A Paradigm Shift of the Trademark Logo Towards ...

19 downloads 1152873 Views 2MB Size Report
media; Facebook, Twitter, YouTube, Flickr and Pinterest. Followed by an analysis of the ...... ariana (accessed August 9, 2013). 533 “Individuals can now ...... note 1332, para. 3.4. 1336 Je boycott Danone, Tribunal de Grande Instance de Paris.
1

A Paradigm Shift of the Trademark Logo Towards Algorithmic Justice PhD thesis August 31, 2013 Faculty of Law Chinese University of Hong Kong Danny Friedmann Supervisor, Professor Bryan Christopher Mercurio External Examinator, Professor Barton Beebe

2

Table of contents ABSTRACT IN ENGLISH .......................................................................................................................... 7 ABSTRACT IN CHINESE .......................................................................................................................... 8 ACKNOWLEDGMENTS ............................................................................................................................ 9 I THE BASICS ............................................................................................................................................10 II SIGNIFICANCE OF THE THESIS .............................................................................................................12 III SCOPE OF THE THESIS.........................................................................................................................13 i. Including non-commercial use ........................................................................................................13 ii. Excluding non-registered trademarks on social media .................................................................14 iii Relation between copyright law and trademark law ......................................................................14 iv Technical protection measures and opt-out mechanisms ..............................................................15 v Geographical scope ..........................................................................................................................16 vi Leges lata et ferenda .......................................................................................................................16 IV METHODOLOGY ..................................................................................................................................17 V LITERATURE REVIEW ...........................................................................................................................19 i Monologic and dialogic perspectives ................................................................................................20 ii Codify – decodify - recodify .............................................................................................................21 iii Stable instability ..............................................................................................................................22 iv Status signalling properties .............................................................................................................23 v Irrational projections .......................................................................................................................23 vi Self-referential.................................................................................................................................24 vii Information law and the unauthorised use of trademarks ...........................................................25 viii Trademark as property ..................................................................................................................26 ix Loss of control .................................................................................................................................27 x Expansion of trademark law ............................................................................................................28 xi Essential function ...........................................................................................................................29 xii Anonymous source theory .............................................................................................................30 xiii Trademark unattached to the product ..........................................................................................30 xiv Unauthorised use of the trademark logo ......................................................................................31 xv Trademark logo as a solution ........................................................................................................32 xvi Freedom of speech ........................................................................................................................32 xvii Chilling effects .............................................................................................................................34 VI OUTLINE OF THE THESIS.....................................................................................................................35 CHAPTER 2 STAGE OF THE LEGAL CONFLICT .............................................................................39 INTRODUCTION ..........................................................................................................................................39 CHAPTER 2.1 RELEVANT INTERNATIONAL TREATIES .................................................................................39 Chapter 2.1.1 Paris Convention ..........................................................................................................41 Chapter 2.1.2 Berne Convention..........................................................................................................42 Chapter 2.1.3 Nice Agreement .............................................................................................................42 Chapter 2.1.4 TRIPS ............................................................................................................................43 Chapter 2.1.5 WTO panel reports ........................................................................................................43 Chapter 2.1.6 ECHR ............................................................................................................................43 CHAPTER 2.2 DEFINITION OF THE TRADEMARK .........................................................................................44 Chapter 2.2.1 EU Definition of the trademark.....................................................................................44 Chapter 2.2.2 Definition of the trademark in the U.S. .........................................................................44 CHAPTER 2.3 TWO ROOTS OF THE TRADEMARK .........................................................................................45 CHAPTER 2.4 TWO DIFFERENT FORMS OF TRADEMARKS IN THE EU AND U.S. ...........................................45 CHAPTER 2.5 INHERENT AND ACQUIRED DISTINCTIVENESS .......................................................................46 CHAPTER 2.6 CONVENTIONAL AND UNCONVENTIONAL TRADEMARKS ......................................................46 CHAPTER 2.7 DOCTRINES TO AVOID MISREPRESENTATION AND MISAPPROPRIATION .................................47 Chapter 2.7.1. Misrepresentation ........................................................................................................48

3 Chapter 2.7.1.1 Likelihood of confusion ......................................................................................................... 48

Chapter 2.7.2 Misappropriation doctrine ............................................................................................51 Chapter 2.7.2.1 Trademark dilution ................................................................................................................ 51 Chapter 2.7.2.1.1 Dilution by blurring ....................................................................................................... 53 Chapter 2.7.2.1.2 Dilution by tarnishment ................................................................................................. 53

CHAPTER 2.8 DICHOTOMOUS FUNCTIONS OF THE TRADEMARK .................................................................54 Chapter 2.8.1 Consumer-interest related functions of trademark infringement ..................................54 Chapter 2.8.2 Consumer interest-related function of trademark dilution ............................................58 Chapter 2.8.3 Proprietary functions ....................................................................................................59 Chapter 2.8.4 Signalling identity .........................................................................................................64 Chapter 2.8.5 Accountability ...............................................................................................................64 CHAPTER 2.9 BRIEF HISTORY OF TRADEMARK INFRINGEMENT AND TRADEMARK DILUTION IN THE U.S. AND EU .....................................................................................................................................................65 Chapter 2.9.1 Brief history of trademark infringement and trademark dilution in the U.S. ................65 Chapter 2.9.1.1 Tort of misappropriation ........................................................................................................ 65 Chapter 2.9.1.2 Passing off to establish fraud ................................................................................................. 66 Chapter 2.9.1.3 Passing off in case of actual or likelihood of confusion by the consumer.............................. 66 Chapter 2.9.1.4 Unfair competition ................................................................................................................. 67 Chapter 2.9.1.5 Legislation against trademark infringement ........................................................................... 68 Chapter 2.9.1.6 Trademark infringement tests ................................................................................................ 69 Chapter 2.9.1.7 Legislation against trademark dilution ................................................................................... 70

Chapter 2.9.2 Brief history relevant to EU legislation ........................................................................73 Chapter 2.9.2.1 Legislation against trademark infringement........................................................................... 74 Chapter 2.9.2.2 Virgin Enterprises Ltd. v Bodtrade likelihood of confusion principles.................................. 75 Chapter 2.9.2.3 Legislation against trademark dilution ................................................................................... 77

CHAPTER 3 PROTAGONISTS OF THE LEGAL CONFLICT ...........................................................80 INTRODUCTION ..........................................................................................................................................80 CHAPTER 3.1 TRADEMARK HOLDERS ........................................................................................................80 Chapter 3.1.1 Trademark holder’s interests ........................................................................................81 CHAPTER 3.2 SOCIAL MEDIA PROVIDER .....................................................................................................83 Chapter 3.2.1 Classification social media ...........................................................................................83 Chapter 3.2.2. Functions of social media ............................................................................................85 Chapter 3.2.2.1 Social networking .................................................................................................................. 86

Chapter 3.2.3 Brief history of social media services ...........................................................................87 Chapter 3.2.4 Commonalities among social media providers .............................................................88 Chapter 3.2.5 Ownership of and liability in relation to user-generated content .................................89 Chapter 3.2.6 Prohibition to infringe intellectual property rights of third-parties..............................91 Chapter 3.2.7 Social media providers’ policy to protect their own intellectual property....................93 Chapter 3.2.8 Social media’s intellectual property infringement procedures .....................................97 Chapter 3.2.9 Protection social media rights versus third-parties’ rights ........................................100 CHAPTER 3.3 INTERNET USER ..................................................................................................................101 Chapter 3.3.1 Definition internet user ...............................................................................................101 Chapter 3.3.2 Community ..................................................................................................................102 Chapter 3.3.3 Real-name policy ........................................................................................................103 Chapter 3.3.4 Empowering the internet user/community...................................................................105 Chapter 3.3.5 Disintermediation and democratisation ......................................................................106 Chapter 3.3.6 Trademark holders’ use of social media .....................................................................108 CHAPTER 3.4 TRADEMARK LOGO ............................................................................................................113 Chapter 3.4.1 History of the logo ......................................................................................................113 Chapter 3.4.2 Evolving function of the logo ......................................................................................114 Chapter 3.4.5 Rationale of the logo ...................................................................................................118 Chapter 3.4.6 Unique characteristics of the logo ..............................................................................119 Chapter 3.4.7 Types of logos .............................................................................................................119 CHAPTER 4 ANALYSIS OF THE LEGAL CONFLICT .....................................................................121 INTRODUCTION ........................................................................................................................................121

4 CHAPTER 4.1 CASE-BY-CASE SOLUTION NOT SUSTAINABLE ....................................................................121 Chapter 4.1.1 Perception of internet users, social media providers and search engines ..................122 Chapter 4.1.2 Ample access to the unauthorised trademark logo .....................................................122 Chapter 4.1.3 Proliferation, scale and speed of contentious content ................................................124 Chapter 4.1.4 Permanence of uploaded logos ...................................................................................127 Chapter 4.1.5 Uncertain boundaries .................................................................................................129 Chapter 4.1.6 Trademark holders and OSPs are overwhelmed, internet users are ignorant of infringement .......................................................................................................................................130 Chapter 4.1.7 Loss of control.............................................................................................................132 Chapter 4.1.8 Emergence of new technologies such as cloud computing..........................................133 CHAPTER 4.2 CONCLUSION......................................................................................................................134 PART II INADEQUACY OF THE LAW ...............................................................................................136 CHAPTER 5 TRADEMARK INFRINGEMENT AND ITS DEFENCES ...........................................137 INTRODUCTION ........................................................................................................................................137 CHAPTER 5.1 COMMERCIAL USE ..............................................................................................................138 Chapter 5.1.1 Commercial use in the U.S. .........................................................................................138 Chapter 5.1.2 Commercial use in the EU ..........................................................................................141 Chapter 5.1.3 Unauthorised trademarks on social media always commercially used ......................143 CHAPTER 5.2 DESCRIPTIVE USE DEFENCES ..............................................................................................145 Chapter 5.2.1 Descriptive use defence in the U.S. .............................................................................146 Chapter 5.2.2 Descriptive use defence in the EU ..............................................................................153 CHAPTER 5.3 DIFFERENCE BETWEEN LEGITIMATE AND ILLEGITIMATE USE OF THE UNAUTHORISED TRADEMARK ............................................................................................................................................157 CHAPTER 5.4 CONCLUSION: TRADEMARK USE ON SOCIAL MEDIA IS COMMERCIAL AND TRADEMARK LOGO IS IMMUNE FOR DESCRIPTIVE USE DEFENCES ...........................................................................................159 CHAPTER 6 TRADEMARK DILUTION AND ITS DEFENCES .......................................................162 INTRODUCTION ........................................................................................................................................162 CHAPTER 6.1 RATIONALE OF THE TRADEMARK DILUTION DOCTRINE ......................................................163 Chapter 6.1.1 Trademark dilution by blurring doctrine ....................................................................165 Chapter 6.1.2 Trademark dilution by tarnishment doctrine ..............................................................166 Chapter 6.1.3 Article 6bis Paris Convention .....................................................................................166 Chapter 6.1.4 Article 10bis Paris Convention ...................................................................................167 CHAPTER 6.2 LEGISLATION AND CASE LAW.............................................................................................168 Chapter 6.2.1 Trademark dilution avant la lettre ..............................................................................168 Chapter 6.2.2 Legislation and case law in the U.S. ...........................................................................169 Chapter 6.2.3 Legislation and case law in the EU.............................................................................178 CHAPTER 6.3 PRECONDITIONS FOR PROTECTION AGAINST TRADEMARK DILUTION ..................................190 Chapter 6.3.1 Degrees of distinctiveness ...........................................................................................191 Chapter 6.3.2 Degree of fame, reputation or well-knownness ...........................................................195 Chapter 6.3.2.1 Famous trademark in the U.S............................................................................................... 196 Chapter 6.3.2.2 Trademarks with a reputation in the EU .............................................................................. 197 Chapter 6.3.2.3 Famous trademarks, trademarks with a reputation and well-known trademarks .................. 201

Chapter 6.3.3 Problems with identical trademarks for dissimilar goods or services ........................203 Chapter 6.3.3.1 Globalisation and the internet .............................................................................................. 204 Chapter 6.3.3.2 Unclear boundaries of product and service classifications................................................... 205 Chapter 6.3.3.3 Too much or too little property in a trademark .................................................................... 206

Chapter 6.3.4 Use identical trademark logo for non-competing goods or services undesirable .......209 CHAPTER 6.4 DEFENCES ..........................................................................................................................210 Chapter 6.4.1 Bases of defence, and defence against defence ...........................................................212 Chapter 6.4.1.1 Which expressions deserve to fall under the freedom of expression to limit the protection against trademark dilution ............................................................................................................................. 214

Chapter 6.4.2 Fair use defences and limitations/exclusions to the exclusive rights ..........................218 Chapter 6.4.2.2 Defence of limitations/exceptions of unfair advantage or detriment to the distinctive character or repute of the mark ..................................................................................................................................... 220

5 Chapter 6.4.3 Parody.........................................................................................................................228 Chapter 6.4.3.1 Parody and dilution by blurring/detriment to distinctiveness ............................................... 241 Chapter 6.4.3.2 Parody and dilution by tarnishment/detriment to repute ...................................................... 241 Chapter 6.4.3.3 Free-riding/unfair advantage of distinctive character or repute ........................................... 251

Chapter 6.4.4 Criticising and commenting ........................................................................................251 Chapter 6.4.5 Current trademark law’s insufficient protection of trademark logo on social media .252 CHAPTER 7 INTERMEDIARY LIABILITY........................................................................................255 INTRODUCTION ........................................................................................................................................255 Chapter 7.1.1 DMCA and CDA .........................................................................................................258 Chapter 7.1.2 Lanham Act .................................................................................................................263 Chapter 7.1.3 E-Commerce Directive ................................................................................................265 CHAPTER 7.2 KNOWLEDGE ......................................................................................................................267 Chapter 7.2.1 Contributory liability ..................................................................................................270 Chapter 7.2.2 Vicarious liability........................................................................................................274 CHAPTER 7.3 WEAKENING INCENTIVES OF SOCIAL MEDIA TO FILTER ......................................................276 Chapter 7.3.1 Market forces ..............................................................................................................276 Chapter 7.3.3 Bargaining power of trademark holders .....................................................................281 Chapter 7.3.4 Self regulation .............................................................................................................282 Chapter 7.3.5 Legislation ..................................................................................................................283 CHAPTER 7.4 SEMINAL CASES .................................................................................................................283 Chapter 7.4.1 Tiffany, Inc. v eBay, Inc. .............................................................................................284 Chapter 7.4.2 Hermès v eBay ............................................................................................................285 Chapter 7.4.5 Lancôme v eBay ..........................................................................................................287 Chapter 7.4.6 L’Oréal and Others .....................................................................................................288 Chapter 7.4.7 Google France and Google.........................................................................................288 CHAPTER 7.5 TO WHAT EXTENT HAVE SOCIAL MEDIA AN OBLIGATION TO MONITOR ...............................289 CHAPTER 7.6 LACK OF LEGAL CERTAINTY...............................................................................................297 PART III PARADIGM CHANGE ...........................................................................................................300 CHAPTER 8 MORAL RIGHT OF INTEGRITY ..................................................................................301 INTRODUCTION ........................................................................................................................................301 CHAPTER 8.1 THE ORIGIN OF MORAL RIGHTS...........................................................................................302 CHAPTER 8.2 INTERNATIONAL TREATIES .................................................................................................306 CHAPTER 8.3 COMMON LAW’S FUNCTIONAL EQUIVALENTS OF MORAL RIGHTS .......................................309 CHAPTER 8.4 TRADEMARK LOGO AND MORAL RIGHTS ............................................................................316 CHAPTER 8.5 TRADEMARK AS THE PERSONIFICATION OF THE TRADEMARK HOLDER ...............................319 CHAPTER 8.6 TRADEMARK DILUTION SEEN AS MORAL RIGHT..................................................................324 CHAPTER 8.7 RATIONALE FOR MORAL RIGHT OF INTEGRITY FOR THE TRADEMARK LOGO .......................326 CHAPTER 9 IMPLEMENTATION OF A PARADIGM SHIFT .........................................................330 INTRODUCTION ........................................................................................................................................330 CHAPTER 9.1 JURIDICAL SOLUTION .........................................................................................................331 Chapter 9.1.1 Right to disclose and withdraw ...................................................................................332 Chapter 9.1.2 Right of attribution ......................................................................................................332 Chapter 9.1.3 Right of integrity .........................................................................................................333 CHAPTER 9.2 CONTRACTUAL SOLUTION ..................................................................................................333 Chapter 9.2.1 Walled garden phenomenon........................................................................................334 Chapter 9.2.2 Diversity ......................................................................................................................336 Chapter 9.2.3 Market forces will shape law in the private sphere.....................................................338 Chapter 9.2.4 Technological developments .......................................................................................339 CHAPTER 9.3 MAKING AUTHORISED TRADEMARK USE TRANSPARENT ....................................................340 Chapter 9.3.1 License conditions .......................................................................................................341 CHAPTER 9.4 MAKING UNAUTHORISED TRADEMARK USE DISAPPEAR .....................................................344 CHAPTER 9.5 PRE-UPLOAD FILTERING TO SUBSTITUTE SAFE HARBOUR PROVISIONS ................................345 CHAPTER 9.6 OPTIMISING POLICY GOALS ................................................................................................348

6 Chapter 9.6.1 Trademark law ............................................................................................................348 Chapter 9.6.2 Copyright law..............................................................................................................348 CHAPTER 9.7 ALGORITHMIC JUSTICE ......................................................................................................349 PART IV CONCLUSIONS.......................................................................................................................351 CHAPTER 10 CONCLUSIONS ..............................................................................................................352 BIBLIOGRAPHY .....................................................................................................................................355

7

Abstract in English A Paradigm Shift of the Trademark Logo: Towards Algorithmic Justice Unauthorised use of the trademark logo on social media on a massive scale has led to frequent legal conflicts between trademark holders, social media providers and internet users and legal uncertainty. The thesis concludes that trademark infringement and dilution laws in the U.S. and EU are inadequate to solve this problem. The trademark logo on social media should be protected against unauthorised use, even though it is not used to sell the good or service the trademark indicates, but is used in a commercial environment. Two premises for any solution are that first the enforcement should be made automatic, since litigation on a case-by-case basis is not scalable, and second that the safe harbour provisions for online service providers, that aggravate the problem, should be substituted for strict liability. The trademark logo can be seen as the personification of the trademark holder, and one can argue that the stability of the trademark logo is not only in the interest of the trademark holder but also of society at large. One can argue that trademark dilution already provides a kind of moral right of integrity for the trademark logo. However, this right is limited to trademark logos that are considered famous or have a reputation, and, moreover, that are used in a commercial way. This thesis argues that also the trademark logo that did not reach the requested level of fame or reputation and is used in a non-commercial way should also be protected against unauthorised use on social media. Therefore the moral right of integrity is proposed for the trademark logo. Until the law will be amended to include a moral right of integrity for the trademark logo, this thesis suggests to implement proactive solutions in the walled gardens of social media as a testing ground for potential legislation. This automated solution is scalable, makes intellectual property protection and enforcement not only effective but also more calibratable to social policy goals and will inevitable lead to an algorithmic justice. Submitted by Danny Friedmann for the degree of PhD Laws at The Chinese University of Hong Kong in August 31, 2013

8

Abstract in Chinese 邁向算法公義的商標圖案範式轉移 社交媒體上大規模未經授權使用的商標標誌為商標持有人、社交媒體提供商 和互聯網用戶之間帶來法律衝突,更帶來法律上的不確定性。本文提出的結論是美 國與歐盟有關商標被侵犯和稀釋的法律並不足以解決這個問題。縱使在社交媒體上 的商標標誌未被用作銷售貨品或服務,但由於是在商業環境使用,所以法律應該保 障其免被未經授權使用。任何解決方法都必須基於兩個前設。首先由於按個別情況 興訟的可行性低,所以執法應該自動化。其二網絡服務供應商所依賴的避風港條款 只會使問題更加嚴重,因此應該採用嚴格法律責任。商標標誌可被視為商標持有人 的縮影,而商標標誌的穩定性除了對商標持有人有利之外,可謂對廣大社會也有裨 益。法律所保障商標免被稀釋本身可說是一種對商標標誌完整性的精神權利的認 可。但現時只有被認為著名,有聲譽,以及作商業用途的商標標誌才享有此權利。 本文強調一般未達到著名或有聲譽,以及未作商業用途的商標標誌在社交媒體上應 該受到同等免被未經授權使用的保障。就此,本文提出商標標誌應享有完整性的精 神權利。在修法保障商標標誌完整性的精神權利前,本文建議在社交媒體這個空間 裡採納積極的措施,以測試未來法律條文的可行性。此自動化的方案有可擴展性, 使保障和執行知識產權既有效率,又可對準社會政策的目標,更必然會帶來算法公 義。 Submitted by Danny Friedmann for the degree of PhD Laws at The Chinese University of Hong Kong in August 31, 2013

9

Acknowledgments This author expresses his gratitude to Professor Bryan Christopher Mercurio for his invaluable insights on intellectual property law and international trade law, focus and knack for thinking outside the box, generous guidance on research and academia, and for encouragement throughout the PhD. Professor Mercurio’s energetic passion and unsurpassed talent for teaching and scholarly work are contagious and inspired this author to pursue a career as a Law Professor. This thesis reflects an intellectual journey in an academic climate that inspired this author to emulate the Professors at the Faculty of Law at Chinese University of Hong Kong and aspire to academic excellence of an international level. Beside Professor Mercurio, this author would also like to extend his appreciation to the following Professors for their support and encouragement: Professor Michael Pendleton, for sharing his knowledge and experience on intellectual property in Hong Kong and China and his kind encouragement to further develop my scholarly ideas; Professor Christopher Gane, for his constructive criticism, care and leadership; Professor Lutz-Christian Wolff for setting an example of structure and academic work ethics; Professor Eva Pils for her social commitment and versatility; Professor Julien Chaisse, for being a mentor and source of inspiration due to his prolific scholarly production; and last but not least Professor Anne Sculley-Hill, for sparking my interest in and unlocking parts of the field of jurisprudence and Common Law and her gift of academic debate and writing. This author also highly values the conversations on the topic with Michiel TjoeAwie, Mathijs van Basten Batenburg, Matthew Stender and John King. And special thanks go to Candy Chan who translated the abstract into Chinese. Thank you all for making the obtainment of my PhD the greatest intellectual experience of my life so far and preparing me for the next phase in academia.

10

Chapter 1 Introduction Building blocks of the research; why, what, how, and what’s done before, plus five hypotheses I The Basics The unauthorised use of the trademark logo on social media can exponentially spread, because of the dynamics and topology of and interactivity between social networks. 1 This can damage a reputation beyond repair 2 in a relatively short period of time which had been diligently built up over a relatively long period of time. The damage to the reputation can devalue the trademark, alienate customers and erode shareholder value. In addition, capital can be destroyed in the ensuing legal conflicts between stakeholders. These legal battles potentially repress commerce of the trademark holder, distract social media providers from their primary activities and stifle creativity of internet users. The parlous state of the present situation is bound to lead to an unacceptable level of legal uncertainty for all stakeholders involved. In 1942, Justice Frankfurter stated: “If another poaches upon the commercial magnetism of the symbol he has created, the owner can obtain legal redress.” 3 At its core, this thesis questions whether such optimism remains valid in times of social media. More specifically, this thesis investigates whether the trademark logo that is uploaded on social media without permission of the trademark holder is sufficiently protected and enforced. Answering this question in the negative, the thesis proposes a paradigm shift.

Paradigm shift The possible scope, scale and impact of damage resulting from unauthorised use of a trademark logo on social media are incomparable with that of a trademark logo 1

Maziar Nekovee et al., Theory of rumour spreading in complex social networks, 374 PHYS. A 457 (2007). “Who steals my purse steals trash; ’tis something, nothing; / ’Twas mine, ’tis his, and has been slave to thousands; / But he that filches from me my good name / Robs me of that which not enriches him, / And makes me poor indeed.” WILLIAM SHAKESPEARE, THE TRAGEDY OF OTHELLO, THE MOOR OF VENICE (1603), Act 3, Sc. 3. 3 Frankfurter J. in Mishawaka Rubber & Wollen Mfg. v S.S. Kresge Co. (Mishawaka Rubber), 316 U.S. 203, 205 (1942). 2

11 offline. The social media phenomenon has radically changed the balance of interest between trademark holders and third party users of their trademark, without any adaptation to the laws of trademark infringement and trademark dilution. After determining that the current system is not sufficient to control the new situation, this thesis proposes a paradigm change to lay the foundation for the protection and enforcement of the trademark logo on social media. In so doing, the thesis will demonstrate that on the one hand the trademark logo is worth protecting on social media and on the other hand, that the enforcement without judicial review is both needed and compatible with the fundaments of a democratic society. Throughout the thesis, two assumptions are made: First, that the trademark holder should be protected against unauthorised use of his trademark logo on social media; second, that technology should be used to restore an equitable equilibrium. The unauthorised use of the trademark logo is a serious problem. In order to resolve it the authorised use of the trademark logo on social media should be made transparent, 4 otherwise any transgression remains undeterminable for even the most wellintentioned internet users. The sheer volume of the number of cases of unauthorised use of the trademark logo makes a case-by-case solution unfeasible. Therefore, this thesis advances automatic enforcement as a prerequisite for a solution. The limitations to internet intermediary liability regimes, relevant to social media providers, do not provide any real safety against legal conflicts for any of the stakeholders; instead, they aggravate the problem. This thesis therefore asserts that an abolition of these so called safe harbour provisions is another prerequisite for a solution. 5 The paradigm shift does not require any derogation of the acquis in the U.S. and EU to guarantee the right to freedom of speech, parody and critical comments. One should realise, however that rights to freedom of speech, parody and critical comments are in no jurisdiction absolute. This paradigm shift leaves enough room for an equitable 4

Not unlike Creative Commons’ license system, which enables copyright holders to make transparent what kind of use of their works is authorised. Creative Commons, available at: http://creativecommons.org (accessed August 7, 2013). 5 In the U.S. the safe harbour provisions can be found in the Digital Millennium Copyright Act (DMCA), 1998, which can be found in the United States Code, Title 17 Chapter 5, Article 512. In the EU, in Directive 2000/31/EC of the European Parliament and of the Council of June 8, 2000 on certain legal aspects of information society services, in particular electronic commerce, in the Internal Market (Directive on electronic commerce). Chapter 7 is dedicated to this subject.

12 balancing of interests of the stakeholders. Based on the paradigm change and the special properties of the trademark logo, the solution proposed is the protection and automatic enforcement of the moral rights of integrity of the trademark logo, the abolishment of the safe harbour provisions, while allowing freedom of speech, parody and critical comments taking into account a few fair formalities. This solution can be either enacted into law, or, pending any such codification, tested as a contractual solution in the “walled gardens” of social media. 6 More simply stated, this thesis will test the following five hypotheses: 1. “An automated enforcement solution for the unauthorised trademark logo on social media is the only feasible solution;” 2. “The current trademark law is insufficiently protecting the unauthorised use of the trademark logo;” 3. “The safe harbour provisions about the law of intermediary liability of trademark infringement are not effective;” 4. “The unauthorised use (including non-commercial use) of the trademark logo on social media should be protected by the moral right of integrity;” 5. “A contractual solution (walled gardens of social media) can pave the way for an automated solution for the trademark logo on social media.”

II Significance of the thesis Brands, which represent a combination of the trademark and the reputation built up in the trademark, can be extremely valuable to trademark holders, consumers and society at large. Some trademarks are sold, licensed or assigned for millions of U.S. dollars or euros. In 2011, the three most valuable brands were Apple; valued at 153,285 million U.S. dollar, Google; valued at 111,498 million U.S. dollars, and IBM; valued at 100,849 million U.S. dollars. 7 As pointed out above, the unauthorised use of the trademark logo on social media can be very harmful to the trademark holder.

6

The term “walled gardens” will be explained in Chapter 9 “Paradigm Shift”. “BrandZ Top 100 Most Valuable Global Brands 2011”, Millward Brown (2011), available at: http://www.millwardbrown.com/libraries/optimor_brandz_files/2011_brandz_top100_chart.sflb.ashx (accessed August 7, 2013). 7

13 As detailed below existing literature does not cover the conflict of trademark holders, social media providers and internet users over the unauthorised use of the trademark logo on social media and how to protect and enforce the trademark logo on social media. This thesis aims to fill that gap. This thesis builds upon the work of multiple intellectual property scholars and others. The thesis is novel in that it explores whether the trademark logo inherently contains certain characteristics which deserve to be protected beyond other forms of the trademark, and that it excludes a solution that includes predominantly litigation, since courts of law are non-scalable. The protection and enforcement of the trademark logo is not only seen as a problem, but also as a solution. The reason is that the trademark logo is not susceptible to any nominative use defence and can avoid confusion when a trademark is used in keyword triggered advertisements. After analysing the challenges facing the trademark logo on social media, this thesis proposes a paradigm shift. The solution to the problems associated with protection and enforcement need to correspond to the principles that it needs to bring clarity, legal certainty and business predictability to all stakeholders involved, and be more economical than the current legal conflicts between trademark holders and social media, and trademark holders and internet users. This thesis not only proposes a change of the law, but until that is realised, it advances contractual solutions via walled gardens of social media, which can be used as testing grounds to automatically enforce the proposed solution.

III Scope of the thesis

i. Including non-commercial use The current trademark law in the U.S. and EU can be characterised as being narrowly interpreted. The protection and consequently the enforcement of the trademark, including the trademark logo on social media, are limited to the use of the trademark in the course of trade. However, this thesis is dealing with the trademark logo used both in and outside the course of trade, as long as it was used without the permission of the trademark holder. In addition, this thesis will assess the merits of the “non-commercial use” doctrine, and that of nominative fair use defences against trademark infringement

14 based on confusion, and fair use defences against trademark dilution, in light of social media.

ii. Excluding non-registered trademarks on social media Logos can be divided into unregistered and registered trademark logos. This thesis will exclusively explore the latter for goods or services which are placed on social media. However, the jurisprudence of unauthorised placement of trademarks on other forms of media that are applicable to those involving trademark logos on social media will be referred to. Therefore some of the cases are about auction sites and keyword triggered advertisements. 8 In other words, this thesis elaborates on the trademark law in general only to see whether it can be applied in the case of the protection and automatic enforcement of the trademark logo on social media in particular.

iii Relation between copyright law and trademark law Copyright law has the potential to protect and enforce those logos with some measure of originality. However, protecting and enforcing copyrighted pictures that were reproduced, displayed and distributed as thumbnails can be more problematic. 9 Recent jurisprudence demonstrates this difficulty. For example, in Perfect 10 v Google 10 the District Court and on appeal 11 the 9th Circuit both favoured the server test 12 instead of the incorporation test, 13 holding that Google Images was not liable for direct copyright infringement since the frames and in-line links it displayed were not stored on and served by Google.

8

As pointed out above under “Significance”, it will be asserted that the trademark logo could play a role in solving the challenges that trademark holders, auctioneers and advertisers face. 9 Miquel Peguera, Copyright Issues Regarding Google Images and Google Cache, in GOOGLE AND THE LAW: IT AND THE LAW 169-202 (Aurelio Lopez-Tarruella, ed., 2012). 10 Perfect 10, Inc. v Google, Inc., 416 F.Supp. 2d 828 (D. Cal. 2006). 11 Perfect 10, Inc. v Amazon.com, Inc., 508 F.3d 1146 (9th Cir. 2007). 12 The server test is to see whether a party is sending ones and zeroes over the internet to the user’s browser. In case of the copyrighted pictures Google was not sending the pictures, but only displaying them via inline linking. Peguera supra note 9, at 177. 13 In the incorporation test it is sufficient when content is incorporated into a web page and then pulled by the browser. When this test would have been applied Google would be held liable for direct copyright right infringement. Peguera, supra note 9, at 177-178.

15 Likewise, in Kelly v Arriba Soft Corp. the District Court 14 and 9th Circuit 15 held that irrespective of whether the source was authorised or not, Arriba Soft Corp.’s reproduction, display and distribution of thumbnails of copyright pictures was transformative and therefore fair use. 16 Thus, it seems that with this recent jurisprudence copyright law is not suitable as a remedy in case of unauthorised use of a trademark logo on social media. That being said, this thesis frequently returns to copyright law as it has been a fertile breeding ground for many doctrines that later were codified into or analogously applied to trademark law. 17

iv Technical protection measures and opt-out mechanisms Although technical protection measures and digital rights management systems are a way to protect against the unauthorised copying of pictures that represent trademark logos, and the removal, disablement or circumvention of these technical protection measures is prohibited by law, 18 the topic will only implicitly be addressed when Google Images is discussed. To infer from the lack of technical protection measures that a trademark holder gives permission to copy-and-paste a trademark logo on social media, by implied license, will not be dealt with, since they are not compatible with an automatic enforcement which employs a system of explicit licenses. Just as technical protection measures and digital rights management systems, optout requirements by social media will not be taken into account, since they have not been

14

Kelly v Arriba Soft Corp., 77 F.Supp.2d 1116 (C.D. Cal. 1999). Kelly v Ariba Soft Corp., 280 F.3d 934 (9th Circuit 2002) withdrawn, re-filed at 336 F.3d 811 (9th Circuit 2003). 16 The Ninth Circuit held that Arriba’s use of the images, namely access to information, serves a different function than Kelly’s use, which can be considered artistic. Kelly v Arriba Soft Corp., supra note 15, at 819. 17 Berne Convention for the Protection of Literary and Artistic Works (infra note 138), with its three-step test of fair-use, fair-use in general, and the safe harbour provisions originate from copyright law. Implied license doctrine comes from patent law and then jumped to copyright law and trademark law, respectively. Moral rights doctrine also originated from copyright law. 18 Articles 11 and 12 WIPO Copyright Treaty, implemented in US via § 103 (17 U.S.C § 1201 Digital Millennium Copyright Act); and in the EU via Article 6 Directive 2001/29/EC of the European Parliament and of the Council of 22 May 2001 on the harmonisation of certain aspects of copyright and related rights in the information society. 15

16 used as a defence by social media, thus far, and from an ethical point of view could be better completely avoided. 19

v Geographical scope The largest part of the most valuable trademark logos in the world are in the hands of trademark holders who are located in the U.S. or EU. Moreover, the most important social media sites are based in the U.S., with affiliate sites in the languages used by and/or top level domain names of the respective EU member states. Thus, the laws and jurisprudence of the U.S. and EU features prominently throughout this thesis, with a focus on the federal law system in the U.S. and directives and regulations in the EU. Although in reality there are many more relevant stakeholders, including the federal and state legislators in the U.S. and the respective EU member states’ legislators, national and international industry groups for trademark holders, internet intermediary service providers, and consumers, this thesis exclusively deals with: trademark holders, social media providers and internet users.

vi Leges lata et ferenda This thesis aspires not just to provide an analysis of the law as it is, 20 but will also propose the law as it ought to be, 21 by proposing a paradigm shift and a comprehensive solution.

19

Opt-out requirements would better be avoided completely, since they differ from the “qui tacet consentire videtur”(he who is silent is taken to agree) whereby a respondent is explicitly asked. To assume that if someone does not opt-out that that person in some way has consented is arguably problematic. 20 The law as it is, in Latin: “lex lata”. 21 The law as it ought to be, in Latin: “lex ferenda”.

17 IV Methodology The idea for this thesis was conceived during the preparation for a presentation at the Asia-Pacific IP Forum in 2010 22 on social media and trademark law. This author noticed that there was not much information on social media in combination with trademark law, let alone the trademark logo. Fascinated by the challenges the stakeholders face, the author researched the topic for three years: from August 2010 to August 2013. The research is a mixture of doctrinal and non-doctrinal legal research, descriptive and analytical, historical and predictive legal research. The “stage of the conflict”, provided in Chapter 2, is giving an overview of the relevant treaties, legislation and doctrines of trademark infringement and trademark dilution, is part of the doctrinal legal research. This part of the research is descriptive. Then the part on the “protagonists of the conflict” in Chapter 3 introduces the stakeholders and their characteristics, which is nondoctrinal legal research and also predominantly descriptive. The “analysis of the legal conflict” of Chapter 4 is a mixture of doctrinal and non-doctrinal legal research, and of course can be qualified as analytical legal research. It first ascertains how the law is and demonstrates the gap between the pre-legislative intention and post-legislative impacts, and is also a combination of research in black-latter of law and socio-legal research. It also uses the a priori concept that given the fundamental characteristics of the problem automatic enforcement should be part of any solution. Chapters 5 and 6 about Trademark Infringement, Trademark Dilution and their defences critically examine whether they provide sufficient protection and enforcement of the trademark logo on social media. Beside analysing the statutory provisions and case law, the thesis arranges the legislation logically and systematically to deduce their rationale and reasoning and test their logical coherence. Chapter 7 about Intermediary Liability critically examines whether the safe harbour provisions provide adequate protection and enforcement for the rights holders and the impact the legislation is now having on online service providers and internet users. The thesis is extrapolating existing trends in filtering technology and uses a 22

7th Annual Asia-Pacific IP Forum, September 2010, available at: http://www.managingip.com/pdfs/AsiaIP_Forum/IP_Agenda2010.pdf?LS=EMS282908 (accessed August 7, 2013).

18 projective model of legal research to anticipate a changed perception of courts and legislators about affirmative monitoring, and includes a deontological approach by arguing that filtering should be part of the online service providers’ duty. It is also identifying and appraising the magnitude of the variable factors influencing the outcome of the current legal processes. Chapter 8 about Moral Right of Integrity and their defences, applies doctrinal, historical and analytical legal research. This chapter systematically investigates the intention of the laws, their historical development and their post-legislative impacts, to lay bare their strengths and weaknesses and the gap between the legal ideal and the social reality, and the factors thereof. Chapter 9 Implementation of a Paradigm Shift is a mixture between doctrinal and non-doctrinal legal research and prescriptive and normative legal research, after determining that the current legislation is not adequately protecting and enforcing the trademark logo on social media, therefore providing a paradigm shift and alternative solutions to realise the potential of the law and to use law as a tool for social engineering. The research for this thesis used a mixture of primary and secondary sources: studying legislation and engaging in qualitative empirical research by interviewing stakeholders 23 (primary sources) and works relevant to the protection and enforcement of the trademark logo on social media (secondary sources). This thesis is also based on comparative legal research between the legislation and case law of the U.S. and EU jurisdictions to audit the parallels and differences. It should also be noted that despite the focus of the thesis being on the legislation and case law of the U.S. and EU jurisdictions, the outcome of the thesis is relevant to other jurisdictions. Moreover, the use of both U.S. and EU law is a positive as its application is directly applicable to both the Common Law and Civil Law systems. One should also take into account that the U.S. DMCA notice-and-takedown procedures, although conceived exclusively for copyright law have de facto become the world standard not just for online service providers in regard to copyright law, but also in regard to trademark law and has been diffused to numerous jurisdictions via bilateral and regional free trade agreements in which the U.S. is party to the treaty. 23

This included a presentation to Valerie Sonnier, Head Global IP Louis Vuitton and Mayank Vaid, Head Hong Kong IP Louis Vuitton, at Louis Vuitton Head Quarters in Quarry Bay, Hong Kong, February 21, 2011.

19 Comparative legal research has also been applied in the sense that the thesis is often comparing copyright law with trademark law. For example comparing the fair use defences for copyright law based on the right to freedom of expression with those fair use defences for trademark law, the three-step test for the limitations and exceptions of copyright law with the two-step test for the limitations and exceptions of trademark law; and in regard to moral rights doctrine, which is originally a copyright law doctrine and whether this doctrine can be applied to trademark law. The thesis started out with the contours of the subject. But by attending the classes of Professor Bryan Mercurio and Professor Michael Pendleton and reading works of intellectual property scholars, the author’s view on the topic became sharper, until he could conclude that a paradigm shift is required. Based on this paradigm shift the thesis proposes a comprehensive solution.

V Literature review Since the problem of the unauthorised use of the trademark logo on social media is underdeveloped in the literature, the review below will give a broad overview of the epistemology on the theories of the trademark in general. This review, which highlights scholarly work on 17 themes (i-xvii), can serve as theoretical building blocks and context in regard to the specific challenges the stakeholders face over the conflict of the unauthorised use of the trademark logo on social media. Also, the interrelationships between the themes will be demonstrated. It has been argued that the perspective on the trademark has been changed radically: from a monologic to a dialogic perspective (i). This means that users not only decodify the messages the trademark holders codified, but also recodify the messages (ii). This can make the trademark, including the trademark logo on social media, as a conveyer of meaning instable, although one can assert that, to an extent, the users of trademarks want them to be stable (iii). The status signalling properties (iv) of the trademark demonstrate this duality: the stability is needed to express sometimes irrational projections (v), but by using the trademark in certain ways, the meaning of the trademark changes, and thus creates instability. One can argue that some trademarks no longer refer to a good or service but only to themselves (vi). These trademark that are their own

20 product, when used on social media can be seen as information, and studied via information law (vii), or as property and studied as such (viii). The dialogic perspective on trademarks have led to a considerable loss of control by the trademark holders (ix), despite the expansion of trademark law (x): the essential function of the trademark, to indicate the source of origin (xi), was supplemented with other functions. But at the same time the links between the trademark on the one hand and the source of origin, goods or services and quality on the other hand has weakened: this has lead to the anonymous source theory (xii), and trademarks sold unattached from the products (xiii). The use of a trademark, when unauthorised (xiv), for example as a false endorsement, can be a substantial problem. But the authorised use of a trademark logo can also lead to solutions (xv). A dilemma for many courts is to decide whether the unauthorised use of a trademark logo, in case of parody, falls within the scope of the right to freedom of speech (xvi). Allowing it can lead to fraudulent information, not allowing it can have chilling effects (xvii).

i Monologic and dialogic perspectives Trademarks can be seen as monologic or dialogic. The philosopher Bakthin 24 came up with this distinction, related to literature. Monologic literature only gives its opinion, while dialogic literature carries on a continual dialogue with other works of literature and other authors. If one perceives the trademark as monologic, then its meaning, defined by the trademark holder will remain unchanged if the trademark holder so wishes. However, if one perceives the trademark as dialogic, then consumers are able to change the meaning given by the trademark holder. 25 The implications of a dialogic perspective are serious, since internet users can easily find, copy and paste unauthorised trademark logos that can be uploaded and shared on and among social media sites. 24

MIKHAIL MIKHAILOVICH BAKHTIN, THE DIALOGIC IMAGINATION: FOUR ESSAYS (Austin: University of Texas Press 1981). 25 An infamous example is the trademark Lonsdale, which was hijacked by racists who re-interpreted the Lonsdale name by focusing on the third, fourth, fifth and sixth letters “NSDA”, short for NSDAP, the former Nazi-party. White supremacists wear Lonsdale clothes under their bomber jackets that are strategically opened to reveal these letters. Therefore the brand became a symbol for the extreme right in the Netherlands, Belgium, France and Germany. The trademark holders of Lonsdale tried to change these associations with the brand by supporting anti-racist initiatives. JOERIE VAN DEN BERGH AND MATTIAS BEHRER, Chapter Seven Happiness: Gen Y’s adoration for branded emotions, in BRANDING TO GENERATION Y, HOW COOL BRANDS STAY HOT 181 (2009).

21 Coombe 26 asserted that creating meaning to an image is not a top-down process, but instead involves dialogue between the corporate author and the consumer. According to Coombe, 27 intellectual property laws stifle dialogic practices and prevent other people to express their identity.

ii Codify – decodify - recodify A trademark holder codifies his trademark with meaning, the consumer decodes that meaning, and third parties might be able to recodify meaning to the trademark. According to Professor Aoki, trademark holders should know that “recodifications of symbols are always capable of being deployed against the grain.” 28 A person that appropriates pre-existing materials and then re-creates improvised structures is called a bricoleur, a term coined by the anthropologist Claude Lévi-Strauss, as the visual semiotician Chandler explained. 29 On social media one can assert that internet users that recodify the trademark logo are such virtual bricoleurs. In his book Remix, Professor Lessig made a case for the freedom of internet users to remix existing copyright works, to improve, integrate or change these works into new works. 30 Although Remix is about copyright law, it is also relevant to the study of the trademark logo. Professor Wilf explained that authorship in trademark could be redefined to include a public act of interpretive association, because it lacks the idea of individual authorial production. 31 Coombe characterised trademarks as free-floating symbols, which she considered to be in the public consciousness, and which are vulnerable for people who assume the right to reinterpret and change them. 32

26

Rosemary J. Coombe, Objects of Property and Subjects of Politics: Intellectual Property Laws and Democratic Dialogue, 69 TEX. L. REV. 1853 (1991). 27 Id, at 1854. 28 Keith Aoki, How the World Dreams Itself to be American: Reflections on the Relationship Between the Expanding Scope of Trademark Protection and Free Speech Norms,17 LOY. L.A. ENT. L. REV. 523, 542 (1997). 29 DANIEL CHANDLER, SEMIOTICS, THE BASICS (London: Routledge 2002). 30 LAWRENCE LESSIG, REMIX: MAKING ART AND COMMERCE THRIVE IN THE HYBRID ECONOMY, (Bloomsbury Academic Press 2008). 31 Steven Wilf, Who Authors Trademarks?, 17 CARDOZO ARTS & ENT. L.J. 4, 10 (1999). 32 Coombe, supra note 26, at 49.

22 According to Professor Fisher all persons in an attractive society would be able to participate in the process of meaning-making. 33 Professor Litman asserted that trademark symbols earn value when the public invests in the meaning of these brands. 34 Professor Dreyfuss also held that the public can contribute to a brand’s value. 35 According to Lessig there is a connection between the possibilities of internet users to participate in a remix procedure and the flourishing of culture. Once the trademark logo is unauthorisedly used in an environment such as social media, recodification can take place. This recodification is obviously aggravated where the internet users upload an altered version of the trademark logo.

iii Stable instability According to Professor Katyal, trademarks are paradoxically immutable, but instable entities open to constant reinterpretation and re-signification. 36 Instable trademarks caused, according to sociologist and philosopher Baudrillard, a hyper-reality, which can be characterized as the fragmentation of the public sphere, and a lack of commonly shared meaning of signs. 37 Professor Hughes articulated that the interests of non-owners in stable trademarks might outweigh groups that want to be able to change the meaning of trademarks. 38 Hughes clarified that even for the latter group the knowledge of the original meaning of the mark is essential as a reference to the re-codification, otherwise no one will notice a difference of meaning. Professor Assaf explained that the interest to protect cultural heritage coincides with a need to fix the meaning of that heritage. 39 Holders of trademark logos that are unauthorisedly used on social media might be most harmed by the instability of meaning. 33

William Fisher, Property and Contract on the Internet, 73 CHI.-KENT. L. REV. 1203, 1217 (1998). Jessica Litman, Breakfast with Batman: The Public Interest in the Advertising Age, 108 YALE L.J. 1717, 1730 (1999). 35 Rochelle Cooper Dreyfuss, Expressive Genericity: Trademarks as Language in the Pepsi Generation, 65 NOTRE DAME L. REV. 397, 402 (1990). 36 Sonia K. Katyal, Stealth Marketing and Antibranding: The Love that Dare Not Speak Its Name, 58 BUFF. L. REV. 795 (2010). 37 JEAN BAUDRILLARD, SYMBOLIC EXCHANGE AND DEATH, (London: Sage Publications 1993); JEAN BAUDRILLARD, SIMULACRA AND SIMULATION, (Ann Arbor: University of Michigan Press 1994). 38 Justin Hughes, “Recoding” Intellectual Property and Overlooked Audience Interests, 77 TEX. L. REV. 923, 941 (1999). 39 Katya Assaf, The Dilution of Culture and the Law of Trademarks, 49 IDEA 1 (2008). 34

23 iv Status signalling properties Already in 1899 the economist and sociologist Veblen explained the evolution of social classes through the consumption of goods. 40 Professor Pollack gave a description through history of the trademarks used as signifiers of social status. 41 A modern example of using a trademark to signify social status can be observed on social media where for this purpose often trademark logos of luxury goods are unauthorisedly uploaded and shared. That consumers use the trademark to help them assume an identity is outlined by Drescher. 42 Hughes wrote that the trademark is used on the one hand to express a need for individuality, but on the other hand to identify with a collective. 43 From an economic or moral point of view it is challenging to use trademark law to protect status-signalling qualities of the mark, according to Professor Harrison. 44

v Irrational projections Frankfurter wrote that “the creation of a market through an established symbol implies that people float on a psychological current engendered by the various advertising devices which give a trademark its potency.” 45 Professor Ralph Brown stated that the goodwill and advertising function might not be beneficial to society at large. 46 Heath and Scott argued that products with a trademark logo might be purchased, even though this might be irrational, for reasons of self-realisation through the internalisation of the portrayed values. 47 The consumer, however, purchases the advertised mental image

40

THORSTEIN VEBLEN, THE THEORY OF THE LEISURE CLASS: AN ECONOMIC STUDY OF INSTITUTIONS (A.M. Kelley 1975) (1899). 41 Malla Pollack, Your Image Is My Image: When Advertising Dedicates Trademarks to the Public Domain - with an Example from the Trademark Counterfeiting Act of 1984, 14 CARDOZO L. REV. 1391 (1993). 42 Thomas D. Drescher, The Transformation and Evolution of Trademarks - from Signals to Symbols to Myth, 82 TMR 301, 309 (1992). 43 Hughes, supra note 38, at 956-57. See also S. Dilbary, Famous Trademarks and the Rational Basis for Protecting “Irrational Beliefs” 14 GEO. MASON L. REV. 605, 634-636 (2007). 44 Jeffrey L. Harrison, Trademark Law and Status Signaling: Tattoos for the Privileged, 59 FLA. L. REV. 195, 196 (2007). 45 Mishawaka Rubber, supra note 3. 46 Ralph S. Brown, Jr., Advertising and the Public Interest: Legal Protection of Trade Symbols, 57 YALE L. J. 1165, 1181 (1948). 47 A.P. Heath and D. Scott, The self-concept and image congruence hypothesis, 32 EUR. J. MARKETING 1110 (1997).

24 together with the physical commodity of a product, as Professor Economides explained. 48 Brown found out that although it might be irrational to buy illusions, reality is that consumers are irrational. 49 Lemley stated hesitantly, in a free market, everybody should perhaps be able to make their own choices, whether these choices are irrational or not. 50 Author and activist Klein in her international bestseller No Logo criticised the philosophy of brands in the global economy that value their image bestowed on their trademarks more than of the products they are manufacturing. 51 Implication of such a philosophy is that these brands outsource their production to Third World countries where the production happens under suboptimal circumstances, to put it euphemistically, cutting loose the link between trademark and source of origin. However, trademark logos can also help make the trademark holder accountable.

vi Self-referential Rogers argued in 1909 that the trademark is not that important since “it is just the shadow of the goodwill.” 52 This perception has definitely changed. After the gap between mark and source, and between mark and product, became so wide, the mark only referred to itself, as Professor of history, film and media studies Poster observed. 53 Later, Coombe also described the mark as quintessential self-referential. 54 Professor Welkowitz stated that the trademark is the product. 55 Judge Kozinski wrote about the use of the logo used as a separate commodity, totally distinct from its original and traditional function. 56 Lemley contended trademarks as assets with their own intrinsic value. 57 Anthropologist and geographer Harvey asserted that “given the ability to produce images as commodities

48

Nicholas S. Economides, The Economics of Trademarks, 78 TMR 523, 533 (1988). Ralph S. Brown, Jr., supra note 46, at 1181. 50 Mark Lemley, The Modern Lanham Act and the Death of Common Sense, 108 YALE L. J. 1687, 1692 (1999). 51 NAOMI KLEIN, NO LOGO: TAKING AIM AT THE BRAND BULLIES, (Knopf Canada, 2000). 52 Edward S. Rogers, Comments on the Modern Law of Unfair Trade, 3 ILL. L. REV. 551, 555 (1909). 53 MARK POSTER, THE MODE OF INFORMATION, POST-STRUCTURALISM AND SOCIAL CONTEXTS 13 (University of Chicago Press 1990). 54 ROSEMARY COOMBE, THE CULTURAL LIFE OF INTELLECTUAL PROPERTIES: AUTHORSHIP, APPROPRIATION, AND THE LAW 55 (Durham, NC: Duke University Press, 1998). 55 DAVID S. WELKOWITZ, TRADEMARK DILUTION: FEDERAL, STATE, AND INTERNATIONAL LAW 117 (2002). 56 Alex Kozinski, Trademarks Unplugged, 68 N.Y. U. L. REV. 960, 961 (1993). 57 Lemley, supra note 50, at 1693. 49

25 more or less at will, it becomes feasible for accumulation to proceed at least in part on the basis of pure image production and marketing.” 58 The author and lawyer Johnson made clear that a trademark holder does want to give his trademark enough meaning, but not too much so that it will be threatened by genericide 59 when its meaning includes a product category. 60 Professor Dreyfuss, who observed that trademarks have become independent commodities, proposed the protection of the expressive dimension of trademarks. 61 Trademarks have become valuable commodities, according to Litman. 62 She also described that the value of the trademark is more dependent with the perception of consumers than the product itself. 63 Even before social media, Judge Kozinski noticed a growing tendency of consumers that use trademarks not just to identify products, “but also to enhance or adorn them, even to create new commodities altogether.” 64 Half a century before, Frankfurter in the Mishawaka Rubber case formulated it like this: trademarks used to “impregnate the atmosphere of the market with the drawing power of a congenial symbol.” 65 Frankfurter also wrote: “If it is true that we live by symbols, it is no less true that we purchase goods by them.” 66

vii Information law and the unauthorised use of trademarks The internet can be described as a platform for free social, cultural, and political discourse and production, 67 with information being communicated that is crucial to a

58

DAVID HARVEY, THE CONDITION OF POSTMODERNITY 89 (1989). An example is Walkman; in the Netherlands SONY made a mistake in advertisements referring to mobile tape-players of its competitors as “walkmen of other brands”, committing genericide to their own trademark name Walkman. Lecture of Professor Bernt P. Hugenholtz, attended at IViR, University of Amsterdam, 2006. 60 Peter Johnson, BOOK REVIEW: Can You Quote Donald Duck?: Intellectual Property in Cyberculture Rosemary J. Coombe, The Cultural Life of Intellectual Properties: Authorship, Appropriation, and the Law, 13 YALE J.L. & HUMAN. 451, 459 (2001). 61 Dreyfuss, supra note 35, 62 Litman, supra note 34, at 1728. 63 Id. 64 Kozinski, supra note 56, at 961. 65 Mishawaka Rubber, supra note 3. 66 Id. 67 LAWRENCE LESSIG, FREE CULTURE, (Penguin Press 2004). 59

26 democratic society. The division between producers and consumers is no longer useful since each can generate content, according to Professor Tushnet. 68 Johnson wrote that the rapid development of the internet has meant an explosion in unauthorised use of commoditised trademark signs in new and innovative ways by internet users, which led to a flood of trademark-related litigation and legislation. 69 Beside trademark law, cyberlaw and information law are possible theoretical frameworks to study these challenges. Lipton asserted that cyberlaw does not suggest a focal point other than internet-related technologies 70 and deals with a plethora of different topics, including fair use or other exceptions to propertisation, formation and interpretation of contracts made electronically and freedom of speech in relation to internet communications. Lipton argued that information law with its focal point on information has a better chance to develop into a coherent framework of law, which comprises a set of principles that can exist alongside other laws such as tort, contract and intellectual property laws. The normative framework of information law suggested by Lipton, is balancing the control rights of property and privacy with the access right in information. This might be partly relevant for the trademark, which has arguably informational components, for example the source of origin.

viii Trademark as property Property implies ownership, which implies possession, which implies exclusory control, even though the control is never absolute. 71 Intellectual property rights such as trademarks are intangible, but they have owners. To look at intellectual property as property is useful since property is a highly efficient way to support commercial transactions of an asset. 72 Professor Llewelyn highlighted the potential of the commercialisation of intellectual property rights. 73 Litman wrote that the reason for the

68

Rebecca Tushnet, Copy This Essay: How Fair Use Harms Free Speech and How Copying Serves It, 114 YALE L. J. 535, 566 (2005). 69 Johnson, supra note 60. 70 Jacqueline Lipton, A Framework for Information Law and Policy, 82 OR. L. REV. 695, 714 (2003). 71 Even though information cannot be physically possessed, it can be controlled, although not in an absolute sense. Id., at 730. 72 Jessica Litman, Information Privacy/Information Property, 52 STAN. L. REV. 1283, 1295, (2000). 73 DAVID LLEWELYN, INVISIBLE GOLD IN ASIA: CREATING WEALTH THROUGH INTELLECTUAL PROPERTY (2010).

27 existence of property is its alienability, to sell or license it. 74 Professor Calabresis and Melamed introduced a classification of property, liability and alienability rules that can partly be applied to the trademark logo: the trademark holder can assign or license them according to these views. 75 However, there has also been criticism to see trademarks as property. Lipton expressed her concern about the potential of overpropertisation of information rights. 76 Professor Lemley opposed the propertisation of trademark law, in particular merchandising rights, and recommended courts to use other rationales for its protection. 77 Professor Denicola made an analysis of the merchandising of famous symbols. 78 Professors Dogan and Lemley suggested to weigh costs and benefits of the property rationale. 79 One implication of seeing trademark as a property right, as Professors Desai and Rierson suggested, is that the investment in the brand is seen as an indicator of potential harm. 80 Jou wrestled with the question when the moral rights of the newcomer outweigh those of the existing trademark holder. 81

ix Loss of control Many authors are defeatist in the challenge to control their trademarks on social media. Examples are Sammons, who suggested that trademark holders should accept that

74

Litman, supra note 72, at 1295. Guido Calabresi and A. Douglas Melamed, Property Rules, Liability Rules, and Inalienability: One View of the Cathedral, 85 HARV. L. REV. 1089, (1972). 76 Jacqueline Lipton, Information Wants to be Property: Legal Commodification of E-Commerce Assets, 16 INT'L REV. L. COMP. & TECH. 53, (2002). 77 Lemley, supra note 50, at 1714. 78 Robert C. Denicola, Institutional Publicity Rights: An Analysis of the Merchandising of Famous Symbols, 62 N.C. L. REV. 603, 606 (1984). 79 Mark Lemley and Stacey Dogan, Merchandising Right: Fragile Theory or Fait Accompli, 54 EMORY L.J. 461, 478 (2005). 80 Deven R. Desai & Sandra L. Rierson, Confronting the Genericism Conundrum, 28 CARDOZO L. REV. 1789, 1797-99 (2007). 81 Chi-Ru Jou, The Perils of a Mental Association Standard of Liability: The Case Against the Subliminal Confusion Cause of Action, 11 VA. J.L. & TECH. 2, 66 (2006). 75

28 they lost control and focus on what they can control, 82 and Standfield, who advised for the same reason to focus on ones own websites. 83 Hughes argued that “society’s increasing dependency on trademarks creates a pressure to remove them from private control.” 84 According to Schaffer-Goldman, “words and images do not worm their way into our discourse by accident; they're generally thrust there by well-orchestrated campaigns intended to burn them into our collective consciousness. Having embarked on that endeavour, the originator of the symbol necessarily - and justly - must give up some measure of control.” 85 In other words: trademark holders expose the public to countless advertisements and therefore the public is entitled to take some control over the trademarks and their meaning. Professor Coombe observed law as a central locus for the control and dissemination of those signifying forms with which identities and differences are made and remade. 86

x Expansion of trademark law The expansion of trademark law, with trademark dilution, based on investment and advertising functions, has been both criticised and advocated at the same time. Professor Coombe asserted that an expansion of intellectual property could strip us of our humanity, 87 nothing less, while Professor Beebe discussed the trademark holders’ need for a broadened scope of trademark protection. 88 Professor Lemley reluctantly made the point that the goal of continued expansion of trademark rights is to obtain property rights in trademarks. 89

82

Stephanie Sammons, “With Blogging and Social Media, Focus on What You Can Control”, September 18, 2010, Build Online Influence, available at: http://www.stephaniesammons.com/with-blogging-andsocial-media-focus-on-what-you-can-control/ (accessed August 7, 2013). 83 Alyson Standfield, “Social Media Is Only a Tool”, Artbizblog, February 23, 2011, available at: http://www.artbizblog.com/2011/02/social-media-is-a-tool.html (accesses on August 7, 2013). 84 Justin Hughes, The Philosophy of Intellectual Property, 77 GEO. L.J. 287, 322 (1988). 85 Regina Schaffer-Goldman, Cease-and-Desist: Tarnishment's Blunt Sword in Its Battle Against the Unseemly, the Unwholesome, and the Unsavory, 20 FORDHAM INTELL. PROP. MEDIA & ENT. L.J. 1241, (2010). 86 Rosemary J. Coombe, Tenth Anniversary Symposium: New Direction: Critical Cultural Legal Studies, 10 YALE J.L. & HUMAN. 463, (1998). 87 Coombe, supra note 26. 88 Barton Beebe, Search and Persuasion in Trademark Law, 103 MICH. L. REV. 2020, 2029 (2005). 89 Lemley, supra note 50, 1687-1714.

29 xi Essential function Matos counted the blessings of the use of brands as source identification in order to prevent opaqueness of the source which leads to deception and confusion of consumers. 90 The only function of trademarks, from symbols to myths, was as a signifier of the source of origin, according to Ralph Brown. 91 Beebe analysed trademark law semiotically: one can distinguish between the signifier (trademark), signified (goodwill) and represent (source and/or product). 92 The essential function of the trademark is considered to indicate the source of origin, so that consumer confusion or misrepresentation is avoided. Diamond, commissioner of patents and trademarks, made clear that the function of trademarks as an indicator of source could already be found in Ancient Rome. 93 The essential function of the trademark can be divided into source identification, product distinction and quality functions, argued Professor Simon Fhima, 94 which all protect against confusion. According to Professor Dreyfuss, some level of confusion might be unavoidable in times of keyword triggered advertisements. 95 Justice Frankfurter, 96 the economist Stigler, 97 and the economist Landes and judge Posner proposed that trademarks are crucial to shorthand the economic search costs for consumers, to repeat enjoyable purchases and avoid those one did not enjoy. 98 In contrast, Larson gave examples of sites that use the trademark logo in a confusing and deceptive way. 99 For Schechter, who introduced the dilution doctrine to the U.S., the

90

Cassi G. Matos, The Unbranding of Brands: Advocating for Source Disclosure in Corporate America, 20 FORDHAM INTELL. PROP. MEDIA & ENT. L.J. 1307, (2010). 91 Brown, Jr., supra note 46, at 1167. 92 Barton Beebe, The Semiotic Analysis of Trademark Law, 51 UCLA L. REV. 621, 658 (2004). 93 Sidney A. Diamond, The Historical Development of Trademarks, 65 TMR 265 (1975). 94 Ilanah Simon Fhima, How Does 'Essential Function' Doctrine Drive European Trade Mark Law? 36 INT’L REV. INTELL. PROP. & COMPETITION L. 401 (2005). 95 Rochelle Cooper Dreyfuss, Reconciling trademark rights and expressive values: how to stop worrying and learn to love abiguity, in TRADEMARK LAW AND THEORY: A HANDBOOK OF CONTEMPORARY RESEARCH, (Graeme B. Dinwoodie & Mark D. Janis, eds., 2007), 261-293, at 286. 96 Frankfurter J: “A trademark is a merchandising shortcut which induces a purchaser to select what he wants, or what he has been led to believe he wants.” Mishawaka Rubber, supra note 3. 97 George J. Stigler The Economics of information, 69 J. POLIT. ECON. 213 (1961). 98 WILLIAM M. LANDES & RICHARD A. POSNER, THE ECONOMIC STRUCTURE OF INTELLECTUAL PROPERTY LAW 166-209 (2003). 99 Joseph A. Larson, Taming The Wild West: An Examination Of Private Student Loan Consolidation Companies' Violations Of § 43(A) Of The Lanhan Act By Using Trade Names And Logos That Closely Resemble Those Used By The United States Department Of Education, 41 CREIGHTON L. REV. 515 (2008).

30 preservation of the uniqueness of a trademark should constitute the only rational basis for its protection. 100

xii Anonymous source theory According to the economist Aldred, it is assumed that trademark holders invest in the reputation of their trademark by keeping the quality of the products or services constant. 101 Professors Altman and Pollack asserted that a trademark is sometimes a more convincing selling point than the quality of the product to which it refers and that often the competition is between trademarks rather than between the quality of the products. 102 Levin stated that some product features consumers associate with the product, rather than with the brand. 103 Therefore the goodwill can be misappropriated when an unauthorised manufacturer uses a feature to benefit from the status or social image that the brand owner has developed, without confusing consumers as to the source of the goods. After trademarks could be assigned and licensors failed to exercise adequate control over the licensee’s level of quality in case of a so called naked license, the connection between trademark and its source of origin was lost, explained Beebe. 104 Subsequently, it was thought that the trademark could indicate the product which had a certain quality, independent from the source. This led to the anonymous source theory, where the source is deemed constant but not known, according to scholar Sakulin. 105

xiii Trademark unattached to the product In 1975 106 and 1989 107 there were the “patch” cases with which U.S. courts wrestled. It was about companies that unauthorisedly reproduced the trademark as a patch

100

Frank I. Schechter, 40 HARV. L. REV. 813 (1927). Jonathan Aldred, The economic rationale of trademarks: an economist’s critique, in TRADE MARKS AND BRANDS: AN INTERDISCIPLINARY CRITIQUE (L. Bently, J. Davis and J.C. Ginsburg, eds., 2008), at 270. 102 LOUIS ALTMAN AND MALLA POLLACK, CALLMANN ON UNFAIR COMPETITION, TRADEMARKS AND MONOPOLIES, Eagan: Thomson Reuters/West 2008. § 17:4. 103 Gabrielle Levin, Misappropriation of Goodwill, 5 WAKE FOREST INTELL. PROP. L.J. 89 (2005). 104 Beebe, supra note 88, at 2029. 105 Wolfgang Sakulin, Trademark Protection and Freedom of Expression, An Inquiry into the Conflict between Trademark Rights and Freedom of Expression under European, German, and Dutch Law, Dissertation IViR, April 27, 2010, at 37. 106 Boston Prof'l Hockey Ass'n v Dallas Cap & Emblem Mfg., 510 F.2d 1004 (5th Cir. 1975). 101

31 unattached to any product. Therefore it was hard to determine trademark infringement, since the mark did not refer to the source. The actual product that defendant sold, the court wrote, is not the “trademark symbol”, but “fabric and thread emblems”. 108 The use of trademark rights to enforce a monopoly in the production of merchandise of, for example, a sports team in the absence of confusion, has been met with criticism, including that of the philosophers Scott, Oliver and Ley-Pineda. 109 Shull posed the question whether universities should allow their students to use their trademark logos. 110 It is an interesting question that could be applied to the use of trademark logos on social media by internet users: should trademark holders authorise internet users to use their trademark logos under certain conditions?

xiv Unauthorised use of the trademark logo Manas used the example of gripe sites such as NoHarvard to see whether they are confusing or not to the public. 111 Consumer opinion websites do not tend to lead the viewer to believe the trademark owner is the sponsor of the site, according to Rochat. 112 By asking visitors to click on another entity’s trademark logo to gain access to their own site would raise trademark infringement concerns if those seeing the link were led to believe that the one who linked was affiliated with the owner of the trademark mark logo, explained Professor Effross. 113 Scott Brown explained how third-party programmes can use trademark logos without authorisation, implying false endorsements or by naming the application in a way that supports a generic understanding of the

107

Boston Athletic Ass'n v Sullivan, 867 F.2d 22 (1st Cir. 1989). Id. 109 Dominic Scott et al., Trade marks as property: a philosophical perspective, in TRADE MARKS AND BRANDS: AN INTERDISCIPLINARY CRITIQUE (L. Bently, J. Davis and J.C. Ginsburg, eds., 2008) 285–305, at 297. 110 Michael C. Shull, Biting The Hand That Feeds: How Trademark Protection Might Threaten School Spirit, 21 MARQ. SPORTS L. REV. 641 (2011). 111 Alayne E. Manas, Harvard as a Model in Trademark and Domain Name Protection, 29 RUTGERS COMPUTER & TECH. L.J. 475 (2003). 112 Leslie C. Rochat, “I See What You're Saying”: Trademarked Terms and Symbols as Protected Consumer Commentary in Consumer Opinion Websites, 24 SEATTLE U. L. REV. 599 (2000). 113 Walter A. Effross, Withdrawal of the Reference: Rights, Rules, and Remedies for Unwelcomed WebLinking, Summer, 49 S.C. L. REV. 651 (1998). 108

32 trademark. 114 Brown also showed how third-party applications that integrate two or more original programmes can lead to confusion. 115

xv Trademark logo as a solution Aoki stated that “symbols have the ability to convey meaning across the globe because they are not restricted by language barriers, and they often have a uniformity of meaning that is understood across cultures.” 116 Because of these special characteristics, the use of a trademark logo can also be used as a solution to potential trademark infringement challenges. Professor Strowel and Ide 117 dealt with the Shetland Times case, whereby it was settled that Shetland News could use the Shetland Times’ headlines, as long as the Shetland Times logo was put next to the links, to show the source. However, in the Total News case the opposite was settled: the links of Total News could be used, but without the Total News’ logo. 118 Professor O’Rourke realised that the trademark logo is special and stated that using an address as a hyperlink intrudes less on the linked site’s trademark rights than would use of a fanciful logo. 119 The trademarked logo is also being used as a deterrent to copyists in fashion, asserted Molho, who wrote a biography about Giorgio Armani, an Italian fashion designer. 120 Likewise, Blakley asserted that trademarks are the only effective way of protection for the fashion industry. 121

xvi Freedom of speech Professor Baker argued that commercial expression does not induce people to think critically, therefore does not qualify for the protection under the freedom of 114

Scott Brown, “I Tweeted on Facebook Today:” Re-Evaluating Trademark Genericide of InternetBased Trademarks, Winter 2012, 7 I/S: J.L. & POL'Y FOR INFO. SOC'Y 457. 115 Id. 116 Aoki, supra note 28, at 541. 117 Alain Strowel and Nicolas Ide, Liability with Regard to Hyperlinks, 24 COLUM.-VLA J.L. & ARTS 403 (2001). 118 Total News, No. 97 Civ. 1190 (PKL) (S.D.N.Y. filed Feb. 28, 1997). 119 Maureen A. O’Rourke, Fencing Cyberspace: Drawing Borders in a Virtual World, 82 MINN. L. REV. 609, 619 (1998). 120 RENATA MOLHO, BEING ARMANI: A BIOGRAPHY 91-92 (Antony Shugaar trans., 2007). 121 Johanna Blakley: “Lessons from fashion’s free culture”, presentation TEDxUSC, filmed April 2010, available at: http://www.ted.com/talks/lang/en/johanna_blakley_lessons_from_fashion_s_free_culture.html (accessed August 7, 2013).

33 expression. 122 In contrast, according to Kozinski, the link between commercial and noncommercial use has not merely blurred but disappeared. 123 Schaffer-Goldman wrote: “If the anti-dilution statute were construed as permitting a trademark owner to enjoin the use of his mark in a non-commercial context found to be negative or offensive, then a corporation could shield itself from criticism by forbidding the use of its name in commentaries critical of its conduct.” 124 Gatewood also pointed to the challenges to freedom of expression when non-commercial use of trademarks is banned. 125 Professor Blanke gave an overview of the history of parody. 126 Parody coincides with being famous asserted Cantwell. According to him trademark holders, “like public figures, who seek the public spotlight must accept the concomitant risk of public ridicule in the form of parody.” 127 Cantwell asserted that if humans had to bear this fate, than certainly the trademark logo does not deserve greater protection than is afforded to a human. 128 Denicola stated that famous trademarks are the functional equivalent of famous names, and found it not surprising that the U.S. Constitution – which does not explicitly mention the protection of the trademark – demands restraint in the recognition of trademark right when the right to freedom of speech is at stake. 129 Professor Dreier applied some reservation to the freedom of speech, based on the relatively new U.S. constitutional law and human rights law in comparison to the much

122 C. Edwin Baker, Commercial Speech: A Problem in the Theory of Freedom, 62 IOWA L. REV. 1 (1976); C. Edwin Baker, Paternalism, Politics, And Citizen Freedom: The Commercial Speech Quandry in Nike, 54 CASE W. RES L. REV. 1161 (2004) 123 White v Samsung Elec., 989 F.2d 1512, 1520-21 (9th Cir.) (Kozinski, J., dissenting), cert. denied, 508 U.S. 951 (1993). 124 Regina Schaffer-Goldman, supra note 85. 125 Christopher E. Gatewood, Web Links, Trademarks and the First Amendment, 5 RICH. J.L. & TECH. 12 (1999). 126 Jordan M. Blanke, Victor's Little Secret: Supreme Court Decision Means More Protection for Trademark Parody, 13 FORDHAM INTELL. PROP. MEDIA & ENT. L.J. 1053 (2003). 127 Michael K. Cantwell, Confusion, Dilution, and Speech, First Amendment Limitations on the Trademark Estate, 87 TMR 547, 583 (1997). 128 Id. 129 Robert C. Denicola, Trademarks as Speech: Constitutional Implications of the Emerging Rationales for the Protection of the Trade Symbols, WIS. L. REV. 158, 198 (1982).

