Supporting the Ravens
Our office manager and Senior Paralegal Tina Neuman in attendance at the Ravens game on Thanksgiving, supporting our Ravens that beat the Steelers 22-20 (phew!)
We hope everyone had a wonderful Thanksgiving.
Our office manager and Senior Paralegal Tina Neuman in attendance at the Ravens game on Thanksgiving, supporting our Ravens that beat the Steelers 22-20 (phew!)
We hope everyone had a wonderful Thanksgiving.
Article by: Larry J. Guffey, Esq. and Pamela K. Riewerts, Esq.
A patent applicant who seeks the benefit of marking an article as “Patent Pending” must make a good faith effort to ensure that the articles are properly and consistently marked. An effective way to do this is to mark the article as “Patent Pending”. Use of this notice alerts the public that your article may soon be patent protected and that once a patent is issued, you have the right to initiate a patent infringement lawsuit against someone who is potentially infringing on that patent and wherein you seek monetary damages or other remedies for the copying, etc. of your patented article.
An applicant may only mark an article with “Patent Pending” once a patent application is filed with the Patent Office. It is also pertinent to note that it is a criminal offense to mark or offer to sell an article as “Patent Pending,” when an application for the invention has not yet been filed.
In deciding how and where to mark articles as “Patent Pending”, a patent applicant should be mindful of the purpose of giving public notice and also use common sense. For example, patent markings may be formed directly on the “Patent Pending” article by etching, molding, or printing, or if you are unable to place the marking on the article itself due to “the character of the article”, the notice may be provided on any packaging of the article, including the box and enclosed packaging papers, or marketing and promotional materials. In addition, there may be particular challenges that a patent applicant or patentee endures to properly mark an article. For example, often times, labels may fall off of the articles in transit, etc. The courts generally follow the “rule of reason” approach to hold that constructive notice is achieved when the patent applicant or patentee consistently marks substantially all of the articles.
Once a patent has been issued for the invention and you are a patentee rather than a patent applicant, the marking on the article should be changed from “Patent Pending” and instead be marked with the patent number and marked in the following manner: e.g., “U.S. Pat. No. X,XXX,XXX”, where your patent number is inserted therein. Examples of the proper use of this patent number marking can be found on the products and packaging of many reputable manufacturers.
More recently, the America Invents Act (AIA) allows patented articles to be marked “virtually” by using the internet. In order to comply with virtual marking requirements, the owner must mark the article itself, or the article packaging if it is not possible to mark the article, with the word “patent” or “pat.” along with a freely-accessible, internet address where one can find the patent numbers applicable to the patented article. Virtual marking provides certain advantages including aesthetic appeal as well as being able to easily update and identify later issued patents relating to the article without having to remark the articles individually. Instead, only a revision to the website page is needed. Examples of virtual marking via internet webpages may be found here: Examples of Virtual Marking
Please note that we recommend consulting with a patent attorney before moving forward with any marking or notice provisions.
Copyright 2013 Oliver & Grimsley, LLC
Disclaimer: The information provided in this article is not legal advice. It cannot be such since legal advice must be tailored to the specific circumstances of each case, including the consideration of federal law and jurisdictional law that can vary greatly from state to state. However, it is hoped that the information provided above will be helpful in familiarizing its readers with issues that may affect them.
Earlier this year, the United States Patent Office (USPTO) implemented a “Micro Entity” applicant status pursuant to the 2011 America Invents Act (AIA). This rule allows qualifying applicants to receive a 75% fee reduction of certain fees—including fees for filing, searching, examining, issuing, appealing, and maintaining patent applications and issued patents. See the USPTO Fee Schedule for a complete listing of fees.
An applicant may qualify for “Micro Entity Status” based on: (1) experience and gross income; or (2) status as an Institution of Higher Education.
(1) Micro Entity Qualification Based on Experience and Gross Income:
An applicant must certify to the following four criteria:
(2) Micro Entity Qualification for Institution of Higher Education Status:
An applicant must certify to one of the following criteria:
Moving forward, applicants can secure (or lose) reduced fees at anytime throughout the life of a filed application or issued patent. Keep in mind that each time fees are paid the applicant must certify that it has “Micro Entity” status. Therefore, it’s best to conduct to review of these requirements prior to each fee filing.
For more information on this topic, please contact Pamela K. Riewerts, Esq. (U.S. Registered Patent Attorney) at pamela@olivergrimsley.com
Beginning in 2015, any website or mobile service that is directed to minors under the age of 18 and allows them to post content, will have to delete that content on request of the minor user. SB 568 provides in part that a site directed to minors must “(1) Permit a minor who is a registered user of the operator’s Internet Web site, online service, online application, or mobile application to remove or, if the operator prefers, to request and obtain removal of, content or information posted on the operator’s Internet Web site, online service, online application, or mobile application by the user. (2) Provide notice to a minor who is a registered user of the operator’s Internet Web site, online service, online application, or mobile application that the minor may remove or, if the operator prefers, request and obtain removal of, content or information posted on the operator’s Internet Web site, online service, online application, or mobile application by the registered user. (3) Provide clear instructions to a minor who is a registered user of the operator’s Internet Web site, online service, online application, or mobile application on how the user may remove or, if the operator prefers, request and obtain the removal of content or information posted on the operator’s Internet Web site, online service, online application, or mobile application. (4) Provide notice to a minor who is a registered user of the operator’s Internet Web site, online service, online application, or mobile application that the removal described under paragraph (1) does not ensure complete or comprehensive removal of the content or information posted on the operator’s Internet Web site, online service, online application, or mobile application by the registered user”
Some exemptions to this requirement apply (such as data that must be retained for law enforcement, data that is posted by a third party about the minor, and data that is anonymized). It is not clear (to this writer) that the law would apply after a minor reaches his or her 18th birthday. In other words – it is not clear a minor who does not make the request before their 18th birthday could make the deletion request after their 18th birthday.
