1 lectures on internet law (csm04) mrs. tuğba taşkaya temizel prof. khurshid ahmad department of...

59
1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November 2005

Upload: stephen-lyons

Post on 27-Dec-2015

216 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

1

Lectures on Internet Law(CSM04)

Mrs. Tuğba Taşkaya TemizelProf. Khurshid AhmadDepartment of Computing

School of Electronics & Physical Sciences

November 2005

Page 2: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

2

Course Outline- Internet Law

• Cyberspace, cyberlaw and the clash of laws• The key players• Internet and Intellectual Property• Internet –Telecomms and Broadcast Regulation• Defamation• Trademarks• Domain Name Registration• Copyrights• Online Service Agreements• Click-Wrap Licences• Computer Fraud and Abuse• Patent Law

Page 3: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

3

Key ReferencesBooks

• Bainbridge, David I. (2000). Introduction to Computer Law (4th Edition). Harlow (England): Longman.

• Edwards, Lillian., & Wealde, Charlotte. (2000). Law and the Internet: A Framework for Electronic Commerce. Oxford & Portland: Hart Publishing.

• Lloyd, Ian J. (1977). Information Technology Law. London:Butterworth.

•Powers D. M. (2001). The Internet Legal Guide. John Wiley & Sons Inc.

• Smedinghoff, Thomas, J. (1996) (Editor). Online Law: The Software Publishers Association’s Legal Guide to Doing Business on the Internet. Reading (Mass): Addison-Wesley Developers Press.

Page 4: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

4

Key ReferencesLinks

• Internet Library of Law and Court Decisions http://www.phillipsnizer.com/library/

• An Introduction to Intellectual Property http://www.law.uconn.edu/homes/swilf/ip/index.htm

• Business, Internet, e-Commerce & Domain Name Law http://www.keytlaw.com/

• Intellectual Property in Cyberspace http://cyber.law.harvard.edu/property00/library/library.html

• Copyright and Fair Usehttp://fairuse.stanford.edu/Copyright_and_Fair_Use_Overview/index.html

• FindLaw Professionals: Summaries of Lawhttp://profs.lp.findlaw.com/

Page 5: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

5

Glossary of Legal Terms

• Allege : To state without proof or before proving• Bona Fide : characterized by good faith and lack of fraud or deceit• Chattel : An article of movable personal property• Defendant : The party against which an action is brought• Dismiss: To put (a claim or action) out of court without further hearing• Enact : To make into law• Infringe :To exceed the limits of; violate• Injunction: A court order prohibiting a party from a specific course of

action• Jurisdiction :The right and power to interpret and apply the law• Lawsuit : An action brought in a court for the purpose of seeking relief

from or remedy for an alleged wrongFor more legal definitions, please refer to

http://www.lawyers.com/legal_topics/glossary/index.php

http://www.dictionary.com

Page 6: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

6

Glossary of Legal Terms

• Legislation : A proposed or enacted law or group of laws.• Merits : A party's strict legal rights, excluding jurisdictional, personal, or

technical aspects• Plaintiff : A person who brings an action in a court of law• Squatter : a person who occupies real property without a claim of right or

title • Statute : An established law or rule, as of a corporation• Sue : To institute legal proceedings; bring suit• Trespass : To commit an unlawful injury to the person,

property, or rights of another, with actual or implied force or violence, especially to enter onto another's land wrongfully

For more legal definitions, please refer to http://www.lawyers.com/legal_topics/glossary/index.php

http://www.dictionary.com

Page 7: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

7

Internet: CYBERSPACE and its Governance

• Changes in our world:1041 Movable clay type invented in China.

1440 Gutenberg completed his wooden press which used metal moving type.

1455 Gutenberg was effectively bankrupt.

1563 UK Parliament passed the Statute of Artificers Act which proved greatly restrictive to craftsmen.

1572 John Day introduced Roman type in England.

– Laws to govern the print media (ink on paper)

Page 8: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

8

Internet: CYBERSPACE?

• Physically the Internet is a collection of packet-switched computer networks connected together by a set of software protocols called Transmission Control Protocol/Internet Protocol.

• Thousands of networks are connected to a core – high capacity backbone networks in the USA – by adapting Internet protocols and then linking in.

