SlideShare ist ein Scribd-Unternehmen logo
1 von 57
Downloaden Sie, um offline zu lesen
Business Law Essentials Series
Essentials of Cyberspace Law




User Generated Content, Privacy, and Advertising

           California Bar Cyberspace Committee
                      January 27, 2010
A Presentation of the Cyberspace Law Committee
Essentials of Business Law Series
January 27, 2010
Where Used
Websites
SaaS
Services
  Skype
  Delivery
  Research
  Other
Social Networking
Legal Issues

Enforceability
Modification
Provisions
Enforceability

Best Practices
  Notice is Key
  Require Consent
    “I agree” buttons
    Required scrolling
  Does Use Indicate Consent?
Enforceability

Specht v. Netscape Communications Corp., 306 F.3d 17 (2d Cir.
2002) (lack of notice vitiates consent)

Register.com Inc. v. Verio Inc. 126 F.Supp.2d 238 (S.D.N.Y. 2000),
aff’d 356 F.3d 393 (2nd Cir. 2004) (post-download notice on
                                   (post-
repeated downloads constitutes notice)

Southwest Airlines Co. v. BoardFirst LLC (N.D. Tex 2007) (home
page legend provides sufficient notice for binding contract)

Ticketmaster LLC v. RMG Techs. Inc. (C.D. Cal. 2007) (in
preliminary injunction matter, terms of use enforceable where court
believed that defendants would be shown to have been notified of
and assented to terms)
Modification
Douglas v. U.S. District Court for the Central District of
  California 495 F.3d 1062 (9th Cir. 2007) (customer was
  not bound to revised contract terms because the
  customer had not received notice of, or assented to, the
  changes)

Harris v. Blockbuster Inc. 622 F. Supp. 2d 396 (N.D. Tex
  2009) (unlimited unilateral ability to modify or terminate
  renders contract illusory, citing Morrison v. Amway Corp.
  517 F.3d 248 (5th Cir. 2008) and distinguishing In re
  Halliburton 80 S.W.3d 566 (Tex. 2002)
Modification
Notice is Key
Best Practices
    Establish Modification Right Initially and Clearly
    Highlight all Material Changes
    Collect and Retain Evidence of Assent
    Create An Opportunity for Rejections


Use Common Sense
Provisions
Contract Language
   Situational
   General
Entire Agreement
   Privacy Policies
   (A.V. v. iParadigms 544F.Supp.2d 473 (E.D. Va. 2008)(browse wrap terms unenforceable
   when not incorporated into click through license)
Modification Process
Social Networking Specific Provisions
   Copyright Infringement Notices (DMCA)
   Content Limitations
   Redistribution Rights
   Indemnification
   Right to Remove Posting and Terminate Account
ALI Principles
ALI Principles of the Law of Software Contracts,
May 19, 2009
Modification requires consents after notice of the
modification and termination requires reasonable
notice
Disclaimable implied IP infringement
indemnification obligation
Nondisclaimable warranty of no hidden material
defects
ECPA and the Impact of
 Outdated Privacy Law

    Essentials of Cyberspace Law
                 January 27, 2010




                      Nicole A. Ozer
            Technology and Civil Liberties
                          Policy Director
              ACLU of Northern California

         www.aclunc.org/tech
         nozer@aclunc.org
The 4th Amendment clearly
protects your data…
• At home or on a device in your possession
  – Judicial search warrant (probable cause)
  – Notice at time of search
• BUT much weaker if in another’s hands
  – Couch (accountant)
  – Miller (bank)
  – Smith (telephone company)
Congress tried in ECPA (1986)
 For the person or business whose records are
 involved, the privacy or proprietary interest in that
 information should not change. Nevertheless,
 because it is subject to control by a third party
 computer operator, the information may be
 subject to no constitutional privacy protection .
 Thus, the information may be open to possible
 wrongful use and public disclosure by law
 enforcement authorities as well as unauthorized
 private parties.
               - Senate Judiciary Committee (1986)
Federal communications
        privacy laws
• Wiretap Act or “Title III” (part of ECPA)
   – interception = getting content of communications in real
     time (in transit)
• Pen register and trap-and-trace statute
   – addressing data of communications in real time
• Stored Communications Act (SCA) (also ECPA)
   – access to stored communications, records of
     communications, subscriber data
Always complex
         and getting worse
• “famous (if not infamous) for its lack of clarity”
  – Steve Jackson Games v. U.S. Secret Service
    (5th Cir. 1994)
• “fraught with trip wires”
  – Forsyth v. Barr (5th Cir. 1994)
• “a fog of inclusions and exclusions”
  – Briggs v. American Air Filter (5th Cir. 1980)
Just a few things have changed
since 1986:
Cloud computing
     2006: Google docs launched
Rise of social networking
     2004: Facebook launched
Internet search
     1998: Google founded
     1994: Yahoo & Amazon founded
The beginning of everything
     1990: World Wide Web created


Cell phones … VOiP … Online book search …
ECPA challenges today
• It’s confusing and outdated
  – ECPA defines service providers in language that does
    not make sense in today’s technological world.
  – Different levels of protection can apply to the same
    piece of communication over it’s lifetime.
  – It clearly applies to public providers, like hotmail. But
    what about a nonpublic provider like a university?
• New technologies are left behind
  – It’s not clear if or how it applies to modern digital
    services, like cloud computing, social networking, or
    Internet search history.
Lifecycle of an email
       Unopened              < 180 days   Warrant

                             > 180 days

       Opened                             Subpoena
                                          or 2703(d)
                                          with notice

       Header info
                                          Subpoena
       Basic subscriber                   or 2703(d)
       info (name, address,               NO notice req’d
       connection records, etc)
That’s confusing. And email was
one of the specific technologies
that existed in 1986 and that
ECPA was intended to protect.