That law also prevents a site “directed to minors” from presenting any content or advertising in the following enumerated categories:
Craigslist, Inc. v 3Taps Inc., No. CV 12-03816 CRB. (N.D. Ca. August 16, 2013) is another case in a now long line of cases that establish that in most situations access to even an otherwise publicly accessible website can be controlled via selective authorization.
The 3Taps case is very straightforward. 3Taps scraped Craigslist’s website, and replicated it. Craigslist sent them a letter revoking all permissions to access the Craigslist site, but 3Taps ignored that and circumvented IP filters and continued accessing the website, and replicating it. In other words, Craigslist “singled out” 3Taps and told them that they could not access the Craigslist website. 3Taps was singled out because it was copying the entire Craigslist site, in apparent competition with Craigslist.
Note that unlike the Digital Millenium Copyright Act, which requires there to be sufficient technological measures to protect copyrighted content before there would be a finding of circumvention, under the CFAA, no such technological measures are required. 3Taps sought to dismiss the complaint filed by Craigslist, which complaint asserted that 3Taps violated the Computer Fraud and Abuse Act (“CFAA”) which generally prohibits a person from “intentionally accesses[ing] a computer without authorization or exceed[ing] authorized access, and thereby obtain[ing] . . . information from any protected computer.” The essence of 3Taps’ argument was that because the Craigslist website is publicly available, the CFAA does not apply, and therefore, just as anyone else had “authorization” to access and use the website, so did 3Taps. [Note: this decision did not address copyright issues with 3Taps’ conduct.]
A long line of cases enforce “terms of service ” either under contract law, under the CFAA, or both – that is, if terms of service authorize access to information on certain conditions, and those conditions are not met, then the access to that information is not authorized and is a violation of the contract and often, the CFAA. See Register. com, Inc. v. Verio, Inc., 126 F. Supp. 2d 238 (S.D.N.Y. 2000), affirmed on other grounds, 356 F. 3d 393 (2nd Cir. 2004) and their progeny.
You can now add this case to that list. This case even more bluntly stands for the proposition that a website owner can, with only the typical “protected class” exceptions, discriminate against a particular user and revoke authorization, while at the same time generally authorize the public to access and use the website. This right, moreover, does not make the website operator a so-called common carrier, and the website operator does not give up its other important immunities, such as the immunity under the Communications Decency Act (47 USC 230). There may be other limitations on a website’s right to discriminate – for example, there may be first amendment interests in the data being accessed, or there might be an argument that certain provisions in a contract limitation constitute a copyright misuse (and hence might make enforcement of the contract, even under the CFAA, problematic). However, in the majority of private interest cases like Craigslist (or Twitter, or Facebook or virtually any other social media provider) – the owner of the data is going to have a pretty broad right in the U.S. and under U.S. law to protect access to that data via restrictions either in a terms of service, or more directly as was done in the 3Taps case.
Congress is considering an amendment to the CFAA (Aaron’s law – for background, see this Techdirt article the EFF pages, and what I believe is the current draft here) that might limit a website platform operator’s use of the CFAA to control its content . . . but that issue has come up in various contexts before and Congress has not seemed to have much appetite for monkeying with the CFAA. Also, that would not eliminate the breach of contract claim (see the Verio case above).
The 3Taps case has been cited in some online commentary for the proposition that IP proxies or anonymization systems (like Tor) are “illegal.” That is not what the court held. There are many legal and pro-privacy reasons to use such systems that would not violate the CFAA. The simplest example would be use of such a system to avoid being tracked while browsing the web. In these cases you are not accessing a protected computer without authorization, you are simply sending a false identifier to a computer that is collecting the data on its own volition. CFAA punishes unauthorized access, not access gained by presenting false location or identification data. However, under the 3Taps case, apparently a terms of service agreement could be written to withdraw consent to any access of the site if a person is using a location or tracking anonymizer/IP spoofer, and hence, a person using such a service and accessing the site could then be in violation of the CFAA. That question, however, also raises substantial 1st Amendment issues (right to anonymous speech), which were not present in 3Taps. Thus, it is not clear at all that a court would hold that the CFAA claim would survive in that instance.
Until Congress modifies the CFAA internet users should be cautious about use of “publicly available” but privately owned information on a website, RSS feed, social media firehose, or other resource, and be careful to read and comply with the terms of service. [Note: this blog entry does not address governmental or public information, FOIA or the right (or lack of a right) under a contract or CFAA to “privatize” governmental public data]
For more information contact Mike Oliver
(unless specifically attributed, all links on this page are provided for information purposes only and have not been vetted by, and do not necessarily represent the views of, the author)