• The physical boundaries of the Internet are virtually impossible to define.

Page 9: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

9

Cyberspace -> Cyberlaw

• Cyberlaw is used to describe the emerging body of law that governs cyberspace transactions and disputes. It is evolving through the actions of the various new statutes that are being enacted.

• Does not have any physical boundaries as such.• The realm of international law does apply at times

to cyberspace, however does not govern Internet use and the changes that are taking place.

Page 10: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

10

Cyberspace: The Clash of Laws

• The question is whether a court has the ability to assume jurisdiction over an Internet Web site that’s located outside its orders. If the court has this jurisdiction, and if the case is important enough, the Web site owner must travel all the way to that foreign country and defend himself/herself under those different laws.

• Internet law is being savagely forged in court decisions and delicately crafted in different statutes by various countries. Although a cyber-common law is being created worldwide, there is still room for legal guidance. When people need more guidance than there are laws, it’s time to look at Internet common sense and basic civility.

Page 11: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

11

• Changes in our world:– Print Media – Broadcast Media (Sound) – Broadcast Media (Images) – Broadcast Media – Interactive Media

Terrestrial

CableSatellite

Telephone

CYBERSPACE and its Governance

Page 12: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

12

• Changes in our legal world:– Media Copyright; Defamation -

Libel/Slander; Security; Information Content; Conduct of producers and consumers

Terrestrial

Cable

Satellite

Telephone

Analogue

Digital

CYBERSPACE and its Governance

Page 13: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

13

Legal Framework:

• To protect the rights of individuals and organisations;

• To outline the duties of individuals and organisations;

• To define the jurisdiction of the framework in terms of time, place, and communities

CYBERSPACE and its Governance

Page 14: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

14

Legal Framework for the Online World:

Owners UsersRights Duties Rights Duties

Information Security

Ownership Authenticity; integrity

Fair Usage Confidentiality

Information Content

Ownership Ethical & Moral

Fair Usage Prevent Abuse

Online Conduct

Fair profits Ethical & Moral, Political; Tax

Fair Usage;

Tax,

Confidentiality; Prevent Abuse

CYBERSPACE and its Governance

Page 15: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

15

• Internet is a unique global institution.• Internet grows with the help of, and is

threatened by, a number of players: national and supra-national governments, for profit and not-for profit organisations, individuals and groups.

• Collaboration between these various players is usually not formalized.

CYBERSPACE and its Governance

Page 16: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

16

• Governance by consensus through the Internet Society which is based in the USA and Switzerland. (www.isoc.org)

• The Internet SOCiety (ISOC) is a professional membership society with more than 150 organization and 16,000 individual members in over 180 countries. It provides leadership in addressing issues that confront the future of the Internet, and is the organization home for the groups responsible for Internet infrastructure standards, including the – Internet Engineering Task Force (IETF),– Internet Architecture Board (IAB),– Internet Assigned Numbers Authority (IANA) and– Internet Information Center.

CYBERSPACE and its Governance

Page 17: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

17

• Internet Society Mission Statement"To assure the open development, evolution and use of the Internet for the benefit of all people throughout the world."

• The Internet Society acts not only as a global clearinghouse for Internet information and education but also as a facilitator and coordinator of Internet-related initiatives around the world.

CYBERSPACE and its Governance

Page 18: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

18

The Internet Society was founded to

•Facilitate open development of standards, protocols, administration and the technical infrastructure of the Internet

•Support education in developing countries specifically, and wherever the need exists

•Promote professional development and opportunities for association to Internet leadership

•Provide reliable information about the Internet

•Provide forums for discussion of issues that affect Internet evolution, development and use -- technical, commercial, societal, etc.

•Foster an environment for international cooperation, community, and a culture that enables self-governance to work

•Serve as a focal point for cooperative efforts to promote the Internet as a positive tool to benefit all people throughout the world

•Provide management and coordination for on-strategy initiatives and outreach efforts -- humanitarian, educational, societal.

CYBERSPACE and its Governance

Page 19: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

19

Internet: The PLAYERS and their roles

THE PROVIDERS• Infrastructure and Network Providers• Content Providers• Access Providers• Navigation Providers

OTHERS• Hosts• Administrators• Transaction Facilitators

Page 20: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

20

Internet: The PLAYERS and their roles Infrastructure Providers: Key components

COMPONENT FUNCTIONS OWNERS

Routers Computers designed to receive & forward packets of data

Governments & private organizations (fully connected)

Hosts Systems which store programs and data

Governments & private organizations (fully connected)

Pipes Telecom connections that link the hosts & routers

Usually, telecom companies that lease capacity/routing/ switching

Page 21: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

21

Network providers have:

Physical links to enable traffic flow direct from one network to another;

Contractual relations Peering Agreement: governs traffic exchange between networks; no peering agreement & no physical link no traffic or find alternative routes

Appropriate Use Policies: used typically by governments to prohibit commercial traffic;

Pricing arrangements that are flat-rate

Internet: The PLAYERS and their rolesNetwork Providers

Page 22: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

22

• Internet protocols allow messages to route around gaps or blockages

• The route is therefore sometimes unpredictable there is no one person to take legal responsibility for END-TO-END delivery of message

Internet: The PLAYERS and their rolesContent Providers

Page 23: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

23

Content Form Examples

Real-time audio, video, animation,voice telephony, video conferencing

Downloadable copiable files including text, graphics, video, computer programs, updates, patches

Internet: The PLAYERS and their rolesContent Providers

Page 24: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

24

• Any ‘soft’ product seems to be a good candidate for buying & selling on the Internet: software, news, books;

• Boundaries of ownership and responsibility are BLURRED.

• Can linking to other sites generate legal liabilities for content on the target such as copyright INFRINGEMENT/defamation?

Internet: The PLAYERS and their rolesContent Providers

Page 25: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

25

Internet: The PLAYERS and their rolesContent Providers

• Copyright? – The exclusive right to reproduce or authorize others to reproduce artistic, dramatic, literary or musical works. The right now includes sound broadcasting, films and TV.

• The UK Copyright Act 1988 confers the right.• Remedies: If a plaintiff’s copyright has been breached

then he or she can (a) take action for damages (b) demand account for profits and (c) seek an injunction against the accused.

• A remedy (also known as redress, relief) is any of the methods available at law for the enforcement, protection, or recovery of rights or for obtaining redress for their infringement.

Page 26: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

26

Internet: The PLAYERS and their rolesThe Hosts

• A host is defined as a computer containing data or programs that another computer can access by means of a network or modem [1]. – Internet Host– Domain Host: The Internet Society’s Domain Name Server is a host.

• Two extremes of data ownership: The owner of the host may OWN & CONTROL data (company hosting an ftp resource); or may have the most tenuous connection with the data (USENET)

• Liability? The liability will vary according to the data ownership status as perceived by the plaintiff and by the defendant.

[1]: http://www.dictionary.com

Page 27: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

27

• Internet works because of the protocols promulgated by the Internet Society. Administration is through consensus.

• Administration is needed because software vendors are vying for business and sometimes adopt extensions to standards before they come into existence.

• Administration will always be needed because of the computing industry’s perennial desire to have de facto standards.

Internet: The PLAYERS and their rolesThe Administrators

Page 28: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

28

• ACCESS: The UK Computer Misuse Act 1990 states that ‘a person secures access to any program or data held in a computer if by causing a computer to perform any function he (or she) alters or erases the program or data, or copies or moves it to any storage medium other than that in which it is held or to a different location in the storage medium in which it is held (whether by having it displayed or in any other manner)’.

Internet: The PLAYERS and their rolesThe Access (Service) Providers

Page 29: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

29

• ACCESS: In the USA, to access strictly means to instruct, communicate with, store data in, retrieve data from, or otherwise obtain the ability to use the resources of a computer or any part thereof.

Internet: The PLAYERS and their rolesThe Access (Service) Providers

Page 30: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

30

• The term Internet access provider refers to an organization that provides HIGH-CAPACITY INTERNET-COMPLIANT links to the backbone(s) and other sites.

• Internet Access Provider (IAP), a company that provides access to the Internet. IAPs generally provide dial-up access through a modem and PPP connection, though companies that offer Internet access with other devices, such as cable modems or wireless connections, could also be considered IAPs.

