Copyright First Sale Doctrine – It Lives

Great news from the Supreme Court today.  I’m still digesting the opinion, so here’s a link to ars technica, who has already digested it:

http://arstechnica.com/tech-policy/2013/03/thai-student-protected-by-first-sale-supreme-court-rules

And more from SCOTUSblog if you’re feeling especially nerdy:

Ronald Mann, Opinion analysis: Justices reject publisher’s claims in gray-market copyright case, SCOTUSblog (Mar. 19, 2013, 12:22 PM), http://www.scotusblog.com/2013/03/opinion-analysis-justices-reject-publishers-claims-in-gray-market-copyright-case/

 

Prenda Law, Meet Judge Otis D. Wright

Mark my words, the court hearing that took place yesterday regarding the behavior of Prenda Law in litigating mass-Doe copyright infringement cases will become a dramatic movie scene one day.  I bet there are already screenwriters out there putting the finishing touches on the script.

Read Ken White’s excellent play-by-play of the hearing, as presented on TechDirt.

One blog post is not enough to provide the back-story on Prenda Law and the mass-Doe litigation nightmare, so you might want to check out these links first:

http://www.techdirt.com/blog/?tag=prenda+law

http://arstechnica.com/series/whos-behind-prenda-law/

And my previous presentation on mass-Doe infringement gives a basic overview of the litigation tactic.

Lock Up Your Files and Throw Away the Fourth Amendment?

Florida IP Trends is taking another IP-detour to bring you a new case from the 9th Circuit regarding the contours of Fourth Amendment protection with regard to border searches.  This topic dovetails nicely with the other privacy-related topics I addressed in my Mobile Devices and Privacy presentation last year, and this new case will definitely be included in my update to that presentation.

Beginning when are very young, we are conditioned that seeking privacy means that we’re doing something wrong. Whether it’s locking the door to our bedrooms as children, having dark tinted windows on our cars, or telling a police officer that they have no right to search your personal belongings at-will, seeking privacy often carries an unfortunate stigma that you’re doing something wrong.  Another example is putting a password on a computer file.  Fortunately, a new case out of the 9th Circuit explains why having a locked file or an encrypted hard drive does not automatically trigger “reasonable suspicion” such that your entire laptop can be forensically examined.

The Fourth Amendment guarantees the “right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures.”  Even so, border searches, such as when law enforcement searches a car for narcotics when re-entering the United States from Mexico, are considered an exception to the general requirement that a warrant be obtained prior to commencing a search or seizure.  However, as the case below recognizes and reaffirms, even a border search must be “reasonable.”  Just because a search is being conducted at the border, that is not cause for an “anything goes” approach.  (In reality, despite the search being triggered at the border, the actual search could take place hundreds of miles away from the border in a forensics lab and still be considered a “border search.”)

The case is United States v. Cotterman, Case No. 09-10139 (9th Cir. March 8, 2013) (en banc).  The quick facts are that Mr. and Mrs. Cotterman were returning home from a vacation in Mexico, and, at an Arizona Port of Entry, a border agent performed a primary inspection of the vehicle, which included running Mr. Cotterman’s name through a database of known or suspected criminals.  The database query revealed that Mr. Cotterman had some prior involvement with child pornography.  The border agents contacted the people associated with Mr. Cotterman’s database record, and that led to additional information about why Mr. Cotterman’s name triggered the alert.  Specifically, the alert was part of a child sex tourism operation which tracked registered sex offenders who travel frequently outside the U.S.

During the initial search, the agents found various media equipment, including a laptop, and they began to examine the devices.  Under the case law interpreting the border search exception to the Fourth Amendment, a suspicionless, cursory scan of one’s personal items is allowed.  There are already cases holding that a “quick look” at a laptop is a Constitutional and unintrusive search.  See United States v. Arnold, 533 F.3d 1003, 1009 (9th Cir. 2008) (holding border search reasonable where border patrol agents had the traveler boot up a laptop so that the agents could perform a cursory review).  So, a basic scan of Mr. Cotterman’s laptop would have been reasonable, and thus legal.

However, after encountering password-protected files, the agents decided to seize the Cottermans’ laptops and digital camera.  Those devices were transported 170 miles away to the ICE office in Tucson, Arizona.  The more thorough forensic examination revealed many images of child pornography, including images showing Mr. Cotterman himself abusing the same child.  He was indicted by a grand jury, however, he moved to suppress the evidence found on his laptop based on the premise that the extended forensic search of his laptop required more suspicion of wrongdoing than the initial border patrol agents could have reasonably found during that initial search.  His motion to suppress was granted.  The government appealed that order, and the 9th Circuit reversed the lower court, finding that reasonable suspicion is not required for the type of extended search that was performed in Tucson.  But the case didn’t end there, because the 9th Circuit agreed to rehear the case “en banc,” meaning that the entire panel of judges would decide the case, not just a 3-judge panel as was the case the first time around.  It is the en banc opinion that we’re addressing with this blog post.

