Blog

Social networking evidence presents challenge in prosectuion over alleged threats made after Virgina Tech shootings

U.S. v. Voneida, 2008 WL 189667 (M.D. Pa. January 18, 2008)

Professor Goldman kindly emailed me a copy of the U.S. District Court for the Middle District of Pennsylvania’s decision in the case of U.S. v. Voneida. This criminal prosecution arose out of some postings that defendant Voneida is alleged to have made on his MySpace page about last April’s Virginia Tech shootings.

The court approached the case with all the awe for the Internet suitable for 1994:

[Voneida’s statements] did not occur in a moment, like words being spoken; nor were they sent from one place to another once and only once, like mailing a letter, broadcasting a message over television or radio, or even sending an email. Rather, Defendant’s comments were communicated, and had the potential to reach an audience, for at least nine days. This is one of the ways in which speech on the internet, and on social networking sites in particular, challenges existing methods of legal analysis.

In this case, the feds claimed that Voneida’s postings ran afoul of 18 U.S.C. 875(c), which prohibits the transmitting in interstate commerce of “any threat to injure the person of another.” Voneida filed a motion in limine requesting that several pieces of evidence be excluded at trial.

One of the pieces of evidence that Voneida wanted kept out was an email message that a student in Pennsylvania sent to university authorities to report the postings. The court denied Voneida’s request on this point.

The court held that in determining whether Voneida’s statements were “true threats,” it would be instructive for the jury to consider the effect of the statements on their audience. Addressing this point, the court observed the following about an online “audience”:

Even if [the student who reported the postings] was an unintended viewer, the context of the internet and social networking sites like Myspace.com may make her part of Defendant’s audience regardless of his intent to reach her as opposed to others. As a part of his audience, her response to his comments is relevant and properly considered when evaluating whether they are “true threats.”

A few more facts would be interesting. What if a social network participant adjusts his profile settings to allow only “friends” see the content? Would the so-called “audience” still be the world at large? To what extent can a publisher technologically constrain his or her audience?

Personal name must have trademark significance for protection under ACPA

Salle v. Meadows, No. 07-1089, 2007 WL 4463920 (M.D. Fla. December 17, 2007)

Defendant Meadows thought that Plaintiff Salle owed him about $9,500.  He was apparently having some trouble getting paid, so he registered the plaintiff’s personal name as a domain name – briansalle.com.  He then tried to sell it to Salle for the amount of the purported debt.  Being uninterested in the purchase, Salle filed a cybersquatting complaint against Meadows in federal court.

Salle asserted claims under both 15 U.S.C. §1125(d) and 15 U.S.C. §1129. Both parties moved for summary judgment. It was a mixed ruling, but largely a win for Salle.

The court addressed the §1129 claim first.  That portion of the Lanham Act provides:

Any person who registers a domain name that consists of the name of another living person, or a name substantially and confusingly similar thereto, without that person’s consent, with the specific intent to profit from such name by selling the domain name for financial gain to that person or any third party, shall be liable in a civil action by such person.

Meadows argued that in trying to sell the domain name and thus recover money owed to him, he was not trying to profit, and therefore not liable under §1129.  Despite some dispute over whether the debt was actually owed and to whom, the court ruled in Salle’s favor.  “[C]yber-extortion is not a permissible way to recover a debt,” the court warned.

As for the §1125(d) claim, the court ruled in Meadows’s favor.  Section 1125(d) provides, among other things, that a person shall be liable to the “owner of a mark, including a personal name which is protected as a mark under [§1125]” if that person has a bad faith intent to profit from that mark. 

Salle argued that §1125 provides that all personal names are subject to trademark protection. Meadows, on the other hand, argued that a personal name must have some sort of trademark significance, e.g., acquired distinctiveness, in order to fall with the protection of §1125. Agreeing with Meadows’s interpretation of the section, the court found that Salle failed to present enough evidence to survive summary judgment on the question of whether he had protectible trademark rights in his personal name.

Filter maker says Apple’s trademark threats a bunch of hot air

“Lowest perceptive capabilities.” Is that code for “a moron in a hurry“?

Chicago-based BlueAir, Inc. has apparently been getting some threats from Apple over BlueAir’s pending trademark registration for the mark AIRPOD, to be used in connection with desk top air purifiers. Apple says AIRPOD will infringe on the IPOD mark.

BlueAir has gone on the offensive, asking the U.S. District Court for the Northern District of Illinois to enter a declaratory judgment of no infringement.

The heart of BlueAir’s allegations are as follows:

“There is no reasonable likelihood of confusion, mistake, or error in the marketplace for persons of even the lowest perceptive capabilities who are seeking an iPod music player considering or buying an AIRPOD desktop air cleaner instead.”

