Copyright Infringement Claims to BitTorrent File Sharing on the Rise

BitTorrent is a peer to peer file sharing protocol that allows its members to share pieces of a file simultaneously such that each user can access and view the entire file without downloading it completely. It was designed to facilitate the sharing of large files and minimize the demand on an individual server. A seed user uploads the file and then peer users join the network, each simultaneously sending and receiving pieces of the file within the swarm of users.

BitTorrent file sharing has the capacity to be used for software and content updates as well as the authorized distribution of media content and comprises a significant amount of total web traffic and bandwidth consumption. Several BitTorrent sites index and catalog publicly-available media files, including movies, television shows, music, video games, and applications, while some files are shared only within a closed group.

When copyright protected material is shared using a BitTorrent protocol without the holder’s permission, each transmission among the users constitutes a copyright infringement. Media distributors, including movie studios, have begun targeting BitTorrent peers through their IP addresses and filing mass lawsuits against up to several thousand downloaders at time. Statutory penalties can be as high as $150,000 but are often much lower.

For the purposes of naming defendants in these sweeping lawsuits, internet service subscribers are identified by their IP addresses. For business owners, that means that any infringing downloads that occur over your connection by your employees, customers, and neighbors can be traced back to your business, in much the same way that a red-light ticket comes to the registered owner of a car regardless of who was driving it. While you may not be able to monitor all internet activity over your home or business network, especially if you have a large number of employees, network security and clear policies and training on internet use limitations can help to prevent unwanted copyright infringement in your business’ name. BitTorrent files and client software often carry viruses and malware as well and should be avoided unless needed for a designated purpose.

For more information on BitTorrent copyright enforcement contact Mike Oliver.

FTC Privacy Report

In April 2012, the Federal Trade Commission issued its report entitled “Protecting Consumer Privacy in an Era of Rapid Change.”  You can read that here.

The Report, while a comprehensive review of hundreds of undoubtedly conflicting filings by the various extreme factions on privacy issues, ultimately just boils down to the FTC complaining that Congress has still not taken any action to normalize privacy rules.   Let’s face it, privacy law is a mess – a hodge podge of state laws, some specific federal laws in the area of financial account, children, protected health information, and education areas, and a morass of case law and regulatory rules – rules that mostly derive from other laws (like the Lanham Act) not really intended to address privacy.  For example, many of the actions the FTC has brought to enforce so called privacy, really involve false advertising – a company saying one thing to a consumer, and doing another, or offering some ability to control a privacy setting, and then ignoring the user setting.

The Report sets forth the FTC’s overview of its objectives and scope summarized here:

  • does not apply to companies that collect only non-sensitive data from fewer than 5,000 consumers a year, provided they do not share the data with third parties
  • “commonly accepted” information collection and use practices for which companies need not provide consumers with choice (product fulfillment, internal operations, fraud prevention, legal compliance and public purpose, and first-party marketing).
  • recommended that companies provide consumers with reasonable access to the data the companies maintain about them, proportionate to the sensitivity of the data and the nature of its use.
  • respect browser and consumer “do not track” election
  • disclose privacy in use of Mobile Applications (also, the major platform providers recently signed an agreement with California, to require all apps on their platforms to link to a privacy policy
  • allowing consumers to have access to and to correct information held by so called “data brokers”
  • industry self-regulation (“no lip service”)

In terms of the actual principles, they are:

  • Companies should incorporate substantive privacy protections into their practices, such as data security, reasonable collection limits, sound retention and disposal practices, and data accuracy
  • Companies should maintain comprehensive data management procedures throughout the life cycle of their products and services
  • Companies should simplify consumer choice (Companies do not need to provide choice before collecting and using consumer data for practices that are consistent with the context of the transaction or the company’s relationship with the consumer, or are required or specifically authorized by law)
  • For practices requiring choice, companies should offer the choice at a time and in a context in which the consumer is making a decision about his or her data. Companies should obtain affirmative express consent before (1) using consumer data in a materially different manner than claimed when the data was collected; or (2) collecting sensitive data for certain purposes
  • Privacy notices should be clearer, shorter, and more standardized to enable better comprehension and comparison of privacy practices
  • Companies should provide reasonable access to the consumer data they maintain; the extent of access should be proportionate to the sensitivity of the data and the nature of its use
  • All stakeholders should expand their efforts to educate consumers about commercial data privacy practices

From a lawyer for small to medium size businesses, it would be very helpful for some national, pre-emptive legislation that gave a lot of guidance and safe harbors for businesses so that they do not have top worry that they are violating some esoteric rule buried in some regulation, order or arcane state law.  Unlikely to happen, though . . .