At this point, it is natural to lose any amount of sympathy you may have had for Mr. Cotterman.  If it turned out that he was engaged in despicable behavior – as the very first database alert suggested – then why should we be concerned with how that behavior was uncovered?  There are several two-word answers to that:  Due Process.  Reasonable Suspicion.  Presumed Innocent.  Fourth Amendment.

I’ll start with the good news – the 9th Circuit ultimately concluded that reasonable suspicion was present, so the extended forensic examination of the laptop was legal, and Mr. Cotterman hopefully will not be able to hurt any more children.  So, why is this case important then?  Justice served.  Isn’t it enough that Cotterman is a registered sex offender who had password protected files?  No.  And that is the very important line in the sand that the majority of the en banc panel draws.

In prosecuting the case, the government attorneys argued that the existence of password protected files was an important factor in determining whether or not to perform a heightened search of the laptop.  Fortunately, the 9th Circuit did not permit that factor to hold much independent weight.  Rather, it was only because of the other factors – Cotterman’s status as a sex offender, multiple documented trips to and from a known sex tourism country, multiple cameras and camera equipment, and, only because of the other factors, the existence of password protected files.  That’s the importance of this ruling – mere existence of password protected files is not enough for law enforcement or the government to seize and thoroughly search your “papers.”  The 9th Circuit majority understood that the “papers” written into the Fourth Amendment are today’s laptops, iPads, and other digital devices.  The Founding Fathers wanted the citizenry to be free from unreasonable searches and seizures of their papers, and that logic extends to our virtual papers.  Securing one’s papers does not equate to reasonable suspicion of criminal activity.

The majority opinion does a wonderful job of cautioning the government about the unique nature of digital searches. The Court stated that “legitimate concerns about child pornography do not justify unfettered crime-fighting searches or an unregulated assault on citizens’ private information.  Reasonable suspicion is a modest, workable standard that is already applied in the extended border search, Terry stop, and other contexts. Its application to the forensic examination here will not impede law enforcement’s ability to monitor and secure our borders or to conduct appropriate searches of electronic devices.”  Indeed, it worked in this very case.  Despite the government not thinking that it needed reasonable suspicion, ultimately, reasonable suspicion was found, with the Court still taking the time to explain what reasonable suspicion is not.

The Court explained that “reasonableness” is a dynamic concept that changes depending on the media.  For example, searching a suitcase is much different than searching a laptop, so what is “reasonably suspicious” when searching one, is not necessarily “reasonably suspicious” when searching the other.  Again, it is the Court’s determination to explain and safeguard digital privacy that is the hallmark of this case.  The Court did not have to go into such detailed analysis, but, thankfully, it did.

With the TSA allowing basic pocketknives and other items back on board airplanes, and cases like this which could easily result in further intrusion of the government into our private lives, maybe we will remain home of the free.

I’ll close this post by just providing and emphasizing some of the excellent language from the case (internal citations and quotations removed):

We rest our analysis on the reasonableness of this search, paying particular heed to the nature of the electronic devices and the attendant expectation of privacy.

Notwithstanding a traveler’s diminished expectation of privacy at the border, the search is still measured against the Fourth Amendment’s reasonableness requirement, which considers the nature and scope of the search.

The amount of private information carried by international travelers was traditionally circumscribed by the size of the traveler’s luggage or automobile. That is no longer the case. Electronic devices are capable of storing warehouses full of information. The average 400-gigabyte laptop hard drive can store over 200 million pages—the equivalent of five floors of a typical academic library…Even a car full of packed suitcases with sensitive documents cannot hold a candle to the sheer, and ever-increasing, capacity of digital storage.

The nature of the contents of electronic devices differs from that of luggage as well. Laptop computers, iPads and the like are simultaneously offices and personal diaries. They contain the most intimate details of our lives: financial records, confidential business documents, medical records and private emails. This type of material implicates the Fourth Amendment’s specific guarantee of the people’s right to be secure in their “papers.” U.S. Const. amend. IV. The express listing of papers reflects the Founders’ deep concern with safeguarding the privacy of thoughts and ideas—what we might call freedom of conscience—from invasion by the government.

Electronic devices often retain sensitive and confidential information far beyond the perceived point of erasure, notably in the form of browsing histories and records of deleted files. This quality makes it impractical, if not impossible, for individuals to make meaningful decisions regarding what digital content to expose to the scrutiny that accompanies international travel. A person’s digital life ought not be hijacked simply by crossing a border. When packing traditional luggage, one is accustomed to deciding what papers to take and what to leave behind. When carrying a laptop, tablet or other device, however, removing files unnecessary to an impending trip is an impractical solution given the volume and often intermingled nature of the files. It is also a time-consuming task that may not even effectively erase the files.