    What about newer services
 that didn’t exist in 1986? How
      does ECPA protect them?
Search
Location-based services
Cloud Computing
A campaign to educate
and activate the public,
businesses, and policy
makers to upgrade privacy
laws and keep pace with
our modern online world.
Updates…



     www.aclunc.org/tech
  www.aclunc.org/techblog
       www.dotRights.org


        nozer@aclunc.org
24
25
26
TM Use Limited to Search Term
27
TM Use Limited to Search Term
 28




J.G. Wentworth SSC Ltd v. Settlement Funding LLC, 2007 WL 30115 (E.D. Pa. Jan. 4, 2007) (granting motion to dismiss).
TM Use Limited to Search Term
29




      Morningware, Inc. v. Hearthware Home Products, Inc., 2009 WL 3878251 (N.D. Ill. Nov. 16, 2009)
30
Initial Interest Confusion
31




     Use of another
     trademark “in a manner
     calculated to capture
     initial consumer
     attention, even though
     no actual sale is finally
     completed as a result of
     the confusion.”
     Brookfield Communications Inc. v. West
      Coast Entertainment Corp., 174 F.3d 1036
     (9th Cir. 1999).




                                                 B Tal
Rationale
32

                 • Improperly Benefits From Goodwill
                   of Trademark

                 • False Detour From Information
                   Super-highway
                    – Analogy to false detour sign directing
                      consumers to take wrong exit. “Unable to
                      locate West Coast, but seeing the Blockbuster
                      store right by the highway entrance, they may
                      simply rent there.” Brookfield Communications,
                       Inc. v. West Coast Entertainment Corp., 174 F.3d
                       1036, 1062 (9th Cir. 1999).


                 • Bait and Switch
                    – “Initial interest confusion can be viewed as a
                      variation on the practice of ‘bait and switch.’”
                       3 J. Thomas McCarthy, McCarthy on Trademarks & Unfair
                       Competition § 23:26 (4th ed. 2003).
Initial Interest Confusion Territory
33
Counterpoint
34

                    Not a Detour, Merely a Lane Change
                      Web surfers are accustomed to false starts
                      and are unlikely to be dissuaded when they
                      end up at the wrong site. Chatam Int'l v.
                      Bodum, Inc., 157 F.Supp.2d 549, 559 (E.D.
                      PA 2001).

                    No different than supermarket placing
                                                products.
                    store brand next to branded products
                      FragranceNet.com, Inc. v. FragranceX.com,
                      493 F. Supp. 2d)(E.D.N.Y 2007)

                    Legally Significant Confusion?
                      “The  [District] court’s refusal to enter the
                      ‘initial interest confusion’ thicket is well
                      taken given the unlikelihood of ‘legally
                      significant’ confusion.” Hasbro Inc. v. Clue
                      Computing, Inc., 232 F.3d 1, 2 (1st Cir.
                      2000).
35
Cyber Squatting Remedies
36



     ICANN’s Uniform Domain Name Dispute
     Resolution Policy
        Establishes arbitration process for bad
        faith domain registration
           2329 cases filed in 2008
        Only remedy is transfer of domain

     Anti-Cyber Squatting Consumer Protection Act
     (15 U.S.C. § 1125(d))
        Lanham Act remedies for bad faith registration of
        domain name
37
Dealing with Gripe Sites
38


     Trademark Claims
       Absent commercial use
       no TM violation or
       cyber squatting
     Copyright
       Fair use defense
     Defamation
       First Amendment and
       SLAPP protection
     Third-Party postings
       Website immune under
       Communications
       Decency Act
Dealing with Gripe Sites
39


     Trademark Claims
       Absent commercial use
       no TM violation or
       cyber squatting
     Copyright
       Fair use defense
     Defamation
       First Amendment and
       SLAPP protection
     Third-Party postings
       Website immune under
       Communications
       Decency Act
40
CAN-SPAM Act of 2003
41



     CAN-
     CAN-SPAM IS . . .                 CAN-
                                       CAN-SPAM DOES NOT . . .

          anti-
       An anti-fraud and disclosure      “Can Spam” – except for
       statute                           wireless spam
       Applies to an email where         Include a “Do Not Email
       the “primary purpose” is          Registry”
       commercial advertisement or
       promotion of a product or
       service                           Impose an “ADV” labeling
                                         requirement
          Non profits are not exempt

       No volume requirement             Create a general private right
                                         of action
CAN-SPAM Principal Requirements
42



                               From line must
                               identify initiator


                            Subject line must not be deceptive.
                            Adult Messages must provide notice.
            UCE must be
             identified
                 as
          “advertisement”




Requires Working Opt-Out
Mechanism for Advertiser                                      Postal Address for Advertiser
CAN-SPAM Plaintiffs
43


                      FTC

                      State AGs

                      Internet Access Service
                      Provider (IASP)
                           Adversely Effected by
                           Violation
                           Cannot be faux-IASP

                      No Consumer Private
                      Right of Action
Preemption of State Law
44




      CAN-
      CAN-SPAM PREEMPTS ALL
      STATE REGULATION OF EMAIL
      EXCEPT STATE LAWS:
      Regulating falsity or deception in
      email

      Not specific to email, including State
      trespass, contract, or tort law; or

      Other State laws to the extent that
      those laws relate to acts of fraud or
      computer crime
45
FTC Disclosure Guidelines
46
The Offer
47

                 *
                 *Earnings Disclaimer - Your level of
                 success in attaining the results claimed in
                 our materials depends on the time you
                 devote to the program, ideas and
                 techniques mentioned, your finances,
                 knowledge and various skills.