For more information, contact Mike Oliver.

 

Delaying trademark enforcement can impact your rights

A question often arises – does an owner of an intellectual property right have the duty to enforce it?  While the answer is no, the failure to do so in the face of known infringement can damage and limit the ability to enforce the right in the future.  This legal doctrine – laches – borrows from the statute of limitations – which prevents a claim from being filed if the event giving rise to the claim occurred a distance in the past.  This doctrine applies differently in each area of intellectual property, but is most critical, and hardest to determine, in trademark cases.

In trademark cases, the elements in the 4th Circuit (and most circuits) are as follows:  “In determining whether laches operates as a defense to a trademark infringement claim, we consider at least the following factors: (1) whether the owner of the mark knew of the infringing use; (2) whether the owner’s delay in challenging the infringement of the mark was inexcusable or unreasonable; and (3) whether the infringing user has been unduly prejudiced by the owner’s delay.” Ray Communications v. Clear Channel, 4th Cir Ct (March 8, 2012).

“[I]n the laches context, “(1) delay is measured from the time at which the owner knew of an infringing use sufficient to require legal action; and (2) legal action is not required until there is a real likelihood of confusion.”  See  What-A-Burger of Virginia, Inc. v. Whataburger, Inc. of Corpus Christi, Texas, 357 F.3d 441, 451 (4th Cir. 2004).

The mark at issue in Ray Communications is AGRINET for “educational services rendered through the medium of radio; namely, a program of interest to farmers.”  The the defendant used similar marks such as “OKLAHOMA AGRINET” for agricultural news programming on the air and in marketing.  The defendant had been using the potentially infringing marks for many years – plaintiff filed its case in 2008, but the use of the defendant commenced in the late 70’s and early 80’s – about 20 years prior to the filing date of the complaint.

While this case reversed the district court’s decision in favor of the defendant – largely because the record was not developed adequately to establish such relief, the case demonstrates the complexity of determining when and how to enforce a trademark.  For example, there was evidence that the defendant had changed certain marks, and that it had used some of the marks under license from the plaintiff – facts not considered in the lower court.

Trademark enforcement is important to maintain the trademark strength, but the failure to enforce it in some cases, will not prevent later enforcement as the infringement looms large.

For more information, contact Mike Oliver or Kimberly Grimsley.

Technical Trademark Dilution Bill is signed by the president

Section 1125(c)(1) of Title 15 (link here) provides as follows: “Subject to the principles of equity, the owner of a famous mark that is distinctive, inherently or through acquired distinctiveness, shall be entitled to an injunction against another person who, at any time after the owner’s mark has become famous, commences use of a mark or trade name in commerce that is likely to cause dilution by blurring or dilution by tarnishment of the famous mark, regardless of the presence or absence of actual or likely confusion, of competition, or of actual economic injury.”

Current law however also provided that a ownership of a valid registered mark was a complete bar to an action under state law, seeking a similar dilution remedy.  15 USC 1125(c)(6).  The law, however, was inartfully worded such that it could be and was read to bar even claims based on federal law.

This “error” in the statute was corrected in 112 HR 6215 (https://docs.house.gov/billsthisweek/20120910/BILLS-112hr6215-SUS.pdf ) by making it clear that ownership of a federal registration is not a bar to an action for dilution under federal law.  Though this is a “technical” change, the old law applies prior to the date this law came into effect, and at least one tribunal has read the old law literally, barring a claim for dilution against a federal trademark holder.

For more information, contact Mike Oliver or Kimberly Grimsley.

Recent court decision in Oracle v Google raises serious copyright questions in certain types of software

In a decision in the Oracle v Google case, the court held that APIs – application program interfaces – small amounts of human readable source code, are not sufficiently original to qualify as copyrights.  This decision can impact API licenses, which most likely are based on copyrights.

What Google did.  Google decided that to construct a mobile platform operating system (ultimately, the Android operating system) it wanted to be able to “interoperate” with java programs – in this way, developers could rapidly publish their programs written in Java, to the mobile platform.  In order to do this, however, Google either needed a license to the Java virtual machine to allow it to “port” it to the mobile hardware, or it needed to emulate that environment.  Google approached Sun (later bought by Oracle) for this license, but the parties never agreed.  Google eventually copied the names of the base classes and methods, and wrote its own original code to implement the particular functions.  So as an example, a Java program would call a function, using the precise identical name of the function, class or method, but the “behind the scenes” black box code in Android that returned a result, was written by Google and not copied from Java.  Google did a few other things (for example, they decompiled some executable code in Java, and used the source code derived from that to test their own software compatibility, and they included verbatim 9 lines of code in a range check function, which the court utterly dismissed as De-minimis copying)

What Oracle claimed.  Faced with having examined 15 million lines of code and discovering that only the structure, sequence and function was copied, Oracle took the position that it had a copyright in that structure, function and sequence.