The present case illustrates this unique aspect of electronic data. Agents found incriminating files in the unallocated space of Cotterman’s laptop, the space where the computer stores files that the user ostensibly deleted and maintains other “deleted” files retrieved from web sites the user has visited. Notwithstanding the attempted erasure of material or the transient nature of a visit to a web site, computer forensic examination was able to restore the files.  It is as if a search of a person’s suitcase could reveal not only what the bag contained on the current trip, but everything it had ever carried.

With the ubiquity of cloud computing, the government’s reach into private data becomes even more problematic. In the “cloud,” a user’s data, including the same kind of highly sensitive data one would have in “papers” at home, is held on remote servers rather than on the device itself. The digital device is a conduit to retrieving information from the cloud, akin to the key to a safe deposit box. Notably, although the virtual “safe deposit box” does not itself cross the border, it may appear as a seamless part of the digital device when presented at the border. With access to the cloud through forensic examination, a traveler’s cache is just a click away from the government.

The point is technology matters. The Department of Homeland Security has acknowledged as much in the context of international travelers:
“Where someone may not feel that the inspection of a briefcase would raise significant privacy concerns because the volume of information to be searched is not great, that same person may feel that a search of their laptop increases the possibility of privacy risks due to the vast amount of information potentially available on electronic devices.” DHS, Privacy Impact Assessment for the Border Searches of Electronic Devices 2 (Aug. 25, 2009), available at http://www.dhs.gov/xlibrary/assets/privacy/privacy_pia_cbp_laptop.pdf

The relevant inquiry, as always, is one of reasonableness. But that reasonableness determination must account for differences in property.

Six Strikes Begins

As a follow-up to my previous post on this topic, the Six Strikes Copyright Alert System (a/k/a the “avoid the ‘hassle’ of the DMCA” program) has started.

ars technica has a good write-up on the latest news, and they even obtained some sample “strike notices” from Comcast:

http://arstechnica.com/tech-policy/2013/02/heres-what-an-actual-six-strikes-copyright-alert-looks-like/

Have Your Snail-Mail E-mailed

Interesting business model:  Company will go to your house, grab the mail out of your mailbox, scan it, and make it available to you digitally.

http://www.cnn.com/2013/02/26/tech/innovation/outbox-mail-service/index.html?hpt=hp_t3

Copyright issues?  If the company is scanning copyrighted material, which it no doubt is, would all of the scanning qualify as fair use?  I think most of it would, but what about scanning a magazine or postcard artwork that the copyright owner also sells in a digital format?  For example, SPIN magazine comes in paper form as well as a great digital iOS app.  Would converting the paper form into digital format via this new service still be fair use?

This should be fair use, but major media companies have a near perfect track record of freaking-the-eff out over any new content delivery systems that they did not expressly authorize.

Super Bull

Chipotle ad as found in MTV.com story.

It’s that time of year again.  News stations and retailers will start advertising and discussing (shhhh, don’t say it too loudly…) “the big game.”  Careful!!!!  I know what you’re thinking, but, don’t. say. “Super Bowl.”  That there is a genuine registered trademark of the National Football League, and may the stench of 1,000 jockstraps plague your nostrils should you dare to say “Super Bowl” in your advertisement for guacamole dip and pizza.

The NFL is a notorious trademark bully, and it has managed to fool the public into believing that there is no fair use of the trademark “Super Bowl.”  Ordinarily, it would be perfectly within a retailers rights to say something like:  “Need a great deal on pizzas for your Super Bowl party?  Well, place an advance order with us the day before the game, and we’ll deliver your pizzas before kickoff…”  While that may be a “commercial” use in that the trademark is being used in an advertisement, there is nothing in that ad to suggest that the pizza place is connected with the Super Bowl in any way.  Consumers will not be confused as to whether or not the pizza is officially sponsored by the NFL.  Yet, due to the NFL’s quest to sign up “official sponsors” for everything from pizza to TV sets, the League has bullied what would likely be fair uses of “Super Bowl” out of existence.

The NFL as a trademark bully is nothing new, and I wasn’t even going to blog about it this year.  However, I found out about another interesting trademark issue related to this year’s “big game.”  (H/T mom).

While it’s not enough for me to shed a tear for the NFL, last year an enterprising citizen named Roy Fox decided to seek registration for HARBOWL and HARBAUGH BOWL on the off chance that the two Harbaugh head coaches would face each other in this February’s Super Bowl, er, big game, uh Big Game….  And wouldn’t you know it, that happened.  The Ravens and 49’ers are both coached by Harbaughs.