                 *By submitting this form you request that
                 your account be activated and give your
                 authorization to immediately charge your
                 credit card $2.98 for access to the Business
                 Kit for Google. After the 7 day trial you will
                 be billed $89.90 each month for continued
                 access to the Business Kit for Google. Your
                 Business Kit access will continue each
                 month until revoked by you. You may
                 cancel at anytime by writing to 230 West
                 400 South, Suite 100 Salt Lake City, UT
                 84101 or calling 1-800-497-4988 or
                 International customers please call 00-1-
                 646-205-0230
Landing Page
48
Transaction Page
49




        ALSO NO REFERENCE TO
        CHARGE ON FIRST PAGE
Transaction Page (con’t)
50
FTC Complaint
51




         FTC v. Infusion Media, Inc., Civil Action No. 09-CV-01112 (D. Nev. 2009)
FTC Advertising Guidelines
52

      Advertising Dot Com              Comparative Advertising
      Disclosures: Information         Statement of Policy Regarding
      About Online Advertising         Comparative Advertising
      [PDF]
                                       Deception FTC Policy Statement
      Advertising and Marketing on     on Deception
      the Internet: The Rules of the
      Road
                                       Deceptive Pricing FTC Guides
      Frequently Asked Advertising     Against Deceptive Pricing
      Questions: A Guide for Small
      Business                         Dietary Supplements Dietary
      Joint FTC/FCC guides on Long     Supplements: An Advertising
      Distance Advertising [PDF]       Guide for Industry
      Advertising Substantiation       FTC Staff Comment on Draft
      FTC Policy Statement             Report of the Commission on
      Regarding Advertising            Dietary Supplement Labels
      Substantiation                   FTC Staff Comment on FDA
      Bait Advertising FTC Guides      Proposed Rule on Statements
      Against Bait Advertising         Made for Dietary Supplements
FTC Advertising Guidelines (con’t)
53

      Endorsements and Testimonials    Food Advertising Enforcement
      FTC Guide Concerning the Use     Policy Statement on Food
      of Endorsements and              Advertising
      Testimonials
                                       Jewelry Guides for the Jewelry,
                                       Precious Metals, and Pewter
      Environment FTC Guides for the   Industries
      Use of Environmental Market
      Claims (Green Guides)            Unfairness FTC Policy Statement on
                                       Unfairness
      Eye-
      Eye-Care Surgery FDA/FTC Joint
      Letter on PRK                    Vocational and Distance Education
                                       Schools Guides for Private
      FTC Staff Guides on Refractive   Vocational and Distance Education
      Eye Surgery                      Schools [PDF]

      Use of the Word "Free" FTC       Weight-
                                       Weight-Loss Products Red Flag:
      Guide Concerning the Use of      Bogus Weight Loss Claims Web Site
      the Word "Free"                  Red Flag: Bogus Weight Loss Claims
                                       Brochure
About the Internet Law Center
54


              The Internet Law Center is dedicated to helping businesses navigate
              the evolving legal standards for today’s digital economy, while also
              contributing to the development of the policies of tomorrow. The
              firm serves a diverse client base that includes startups and public
              companies both online and offline across North America and Asia.

              The professionals of the Internet Law Center possess years of
              practical experience as lawyers and entrepreneurs with internet
              companies and have played a leading role in shaping Internet law
              and policy. This unprecedented combination of business, legal and
              policy experience makes the Internet Law Center uniquely qualified
              to provide the professional advice needed to address emerging
              issues of internet law in an uncertain economy.

              Sign up for the Cyber Report – our award winning newsletter which
              was named one of the Top 100 Internet Law Resources. It is also
              available on our blog (along with other materials) at
              www.ilccyberreport.wordpress.com.   .
About Bennet Kelley
55

             Bennet is one of the nation’s leading Internet attorneys
             and founder of the Internet Law Center. He is Co-Chair
             of the California Bar Cyberspace Committee and a
             frequent speaker on the latest developments in Internet
             law at conferences throughout North America. Bennet
             also is a regular guest on Webmaster Radio’s “InBoxed”.

             Bennet has played a leading role in shaping Internet
             law and policy having testified and lobbied on Internet
             issues in Washington and Sacramento, winning praise
             from a key Congressional committee for his
             contributions to federal spyware legislation.

             In addition, the Internet Law Center’s newsletter, Cyber
             Report, was named one of the top 100 Internet law
             resources and recognized by the LA Press Club.
56   Contact
     Bennet Kelley
     Internet Law Center
     100 Wilshire Blvd, Suite 950, Santa Monica, CA 90401
     (310) 452-0401
     bkelley@internetlawcenter.net
     www.internetlawcenter.net
     Twitter: InternetLawCent / SlideShare: InternetLawCenter
Business Law Essentials Series
Essentials of Cyberspace Law




User Generated Content, Privacy, and Advertising

           California Bar Cyberspace Committee
                      January 27, 2010

Weitere ähnliche Inhalte

Was ist angesagt?

Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law Center
 
GRIFFIN COPYRIGHT MBU 2520 FALL 2019 chapter 15
GRIFFIN COPYRIGHT MBU 2520 FALL 2019 chapter 15GRIFFIN COPYRIGHT MBU 2520 FALL 2019 chapter 15
GRIFFIN COPYRIGHT MBU 2520 FALL 2019 chapter 15Eric Griffin
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementInternet Law Center
 
When the World Wide Web Becomes the World Wild Web: PIPA, SOPA, OPEN Act, CIS...
When the World Wide Web Becomes the World Wild Web: PIPA, SOPA, OPEN Act, CIS...When the World Wide Web Becomes the World Wild Web: PIPA, SOPA, OPEN Act, CIS...
When the World Wide Web Becomes the World Wild Web: PIPA, SOPA, OPEN Act, CIS...Thomas O. Dubuisson
 
Ecommerce legal exchange beijing
Ecommerce legal exchange beijingEcommerce legal exchange beijing
Ecommerce legal exchange beijingInternet Law Center
 
Replacing the Infancy Doctrine_34WhittierLRev141
Replacing the Infancy Doctrine_34WhittierLRev141Replacing the Infancy Doctrine_34WhittierLRev141
Replacing the Infancy Doctrine_34WhittierLRev141Karen Shiffman
 
Sarah Jamieson_corrections
Sarah Jamieson_correctionsSarah Jamieson_corrections
Sarah Jamieson_correctionsSarah Jamieson
 
LexisNexis CaseMap National Webinar
LexisNexis CaseMap National WebinarLexisNexis CaseMap National Webinar
LexisNexis CaseMap National WebinarDaniel Gold, Esq.
 

Was ist angesagt? (10)

Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP Institute
 
Png w25 b
Png w25 bPng w25 b
Png w25 b
 
GRIFFIN COPYRIGHT MBU 2520 FALL 2019 chapter 15
GRIFFIN COPYRIGHT MBU 2520 FALL 2019 chapter 15GRIFFIN COPYRIGHT MBU 2520 FALL 2019 chapter 15
GRIFFIN COPYRIGHT MBU 2520 FALL 2019 chapter 15
 
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation ManagementSM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
SM Chamber of Commerce TechTalk: 5 Rules of Reputation Management
 
When the World Wide Web Becomes the World Wild Web: PIPA, SOPA, OPEN Act, CIS...
When the World Wide Web Becomes the World Wild Web: PIPA, SOPA, OPEN Act, CIS...When the World Wide Web Becomes the World Wild Web: PIPA, SOPA, OPEN Act, CIS...
When the World Wide Web Becomes the World Wild Web: PIPA, SOPA, OPEN Act, CIS...
 
Vgl13 t6
Vgl13 t6Vgl13 t6
Vgl13 t6
 
Ecommerce legal exchange beijing
Ecommerce legal exchange beijingEcommerce legal exchange beijing
Ecommerce legal exchange beijing
 
Replacing the Infancy Doctrine_34WhittierLRev141
Replacing the Infancy Doctrine_34WhittierLRev141Replacing the Infancy Doctrine_34WhittierLRev141
Replacing the Infancy Doctrine_34WhittierLRev141
 
Sarah Jamieson_corrections
Sarah Jamieson_correctionsSarah Jamieson_corrections
Sarah Jamieson_corrections
 
LexisNexis CaseMap National Webinar
LexisNexis CaseMap National WebinarLexisNexis CaseMap National Webinar
LexisNexis CaseMap National Webinar
 

Ähnlich wie Essentials Of Cyberspace Law Cal Bar Cyberspace Commt

The Communications Decency Act with Maria Crimi Speth
The Communications Decency Act with Maria Crimi SpethThe Communications Decency Act with Maria Crimi Speth
The Communications Decency Act with Maria Crimi SpethJaburgWilk
 
PELTON PowerPoint: ABA Cyberspace Institute 2011-01-28
PELTON PowerPoint: ABA Cyberspace Institute 2011-01-28PELTON PowerPoint: ABA Cyberspace Institute 2011-01-28
PELTON PowerPoint: ABA Cyberspace Institute 2011-01-28erikpelton
 
The Anticybersquatting Consumer Protection Act and the Uniform Domain Name Di...
The Anticybersquatting Consumer Protection Act and the Uniform Domain Name Di...The Anticybersquatting Consumer Protection Act and the Uniform Domain Name Di...
The Anticybersquatting Consumer Protection Act and the Uniform Domain Name Di...tenesa
 
Protecting Your Brand in Cyberspace
Protecting Your Brand in CyberspaceProtecting Your Brand in Cyberspace
Protecting Your Brand in CyberspaceInternet Law Center
 
Legal Questions Surrounding Cell Phone Privacy
Legal Questions Surrounding Cell Phone PrivacyLegal Questions Surrounding Cell Phone Privacy
Legal Questions Surrounding Cell Phone PrivacyChristie Dudley
 
Federal Computer Fraud and Abuse Act & Texas Computer Hacking Statutes
Federal Computer Fraud and Abuse Act & Texas Computer Hacking StatutesFederal Computer Fraud and Abuse Act & Texas Computer Hacking Statutes
Federal Computer Fraud and Abuse Act & Texas Computer Hacking StatutesShawn Tuma
 
08/19/2010 Meeting - Litigation Holds and Security Breaches
08/19/2010 Meeting - Litigation Holds and Security Breaches08/19/2010 Meeting - Litigation Holds and Security Breaches
08/19/2010 Meeting - Litigation Holds and Security Breachesacfesj
 
Glover ccil internet_jurisdiction_slides.ppt
Glover ccil internet_jurisdiction_slides.pptGlover ccil internet_jurisdiction_slides.ppt
Glover ccil internet_jurisdiction_slides.pptbsookman
 
Managing the Legal Concerns of Cloud Computing
Managing the Legal Concerns of Cloud ComputingManaging the Legal Concerns of Cloud Computing
Managing the Legal Concerns of Cloud ComputingAmy Larrimore
 
2600 v19 n1 (spring 2002)
2600 v19 n1 (spring 2002)2600 v19 n1 (spring 2002)
2600 v19 n1 (spring 2002)Felipe Prado
 
Privacy Concerns in Marketing and Commercial Communications
Privacy Concerns in Marketing and Commercial CommunicationsPrivacy Concerns in Marketing and Commercial Communications
Privacy Concerns in Marketing and Commercial CommunicationsInternet Law Center
 
NYCLA Privacy CLE_october_1_2014_presentation
NYCLA Privacy CLE_october_1_2014_presentationNYCLA Privacy CLE_october_1_2014_presentation
NYCLA Privacy CLE_october_1_2014_presentationAltheimPrivacy
 
20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet LawKlemchuk LLP
 
Trademark/Copyright Law Update 2008
Trademark/Copyright Law Update 2008Trademark/Copyright Law Update 2008
Trademark/Copyright Law Update 2008Jim Francis
 
michael hamilton startegic dm case team
michael hamilton startegic dm case team  michael hamilton startegic dm case team
michael hamilton startegic dm case team michaelhamilton
 
EDiscovery Presentation
EDiscovery PresentationEDiscovery Presentation
EDiscovery Presentationscubastog
 

Ähnlich wie Essentials Of Cyberspace Law Cal Bar Cyberspace Commt (20)

The Communications Decency Act with Maria Crimi Speth
The Communications Decency Act with Maria Crimi SpethThe Communications Decency Act with Maria Crimi Speth
The Communications Decency Act with Maria Crimi Speth
 
PELTON PowerPoint: ABA Cyberspace Institute 2011-01-28
PELTON PowerPoint: ABA Cyberspace Institute 2011-01-28PELTON PowerPoint: ABA Cyberspace Institute 2011-01-28
PELTON PowerPoint: ABA Cyberspace Institute 2011-01-28
 
The Anticybersquatting Consumer Protection Act and the Uniform Domain Name Di...
The Anticybersquatting Consumer Protection Act and the Uniform Domain Name Di...The Anticybersquatting Consumer Protection Act and the Uniform Domain Name Di...
The Anticybersquatting Consumer Protection Act and the Uniform Domain Name Di...
 
Protecting Your Brand in Cyberspace
Protecting Your Brand in CyberspaceProtecting Your Brand in Cyberspace
Protecting Your Brand in Cyberspace
 
Legal Questions Surrounding Cell Phone Privacy
Legal Questions Surrounding Cell Phone PrivacyLegal Questions Surrounding Cell Phone Privacy
Legal Questions Surrounding Cell Phone Privacy
 
June's ARTICLES
June's ARTICLESJune's ARTICLES
June's ARTICLES
 
Federal Computer Fraud and Abuse Act & Texas Computer Hacking Statutes
Federal Computer Fraud and Abuse Act & Texas Computer Hacking StatutesFederal Computer Fraud and Abuse Act & Texas Computer Hacking Statutes
Federal Computer Fraud and Abuse Act & Texas Computer Hacking Statutes
 
08/19/2010 Meeting - Litigation Holds and Security Breaches
08/19/2010 Meeting - Litigation Holds and Security Breaches08/19/2010 Meeting - Litigation Holds and Security Breaches
08/19/2010 Meeting - Litigation Holds and Security Breaches
 
Glover ccil internet_jurisdiction_slides.ppt
Glover ccil internet_jurisdiction_slides.pptGlover ccil internet_jurisdiction_slides.ppt
Glover ccil internet_jurisdiction_slides.ppt
 
Managing the Legal Concerns of Cloud Computing
Managing the Legal Concerns of Cloud ComputingManaging the Legal Concerns of Cloud Computing
Managing the Legal Concerns of Cloud Computing
 
PLI Can Spam
PLI Can SpamPLI Can Spam
PLI Can Spam
 
2600 v19 n1 (spring 2002)
2600 v19 n1 (spring 2002)2600 v19 n1 (spring 2002)
2600 v19 n1 (spring 2002)
 
Legal final
Legal finalLegal final
Legal final
 
Privacy Concerns in Marketing and Commercial Communications
Privacy Concerns in Marketing and Commercial CommunicationsPrivacy Concerns in Marketing and Commercial Communications
Privacy Concerns in Marketing and Commercial Communications
 
NYCLA Privacy CLE_october_1_2014_presentation
NYCLA Privacy CLE_october_1_2014_presentationNYCLA Privacy CLE_october_1_2014_presentation
NYCLA Privacy CLE_october_1_2014_presentation
 
20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law20 New Trends and Developments in Computer and Internet Law
20 New Trends and Developments in Computer and Internet Law
 
Trademark/Copyright Law Update 2008
Trademark/Copyright Law Update 2008Trademark/Copyright Law Update 2008
Trademark/Copyright Law Update 2008
 
michael hamilton startegic dm case team
michael hamilton startegic dm case team  michael hamilton startegic dm case team
michael hamilton startegic dm case team
 
EDiscovery Presentation
EDiscovery PresentationEDiscovery Presentation
EDiscovery Presentation
 
Law w23
Law w23Law w23
Law w23
 

Mehr von Internet Law Center

Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfBlueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfInternet Law Center
 
Blueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfBlueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfInternet Law Center
 
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...Internet Law Center
 
Oregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfOregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfInternet Law Center
 
Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Internet Law Center
 
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfBipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfInternet Law Center
 
ECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionInternet Law Center
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyInternet Law Center
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinInternet Law Center
 
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareData Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareInternet Law Center
 
Cyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsCyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsInternet Law Center
 
Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Internet Law Center
 

Mehr von Internet Law Center (20)

Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfBlueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
 
Blueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfBlueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdf
 
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
 
SEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdfSEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdf
 
Oregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfOregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdf
 
Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer
 
CCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdfCCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdf
 
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfBipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
 
20200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc3111820200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc31118
 
ECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II Decision
 
The Road to Schrems II
The Road to Schrems IIThe Road to Schrems II
The Road to Schrems II
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH Economy
 
FIFA Indictment
FIFA IndictmentFIFA Indictment
FIFA Indictment
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletin
 
Data Privacy Day 2020
Data Privacy Day 2020Data Privacy Day 2020
Data Privacy Day 2020
 
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareData Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
 
Cyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsCyber Report: A New Year with New Laws
Cyber Report: A New Year with New Laws
 
Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296
 
FTC's Influencer Guide
FTC's Influencer GuideFTC's Influencer Guide
FTC's Influencer Guide
 
Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)
 

Kürzlich hochgeladen

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Kürzlich hochgeladen (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Essentials Of Cyberspace Law Cal Bar Cyberspace Commt

  • 1. Business Law Essentials Series Essentials of Cyberspace Law User Generated Content, Privacy, and Advertising California Bar Cyberspace Committee January 27, 2010
  • 2. A Presentation of the Cyberspace Law Committee Essentials of Business Law Series January 27, 2010
  • 3. Where Used Websites SaaS Services Skype Delivery Research Other Social Networking
  • 5. Enforceability Best Practices Notice is Key Require Consent “I agree” buttons Required scrolling Does Use Indicate Consent?
  • 6. Enforceability Specht v. Netscape Communications Corp., 306 F.3d 17 (2d Cir. 2002) (lack of notice vitiates consent) Register.com Inc. v. Verio Inc. 126 F.Supp.2d 238 (S.D.N.Y. 2000), aff’d 356 F.3d 393 (2nd Cir. 2004) (post-download notice on (post- repeated downloads constitutes notice) Southwest Airlines Co. v. BoardFirst LLC (N.D. Tex 2007) (home page legend provides sufficient notice for binding contract) Ticketmaster LLC v. RMG Techs. Inc. (C.D. Cal. 2007) (in preliminary injunction matter, terms of use enforceable where court believed that defendants would be shown to have been notified of and assented to terms)
  • 7. Modification Douglas v. U.S. District Court for the Central District of California 495 F.3d 1062 (9th Cir. 2007) (customer was not bound to revised contract terms because the customer had not received notice of, or assented to, the changes) Harris v. Blockbuster Inc. 622 F. Supp. 2d 396 (N.D. Tex 2009) (unlimited unilateral ability to modify or terminate renders contract illusory, citing Morrison v. Amway Corp. 517 F.3d 248 (5th Cir. 2008) and distinguishing In re Halliburton 80 S.W.3d 566 (Tex. 2002)
  • 8. Modification Notice is Key Best Practices Establish Modification Right Initially and Clearly Highlight all Material Changes Collect and Retain Evidence of Assent Create An Opportunity for Rejections Use Common Sense
  • 9. Provisions Contract Language Situational General Entire Agreement Privacy Policies (A.V. v. iParadigms 544F.Supp.2d 473 (E.D. Va. 2008)(browse wrap terms unenforceable when not incorporated into click through license) Modification Process Social Networking Specific Provisions Copyright Infringement Notices (DMCA) Content Limitations Redistribution Rights Indemnification Right to Remove Posting and Terminate Account
  • 10. ALI Principles ALI Principles of the Law of Software Contracts, May 19, 2009 Modification requires consents after notice of the modification and termination requires reasonable notice Disclaimable implied IP infringement indemnification obligation Nondisclaimable warranty of no hidden material defects
  • 11.
  • 12. ECPA and the Impact of Outdated Privacy Law Essentials of Cyberspace Law January 27, 2010 Nicole A. Ozer Technology and Civil Liberties Policy Director ACLU of Northern California www.aclunc.org/tech nozer@aclunc.org
  • 13. The 4th Amendment clearly protects your data… • At home or on a device in your possession – Judicial search warrant (probable cause) – Notice at time of search • BUT much weaker if in another’s hands – Couch (accountant) – Miller (bank) – Smith (telephone company)
  • 14. Congress tried in ECPA (1986) For the person or business whose records are involved, the privacy or proprietary interest in that information should not change. Nevertheless, because it is subject to control by a third party computer operator, the information may be subject to no constitutional privacy protection . Thus, the information may be open to possible wrongful use and public disclosure by law enforcement authorities as well as unauthorized private parties. - Senate Judiciary Committee (1986)
  • 15. Federal communications privacy laws • Wiretap Act or “Title III” (part of ECPA) – interception = getting content of communications in real time (in transit) • Pen register and trap-and-trace statute – addressing data of communications in real time • Stored Communications Act (SCA) (also ECPA) – access to stored communications, records of communications, subscriber data
  • 16. Always complex and getting worse • “famous (if not infamous) for its lack of clarity” – Steve Jackson Games v. U.S. Secret Service (5th Cir. 1994) • “fraught with trip wires” – Forsyth v. Barr (5th Cir. 1994) • “a fog of inclusions and exclusions” – Briggs v. American Air Filter (5th Cir. 1980)
  • 17. Just a few things have changed since 1986: Cloud computing 2006: Google docs launched Rise of social networking 2004: Facebook launched Internet search 1998: Google founded 1994: Yahoo & Amazon founded The beginning of everything 1990: World Wide Web created Cell phones … VOiP … Online book search …
  • 18. ECPA challenges today • It’s confusing and outdated – ECPA defines service providers in language that does not make sense in today’s technological world. – Different levels of protection can apply to the same piece of communication over it’s lifetime. – It clearly applies to public providers, like hotmail. But what about a nonpublic provider like a university? • New technologies are left behind – It’s not clear if or how it applies to modern digital services, like cloud computing, social networking, or Internet search history.
  • 19. Lifecycle of an email Unopened < 180 days Warrant > 180 days Opened Subpoena or 2703(d) with notice Header info Subpoena Basic subscriber or 2703(d) info (name, address, NO notice req’d connection records, etc)
  • 20. That’s confusing. And email was one of the specific technologies that existed in 1986 and that ECPA was intended to protect. What about newer services that didn’t exist in 1986? How does ECPA protect them?
  • 22. A campaign to educate and activate the public, businesses, and policy makers to upgrade privacy laws and keep pace with our modern online world.
  • 23. Updates… www.aclunc.org/tech www.aclunc.org/techblog www.dotRights.org nozer@aclunc.org
  • 24. 24
  • 25. 25
  • 26. 26
  • 27. TM Use Limited to Search Term 27
  • 28. TM Use Limited to Search Term 28 J.G. Wentworth SSC Ltd v. Settlement Funding LLC, 2007 WL 30115 (E.D. Pa. Jan. 4, 2007) (granting motion to dismiss).
  • 29. TM Use Limited to Search Term 29 Morningware, Inc. v. Hearthware Home Products, Inc., 2009 WL 3878251 (N.D. Ill. Nov. 16, 2009)
  • 30. 30
  • 31. Initial Interest Confusion 31 Use of another trademark “in a manner calculated to capture initial consumer attention, even though no actual sale is finally completed as a result of the confusion.” Brookfield Communications Inc. v. West Coast Entertainment Corp., 174 F.3d 1036 (9th Cir. 1999). B Tal
  • 32. Rationale 32 • Improperly Benefits From Goodwill of Trademark • False Detour From Information Super-highway – Analogy to false detour sign directing consumers to take wrong exit. “Unable to locate West Coast, but seeing the Blockbuster store right by the highway entrance, they may simply rent there.” Brookfield Communications, Inc. v. West Coast Entertainment Corp., 174 F.3d 1036, 1062 (9th Cir. 1999). • Bait and Switch – “Initial interest confusion can be viewed as a variation on the practice of ‘bait and switch.’” 3 J. Thomas McCarthy, McCarthy on Trademarks & Unfair Competition § 23:26 (4th ed. 2003).
  • 34. Counterpoint 34 Not a Detour, Merely a Lane Change Web surfers are accustomed to false starts and are unlikely to be dissuaded when they end up at the wrong site. Chatam Int'l v. Bodum, Inc., 157 F.Supp.2d 549, 559 (E.D. PA 2001). No different than supermarket placing products. store brand next to branded products FragranceNet.com, Inc. v. FragranceX.com, 493 F. Supp. 2d)(E.D.N.Y 2007) Legally Significant Confusion? “The [District] court’s refusal to enter the ‘initial interest confusion’ thicket is well taken given the unlikelihood of ‘legally significant’ confusion.” Hasbro Inc. v. Clue Computing, Inc., 232 F.3d 1, 2 (1st Cir. 2000).
  • 35. 35
  • 36. Cyber Squatting Remedies 36 ICANN’s Uniform Domain Name Dispute Resolution Policy Establishes arbitration process for bad faith domain registration 2329 cases filed in 2008 Only remedy is transfer of domain Anti-Cyber Squatting Consumer Protection Act (15 U.S.C. § 1125(d)) Lanham Act remedies for bad faith registration of domain name
  • 37. 37
  • 38. Dealing with Gripe Sites 38 Trademark Claims Absent commercial use no TM violation or cyber squatting Copyright Fair use defense Defamation First Amendment and SLAPP protection Third-Party postings Website immune under Communications Decency Act
  • 39. Dealing with Gripe Sites 39 Trademark Claims Absent commercial use no TM violation or cyber squatting Copyright Fair use defense Defamation First Amendment and SLAPP protection Third-Party postings Website immune under Communications Decency Act
  • 40. 40
  • 41. CAN-SPAM Act of 2003 41 CAN- CAN-SPAM IS . . . CAN- CAN-SPAM DOES NOT . . . anti- An anti-fraud and disclosure “Can Spam” – except for statute wireless spam Applies to an email where Include a “Do Not Email the “primary purpose” is Registry” commercial advertisement or promotion of a product or service Impose an “ADV” labeling requirement Non profits are not exempt No volume requirement Create a general private right of action
  • 42. CAN-SPAM Principal Requirements 42 From line must identify initiator Subject line must not be deceptive. Adult Messages must provide notice. UCE must be identified as “advertisement” Requires Working Opt-Out Mechanism for Advertiser Postal Address for Advertiser
  • 43. CAN-SPAM Plaintiffs 43 FTC State AGs Internet Access Service Provider (IASP) Adversely Effected by Violation Cannot be faux-IASP No Consumer Private Right of Action
  • 44. Preemption of State Law 44 CAN- CAN-SPAM PREEMPTS ALL STATE REGULATION OF EMAIL EXCEPT STATE LAWS: Regulating falsity or deception in email Not specific to email, including State trespass, contract, or tort law; or Other State laws to the extent that those laws relate to acts of fraud or computer crime
  • 45. 45
  • 47. The Offer 47 * *Earnings Disclaimer - Your level of success in attaining the results claimed in our materials depends on the time you devote to the program, ideas and techniques mentioned, your finances, knowledge and various skills. *By submitting this form you request that your account be activated and give your authorization to immediately charge your credit card $2.98 for access to the Business Kit for Google. After the 7 day trial you will be billed $89.90 each month for continued access to the Business Kit for Google. Your Business Kit access will continue each month until revoked by you. You may cancel at anytime by writing to 230 West 400 South, Suite 100 Salt Lake City, UT 84101 or calling 1-800-497-4988 or International customers please call 00-1- 646-205-0230
  • 49. Transaction Page 49 ALSO NO REFERENCE TO CHARGE ON FIRST PAGE
  • 51. FTC Complaint 51 FTC v. Infusion Media, Inc., Civil Action No. 09-CV-01112 (D. Nev. 2009)
  • 52. FTC Advertising Guidelines 52 Advertising Dot Com Comparative Advertising Disclosures: Information Statement of Policy Regarding About Online Advertising Comparative Advertising [PDF] Deception FTC Policy Statement Advertising and Marketing on on Deception the Internet: The Rules of the Road Deceptive Pricing FTC Guides Frequently Asked Advertising Against Deceptive Pricing Questions: A Guide for Small Business Dietary Supplements Dietary Joint FTC/FCC guides on Long Supplements: An Advertising Distance Advertising [PDF] Guide for Industry Advertising Substantiation FTC Staff Comment on Draft FTC Policy Statement Report of the Commission on Regarding Advertising Dietary Supplement Labels Substantiation FTC Staff Comment on FDA Bait Advertising FTC Guides Proposed Rule on Statements Against Bait Advertising Made for Dietary Supplements
  • 53. FTC Advertising Guidelines (con’t) 53 Endorsements and Testimonials Food Advertising Enforcement FTC Guide Concerning the Use Policy Statement on Food of Endorsements and Advertising Testimonials Jewelry Guides for the Jewelry, Precious Metals, and Pewter Environment FTC Guides for the Industries Use of Environmental Market Claims (Green Guides) Unfairness FTC Policy Statement on Unfairness Eye- Eye-Care Surgery FDA/FTC Joint Letter on PRK Vocational and Distance Education Schools Guides for Private FTC Staff Guides on Refractive Vocational and Distance Education Eye Surgery Schools [PDF] Use of the Word "Free" FTC Weight- Weight-Loss Products Red Flag: Guide Concerning the Use of Bogus Weight Loss Claims Web Site the Word "Free" Red Flag: Bogus Weight Loss Claims Brochure
  • 54. About the Internet Law Center 54 The Internet Law Center is dedicated to helping businesses navigate the evolving legal standards for today’s digital economy, while also contributing to the development of the policies of tomorrow. The firm serves a diverse client base that includes startups and public companies both online and offline across North America and Asia. The professionals of the Internet Law Center possess years of practical experience as lawyers and entrepreneurs with internet companies and have played a leading role in shaping Internet law and policy. This unprecedented combination of business, legal and policy experience makes the Internet Law Center uniquely qualified to provide the professional advice needed to address emerging issues of internet law in an uncertain economy. Sign up for the Cyber Report – our award winning newsletter which was named one of the Top 100 Internet Law Resources. It is also available on our blog (along with other materials) at www.ilccyberreport.wordpress.com. .
  • 55. About Bennet Kelley 55 Bennet is one of the nation’s leading Internet attorneys and founder of the Internet Law Center. He is Co-Chair of the California Bar Cyberspace Committee and a frequent speaker on the latest developments in Internet law at conferences throughout North America. Bennet also is a regular guest on Webmaster Radio’s “InBoxed”. Bennet has played a leading role in shaping Internet law and policy having testified and lobbied on Internet issues in Washington and Sacramento, winning praise from a key Congressional committee for his contributions to federal spyware legislation. In addition, the Internet Law Center’s newsletter, Cyber Report, was named one of the top 100 Internet law resources and recognized by the LA Press Club.
  • 56. 56 Contact Bennet Kelley Internet Law Center 100 Wilshire Blvd, Suite 950, Santa Monica, CA 90401 (310) 452-0401 bkelley@internetlawcenter.net www.internetlawcenter.net Twitter: InternetLawCent / SlideShare: InternetLawCenter
  • 57. Business Law Essentials Series Essentials of Cyberspace Law User Generated Content, Privacy, and Advertising California Bar Cyberspace Committee January 27, 2010