What the court held.  The parties had agreed that the issue of copyright was for the court to decide, with the jury being the arbiter of any infringement or damages.  The court did a very good job of reviewing the history of protection of computer software – which really started in about 1980, with amendments to the Copyright Act that recognized computer software as a literary work.  (this case is very well written and researched, so I can commend it to anyone who wants a crash course in software law)

The trouble with the copyright protection, however, is that copyrights cannot protect ideas – that is the exclusive domain of patent law.  So, whenever a copyright expresses an idea, we often say that the idea is free but the expression of it may not be.  However, where there is only a limited way of expressing the idea – courts hold that the idea then “merges” into the expression, becoming inseparable, and renders that particular expression free from copyright protection.   That is what the court held here – essentially, the court said that if you want to protect the sequence, function and structure of how a software program works, you must use patent, and not copyright, law.  This ended the case for Oracle, as Oracle had lost on patent infringement.

The court summarized the best argument as follows: “Oracle’s best argument, therefore, is that while no single name is copyrightable, Java’s overall system of organized names — covering 37 packages, with over six hundred classes, with over six thousand methods — is a “taxonomy” and, therefore, copyrightable under American Dental Association v. Delta Dental Plans Association, 126 F.3d 977 (7th Cir. 1997).” (emphasis added)

What impact does this case have?   In the abstract, this case follows a fairly well defined line of cases that have denied copyright protection to such things as menu structures and programmatic access to underlying operating systems.   In this regard, the case does not change the law.  However, in a bigger picture view, and with particular reference to the amount of copying here – all of the main class and method calls in Java were replicated verbatim . . . it could be seen as a step toward requiring either very good contracting practice, or patenting, to protect access to a software language system.   The only other way to protect access is under the Digital Millennium Copyright Act – installing and using a sufficient technological measure that must be decrypted in order to access content.

If a software developer desires to restrict access to base operating code, the Oracle v Google case poses a significant barrier to reliance on copyright alone.  As stated above, the developer should consider proper contract language, patenting the system, and use of encryption technology to unlock such access.

For more information contact Mike Oliver.

Idea theft case narrowly escapes near certain death in 2nd Circuit

The Second Circuit (an important circuit) recently decided FOREST PARK PICTURES v. UNIVERSAL TELEVISION NETWORK, INC. (June 26, 2012), allowing a “pitch man” to overcome a dismissal of his law suit that claimed Universal took his idea for a television show without paying for it.

Raw ideas that cannot be patented (such as ideas for themes or methods of performance of a TV show) can only be protected by a contract, in most cases.  Contrast this with, for example, a script, character development, book, adaptation, or short film – all of which can be protected by copyright.  So, people who have a raw idea but no real copyrightable work behind it (and in some cases, even when then they do have copyrightable content, see Fischer v. Viacom International, 115 F. Supp 2d 535 (D. Md. 2000)) must resort to a delicate balance of asking the person they disclose the idea to, to pay them if they use the idea (or not use the idea without an agreement on compensation).  Many content owners will not make such an agreement.

In this case, the plaintiff alleged that it had “created a written series treatment for the idea, including character biographies, themes, and storylines” and mailed that to an executive at USA Network, and then later had a meeting with that executive to “pitch” the show; the plaintiff alleged “that it was standard in the entertainment industry for ideas to be pitched with the expectation of compensation in the event of use.”  USA Network later came out with the show Royal Pains, a show “in which a doctor, after being expelled from the medical community for treating patients who could not pay, became a concierge doctor to the rich and famous in the Hamptons” – the precise thematic treatment alleged by plaintiff that it had disclosed 4 years earlier.

The problem these cases have is that if the claim essentially sounds in copyright, it must only be brought in Federal Court (and the copyright must be registered to do so) – and worse, copyrights do not protect ideas, only the expression of them.  So, to avoid this preemption effect of copyright law, the plaintiff must plead an “extra element” – and in all of these cases, that extra element is contract (a contract requires proof of an offer, acceptance, consideration, and legality – none of those elements are required to establish copyright infringement).   This court held that “As long as the elements of a contract are properly pleaded, there is no difference for preemption purposes between an express contract and an implied-in-fact contract.”  Hence, the claim survived another day.

We advise our clients to be as express as possible when making pitches, even if in the applicable industry, it is “standard practice” to respect the notion of payment if the idea is used.

For more information contact Mike Oliver.