There is one major problem with Mr. Fox’s foxy trademark speculation.  For trademarks that refer to a living individual, the applicant must include a statement that  the person or persons referred to in the mark have consented to their name(s) being registered.  (See my post regarding the TRAYVON MARTIN applications for more on personal names in trademarks.)  Amazingly, the Examining Attorney who was responsible for the HARBOWL and HARBAUGH BOWL applications did not inquire into whether or not the marks referred to living individuals, and the applicant, Mr. Fox, didn’t disclose that fact either.  The applications may have proceeded to registration if it wasn’t for the NFL stepping in and pressuring Mr. Fox to be a good sport and immediately cease and desist before being sued to within 4th-and-inches of bankruptcy.

So, shame on Mr. Fox for “trademark-squatting,” shame on the USPTO for not inquiring about the “living individual” consent issue, and shame on the NFL for continuing it’s bowlshit tactics.

ENJOY THIS YEAR’S SUPER BOWL®!!!

(Go Ravens!  Relishing the thought of Ray Lewis sprawled out at mid-field in tears while melodramatically and megalomaniacally proclaiming that God took a break from the rest of His general duties to help the Ravens become the Divine Winners of the Big Game.)

Freedom of Speech Online: Are We Entering an Internet Governance Cold War?

My co-associate at Walters Law Group, Kimberly Harchuck, recently presented an excellent CLE via the West LegalEdcenter.  She included a large amount of valuable information concerning recent domestic and foreign attempts to regulate not only speech on the Internet, but the very function of the Internet itself.

She has graciously made the slides available for Florida IP Trends readers.  Enjoy!

KAH Webcast Presentation – 01.23.13

The full CLE, including the audio file, will be available via the West LegalEdcenter next week.

Mobile Devices and Privacy – Presentation

I just realized that I didn’t post the slides from a presentation I gave back in July.  It dealt with regulations, laws, and technical issues concerning mobile devices and First Amendment rights.  I cited several recent cases concerning the right to film the police, as well as some cases concerning compelled password disclosure (i.e. forcing citizens to reveal encrypted contents).

Usual disclaimer applies: by themselves, the slides don’t give the full effect of the presentation, but you might find them interesting.

Mobile Device Privacy-Summer 2012-public

Medieval Times Goes Medieval on Competitor – Part I

The concept of “trade dress” is sometimes hard to grasp.  It is different, yet similar, to a design patent or copyright over expressive works.  Trade dress typically refers to the shape or configuration of a product or a product’s packaging.  However, to be protectable as trade dress, such configuration or shape must serve a source-identifying function, just like any other trademark.  That’s the distinguishing factor between a design patent and/or copyright – the source identifying role.  The classic trade dress example is the iconic shape of a Coca-Cola bottle.  When you see that curved bottle, you immediately think of the Coca-Cola company and its products.  It is an example of trade dress and product packaging.

Trade dress becomes more difficult when venturing outside of product packaging.  Some trademarks can be “inherently distinctive” due to their arbitrary nature when applied to relevant goods.  For example, “Apple” is inherently distinctive when applied to computer products because “apple” is not descriptive or suggestive of computer products.  When dealing with product packaging, trade dress can also be inherently distinctive.  However, when dealing with product design – such as the layout of a store – trade dress can not be inherently distinctive.  See Wal-Mart Stores, Inc. v. Samara Brothers, Inc., 529 U.S. 205 (2000).  To achieve protectable trade dress for product design, you must prove secondary meaning – which means that when the consuming public sees your specific product design, they immediately make a connection to you, the brand source.  Also, trade dress cannot be “functional,” which means that you cannot take a product configuration out of the marketplace and claim it as your own if the configuration is necessary for others to compete in the market.  An example of a failed trade dress claim is the Hooters girl outfit.  See commentary HERE regarding the famous Hooters v. Wing House trade dress case.

I explain those basic trade dress principles in order to present the next Featured Case on Florida IP Trends.

Case: Medieval Times U.S.A., Inc. v. Pirate’s Dinner Adventure, Inc., et al

Medieval Times – Amended Complaint

Medieval Times – Motion To Dismiss Original Complaint

I’ll be back in the next few days to comment on the actual case, but the basic premise is that Medieval Times has sued a local competitor who also offered a dinner show “inspired by the true medieval tradition of royal families inviting guests to a festival and feast to watch knights compete on horseback.”  That quote is from the First Amended Complaint, and I have a feeling that it will come back to haunt the Plaintiff in the future…

Until Part II, enjoy some pictures from my (coincidental) recent visit to Medieval Times earlier this month: