IS YOUR DOMAIN NAME TOO LONG?

If you registered a trademark in any country on or before July, 30 2008, you have the opportunity until June 10, 2010 to register a .CO domain name ahead of the general public . The domain name must be an exact match to your registered trademark. So you can now drop the “M” at the end of your domain name and your customers can reach you with less keystrokes.

Posted in News | Tagged , , | Comments Off on IS YOUR DOMAIN NAME TOO LONG?

IP PROTECTION FOR GAMES

Copyright registration does not protect the concept of a game. It does protect its literary and pictorial expression, however, namely the appearance of the game, the board, cards, etc and the content of any instructions or published material packaged with the game against someone creating substantially similar materials. This assumes the registration refers to these materials.

However, the name of the game or any slogans used on the game box to identify the game and distinguish it from other games in the marketplace, e.g., “EQUIVOCATE,” would be the subject of trademark protection for a party game. Trademark rights are based on first use in the U.S. but registration is prima facie evidence of the validity of that registered mark, the registrant’s ownership of that mark, and of her exclusive right to use that mark in the U.S.

Game concepts can be protected by a patent.  For example, see U.S. Patent #5,112,048 for a “Garage Roof Party Game.”

Before anyone shows an invention or product concept, which your game design is, to a potential manufacturer/designer, that manufacturer/designer should sign a confidentiality/non-disclosure agreement providing that if that manufacturer/designer steals that invention or product that it/he will have broken that contract. therefore
giving the right to sue for breach of that agreement to the creator.

Posted in News | Tagged , , , | Comments Off on IP PROTECTION FOR GAMES

USING OTHER PEOPLE’S CONTENT IN YOUR CREATIVE WORKS

The Copyright Office web site summarizes the law in this area by stating, “Under the fair use doctrine of the U.S. copyright statute, it is permissible to use limited portions of a work including quotes, for purposes such as commentary, criticism, news reporting, and scholarly reports. There are no legal rules permitting the use of a specific number of words, a certain number of musical notes, or percentage of a work. Whether a particular use qualifies as fair use depends on all the circumstances.” “If you use a copyrighted work without authorization, the owner may be entitled to bring an infringement action against you. There are circumstances under the fair use doctrine where a quote or a sample may be used without permission. However, in cases of doubt, the Copyright Office recommends that permission be obtained.”
See HTTP://WWW.COPYRIGHT.GOV/FLS/FL102.HTML for more information.

Posted in News | Tagged , , | Comments Off on USING OTHER PEOPLE’S CONTENT IN YOUR CREATIVE WORKS

USING OTHER’S IMAGES

The ILLINOIS RIGHT OF PUBLICITY ACT (765 ILCS 1075) provides that, “the public use or holding out of an individual’s identity (which is defined in the Act as “any attribute of an individual that serves to identify that individual to an ordinary, reasonable viewer or listener, including but not limited to (i) name, (ii) signature, (iii) photograph, (iv) image, (v) likeness, or (vi) voice”) (i) on or in connection with the offering for sale or sale of a product, merchandise, goods, or services; (ii) for purposes of advertising or promoting products, merchandise, goods, or services; or (iii) for the purpose of fundraising during the individual’s lifetime without having obtained previous written consent from the appropriate person or persons may be liable for either of the following, whichever is greater; (1) actual damages, profits derived from the unauthorized use, or both; or (2) $1,000. In addition, punitive damages may be awarded against a person found to have willfully violated the Act.

Posted in News | Tagged , , , , | Comments Off on USING OTHER’S IMAGES

NAMING YOUR ROCK BAND AND KEEPING IT LEGAL

It was reported recently in the Wall Street Journal that former Led Zeppelin bassist John Paul Jones was having difficulty finding a name for his new band. Apparently, there is a shortage of good band names out there, and believe it or not, the term, “counterculture,” now has a new meaning as the prior users of band names are now sending cease and desist letters to new bands using theirs or confusingly similar names.

Band names, whether they are used in connection with T-shirts, entertainment services in the nature of live musical performances or pre-recorded digital media, comprise trademarks and need to be searched as should be any other trademark prior to their adoption and use.

Looking for an idea for a band name, try http://www.bandnamemaker.com/ Once you’ve found a good one, then I can help see if your band name is available for registration as a trademark for one or more of the above goods and services, assist you in obtaining copyright protection for your musical works, prepare and review contracts on your behalf, assist you in ensuring that your web site contains the necessary legal disclosures, and obtain the necessary releases to use other people’s material. And if things go sour, I have represented band members in the past in contractual disputes with other band members when they have left the band.

 

Posted in News | Tagged , , | Comments Off on NAMING YOUR ROCK BAND AND KEEPING IT LEGAL

CYBERWAR (Cont.)

On May 30, 2007 in a blog post titled “Cyberwar” I wrote about a distributed denial-of-service attack launched against Estonia. According to an article published on February 19, 2010 in the New York Times, investigators into the online attacks on Google and reportedly more than 30 other companies including Intel, Adobe and Yahoo, which involved in part the unauthorized access to dozens of accounts of Gmail users who are advocates of human rights in China, have traced the attacks to two Chinese schools; Shanghai Jiaotong University, which has one of China’s top computer science programs and whose students recently won an international computer programming competition beating out Stanford and other top-flight universities, and the Lanxiang Vocational School, that was established with military support and trains some computer scientists for the military. A professor at Jiaotong was quoted by the New York Times as saying, “I’m not surprised. Actually students hacking into foreign Web sites is quite normal.”

Writing in the March 2010 issue of The Atlantic, James Fallows suggests China may not be our biggest cyberwar threat. Quoting a former diplomat who worked on security and intelligence issues, that former official stated that our #1 electronic threat was Russia, #2 was the Israelis, who are looking for political advantage, tied with the Israelis is China, but the French, who are looking for economic advantage, and the Brazilians, who are involved in financial crime, are also countries to be concerned about. On May 30, 2007 in a blog post titled “Cyberwar” I wrote about a distributed denial-of-service attack launched against Estonia. According to an article published on February 19, 2010 in the New York Times, investigators into the online attacks on Google and reportedly more than 30 other companies including Intel, Adobe and Yahoo, which involved in part the unauthorized access to dozens of accounts of Gmail users who are advocates of human rights in China, have traced the attacks to two Chinese schools; Shanghai Jiaotong University, which has one of China’s top computer science programs and whose students recently won an international computer programming competition beating out Stanford and other top-flight universities, and the Lanxiang Vocational School, that was established with military support and trains some computer scientists for the military. A professor at Jiaotong was quoted by the New York Times as saying, “I’m not surprised. Actually students hacking into foreign Web sites is quite normal.”

Writing in the March 2010 issue of The Atlantic, James Fallows suggests China may not be our biggest cyberwar threat. Quoting a former diplomat who worked on security and intelligence issues, that former official stated that our #1 electronic threat was Russia, #2 was the Israelis, who are looking for political advantage, tied with the Israelis is China, but the French, who are looking for economic advantage, and the Brazilians, who are involved in financial crime, are also countries to be concerned about.

Posted in News | Tagged , , , | Comments Off on CYBERWAR (Cont.)

THE IPAD & WHY YOU SHOULD DO A TRADEMARK SEARCH

“Remember that prior to filing an application to protect a product name, logo or design, a search should be undertaken to determine if a mark or design similar to the one that you are seeking to protect has already been applied for or registered.” Also, because the owner of a federally registered trademark or service mark on the Principal Register has a prima facie exclusive right to use the registered mark in commerce on or in connection with the goods or services specified in the certificate throughout the United States and the prior user of an unregistered mark has a senior right over a more junior user to use a mark on the same or closely related goods in at least the same geographical area, again, I recommend that a business, before it adopts a name for goods or services that it intends to offer, conduct a prior search to determine that that mark is available for it to use. My fees to conduct such a search are shown above.

In today’s recessionary economy, many out-of-work former employees are trying their hand at starting new businesses. To some degree, their success in that new endeavor may be dependent at how catchy a name or logo they adopt to identify that business.

A word to the wise; before you put that name on your signs, stationary or web site, do a search and make sure that someone else doesn’t own a federal trademark registration for the same mark or logo that you are adopting. The cost of not doing one, of having to order new signs, putting together a new web site or printing all new marketing materials as well as telling the world that what they used to call your great idea is now called something else, is likely to be more expensive.

For example, go to www.apple.com and you will find a full page announcement for its iPad tablet computer. Then go to the Trademark Electronic Search System on the United States Patent and Trademark Office’s web site and you will see a federal trademark registration for the IPAD for bras, lingerie, panties and pads for use in bras, for IPAD for “Keypads For Entry Of Personal Identification Numbers In E-Commerce,” and an application by Fujitsu for IPAD for a “Hand-Held Computing Device For Wireless Networking In A Retail Environment.” In other words, Steve Jobs picked a name for what he hopes will be a revolutionary product but it is a name that others in the computer industry and the lingerie industry had already selected. But as the New York Times reported on January 29, 2010 describing a previous trademark negotiation ultimately won by Steve Jobs for the iPhone trademark, “I feel sorry for the poor guy at Fujitsu (or his lawyer) who is going to be negotiating with Steve directly.” For its fiscal 2010 first quarter ended December 26, 2009 Apple posted revenue of $15.68 billion and a net quarterly profit of $3.38 billion.

I doubt if your start-up can claim those numbers, so don’t count on paying off anybody with senior trademark rights. Do a search first and use the money you save by selecting an available mark to emerge from your garage as the next Apple.

Posted in News | Tagged , , | Comments Off on THE IPAD & WHY YOU SHOULD DO A TRADEMARK SEARCH

PARODY AND TRANSFORMATIVE USE

I attended a public discussion about music sampling, fair use and transformative use. So I would like to take the opportunity to carry on that discussion on the web.

The U.S. Copyright Office advises, “One of the rights accorded to the owner of copyright is the right to reproduce or to authorize others to reproduce the work in copies or phonorecords.” This right is subject to certain limitations, including the limitation found in Section 107 of the Copyright Law. That Section identifies the doctrine of “fair use.”

Section 107 contains a list of the various purposes for which the reproduction of a particular work may be considered fair, such as criticism, comment, news reporting, teaching, scholarship, and research. It also sets out four factors to be considered in determining whether or not a particular use is fair:

1) The purpose and character of the use, including whether such use is of commercial nature or is for nonprofit educational purposes

2) The nature of the copyrighted work

3) The amount and substantiality of the portion used in relation to the copyrighted work as a whole

4) The effect of the use upon the potential market for, or value of, the copyrighted work

The Copyright Office warns, “There is no specific number of words, lines, or notes that may safely be taken without permission. Acknowledging the source of the copyrighted material does not substitute for obtaining permission.”

“Fair Use” is not a black and white defense to the unauthorized reproduction of a copyrighted work. A court will consider each of the four factors noted above. In looking at the purpose and character of an allegedly infringing use, a court will look to see if it is “transformative.” To be “transformative,” the new work must alter the original with new expression, meaning or message. An example would be if the new work comments on the original, quotes from the original to criticize it or parodies it, that is, comments on the original work for the purpose of mocking it. Parody is different from satire, which uses the original work to comment on a subject that is unrelated to the original and, therefore, the satirist doesn’t need to use the original work to make his point.

Here are some examples of the application of these principles.

1: In Mattel v. Pitt the federal court in Manhattan in 2002 held that taking the head off of a Barbie doll, putting that head on another doll, placing the doll in sexually suggestive positions and calling the resulting creation “Dungeon Doll” was a patently transformative creation that would not affect the demand for Barbie dolls and therefore was fair use.

2. Similarly, that same year, the federal court in San Francisco found a pornographic animated spoof of the Star Wars films to be parody and, thus, fair use.

3. In Newton v. Diamond, that same year, the federal court in L.A. found the use by the Beastie Boys of a three-note sequence with one background note, approximately six second long, to be a de minimis use and, therefore, it wasn’t necessary to consider fair use.

4. On the other hand, that same court in 1999 in a case between the L.A. Times and Free Republic.com, a political commentary web site that provided commentary on media coverage, held that the criticism exception to copyright infringement did not apply where entire news articles were copied.

5. In 1998, that same court denied the fair use defense to the Internet Entertainment Group which sought the right to display short segments or still images from the Pamela Anderson sex tape for the reason that given the nature of the adult entertainment industry on the Internet, such a use is a commercial use that conflicts with the rights of the copyright owners. [Note that it was fair use for Hard Copy to broadcast 27 seconds of the tape. That use was fair use; it was news reporting and transformative; and it was blurred. Moreover, looking at the 4th fair use factor, it was likely to enhance the marketability of the tape.]

6. The Ninth Circuit Court of Appeals in 1997 in a case brought by Dr. Seuss Enterprises held that “The Cat Not In The Hat!…” was an infringement of “The Cat in the Hat” because it was satire and not parody; it was not transformative in that it did not comment on the original work.

Posted in News | Tagged , , , | Comments Off on PARODY AND TRANSFORMATIVE USE

IT’S A WONDERFUL LIFE (ALT VERSION)

The quintessential Christmas movie, “It’s A Wonderful Life” provides an excellent opportunity to understand the current credit crisis. Mr. Henry Potter operated a successful commercial bank in Bedford Falls. His lending practices were judicious and his institution was well capitalized, surviving the Great Depression. Mr. Potter, at one point in the movie, offers a position to George Bailey, the operator of the Bailey Building & Loan, an undercapitalized financial institution offering home loans to those who can barely afford them. Now let’s assume that the movie turned out differently, that George took the job with Potter’s bank and that Mr. Potter died shortly thereafter leaving George in control of the bank and he hires his Uncle Billy as a key executive. Bailey engages in the same risky loan practices that he engaged in when he was at the Building & Loan and this, in combination with Uncle Billy’s negligence, leads to the failure of Potter’s formerly viable bank. Desperate to avoid default, he sends his brother Harry, a Medal of Honor winner to Congress to plead for a bailout.

Posted in News | Tagged , | Comments Off on IT’S A WONDERFUL LIFE (ALT VERSION)

INTELLECTUAL PROPERTY-AMERICA’S GROWTH INDUSTRY

During his campaign for the Presidency, Barack Obama, at a San Francisco fundraiser, referred to working class voters as follows, “So it’s not surprising then that they get bitter, they cling to guns or religion or antipathy to people who aren’t like them or anti-immigrant sentiment or anti-trade sentiment as a way to explain their frustrations.” Those frustrations are understandable. Products that were once made in this country are now made abroad and the jobs making those products have been sent abroad as well. I have owned three Ford Escorts; the first (model year 1981) was made in New Jersey, the second (model year 1989) was made in Michigan and the third (model year 1999) was made in Hermosillo, Mexico. Boeing’s latest and most advanced airliner, the 787, has its wings manufactured by Japanese companies in Nagoya, Japan; its horizontal stabilizers manufactured by Alenia Aeronautica in Italy and sections of the fuselage manufactured by Alenia in Italy and Kawasaki Heavy Industries in Japan. The list of products, including food products, formerly manufactured in the United States but now made in China is copious.

But one thing the United States does produce, and export, in great quantities is intellectual property. As set forth in House of Representatives Resolution 314 (April 17, 2007), it is the only sector of our economy that runs a trade surplus with every nation in the world and over 50 percent of United States exports rely on some form of intellectual property. According to that resolution, intellectual property assets represent more than 17 percent of our national gross domestic product. While we may drive Japanese cars, Apple computer on-line stores may be found in 25 foreign countries and Apple brick and mortar stores found in Japan, Canada, the United Kingdom and Italy. Starbucks may be found in 24 foreign countries, Staples stores may be found in the United Kingdom, Germany, Portugal and Canada and McDonald’s are ubiquitous abroad, found in just about every country that the U.S. has diplomatic relations with outside of Africa. And these examples are just illustrative of the value of some of our most recognized trademarks abroad. Copyrighted material, including Hollywood’s movies, Microsoft’s software, and our music make their way both legally and illegally to consumers throughout the world. As an example,see the following photo taken at the Residenzstrasse subway station in Berlin, Germany. How many foreign films, dubbed into English, can most Americans remember seeing? Half of all patents issued by the United States Patent and Trademark Office in 2007 were of American origin.

So, while some of us may be bitter, if Barack is correct in his observation, there’s no reason to be bitter about our exports of our intellectual products. New York Times columnist David Brooks noted in his May 2, 2008column that, “In order to thrive, people are compelled to become better at absorbing, processing and combining information.” In order for our economy to thrive, it is imperative that the owners of that information protect their rights to it. My business is assisting you to grow your business by protecting your most valuable assets, your know-how, your creative works and your business and product identities that symbolize your goodwill.

Posted in News | Tagged , , , | Comments Off on INTELLECTUAL PROPERTY-AMERICA’S GROWTH INDUSTRY

E-MAIL & YOUR EMPLOYER

It’s tempting, eyes glazing over, spending 8-10 hours at your desk in your cubicle, to want to check your personal e-mail one or two times during the day or to research that new restaurant you are thinking of dining out at on Saturday night or even check out pictures of Eliot Spitzer’s call girl.

Beware!

Employers are entitled to monitor employees’ e-mail when they are using their company’s e-mail systems. Employers should warn employees of this fact in writing and address such issues as whether instant messaging may be used as a business tool or should be banned as a personal vice.

Logging on to one’s own Yahoo or Gmail account will not cloak you from your employer’s prying eye. Since you are using your employer’s computer network to do so, he or she is still entitled to monitor the system. Employers may lose their right to monitor their employees’ e-mail if they don’t do so regularly so when they indicate in the personnel manual or otherwise in writing that they have the right to do so, they should state that their failure to monitor e-mail regularly does not constitute a waiver of that right.

Even if e-mailing at work is allowed, you shouldn’t don’t use your employer’s e-mail system to send your resume to a potential employer, to search Craigslist for a night out with Eliot Spitzer’s call girl or to advise a friend that your company is about to be sold, when that information is confidential, and therefore that she should buy its stock.

Finally, your employer can not only review your e-mail but also check out which web sites you’re browsing. There are two other considerations to think about here; what you browse may be considered to be inappropriate objectionable matter to a fellow worker when it appears on your screen and therefore subject you to discipline under your company’s sexual harassment policy, e.g., those tasteful nudes of a Hollywood starlet, and what you browse and download may introduce a virus into your employer’s network, making you a wanted man in the eyes of your employer’s Chief Technology Officer.

Posted in News | Tagged , , , | Comments Off on E-MAIL & YOUR EMPLOYER

A PRIMER ON COPYRIGHT LAW

1. Copyright does not protect ideas. It protects only the expression of those ideas. Thus, if you have an idea about a movie thriller where someone crash lands on another planet or a romantic comedy about a couple who are just “friends” until the tension builds to a boil or software that allows people to share their hobbies and interests and create virtual groups with common hobbies and interests, it is the expression of those ideas in a screenplay or computer software or website that is protectible, not the ideas themselves.

2. Copyright protection in a work, which may take such forms as a text, an audiovisual work such as a video or motion picture, a sound recording, a musical work, a photograph, an architectural drawing or a choreographic work, is secured automatically once a work is created, in other words, when it is fixed in a copy or phonorecord for the first time.

3. However, unless registered in the U.S, which currently costs $35.00, if filed electronically, you cannot sue for infringement of your copyrighted work and unless you register that copyrighted work and unless registration is made within 3 months after publication of your work or prior to an infringement of your work, you cannot get statutory damages and attorney’s fees. This means that if you wait and your work is infringed you will have to prove the amount of your actual damages and the infringer’s profits to obtain relief from that infringement.

4. If your employee created the text, recording, website, photograph, video, etc., you, as the employer owns it. Otherwise, the creator or author of the work is the owner of the copyright in that work. You would own the copyright in a work specially ordered or commissioned for use as a contribution to a collective work, as a part of a motion picture or other audiovisual work, as a translation, as a supplementary work, as a compilation, as an instructional text, as a test, as answer material for a test, or as an atlas, if you and the author expressly agreed in a written instrument signed by both parties that the work shall be considered a work made for hire. Otherwise the author owns the work, not you. So the next time you hire a photographer, software engineer, graphic designer, website designer or videographer to document an important family moment, the office Christmas party, or your new offices, or create your new web site or write your new accounting program, remember it’s his, not yours, unless before he starts work he signs an agreement granting you the copyright in his work.

The owner of a copyright obtains the exclusive right to do and to authorize others to To reproduce the work in copies or phonorecords; to prepare derivative works based upon the work; to distribute copies or phonorecords of the work to the public by sale or other transfer of ownership, or by rental, lease, or lending; to perform the work publicly, in the case of literary, musical, dramatic, and choreographic works, pantomimes, and motion pictures and other audiovisual works; to display the work publicly, in the case of literary, musical, dramatic, and choreographic works, pantomimes, and pictorial, graphic, or sculptural works, including the individual images of a motion picture or other audiovisual work; and in the case of sound recordings, to perform the work publicly by means of a digital audio transmission.

Posted in News | Tagged , , , , | Comments Off on A PRIMER ON COPYRIGHT LAW

YOUR PRIVACY AND WHAT’S ON YOUR HARD DRIVE

The Motion Picture Association of America (MPAA) won a default judgment against the operators of the TorrentSpy.com web site in the U.S. District Court for the Central District of California, located in Los Angeles, with the U.S. District Court Judge holding that, although TorrentSpy’s servers were housed in the Netherlands, TorrentSpy must preserve server data logs held in random access memory containing user IP addresses, discussion forum postings about the trading of movies and moderator identities. TorrentSpy, which provided a central location to find files distributed on BitTorent peer-to-peer networks destroyed those records.

The judge in that case wrote that TorrentSpy “engaged in widespread and systematic efforts to destroy evidence and have provided false testimony under oath in an effort to hide evidence of such destruction.”

If this ruling stands, where you surf and what you download may be discoverable in third-party lawsuits that you know nothing about.

And, don’t try to sneak out of the country with your computer. Adam Liptak wrote in the New York Times that the border is a privacy-free zone and the government, namely the U.S. Customs and Border Protection Agency, has the right to take a look at your laptop computer, open up the folders on that computer and peer inside as it can do with your luggage.
So downloading the latest movie release or any other illegal content onto your computer and watching it for free may be no less risk-free as bringing a video camera into your local movie house and taping that film.

Posted in News | Tagged , , , | Comments Off on YOUR PRIVACY AND WHAT’S ON YOUR HARD DRIVE

USING PHOTOS FROM THE WEB

A client of mine who provided business software used a head shot of a young blond woman wearing glasses to grace its website. It was an example of using sex in a subdued and tasteful manner to sell a product. Well, when that same shot appeared on a travel web site, I did what any aggressive counsel would do and contacted my client anxious to spring a cease and desist letter on the owner of that travel site only to find out that my client had acquired a non-exclusive license to use that photo.

Subsequently, another client asked me to clear a unique artistic design for its use as a trademark. A web search disclosed that it had acquired that design from a web provider whose terms of use stated that it granted a nonexclusive limited license to use that design and that my client may not claim intellectual or exclusive ownership in it. Therefore, it sought to claim exclusive rights in something as its trademark that it was not entitled to.

Recently a 15 year old Dallas girl posed with a friend for a photo at a church-sponsored car wash only to later find her image on a billboard in Adelaide, Australia as part of a Virgin Mobile advertising campaign. Her image had been uploaded to the Flickr web site, by the photographer, her church youth counselor. Although the Flickr license in this case allowed the photographs posted on it to be used by anyone in any way, as long as the photographer was credited, it did not grant Virgin Mobile the girl’s privacy rights, that is her right not to have her likeness used for commercial benefit without permission.

A lawsuit ensued.

The moral of these stories.  Watch what you take from the Internet and how you use it. Read the small print but realize the small print may not tell the whole story

Posted in News | Tagged , , , | Comments Off on USING PHOTOS FROM THE WEB