Category: Uncategorized (page 1 of 7)

Smartphone user gave consent by website registration to receive texts

consent by website registration

Plaintiff sued defendant alleging defendant sent unsolicited text messages that violated the Telephone Consumer Protection Act (TCPA). Defendant moved for summary judgment. The court granted the motion. It found that plaintiff expressly gave consent by website registration to receive the text messages when she signed up for defendant’s services. This was a significant win for defendant because the TCPA provides for stiff penalties. 

Consent by website registration

Plaintiff used her smartphone to sign up for defendant’s food delivery services. When she registered, she left checked a box opting in to receive text messages. She also provided her cell phone number.

Defense of express consent

Defendant raised the affirmative defense of express consent as an affirmative defense. Plaintiff claimed the signup process did not include a clear and conspicuous disclosure that she would receive text messages. The court rejected defendant’s arguments. It found that the website disclosure was clear and conspicuous.

Pre-checked box was okay

And the court rejected plaintiff’s argument that the pre-checked box opting in was no a valid electronic signature. The court recognized, among other things, that smartphones are a pervasive part of daily life, and a significant majority of American adults own smartphones. It also noted that it should consider the perspective of a reasonably prudent smartphone user. On these facts, the court found that the phone disclosure reasonably conveyed that registering an account with the phone communications box checked would indicate consent to phone communications regarding advertising.

Lundbom v. Schwans Home Service, Inc., 2020 WL 2736419 (D. Oregon, May 26, 2020)

See also: Browsewrap enforceable: hyperlinked terms on defendant’s website gave reasonable notice

About the author: Evan Brown is a technology and intellectual property attorney helping clients with a variety of online issues. Call him at (630) 362-7237 or send email to ebrown@internetcases.com. Follow on Twitter and Instagram

Identifying unknown online copyright infringers: guidance

unmasking online copyright infringers

A recent case addressed the problem of identifying unknown online copyright infringers. Plaintiff sued some unknown “John Doe” defendants who infringed plaintiff’s copyrights. To keep the lawsuit moving forward, plaintiff needed to serve the complaint on the defendants. But this presented a challenge, since plaintiff did not know to whom it should deliver the documents. So plaintiff filed a motion with the court, asking for permission to send interrogatories and to take depositions that would help unmask the anonymous infringers. Plaintiffs sought to get information from parties including PayPal, Cloudflare and various domain name registrars. The court’s response provides guidance to parties seeking to learn the identities of unknown parties.

To identify unknown online copyright infringers: early discovery

The rules of procedure in federal court do not permit discovery requests until the parties have had an initial conference with each other. But they cannot have that conference if the defendant is unknown. So the plaintiff needs to send discovery requests earlier than what the rules generally allow. It needs the court’s permission to do so.

A court will not permit early discovery in every instance. But courts have made exceptions, permitting limited discovery after a plaintiff files the complaint to permit the plaintiff to learn the identifying facts necessary to permit service on the defendant. Courts allow these requests upon a showing of good cause.

What constitutes good cause for early discovery?

This court applied the three part test for good cause set out more than 20 years ago in the case of Columbia Ins. Co. v. Seescandy.com, 185 F.R.D. 573 (N.D. Cal. 1999). The party seeking early discovery should be able to:

  • Identify the missing party with sufficient specificity such that the court can determine that the defendant is a real person or entity who could be sued in federal court;
  • Identify all previous steps taken to locate the elusive defendant; and
  • Establish to the court’s satisfaction that the suit against defendant could withstand a motion to dismiss.

Early discovery was appropriate in this case

Under the first prong of the test, the court found that plaintiff identified the missing parties with as much clarity as possible. Plaintiff stated that those missing parties were persons or entities, and that those parties had been observed and documented as infringing on plaintiff’s copyrights. Thus, as real persons or entities, those Doe parties could be sued in federal court.

As for the second prong, the only information plaintiff had regarding the defendants was the existence of accounts relating to the operations of the defendants’ websites. Therefore, there were no other measures plaintiff could take to identify the defendants other than to obtain their identifying information from the parties from whom it was sought.

Finally, on the third prong, for identifying unknown copyright infingers, the court found that plaintiff had pled the required elements of direct and contributory copyright infringement. Plaintiff claimed (1) it owned and had registered the copyrighted work at issue in the case; (2) defendants knew of the infringing activity and were conscious of their infringement; and (3) defendants actively participated in this infringement by inducing, causing and contributing to the infringement of plaintiff’s copyrighted work. Since plaintiff had alleged each of these elements properly, this cause of action could withstand a motion to dismiss.