This dispute has been going on for a few months, and it is interesting to see suit filed now, to essentially coincide with the introduction of the MacBook Air.

BlueAir, Inc. v. Apple, Inc., No. 08-427 (N.D. Ill. filed January 18, 2007)
[Download the Complaint]

Anonymous alleged infringer identified with little substantive inquiry into infringement claim

[In re Subpoena Issued Pursuant to the Digital Millennium Copyrigt Act to: 43SB.com, No. 07- 6236, 2007 WL 4335441 (D. Idaho, December 7, 2007).]

When the general counsel for Melaleuca, Inc. saw some negative content someone had posted about the company on the Web site 43rdstateblues.com, he sent a cease and desist letter demanding the content be removed. The letter, however, did not accomplish its intended purpose. Instead, the site owner posted the entire letter.

Melaleuca did not give up, but just adapted its strategy. It served a DMCA subpoena [see 17 U.S.C. §512(h)] on the site, seeking to identify the person who posted the letter “so that [Melaleuca] might seek redress for copyright infringement.” Melaleuca claimed that its copyright rights in the letter were infringed when it was posted online. (Claiming copyright in cease and desist letters is not a new tactic.  See, e.g., here and here.) 

The website moved to quash the subpoena, asserting, among other things, that the letter was not subject to copyright protection, and that the failure by Melaleuca to establish a prima facie case of copyright ownership was fatal to the subpoena.

The court denied the motion to quash. The Web site had argued that Melaleuca could not own a copyright in the letter, according to 17 U.S.C. 102(b)’s exclusion of “any idea, procedure, process, system, method of operation, concept, principle or discovery” form copyright protection. But the court rejected that argument.

Declining to “go into an in-depth analysis of the merits of a copyright infringement claim in determining whether to quash [the] subpoena,” the court found that Melaleuca’s copyright registration in the letter was sufficient to establish ownership of a valid copyright.  As for alleged copying, the court found that posting of the entire letter was sufficient.

There are a couple of interesting observations to be made from this decision.  First, unlike cases in which plaintiffs seek to uncover the identity of anonymous defendants accused of defamation [see here], this court gave – relatively speaking – little inquiry into the merits of the plaintiff’s case.  Perhaps it felt that such an analysis was not necessary given that the Copyright Office had already determined copyrightable subject matter to exist (when it issued the registration certificate).

A second interesting question arises when one considers how the court might have ruled had the defendant asserted fair use as a basis for the motion to quash. (Doesn’t it seem like posting a cease and desist letter on the Internet, ostensibly for eliciting public ridicule, is a transformative use?) Given the fact intensive inquiry of a fair use analysis, the court would have probably reached the same conclusion, if anything to put off the factfinding until later.  But would a court do that in other cases where the offending, anonymous use is more obviously fair?     

Franklin Covey sues Lycos for posting of 7 Habits book

FranklinCovey v. Lycos, No. 07-cv-00974 (D. Utah, filed December 17, 2007). [Download the Complaint]

FranklinCovey owns the copyright in the bestselling book The 7 Habits of Highly Effective People. It has sued Lycos, owner of AngelFire, for copyright infringement, claiming direct and/or secondary liability for the posting of an entire copy of the work online.

The allegations are a bit ambiguous as to who FranklinCovey thinks actually posted the work online. In some parts of the complaint it accuses Lycos as having posted it, but at the same time, the allegations describe the multiple DMCA takedown notices that FranklinCovey sent, as if their theory is that Lycos is a provider for third party content.

It’s an allegation as to the DMCA that raised my eyebrows when reading the complaint. Here’s what Paragraph 34 says:

“Based on Defendants’ failure to expeditiously remove or disable access to this infringement, notwithstanding their actual knowledge thereof, Defendants have waived any defense to liability they may otherwise have had pursuant to 17 U.S.C. § 512 or otherwise.”

It’s the word “otherwise” that particularly piqued my interest.  Is this true? By failing to comply with a DMCA takedown notice, has Lycos really waived its defense to infringement liability?

Here’s what 17 USC 512(l) says:

(l) Other defenses not affected.–The failure of a service provider’s conduct to qualify for limitation of liability under this section shall not bear adversely upon the consideration of a defense by the service provider that the service provider’s conduct is not infringing under this title or any other defense.

Thoughts, anyone?

Court flushes septic company’s request for injunction in copyright suit

Biosafe-One, Inc. v. Hawks, — F.Supp.2d —-, 2007 WL 4212411 (S.D.N.Y. November 29, 2007)

Back in 2005, industrial-strength septic system cleaning products company Bio-Safe One, Inc., needed a “jumbo mortgage,” so its president, one Jorgensen, did a web search for brokers and located Messrs. Hawks and Skierkowski, who helped Bio-Safe One with its mortgage needs. Although that transaction was over in June 2005, Jorgensen believed that Hawks and Skierkowski used information he had provided them during the mortgage transaction to start up a competing septic business.

Jorgensen and Bio-Safe One filed a lawsuit against Hawks and Skierkowski in New York federal court alleging, among other things, copyright infringement. They claimed that the competing enterprise illegally copied elements Bio-Safe One’s website.

The plaintiffs sought a preliminary injunction to prevent Hawks and Skierkowski from continuing what they believed to be copyright infringement. The court denied the motion for preliminary injunction.

It held that although the plaintiffs had established ownership of the copyright in the Bio-Safe One website by presenting a registration certificate for it, they failed to show that the defendants had engaged in illegal copying of any original elements of the site.

Applying the “ordinary observer test,” the court held that a side-by-side comparison simply would not prompt a person to regard the aesthetic appeal of the websites as the same. Rather, it was difficult to detect any similarities. The arrangement, photographs, and graphics on the websites were “decidedly dissimilar.” And the textual elements that were similar on the websites, including minor phrasing and terminology, were so far spaced throughout that they were not noticeable.

Accordingly, the court held that the plaintiffs would not likely succeed on their claim of copyright infringement.

Arizona state court adopts three part test for unmasking anonymous online speakers

Test adds an additional “balancing of the competing interests” element to the Cahill test

Mobilisa, Inc. v. Doe, — P.3d —-, 2007 WL 4167007 (Ariz. App. November 27, 2007)

Plaintiff filed suit in Washington state court against an anonymous (“John Doe”) defendant which it accused of violating the Computer Fraud and Abuse Act and the Stored Communications Act. Doe allegedly accessed the plaintiff’s computer system and obtained a copy of an “intimate” email which he forwarded to a number of people.

Plaintiff served a subpoena on Doe’s Arizona-based email provider, seeking to uncover Doe’s true identity. The email provider and Doe individually, through counsel, objected, but the Arizona court ordered that Doe’s identity be revealed. The court looked to the 2005 case of Doe v. Cahill which requires (1) that the anonymous party sought to be unmask be given notice of the proceedings, and (2) that the party seeking the identity of the anonymous party put forth sufficient facts to survive a motion for summary judgment.

Doe appealed the lower court’s order which required he be identified. On appeal, the Arizona Court of Appeals remanded the matter back to the trial court. It held that although the court correctly applied the two Cahill factors, it should have considered a third factor, namely, a balancing of the relative interests of the parties. Consideration of this third factor, the court held, would help ensure that the important First Amendment rights at issue in anonymous speech cases would be adequately protected.

Online purchaser not entitled to $1 hard drives

Perez v. Luu, — S.W.3d —-, (Tex. App. November 1, 2007).

Perez sued Luu in Texas state court after Luu refused to fulfill Perez’s order of 100 hard drives that Perez ordered from Luu online. Luu’s website mistakenly listed the price of the hard drives as $1 each, when in reality Luu charged closer to $1,200 apiece.

The matter proceeded to trial and the court entered judgement in favor of Luu. Perez appealed, and the appellate court affirmed. It held that Perez failed to establish a violation of the Texas Deceptive Trade Practices Act.

The court determined that the relevant portions of the statute [Tex. Bus. & Com. Code Sec. 17.41 et seq.] required a showing of intent to misrepresent the price of goods being offered for sale. Luu introduced evidence showing that the $1 pricing was merely a mistake — the website was new and the developer had previously used a $1 quantity for testing purposes. Moreover, there was language on Luu’s website which gave him the right to correct any errors in pricing.

Booklocker.com on the copyright offensive in Maine

Booklocker.com, Inc. v. Sartain, No. 07-0176 (D. Me., Filed November 21, 2007). [Download the Complaint]

Online, on demand book publisher Booklocker.com has filed a declaratory judgment action against Utah-based artist Julie Sartain, in response to a cease and desist letter Sartain sent to Booklocker alleging copyright infringement.  In the case, Booklocker seeks a determination by the United States District Court for the District of Maine that Booklocker’s use of artwork on book covers does not infringe on any copyright right held by Sartain.

The allegations are a bit sparse, as one may expect to see in federal pleading, but it appears that Booklocker believes Sartain does not own the copyrights in the cover artwork, but that such artwork is owned by the authors who have Booklocker print their books on demand.  In the alternative, Booklocker asserts that it has some sort of implied license to reproduce the artwork through the course of dealing between the parties during the past four years.

In asserting that the individual authors — and not Sartain — own the copyrights in the individual pieces of cover art, Booklocker is putting a lot of faith in the process whereby the authors may have commissioned Sartain to create those works.  The complaint says that there are more than a thousand works at issue.  Are we to believe that there is a detailed, written agreement in place for each one of those works, in which Sartain assigned her copyright rights to these authors? 

Scroll to top