• The terms IAPs and ISP (Internet Service Providers) are often used interchangeably, though some people consider IAPs to be a subset of ISPs. Whereas IAPs offer only Internet access, ISPs may provide additional services, such as leased lines (T-1 or T-3) and Web development. In contrast to both IAPs and ISPs, online services provide their own proprietary content in addition to Internet access.

Internet: The PLAYERS and their rolesThe Access vs Service Providers

http://isp.webopedia.com/TERM/I/IAP.html

Page 31: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

31

• Major telecomm organizations provide access to the Internet: these organizations can provide local-dial up numbers – PoPs: Points of Presence – around a country and connections to the Internet.

• Small access providers typically re-sell the capacity of major access providers through the use of local telephone numbers. The local numbers are routed through the major’s network to the (small) access provider. This method of maintaining PoPs is called virtual PoP.

Internet: The PLAYERS and their rolesThe Access (Service) Providers

Page 32: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

32

• Legal Liability: Access providers have been sued by plaintiffs who have argued that data copied automatically onto other computers (strictly IP numbers) by an access provider, say servicing a news group, were directly infringing the rights of the plaintiff. Furthermore, the defendant is still liable irrespective of his or her knowledge of the contents of the copied data.

• The legal point here is this: whether or not the access providers are liable for incidental copies automatically made on their computers using their software as part of a process initiated by a 3rd party.

• The famous case in Californian courts, Religious Technology Center v Netcom (21/11/1995) established that Netcom was not liable.

Internet: The PLAYERS and their rolesThe Access (Service) Providers

Page 33: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

33

• The Religious Technology Center v Netcom case was settled in favour of the defendants Netcom because the court could not find ‘a theory of infringement that would hold the entire Internet liable for activities that cannot reasonably be deterred’.

• In other cases where plaintiffs failed to establish the case for ‘criminal copyright infringement’, the courts rejected their appeals (United States vs LaMaccia 1994).

Internet: The PLAYERS and their rolesThe Access (Service) Providers

Page 34: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

34

• Navigation providers help their users, usually without any cost, to find the information on the Internet they require. The emergence of search engines is an example where the providers compile catalogue resources across the Internet.

• The navigation providers act as signposts to quality information.

Internet: The PLAYERS and their roles Navigation Providers

Page 35: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

35

• Navigation providers finance their operation through 3rd party advertisements and sponsorships.

• NPs sift contents on one host and the results (mainly links) may be stored on yet another; the two may be under different legal jurisdiction with the NPs under another.

• NPs are involved in more complex sets of contractual relationships found on the Internet.

Internet: The PLAYERS and their roles Navigation Providers

Page 36: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

36

• Internet flourishes by the way data is freely exchanged across organizations, across national and international boundaries.

• Lack of security and the near-anonymity of Internet users has led to the formation of organizations that provide security and identity systems.

Internet: The PLAYERS and their roles Transaction Facilitators

Page 37: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

37

• Internet is a consensus-based community

• The manner in which members of the community interact with each other and others is governed by legislation which is state-based.

Internet: The PLAYERS and their roles

Page 38: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

38

Internet and Intellectual Property

• Internet deals with data – an intangible asset – unlike property, plant or machinery. Data has no physical existence legally and hence is intangible.

• Internet is about the efficient access of data. Such access may not be perceived by some to be equitable.

• Three areas of Intellectual Property Law relates to Internet: copyright; patents; and trademarks.

Page 39: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

39

Internet and Intellectual Property

• Copyright Laws and the Information Society

UK: Copyright, Designs and Patent Act 1988 which is based on the Copyright Act 1709.

Europe: Copyright and Related Rights in the

Information Society 1995.

• Provision has had to be made for electronic media, for remote operations, for new modes of work involving telecommunications systems, for digitization and ‘dematerialisation’ of information, misuse of confidential information on the Internet.

Page 40: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

40

Internet and Intellectual Property• Evolution of the concept of intellectual property:

Providing programs to copy files and software on bulletin boards: The person who developed the copier program, for a specific file/software, can be held responsible for infringing the right of those who hold copyright on the software (US Sega Enterprises v Maphia 1994);

Hosting bulletin boards which can be used to distribute copyrighted material: The person who owns the board(s) is responsible for what is on it, even though he or she may not be aware of it (US Playboy Enterprises v Frena 1993)

No decisions in the UK courts until recently related to copyright infringement on the Internet.

Page 41: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

41

Internet and Intellectual Property

• Evolution of the concept of intellectual property:

Hosting bulletin board(s) for the free exchange of commercial software: although this behaviour was, according to a US court, ‘heedlessly irresponsible, [..], self indulgent and lacking in any fundamental sense of values’, but as long as ‘no personal gain was made’ the host cannot be accused under the US Computer Fraud and Act 1986. The person may be tried under the US Copyright Act for ‘criminal copyright infringement’. Case dismissed. (US v LaMaccia 1994)

Hosting content providers who may have deemed to have infringed somebody’s copyright: Host not guilty because there ‘is no workable theory of infringement…’. (Religious Technology Center vs Netcom Online Communications Services 1995)

Page 42: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

42

Internet and Intellectual Property

• Evolution of the concept of intellectual property:Publishing confidential information obtained through hacking: The US courts have held that ‘electronic transfer of confidential information from one computer to another across [US] state lines constituted interstate transfer of stolen property’. So far cases in which law enforcement records, banking information, stock market information and emergency procedures were obtained without consent, have been decided in favour of the plaintiffs.

However, in the UK there is no law which specifically forbids ‘dishonest appropriation of pure information’ and that ‘information is not property capable of being stolen’ (Oxford v Moss 1978).

Page 43: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

43

Internet and Intellectual Property

• The copyright, patent and design acts in various countries are being used

• The body of law is evolving each time a court case is settled. This is called precedence.

Page 44: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

44

Internet: Telecommunications & Broadcasting

• The Intellectual Property (Rights) discussion is focused largely on the written word.

• The issues related to the transference of information across national boundaries poses a set of major challenges.

• Internet has opened up new types of markets in publishing and entertainment; again there are only national laws and statutes in this area.

Page 45: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

45

Internet: Telecommunications & Broadcasting

• In order to offer services over the Internet and to operate the infrastructure, one needs LICENCES and CONSENTS.

• Regulations dealing with content have to define the distinction between the modality of information: text v. video; video v. graphics; voice v. music and so on.

Page 46: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

46

Defamation

• Defamation is present when a material falsehood about somebody which harms that person’s reputation is communicated to a third party.

• For a comment, whether written or not, to be defamatory, it must meet several minimum requirements:– It must damage someone else’s reputation, whether that is

a person or a business– It must be the type that generally would adversely affect

that reputation– It must be communicated to another person.

Page 47: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

47

Defamation

• The defences of this action are:– The statement was true

– The communicator had a privilege, such as “fair critism”

– The statement was just your opinion

Page 48: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

48

Service Mark (Lanham Act § 3): A name, phrase, or other device used to identify and distinguish the services of a certain provider. SERVICES

Types of MarksTrademark (Lanham Act § 45): A word, phrase, logo, or other graphic symbol used by a manufacturer or seller to distinguish its product or products from those of others. Referent to the origin of the product. GOODS

© 2001 by Prof. Steven Wilf

Collective Mark (Lanham Act § 4): A trademark or servicemark used by an association, union, or other group either to identify the group’s products or services or to signify membership in the group. ORGANISATIONS

Certification Mark (Lanham Act § 4): A word, symbol, or device used on goods or services to certify the place of origin, quality, or other characteristic. QUALITY

Page 49: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

49

Trademarks

• A name, symbol, sign, numerals, abbreviations, colours, sounds, music, domain names or the like, legally registered to a person or a company, which identifies a good or service and distinguishes itself from its similar kinds.