MG Premium Ltd. v. Does, 2020 WL 1675741 (W.D. Wash. April 6, 2020)

Related: 

Video: How to stop phishing using your company’s trademarks

COVID-19: Phishing is up since the beginning of the Coronavirus crisis began. Companies can file a straightforward action to stop fraudsters using domain names similar to the company’s trademark.

Related blog post: How companies can use their trademarks to combat COVID-19-related phishing

Fortnite player’s “anxiety and anguish” were not enough to support a lawsuit against game developer over data vulnerability

Plaintiff – one of the millions of people who have played Fortnite – sued Fortnite developer Epic Games based on a data vulnerability in the Fortnite platform and an apparent hacking incident that took place in 2018. After the case was moved from state court in Illinois to federal court there, and then to federal court in North Carolina, defendant moved to dismiss for failure to state a claim.

This young man is feeling anxiety and anguish. He probably would not have standing in a data breach case.

The court dismissed the case, finding that the court lacked subject matter jurisdiction, since plaintiff had not sufficiently alleged that he had suffered an “injury-in-fact”.

It held that the mere existence of a data vulnerability does not constitute injury-in-fact. Instead, a complaint must allege a sufficient factual basis from which to conclude either that plaintiff’s compromised data has been misused, or that it will be misused, such that concrete harms are actual or imminent.

In this case, plaintiff’s complaint contained no facts showing, or even suggesting, that his personal data had been used as a result of the cyber vulnerability. Plaintiff’s complaint did not even state that his data was taken, only that Fortnite had a cyber vulnerability that could have allowed hackers to access his data.

Plaintiff’s only alleged harms were “time and effort to mitigate the risk of identity theft” and “anxiety and anguish”. The court held that anxiety and anguish resulting from data breaches do not confer standing. And without a single fact alleged to show that future harms were certainly impending, the money, time, and effort spent by plaintiff were merely self-imposed harms in response to a speculative threat. In the court’s view, the threat of future injury was wholly speculative and insufficient for standing.

Krohm v. Epic Games, Inc., No. 19-173, 2019 WL 4861101 (E.D. N. Carolina, October 1, 2019)

About the Author: Evan Brown is a Chicago technology and intellectual property attorney. Call Evan at (630) 362-7237, send email to ebrown [at] internetcases.com, or follow him on Twitter @internetcases. Read Evan’s other blog, UDRP Tracker, for information about domain name disputes.

Attorney-client privilege protected defendants’ lawyers’ communications with PR firm hired to combat negative online treatment

In defending intellectual property claims over video games, defendants’ law firm hired a public relations firm to assist it with “input on legal strategy, including regarding initial pleadings and communications about the case to counteract [plaintiff’s] false and negative statement.” Defendants were allegedly being targeted by negative online attacks by the plaintiff.

During discovery, plaintiff served a subpoena on the hired PR firm, seeking, among other things, all documents relating to the communciations between the PR firm and defendants’ counsel.

Defendants sought to quash the subpoena, arguing the information was protected from disclosure under the attorney-client privilege. The court quashed the subpoena.

It found that because defendants’ counsel (and not defendants themselves) hired the PR firm to provide PR counseling specifically for the purposes of litigation strategy, the attorney-client privilege extended to the communications between the PR firm and defendants’ counsel pertaining to “giving and receiving legal advice about the appropriate response to the lawsuit and making related public statements.”

Specifically, these communications were

  • confidential communications made
  • between lawyers and public relation consultants
  • hired by the lawyers to assist them in dealing with the media in cases or litigation
  • that were made for the purpose of giving or receiving advice
  • directed at handling the client’s legal problems that were undeniably protected by the attorney client privilege.

The court similarly found that the attorney work product doctrine extended to the communications exchanged between the PR firm and defendants’ counsel. As could be seen by the privilege log, documents such as a “draft Answer and Counterclaim” and a “draft press release” would contain “the mental impressions, conclusions, opinions, or legal theories of a party’s attorney or other representative concerning the litigation.” Moreover, documents such as a “draft Answer and Counterclaim” and a “draft press release” were “prepared in anticipation of litigation or for trial.” Defendants’ counsel also did not waive their work-product protection when they shared otherwise valid work product (e.g. draft Answers or Counterclaims) with the PR firm for assistance because the communications were intended to be confidential.

Stardock Systems, Inc. v. Reiche, 2018 WL 6259536 (N.D.Cal. Nov. 30, 2018)

See also: Emails sent through Yahoo account using work computer protected under attorney-client privilege

Summary judgment awarded to luxury brand against cybersquatter under ACPA

Plaintiff (the luxury brand Chanel) sued defendant under the Anti-Cybersquatting Consumer Protection Act (15 U.S.C. 1125(d)) (“ACPA”) over defendant’s registration and use of the disputed domain name <chanelgraffiti.com>. Plaintiff moved for summary judgment on its ACPA claim. The court granted the motion.

Distinctiveness of plaintiff’s mark

Defendant did not contest that plaintiff’s CHANEL mark was distinctive at the time the disputed domain name was registered. Plaintiff had put forth evidence that it owned registered trademarks for the mark CHANEL, and the court noted that registered trademarks are presumed to be distinctive.

Confusing similarity

The court found that the disputed domain name was confusingly similar to plaintiff’s mark. Citing 5 McCarthy on Trademarks § 25:78 (4th ed. 2002), the court held that “[i]n the cybersquatting context, ‘confusingly similar’ must simply mean that the plaintiff’s mark and the defendant’s domain name are so similar in sight, sound, or meaning that they could be confused.” The court found that defendant offered no admissible evidence to suggest that chanelgraffiti.com was not confusingly similar to the mark CHANEL.

Even with the additional word “graffiti” appearing within the disputed domain name, the court found that the similarities between the CHANEL mark and the disputed domain name were “instantly apparent because of the inclusion of the word” CHANEL in the disputed domain name. Moreover, defendant did not claim that the term “chanel” was meant to reference anything other than the luxury brand. Similarly, the court found that the including of the term “graffiti” did not self-evidently connote a type of criticism or disregard for the brand that rises to a meaningful level of distinction.

Bad faith intent

The court also found that there was no reasonable dispute that defendant had a bad faith intent to profit from the CHANEL mark. It found that bad faith could be inferred from defendant’s intent to divert consumers from plaintiff’s online location to a site accessible under the disputed domain name that could harm the goodwill represented by plaintiff’s mark, either for commercial gain or with the intent to tarnish or disparage plaintiff’s mark, by creating a likelihood of confusion as to the source, sponsorship, affiliation, or endorsement of the site.

The court found that the disputed domain name unquestionably advertised products containing plaintiff’s mark and had product descriptions that read “CHANEL inspired graffiti bags.” Defendant disputed that he had any control over the content of the site, stating that he did not operate the website and had no connection to the disputed domain name outside of registering it.

Whether and to what extent the site was used or operated by defendant, however, was beside the point under ACPA. Defendant did not dispute that his registration of the disputed domain name, regardless of the content of the site, would divert customers from plaintiff’s website by creating a likelihood of confusion as to the affiliation of defendant’s site, which was a “quintessential example of bad faith within the meaning of ACPA.”

Chanel, Inc. v. Richardson, 2018 WL 6097865 (S.D.N.Y. November 20, 2018)

Expedia’s online clickwrap agreement upheld

i_agree

Plaintiff airline ticket buyer sued Expedia in court for, among other things, fraud, claiming that he was entitled to a refund of the price of his ticket because he had to cancel for medical reasons. Expedia moved to compel arbitration. The court granted the motion.

It found that plaintiff manifested his clear agreement to the arbitration clause in Expedia’s online terms and conditions when he selected the “complete booking” button on the “Review and book your trip” screen during his ticket purchase process.

It also found that each of plaintiff’s claims were encompassed by the arbitration agreement found in the online terms. The arbitration agreement entered into by the parties stated that “[a]ny and all Claims will be resolved by binding arbitration.” There was no apparent exception for fraud or contract claims, and plaintiff did not argue that any exception existed.

Van Den Heuvel v. Expedia Travel, 2017 WL 5133270 (E.D. Cal., November 6, 2017

About the Author: Evan Brown is a Chicago technology and intellectual property attorney. Call Evan at (630) 362-7237, send email to ebrown [at] internetcases.com, or follow him on Twitter @internetcases. Read Evan’s other blog, UDRP Tracker, for information about domain name disputes.

Microsoft letter to GitHub over DRM-free music software is not the first copyright-ironic action against an intermediary

TorrentFreak has reported that Microsoft demanded that GitHub take the code repository of an app that provides access to unprotected Xbox Music tracks. Some are calling it ironic, given that Microsoft is offering access to DRM-free music through its API.

The situation is reminiscent (though not legally identical) to the weirdness we observed way back in 2006 when YouTube asked TechCruch to take down a tool that allowed people to download video clips. We recognized early on that YouTube was a copyright renegade. So it was surprising that it would take such an aggressive tactic toward purveyors of software that would make use of copyrighted works easier.

The Microsoft of today is certainly not the YouTube of 2006. So naturally its interests are different. But comparing the two scenarios yields the common conundrum of how one company that wants to more smoothly make content available deals with other technologies and platforms that do the same thing, but cut out the main monetizing opportunity.

It could be a phenomenon of copyright’s outdatedness. Both YouTube and Microsoft took action against others who were distributing technologies that touched on infringement by means of making copies of the works. That will likely remain an important protection under copyright law even after meaningful reform. But what is really at stake is the right to access content. If that were a meaningful right under the Copyright Act, companies would be less likely to take enforcement actions that appear on the surface to be ironic.

Evan Brown is an attorney in Chicago advising clients on matters dealing with copyright, technology, the internet and new media.

One must conscientiously and systematically perform abstraction-filtration-comparison test in software copyright infringement matters

In all copyright infringement cases, a plaintiff must prove, among other things, that the defendant copied elements of plaintiff’s work that are protected by copyright. This is key because not all copying is infringement – some of what is copied may be merely ideas, processes, facts, in the public domain, or scenes a faire material. It’s not illegal to copy those things. So a successful plaintiff has to show more than “copying in fact”. It must show “illegal copying”.

Software infringement cases present some nuance for this analysis. A computer program has different levels of abstraction (i.e. from main purpose down to object code), and when the only similarities are at higher levels of abstraction, there is less chance that infringement has occurred. Some courts employ the “abstraction-filtration-comparison test” to evaluate whether a defendant accused of infringing the copyright in software has indeed illegally copied protected elements of the plaintiff’s work:

At the abstraction step, we separate the ideas (and basic utilitarian functions), which are not protectable, from the particular expression of the work. Then, we filter out the nonprotectable components of the product from the original expression. Finally, we compare the remaining protected elements to the allegedly copied work to determine if the two works are substantially similar.

Plaintiff sued one of its founders for copyright infringement after that founder had moved to another company and had developed software allegedly similar to software he had created while at plaintiff-company. The parties agreed to have a special master evaluate the parties’ software to opine on whether defendant had infringed. The special master found there to be infringement, and the district court agreed, ordering that copies of defendant’s software be destroyed.

Defendant sought review in the Tenth Circuit. On appeal, the court vacated and remanded. It held that the special master failed to properly document the steps involved in conducting the abstraction-filtration-comparison test.

The court found there was little evidence the special master performed the abstraction step. Although “[a]pplication of the abstractions test will necessarily vary from case-to-case and program-to-program,” a “computer program can often be parsed into at least six levels of generally declining abstraction: (i) the main purpose, (ii) the program structure or architecture, (iii) modules, (iv) algorithms and data structures, (v) source code, and (vi) object code.” In the court’s mind, “[a]bstraction is important, and it cannot be neglected here.”

The failure to “conscientiously and systematically” perform the abstraction step tainted the remainder of the three-part test. The court criticized the special master’s application of the filtration and comparison steps, observing that the special master apparently proceeded from the false premise that an infringement analysis begins and ends with “copying in fact.” The special master went to great lengths to show that defendant took steps to conceal his copying of source code (e.g., by omitting comments). But having not first properly separated out (by filtering) the unprotected elements after abstraction, the special master’s report was not sturdy enough to support a finding in the district court that infringement had occurred.

Paycom Payroll, LLC v. Richison, — F.3d —, 2014 WL 3377679 (10th Cir. July 11, 2014)

Tomcar sales using Bitcoin reveal some new norms

The Australian off-road utility vehicle manufacturer Tomcar has begun accepting Bitcoin as a form of payment for its direct sales to customers. This example of Bitcoin’s expansion into the marketplace sends a few interesting messages, among them:

  • Sellers and buyers will be motivated to use the cryptocurrency for reasons other than anonymity: Tomcar’s stated reason for liking Bitcoin is to avoid credit card transaction fees and unfavorable international currency exchange rates.
  • Bitcoin plays a role in the supply chain, not just in transactions with the end user. Tomcar is paying some of its suppliers using Bitcoin. The Winklevoss twins say Bitcoin could become the currency for an entire country.
  • Payment gateway CoinJar (which Tomcar uses) is an interesting specimen. It’s not just the Brothers Winklevii who are investing in the Bitcoin marketplace.
  • The Silk Road shutdown was a good thing. Cryptocurrency lends itself well to a seedy marketplace. And those seeds, watered with unscrupulousness, will bear fruit of bad reputation. Tomcar’s founder hails Silk Road’s demise, since a lack of association with the unlawful will do the currency some PR good.

One can’t help but wonder whether there are some opportunities to reinforce some stereotypes when thinking about Tomcar and the people who would buy them. The off-road utility of the vehicles would come in handy in the post-apocalyptic world occasioned by the collapse of modern governments – the very entities running a monetary system that the Bitcoin enthusiast gladly wishes to circumvent.

« Older posts

© 2020 internetcases

Theme by Anders NorenUp ↑