• Trademarks should be unique and used in commerce.• Trademarks encourages manufacturers to strive for

consistency and quality for the sake of good reputations.• Trademark Registration is done via

– UK Patent Office (http://www.patent.gov.uk/) – U.S. Patent and Trademark Office (http://www.uspto.gov/)

– Community Trade Mark Office in Alicante, Spain for EU (http://oami.eu.int/en/)

http://www.bl.uk/collections/patents/tmlinks.html

Page 50: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

50

TrademarksUse of Trademarks in Cyberspace

• Advertising

Product Identification

Online Services

Domain Names

Page 51: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

51

TrademarksProcess

SelectionSelection

RegistrationRegistration

UseUse

Choose a “Strong” trademark

Choose a “Strong” trademark

(Strongest)

(Weakest)

Fanciful or CoinedFanciful or Coined

ArbitraryArbitrary

SuggestiveSuggestive

DescriptiveDescriptive

Generic (not entitled)Generic (not entitled)

Meeting Use RequirementsMeeting Use Requirements

Check the AvailabilityCheck the Availability

Available

Not Available

The

Abe

rcro

mbi

e T

est

Page 52: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

52

TrademarksDescriptive Marks Zatarains, Inc. v. Oak Grove Smokehouse, Inc.,

698 F2d 786 (5th Cir. 1983)

Plaintiff Defendant

Court applies Abercrombie Test:

Holding:

• Term “Fish-Fry” is descriptive in nature, BUT have acquired secondary meaning• The secondary meaning should be restricted to a certain marketplace (Louisiana)

Generic terms are not protected. Descriptive, suggestive,or arbitrary or fanciful terms can be protected.

• Defendant has right to use terms under “Fair Use” Doctrine as descriptive terms

Oak Grove Dist.

© 2001 by Prof. Steven Wilf

Page 53: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

53

TrademarksStatutories

• US: The system was originated in the Federal Trademark Registration Act. The present is The Lanham Act (1947)

• UK: The system was originated in the Trademarks Act of 1875. The present is Trademarks Act of 1994.

• EU: European Trademark Directive (1988)• International: Madrid Agreement Concerning

the International Registration of Marks

Page 54: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

54

TrademarksTrademark Infringement

• Using a mark that is the same as or similar to the trademark– Similarity appearance, sound, meaning,

connotation

Confusing Not confusing Apple

(computers)Pineapple (computers)

Supercuts (hair salon)

Superclips (hair salon)

Wheaties (for cereal)

Oaties (for cereal)

Swatch (watches)

T-watch (watches)

Page 55: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

55

TrademarksTrademark Infringement

• Using that mark in connection with the sale or advertising of goods or services

• Using the mark in a way that is likely to cause confusion as to the source, origin, sponsorship, or approval of goods or services.

• Courts also considers:– Sophistication of relevant consumers– Similarity of the goods on which marks are used– Defendant’s good faith in adopting its mark

Page 56: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

56

Trademarks Trademark Infringement (Unfair Practices)

• False or misleading copyright notices– E.g. putting a copyright notice on an unoriginal work in

public domain

• Improper credit or attribution– E.g. deleting the correct name and substituting another,

overattribution

• Misrepresentations about the currency of a work– E.g. an older work is published using a current picture of

the artist

• Unauthorized modifications or editing – E.g. ABC and Monty Python case

Page 57: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

57

TrademarksTrademark Infringement (Other Cases)

• Titles and characters

• False Endorsements

• Confusion Arising from Web Page Links

• Reverse Passing Off

• Trade Dress Infringement

Page 58: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

58

TrademarksLimitations of Trademark Owners’ Rights

• Unrelated Goods or Services– e.g. Domino for sugar, Domino for pizza

• Use Other Than as a Trademark– e.g. IBM compatible products, software

• Remote Geographic Territories– e.g. There are over 100 service stations in different states of USA,

named Ray’s.

• Different Channels of Trade• Parody

– e.g. Bagzilla was not an infringement of Godzilla.– Garbage pail kids for stickers is an infringement of cabbage patch kids.

Page 59: 1 Lectures on Internet Law (CSM04) Mrs. Tuğba Taşkaya Temizel Prof. Khurshid Ahmad Department of Computing School of Electronics & Physical Sciences November

59

Trademarks Dilution

• Another concept under the broad umbrella of unfair competition is known as dilution. Trademark infringement law is based on the likelihood of confusion between goods or services; it does not protect against non-confusing sites.

• Many states (in the USA) therefore have anti-dilution laws prohibiting the use of a trademark when it would “dilute the distinctive quality” of another’s mark, even if no confusion was likely. As of January 16 1996, a new federal trademark dilution statute also came into effect.