34 older private law. 130 Sakulin asserted that intellectual property lawyers might have the same concerns. 131 The protection of the right of speakers is very important, but as Professor Heymann demonstrated, it is also important to protect the right of listeners: they deserve to receive non-fraudulent information. 132 Heymann was afraid that the presence of a trademark logo can convey to consumers the false message of affiliation, even though the entity might have used the trademark logo unauthorisedly, so that the trademark holder of the used trademark logo had no involvement with the production of the good. 133

xvii Chilling effects It is argued that the mere brandishing of intellectual property laws can be sufficient to not only stop offensive uses but also innocent uses. This is called the “chilling effect”. 134 As Coombe observed: “Hegemonic power is operative when threats of legal action are made as well as when they are actually acted upon.” 135 Beside the chilling effects of trademark infringement, there are chilling effects of trademark dilution on corporate parody, which is dealt with by Schlosser. 136

130

Thomas Dreier, Balancing Proprietary and Public Domain Interests: Inside or Outside of Proprietary Rights?, in EXPANDING THE BOUNDARIES OF INTELLECTUAL PROPERTY, INNOVATION POLICY FOR THE KNOWLEDGE SOCIETY (R. Dreyfuss, D. Leenheer Zimmerman and H. First, eds., 2001) 295-316 at 310. 131 Sakulin, supra note 105, at 110. 132 Laura A. Heymann, The Public’s Domain In Trademark Law: A First Amendment Theory Of The Consumer, 43 GA. L. REV. 651 (2009). 133 Id. 134 Examples can be found on the site “Chilling Effects”, available at: http://www.chillingeffects.org/ (accessed August 7, 2013). 135 Chilling effect: the mere brandishing of intellectual property laws is usually sufficient to stop offensive uses. As Coombe observed: “Hegemonic power is operative when threats of legal action are made as well as when they are actually acted upon.” Coombe, supra note 86, at 9. 136 Sarah Mayhew Schlosser, The High Price of (Criticizing) Coffee: The Chilling Effect of the Federal Trademark Dilution Act on Corporate Parody, 43 ARIZ. L. REV. 931 (2001).

35 VI Outline of the thesis Part I (Chapters 2-4) introduces the conflict, under the ambit of trademark law (Stage of the Conflict), between trademark holders, social media providers and internet users (Protagonists of the Conflict) over the unauthorised use of the trademark logo on social media. After that the conflict is deconstructed into its constituent elements (Analysis of the Legal conflict). Thus, Part I is testing Hypothesis 1. “An automated enforcement solution for the unauthorised trademark logo on social media is the only feasible solution.” Part II (Chapters 5-7) elaborates on the problems of protection and enforcement of the trademark logo on social media, addressed in the hypotheses. It explores the misrepresentation of the trademark logo, and covers confusion or a likelihood of confusion that lead to trademark infringements, and the defences of trademark infringement: trademark use outside the course of trade and nominative fair use. It then deals with the misappropriation of the trademark logo, trademark dilution or a likelihood of dilution. This will be followed by the defences against dilution: fair use and exceptions, including parody, satire and comments. Finally, Part II covers the internet intermediary liability, notice-and-takedown obligations and the limitation on internet intermediary liability (also known as the safe harbour provisions). Thus, Part II is testing two hypotheses: Hypothesis 2. “The current trademark law is insufficiently protecting the unauthorised use of the trademark logo;” and Hypothesis 3. “The safe harbour provisions about the law of intermediary liability of trademark infringement are not effective.” Part III (Chapters 8-9) offers a paradigm shift: toward the moral right of integrity of the trademark logo. The question to be answered is why this has not been the case yet, and how this can be changed. A rationale will be proposed for a moral right of integrity of the trademarked logo, which is a feasible solution for the problems outlined in Part II. Finally a description will be given of the walled gardens of social media as testing grounds for the proposed solution. Part III is testing two hypotheses: Hypothesis 4. “The unauthorised use (including non-commercial use) of the trademark logo on social media should be protected by the moral right of integrity;” and Hypothesis 5. “A contractual solution (walled gardens of social media) can pave the way for an automated solution for the trademark logo on social media.”

36 Part IV (Chapter 10) summarises all tested hypotheses and provides the conclusion.

37

Part I: Stage, Protagonists and Legal Conflict Part I contains Chapters 2-4. This part provides a broad background of the trademark law that covers the conflict, the stakeholders involved and the elements of the legal conflict, so that Parts II-IV, which have a more narrow focus, can be better contextualised. Chapter 2 is setting the stage of the legal conflict, which falls within the ambit of trademark law. Therefore a primer on trademark law in general and in the U.S. and EU in particular, is given. It starts with the international treaties that are most relevant to these trademark law jurisdictions. Then the definition of the trademark, trademark infringement and trademark dilution is provided. Followed by the consumer interest-related and proprietary functions of the trademark. After that the Chapter supplies a brief history of trademark infringement and trademark dilution in the U.S. and EU. After Chapter 2 set the stage of the legal conflict, Chapter 3 introduces its protagonists: a trinity of stakeholders that are all connected with each other because of their idiosyncratic relation to the trademark logo. Chapter 3 presents the trademark holders and a definition of the trademark holder. Subsequently, it introduces the social media provider, beginning with a classification of social media which clarifies their respective functions, and a brief history of social media. It then investigates the commonalities of five of the most popular social media; Facebook, Twitter, YouTube, Flickr and Pinterest. Followed by an analysis of the differences between these social media and their respective Terms of Service. Four questions will be answered for each of these five social media: - Who owns the user-generated content on these social media; - How do social media prohibit intellectual property infringements by third parties; - What is their policy to protect their own intellectual property rights; - What kind of procedures have they put in place in case of trademark infringements. The end to the introduction of social media discusses the trademark holders’ use of social media.

38 Then the Chapter presents the internet user, followed by a definition of this stakeholder. After that it explores the implications of the empowerment of the internet user and community and in this context the concepts of disintermediation and democratisation. Finally it assesses the feasibility of a real-name policy to battle trademark infringement. Subsequently the Chapter covers the trademark logo as the last protagonist, where the three stakeholders find each other under increasingly problematic circumstances. It first provides the definition of the logo and highlights the different types of logos. The Chapter briefly presents the logo’s history, evolution and possible future, and describes its rationale and unique characteristics. After Chapter 2 has set the stage and Chapter 3 has introduced the protagonists, Chapter 4 will break down the conflict into seven constituent elements: - the perception by internet users and social media that the trademark logo is outlawed; - the uncertain boundaries of the protection and enforcement of the trademark logo; - the aggravating factors that there is ample access to unauthorised trademark logos; - the unprecedented proliferation, scale and speed of contentious content; - the low threshold to eternity so that the problem becomes permanent; - the trademark holders and social media providers that are overwhelmed and internet users that have no idea how to deal with this problem; - and a general sense of loss of control in the eyes of trademark holders and social media. Part I is testing Hypothesis 1: “An automated enforcement solution for the unauthorised trademark logo on social media is the only feasible solution.”

39

Chapter 2 Stage of the Legal Conflict Mapping the legal landscape before routing a way out of the legal conflict Introduction Understanding the context in which the legal conflict takes place, the trademark law in the U.S. and EU, is crucial to find a solution. As one appreciates the intricacies of these legal systems under which the trademark logo on social media should be protected and enforced, one can see that these laws are ill-equipped to address the problem. This is exacerbated by international treaties such as the Berne and Paris Conventions, partly incorporated by TRIPS and interpreted by the WTO panel reports, that give the U.S. and EU the bandwidth within which these jurisdictions can operate. Therefore, in order to provide the necessary context the Chapter provides a brief introduction to the relevant international treaties (Chapter 2.1) and a comprehensive review of the basis of U.S. and EU trademark law. Chapter 2.2 provides a definition of the trademark; Chapter 2.3 explicates the two roots of trademark law; Chapter 2.4 demonstrates that the U.S. has federal and state trademarks, and the EU has community and national trademarks; Chapter 2.5 makes a distinction between inherent and acquired distinctiveness; Chapter 2.6 gives an overview of conventional and unconventional trademarks; Chapter 2.7 reviews the doctrines to avoid misrepresentation and misappropriation; Chapter 2.8 sets out the dichotomous functions of the trademark based on these doctrines. Finally, Chapter 2.9 provides a brief history of trademark infringement and trademark dilution in both the U.S. and EU.

Chapter 2.1 Relevant international treaties The international treaties relevant to the trademark logo on social media will be introduced below. Why they are germane will be explained in-depth in the designated Chapters.

40 One can argue that intellectual property law has been harmonised to a greater extent than any other field of law. This is due to the Paris Convention for the Protection of Industrial Property137 (Paris Convention) of 1883, Berne Convention for the Protection of Literary and Artistic Works 138 (Berne Convention) of 1886, the Nice Agreement Concerning the International Classification of Goods and Services for the Purposes of the Registration of Marks 139 (Nice Agreement) treaty of 1957 and the Trade-related Aspects of Intellectual Property Rights (TRIPS) of 1994. They will be dealt with below, as well as the World Trade Organization (WTO) panel reports, 140 relevant for interpretations of some legal terms, and the Convention for the Protection of Human Rights and Fundamental Freedoms 141 (ECHR) and Protocol to the ECHR, 142 which must guarantee freedom of speech, but also the protection of property. Unfortunately there is much legal uncertainty over what constitutes protectable freedom of speech, parody or critical comment, and how to balance it with proprietary rights. Chapter 6 “Trademark Dilution And Its Defences”, deals extensively with this problem.

137

Paris Convention for the Protection of Industrial Property (Paris Convention), signed in Paris 1883, revised at Brussels in 1900 (Brussels Act), Washington in 1911 (Washington Act), The Hague in 1925 (The Hague Act), London in 1934 (London Act), Lisbon in 1958 (Lisbon Act), Stockholm in 1967 (Stockholm Act) and amended in 1979. The Paris Convention is administered by World Intellectual Property Organization (WIPO). 138 Berne Convention for the Protection of Literary and Artistic Works (Berne Convention) signed in Berne in 1886, completed at Paris in 1896, revised at Berlin in 1908, completed at Berne in 1914, revised at Rome in 1928, revised at Brussels in 1948, revised at Stockholm in 1967, and revised at Paris in 1971, and amended in 1979. The Berne Convention is administered by WIPO. 139 The Nice Agreement Concerning the International Classification of Goods and Services for the Purposes of the Registration of Marks, (Nice Agreement) of June 15, 1957, as revised at Stockholm on July 14, 1967, and at Geneva on May 13, 1977, and amended on September 28, 1979. Nice Agreement is administered by WIPO. 140 World Trade Organization (WTO) document WT/DS114/R, March 17 2000, panel report Canada – patent protection of pharmaceutical products case (WTO panel report patent); WTO document WT/DS160/R, June 15, 2000, panel report United States – Section 110(5) of the United States Copyright Act (WTO panel report copyright); WTO document WT/DS174/R, March 15, 2005, panel report European Communities – Protection of Trademarks and Geographical Indications for Agricultural Products and Foodstuffs (WTO panel report trademark) . 141 European Convention for the Protection of Human Rights and Fundamental Rights (ECHR), Rome, November 6, 1950. 142 Protocol to the Convention for the Protection of Human Rights and Fundamental Rights (Protocol to ECHR), Paris, March 20, 1952, p 31.

41 Chapter 2.1.1 Paris Convention For this thesis the Paris Convention 143 is highly relevant. The U.S. 144 and all members of the EU 145 are members of the first important intellectual property treaty in history: the Paris Convention which was signed in 1883 by 11 countries. The EU 146 and U.S. jurisdictions are bound by the Paris Convention, and their legislations must comply with it. The Paris Convention, which covers marks and trade names as well as patents, utility models and industrial designs, contains two fundamental principles: national treatment 147 and priority right. 148 These two principles have internationally harmonised the procedural law of trademarks to some degree. For this thesis Articles 6-10ter Paris Convention are especially relevant: they include well-known marks, 149 prohibitions concerning state emblems etc., 150 assignment of marks, 151 nature of the goods to which the mark is applied, 152 collective marks, 153

143

Paris Convention, supra note 137. United States acceded to the Paris Convention on March 18, 1887 and the treaty went in force as of May 30, 1887. 145 The Paris Convention went into effect in all 27 members of the European Union: Belgium 1884, France 1884, Italy 1884, Netherlands 1884, Portugal 1884, Spain 1884, United Kingdom 1884, Sweden 1885, Denmark 1894, Germany 1903, Hungary 1909, Austria 1909, Poland 1919, Romania 1920, Bulgaria 1921, Finland 1921, Luxembourg 1922, Greece 1924, Ireland 1925 Cyprus 1966, Malta 1967, Slovenia 1991, Czech Republic 1993, Lavia 1993, Slovakia 1993, Estonia 1994, and Lithuania 1994. Supra note 137. 146 Last paragraph of the Preamble of the First Council Directive 89/104/EEC of 21 December 1988 to approximate the laws of the Member States relating to trade marks (Trademark Directive): “Whereas all Member States of the Community are bound by the Paris Convention for the Protection of Industrial Property; whereas it is necessary that the provisions of this Directive are entirely consistent with those of the Paris Convention; whereas the obligations of the Member States resulting from this Convention are not affected by this Directive; [..].” 147 National Treatment means that each member of the treaty must treat nationals of other member in respect of industrial property in the same way as their own nationals. See Article 2 Paris Convention, supra note 137. 148 The priority right in regard to trademark rights provides an applicant from one treaty member with the possibility to use the filing date in one of the treaty members as the effective filing date in another contracting State, provided that the applicant files another application within 6 months from the first filing. Article 4 Paris Convention, id. 149 Article 6bis id. 150 Article 6ter id. 151 Article 6quarter id. 152 Article 7 id. 153 Article 7bis id. 144

42 trade names, 154 goods unlawfully bearing a mark or trade name, 155 false indications as to their source or the identity of the producer 156 and unfair competition. 157

Chapter 2.1.2 Berne Convention Although the Berne Convention 158 covers the protection of authors’ rights and neighbouring rights, it is also relevant for this thesis. In particular Articles 9(2), 10 and 10bis Berne Convention, which deal with the three-step test and certain free use of works, in other words with fair use, which are sometimes analogously applied to trademark use. Beside, Article 9(2) Berne Convention applies to works and other subject matter, and therefore might be applicable to trademarks.

Chapter 2.1.3 Nice Agreement Another international treaty relevant for this thesis is Nice Agreement 159 of 1957, under which goods are classified into classes 1-34, and services into classes 35-45. Under Article 19 Paris Convention, the States to which it applies reserve the right to make separately between themselves special agreements for the protection of industrial property. The Nice Agreement is signed by the U.S. and all members of the EU, except for Cyprus and Malta. 160 In Chapter 6.3.3.2 “Unclear boundaries of product and service classifications” it will be argued that the fundament of Nice Classification, to divide the trademarks according to class is artificial and not fair to trademark holders that should be able to extend the use of their trademark to other goods and services.

154

Article 8 id. Article 9 id. 156 Article 10 id. 157 Article 10bis id. 158 Supra note 138. 159 Supra note 139. 160 Nevertheless, these two countries also use the Nice Classification system. Cyprus and Malta are no party to the Nice Classification, but nevertheless use the classification. Trademark Classification in Cyprus, available at: http://www.ldlaw.com.cy/services/intellectual.htm (accessed August 8, 2013). Trademark Classification in Malta, available at: http://www.euromalta.net/trademark/attorneys.htm (accessed on August 8, 2013). 155

43 Chapter 2.1.4 TRIPS The relevance of the Paris and Berne Conventions has only increased since all members of the WTO have to comply with TRIPS, 161 which has incorporated Articles 1 through 12 and Article 19 of the Paris Convention 162 and the Berne Convention. 163 TRIPS provides minimum standards to enforce intellectual property rights. The three-step test of Article 9(2) Berne Convention was curtailed into a two-step test of Article 17 TRIPS, which deprives trademark holders from the “normal exploitation” criterion. This will be extensively covered in Chapter 6 “Trademark Dilution and Its Defences”.

Chapter 2.1.5 WTO panel reports To interpret the terms used in the two-step test of Article 17 TRIPS to see whether the limitations and exceptions should be applied or not by legislators or courts there are three WTO panel reports relevant: - Canada –patent protection of pharmaceutical products 164 (patent panel); - United States – § 110(5) of the U.S. Copyright Act 165 (copyright panel), and; - EU – Protection of Trademarks and Geographical Indications for Agricultural Products and Foodstuffs 166 (trademark panel). Chapter 6 “Trademark Dilution and Its Defences” elaborates on these interpretations.

Chapter 2.1.6 ECHR An international treaty relevant for the limitations of the exclusive rights of trademarks in the EU and the U.S. is the ECHR, 167 especially Article 10 of this convention which covers freedom of expression, and Article 1 Protocol to the ECHR, 168 which covers the protection of property. Charter of Fundamental Rights of the EU 161

Trade-related Aspects of Intellectual Property Rights (TRIPS) is Annex 1C of the Marrakesh Agreement on the Establishment of the WTO, April 15, 1994. 162 Article 2(1) TRIPS: In respect of Parts II, III and IV of this Agreement, Members shall comply with Articles 1 through 12, and Article 19, of the Paris Convention (1967), id. 163 Article 2(2) TRIPS: Nothing in Parts I to IV of this Agreement shall derogate from existing obligations that Members may have to each other under the Paris Convention, the Berne Convention, the Rome Convention and the Treaty on Intellectual Property in Respect of Integrated Circuits, id. 164 WTO panel report patent, supra note 140. 165 WTO panel report copyright, id. 166 WTO panel report trademark, id. 167 ECHR, supra note 141. 168 Protocol to ECHR, supra note 142.

44 (Charter), 169 based on the ECHR, is relevant for the countries of the EU. Just like the ECHR, Article 11 Charter protects the right to freedom of expression and information, and Article 17 Charter protects the right to property. How to balance these two rights is dealt with in Chapter 6 “Trademark Dilution and its Defences”.

Chapter 2.2 Definition of the trademark The Paris Convention and TRIPS, to which both the member countries of the EU and U.S. are contracting parties, are not giving any definition of a trademark. It is up to the sovereignty of the contracting parties to come up with their own version. As a definition, both the EU and U.S. have promulgated a non-exhaustive list of examples of what could constitute a trademark.

Chapter 2.2.1 EU Definition of the trademark The Trademark Directive 170 and Community Mark Regulation 171 give both the same broad definition of a trademark: “A trademark [or Community Trademark] may consist of any sign capable of being represented graphically, particularly words, including personal names, designs, letters, numerals, the shape of goods or of their packaging, provided that such signs are capable of distinguishing the goods or services of one undertaking from those of other undertakings.” 172

Chapter 2.2.2 Definition of the trademark in the U.S. Then there are federal trademarks under the Lanham Act. Just as the EU definition of a trademark the Lanham Act provides a broad definition of a trademark: “The term “trademark” includes any word, name, symbol, or device, or any combination thereof [..]”, that identifies and distinguishes the goods or services of one undertaking from those of another, and that indicates the source of the goods or services. 173

169

Charter of Fundamental Rights of the EU (EU Charter), proclaimed in 2000 and binding in December 2009. 170 Article 2 Trademark Directive, supra note 146. 171 Article 4 Council Regulation (EC) No 40/94 of 20 December 1993 on the Community trade mark (Community regulation). 172 Article 2 Trademark Directive, supra note 146, and Article 4 Community Regulation, supra note 171. 173 15 U.S.C. §1127.

45 Chapter 2.3 Two roots of the trademark According to Schechter the trademark has two roots: the voluntary merchant’s, personal or proprietary mark on the one hand to establish ownership, and the compulsory production marks on the other hand, to identify the collective origin of the goods. 174 “Strictly speaking, marks designating ownership are not trade-marks at all but merely proprietary marks, which may or may not incidentally serve to designate the origin or source of the goods to which they are affixed.” 175 Meanwhile, the raison d’être for the regulatory production mark was to be able to “trace back defective goods to the craftsman, and thus protection against deceit and safeguarding the collective good will and monopoly of the gild.” 176 The expansion of the trademark functions shows that the proprietary part of the functions that protect trademark holders, has become just as important as the source of origin-related functions that protect consumers. Just as with some trees these two roots of trademarks have fused. Its result is inseparable and the two different functions of the trademark amplify each other.

Chapter 2.4 Two different forms of trademarks in the EU and U.S. According to the Paris Convention 177 the conditions for the filing and registration of trademarks will be determined in each country of the Union by its domestic legislation. 178 In the EU there are two kinds of trademarks. The national trademark of each member state and the Community Trademark. The national trademark is governed by the national laws relating to trademarks in combination with the Trademark Directive to approximate these laws of each of the Member States. 179 The Community Mark is ruled by the Community Directive, that is binding in its entirety and directly applicable in all

174

NEIL J. WILKOF AND DANIEL BURKITT, TRADE MARK LICENSING, (Second Edition, Sweet & Maxwell, 2005), at 22. 175 Schechter, supra note 100, at 819. 176 Id., at 825. 177 Paris Convention, supra note 137. 178 Article 6(1) Paris Convention, id. 179 Third sentence of Article 189 Treaty establishing the European Economic Community (Treaty of Rome), March 25, 1957: “A directive shall be binding, as to the result to be achieved, upon each Member State to which it is addressed, but shall leave to the national authorities the choice of form and methods.”

46 member states. 180 Each of the member countries of the EU use a first-to-file system for their national trademarks, and also the Office for the Harmonisation of the Internal Market (OHIM) uses a first-to-file system to register the Community Trademarks. In the U.S. there are also two kinds of trademarks. Each American state can register state trademarks. Beside state trademarks, one can register federal trademarks at the U.S. Patent and Trademark Office (USPTO). The U.S. follows the first-to-use rule for trademark registration, which means that the rights to a trademark can be acquired either through being the first to use the mark in commerce, or being the first to register the mark with the trademark office. 181

Chapter 2.5 Inherent and acquired distinctiveness In both the U.S. and EU if a word is not inherently distinctive it is incapable of becoming a valid trademark, for example if it is only descriptive. However, even descriptive marks can acquire secondary meaning 182 by using the mark intensively, for example via advertising, so that it can be protected by unfair competition law in the U.S. 183 and trademark law in the EU. Standard Oil is an example in the U.S. 184 and Windsurfing Chiemsee in the EU 185 of descriptive marks that have acquired distinctiveness. The inverse route is also possible; so that a distinctive trademark becomes a generic one, see Chapter 6.3.1 “Degrees of distinctiveness”.

Chapter 2.6 Conventional and unconventional trademarks In both the EU and U.S. conventional trademarks are signs that are visible such as brand names, slogans and logos. Although this thesis covers exclusively conventional 180

Second sentence of Article 189 Treaty of Rome: “A regulation shall have general application. It shall be binding in its entirety and directly applicable in all Member States.” Id. 181 15 USC § 1127(a). 182 A trade name has acquired “secondary meaning” when “a substantial number of present or prospective purchasers understand the designation, when used in connection with goods, services, or a business, not in its primary lexicographical sense, but as referring to a particular place or association” RESTATEMENT OF TORTS § 716 (b) & cmt. b (1938). 183 “In the absence of secondary meaning, the law of unfair competition does not protect a name which is based on or is truly descriptive of the construction common to, or characteristics of an article.” HARRY D. NIMS, THE LAW OF UNFAIR COMPETITION AND TRADE-MARKS § 50 (3d ed. 1929) 184 Standard Oil Co. of Maine v Standard Oil Co. of N.Y., 45 F.2d 309, 310 (1st Cir. 1930). 185 Windsurfing Chiemsee Produktions- und Vertriebs GmbH (WSC) v Boots- und Segelzubehör Walter Huber and Franz Attenberger (Windsurfing Chiemsee) (Joint cases C108/97 and 109/97), Judgment of the ECJ, May 4, 1999.

47 trademarks, one should realise that there is a growing number of unconventional marks. 186 These include in the EU gustatory, scent, 187 touch, 188 sound, 189 colour, 190 3D 191 marks, that in an increasing number of jurisdictions can be registered as trademarks, as long as the source identification, 192 graphical representation, non-functionality193 and distinctiveness criteria are met. In the U.S. the 1988 amendment of the Lanham Act, Congress retained the words ‘symbol’ and ‘device’ “so as not to preclude the registration of colours, shapes, smells, sounds or configurations where they function as trademarks.” 194 More concisely, the U.S. Supreme Court made it clear in Qualitex Co. v Jacobson Products Co. that a trademark can be “almost anything at all that is capable of carrying meaning”. 195 A recent example of the special features mark is the red dripping wax seal of Maker’s Mark, a brand of bourbon. 196

Chapter 2.7 Doctrines to avoid misrepresentation and misappropriation There are two doctrines on which the protection and enforcement of the trademark is based in the U.S. and in the EU: the doctrine to avoid misrepresentation, and the doctrine to avoid misappropriation.

186

John T. Gabrielides and Thomas M. Williams, “The sound of unconventional marks in the United States”, WORLD TM REV., July/August 2007, 94-95. 187 Dr. Ralf Sieckmann v Deutsches Patent- und Markenambt (C-273/00) Judgment of the ECJ, December 12, 2002. 188 Distinctive texture of Louis Vuitton bags might be entitled to protection in some jurisdictions as a touch trademark. INTA, Global Trademark Research, Fact Sheets Types of Protection, Nontraditional Trademarks, available at: http://www.inta.org/TrademarkBasics/FactSheets/Pages/NontraditionalTrademarksFactSheet.aspx (accessed August 8, 2013). 189 Shield Mark BV v Kist (C-283/1) Judgment of the ECJ, November 27, 2003. 190 Libertel Groep BV Benelux-Merkenbureau (C-104/01) Judgment of the ECJ, May 6, 2003. 191 Koninklijke Philips Electronics NV v Remington Consumer Products Ltd. (C-299/99) Judgment of the ECJ, June 18, 2002. 192 Oliveira v Frito-Lay Inc (251 F3d 56 (2d Cir 2001). 193 In re NV Organon (79 USPQ2d 1639 (TTAB 2006). 194 S Rep 515, 100th Cong 2d Sess 44 (1988). 195 Qualitex Co v Jacobson Products Co, 514 US 159 (1995). 196 th 6 Circuit decided in Maker’s Mark (bourbon) v Jose Cuervo (tequila) that the red dripping wax seal on the bottle is a protected trade dress. Josh Block is interviewing Chris Spigman at Bloomberg Law, May 23, 2012, available at: http://www.youtube.com/watch?v=9Pgl4V9AURU (accessed August 8, 2013).

48 Chapter 2.7.1. Misrepresentation Misrepresentation leads to a likelihood of confusion, which constitutes liability for trademark infringement. When an identical or similar sign is used as the trademark without authorisation of the trademark holder in the identical or similar product or service class, the trademark holder can prevent that the sign will be registered or if it is registered to cancel it.

Chapter 2.7.1.1 Likelihood of confusion The result of a misrepresentation of the trademark, where a link between trademark and an entity is suggested that does not exist, consumers might get confused. Therefore consumers need to be protected against this likelihood of confusion. McKenna criticises that the likelihood of confusion is sufficient to sustain a claim, even in case it has no effect on consumers’ purchasing decisions: 197 “[A] trademark law focused on consumer decision making and committed to respecting consumer autonomy should treat consumer preferences as fixed and exogenous; it should intervene only when use of a trademark threatens to prevent consumers from acting on pre-existing preferences. It should specifically decline to regulate non-deceptive attempts to shape those preferences.” 198 Beside enjoining the use or cancellation of an existing trademark, likelihood of confusion is also a reason to not allow to register a trademark. 199 On the one hand it has become more difficult to claim that a likelihood of confusion has taken place, because of the relaxation of the source of origin function into a constant source doctrine and the gradual abandonment of the quality control requirement

197

McKenna defined trademark search narrowly: “targeting search costs or confusion in and of themselves, trademark law should instead focus on deceptive practices that interfere with consumers’ purchasing decisions. Specifically: defendant’s use of the plaintiff’s trademark creates a risk that consumers will be deceived into buying goods or services they otherwise would not have or refraining from buying what they otherwise would have. Trade diversion seems no longer to be averted but the confusion itself.” Mark P. McKenna, A Consumer Decision-Making Theory of Trademark Law, 98 VA. L. REV. 67, 70 (2012). See also: Mark A. Lemley & Mark McKenna, Irrelevant Confusion, 62 STAN. L. REV. 413, 415–16, 450 (2010). 198 McKenna, A Consumer Decision-Making Theory of Trademark Law, id., at 122. 199 Besides, trademark infringement, Article 4(1)(b) Trademark Directive, supra note 146, states that “if because of its identity with, or similarity to, the earlier trade mark and the identity or similarity of the goods or services covered by the trade marks, there exists a likelihood of confusion on the part of the public, which includes the likelihood of association with the earlier trade mark.”

49 (see Chapter 2.8.1). On the other hand, it has become easier, because of four controversial doctrines: sponsorship and affiliation confusion; initial-interest confusion; post-sale confusion; and reverse confusion. Lemley and McKenna argued that these four forms of confusion should only be actionable when the plaintiff can prove the confusion is likely to materially impact consumer purchasing decisions. 200

Sponsorship and affiliation confusion Derived from the source of origin function, if a trademark is used for a product or service, the consumer knows that it is not part of the core activities of the trademark holder, he or she assumes 201 that the trademark holder has “sponsored, endorsed, or otherwise approved of defendant’s use of the mark.” 202 Here too, a likelihood of confusion can happen when a link between trademark and sponsor is suggested, but does not really exist. Dogan and Lemley compared sponsorship and affiliation confusion to the right of publicity. 203

Initial-interest confusion Initial-interest confusion takes place when the purchaser is initially confused and during the purchase he knows he is purchasing a product from another source than he initially intended. The Brookfield case showed that Blockbuster Video put up a billboard on the highway with the words: “West Coast Video next exit.” Consumers expecting West Coast Video will only find a Blockbuster video store there. 204 Gasparek criticised Brookfield as an outcome determinative decision. 205

200

Lemley & McKenna, supra note 197, at 414-415. “[A]n appreciable number of ordinarily prudent purchasers are likely to be misled, or indeed simply confused, as to the source of the goods in question [..].” Savin Corp. v Savin Group, 391 F.3d (2d Cir. 2004) at 456 (citing Mushroom Makers, Inc. v R.G. Barry Corp., 580 F.2d 44, 47 (2d Cir. 1978). 202 Tommy Hilfiger Licensing, Inc. v Nature Labs LLC (Tommy Hilfiger), 221 F. Supp. 2d 410, 414 (S.D.N.Y. 2002) (citing Dallas Cowboys Cheerleaders, Inc. v Pussycat Cinema, Ltd., 604 F.2d 200, 204-05 (2d Cir. 1979). 203 Stacey L. Dogan & Mark A. Lemley, What the Right of Publicity Can Learn from Trademark Law, 58 STAN. L. REV. 1161, 1193 (2006). 204 Brookfield Communications, Inc. v W. Coast Entm’t Corp., 174 F.3d 1036, 1044 (9th Cir. 1999). 205 “The circuit court, having found intent or bad faith on the part of the alleged infringer, set out to find a theory that would allow them to hold against that party.” Katherine E. Gasparek, Applying the Fair Use 201

50 Metatags can also lead to initial-interest confusion. McCuaig argued that the initial-interest confusion theory in the metatag context is debatable since consumers are aware that search engines do not always produce relevant results. 206 O’Rourke argued that the use of a trademark on the face of a web page may manipulate search engines more than those in metatags, since many search engines do not consider metatags anymore in producing search results. 207

Post-sale confusion Post-sale confusion is when a potential customer is confused and believes someone else has bought a product of brand A, even though the actual customer knew it bought a product of brand B. If the quality of brand B is inferior to brand A, potential customers of brand A can be deterred from purchasing products from brand A. McKenna asserted that post-sale confusion does not matter as long we have some reason to think that those observers would otherwise be potential customers. However, in principle every consumer is a potential customer. 208 Therefore one can argue that McKenna demonstrated, in contrast to his intention, that the post-sale confusion is relevant. 209

Reverse confusion Ford, a brand better known than Westward, used Mustang for its experimental cars in 1962, even though it knew that Westward had a federal registration of the mark and used it for its trailers and campers. Ford spent 16 million U.S. dollar advertising the Mustang. 210 Therefore consumers might be confused to think that the senior brand, in this case Westward, is the infringer. In 1974, the 10th Circuit for the first time recognised reverse confusion in the case of the senior use of the trademark Big Foot by the lesser Defense in Traditional Trademark Infringement and Dilution Cases to Internet Meta Tagging or Linking Cases, 7 GEO. MASON L. REV. 787, 795 (1999). 206 Dan McCuaig, Halve The Baby: An Obvious Solution To The Troubling Use Of Trademarks As Metatags, 18 J. MARSHALL J. COMPUTER & INFO. L. 643, 654, 658-64 (2000). 207 Maureen A. O’Rourke, Defining the Limits of Free-Riding in Cyberspace: Trademark Liability for Metatagging, 33 GONZ. L. REV. 277, 285 (1997-98). 208 Chances that potential customers become actual customers are of course higher in societies with high socio-economic mobility. 209 McKenna, supra note 197, at 103. 210 The 7th Circuit refused to recognise reverse confusion, instead the 7th Circuit determined that the trademark of the senior Westward brand was not strong, therefore there was no trademark infringement. Westward Coach Mfg. Co. v Ford Motor Co., 388 F.2d 627 (7th Cir.1968).

51 known brand Big O Tire against the junior user of the mark, but better known brand Goodyear. 211 It is obvious that the lesser known brand which is the senior user, has a property interest in protecting the mark. However, Feldman asserted that “the public may benefit more from the junior user’s [the better known brand] adoption of the mark because they only identify the mark with the junior user and are not confused by the dual uses of the mark.” 212 The junior user might not directly take away business from the senior user. However, one can argue that reverse confusion leads to the senior user’s loss of control of the significance and distinctiveness of its trademark, comparable to trademark dilution, see below.

Chapter 2.7.2 Misappropriation doctrine Misappropriation leads to what is called liability for “trademark dilution” in the U.S. and “unfair advantage of or causing detriment to the distinctive character or repute of the trademark” in the EU. In the EU marks with a reputation, and in the U.S. famous marks are given extra protection by permitting the registrant of a mark with a reputation or famous mark to prevent the use or registration of a diluting trademark, or institute cancellation proceedings based on the validity of its earlier registration, 213 even for goods or services in non-competing categories.

Chapter 2.7.2.1 Trademark dilution Schechter, introduced the dilution doctrine in 1927 to the U.S. as ”the gradual whittling away or dispersion of the identity and hold upon the public mind of the mark or name by its use upon non-competing goods.” 214 Callmann, an advocate of incorporating

211

Big O Tire Dealers, Inc. v Goodyear Tire & Rubber Co., 561 F.2d 1365 (10th Cir. 1977). Joel R. Feldman, Reverse Confusion in Trademarks: Balancing the Interest of the Public, the Trademark Owner, and the Infringer, 8 J. TECH. L. & POL'Y 163, 164 (2003). 213 Marshall A. Leaffer, The New World of Intellectual Trademark Law, 2 MARQ. INTELL. PROP. L. REV. 1, 9 (1998). 214 Schechter, supra note 100, at 825. Schechter referred to the Odol case, where the Landgericht Elberfeld substantiated the right to prevent others from using the trademark Odol in a non-confusing way on general principles of civil code and the law against unfair competition. Landgericht Elberfeld, September 11, 1924, Juristische Wochenschrift 1925, 502, Anselm Kamperman Sanders, Ch. 4. Odol: The Introduction of a Watery Concept with Steeled Resilience, in LANDMARK INTELLECTUAL PROPERTY CASES AND THEIR LEGACY (Christopher Heath & Anselm Kamperman Sanders, eds., 2011), at 51, footnote 1. 212

52 the protection of the advertising function of the trademark in trademark law, coined the word dilution for this doctrine. 215 However, when the doctrine was made into law in the U.S., Schechter’s suggestion to apply it to fancy and arbitrary marks was not followed, and he did not mention dilution by tarnishment. Instead it was applied only to famous marks and marks with a reputation and dilution by tarnishment was included. Rierson argued that “[i]f marks are nonrivalrous and therefore function more like words than disposable goods, the economic justification for the dilution cause of action ceases to exist.” 216 But a strong argument for the protection against trademark dilution is that the freedom of holders of a famous mark to extend the use of their trademark to different product categories would otherwise be restricted. 217 This reasoning was self-evident to Justice Pitney in the 1916 Hanover Star Milling case: “Common Law trademarks, and the right to their exclusive use, are of course, to be classed among property rights, but only in the sense that a man’s right to the continued enjoyment of his trade reputation and the good will that flows from it, free from unwarranted interference by others, is a property right, for the protection of which a trademark is an instrumentality.” 218 Nelson criticised this line of reasoning by asserting that the supply by more competitors of a good or service can be beneficial to consumers. 219 This might be the case, but one can equally argue that competitors can supply a good or service using a trademark name and especially in case of a trademark logo, that is distinctive enough from any senior mark. Not using the names that are already taken leaves enough room, as Schechter put it eloquently: “All the rest of infinity is open to defendant.” 220 One can argue it would be fair if trademark holders be able to determine whether they would like to use their mark to provide an unrelated product or service, or whether 215

Id., at 54. Sandra L. Rierson, The Myth and Reality of Dilution, 11 DUKE L. & TECH. REV. 212, 213 (2012). 217 Learned Hand: “However, it has of recent years been recognized that a merchant may have a sufficient economic interest in the use of his mark outside the field of his own exploitation to justify interposition by a court. His mark is his authentic seal; by it he vouches for the goods which bear it; it carries his name for good or ill. If another uses it, he borrows the owner’s reputation, whose quality no longer lies within its control. This is an injury, even though the borrower does not tarnish it, or divert any sales by its use; for a reputation like a face, is the symbol of its possessor and creator, and another can use it only as a mask. And so it has become to be recognized that, unless the borrower’s use is so foreign to the owner’s as to insure against any identification of the two, it is unlawful.” Yale Elec. Corp. v Robertson, 26 F.2d 972, 974 (2 Cir. 1928). 218 Hanover Star Milling Co. v Metcalf, 240 U.S. 403, at 412-13 (1916). 219 Sara Stadler Nelson, The Wages of Ubiquity in Trademark Law, 88 IOWA L. REV. 731, 776-83 (2003). 220 Schechter, supra note 100, at 833. 216

53 they would like to license the use of their mark to other providers. Drescher identified this phenomenon as “brand extension” and noted that one can stretch a brand “only so far as its reservoir of good will, its ‘brand equity’ will allow.” 221 Below the two forms of trademark dilution will be analysed. 222

Chapter 2.7.2.1.1 Dilution by blurring One can argue that dilution by blurring impairs the distinctiveness of the trademark. Schechter wrote: “If “Kodak” may be used for bath tubs and cakes, “Mazda” for cameras and shoes, or “Ritz-Carlton” for coffee, these marks must inevitably be lost in the common place words of the language, despite the originality and ingenuity of their contrivance, and the vast expenditures in advertising them which the courts concede should be protected to the same extent as plant and machinery.” 223 This loss of distinctiveness could lead to a “death by a thousand cuts.” 224 This thesis’ author would define it as genericism not for the products or services, but for the trademark name itself. 225

Chapter 2.7.2.1.2 Dilution by tarnishment Dilution by tarnishment happens when an association arising from the similarity between a mark or trade name and a famous mark harms the reputation of the latter. For example the junior mark is used on inferior products, or sexual suggestive products. As stated by the Second Circuit: “[t]he sine qua non of tarnishment is a finding that plaintiff’s mark will suffer negative associations through defendant’s use.” 226 Taran argued that it is not up to the judge to be a gatekeeper of culture and asserted that no matter whether it is vulgar or refined humour, low and high brow art, all expressions of the freedom of speech deserve the same level of protection. 227 221

Drescher, supra note 42, at 338. Beebe makes a threefold division which distinguishes next to dilution by blurring and dilution by tarnishement, the dilution of uniqueness, because Schechter meant to refer to the impairment of uniqueness. Barton Beebe, A Defense of the New Federal Trademark Antidilution Law, 16 FORDHAM INTELL. PROP. MEDIA & ENT. L.J. 1143, 1145 (2006). 223 Schechter, supra note 100, at 830. 224 Beebe, supra note 222, at 1163 footnote 102. 225 Bayer Co. v United Drug Co., 272 F. 505, 510 (S.D.N.Y. 1921). 226 Hormel Foods Corp. v Jim Henson Productions, Inc., (Hormel Foods) 73 F.3d 497, 507 (2d Cir. 1996). 227 Jessica Taran, Dilution by Tarnishment: A Case for Vulgar Humor, 7 INTELL. PROP. L. BULL. 1 (2002). 222

54 Schaffer-Goldman argued that even though tarnishment actions are often rejected by courts, cease-and-desist letters can still stifle expressions that are unseemly, unwholesome and unsavoury in the sensitive eyes of the trademark holder. 228

Chapter 2.8 Dichotomous functions of the trademark One can argue that the functions of the trademark are the justifications or at least the efforts to justify for its very existence, protection and enforcement of a trademark. Beside that the indication of a source of origin and quality are the dominant functions of a trademark, there is no consensus about which other functions a trademark covers or should cover. It is established law by the Court of Justice of the EU (CJEU) 229 that if an action has an adverse effect on the functions of the trademark, the trademark holder should be able to stop it. 230 It is clear that the universe of trademark functions in the EU and U.S. has expanded from exclusively consumer-interest related functions to include proprietary functions.

Chapter 2.8.1 Consumer-interest related functions of trademark infringement Below, one can find a taxonomy of trademark functions that can rejoice in a varying degree of popularity. Landes and Posner argued that each trademark function confers its own benefit to the owner and to society under an economic analysis which justifies conferring a “property” right under a costs/benefits model. 231 Professor McKenna argued that trademark law traditionally sought to protect a trademark owner’s interests by preventing competitors from dishonestly diverting the 228

Schaffer-Goldman, supra note 85, at 1305. CJEU, before December 1, 2009, when the Treaty of Lisbon went into force, known as the European Court of Justice. 230 Google France and Google (Google France SARL and Google Inc. v Louis Vuitton Malletier SA (C236/08), Google France SARL v Viaticum SA and Luteciel SARL (C-237/08) and Google France SARL v Centre national de recherche en relations humaines (CNRRH) SARL and Others (C-238/08)), Judgment of the ECJ, March 23, 2010, para. 79; Die BergSpechte Outdoor Reisen und Alpinschule Edi Koblmüller GmbH v Günther Guni and trekking.at Reisen GmbH. (C-278/08), Judgment of the CJEU, March 25, 2010, para. 21; Portakabin Ltd and Portakabin BV v Primakabin BV. (Portakabin)(C-558/08), Judgment of the CJEU, July 8, 2010, para. 29; L'Oréal SA, Lancôme parfums et beauté & Cie SNC and Laboratoire Garnier & Cie v Bellure NV, Malaika Investments Ltd and Starion International Ltd. (L’Oréal and Others) (C-487/07), Judgment of the ECJ, June 18, 2009, para. 60. 231 William M. Landes & Richard A. Posner, The Economics of Trademark Law, 78 TMR 267, 270 (1988). 229

55 trademark holder’s trade. 232 According to McKenna, trademark doctrine is better explained through that historical proprietary lens than through the “search costs” consumer interest lens. 233

Source of origin The essential function of the trademark is considered indicating the origin or trade source of a product or service. 234 This makes the search process more efficient for consumers; 235 they can find back products they like 236 and avoid products they do not like. 237 The shortcut in the search process is a more efficient alternative for assessing the quality each time one needs a product or service. The advantages for the trademark holders to reach “their hands over the retail tradesman’s shoulder, so to speak, and offering their goods in their own name to the customer”, 238 are that their products can be distinguished from other products, so that the customer can appreciate their reputation. Then again, search cost reduction might also reduce competition, which might not be in the consumers’ interest. 239 McKenna asserted that increasing search costs can actually benefit brands, by more actively engaging consumers. 240

232

Mark P. McKenna, The Normative Foundations of Trademark Law, 82 NOTRE DAME L. REV. 1839, 1866-1871 (2007). 233 McKenna, id. 234 “A significant function of a trade mark is to link goods or services to a source of supply, whether the original producer or a commercial intermediary. That is in the interest of both supplier and consumer. The supplier can establish a reputation, which is protected from usurpation by competitors, for products bearing the mark, and can thus promote trade in those products. Likewise, the consumer can make purchasing decisions on the basis of the qualities he perceives as attached to the mark. Since those decisions may be negative, suppliers have an incentive to maintain and improve the quality of the goods or services supplied under the mark.” Intel Corporation Inc. v CPM United Kingdom Ltd., Case C-252/07, Opinion Advocate General Sharpston, June 26, 2008. 235 McKenna points out that that consumers are a diverse group, some have a high need for cognition in the purchase decision making, others like to make intuitively purchase decisions. McKenna, supra note 197, at 90. 236 “The true functions of the trademark are, then, to identify a product as satisfactory and thereby to stimulate purchases by the consuming public.” Schechter, supra note 100, at 817. 237 "[O]nce consumer learns that he does no want particular goods, the mark, name or get-up becomes a significant warning signal." WILLIAM CORNISH & DAVID LLEWELYN, INTELLECTUAL PROPERTY: PATENTS, COPYRIGHTS, TRADEMARKS & ALLIED RIGHTS (sixth edition 2007), at 587. 238 H.G. WELLS, THE WORLD OF WILLIAM CLISSOLD, Vol. 1 (1926), at 237. 239 McKenna, supra note 197, at 87. 240 An example could be Google that every now and then changes the logo of its search engine into a Google Doodle, which is a themed masquerade of the Google logo. Available at: http://www.google.com/doodles/finder/2012/All%20doodles (accessed August 8, 2013). McKenna, supra note 197, at 91.

56 The function of the trademark to indicate a source of origin has been eclipsed by the constant source function, even though that source might be unknown. 241 The latter case can be relevant if trademarks are transferred independently of the undertaking. 242

Quality Trademarks are an incentive to trademark holders, to produce high-quality goods and services, because competitors are not allowed to mimic their mark and free-ride off their work. 243 Quality is linked to the source of origin, since stability of source designation is considered a proxy for consistent quality. 244 Making sure that the quality associated by consumers is at least as high as consumers expect, is crucial for taking advantage of the link between trademark and trademark holder. Without consistency in quality, it would adversely affect the source of origin function of the trademark. It can be argued that a trademark can be protected in the absence of a connection between the trademark and the producer in the mind of the consumer, if the consumer uses the connection between trademark and trade source as a sign of quality. 245 The naked or bare license is a U.S. and UK doctrine. In the U.S. the Lanham Act § 45, 15 U.S.C. § 1127 246 prescribes that the licensor of a registered trademark controls 241

Schechter: “[T]hat the goods in connection with which it is used emanate from the same – possibly anonymous – source or have reached the consumer through the same channels as certain other goods that have already given the consumer satisfaction, and that bore the same trademark.” Schechter, supra note 100, at 816. Lord Justice Warrington: “(..) The deception which I think the registration would be calculated to produce is that the two products emanate from the same source, and for the purposes of the present question it does not, in my opinion, matter whether the public do, or do not, know what the source is.” In the Matter of MacDowell’s Application, 43 Rep. Pat. Cas. 313 (1926), at 337, cited by Schechter, supra note 100, at 817 footnotes 18 and 20. A trademark “to identify and distinguish his or her goods, including a unique product, from those manufactured or sold by others and to indicate the source of the goods, even if that source is unknown.” 15 USC § 1127. The same principle applies in the EU, read Sakulin, supra note 105, at 37. 242 Article 19 Trademark Directive, supra note 146. 243 William Fisher, Theories of Intellectual Property, in NEW ESSAYS IN THE LEGAL AND POLITICAL THEORY OF PROPERTY (Stephen R. Munzer ed., 2001) 169-170. 244 “From the standpoint of realities, the consumer does not regard the trade-mark as an indication of origin but rather as a guaranty that the goods purchased under the trade-mark will have the same meritorious qualities as those previously noted by him in his purchase of other goods bearing the same mark. The mark ‘sells the goods’”. FRANK I. SCHECHTER THE HISTORICAL FOUNDATION OF THE LAW RELATING TO TRADEMARKS 1925 (The Lawbook Exchange, NJ, 2002 - reprint) at 149-150. 245 Westbury as Lord Chancellor insisted that a mark or name could be protected even though the public did not know the producer as such but used the connection with a trade source simply as a sign of quality. CORNISH & LLEWELYN, supra note 237, at 574 footnote; 21 Hall v Barrows (1863) 4 De G.J. & S. 150, at 157.

57 the quality of his mark by licensees, so that consumers will not be misled. Failure to exercise quality control, deemed to be “naked licensing”, may result in the unintentional abandonment of the trademark, 247 because as Wilkof put it: “the user of the mark is not the owner of the mark, and the owner of the mark is not the user of the mark.” 248 However, professor Calboli made clear that unfortunately the “statute neither provided a definition of “quality” and “control” nor indicated how much control must be used for licensing to be valid.” 249 However, the interpretation of control has been loosened from “adequate” to “sufficient” to “minimal”. 250 In the UK, since the Scandecor case, 251 the bare trademark license doctrine seems to be no longer applied. According to Lord Nicholls the Trade Marks Act of 1994 252 has swept the remaining restrictions on licensing. 253 Wilkof and Burkitt wrote: “[q]uality control is no longer relevant in assuring that, as a legal matter, the licensor remains the source of the good. What is crucial for determining source is that during the term of the license, the exclusive licensee has been authorised to use the mark and that the consumer identifies the exclusive licensee as the source of the goods.” 254

Product distinction Trademarks are signifiers used to distinguish a good or service produced by one undertaking from the goods or services of other undertakings. 255 This function is a precondition for all the other trademark functions. For example, if one cannot distinguish

246

“The term ‘related company’ means any person whose use of a mark is controlled by the owner of the mark with respect to the nature and quality of the goods or services on or in connection with which the mark is used.” Lanham Act § 45, 15 U.S.C. § 1127. 247 Lanning Bryer and Matthew Asbell, Combining Trademarks in a Jointly Owned IP Holding Company, 98 TMR 834, 838. 248 Neil Wilkof, “When Rodney Dangerfield Meets the Naked Trade Mark Licence”, The IPKat, January 3, 2011, available at: http://ipkitten.blogspot.com/2011/01/when-rodney-dangerfield-meets-naked.html (accessed August 8, 2013). 249 Irene Calboli, The Sunset of ‘Quality Control’ in Modern Trademark Licensing, 57 AM. U. L. REV. 341, 345 (2007). 250 Id., at 346. 251 Scandecor Developments AB v Scandecor Marketing AB and Others, 2001, UK House of Lords 21, 2001, E.T.M.R. 74, 2002, F.S.R. 122. The opinion of the High Court is reported in 1998, F.S.R. 500; the opinion of the Court of Appeal is reported in 1999, F.S.R. 26. 252 Trade Marks Act 1994 (UK). 253 Scandecor Developments AB v Scandecor Marketing AB and Others, supra note 251, para. 33. 254 WILKOF AND BURKITT, supra note 174, at 133. 255 Article 2 Trademark Directive, supra note 146; Article 4 Trademark Regulation, supra note 171.

58 one product from the other, there is no point in knowing what the source of origin is of that product.

Chapter 2.8.2 Consumer interest-related function of trademark dilution A special consumer interest-related function is the one that should avert trademark dilution. Scholars have tried to align trademark dilution to the confusion doctrine to state that dilution negatively influences the source of origin function that shortcuts the search process. In the words of Dogan and Lemley: “Dilution of a unique mark increases consumer search costs by making consumers who once associated any mention of the trademark with its owner look further for context.” 256 Or, as Austin put it succinctly: dilution leads to “burdened imagination”. 257 Rose argued that there are few scholars that identify “dilution rights as protecting this earned property against subliminal association/confusion, which would ultimately dilute the value of the quality image/persona of famous and highly distinctive marks.” 258

256

Stacey L. Dogan and Mark A. Lemley, Trademarks and Consumer Search Costs on the Internet, 41 HOUS. L. REV. 777 (2004). 257 Graeme W. Austin, Trademarks and the Burdened Imagination, 69 BROOK. L. REV. 827, 890-895 (2004). 258 Simone A. Rose, Will Atlas Shrug? Dilution Protection For ‘Famous’ Trademarks: Anti-Competitive ‘Monopoly’ Or Earned ‘Property’ Right?, 47 FLA. L. REV. 653, 702-703 (1995).

59 Chapter 2.8.3 Proprietary functions In the EU and U.S. legislatures 259 and case-law 260 one can find ample evidence for the existence of other relevant functions of the trademark. But it can be argued 261 the trademark includes the following functions of the trademark, which overlap each other somewhat, each separately and in combination can be seen as instruments of commercial strategy used, inter alia, for advertising purposes or to acquire a reputation in order to develop consumer loyalty. This is not only concerned with rational evaluation of information, but also with feelings and subconscious appreciations of consumers. 262 One can assume that both trademark holders with and without a reputation are capable of having functions other than that of indicating the source of origin. 263 Callmann observed that courts are reluctant to define trademarks as property, because of the erroneous view that a trademark has no independent “advertising” value or “persona”, but is instead limited to its source identification and “good-will” function. 264 McKenna stated that trademark law’s expansive confusion doctrines were developed, often explicitly, for the purpose of protecting trademark holders’ interests. However, McKenna asserted that courts preferred to cast their decisions in consumer-

259

The wording of the EU legislature when describing the functions of the trademark includes ‘in particular’ in the tenth recital to Trademark Directive, supra note 146, and seventh recital to Community Trademark Regulation, supra note 171. In the U.S. Congress removed reference to confusion in the Lanham Act “as to the source of origin”, as to also allow the protection of other functions of the trademark. S. Rep. No. 2107, 87th Cong., 2d Sess. 4, reprinted in 1962 U.S.C.C.A.N. 2844, 2847. Read also Kozinski, supra note 56, at 973. 260 In Arsenal Football Club the plural word ‘functions’ of the mark was first used in nine different paras. Since that time L’Oréal and Others and Google France and Google have also dealt with functions of the trademark. Arsenal Football Club plc v Matthew Reed (Arsenal Football Club) (Case C-206/01) Judgment of the ECJ, November 12, 2002; L’Oréal and Others, supra 230, paras 63 and 65; Google France and Google, supra note 230, paras 77 and 79. 261 Those who see the use of marks to actually tell consumers specifically where goods or services come from, and also a looser usage to distinguish one line of goods or services from another on the market, in cases where consumers have no interest in source as such only as a key to qualities, was labelled by Advocate-General Colomer of the ECJ as “simplistic reductionism” in Arsenal Football Club (Case C-206/01) Opinion of the Advocate-General, June 13, 2002 at para. 46. 262 CORNISH & LLEWELYN, supra note 237, at 590. 263 Interflora Inc. and Interflora British Unit v Marks & Spencer plc et Flowers Direct Online Ltd. (Interflora) (C-323/09) Judgment of the CJEU, July 22, 2011, para. 40. 264 Rudolf Callmann, Unfair Competition Without Competition? The Importance of the Property Concept in the Law of Trade-Marks, 95 U. PA. L. REV. 443, 458-460 (1947).

60 interest function terms, “since their emphasis on confusion is so compatible with the dominant theoretical account of trademark law - namely, the search costs theory.” 265

Communication In order to communicate the values of a brand, the integrity of the trademark is crucial. The constituent parts of a trademark logo and name should be complete. The context in which a trademark is communicated is also crucial. If the consumers are aware of the brand’s sustainability principle it would be damaging to the brand if their trademark was used on non-degradable plastic bags, or used on a Hummer, not known for its efficient use of fossil fuels.

Advertisement In Google France and Google the CJEU clarified when there is an adverse effect on the advertising function of the trademark: “[T]he proprietor of a trade mark is entitled to prohibit a third party from using, without the proprietor’s consent, a sign identical with its trade mark in relation to goods or services which are identical with those for which that trade mark is registered, in the case where that use adversely affects the proprietor's use of its mark as a factor in sales promotion or as an instrument of commercial strategy.” 266 The advertising function is used by the trademark holder to acquire or preserve a reputation capable of attracting consumers and retaining their loyalty. 267 For example in 2002-2003 Samsung spent 200 million U.S. dollar in advertising to try to link its image to the lifestyle its customers were looking for. 268 According to Cornish and Llewelyn, investments in the promotion of the trademark deserve to be protected on their own merits, apart from the protection against abuse arising from misrepresentation or inferior quality. 269

265

McKenna, supra note 197, at 71. Google France and Google, supra note 230, para. 92. 267 Interflora, supra note 263, para. 60. 268 Gerry Khermouch, “The Best Global Brands”, BusinessWeek, August 4, 2002. 269 “Marks are ciphers around which investment in the promotion of a product is built and that investment is a value, which deserves protection is such, even when there is no abuse arising from misrepresentation either about origin or quality.” CORNISH & LLEWELYN, supra note 237, at 586-587. 266

61 According to Gilson the term advertising function of the trademark is not used in the U.S. 270 Of course, in the U.S. it is dealt with implicitly to support a trademark infringement or dilution claim, when the defendant is harming the plaintiff’s ability to advertise effectively by confusion or when the trademark’s attributes cannot be promoted due to dilution. Dilution could be grounded in deceit and trespass, according to Rose. 271 She argued that the protection of the advertising value or, as Pattishall, following the example of Frankfurter, 272 called it, “commercial magnetism” 273 of a mark is an acknowledged function of anti-dilution measures.

Investment The investment function is just as the advertising function used to acquire or preserve a reputation, however, not only advertising is employed, but also various other commercial techniques. 274 When a competitor is using a sign that is identical with the trademark “substantially interferes with the proprietor’s use of its trade mark to acquire or preserve a reputation capable of attracting consumers and retaining their loyalty, the third party’s use must be regarded as adversely affecting the trade mark’s investment function.” 275 In such cases the trademark holder should be able, by virtue of the exclusive right conferred upon it by the mark, to prevent such use. 276 Simon Fhima wrote that “the law does not automatically protect intangibles just because they are valuable, and intellectual property rights (IPRs) are generally only created where the public interest in incentivising that form of investment outweighs the public detriment in restricting use of the intangible.” 277 However, Simon Fhima has reservations about protecting the investments in the reputation in the image of a 270

Jerome Gilson, Trademarks: The Future of the Advertising Function (an American Perspective), University College London Institute of Brand and Innovation Law, London, March 23, 2011, available at: http://www.ucl.ac.uk/laws/ibil/docs/11_brands_gilson.pdf (accessed August 8, 2013). 271 Rose, supra note 258. 272 Mishawaka Rubber, supra note 3, at 205. 273 Beverly W. Pattishall, The Dilution Rationale for Trademark-Trade Identity Protection, Its Progress and Prospects, 67 TMR 607, 621-22 (1977). 274 Interflora, supra note 263, para. 61. 275 Id., para. 62. 276 L’Oréal and Others, supra note 230; Interflora, supra note 263, para. 63. 277 ILANAH SIMON FHIMA, TRADE MARK DILUTION IN EUROPE AND THE UNITED STATES, OUP, November 3, 2011, at 163.

62 trademark: “However, we must be careful not to let the image take on too much of a life of its own, ultimately, the role of a trademark is to identify goods or services.” 278 In contrast, Poster 279 and Coombe 280 declared the trademark quintessentially self-referential, as already mentioned in the literature review.

Good will Trademarks can be seen as visible manifestations of good will, 281 or as Rogers put it “good will is the substance, the trademark merely the shadow.” 282 But this does not accurately state the function of trademarks. Schechter acknowledged that trademarks are not just symbols of good will, but that it is an agency for the actual creation and perpetuation of good will: 283 “[T]he trademark is not merely the symbol of good will but often the most effective agent for the creation of good will, imprinting upon the public mind an anonymous and impersonal guaranty of satisfaction, creating a desire for further satisfactions.” 284

Reputation Consumers have the need to know the reputation, which is the collective judgment of others, of a product or service. Schechter decoupled creation and retention from the source of origin doctrine. 285 There seems to be a virtuous circle of trademark products or services with a reputation. The reputable goods/services attract consumers, so that manufacturers are willing to invest in the quality and innovation of the products/services, which on their turn increase the reputation of the goods/services, 278

Id., at 164. POSTER, supra note 53 . 280 COOMBE, supra note 54. 281 “Goodwill is an intangible asset that comprises a good name and/or reputation as well as regular customer satisfaction or technical efficiency.” Sakulin, supra note 105, at 40. 282 Edward Sidney Rogers, Comments on the Modern Law of Unfair Trade, 3 ILL. L. REV. 551, 555 (1909). 283 Schechter, supra note 100, at 818. 284 Id., at 819. 285 Ainsworth v Walmsley: “If he does not carry on a trade in iron, but carries on a trade in linen and stamps a lion on his linen, another person my stamp a lion on iron.” (L. R. 1 Eq. 518, 524-525 (1866). The equitable principle that you may not palm off goods of another and that the sole injury resulting from the use of the same “lion” mark on linen and iron might be a confusion as to the source of these two dissimilar products. This ignores the fact that creation and retention of custom (instead of designation of source) is the primary function of a trademark. “[T]he preservation of uniqueness and individuality of the trademark is of paramount importance to its owner.” Schechter, supra note 100, at 822. 279

63 etc. 286 Heymann posed the question whether reputation should be better protected by advertising law than by trademark law, or as defamation, trade libel or product disparagement claims. 287 But she also warned that the desire to move reputational claims outside of trademark law leads to discount the existence of the reputational interests of the brand. 288 “Reputation, reputation, reputation! O, I have lost my reputation! I have lost the immortal part of myself, and what remains is bestial. My reputation, Iago, my reputation!” 289 Nock proposed a definition of reputation: “a shared, or collective, perception about a person”, based on judgments on a mosaic of information available. 290 The same could be applied to the trademark’s reputation, including the trademark logo’s reputation. According to Post, reputation is a form of property. Post’s Lockean vision is that people earn the esteem of others by “the fruit of personal exertion.” 291 The other side of the coin of reputation is self image. Humans partly form their self image on how they are perceived by other people, 292 or in the case of trademark holders how internet users perceive the trademark logo of the trademark holders on social media.

286 “The assumption is that a company is a going concern, and has no incentive to exploit its reputation, but wants to maintain it, if not improve it.” Norman Siebrasse, Comparative Advertising, Dilution: and the Meaning of Section 22 of the Trade-marks Act at 33, available at http://www.law.unb.ca/Siebrasse/Download/Section22.pdf (accessed August 9, 2013). 287 Laura A. Heymann, The Scope of Trademark Law in the Age of the Brand Persona, 98 VA. L. REV. In Brief 68 (2012). 288 Id. 289 Cassio in Othello. WILLIAM SHAKESPEARE, OTHELLO, Act 2, Sc. 3, 262-265, approx. 1603. 290 STEVEN L. NOCK, THE COSTS OF PRIVACY: SURVEILLANCE AND REPUTATION IN AMERICA (1993) at 2. See DANIEL SOLOVE, THE FUTURE OF REPUTATION, GOSSIP, RUMOR, AND PRIVACY ON THE INTERNET, (Yale University Press 2007) at 30. 291 Robert C. Post, The Social Foundations of Defamation Law: Reputation and the Constitution, 74 CAL. L. REV. 691, 694 (1986) (quoting J. Hawes, Lectures Addressed to the Young Men of Hartford and New Haven 95 (1828)). 292 The looking glass self. C.H. COOLEY, HUMAN NATURE AND THE SOCIAL ORDER (1902).

64 Chapter 2.8.4 Signalling identity More companies start to realise that their brands equal their identity or persona. 293 “We consider the Polo brands to be the essence of our company. They are our identity, our face, our worth – in other words, our property. For Polo Ralph Lauren, and many other American companies, the most valuable piece of property that they own is their good name, or, as we say in the industry, their brand (...).” 294 Gerhardt argued that consumers do not use trademarks just as a shorthand for the physical qualities of a product, “but as a way of signalling their own emotional participation and identity, which then feeds back into the meaning of the brand in a continuous loop.” 295 Consumers have bonds with their favourite brands that mimic the dynamics of a personal relationships. And just like relationships between friends can go awry, so can the relationships between brands and consumers. 296

Chapter 2.8.5 Accountability The link between trademark and trademark holders, can also be seen as a way to make trademark holders accountable for their actions, not just the quality of their products and services but also in regard to the way their products are manufactured, the way they deal with corporate social responsibility and environmental issues. 297 One of 293

‘Persona’ has been defined as the ‘quality of distinctiveness and uniqueness’, quite apart from its [the trademark's] function of identifying the source of goods and services.” Ellen P. Winner, Right of Identity: Right of Publicity and Protection for a Trademark’s ‘Persona’, 71 TRM 193 (1981). 294 Oral Statement of Sherry L. Jetter, Vice President, Intellectual Property, Polo Ralph Lauren Corporation, before the Hearing of the Subcommittee on Courts, The Internet, and Intellectual Property of the Committee on the Judiciary, 107th Cong., 2d Sess., Serial No. 53 (Feb. 14, 2003). 295 Deborah R. Gerhardt, Consumer Investment in Trademarks 88 N.C. L. REV. 427, 455 (2010). Read more about the signaling properties of the trademark in Drescher, supra note 42, at 309. 296 When Frederic Rouzaud, managing director of Louis Roederer was asked in The Economist what he thought of the embracement of the hip-hop community of their Cristal champagne, he distanced himself from the hip-hop community. This triggered hip-hop artist and producer Jay-Z to cal for a boycott. “Bubbles and bling”, The Economist, May 8, 2006, available at: http://www.economist.com/node/6905921 (accessed August 9, 2013). “Jay-Z launches bubbly boycott of Cristal”, Associated Press, June 15, 2006, via USA Today, available at: http://www.usatoday.com/life/people/2006-06-15-jayz-cristal_x.htm (accessed August 9, 2013). Douglas Century, “Jay-Z Puts a Cap on Cristal”, N.Y. Times, July 2, 2006, at H1, available at: http://select.nytimes.com/gst/abstract.html?res=F40815FE3E540C718CDDAE0894DE404482 (accessed August 9, 2013). 297 Since brands and their corporate parents are becoming ever more entwined—both in the public perception and commercial reality—it follows that consumers can increasingly influence the behaviour of companies. “It is absurd to say that brands can be too powerful,” concludes Interbrand’s Ms Clifton. “Brands are the ultimate accountable institution. If people fall out of love with your brand, you go out of

65 the biggest reasons the questionable working conditions and, as a consequence, suicides that took place at Foxconn in Shenzhen China, were picked up by the mainstream media, was because they are the biggest manufacturer for Apple, Inc. Therefore, one can argue that the title of Klein’s bestseller “No Logo” pointed to a problem instead of a solution, because without a trademark logo, the ultimate principles can not be traced. 298

Chapter 2.9 Brief history of trademark infringement and trademark dilution in the U.S. and EU Trademark infringement, based on the misrepresentation doctrine, and trademark dilution, based on the doctrine of misappropriation, have developed in both the U.S. and EU, under the constraints of international treaties to which both are members. The result is that trademark infringement and trademark dilution in both jurisdictions are similar, but still deserve their own analysis.

Chapter 2.9.1 Brief history of trademark infringement and trademark dilution in the U.S. Trademark law in the U.S. pursues two related goals: to protect against deception, fraud and misrepresentation, which is actionable via trademark infringement, and; to protect against misappropriation and the protection of property, 299 actionable via trademark dilution. Below a brief overview is given of the evolution of the trademark in U.S. legislation.

Chapter 2.9.1.1 Tort of misappropriation Although it can be argued that trademark law plays an equally important role in American society as patent and copyright law, it was never drafted into the U.S. Constitution300 as something Congress should promote. 301 Instead, trademark law developed from tort-based causes of action, misappropriation and misrepresentation.

business.” “Who’s wearing the trousers?”, The Economist, September 6, 2001 available at; http://www.economist.com/node/770992?story_id=770992 (accessed August 9, 2013). 298 KLEIN, supra note 51. 299 Ameritech Inc. v American Info. Tech. Corp., 811 F.2d 960, 964 (6th Cir. 1987). 300 According to the U.S. Const. art. I, § 8, U.S. Congress is given the power “[t]o promote the Progress of Science and Useful Arts, by securing for limited Times to Authors and Inventors the Exclusive Right to their respective Writings and Discoveries.” Federal Convention of 1787.

66 The tort of misappropriation of the goodwill of the trademark owner is based on the Lockean concept that people should not be able to reap where they have not sown, 302 in other words free-riding on the reputation of another, if doing so interferes with the incentive to engage in creative activity so that society would suffer. 303 The tort of deception of the consumer became the fundament under the likelihood of confusion doctrine.

Chapter 2.9.1.2 Passing off to establish fraud Initially one must prove that the defendant was deliberately attempting to pass off his goods as those of the plaintiff to establish fraud. “No man has a right to use names, symbols, signs or marks which are intended, or calculated, to represent that his business is that of another.” 304 In 1925, generic descriptive words could be enjoined if there was actual fraud or intent to deceive. 305

Chapter 2.9.1.3 Passing off in case of actual or likelihood of confusion by the consumer “The universal test [of unfair competition] is whether the public is likely to be deceived.” 306 A non-arbitrary trademark that has acquired secondary meaning can be restrained in case of actual or likelihood of confusion. 307 “The determining factor is not that people have actually been deceived but that there is a likelihood of that happening.” 308 Chafee observed that “[f]raud has been squeezed out of” cases involving trade names and trademarks. 309

301

The authority of Congress [re: Patent and Copyright Acts] is exercised in the hope that “[t]he productive effort thereby fostered will have a positive effect on society through the introduction of new products and processes of manufacture into the economy, and the emanations by way of increased employment and better lives for our citizens.” Diamond v Chakrabarty, 447 U.S. 303, 307 (1980) (quoting Kewanee Oil Co. v Bicron Corp., 416 U.S. 470, 480 (1974)). One can argue that trademarks are justified by a similar rationale. 302 JOHN LOCKE, THE SECOND TREATISE OF CIVIL GOVERNMENT, (Peter Laslett ed., 1988), Chapter 5 Property, 1690. 303 The creative activity of a trademark is that it is endowing symbols with information carrying capacity. David W. Barnes, Misappropriation of Trademark (2007). 9 N.C. J.L. & TECH. 171 (2008). 304 Hilson Co. v Foster, 80 F. 896, 897 (C.C.N.Y. 1897). 305 Drive It Yourself Co. v North, 130 A. 57, 59 (Md. App. 1925). 306 Boice v Stevenson, 187 P.2d 648, 653 (Ariz. 1947). 307 Sartor v Schaden, 101 N.W. 511, 513 (Iowa 1904). 308 New York World’s Fair v World’s Fair News, 256 A.D. 373, 374 (N.Y. App. 1939). 309 Zechariah Chafee, Unfair Competition, 53 HARV. L. REV. 1289, 1296-97 (1940).

67 Chapter 2.9.1.4 Unfair competition In Hanover Star Milling, the U.S. Supreme Court made it clear that the essential element, the sale of the goods of one manufacturer for those of another, is the same in trademark cases as in cases of unfair competition unaccompanied by trademark infringement. 310 Therefore, the doctrine was embraced to treat trademarks and trade names under unfair competition law in the same way. Trademark law is often seen as a subset of the law of unfair competition. 311 However, in contrast to this belief Derenberg asserted that the law of unfair competition developed at the beginning of the 20th century and was considered an outgrowth of trademark law. 312 According to Chafee the only important difference between trade names and trademarks was the eligibility for federal registration of the latter. 313 Handler and Pickett wrote that since trademarks and trade names functioned much the same in practice, there is no justification to discriminate the level of protection of one of the two. 314 Rogers observed: “The notion that there is ‘property’ in trademarks as a separate thing was once quite generally entertained and for a while it served well enough, but it was very soon perceived that a trader’s customers might be diverted by the imitation of things which were not trademarks and in which property rights could not be maintained, such as the misuse of personal names, descriptive words and the like.” 315

310

Hanover Star Milling Co., 240 U.S. (1916) at 412-13. “Trademark law is really just a part of the broader law of unfair competition.” Gasparek, supra note 205, at 795. 312 WALTER J. DERENBERG, TRADE-MARK PROTECTION AND UNFAIR TRADING 48 (1936), at 39-40. 313 Zechariah Chafee, Unfair Competition, 53 HARV. L. REV. 1289, at 1298 (1940). 314 “Whether or not there is property in trademarks or trade names seems to us a fruitless and unhelpful inquiry. Both types of mark frequently are the most valuable assets of a business. [ ] It is enough that plaintiff has a material interest which is worthy of protection. It does not matter much what label is tagged to it (..). The approach to the law of trade-marks would probably be more realistic if courts entirely abandoned the property notion.” Milton Handler & Charles Pickettt, Trade-Marks and Trade Names – An Analysis and Synthesis: II, 30 COLUM. L. REV. 168, 759, 776 (1930). 315 Edward Sidney Rogers, New Concepts of Unfair Competition under the Lanham Act, 38 TMR 259, 260 (1948). 311

68 Chapter 2.9.1.5 Legislation against trademark infringement The first federal trademark law was enacted on July 5, 1946: the Lanham Act. 316 The Lanham Act was introduced as a bill “to place all matters relating to trademarks in one statute and to eliminate judicial obscurity (..) and [to make] relief against infringement prompt and effective.” It promotes three policies: it prevents consumer confusion, 317 protects the goodwill of businesses, and encourages competition within the market. 318 There are two trademark registers in the U.S.: the Principal Register 319 if trademarks meet the qualifications, including that of distinctiveness. If not, they still can be listed on the Supplemental Register. 320 The protection for federal trademarks on the Principle Register is stronger than on the Supplemental Register or unregistered marks. If registered on the Principle Register, one can enforce one’s trademark against trademark infringement. § 43(a) Lanham Act also protects against violations of false advertising or unfair competition, 321 without the need to have a federally registered trademark. Rogers asserted that “[u]nder the modern law (..), unfair competition includes any act, not necessarily fraudulent, which artificially interferes with the normal course of trade to the disadvantage of another. There need be no competition if the artificial interference is present. It is true, of course, that most of the cases have arisen between competitors in business, but the fact of competition or its absence ought not to be controlling. It is the nature or the result of the act, not the occupation of the actor which should determine its character.” 322 The 1905 Trademark Act prevented registration of a mark that was likely to cause confusion with an already registered mark, but only if the marks were placed on goods of 316

The Lanham Act was passed on July 5, 1946 and was named after congressman Frederick (Fritz) Garland Lanham, representative for Texas and a Democrat. 317 The trademark infringement claim can be found in § 32(1) Lanham Act, 15 U.S.C. § 1114(1). 318 Fara S. Sunderji, Protecting Online Auction Sites from the Contributory Trademark Liability Storm: A Legislative Solution to the Tiffany Inc. v eBay Inc. Problem, 74 FORDHAM L. REV. 909, 917-18 (2005). 319 15 USC § 1051-1072. 320 15 USC § 1091-1096. To meet the requirement of some countries that require that the mark has been first registered in the home-country. 321 “Section 43(a) Lanham Act proscribes false statements or representations that are made in commercial advertising or promotion, are likely to deceive consumers, and are likely to cause injury to the plaintiff.” Court L. Reichman & M. Melissa Cannady, False Advertising Under the Lanham Act, 21 FRAN. L. J. 187, 187 (2002). 322 Rogers, supra note 315, at 262.

69 the “same descriptive properties” as those of the senior user. The Lanham Act of 1946 eliminated this requirement. Under the revised version of the Act, a junior user could not register or use a mark “in connection with the sale, offering for sale, or advertising of any goods or services on or in connection with which such use is likely to cause confusion or mistake or to deceive purchasers as to the source of origin of such goods or services.” 323 Handler and Pickett had already advocated in 1930 that all types of marks will be entitled to protection under the likelihood of confusion standard. 324

Chapter 2.9.1.6 Trademark infringement tests Although there are more tests, as will be pointed out below, the Polaroid test is still the most authoritative. In 1961 the Second Circuit formulated the Polaroid factors 325 to determine whether a likelihood of confusion exists: 326 (1) strength of plaintiff’s mark; (2) similarity of competing marks; (3) competitive proximity of the products; (4) likelihood that plaintiff will “bridge the gap” and offer a product like defendants’ product; (5) actual confusion; (6) defendants’ good faith; (7) quality of defendants’ product; (8) sophistication of the buyers. In 1962 Congress broadened the scope of the likelihood of confusion standard by removing the reference to “purchasers” in the statute. 327 It now prohibits all uses of a trademark that are “likely to cause confusion or to cause mistake or to deceive.” 328

323

Trademark Act of 1946, ch. 540, §43(a)(1)(A), 60 Stat. 444, 15 U.S.C. § 1125(a)(1)(A) (1946). Handler & Pickett, supra note 314. 325 Polaroid Corp. v Polarad Elecs. Corp., 287 F.2d 492, 495 (2d. Cir. 1961), cert. denied, 368 U.S. 820 (1961). 326 These factors must not be applied in a mechanical way, and the focus needs to be on whether consumers are likely to be confused. Nabisco, Inc. v Warner-Lambert Co., 220 F.3d 43, 46 (2d Cir. 2000). 327 S. Rep. No. 2107, 87th Cong., 2d Sess. 4, reprinted in 1962 U.S.C.C.A.N. 2844, 2847. 328 Since 1962 Lanham Act: 15 U.S.C. § 1125(a)(1)(A) (2006). 324

70 Congress also removed reference to confusion “as to the source of origin”, so now also confusion as to sponsorship or endorsement of a good or service are within the scope of protection and thus prohibited. 329 In 1979 the 9th Circuit came up with an eight factors balancing test for the likelihood of confusion: 330 (1) strength of the mark; (2) proximity of the goods; (3) similarity of the marks; (4) evidence of actual confusion; (5) marketing channels used; (6) type of goods and the degree of care likely to be exercised by the purchaser; (7) defendant’s intent in selecting the mark; (8) likelihood of expansion of the product lines. In 2000 the 7th Circuit used a slightly different seven factors balancing test: 331 (1) the similarity between the marks in appearance and suggestion; (2) the similarity of the products; (3) the area and manner of concurrent use of the products; (4) the degree of care likely to be exercised by consumers; (5) the strength of the complainant’s mark; (6) any evidence of actual confusion; (7) the defendant’s intent (or lack thereof) to palm off its product as that of another.

Chapter 2.9.1.7 Legislation against trademark dilution In contrast to what Schechter proposed, namely the protection of the distinctiveness of arbitrary or fancy marks, the U.S. legislator choose to only protect famous marks. 332 Rierson pointed out that Schechter did not intend that it would apply to words or terms that were not inherently distinctive: “His argument in favor of separating

329

S. Rep. No. 2107, 87th Cong., 2d Sess. 4, reprinted in 1962 U.S.C.C.A.N. 2844, 2847. AMF, Inc. v Sleekcraft Boats, 599 F.2d 341, 348-49 (9th Cir. 1979). 331 Eli Lilly & Co. v Natural Answers, Inc., 233 F.3d 456, 461-62 (7th Cir. 2000). 332 Beebe, supra note 222, at 1162-63. 330

71 the two classes of marks was in fact directly contrary to the definite trend in favor of conflating them.” 333 McClure characterised Schechter’s trademark dilution theory as a proposal to repropertise certain categories of trademarks. 334 Locke’s labour theory of property, 335 which argues that the fruits of one’s labour are one’s own because one has worked for it, cannot be employed according to Port, because the trademark holder has not exerted any work on the mark in non-competing markets. 336 However, Locke developed the homestead principle: one gains just ownership of an unowned resource by performing an act of original appropriation. It can be argued that to register and use a trademark in one product category can be seen as such an act of original appropriation for all categories. Property can be used in any way the property owner sees fit, 337 as long as it has no detrimental effects to society. Callmann, after Schechter one of the most prolific advocates of codifying the trademark dilution doctrine, asserted that “trade-mark infringement includes both “passing-off”, which is found when competitors infringe upon a mark, and “trespass of trademark property”, which is found most commonly when the infringing mark is used on non-competing goods.” 338 Since 1947 trademark dilution has been enacted in some of the U.S. states. 339 But only in 1995 Congress enacted the Federal Trademark Dilution Act (FTDA). 340

333

Rierson, supra note 216, at 9. Daniel M. McClure, Trademarks and Unfair Competition: A Critical History of Legal Thought, 69 TMR 320, 323-324 (1979). 335 LOCKE, supra note 302. 336 Kenneth L. Port, The ‘Unnatural’ Expansion of Trademark Rights: Is a Federal Dilution Statute Necessary?, 18 SETON HALL LEGIS. J. 433, 473-474, 487 (1994). 337 This can be compared to someone who claims land and uses it in one way, and does not have to allow anyone to exploit the same land in other ways that do not interfere with the exploitation of the activity of the land owner. 338 Callmann, supra note 264, at 465-466. 339 Massachusetts enacted the first dilution statute: Act of May 2, 1947, Ch. 307, § 7a, 1947 Mass. Acts 300 (codified as amended at MASS. GEN. LAWS ANN. Ch. 110H § 13 (West Supp. 2007)). Massachusetts was followed by New York, Illinois, and Georgia. Dilution materialized in state statutes as early as 1947, and many states still recognize a dilution cause of action. See: N.Y. GEN. BUS. LAW § 368-d (1961 N.Y. Laws 1806, 1813) (recodified at N.Y. GEN. BUS. LAW § 360-l (McKinney 1996 & Supp. 2008)); 140 ILL. COMP. STAT. ANN. ¶ 22 (West 1986) (superseded by 765 ILL. COMP. STAT. ANN. §§ 1036/5, 1036/65 (West 2001)); GA. CODE ANN. § 10-1-451 (2000). Robert G. Bone, Schechter’s Ideas in Historical Context and Dilution’s Rocky Road, 24 SANTA CLARA COMP. & HIGH TECH. L.J. 469, 497-504 (2008). 340 Federal Trademark Dilution Act of 1995, Pub. L. No. 104-98, § 4, 109 Stat. 985, 986 (codified at 15 U.S.C. § 1127 (2000). 334

72 Chapter 2.9.1.8 From FTDA to TDRA The FTDA was replaced by the Trademark Dilution Revision Act (TDRA) 341 after the Supreme Court had interpreted the FTDA in the Victoria’s Secret case 342 as having an actual dilution standard: after the District Court 343 decided to favour the dilution claim and the Sixth Circuit 344 confirmed, the Supreme Court reversed. There needed to be more than mere association between them to demonstrate that the defendant had “impaired the distinctiveness” of and thereby diluted plaintiff’s famous trademark. The actual dilution standard articulated in Victoria’s Secret was criticised by the holders of famous trademarks. Then, Congress amended the Act because of the Supreme Court’s decision 345 and passed the TDRA. § 43(c) U.S. Trademark Act of 1946, as amended by the TDRA of 2006, 346 is codified in U.S.C. Title 15 § 1125 347 and includes dilution by blurring 348 and tarnishment. 349 It modified the statutory language in a manner that effectively decreased the importance of mark similarity and increased the relevance of mark association in trademark dilution cases. In the next Victoria Secret’s case, the District Court 350 applied the likelihood of dilution standard, which was confirmed by the Sixth Circuit. 351

341

Trademark Dilution Revision Act of 2006, Pub. L. No. 109-312, § 2, 120 Stat. 1730 (codified at 15 U.S.C. § 1125(c) (2006). 342 Moseley v V Secret Catalogue, Inc. (01-1015) 537 U.S. 418 (2003) 259 F.3d 464, reversed and remanded. 343 V Secret Catalogue, Inc. v. Moseley, No. 3:98CV-395-S, 2000 WL 370525, at 1 (W.D. Ky. Feb. 9, 2000). 344 V Secret Catalogue, Inc. v Moseley, 259 F.3d 464, 476–77 (6th Cir. 2001). 345 As was pointed out in Starbucks Corp. v Wolfe’s Borough Coffee, Inc., 588 F.3d 97, 104 (2d Cir. 2009). 346 Trademark Dilution Revision Act (TDRA) of 2006 was implemented as a correction to the Supreme Court’s interpretation of the Federal Trademark Dilution Act of 1995 in Moseley v V Secret Catalogues, Inc., supra note 342. TDRA made clear that no actual trademark dilution was needed, but that a likelihood of trademark dilution was enough for protection. Famous mark was redefined as recognized by a member of the general public, instead of a member of a niche market. Also changed the fair use defense. See Chapter 6 “Trademark Dilution and Its Defences”. 347 Trademark dilution legislation, in the U.S. Title 15, Ch. 22, subCh. III, §1125, ‘False designations of origin, false descriptions, and dilution forbidden’ (c) Dilution by blurring, dilution by tarnishment. 348 U.S. Code, Title 15, Ch. 22, subCh. III, § 1125(c)(2)(B), see note 9. 349 Code, Title 15, Ch. 22, sub Ch. III, § 1125(c)(2)(C), see note 9. 350 V Secret Catalogue, Inc. v Moseley, 558 F. Supp. 2d 734, 750 (W.D. Ky. 2008). 351 V Secret Catalogue, Inc. v Moseley, 605 F.3d 382, 390 (6th Cir. 2010), cert. denied, 79 U.S.L.W. 3301 (U.S. Jan. 18, 2011) (No. 10-604).

73 Chapter 2.9.1.9 TDRA test for trademark dilution by blurring The six TDRA factors about what could constitute trademark dilution by blurring 352 are non-exclusionary: (1) The degree of similarity between the mark or trade name and the famous mark; (2) The degree of inherent or acquired distinctiveness of the famous mark; (3) The extent to which the owner of the famous mark is engaging in substantially exclusive use of the mark; (4) The degree of recognition of the famous mark; (5) Whether the user of the mark or trade name intended to create an association with the famous mark; (6) Any actual association between the mark or trade name and the famous mark. If one approaches the dilution doctrine from a relational perspective it makes sense that a mere association instead of likelihood of dilution can be damaging. If one associates oneself with the wrong kind of people, it reduces one’s reputation in the job market and might also decrease the opportunities one is getting in one’s career. In regard to dilution by tarnishment Horn criticised that when a defendant’s trademark has lewd or sexual associations a “likelihood of dilution” is presumed and must be rebutted by the defendant. 353 Under the TDRA, injunctive relief is the primary form of remedy. 354 Damages and attorney fees can be compensated by the defendant, in cases of “willful” dilution. 355

Chapter 2.9.2 Brief history relevant to EU legislation In the 1990s the EC harmonised the trademark, this led to the First Council Directive 89/104/EEC (Trademark Directive). 356 Harmonisation has made the differences between the rules in the separate EU member jurisdictions smaller. 357 However, it did not

352

15 U.S.C. § 1125(c)(2)(B). Greg Horn and Matthew Malm, Sex Changes Everything, But The Trademark Dilution Revision Act Shouldn’t: V Secret Catalogue, Inc. V. Moseley And The Burden Of Proof In Trademark Dilution Actions, 79 U. CIN. L. REV. 1583, 1584 (2011). 354 15 U.S.C. § 1125(c)(1). 355 15 U.S.C. § 1125(c)(5)(B)(i) and (ii). 356 Supra note 146. 357 Harmonisation of laws has been called the “dominant impulse” for international lawmaking initiatives. Timothy W. Blakely, Comment: Beyond The International Harmonization Of Trademark Law: The 353

74 lead to a uniform set of agreed rules. Rather, it merely “directs a change of rules, standards or processes in order to avoid conflicts and bring about equivalence.” 358 Which on its turn set the stage for unifying community trademark law into the Community Trademark Regulation. 359 Unification did eliminate the differences between the rules in the jurisdictions of the separate member countries of the EU for the community trademark.

Chapter 2.9.2.1 Legislation against trademark infringement One can observe an evolution in what can prevent a likelihood of confusion. It started with the precondition of a single undertaking that is the source of origin and who is in control of the quality of the products: “For the trade mark to be able to fulfil its essential role in the system of undistorted competition which the Treaty seeks to establish, it must offer a guarantee that all the goods or services bearing it have originated under the control of a single undertaking which is responsible for their quality.” 360 The requirement for a single undertaking was first that it had to be known, later the requirement sufficed that it be constant. The one responsible for the quality was broadened to economicallylinked undertakings in Canon Kabushiki Kaisha v Metro-Goldwyn-Meyer Inc. 361 As pointed out in Chapter 2.8.1 on the quality function, the interpretation of control over the quality has shifted from adequate to sufficient to minimal. Distinctiveness is part of the likelihood of confusion test. “[T]he distinctive character of the earlier trade mark, and in particular its reputation, must be taken into account when determining whether the similarity between the goods or services covered by the two trade marks is sufficient to give rise to the likelihood of confusion.” 362 It was established that there is a relation between the degree of similarity between goods or services of the sign and the trademark and the degree of similarity between the

Community Trade Mark As A Model Of Unitary Transnational Trademark Protection, 149 U. PA. L. REV. 309, 309 (2000). 358 George A. Zaphiriou, Unification and Harmonization of Law Relating to Global and Regional Trading, 14 N. ILL. U. L. REV. 407, 407 (1994). 359 Supra note 171. 360 HAG GF (HAG II) (Case C-10/89), Judgment of the ECJ, October 17, 1990, paras 13 and 14. 361 Canon Kabushiki Kaisha v Metro-Goldwyn-Meyer Inc (Canon Kabushiki Kaisha) (Case C-39/97), Judgment of the ECJ, September 29, 1998, para. 30. 362 Id., para. 24.

75 sign and the trademark. 363 In other words: if two entities use very similar signs but their products are very dissimilar it might be not confusing.

Chapter 2.9.2.2 Virgin Enterprises Ltd. v Bodtrade likelihood of confusion principles In La Chemise Lacoste SA v Baker Street Clothing Ltd. 364 Geoffrey Hobbs QC sitting as the Appointed Person quoted the following summary earlier used by Mr. Allan James in Virgin Enterprises Ltd. v Bodtrade 365 to give an overview of the principles established in regard whether a similar trademark for identical or similar products can coexist: (a) “the likelihood of confusion must be appreciated globally, taking account of all relevant factors; 366 (b) the matter must be judged through the eyes of the average consumer of the goods or services in question, 367 who is deemed to be reasonably well informed and reasonably circumspect and observant, 368 but who rarely has the chance to make direct comparisons between marks and must instead rely upon the imperfect picture of them he has kept in his mind, and whose attention varies according to the category of goods or services in question; 369 (c) the average consumer normally perceives a mark as a whole and does not proceed to analyse its various details; 370 (d) the visual, aural and conceptual similarities of the marks must normally be assessed by reference to the overall impressions created by the marks bearing in mind their distinctive and dominant components, but it is only when all other components of a

363

“[A] lesser degree of similarity between those goods or services may be offset by a greater degree of similarity between the marks, and vice versa.” Id., para. 17. 364 La Chemise Lacoste SA v Baker Street Clothing LTD, The Appointed Person (Geoffrey Hobbs, Q.C.): 128 R.P.C. 165 (2011). 365 Virgin Enterprises Ltd v Bodtrade 54 (Pty) Ltd (BL O-216/09; 23 July 2009). 366 SABEL BV v Puma AG (SABEL BV) (Case C-251/95), Judgment of the ECJ, November 11, 1997, para. 22. 367 Id., para. 23. 368 Gut Springenheide GmbH and Rudolf Tusky v Oberkreisdirektor des Kreises Steinfurt - Amt für Lebensmittelüberwachung (Case C-210/96), Judgment of the ECJ, July 16, 1998, para. 31. 369 Lloyd Schuhfabrik Meyer & Co. GmbH v Klijsen Handel BV (Case C-342/97) Judgment of the ECJ, June 22, 1999, para. 26. 370 SABEL BV, supra note 366, para. 6.

76 complex mark are negligible that it is permissible to make the comparison solely on the basis of the dominant elements; 371 (e) nevertheless, the overall impression conveyed to the public by a composite trade mark may, in certain circumstances, be dominated by one or more of its components; 372 (f) and beyond the usual case, where the overall impression created by a mark depends heavily on the dominant features of the mark, it is quite possible that in a particular case an element corresponding to an earlier trade mark may retain an independent distinctive role in a composite mark, without necessarily constituting a dominant element of that mark; 373 (g) a lesser degree of similarity between the goods or services may be offset by a great degree of similarity between the marks, and vice versa; 374 (h) there is a greater likelihood of confusion where the earlier mark has a highly distinctive character, either per se or because of the use that has been made of it; 375 (i) mere association, in the strict sense that the later mark brings the earlier mark to mind, is not sufficient; 376 (j) the reputation of a mark does not give grounds for presuming a likelihood of confusion simply because of a likelihood of association in the strict sense; 377 (k) if the association between the marks causes the public to wrongly believe that the respective goods [or services] come from the same or economically-linked undertakings, there is a likelihood of confusion.” The ECJ made clear in O2 v Hutchison (the “bubbles” case) 378 that the plaintiff can take action for trademark infringement in case of a likelihood of confusion, even in

371

Lloyd Schuhfabrik Meyer & Co GmbH v Klijsen Handel BV, supra note 369, para. 25. Matratzen Concord v OHIM Hukla Germany (MATRATZEN) (Case T-6/01), Judgment of the Court of First Instance, October 23, 2002, para. XXXV. 373 Medion AG v Thomson Sales Germany & Austria GmbH (Case C-120/04), Judgment of the ECJ, October 6, 2005, paras 35-37. 374 SABEL BV v Puma AG, supra note 366, para. 22. 375 Canon Kabushiki Kaisha, supra note 361, para. 24. 376 SABEL BV, supra note 366, para. 26. 377 Marca Mode CV v Adidas AG (Case C-425/98), Judgment of the ECJ, June 22, 2000, para. 41. 378 O2 Holdings Ltd and O2 (UK) Limited v Hutchison 3G Limited (C-533/06) Judgment of the ECJ, June 12, 2008. 372

77 respect of a comparative advertisement. Beside, a plaintiff can bring a complaint under the current Misleading and Comparative Advertising Directive. 379

Chapter 2.9.2.3 Legislation against trademark dilution Although the word dilution cannot be found anywhere in directive nor regulation, the doctrine to protect marks with a reputation against use on dissimilar goods or services as taking unfair advantage of or causing detriment to the distinctive character or repute of the trademark can be found in both: Article 5(2) Trademark Directive, 380 and its equivalent: Article 9(1)(c) Community Trademark Regulation. 381 In a case between the competitors Puma v Sabel, 382 the ECJ rejected the interpretation that a likelihood of association meant that the accused mark merely calls to mind the senior mark and that the concept of likelihood of association is not an alternative to that of likelihood of confusion, but serves to define its scope. 383 In Davidoff v Gofkid the ECJ decided that member states can also allow action against a competitor for causing detriment to, or taking unfair advantage of the distinctive character or repute of a trademark, rather than someone who uses the sign on dissimilar goods or services. 384 Article 5(2) Trademark Directive 385 “cannot be given an interpretation which would lead to marks with a reputation having less protection where a sign is used for identical or similar goods.” 386 In Intel v CPM the ECJ could not find any likelihood of confusion. 387 However, it decided that causing detriment to the distinctive character of the mark is actionable when: “Such detriment is caused when that mark’s ability to identify the goods or services for which it is registered and used as coming from the proprietor of that mark is weakened, 379

Misleading and Comparative Advertising Directive 2006/114/EC. Supra note 146. 381 Council Regulation 40/94, supra note 171, and updated by Council Regulation (EC) No 207/2009 of February 26, 2009 on the Community trade mark. 382 SABEL BV, supra note 366, para. 26. 383 SABEL BV, idem, at para. 18. Also Canon Kabushiki Kaisha, supra note 361. 384 Davidoff & Cie SA and Zino Davidoff SA v Gofkid Ltd. (Davidoff) (Case C-292/00), Judgment of the ECJ, January 9, 2003. 385 Trademark Directive, supra note 146. 386 Davidoff, supra note 384, para. 25. Adidas-Salomon AG and Adidas Benelux BV v Fitnessworld Trading Ltd. (Adidas v Fitnessworld), (C-408/01), Judgment of the ECJ, October 23, 2003, confirmed Davidoff in paras. 14, 16 and 19. 387 Intel Corporation Inc. v CPM United Kingdom Ltd. (Intel v CPM) (Case C-252/07), Judgment of the ECJ, November 27, 2008. 380

78 since use of the later mark lead to dispersion of the identity and hold upon the public mind of the earlier mark. That is notably the case when the earlier mark, which used to arouse immediate association with the goods and services for which it is registered, is no longer capable of doing so.” 388 The ECJ in Intel v CPM also held that in order to prove detriment to the distinctive character of the mark with a reputation, the proprietor must present evidence of a change in economic behaviour of the average consumer of the earlier goods or services as a consequence of the use of the later mark, or a likelihood that such a change will occur in the future. 389 L’Oréal v Bellure was about comparison lists of smell-alike perfumes. 390 The ECJ decided: “Since, under Directive 84/450, comparative advertising which represents the advertiser’s products as an imitation of a product bearing a trade mark is inconsistent with fair competition and thus unlawful, any advantage gained by the advertiser through such advertising will have been achieved as the result of unfair competition and must, accordingly, be regarded as taking unfair advantage of the reputation of that mark.” 391 In Interflora the mere fact that a competitor uses an identical sign with the trademark in relation to services identical for which that mark is registered, forces a trademark holder to intensify its advertising in order to maintain or enhance its profile with consumers is not a sufficient basis, in every case, for concluding that the trade mark’s advertising function is adversely affected. 392 According to the CJEU: the trademark holder is not protected against practices inherent in competition and keyword advertising as a general rule is deemed as “merely to offer internet users alternatives to the goods or services of the proprietors of those trade marks.” 393 In Interflora, Marks & Spencer (M&S) selected keywords, including Interflora.com. 394 It can be argued that a website address, which literally indicates the 388

Id. Jukka Palm, “The ECJ’s puzzling concept of a “change in economic behaviour”, Brands in the Boardroom 2009, IAM-Magazine, 20 (2009). 390 L’Oréal v Others, supra 230. 391 Id., para. 79. 392 Interflora, supra note 263, at para. 57. 393 Google France, supra note 230, para. 69, Interflora, supra note 263, para. 58. 394 Using Google’s AdWords referencing service, M & S selected as keywords the word ‘Interflora’, as well as variants made up of that word with minor errors and expressions containing the word ‘Interflora’, including: ‘Interflora.com’. “Consequently, when internet users entered the word ‘Interflora’ or one of 389

79 origin and should link to that source, leaves no doubt as to where the internet user wants to go. But instead of linking the internet user to Interflora.com, the M&S advertisement or M&S website was triggered, something the CJEU did not qualify as an adverse effect on the source of origin function of the trademark, nor a likelihood of confusion. However, an empirical research by Bechtold and Tucker showed that instead of shortening the search process, the use of trademarks in keyword triggered advertising caused people to need more time to find the brand, which suggests that it adversely affects the source of origin function of the trademark. 395 According to the CJEU in Interflora the trademark holder should accept the situation in which his trademark is used “in conditions of fair competition that respect the trademark’s function as an indication of origin” 396 and where the only consequence is that the trademark holder is obliged “to adapt its efforts to acquire or preserve a reputation of that trademark capable of attracting consumers and retaining their loyalty.” 397 That some consumers are prompted to switch from the trademark holder to competitors is all in the game and part of fair competition. 398

those variants or expressions as a search term in the Google search engine, an M & S advertisement appeared under the heading ‘sponsored links’.” Interflora, supra 263, para. 18. 395 Stefan Bechtold and Catherine Tucker, Trademarks, Triggers and Online Search, Working Paper, December 2012. Presentation at Overlapping IP Rights: The Rise of Functional and Empirical Perspectives, Conference "Searching for the Boundaries of Intellectual Property Law", Universities of Hong Kong, December 15, 2012. 396 Interflora, supra note 263, para. 64. 397 Id. 398 Id.

80

Chapter 3 Protagonists of the Legal Conflict Why all parties affected to the conflict would equally gain by its dissolvement Introduction As Chapter 2 set out the stage of the legal conflict, this Chapter introduces the perspective, interests and idiosyncrasies of each of the protagonists: trademark holders (Chapter 3.1), social media providers (Chapter 3.2) and internet users (Chapter 3.3). The trademark logo connects each of this trinity of stakeholders to each other via the trademark logo (Chapter 3.4).

Chapter 3.1 Trademark holders The trademark holder, trademark and brand, although often used interchangeably in common parlance, each have their own specific meaning, measures and scope. The brand is the perception people experience when they come into contact with the trademark of the trademark holder. 399 Marketing author Godin succinctly stated the definition of a brand as a “set of expectations, memories, stories and relationships that, taken together, account for a consumer’s decision to choose one product or service over another.” 400 A definition of a trademark holder could simply be an entity that has either registered or acquired a registered trademark. Licensees, including internet users, that use the trademark in an authorised way, are not considered trademark holders, since they do not have the right to alienate the trademark. Trademark holders identify themselves and are publicly identified by their trademark.

399

“A brand is a set of associations linked to a name, mark, or symbol associated with a product or service” and “are created through a wide range of touch points; every time customers interact with a brand they form associations.” Tim Calkins, The Challenge of Branding, in KELLOG ON BRANDING (Tim Calkins and Alice Tybout, eds. 2005) at 1.1. 400 Seth Godin, “Define: Brand”, December 13, 2009, available at: http://sethgodin.typepad.com/seths_blog/2009/12/define-brand.html (accessed August 9, 2013).

81 A set out in Chapter 2, the trademark is a sign that is distinctive or has become distinctive and has been registered at the designated trademark office.

Chapter 3.1.1 Trademark holder’s interests The interests of the trademark holder are complex: the trademark holder does not want to allow that the functions of the trademark are to be infringed and diluted. On the one hand trademark holders can become enthusiastic if internet users refer to their mark on social media in a positive way. On the other hand, trademark holders do not approve if internet users refer to their trademark in a negative way. Also, even if internet users have good intentions, they might use the trademark in new ways. This can precipitate a resignification of the trademark, so that trademark holders de facto lose control over their trademarks. Trademark holders try to prevent this from happening outside of the boundaries they have set. This could be the case when competitors use their trademark in a descriptive way to promote their competing or non-competing product or service, or in comparative advertising, or when internet users use their trademark for parody, satire or to make critical comments (see Chapter 6 “Trademark Dilution and Its Defences”). So on the one side it is in the trademark holders’ interest to mitigate the space in which their trademark is used without their permission. On the other side each potential trademark holder needs to have the freedom to find a suitable name for his trademark and promote their products using descriptive words in advertisements that might already be claimed by other trademark holders, so it is in their interest to maximise the space that fair competition can flourish. Therefore a balance needs to be struck between these contradictory forces. A trademark holder was once considered to be the exclusive source to which his trademark refers. Then licensees were authorised to use the trademark, so that they too could be the source to which the trademark refers, which necessitated the abandonment of this idea of exclusive reference. 401 For the trademark holder the value is predominantly in the trademark, not in the product itself. Curtis is quoted saying that “[i]f all

401

See Chapter 2.8.1 “Source of origin”.

82 of Coca Cola’s assets were destroyed overnight, whoever owned the Coca-Cola name could walk into a bank the next day morning and get a loan to rebuild everything.” 402 Although often not exclusive anymore, the link between trademark holder and trademark still exists. The trademark enables that the policy in regard to for example corporate social responsibility or sustainability can be traced back to the trademark holder. Thus, the trademark facilitates accountability of the trademark holder. 403 In this sense, the trademark not only gives trademark holders a face, but also makes it possible for them to lose their face. The activities of trademark holders vary widely, from for-profit companies to non-profit organisations, and from holders of well-known marks, 404 service marks, 405 collective marks 406 to certification marks. 407 The latter category might even be defined so as to include geographical indications. 408 Although trademark holders have such different backgrounds, and can be each other’s competitors, they have demonstrated the ability to form a powerful lobbyist and interest groups. 409 If trademark holders, who are of course the main advertisers on social media, would unite in the fight against infringement of their trademark logos on social media sites, they would be a formidable force to advocate a paradigm change to protect and enforce their trademark logo on social media. 410

402

Carlton Curtis, VP Corporate Communications, Coca Cola. Laurent Muzellec, What is in a Name Change? Re-Joycing Corporate Names to Create Corporate Brands, 8 CORP. REPUTATION REV. 305 (2006). 403 See Ch. 2.8.5 “Accountability”. 404 Article 6bis Paris Convention, supra note 137. 405 Article 6sexies Paris Convention, id. 406 “A collective membership mark is a mark adopted for the purpose of indicating membership in an organized collective group, such as a union, an association, or other organization. Neither the collective nor its members uses the collective membership mark to identify and distinguish goods or services; rather, the sole function of such a mark is to indicate that the person displaying the mark is a member of the organized collective group.” Geographical Indication Protection in the United States, United States Patent and Trademark Office, p 5. Article 7bis Paris Convention, supra note 137. 407 The owner of a certification mark does not use it. A certification mark does not indicate commercial source nor distinguish the goods or services of one person from those of another person. Certification marks are only source-identifying in the sense that they identify the nature and quality of the goods and affirm that these goods have met certain defined standards. Geographical Indication Protection in the United States, United States Patent and Trademark Office, p 3. 408 Articles 22 and 23 TRIPS, supra note 161. 409 Examples are: International Trademark Association (INTA), American Intellectual Property Law Association (AIPLA), European Communities Trade Mark Association (ECTA). 410 How trademark holders use social media themselves will be dealt with in Chapter 3.3.6.

83 Trademark holders play a crucial role in society, and not only because they offer a product or service of a certain quality411 and reputation that people recognise and sometimes even want to identify with. 412 They also provide a source of employment, which can stretch multiple generations. In contrast to all other intellectual property rights, trademark rights can be extended indefinitely. In fact, some trademark holders continue to thrive on trademarks registered in the late 19th century. 413

Chapter 3.2 Social media provider The social media provider is, next to the internet user and trademark holder, the newest of the trinity of protagonists of the legal conflict, as social media is a relatively new phenomenon this section describes at length several aspects of social media. First it classifies and describes the functions of the dominant social media services, before providing a brief history of the social media phenomenon and the commonalities of social media providers. Next the section analyses the terms of service and community guidelines of five important examples of social media sites: Facebook, Twitter, YouTube, Flickr and Pinterest. The section will look at issues of ownership and responsibility of these social media providers, the differences between measures taken to protect thirdparties against intellectual property rights infringements and the policies they set up to protect their own intellectual property rights. Finally, the section discloses what procedures are put in place in case of trademark infringements, and to compare these findings to cases of copyright infringements.

Chapter 3.2.1 Classification social media “Social Media is a group of Internet-based applications that build on the ideological and technological foundations of Web 2.0, and that allow the creation and exchange of User Generated Content.” 414 Web 2.0, as the ideological and technological 411

See Chapter 2.9.2.1 “Communication”. Drescher, supra note 42, at 309. 413 The Bass Red Triangle was the first trademark logo to be registered under the UK's Trade Mark Registration Act of 1875, as trade mark number 1. Filing date, January 1, 1886. Next renewal date, January 1, 2022, available at: http://www.ipo.gov.uk/tm/t-find/t-find-number?detailsrequested=C&trademark=1 (accessed August 9, 2013). 414 Andreas M. Kaplan and Michael Haenlein, Users of the world, unite! The challenges and opportunities of Social Media, 53 BUSINESS HORIZONS 59, 61 (2010). A definition of User Generated Content (UGC) 412

84 foundation of social media, became popular after the O’Reilly Media Web 2.0 conference in 2004. 415 Prashant described Web 2.0 as a concept that takes the network as a platform for information sharing, interoperability, user-centred design and collaboration on the World Wide Web. 416 The inventor of the World Wide Web, Tim Berners-Lee described Web 2.0 as jargon; he argued that the web is “a collaborative medium, a place where we all meet and read and write.” 417 Social media are provided on a growing arsenal of digital platforms, such as PCs, tablets and smart phones, and accessed with an internet connection. Kaplan and Haenlein classified social media sites according to theories in the field of media research: 418 social presence, media richness, social processes, self-presentation and self-disclosure. These theories might help explain why some intrinsic features of some social media sites are more prone to stimulate the use of unauthorised trademark logos: Short, Williams and Christie defined social presence as the “acoustic, visual, and physical contact that can be achieved” between two communication partners. 419 Social presence takes intimacy (interpersonal versus mediated) and immediacy (asynchronous versus synchronous) of the medium into account. They assert that the higher the social presence, the larger the social influence is that the communication partners have on each other’s behaviour. If someone with high social influence has uploaded an unauthorised trademark logo on his social media page, changes are higher that his connections will share this trademark logo on their social media pages.

could be: content that is published on publicly accessible websites or social networking sites accessible to selected groups, demonstrating some creative effort and created outside of professional routines and practices. OECD, “Participative Web: User-Created Content”, document DSTI/ICCP/IE(2006)7/Final, dated April 12, 2007. 415 Tim O’Reilly, “What is Web 2.0”, September 30, 2005, available at: http://oreilly.com/pub/a/web2/archive/what-is-web-20.html (accessed August 9, 2013). 416 Prashant Sharma, “Core Characteristics of Web 2.0 Services”, TechPluto, November 28, 2008, available at: http://www.techpluto.com/web-20-services/ (accessed August 9, 2013). 417 “developerWorks Interviews: Tim Berners-Lee”, August 22, 2006, available at: http://www.ibm.com/developerworks/podcast/dwi/cm-int082206txt.html (accessed August 9, 2013). 418 Kaplan and Haenlein, supra note 414, at 61. 419 J. SHORT et al., THE SOCIAL PSYCHOLOGY OF TELECOMMUNICATIONS (Hoboken, NJ: John Wiley & Sons, Ltd. 1976).

85 Daft and Lengel proposed media richness as a way to measure the degree in which communication can resolve ambiguity and reduce uncertainty. 420 Most social media sites now include the feature to post pictures, including unauthorised trademark logos. Goffman developed the concept of self-presentation, which asserts that people in any type of social interaction have the desire to control the impressions other people form of them. 421 Schau and Gilly defined self-disclosure as “the conscious or unconscious revelation of personal information consistent with the image one would like to give.” 422 In other words self-presentation plus unconscious revelation of personal information is self-disclosure. The more a social media site allows self-disclosure, the higher the chances are that unauthorised trademark logos are uploaded for their status signalling properties (see Introduction, V Literature review, iv Status signalling properties).

Chapter 3.2.2. Functions of social media Kaplan and Haenlein distinguished between the following social media: 423 in collaborative projects such as Wikipedia; blogs such as Blogger; content communities such as YouTube; social networking sites such as Facebook; virtual game worlds such as massively multiplayer online role-playing games such as Blizzard Entertainment’s World of Warcraft and NCsoft’s Lineage, and; virtual social worlds such as Linden Lab’s Second World. 424 This thesis will not take into account collaborative projects, nor virtual game worlds or virtual social worlds. Blog service providers, such as Blogger, can be defined as platforms where internet users, after registering and logging in, can add or edit content on their website, in reversed chronological order, which includes time stamps. 425 Many blogs have a high

420

R.L. Daft & R.H. Lengel, Organizational information requirements, media richness, and structural design, 32 MANAGE. SCI. 554(1986). 421 E. GOFFMAN, THE PRESENTATION OF SELF IN EVERYDAY LIFE (New York: Doubleday Anchor Books 1959). 422 H.J. Schau & M.C. Gilly, We are what we post? Selfpresentation in personal web space, 30 J. CONS. RES. 385 (2003) 423 Kaplan and Haenlein, supra note 414, at 61. 424 Id. 425 In August 23, 1999 Blogger was created by Pyra Labs. In February 2003 it was bought by Google under undisclosed terms.

86 degree of self-presentation and self-disclosure and low social presence and media richness. Videos and music can be uploaded by internet users that register and log in. They can be watched by everybody or only people that subscribed to a channel or only people that have the link to the video. YouTube is the dominant video sharing site. 426 Kaplan and Haenlein classified YouTube as low in self-presentation/self-disclosure and as mediate in social presence and media-richness. 427 However, one can argue that the self-presentation/self-disclosure ranges from factual videos to exhibitionistic videopods. Pinterest is a virtual pinboard that can be shared. 428 Flickr is a photo sharing site where internet users can upload photos and video, edit images and organise content. 429 Then there is a kind of mix between blogging and social networking, also known as microblogging. Each “tweet” is limited to 140 characters. Twitter is the dominant microblogging site. 430

Chapter 3.2.2.1 Social networking Boyd and Ellison 431 defined social network sites, which include Facebook, 432 LinkedIn 433 or Google+ 434 as: “[W]eb-based services that allow individuals to (1) construct a public or semi-public profile within a bounded system, 426

YouTube was created in February 2005. In November 2006 it was bought by Google for 1.65 billion U.S. dollar. 427 Kaplan and Haenlein, supra note 414, at 61. 428 Pinterest was launched in 2009. In 2012 it has over 12 million users. It raised 100 million U.S. dollars and was valued 1 to 1.5 billion U.S. dollars. Lauren Indvik, “Confirmed: Pinterest Raises $ 100 Million to Fund International Expansion”, Mashable Business, May 17, 2012, available at: http://mashable.com/2012/05/17/pinterest-120-million/ (accessed August 9, 2013). 429 Flickr is a photo sharing site, created by Ludicorp in 2004 and acquired by Yahoo! in 2005. Flickr had 51 million registered members and 80 million unique visitors in June 2011. “Flickr – Advertising Solution”, Yahoo!. After June 2011, available at: http://advertising.yahoo.com/article/flickr.html (accessed August 9, 2013). 430 Twitter, a microblogging site, was launched in March 2006. It has more than 500 million users in 2012. 431 D.M. Boyd and N.B. Ellison, Social network sites: Definition, history, and scholarship. 11 J. COMPUT.MEDIAT COMM. 210 (2007). 432 Facebook was launched February 2004. May 2012 Facebook had 900 million users. May 18, 2012 it went public at NASDAQ and raised around 16 billion U.S. dollar. In 2012 Facebook passed 1 billion monthly active users. Zack Whittaker, “Facebook hits 1 billion active user milestone”, CNET, October 4, 2012, available at: http://news.cnet.com/8301-1023_3-57525797-93/facebook-hits-1-billion-active-usermilestone/ (accessed August 9, 2013). 433 LinkedIn was launched in May 2003. In 2010 LinkedIn had 47.6 million users. May 19, 2011 LinkedIn went public and raised 352.8 million U.S. dollar. LinkedIn is focusing on linking professional connections. 434 Google+ was launched June 28, 2011. In June 2012 it had 250 million registered users.

87 (2) articulate a list of other users with whom they share a connection, and (3) view and traverse their list of connections and those made by others within the system. The nature and nomenclature of these connections may vary from site to site.” 435 In all cases, users of all social network sites can see a stream of updates from their connections. Of course, some differences exist: i.e. Facebook users can select Facebook Timeline 436 to tell their life story with pictures, films and stories; LinkedIn users can show their professional profile, including recommendations; Google+ provides “hangouts”, 437 which enables a group to chat via video. Social networking has a high degree of self-presentation/self-disclosure and medium degree of social presence and media-richness.

Chapter 3.2.3 Brief history of social media services Before the adoption of social media sites by mainstream internet users, there were already some sites such as The WELL 438 in 1985 and GeoCities 439 in 1994, experimenting with elements that were later included in other social media sites. In 2002, Friendster emerged as the dominant social networking site, followed by MySpace, 440 and Bebo in 2005. 441 Launched in 2003, LinkedIn provided a site for networking professionals. 442 Facebook, was launched in 2004, initially limited to the U.S. college 435

Boyd and Ellison, supra note 431. A demonstration of Facebook Timeline, available at: http://www.facebook.com/about/timeline (accessed August 9, 2013). 437 Google+ Hangouts plugin, available at: http://www.google.com/tools/dlpage/res/talkvideo/hangouts/ (accessed August 9, 2013). 438 The WELL is an abbreviation for Whole Earth ‘Lectronic Link and was based on a bulletin board system. According to Rheingold it is the first virtual community. HOWARD RHEINGOLD, THE VIRTUAL COMMUNITY: HOMESTEADING ON THE ELECTRONIC FRONTIER (Addison-Wesley Publishing Company, Reading, MA, 1993). 439 GeoCities was founded in 1994. One could build a website, “homestead”, in one of 29 virtual neighbourhoods. In 1999 it was the third most visited site on the World Wide Web. In 2009 it was bought by Yahoo!. The free service was closed down on October 26, 2009. See “Why did GeoCities close down, Yahoo!”, April 24, 2012, available at: http://help.yahoo.com/l/us/yahoo/geocities/close/close01.html;_ylt=ApHd2xR2VGNeoKi6ZFn.7QRWFHdG (accessed August 9, 2013). 440 In 2005 MySpace, which was focusing on entertainment. It was getting more page views than Google in 2006. It was acquired by News Corp. in July 2005 for 580 million U.S. dollar. Between 2005 and early 2008 it was the dominant social network. As of June 2012 it was ranked 161st by total internet traffic. 441 March 13, 2008, Bebo was bought for 850 U.S. dollar by AOL. “AOL Acquires Bebo Social Network”, BBC News, March 13, 2008, available at: http://news.bbc.co.uk/2/hi/business/7294174.stm (accessed August 9, 2013). 442 Wikipedia legend “LinkedIn”, available at: http://en.wikipedia.org/wiki/LinkedIn (accessed August 9, 2013). 436

88 community. In 2006, Facebook opened up, and in early 2008 it became the dominant social network. One can safely assert that U.S. social media dominate social media globally, with the exception of the People’s Republic of China where they are banned and substituted with Chinese versions of social media. 443

Chapter 3.2.4 Commonalities among social media providers One thing that social media services, also known as Web 2.0 applications, 444 have in common is that they are based on user-generated content communicated to a network of users. Internet users have different possibilities at the respective social media sites in regard to the visibility and access of their profile. The size of this network of users to which certain content can be shared can also be selected. 445 Social media providers have enabled internet users to share unmediated content, including advertisements. The implications of this enablement to share will be disclosed in detail in Chapter 7 “Intermediary liability”. The sharing of content can even take place between different social media services. For example there are deals between different social media service providers and there are independent service integrators that connect social media services. This interoperability increases the distribution, extent and rate of content, including contentious content (see Chapter 4.1.3 “Proliferation, scale and speed of contentious content”). Another shared characteristic is that they are walled gardens, which means that they can set their own rules within the space that can be accessed by internet users that have agreed to their shrink wrapped agreements. These aspects of social media sites will be elaborated in Chapter 9 “Paradigm shift”.

443

Danny Friedmann, Rise and demise of U.S. social media in China, A touchstone of WTO and BIT regulations (Sept. 2011), CHINA’S INFLUENCE ON NON-TRADE CONCERNS IN INTERNATIONAL ECONOMIC LAW, (Paolo Farah, ed., forthcoming 2012). 444 “A group of Internet-based applications that build on the ideological and technological foundations of Web 2.0, and that allow the creation and exchange of user-generated content.” Kaplan and Haenlein, supra note 414. 445 In Facebook for example one can decide whether everybody has access to one’s Facebook page has, or one’s friends or friends and the friend’s friend. In Google+ one can select varying circles of people to select the group with whom wants to share content.

89 As the respective social media sites evolve, a convergence between the different functions can be observed. Internet users can now share pictures and videos on microblogging site Twitter without leaving the site; Facebook has chat functionality just like chat applications such as Skype; and one can share pictures on Skype. One can add a contact/connection/friend on a social media site if that party agrees. Generally one can register uni-directionally at a blog as a fan, or at Twitter as a follower 446 and reciprocity is not needed. The business model of social media providers is based on three sources: a stream of revenues of advertisements; data on the behaviour and content of the users; and gaming applications.

Chapter 3.2.5 Ownership of and liability in relation to user-generated content Below the situation in regard to ownership and liability of intellectual property infringement will be assessed for the popular sites of Facebook, Twitter, YouTube, Flickr and Pinterest.

Facebook Facebook’s Terms of Service 447 state that content covered by intellectual property the internet user is giving permission to Facebook to grant it a “non-exclusive, transferable, sub-licensable, royalty-free, worldwide license to use any IP [intellectual property] content” that the internet user posts on or in connection with Facebook and constitutes an IP License. This IP License ends when the internet user deletes his IP content or its account, unless his content has been shared with others, and they have not deleted it. 448

446

Unless the permission to follow is selected by the Twitter user. In that case the follower can also send direct messages. 447 Statement of Rights and Responsibilities, Facebook’s Term of Service, June 8, 2012, available at: http://www.facebook.com/legal/terms (accessed August 9, 2013). 448 2.1. id.

90 Twitter The internet user retains his rights to any content he submits, posts or displays on or through the services. By submitting, posting or displaying content on or through the services, the internet user grants Twitter “a worldwide, non-exclusive, royalty-free license (with the right to sublicense) to use, copy, reproduce, process, adapt, modify, publish, transmit, display and distribute such Content in any and all media or distribution methods (now known or later developed).” 449 The internet user can terminate the license when he pleases, but the responsibility of having submitted the content will continue. 450

YouTube The “Content on the service”, and the trademarks, service marks and logos on the Service, are owned by or licensed to YouTube, subject to copyright and other intellectual property rights under the law. 451

Flickr Since Flickr is part of Yahoo!, the Terms of Service of Yahoo! are applicable. Yahoo! Terms of Service specifies that members are solely responsible for any content that they transmit using their service. If an internet user submits or makes available content to a service of Yahoo!, it does not claim ownership of content, but these actions will grant Yahoo! a worldwide, royalty-free and non-exclusive license. 452 The license with respect to photos, graphics, audio or video, only exists for the purposes of the specific group, in this case Flickr and as long as the internet user elects to continue to include his content. It will terminate when he removes or Yahoo! removes such content. Over other content Yahoo! Services other than Yahoo! Groups, for example Flickr, will keep the perpetual, irrevocable and fully sub-licensable license to use, distribute, reproduce, modify, adapt, publish, translate, publicly perform and public display such

449

5. Your Rights, Terms of Service Twitter, June 25, 2012, available at: http://twitter.com/tos/ (accessed August 9, 2013) . 450 10. Ending These Terms, id. 451 5.A. Terms of Service YouTube, June 9, 2010, available at: http://www.youtube.com/static?gl=US&template=terms (accessed August 9, 2013). 452 9. Content submitted or made available for inclusion on the Yahoo! Services, Terms of Service Yahoo!, available at: http://info.yahoo.com/legal/us/yahoo/utos/utos-173.html (accessed August 9, 2013).

91 content and to incorporate such content in other works in any format or medium now known or later developed.

Pinterest In the Terms of Service 453 of Pinterest one can find that the internet user retains its all content he or she pins or posts. 454 The users grant Pinterest a “non-exclusive, royalty-free, transferable, sub-licensable, worldwide license” to use the User Content. 455 Pinterest may retain the User Content for a commercially reasonable period of time and may retain and continue the User Content that is re-pinned by others. 456

Chapter 3.2.6 Prohibition to infringe intellectual property rights of third-parties Each social media provider prohibits intellectual property infringement by the internet users. All make clear that they are not responsible for any IP infringement by the users. Again the situation at the social media Facebook, Twitter, YouTube, Flickr and Pinterest will be assessed.

Facebook “We respect other people's rights, and expect you to do the same.” 457 Internet users should not post content that infringes someone else’s rights. 458 If Facebook removes the internet user’s content “for infringing someone else’s copyright” and the internet user believes Facebook removed it by mistake, it will provide the internet user with an opportunity to appeal. 459 The Statement of Rights and Responsibilities remains silent about the possibility of internet users to appeal a removal of alleged infringed trademarks. If an internet user repeatedly infringe other people’s intellectual property rights, Facebook will disable his account “when appropriate”. 460 453

Pinterest Terms of Service, effective April 6, 2012, available at: http://pinterest.com/about/terms/ (accessed August 9, 2013). 454 Last sentence of 1.a. Terms of Service Pinterest: “You retain all of your rights in all of the User Content you post to our Service,” id. 455 1.b, id. 456 1.c, id. 457 5.1 Statement of Rights and Responsibilities Facebook, supra note 447. 458 5.1, id. 459 5.4, id. 460 5.5, id.

92 Twitter On Twitter, the internet user is responsible for the use of the services, for any content he posts to the services, and for any consequences thereof. 461 According to the Terms of Service the content is “the sole responsibility of the person who originated such content.” Twitter states that they may not monitor or control the content posted via the services and, that they cannot take responsibility for such content. 462

YouTube In the Terms of Service 463 it is stated that the one who uploads content is solely responsible for the content and the consequences of submitting and publishing this content. Internet users should affirm, represent, and warrant that they own or have the necessary licenses, rights, consents, and permissions to publish content they submit. Internet users agree to license to YouTube “all patent, trademark, trade secret, copyright or other proprietary rights in and to such content for publication.” YouTube Community Guidelines require internet users to respect copyright and to only upload videos that the internet user made or that he is authorised to use. 464 Internet users agree “not to circumvent, disable or otherwise interfere with security-related features of the service or features that prevent or restrict use or copying of any content or enforce limitations on use of the service or the content therein.” 465 YouTube is suggesting that because of its exposure to content from a variety of sources it is not responsible for the accuracy, usefulness, safety, or intellectual property rights of or relating to such content. 466 The internet user must agree to indemnify YouTube to the fullest extent allowed by the law.

461

1. Basic Terms, Terms of Service, Twitter, June 25, 2012, supra note 449. 4. Content on the Services, id. 463 6 B Terms of Service YouTube, supra note 451. 464 th 5 bullet point YouTube Community Guidelines, available at: http://www.youtube.com/t/community_guidelines (accessed August 9, 2013). 465 5C Terms of Service Youtube, supra note 451. 466 “You understand that when using the Service, you will be exposed to Content from a variety of sources, and that YouTube is not responsible for the accuracy, usefulness, safety, or intellectual property rights of or relating to such Content.” 5.D. Terms of Service YouTube, supra note 451. 462

93 Flickr Members of the Yahoo! Services, of which Flickr is part, agree not to “upload, post, email, transmit or otherwise make available any Content that infringes any patent, trademark, trade secret, copyright or other proprietary rights” of any party. 467 Interestingly, the Flickr Community Guidelines 468 categorically prohibit that internet users use their account to host web graphics, such as logos and banners. Sanctions can be a warning or deletion of the account.

Pinterest “Pinterest values and respects the rights of third party creators and content owners, and expects” internet users to do the same. Internet users agree that any User Content that they post does not infringe intellectual property rights. 469 Pinterest is alleging that the internet user is in the best position to know whether it is legally allowed to post the content. 470 This thesis does not agree: an automatic check by the social media site before uploading the content about the status of the content in their database would avoid problems, see Chapter 9 “Paradigm shift”. To also ask internet users to be careful even if they have found the content on Pinterest and want to re-pin it 471 seems unreasonable in light of Pinterest’s insistence on a continuous right to let other internet users re-pin all content that has been posted or pinned. One might expect that at some point Pinterest would take its responsibility and check the status of the content whether it is legally allowed.

Chapter 3.2.7 Social media providers’ policy to protect their own intellectual property Social media providers are strict when protecting and enforcing their own intellectual property rights. The contrast of their stance in regard to the intellectual

467

f. heading “You agree not to use the Yahoo! Services to:”, Terms of Service Yahoo!, supra note 452. Flickr Community Guidelines, available at: http://www.flickr.com/help/guidelines/ (accessed August 9, 2013). 469 1.d. ii Terms of Service Pinterest, supra note 453. 470 “It is important that you understand that you are in the best position to know if the materials you post are legally allowed.” 1.d. ii id. 471 “We therefore ask that you please be careful when deciding whether to make User Content available on our Service, including whether you can pin or re-pin User Content on your boards.” 1.d. ii id. 468

94 property infringement of trademark holders is salient. Again, below the situation will be assessed of the social media sites: Facebook, Twitter, YouTube, Flickr and Pinterest.

Facebook Facebook is making clear that no internet user will use its copyrights or trademarks, “including Facebook, the Facebook and F Logos, FB, Face, Poke, Book and Wall”, or any confusingly similar marks, except as expressly permitted by Facebook’s Brand Usage Guidelines or with our prior written permission. 472 Facebook’s Brand Usage Guidelines are very elaborated and detailed. These include how to refer to Facebook: 473 one cannot suggest that one is affiliated with, sponsored, or endorsed by Facebook; one can only link to the Facebook.com page; one cannot combine one’s name with Facebook. Facebook should be in the same font size and style as the other content; and Facebook cannot be used as a verb or pluralised. Then there guidelines how to use Facebook’s logos and other trademarks 474 which Facebook calls “brand assets”. General guidelines that apply to all permitted uses of the Brand Assets: “1. Avoid using Brand Assets in a way that suggests any type of association or partnership with Facebook, or approval, sponsorship, or endorsement by Facebook. 2. Don’t present a Brand Asset in a way that makes it the most distinctive or prominent feature on your web page, printed material, or other content. 3. Don’t use Facebook’s Brand Assets in a way that is deceptive, harmful, obscene, or otherwise objectionable to Facebook. 4. You may not present or feature the Brand Assets on websites containing content associated with pornography, gambling, or illegal activities. 5. You must keep sufficient space around our Brand Assets so they appear clean and uncluttered. 6. You may not combine our Brand Assets, or elements of our Brand Assets, with your own name or mark or generic terms. 472

5.6 Statement of Rights and Responsibilities Facebook, supra note 447. Referencing Facebook, Brand Permission Center Usage Guidelines, available at: https://www.facebook.com/brandpermissions/index.php (accessed August 9, 2013). 474 Logos & Trademarks, Brand Permission Center Usage Guideline, available at: https://www.facebook.com/brandpermissions/logos.php (accessed August 9, 2013). 473

95 7. Do not use trademarks, logos, or other content that is confusingly similar to the Brand Assets. 8. You may not attempt to get rights in the Brand Assets, or any confusingly similar approximations, whether by trademark registration, domain name registration, or otherwise. 9. We do not require the use of either the ® or the ™ attribution symbols with our Brand Assets. 10. All use of Brand Assets is subject to Facebook’s terms and policies, including the Statement of Rights and Responsibilities and the Privacy Policy.” 475 The Facebook and “f” logos are shown with the corresponding message that Facebook generally does not allow the use of the Facebook logo and that this needs to be requested. Facebook makes explicit what use of the “f” logo to refer off the Facebook is permitted: to Facebook Page, Facebook Group, an application one offers via Facebook Platform or Facebook Connect. It is interesting to see that Facebook uses a protection to copy the images of the logos it does not allow, while trademark logos of other companies can be copied from and pasted on its site. By providing Like Buttons Facebook is proactive by providing a Like button social plugin. The Like Button can be used in traditional offline media, a textual or visual reference must be made to Facebook. One can scale the size to suit ones needs, but the Like Button may not modified in any other way, such as by changing the design. The Like Button cannot used for online advertising. Facebook is also giving visual examples of online advertising that Facebook deems unacceptable and acceptable usages.

Twitter The services are protected by copyright, trademark, and other laws of both the U.S. and other countries. Twitter makes clear that nothing in the Terms gives the internet user a right to use the Twitter name or any of the Twitter trademarks, logos, domain names, and other distinctive brand features. 476

475 476

Logos & Trademarks, Brand Permission Center Usage Guidelines, id. 7. Twitter Rights, Terms of Service Twitter, supra note 449.

96 YouTube The trademarks, service marks and logos YouTube owns are subject to copyright and other intellectual property rights under the law, just as the content YouTube licenses of the internet users. 477 So YouTube does not make any distinction between the protection of its own intellectual property rights and those of third parties.

Flickr Flickr’s trademarks are part of the Yahoo! Marks. Members of Flickr need to agree that “all of Yahoo!’s trademarks, trade names, service marks and other Yahoo! logos and brand features, and product and service names are trademarks and the property of Yahoo! Inc.” Without Yahoo!'s prior permission, a member does agree not to display or use in any manner the Yahoo! Marks. 478 There is also the Guidelines for use of Yahoo! brand features which states that “trademarks and service marks included in the Yahoo! Brand Features will be designated with ‘SM’, ‘TM’ or ‘®’, in the manner directed by Yahoo!” 479

Pinterest Pinterest allows internet users to access and view Pinterest Content, for their personal, non-commercial use to allow them to express themselves, discuss public issues, report on issues of public concern and engage in parody. 480 Unsurprisingly, the Acceptable Use Policy481 points out that third parties’ intellectual property rights should not be infringed. 482 The internet user should not use the Pinterest name, trademark, logo or other proprietary information, or the layout and design of any page, without Pinterest’s express written consent. 483 It also made clear that internet users should not engage in any of the following activities: “[e]xcept for use of a “No Pin” instruction, use any meta tags

477

5.A Terms of Service YouTube, supra 451. 25. Trademark Information, Terms of Service Yahoo!, supra 452. 479 4. Notices, Guidelines for use of Yahoo! brand features, available at: http://pressroom.yahoo.net/pr/ycorp/document/guidelines.pdf (accessed August 9, 2013). 480 2.b. Terms of Service Pinterest, supra note 453. 481 Acceptable Use Policy Pinterest, available at: http://pinterest.com/about/use/ (accessed August 9, 2013). 482 Seventh bullet point of heading ‘You agree not to post User content that:’, id. 483 First bullet point of heading ‘You agree not to engage in any of the following prohibited activities:”, id. 478

97 or other hidden text or metadata utilizing a Pinterest or Pinterest trademark, logo, URL, or product name without Pinterest’s express written consent.” 484 Thus, Pinterest requires a higher standard, namely “express written consent”, for the use of their own trademark, than they ask from the internet users to use the trademark of other companies.

Chapter 3.2.8 Social media’s intellectual property infringement procedures In order for social media providers to qualify for the safe harbour provisions (as will be pointed out in Chapter 7 “Intermediary liability”) the U.S. versions of their Terms of Service all link to online forms that are compliant to the requirements of a notice of an alleged copyright infringement under the DMCA. 485 The elements of the notification 486 to the designated agent of the service provider are: a physical or electronic signature of the copyright owner or authorised representative, 487 identification of the copyrighted work alleged to be infringed 488 and content that is claimed to be infringing and is to be removed or access to which is to be disabled, and information reasonably sufficient to permit the service provider to locate the content. 489 The contact information of the complaining party should be given 490 and a statement that the complaining party has a good faith belief that use of the material in the manner complained of is not authorised by the copyright owner, its agent, or the law, 491 that the information is accurate, and under penalty of perjury, that the complaining party is the copyright owner or the authorized representative. 492 For complaints about trademark infringements there is no system comparable to the DMCA notification system in place.

484

Seventh bullet point of heading ‘You agree not to engage in any of the following prohibited activities:’,

id. 485

Safe harbour provisions of the DMCA, 17 USC § 512. § 512. Limitations on liability relating to material online (c) Information Residing on Systems or Networks at Direction of Users. (3) Elements of notification. Digital Millennium Copyright Act (DMCA). 487 § 512 (c)(3)(A)(i) DMCA. 488 § 512 (c)(3)(A)(ii) DMCA. 489 § 512 (c)(3)(A)(iii) DMCA. 490 § 512 (c)(3)(A)(iv) DMCA. 491 § 512 (c)(3)(A)(v) DMCA. 492 § 512 (c)(3)(A)(vi) DMCA. 486

98 Facebook Facebook has online forms to report 493 both copyright infringements and trademark infringements. A DMCA notice can be send to a designated agent claiming copyright infringement by using Facebook’s online form, which is DMCA compliant, or one can contact the designated agent directly. In Facebook’s online form one needs to describe or analyse the copyrighted work that is alleged to be infringed in maximum 1000 characters. This limitation seems highly arbitrary and therefore unreasonable, especially since the online medium does not impose any technical limitation. Then again, it might demonstrate that the social media provider is not prepared to put in too much time, effort and money to solving the conflict. In case of trademark infringement, the rights holder needs to identify the alleged infringing content. Also, the URL needs to be provided and if this is not possible “information reasonable sufficient to locate the material.” The trademark holder should clarify in what countries he claims trademark rights that he believes are being infringed by this content, whether he has registered the mark and the categories of goods/services for which he asserts the rights. The trademark holder should give a description of how he believes this content infringes his trademark. This question is absent in the copyright infringement form and suggests to give Facebook more discretion to reject a request to remove by a rights holder or his authorised representative.

Twitter Twitter explains the elements that are needed for a DMCA notification for a claim of an alleged copyright infringement and gives the contact information of its designated agent. 494 Trademark infringement is not mentioned.

YouTube YouTube also has an online form for a DMCA notification of a copyright infringement. 495 YouTube tries to discourage complainants to complain of trademark infringements by internet users against a specific YouTube video or YouTube channel: 493

Reporting a Violation/Infringement of your Rights, Facebook, available at: http://www.facebook.com/help/contact/?id=208282075858952 (accessed August 9, 2013). 494 9. Copyright Policy, Terms of Service Twitter, supra note 449.

99 “Please understand YouTube is not in a position to mediate trademark disputes between users and trademark owners. As a result, we strongly encourage trademark owners to resolve their disputes directly with the user who posted the content in question. Contacting the uploader may allow for a quicker resolution to your claim in a way that is beneficial to you, the uploader, and the YouTube community.” 496 Then the complainant can select between contacting the uploader using private messaging, via an auto-generated email or via YouTube. In case of the latter option, YouTube is “willing to perform a limited investigation of reasonable complaints”. YouTube has also online forms for counterfeit complaints and other legal issues, including circumvention of technological measures. 497

Flickr The Flickr Community Guidelines state that one should not upload that what is illegal or prohibited. Flickr believes the members of its community are essentially good: “If you see photos or videos that you’ve created in another member’s photostream, don't panic. This is probably just a misunderstanding and not malicious”, 498 but nevertheless links to its Copyright and Intellectual Policy, 499 which is giving the elements required to make a copyright infringement claim, which can lead to a DMCA compliant notification. Flickr Yahoo! uses the DMCA notice and procedure for making claims of copyright or any other intellectual property infringement. 500 Since Yahoo! does not provide online forms, the complaining party needs to send an email to Flickr’s designated agent.

495

YouTube online form with DMCA Notification of alleged copyright infringement, available at: http://www.youtube.com/t/dmca_policy (accessed August 9, 2013). 496 YouTube Trademark Complaint Step 2, available at: http://support.google.com/youtube/bin/answer.py?hl=en&answer=1244597 (accessed August 9, 2013). 497 Online forms, including copyright, trademark, counterfeit and other legal issues, available at: http://info.yahoo.com/legal/us/yahoo/utos/terms/ (accessed August 9, 2013). 498 Flickr Community Guidelines, available at: http://www.flickr.com/help/guidelines. 499 Yahoo! Copyright and Intellectual Property Policy, available at: http://info.yahoo.com/legal/us/yahoo/copyright/en-us/ (accessed August 9, 2013). 500 26 Notice and procedure for making claims of copyright or intellectual property infringement, Terms of Service Yahoo!, available at: Yahoo! Terms of Service, available at: http://info.yahoo.com/legal/us/yahoo/utos/terms/ (accessed August 9, 2013).

100 Pinterest Pinterest has both copyright complaint forms 501 and trademark complaint forms 502 on its site. The online copyright complaint should include the formal requirements of the DMCA Notice of Alleged Copyright Infringement and is delivered to Pinterest’s Designated Copyright Agent. Pinterest does not give any requirements to include in a trademark complaint, which seems not conducive to an efficient handling of the cases.

Chapter 3.2.9 Protection social media rights versus third-parties’ rights Social media providers invite internet users to share content, and once they do, they appropriate the intellectual property rights, irrevocably and perpetually. Social media providers, especially Facebook, appear deeply concerned with protecting their own trademarks, but are much less interested in protecting other companies’ trademarks, even though they are Facebook’s customers of advertisements and data on the behaviour and content of internet users. Likewise, Pinterest uses a double standard: on the one hand it allows internet users to pin any picture, including trademark logos, on their electronic pinboard without any verification of authorisation, on the other hand, if the trademark logo happened to be of Pinterest the internet user needs to ask written permission first. Social media providers such as Flickr require people that use their trademarks to use symbols such as ®, while others such as Facebook do not. Chapter 9.3 “Making authorised trademark use transparent”, looks at whether such symbols can play a significant role in the protection of trademark logos. Moreover, Twitter is the only social media provider that allows internet users to use their moral right to revoke or withdraw a work completely. Of course, each social media provider goes to great length to try to indemnify themselves for content submitted by internet users that violate or infringe law, including intellectual property rights of third-parties.

501

Pinterest states it will respond in accordance to the text of the DMCA, available at: http://pinterest.com/about/copyright/ (accessed on August 9, 2013). 502 Pinterest states it respects trademark rights others. It does not mention any particular text as it does regarding copyright, available at: http://pinterest.com/about/trademark/ (accessed on August 9, 2013).

101 An argument Chapter 7 “Intermediary liability” further investigates whether social media sites merely host content which reflects society and therefore reject any form of intermediary liability in regard to intellectual property infringements. 503

Chapter 3.3 Internet user The internet user is the remaining of the trinity of protagonists in the legal conflict to be explored. Internet users aggregated in communities are influential groups acknowledged by both trademark holders and social media providers.

Chapter 3.3.1 Definition internet user The Standing Committee on Trademarks, Industrial Designs and Geographical Indications defined the internet as follows: “Internet” refers to an interactive medium for communication which contains information that is simultaneously and immediately accessible irrespective of territorial location to members of the public from a place and at a time individually chosen by them. 504 One can simply define internet users as those who make use of the internet. This thesis focuses on internet users that make use of social media services. “User” was historically used for computer operators/creators of code or digital rules, that made further content generation possible. A good illumination of this meaning of “user” can be seen in the 1982 movie Tron, 505 where the “user” is “capable of manipulating the reality of the digital world”. 506 Therefore disambiguation is needed: in this thesis “a user” is generating content for social media, based on code created by social media providers.

503

Twitter made explicitly the argument that they have so much content, that they cannot really monitor or control it. The other social media providers would likely concur. Many companies and governments made some huge mistakes in the beginning with Twitter. Kristin Burnham, “Sweden Teaches Us How Not to Do Social Media”, Social Media Matters, available at: http://blogs.cio.com/twitter/17162/sweden-teaches-ushow-not-do-social-media (accessed August 2013). 504 Standing Committee on Trademarks, Industrial Designs and Geographical Indications, Joint Recommendation Concerning Provisions on the Protection of Marks, and Other Industrial Property Rights in Signs, on the Internet, Publication 845, WIPO, September 24 to October 3, 2001, at 6. 505 Director Steven Lisberger, Tron, 1982, available at: http://www.imdb.com/title/tt0084827/ (accessed August 9, 2013). 506 See Wikipedia under lemma Tron, available at: http://en.wikipedia.org/wiki/Tron (accessed August 9, 2013).

102 Chapter 3.3.2 Community An aggregation of internet users can be more than the sum of its individuals. This is caused by interactive influence of the internet users and group dynamics. Substrata of the internet can form communities, with their own values and norms. One can find a wide variety of communities online. Social media can be seen as the most vibrant communities online. Some online service providers allow anonymity507 or pseudonymity, 508 while others require internet users to use their real name. Different pseudonyms can be distinguished, which have a different degree of linkability 509 and observability. 510 Pseudonymity allows internet users to be perceived online different from their real-life identity. Advocates of pseudonymity are against real name policies, because of some inherent disadvantages for some groups and in some situations. 511 However, anonymity can make accountability for trademark infringements impossible and pseudonymity can make it very difficult. Therefore, OSPs, that do not want to assume liability for the acts of their internet users, and also content rights holders, might also want to push for real name policies. 512 507

“Anonymity is the state of not being identifiable within a set of subjects, the anonymity set.” Andreas Pfitzmann and Marit Hansen, Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology, Version v0.25 (2005), at 6, available: http://freehaven.net/anonbib/cache/terminology.pdf (accessed August 9, 2013). 508 “Being pseudonymous is the state of using a pseudonym as ID.” Id., at 13. 509 Pfitzmann and Hansen describe the degrees of linkability due to the use of a pseudonym in different contexts. Id., at 17. 510 “Unobservability is the state of items of interest (IOIs) being indistinguishable from any IOI (of the same type) at all.” Id., at 10. 511 The Geek Feminism Wiki catagorises the alleged harm to following groups and situations: the marginalised and endangered groups, people with direct identity concerns, subject-related considerations, employment-related, people whose “real-name” is more complicated than you think, people with long standing pseudonyms, people whose “real-names” are extremely common or rare, but also people who are confortable using their uncomplicated “real-name” in certain situations. Who is harmed by a “Real Names” policy?, Geek Feminism Wiki, available at: http://geekfeminism.wikia.com/wiki/Who_is_harmed_by_a_"Real_Names"_policy%3F (accessed August 9, 2013). 512 Winer points out an additional reason: the ability to cross-relate your account in a “commerce-ready way” and “to give them information about what you do on the Internet, without obfuscation of pseudonyms.” Dave Winer, “Why Google cares if you use your real name”, Scripting News, July 25, 2011, available at: http://scripting.com/stories/2011/07/25/whyGoogleCaresIfYouUseYour.html (accessed August 9, 2013). Madrigal understands why Facebook and Google favour real-name policies: “It's bad for their marketing teams. It generates social problems when people don't act responsibly under the cloak of their assumed identity. It messes up the clarity and coherence of their data. And maybe those costs do outweigh the benefits pseudonymity brings to social networks.” Alexis Madrigal, “Why Facebook and Google's Concept of 'Real Names' Is Revolutionary”, The Atlantic, August 5, 2011, available at:

103 Chapter 3.3.3 Real-name policy Social networking site Friendster required real name registration in 2003, 513 and Facebook required real name registration in 2007. 514 Google+, what Google calls a social layer across its many properties, came up with a common name policy in July 2011, 515 which is described by Google as “the name your friends, family or co-workers usually call you”. 516 This triggered the so called nymwars. 517 Only real persons were allowed to have a profile, therefore it banned company names. 518 Singel argued that “Google is likely trying to defer the difficult problems around trademark issues and fake business profiles, because any social network with scale ends up having to deal with the same thorny naming problems that plague the net (essentially inheriting all the problems of ICANN, though without the formalities).” 519 Google deactivated company names, from Google+, but the Mashable blog was allowed to change its profile name to that of its founder. 520 However, in November 2011, 521 Google made it possible for companies to

http://www.theatlantic.com/technology/archive/2011/08/why-facebook-and-googles-concept-of-realnames-is-revolutionary/243171/ (accessed August 9, 2013). 513 Mike Masnick, “Friendster Fakesters – Goodster Or Badster”, TechDirt, August 13, 2003, available at: http://www.techdirt.com/articles/20030813/2010251.shtml (accessed August 9, 2013). 514 Mike Masnick, “Does No One Remember The Friendster Fakester Fiasco? Facebook Now Dealing With Fakebookers”, TechDirt, November 2, 2007, available at: http://www.techdirt.com/articles/20071101/194615.shtml (accessed August 9, 2013). 515 Horowitz of Google+ gives some more information on the common name policy. Bradley Horowitz, July 26, 2011, available at: https://plus.google.com/113116318008017777871/posts/VJoZMS8zVqU (accessed August 9, 2013). 516 Google+ Page and Profile Names, available at: http://support.google.com/plus/bin/answer.py?hl=en&answer=1228271 (accessed August 9, 2013). 517 Nymwars is a neologism, and consists partly of the word “pseudonym” and the word “wars”. Nymwars, Wikipedia, available at: http://en.wikipedia.org/wiki/Nymwars (accessed August 9, 2013). 518 Ryan Singel, “Kicking Square Pegs Out of Round Circles: Why Google’s Banishment of Companies from Google+ is a Bad Sign”, Wired, July 22, 2011, available at: http://www.wired.com/business/2011/07/companies-google-plus/ (accessed on August 9, 2013). 519 Id. 520 Ben Popper, “Anti-social networking, Google+ Clarifies Brand Pages and Mashable Drops Profile, Betabeat”, July 21, 2011, available at: http://betabeat.com/2011/07/has-the-google-brand-purge-begunford-motors-next-web-down-yet-mashable-remains/ (accessed August 9, 2013). 521 Azam Khan, “Google Launches Business Pages”, Social Times, November 7, 2011, available at: http://socialtimes.com/google-launches-business-pages_b83409 (accessed August 9, 2013).

104 use Google+ Pages, 522 if these companies first get an owner to get a profile on Google+ first. 523 Three out of four of the Top 100 brands can now be found on Google+ Pages. 524 Facebook has a real name policy 525 since 2005. However, Facebook revealed that 4.8 percent of its accounts are duplicate, 2.4 percent misclassified, and 1.5 percent undesirable, which accounted for 83.09 million “fake” Facebook accounts. 526 Apparently in an effort to fight this substantial number, Facebook is using pop-up surveys that ask users to point out if a certain friend named in that survey is using his or her real name. 527 The use of a pseudonym or a real name, has implications to identity, and touches upon cultural sensitivity, public and private identity, privacy, and the role of social media in modern discourse. Anonymity, pseudonymity and privacy already seem to get weaker in society528 while they can, under some circumstances, 529 be beneficial to society. Therefore this thesis does not advocate any real-name policy for its proposed solution, a fortiori, since real-name policies are costly and burdensome to implement and enforce, even in China. 530

522

About Google+ Pages, available at: http://support.google.com/plus/bin/answer.py?hl=en&answer=1710600 (accessed August 9, 2013). Three out of four companies of the Top 100 brands are now on Google+ Pages. 523 Each Google+ Page can have one owner and up to 50 managers. Owners and managers on Google+ Pages, available at: http://support.google.com/plus/bin/answer.py?hl=en&answer=2380625 (accessed August 9, 2013). 524 Miranda Miller, “Google+ Adoption Among Big Brands Growing, Pages Featured More in SERPs”, August 1, 2012, available at: http://searchenginewatch.com/article/2196139/Google-Adoption-Among-BigBrands-Growing-Pages-Featured-More-in-SERPs (accessed August 9, 2013). 525 Facebook’s Name Policy, available at: http://www.facebook.com/help/292517374180078/ (accessed August 9, 2013). 526 Emil Protalinski, “Facebook: 8.7 percent are fake users”, CNET, August 1, 2012, available at: http://news.cnet.com/8301-1023_3-57484991-93/facebook-8.7-percent-are-fake-users/ (accessed August 9, 2013). 527 Carl Franzen, “Facebook Surveying Users About Their Friends’ Fake Usernames”, TPMIdeaLab, September 20, 2012, available at: http://idealab.talkingpointsmemo.com/2012/09/facebook-confirms-itssurveying-users-about-their-friends-fake-usernames.php (accessed August 9, 2013). 528 Eva Galperin, Randi Zuckerberg Runs in the Wrong Direction on Pseudonymity Online, EFF, August 2, 2011, available at: https://www.eff.org/deeplinks/2011/08/randi-zuckerberg-runs-wrong-directionpseudonymity (accessed August 9, 2013). 529 The Geek Feminism Wiki catagorises the alleged harm to following groups and situations: the marginalised and endangered groups, people with direct identity concerns, subject-related considerations, employment-related, people whose “real-name” is more complicated than you think, people with long standing pseudonyms, people whose “real-names” are extremely common or rare, but also people who are confortable using their uncomplicated “real-name” in certain situations. Who is harmed by a “Real Names” policy?, Geek Feminism Wiki, supra note 511. 530 The real name registration is tried before and is expected to be too costly for social media sites to be implemented in the short term. Bill Bishop, “Rumors of a Real Name Registration Requirement Coming For Weibo And Other Chinese Social Media?”, DigiCha, August 29, 2011, available at:

105 Chapter 3.3.4 Empowering the internet user/community Social media have made it possible for internet users and communities to engage in expressive activities that were first the prerogative of mainstream media and professionals. Each internet user can publish 531 his activities as a journalist, 532 photographer, radio or television maker. 533 Using social media as a platform gives each internet user a platform on which he can, theoretically, reach the whole online population. 534 Communities can engage in putting some political or social goals on the agenda, using social media. One can argue that social media were the catalysts for communities that wanted social change during the Arab Spring. 535 MacKinnon argued that internet users, not only have the right to express themselves individually, but also have an obligation to assert their rights and responsibilities as citizens of nation-states. 536 The question that remains is whether the law and regulations that govern intellectual property should reflect the norms of the internet users/community or should the law be used instrumentally to impose a policy choice. Chapter 4 “Analysis of The Legal Conflict” will demonstrate that the norms of the internet users/community have caused a great deal of problems. This Chapter will demonstrate it is preferable to use the instrumentality of the law to impose a policy choice that is benefiting all stakeholders. http://digicha.com/index.php/2011/08/real-name-registration-requirement-coming-for-weibo-and-otherchinese-social-media/ (accessed August 9, 2013). 531 Four revolutions in the production of knowledge: first: language; second: writing; third: printing press; fourth: internet. M. Warschauer and T. Matuchniak, New Technology and Digital Worlds: Analyzing Evidence of Equity in Access, Use, and Outcomes, 34 REV. RES. EDU. 179, 179 (2010), referring to S. Harnad, Post-Gutenberg Galaxy: The Fourth Revolution in the Means of Production and Knowledge, 2 PUB.-ACCESS COMP. SYS. REV. 39, 39 (1991). 532 The following blogs rank numbers 1 to 5 respectively in the Technorati Top 100 (August 8, 2012): Huffington Post, BuzzFeed, Mashable!, Business Insider and The Verge. “Technorati’s Top100 blogs”, August 8, 2012, available at: http://technorati.com/blogs/top100/ (accessed August 9, 2013). One can argue that these blogs have become mainstream media themselves. For example the Huffington Post was bought by AOL for 315 million U.S. dollar. Richard Adams, “Huffington Post sold to AOL for $315m”, The Guardian, http://www.guardian.co.uk/world/richard-adams-blog/2011/feb/07/huffington-post-sale-aolariana (accessed August 9, 2013). 533 “Individuals can now post content to an audience that previously would have been available only through the mass media, leading to a convergence in audience and producer.” Jacob Rowbottom, To Rant, Vent and Converse: Protecting Low Level Digital Speech, 71 CLJ 365 (2012). 534 Gillmor is asserting that civil journalism and independent journalist challenge the traditional media. DAN GILLMOR, WE THE MEDIA: GRASSROOTS JOURNALISM BY THE PEOPLE, FOR THE PEOPLE (Sebastopol, CA: O'Reilly Media 2004-08). 535 Eric Voeten, “Similarities and Differences between Eastern Europe in 1989 and the Middle East in 2011. Summarized remarks from a panel discussion sponsored by Middle East Studies”, Am. U., May 30, 2011, available at: http://themonkeycage.org/blog/2011/05/30/similarities-and-differences-between-easterneurope-in-1989-and-the-middle-east-in-2011/ (accessed August 9, 2013). 536 Rebecca MacKinnon, The Netizen, 55 DEVELOPMENT 201 (2012) .

106 Chapter 3.3.5 Disintermediation and democratisation Disintermediation, had led to a massive expression by internet users. The drawback is that after the middle person is cut out of the equation, this is not necessarily conducive for the quality of the content. A side-effect of the lack of monitoring, quality control, editing, has led to a massive scale of online intellectual property infringements. A growing percentage of all internet users have grown up with digital media and are able to express themselves digitally. Rushkoff called young people who grew up with the electronic media screenagers in 1997, 537 Persky followed with the term digital natives in 2001. 538 Social media providers have made it possible for everyone with access to the uncensored internet 539 to gather, share and add information, accessible from a growing range of electronic devices. The internet in combination with inexpensive cameras and microphones has led to a democratisation of film, photography and written journalism and disintermediation of publishing. This has resulted in an enormous content generation by internet users. For example: seventy-two hours of video are uploaded on YouTube every minute. In one month time, more content was generated on YouTube than the major U.S. television networks created in sixty years. Seventy percent of YouTube’s traffic comes from outside the U.S. 540 The world population is more than 7 billion people, 541 and Flickr hosts over 6 billion photos.542 One can argue that the right to freedom of expression is indispensable for a wellfunctioning democracy. Since social media has empowered so many internet users, it can be seen as one of the foremost platforms for political, artistic and commercial expression. Therefore, a discussion whether a right to internet access is a human right was articulated

537

“Children born into our electronically mediated world of computer and television monitors might best be called “screenagers.”” Rushkoff argues that adults that did not grow up with digital media should learn about the digital environment from their children. DOUGLAS RUSHKOFF, PLAYING THE FUTURE (Riverhead Books June 1996). 538 MARK PRENSKY, DIGITAL NATIVES, DIGITAL IMMIGRATION, 2001. 539 Danny Friedmann, Paradoxes, Google and China - How Censorship Can Harm and Intellectual Property Can Harness Innovation (July 1, 2011), supra note 9. Danny Friedmann, supra note 443. 540 Statistics, YouTube, http://www.youtube.com/t/press_statistics (accessed August 9, 2013). 541 Population Reference Bureau, world population clock, July 15, 2015, available at: http://www.prb.org/ (accessed August 9, 2013). 542 Kay Kremerskothen, 6,000,000,000, Flickr, August 4, 2011, http://blog.flickr.net/en/2011/08/04/6000000000/ (accessed August 9, 2013).

107 in light of a potential implementation of a “graduated response” 543 in case of repeat infringers of copyright law, and possibly trademark law. In Estonia, 544 Finland, 545 France, 546 Greece 547 internet access is considered a human right. 548 And according to the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression, internet access is a human right. 549 Cerf, one of the fathers of the internet and now vice-president of Google, did not agree: “technology is not a right, but an enabler of rights” and that the protection of human rights should be reserved to the most basic rights. 550 However, it can be argued that the output of internet user generated content has a profound amplifying effect on culture, society and economics. Freedom of expression, commentary, criticism and parody are all conducive to a democratic society. The question remains when using content in an unauthorised way becomes abusing content. 551 In the book Remix, Lessig argued that recombining and building on existing copyrighted content and mash-ups always happened and that it could have transformative effects. 552 However, Lessig did not elaborate on the unauthorised use of

543

Peter K. Yu, The Graduated Response, 62 FLA. L. REV. 1373 (2010). Public Information Act of Estonia, 15 Nov. 2000, as amended 2003, available at http://www.legaltext.ee/text/en/X40095K4.htm (accessed August 9, 2013). Oana Lungescu, “Tiny Estonia leads internet revolution”, BBC News, April 7, 2004, available at: http://news.bbc.co.uk/2/hi/europe/3603943.stm (accessed August 9, 2013). 545 Decree no. 732/2009 of the Finnish Ministry of Transport and Communications on the Minimum Rate of a Functional Internet Access as a Universal Service, 14 Oct. 2009, available at http://www.finlex.fi/en/laki/kaannokset/2009/en20090732.pdf (accessed August 9, 2013). Bobbie Johnson, “Finland makes broadband access a legal right”, The Guardian, October 14, 2009, available at: http://www.guardian.co.uk/technology/2009/oct/14/finland-broadband (accessed August 9, 2013). 546 French Act furthering the diffusion and protection of creation on the Internet, Decision n° 2009-580, June 10, 2009, available at: http://www.conseil-constitutionnel.fr/conseilconstitutionnel/root/bank/download/2009580DC2009_580dc.pdf (accessed August 9, 2013). 547 2001 Syntagma Constitution art. 5A of Greece. The Constitution of Greece: as revised by the parliamentary resolution of April 6th 2001, of the VIIth Revisionary Parliament (2004), available at http://www.hellenicparliament.gr/UserFiles/f3c70a23-7696-49db-9148-f24dce6a27c8/001156%20aggliko.pdf (accessed August 9, 2013). 548 Charter of Human Rights and Principles for the Internet, Version 1.1. Draft, Internet Rights & Principles Coalition, 2011; Commentary on the Charter of Human Rights and Principles for the Internet, Internet Rights & Principles Coalition, Centre for Law and Democracy, October 2011. 549 Frank La Rue, “Document U.N. report: Internet access is a human right”, May 16, 2011, available at: http://documents.latimes.com/un-report-internet-rights/ (accessed August 9, 2013). 550 Vinton G. Cerf, “Internet Access Is Not a Human Right”, New York Times, January 4, 2012, available at: http://www.nytimes.com/2012/01/05/opinion/internet-access-is-not-a-human-right.html?_r=0 (accessed August 9, 2013). 551 Since the abuse of content is shared online, it can be followed by “abusement”, which is described by Urban Dictionary as “deriving amusement from the abuse of others”, available at: http://www.urbandictionary.com/define.php?term=Abusement (accessed August 9, 2013). 552 LESSIG, supra note 30. 544

108 trademarks. In Chapter 6 “Trademark Dilution and Its Defences”, a proposal will be given about where to draw the line in case of commentary, criticism and parody in case of the unauthorised use of a trademark logo on social media.

Chapter 3.3.6 Trademark holders’ use of social media Trademark holders are not just challenged by social media, but they can also benefit from setting up their own pages, advertising and buying data for behavioural targeting. CEO of luxury goods company Gucci considered social media even as a marketeer's dream. 553 Setting up fan pages to engage in a two-way conversation with the target group can build and strengthen the bond between brand and customer or potential customer. Trademark holders can monitor and study what is said by the internet users on social media about their brands. Blackshaw wrote that satisfied customers tell 3 friends, but angry customers 3,000 people about a bad experience with a product or service. 554 Social media make it possible that companies respond to specific issues and adjust their public relations and marketing actions, 555 and in case of intellectual property infringements decide to take enforcement measures. Facebook users can subscribe to so called “fan pages” about a brand, either set up by the trademark holder or by a third party, fan or foe. The idea is that after each status update by the brand, it will be shown in the news feeds 556 of the users, to which comments can be added. These comments will be shared with the user's Facebook contacts, who on their turn can subscribe again to these fan pages by “liking” them.

553

As Robert Polet, President, CEO and Chairman of the Managing Board of Gucci Group, pointed out during Google Zeitgeist Europe 2010, May 17, 2010, available at: http://www.youtube.com/user/eurozeitgeist#p/u/13/B8v2tMJmeg0 (accessed August 9, 2013). 554 PETE BLACKSHAW, SATISFIED CUSTOMERS TELL THREE FRIENDS, ANGRY CUSTOMERS TELL 3,000: RUNNING A BUSINESS IN TODAY’S CONSUMER-DRIVEN WORLD, (2008). 555 For instance Gap Inc., an American apparel and accessories retailer reintroduced its original logo after a week long of massive protests from fans on social media. Emily Fredrix, “Gap's logo back to blue after fans gripe about new”, October 11, 2010 available at: http://finance.yahoo.com/news/Gaps-logo-back-toblueafter-apf-3578440916.html?x=0 (accessed August 9, 2013). 556 News feeds are constantly updating lists of actions of Facebook connections.

109 However, there has been some controversy about the so called News Feed algorithm, 557 which regulates the distribution of status updates of the fan pages to the news feed of the subscribed users. It was alleged that the News Feed algorithm deliberately prevented between 50 and 85 percent of these status updates to be distributed to users. 558 This was allegedly done in order to stimulate the brands to compensate their loss of visibility in these news feeds by advertising in the sponsored posts that are also distributed in the news feeds. 559 This was denied by Phil Zigoris, software engineer at Facebook’s sponsored posts products. 560 Just as many companies use search engine optimisation (SEO) to rank as high as possible in Google’s organic search results, increasingly they also want to apply EdgeRank/News Feed optimisation, by optimising the timing of a post, type of post (video, text or photo), frequency of posts and content of a post. 561 Social media have special characteristics that make it particularly suitable as an advertisement platform of trademark holders. Facebook, for example, makes it possible for trademark holders to advertise based on user-generated content, behavioural targeting and social marketing. 562 Trademark holders know that social media are more effective vehicles for advertisements than traditional media such as newspapers or broadcasting. 563 According 557

The News Feed algorithm is often called EdgeRank, however, this is denied by Zigoris. Howard Greenstein, “5 Things You Don't Know About Facebook Exposure, Inc.com”, July 25, 2012, available at: http://www.inc.com/howard-greenstein/facebook-promoted-posts-for-small-business.html (accessed August 9, 2013). 558 Geoffrey Colon, “Thinking Social / Value, Facebook Algorithmic Change to Decrease Reach on Brand Page Posts”, Social@Ogilvy, September 25, 2012, available at: https://social.ogilvy.com/facebookalgorithmic-change-to-decrease-reach-on-brand-page-posts/ (accessed August 9, 2013). Jim Edwards, “Facebook Accused Of Changing A Key Algorithm To Hurt Advertisers”, Business Insider, October 3, 2012, available at: http://www.businessinsider.com/facebook-changed-edgerank-algorithm-to-hurtadvertisers-2012-10 (accessed August 9, 2013). Ryan Holiday, “Broken on Purpose: Why Getting It Wrong Pays More Than Getting It Right”, New York Observer, November 11, 2012, http://observer.com/2012/09/broken-on-purpose/ (accessed August 9, 2013). 559 PETER OLSTHOORN, ‘IT’S COMPLICATED’, THE POWER OF FACEBOOK, EXTENDED EDITION, 2012. 560 Greenstein, supra note 537. 561 Tomio Geron, “PostRocket's ‘News Feed Optimization’ For Facebook Raises Seed Funding”, Forbes, May 31, 2012, available at: http://www.forbes.com/sites/tomiogeron/2012/05/31/postrockets-news-feedoptimization-for-facebook-raises-seed-funding/ (accessed August 9, 2013). 562 McGeveran has mapped the problems that can appear when using social marketing: William McGeveran, Disclosure, Endorsement, and Identity in Social Marketing, 4 U. ILL. L. REV. 1105 (2009). 563 Ethan Smith, “How Old Media Can Survive In a New World”, Wall Street Journal, May 23, 2005, available at: http://online.wsj.com/public/article/SB111643067458336994dZdpfVsBBc8Y17yRcFtFhF_8YWk_20060522.html?mod=blogs (accessed August 9, 2013).

110 to Favier, former research director of Forrester Research, the ROI of the best social media is four times that of traditional media. 564 Nielsen market research measured that people notice brands in Facebook's news feeds thirty percent better than brands using advertisements that have not been endorsed by the connections of a Facebook user. 565 Facebook with its more than a billion active internet users in the U.S., EU but also emerging economies, excluding China 566 is a convenient one-stop shop for companies. They can reach with their advertisements specific target groups, based on individual profiles 567 and behavioural patterns. Facebook is increasingly used mobile: 23 percent of the total time spent on Android and iOS applications in the U.S. goes to Facebook. 568 The commercial return on Facebook per user was about 5 dollars during 2012, with only a 1.30 dollar margin (with 5 billion dollar total revenue and 1.3 billion net result). Around 85 percent of company profits came from advertising. 569 Facebook Advertisements tries to increase the growth of its audience, to convert more

564

“The best social media programs also convert the consumer’s social time into a brand premium, reaching a return on investment (ROI) up to four times as high as the ROI of a TV commercial.” Jaap Favier, “Calculate the ROI of Social Media”, Brian Solis October 8, 2012, available at: http://www.briansolis.com/2012/10/calculate-the-roi-of-social-media/ (accessed August 9, 2013). “In the US, around $150 billion per year is spent on advertising. Per American, that is roughly 500 dollars. Of that figure, television brings in around 25 percent and the internet 20 percent. Internet advertising has grown the most rapidly in recent years, in particular at the expense of newspapers and magazines.” OLSTHOORN, supra note 559. 565 Jack Neff, “Nielsen: Facebook's Ads Work Pretty Well”, Advertisement Age, April 19, 2010, available at: http://adage.com/digital/article?article_id=143381 (accessed August 9, 2013). 566 U.S. 163.1 million of the population (52 percent penetration). EU members: Austria 2.9 million (36 percent); Belgium 4.9 million (47 percent); Bulgaria 2.6 million (36.1 percent); Cyprus 0,6 million (53 percent); Czech Republic 3.9 million (37 percent); Denmark 3.0 million (55 percent); Estonia 0.5 million (39 percent); Finland 2.3 million (43 percent); France 25.3 million participants (39 percent); Germany 25.1 million (31 percent); Greece 4.0 million (36 percent); Hungary 4.3 million (44 percent); Ireland 2.2 million (48 percent); Italy 23.1 million (38 percent); Latvia 0.4 million (19 percent); Lithuania 1.1 million (32 percent); Luxembourg 0.2 million (44 percent); Malta 0.2 million (54 percent); Netherland 7.5 million (45 percent); Poland 10.3 million (27 percent); Portugal 4.7 million (44 percent); Romania 5.7 million (26 percent); Slovakia 2.1 million (38 percent); Slovenia 0.7 million (37 percent); Spain 17.1 million (37 percent); Sweden 4.9 million (54 percent); United Kingdom 32.3 million (52 percent); Source: SocialBakers 2012-2013. 567 “Thanks to the internet passport, Facebook is the ultimate medium for marketing, because it identifies you as an individual customer under your own name.” OLSTHOORN, supra note 559. 568 Dara Kerr, “Facebook's mobile-only use jumps 23 percent since March”, CNET, July 31, 2012, available at: http://news.cnet.com/8301-1023_3-57484036-93/facebooks-mobile-only-use-jumps-23percent-since-march/ (accessed August 9, 2013). 569 OLSTHOORN, supra note 559.

111 advertisements into clicks, make internet users more awareness and engage them. 570 Internet users with Facebook use this social media 25 percent of the time. 571 Facebook is tracking all actions of its users on Facebook, and other sites with Facebook plugins or where one can login with Facebook, even after they logged out of Facebook. Therefore, Facebook is being sued by a 15 billion dollar class action. 572 After tracking the users’ actions, preferences, interactions and cross-references with affiliated sites Facebook can base its predictions and offer advertisements that are tailor made to individuals, these include re-targeting advertisements. 573 Companies can bid on advertisement space based the behavioural patterns of a target group and being able to capitalise on, for example, events, called Facebook Ad Exchange (FBX). Beside providing a platform for advertising, Facebook will probably also become more active in commerce: “F-commerce”, including a ‘Buy button’ for advertisers. Facebook already provides the possibility to buy gifts via its site. For some time, trademark holders have been laggards in the usage of social media. This has led to considerable cybersquatting of the names of social media profiles, also known as brandjacking. 574 570

SocialFresh.com gave the following overview of the 2012 Facebook Ads Report: 1. Audience growth: 44 percent (= more Likes); 2. Conversion: 27 percent (= sales); 3. Awareness: 22 percent (= brand); 4. Engagement: 7 percent (= communication). The CPM rate, the percentage of users clicking on an ad, was 0.05 percent on Facebook: 5 in every 10.000 users who were presented with the ad clicked on it. Average cost per click (CPC) on Facebook was $0.70, while off Facebook it was $1.10. 571 OLSTHOORN, supra note 559. 572 Emil Protalinski, “Facebook hit with $15 billion class action user tracking lawsuit”, ZDNET, May 18, 2012, available at: http://www.zdnet.com/blog/facebook/facebook-hit-with-15-billion-class-action-usertracking-lawsuit/13358 (accessed August 9, 2013). 573 Re-targeting advertisements: after Facebook finds out that a Facebook user had clicked a certain advertisement outside Facebook by recognising the cookies, Facebook offers the same relevant advertisement. 574 A third party can impersonate an employee or representative of the brand or company, or suggest a link with the brand. ExxonMobil was brandjacked by a certain Janet who registered the ExxonMobil Twitter account, impersonating as an employee of the oil company. Jeremiah Owyang, “How “Janet” Fooled the Twittersphere (and me) She's the Voice of ExxonMobil”, August 1, 2008, available at: http://www.web-strategist.com/blog/2008/08/01/how-janet-fooled-the-twittersphere-shes-thevoice-of-exxonmobil/ (accessed August 9, 2013). Ramsey points out that Janet was making some tweets about Exxon Valdez that were not conducive to ExxonMobile's public relations policy, including: “while tragic, the Valdez spill didn’t rank among the top 10 such incidents.” Lisa P. Ramsey, Brandjacking on Social Networks: Trademark Infringement by Impersonation of Markholders, 58 BUFF. L. REV. 851 (2010). Hyundai has been brandjacked via Twitter as well. @hyundai was tweeting about subjects unrelated to cars, such as oysters, cellphones and the Yankees. “Clicking on a profile photo reveals a collage of scantily clad ladies bearing cleavage and more, and a caption saying, ‘Have a Lustful Day’.” Rupal Parekh, “GM, Kellogg, Nestle Beat to the Tweet as Squatters Take Over Twitter Names”, Advertisement Age, November 9, 2009, available at: http://adage.com/digital/article?article_id=140377 (accessed August 9, 2013). In such

112 Now many trademark holders have become avid users of social media and made it an integral part of their brand strategy. “As these communication tools become more important the allocation of the unique identifiers (user names), also becomes more important”. 575 Allemann is concerned that trademark lawyers will expand the definition of domain names to include user names. 576 This process of registering user names of social media without the authorisation of the trademark holder is easy and without extra costs. 577 Some trademark holders have pre-emptively registered user names using their trademarks on all important social media sites. 578 But after registering, brand owners need not to use the social media sites, despite the hoax that if they do not use Facebook

a case the unwholesome or unsavory context harms the reputation of the brand and in order to prove trademark dilution by tarnishment, no likelihood of confusion is required in cases of famous marks. “Some cases have found that a mark may be tarnished when its likeness is placed in the context of sexual activity, obscenity, or illegal activity.” David Tan, The Business of Luxury Brands and Trademark Protection, presentation at the University of Hong Kong, September 20, 2010. It is easy to see that after a video prank was posted on YouTube by two Domino employees doing distasteful things with food, caused that the revenue stream of the pizza chain significantly decreased, Dominos Pizza on the Today Show - Workers Fired for Dominos Prank Video, April 17, 2009, available at: http://www.youtube.com/watch?v=xaNuE3DsJHM (accessed August 9, 2013). Another danger for trademark holders is dilution by blurring: the famous mark is used repeatedly over a long period of time in an undesirable way so that the distinctiveness of the mark will suffer “death by a thousand cuts” Beebe, supra note 222, at 1163. 575 Adam Strong, “Social Media User Names Becoming More Like Domain Names”, Domain Name News, December 22, 2008, available at: http://www.domainnamenews.com/miscellaneous/social-media-usernames-becoming-more-like-domainnames/3556 (accessed August 9, 2013). 576 Andrew Allemann, “Facebook Usernames Set Dangerous Precedent”, June 23, 2009, Domain Name Wire, available at: http://domainnamewire.com/2009/06/23/facebook-usernames-set-dangerous-precedent/ (accessed August 9, 2013). 577 This was experienced by the Coca-Cola Company. The Coca-Cola user name was cybersquatted on both Facebook and Twitter. Dusty Sorg and Michael Jedrzejewski, fans of the carbonated drink, registered a Facebook page with the URL www.facebook.com/coca-cola on August 2008. And only in November 2009, Facebook started to enforce a policy that anyone who creates a branded Facebook page must be authorized by or associated with the brand Terms of Use, 4. Registration and Account Security; 10. “If you select a username for your account, we reserve the right to withdraw it if we deem inappropriate (eg where the proprietor of a trademark complaint concerning a user name that does not match the actual name of the user),” available at: http://www.facebook.com/terms.php (accessed August 9, 2013). Still independent Facebook users can create homages to brands, but they must live as a "group" or fan club Abbey Klaassen, “How Two Coke Fans Brought The Brand To Facebook Fame”, March 16, 2009, available at: http://adage.com/digital/article?article_id=135238 (accessed August 9, 2013). Coca-Cola Company could have demanded that the immensely popular fan page be closed down. But instead they came up with an elegant solution, whereby Coca-Cola took control but still works together with the founders of the page. Justin Smith, “How Do You Treat A Fan Who Owns Your Facebook Page?”, Inside Facebook, March 18, 2009, available at: http://www.insidefacebook.com/2009/03/18/how-do-you-treat-a-fan-who-owns-yourfacebook-page/ (accessed August 9, 2013). 578 Dell Inc. is a good example, according to Seidenburg: “The Texas-based computer giant has created three photo streams on Flickr, 26 pages and groups on Facebook and 34 Twitter feeds.”23

113 for two weeks, they risk that their account will be removed. 579 However, even the process of pre-emptive registering can be a time consuming and costly exercise for trademark holders. Even after pre-emptively registering social media user names, trademark holders can avoid a lot of problems by developing a clear social media policy 580 that is companywide known and by which every employee or even ex-employee is contractually bound.

Chapter 3.4 Trademark logo The trademark logo can be seen as the locus on the stage where the protagonists of the legal conflict, trademark holder, social media providers and internet users, find each other. Below the following questions will be answered: where does the logo come from and how its function is evolving and what will be its future. Then a definition of the trademark logo will be provided and a rationale for the trademark logo, some unique characteristics and a taxonomy of the different types of the trademark logo.

Chapter 3.4.1 History of the logo Etymologically, the English word logo means sign or character representing a word, was used for the first time in 1937. 581 Its origin is probably an abbreviation of logogram, 582 which means a letter, symbol or sign used to represent an entire word, and was coined in 1840.

579 Brett M. Christensen, “Hoax-Slayer, Facebook Deleting Inactive Users Hoax”, September 19, 2007, availabel at: http://www.hoax-slayer.com/facebook-overpopulated-hoax.shtml (accessed August 9, 2013). “34 percent of all Twitter accounts have no tweets, in comparison to 37.1 percent in June 2009”, Paul Judge, Barracuda Labs, Annual Report 2009, at 7, available at: http://barracudalabs.com/downloads/BarracudaLabs2009AnnualReport-FINAL.pdf (accessed August 9, 2013). 580 Fleet has compiled a list of 57 links to social media policies of companies such as American Express, BBC, Cisco, Coca-Cola, Dell, General Motors, Harvard Law School, IBM, Intel, etc. have published online. Dave Fleet, “57 Social Media Policy Examples and Resources”, Social Media Today, July 26, 2010, available at: http://socialmediatoday.com/davefleet/151761/57-social-media-policy-examples-andresources&ei=L7AoUOjrCMuviQfx (accessed August 9, 2013). 581 First known use of logo in 1937, according to the online Merriam-Webster dictionary, available at: http://www.merriam-webster.com/dictionary/logo (accessed August 9, 2013). 582 Online Etymology Dictionary, available at: http://www.etymonline.com/index.php?term=logo (accessed August 9, 2013).

114 The modern logo has many predecessors, which include cylinder seals (c.2300 BCE), coins (c.600 BCE), coats of arms, watermarks, silver hallmarks, 583 banners 584 and stickers. 585 Just like cloth banners before, the logo can make the communication of the brand coherent. Logos have made the transition to online media. With the advent of social media they started to populate these platforms both intentionally and unintentionally. This in combination with the characteristics of the digital media, which makes the logo easily copy-and-pastable and highly diffusible, resulted in many corporations’ perception that they have lost control over their own trademark logo.

Chapter 3.4.2 Evolving function of the logo The logo has evolved together with the trademark: from an indicator of the source of origin and of quality to a “visual distillation of a cultural ideal”. 586 Many trademark logos are no longer exclusively influenced by the trademark holder. Customers, potential

583

Logo, Wikipedia, available at: http://en.wikipedia.org/wiki/Logo (accessed August 9, 2013). Banners were used for identification purposes. There are among others, heraldic, religious, trade-union and for this thesis most relevant advertising banners, which can include a logo. Banner, Wikipedia, available at: http://en.wikipedia.org/wiki/Banner (accessed August 9, 2013). 585 Before the time of user generated content and social media, the brandscape was divided dichotomously into content producers and consumers. In the Seventies and Eighties of the Twentieth century, brand holders that wanted to promote their brands sometimes distributed stickers with their logo at shops or exhibitions. By giving away stickers, the brand holders gave away some of their control: they had no influence where the people would stick the adhesives. The hope was that fans and youngsters would stick the adhesives for example on their door of their room, so that they and their family will see it daily or in the street so that people will be exposed to it frequently. In the worst case the stickers were put on traffic signs, cars, windows or garage doors of strangers. Those affected would had to go through some trouble, or even had some damages to remove the stickers from their property. Those affected might not always make a distinction between the ones who put the stickers on their property without any permission, and the brand that was responsible for giving away the stickers. It is safe to say that a “negative sticker experience” of some brand is not conducive to build positive associations with that brand. Though the placement of the stickers would be sometimes considered vandalism, the integrity of the logos on the stickers were most of the time retained. The trademark holders had to weigh the costs of manufacturing and distributing the stickers and the negative brand exposure that connected to sticker abuse with the positive brand exposure. One way to minimise sticker abuse was to try to give them only to fans. But nobody had to sign an agreement about how they could use the sticker with the brand logo before they received it. As long as the acquirer of the trademark logo, whether or not depicted on a sticker, does not use it as a way to counterfeit goods or deceive people into believing that the trademark holder sponsored the relationship between the acquirer's goods and the acquirer, the use of the trademark is considered not in the course of trade. Whether this is justified or not will be looked into below. 586 Dan Redding, “The Evolution of The Logo”, Smashing Magazine, July 6, 2010, http://www.smashingmagazine.com/2010/07/06/the-evolution-of-the-logo/ (accessed August 9, 2013). 584

115 customers and even non-customers invest meaning in the logo to give expression to part of their personality, thereby partly appropriating control of the logo. Many individual logos evolve over the years. Although with trademarks, there is no need for evergreening, 587 since trademarks are in principle perpetual if one keeps using them and paying the fees for them to the trademark office. But still some brands decide to redesign their logo in such a way to keep some connection to the old logo, so that the mnemonic value is maintained. At the same time the update is often implying progressiveness. 588 adidas’ 3-Stripes, 589 then its Trefoil and 3 bars logos were developed. 590 Nike’s swoosh is an example 591 of a logo that has evolved over the years. Sometimes the customers of a brand demand the return of the old version of the trademark logo. 592

Chapter 3.4.3 Future of the logo Redding anticipated the future of the logo in a deconstructionist way. 593 Louis Vuitton has already registered as trademarks the constituting elements of its trademarked

587

Evergreening is the strategy of extending the patent, by the patenting of nonessential features of products, including aspects of their formulation, their metabolites, or methods of administration. Aaron S. Kesselheim, Intellectual Property Policy in the Pharmaceutical Sciences: The Effect of Inappropriate Patents and Market Exclusivity Extensions on the Health Care System, 9 AAPS J. E306 (2007). Evergreening also exist in copyright law: the creation of slightly new works, so that the work will be protected again by copyright. Duncan Bucknell, “Copyright ‘evergreening’”, March 2, 2008, available at: http://www.thinkipstrategy.com/ipthinktank/273/copyright-evergreening/ (accessed August 9, 2013). 588 Paul Rand, graphic designer of corporate logos, including the ABC, UPS and IBM logos: “My take on redesigning logos is that if possible, try to have some connection to the old logo so that there is a frame of reference, there is nostalgia, there is the value of the mnemonic device, that you can recognize. And if you can do it and update it, you have this double advantage. Updating implies progressiveness and so on.” Transcript of video: Miggs Burroughs Interview with Paul Rand, filmed for the TV show “Miggs B. on TV” in Connecticut, 1991, available at: http://www.paulrand.com/foundation/video_miggsInterview_1991/#.UDA3sKkgcR8 (accessed August 9, 2013). 589 If three stripes were purely an embellishment it would not infringe, adidas’ trademark. adidas AG and adidas Benelux BV v Marca Mode CV and Others (adidas v Marca II), Case C-102/07, Judgment of the ECJ, April 10, 2008. See also Adidas v Fitnessworld supra note 386. Timothy Pinto, Too stripy for Adidas, 3 J.I.P.L.P. 624 (2008). 590 adidas – the story of a logo, available at: http://www.adidasgroup.com/en/ourgroup/assets/History/pdfs/logohistory-e.pdf (accessed August 9, 2013). The trademark adidas was registered in lowercase on August 18, 1949. 591 Sports apparel company Nike has a logo called the Swoosh, designed by Carolyn Davidson, which is recognized widely to represent Nike. Heritage, The Origin of the Swoosh, Nikebiz.com, available via the Internet Archive, http://web.archive.org/web/20070408190641/http://www.nike.com/nikebiz/nikebiz.jhtml?page=5&item=or igin (accessed August 9, 2013). 592 Supra note 555.

116 Monogram Canvas. 594 After the Court of Appeal in Singapore 595 rejected its claim of trademark infringement and passing off of its Flower Quatrefoil and Flower Quatrefoil Diamond 596 on a Solvil watch, it started to use the constituting elements of its Monogram Canvas independently. 597

Chapter 3.4.4 Definition of the logo The Paris Convention 598 does not mention any logo and Article 6(1) Paris Convention leaves the pre-conditions for the filing and registration of trademarks with the respective member states (countries of the union). 599 Article 6ter Paris Convention does prohibit state emblems, official hallmarks, and emblems of intergovernmental organisations. 600 Both Article 15 TRIPS 601 and Article 2 Trademark Directive 602 provide a nonexhaustive overview of the signs a trademark may constitute. At least TRIPS, the 593

“How else can a logo break the rules to adapt? Is there a way to explode the logo, to decentralize it? What about a logo that consisted of separate elements that could be displayed on their own or joined together to create a unified whole? If branded products exist on a molecular level that’s invisible to the naked eye, could they project external holographic brand identity?” Dan Redding, “The Evolution of The Logo”, Smashing Magazine, July 6, 2010, http://www.smashingmagazine.com/2010/07/06/the-evolutionof-the-logo/ (accessed August 9, 2013). 594 The Toile Monogram consists of the LV monogram (a motif made by overlapping or combining two or more letters or other graphemes to form one symbol), a circle with a four-leaved flower inset (flower quatrefoil), a curved beige diamond with a four-point star inset (flower quatrefoil diamond), and its negative, as explained by Michael Pantalony, Director of Civil Enforcement, North America, Louis Vuitton Malletier, who sent cease-and-desist letter to dean of University of Pennsylvania Law School, February 29, 2012, available at: https://www.law.upenn.edu/fac/pwagner/DropBox/lv_letter.pdf (accessed August 9, 2013). 595 City Chain Stores (S) Pte Ltd v Louis Vuitton Malletier ([2009] SGCA 53, November 6 2009). 596 With regard to passing off, the court held that Louis Vuitton was required to show the existence of goodwill in the 'flower quatrefoil' mark itself. However, on the facts, the court found that the mark had never been used alone, but was used either as part of Louis Vuitton's monogram or with the trademark LOUIS VUITTON. Therefore, the court held that the court held that Louis Vuitton had failed to prove that it possessed goodwill in the ‘flower quatrefoil’ mark.” Regina Quek, “Louis Vuitton defeated on appeal in ‘quatrefoil’ case”, January 15, 2010, available at: http://www.onelegal.sg/pdf/Louis%20Vuitton%20defeated%20on%20appeal%20in%20quatrefoil%20case. pdf (accessed August 9, 2013). 597 David Tan, The Business of Luxury Brands and Trademark Protection, Powerpoint presentation at NUS, (2011), at 21, available at: http://www.lawtech.hk/wp-content/uploads/2011/01/Presentationpowerpoint1.pdf (accessed August 9, 2013). 598 Supra note 137. 599 Article 6(1) Paris Convention: “The conditions for the filing and registration of trademarks shall be determined in each country of the Union by its domestic legislation.” Id. 600 Article 6ter id. 601 “Any sign, or any combination of signs, capable of distinguishing the goods or services of one undertaking from those of other undertakings, shall be capable of constituting a trademark. Such signs, in

117 Trademark Directive and Community Trademark Regulation state the capability of signs to be represented graphically and to distinguish one undertaking from another, as preconditions to function as a trademark. Article 2 TRIPS 603 incorporates Article 6ter Paris Convention about the prohibition of state emblems, official hallmarks and emblems of intergovernmental organisations. In the U.S., 15 USC § 1127 gives the definition of trademark: “The term “trademark” includes any word, name, symbol, or device, or any combination thereof.” 604 Therefore one can conclude that no precise definition of the word “sign” is given, and not any definition of the word symbol nor the word logo. It is uncontested that a logo is both a symbol and a sign, and that a symbol or a sign is not necessarily a logo. Therefore, this thesis prefers to use the word logo. Wikipedia’s non-legal definition of the logo is: “a graphic mark or emblem commonly used by commercial enterprises, organizations and even individuals to aid and promote instant public recognition.” 605 This thesis proposes a shorter definition for the logo as a corporate or organisational avatar under which the company or individual 606 engages not just in the marketplace, but everywhere in the virtual and non-virtual world. particular words including personal names, letters, numerals, figurative elements and combinations of colours as well as any combination of such signs, shall be eligible for registration as trademarks. Where signs are not inherently capable of distinguishing the relevant goods or services, Members may make registrability depend on distinctiveness acquired through use. Members may require, as a condition of registration, that signs be visually perceptible.” Article 15 TRIPS, supra note 161. 602 “A trade mark may consist of any sign capable of being represented graphically, particularly words, including personal names, designs, letters, numerals, the shape of goods or of their packaging, provided that such signs are capable of distinguishing the goods or services of one undertaking from those of other undertakings.” Trademark Directive, supra note 146. 603 Artice 2(1) TRIPS: “In respect of Parts II, III and IV of this Agreement, Members shall comply with Articles 1 through 12, and Article 19, of the Paris Convention (1967).” So including 6ter Paris Convention. Supra note 161. 604 15 USC § 1127. 605 Logo, Wikipedia, supra note 583. 606 After a conflict with Warner Bros. in 1992, musician Prince started refer to himself by an unpronounceable symbol, which is now called “Love symbol no. 2”, which looks like a combination of the symbols for man (Mars symbol) and woman (Venus symbol), and Ankh, which is the Egyptian symbol for eternal life. See Wikipedia, available at: http://en.wikipedia.org/wiki/Ankh (accessed August 9, 2013). In 1993 Pickett made a guitar in the form of “Love symbol no. 2” (see Wikipedia, available at: http://en.wikipedia.org/wiki/Prince_(musician) (accessed August 9, 2013). After Picket showed Prince the guitar, he let someone else make a guitar in the same “Love symbol no. 2” form. Picket sued Prince in 1994. “Pickett claims the right to copyright a work derivative from another person's copyright without that person's permission and then to sue that person for infringement by the person's own derivative work.” Ferdinand Pickett v Prince, 207 F.3d 402 (7th Cir. 2000), March 14, 2000, para. 4. In 1997 Prince registered the logo as a copyright of visual art, not as a trademark, although Judge Posner wrote that the symbol is Prince’s trademark, he probably spoke in a figurative way. Ferdinand Pickett v Prince, 207 F.3d

118 In case of the tobacco industry, the logo and its dimensions are well-defined in a legal sense. The plain package controversy between Philip Morris and Australia 607 illustrated that the banishment of the logo from the package is perceived as a defacement of the company, allegedly commercially crippling them.

Chapter 3.4.5 Rationale of the logo According to Rand, who designed the logos for ABC, UPS and IBM, the logo is not, what is often assumed, an illustration of what the company does or what it represents. 608 Instead Rand asserted that after the logo is used, it can become a suitable vehicle for associating the brand, product or corporation with its good will, reputation and identity/personality. The raison d’être of the logo is the need for an association of an otherwise faceless brand, product or organisation. Most natural persons are gifted with a face, which distinguishes them from other people and makes them recognisable as a unique individual. 609 Legal persons might not have a face of flesh and bones and sometimes they even have the same name if they are active in another product or service category. So the trademark logo can be crucial to distinguish products or companies 610 from each other, an distinct appearance with which they can link themselves to the outside world. One can argue that some brands, such as those of Nike and Apple, are presenting themselves as life-style brands. This has led to a situation whereby consumers use the

402 (7th Cir. 2000), March 14, 2000, para. 1. Judge Posner decided that Pickett could not make a derivative work based on the Prince symbol without Prince's authorization even if Pickett's guitar would have showed the incremental originality needed. Ferdinand Pickett v Prince, 207 F.3d 402 (7th Cir. 2000), March 14, 2000, paras. 5 and 7. 607 Bryan Christopher Mercurio, Awakening the Sleeping Giant: Intellectual Property Rights in International Investment Agreements, 15 J. INT’L ECON. L. 871 (2012). 608 “People don’t understand how or why a logo is designed. They don’t understand. Most clients or people on the street think that the important thing about a logo is that it illustrate what the business does or what it represents, which is nonsense. I think it’s proven by this logo (IBM logo, DF). I mean a logo becomes meaningful only after it’s used. In other words the illustration that represents the logo is the product and not the logo. So that comes after the logo, and that requires that the thing is seen and associated. And the association is what makes the logo.” Supra note 588. 609 Twins, look-alikes and doubles, undermine this uniqueness and Propopagnosia, whose sufferers cannot recognize faces, makes this uniqueness ineffective. Prosopagnosia, Wikipedia, available at: http://en.wikipedia.org/wiki/Prosopagnosia (accessed August 9, 2013). 610 A company's logo is often synonymous with its trademark. ALINE WHEELER, DESIGNING BRAND IDENTITY, (John Wiley & Sons, Inc., 2006), at 4.

119 logos to express some part of their personality. 611 The one-way communication from the trademark holder to the public via TV, radio and print advertisements has been substituted with two-way communication between the trademark holder and internet users on social media. 612

Chapter 3.4.6 Unique characteristics of the logo Research has demonstrated that the human brain can absorb and remember 613 visual information much faster than verbal information. 614 A picture is worth a thousand words. 615 There are, however, also word marks and letter marks, but the use of the font or the design of the letters make those logos easier recognisable and distinguishable than a plain package with a generic font as a badge of recognition. As will be dealt with in Chapter 5 “Trademark Infringement and Its Defences”, it can be argued that trademark logos, unlike trademark names, are immune for legal issues in regard to nominative fair-use issues and could be solved in an automatic way. This gives trademark logos a unique way of guaranteeing the functions of the trademark.

Chapter 3.4.7 Types of logos There is a non-exhaustive number of ways to classify the different types of logos: for example, in three, 616 five, 617 six 618 or seven 619 different logo types.

611

Drescher, supra note 42, at 309. “Advertising thus seeks to control the behaviour of recipients or consumers. Amongst others, trademark rights help in protecting this kind of communication and, thus, ensure that right holders have undistorted access to consumers and the latter’s undivided attention. By contrast, freedom of expression seeks to ensure dialogic communication, which results in dialogue or discussion, with the intention of bringing forth truth and the advancement of society.” Sakulin, supra note 105, at 7-8. 613 Ancient Roman rhetorical treatises, for example Cicero’s De Oratore, explain the principles of memory palace: items can be remembered by visualizing them in specific physical locations. Method of loci, Wikipedia, available at: http://en.wikipedia.org/wiki/Method_of_loci (accessed August 9, 2013). 614 Susumu Kobayashi, Theoretical Issues Concerning Superiority of Pictures over Words and Sentences in Memory, 63 PERCEPTUAL & MOTOR SKILLS 783 (1986). 615 McCarthy is using this logic to suggest the inverse: “As the Chinese say, 1001 words is worth more than a picture.” John McCarthy, “The sayings of John McCarthy”, March 1, 2007, available at: http://wwwformal.stanford.edu/jmc/sayings.html (accessed August 9, 2013). 616 Three basic types of logos: 1.iconic/symbolic; 2.logotype/wordmark; and 3.combinationmark. “Types of Logodesign”, Logodesignsource.com, 2005, available at: http://www.logodesignsource.com/types.html (accessed August 9, 2013). 617 Five different types of logos: 1.brandmark, 2.wordmark, 3.lettermark, 4.combination mark and 5.emblem. “5 Different Types Of Logos” Breezy Creative Design, January 21, 2010, available at: http://breezycreativedesign.com/2010/01/21/5-different-types-of-logos/ (accessed August 9, 2013). 612

120 The categorisation of the logos in five groups has the advantage that the groups are not too big, as in the categorisation of the logos in three groups, and do not seem to overlap, as might be the case in the categorisation in six and seven different logo types, respectively. Categorization into five different logo groups: 620 1.brandmark; for example the apple logo of Apple; 2.wordmark; for example the Sony logo; 3.lettermark; for example the IBM logo, with the horizontal stripes; 4.combination mark, of a brandmark and a wordmark, for example the Unilever logo; 5.emblem, a wordmark or lettermark in an emblem, for example the Harley-Davidson logo. Another distinction is between static and dynamic logos. Most logos are static, because it is easier to memorise and recall a logo that is always presented in the same consistent way with the same dimensions. However, some brands, such as Google, Michelin, MTV, Morton Salt and Saks Fifth Avenue, made the decision to use dynamic logos. MTV for example wanted a logo that fits with a rock music image. 621 Therefore, the logo was animated all the time in new ways. However, in the end the contours could be seen from the letters M and TV. Also Google invites all kinds of designers to come up with their renditions of the logo, which it calls Doodles. 622 However, the ‘doodles’ are alternated with the Google logo that is static.

618

Six different types of logos: 1.type-based logos, 2.symbol-based logos, 3.abstract-based logos, 4.initialbased logos, 5.badge-style logos, 6.mascot logos. Nora Reed, “6 Different Types of Logo Designs – Choose The Right One!”, Logo blog, April 2, 2012, available at: http://www.logoblog.org/types-of-logodesign/ (accessed August 9, 2013). 619 Seven different types of logos: 1.abstract, 2.descriptive, 3.emblematic, 4.illustrative, 5.letterform, 6.typographic, 7.wordmark. Tatiana Hindes, “7 different types of logos for small to medium businesses, which one is the right for yours?”, June 10, 2011, available at: http://www.soulspace.com.au/7-differenttypes-of-logos-for-small-to-medium-businesses-which-one-is-the-right-for-yours/ (accessed August 9, 2013). 620 Supra note 617. 621 “Knowing that many animators, designers, ad agencies, etc. were going to be working with the logo made them think how, just like rock music always changes, the logo should also. This was a concept that had never been used on a logo before. The “M” and the “TV” could be made of any colors and/or materials.” Frank Olinsky, “MTV Logo Story”, available at: http://www.frankolinsky.com/mtvstory1.html (accessed August 9, 2013). 622 Google Doodles, available at: http://www.google.com/doodles/finder/2012/All%20doodles (accessed August 9, 2013).

121

Chapter 4 Analysis of the Legal Conflict The non-scalability of litigation and arbitration necessitates the prerequisite of automation for any solution Introduction This Chapter provides a description of aspects of social media which lead to legal conflicts between internet users, trademark holders and social media providers. The sections below (Chapter 4.1-8) will distinguish eight elements of the legal conflict between trademark holders, social media providers and internet users: - a perception by internet users, social media providers and image search engines that the trademark logo is without protection; - the ample access to the unauthorised use of the trademark logo; - the proliferation, scale and speed of the unauthorised use of the trademark logo; - the permanence of the uploaded unauthorised trademark logos on the internet; - the uncertain boundaries of the trademark logo; - stakeholders that are either overwhelmed or ignorant to the infringement; - a loss of control for trademark holders; - and the emergence of new technology such as cloud computing. After analysing and finding that the legal conflict cannot be reconciled with a solution based on conventional case-by-case litigation or dispute resolution Chapter 4.2 concludes that a paradigm shift is necessary.

Chapter 4.1 Case-by-case solution not sustainable The unauthorised use of the trademark logo on social media has been so widespread, massive and fast-paced that it places the protagonists – trademark holders, social media providers and internet users – in an uncertain legal position. As this Chapter

122 will argue, the current case-by-case solutions 623 using existing IP laws is not sustainable, nor is it advisable.

Chapter 4.1.1 Perception of internet users, social media providers and search engines Internet users make unauthorised use of trademark logos as if there are no restrictions. Despite some prohibitory words in the Terms of Service of social media sites against intellectual property infringements by third-parties, the unauthorised use of the trademark logo is not mentioned. Instead, image search engines and social media providers have technically enabled internet users to use trademark logos, regardless of whether the trademark holder has authorised such use, which simply reinforces the perception of internet users that to use trademark logos without authorisation is legitimate. Internet users share trademark logos for a variety of reasons. Some internet users want to share with their social media relations their love or hate for a brand of which the logo is the symbol. While others see the logo to express part of their personality. 624 And some internet users perceive the trademark logo as raw material with which they may freely use to express some commercial, artistic or political message (see Chapter 6 “Trademark Dilution And Its Defences”, about the use of trademark for parody, satire and critical comment).

Chapter 4.1.2 Ample access to the unauthorised trademark logo Search engines, such as Google, Bing and Baidu each have a special search engine for images, called Google Images, 625 Bing Images 626 and Baidu Images, 627 respectively. One can argue that these image indexing sites are the biggest enablers or inducers of unauthorised use of trademark logos. The search engines index all the pictures their webspiders come across on the internet. Some of those pictures are trademark logos, that 623

In case the parties are willing to bind themselves to the award, arbitration might be a more efficient way to resolve a dispute than litigation. However, the massiveness of the legal conflicts also outnumbers the arbitrators’ capacity. 624 Drescher, supra note 42, at 338. 625 Google Images, available at: http://images.google.com/. Baidu Images, available at: http://image.baidu.com/ (both accessed August 9, 2013). 626 Bing Images, available at: http://bing.com/images (accessed August 9, 2013). 627 Baidu Images, supra note 625.

123 have been uploaded somewhere on the internet without permission of the trademark holder. Once these trademark logos are indexed on the search engine, they can be selected with two right clicks on the mouse, copy-and-pasted, and uploaded somewhere else on the internet, for example on a social media site. For instance a simple search for the LV logo, one gets 493,000,000 results, spread out over many pages, with 24 pictures per page related in some way to the LV trademark logo. 628 One can directly copy-and-paste a picture from these search result pages, without ever seeing any warning against possible infringement of intellectual property rights. If one clicks on any picture on the Google Images site one will be taken to a page where one will see in a column which takes in a fourth of the complete page some information about the website where Google found the image, the dimensions of the image, the type of the image (the format, for example jpeg), and the sentence: “Images may be subject to copyright.” The possibility that images may be subject to trademark law is not even suggested. The rest of the column remains empty. Internet users might see the technical possibilities to copy-and-paste any trademark logo as an implied consent by the search engine that gives them those options. This thesis asserts that a trademark holder should be able to freely determine whether Google can index a picture of its trademark. Google gave some advice to those with a website, so that their images will be indexed successfully. 629 Moreover, there are two possibilities for trademark holders to opt-out of Google Images so that the trademark logos they have placed online will not be indexed. 630 However, these efforts do not solve the problem that Google Images still indexes trademark logos that have been uploaded from sites that were not under the control of the trademark holder.

628

It becomes immediately clear that many images related to the LV logo were not uploaded by Louis Vuitton, and worse, violate the integrity of the logo, and dilute by blurring or tarnishment. 629 Illyes explained that when it is not clear from the URL that there are pictures, then Googlebot will crawl the URL first, and if an image was found Googlebot-Image will revisit. Gary Illyes, “1000 Words About Images”, Google Webmaster Central Blog, April 25, 2012, available at: http://googlewebmastercentral.blogspot.in/2012/04/1000-words-aboutimages.html?utm_source=twitterfeed&utm_medium=facebook (accessed August 9, 2013). 630 Google attempted to educate users on the possibility to opt-out of Google Images by providing a metatag in the HTML code of the page, or to put a “robots.txt file in the server root. Robots Pages, available at: http://www.robstxt.org (accessed on August 9, 2013).

124 Chapter 4.1.3 Proliferation, scale and speed of contentious content Before the popularity of social media, false information could already spread very rapidly. In 1996 a false rumour about the clothing designer Tommy Hilfiger erupted on the internet. According to the rumour, Hilfiger had said: “If I had known that AfricanAmericans, Hispanics, and Asians would buy my clothes, I would not have made them so nice.” 631 One of the components of the rumour was that Hilfiger had made the statement on the Oprah Winfrey show. However, Hilfiger never appeared on the Oprah Winfrey show. The false rumour was very damaging to brand value of Tommy Hilfiger. 632 Social media sites created the unprecedented possibility for every internet user to communicate and share information efficiently and effectively, thanks to the interoperability between different platforms. With minimum effort internet users can use social media to amplify the diffusion of information. In fact, this scalability is one of the great advantages of social media. 633 With the same amount of programming one’s social media site can provide the same service, no matter whether there are just a few or millions of internet users. 634 The other side of the coin is that the same can be said for the challenges of unauthorised use of trademark logos. Suppose one internet user uploads an unauthorised trademark logo, or worse, a mutilated version of the trademark logo. After a short time, the unauthorised and mutilated trademark logo may have spread epidemically among social media sites, and have come to the attention of thousands or even hundreds of thousands of internet users. 635 Such actions might have devastating effects on the reputation and goodwill of the trademark logo. 631

Barbara Mikkelson & David P. Mikkelson, “Tommy Rot, Urban Legends Reference Pages”, May 6, 2006, available at: http://www.snopes.com/racial/business/Hilfiger.asp; Tommy Hilfiger “Racist” Rumor Is Fashionable Again, About.com, http://urbanlegends.about.com/library/weekly/aa121698.htm (both accessed August 9, 2013). 632 Id. 633 Insights about value of a network and its scalability have developed via laws developed by Sarnoff, Metcalfe and Reed. Sarnoff’s law which states that the value of a broadcast network is proportional to the number of viewers, can be applied to networks: the value of a network corresponds proportionately with the number of users of a network. David Sarnoff, Wikipedia. Metcalfe’s law (Robert Metcalfe) Value of a telecommunications network is proportional to the square of the number of connected users of the system n(n-1)/2. Metcalfe’s law, Wikipedia. Reed’s law: utility of large networks, particularly social networks, can scale exponentially with the size of the network, which goes faster than Sarnoff’s or Metcalfe’s law. David Reed, Reed’s Law, Wikipedia. 634 The only difference is that one has to buy more servers space. 635 Stephanie Clifford, “Video Prank at Domino’s Taints Brand”, New York Times, April 15, 2009, available at: http://www.nytimes.com/2009/04/16/business/media/16dominos.html (accessed August 9, 2013).

125 One complicating factor is that some internet users have not changed their privacy settings and thus share their information with everybody. If an internet user has set up his social media profile in such a way that he is only sharing the content he uploads with his social media connections, he can assume that his content will only reach this limited audience. However, despite the internet user’s privacy settings, the distribution of the content can reach a much bigger audience than intended, 636 including the government. 637 Moreover, search engines index even the content that is “locked” within social media. Social media connections can republish 638 content so that the content will be exposed to their respective social networks too, or they can republish it outside this social media site. 639 Since platforms have converged in respect to the media they provide, content can jump seamlessly from one platform to the other. And many internet users make use of interoperability sites that make it possible to automatically republish across many platforms. Therefore, both good and bad news can spread like wild fire. An interesting case is the dissemination of the prank video by two Domino’s Pizza employees in 2009. 640 The video, which showed unhygienic acts with pizzas to put it euphemistically, was uploaded to YouTube. 641 Within two days half a million people saw the video on YouTube, many more via other social media sites such as Twitter. References to the 636

“Digitised communications also allow the expression to come to the attention of people beyond the speaker’s intended audience.” Rowbottom, supra note 533, at 366. 637 Facebook users have no control with whom their friends shares their profile. Jeff John Roberts, “‘Friends’ can share your Facebook profile with the government, court rules”, PaidContent, August 15, 2012, available at: http://gigaom.com/2012/08/15/friends-can-share-your-facebook-profile-with-the-government-courtrules/?utm_source=General+Users&utm_campaign=cd049c36d7-c%3Amed+d%3A0816&utm_medium=email (accessed August 9, 2013). 638 Re-publication includes linking, re-tweeting, embedding, re-posting and re-blogging. See, Jason J. Lunardi, Guerrilla Video: Potential Copyright Liability for Websites that Index Links to Unauthorized Streaming Content, 19 FORDHAM INTELL. PROPO. MEDIA & ENT. L.J. 1077, 1081 (2009). Seth A. Metsch, Embedded Media: Apps, Widgets, RSS and Embedded Content, 978 PLI/PAT 235 (2009). 639 One can pose the question whether an author of a post will also be liable for republication on other websites. M. Collins, The Law of Defamation and the Internet, 3rd ed., 2010, at 5.38–5.41. 640 Jaram Park et al., Sentiment Analysis on Bad News Spreading, CSCW Workshop on Design, Influence, and Social Technologies (DIST) (2012), available at: http://distworkshop.files.wordpress.com/2012/02/dist2012-workshop_2-2.pdf (accessed August 9, 2013). 641 Fragments of the prank video that was removed from YouTube can be seen here, in a reportage of WCBC, Charlotte New Caroline, available at: http://www.youtube.com/watch?v=OhBmWxQpedI (accessed August 9, 2013).

126 video could be found in five of the 12 results on the first page of Google search for “Domino’s”. Domino’s Pizza’s reputation was damaged and the perception of its quality among consumers went from positive to negative in just days. 642 Then again, social media also helped to identify the perpetrators. 643 Domino’s Pizza reacted with a counteroffensive public-relations campaign, of course using social media to express its views. 644 The libel case Cairns v Modi in the UK illustrated the connection between scope and spread of the injurious information on the one hand and the damages awarded on the other hand. In this case, £90,000 in libel damages was awarded after defamatory allegations of cricket match fixing were made on Twitter 645 and an online journal, where it was seen by 65 and 1,000 people, respectively. It was recognised that the spread via social media was an aggravating factor; thus, the ordinarily £75,000 award was supplemented with an additional £15,000. The scope of dissemination on social media sites cannot really be contained, because republishing between social media connections and between different social media platforms is so easy. Therefore equitable remedies are often not possible. Instead an action on the basis of the legal remedy of compensatory damages is available for the injured party. 646 However, as will be shown in Chs. 5 and 6, the available courses of action are not sufficient. 642

“In just a few days, Domino’s reputation was damaged. The perception of its quality among consumers went from positive to negative since Monday, according to the research firm YouGov, which holds online surveys of about 1,000 consumers every day regarding hundreds of brands.” Stephanie Clifford, Video Prank at Domino’s Taints Brand, New York Times, April 15, 2009, available at: http://www.nytimes.com/2009/04/16/business/media/16dominos.html (accessed August 9, 2013). 643 The perpetrators were fired by Domino’s Pizza and held in custody at the Conover police department on felony charges of tampering and distributing food. Russell Goldman and Jason Stine, Star of Domino's Pizza Gross-Out Video Is Sorry, ABC Good Morning America, May 2009, available at: http://abcnews.go.com/GMA/Business/story?id=7500551#.UYjfKqIhpDM (accessed August 9, 2013). Whether the perpetrators were convicted or not, could not be found. 644 Domino’s created a Twitter account: @dpzinfo and uploaded a YouTube video by its chief-executive, which was later removed. More generally, they started a website called Pizza Turnaround. Patrick Doyle, president of Domino’s Pizza stated: “You can even use negative comments to put you down or you use them to excite you and energize your process to make a better pizza. We did the latter.” December 21, 2009, available at: http://www.youtube.com/watch?v=AH5R56jILag (accessed August 9, 2013). Jaram Park et al., Managing Bad News in Social Media: A Case Study on Domino’s Pizza Crisis, International AAAI Conference on Weblogs and Social Media (ICWSM) (2012), available at: http://mia.kaist.ac.kr/publication/icwsm2012_park.pdf (accessed August 9, 2013). 645 Cairns v Modi, [2012] EWHC 756 (QB). 646 “[I]n some cases content can be republished so quickly and in so many places that an adjudication by a court or agency may be futile and the only remedy is an award of damages, assuming the author’s identity is known.” Rowbottom, supra note 533, at 381.

127 Chapter 4.1.4 Permanence of uploaded logos As Judge Benjamin Cardozo wrote in 1931: “What gives the sting to writing is its permanence in form. The spoken word dissolves, but the written one abides and perpetuates the scandal.” 647 Cardozo’s words are relevant in the era of social media, perhaps to even a greater extent, user-generated content has led to a democratisation and disintermediation of content, but the lack of gatekeepers is not only a strength, it is also a weakness. This can lead not only to a fountain of creativity, but also potentially flood the system with adulterated content that can have negative effects to rights holders and the public at large. There are two opposing technological developments in social media. On the one hand it has become increasingly easy to upload, post, publish or link to content. Indeed, the gap between thought and expression to the outside world has become smaller. 648 On the other hand, once something is uploaded, posted or linked somewhere on the internet, it is difficult if not impossible to remove. This level of persistence varies with social media sites. 649 Twitter keeps messages accessible to the public for a limited period of time, but is making its entire archive accessible to the U.S. Library of Congress, 650 based on its users’ consent for disclosure by virtue of its Private Policy. Because messages can be republished and because there is considerable interoperability between the different social media, messages can always jump to other persistent platforms before it could be retracted. Since the threshold is so low and implications for internet users seem to be inconsequential, internet users might be tempted to spontaneous actions of generating content. But because content can stay forever online a rights holder can ultimately find

647

Ostrowe v Lee, 175 N.E. 505, 506 (N.Y. Ct. App. 1931). “When a person says whatever is on his mind, the gap between the thought and its expression to the outside world is minimal. It is not mediated by further reflection, research or verification.” Rowbottom, supra note 533, at 374. 649 Danah Boyd, Social Network Sites as Networked Publics: Affordances, Dynamics, and Implications in NETWORKED SELF: IDENTITY, COMMUNITY, AND CULTURE ON SOCIAL NETWORK SITES (Z. Papacharissi, ed., 2010). 650 Matt Raymond, “How Tweet It Is!: Library Acquires Entire Twitter Archive”, Library of Congress, April 14, 2010, available at: http://blogs.loc.gov/loc/2010/04/how-tweet-it-is-library-acquires-entiretwitter-archive/. See also: Audrey Watters, “How the Library of Congress is Building the Twitter Archive”, O’reilly Radar, June 2, 2011, available at: http://radar.oreilly.com/2011/06/library-of-congress-twitterarchive.html (both accessed August 9, 2013). 648

128 the content and take legal steps against the internet user and/or internet service provider. 651 The lack of a possibility to reformulate, perfect and retract (see Chapter 8 on the moral right of withdrawal) can potentially lead to serious legal problems which seem disproportionate. 652 It is interesting to realise that a virtual medium can also be so lapidary. Solove stated: “There is a grave danger that people will enslave themselves and each other by making past mistakes permanently and readily available for the rest of their lives.” 653 As Solove continued: “Information that was once scattered, forgettable, and localized is becoming permanent and searchable. Ironically, the free flow of information threatens to undermine our freedom in the future.” 654 However, one can also argue that because of this characteristic the massive amount of infringing content stays online forever. An interesting question that might ultimately be answered by the U.S. Supreme Court is whether a message that has been deleted and made inaccessible to internet users is no longer accessible for the government, unprotected by state or federal privacy protection. 655 Judge Sciarinno Jr. compared messages on social media with messages on the street: “Well today, the street is an online, 651

Rowbottom compared the situation in which internet users take into account the possibility that they are being surveyed with a digital version of Jeremy Bentam’s panopticon. Rowbottom, supra note 533, at 367. See also Panopticon, Wikipedia, available at: http://en.wikipedia.org/wiki/Panopticon (accessed August 9, 2013). 652 The Strasbourg Court has considered the factor of dissemination, looking at whether there was any “possibility of reformulating, perfecting or retracting” a statement before putting it into the public domain. Fuentes Bobo v Spain (2001) 31 E.H.R.R. 50 at [46]. 653 Daniel Solove, Speech, Privacy and Reputation on the Internet in THE OFFENSIVE INTERNET (Martha Nussbaum & Saul Levmore, eds., 2011), at 16. 654 SOLOVE, supra note 290, at 4. 655 A subpoena issued by the New York County District Attorney’s Office to Twitter, ordered that it provides all possible information, including tweets, and “non-public location and movement information”. (Amicus Curiae Brief Of American Civil Liberties Union, New York Civil Liberties Union, Electronic Frontier Foundation, And Public Citizen, Inc., In Support Of Twitter, Inc.’s Appeal, August 27, 2012, at 1, that can be derived from the internet protocol address of an Occupy Wall Street protester, without the need to get a search warrant. Criminal Court of the City of New York judge Matthew Sciarrino Jr. upheld the district attorney’s order (Criminal Court of the City of New York, County of New York, JURY 2, The People of the State of New New York v Malcolm Harris - June 30 Decision and Order, Docket No: 2011NY080152) (The People of the State NY v Harris). Judge Sciarinno Jr. compares messages on social media with messages on the street, at 4: “Well today, the street is an online, information superhighway, and the witnesses can be the third party providers like Twitter, Facebook, Instragram, Pinterest, or the next hot social media application.” and at 6: “If you post a tweet, just like if you scream it out the window, there is no reasonable expectation of privacy,” which is now appealed by Twitter. Aden Fine, “Twitter Appeals Ruling in Battle Over Occupy Wall Street Protester’s Information”, August 27, 2012, ACLU, available at: http://www.aclu.org/blog/technology-and-liberty-national-security-free-speech/twitter-appeals-rulingbattle-over-occupy (accessed August 9, 2013).

129 information superhighway, and the witnesses can be the third party providers like Twitter, Facebook, Instagram, Pinterest, or the next hot social media application.” 656 He continued: “If you post a tweet, just like if you scream it out the window, there is no reasonable expectation of privacy.” 657

Chapter 4.1.5 Uncertain boundaries Bessen and Meuren asserted that “if you can’t tell the boundaries, it ain’t property.” 658 It is sometimes argued that jurisdictions have not provided any bright-line rules for what internet users can and can not do with a trademark logo for which they have no authorisation and thus confusion exists. This combined with the fact that there seem to be an uninformed laissez-faire, if not hostile, attitude towards IP rights amongst internet users. In contrast with the technological possibilities, it can, admittedly, be sometimes difficult for internet users to find out what is authorised use of a trademark logo (see Chapter 9 “Paradigm Shift”, which is proposing a uniform solution that makes transparent which use of the trademark logo on social media is authorised) or even to verify whether a trademark is registered or not. 659 This can make it difficult for even the most benign of internet users that want to use a trademark logo in an authorised way on social media. 660 Thus, the relevant provisions of trademark law are either not known or ignored by most internet users. Of course, even the knowledge of these law provisions is sometimes not enough. For example one cannot use a trademark logo without authorisation in a commercial way. An internet user might not use the trademark logo he or she uploaded 656

People of the State of NY v Harris, id., at 4. People of the State of NY v Harris, id., at 6. 658 Read Chapter 3 “If You Can’t Tell the Boundaries, Then It Ain’t Property” of JAMES BESSEN AND MICHAEL JAMES MEURER, PATENT FAILURE: HOW JUDGES, BUREAUCRATS, AND LAWYERS PUT INNOVATORS AT RISK, 47- 72. 659 Problems related to logo: Difficult to find whether the trademarks have been registered, Watch out! You Might Be Infringing Someone’s Trade Mark, RODYK, available at: http://www.rodyk.com/front/poppage/261 (accessed August 9, 2013). 660 Many trademark holders do no explain what is authorised use of their trademark logo. And those that do explain it, do this in a non-uniform way, so that each time, an internet user had learned how to find what is authorised of one trademark logo, he has to unlearn this when he wants to know what is authorised use of another trademark logo. More about this intransparency challenge can be found in Chapter 9 “Paradigm Shift”. 657

130 on social media in a commercial way, but what if a social media site takes commercial advantage of the trademark logo uploaded by the internet user. In other words: where does commercial use start and where does it end? Chapter 5 “Trademark Infringement And Its Defences” will elaborate on this question. The same question can be asked in regard to parody, satire and critical comments (see Chapter 6 “Trademark infringement And Its Defences”).

Chapter 4.1.6 Trademark holders and OSPs are overwhelmed, internet users are ignorant of infringement The scale of unauthorised use of intellectual property rights on the internet is massive. Even where OSPs attempt to enforce intellectual property rights, they cannot keep up with the pace of infringements. For instance, Google is transparent about copyright removals, 661 and in August 2012 it claimed “to remove more than 4.3 million URLs in the last 30 days alone”, and, moreover, Google take valid copyright removal notices into account in its ranking search algorithm to rank them into obscurity. 662 One month later Google received more than 8.5 million copyright removal receipts. 663 Again Google did not publish information on the number of requests to remove trademarks, including trademark logos. One can assume that these numbers follow the trend of the number of copyright removal requests. Given the sheer numbers, to enforce unauthorised trademark logos on a case-by-case basis seems not feasible. In other words: litigation and arbitration are not scalable. The problem is bigger than the amount of actions taken by trademark holders, because of so called tolerated use. 664 Some of the trademark holders think they cannot do 661

An overview of the scale can be found at Google Transparency Report, available at: http://www.google.com/transparencyreport/removals/copyright/ (accessed August 9, 2013). 662 “Since we re-booted our copyright removals over two years ago, we’ve been given much more data by copyright owners about infringing content online. In fact, we’re now receiving and processing more copyright removal notices every day than we did in all of 2009— more than 4.3 million URLs in the last 30 days alone. We will now be using this data as a signal in our search rankings.” Amit Singhal, “An update to our search algorithms”, Inside Search, The official Google Search blog, August 10, 2012, available at: http://insidesearch.blogspot.ca/2012/08/an-update-to-our-search-algorithms.html?m=1 (accessed August 9, 2013). 663 Google received 16,107,468 copyright removal requests in the last month (July 2013), available at: http://www.google.com/transparencyreport/removals/copyright/ (accessed on August 9, 2013). 664 Wu describes tolerated use for copyright: “Tolerated use occurs when a copyright owner knows about infringing activity but does not act to halt it or seek to be compensated for it. This informal practice may be

131 anything about it or they do not want to do anything about it. The scope of the problem is further blurred by second level agreements between content holders and social media providers, 665 in which social media providers share the revenues they make from the infringing content with the content holders. Aretz wrote that operators of photo-sharing platforms never entered any second level agreement so that right holders in images still bear the costs of tracking their content over the internet. 666 Aretz further speculated that because of privity of contract 667 the second level agreements do not have any impact on internet users’ legal status, unless they are interpreted as implied license and estoppel to exculpate the user. 668 It is hard for trademark holders to vindicate their rights. The current legal environment, with prescribed notice-and-takedown requirements allowing OSPs, including social media providers, to invoke the safe harbour provisions provide that OSPs take down any content after a notice sent by trademark holders and at the same time do not proactively filter before content is uploaded (see Chapter 7 “Intermediate Liability”). Because social media sites, such as Facebook, Twitter and YouTube get millions of notifications, they have tried to automate the takedown process. But since this process is far from perfect, trademark holders try to enforce their rights against the primary and secondary infringers. Because real-name policy is not implemented and probably will not in the future, trademark holders try to enforce their trademark rights against OSPs if they cannot track down the internet users (see Chapter 7 “Intermediate Liability”). The internet users do not know what kind of use is authorised or not authorised and what is legal or illegal. And after being exposed to so much unauthorised content on social media, on image search engines, and having a technology available that can copyand-paste unauthorised content stripped from any metatags, many an internet user assumes that uploading unauthorised content is legal. This had led to, as Lee put it, a grounded in a copyright owner’s laziness, expansive enforcement costs, a desire to create goodwill, or a strategic decision to enjoy the benefit of the unauthorized use.” Tim Wu, Tolerated Use, 31 COLUM. J.L. & ARTS 617, 619 (2008). 665 “Second Level Agreements are preemptive licenses granted by copyright owners to platforms operators, with the purpose of ratifying the mass usage of copyrighted content by their users.” Yafit Lev Aretz, Second Level Agreements, 45 AKRON L. REV. 137 (2012). 666 Id. 667 Privity of contract is when rights cannot be conferred to or obligations imposed on any one else than the parties of the contract. 668 Aretz, supra note 665.

132 “warming up” instead of a chilling effect on user-generated content (which will be further discussed in Chapter 8.7 “Rationale for moral right of integrity for the trademark logo”). Thus, there is much room for improvement here.

Chapter 4.1.7 Loss of control The ascend of social media sites precipitated the perception of a loss of control 669 for trademark holders in regard to the unauthorised use of their trademark logo on social media; for social media providers in regard to secondary liability and for internet users in regard of direct liability, in case of content infringement. However, there is no reason for defeatism for the protagonists involved. After sometimes decades of investing labour, effort and investment in their trademark logo, trademark holders have found out that social media sites and Google Images have de facto outlawed the use of their trademark logo by making it possible for every internet user to copy-and-paste and upload pictures stripped of metadata. Some trademark holders perceive that they have lost control over the use of their own trademark logo on social media. 670 This dissertation goes beyond the advice set up a communication strategy for social media, and to develop and implement a social media policy, 671 as marketing 672 and public relations 673 experts tend to focus on. This dissertation will propose a paradigm shift which will give back some measure of control to trademark holders, but also to social media providers and internet users. On the one hand by making OSPs fully liable for secondary liability of trademark infringement, and 669

“It is no wonder that content industries feel threatened, not just because people recirculate what they regard as their property, but also because they are no longer able to exercise the kind of control over the marketplace that they imagine they used to have.” Christina Spiesel, Responding to Rebecca Tushnet, Worth a Thousand Words: The Images of Copyright, 125 HARV. L. REV. 683 (2012). 670 McGeveran, supra note 562. 671 Boudreaux has set up a database of social media policy papers of many famous brands and organisations. Chris Boudreaux, “Policy Database, Social Media Governance, 2009-2013”, available at: http://socialmediagovernance.com/policies.php (accessed August 9, 2013). 672 Gaines-Ross comes up with six strategies to defend a company's reputation on social media in a reactionary way: proportionate reaction; respond quickly, tell your organisation’s side of the story, use social media for your message, find third parties that can amplify your message, stockpile credentials. See Leslie Gaines-Ross, Reputational Warfare, HARV. BUS. REV. 70, 73 (December 2010). O’Dell interviewed 6 experts: Jolie O’Dell, “6 Challenges to Managing a Brand on the Social Web”, June 30, 2010, available at: http://mashable.com/2010/06/30/brands-social-web (accessed on August 9, 2013). 673 Andres Wittermann, The global social media challenge: a social marketer’s guide to managing brands across borders, IPRA, April 10, 2013, available at: http://ipra.org/itl/04/2013/the-global-social-mediachallenge-a-social-marketer-s-guide-to-managing-brands-across-borders (accessed August 9, 2013).

133 on the other hand by providing some degree of control to the internet users by making transparent which use is authorised. Social media providers perceive a loss of control since, even though they operate under the aegis of the safe harbour provisions, they are still held liable for secondary liability of content infringement (as will be discussed further in Chapter 7 “Intermediate liability”). Also internet users can perceive a loss of control. If internet users have uploaded some infringing content online, it might have spread already to different platforms and they might not be able to remove the infringing content completely, damaging the reputation and goodwill of the trademark holder. Then, when the internet user is sued by the trademark holder, the latter has the advantage in the evolving asymmetric legal conflict.

Chapter 4.1.8 Emergence of new technologies such as cloud computing New technologies can make enforcement of intellectual property rights, including the trademark logo on social media more difficult. For example if a social media provider makes use of cloud computing, 674 it is not or not exclusively making use of its own servers. If a trademark holder wants to enforce its trademark logo on a social media site whose content is uploaded in the cloud, this makes that the social media provider not the only possible addressee of such an enforcement action: other candidate addressees are the cloud infrastructure provider and the cloud service provider. Complicating factors from a forensic point of view include that data held in the cloud are likely to be replicated for reasons of performance, availability, back-up and redundancy; 675 that the data are stored in a distributed way via techniques that include sharding 676 and other forms of

674

Dotcom: “There are many other sites that provide the same service as ours. Mediafire is based in the U.S. offers exactly the same service as us. Rapidshare, Filesurf, Filesonic. Microsoft has their own service called Skydrive, Google is launching a new service called Drive. Everyone is in this cloud arena, in the same business, and has the same problems as we have, battling piracy. But we are not responsible for the problem.” Kim Dotcom (Schmitz), founder of Megaupload, was interviewed by John Campbell of 3NewsNz, March 1, 2012, available at: http://www.youtube.com/watch?v=ZvrRaeHD5TE (accessed August 9, 2103). 675 Ian Walden, Accessing Data in the Cloud: The Long Arm of the Law Enforcement Agent, QUEEN MARY SCHOOL OF LAW LEGAL STUDIES RESEARCH PAPER No. 74/2011, at 3. 676 “Sharding is a type of database partitioning that separates very large databases the into smaller, faster, more easily managed parts called data shards.” Margaret Rouse, “Definition What is sharding?”, Search

134 partitioning, which means “that the data will likely be stored as fragments across a range of machines, logically linked and reassembled on demand, rather than as a single contiguous data set”; 677 that the data are encrypted; and it is difficult, if not impossible, to establish a link between the internet user who uploaded the content and the content in the cloud, especially where user applications are allegedly configured not to record such interactions. 678 Once the infringing content is located in the cloud it might be that the data are distributed over servers in different jurisdictions, with possibly different and conflicting intellectual property rights, privacy, data protection and evidential rules. Even if the cloud user, cloud service provider or cloud infrastructure provider would comply to these requests, the identified internet users might be located in a place, where although the jurisdiction could be asserted, because harm was experienced locally, 679 it is not economical to do so.

Chapter 4.2 Conclusion This Chapter demonstrates that the following aspects either complicate the effective enforcement of the trademark logo on social media or make it sheer impossible. Because of ample availability of copy-and-pastable pictures of unauthorised trademark logos on image search engines and social media sites, many internet users assume that they can upload to social media trademark logos without the authorisation of the trademark holder. These uploaded pictures of unauthorised trademark logos on social media can spread rapidly over different social media platforms, so that it can become impossible to be removed completely. Thus, after uploading, the internet user and possibly also the social media site, can be held liable at some point in the future. The uncertain boundaries Cloud Computing, December 2011, available at: http://searchcloudcomputing.techtarget.com/definition/sharding (accessed August 9, 2013). 677 Walden, supra note 675. 678 “One of the world’s most popular browsers, Internet Explorer from Microsoft allows for “InPrivate” browsing that, at least allegedly, does not leave any trace of the computer user having gone to any particular web site.” Joseph J. Schwerha IV, in Law Enforcement Challenges in Transborder Acquisition of Electronic Evidence from “Cloud Computing Providers” Draft Discussion Paper, Council of Europe, January 15, 2010, at 1. 679 Michael Geist, Is There A There There, Toward Greater Certainty for Internet Jurisdiction, 16 BERKELEY TECH. L.J. 1345 (2002).

135 of the trademark logo in the law make enforcement nearly impossible, aggravated by new technologies, such as cloud computing, that are making enforcement even more complex. Thus, this problem makes trademark holders, social media providers and internet users, each in their own way, vulnerable after they have lost some of their control. The massiveness of the unauthorised use of the trademark logo in combination with the non-scalability of litigation and arbitration leads to the prerequisite for any feasible solution that it is automated.

136

Part II Inadequacy of the Law Part I introduced the relevant field of law, the stakeholders and the conflict in which they are involved. Part II builds on this fundament and answers the question why legislation in the U.S. and EU offer inadequate measures to protect and enforce the trademark logo on social media. Part II is testing two hypotheses: Hypothesis 2. “The current trademark law is insufficiently protecting the unauthorised use of the trademark logo;” Hypothesis 3. “The safe harbour provisions about the law of intermediary liability of trademark infringement are not effective.” Part II starts with Chapter 5 “Trademark Infringement and its Defences”. Chapter 5 attempts to clarify the commerciality requirement for the protectability of the trademark and why the use of the trademark logo on social media falls within commercial use if there are any advertisements on the site. The Chapter will next show why the trademark logo is not susceptible to descriptive use defences. Chapter 6 “Trademark Dilution and its Defences” starts with the defences of dilution: parody, satire and critical comments, and non-commercial use. 680 It will then demonstrate that the measures against the unauthorised trademark logo on social media are compatible with these freedom of expression exemptions but with a few small adjustments. Finally Chapter 7 “Intermediary Liability” will demonstrate why the safe harbour provisions do not provide a solution to the problem of unauthorised use of the trademark logo on social media, but instead exacerbate the problems for all the stakeholders involved. Importantly the Chapter will provide the reasons why the OSPs, including social media providers, should be held responsible for intermediary liability.

680

Although commercial use is a prerequisite for the protection against trademark dilution, this author will try to explain the tautological exception of non-commerciality.

137

Chapter 5 Trademark Infringement and its Defences Why use of trademarks on social media are commercial and trademark logos incompatible to the descriptive use defence Introduction This Chapter demonstrates why the trademark logo on social media is not adequately protected against trademark infringement. When the mark used by a defendant is too similar or identical with the trademark of a plaintiff on similar or identical goods or services, one would assume that the resulting likelihood of confusion can be remedied with a measure against trademark infringement. However, the protection of the trademark right is not absolute: if the mark that causes a likelihood of confusion but is used in a descriptive way, the descriptive use defences can be invoked. The prerequisite of the trademark right is that the trademark needs to be used in a commercial way. Therefore the defence of non-commercial use of a trademark is often invoked when trademark infringement is alleged. If the trademark is used in a commercial way without permission of the trademark holder so that it would cause actual confusion or a likelihood of confusion, it becomes clear that the freedom of expression exemptions do not apply. Kozinski illustrated this in the context of U.S. law: “Whatever first amendment rights you may have in calling the brew you make in your bathtub ‘Pepsi’ are easily outweighed by the buyer’s interest in not being fooled into buying it.” 681 Chapter 5.1 will first describe and evaluate U.S. and EU legislation in relation to commercial use, together with the relevant jurisprudence. Following this introduction, the thesis will argue that in case of unauthorised trademark use of the trademark logo on social media it would be difficult to maintain that there is no commercial use of the 681

Kozinski, supra note 56, at 973.

138 trademark. In Chapter 5.2, the thesis will look into the descriptive use defences in the U.S. and in the EU, as applicable in case of trademark infringement, including on social media sites. Chapter 5.3 follows by looking at the bright line between legitimate and illegitimate unauthorised use of a trademark. Finally Chapter 5.4 concludes that the use of a trademark on social media is nearly always commercial and that the trademark logo is immune from descriptive use defences.

Chapter 5.1 Commercial use This section reviews commercial use of the trademark in the trademark law of the U.S. and EU, respectively. Since this thesis is about the trademark logo on social media, it is appropriate to focus on these two jurisdictions, since the most valuable trademarks originate from the U.S. and EU, and most social media were developed in the U.S., as was already explained in the Introduction under “Geographical scope”.

Chapter 5.1.1 Commercial use in the U.S. In the U.S., the Lanham Act makes clear that if someone, without consent of the trademark holder, uses the trademark in a commercial way and this leads to a likelihood of confusion or actual confusion he will be held liable for trademark infringement. 682 In other words: the use of a trademark in a commercial way is a precondition to impose liability of trademark infringement. This makes the non-commercial use of the trademark a defence for trademark infringement. The Lanham Act gives two examples of the term “use in commerce”, 683 in connection to goods and in connection to services: A mark is used in commerce in connection with goods when “it is placed in any manner on the goods or their containers or the displays associated therewith or on the tags or labels affixed thereto, or if the nature of the goods makes such placement impracticable, then on documents associated with the goods or their sale, and [..] the goods are sold or transported in commerce.” 684 One could argue that the use of a

682

15 USC § 1114. 15 U.S.C. § 1127. 684 15 U.S.C. § 1127(1). 683

139 trademark logo on social media pages, could be seen as digital versions of documents that are associated with goods or their sale. A mark is used in commerce in connection with services when “it is used or displayed in the sale or advertising of services and the services are rendered in commerce.” 685 So, use in commerce is the use of the trademark in bona fide business activities. The non-commercial use exclusion is designed to be used as an affirmative defence. This means that the defendant can affirm that the trademark has been used, but not in a commercial way - therefore the defendant should be exonerated. There is no case law regarding “commercial use” in the context of social media, yet. However, this thesis argues that the unauthorised use of the trademark logo on social media sites that all include advertisements can be qualified as commercial use of the social media provider: to de facto allow the placement of the trademark logo on social media pages helps make these pages more popular and one can argue that as a consequence the social media provider could be held liable for secondary liability. In the absence of case law regarding “commercial use” in the context of social media, there is however relevant case law. In 1-800 Contacts, Inc. v WhenU.com 686 the Second Circuit decided in 2005 that the purchasing of adware and pop-ups does not qualify as a use in commerce: “[C]ommercial use is not the equivalent of ‘use in commerce.” 687 The Second Circuit decided that: “Not only are “use,” “in commerce,” and “likelihood of confusion” three distinct elements of a trademark infringement claim, but “use” must be decided as a threshold matter because, while any number of activities may be “in commerce” or create a likelihood of confusion, no such activity is actionable under the Lanham Act absent the “use” of a trademark. Because 1-800 had failed to establish such “use,” its trademark infringement claims fail.” 688 However, in this case the court did not explicitly rule out that the provider of adware and pop-ups could not be held liable for secondary liability of trademark infringement. 685

15 U.S.C. § 1127(2). 1-800 Contacts, Inc. v WhenU.com, Inc., Docket Nos. 04-0026-cv and 04-0446-cv (2d Cir. June 27, 2005). 687 Merck & Co. v MediPlan Health Consulting, Inc., 431 F. Supp. 2d 425, 427 (S.D.N.Y. 2006). 688 1-800 Contacts, Inc. v. WhenU.com, Inc., supra note 686. 686

140 In Merck & Co. v Mediplan Health Consulting689 in 2006, the District Court for the Southern District of New York extended the 1-800 Contacts doctrine to the realm of keyword triggered advertisements. 690 Here too, the position of the provider of the keyword triggered advertisements was not questioned. In this case some of defendants, Canadian online pharmacies, purchased Merck’s trademark name Zocor as a keyword for the search engines of Google and Yahoo! to trigger their own advertisements or link to their own sites in special designated places next or above the search results. Judge Chin determined that using Zocor as a keyword to trigger the advertisement or website of the defendants in a search engine cannot be considered as use of the mark in the sense of a trademark since it is not “placed in any manner on the goods or their containers or the displays associated therewith or on the tags or labels affixed thereto, or if the nature of the goods makes such placement impracticable, then on documents associated with the goods or their sale, and . . . the goods are sold or transported in commerce”, as promulgated by 15 U.S.C. § 1127(1). 691 Judge Chin considered it “internal use of the keyword ‘Zocor’ [which] is not use of the mark in the trademark sense.” 692 In so deciding it appears Judge Chin is following Second Circuit law that treats “use in commerce” the same for goods and services. 693 However, one could also assert that the advertisements that will be displayed after the purchased keywords are typed in search engines is a service and constitutes use in commerce. 694 And beside primary liability of the buyers of a keyword triggered advertisement, it is difficult to qualify the

689

“Here, in the search engine context, defendants do not "place" the ZOCOR marks on any goods or containers or displays or associated documents, nor do they use them in any way to indicate source or sponsorship. Rather, the ZOCOR mark is "used" only in the sense that a computer user's search of the keyword "Zocor" will trigger the display of sponsored links to defendants' websites. This internal use of the mark "Zocor" as a key word to trigger the display of sponsored links is not use of the mark in a trademark sense.” Merck & Co. v Mediplan Health Consulting, Inc., supra note 687, at 22. 690 Read also Jonathan Moskin, Virtual Trademark Use - The Parallel World of Keyword Ads, 98 TMR 873. 691 Merck & Co. v Mediplan Health Consulting Inc., supra note 687, at 415. 692 With “internal use” judge Chin refers to 1-800 Contacts, Inc. v WhenU.com. “A company’s internal utilization of a trademark in a way that does not communicate it to the public is analogous to an individual’s private thoughts about a trademark. Such conduct simply does not violate the Lanham Act, which is concerned with the use of trademarks in connection with the sale of goods or services in a manner likely to lead to consumer confusion as to the source of the goods or services.”1-800 Contacts, Inc. v WhenU.com, supra note 686, at 409. 693 See Rebecca Tushnet, “keywords revisited: goods versus services”, Rebecca Tushnet’s 43(B)log, May 26, 2006, available at: http://tushnet.blogspot.hk/2006/05/keywords-revisited-goods-versus_26.html (accessed August 9, 2013). 694 Tushnet, id.

141 unauthorised use of the trademark by providers of keyword triggered advertisements other than secondary liability of trademark infringement.

Chapter 5.1.2 Commercial use in the EU Use of the trademark “in the course of trade”, is the EU equivalent of “commercial use” of a trademark in the U.S. Here too, use of the trademark “in the course of trade” is a precondition for the determination of a liability of trademark infringement. According to Article 5(1)a-b Trademark Directive 89/104/EEC, 695 the trademark holder is only entitled to prevent all third parties that use their trademark unauthorisedly in the course of trade. The equivalent of this provision can be found in Article 9(1)a-b Community Trademark Regulation 40/94/EC. 696 So, just as in the U.S., non-commercial use of the trademark can be used as a defence in case of trademark infringement. The use in the course of trade was interpreted by the ECJ in Matthew Reed v Arsenal Football Club in 2002, as use that “takes place in the context of commercial activity with a view to economic advantage and not as a private matter.” 697 Two related cases in 2006 and 2011 revolving around use by the European Commission of the trademark Galileo for a satellite navigation system, 698 further clarified the law. In the Galileo cases first the ECJ and later the CJEU held that the Commission was not offering goods or services on the market. “By using the word ‘Galileo’ in the context of the research, development and deployment phases of the project, which precede the economic operational phase proper, the Commission is not seeking to obtain an economic advantage over other operators, given that there are no operators in

695

Trademark Directive, supra note 146. In 2008, Directive 89/104/EEC was substituted by Directive 2008/95/EEC of the European Parliament And Of The Council of 22 October 2008 to approximate the laws of the Member States relating to trade marks. 696 Community Trademark Regulation, supra note 171. In 2009, the Regulation 40/94 was substituted by Council Regulation (EC) No 207/2009 of 26 February 2009 on the Community trade mark. 697 Arsenal Football Club, supra note 260, para. 40. 698 CFI, Galileo International Technology and others v Commission, (Galileo v Commission) (Case T279/03), Judgment of the Court of First Instance, May 10, 2006, para. 114 and Galileo International Technology v OHMI—Galileo Sistemas y Servicios (GSS Galileo Sistemas Y Servicios) (Galileon v OHMI), (Case T-488/08), Judgment of the CJEU, 6 October 2011.

142 competition with it in that field.” 699 It is questionable whether research in the pre-market phase is non-commercial. Research form the building blocks for all market activities. Whether research is for profit or not-for-profit, their results represent added-value which arguably all could be qualified as commercial and commercially quantified. The qualification “seeking to obtain an economic advantage over other operators” is definitely applicable in case of use of the trademark for keyword triggered advertisements. The same can be said for the advertisements on social media sites which de facto allow the placement of unauthorised trademark logos. An affirmative defence of trademark infringement is that although the trademark is operated in a commercial way, it is not commercially used by the defendant. In Google France and Google, the CJEU joined three cases in which Google operated as a reference service provider, permitting advertisers to select keywords that are trademarks of Louis Vuitton, Viaticum and CNRRH. 700 The keywords triggered advertisements are displayed under the heading ‘sponsored links’ or links to the sites of these competitors or counterfeiters. The CJEU stated: “Although it is clear from those factors that the referencing service provider operates ‘in the course of trade’ when it permits advertisers to select, as keywords, signs identical to trade marks, stores those signs and displays its clients’ ‘ads’ on the basis thereof, it does not follow, however, from those factors that that service provider itself ‘uses’ those signs within the terms of Article 5 of Directive 89/104 and Article 9 of Regulation No 40/94.” 701 Thus, according the CJEU, even though Google did operate in the course of trade, it did not itself use the trademark: “The fact of creating the technical conditions necessary for the use of a sign and being paid for that service does not mean that the party offering the service itself uses the sign.” 702 In L’Oréal and Others, the CJEU held that if due to “their volume, their frequency or other characteristics, the sales made on a marketplace such as eBay went beyond the realms of a private activity”, 703 sellers on eBay were acting in the course of 699

CFI, Galileo International Technology and others v Commission, id. and Galileo International Technology v OHMI—Galileo Sistemas y Servicios (GSS Galileo Sistemas Y Servicios), id. 700 Google France and Google, supra note 230. 701 Id., para.55. 702 Id., para. 57. 703 L’Oréal and Others, supra note 230.

143 trade. However eBay, the operator of the online marketplace, did not use the trademark, if it “provides a service consisting in enabling its customers to display on its website, in the course of their commercial activities such as their offers for sale, signs corresponding to trade marks, it does not itself use those signs within the meaning of that EU legislation.” 704 Therefore, EU case law demonstrates, just as in the U.S., that one can operate a trademark in the commercial way with impunity as long as one is not using the trademark directly for oneself. The interpretation of use in the course of trade (“seeking to obtain an economic advantage over other operators”) in the EU differs from the definition of commercial use (attached to a product or document associated with the product or sale, or advertised as a service) in the U.S. However, it seems that the courts in both jurisdictions use these interpretations to their discretion, to rationalise what they consider is fair and reasonable.

Chapter 5.1.3 Unauthorised trademarks on social media always commercially used One can argue that trademarks used on social media pages are always used in a commercial way. Social media providers exploit advertisements on their social media sites. If internet users upload unauthorised trademark logos on the social media sites, these can be perceived as more attractive to internet users. Below are two examples that show how the use of the unauthorised trademark on a site with one or more advertisements can be judged as commercial use of that trademark by the operator of that site: In People for the Ethical Treatment of Animals v Doughney, 705 Doughney registered and operated the gripe-site peta.org. The Fourth Circuit held that Doughney was liable for trademark infringement, because of his use of the PETA trademark with which he intended to divert consumers from the PETA website to his own website, either for commercial gain or with the intent to tarnish the mark by creating a likelihood of confusion as to the source, sponsorship, affiliation, or endorsement of the site. 706 Doughney’s website provided links to over 30 commercial operations offering goods and 704

Id. People for the Ethical Treatment of Animals v Doughney, 263 F.3d 359 (4th Cir. 2001). 706 Id., at 12. 705

144 services: “By providing links to these commercial operations, Doughney’s use of PETA’s Mark is “in connection with” the sale of goods or services.” 707 Another useful illustration of how the combination of unauthorised use of a trademark and advertisements on the same site can lead to a determination of commerciality is the I Hate Ryan Air case. 708 Although there was no confusion for consumers about the source of the criticism, because of the name and address of the website (www.ihateryanair.org), the respondent was forced to hand over the websiteaddress to the trademark holder. The reason was that the respondent received revenue of £322 from the commercial links on the site, and therefore took unfair advantage of the complainant’s trademark, according to the expert of the dispute resolution provider. This thesis concludes that no continuum of commerce exists. Just as one is either pregnant or not, one receives money using a third party’s unauthorised trademark or not. In the case of social media it would therefore be reasonable that the social media provider would be held liable for secondary liability, since he has both the control to prevent the uploading of unauthorised trademark logos on social media pages and benefits financially from the increased popularity of the uploaded unauthorised trademark logos (See Chapter 7.2.2 “Vicarious liability”). One can argue there cannot be a secondary infringer without a direct infringer. However, one can argue that internet users benefit in a commercially expressible way from the increased attractiveness that is associated with unauthorised use of the trademark logos. For example Facebook users upload a trademark logo unauthorisedly. These trademark logos make Facebook more attractive (because they embellish their site or the Facebook users can signal their personality to other Facebook users in a better way, potentially attracting more internet users to or attract them more frequently to Facebook). By uploading trademark logos unauthorisedly the value of the service the Facebook users receive from Facebook increases, because of the network effects (the more Facebook users the merrier Facebook will become and the more valuable the service is to Facebook 707

Id. at 8. Ryanair Limited v Robert Tyler, Dispute Resolution Service, D00008527, Decision of Independent Expert, available at: Nominet Dispute-Resolution Service Policy, July 28, 2008, available at: http://www.nic.uk/disputes/drs/decisions/decisionssearch/?searchText=Ryanair&x=28&y=14 (accessed August 9, 2013). The URL ihateryanair.co.uk is offline, but Robert Tyler has already registered the URL ihateryanair.org, which is online. 708

145 users). To quantify the increase in value of the service of Facebook users is difficult, but it is clear that neither Facebook users nor Facebook pays anything for the increase in attractiveness of the service in return, save the costs for notice-and-takedown procedures and litigation. The value the Facebook user extracts from the trademark holder he adds to the service he receives from Facebook. Therefore one can argue that the trademark logo is used in a commercial way by the Facebook users, bartering the attractiveness of the trademark logo for an improved service of Facebook (more users and more frequent users).

Chapter 5.2 Descriptive use defences The descriptive use defence for the descriptive use of a trademark can be found in the legislation of both the U.S. and EU, see below. However, one can argue that the descriptive use defence for the descriptive use of the trademark logo, given its unique characteristics, is never possible (see Chapter 5.3 “Difference between legitimate and illegitimate use of the unauthorised trademark”), so also not on social media sites. In fact, as both U.S. and EU case law underlines, one can argue that the descriptive use defence for the trademark name is no longer applicable when also the trademark logo is used. First some comments are made about the risks of allowing descriptive use of the trademark name. Frey argued that the public has an interest in not allowing individuals to create monopolies or other “barriers to competition by improperly using trademark law to remove words”, symbols, or product features from general use. 709 In the same vein Mencken wrote: “Life’s apologies, but the Goodrich Company must be aware that its trademark has passed into the English language.” 710 However, this process leads ultimately to genericide, 711 as can be illustrated by the Aspirin case, which metamorphosed from Bayer’s trademark into a product category name in 1921, 712 since it 709

Michael G. Frey, Comment, Is it Fair to Confuse? An Examination of Trademark Protection, the Fair Use Defense, and the First Amendment, 65 U. CIN. L. REV. 1255, 1260-61 (1997). 710 BF Goodrich Company claimed to have exclusive right in the use of their trademark “zipper”. Mencken refers to Life Magazine’s reply to Goodrich Company. HENRY L. MENCKEN, THE AMERICAN LANGUAGE, 1921 711 Genericide is when a protectable trademark becomes generic. Gary H. Fechter & Elina Slavin, Practical Tips on Avoiding Genericide, 66 INTA BULL. 20 (2011). 712 Supra note 225.

146 is easier to remember Aspirin than acetyl salicylic acid. Thus, Google’s opposition against 713 the inclusion of the verb “to google” in Merriam-Webster Collegiate Dictionary714 is in light of imminent genericide understandable. Although the definition is “to use the Google search engine to obtain information about (as a person) on the World Wide Web,” 715 Google’s problem with it is that the verb is lower-cased. And as The American Press already warned in 1952: “A trademark or business can be lowercased or misspelled to death.” 716

Chapter 5.2.1 Descriptive use defence in the U.S. When a plaintiff alleges that a third party is using his trademark unauthorisedly in a commercial way and is holding the defendant liable for trademark infringement, there are two varieties of the fair use defence the defendant can invoke in the U.S. The defendant can make either a classic fair use or a nominative fair use claim. Although the fair use defences are mutually exclusive, some defendants use both and let the judge determine which variety applies. 717 When analysing which of the two fair use defences can be applied, if at all, one should first make a basic distinction: is the trademark used in a primary, descriptive sense or in a secondary, trademark sense. 718 In the latter case, no claim on the fair use defences can be made. The difference can be explained with the following example: in the case of the trademark Beach Boys, if one uses the mark to describe boys who frequent a stretch of sand beside the sea, it would be use of a trademark in a primary, descriptive sense. However, if one uses the trademark Beach Boys to indicate the music band it would be trademark use in a secondary, trademark sense. 719 713

Elinor Mills, “Google says no ‘googling’ in trademark warning”, CNET, August 14, 2006, available at: http://news.cnet.com/8301-10784_3-6105481-7.html (accessed August 9, 2013). 714 Candace Lombardi, “Google joins Xerox as a verb”, CNET, July 6, 2006, available at: http://news.cnet.com/Google-joins-Xerox-as-a-verb/2100-1025_3-6091289.html (accessed August 9, 2013). 715 Definition of “google” in Merriam-Webster online dictionary, supra note 581. 716 DEATH OF A TRADEMARK, The American Press, February 1952, p 20. Mentioned in, Walter J. Derenberg, The Problem of Trademark Dilution and the Antidilution Statutes, 44 CAL. L. REV. 439, 464 (1956) at footnote 115. 717 Brothers Records, Inc. v Jardine, 318 F.3d 900 (9th Cir. 2003). 718 “The fair use defense "[allows] a junior user to use a descriptive term in good faith in its primary, descriptive sense other than as a trademark.” J. THOMAS MCCARTHY, MCCARTHY ON TRADEMARK AND UNFAIR COMPETITION 11:45 (4th ed. 2001). 719 Brothers Records, Inc. v Jardine, supra note 717.

147 Brookfield Communications, Inc. v West Coast Entertainment Corp. 720 demonstrated that the line between primary and secondary meaning can be thin. For instance, West Coast was deemed not to be infringing Brookfield Communications’ trademark “MovieBuff” when it used “Movie Buff” as a metatag. The Ninth Circuit held that “Movie Buff” was primary, descriptive use of the trademark, referring to someone who is enthusiastic for watching movies, and “MovieBuff” as secondary, trademark use of the trademark. 721 The space between the two words made the difference.

Classic fair use defence A brief definition of the classic fair use defence can be found in Nihon Keizai Shimbun v Comline Business Data: “[F]air use permits others to use a protected mark to describe aspects of their own goods.” 722 The classic fair use defence is codified in the Lanham Act, 15 U.S.C. para. 1115(b)(4) 723 and applies when the trademark is used in its primary, descriptive sense: 724 when a defendant uses the plaintiff’s trademark name, term or device of geographic indication to describe its own products. This way the public's right to use descriptive words in their ordinary descriptive sense prevails over the exclusivity claims of the trademark holder. 725 In other words: because of this defence, descriptive words are not monopolised by trademark holders who registered them, but can still be used to describe things needed for commercial and non-commercial expressions. 726 The provision includes the preconditions that the trademark is “used fairly” and “in good faith” which seem superfluous since the trademark will already be used in a descriptive way. 727 720

Brookfield Communications, Inc. v West Coast Entertainment Corp., 174 F.3d. 1036 (9th Cir. 1999). Id. 722 Nihon Keizai Shimbun, Inc. v Comline Bus. Data, Inc., 166 F.3d 65, 73 (2d Cir.1999). 723 Lanham Act, 15 U.S.C. § 1115(b)(4): “That the use of the name, term, or device charged to be an infringement is a use, otherwise than as a mark, of the party’s individual name in his own business, or of the individual name of anyone in privity with such party, or of a term or device which is descriptive of and used fairly and in good faith only to describe the goods or services of such party, or their geographic origin.” 724 Use of a mark not in a trademark sense, but in a descriptive sense, and in good faith. EMI Catalogue P'ship v Hill, Holliday, Connors, Cosmopulus Inc., 228 F.3d 56, 64 (2d Cir. 2000). 725 CarFreshner Corp. v S.C. Johnson & Son, Inc., 70 F.3d 267, 269 (2d Cir. 1995). 726 KP Permanent Make-Up, Inc. v Lasting Impression I, Inc., 543 U.S. 111, 122, 125 S.Ct. 542, 160 L.Ed.2d 440 (2004). 727 Lanham Act, 15 U.S.C. § 1115(b)(4): “That the use of the name, term, or device charged to be an infringement is a use, otherwise than as a mark, of the party’s individual name in his own business, or of 721

148 The 2004 Supreme Court case of KP Permanent Make-Up, Inc. v Lasting Impression I, Inc. 728 was about the generic words, and if not generic then descriptive words: “micro colors” that were part of Lasting Impression’s trademark logo. The Supreme Court agreed with the District Court 729 and overturned the Ninth Circuit Appellate Court, when it determined that these words did not acquire secondary meaning for the parties. At the District Court, KP Permanent claimed prior use of the words “micro colors” before Lasting Impression’s registration and also claimed the fair use defence. 730 When Lasting Impression conceded that KP Permanent did not use the words as a trademark, they gave KP Permanent the possibility to rely on the classic fair use defence that the words were used merely to describe their product. 731 KP Permanent clarified that a likelihood of confusion does not preclude a classic fair use defence. 732 Just as the 1924 case Warner & Co. v Eli Lilly & Co. already demonstrated: the use of a similar name by another to describe ones own product can be legal even if it confused the public about the origin of the goods. 733 The Supreme Court concurred with the District Court and applied the three pronged test 734 of 15 U.S.C. para. 1115(b)4 for the classic fair use defence: 1. term only describe goods or services; 2. term not used as a mark;

the individual name of anyone in privity with such party, or of a term or device which is descriptive of and used fairly and in good faith only to describe the goods or services of such party, or their geographic origin.” 728 KP Permanent Make-Up, Inc., v Lasting Impression I, Inc., supra note 726. 729 KP Permanent was allowed declaratory relief against Lasting Impression in the U.S. District Court for the Central District of California. Judgment, Case No. SA-CV-00-276-GLT, (EEx) (C.D. Cal., May 17, 2001). 730 Abel and Sieber argued that the focus of the District Court in KP Permanent Make-Up should have been on prior use defence instead of on the fair use defence. Then again, they remarked , the case would never have gone to the Supreme Court. Sally Abel and Albert Sieber, The Supreme Court’s KP Permanent Decision Opens a Can of Worms, Fenwick & West LLP, 2006, at 2, available at: http://www.fenwick.com/docstore/publications/ip/fair_use_palooza.pdf (accessed August 9, 2013). 731 KP Permanent Make-Up, Inc., v Lasting Impression I, Inc., supra note 726. 732 Id. 733 “The use of a similar name by another to truthfully describe his own product does not constitute a legal or moral wrong, even if its effect be to cause the public to mistake the origin or ownership of the product.” William R. Warner & Co. v Eli Lilly & Co., 265 U.S. 526, 528 (1924). 734 “After finding that Lasting had conceded that KP used the term only to describe its goods and not as a mark, the District Court held that KP was acting fairly and in good faith because undisputed facts showed that KP had employed the term .microcolor. continuously from a time before Lasting adopted the two-word, plural variant as a mark.” Supreme Court, KP Permanent Make-Up, Inc., v Lasting Impression I, Inc., supra note 726, at 3.

149 3. term used fairly and in good faith. It would be conceivable to include the absence of the use of a trademark logo as a fourth prerequisite, as the Volkswagen Aktiengesellschaft 735 case below will illuminate. However, one can also argue that the use of a trademark logo is not compatible with the third prerequisite that the term should be used fairly and in good faith. The Supreme Court interpreted the classic fair use defence of 15 U.S.C. paragraph 1115(b)4 strictly, so that the defendant claiming a classic fair use defence has no burden to negate any likelihood that the practice complained of will confuse consumers about the origin of the goods or services affected. 736 In other words, mirroring the legal principle that the burden is on the challenger, instead of on the party being challenged. Machat concluded that any resulting confusion in these cases is not due to the strength of a plaintiff’s mark, but rather due to its weakness. 737 The Supreme Court did not rule out that some degree of confusion could influence the fairness of the application of the fair use defence. 738 But the question remains how much consumer confusion precludes to a successful claim on the classic fair use defence. 739 The classic fair use doctrine is also applicable in the social media realm: when an undertaking that uses a trademark without authorisation of the trademark holder uses the words merely in their ordinary, descriptive meaning to sell its products or services, it can invoke the classic fair use defence. 740

735

Volkswagen Aktiengesellschaft v Church (Volkswagen Aktiengesellschaft), 411 F.2d 350 (9th Cir. 1969). In contrast to view of the Court of Appeals for the Ninth Circuit that there cannot be a fair use defense that leads to a likelihood of confusion. KP Permanent Make-Up, Inc., v Lasting Impression I, Inc., 328 F. 3d 1061, 1073 (9th Cir. 2003). 737 Michael Machat, The Practical Significance of the Supreme Court Decision in KP Permanent Make-Up, Inc. v. Lasting Impression I, Inc., 95 TMR 825, 831 (2005). 738 “While we thus recognize that mere risk of confusion will not rule out fair use, we think it would be improvident to go further in this case, for deciding anything more would take us beyond the Ninth Circuit’s consideration of the subject. It suffices to realize that our holding that fair use can occur along with some degree of confusion does not foreclose the relevance of the extent of any likely consumer confusion in assessing whether a defendant’s use is objectively fair.” Supreme Court, KP Permanent Make-Up, Inc., v Lasting Impression I, Inc., supra note 726, at 10. 739 Michael Fuller, ‘Fair Use’ Trumps Likelihood of Confusion in Trademark Law The Supreme Court Rules in KP Permanent Make-Up, Inc. v Lasting Impression I, Inc., B.C. INTELL. PROP. & TECH. F. 011001 (2006). 740 “In the social media space, a company that markets its product in a way that merely uses words for their ordinary, descriptive meaning does not constitute trademark use sufficient to offend the Lanham Act – even if those words happen to be someone’s trademark.” Michael G. Atkins, Social Media Law: Trademark Issues, Seattle Trademark Lawyer, undated, at 2, available at: http://seattletrademarklawyer.com/storage/Social%20Media%20Law.pdf (accessed August 9, 2013). 736

150 Instead of internet users on social media, social media providers can also themselves try to invoke the descriptive fair use defence. September 29, 2011, Facebook was sued by Timelines, Inc. before the U.S. District Court for the Northern District of Illinois 741 for using the name Timeline for one of its main features, 742 as introduced at the F8 Developers Conference on September 22, 2011. 743 Facebook argued before the court that Timelines and Timeline are generic terms 744 and tried to substantiate this by a survey in which 68 percent agreed with this statement. 745 Then Facebook asserted that Timelines’ mark is merely descriptive and had not acquired secondary meaning. 746 However, the court deemed the evidence for this inadequate to support a motion for a summary judgement. 747 Facebook then tried to invoke the fair use defence 748 and alleged that it did not use Timeline as a trademark and its use was merely descriptive of its offering, and it used the mark fairly and in good faith. 749 However, Facebook founder and CEO Mark Zuckerberg undermined this assertion, because he had referred to “Timeline” as Facebook’s “most important brand”, 750 intended to replace its trademarked “Wall”. 751 According to the document Facebook filed at the Securities and Exchange Commission on May 2, 2013, the case with Timelines, Inc. was settled. 752

Nominative fair use defence Just as the classic fair use defence, the nominative fair use defence can be applied in the social media realm. In the absence of any social media related jurisprudence, physical world examples can illustrate the doctrine.

741

Timelines, Inc. v. Facebook, Inc., No. 11-cv-6867 (N.D. Ill. Apr. 1, 2013), at 1. Facebook Timeline can include a summary of a user’s life since birth, using updates made to a user’s profile on the website. Introducing Timeline, Tell your life story with a new kind of profile, available at: https://www.facebook.com/about/timeline (accessed August 9, 2013). 743 Timelines, Inc. v. Facebook, Inc., supra note 741, at 12. 744 Id., at 14. 745 Id., at 13. 746 Id., at 14. 747 Id. at 19. 748 Which could be qualified as a classic fair use defence. 749 Timelines, Inc. v. Facebook, Inc., supra note 741, at 14. 750 Id., at 10. 751 Id., at 11. 752 Facebook, Inc., Securities and Exchange Commission, Form 10-Q, (Quarterly Report), May 2, 2013, at 33. 742

151 A brief definition of nominative fair use can be found in Saxlehner v Wagner: “defendants are not trying to get the good will of the name, but the good will of the good.” 753 It also makes clear that “[t]he Lanham Act does not prohibit commercial rival’s truthfully denominating his goods a copy of a design in the public domain, though he uses the name of the designer to do so”, 754 even if this leads to a substitution for another’s product, which is “a common method of advertisement that encourages competition.” 755 Just as the classic fair use defence, the nominative fair use defence can be based on 15 U.S.C. para. 1115(b)(4). 756 Since the New Kids on the Block case 757 the nominative fair use defence acknowledges that there are cases which include for the purposes of comparison, critique or point of reference, where there are no alternatives for the defendant but to describe the plaintiff’s trademark. “Where a mark incorporates a term that is the only reasonably available means of describing a characteristic of another’s goods, the other’s use of that term in a descriptive sense is usually protected by the fair use doctrine.” 758 Two publishers could not refrain from mentioning the trademark New Kids on the Block in a survey, otherwise the respondents would not have known about which band they should give their opinion. In New Kids on the Block, 759 the judge provided a three pronged test: 1. The product or service in question must be one not readily identifiable without use of the trademark. One could call this the subsidiarity principle. 2. Only so much of the mark or marks may be used as is reasonably necessary to identify the product or service. The defendant has to minimise its referral to the trademark. One could call this the proportionality principle. This principle was applied in this way: “[b]oth The Star and USA Today reference the New Kids only to the extent necessary to 753

Saxlehner v Wagner, 216 U.S. 375, 380-81, 30 S.Ct. 298, 54 L.Ed. 525 (1910). Societe Comptoir de L'Industrie v Alexander's Dep't Stores, Inc., 299 F.2d 33, 36 (2d Cir. 1962). 755 Neutrik AG v Switchcraft, Inc., No. 99 Civ. 11931 (JSM), 2001 WL 286722, at 3 (S.D.N.Y. Mar. 23, 2001). 756 Lanham Act, 15 U.S.C. § 1115(b)(4): “That the use of the name, term, or device charged to be an infringement is a use, otherwise than as a mark, of the party’s individual name in his own business, or of the individual name of anyone in privity with such party, or of a term or device which is descriptive of and used fairly and in good faith only to describe the goods or services of such party, or their geographic origin;”. 757 New Kids on the Block v News America Publishing Inc., case (971 F.2d 302 (9th Cir.1992). 758 Id. 759 Id. 754

152 identify them as the subject of the polls; they do not use the New Kids’ distinctive logo or anything else that isn’t needed to make the announcements intelligible to readers.” 760 3. The user must do nothing that would, in conjunction with the mark, suggest sponsorship or endorsement by the trademark holder. This indicates that using a trademark logo is not compatible with the avoidance of affiliation confusion. One could call this the passivity principle. There has been criticism of the New Kids on the Block 761 doctrine concerning the burden of proof. As mentioned above it is a well-established principle of law that the plaintiff has the burden of proof, which was also applied in the classic fair use defence case KP Permanent Make-up. 762 However, in New Kids on the Block 763 the plaintiff did not have to prove that the consumers perceived a likelihood of confusion by for example applying the Sleekcraft test. 764 But New Kids on the Block inversed this by shifting the burden of proof to the defendant to negate that he did nothing to suggest an affiliation between him and the plaintiff’s trademark, 765 which is in the words of professor McCarthy, “merely the other side of the confusion coin.” 766 Doellinger noticed that the nominative fair use defence, created in the New Kids on the Block case, is more difficult to prove than the Sleekcraft test requires. 767 This could lead to a situation whereby on the one hand defendants could not prove that they were not involved in any affiliation confusion so that the court would not allow the nominative fair use defence, 768 and on the other hand the court would allow the plaintiff summary judgment, even in cases where the plaintiff would not be able to prove a likelihood of confusion. The other Circuit courts have not followed the New Kids on the Block doctrine. 769 In Brother Record, Inc. v Jardine 770 in 2003, the same Ninth Circuit that decided New 760

Id., at 23. Id. 762 KP Permanent Make-Up, Inc., v Lasting Impression I, Inc., supra note 726. 763 New Kids on the Block v News America Publishing Inc., supra note 757. 764 AMF Inc. v Sleekcraft Boats, supra note 300. 765 Chad J. Doellinger, Nominative Fair Use: Jardine and the Demise of a Doctrine, 1 NW. J. TECH. & INTELL. PROP. 66 (2003). 766 Brothers Records, Inc. v Jardine, supra note 717. 767 Doellinger, supra note 765. 768 Number 3 of the New Kids on the Block test. Although one could argue that indirectly a similarity between plaintiff and defendant’s mark could lead to a confusion about some kind of affiliation between the two. Supra note 757. 769 “The Second Circuit has come closest to adopting the test, simply by accepting its use 761

153 Kids on the Block 771 considered applying a stronger likelihood of confusion doctrine in the nominative fair use analysis. However, the Ninth Circuit argued that the application of the Sleekcraft test, 772 which focuses on the similarity of the trademark used by the plaintiff and the defendant, would lead to the wrong conclusion that all nominative fair uses are confusing. Then the Ninth Circuit combined the nominative fair use analysis with the likelihood of confusion theory by arguing that the third step of the New Kids on the Block test, the passivity principle which aims to prevent any suggestion that the plaintiff’s trademark has sponsored or endorsed the mark of the defendant, is a derivative of the likelihood of confusion doctrine. Should there be a likelihood of confusion test for nominative fair use defence? Abel and Sieber 773 criticise and discuss whether the test should be changed, and in doing so referred to the controversial Century 21 case, 774 decided by the Court of Appeals for the Third Circuit in 2005, which even added a preliminary likelihood of confusion test to the three pronged New Kids on the Block test. 775 Despite using a trademark without authorisation in a commercial way and in a confusing way one could still invoke the classic or nominative fair use defence. One could conclude that the common denominator of both the classic and nominative fair use defence is their incompatibility with the use of trademark logos. Beside, one can argue that the nominative fair use defence principles of subsidiarity, proportionality and passivity should be applied to the classic fair use defence as well.

Chapter 5.2.2 Descriptive use defence in the EU Comparable to the U.S., defendants in the EU can invoke defences based on primary, descriptive use of the trademark. These defences are also applicable in the realm of social media. And just as the case law in the U.S. one can learn from the EU case law

by its district courts below.” Abel and Sieber, supra note 730. 770 Brother Records, Inc. v Jardine, 318 F.3d at 900 (9th Cir. 2003). 771 New Kids on the Block, supra note 757. 772 AMF Inc. v Sleekcraft Boats, supra note 300. 773 Abel and Sieber, supra note 730. 774 Century 21 Real Estate Corp. v Lendingtree, Inc., 425 F.3d 211, 221, 229-31 (3d Cir. 2005). 775 New Kids on the Block v News America Publishing Inc., supra note 757.

154 that the use of the unauthorised trademark logos is an indication that an invocation of the descriptive use defence will be unsuccessful. The EU limits the effects of trademarks in the course of trade in Article 6 Directive 2008/95/EC 776 and in its parallel provision of Article 12 Regulation 207/2009/EC, 777 if a third party uses his own name or address, or if indications are used that concern kind, quality, quantity, intended purpose, value, geographical origin, the time of production of goods or of rendering of the service, or other characteristics of goods or services (comparable to the classic fair use defence in the U.S., see above). A trademark holder can also not prohibit a third party from using a trademark in the course of trade, where it is necessary to indicate the intended purpose of a product or service (comparable to the nominative fair use defence in the U.S., see above), in particular as accessories or spare parts. The condition is, however, that the person uses the trademark “in accordance with honest practices in industrial or commercial matters.” 778 In Portakabin Ltd. v Primakabin B.V., Primakabin made use of the trademark Portakabin as a keyword, to sell second hand Portakabin and Primakabin mobile homes. 779 So it made sense that Primakabin’s advertisements that were triggered included the Portakabin trademark name to indicate that the retailer sells second hand Portakabins. However, Primakabin “did not enable normally informed and reasonably attentive internet users, or enables them only with difficulty, to ascertain whether the goods or services referred to by the advertisement originate from the trade mark proprietor or from an undertaking economically linked to it or originate from a third party”, 780 which would correspond to a breach of the passivity principle in the U.S. 781 But Primakabin lost its chance to successfully invoke a defence based on Article 6 Trademark Directive 2008/95/EEC, 782 since it had removed some of Portakabin’s trademark logos from the

776

Supra note 695. Supra note 696. 778 Article 6 Directive 2008/95/EC, supra note 695. Article 12 Council Regulation No 207/2009/EC, supra note 696. 779 Portakabin, supra note 230. 780 Portakabin, id., paras. 54, 68. 781 3 Factor of the New Kids on the Block test. “The user must do nothing that would, in conjunction with the mark, suggest sponsorship or endorsement by the trademark holder. Again this indicates that using a trademark logo is not compatible to avoid sponsorship or affiliation confusion. One could call this the passivity principle.” Supra note 757. 782 Supra note 695. 777

155 mobile homes, so called debranding. Therefore, the CJEU held that Primakabin could not claim to have acted in accordance with honest practices in industrial or commercial matters, but it was up to the national court to carry out the overall assessment of all relevant circumstances to determine whether there is any evidence to justify the contrary. 783 In Hölterhoff v Freiesleben, Hölterhoff offered for sale particular cuts of precious stones. 784 In order to describe these special characteristics of the precious stones, Hölterhoff refers to trademarks Spirit Sun and Context Sun, owned by Freiesleben, that cover these particular cuts. According to the ECJ, the reference cannot be interpreted by potential customers as indicating the source of origin of the products. No trademark logo was used, which would be confusing to potential customers as indicating the source of origin of the product or suggesting an affiliation to the trademark holder. But one can argue that the addition of the words “style” or “like” to the trademark names Spirit Sun and Context Sun would completely eliminate every likelihood of confusion. In O2 Holdings v Hutchison, 785 Hutchison, which owns the mobile phone company 3, used bubbles imagery that was similar to the O2 trademark logo which includes bubbles in a comparative advertisement campaign. 786 O2 was not entitled to prevent the use of a sign that is similar to its trademark logo in a comparative advertisement, “where such use does not give rise to a likelihood of confusion and that is so irrespective of whether or not the comparative advertisement satisfies all the conditions laid down in Article 3a of Directive 84/450 787 concerning misleading advertising and comparative advertising, as amended by Directive 97/55, 788 under which comparative advertising is permitted.” 789

783

Portakabin, supra note 230. Michael Hölterhoff v Ulrich Freiesleben (C-2/00) Judgment of the ECJ, May 14, 2002. 785 O2 Holdings Ltd. and O2 (UK) Ltd. v Hutchison 3G UK Ltd., supra note 378. 786 3 Bubble Advert – subject of O2 Bubble case, campaign video, available at: http://www.youtube.com/watch?v=U_XFVYrQbzg&feature=plcp (accessed August 9, 2013). 787 Council Directive 84/450/EEC of 10 September 1984 relating to the approximation of the laws, regulations and administrative provisions of the Member States concerning misleading advertising, September 10, 1984. 788 Directive 97/55/EC of European Parliament and of the Council of October 6, 1997, amending Directive 84/450/EEC Concerning Misleading Advertising so as to Include Comparative Advertising. 789 O2 Holdings Ltd. and O2 (UK) Ltd. v Hutchison 3G UK Ltd., supra note 378. 784

156 The question whether Article 3a(1) Directive 84/450/EEC 790 must be interpreted as meaning that a comparative advertisement in which the advertiser uses the trademark of a competitor or a sign similar to that mark is permitted only if that use is indispensable in order to make a comparison between the advertiser’s goods or services and those of the competitor. One can argue that a sign that is identical or similar to a trademark logo of a competitor is never indispensable, since one can refer to the trademark name. This way the distinctiveness of the trademark will not be harmed. In Adam Opel v Autec, the latter manufactured toy cars that are replicas of Opel and include the Opel trademark logo. 791 The Federal Supreme Court of Germany asked the ECJ for a preliminary ruling on whether Opel should be able to prevent this unauthorised use of its trademark logo. The ECJ ruled that there could only be trademark infringement where the use adversely affects the functions of the trade mark, in particular, its essential function. Opel registered its trademark logo for cars but also for toys. One can argue that the ECJ’s determination, based on an explanation by the referring German court, that the average consumer will understand “that the Opel logo appearing on Autec’s products indicates that this is a reduced-scale reproduction of an Opel car”, 792 does not preclude any likelihood of confusion as to the origin or, affiliation of the product with the trademark. When the trademark logo is on a toy that seems to be a miniature version of the product of the same product, one would expect that the trademark holder would authorise the dimensions and design. However, the German Federal Supreme Court confirmed that despite the registration of the Opel trademark for toys that the essential function of the trademark was not harmed. 793 Since this is a double identity case, 794 one should expect that not only the origin and quality functions of the trademark are protected, but also the advertisement, communication and investment functions of the trademark (see Chapter 6 “Trademark

790

Council Directive 84/450/EEC, supra note 787. Adam Opel v Autec, (Case C-48/05), Judgment of the ECJ, January 25, 2007, para. 23. 792 Id. 793 Bundesgerichtshof, Opel Blitz II (Adam Opel v Autec), I ZR 88/08, Judgment of January 14, 2010. 794 “[I]f it is identical with the earlier trade mark and the goods or services for which registration is applied for are identical with the goods or services for which the earlier trade mark is protected.” The Manual Concerning Opposition Part 2, Ch. 1: Identity, at 4. 791

157 Dilution and Its Defences”), just as in the L’Oréal case. 795 But a likelihood of a loss of distinctiveness of the trademark logo was not even mentioned.

Chapter 5.3 Difference between legitimate and illegitimate use of the unauthorised trademark Since a trademark used on social media can almost exclusively be qualified as commercial use of the trademark, so that the non-commercial defence can be excluded, the question remains when does commercial use of a third party’s trademark on social media without explicit permission constitute trademark infringement? If an undertaking uses a trademark name to inform the public that it is providing a product or service related to the trademark product, it is in the interest of fair competition and the society at large that the undertaking is able to do so, basing its conduct on a descriptive use defence. However, these defences are accepted by jurisprudence in the U.S. and EU only under certain conditions. What is the bright line between legitimate and illegitimate unauthorised commercial use of a third party’s trademark? The boundaries of unauthorised commercial use of the trademark can be illuminated by two comparable automobile repair cases, one in the U.S., the other in the EU: Volkswagen Aktiengesellschaft v Church, is a case in the U.S. decided in 1969 by the Ninth Circuit. 796 The defendant, Douglas Church opened an automobile repair business, specialised in the repair of Volkswagen and Porsche vehicles. He did this first under the name ‘Modern Volkswagen Porsche Service’. In response to objections by Volkswagen, Church changed the name into Modern Specialist. Also in response to objections by Volkswagen, Church started to add the word ‘Independent’ in his advertising, to distinguish his business from those of Volkswagen’s authorised or franchised dealers. Church used a large sign on the front of his premises which read ‘Modern Volkswagen Porsche Service’ and changed it when the action was filed by Volkswagen into ‘Independent Volkswagen Porsche Service’. The court held that Church’s early use of the word ‘Volkswagen’ as part of his former business name ‘Modern Volkswagen Porsche Service’ was unlawful. However,

795 796

L’Oréal and Others, supra note 230, paras. 2, 58 and 63. Volkswagen Aktiengesellschaft, supra note 735.

158 none of his subsequent practices infringed Volkswagen’s rights, because of Church’s “extensive use of the word ‘Independent’ sufficiently distinguished his business from those affiliated with appellant.” 797 According to the court “the terms ‘Volkswagen Service’ and ‘VW Service’ did not belong exclusively to Volkswagen, but have come to mean in the mind of the public only that the advertiser services Volkswagen vehicles.” 798 It was not expected from Church that he avoided the use of the trademark names Volkswagen or VW, which are the normal terms to signify the type of cars Church repairs. However, Church should not advertise in a manner “which is likely to suggest to his prospective customers that he is part of Volkswagen’s organization of franchised dealers and repairmen.” 799 The Ninth Circuit upheld the District Court’s decision that Church’s advertising did not constitute trademark infringement nor unfair competition. “The size, style and appearance of the advertising articles and displays were among these factors. Another was the fact that Church did not use Volkswagen’s distinctive lettering style or color scheme, nor did he display the encircled ‘VW’ emblem.” 800 BMW v Deenik is a case of 1999 decided by the ECJ, 801 and is comparable to the Volkswagen Aktiengesellschaft v Church case. 802 It dealt with the alleged unauthorised use in advertisements of the trademark of another famous car brand, BMW, for a garage business, which included the sale of second-hand cars, repairs and maintenance of BMW vehicles. The ECJ was asked by the Supreme Court of the Netherlands to give a preliminary ruling that, based on the Trademark Directive 89/104/EEC, 803 the trademark proprietor can only prevent the person of using the mark if he creates the impression that his undertaking is affiliated to the trademark proprietor’s network. 804 BMW argued that “the high probability that the manner in which the trade mark is used for those announcements may create an impression among the public that the trade mark is in that 797

Id., at 9. Id., at 9. 799 Id., at 10. 800 Id., at 12. 801 Bayerische Motorenwerke AG (BMW) and BMW Nederland BV v Ronald Karel Deenik, (Case C-63/97), Judgment of the ECJ, February 23, 1999. See also the Opinion of the Advocate General in, (C-236/08), September 22, 2009. 802 Volkswagen Aktiengesellschaft, supra note 735. 803 Supra note 146. 804 Bayerische Motorenwerke AG (BMW), supra note 801, para. 44. 798

159 regard being used to an appreciable extent for the purpose of advertising his own business as such by creating a specific suggestion of quality”, 805 was not taken seriously by the court. The use of the trademark was seen as unavoidable. Both the Volkswagen and BMW case show that there is a broad consensus in the U.S. and EU that proprietors cannot prevent undertakings that can only sell their product or service by referring to a third party’s trademark. They must be able to do so, because it furthers fair competition. So they use the trademark of a third party in a commercial way which constitutes trademark infringement, but they can claim a descriptive use defence, under the condition that they do not suggest any sponsorship, endorsement or affiliation by the brand whose trademark they use. Therefore, as the Volkswagen case makes explicit and the BMW implicit, the unauthorised use of the trademark logo and the use of distinctive lettering and style should be avoided and could be ground for which any recourse to a descriptive use defence become ineffective.

Proprietors of trademarks sometimes need to tolerate that their exclusive rights are limited so that the competition in a fair market will not be stifled. 806 However, one can argue that these restrictions need to be limited, by applying the principles of subsidiarity, proportionality and non-affiliation. The trademark logo has such special characteristics which excludes any descriptive use defences in case of a trademark infringement claim, 807 since the trademark logo, representing a brand, can be accurately described by the trademark name of the brand, without the need to use the trademark logo.

Chapter 5.4 Conclusion: trademark use on social media is commercial and trademark logo is immune for descriptive use defences

805

Id. A rare exception is honest concurrent use. An example is Budejovicky Budvar v Anheuser-Busch where both use the identical trademark name Budweiser registered for an identical product, although they have different trademark logos. Budweiser case Budejovicky Budvar Narodni Podnik v Anheuser-Busch, Inc. [2012] EWCA Civ 880. 807 “(..) using a trademark owner’s logo often crosses the line, because its word mark alone almost always would suffice to convey the desired message.” Atkins, supra note 740, at 4. 806

160 To apply fair use defences “fairly and in good faith” 808 in the U.S. or the descriptive use defence “in accordance with honest practices in industrial or commercial matters” 809 in the EU, it seems reasonable to apply the New Kids on the Block doctrine, so that the use of the trademark will be tested against principles of subsidiarity, proportionality and passivity (non-affiliation). One can argue that these three principles can be satisfied when: 1. the use of a trademark logo is precluded, because the defendant can substitute the trademark logo for a trademark name, which already clarifies to which the product the defendant is referring to (subsidiarity principle); 2. Trademark logos do not lend themselves well to be used in a minimal way 810 (proportionality principle); 3. One can argue that any use of a trademark logo by the defendant directly suggests some kind of affiliation with the plaintiffs trademark (passivity principle). The passivity principle might be overcome if there comes into being a convention of using trademark logos in a distinctive way that makes clear that there is no endorsement, sponsorship or affiliation between the trademark holder and trademark user. 811 One can also deduce from the EU case law some principles applicable to descriptive use defences. In the Galileo cases, OHIM 812 and the General Court 813 came to the conclusion that the conceptual comparison between two identical trademark names should take into consideration the context of the entire mark: including the figurative elements, size and overall dominant impression and in relation with the goods and services for which it is registered. The Galileo 814 and Portakabin 815 cases confirmed that the trademark logo can make the difference. The source identifying function of the trademark is favourably affected if a keyword was enriched with a trademark logo, so that it would enable normally informed and reasonably attentive internet users, or enables 808

Lanham Act, 15 U.S.C. § 1115(b)(4). Article 6 Directive 2008/95/EC, supra note 695. The parallel provision can be found in article 12 Regulation 207/2009/EC, supra note 696. 810 If one insists on using trademark logos, could think about thumbnails or low resolution versions of the trademark logo. 811 For example one can think of a red ring around the logo. 812 Galileo v Commission, supra note 698. 813 Galileo v OHMI, id. 814 Galileo v Commission, id., Galileo logy v OHMI, id.. 815 Portakabin, supra note 230. 809

161 them only with little difficulty, to ascertain whether the goods or services referred to by the advertisement originate from the proprietor of the trademark or an undertaking economically connected to it or, on the contrary, originate from a third party. 816 These cases show that courts in the U.S. and in the EU confirm the importance of the trademark logo in determining whether a user of the trademark is suggesting sponsorship, endorsement or affiliation. Therefore it seems peculiar that legislation in neither jurisdiction is providing adequate protection against unauthorised use of trademark logos on social media. Especially since it can be determined that social media sites exploit advertisements, so that unauthorised trademark logos on social media will be used in a commercial way.

816

In contrast to the wording: “The function of indicating the origin of the mark is adversely affected if the ad does not enable normally informed and reasonably attentive internet users, or enables them only with difficulty, to ascertain whether the goods or services referred to by the ad originate from the proprietor of the trade mark or an undertaking economically connected to it or, on the contrary, originate from a third party.” Portakabin, supra note 230, and Google France, supra note 230, para. 83, 84.

162

Chapter 6 Trademark Dilution and its Defences Why identical trademarks for non-competing products are problematic and how to reconcile the protection of the trademark logo with the freedom of expression Introduction The last Chapter demonstrated trademark law’s lack of adequate protection of the trademark logo on social media against trademark infringement. One of the main problems was that despite counter-indications, commerciality was not always assumed. This Chapter will examine whether trademark law is protecting the trademark logo on social media against trademark dilution in the U.S. or its equivalent in the EU called ‘unfair advantage or detriment to the distinctive character or repute of the trademark’. Where measures against trademark infringement should protect against misrepresentation via confusion-related functions of the trademark (as discussed in Chapter 2.7.1), measures against trademark dilution are supposed to protect against misappropriation of the famous trademark or trademark with a reputation via the proprietary functions of the trademark that protect the communication, advertising and investment functions of the trademark and that must guarantee its reputation, good will, signalling identity and accountability (as discussed in Chapters 2.8.3-5). Justice Arnold remarked that courts have found it difficult to develop coherent and workable principles within the field of dilution. 817 This points to some of the challenges ahead. Unintimidated, this Chapter attempts to develop coherent and workable principles so that the right of the trademark holder to protect the trademark logo on social media against trademark dilution can be reconciled with the right to freedom of expression by third parties, including internet users. 817

“Although the thinking behind it goes back as far as Schechter’s seminal 1927 article in the Harvard Law Review, supra note 100, the legislative provisions are still relatively new to our law and indeed most European laws. As of yet the courts have found it difficult to develop coherent and workable principles within this field. It is possible that extended protection simply is incapable to being developed into a clear body of law. But I suggest it is a bit premature to reach that conclusion just yet.” Justice Arnold, Brand Protection and Competition, IBIL, January 27, 2010, available at: http://www.ucl.ac.uk/laws/ibil/index.shtml?events_past (accessed August 10, 2013).

163 The Chapter consists of two sections: trademark dilution (Chapter 6.1-3) and the defences against trademark dilution (Chapter 6.4). The question in this Chapter will be answered why the current trademark dilution law and the defences provide insufficient protection for the trademark logo on social media. Firstly, Chapter 6.1 discusses the rationale of the trademark dilution doctrine. Chapter 6.2 then examines the legislations and case law about trademark dilution in the U.S. and about the unfair advantage of or detriment to the distinctive character or repute of the trademark in the EU. Chapter 6.3 next explores the preconditions of trademark dilution: in the U.S. a famous trademark and in the EU a trademark with a reputation. Finally, Chapter 6.4 looks into the trademark dilution defences in case of parody, commenting or criticising.

Chapter 6.1 Rationale of the trademark dilution doctrine The rationale for the trademark dilution law against non-confusing, 818 noncompeting use of a famous trademark or trademark with a reputation is to protect it against any negative impact it might have on its distinctiveness, individuality, originality, uniqueness, identity, reputation, good will, significance, drawing power, selling power, 819 advertising power, 820 commercial magnetism 821 and prestige. Handler succinctly stated: “Dilution protects the mark while confusion protects the business.” 822 The discussion of trademark dilution as “the gradual whittling away or dispersion of the identity and hold upon the public’s mind of the mark or name by its use upon noncompeting goods” 823 was initiated by Schechter’s article in the Harvard Law Review in 1927. 824 Schechter was an advocate for the right of trademark holders to extend the use of their trademark for activities that involved other products or services, and this was not 818

Article 8(5) does not require proof of likelihood of confusion, even where there is no similarity between the goods in question. SABEL BV supra note 366. 819 Schechter, supra note 100, at 831. 820 Beverly W. Pattishall, Dawning Acceptance of the Dilution Rationale For Trade-Mark Identity Protection, 74 TMR 289, 297 (1984). 821 Mishawaka Rubber, supra note 3, at 205. 822 With protecting the mark, Handler meant protection against the impairment of distinctiveness or the harm of reputation. With protecting business Handler meant that the doctrine protects against trademark use for competing products or services. Milton W. Handler, Are the State anti-dilution laws compatible with the national protection of trademarks?, 88 TMR 419 (1998). 823 Schechter, supra note 100. 824 Schechter, id.

164 necessarily limited to famous trademarks or trademarks with a reputation (as will be discussed in Chapter 6.3.3.4). In contrast to Schechter’s substantial legacy, modern defences against trademark dilution do not take into account whether the future “normal exploitation” of the mark will be conflicted (conform the second step of the three-step test for copyright limitations and exceptions in the EU, but not according to the two-step test for trademark limitations and exceptions in the EU, as will be discussed in Chapter 6.4.2.2) or whether the effect of the use upon the potential market is negatively influenced (conform step four of the fair use test for copyright in the U.S., but not according to fair use test for trademark in the U.S., see Chapter 6.2.2). Another problem of contemporary trademark law is its flawed classification system for trademark registration (see Chapter 6.3.3.2). The argument for the use of an identical trademark name used by multiple proprietors active in different fields is that it would not be a problem if they would operate in separate markets so that it is not likely that the public will be confused. However, in times of internet and globalisation to protect exclusively famous trademarks or trademarks with a reputation across the different designated goods or services classes is unfeasible and outdated (see Chapter 6.3.3.1 “Globalisation and the internet”). Schechter posed the question whether “the preservation of the uniqueness of a trademark should constitute the only rational basis for its protection.” 825 The unique character of the trademark, especially the trademark logo, could be interpreted as “one of its kind” and implies that it needs to remain unique for all activities. This Chapter will answer the question why trademark logos, beside those that are famous or have a reputation, have such a Schechterian quality of singularity that a higher level of protection in comparison to the current level of protection becomes imperative. Below the Chapters 6.1.1-2 make a distinction between the trademark dilution by blurring doctrine and the trademark dilution by tarnishment doctrine, respectively. After that, Chapters. 6.1.3-4 discuss the relevance for the trademark dilution doctrine of Article 6bis Paris Convention and Article 10bis Paris Convention, respectively.

825

Schechter, id., at 831.

165 Chapter 6.1.1 Trademark dilution by blurring doctrine The gradual whittling away, lessening, watering down, debilitating, undermining, eroding and insidious gnawing away of the distinctiveness of the trademark has been described as trademark dilution by blurring, or hyperbolically as “death by a thousand cuts”, 826 “stung by a hundred bees”, 827 or euphemistically as “picking the proverbial cherry from the top of their cake”. 828 An important but unjustly ignored rationale for the trademark dilution doctrine is that trademark holders of famous marks or marks with a reputation deserve to keep the possibility to extend the use of their trademark and enter into new related 829 or non-related fields themselves or allow others via licensing (see Chapter 6.3.3.4). Where the source identifying function of the trademark is adversely affected, and the search costs for consumers are not cut short but extended, liability for trademark infringement can be determined, as already discussed in Chapter 5. However, Judge Posner asserted 830 that also trademark dilution can lead to increased mental search costs for consumers. 831 If every product one comes across is called Coca-Cola, one would have to think twice in case an advertisement of Coca-Cola by the senior user of the mark selling carbonated soft drink was shown. Trademark infringement deals with the question whether two products or services are from the same source. In contrast, trademark dilution deals with the question of whether the famous trademark or trademark with a reputation for a product or service can be retrieved from memory. 832 The trademark dilution doctrine is also relevant for trademark logos of collective trademarks and certification trademarks. A distinction must be made between members and non-members, in the case of collective trademarks, and between companies that did 826

Beebe, supra note 222, at 1143, 1163. MCCARTHY, supra note 718, § 24:94. 828 Anca Musat, “Trademark infringement: Any room for the parody defense in Romania?”, Business Review /Bucharest Lawyer, June 2007, at 10, available at: http://www.musat.ro/pdf/Bucharest%20Lawyer%20-%20Anca%20Musat%20-%20June.pdf (accessed August 10, 2013). 829 Hormel Foods supra note 226, at 504. 830 Ty, Inc. v Perryman, 306 F.3d 509 (7th Cir. 2002). 831 “The mark holder surely benefits from the FTDA’s preservation of her mark’s uniqueness, but consumers also benefit, as they experience a more efficient market.” Brian A. Jacobs, Note, Trademark Dilution on the Constitutional Edge, 104 COLUM. L. REV. 161, 188 (2004). 832 Rebecca Tushnet, Truth and Advertising: The Lanham Act and Commercial Speech Doctrine, 58 S.C. L. REV. 737 (2007). 827

166 and those that did not pass a certain standard, in the case of certification trademarks. So here too trademark dilution by blurring or trademark dilution by tarnishment can occur if a non-member uses the collective trademark or if a company that did not pass a certain standard uses the certification mark.

Chapter 6.1.2 Trademark dilution by tarnishment doctrine Trademark dilution by tarnishment could be defined as the harm to the reputation or good will that was caused by the unauthorised use of a trademark in an unsavoury way. However, there must be the assumption that the consumer, after seeing the junior mark used in an unsavoury way, will blame the famous senior mark/mark with a reputation. Pattishall 833 and Moskin 834 have questioned the efficacy of this contagion theory. 835 However, it seems safe to assume that for example it will not be conducive for the commercial magnetism of a trademark such as Louis Vuitton, if a Louis Vuitton aficionado is exposed to a streetscape dominated by fake Louis Vuitton products. A more radical view on the trademark dilution is espoused by Magliocca. 836 He asserted that all second uses of trademarks are per definition infringing, 837 which makes enforcement potentially simple and effective.

Chapter 6.1.3 Article 6bis Paris Convention Article 6bis was added to the Paris Convention in 1925, 838 especially to protect those first users in a member country of the Union of the Paris Convention that have not registered or used it in another member country of the Union, against those that register or have registered a mark that is already well-known in the country of origin and in the country where protection is sought, for identical or similar goods or services, and which use could be confusing. 839 Callmann 840 appealed to no avail to include protection against 833

Pattishall, supra note 820, at 307. Jonathan Moskin, Dilution or Delusion: the Rational Limits of Trademark Protection, 83 TMR 122, 146 (1993). 835 SIMON FHIMA, supra note 277, at 161, footnote 7. 836 Gerard N. Magliocca, One and Inseparable: Dilution and Infringement in Trademark Law, 85 MINN. L. REV. 949, 983 (2001). 837 Magliocca, id., at 983. 838 Article 6bis Paris Convention, supra note 137. 839 Article 6bis(1) Paris Convention, since the revision of Stockholm in 1967. The countries of the Union undertake, ex officio if their legislation so permits, or at the request of an interested party, to refuse or to 834

167 non-confusing marks for non-competing goods or services. Also the International Chamber of Commerce (ICC) proposed in vain an amendment to Article 6bis Paris Convention, to make the protection applicable to marks registered or used for dissimilar products. 841 Only in 1994, Callmann and the ICC’s dream became a reality: Article 16(3) TRIPS 842 extended the scope of Article 6bis Paris Convention’s protection to dissimilar goods and services, under the conditions that the use of the trademark would indicate a connection between the goods/services and the trademark holder, and that it would likely cause damage to the trademark. 843 Therefore, the Article 16(3)TRIPS 844 incarnation of Article 6bis Paris Convention is relevant to this thesis.

Chapter 6.1.4 Article 10bis Paris Convention Article 10bis Paris Convention, 845 prescribes that countries of the Union must assure their nationals effective protection against unfair competition. Article 10bis(2) Paris Convention states that “[a]ny act of competition contrary to honest practices in industrial or commercial matters constitutes an act of unfair competition.” 846 Trademark dilution arguably falls within this collection of acts of unfair competition. Especially since the wording of Article 10bis(3) Paris Convention 847 is “The following in particular

cancel the registration, and to prohibit the use, of a trademark which constitutes a reproduction, an imitation, or a translation, liable to create confusion, of a mark considered by the competent authority of the country of registration or use to be well known in that country as being already the mark of a person entitled to the benefits of this Convention and used for identical or similar goods. These provisions shall also apply when the essential part of the mark constitutes a reproduction of any such well-known mark or an imitation liable to create confusion therewith. See supra note 137. 840 Rudolf Callmann, Thoughts on the Protection of World Marks, 44 TMR 1134 (1954). 841 Dr. Stephen P. Ladas, Chairman and Charles Magnin, Rapporteur of the International Chamber of Commerce, Commission on International Protection of Industrial Property, “Well-known Trade Marks”, 13th I.C.C. Congress, Lisbon, June 1951. Derenberg, supra note 716, at 484 footnote 194. 842 Article 16(3) TRIPS, supra note 161. 843 Article 16(3) TRIPS, id. : “Article 6bis of the Paris Convention (1967) shall apply, mutatis mutandis, to goods or services which are not similar to those in respect of which a trademark is registered, provided that use of that trademark in relation to those goods or services would indicate a connection between those goods or services and the owner of the registered trademark and provided that the interests of the owner of the registered trademark are likely to be damaged by such use.” 844 Article 16(3) TRIPS, id. 845 Article 10bis Paris Convention, supra note 137. 846 Article 10bis Paris Convention, id. 847 Article 10bis Paris Convention, id.

168 shall be prohibited”, which makes clear this is a non-exhaustive list which could include trademark dilution. At the Quebec Congress of the ICC 848 it was proposed to amend Article 10bis Paris Convention 849 to include: “The use or registration by a person of a mark which by reason of its originality and uniqueness or of its long and exclusive use by another has come to symbolize and identify his entire business or commercial activity shall be deemed an act of unfair competition.” 850 The wording of “originality and uniqueness” is interesting, since it is in the spirit of Schechter’s proposal to protect coined, invented, fanciful or arbitrary marks, which fit within the description of “original”, instead of the famous or well-known marks. The word “uniqueness” which can be defined as “one of its kind”, could be interpreted as to point to the right of the trademark holder to extend the activities of its trademark (see Chapter 6.3.3.4).

Chapter 6.2 Legislation and case law This section examines the legislation and case law, starting with some cases of trademark dilution avant la lettre (Chapter 6.2.1). Then, Chapter 6.2.2. examines the legislation and case law in the U.S., where a distinction is made between dilution by blurring, dilution by tarnishment and free-riding. Chapter 6.2.3 discusses the legislation and case law in the EU and makes a distinction between detriment of distinctiveness, detriment of repute and use without due cause. It also analyses the double identity case of Davidoff, 851 and the keyword triggered advertising case of Interflora, 852 which sheds a light on both the source function and the advertising/investment function of the trademark.

Chapter 6.2.1 Trademark dilution avant la lettre In Eastman Photographic Materials Co. Ltd. v John Griffiths Cycle Corp. Ltd. the trademark name Kodak, manufacturer of photographic material, was used by a defendant

848

Quebec Congress of the International Chamber of Commerce, 12th Congress, Summer 1949. Derenberg, supra note 716, at 487, footnote 212. 849 Article 10bis Paris Convention, supra note 137, revision of The Hague, November 6, 1925. 850 Derenberg, supra note 716, at 488. 851 Davidoff, supra note 384. 852 Interflora, supra note 263.

169 to sell bicycles in 1898, 853 benefiting from the plaintiff’s investments in the mark, the British Court under Justice Romer, wrestled to come up with a solution that served justice using the doctrines that were available at the time. For this purpose Justice Romer determined that there was an “intimate connection between the bicycle trade and camera trade”, 854 which, according to him caused a likelihood of confusion. One can argue that the judge was trying to put a square peg into a round hole, and applying a trademark dilution by blurring doctrine avant la lettre in the process. Another example which could be qualified as dilution by blurring avant la lettre is the Duro Pump & Mfg. Co. v Cal. Cedar Products Co. case of 1926, 855 in which Justice Robb wrote: “If the Californian Cedar Products Company were permitted to use this mark, which has come to represent the Duro Company and its product to the public, other companies likewise might use it, with resultant loss of identity of the Duro Company.” 856 The judge determined that the mark Duro registered for pneumatic pressure systems by one proprietor could not also be registered for manufacturing wall board materials by an other proprietor.

Chapter 6.2.2 Legislation and case law in the U.S. Schechter was familiar with the German Odol case, 857 in which the loss of drawing power of a mark for non-competing products was protectable. 858 Schechter’s insights on “dilution” 859 can be found in his influential Harvard Law Review article of 1927 entitled ‘The Rational Basis of Trademark Protection’, in which he advocated the

853

Eastman Photographic Materials Ltd. v John Griffiths Cycle Corp. Ltd. (1898) 15 R.P.C. 105. Romer J., at 110 wrote: “At one recent large cycle show the Plaintiff company had a stall, and the evidence shows that between the two trades, the bicycle trade and the camera trade, there is an intimate connection.” Id. 855 Duro Pump & Mfg. Co. v. Cal. Cedar Products Co., 11 F. (2nd) 205 (Ct. of Appeal D.C. 1926). Read also Trade-Marks, Manufacturer of Wall Board Materials Not Entitled to Registration of Mark Used for Pneumatic Pressure Systems, 8 BUS. L.J. 51 (1926). 856 Id. 857 Landgericht Elberfeld, September 11, 1924, Juristische Wochenschrift 1925, 502. Kamperman Sanders, supra note 214, at 51, footnote 1. 858 About the junior mark was registered for non-competing goods or services the German Court wrote: “That, however, is beside the point. The complainant has created a demand for its goods, while employing thereon a word having drawing power, for only through the year-long activity of complainant was its selling power acquired (..). Complainant’s ability to compete with other manufacturers of mouth wash will be impaired if the significance of its mark is lessened. 859 However Schechter, did not actually use the term dilution. Supra note 100. 854

170 protection against “[t]he gradual whittling away or dispersion of the identity and hold upon the public mind of the mark or name by its use upon non-competing goods.” 860 Schechter testified before a Congressional Commission in 1932 861 about a revision of the trademark law, called the Perkins Bill, 862 which he drafted and in which he did not propose to protect famous marks or marks with a reputation but did propose to protect registered marks that are “coined or invented or fanciful or arbitrary” against confusing marks but also against users that “injure the good will, reputation, business credit or securities of the owner of the previous used owner.” 863 In 1934, after Irving’s Yeast-Vite Ltd. v Horsenail, 864 in which the House of Lords held that a reference to the Horsenail’s yeast tablet as being “a substitute for Yeast-Vite” was not use of the plaintiff’s “Yeast-Vite” mark in the trade mark sense, the Goschen Committee in the U.S. recommended to change the trademark law in regard to collateral references, which used disclaimers such as “a substitute for”, “an equivalent of”, “as good as” or “X-type.” 865 Despite the recommendation, the trademark law remained unchanged in this respect. In 1963, in Polaroid Corp. v Polaraid Inc. 866 the Seventh Circuit made it clear that the plaintiff should not have to share with anyone the “effort and expenditure of large amounts of money”, in other words: the investments made by the plaintiff which gained him his reputation. In 1977, in Allied Maintenance Corp. v Allied Mechanical Trades, Inc., 867 the defendant’s use of the plaintiffs trademark for dissimilar products had been compared with “cancerlike growth” which “feeds upon the business reputation of an established distinctive trademark or name.” 868

860

Schechter, id. Frank I. Schechter’s testimony: Hearings Before the House Committee on Patents, 72d Cong., 1st Sess. 15 (1932). 862 Perkins Bill, H.R. 11592, 72d Cong., 1 Sess. (1932). 863 Id., § 2(d)(3) 864 Irving’s Yeast-Vite Ltd. v Horsenail, 51 R.P.C. 110 (1934). 865 Goschen Committee, Board of Trade, Report of the Departmental Committee on the Law and Practice Relating to Trade Marks 80, § 185 (1934), at 50. 866 Polaroid Corporation v Polaraid Inc., 319 F 2d 830, 837 (7th Cir, 1963). 867 Allied Maintenance Corporation v Allied Mechanical Trades, Inc 42 NY 2d 538, 369 NE 2d 1162, 399 NYS 2d 628, 198 USPQ 418, 422 (1977). 868 Id. 861

171 During the long formation of the Lanham Act, the dilution doctrine never got implemented. Callmann, 869 a trademark scholar, 870 became a prolific advocate of Schechter’s ideas after he passed away in 1937. Several states implemented anti-dilution laws in their common law legislation, which showed some variety. 871 Only much later, in 1995, Schechter’s ideas on dilution were implemented in a federal statute, although in an adulterated form: the Federal Trademark Dilution Act (FTDA). 872 Trademarks, eligible to protection of the FTDA have to be famous, which is a radical departure from the premise that trademarks with coined, arbitrary and fancy terms would be eligible for protection, as Schechter had imagined. In 2003, in Moseley v Victoria Secret Catalogue Inc., 873 the U.S. Supreme Court held that the FTDA applied only when the plaintiff could prove actual dilution instead of a likelihood of dilution. However, an actual dilution standard necessarily means that the harm first must have manifested itself. Therefore, Congress preferred a likelihood of dilution standard, 874 so that the harm could be prevented and at the same time clarify that famous trademarks are federally protected against dilution, no matter whether they are inherently distinctive or have acquired distinctiveness. 875 Dilution by tarnishment was also to become an explicit measure for action. This lead to a revised dilution act: the Trademark Dilution Revision Act (TDRA) 876 of 2006. Beside the two forms of dilution recognised in the TDRA; dilution by blurring 877 and dilution by tarnishment, 878 Judge Posner distinguished free riding as a third form of 869

Lutter, Stiefel and Hoeflich wrote a book about the influence of German immigrants on the legal development in the U.S. and in Germany. MARCUS LUTTER et al., DER EINFLUSS DEUTSCHER EMIGRANTEN AUF DIE RECHTSENTWICKLUNG IN DEN USA UND IN DEUTSCHLAND, Mohr Siebeck 1993, at 64. 870 Rudolf Callmann, Trademark Infringement and Unfair Competition, 14 LAW & CONTEMP. PROB. 185 (1949). Callmann, supra note 264. 871 “A man’s rights in his trade-marks in one State may differ widely from the rights which he enjoys in another.” Although Derenberg explains that the New York and Massachusetts State statutes and those of Georgia and Illinois are identical. Derenberg, supra note 716, at 439. 872 Federal Trademark Dilution Act (FTDA). 873 Supra note 342. 874 Stacey Dogan & Mark Lemley, The Trademark Use Requirement In Dilution Cases, 24 SANTA CLARA COMPUTER & HIGH TECH. L.J. 541, 547 (2008). 875 Overturning a precedent of the Second Circuit. TCPIP Holding Co. v Haar Commc’ns Inc., 244 F.3d 88, 96 (2d Cir. 2001). 876 Trademark Dilution Revision Act (TDRA), § 43(c) of the United States Trademark Act of 1946 amended by U.S. Title 15, Chapter 22, subchapter III, § 1125, 'False designations of origin, false descriptions, and dilution forbidden' (c) Dilution by blurring, dilution by tarnishment. 877 U.S. Code, Title 15, Chapter 22, subchapter III, § 1125(c)(2)(B). 878 Code, Title 15, Chapter 22, subchapter III, § 1125(c)(2)(C).

172 non-confusing use by third parties the trademark holders should be able to prevent. 879 This corresponds with the ‘unfair advantage of the distinctive character or repute of a trademark’ in the EU. However, in the U.S. it is not codified as such.

Dilution by blurring Dilution by blurring arises from the use of a similar junior mark in non-competing goods or services that impairs the distinctiveness of the senior famous mark. 880 Schechter illustrated this danger: “[I]f you allow Rolls Royce restaurants and Rolls Royce cafeterias, and Rolls Royce pants, and Rolls Royce candy, in 10 years you will not have the Rolls Royce mark any more.” 881 In other words dilution by blurring could ultimately lead to a situation where the distinctive character of the trademark is lost, and genericide takes place. Barber proposed three factors for the TDRA to see whether dilution by blurring is applicable: the degree of fame of the plaintiff’s mark, the uniqueness of the plaintiff’s mark and the similarity of the defendant’s mark to the plaintiff’s mark. 882 The TDRA provision, however, is more extensive and sums up six non-exhaustive factors the court can consider when making a decision whether dilution by blurring is applicable: 1. the degree of similarity between the mark and the famous mark; 2. the degree of inherent or acquired distinctiveness of the famous mark; 3. the extent to which the owner of the famous mark is engaging in substantially exclusive use of the mark; 4. the degree of recognition of the famous mark; 5. whether the user of the mark or trade name intended to create an association with the famous mark; 6. any actual association between the mark or trade name and the famous mark. These six factors will be assessed in light of their compatibility to be applied in case of an automatic enforcement of the trademark logo on social media, as Chapter 4 determined this prerequisite crucial to any solution. Two factors, 1 and 5 are about the 879

Ty, Inc. v Perryman, supra note 830. U.S. Code, Title 15, Chapter 22, subchapter III, § 1125 (c)(2)(B). 881 Schechter’s testimony, supra note 861. 882 William G. Barber, A "Rational" Approach for Analyzing Dilution Claims: The Three Hallmarks of True Trademark Dilution, 33 AIPLA Q.J. 25, 40 (2005). 880

173 role of the alleged dilutor. Factor 1, the degree of similarity between a junior trademark logo and the famous senior trademark logo, can be determined in an objective and automatic way. 883 Currently, software already exists that is able to detect copyrighted video on YouTube. Therefore from a technological point of view is it even easier to find static trademark logos. However, it is more difficult to find out whether the user of the mark or trade name intended to create an association 884 with the famous mark, 885 since intention is subjective. Therefore factor 5 is not suitable for an automatic test. In factors 2 and 3, the trademark holder is the protagonist. Factor 2, to determine the degree of inherent or acquired distinctiveness of the famous mark, 886 seems superfluous, since the trademark has already passed the required minimum standard of distinctiveness, otherwise it would not have been registered in the first place. In any case, one can argue that it qualifies for protection. Factor 3, the extent to which the owner of the famous mark is engaging in substantially exclusive use of the mark, is irrelevant. 887 It is completely to the discretion of the trademark holder whether he wants to engage in exclusive use of its trademark, or whether he wants to license its trademark. Factors 4 and 6 use external information from the relevant public: the degree of recognition of the famous mark, 888 and the actual association between the mark or trade name and the famous mark. 889 Factor 4, to find the relevant public and test whether they recognise the mark can be costly and difficult to automate. So is factor 6, to measure any actual association between the sign and the famous trademark. These factors are therefore less suitable for automation. The extent of proximity between the products or services of the senior famous mark and those of the junior mark has been suggested as another factor. One could imagine a continuum where, for example, steam shovels and lipstick are situated at each

883

U.S. Code, Title 15, Chapter 22, subchapter III, § 1125 (c)(2)(B)(i). Read more about the associative pathways to the mind of the consumer by Alexander Simonson, How and When Do Trademarks Dilute: A Behavioral Framework to Judge Likelihood of Dilution, 83 TMR 149, 159-162 (1993). 885 U.S. Code, Title 15, Chapter 22, subchapter III, § 112 (c)(2)(B)(v). 886 Id., § 112 (c)(2)(B)(ii). 887 Id., § 112 (c)(2)(B)(iii). 888 Id., § 112 (c)(2)(B)(iv). 889 Id., §112 (c)(2)(B)(vi). 884

174 other’s extremes. 890 One could come up with an algorithm which could be fed information about trademark class, customer class, ingredients used, etc., so that the relative distance between goods or between services could be estimated (read about more problems related to classification of goods and services in Chapter 6.3.3.2). Until the advent of a workable algorithm the proximity between goods or services cannot be automatically measured. In short: only factor 1 is suitable for an automated way to determine whether there is a case of trademark dilution by blurring.

Trademark dilution by tarnishment In 1963 Anheuser-Busch brewery had spent 40 million dollars to promote their slogan “Where there’s life, there’s Bud.” Then Chemical Corp. of America, manufacturer of a floor wax with insecticide modified this slogan by changing “bud” for “ bugs”, thereby disparaging Budweiser, according to Anheuser-Busch, who tried to enjoin Chemical Corp.’s use of the modified slogan. The latter’s rebut was that their inspiration was John Gay’s famous line: “While there’s life, there's hope, he cried.” In a temporary injunction the court ruled that Chemical Corp. should apply the word “bug killer” to its slogan 891 to avoid a “peculiarly unwholesome association of ideas.” One can question whether this is a big improvement, but the reasoning in Chemical Corp. of America, Inc. v Anheuser-Busch, Inc. 892 was to make the two slogans more distinct from each other. In 1964 an interesting anonymous note was published in the Harvard Law Review that examined whether the scope of protection should include not only trademark dilution by blurring, but also trademark dilution by tarnishment. 893 The anonymous writer determined that non-confusing use may also tarnish the affirmative mental associations which form part of the advertising value of the mark. 894

890

Judge Learned Hand “it would be hard … for the seller of a steam shovel to find ground for complaint in the use of his trade-mark on a lipstick.” L.E. Waterman Co. v Gordon, 72 F.2nd 272, 273 (2d Cir. 1934). 891 Chemical Corp. of America v Anheuser-Busch, Inc., 306 F.2d 433, 437 (5th Cir. 1962), cert. denied, 372 U.S. 965 (1963). 892 Id. 893 “Tarnishment may even be an independent ground of relief.” Anonymous, Dilution: Trademark Infringement or Will-O-The-Wisp, 77 HARV. L. REV. 520, 525 (1963-1964). 894 Id., at 522.

175 In 1994, the Second Circuit decided Deere & Co. v MTD Products, Inc., 895 a double identity dilution case: famous senior mark and junior mark were identical and used for competing products or services. MTD, a competing manufacturer of lawn tractors, developed and showed an animated commercial in which their MTD tractor altered Deere & Co.’s trademarked deer “from a proud, majestic deer, to one that was cowardly and afraid.” 896 The court judged that the distorted version of the senior trademark in the commercial, although not confusing, could lead consumers to attribute unfavourable characteristics to the trademark and ultimately to the goods. In 1995 the FTDA 897 became effective, which did not explicitly include dilution by tarnisment as a cause of action, 898 but was nevertheless recognised in the Mattel cases in 2002 899 and 2003. 900 But only since the TDRA of 2006 dilution by tarnishment was mentioned explicitly as a course of action. 901 In 2009, in Starbucks Corp. v Wolfe’s Borough Coffee, Inc., Starbucks could not convince the court that Charbucks caused consumers to attribute unfavourable characteristics to their mark and ultimately associate their mark with inferior goods and services. 902 Interestingly enough, the law does not give any factors that can be taken into account in relation to what constitutes trademark dilution by tarnishment. 903 In the TDRA of 2006, dilution by tarnishment became an explicit ground for action. 904 Dilution by tarnishment is an association arising from the similarity between a

895

Deere & Co. v MTD Products, Inc., 41 F3d 39, 43 (CA2 1994). Id. 897 Federal Trademark Dilution Act (FTDA). 898 15 U.S.C. § 1125 (c)1. 899 Mattel, Inc. v MCA Records (Mattel), 296 F.3d 894 (9th Cir. 2002), paras 22 and 23. However, Judge Kozinski recognises the possibility of tarnishment, “inappropriate for young girls” and “tarnishing with negative associations”, he described the use as non-commercial, which constituted a statutory “exemption” from the FTDA. 900 Mattel, Inc. v Walking Mountain Prods., 353 F.3d 792, 812 (9th Cir. 2003). The court held that Thomas Forsythe’s 78 ‘Food Chain Barbie’ photos portraying Barbie “in various absurd and often sexualized positions” were artistic and parodic works and therefore noncommercial speech not subject to a trademark dilution claim. Rebecca Tushnet, Make Me Walk, Make Me Talk, Do Whatever You Please: Barbie and Exceptions, in INTELLECTUAL PROPERTY AT THE EDGE, (Rochelle Dreyfuss & Jane Ginsburg eds., forthcoming 2013), at 10. 901 Trademark Dilution Revision Act (TDRA), § 43(c) of the United States Trademark Act of 1946 amended by U.S. Title 15, Chapter 22, subchapter III, § 1125, ‘False designations of origin, false descriptions, and dilution forbidden’ (c) Dilution by blurring, dilution by tarnishment. 902 Supra note 345. 903 SIMON FHIMA, supra note 277, at 178. 896

176 mark or trade name and a famous mark that harms the reputation of the famous mark 905, or in the words of the court in Deer & Co. v MTD Products, Inc.: “to evoke unflattering thoughts about the owner’s product” 906 or service. Or to put it in another way: when the mark may lose its ability to serve as a “wholesome identifier” of plaintiff's product. As already pointed out above, there is no test for tarnishment in the U.S. Generally trademark dilution by tarnishment is assumed to be easier recognised than trademark dilution by blurring. Deere & Co. v MTD Products, Inc. 907 illuminated that dilution by tarnishment “is usually found where a distinctive mark is depicted in a context of sexual activity, 908 obscenity, 909 or illegal activity.” 910 Denicola proposed to limit the scope of trademark dilution by tarnishment to only those cases where a junior user of the mark uses it for his own goods. 911 However, this means that competitors can easily avoid claims of trademark dilution by tarnishment if they hire parodists to degrade the senior mark. Just like there is already filter software against porn, it is possible to filter porn or illegal activity in combination with a trademark.

904

Trademark Dilution Revision Act (TDRA), § 43(c)(2)(C) Trademark Dilution Revision Act: association arising from the similarity between a mark or trade name and a famous mark that harms the reputation of the famous mark. 905 U.S. Code, Title 15, Chapter 22, subchapter III, § 112 (c)(2)(C). 906 Deere & Co. v MTD Prods., Inc.,41 F.3d 39, 43 (2d Cir.1994), para 17. 907 Id., para. 20. 908 Joe-College.com sells without any authorisation a number of T-shirts with trademarks of Kansas University which refer to sex and alcohol. University of Kansas v Sinks, 565 F.Supp.2d 1216 (D. Kan. 2008). In an earlier case, the uniforms of the Dallas Cowboys Cheerleaders were used in sex movie, so that the business reputation of the Dallas Cowboys was injured. Dallas Cowboy Cheerleaders, Inc. v Pussycat Cinema, Ltd., 604 F.2d 200 (2d Cir. 1979). A recent example is Rodax Distributors Inc., which does business as Caballero Video, which got to temporary restraining order, barring it from selling its “Ben & Cherry’s” series of 10 DVDs with titles including “Peanut Butter D-Cups” and “Boston Cream Thigh” while a trademark suit is under way. Ben & Jerry’s Homemade Inc. v Rodax Distributors Inc., 12-cv-6734 (S.D.N.Y. 2012). 909 It is easy to see that after a video prank was posted on YouTube by two Domino employees doing distasteful things with food, caused that the revenue stream of the pizza chain significantly decreased, supra note 574. 910 Coca-Cola sued Gemini Rising for selling a poster in the colours of Coca-Cola and text written in the characteristic curved lettering “enjoy Cocaine”, which was held not only to be distasteful but tarnishing to the Coca-Cola trademark. Coca-Cola Co. v Gemini Rising, Inc., 346 F Supp 1183 (DCNY 1972), at 1189. 911 Denicola, supra note129, 202-203.

177 In other words one can “teach” software to find by itself 912 these categories of unsavoury content to which famous marks cannot be exposed on social media. Until that time there are broad categories of tarnishing use of a trademark that can not be automatically recognised. In Chapter 9 it will be explained how trademark holders in case of “outbreaks” of tarnishing use on social media can “vaccinate” these systems, so that tarnishing use of trademarks on social media provisionally can be tackled in a semiautomatic way. Hormel Foods 913 made clear that a trademark may be tarnished when it is linked to products of shoddy quality, 914 poor customer service, 915 internet usage, 916 or is portrayed in an unwholesome or unsavoury context, with the result that the public will associate the lack of quality or lack of prestige in the defendant’s goods with the plaintiff’s unrelated goods. 917 To automatically assess the subjective qualifications associated with a junior mark is not possible. In short: even before tarnisment was codified in the TDRA it was part of established case law. In contrast to trademark dilution by blurring, trademark dilution by tarnishment does not have any test which courts can apply. However, one can draw from the jurisprudence that famous trademarks used in an unsavoury way, especially when associated with sexuality, obscenity or illegality, courts recognise that they can qualify this as tarnishing, but can decide to exempt the tarnishing trademark dilutor under certain circumstances (as will be discussed in Chapter 6.4).

Free riding Although free-riding, misappropriation, or unfair competition, has not been included explicitly in the federal statutory protection against trademark dilution, it was 912

Nancy Owano, “Google team: Self-teaching computers recognize cats”, Phys.org, June 26, 2012, avadilable at: http://phys.org/news/2012-06-google-team-self-teaching-cats.html (accessed August 11, 2013). 913 Hormel Foods, supra note 226. 914 Use of the trademark on poor quality goods. Chewy Vuiton: Louis Vuitton Malletier SA v Haute Diggity Dog (Haute Diggity Dog), LLC 507 F 3d 252, 268-269 (CA4 2007). In Dallas Cowboys v America’s Team, the defendants had used the trademark on products that misspelled the word basketball. Dallas Cowboys Football Club, Ltd. v America’s Team Properties, 616 F Supp 2d 622, 643 (ND Tex. 2009). 915 The New York City Triathlon, LLC v NYC Triath-Lon Club, Inc., 704 F Supp 2d 305, 323 (SDNY 2010) para. 36. 916 Nissan Motor Co. v Nissan Computer Corp., 2007 U.S. Dist LEXIS 90487 (CD Cal. 2007). 917 Hormel Foods, supra note 226.

178 recognised in Tiffany & Company v Tiffany Productions, Inc. 918 Here, the defendant, a film producer, had chosen the jeweller’s mark with no plausible reason “except the desire to obtain the benefit of the reputation built up by the plaintiff at a great expense over a long period of years, even though there was no competition between the two undertakings.” 919 Some more recent judgments where free riding has been dealt with include Johnny Carson v Here’s Johnny Portable Toilets, Inc. 920 in 1983 and Ty, Inc. v Perryman 921 in 2002. To automate the enforcement of trademark use that is free riding, separate of an automatic inference of trademark dilution by blurring, is difficult. If there is also dilution by blurring, they overlap and there is no need for any separate inference for free riding.

Chapter 6.2.3 Legislation and case law in the EU Chapter 6.2.3 will first provide a review of the most important legislation and case law in the EU, followed by an analysis of Article 5(2) Trademark Directive (parallel to Article 9(1)(c) Community Trademark Regulation), which provides a clear definition of trademark dilution. After this analysis one can assess the controversial judgment of the CJEU in Interflora, which is derogating Article 5(2) Trademark Directive’s protection against unfair competition in favour of “principles inherent to competition”, in the absence of any trademark dilution, trademark infringement or trademark use adversely affecting the trademark functions. An “act of unfair competition” means any act of competition contrary to honest business practices in industrial or commercial matters as defined in Article 10bis Paris Convention. 922 Taking ‘unfair advantage of the distinctive character or the repute of the trade mark’, is the EU equivalent of free-riding, a term sometimes used in the U.S. It relates not to the detriment caused to the mark but to the advantage taken by the third

918

Tiffany & Company v Tiffany Productions, Inc 147 Misc 679, 264 NYS 459 (1932, NY Sup Ct), affd 237 App Div 801, 262 NYS, at 682. 919 Id. 920 Johnny W. Carson v Here's Johnny Portable Toilets, Inc., 698 F.2d 831, February 6, 1983, (6th Cir. 1983). 921 Ty, Inc. v Perryman, supra note 830. Read Ilanah Simon Fhima, Dilution by blurring – a conceptual roadmap, IPQ 44, 56 (2010). 922 Paris Convention, supra note 137.

179 party as a result of the use of the identical or similar sign. In other words, “an exploitation on the coat-tails of the mark with a reputation.” 923 Trademark holders can protect their mark against trademark dilution in the EU according to Article 5(2) Trademark Directive, 924 and its equivalent Article 9(1)(c) Community Trademark Regulation. 925 Both deal with preventing third parties that, without permission, use in the course of trade of a sign that is identical with or similar to a trademark with a reputation in relation to goods or services which are not similar to those for which the trade mark is registered, and where use of that sign takes unfair advantage of, or is detrimental to, the distinctive character or the repute of the trade mark. Trademark dilution can happen when the average consumer is able to attach the sign to inferior goods or to those whose connotations are incompatible with those of the trademark with a reputation. There needs to be a sufficient degree of knowledge of that senior trademark so that the public, when confronted by the junior mark, may possibly make an association between the two marks. 926 “The Court of Justice has interpreted that wording as requiring a degree of similarity between the two marks which need not be such as to give rise to a likelihood of confusion but may merely have the effect that the relevant section of the public ‘establishes a link’ between them.” 927 Despite the formulation in Article 5(2) Trademark Directive and Articles 9(1)(c) Community Trademark Regulation, trademarks can be protected against trademark dilution not only in relation to dissimilar goods and services, but also in relation to identical or similar goods or services as the ECJ explained in Davidoff 928 and confirmed in Interflora. 929 These so called double-identity cases fall within the ambit of Article 5(1) and (2) Trademark Directive, 930 which provide harmonised trademark dilution criteria (see the section below: “In relation to dissimilar goods”).

923

Interflora refers to L’Oréal and Others, supra 230, para. 41. Interflora, supra note 263, para. 74. Supra note 146, and updated by Directive 2008/95/EC, supra note 696. 925 Supra note 171, and updated by Council Regulation (EC) No 207/2009, supra note 696. 926 General Motors Corp. v Yplon SA (General Motors) (Case C-375/97), Judgment of the ECJ, September 14, 1999. Adidas v Marca Mode I, (Case C-425/98), Judgment of the ECJ, June 22, 2000. 927 Intel v CPM, supra note 387. 928 Davidoff, supra note 384. 929 Interflora refers to other double-identity cases: Davidoff, supra note 384, para. 30; Adidas v Fitnessworld, supra note 386, paras 18-22, and Google France, para. 48. Interflora, supra note 263, para. 68. 930 Supra note 146. 924

180 Article 5(5) Trademark Directive 931 states: “Paragraphs 1 to 4 shall not affect provisions in any Member State relating to the protection against the use of a sign other than for the purposes of distinguishing goods or services, where use of that sign without due cause takes unfair advantage of, or is detrimental to, the distinctive character or the repute of the trade mark.” Therefore, EU members might come up with legislation that protects the use of a sign other than for the purposes of distinguishing goods or services where use of that sign without due cause takes unfair advantage of, or is detrimental to, the distinctive character or the repute of the trade mark. Interestingly enough Article 5(5) Trademark Directive 932 lacks any criterion of “use in the course of trade” which are explicitly mentioned in Article 5(1) and (2) Trademark Directive. 933 Since Robelco NV v Robeco NV, 934 it became clear that the implementation of Article 5(5) Trademark Directive 935 is not part of harmonised EU law. 936 As a consequence it cannot be dealt with by the CJEU. Any decision to implement such provision in the national law falls within the sovereign competence of each EU member state. Article 5(5) Trademark Directive 937 was implemented into Article 2.20(1)(d) Benelux Convention on Intellectual Property, 938 a Belgium, Dutch and Luxembourg organisation that grants so called Benelux trademarks. Since 2002 the BeneluxTrademark Office (Merkenbureau) started referring to the ECJ for preliminary rulings. 939 Article 2.20 Benelux Convention on Intellectual Property: 940 “(1) A registered trademark shall provide its owner with an exclusive right. Without prejudice to the possible application of ordinary law in matters of civil liability, the exclusive right to a trademark shall permit the owner to prevent any third party, without its consent, from: (d) using a sign for purposes other than those of distinguishing the goods or services, where use of the sign without due cause would take unfair advantage of or be detrimental to the distinctive character or the repute of the trademark.” 931

Id. Id. 933 Id. 934 Robelco NV v Robeco NV (Case C-23/01), Judgment of ECJ, November 21, 2002. 935 Supra note 146. 936 Robelco NV v Robeco NV, supra note 934, paras 25, 30 and 31. 937 Id. 938 Benelux Convention on Intellectual Property (Trademarks and Designs) of February 25, 2005. 939 Campina Melkunie BV v Benelux-Merkenbureau (Case C-265/00), Judgment of ECJ, February 12 2004. 940 Benelux Convention on Intellectual Property (Trademarks and Designs), supra note 938. 932

181 To summarise the abovementioned legislation and case law: since 1991 the EU members have to implement the Trademark Directive which includes a provision to protect against dilution of their national trademarks. Since 1993 the provision in the Community Trademark Regulation to protect against dilution of the Community trademarks is binding to the EU members and directly applicable. The ECJ made clear that the public must be able to make an association between the junior and senior mark before there can be trademark dilution, and that a proprietor should be able to protect its trademark against trademark dilution in relation to not just dissimilar goods or services, but also in case of identical goods or services. The protection of a trademark outside the course of trade, as Article 5(5) Trademark Directive makes possible, falls outside harmonised EU law, and is left to the member states. The Benelux member states have implemented Article 5(5) Trademark Directive via Article 2.20(1)(d) Benelux Convention on Intellectual Property. The EU provision of a protection against trademark dilution is formulated rather descriptively. Article 5(2) Trademark Directive states that a proprietor can prevent third parties from using a sign without permission that is identical or similar to its trademark with a reputation in relation to dissimilar goods or services if it “without due cause takes unfair advantage of, or is detrimental to, the distinctive character or the repute of the trade mark.” Below the constituting parts of this definition will be analysed: - In relation to dissimilar goods or services. - Detriment to distinctiveness; - Detriment to repute; - Unfair advantage of the distinctive character; - Unfair advantage of repute; use without due cause;

In relation to dissimilar goods or services The distinctive feature of trademark dilution is that it protects trademarks with a reputation against unauthorised use of an identical or similar sign for dissimilar goods or services. However, the ECJ in Davidoff 941 made clear that the scope of protection against 941

Davidoff, supra note 384.

182 trademark dilution includes identical or similar signs in relation to identical or similar goods: so called double-identity cases. These double-identity cases which take unfair advantage of or are detrimental to the distinctive character or the repute of the earlier trademark is controversial, since one can argue that the application of the trademark confusion doctrine is preferable in such a situation. Article 5(2) Trademark Directive’s wording 942 seemed to exclude similar goods, according to Advocate General Jacobs’ opinion. 943 The ECJ in Davidoff 944 disagreed, and held that one should not interpret the Trademark Directive 945 solely on the basis of its wording: one should take into account the overall scheme and objectives of the system of which it is a part. 946 But the ECJ in Davidoff 947 contended that non-confusing doubleidentity cases should be also protectable. Article 5(1)(b) Trademark Directive 948 is not suitable because it relates to cases with a likelihood of confusion. Therefore the ECJ made clear that non-confusing double-identity cases are eligible for protection under Article 5(2) Trademark Directive. The ECJ reasoned that if Article 5(2) Trademark Directive 949 was applicable to dissimilar goods then it would be a fortiori applicable to identical and similar goods and services, which could arguably be a bigger danger to a senior trademark. 950

942

Supra note 146. Davidoff & Cie and Zino Davidoff SA v Gofkid Ltd. (Case C-292/00), Opinion of Advocate General, March 21, 2002. 944 The ECJ interpreted the articles 4(4)(a) and 5(2) Trademark Directive “as entitling the Member States to provide specific protection for trade marks with a reputation in cases where the later mark is intended to be used or is used for goods or services identical with or similar to those covered by the earlier mark”. Davidoff, supra note 384. 945 Supra note 146. 946 Compare Article 31(2) Vienna Convention on the Law of Treaties, United Nations, May 23, 1969. 947 Davidoff, supra note 384. 948 Supra note 146. 949 Supra note 146. 950 Davidoff, supra note 384. 943

183 Detriment to distinctiveness Detriment to the distinctive character of a trademark with a reputation, is the EU’s version of dilution by blurring. 951 This occurs when the ability of the trademark to identify goods or services for which it is registered is weakened. 952 The proprietor of a trademark with a reputation does not have to wait until dilution has destroyed its distinctive character, a likelihood of detriment of distinctiveness is sufficient. 953 One can argue that it is detrimental to the distinctive character of a trademark logo, if other proprietors use the identical trademark logo, gradually persuading internet users that the trademark logo is not a trademark designating the goods or service provided by one particular trademark holder, but a generic symbol for different goods or services the trademarked logo is registered for (or in case of double-identity cases a generic symbol for the identical or similar goods or services, see below). Just as with dilution by blurring in the U.S., the detriment to the distinctive character of the trademark could be automatically and objectively determined by comparing the degree of similarity between a junior trademark and a senior trademark with a reputation.

Detriment to repute Detriment to the repute of a trademark with a reputation, is the EU’s equivalent of dilution by tarnishment. It is caused when the goods or services for which the identical or similar sign is used by the third party may be perceived by the public in such a way that

951

“In my opinion blurring in the sense of watering down is analogous to a family name losing its ability to distinguish between different families as groups with a common origin.” Advocate General Jääskinen in Interflora Inc., Interflora British Unit v Marks & Spencer plc Flowers Direct Online Limited (Case C-323/09), Opinion of Advocate General, March 24, 2011, footnote 65. 952 Interflora refers to L’Oréal and Others, supra note 230, paras 39 and 40. Interflora, supra note 263, para. 73. Interflora also refers to Advocate General Jääskinen in Interflora, id., in para. 80: “detriment is caused to the distinctive character of a trade mark with a reputation when the use of a sign identical with or similar to that mark reduces the ability of the mark to distinguish the goods or services of its proprietor from those which have a different origin. At the end of the process of dilution, the trade mark is no longer capable of creating an immediate association, in the minds of consumers, with a specific commercial origin.” 953 “[W]ithout it being required to wait for the end of the process of dilution, that is to say, the total loss of the trade mark’s distinctive character.” Interflora refers to L’Oréal and Others, supra note 230, paras 39 and 40. Interflora, supra note 263, para. 77.

184 the trademark’s power of attraction is reduced, 954 “[t]he reputation tainted or debased, devalued without due reason in such a way that the capacity of the mark to stimulate the desire to buy the kinds of good for which it is registered might be impaired. This can occur when the mark has been put in a context that is obscene or degrading or inappropriate or inherently unpleasant, or incompatible with the special image the earlier trademark has acquired in the eyes of the public, due to the promotional efforts of its owner.” 955 An clear illustration is the Claeryn/Klarein decision 956 of the Benelux Court of Justice which asserted that the use of the Klarein detergent would negatively affect the persuasive advertising power of the mark for the Claeryn gin, which is pronounced the same way in Dutch. Simon Fhima pointed out that attention in the EU was focused on so called dissonant goods. 957 Then again, she explained that so far, the CJEU has not expressed itself on the scope of tarnishment, in contrast to some Advocates General. 958 Just like the U.S. there is no test for tarnishment in the EU. 959 Just as with dilution by tarnishment in the U.S., the protection against the detriment to the repute of the trademark could be semi-automated against “outbreaks” that are detrimental to the reputation of the trademark, as will be explained in Chapter 9 “Paradigm shift”.

Unfair advantage of the distinctive character If an unauthorised use of the trademark did not cause detriment to the distinctiveness of the trademark it can still take unfair advantage of the distinctive character of the trademark. “Unfair advantage of distinctiveness covers cases where the 954

Interflora refers to L’Oréal and Others, supra note 230, paras 39 and 40. Interflora, supra note 263, para. 73. 955 OHIM The Manual concerning Opposition - Part 5, Article 8(5) CTMR, at 38. 956 Colgate-Palmolive v Bols (Claeryn v Klarein), Benelux Court of Justice, March 1, 1975, N 1975, 472. Kamperman Sanders, supra note 214, at 57, footnote 29. 957 SIMON FHIMA, supra note 277, at 175. 958 Id., at 175. An example is Advocate General Sharpton, who proposed criteria for what constitutes liability for damage of the reputation of the trademark, in relation to repackaging and parallel import. One can avoid becoming liable by ensuring that the packaging is not be defective, of poor quality, or untidy; and that the importer gives notice to the trade mark owner before the repackaged product is put on sale, and, on demand, supplies him with a specimen of the repackaged product. Boehringer Ingelheim KG and Others v Swingward Ltd and Dowelhurst Ltd. (Case C-348/04), Opinion Advocate General, April 26, 2007, para. 17(4) and (5) 959 Id., at 178.

185 applicant benefits from the attractiveness of the earlier right by affixing on his goods a sign which is widely known in the market, misappropriating thus its attractive powers and advertising value.” 960 Misappropriation of the distinctiveness of the trademark with a reputation, also known as free-riding or commercial parasitism, can happen when there is an association between the senior and junior trademark which renders possible the transfer of attractiveness to the junior trademark. 961 Three opposition cases illustrate in what kind of scenarios a transfer of the attractiveness of the senior trademark to a junior mark can take place: In Comité International Olympique v Belmont Olympic S.A., the International Olympic Committee opposed the registration of the Community Trademark ‘Family Club Belmont Olympic’, which included the word ‘Olympic’, which would “immediately add value thereto, because it will make it both easier to remember as a whole, as it is built around a reputed sign, and more attractive, as all the highly regarded concepts relating to the Olympic Games will be also reflected in the later mark.” 962 In the Lipostatin/Lipostat case, the Community Trademark application of Lipostatin for the product classes which included hair lotion and food was opposed by Lipostat, which was registered in the product class for pharmaceuticals. It was held that there was the risk that some of the qualities of the Lipostat’s goods would be attributed to those of Lipostatin, especially because of the proximity of the markets in the respective product classes, so that the extension of Lipostat into Lipostatin’s product classes were conceivable. 963 In the Formula One Licensing B.V. v Produits Petroliers Organisation S.A., Formula One Licensing appealed, to no avail, to the rejection of its opposition against the registration of Community Trademark Kennol f1, based on earlier rights, all variations of Formule 1 trademarks, which are known for goods and services associated with the motor sport and/or motor industry in general and the Championship in particular and therefore

960

Opposition Guidelines, Part 5, Article 8(5) CTMR - Status: March 2004, p 40. Id. 962 Decision No. 81/2000 of the Opposition Division of 25 January 2000, Comité International Olympique v Belmont Olympic S.A, at 12. 963 Lipostatin/Lipostat, (Case R 1007/2000-1), OHIM decision November 30, 2001. See also “Make Your Marks”, European Perspectives, available at: http://www.jenkins.eu/mym-autumn-2002/alicante-abstracts.asp (accessed August 11, 2013). 961

186 take unfair advantage of the distinctiveness of Formula One, 964 but would also preclude this trademark holder the possibility of further licensing and merchandising even outside its natural market sector. 965 In other words the chance that taking unfair advantage of distinctiveness takes place is especially high in case the trademark’s distinctiveness is very strong, or if the junior mark is used for products that are within the reach of the trademark’s natural extension of products, or outside of this extension when the distinctiveness of the trademark is very suitable for licensing or merchandising. 966 The intention of the party that takes unfair advantage to distinctiveness is not relevant. 967 Just as with free riding in the U.S., it is difficult to automatically determine that there is unfair advantage of the distinctive character of the trademark.

Unfair advantage of repute Instead of detriment of repute, there can be an unfair advantage of repute. Unfair advantage of repute cases concern those where the defendant profits from the renown of the opponent’s trademark by unduly exploiting its prestige. In L’Oréal and Others, 968 unfair advantage of repute was described, as “exploitation on the coat-tails of the mark with a reputation.” 969 Unfair advantage of repute is focused on the quality image of the mark. So, the mark has acquired not only a high degree of recognition amongst consumers, but a good or special reputation as well. The plaintiff needs to prove this added value. This is especially difficult if not impossible to automate.

964

Formula One Licensing B.V. v Produits Petroliers Organisation S.A. (Case R 957/2001-1), OHIM decision, December 17, 2002, at 5, para. 6. 965 Opposition Guidelines, Part 5, Article 8(5) CTMR - Status: March 2004, at 41. 966 Id. 967 Id. 968 L’Oréal and Others, supra note 230. 969 Id. at para. 41

187 Use without due cause Even though “use without due cause” 970 is a necessary element of protection against trademark dilution, it is not reasonable to expect that the opponent proves a negative fact, such as the absence of due cause. Simon Fhima explained that in the absence of any indications on the face of the evidence providing an apparent justification for the applicant’s acts, the lack of due cause must be generally presumed. 971 However, the applicant may avail himself of the possibility of rebutting such a presumption by showing that he has one of the legitimate justifications that entitles him to act in this particular manner. Chapter 6.4 “Trademark dilution defences” elaborates on how the phrase “use without due cause” provides a link between trademark dilution and the defences and discretion to the court to exempt trademark use.

Interflora In 2011, in Interflora, 972 trademarks were unauthorisedly used as keywords triggering advertisements. The CJEU confirmed that Article 5(2) Trademark Directive 973 and Article 9(1)(c) Community Trademark Regulation 974 must be interpreted that a proprietor can prevent a competitor from advertising on the basis of a keyword corresponding to that trademark, whereby the competitor takes unfair advantage of the distinctive character or repute of the trademark (free-riding), or where where the advertising is detrimental to that distinctive character (trademark dilution by blurring) or to that repute (trademark dilution by tarnishment). 975 But then the CJEU held that a proprietor is not entitled to prevent keyword triggered advertisements by competitors which put forward an alternative to the goods or services of the proprietor of that mark, if the competitor is not offering a mere imitation of the goods or services of the proprietor

970

Article 5(2) Trademark Directive states that reputation in the member state of the trademark is an express precondition for proprietors to prevent third parties not having their consent using their trademark in the course of trade for dissimilar products or services where the latter has a reputation in the member state and where use of that sign without due cause takes unfair advantage of, or is detrimental to, the distinctive character or the repute of the trade mark. Supra note 146. 971 SIMON FHIMA, supra note 277, at 228. 972 Interflora, supra note 263. 973 Supra note 146. 974 Supra note 171. 975 Interflora, supra note 263, para. 96(2).

188 of that trademark, without causing dilution or tarnishement and without adversely affecting functions of the trademark with a reputation. In short the CJEU held that if a competitor uses a trademark unauthorisedly for keyword triggered advertising of a competitor, it is able to do so, if it withholds from dilution by blurring, dilution by tarnisment and is not adversely affecting the functions of the trademark. Article 5(2) Trademark Directive 976 provides a separate protection against “unfair advantage to the distinctive character or repute of the trademark”, also known as free-riding or unfair competition. Advocate General Jääskinen in his Opinion on Interflora seems to take free-riding more serious: proprietors should be able to prevent use of their trademark if an “advertiser attempts thereby to benefit from its power of attraction, its reputation or its prestige, and to exploit the marketing effort expended by the proprietor of that mark in order to create and maintain the image of that mark.” 977 However, the CJEU held that in this keyword triggered advertising case the protection ground against unfair competition lost out against “practices inherent in competition.” Apparantly the CJEU finds the possibility of keyword triggered advertisments more important than protecting proprietors against trademark dilution. The CJEU however, agrees with the Advocate General, 978 that if keyword triggered advertising is detrimental to the distinctive character of a trademark with a reputation if it contributes to turning that trademark into a generic term. 979 In other words, proprietors should be able to protect their trademark against trademark dilution by blurring. One can question whether the competitor making use of the proprietor’s trademark reputation via keyword triggered advertising really withheld from dilution by tarnishment and from adversely affecting the advertising and investment functions of the trademark. Besides, trademarks used as keyword triggering advertisements could lead to dilution by tarnishment. The proximity of the keyword triggered advertisement to the organic results of the famous trademark can influence internet users’ perceptions in such 976

Supra note 146. Supra note 951, para. 107(2)(B). 978 Id. 979 Interflora, supra note 263, para. 96(2). 977

189 a way that the famous mark will be tarnished. There have been not many dilution by tarnishment cases thus far for keyword triggered advertisement, but an example could be: a non-exclusive outlet known for shoddy products using the trademark Louis Vuitton for selling genuine Louis Vuitton products. Competitors that unauthorisedly use a trademark of a third party as a keyword triggering advertisements, piggyback on the reputation of this trademark, thereby saving money the third party has invested in marketing and advertising, this adversely affects the advertising function of the proprietor’s trademark. One can also argue that the investment function of the trademark will adversely be affected, because if a famous mark wants to buy advertisements that are triggered by its own name it has to pay a premium because of the bids by junior marks. The CJEU failed to appreciate that trademarks with a reputation that are unauthorisedly used as keyword triggering advertisements of a competitor adversely affect the essential function of the trademark: as an indicator of the source of origin. Instead of shortcutting the search process of internet users, their search process is diverted away from the trademark they were looking for, although Google makes a minor distinction using a slight colour difference and placement between keyword triggered advertisements and organic results. 980 Phillips posed the useful question how the advertiser is attempting to benefit from the power of attraction, 981 reputation, prestige of a trademark and exploit the marketing effort of the trademark holder, if the internet user already typed in the trademark as keyword. 982 To give an answer to this question one could compare the situation of keyword triggered advertisements with that of asking where one can find a certain brand of product in a supermarket. A supermarket employee takes one along the aisles to the right shelf. Here one sees the branded product flanked by house branded products. The difference between the search in the supermarket and on the internet is that the latter concerns a digital medium that has the potential to be much more effective and efficient 980

“People are only noticing retrospectively that the visual distinction between Google search results and advertising has diminished over the years. You hardly see the difference between paid links on top of the page and search results beneath. So it is easier to click on advertisements (including accidentally) and generate Google revenue.” OLSTHOORN, supra note 559 . 981 Intel v CPM, supra note 387, at 18, quoting Adidas v Fitnessworld, supra note 386. 982 Jeremy Philips, Google AdWords: Trade Mark Law and Liability of Internet Service Providers, supra note 9, at 66.

190 in shortcutting one’s search process. Bechtold and Tucker researched the influence of keyword triggered advertisements on the search process of two groups of internet users. 983 One group was looking for a certain brand and the other group for a certain product. The group looking for a certain brand needed a bit more time to find what they were looking for, and the group looking for a certain product found it a bit faster. Therefore, one can conclude that when trademarks are used as keyword triggering advertisements the internet users looking for a certain brand need more time, hence adversely affecting the source function of the trademark of which shortcutting the search process is its raison d’être.

Chapter 6.3 Preconditions for protection against trademark dilution After the legislation and case law of the trademark dilution in the U.S. and unfair advantage of or detriment to the distinctive character or repute of the trademark in the EU, this Chapter follows with prerequisites of the anti-trademark dilution measures. Chapter 6.3.1 provides the degrees of distinctiveness, including a classification of trademarks into four categories (generic, descriptive, suggestive and arbitrary marks), dependent on their distinctiveness. Chapter 6.3.2 examines the degree of fame, reputation or well-knownness. Then, Chapter 6.3.2.1 examines the precondition to trademark dilution in the U.S., namely a famous trademark. Chapter 6.3.2.2 examines the precondition to unfair advantage of or detriment to the distinctive character of the trademark in the EU, namely a trademark with a reputation. Chapter 6.3.2.3 provides the differences between famous trademarks and trademarks with a reputation on the one side and well-known trademarks on the other side. Then Chapter 6.3.3. discusses the problems with identical trademarks for dissimilar goods or services, which are caused by globalisation and the internet (Chapter 6.3.3.1) and unclear boundaries of goods and services classifications (Chapter 6.3.3.2). Chapter 6.3.3.3. answers the question whether there is too much or too little property in a

983

Stefan Bechtold and Catherine Tucker, Trademarks, Triggers and Online Search, March 2013 (paper available upon request to Prof. Bechtold), available at: http://www.ip.ethz.ch/people/bechtold/publications/ (accessed on August 9, 2013).

191 trademark. Chapter 6.3.3.4. analyses arguments pro and contra the right of trademark holders to extend the use of their trademark to other activities. Chapter 6.3.4 concludes that the use of identical or similar trademark logos for non-competing goods or services is undesirable.

Chapter 6.3.1 Degrees of distinctiveness Distinctiveness plays a dual role in trademark law. The first role: to register a sign as a trademark it needs to qualify as inherently distinctive or otherwise have acquired distinctiveness. 984 The second role is that the degree of distinctiveness determines the scope of protection granted to a trademark. 985 If the distinctiveness of a trademark is to be evaluated to see whether a trademark deserves extended protection against trademark dilution, then its distinctiveness is being evaluated for a second time. The first time was to see whether the sign reached the threshold of sufficient distinctiveness so that it could be registered as a trademark. To do a distinctiveness evaluation twice is redundant. In The Rational Basis of Trademark Protection, 986 Schechter clarified the relation between the need for protection and the degree of distinctiveness: “The more distinctive or unique the mark, the deeper is its impress upon the public consciousness, and the greater its need for protection against vitiation or dissociation from the particular product in connection with which it has been used.” 987 Schechter asserted that the more distinctive the mark, the more effective is its selling power. 988 Therefore it was his opinion that “coined, invented, fanciful or arbitrary marks” deserve to have extensive protection, i.e. beyond protection against confusion. 989 Simon Fhima’s critique of Schechter was that his only criterion for protection is coined, arbitrary or fanciful marks, regardless whether these goods are perceived as satisfactorily or unsatisfactorily: “This conveyance of poor quality could serve a useful 984

A non-distinctive trademark can be registered once it has acquired secondary meaning recognised in a relevant universe of consumers after that mark was extensively used, for example via advertising. This concept of having acquired secondary meaning is known in German as Freihaltebedürfnis. 985 “As the distinctiveness of the mark is the quality that the statute endeavors to protect, the more distinctiveness the mark possesses, the greater the interest to be protected.” Nabisco, Inc. v PF Brands, Inc, 191 F.3d 208; (August 31, 1999) U.S. App. LEXIS 20786; 51 U.S.P.Q.2D (BNA) 1882.. 986 Schechter, supra note 100. . 987 Schechter, id., at 825. 988 Schechter, id., at 819. 989 Schechter, id., at 829.

192 consumer information function, but then it seems strange to vest such rights in the mark owner who has produced such unsatisfactory products.” 990 However, this author begs to differ: whether a good is perceived as satisfactorily or unsatisfactorily is subjective and can differ from one customer to the next. Therefore, it can be argued that the protection of goods that are unique, since their marks are coined, arbitrary or fanciful, and therefore can be recognised no matter whether they are valued in a positive or negative way, is rational. The need for protection of this uniqueness is arguably a fortiori of importance in case a good is perceived as unsatisfactorily, so that it can be avoided in the future. In Zatarains Inc. v Oak Grove Smokehouse, Inc., 991 a classification of trademarks is given. Four categories of trademarks can be distinguished: generic, descriptive, suggestive and arbitrary marks.

Generic trademarks The generic trademark, also known as proprietary eponym, is the common name for the kind of product instead of indicating the source of the product. Generic marks are not protected under the Lanham Act and are subject to cancellation of registration. 992 Advocate General Jääskinen in Interflora 993 makes a distinction between a trademark becoming banal and thereby losing its distinctiveness caused by dilution of the trademark for dissimilar goods, and the risk of degeneration, the trademark becoming a generic term or common noun, so that genericide of the trademark takes place for the same kind of products. The latter also “indicates a loss of distinctiveness but of a different nature than dilution in the sense of the trade mark becoming watered down.” 994 In Alvin M. Marks v Polaroid Corp., 995 the court gave a definition of genericide: “That a well known trademark does not become generic unless it has lost all trademark meaning, not only within part of the general public but within the entire industry and trade.” 996 Examples of genericide happened to Aspirin, 997 Cellophane 998 and Shredded Wheat. 999 990

Simon Fhima, supra note 921, at 6. Zatarains, Inc. v Oak Grove Smokehouse, Inc., 698 F.2d 786, 791 (5th Cir. 1983). 992 15 U.S.C. § 1064(3), Lanham Act. 993 Opinion of Advocate General Jääskinen, Interflora, supra note 951, paragraph 82. 994 Id. 995 Alvin M. Marks v Polaroid Corp., 129 F. Supp. 243, 105 U.S.P.Q. 10 (D. Mass. 1955). 996 Id. 997 Aspirin: Bayer & Co., Inc. v United Drug Co., supra note 225. 991

193 Trademark holders need to create a body of proof for the purpose of avoiding a charge of constructive abandonment in the future. 1000 That is why for example a company such as Google explicitly objects internationally that its trademark Google is used as a verb, conjugated or not. 1001

Descriptive trademarks A descriptive trademark describes the qualities or laudatory characteristics of a product. If a term requires imagination, thought and perception to reach a conclusion as to the nature of goods it is not descriptive. Another test is whether competitors would be likely to need the terms used in the trademark in describing their products. If so, the trademark is descriptive. Another indication is to the extent to which a term actually has been used by others marketing a similar service or product. Descriptive marks are only protected if and to the extent that they have acquired secondary meaning in the minds of the consuming public. Machat wrote that if one incorporates a descriptive or generic word in a trademarked name or logo, it can advertise to or inform the public about the function or attributes of a product. 1002 The other side of the coin is, however, that the chances increase that the public will get confused because other businesses use those same descriptive or generic words to describe their product. For this reason the trademark registrar can oblige the registrant to disclaim the use of the descriptive or generic words in the logo or name as a precondition to registration.

Suggestive marks A suggestive mark “suggests, rather than describes, some particular characteristic of the goods or services to which it applies and requires the consumer to exercise the imagination in order to draw a conclusion as to the nature of the goods and services.” 1003 998

Cellophane: DuPont de Nemours & Co. v Waxed Products Co., 85 F2d 75 (2d Cir. 1936), modifying 6 F. Supp. 958 (E.D.N.Y. 1934) cert. denied, 299 U.S. 601 (1936). 999 Shredded Wheat: Kellog Co. v National Biscuit Co., 305 U.S. 111 (1938). 1000 Constructive abandonment of a trademark can be by commission, acts that use the trademark in a generic way, or by omission, lacking to write letters protesting the use of the trademark in a generic way. 1001 Mike Wheatley, “Google Wins ‘Ungoogleable’ Usage Fight In Sweden, But At What Cost To Its Brand?”, Silicon Angle, March 26, 2013, available at: http://siliconangle.com/blog/2013/03/26/googlewins-ungoogleable-usage-fight-in-sweden-but-at-what-cost-to-its-image/ (accessed August 11, 2013). 1002 Machat, supra note 737, at 832-833 (2005). 1003 Zatarains, Inc. v Oak Grove Smokehouse, Inc., supra note 991, at para. 20.

194 In Coca-Cola Co. v Koke Co., 1004 the infringer of Coca-Cola tried to use as a defence that the trademark Coca-Cola in combination with an illustration of coca leaves and nut suggested that cocaine was still used, and because of this alleged fraudulent representations to the public, the plaintiff had lost its claim to any help from the court. Justice Holmes did not concur: “Coca-Cola probably means to most persons the plaintiff's familiar product to be had everywhere, rather than a compound of particular substances.” 1005

Arbitrary or fanciful marks Arbitrary or fanciful marks, which come into being out of the imagination, are invented marks. They do not bear any relationship to the products or services to which they are applied. Suggestive, arbitrary and fanciful marks are considered per definition distinctive and are protected without proof of secondary meaning. However, as pointed out in Abercrombie & Fitch, 1006 the lines of demarcation between distinctive and invented marks are not always bright: “Moreover, the difficulties are compounded because a term that is in one category for a particular product may be in quite a different one for another, because a term may shift from one category to another in light of differences in usage through time, because a term may have one meaning to one group of users and a different one to others, and because the same term may be put to different uses with respect to a single product.” 1007 Heymann asserted that the hierarchy used in Abercrombie & Fitch, 1008 which rewards the creativity inherent in a trademark and supported a Lockean notion of trademarks, should be substituted by a linguistic analysis. 1009 In such an analysis only trademarks that are not metaphorically used, do not appear in lower case and are

1004

Coca-Cola Co. v Koke Co., 254 U.S. 143 (1920) at 146. Id. 1006 Abercrombie & Fitch Co. v Hunting World, Inc. (Abercrombie & Fitch), 537 F.2d 4 (2d Cir. 1976). 1007 Id. 1008 Id. 1009 Laura A. Heymann, The Grammar of Trademarks 14 LEWIS & CLARK L. REV. 1313, 1332-33 (2010). 1005

195 exclusively used as an adjective and never as a noun or verb, are to be preferred over those that do. 1010

Trademarks with a personality Since the distinctiveness of trademarks can be acquired, a more useful distinction might be between those trademarks that symbolise a brand with a personality and those that symbolise a brand without personality. Professor Tan called the first kind alpha brands. 1011 The implications for these alpha brands is that they should accept that they will be more referenced by other brands. In a similar vein, Beebe advocated that only extraordinary marks would be eligible for the extended protection against trademark dilution. 1012

Chapter 6.3.2 Degree of fame, reputation or well-knownness “Reputation comes on foot and leaves on horseback” 1013 Despite Schechter’s proposal to give arbitrary, coined or fanciful marks extended protection against dilution, the prerequisite for extended protection against dilution was and is still given to those marks that are famous in the U.S. or have a reputation in the EU. Schechter did not propose his criteria because unusual names sell per se. Instead, he proposed these as prerequisites for extended protection, because the uniqueness or arbitrariness, which one could see as a manifestation of a strong mark 1014 is important, simply to be able to distinguish one trademark from the other. The idea behind the precondition for trademark dilution is that if the trademark is not famous or does not have a reputation there is nothing to dilute. However this assumes that famous trademarks or trademarks with a reputation deserve to be more protected than non-famous trademarks or trademarks without a reputation, an untenable position as Chapter 6.3.3.4 will demonstrate.

1010

Heymann, id., 1330-1343. David Tan, Affective Transfer & the Appropriation of Commercial Value: A Cultural Analysis of the Right of Publicity 9 VA. SPORTS & ENT. L.J. 272 (2010). 1012 Beebe, supra note 222, 1158 (2006). 1013 Translation of “Reputatie komt te voet en gaat te paard”, which is a Dutch saying. 1014 Norman Siebrasse, supra note 286, at 33, footnote 106 1011

196 The prior mark must have obtained its famous status, or reputation, prior to the first use of the allegedly diluting mark to qualify for dilution protection. To prove that one’s trademark was famous or had a reputation, sometimes years ago, might be a more practical challenge.

Chapter 6.3.2.1 Famous trademark in the U.S. When the TDRA went into effect, 15 USC § 1125(c)(2)(A) 1015 codified some factors courts could take into account when determining whether a trademark possesses “the requisite degree of recognition”: (i) The duration, extent, and geographic reach of advertising and publicity of the mark, whether advertised or publicized by the owner or third parties. (ii) The amount, volume, and geographic extent of sales of goods or services offered under the mark. (iii) The extent of actual recognition of the mark. (iv) Whether the mark was registered under the Act of March 3, 1881, or the Act of February 20, 1905, or on the principal register. This non-exhaustive list of factors substitutes the Nabisco, Inc. v PF Brands, Inc. 1016 factors that were applied under the FTDA. The TDRA 1017 changed the fact that a trademark could be famous with some niche of the population, as was decided in the pre-TDRA Moseley v Victoria Secret Inc. 1018 case by the Supreme Court. As of 2006, a famous mark must be “widely recognized by the general consuming public of the United States.” 1019

1015

15 USC § 1125 (c)(2)(A). The Second Circuit in Nabisco, Inc. v PF Brands, Inc. provided a five-factor test to see whether a claim of dilution under the FTDA is justified: (1) the senior mark must be famous; (2) it must be distinctive; (3) the junior use must be a commercial use in commerce; (4) it must begin after the senior mark has become famous; and (5) it must cause dilution of the distinctive quality of the senior mark. Nabisco, Inc. v PF Brands, Inc., supra note 985. 1017 Trademark Dilution Revision Act (TDRA), § 43(c) of the United States Trademark Act of 1946 amended by U.S. Title 15, Chapter 22, subchapter III, § 1125, 'False designations of origin, false descriptions, and dilution forbidden' (c) Dilution by blurring, dilution by tarnishment. 1018 Supra note 342. 1019 15 U.S.C.A. § 1125(c)(2)(A). 1016

197 According to professor Fischer, U.S. courts use in practice the following eightfactor test to see whether a mark is famous, 1020 which is predominantly the same as 15 USC § 1125(c)(2)(A), 1021 except for factor 7: 1. the degree of inherent or acquired distinctiveness of the mark; 1022 2. the duration and extent of use of the mark in the identified field; 3. advertising and publicity; 4. the geographic area in which the mark is used; 5. the channels of trade; 6. the trade’s recognition of the mark; 7. whether third parties also use the mark; 8. and whether the mark is federally registered.

Chapter 6.3.2.2 Trademarks with a reputation in the EU Advocate General Sharpston articulated in her opinion on Intel Corp. v CPM UK Ltd. 1023 in 2008 the paradox that trademarks with a reputation are especially vulnerable to the existence of similar marks in dissimilar product areas where actual confusion is unlikely. To counter these challenges member states have the option to grant extended protection to trademarks with a reputation. 1024 All member states effectively have done so. First the relevant articles of the Trademark Directive 1025 and Community Trademark Regulation 1026 will be provided. Then the word “reputation” is clarified.

1020

William Fisher, Overview of Trademark Law, Harvard Law School, available at: http://cyber.law.harvard.edu/metaschool/fisher/domain/tm.htm#8 (accessed August 11, 2013). 1021 15 USC § 1125 (c)(2)(A). 1022 In contrast to FTDA, TDRA explicitly includes the protection against dilution by including the degree of "inherent or acquired distinctiveness" as one of the relevant factors. 1023 “In an apparent paradox, the best known trade marks are particularly vulnerable to the existence of similar marks even in highly dissimilar product areas, where actual confusion is unlikely.” Advocate General Sharpston in Intel Corporation Inc. v CPM United Kingdom Ltd. (Case C-252/07), Opinion of Advocate General, June 26, 2008, para. 8. 1024 Preamble 10 Trademark Directive. Notice that the geographical scope of the reputation is not mentioned here. Supra note 146. 1025 Id. 1026 Supra note 171.

198 Reputation is prerequisite Article 5(2) Trademark Directive 1027 states that reputation in the member state of the trademark is an express precondition for proprietors to prevent third parties not having their consent using their trademark in the course of trade for dissimilar goods or services where the latter has a reputation in the member state and where use of that sign without due cause takes unfair advantage of, or is detrimental to, the distinctive character or the repute of the trade mark. The ECJ in PAGO International GmbH 1028 explained that a community trademark must be known by a significant part of the public concerned by the goods or services covered by that trademark in a substantial part of the territory of the European Community and that the territory of one member state of the EU may be considered such a substantial part. 1029 Article 9(1)(c) Community Trademark Regulation 1030 is the parallel provision to Article 5(2) Trademark Directive. 1031 Beside an article to avert use of their trademark for dissimilar use, the Trademark Directive 1032 and Community Trademark Regulation 1033 have each also an article to refuse or invalidate the registration of the already registered trademark for dissimilar use: Article 4(3) Trademark Directive 1034 provides grounds for refusal or invalidity of a trademark that is registered for dissimilar goods or services of an earlier Community trademark which has a reputation in the Community and where the use of the later trade mark without due cause would take unfair advantage of, or be detrimental to, the distinctive character or the repute of the earlier Community trade mark. Article 4(4)(a) Trademark Directive 1035 is the optional version of Article 4(3) Trademark Directive 1036 focused on protecting the earlier national trademark. An express

1027

Id. PAGO International GmbH v Tirolmilch registrierte Genossenschaft mbH. (PAGO International GmbH) (Case C-301/07), Judgment of the ECJ, October 6, 2009. 1029 Id., para. 30. 1030 Supra note 171. 1031 Supra note 146. 1032 Id. 1033 Supra note 171. 1034 Supra note 146. 1035 Id. 1036 Id. 1028

199 condition for Article 4(4)(a) Trademark Directive 1037 is that the earlier trademark has a reputation in the member state concerned. Article 8(5) Community Trademark Regulation 1038 is the parallel provision to Article 4(3) Trademark Directive. 1039 The only difference is that the regulation distinguishes between an earlier Community trademark which needs to have a reputation in the Community, and an earlier national trademark which needs to have a reputation in the member state concerned.

How to define reputation There is no definition of “reputation” in the Trademark Directive, 1040 nor in the Community Trademark Regulation. 1041 In General Motors, 1042 the ECJ explained that the translations of the word “reputation” into the different languages of the EU can be divided into two groups: The first group consisting of translations of the word “reputation” into German, Dutch and Swedish, are words that signify that the trademark must be known without indicating the extent of knowledge required. The second group of words existing of translations of the word “reputation” are words that imply a quantitative level of a certain degree of knowledge required amongst the public. 1043 The ECJ confirmed that the degree of knowledge required must be considered to be reached when the earlier mark is known by a significant part of the public concerned by the goods or services covered by that trade mark, 1044 conform Article 5(2) Trademark Directive. 1045 This knowledge threshold 1046 is deemed to have been reached, when a trademark is 1037

Id. Supra note 171. 1039 Supra note 146. 1040 Id. 1041 Supra note 171. 1042 General Motors, supra note 926, at para. 21. 1043 Id. 1044 Id., para. 26. 1045 “In so far as Article 5(2) of the Directive, unlike Article 5(1), protects trade marks registered for nonsimilar products or services, its first condition implies a certain degree of knowledge of the earlier trade mark among the public. It is only where there is a sufficient degree of knowledge of that mark that the public, when confronted by the later trade mark, may possibly make an association between the two trade marks, even when used for non-similar products or services, and that the earlier trade mark may consequently be damaged.” General Motors, supra note 926 , para. 23. 1046 “The degree of knowledge required must be considered to be reached when the earlier mark is known by a significant part of the public concerned by the products or services covered by that trade mark.” General Motors, supra note 926, para. 26. 1038

200 known by a significant part of the public concerned by the products or services covered by the mark. 1047 To assess whether a significant part of the public knows the trademark, it is not sufficient to apply a percentage, as General Motors explained. 1048 Instead, the ECJ made it clear that all relevant facts of the case must be taken into account, ”in particular the market share held by the trade mark, the intensity, geographical extent and duration of its use, and the size of the investment made by the undertaking in promoting it.” 1049 Because of these interpretations of reputation, the EU trademark system has a broader eligibility for dilution protection than that of the U.S. trademark system. Then again, the U.S. trademark system compensates its narrower eligibility for dilution protection with a broader protection under the trademark infringement, using the likelihood of confusion doctrine, so that the two legal systems de facto lead to similar outcomes. 1050 “Reputation” in the Community Trademark Regulation 1051 has the same meaning as in the Trademark Directive. 1052 The OHIM Manual Concerning Opposition confirmed that “the limited size of the relevant market should not be regarded in itself as a factor capable of preventing a mark from acquiring a reputation within the meaning of Article 8(5)[Community Trademark Regulation], as reputation is more a question of proportions and less of absolute numbers.” 1053 It continued that: “[A]s the economic value of reputation is also the protected subject-matter of this provision, any qualitative aspects thereof are of relevance when assessing the possibility of detriment or unfair advantage.” 1054

1047

“The public amongst which the earlier trade mark must have acquired a reputation is that concerned by that trade mark, that is to say, depending on the product or service marketed, either the public at large or a more specialised public, for example traders in a specific sector.” General Motors, supra note 926, para. 24. 1048 “It cannot be inferred from either the letter or the spirit of Article 5(2) of the Directive that the trade mark must be known by a given percentage of the public so defined.” General Motors, supra note 926, para. 25. 1049 General Motors, supra note 926 , para. 27. 1050 Marcus Luepke, Taking Unfair Advantage or Diluting a Famous Mark—A 20/20 Perspective on the Blurred Differences Between U.S. and E.U. Dilution Law, 98 TMR 789 (2008). 1051 Supra note 171. 1052 Supra note 146. 1053 OHIM Manual Concerning Opposition – Part 5, Article 8(5) CTMR, at 11. 1054 Id., at 10.

201 A difference between the Trademark Directive 1055 and the Community Trademark Regulation 1056 is that the Community trademark should have a reputation in a substantial part of the territory of the Community. As already pointed out above in PAGO International GmbH, 1057 the CJEU interpreted substantial part of the territory of the Community to be at least one member state. Simon Fhima wrote that in case of proving detriment of repute, the EU version of dilution by tarnisment, trademark holders need not only to show that their senior trademark has a reputation, but also what kind of reputation: for example that those consumers have a positive image. 1058 Simon Fhima rightly argued that one might expect an automatic assumption that trademarks have positive reputation: the plaintiff should not be unnecessarily burdened to prove a positive image of his trademark, instead, the defendant should have the burden to prove otherwise. 1059

Chapter 6.3.2.3 Famous trademarks, trademarks with a reputation and well-known trademarks The WIPO recommendations concerning provisions on the protection of wellknown marks confirmed that the term well-known can be explained in a quantitative sense. Article 2(2)(b) WIPO Recommendations 1060: “Where a mark is determined to be well known in at least one relevant sector of the public in a Member State, the mark shall be considered by the Member State to be a well-known mark.” Article 2(2)(c) WIPO Recommendations: “Where a mark is determined to be known in at least one relevant sector of the public in a Member State, the mark may be considered by the Member State to be a well-known mark.” Advocate General Jacobs explained the difference between the term “wellknown” in Article 6bis Paris Convention, which has a quantitative connotation, whereas

1055

Supra note 146. Supra note 171. 1057 PAGO International GmbH, supra note 1028. 1058 SIMON FHIMA, supra note 277, at 175. 1059 Id., at 177. 1060 WIPO Joint Recommendation Concerning Provisions on the Protection of Well-Known Marks, adopted by the Assembly of the Paris Union for the Protection of Industrial Property and the General Assembly of the World Intellectual Property Organization at the Thirty-Fourth Series of Meetings of the Assemblies of the Member States of WIPO September 20 to 29, 1999. 1056

202 the term “reputation” in Articles 4(3), 4(4)(a) and 5(2) Trademark Directive 1061 can be associated with qualitative criteria. Just as the ECJ, the Advocate General also noticed differences in the terms used in the other official languages in which the Trademark Directive has been written. 1062 However, Article 16(2) TRIPS 1063 which explains how to determine whether a trademark is well-known according to Article 6bis Paris Convention 1064 and the guidelines of the Joint Recommendation Concerning Provision of Well-Known Marks leave enough room for member states to determine the degree of knowledge or recognition on qualitative factors. 1065 Arguably the most important difference between a trademark with a reputation and a well-known trademark is that the first needs to be registered, whereas this is not necessary for the latter. Trademarks with a reputation can be protected against unauthorised use for similar goods or services or non-competing goods or services, whereas a well-known mark only protects in case of similar products and services, according to Article 6bis Paris Convention, 1066 although in the Article 16(3) TRIPS incarnation 1067 of Article 6bis Paris Convention the protection is extended to non-similar goods and services. 1068 The U.S. is a member of the Paris Convention since 1887, including the revision of the The Hague Act in 1925 1069 and TRIPS in 1995. 1070 Nevertheless the applicability

1061

Supra note 146. Advocate General Jacobs in General Motors v Yplon S.A. (Case C-375/97), Opinion of the Advocate General, November 26, 1998, para. 34-36. 1063 Article 16(2) TRIPS, supra note 161: “Article 6bis of the Paris Convention (1967) shall apply, mutatis mutandis, to services. In determining whether a trademark is well-known, Members shall take account of the knowledge of the trademark in the relevant sector of the public, including knowledge in the Member concerned which has been obtained as a result of the promotion of the trademark.” 1064 Article 6bis Paris Convention, supra note 137. 1065 Article 2(1)(b)1-6, WIPO Joint Recommendation Concerning Provisions on the Protection of WellKnown Marks, adopted by the Assembly of the Paris Union for the Protection of Industrial Property and the General Assembly of the World Intellectual Property Organization at the Thirty-Fourth Series of Meetings of the Assemblies of the Member States of WIPO September 20 to 29, 1999. 1066 Article 6bis Paris Convention, revision of The Hague, November 6, 1925, supra note 137. 1067 Article 16(3) TRIPS, supra note 161. 1068 First sentence of Article 16(2) TRIPS: “Article 6bis of the Paris Convention (1967) shall apply, mutatis mutandis, to services.” Id. 1069 The U.S. is a member of the Paris Convention since May 30, 1887 and the The Hague Act which revised the Paris Convention on November 6, 1925 introducing article 6bis Paris Convention entered into force in the U.S. since March 6, 1931. See WIPO Treaties and Contracting Parties. 1062

203 of the protection of well-known marks for dissimilar goods and services guaranteed in the Articles 6bis and 10bis Paris Convention 1071 in combination with Article 16(3) TRIPS, 1072 within the U.S. remains controversial. In 1936, in Maison Prunier v Prunie’s Rest. & Café 1073 the well-known marks doctrine, which in the jurisprudence is called the well-known/famous marks doctrine, was recognised for the first time by a New York trial court in a common law action for unfair competition. In 2007, in ITC Ltd. v Punchgini, Inc. the Second Circuit relied on Trademark Board rulings which did not recognise that the well-known/famous marks doctrine derives from any provision of the Lanham Act or other federal law. 1074 According to the Second Circuit the case needed to be resolved under state common law and therefore sent certified questions to the New York Court of Appeals. 1075 The latter court made clear in an advisory opinion that it “recognises common law unfair competition law, but not the ‘famous’ or ‘well-known’ marks doctrine.” 1076

Chapter 6.3.3 Problems with identical trademarks for dissimilar goods or services Orthodox trademark law protects only famous trademarks or trademarks with a reputation against identical trademarks for dissimilar goods or services against trademark dilution. In other words: it has been assumed that the connection of a senior trademark for goods or services that did not reach the threshold of fame or reputation and an identical junior trademark with different products or services can peacefully coexist. The premise was: if there is no competition, than there can be no unfair competition. However, if a trademark is not famous yet or if it only has reached a reputation in some niche market, one can argue that the trademark holders’ investments in advertisements in the trademark might have charged it with personality, and that the investments in advertisements

1070

The U.S. is a member of the Marrakesh Agreement Establishing the World Trade Organization (WTO) since January 1, 1995, of which the Agreement on Trade-Related Aspects of Intellectual Property Rights is an integral part, see Annex 1C of the Agreement Establishing the WTO. 1071 Article 6bis Paris Convention, revision of The Hague, November 6, 1925, supra note 137. 1072 Article 16(3) TRIPS, supra note 161 1073 Maison Prunier v Prunier's Rest. & Café, 159 Misc. 551, 557-58, 288 N.Y.S. 529, 535-36 (N.Y.Sup.Ct.1936). 1074 ITC Ltd. v Punchgini, Inc., 482 F.3d 135 (2d Circuit), March 28, 2007, at para. 83. 1075 ITC Limited and ITC Hotels Limited, Appellants,v Punchgini, Inc., New York Court of Appeals, 2007 NY Int. 164, number 165, December 13, 2007. 1076 Id.

204 deserve it to be protected. Just as important, in order to distinguish non-famous identical trademarks for dissimilar goods or services from each other it can be argued that the use of different trademark logos can be crucial. Even if one really would believe that only famous trademarks or trademarks with a reputation deserve to be protected against trademark dilution, the automatic determination of whether a trademark is famous enough or has enough reputation is impossible if there is no special list for that kind of trademarks. If trademarks that are well-known according to the Paris Convention, are not registered, they are still protected. However, in most cases the trademark holders of wellknown trademarks have enough resources to register them in a special list for well-known trademarks, which would be conducive to automatic enforcement. Orthodox trademark law assumes that if an identical trademark for dissimilar goods or services is used or registered for geographical separated markets this is not a problem, irrespective of whether the trademark is famous or has a reputation. This is a misconception, as the 1961 Lincoln Restaurant Corp. v Wolfies Restaurant, Inc. 1077 case of two seemingly separate markets already has demonstrated. A famous restaurant from Miami Beach, Florida, sued a company for using the identical name in Brooklyn New York. The judge found that there was unfair competition, because many people from Brooklyn frequented Miami and patronised the restaurants there. 1078

Chapter 6.3.3.1 Globalisation and the internet The trend that could already be perceived in 1961 1079 was extrapolated and amplified by globalisation and the internet. Globalisation and the internet make the division of the market into different geographical areas, where identical trademarks can coexist, ever more artificial and untenable. Despite the territorial character of trademark law and even though trademark holders would passively mind their own business in their own separate markets, the internet has unified all these markets. This could lead to situations where consumers search online for brand A that produces shoes, and are finding another brand A that produces clothing. This might not only lead to trademark 1077

Lincoln Restaurant Corp. v Wolfies Restaurant, Inc., 291 F.2d 302, 303 (2d Cir. 1961). Id. 1079 Id. 1078

205 dilution, but also slows down the search process for consumers and may lead to sponsorship and affiliate confusion (as discussed in Chapter 2.7.1.1). Therefore there is an increasing need for trademark holders to use and register their trademarks globally, which is burdensome and costly. Again, one way to distinguish one’s trademark from one or more identical trademarks, is using unique trademark logos.

Chapter 6.3.3.2 Unclear boundaries of product and service classifications Non-famous trademarks or trademarks without enough reputation are only protected in the designated classes of goods or services for which they are registered according to the Nice Classification. 1080 IP Legislator 1081 demonstrated the unclear boundaries of the Nice Classification. First the OHIM President in Communication No. 4/03 1082 explained that OHIM did “not object to the use of the general indications and class headings as being too vague or indefinite, contrary to the practice which is applied by some national offices in the EU and in third countries in respect of some of the class headings and general indications.” 1083 However, the CJEU held that applicants who use all the general indications of a particular class heading of the Classification must specify whether its application for registration is intended to cover all the goods or services included in the alphabetical list of that class or only some of those goods or services. 1084 After IP Legislator, OHIM President’s Communication No. 2/12 1085 rescinded Communication No. 4/03. 1086 1080

The Nice Agreement Concerning the International Classification of Goods and Services for the Purposes of the Registration of Marks, of June 15, 1957, as revised at Stockholm on July 14, 1967, and at Geneva on May 13, 1977, and amended on September 28, 1979. Supra note 139. 1081 Chartered Institute of Patent Attorneys v Registrar of Trade Marks (IP Legislator) (Case C-307/10), Judgment of the ECJ, June 19, 2012. 1082 Communication No. 4/03 of OHIM President, June 16 June, 2003 concerning the use of class headings in lists of goods and services for Community trade mark applications and registrations. 1083 Second para. Point III Communication No 4/03, id. 1084 IP Legislator, supra note 1081, para 64, third point. Ashmead rightly pointed out, the Court’s linkage of the validity of class heading registrations to a mixture of intent and deemed coverage of Nice class alphabetical lists is inconsistent with the Court’s requirement of clarity and precision. According to Ashmead this is “likely to involve goods scope broadening”, which, he argued, cannot be lawful within the international legal framework. Richard Ashmead, “IP TRANSLATOR: a sun-drenched perspective”, IPKat, July 9, 2012, available at: http://ipkitten.blogspot.hk/2012/07/ip-translator-sun-drenched-perspective.html (accessed August 11, 2013). 1085 Communication No. 2/12 of OHIM President, concerning the use of class headings in lists of goods and services for Community trade mark applications and registrations, June 20, 2012.

206 Beside the scope of the class headings, another practical problem of classifying trademarks is the difficulty to determine the scope of some goods and services. This has resulted in literal and rigid application of classes. Schechter already noted this problem by giving an illustration: “Thus bread and flour, pancake flour and syrup are in the same class, while, on the other hand, ‘straight’ wheat flour and ‘prepared flours’ – such as ‘pancake flour’ – are declared not to be of the same ‘class of commodities.’ Chewing gum, held to be a ‘food,’ and chewing tobacco, held to be a ‘narcotic,’ ice cream and milk, cheese and butter are likewise found not [sic] of different classes.” 1087 Since the convergence of different technologies, such as phone, camera, audio-player, gaming console, reading device and computer into one smart phone, this trend might have been aggravated. In Intel v CPM, 1088 the ECJ explained the boundaries problem in a spatial way and showed the relation between the similarity of mark and the similarity of product/service: “[A]round each trade mark there is an ‘exclusion zone’ which other marks may not enter. The extent of that zone will vary according to circumstances. An identical or extremely similar mark must be kept at a greater distance in terms of the goods or services covered. Conversely, a mark used for identical or extremely similar products must be kept at a greater distance in terms of similarity with the protected mark.” 1089

Chapter 6.3.3.3 Too much or too little property in a trademark Recital 10 Community Trademark Regulation 1090 postulates trademark as property, because it exists separately from the trademark holders, and can be assigned, licensed, or charged as security. 1091 Nevertheless, the doctrine that the same trademarks

1086

See supra note 1082. Schechter, supra note 100, at 823. See also Fox. “[T]obacco pipes were not wares similar to cigarettes and tobacco, that canned chicken products including chicken sandwich spread on the one hand and jams, jellies, pickles, sauces and vinegar on the other hand were not similar wares and that leather footware and rubber footware were not similar.” HAROLD G. FOX, THE CANDADIAN LAW OF TRADE MARKS AND UNFAIR COMPETITION (2d ed., Carswell, 1956). 1088 Intel v CPM, supra note 387. 1089 Id. 1090 Supra note 171. 1091 Recital 10 Community Trademark Regulation: “Whereas a Community trade mark is to be regarded as an object of property which exists separately from the undertakings whose goods or services are designated 1087

207 may be used in different classes by different owners is premised on the idea that there is no property in a trademark apart from the business or trade in connection with which it is employed. 1092 Property has an erga omnes character, 1093 while the exclusive right of trademark is conditional, namely under the condition of the class in which it is used, and as it has already been pointed out in Chapter 5 whether it is used in the course of commerce, and as will be demonstrated below whether it is used for parody or critical comment purposes. Could one deduce from this that if there are no classes that the property in trademarks is more extensive? Beebe argued succinctly that “[t]o prevent blurring, therefore one must prevent dilution, and to prevent dilution, one must grant the owner of the mark absolute property rights, against the world, in that mark.” 1094 Schechter did not qualify trademark as property but as “reasonable expectation of future patronage.” 1095 Callmann considered a situation in which trademarks are property: “The protection that can be granted to a trade-mark on the basis of a property right is most extensive. Relief can be awarded against any injury which would prevent the trademark owner from fully utilizing his trade-mark. Every lawful function of a trademark creates a corresponding sphere of interest, the legal protection of which is determined by the likelihood of damage to the owner of the trade-mark.” 1096 Desai tried to apply Heller’s thesis that too much ownership in trademarks leads to a gridlock economy. 1097 The author of this thesis does not think that this situation has been reached yet, and will demonstrate in Chapter 9 that especially on social media a

by it; whereas accordingly, it must be capable of being transferred, subject to the overriding need to prevent the public being misled as a result of the transfer. It must also be capable of being charged as security in favour of a third party and of being the subject matter of licences;” Id. 1092 American Steel Foundries v Robertson, 269 U.S. 372 (1926). 1093 Enforceable against anybody. 1094 Barton Beebe, The Semiotic Account of Trademark Doctrine and Trademark Culture, Chapter 2 in, TRADEMARK LAW AND THEORY: A HANDBOOK OF CONTEMPORARY RESEARCH (Graeme B Dinwoodie and Mark D Janis (eds) Edward Elgar, Cheltenham, 2008), at 59. 1095 SCHECHTER, supra note 244, at 160-161. 1096 Callmann, supra note 264, at 453. 1097 MICHAEL HELLER, THE GRIDLOCK ECONOMY: HOW TOO MUCH OWNERSHIP WRECKS MARKETS, STOPS INNOVATION, AND COSTS LIVES (Basic Books, 2008).

208 property-like approach of the trademark logo could benefit trademark holders, social media providers, internet users and the society at large. 1098 Chapter 6.3.3.4 Right to extend activities Schechter contended that “[o]nce a mark has come to indicate to the public a constant and uniform source of satisfaction, its owner should be allowed the broadest scope possible for ‘the natural expansion of trade’ to other lines of fields of enterprise.” 1099 In other words: Schechter advocated a right for the trademark holder to extend the use of his trademark to other activities, which includes the possibility to license his trademark. However, the Trademark Law Review Committee was concerned about extended protection for trademarks for dissimilar goods or services: 1100 “There was also some concern that allowing trade mark protection for an indefinite range of goods would lead to the exhaustion of possible trade mark names, hence the Committee’s remark regarding the “designing ingenuity of man.” 1101 To withhold trademark holders the right to extend the use of their trademark for new entrepreneurial activities, because otherwise the creatively challenged cannot copy already used trademark names for their activities seems to be economically suboptimal.

1098

Desai argues that the trademark approach to reputation exacerbates the attribution, publicity and integrity problems Heller identified in copyright. The right of publicity is not applicable to trademarks. Desai’s general argument is that trademarks “do not foster the semicommons as they lack leaks and limitations on the private rights granted.” As this chapter and the previous demonstrates, there is arguably too much leakage and limitations. Desai’s assertion is that therefore there is “a threat to the spillover of ideas”. Trademarks are not a threat to the spillover of ideas. One can see trademarks as merely the flag which covers the cargo. One can argue that trademarks increase the efficient exchange between consumer and proprietor and decreases the transaction costs for both. In practice the principle of a temporality of intellectual property rights is in the case of trademark right not applied. This author does not agree that it is a problem. Descriptive use of a trademark is possible, trademarks that are abandoned can be re-used, and as long as the trademark is used by the trademark holder, the benefits for society to protect these outweigh the costs for other trademark holders to come up with their own trademark or third parties to ask permission for the use of that trademark. Desai writes that trademark’s attribution is “rudderless and unworkable”. He bases this on attribution’s incoherence seen in debates regarding whether it belongs under copyright or trademark to whether it is a discrete right to what should shape the right in general. According to Desai integrity rights suffer from the same problems. Deven R. Desai, Individual Branding: How the rise of individual creation and distribution of cultural products confuses the intellectual property system in CREATIVITY, LAW AND ENTREPRENEURSHIP (Shubha Ghosh & Robin Paul Malloy, eds., 2011) at 121. 1099 Schechter, supra note 100, at 823. 1100 Siebrasse, supra note 286, at 19, footnote 54. 1101 Id.

209 Nelson proposed that dilution protection should be limited to trademarks that are identified with one product. 1102 According to Nelson, if a trademark holder is using the trademark for more than one product, the proprietor would be responsible for his own dilution by blurring. 1103 However, one can argue that each trademark holder should have the right of self-determination to use his trademark at his own discretion and risk. One can argue that if trademark holders are allowed to extend their activities to other goods and services, it would have real benefits to society. Not only in case of market externalities, such as disruptive technological change or the end of a war 1104 when the old products have become obsolete, but also if companies want to capitalise on their reputation and goodwill in which they have invested time and money and become active in other classes. This way employment, experience and expertise are maintained, economies of scale enabled, bargaining power built up and synergetic effects developed. 1105 The Opinion on Red Bull v The Bull Dog 1106 of March 2013, might be an indication that trademark extension, which stimulates competition, can outweigh the avoidance of trademark dilution.1107

Chapter 6.3.4 Use identical trademark logo for non-competing goods or services undesirable 1102

Nelson, supra note 219, 731-735 (2003). Id. 1104 When World War I ended, Remington Arms Company, Winchester Repeating Arms Company and Dupont Company, directly needed to transition from war to some kind of peace industry. Hearings before the Committee on Patents on H.R. 7157 (a bill to amend § 5 of the Trade-Mark Act of 1905), 66th Congress, 2nd Session, January 21-22, 1920, at 4-5, 11-12). 1105 Conglomerates are combinations of one or more corporations engaged in different businesses that fall under one corporate group. The Anglo-Dutch conglomerate Unilever produces foods, beverages, cleaning agents, and personal care products, which have all their own trademark, but they also use the same Unilever corporate trademark logo which represents the values and activities of the conglomerate. Unilever icons explained, Logo Design Love, December 1, 2011, available at: http://www.logodesignlove.com/unilevericons. The American conglomerate Procter & Gamble is active in the production of beauty, grooming, health care, snacks & pet care, fabric care, home care, baby care and family home care products, using the same corporate trademark logo. Procter & Gamble, Wikipedia, available at: http://en.wikipedia.org/wiki/Procter_%26_Gamble#Brands. The South Korean variety of the conglomerate is the chaebol. The conglomerate Samsung for example produces ships, cars, phones and glass windows, all under the Samsung trademark name. Samsung, Wikipedia, available at: http://en.wikipedia.org/wiki/Samsung (sites accessed August 11, 2013). 1106 See supra note 3, para 7. 1107 Danny Friedmann, Extended Trademark Protection v Extended Trademark Use, Pendulum Might Be Swinging From Avoidance of Trademark Dilution to Competition, expected TMR 2013. 1103

210 If a company uses a similar or identical trademark of a third party that is not famous or has not enough reputation, in a commercial way, but in a different good or service class than the third party had registered for, both the U.S. and EU jurisdictions do not impose any restrictions. This leads to a co-existence of similar or identical trademarks. To give an example: although one can argue that Ajax, the Amsterdam football club listed at the Euronext exchange 1108 might be a trademark with a reputation, it does coexist with trademark namesakes in different product classes, including a detergent 1109 and a manufacturer of fire extinguishers. 1110 As pointed out in Chapter 6.3.3 this can lead to potential problems of trademark confusion and dilution. These problems play to an even greater extent when the trademark concerns a trademark logo. Imagine the three Ajax companies with their different activities using one identical or very similar trademark logo. As will be argued in Chapter 8, there is no reason why any company, including those who lack a famous trademark or trademark without reputation, should allow other companies to use a similar or identical trademark logo in a commercial way for a good or service in another class, without their express authorisation.

Chapter 6.4 Defences After the legislation and case law of the trademark dilution in the U.S. and unfair advantage of or detriment to the distinctive character or repute of the trademark in the EU, and their respective prerequisites for the anti-dilution measures are examined, this section will examine how the protection against trademark dilution and the freedom of expression can be reconciled. Trademark dilution claims and defences based on the freedom of expression are well matched, better than trademark infringement and defences based on the freedom of expression. Trademark infringement is premised on the need to prevent a likelihood of consumer confusion, while trademark dilution is premised on the need to prevent against harming the trademark. Averting fraud via a claim of trademark infringement is

1108

Amsterdam Football Club Ajax. Colgate Ajax, available at: http://www.colgate.com/app/Colgate/US/HC/Products/Dishwashing/Ajax.cvsp (accessed August 11, 2013). 1110 Ajax Chubb Varel, available at: http://www.ajaxfire.nl (accessed August 11, 2013). 1109

211 considered to forfeit any defence based on the First Amendment 1111 or human rights treaties. 1112 While averting harm to the trademark is more complex, since it should take into account both the right to freedom of expression, which includes parody and critical comments and the right to protect property 1113 or intellectual property. 1114 Or as Judge Kozinski argued in Mattel, Inc. v MCA Records, Inc. in 2000: trademark dilution injunctions lack a First Amendment compass. 1115 In order to determine whether the protection against trademark dilution is adequate one needs to take the defences against trademark dilution into account. In the U.S. the fair use defences against trademark dilution and in the EU the limitations and exclusions against unfair advantage or detriment to the distinctive character or repute of the trademark are examined. The right to freedom of expression, from which the parody defence and critical comments defence derive, needs to be weighed against the right of the trademark holder to protect his trademark against trademark dilution. Chapter 6.4.1 first examines the bases of the defences: for the defendants, the right to freedom of expression and for the plaintiffs the defence against this defence: the right to protect their property. Chapter 6.4.1.1 poses the question which kind of expression deserves to fall under the right to freedom of expression to limit the protection against trademark dilution, and makes the distinction between commercial and noncommercial expression, and includes factors of general interest, damage, dispersion and prejudice. Chapter 6.4.2 examines the fair use defences and limitations/exclusions to the exclusive rights, derived from the right to freedom of expression. Chapter 6.4.2.1 covers the defence of fair use in case of trademark dilution in the U.S. In order to be able to analyse the defence of limitations/exceptions of unfair advantage or detriment to the distinctive character or repute of the trademark in the EU, Chapter 6.4.2.2 first examines the three-step test for copyright law so that it can be compared with the two-step test for trademark law.

1111

U.S. Const. amend. I (1791). EU Charter, supra note 169. 1113 Article 11(1) id. 1114 Article 17(2) id. 1115 Mattel, supra note 899, at para. 33. 1112

212 Chapter 6.4.3 demonstrates that parody aims to amuse instead of to confuse. Then it questions whether trademark law should have a sense of humour at the expense of trademark holders. Followed by the parody/satire, non-competing/competing, noncommercial/commercial, high culture/low culture and transformative use/nontransformative use dichotomies to see whether they can function as criteria to decide whether or not the parodic use of a trademark should be allowed. Chapter 6.4.3.1 examines parody and dilution by blurring in the U.S. and detriment to distinctiveness in the EU. Chapter 6.4.3.2. investigates parody and dilution by tarnishment in the U.S. and detriment to repute in the EU, including some cases of EU members that illustrate the implementations of the Trademark Directive in combination with parody. Then Chapter 6.4.3.3 examines free-riding/unfair advantage of distinctive character or repute. Next to the parodic use of the trademark, Chapter 6.4.4 explains that the trademark can also be used in a criticising or commenting way. These are defences against a claim of trademark dilution. Finally Chapter 6.4.5 demonstrates why the current trademark law insufficiently protects the trademark logo on social media against trademark dilution, and alludes to a solution.

Chapter 6.4.1 Bases of defence, and defence against defence In both the U.S. and EU the right to freedom of expression is considered of crucial importance to the effective functioning of a democratic society and as “a fundamental requirement for culture to continue.” 1116 However, the human right of freedom of expression is not absolute and must be weighed against another human right: the protection of property. 1117 The First Amendment to the Constitution1118 guarantees the right to freedom of expression in the U.S. New York Times v Sullivan, 1119 confirmed the importance of the 1116

“Fair use, a fundamental requirement for culture to continue, meets the First Amendment all over the Internet.” Spiesel, supra note 669. 1117 That the protection of property is a human right becomes clear after the realisation that people own their own bodies. 1118 “Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the government for a redress of grievances.” U.S. Const. amend. I (1791). 1119 New York Times v. Sullivan (376 U.S. 254, 84 S. Ct. 710 U.S. Ala. 1964, at pp. 724-730).

213 right where the Supreme Court held that the First Amendment can be considered even if it is not claimed by the parties. 1120 As already pointed out, the right to freedom of expression is not absolute and needs to be weighed against the right to protect property. The Constitution1121 treated the latter right impliedly, and also expressly in the Fifth 1122 and Fourteenth Amendments, 1123 via “due process” provisions. These including the rule, based on international law, that prescribes compensation in case of expropriation, where a redistribution of private property took place or where the use of private property was restrained in the public interest. However, lex specialis derogat legi generali. 1124 Fair use in case of parody is such a lex specialis (see Chapter 6.4.2), and although the right of parody is arguably in the general interest, it can also be seen as an act that is restraining the use of the trademark holder’s property, constituting an expropriation, which, however, does not need to be compensated under this lex specialis. In the Council of Europe, which includes the EU countries and twenty other countries, 1125 Article 10 ECHR 1126 guarantees the right to freedom of expression. If one assumes that trademark rights are a property then Article 10 ECHR must be balanced with Article 1 of Protocol No. 1 to ECHR, 1127 which provides the right to protection of

1120

Id. “[T]he Framers [of the Constitution] simply assumed the existence of such [property] rights, defined and protected mainly by state law, because the common law, grounded in property, was the background for all they did.” ROGER PILON, THE CONSTITUTIONAL PROTECTION OF PROPERTY RIGHTS: AMERICA AND EUROPE, Economic Education Bulletin, AIER, 2008, at 8. 1122 “No person shall (..) be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use, without just compensation.” U.S. Const. amend. V. 1123 “No state shall make or enforce any law which shall abridge the privileges or immunities of citizens of the United States; nor shall any state deprive any person of life, liberty, or property, without due process of law;” U.S. Const. amend. XIV. 1124 Latin maxim which means “special law derogates from the general law”. 1125 U.S. has observer status. 1126 Article 10 ECHR: (1) Everyone has the right to freedom of expression. this right shall include freedom to hold opinions and to receive and impart information and ideas without interference by public authority and regardless of frontiers. This article shall not prevent States from requiring the licensing of broadcasting, television or cinema enterprises. (2) The exercise of these freedoms, since it carries with it duties and responsibilities, may be subject to such formalities, conditions, restrictions or penalties as are prescribed by law and are necessary in a democratic society, in the interests of national security, territorial integrity or public safety, for the prevention of disorder or crime, for the protection of health or morals, for the protection of the reputation or the rights of others, for preventing the disclosure of information received in confidence, or for maintaining the authority and impartiality of the judiciary. Supra note 141. 1127 Article 1 Protocol No. 1 to ECHR: “Every natural or legal person is entitled to the peaceful enjoyment of his possessions. No one shall be deprived of his possessions except in the public interest and subject to the conditions provided for by law and by the general principles of international law.” Supra note 142. 1121

214 property. Article 11 EU Charter, 1128 which binds EU members, except for the UK and Poland that signed an opt-out protocol and the Czech Republic that will be included in this opt-out protocol, 1129 prescribes the right to freedom of expression, which should be balanced with Article 17(2) EU Charter, which prescribes that “Intellectual Property shall be protected.” 1130 The relation between the ECHR and the EU Charter is explained in Article 52(3) EU Charter: that the level of protection of the EU Charter should at least be as high as that of the ECHR. In 1987, Judge Bownes in L.L. Bean, Inc. v Drake Publishers, Inc., wrote that “trademark rights do not entitle the owner to quash an unauthorized use of the mark by another who is communicating ideas or expressing points of view.” 1131 However, whether or not a trademark holder can protect its trademark, despite a third party’s right to freedom of expression, needs to be balanced against one another, and is arguably fact specific.

Chapter 6.4.1.1 Which expressions deserve to fall under the freedom of expression to limit the protection against trademark dilution Sakulin described the tension between trademark protection and the freedom of expression: “In practical terms, the freedom of commercial and non-commercial expression may include the freedom to use trademarks of third parties, in particular in artistic and political expression, but also in commercial expression, like comparative advertising, use as a reference, or use as a descriptive indication. Freedom of expression The preceding provisions shall not, however, in any way impair the right of a State to enforce such laws as it deems necessary to control the use of property in accordance with the general interest or to secure the payment of taxes or other contributions or penalties. 1128 Article 11(1) EU Charter: “Everyone has the right to freedom of expression. This right shall include freedom to hold opinions and to receive and impart information and ideas without interference by public authority and regardless of frontiers.” EU Charter, supra note 169. 1129 UK and Poland fall under an opt-out protocol (Protocol No 30 on the application of the Charter of Fundamental Rights of the European Union to Poland and to the United Kingdom, annexed to the Treaty on the EU and to the Treaty on the Functioning of the European Union), which effectiveness in Joined Cases C-411/10 and C-493/11 NS v Secretary of State for the Home Department and Others, was denied by the ECJ. The Czech Republic’s condition to sign the Lisbon Treaty in 2007 was that it would be added to Protocol 30. “Background Note: ECAS’s Requests for Access to Commission Documents Concerning the Opt-Out from the EU Charter of Fundamental Rights”, available at: http://blogs.kent.ac.uk/eu-rightsclinic/files/2013/03/Background-Note-Access-to-Documents-on-Charter-Opt-Out-04.03.13.pdf (accessed August 11, 2013). 1130 Article 17(2) EU Charter, supra note 169. 1131 L.L. Bean, Inc. v Drake Publishers, Inc., 811 F.2d 26, 29 (1st Cir.1987).

215 may thus conflict with the rights of the trademark holder to prohibit the use of his trademarks.” 1132 Farber argued that courts have applied a higher standard for commercial expressions to be communicated: “If a political candidate can lie without fear of legal intervention, why can’t a used car dealer? Why should a cigarette manufacturer be required to publicize disagreeable facts about his product when a newspaper commentator cannot be penalized for incomplete disclosure?” 1133 Once communicated, the courts dealt with these commercial speech in comparison to non-commercial speech arguably in a discriminatory manner. Below an overview is given of the rise and demise of the commercial speech doctrine. In 1942, in Valentine v Chrestensen, 1134 the Supreme Court established the commercial speech doctrine, according to Kozinski and Banner without any constitutional basis. 1135 The Supreme Court held that the first amendment allowed the regulation of commercial speech in the street. 1136 In 1968, in United States v O’Brien, 1137 the Supreme Court held that ‘speech’ and ‘nonspeech’ elements could be combined in the same course of conduct. In 1975 in Bigalow v Virginia,1138 the Supreme Court held that although an abortion referral service was prohibited in Virginia, the advertisement in a Virginia weekly for such service in New York by a New York organisation was allowed, since it conveyed newsworthy information. 1139 This was followed a year later by Virginia State Board of Pharmacy v Virginia Citizens Consumer Council, Inc., 1140 in which the Supreme Court determined that the economic motive did not disqualify from the First Amendment coverage and held that “[a]s to the particular consumer’s interest in the free flow of commercial information, that

1132

Sakulin, supra note 105. Daniel A. Farber, Commercial Speech and First Amendment Theory, 74 NW. U. L. REV. 372, 373 (1979). 1134 Valentine v Chrestensen, Supreme Court of the U.S., 316 U.S. 52 (1942). 1135 “[T]he Supreme Court plucked the commercial speech doctrine out of thin air.”Alex Kozinski & Stuart Banner, Who’s Afraid of Commercial Speech?, 76 VA. L. REV. 627, 627 (1990). 1136 Valentine v Chrestensen, supra note 1134. 1137 United States v O'Brien, 391 U.S. 367 (1968). 1138 Bigalow v Virginia, 421 U.S. 809 (1975). 1139 Id. 1140 Virginia State Board of Pharmacy v Virginia Citizens Consumer Council, Inc., 425 U.S. 748 (1976). 1133

216 interest may be as keen, if not keener by far, than his interest in the day’s most urgent political debate”, 1141 thereby considering the public interest in commercial speech. In 1978, in Ohralik v Ohio State Bar Association 1142 the court recognised that commercial speech has come within the ambit of the First Amendment, but rejected the notion that such speech should be wholly undifferentiable from other forms of speech. The court held that a “commonsense” distinction should be made, and that otherwise a devitalisation of the First Amendment would take place. 1143 In 1980, in Village of Schaumberg v Citizens for a Better Environment, 1144 the court fully protected the speech where the commercial and non-commercial elements were “characteristically intertwined.” 1145 In 1983, in Bolger v Youngs Drug Products Corp., 1146 it was held relevant that the speaker acted substantially out of economic motivation, therefore the linking of product to matters of public debate was not considered to entitle to an increased protection afforded by non-commercial speech. Farber dismissed an economic motivation of the speaker or the subject matter of the speech as irrelevant to the question whether it deserves protection under the First Amendment. Instead he distinguishes between the informative function and contractual function of speech, of which, according to Farber, only the first deserves to be protected under the First Amendment. 1147 Farber described the contractual function of speech: “the unique aspect of commercial speech is that it is a prelude to, and therefore becomes integrated into, a contract, the essence of which is the presence of a promise. Because a promise is an undertaking to ensure that a certain state of affairs takes place, promises obviously have a closer connection with conduct than with self-expression.” 1148

1141

Id. Ohralik v Ohio State Bar Ass’n, 436 U.S. 447 (1978). 1143 Id. 1144 Vill. of Schaumberg v. Citizens for a Better Env’t, 444 U.S. 620, 632 (1980). 1145 Id. 1146 Bolger v Youngs Drug Products Corp., 463 U.S. 60 (1983) . 1147 Farber, supra note 1133, at 389 and 407. 1148 Id. 1142

217 In 1988, in National Federation of the Blind v Riley, 1149 full speech protection to partially commercial speech due to the “inextricably intertwined” nature of certain commercial and non-commercial speech elements. In 1996, the court in Dr. Seuss Enterprises v Penguin Books USA 1150 determined that the use of the Dr. Seuss mark was not purely commercial speech. Therefore due to the freedom of expression Dr. Seuss could not be protected against trademark dilution. In 2001, Hoffman v Capital Cities/ABC, Inc., 1151 concluded that the core notion of commercial speech is that it does no more than propose a commercial transaction. To summarise: First the courts decided that freedom of expression covers all speech, of both commercial and non-commercial nature. 1152 Later, the courts decided that there exists an intermediate level of protection: if commercial communications were intertwined with non-commercial communications, they were regarded as the latter and protected by the First Amendment. 1153 However, courts have varied their motivations by referring to one of the above mentioned jurisprudence. 1154 One can argue that for a long period of time trademarks were seen as exclusively commercial. As pointed out in the Literature Review (Chapter 1 “Introduction iv Status signalling property”) their function as social, political and cultural signifier has become more prominent, which made the character of the communication arguably more noncommercial, therefore more deserving of protection. Next to the ratio between commercial nature of the expression and the public or general interest nature of the matter, Sakulin provided a non-exhaustive list of criteria to assess whether there is a fair balance between the right to freedom of expression and right to protect property: 1155 the extent and intensity of the damage as a result of the expression;

1149

National Federation of Blind v Riley, 487 U.S. at 796 (1988). Dr. Seuss Enterprises v Penguin Books USA Inc. (Dr. Seuss) 924 F. Supp. 1559, 1574 (S.D. Cal. 1996). 1151 Hoffman v Capital Cities/ABC, Inc., 255 F.3d 1180, 1184 (9th Cir.2001). 1152 Virginia State Board of Pharmacy v Virginia Citizens Consumer Council, supra note 1140, at 18251831. 1153 Riley v National Federation of Blind, Inc., 487 U.S. 781 1988, at 795-801. 1154 Lee Ann W. Lockridge, When is a Use in Commerce a Noncommercial Use? 37 FLA. ST. U. L. REV. 337 (2010). 1155 Wolfgang Sakulin, Note under Vzr. Rb. The Hague May 4, 2011, Plesner v Louis Vuitton, LJN BQ3525; IEPT20110504, IER 39 (2011); NJF 264 (2011). 1150

218 the fame of the protected object; 1156 extent of dispersion; whether the use unnecessarily prejudices the reputation of the object of protection. 1157 Van den Berg and Haak asserted that another factor should be taken into account: the extent to which it has been attempted to prevent the risk of confusion. 1158

Chapter 6.4.2 Fair use defences and limitations/exclusions to the exclusive rights Based on the freedom of expression rationale are the defences for trademark dilution: fair use in the U.S. and limitations and exclusions in the EU. To be able to assess whether trademark law provides sufficient protection against trademark dilution, one has to take into account these defences. For a better comprehension of the potential of the fair use test for trademark law in the U.S., one first needs to take a look at the fair use test for copyright law. In the same vein, if one wants to understand the development and possibilities of an open term for limitations and exceptions in the EU that can provide flexibility for trademark law, one needs to first examine the three-step test that was drafted for copyright law under the Berne Convention. 1159 This section will show that the fair use defences to trademark dilution or the limitations and exceptions to the ‘unfair advantage of or detriment to the distinctive character or repute of the trademark’ and a sufficient protection of the trademark logo can be combined, under the condition that only a simple formality is taken into account (see Chapter 6.4.5).

Chapter 6.4.2.1 Defence of fair use in case of trademark dilution in the U.S.

1156

“It is true that large public companies inevitably and knowingly lay themselves open to close scrunity of their acts […] and the limits of acceptable ciriticism are wider in the case of such companies”. Fayed v the United Kingdom, 21 September 1994, ECHR Series A no. 294-B. Steel and Morris v the United Kingdom, no. 68416/01, ECHR 2005-II, para. 94. 1157 Guibault also contended that for examining the level of protection more factors need to be taken into account and weighed: the extent and intensity of the damage and the extent of dissemination, in order to see whether the use unduly affects the reputation.Lucie Guibault, The Netherlands: Darfurnica, Miffy and the right to parody!, 3 JIPITEC 237 (2011), para. 3. 1158 Josine van den Berg & Maarten Haak, IE-Rechten en uitingsvrijheid, naar een fair balance, 39 BMM BULLETIN 2 (2013). 1159 Berne Convention, supra note 138.

219 Defendants of a trademark dilution action can invoke a fair use defence based on the Lanham Act § 43(c), now codified in 15 U.S.C. § 1125(c)(3)(A-C), 1160 which gives some exclusions of what is actionable under the dilution by blurring and dilution by tarnishment provisions: (A) Any fair use, including a nominative or descriptive fair use, or facilitation of such fair use, of a famous mark by another person other than as a designation of source for the person’s own goods or services, including use in connection with— (i) advertising or promotion that permits consumers to compare goods or services; or (ii) identifying and parodying, criticizing, or commenting upon the famous mark owner or the goods or services of the famous mark owner. (B) All forms of news reporting and news commentary. (C) Any noncommercial use of a mark.

U.S.C. § 1125(c)(3)(A) Dilution is not actionable 1161 in case of fair use, including nominative or descriptive fair use, or facilitation of such fair use (as discussed in Chapter 5).

U.S.C. § 1125(c)(3)(A)(i) Comparative advertising 1162 is legitimate in the U.S. and in the EU 1163 jurisdictions. In such advertising often the trademark logo is presented of both companies that are compared by one of the companies that asserts it has the best product attributes or price/quality relationship. A comparison, not being a comparative advertisement is hard to distinguish these days from those that are. One has to do a lot of research to find out whether the website that is comparing has no interest in the company that happens to be selected as the best. There are even bloggers that are paid by companies to promote particular brands. If only authorised trademark holder use were allowed to use the 1160

15 USC § 1125. U.S. Code, Title 15, Chapter 22, subchapter III, § 1125(c)(2)(B). 1162 According to Siebrasse comparative advertising does not injure the goodwill in the mark. “On the contrary, because it attempts to lure customers from one supplier to another, though it emphasizes the similarity between the goods, at the same time it emphasizes the distinction between the two manufacturers, and so does not weaken the association between the first supplier and its mark.” Siebrasse, supra note 286 . 1163 Misleading and Comparative Advertising Directive 2006/114/EC of the European Parliament and of the Council, December 12, 2006. 1161

220 trademark logo, the uncertainty about the source of a message will be solved. If one is not authorised to use a trademark logo, one can still describe, critique, inform, present in proximity, learn, comment, report or satirise brands without actually using the trademark logo.

U.S.C. § 1125(c)(3)(A)(ii) So there is a fair use defence in case of trademark dilution when the trademark is used for: - identifying and parodying; - criticizing or commenting; - upon the famous mark owner or; - the goods or services of the famous mark owner. 1164 Mentioning ‘identifying’ after it was already clear that “fair use, including a nominative or descriptive fair use” is included, seems to be superfluous.

Chapter 6.4.2.2 Defence of limitations/exceptions of unfair advantage or detriment to the distinctive character or repute of the mark Limitations and exceptions of copyright law and the three-step test In order to analyse the two-step test for the limitations and exceptions of trademark law it is useful to first look at its predecessor: the three-step test for copyright law, which might even apply to trademark rights directly. Article 5(3)(k) Information Society Directive 1165 allows member states of the EU to legislate exemptions of copyright use for the purpose of caricature, parody or pastiche without defining these purposes any further. However, EU copyright law does provide an open three-step test, in Article 5(5) Information Society Directive, 1166 based on Article 1164

15 U.S.C. § 1125(c)(3)(A)ii. Article 5 Directive 2001/29/EC of the European Parliament and of the Council of 22 May 2001 on the harmonisation of certain aspects of copyright and related rights in the information society (Information Society Directive): (3) Member States may provide for exceptions or limitations to the rights provided for in Articles 2 and 3 in the following cases: (k) use for the purpose of caricature, parody or pastiche; 1166 Article 5(5) Directive 2001/29/EC of the European Parliament and of the Council of 22 May 2001 on the harmonisation of certain aspects of copyright and related rights in the information society (Information Society Directive): “The exceptions and limitations provided for in paragraphs 1, 2, 3 and 4 shall only be applied in certain special cases which do not conflict with a normal exploitation of the work or other subject-matter and do not unreasonably prejudice the legitimate interests of the rightholder.” 1165

221 9(2) Berne Convention, 1167 which tests whether exceptions and limitations, such as parody, must be applied or not. The three-step test originated at the Stockholm Conference revision of the Berne Convention in 1967. 1168 Article 9(2) Berne Convention 1169 applies to works or other subject matter, and therefore might include trademarks.

1167

Article 9 (2) Berne Convention: “It shall be a matter for legislation in the countries of the Union to permit the reproduction of such works in certain special cases, provided that such reproduction does not conflict with a normal exploitation of the work and does not unreasonably prejudice the legitimate interests of the author.” Supra note 138. 1168 Berne Convention, id. 1169 Berne Convention, id.

222 Three-step test The limitations of the Berne Convention can only be applied: Step 1. in certain special cases; Step 2. which do not conflict with the normal exploitation of the work or other subjectmatter; Step 3. and do not unreasonably prejudice the legitimate interests of the right holder. Limitations can only be applied in “certain special cases”, when they serve some public policy objective 1170 (step 1). “[T]ake account of the legitimate interests of the owner of the trademark and of third parties” (step 3) can be interpreted as “do not unreasonably prejudice the legitimate interests of the right holder.” Remuneration might be able to make the prejudice “reasonable.” 1171 One could see step 2 as part of step 3: in case the exceptions and limitations conflict with the normal exploitation of the work or other subject-matter, then one can argue that the legitimate interests of the right holder have been unreasonably prejudiced. There is no consensus on how to interpret the three-step test. Should the test be applied to the limitations in legislation or in concrete cases by judges? Also there is uncertainty as how to apply the test. Ficsor argued, based on two WTO cases, 1172 that “the test must be applied step by step in a way that, if the exception or limitation fails the criterion of a step, it fails the test in general and there is no need to proceed to the next step.” 1173 Geiger made the point that the imprecise formulation of conflict with the normal exploitation of the work of step 2 could pre-empt the more meaningful assessment of unreasonable prejudice of legitimate interests of step 3. The WTO Panel’s interpretation of “normal exploitation” strengthens this point: it makes clear that it not only covers current forms of exploitation that create sufficient income, but also those that have the potential to do so in the future. 1174 1170

Kamiel Koelman, Fixing the Three-Step Test, EIPR 3 (2006). Id. 1172 WTO Panel Report Patent, supra note 140. 1173 Mihály Ficsor, “Munich Declaration” on the three-step test – respectable objective; wrong way to try to achieve it, May 11, 2012, available at: http://www.copyrightseesaw.net/data/documents/documents/0/6/6/0665a0ebfa425ceb829cc8fb4f3bf03f.doc (accessed August 11, 2013). 1174 WTO Panel Report Copyrights, supra note 140. 1171

223 In such scenarios Geiger proposed to start with step three “and to use the second step afterwards as a corrective measure to eliminate the most abusive conflicts with the exploitation of the work.” 1175 Thirty prominent intellectual property scholars have drafted a declaration that state that “[t]he three steps are to be considered together and as a whole in a comprehensive overall assessment.” 1176 Koelman asserted that the three-step test, should be redesigned, inspired by the fair-use test, from three hurdles to three factors that must be weighed together and to let legislators and courts consider all interests involved. Griffiths pointed to a more radical interpretation of the three-step test: not as a secondary constraint to see whether the statutory exceptions are acceptable, but as a safety net to see whether the scope of the exclusive rights of the copyright holder are legitimate. 1177 Open terms such as “special”, “normal”, “unreasonably” and “legitimate” give sovereignty to legislators and flexibility to judges, but also cause legal uncertainty, which could have chilling effects. For example it can be costly to prove via studies that a limitation conflicts with the normal exploitation, and the judge might not be have the means to assess this conflict with an alternative study. 1178 Whether the limitations to the exclusive rights are checked by open norms or the scope of the exclusive rights are checked via open norms, in both cases the advantage of open norms is flexibility which could lead to fair decisions in unforeseen new concrete cases. This is especially welcome to keep up with the ever increasing rate of technological change. Beside the lack of predictability and legal uncertainty, open norms could result in courts that make de facto laws. This cannot be justified because the courts’ lawmaking process lacks any democratic legitimacy. 1179

1175

Christophe Geiger, The Role Of The Three-Step Test In The Adaptation Of Copyright Law To The Information Society, UNESCO, e-Copyright Bulletin, January – March, 2002, at 18. 1176 Christophe Geiger et al., Declaration, A Balanced Interpretation of the “Three-step Test” in Copyright Law, 1 JIPITEC 119 (2010). 1177 Jonathan Griffiths, The 'Three-Step Test' in European Copyright Law - Problems and Solutions, QUEEN MARY SCHOOL OF LAW LEGAL STUDIES RESEARCH PAPER No. 31/2009, at 14.. 1178 Geiger, supra note 1175, at 16. 1179 P. Bernt Hugenholtz & Martin Senftleben, Fair Use in Europe: In Search of Flexibilities (study commissioned by Google) November 14, 2011, at 8.

224 Limitations and exceptions of trademark rights and the two-step test The Trademark Directive 1180 and the Community Trademark Regulation 1181 both lack an explicit provision which allows member states to exempt trademark use for the purpose of parody or pastiche, in contrast to Article 5(3)(k) Information Society Directive, 1182 which does provide these limitations for copyright law. However, the trademark regulations give trademark holders the rights to prevent others to use their trademark “without due cause”. This gives courts the possibility to interpret the invocation of the fundamental guarantee of freedom of expression and information of Article 11 EU Charter 1183 and Article 10 ECHR 1184 as “due cause.” after weighing them against the right to protection of intellectual property1185 or more broadly property. 1186 In TRIPS 1187 one can find different incarnations of Article 9(2) Berne Convention: Article 13 TRIPS, 1188 gives a three-step test to assess whether limitations to copyright might be applied by legislatures or courts. Article 26(2) TRIPS 1189 also gives a three-step test for limitations to the right of industrial designs, and Article 30 TRIPS 1190 does the same for patent rights. This section is mainly dealing with Article 17 TRIPS which gives a two-step test for limitations to trademark rights. Three WTO disputes 1191 were dealing with the tests for limitations and have shed some light on how to interpret the terms used in the limitations to trademark rights. It is interesting to see how the incorporation of the provisions of the Berne and Paris

1180

Article 5(2) and 5(5) Trademark Directive, supra note 146. Article 9(1)(c) Community Trademark Regulation, supra note 171. 1182 Article 5 Information Society Directive: (3) Member States may provide for exceptions or limitations to the rights provided for in Articles 2 and 3 in the following cases: (k) use for the purpose of caricature, parody or pastiche. Supra note 1166. 1183 EU Charter, supra note 169. 1184 ECHR, supra note 141. 1185 Article 17(2) ECHR, id. 1186 Article 1 Protocol No. 1 to ECHR, supra note 142. 1187 TRIPS, supra note 161. 1188 Id. 1189 Article 26(2) TRIPS: “Members may provide limited exceptions to the protection of industrial designs, provided that such exceptions do not unreasonably conflict with the normal exploitation of protected industrial designs and do not unreasonably prejudice the legitimate interests of the owner of the protected design, taking account of the legitimate interests of third parties.” Id. 1190 Article 30 TRIPS: “Members may provide limited exceptions to the exclusive rights conferred by a patent, provided that such exceptions do not unreasonably conflict with a normal exploitation of the patent and do not unreasonably prejudice the legitimate interests of the patent owner, taking account of the legitimate interests of third parties.” Supra note 161. 1191 WTO Panel Report Patent; WTO Panel Report Trademark, supra note 140. 1181

225 Conventions in TRIPS 1192 have led to a situation where the panels of the WTO dispute settlement system have become de facto the ultimate interpreters of these intellectual property treaties under the auspices of WIPO. 1193 Article 17 TRIPS 1194 allows members of the WTO, which include the U.S. and EU, to provide “limited exceptions to the rights conferred by a trademark, such as fair use of descriptive terms, provided that such exceptions take account of the legitimate interests of the owner of the trademark and of third parties.” So in contrast to the three-step test for limitations to the rights of copyright, industrial design and patent, TRIPS provides a two-step test for limitations to trademark rights: Two-step test 1195 Step 1: limited exceptions, (and fair use of descriptive terms is given as an example of such limited exceptions); Step 2: taking account of the legitimate interests of the trademark holder and of third parties. How to interpret these terms? Interpretation of step 1: “Limited exceptions” is similar to “certain special cases” for copyrights. The trademark panel agreed with the patent panel 1196 that the term “exceptions” connotes a “limited derogation, one that does not undercut the body of rules from which it is made”. 1197 “Limited” was used to emphasise that the exception must be narrow and permit only a small diminution of rights. 1198 Interpretation of step 2: The trademark panel agrees with the patent panel’s interpretation of “legitimate interests”: “To make sense of the term ‘legitimate interests’ in this context, that term must be defined in the way that it is often used in legal discourse – as a normative claim calling for protection of interests that are ‘justifiable’ in the sense that they are supported by relevant public policies or other social norms.” 1199

1192

TRIPS, supra note 161. The two international organisations signed a cooperation agreement, which excluded an arrangement on the interpretation of each other’s treaties. WTO-WIPO Cooperation Agreement, December 22, 1995. 1194 TRIPS, supra note 161. 1195 Article 17 TRIPS, id. 1196 WTO Panel Report Patent, supra note 140. 1197 WTO Panel Report Trademarks, id., para. 7.650. 1198 Id. 1199 WTO Panel Report Trademarks, supra note 140, para. 7.663. 1193

226 Due to the “limited exceptions” the “legitimate interests” of the trademark holders are not equal to the full enjoyment of the trademark right. To put it in two formulas:

For trademark holders: Full enjoyment of rights conferred by trademark - limited exceptions = legitimate interests

For third parties: No enjoyment of rights conferred by trademark + limited exceptions = legitimate interests

The trademark panel states that the ‘legitimate interests’ of the trademark holders are different from ‘third parties’, who have no rights conferred by the trademark and that this difference is confirmed by the use of the verb ‘take account of’, which is less than ‘protect’. 1200 However, in this view the wording of the second step should be: “provided that such exceptions protect the legitimate interests of the owner of the trademark and take into account of third parties.” In contrast to the other limitations tests, Article 17 TRIPS 1201 misses the “normal exploitation” criterion. Senftleben wrote that the negotiating history of TRIPS does not necessarily explain the reasons of adopting different tests for the limitations of respectively copyright and trademark rights. 1202 To include the ‘normal exploitation’ criterion in Article 17 TRIPS would deviate from international trademark law, according to Senftleben. 1203 This author does not concur: normal exploitation is one of the rationales for the dilution doctrine that is prevalent in both the EU and U.S.: that trademark holders should be able to extend the use of their trademark with a reputation or famous trademark to new products and services, that are outside the classes of goods or

1200

Id., para. 7.662. TRIPS, supra note 161. 1202 Martin Senftleben, Towards a Horizontal Standard for Limiting Intellectual Property Rights? WTO Panel Reports Shed Light on the Three-Step Test in Copyright Law and Related Tests in Patent and Trademark Law (March 1, 2006). 37 IRIPC 407, 412 (2006). 1203 Senftleben, supra note 1202, at 422. 1201

227 services for which they designated their trademark registrations. Article 16(3) TRIPS 1204 prescribes that Article 6bis Paris Convention, which protects well-known marks, protects goods and services for dissimilar goods and services. 1205 Moreover, the WTO trademark panel acknowledges the advertising and investment functions of the trademark, 1206 which needs to protect against harm by non-competing goods that use an identical or similar mark. One can argue that the principle to protect against confusion and dilution is enshrined in international trademark law. The trademark panel does recognise the trademark holders’ legitimate interest in preserving the distinctiveness or capacity to distinguish, which refers to trademark’s essential function as an indicator of origin preventing confusion, but also acknowledges the trademark’s advertising and investment functions, to prevent dilution by blurring and tarnishment: “Taking account of that legitimate interest will also take account of the trademark owner’s interest in the economic value of its mark arising from the reputation that it enjoys and the quality that it denotes.” 1207 The trademark limitations test could benefit from the normal exploitation criterion, as constituted by the patent panel: normal is defined on the one hand by “an empirical conclusion about what is common within a relevant community.” 1208 On the other hand it means “a normative standard of entitlement.” 1209 The copyright panel interpreted normal exploitation as the current activities that led to extraction of economic value, but also the activities that could lead to important financial gains in the future. 1210

1204

Article 16(3) TRIPS, supra note 161. This WIPO explanation on Well-known marks associates article 16(2) TRIPs with dilution. WIPO, Well-known marks, available at: http://www.wipo.int/sme/en/ip_business/marks/well_known_marks.htm (accessed August 11, 2013). 1206 WTO Panel Report Trademarks, supra note 140, para. 7.664. 1207 Id., para. 7.664. 1208 WTO Panel Report Patent, supra note 140, para. 7.53. 1209 Id. 1210 “We believe that an exception or limitation to an exclusive right in domestic legislation rises to the level of a conflict with a normal exploitation of a work (ie, the copyright or rather the whole bundle of exclusive rights conferred by the ownership of the copyright), if uses, that in principle are covered by that right but exempted under the exception or limitation, enter into economic competition with the ways that right holders normally extract economic value from that right to the work (ie the copyright) and thereby deprive them of significant or tangible commercial gains.” WTO Panel Report Copyright, supra note 140, para 6.183. 1205

228 Why should trademark holders be deprived of the normal exploitation criterion that is granted to copyright and patent right holders? The deprivation might be caused by the constitutional status of copyrights and patents in the U.S.: “To promote the progress of science and useful arts, by securing for limited times to authors and inventors the exclusive right to their respective writings and discoveries.” 1211 However, trademarks play such a crucial role in society as the facilitator of the normal exploitation of copyrighted works, protected industrial designs and patented inventions. Furthermore, trademarks play an, often intergenerational, 1212 role in the creation of wealth for society and the extent to which a trademark holder is prevented from the normal exploitation of his trademark should at least be taken into account, just as in the case where copyright holders and patent holders are prevented from the normal exploitation of their works and patents, respectively.

Chapter 6.4.3 Parody Parody defence, based on the right to freedom of expression doctrine, was expressly postulated in the U.S. as a fair use defence in U.S.C. § 1125(c)(3)(A)ii. 1213 In the EU, parody can be implied as a limitation or exception of unfair advantage of or detriment to the distinctive character or repute of the mark, because it can fall within the “due cause” clause of Articles 5(2) Trademark Directive 1214 and 9(1)(c) Community Trademark Regulation 1215 in combination with the two-step test of Article 17 TRIPS 1216 mentioned above. The fact that parody is expressly or impliedly a defence against a claim of trademark dilution means that it still needs to be justified. In other words: that the advantage of a parodic work outweighs the disadvantage of a likelihood of trademark dilution.

1211

U.S. Const. art. I, § 8, Cl. 8. This author disagrees with the anonymous writer of the Harvard Law Review note in 1963. He or she wrote: “Unlike the confusion case, there is no public interest here to tip the balance in favor of the owner.” But this does not take intergenerational employment into account. Anonymous, supra note 893, at 529. 1213 U.S.C. § 1125(c)(3)(A)ii. 1214 Supra note 146.. 1215 Article 9(1)(c) Community Trademark Regulation, supra note 171. 1216 TRIPS, supra note 161 1212

229 In Gucci Shops, Inc. v R.H. Macy & Co., Inc., consumers who see the trademark name Gucchi Goo, the court held that it is not unreasonable for them to assume that the defendant’s use of the Gucci mark and the stripe on ‘diaper bags’ would mislead members of the public into believing that plaintiff is somehow connected with the diaper bag. 1217 However, in Haute Diggity Dog ‘dog bags’ were offered with parodic names such as Chewy Vuiton, “which by their attempted humorous, satirical association” distinguished it from Louis Vuitton bags. 1218 As these above mentioned cases signify, comparable parody defence cases often have opposite outcomes. This lack of consistency has led to legal uncertainty and unpredictability. Chapter 6.4.5 will demonstrate how a change in doctrine coupled with a simple formality can lead to legal certainty and automatic enforcement.

To amuse instead of to confuse Already in 1908 it was known that a parody manifests at the same time its difference as well as its resemblance with the famous trademark. 1219 Ninety-nine years later, in 2007, the court in Haute Diggity Dog 1220 confirmed this: “A parody must convey two simultaneous – and contradictory – messages: that it is the original, but also that it is not the original and is instead a parody. This second message must not only differentiate the alleged parody from the original but must also communicate some articulate element of satire, ridicule, joking, or amusement. Thus parody relies upon a difference from the original mark, presumably a humorous difference, in order to produce its desired effect.” 1221 If one chooses to mimic an existing trademark name, despite the possibility to choose one’s own trademark, courts presume that the junior trademark intentionally tries to confuse the public with the more recognisable senior mark. However, the junior mark can use this fact for a fair use defence: 1222 this recognisability of the trademark makes it 1217

Gucci Shops, Inc. v R.H. Macy & Co., Inc., 446 F. Supp. 838, 840 (S.D.N.Y. 1977). Haute Diggity Dog, supra note 914. 1219 “Parody is permissible, but then, parody shows at the very time that it is [imitating] that it is an imitation, it shows the difference as well as the resemblance." Tate v. Fulbrook, 98 L.T.R. 706 (C.A. 1908). 1220 Haute Diggity Dog, supra note 914. 1221 Id. 1222 15 U.S.C. § 1125(c)3(A)ii was added to the Trademark Dilution Revision Act in 2006: 1218

230 easier for the audience to realise that the use is a parody and a joke on the qualities embodied in a trademark word or image. 1223 Where a third party chooses to parodically use a trademark, the intent is not necessarily to confuse the public but rather to amuse. 1224 Judge Kozinski illustrated this reasoning in Mattel, Inc. v MCA Records, Inc.: “If we see a painting titled ‘Campbell’s Chicken Noodle Soup,’ we’re unlikely to believe that Campbell’s has branched into the art business. Nor, upon hearing Janis Joplin croon, ‘Oh Lord, won’t you buy me a Mercedes-Benz?’ would we suspect that she and the carmaker had entered into a joint venture.” 1225

Should trademark law allow a sense of humour at the expense of trademark holders Humorist Will Rogers wrote in 1974: “Now everything is funny as long as it is happening to somebody Else, but when it happens to you, why it seems to lose some of its Humor, and if it keeps on happening, why the entire laughter kinder Fades out of it.” 1226 In 1977 the court in Gucci Shops, Inc. v Macy & Co., Inc. 1227 held that a validly established trademark may be protected from ridicule which rises to the level of infringement of the mark. This seems reasonable if one considers the asymmetry between trademark holders and parodists. Parodists can destroy a brand’s reputation in little time and without much costs, while trademark holders need a lot of time, money and effort to build up the reputation of their trademarks. Who really should own a trademark? The court in Jordache held that the owner of the mark “does not own in gross the penumbral customer awareness of its name, nor the

(A) Any fair use, including a nominative or descriptive fair use, or facilitation of such fair use, of a famous mark by another person other than as a designation of source for the person's own goods or services, including use in connection with (i) advertising or promotion that permits consumers to compare goods or services; or (ii) identifying and parodying, criticizing, or commenting upon the famous mark owner or the goods or services of the famous mark owner. (B) All forms of news reporting and news commentary. (C) Any noncommercial use of a mark. 1223 Tommy Hilfiger, supra note 202, quoting MCCARTHY supra note 718, 31:153. 1224 Jordache Enterprises, Inc. v Hogg Wyld Ltd. (Jordache), 828 F. 2d 1482 (10 Cir. 1987) para. 26. 1225 Mattel, supra note 899, para. 14. 1226 Will Rogers, Warning to Jokers: Lay Off the Prince, in THE ILLITERATE DIGEST, I-3 THE WRITINGS OF WILL ROGERS 75 (1974). 1227 Supra note 1217.

231 fallout from its advertising.” 1228 Does the public co-own trademarks they are involuntarily exposed to via advertisements online and in the streets? One can see parody in trademark as a way to appropriate or expropriate the fruits of intellectual labour in a legal way, or as a counter-balance to the power trademark holders have over consumers and the public in general. 1229 See also Chapter 1 “Literature review ix Loss of control”. One could assume the proverb “High trees catch much wind” 1230 would apply to famous trademarks or trademarks with a reputation. In other words: that famous trademarks or trademarks with a reputation should be more willing to accept the fact that they will be parodied and criticised in comparison with lesser known trademarks. Just like the burden of proof in defamation actions is higher in case the plaintiff is a public figure than where the plaintiff is a private figure, 1231 one would expect that the same principle would apply for parodic use of a famous trademark or a trademark with a reputation in comparison to a lesser known trademark. However, holders of famous trademarks and trademarks with a reputation can invoke an action based on trademark dilution in case of a likelihood of trademark dilution, while the holders of lesser known trademarks are deprived of this right. The spectrum of opinions on parody and protection against trademark dilution have two extremes: one can assert that one can parody any trademark, unless the parodic use of the trademark competes directly with the original trademark in the same market, or as Judge Carter asserted there is enough material in the public domain available for parody 1232 and therefore there is no need to use any trademarks for parody. In order to come up with a more nuanced view courts have developed dichotomous criteria to decide whether the parodic use of a trademark is allowed, 1228

Supra note 1224. “Parody serves the public interest by ridiculing the power of these symbols, by achieving a provocative effect and by producing laughter.” James Richard Banko, “Schlurppes Tonic Bubble Bath”: In Defense of Parody, 11 U. PA. J. INT’L BUS. L. 627, 634 (1990). 1230 Dutch proverb: “Hoge bomen vangen veel wind.” 1231 A plaintiff who is a public figure must be able to prove malice, typically by the higher clear and convincing evidence standard, and actual damages. A plaintiff who is a private figure must be able to prove negligence by a “preponderance of the evidence”, actual damages or in case of “per se”-cases about one’s criminal background, business character, chastity, etc. actual damages are presumed. Defamation Act (UK) 1996. 1232 Judge Carter’s remark in a dicta. 131 F. Supp. 165 (S.D. Cal. 1955), affd sub nom. Benny v Loew's Inc., 239 F.2d 532 (9th Cir. 1956), affd per curiam by an equally divided Court, 356 U.S. 43 (1957) (Douglas, J. abstaining), reh'g denied, 356 U.S. 934 (1958). 1229

232 including the parody/satire, non-competing/competing, non-commercial/commercial, high culture/low culture and transformative use/non-transformative use dichotomies.

Parody/satire dichotomy The difference between parody and satire was tersely explained in 2002 in Mattel: 1233 “The song does not rely on the Barbie mark to poke fun at another subject but targets Barbie herself” 1234 and is therefore considered parody. In 1994, Campbell v AcuffRose Music, Inc. 1235 explicated it more elaborately: “Parody needs to mimic an original to make its point, and so has some claim to use the creation of its victim’s (or collective victims’) imagination, whereas satire can stand on its own two feet and so requires justification for the very act of borrowing.” 1236 Because parodists of trademarks necessarily need to use the trademark, they are given considerable more leeway than in case of claimed parodic use that makes no comment on the trademark. 1237 An example of satiric use of the trademark is the 1999 case of Harley-Davidson, Inc. v Grottanelli. 1238 The defendant made no comment with his mark on the HarleyDavidson mark, but “simply use[d] it somewhat humorously to promote his own products and services”, therefore he was held infringing the Harley-Davidson’s trademark. The same criterion was applied in Dr. Seuss, 1239 in 1996, in which case the defendant had

1233

Mattel sued MCA Records, because the band Aqua had made the song “Barbie Girl”. Mattel, supra note 899, para. 14. 1234 Id. 1235 Acuff-Rose Music had sued 2 Live Crew for covering Roy Orbison’s song “Oh pretty woman” in a rap version. Campbell petitioned at the Supreme Court: Campbell v Acuff-Rose Music, Inc., 510 U.S. 569 (1994) at 581. It also adds some definitions it found in dictionaries in footnote 14: “Satire has been defined as a work “in which prevalent follies or vices are assailed with ridicule,” 14 Oxford English Dictionary, supra, at 500, or are “attacked through irony, derision, or wit,” American Heritage Dictionary, supra, at 1604.” 1236 For an overview of the parody/satire cases from the pre-Trademark Dilution Revision Act era: Juli Marshall & Nicholas Siciliano, The Satire/Parody Distinction in Copyright and Trademark Law— Can Satire Ever Be a Fair Use? ABA Section of Litigation Intellectual Property Litigation Committee Roundtable Discussion Online, available at: http://apps.americanbar.org/litigation/committees/intellectual/roundtables/0506_outline.pdf (accessed August 11, 2013). 1237 Harley-Davidson, Inc. v Grottanelli, 164 F.3d 806, 812-13 (2d Cir.1999). 1238 Id. 1239 Dr. Seuss, supra note 1150.

233 published a book called “The Cat NOT in the Hat!”, thereby using Dr. Seuss’ trademarked title “The Cat in the Hat!” to get attention, instead of mocking the original. An example of parody can be found in Tommy Hilfiger in 1987, 1240 in which the juxtaposition of “the irreverent representation of the trademark with the idealized image created by the mark’s owner” resulted in parody. 1241 Twenty years later in Haute Diggity Dog 1242 the same criterion was used: “a simple form of entertainment conveyed by juxtaposing the irreverent representation of the trademark with the idealized image created by the mark’s owner.” 1243

Non-competition/competition dichotomy As discussed in Chapter 6.4 in the introduction, where the right to freedom of expression, or one of its derivations such as the right to use a trademark parodically, is weighed against trademark infringement, generally the latter will prevail. In 2011, in Ate My Heart v Mind Candy, 1244 such a case was submitted to the High Court of England and Wales. Mind Candy tried to invoke the right to use a trademark parodically as a defence against the claim by Ate My Heart of trademark infringement. Ate My Heart, Stefani Germanotta (Lady Gaga)’s company, was granted an interim injunction to restrain an infringement of trademark, so that The Moshi Dance, a song sung by the animated character Lady Goo Goo from the Moshi Monsters Game, which has similarities with Lady Gaga’s song Bad Romance, will have to be removed from YouTube. 1245 To see whether or not the trademark use was “without due cause”, according to Justice Vos, the similarities between the song of Lady Gaga and Lady Goo Goo were clear even to the untutored ear. 1246 Justice Vos held that although Lady Goo Goo started out as a parody within a game, when this animated character was going into direct competition with Lady Gaga this was no longer the case. 1247 1240

Tommy Hilfiger, supra note 202. Id. citing L.L. Bean, Inc. v Drake Publishers, Inc., 811 F.2d 26, 34 (1st Cir. 1987). 1242 Haute Diggity Dog, supra note 914. 1243 Id. 1244 Ate My Heart Inc v Mind Candy Ltd & Anr (Ate My Heart Inc.)(Vos J; [2011] EWHC 2741 (Ch); 10.10.11). 1245 David Tan, Goo Goo Gaga: The Chilling Effect of the Trade Mark Monster, 17 MALR 84 (2012). 1246 Id. at 85. 1247 “Lady Goo Goo, when she and the other take-off pop stars were born in the Underground Disco in the Game, were indeed parodies of the real stars that inspired them. But, as it seems to me, it is at least 1241

234 Professor Tan did not agree with the logical chain of linkages drawn by the judge: between evocation, association and confusion. 1248 In contrast to the Ate My Heart v Mind Candy case, Haute Diggity Dog showed that evocation in itself is not enough reason to find confusion. 1249 “Despite Haute Diggity Dog’s obvious intent to profit from its use of parodies, this action does not amount to a bad faith intent to create consumer confusion. To the contrary, the intent is to do just the opposite – to evoke a humorous, satirical association that distinguishes the products.” 1250 Professor Tan asserted that in case of “transformative play” and based on the right to freedom of expression it should be possible to parody a trademark. 1251

Non-commercial/commercial dichotomy McCarthy asserted that trademark dilution in case of “non-trademark use”, 1252 which is non-commercial use of a trademark in the U.S., 1253 would be precluded (see Chapter 6.2.2). The same, can be said for trademark use outside the course of trade in the EU, 1254 (also discussed in Chapter 6.2.3). In Mattel, 1255 the toy manufacturing company claimed that consumers that hear Barbie’s name think of the song “Barbie Girl”, in addition to the doll, or potentially exclusively of the song. The Ninth Circuit decided that there was no dilution by blurring, because the use of the Barbie mark in the song was non-commercial and therefore exempted. 1256 One could describe non-commercial parodic use of a trademark as use of a trademark that consists entirely of non-commercial, or fully constitutionally protected, arguable that at some point Lady Goo Goo morphed into something rather different, namely a character who is being used to enhance the commercial success of the Moshi Monsters brand, and now to sell records.” Supra note 1244, para. 46. 1248 Supra note 1245, at 86. 1249 Haute Diggity Dog, supra note 914, at 260. 1250 Id., at 263. 1251 Tan, supra note 1244. 1252 “Non-trademark use does not dilute: in content of expressive works, e.g. novels; in content of TV and movies; prestige claims: “Moose River wine the Rolls-Royce of Idaho wines”; art, for example Andy Warhol.” J. Thomas McCarthy, The American Experience with Trademark Anti-Dilution Law, IBIL, February 2009, presentation slides, at 9, available at: http://www.ucl.ac.uk/laws/ibil/docs/ibil_11feb09_mccarthy_ppt.pdf (accessed August 11, 2013). 1253 U.S.C. § 1125(c)(3)(C). 1254 See article 5(2) Trademark Directive, supra note 146, and article 9(1)(c) Community Trademark Regulation, supra note 171. 1255 Mattel, supra note 899. 1256 15 U.S.C. § 1125(c)(3)(C).

235 speech. 1257 However, non-commercial parodic use of the mark does not really exist. Just as the “Barbie Girl” song, sung by Aqua, was and still is commercial. 1258 The one who is using the trademark for parodic purposes is getting attention, which has a market value. To qualify commercial income as marginal as the court did in the Bild Dir Keine Meinung 1259 case or to assert that the trademark is not only used commercially, therefore the freedom of art was given priority, as the court did in Lila Postkarte1260 ignores the binary character of commercial use: either any income is received or not, see Chapter 6.4.3.2. Even if the trademark is made for art, one can argue that the use of the trademark is commercial: Nadia Plesner made a painting, which she called Darfurnica, 1261 allegedly as a protest against the lack of public attention for the human tragedy taking place in Darfur while at the same time full page advertisements were placed for luxury products, such as those of Louis Vuitton. The painting includes an emaciated boy holding a Louis Vuitton bag. Plesner argued that she did not take advantage of Louis Vuitton in a commercial 1262 sense. However, she not only capitalised on the attention she was getting as an artist because of the controversy that ensued, but she also was and still is selling merchandise with the depiction in question via her online shop, 1263 beside selling

1257

Jerome Gilson et al., Trademark Protection and Practice § 5.12[1][c][vi], at 5-240. “Barbie Girl” from the album Aquarium, sung by Aqua, can be downloaded for 1,29 dollar at Amazon.com, available at: http://www.amazon.com/Barbie-Girl/dp/B000V66VGA or iTunes, available at: https://itunes.apple.com/us/artist/aqua/id62978 (both accessed August 11, 2013). 1259 OLG Hamburg, June 4, 1998, NJW-RR 1990, 1060. 1260 (Lila-Postkarte), Federal Court of Justice (BGH), Decision of February 3, 2005 - Az. I ZR 159/02; OLG Hamm. 1261 The name Darfurnica is a reference to Guernica, painted by Pablo Picasso in response to the bombing of a Basque country village during the Spanish Civil War. 1262 District Court of The Hague, 4 May 2011, IER 2011/39 with commentary from Wolfgang Sakulin (Nadia Plesner Joensen/Louis Vuitton Malletier SA) overturning the ex parte decision Court in preliminary proceedings of The Hague of 27 januari 2011, LJN: BP9616 KG RK 10-214 (Louis Vuitton Malletier SA/ Nadia Plesner Joensen). The unofficial translation of the decision of the Court of Appeal was made by Kennedy Van der Laan, attorneys in Amsterdam, representing defendant Nadia Plesner, available at: http://www.nadiaplesner.com/Website/Verdict_English.pdf (accessed August 11, 2013). 1263 Before, Plesner sold T-shirts depicting only the boy with the bag that has the Louis Vuitton pattern protected by a Community Design. Plesner is still monetizing on the Louis Vuitton pattern, by selling replicas of the Darfurnica painting, 25 Euros per poster. Nadia Plesner Foundation Shop, available at: http://www.nadiaplesnerfoundation.org/shop (accessed August 11, 2013). 1258

236 controversial original works. No matter how the money is spent, and no matter whether it is a non-profit organisation that receives the revenues. 1264 Another example of “art” that uses a trademark in a commercial way were pigs that were tattooed with the Louis Vuitton trademark logo without the authorisation of Louis Vuitton. 1265 Beside the obvious animal rights abuse, the trademark logo has been abused 1266 in a commercial way, because after the pigs were tattooed, they were killed and stuffed, and sold for 106,000 pounds sterling per pig. The trademark holder suffers from the parodic use of his trademark by third parties: humour at his expense, which can have severe economic consequences. An example from the pre-social media era which illuminates the devastating effects of so called non-commercial parodic use of a trademark is the Buckler 1267 case: In the summer of 1988, Dutch beer brewer Heineken introduced a beer with a low alcohol percentage under the trademark Buckler. Initially Buckler thrived, taking over Clausthaler, market leader in the low alcohol beer segment. Then, on the evening of December 31, 1989, a Dutch cabaret performer Youp van ‘t Hek mocked the brand and its users on a well watched Dutch TV programme. Van ‘t Hek’s point was mainly that people who drink Buckler are losers. After the evening, sales of Buckler plummeted. In 1993 Heineken had to withdraw Buckler from the Dutch market. Cause (the “humorous” expressions) and effect (actual damages) were easy to prove. Therefore, according to Langeveld, under the former Dutch trademark law, Heineken would have won a lawsuit, but choose not to sue the cabaret performer, 1268 because the beer brewer was afraid for

1264

In Hong Kong so called vanity license plates, which included names such as Louis Vuitton and Gucci, were auctioned off by the Hong Kong government. The respective trademark holders argued that this constitutes trademark infringement. However, the Hong Kong court decided that it was not, since the revenues of the auction were given to charity and therefore the trademark was not used in a commercial way. Interview with Mayank Vaid, IP Director of LVMH Fashion, February 21, 2012. Read more about the phenomenon of vanity plates: Laura Santini, “Market for Vanity Plates Grows Despite Hard Economic Times”, Wall Street Journal, January 27, 2010, available at: http://online.wsj.com/article/SB10001424052748703410004575028380283025678.html (accessed August 11, 2013). 1265 Urmee Khan, “Tatooed pigs banned from modern art exhibition”, The Telegraph, November 4, 2008, available at: http://www.telegraph.co.uk/news/newstopics/howaboutthat/3382201/Tattooed-pigs-bannedfrom-modern-art-exhibition.html (accessed August 11, 2013). 1266 This abuse can be categorised as trademark dilution by tarnishment. See Chapter 4. 1267 MARNIX LANGEVELD, BUCKLER? PROOST! (Amsterdam: Otto Cramwinckel 2004). 1268 Id.

237 even more negative attention. The Buckler case belies the expression that any publicity is good publicity. Although it is often dubious whether the use of a trademark is really noncommercial, it is clear that even non-commercial use of an unauthorised trademark logo can lead to a likelihood of damages. If for example a trademark logo is known to be the symbol of high quality of the products that bear the trademark logo, then, this trademark’s reputation can be harmed if people associate its trademark logo with a substandard product. Louis Vuitton is perceived to attract designers with a refined taste, so its trademark logo can be tarnished when a Rolls-Royce is modified by a private person, by covering the outer skin in Louis Vuitton trademark logos, which can give an overall impression of vulgarity 1269 and concomitant attention in the media. 1270 Dogan and Lemley discussed the use of the trademark “in a non-branding way” when it is not used to indicate the source or sponsorship. 1271 However, branding is not a legal term, and one can argue that “comparing, describing, critiquing, informing, presenting in proximity, learning, commenting, reporting, or simply poking fun” at or with the trademark are all included in the activity of branding. Siebrasse argued that given the dominant doctrine of source, if there is no likelihood of confusion, that all references of a mark with an unauthorised trademark are permitted. 1272 On the other hand, if one takes the damaging effects of non-commercial parody into account, one could argue that such cases would ask for a broader interpretation of dilution: that trademark dilution by tarnishment or blurring is possible even in non-commercial settings.

1269

This also raises questions to what extent Rolls-Royce can enjoin the modification of one of its designs, based on moral rights: le droit moral d’intégrité de l’auteur. 1270 Jared Paul Stern, “The Brothel Prince & His Louis Vuitton Rolls-Royce”, Luxist, May 11, 2009, available at: http://www.luxist.com/2009/05/11/the-brothel-prince-and-his-louis-vuitton-rolls-royce/ (accessed August 11, 2013). 1271 “The requirement thus distinguishes between those who brand their products using the plaintiff’s mark or some version thereof and others who use the plaintiff’s trademark in some non-branding way – for example, by comparing, describing, critiquing, informing, presenting in proximity, learning, commenting, reporting, or simply poking fun.” Dogan & Lemley, supra note 874, at 542. 1272 “It is a corollary of source theory that unauthorized use of the mark other than as a mark, and in particular use of the mark to refer to the goods with which the mark is normally associated, is permitted.” Siebrasse, supra note 286.

238 In the EU, member countries could already implement Article 5(5) Trademark Directive 1273 in order to provide protection against non-commercial use (see Chapter 6.2.3 “Legislation and case law in the EU” under ‘Unfair advantage of repute’).

High culture/low culture dichotomy The distinction between commercial and non-commercial is hard to make and therefore not the best of criteria to decide whether parody should trump the trademark dilution. Another controversial criterion to decide whether an expression deserves it to be protected against trademark dilution is to give a value judgment. In Bleistein v Donaldson Lithographing Co. in 1903, 1274 Justice Holmes was concerned to let “professionals” judge over the worth of pictorial illustrations: “It would be a dangerous undertaking for persons trained only to the law to constitute themselves final judges of the worth of pictorial illustrations, outside of the narrowest and most obvious limits.” 1275 A value judgment on which expressions are worth protection is per definition subjective. As Justice Harlan put it in 1971 in Cohen v California: “[I]t is (..) often true that one man’s vulgarity is another’s lyric. Indeed, we think it is largely because governmental officials cannot make principled distinctions in this area that the Constitution leaves matters of taste and style so largely to the individual.” 1276 This opinion was confirmed in 1993 by the Supreme Court in Edenfield v Fane. 1277 Rowbottom disagreed and preferred that the courts distinguish between high and low levels of expression of which the latter he wanted to provide some kind of proportional protection. 1278 However, one can argue that the difference between high and low expressions are arbitrary and elitist. The question of what kind of expressions overrule the right to protect against trademark dilution can also be inversed: when is the restriction of the freedom of expression legitimate in order to protect against trademark dilution? As an attorney

1273

Supra note 146. Bleistein v Donaldson Lithographing Co., 188 U.S. 239, 251 (1903). 1275 Attorney Steve Baird’s remark on radio KYW Newsradio, quoted by Pat Loeb. 1276 Cohen v California, 403 U.S. 15, 25 (1971). 1277 “The commercial marketplace, like other spheres of our social and cultural life, provides a forum where ideas and information flourish. Some of the ideas and information are vital, some of slight worth. But the general rule is that the speaker and the audience, not the government, assess the value of the information presented.” Edenfield v Fane, 507 U.S. 761, 767 (1993). 1278 Rowbottom, supra note 533, at 370. 1274

239 pointed out on the radio: “One person’s bully is another’s legitimate trademark enforcement.” 1279 One can argue that the indignation, oftentimes vented in the media 1280 against companies defending their trademarks is one-sided.

1279

Pat Loeb, “Penn Law Goes Head-To-Head Against Copyright Lawyer Over Student Poster”, March 20, 2012, available at: http://philadelphia.cbslocal.com/2012/03/20/penn-law-goes-head-to-head-against-copyright-lawyer-overstudent-poster/ (accessed August 11, 2013). 1280 Matthew Yglesias, “Louis Vuitton’s Campaign Against Free Speech”, Slate, March 9, 2012, available at: http://www.slate.com/blogs/moneybox/2012/03/09/louis_vuitton_s_campaign_against_free_speech.html (accessed August 11, 2013).

240 Transformative/non-transformative dichotomy A more promising criterion to distinguish between expressions worth protecting and those that should give way to protection against trademark dilution, is sufficient transformative use. Transformative use, a doctrine established in copyright law could also be applied to trademark law. If a parodist uses a substantial part of a work but also adds something to that work, the work will be original to the extent of that something, and it will be infringing for the remainder. 1281 The question is when the exact point arrives that the changes are sufficient to determine that the work has been transformed. In other words: when “use of a trademark” has been transferred into “inspired by a trademark”. Just as described within the fair use test for copyright there is a relationship between the extent the parody is substituting the original and the extent it is transformative. One can compensate for the other. 1282 So far that point was determined in a qualitative way by the court, for example via the formulation “not more than necessary”, 1283 which makes any effort to predict this proportional level elusive. Beside the legal uncertainty it creates, it renders automatic determination impossible. On the other hand, if one would come up with a certain quantitative standard, for example: “if more than 50 percent of the content has been changed there is transformative use” it would lead to legal certainty and enforcement could be automated. Such a quantitative

1281

“At one time it was thought "that no infringement was committed if the amount of effort and skill which the parodist expended upon his work was so great that the parody could be regarded as an original work in its own right. This view, which was only obiter, was founded upon the misapprehension that a work was either an original work or an infringing one. Since a work can be both original and infringing" it is not surprising that, in Schweppes Ltd. v Wellington, Falconer, J. held that parody could not of itself affect the question of infringement: either a substantial part of a work was copied or it was not.” JEREMY PHILLIPS, INTRODUCTION TO INTELLECTUAL PROPERTY LAW 106, 1986, quoting Millar v Taylor, [1769]. 4 Burr. 2303, at 2334-35; 1282 “A parody that more loosely targets an original than the parody presented here may still be sufficiently aimed at an original work to come within our analysis of parody. If a parody whose wide dissemination in the market runs the risk of serving as a substitute for the original or licensed derivatives (see infra, at 590594, discussing factor four), it is more incumbent on one claiming fair use to establish the extent of transformation and the parody's critical relationship to the original. By contrast, when there is little or no risk of market substitution, whether because of the large extent of transformation of the earlier work, the new work's minimal distribution in the market, the small extent to which it borrows from an original, or other factors, taking parodic aim at an original is a less critical factor in the analysis, and looser forms of parody may be found to be fair use, as may satire with lesser justification for the borrowing than would otherwise be required.” Campbell v Acuff-Rose Music, supra note 1235, footnote 14. 1283 Columbia Pictures Corp. v National Broadcasting Co., 137 F. Supp. 348, 350 (S.D. Cal. 1955).

241 standard could be implemented for copyright and for trademark use by parodists on social media. The inconsistent way of how courts deal with parody defences will be illustrated below by examples from both sides of the Atlantic.

Chapter 6.4.3.1 Parody and dilution by blurring/detriment to distinctiveness In 2002, in the U.S., the courts in Tommy Hilfiger 1284 and also in 2003 in WWE Inc. v Big Dog Holdings, 1285 held that parody products would rather increase public identification with the senior marks instead of dilution by blurring. In contrast to these U.S. decisions, the High Court of England and Wales in the Ate My Heart, Inc. v Mind Candy Ltd. 1286 of 2011, rejected a parody defence. Justice Vos in this case remarked that: “[t]he distinction between Lady Goo Goo and Lady Gaga has been blurred by the defendants in the way that I have mentioned, for example, by the use of the tag on the YouTube video and indeed the choice of the name, Goo Goo, similar as it is to Gaga.” 1287

Chapter 6.4.3.2 Parody and dilution by tarnishment/detriment to repute U.S. One would assume that the parody defence in Mutual of Omaha v Novak 1288 in 1986, would be unsuccessful and that the dilution by tarnishment claim would prevail. A designer called Novak produced a design using the words “Mutant of Omaha” and was sued by Mutual of Omaha, an insurance company. The design, as found by the District Court, utilised “an accompanying logo depicting a side view of a war bonneted and emaciated human face.” 1289 The design initially was placed on T-shirts but later also on sweatshirts, caps, buttons and coffee mugs. In the spring of 1984 Novak produced designs using the words “Mutant Kingdom” and “Mutant of Omaha's Mutant Kingdom” 1284

Tommy Hilfiger, supra note 202. World Wrestling Fed’n Entm’t, Inc. v Big Dog Holdings, Inc., 280 F. Supp. 2d 413, 441–42 (W.D. Pa. 2003) citing both Hormel Foods, supra note 226, and Jordache supra note 1224. 1286 Ate My Heart Inc., supra note 1244. 1287 Id., para. 65. 1288 In the Mutual of Omaha v Novak case, trademark by tarnishment is called trademark disparagement. Mutual of Omaha v Novak, 648 F. Supp. 905 D.Neb.1986. 1289 Id. 1285

242 and an accompanying logo depicting a one-eyed tiger. With these designs Novak often used the phrase “Nuclear Holocaust Insurance” or “Sponsored by Mutant of Omaha Nuclear Insurance Company.” 1290 The District Court granted a permanent injunction based on trademark infringement, but rejected the trademark dilution claim, which it called trademark disparagement. 1291 According to the court, Novak’s design might be considered to be in poor taste by some consumers but “it was not likely to create in the mind of consumers a particularly unwholesome, unsavory, or degrading association with Mutual’s name and marks.” 1292 On appeal the Eight Circuit confirmed trademark infringement, but unfortunately did not reach the trademark disparagement (dilution) issue. 1293 In 1996, in Hormel Foods, 1294 Hormel Foods, Inc., the proprietor of the Spam trademark, unsuccessfully sued Jim Henson Productions for trademark dilution by tarnishment, because of the use of a character in the film Muppet Treasure Island called “Spa’am”. Hormel described the fictitious character as “evil in porcine form” and the boar as unhygienic. The District Court, however, found “that Spa’am, a likeable, positive character, will not generate any negative associations.” 1295 Moreover, contrary to Hormel’s contentions, the District Court also found no evidence that Spa’am is unhygienic or that his character places Hormel’s mark in an unsavoury context. 1296 According to the court, the reference to the fact that Spam is made from pork is unlikely to tarnish Hormel’s mark, and absent any showing that Henson’s use will create negative associations with the Spam mark, there was little chance to a likelihood of dilution. 1297 In the 2002 Tommy Hilfiger 1298 case, it was held that the mere association with pets, especially where the association is considered light-hearted, is not sufficient to find dilution by tarnishment.

1290

Id., at 398 and 401. Id. 1292 Id. 1293 Mutual of Omaha Insurance Company v Novak, 836 F.2d 397 (8th Circ. 1987). 1294 Hormel Foods, supra note 226. 1295 Id. 1296 Id. 1297 Id. 1298 Tommy Hilfiger, supra note 202. 1291

243 Aso in 2002, in Kraft Food Holdings, Inc. v Helm, 1299 it was held that the connection between the defendant’s mark VelVeeda with sexually explicit content likely tarnished the plaintiff’s Velveeta mark. Therefore there could be no parody of Kraft’s cheese products. In 2003, in Caterpillar Inc. v Walt Disney Co., 1300 where in the movie George of the Jungle 2 Caterpillar bulldozers tried to destroy the home of George, Caterpillar’s claim of dilution by tarnishment was rejected. According to the court the Caterpillar bulldozers were not cast in an unwholesome or unsavoury light as viewers would understand the fantastic nature of the movie. In the same year, in WWE Inc. v Big Dog Holdings, 1301 it was held that the sine qua non of dilution by tarnishment is a finding that the plaintiff’s mark will suffer negative associations through the defendant’s use. Because the Big Dog graphics were considered humorous and family friendly there could be no negative association and thus no tarnishment. Based on 15 U.S.C. § 1125(c)3(A), 1302 in 2009 Starbucks v Charbucks, 1303 Black Bear’s use of the Charbucks trademark could not qualify under the parody exception, because it was used as a designation of source for its own goods. 1304

UK In 2011, in Ate My Heart Inc., 1305 beside the likelihood of confusion standard that was held sufficient, Justice Vos held that, based on Article 9(1)(c) Community Trademark Regulation, there was a real risk of actual tarnishment of the Lady Gaga trademark. 1306

1299

Kraft Food Holdings, Inc. v Helm, 205 F. Supp. 2d 942, 949–50, 953 (N.D. Ill. 2002). Caterpillar Inc. v Walt Disney Co., 287 F Supp 2d 913 (CD Ill 2003). 1301 World Wrestling Fed’n Entm’t, Inc. v Big Dog Holdings, Inc., 280 F. Supp. 2d 413, 442–43 (W.D. Pa. 2003) citing Hormel Foods, supra note 226. 1302 15 USC § 1125. 1303 Supra note 345. 1304 However, since the case was decided before the Trademark Dilution Revision Act, the parody exception may still apply even if the parody were used to "identify the source of the defendants' goods". Just like Haute Diggity Dog, supra note 914. 1305 Ate My Heart Inc., supra note 1244.. 1306 Id. 1300

244 Germany The German Trademarks Act, Markengesetz (MarkenG), 1307 does not have any explicit parody exception. However, Article 14(2)(3) MarkenG includes: “ohne rechtfertigenden Grund”, which is the German equivalent of the “use without due cause” clause of Article 5(2) Trademark Directive. An example of due cause in the German context would be parody based on Article 5(1) Basic Law 1308 which is protecting the right to freedom of expression. Schneider argues that until the Lila Postkarte case 1309 in 2005, German courts assessed whether the parody defence was successful or not predominantly based on whether the trademark was used to identify the source. 1310 An overview of the most salient pre-Lila Postkarte cases will be given below: Mordoro-Poker in 1981, Lusthansa in 1982, adihash in 1992, Mars condoms in 1994, Shell-Totenkopf in 1998 and Deutsche Pest in 2000. In 1981, in Mordoro-Poker, 1311 the Federal Court of Justice held that freedom of expression of the non-smoking organisation, based on Article 5(1) Basic Law, which was manifested via a parodic non-commercial calendar for its members outweighed Philip Morris’ “encroachment upon established and practiced business operations.” 1307

Gesetz über den Schutz von Marken und sonstigen Kennzeichen (Markengesetz – MarkenG), effective since October 25, 1994, article 15 was amended in November 24, 2011. 1308 Basic Law for the Federal Republic of Germany 1949, translated by professors Christian Tomuschat and David P. Currie, 2012. 1309 Lila-Postkarte, supra note 1260. 1310 BERNADETTE SCHNEIDER, DIE MARKENPARODIE IN DEUTSCHLAND (Peter Lang Internationaler Verlag der Wissenschaft, Cologne, University dissertation 2010), at 45. 1311 Mordoro-Poker: Manufacturer of Marlboro cigarettes, Philip Morris, filed a law suit at the Regional Court of Munich against the non-smoking organisation Aktive Heidelberger Nichtraucher in 1981 for using their altered advertisement on a calendar. The original advertisement was “Grand Marlboro-Poker with 1000 prizes worth 150,000 Mark” (“Großes Marlboro-Poker mit 1000 Gewinnen im Wert von 150 000 Mark”) for sponsoring an evening school. Ernst-Günther Krause, “Nichtraucher-Initiative München e.V.”, May 18, 2011, available at: http://www.ni-muenchen.de/content/view/331/20/ (accessed August 11, 2013). This was changed into “Grand Murder-Poker, with the prizes 1. Gastic ulcer, 2. heart attack, 3. lung cancer” (“Großes Mordoro-Poker mit den Preisen 1. Magengeschwür, 2, Herzinfarkt, 3. Lungenkrebs”). One day before the hearing, Philip Morris withdrew its claim. Then the non-smoker organisation demanded from Philip Morris that they would issue a declaration of non-infringement for the calendar. Philip Morris refused, and was sued at the Regional Court of Munich, that rejected the claim of the non-smoking organisation. The latter appealed successfully at the Higher Regional Court. In 1984 Philip Morris asked revision in the Mordoro-Poker case at the Federal Court of Justice, to no avail. Philip Morris’ claim of “encroachment upon established and practiced business operations“ were outweighed by the freedom of expression based on article 5(1) Basic Law. It must have helped that the spread of the calendar was not for commercial reasons but to promote public health. BGH GRUR 1984, 684, sec. 823 I BGB, April 17, 1984.

245 In 1982, in Lusthansa, the Higher Regional Court of Frankfurt held that the parody defence claimed by Harlekin, a company that sold Lusthansa adhesive stickers, as a parody on Lufthansa was successful, because it did not use the mark to identify to the source, nor did they use the trademark in the course of trade. The Higher Regional Court interpreted “in the course of trade” narrowly: Harlekin was selling joke articles, not airline flights. 1312 In 1992, in adihash, the Higher Regional Court of Hamburg held that the use of the slogan “adihash gives you speed” printed on a T-shirt, and thereby using a mark similar to the trademark adidas was not allowed. 1313 The court held that the possibility of confusion could not be excluded, since one needed knowledge of the English language to appreciate the difference between “adihash” and “adidas”. In 1994, in Mars condoms, the Federal Constitutional Court held that “Mars macht mobil bei Sex, Sport und Spiel”, which was meant as a parody on a similar slogan by the chocolate bar producer, was considered use of a designation in a trademark context which is not intended to be covered by the protective scope of the freedom of expression (Article 5 (1) Basic Law). 1314 Therefore the parody defence was unsuccessful. 1315 In 1998, in Shell-Totenkopf, Higher Regional Court of Hamburg 1316 held that the parody defence of a company selling T-shirts equipped with the trademark logo of Shell in an altered form was not successful. Although there was no direct competition between the oil company and the T-shirt company, the latter engaged in unfair competition, within the meaning of the unfair competition law, § 1 gesetz gegen den unlauteren Wettbewerb

1312

Lusthansa: In Germany the long s, which is written as an f, can be found in the blackletter typeface “fraktur”, which increases a likelihood of confusion between Lufthansa and Lusthansa. Lusthansa, OLG Frankfurt, BGH GRUR 1982, 319, 320. The site Lusthansa is available at: http://www.lusthansa.de/ (accessed August 11, 2013). 1313 Adihash, OLG Hamburg GRUR 1992, 58. 1314 Basic Law for the Federal Republic of Germany 1949, translated by professors Christian Tomuschat and David P. Currie, 2012. 1315 Mars condoms: In the 1970s chocolate bar producer Mars used the slogan “Mars makes you mobil at work, sports and games” (“Mars macht mobil bei Arbeit, Sport und Spiel”). Mars (Schokoriegel), Wikipedia, available at: http://de.wikipedia.org/wiki/Mars_(Schokoriegel) (accessed August 11, 2013). Marskondom, Markenverunglimpfung I, BGH GRUR 1994, 808, NJW 1994, 3342, decision of May 27, 1994. See also SÖNKE BECKER, PARODIE UND KOMMERZ, EINE RECHTSVERGLEICHENDE UNTERSUCHUNG DES AMERIKANISCHEN UND DEUTSCHEN URHEBER- UND MARKENRECHTS (2004), at 52. 1316 Shell-Totenkopf, OLG Hamburg, GRUR 1998, 1121 (1122), 11/06/1997 3 U 222/96 operating consultant in 1998, 235.

246 (UWG), because the sales of the T-shirts took advantage of the repute of the trademark. 1317 Also in 1998, in Bild Dir Keine Meinung, artist Kuno Klaboschke made post cards with the text “Bild Dir Keine Meinung” (“Do not form your own opinion”), which is parody on the slogan used by newspaper Bild; “Bild Dir Deine Meinung” (“Form your own opinion.”). The Court of Appeals of Hamburg held that Klaboschke’s parody defence was successful. 1318 Shell-Totenkopf and Bild Dir Keine Meinung were both decided by the Higher Regional Court of Hamburg in 1998. The difference is that the court in Bild Dir Keine Meinung determined that the trademark was used more artistically than commercially, and that the commercial income was marginal. In 2000, in Deutsche Pest, the Regional Court of Hamburg held that a van in the yellow colour of the German post office Deutsche Post with the words “Deutsche Pest” (“German plague”) was used by a trade-fair construction company. 1319 In weighing the interests of the freedom of expression and the “general personality rights” of the trademark holder, the court held that the “defamatory disparaging criticism” 1320 does not prevail because a key part of the fundamental rights of the trademark holder was affected. These examples of German case law demonstrate the variety in which the courts are weighing parodic but tarnishing use of trademarks based on the freedom of expression, with the origin of source doctrine, 1321 general personality rights of the trademark holder or use in a designating context. According to Schneider, Lila Postkarte was the watershed moment when German courts no longer base their parody decisions predominantly on whether there is confusion or not. 1322 As discussed in the introduction to Chapter 5, Kozinski pointed out that general confusion is excluding any claim based on the right to freedom of expression. 1323 From the above mentioned cases one can determine that the courts in Lusthansa, adihash 1317

Id. See also SCHNEIDER, supra note 1310, at 183. Bild Dir Keine Meinung, OLG Hamburg, June 4, 1998, NJW-RR 1990, 1060. 1319 LG Hamburg GRUR 2000, 514. 1320 The Regional Court of Hamburg stated that “die ehrverletzende herabwürdigende Kritik nicht obsiegen, weil ein Kernbereich der Grundrechte der Markeninhaberin berührt sei.” LG Hamburg GRUR 2000, 514. 1321 SCHNEIDER, supra note 1310, at 45. 1322 Id. 1323 Kozinski, supra note 56, at 973. 1318

247 and Mars Condoms based their parody decision predominantly on confusion, but the other cases did not. However, Lila Postkarte, can be indicative of German courts following more stringently the structure of their implementation of Article 5(2) Trademark Directive. 1324 In Lila Postkarte, a postcard using the word Milka, with the purple background colour trademarked by chocolate manufacturer Milka was published. The partly purple cow that was used in some of Milka advertisements was described as a word in the following poem: 1325 “Über allen Wipfeln is Ruh, irgendwo blökt eine Kuh. Muh! Rainer Maria Milka” 1326 The imaginary poet Rainer Maria Milka was attributed, which is an allusion to Rainer Maria Rilke. 1327 In 2005, Federal Court of Justice weighed the freedom of art of Article 5(3) Basic Law 1328 with the guarantee of property protection of Article 14(1) Basic Law. 1329 The court held that that there was no disparagement of the trademark and that the trademark was not only used commercially, therefore the freedom of art was given priority. 1330 So the parodic use of the trademark was with “rechtfertigenden Grund” (“due cause”) conform para. 14 Abs. 2 nr. 3 MarkenG, 1331 Germany’s equivalent of Article 5(2) Trademark Directive’s “use with due cause” clause.

1324

Para. 14 Abs. 2 nr. 3 MarkenG, which is conform to Article 5(2) Trademark Directive, supra note 146. SCHNEIDER, supra note 1310, at 46-47. 1326 An English translation is: “Over all the mountains is peace, bleats a cow somewhere. Moo!” An illustration of the Lila Postkarte can be found here: http://www.uni-konstanz.de/FuF/Jura/fezer/materi2.jpg (accessed August 11, 2013). 1327 Rainer Maria Rilke was a famous German-language poet, 4 December 1875 – 29 December 1926. Rainer Maria Rilke, Wikipedia. 1328 Article 5(3) Basic Law for the Federal Republic of Germany (Grundgesetz): Art and science, research and teaching are free. The freedom of teaching does not absolve from loyalty to the constitution (Kunst und Wissenschaft, Forschung und Lehre sind frei. Die Freiheit der Lehre entbindet nicht von der Treue zur Verfassung). 1329 First sentence of article 14(1) Basic Law for the Federal Republic of Germany (Grundgesetz): Property and inheritance shall be guaranteed. (Das Eigentum und das Erbrecht werden gewährleistet). 1330 Lila-Postkarte, supra note 1260, para. 34. 1331 Supra note 1324. 1325

248 Austria Comparable to Lila Postkarte 1332 in the sense that it also follows the structure of Article 5(2) Trademark Directive, but with an opposite result is the Styriagra 1333 case of 2010: Richard Mandl, a producer of pumpkin seeds from the Austrian province Steiermark, coated the pumpkin seeds in a blue coloured sugar and sold them under the trademark Styriagra, alluding to the alleged aphrodisiacal properties of pumpkin seeds. Pfizer, holder of the Viagra trademark sued the producer. The court of first instance held that the reputation of Viagra’s trademark was not affected. However, the court of appeal and the supreme court held that Mandl used the Viagra trademark to attract the public’s attention to the Styriagra trademark and benefit from Viagra’s reputation, 1334 even though it recognised the humorous allusion of Styriagra to Viagra. 1335 Therefore, by using the trademark Styriagra Mandl had taken unfair advantage of or had acted detrimental to the distinctive character or repute of Pfizer, on the basis of Articles 5(2) Trademark Directive and 9(1)c Community Trademark Regulation.

France In the Je boycott Danone case (2001-2003), Olivier Malnuit used the trademark Danone in the name of the website Jeboycottdanone.net, that was advocating employers’ interests, and reproduced the trademark logo of Danone wherein the red bar was substituted by a black bar, and added the words “Je boycott” (“I boycott”) above and “.net” next to the name Danone. The Paris High Court 1336 in two summary proceedings ordered Olivier Malnuit and Voltaire Network who were exploiting the website to cease 1332

The Austrian Supreme Court also refers explicitly to this case, (Styriagra) Austrian Supreme Court September 22, 2009; 17 Ob 15/09v, paras 3.1 and 3.3. 1333 Id. Read Maximilian Schubert, “STYRIAGRA: Pfizer Getting Seriously “Excited” About The Sale Of Blue Coloured Pumpkin Seeds”, Austrotrabant, December 3, 2009, available at: http://austrotrabant.wordpress.com/2009/12/03/styriagra-pfizer-getting-seriously-excited-about-the-sale-ofblue-coloured-pumpkin-seeds/, and also Stephanie Bauer, Austria: Trademark Parody - Humour is ..., February 17, 2010, available at: http://www.mondaq.com/x/94072/ (sites accessed August 11, 2013). 1334 The Supreme Court cited para. 49 of L'Oréal and Others, supra note 230: “to ride on the coat-tails of that mark in order to benefit from its power of attraction, its reputation and its prestige, and to exploit, without paying any financial compensation (..).” Styriagra, supra note 1332, para. 3. 1335 “Undoubtedly, the emphasis is, however, an attempt by the defendant to create by the reference to a well known brand awareness for its own product.” (Zweifellos im Vordergrund steht jedoch der Versuch des Beklagten, durch die Anlehnung an eine bekannte Marke Aufmerksamkeit für sein eigenes Produkt zu erregen.) Styriagra, supra note 1332, para. 3.4. 1336 Je boycott Danone, Tribunal de Grande Instance de Paris.

249 using the sign similar to Danone. 1337 The Paris High Court asserted that the use of the semi-figurative trademark (trademark logo of which the trademark name is a part) on the website jeboycottdanone.net exceeded the requirements of the right to freedom of expression, and took the consequences of a possible weakening of the trademark into account. 1338 In a separate decision the Paris High Court held simply that the parody, pastiche or caricature exception to author’s right is not applicable to trademark law. 1339 Olivier Malnuit and Voltaire Network successfully appealed. 1340 The Paris court of appeal stated that jeboycottdanone.net clearly does not intend to promote products competing with Danone. Instead the court considered that the defendants strictly exercised their right to freedom of expression by using the sign similar to Danone which was necessary and purely used in a polemical way, and that remarks about the products were not in any way denigrating, but instead positive statements. 1341

1337

Je boycott Danone, Paris High Court (Tribunal de Grande Instance de Paris) preliminary injunction of April 23, 2001, Compagnie Gervais Danone/Olivier M., 7 Ways, ELB Multimédia. Paris High Court (Tribunal de Grande Instance de Paris) preliminary injunction of May 14, 2001. 1338 The Paris High Court also asserted that the weakening of the trademark would cause greater harm to the employees of the Danone group, without proven benefit for wages affected by the closure (Attendu que le recours à la reproduction des marques semi-figuratives Danone excède donc les besoins de la liberté d’expression ; qu’il peut avoir, au contraire, un effet d’affaiblissement desdites marques pour le plus grand préjudice des salariés du groupe et sans gain avéré pour les salaires concernés par les mesures de fermeture). Paris High Court (Tribunal de Grande Instance de Paris) preliminary injunction of May 14, 2001. 1339 “l’exception de parodie, de pastiche ou de caricature, propre à la législation des droits d’auteur, n’existe pas en droit des marques.”Paris High Court (Tribunal de Grande Instance de Paris) third chamber, first section, decision of July 4, 2001, Sté Compagnie Gervais Danone et Sté Groupe Danone / Olivier M., SA 7 Ways, Sté ELB Multimédia, association "Le Réseau Voltaire Pour la Liberté d’expression" (ci-après "Réseau Voltaire"), Sté Gandi et Valentin L. (exerçant sous le nom commercial “Altern B”). 1340 Paris court of appeal (Cour d’appel de Paris) fourth chamber, section A, judgment of April 30, 2003, Olivier M., Réseau Voltaire / Compagnie Gervais Danone, Groupe Danone. 1341 “Que, en effet, même s’il est fait, pour partie, référence aux marques verbales et à la reproduction des marques semi figuratives appartenant à la société Compagnie Gervais Danone, à la seule différence tenant à la substitution d’un trait noir dans la partie inférieure du cartouche au trait rouge de l’original, les signes "jeboycottedanone.net" et "jeboycottedanone.com" ne visent manifestement pas à promouvoir la commercialisation de produits ou de services, concurrents de ceux des sociétés intimées, en faveur de l’association Réseau Voltaire et de Olivier M. mais relève au contraire d’un usage purement polémique étranger à la vie des affaires ; qu’il résulte des éléments du dossier que, d’une part, la référence à la marque Danone était nécessaire pour expliquer le caractère politique ou polémique de la campagne et, d’autre part, que, contrairement aux allégations des sociétés Groupe Danone et Compagnie Gervais Danone, leurs produits n’étaient nullement dénigrés ni même visés, puisque, sur les sites litigieux, on relève, tout au contraire, des mentions telles que "on aime vos produits. On a envie de continuer à les fabriquer, on a envie que les gens continuent à les acheter" ;” Paris court of appeal (Cour d’appel de Paris) fourth chamber, section A, judgment of April 30, 2003, Olivier M., Réseau Voltaire / Compagnie Gervais Danone, Groupe Danone.

250 In 2002, in CNMTR v societé JT, 1342 the Paris Court of Appeal held that the parody defence was admissible after CNMTR used the trademark “Camel”, in the context of an anti-smoking campaign in combination with a picture of a dromedary lying on the ground with his legs folded underneath his emaciated body, in combination with the text “let yourself be fooled by the smoke.” 1343 The French Supreme Court, however, overruled the decision because it held that a parody at the expense of a cigarette brand for the public health goal pursued by CNMRT and its right to freedom of expression, do not justify that the rights of a cigarette brand that operates within the law are violated. 1344 So in summary: in the Je boycott Danone case, the Paris High Court applied the principle of proportionality, and determined separately that parody, pastiche and caricature are incompatible with trademark law. The Paris Court of Appeal however held that the defendants had used the trademark within their freedom of expression, and had not used the website to promote competing products. The court seems to contend that the website was not used in the course of trade. In CNMTR v societé JT the Paris Court of Appeal accepted the parody defence. However, then the French Supreme Court did not allow a parody defence at the expense of the cigarette company that acted within the law, even though it was to further the public health goals. The different approaches to parody as a defence in case of trademark dilution by the courts in the different EU member countries demonstrate that parody is a constant source of legal uncertainty. Further EU wide harmonisation might be desirable. Olson argued that parody defences in the U.S. case law are not balanced with the trademark holders exclusive rights: “Under the current statutory framework, if a mark holder seeks injunctive relief for an artist’s tarnishing use, he will fail every time.” 1345 One can argue that this view can be nuanced: in the U.S. if the trademark holder can 1342

comité national contre les maladies respiratoires et la tuberculose CNMTR v société JT International GmbH et autre (CNMTR v société JT), Paris Court of Appeal (Cour d’appel de Paris), 2002. 1343 “[T]e laisse pas rouler par la cigarette", CNMTR v société JT, Paris Court of Appeal (Cour d’appel de Paris), 2002. 1344 CNMTR v société JT, Supreme court (Cour de cassation) - Deuxième chambre civile, judgement number 1601, 05-13.489, October 19, 2006. 1345 Alexandra Olson, Dilution by Tarnishment: An Unworkable Cause of Action in Cases of Artistic Expression, 53 B. C. L. REV. 693, 734 (2012).

251 prove that his trademark is used in a sexual explicit context a dilution by tarnishment claim has a big chance to be successful. In the EU, however, trademark holders seem to be quite successful to prove their detriment to the character or repute of their trademark claims. Olson proposed to apply a balancing test conform the fair use test for copyright law which should replace the non-commercial use requirement and broad fair use exclusions.1346

Chapter 6.4.3.3 Free-riding/unfair advantage of distinctive character or repute Justice Vos explained that Ate My Heart Inc. v Mind Candy Ltd. dealt not with amusingly similar referential names such as Broccoli Spears. Lady Goo Goo was known on the internet and therefore could not exploit her name without taking unfair advantage of the Lady Gaga trademark. 1347

Chapter 6.4.4 Criticising and commenting It seems obvious that news reporters, commentators and criticasters must be permitted to use trademarks to report, comment or criticise the trademarked product or service or the trademark holder. 1348 Critique on a perceived lack of social, environmental responsibility can be especially useful to the public at large and is arguably indispensable for the democratic process. However, when journalists use a trademark logo to illustrate an article that has nothing to do with a particular trademark or trademark holder, then an approach comparable to the parody/satire dichotomy would be welcome, in which the trademark can only be used in cases where the trademark or the trademark holder is the subject. Rowbottom argued that there should be different norms for professional and amateur writers: “That condition specifically refers to the norms of the mass media professional, and as a result the defence will offer limited protection to the amateur digital speaker that is not acquainted with those journalistic practices.” 1349 One can argue that to distinguish between amateur and professional journalists is untenable and artificial. 1346

Id., at 729. Ate My Heart Inc., supra note 1244, para. 50. 1348 In the U.S. this is permitted under U.S.C. § 1125(c)(3)(B), in the EU Article 10 ECHR. 1349 Rowbottom, supra note 533, at 359. 1347

252 Instead this thesis will propose the formality of linking back to the original site as a precondition for the use of the trademark logo on social media and can be used as a defence against trademark dilution claims. Linking back conforms to the journalistic norm of the adversarial process, see Chapter 8.

Chapter 6.4.5 Current trademark law’s insufficient protection of trademark logo on social media Anti-trademark dilution protects the public interest, but also the individual rights of the trademark holders, 1350 which now indirectly adds to the public interest by the added wealth and broadened products and services assortments the trademark holders create. Therefore from both a trademark holder and public interest point of view one can argue that trademark holders have a need to protect their expenditure of time, effort, labour, money and skills and strategies 1351 they have put into the goodwill and reputation of their trademarks. 1352 The anti-dilution laws in the U.S. and EU are insufficient to turn the tide of massive unauthorised use of the trademark logo on social media. Google received more than 15 million copyright removal requests in a month. 1353 Although Google did not publish information on the number of requests to remove trademarks, including trademark logos, one can assume that these numbers follow the trend of the copyright

1350

“.. great importance to the public interests as well as to the individual rights, of maintaining inviolate, that peculiar property which serves to designate and identify the goods, and wares, and merchandise of the artisan, the manufacturer, and the merchant, which minister to the constant necessities of all, and which furnish the sole assurance and guarantee of their genuineness, purity and integrity.” Derenberg, supra note 716, at 445. 1351 “Any expenditure of mental or physical effort, as a result of which there is created an entity, whether tangible or intangible, vests in the person who brought the entity into being, a proprietary right to the commercial exploitation of that entity, which right is separate and independent from the ownership of that entity”, D.F. Libling, The Concept of Property: Property in Intangibles, 92 LAW Q. REV. 103, 103-119 (1978). 1352 David Tan juxtaposes the point of view that companies spend a lot of money building their brands, and hence want greater protection for their trademarks, and whether there should be greater public usage because brands derive their economic value as a result of the emotional investments by consumers? Comments via email, on file with the author, October 19, 2010. 1353 Google copyright removal receipts in the last month (15,873,638): August 14, 2013, available at: http://www.google.com/transparencyreport/removals/copyright/ (accessed August 14, 2014).

253 removal requests. To deal with these on a case by case basis via litigation seems not feasible due to the sheer quantity. 1354 The role of the trademark in society has expanded, from signifier of the source of origin to a signifier of reputation and good will, 1355 and the expansion of trademark law has followed this development beyond the rationale of decreasing economic search costs. However, the anti-dilution laws suffer from some fundamental flaws, which have arisen because the ideas of Schechter have only been partially implemented. Instead of his proposal to protect trademarks that are original and unique so that they can be distinctive from any other, the concept of famous trademark or trademark with a reputation has been implemented, probably inspired by the well-known trademark doctrine, which was a Fremdkörper in regard to the dilution doctrine until it was incorporated by TRIPS. 1356 The situation whereby multiple proprietors can use the identical trademark as long as they operate in different trademark classes is untenable in the era of globalisation and the internet, where markets are physically and virtually connected, where travellers and internet users come into contact with any trademark. The fair use test in the U.S. and the limitations and exceptions in combination with the two-step test can only partly be automated. They are largely based on qualitative, and thus per definition subjective criteria, while only those factors that are based on quantitative, and thus objective, criteria are suitable for automation. It is an illusion to presume that litigation at a court of law could have the resources or priority to evaluate a flood of trademark abuse cases on a case by case basis. As already concluded in Chapter 4, litigation is not scalable.

1354

“Quantity has a quality all it own,” attributed to Joseph Stalin, unsourced, Wikiquote, available at: http://en.wikiquote.org/wiki/Talk:Joseph_Stalin (accessed August 11, 2013). 1355 “Moreover, such marks frequently perform functions which go beyond linking goods or services to a uniform source. They present a powerful image of quality, exclusivity, youth, fun, luxury, adventure, glamour or other reputedly desirable lifestyle attributes, not necessarily associated with specific products but capable of presenting a strong marketing message in itself.” Advocate General Sharpston in Intel Corp. Inc. v CPM United Kingdom Ltd. (Case C-252/07), Opinion of Advocate Genera, June 26, 2008, para. 8. 1356 Article 16(3) TRIPS, supra note 161.

254 Visuality of the trademark logo “[A] reputation like a face is the symbol of its possessor and creator, and another can only use it as a mask.” 1357 Just as trademarks tell stories, so do trademark logos, arguably in a condensed form. 1358 One can see the trademark logo as a symbol with a cluster of meanings. The OHIM acknowledges that trademarks do not only service to indicate the origin of a product, but also to convey a certain message or image to the consumer. 1359 Spiesel remarked that to determine whether the picture was used fairly rests largely on a judgment about whether its meaning has shifted. 1360 She also noted that this recoding is assessed by translating that what has been observed into words. On social media trademark logos are encoded by the trademark holder with meanings to associate it with for example desirability and luxury. These attributes in turn are then decoded by internet users. However, the user-generated content characteristics of social media make it possible that internet users recode the meaning of trademark logos in harmful ways. Tushnet demonstrated that pictures have an immediacy and therefore their meaning is context-bound. 1361 Because the context is so relevant, trademark logos are vulnerable for unsavoury contexts. This thesis will propose that only those trademark dilution defences against trademark dilution claims of unauthorised trademark logos on social media will be effective under the condition of linking back the trademark logo to the original site (see Chapter 8).

1357

Judge Learned Hand in Yale Elec. Corp. v Robertson, supra note 217. “[T]rade marks tell stories. Their expressiveness is the basis of commercial activity, the trader-author the conduit of meaning, and the market-audience the monitor and arbiter of taste. Megan Richardson, Trade Marks and Language, 26 SYDNEY L. REV. 193, 196 (2004) . 1359 “It follows that trade marks do not only serve to indicate the origin of a product, but also to convey a certain message or image to the consumer, which is incorporated in the sign mostly through use and, once acquired, forms part of its distinctiveness and repute. In most cases of reputation these features of the trade mark will be particularly developed, as the commercial success of a brand is usually based on product quality, successful promotion, or both and, for this reason, they will be especially valuable to the trade mark owner. This added value of a mark with reputation is precisely what Article 8(5) intends to protect against undue detriment or unfair advantage.” OHIM, The Manual concerning Opposition - Part 5, Article 8(5) CTMR, at 35. 1360 Spiesel, supra note 669. 1361 Rebecca Tushnet, Worth a Thousand Words: The Images of Copyright Law, 125 HARV. L. REV. 683 (2012). 1358

255

Chapter 7 Intermediary Liability Why the safe harbour provisions must be substituted for strict intermediary liability Introduction “With great power comes great responsibility.” 1362 Before the advent of social media, towards the end of the “dot.com bubble”, 1363 the idea took root that electronic commerce would be crucial for society. Because of “the embryonic state of electronic commerce, policies should be crafted with care and with due recognition of its fragile and evolving nature.” 1364 In this light it was thought that, among other internet intermediaries, the online service providers (OSPs), 1365 who merely host content posted by third parties, needed to be protected against a flood of legal conflicts because of alleged copyright and trademark infringements. 1366 Legislators on both sides of the Atlantic assumed that this would “ensure that the efficiency of the internet [would] continue to improve and that the variety and quality of services on the internet [would] continue to expand.” 1367 The development of ecommerce proofed to be robust and user-generated content on social media started to blossom, and the foreseen problems never materialised. Therefore, one can assert that his eliminated the raison d’être for the safe harbour provisions. 1368

1362

VOLTAIRE, ADRIEN JEAN QUENTIN BEUCHOT, PIERRE-AUGUSTE-MARIE MIGER “ŒUVRES DE VOLTAIRE, VOLUME 48”( Lefèvre, 1832). 1363 The “dot.com bubble” took place between 1995 and 2000. Exuberant expectations about technological advances lead to speculations that anything related to the internet would prosper. 1364 Andrew Wyckoff & Alessandra Colecchia, The Economic and Social Impact of Electronic Commerce, Preliminary Findings and Research Agenda, OECD, (1998), at 12. 1365 With the online service provider (OSP) is meant an intermediary that is called a internet society service in the E-Commerce Directive and service provider in the DMCA, supra note 5. 1366 In this dissertation copyright and trademark infringements on the internet together are called content infringements. 1367 Viacom Int’l Inc. v YouTube, Inc., 718 F. Supp. 2d 514, 519 (S.D.N.Y. 2010). Quoting The Senate Committee on the Judiciary Report, S. REP. NO. 105-190 (1998), at 8. 1368 Danny Friedmann, Sinking the Safe Harbour With the Legal Certainty of Strict Liability in Sight, BMM Bulletin, 2013 upcoming.

256 The safe harbour provisions are supposed to give internet intermediaries, including OSPs, immunity in case of intermediary liability, 1369 because of content infringements by internet users, 1370 if they met two prerequisites. The first prerequisite is that an OSP has no actual knowledge nor constructed knowledge. 1371 And in case it obtains such knowledge or awareness it must expeditiously remove or disable access to such content. 1372 In the case of the safe harbour provisions in the Lanham Act the first prerequisite is preventing future presentations of trademark infringements. The second prerequisite is that OSPs should act neutrally in relation to content uploaded by third parties, for example user-generated content on social media or internet auctions. However, this is in conflict with OSPs’ desire to harness technology to further their entrepreneurial interests. The juridrudence shows that knowledge (the first prerequisite) is narrowly interpreted, while neutrality (the second prerequisite) is broadly interpreted. All these safe harbour provisions were introduced before the ascent of one subspecies of the OSP: the social media provider. An additional advantage of the concept of the safe harbour provisions, it was assumed, would be that they would not have to filter inappropriate content, so that they could primarily focus on their core activities, 1373 without having to fear being sued for intellectual property infringements. However, this idea does not correspond well with reality. For social media providers the risks of being sued by content holders have become substantial, because of the massive amount of usergenerated content they are hosting. Social media are already swamped by notice and takedown requests by alleged content holders.

1369

Secondary liability is also called third-party liability, applied to internet intermediaries this is also called intermediary liability. 1370 The internet users that upload infringed content are the primary infringers. 1371 Awareness of facts or circumstances that infringing activity is apparent. 1372 17 USC § 512(c)(3); and Recital 46 of the preamble to and Article 14(1)(b) of the E-Commerce Directive, supra note 5. 1373 U.S. Congress was concerned that internet service providers were forced to operate a human compiled directory of websites or to monitoring a site for inappropriate content. In the legislative history it becomes clear that Congress wants liability to arise only in such cases if the infringement was “obvious,” such as a “‘pirate’ site,” such that “online editors and catalogers would not be required to make discriminating judgments about potential copyright infringement.” H.R. Rep. No. 105-551 pt. 2 at 57-58; S. Rep. 105-190 at 48-49.

257 This Chapter will test Hypothesis 2. “The safe harbour provisions that exclude social media from intermediary liability of trademark infringement under certain conditions is not effective.” The Chapter also provides the reasons why this hypothesis must be confirmed. First the relevant safe harbour provisions in case of trademark infringements are briefly introduced in Chapter 7.1. The question will be answered why safe harbour provisions only give a false sense of safety and do not provide real protection to social media providers. Chapter 7.2 will investigate why OSPs in general and social media providers in particular are not incentivised to proactively monitor for infringing material and whether this could be changed via self-regulation, market power or legislation. Followed by why and how the intermediary liability could provide relieve to trademark holders. Chapter 7.3 will explain the grounds that can pierce the veil of the safe harbour provisions and enable trademark holders to sue the OSPs, including social media providers: contributory liability, inducement as part of contributory liability and, vicarious liability. This section also investigates inducement as a possible stand-alone action and some interesting developments to use Facebook to sue primary infringers, the internet users, on social media. Chapter 7.4 will provide an overview of some seminal case law in which trademark and copyright holders have filed lawsuits against eBay and Google France. Although the internet auction and reference service are not purely social media, these cases illuminate the filter conditions of the safe harbour provisions relevant to OSPs, including social media. Chapter 7.5 will answer the question to what degree OSPs, including social media providers, should be obligated to filter infringing content. Chapter 7.6 examines what the implications are of the safe harbour provisions in case of trademark infringement in regard to the legal certainty of social media providers, trademark holders and internet users. The Chapter will end with confirming Hypothesis 2.

258 Chapter 7.1 Safe harbour provisions “We cannot be liable for actions of third parties. As long as we follow a regime of taking things down that are reported to us, which we have done over all these years, we are protected according to the law.“ Transcription of Kim Dotcom in 2012. 1374 The DMCA 1375 and the Communications Decency Act (CDA), 1376 are both not applicable to trademark infringements. However, the DMCA is relevant to the subject, because it has been used as an inspiration for the E-Commerce Directive 1377 in the EU and also for the notice and takedown procedures de facto used by eBay and social media providers. Case law on the CDA is also relevant since it has pointed the way to the applicability of the safe harbour provisions in the Lanham Act in case of trademark infringements (Chapter 7.1.1). Then the safe harbour provisions of the Lanham Act that are partly applicable in case of trademark infringements in the U.S. will be examined (Chapter 7.1.2), followed by the safe harbour provisions of the E-Commerce Directive, 1378 applicable in case of all intellectual property infringements in the EU, including trademark infringements (Chapter 7.1.3).

Chapter 7.1.1 DMCA and CDA DMCA On October 12, 1998, the U.S. Congress passed the DMCA, 1379 which for the most part became effective on the same date. 1380 The DMCA has the most prominent safe harbour provisions in the U.S., or arguably worldwide. Although it is only applicable in case of copyright infringement and not trademark infringements, it is relevant for this thesis: it inspired the safe harbour provisions in the EU which has led to the safe harbour

1374

Dotcom, supra note 674. Surpra note 5. 1376 47 U.S.C. § 230 (2000). 1377 Directive 2000/31, supra note 5. 1378 Id. 1379 DMCA, supra note 5. 1380 Most provisions of the DMCA are effective on the date of enactment. However, those provisions that are related to the WIPO copyright treaties, became effective until these relevant treaties came into force. WIPO Performances and Phonograms Treaty, effective on May 20, 2002. WIPO Copyright Treaty effective on March 6, 2002, supra note 18. The prohibition on the act of circumvention of access control measures does not take effect until two years from enactment (October 28, 2000). 1375

259 provisions in the E-Commerce Directive, applicable to all intellectual property infringements, including trademark infringements. Also, the DMCA 1381 has set a de facto standard in regard to notice and takedown procedures; its structure has been followed by eBay and many social media providers. It also provides a context to demonstrate how the safe harbour provisions in the Lanham Act differ from those in the DMCA. In short: the DMCA 1382 exempts internet intermediaries for secondary liability of copyright infringements, as long as they expeditiously remove infringing copyright material or disable access of such material after being notified conform a specified notice and takedown procedure, 1383 or after they are aware of facts or circumstances that infringing activity is apparent. The alleged copyright infringer has the opportunity to counter-notify the one who alleged to be authorised by the copyright holder, in order to get the content back online. 1384 The copyright holder has now 10 to 14 days to avoid that the content will be placed back by notifying the designated agent of the OSP that he has filed a court order to restrain the user from engaging in infringing activity on the servers of the OSP. 1385 Internet intermediaries can be divided into five categories: to provide transitory digital network communications, 1386 system caching 1387 or information residing on systems or networks at direction of users, 1388 search engines and hyperlinks. 1389 The latter two, called together information location tools, can only be found in the DMCA. 1390 The member states of the EU deal with information location tools in a way similar to hosting. 1391 The DCMA and in slightly different wording the E-Commerce Directive, 1392 both distinguish between the different internet intermediaries’ activities:

1381

Supra note 5. Id. 1383 § 512(c)(1)(A)iii DMCA, id. 1384 § 512(g)(2)(B) DMCA, id. 1385 § 512(g)(2)(C) DMCA, id. 1386 § 512(a) DMCA, id. 1387 § 512(b) DMCA, id. 1388 § 512(c) DMCA, id. 1389 § 512(d) DMCA, id. 1390 Id. 1391 Google France and Google, supra note 230, para. 110. Read Thibault Verbiest et al., Study on the Liability of the Internet Intermediaries, Markt/2006/09/E, November 12, 2007, at 18-19/115. 1392 Supra note 5. 1382

260 - transitory digital network communication 1393/mere conduit; 1394 - system caching 1395/caching, 1396 and; - information residing on systems or networks at direction of users 1397/hosting, 1398 respectively. The difference between these activities is how long the internet intermediaries store the information. The DMCA 1399 is not applicable in case of trademark infringements. However, the Lanham Act has its own safe harbour provisions 1400 for so called innocent infringers and innocent violators, where the trademark infringement or trademark violation complained of is contained in or is part of paid advertising matter. 1401 The following three groups of protagonists are eligible for these Lanham Act safe harbour provisions: - those engaged in the business of printing; 1402 - publishers or distributors of newspapers, magazines or electronic communications; 1403 - domain name registrars. 1404 Only publishers of electronic communications will be discussed below, because social media providers fit in this category. As already mentioned above the DMCA 1405 has set a standard for other safe harbour provisions in regard to its notice and takedown procedures. Social media providers flooded by takedown requests by trademark holders have tried to find refuge in DMCA 1406 style notice and takedown procedures, as discussed in Chapter 3.2.8. Also being sued frequently by trademark holders, internet auction eBay has implemented a Verified Rights Owners (VeRO) programme which uses a notice and takedown

1393

§ 512(a) DMCA, supra note 5. Article 12 E-Commerce Directive, supra note 5. 1395 § 512(b) DMCA, supra note 5 1396 Article 13 E-Commerce Directive, supra note 5. 1397 § 512(c) DMCA, supra note 5. 1398 Article 14 E-Commerce Directive, supra note 5. 1399 DMCA, supra note 5. 1400 § 32(2) Lanham Act, as codified into 15 U.S.C. § 1114(2) (2000). 1401 Id., § 1114(2)(B) Lanham Act. 1402 Id., § 1114(2)(A) Lanham Act. 1403 Id., § 1114(2)(B) Lanham Act. 1404 Id., § 1114(2)(C) Lanham Act. 1405 DMCA, supra note 5. 1406 Id. 1394

261 procedure with nearly the same six elements required in § 512(c)(3)i-vi DMCA, which eBay called: notice of claimed infringement (NOCI). 1407 The sixth element of NOCI: “a statement by you, made under penalty of perjury, that the information in your notice is accurate and that you are the copyright or intellectual property owner or authorized to act on the copyright or intellectual property 1408 owner’s behalf”, 1409 is putting the penalty of perjury under the statement which includes that the information in the notice is accurate and that the complainant is authorised to act on the copyright or intellectual property owner’s behalf. This makes NOCI’s penalty more inclusive than § 512(c)(3)vi DMCA which, due to the positioning of the comma, only puts the penalty of perjury on the second part: “A statement that the information in the notification is accurate, and under penalty of perjury, that the complaining party is authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.” 1410 Just as the DMCA prescribes that the complainant should be able to send his complaint to a designated agent of the internet intermediary, 1411 so does eBay has a designated agent to whom complainants can send their complaints. 1412 Under the DMCA the liability of internet intermediaries that provide hosting, applies under the condition that they remove or disable material upon notification 1413 sent to their designated agent 1414 by the alleged rights holder and notify the subscriber. Upon receipt of a counter-notification to the claimant, the hosting provider must replace the removed material or enable disabled material, in not less than 10 days nor more than 14 working days 1415 if he wants to remain immune to secondary liability, unless the

1407

eBay: VeRO Reporting and Infringement, available at: http://pages.ebay.com/vero/notice.html (accessed August 20, 2013). 1408 To state “copyright or intellectual property” is a tautological formulation, since copyright is part of the category of intellectual property. A more precise but still broad formulation would be “copyright or industrial property.” Industrial property includes trademark rights, design rights and patent rights. 1409 Supra note 1407. 1410 § 512(c)(3)vi DMCA, supra note 5. 1411 § 512(c)(2) DMCA, id. 1412 Supra note 1407. 1413 According to elements mentioned in § 512(c)(3) DMCA, supra note 5. 1414 § 512(c)(2) DMCA, id. 1415 § 512(g)(2)(C) DMCA, id.

262 designated agent first received a notification from the alleged rights holders that he filed an action seeking a court order to restrain the OSP. 1416 Unlike the DMCA notice and takedown procedure, 1417 eBay’s NOCI does not have included the possibility of a counterclaim. Just as the DMCA prescribes that internet intermediaries implement a policy against repeat infringers, 1418 “eBay has adopted and implements a policy that provides for the termination in appropriate circumstances of the accounts of users who repeatedly infringe copyrights or other intellectual property rights of eBay and/or others.” 1419

CDA Another set of safe harbour provisions was created in 2000: CDA. 1420 These safe harbour provisions indemnify internet intermediaries from intermediary liability arising from third-party generated content: “No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.” 1421 However these safe harbour provisions have so far been interpreted as granting internet service providers immunity from state and federal causes of actions, such as torts including defamation and negligence. 1422 The question whether it was applicable to intellectual property was answered in 2001, in Gucci Am., Inc. v Hall & Assocs. 1423 The court held that § 230(e)(2) CDA needed to be interpreted in such a way that “it would neither limit or expand any law pertaining to intellectual property.” 1424 However, the court in Gucci Am., Inc. v Hall & Assocs., 1425 did refer to safe harbour provisions of the Lanham Act, 1426 hereby clarifying that these apply.

1416

§ 512(g)(2)(C) DMCA, id. § 512(g)(2)(C)DMCA, id. 1418 § 512(i)(1)(A) DMCA, id. 1419 Supra note 1407. 1420 Communications Decency Act (CDA) codified in 47 U.S.C. § 230 (2000) 1421 47 U.S.C. § 230(c)(1) (2000), id. 1422 The Electronic Frontier Foundation gives an overview of cases when CDA was claimed. “Defamation: CDA Cases”, EFF, (undated), available at: https://ilt.eff.org/index.php/Defamation:_CDA_Cases (accessed August 21, 2013). 1423 Gucci Am., Inc. v. Hall & Assocs., 135 F. Supp. 2d 409, 413 (S.D.N.Y. 2001). 1424 Id. 1425 Id. 1426 § 32(2) Lanham Act, as codified into 15 U.S.C. § 1114(2) 2000. 1417

263 Chapter 7.1.2 Lanham Act The safe harbour provisions in the Lanham Act, established in 2000, 1427 are not well known among scholars. 1428 Perhaps they are overshadowed by the attention bestowed on the safe harbour provisions of the DMCA. However, § 1114(2) Lanham Act protects “innocent infringing and violating” publishers of “newspaper, magazine, or other similar periodical or in an electronic communication” 1429 against intermediary liability for trademark infringement, including OSPs that host user-generated content. 1430 Social media providers that publish content written by its users (user-generated content as discussed in Chapter 3.2.5) can be defined as electronic communications. 1431 § 1114(2)(B) and (C) Lanham Act are relevant. 1432 § 1114(2)(B) Lanham Act makes clear that the publishers of electronic communications, including social media, can be exempted from intermediary liability of trademark infringements if they are innocent infringers or innocent violators of trademark rights, although they have to abide to an injunction against the presentation of such infringing advertising matter in future transmissions of such electronic communications. What “innocent infringer or innocent violator” means can be inferred from

1427

Id. U.S. Trademark Law, Rules of Practice & Federal Statutes, USPTO, August 9, 2012, 205-207. For example Kaiser wrote an interesting paper about contributory trademark infringement and that this should be limited, but not a word is mentioned about special safe harbour provisions in case of trademark infringements. Brian Kaiser, Contributory Trademark Infringement By Internet Service Providers: An Argument For Limitation, 7 J. TECH. L. & POL’Y 65 (2002). Chilling Effects Clearinghouse is not mentioning it either, Frequently Asked Questions (and Answers) about Trademark What to Expect When You're Expecting to Be Sued for Trademark Infringement, Chilling Effects Clearinghouse, available at: https://www.chillingeffects.org/trademark/faq#QID872 (accessed August 21, 2013). Levin did point it out. Elizabeth Levin, A Safe Harbor For Trademark: Reevaluating Secondary Trademark Liability After Tiffany V. Ebay, 24 BERK. TECH. L. J. 491, 520. 1429 15 U.S.C. § 1114(2), supra note 1426. 1430 15 U.S.C. § 1114(2)(B)-(C), id. 1431 Electronic Communications Privacy Act of 1986 codified in 18 USC § 2510(12). 1432 15 U.S.C. § 1114(2)A, supra note 1426, is not relevant for social media sites. Where an innocent infringer or innocent violator is engaged solely in the business of printing the mark or violating matter for others, the trademark holder shall be entitled as against such infringer or violator only to an injunction against future printing. 15 U.S.C. § 1114(2)D is not relevant for social media sites. A domain name registrar, a domain name registry, or other domain name registration authority that takes any action described under clause (ii) affecting a domain name shall not be liable for monetary relief or, except as provided in subclause (II), for injunctive relief, to any person for such action, regardless of whether the domain name is finally determined to infringe or dilute the mark. 1428

264 § 1114(2)(A), namely that the infringer or violator is engaged solely in hosting infringing or violating matter for others, 1433 which in this thesis’ context could mean that the social media provider is hosting infringing user-generated content. § 1114(2)(C) Lanham Act explains that the trademark holder’s injunctive relief against future infringement shall not be available if restraining the dissemination of such infringing matter would delay the normal transmission of such electronic communication, in accordance with sound business practice. Therefore the conditions under which the safe harbour provisions in the Lanham Act apply significantly differ from those in the DMCA. 1434 Under the DMCA the internet intermediary can make use of the safe harbour provisions if he expeditiously removes or disables access to infringing material after a complaint by an alleged copyright holder. 1435 Also, the one who uploaded the work is notified that the work will be removed, but he can oppose this procedure by counter-notification. 1436 Under the Lanham Act, the OSP only has to prevent that infringing matter will be presented in the future, 1437 but only if this is not incompatible with a sound business practice. 1438 And the Lanham Act lacks any notice and takedown and counter-notification procedure as the DMCA specifies. 1439

Scope of the safe harbour provisions in the Lanham Act: Trademark infringement part of paid advertising matter As will be discussed below the safe harbour provisions of the E-Commerce Directive 1440 apply in case of all intellectual property infringements, including all trademark infringements. In contrast, under the Lanham Act the safe harbour provisions seem to apply to only a subspecies of trademark infringements: those trademark infringements that are part of paid advertising matter; for example via keyword triggered advertisements or banners. 1433

§ 1114(2)(A) Lanham Act: “Where an infringer or violator is engaged solely in the business of printing the mark or violating matter for others and establishes that he or she was an innocent infringer or innocent violator (..)” Supra note 1426. 1434 Supra note 5. 1435 § 512(c)(1)(A)iii DMCA, id. 1436 § 512(g)(2)(B-C) DMCA, id. 1437 15 U.S.C. § 1114(2)B, supra note 1426. 1438 15 U.S.C. § 1114(2)C, id. 1439 § 512(g)(2)(B-C) DMCA, supra note 5 1440 Supra note 5.

265 This means that the safe harbour provisions in the Lanham Act do not give any refuge to social media providers in case of trademark infringements or violations that are not part of paid advertising matter and might render them liable for intermediary liability. Examples include violations of trademark dilution by blurring and tarnishment. Noncommercial use of the trademark logo on social media is unlikely, since social media almost always include advertisements, as discussed in Chapter 5.4. However, trademark infringement as part of paid advertising matter can be distinguished from trademark infringement in a context with paid advertisements. And the latter also could fall outside the safe harbour provisions of the Lanham Act and make the social media provider liable for intermediary liability.

Chapter 7.1.3 E-Commerce Directive Already in 1997 the European Commission considered the need for an ECommerce Directive. 1441 In March of 1998 European Commissioner for the internal market, services customs and taxation, Mario Monti, stated that action should be taken on intellectual property legislation. 1442 In November of 1998, the European Commission proposed a legal framework for a directive which included the concept of liability of intermediaries: “[t]o eliminate existing legal uncertainties and to avoid divergent approaches at Member State level, the proposal would establish an exemption from liability for intermediaries where they play a passive role as a “mere conduit” of information from third parties and limit service providers’ liability for other “intermediary” activities such as the storage of information.” 1443 The ambition of the proposal was to strike “a careful balance between the different interests involved in order to stimulate co-operation between different parties and so reduce the risk of illegal activity on-line.” 1444 An amended proposal in 1999 for the directive did not change the

1441

European Commission, Electronic Commerce: Commission presents framework for future action, IP/97/313, April 16, 1997. 1442 Mario Monti, Orientations for Electronic Commerce: discussion at Council of Economy and Finance Ministers, March 10, 1998, available at: http://ec.europa.eu/internal_market/e-commerce/orientation_fr.htm (accessed August 21, 2013). 1443 European Commission, Electronic commerce: Commission proposes legal framework, IP/98/999, November 18, 1998. 1444 Id.

266 safe harbour provisions contained therein. 1445 May 4, 2000, the European Parliament approved the E-Commerce Directive. 1446 The E-Commerce Directive, 1447 was implemented to protect the development of electronic commerce within the information society, 1448 which “offers significant employment opportunities in the Community, particularly in small and medium-sized enterprises, and will stimulate economic growth and investment in innovation by European companies, and can also enhance the competitiveness of European industry, provided that everyone has access to the Internet.” 1449 The E-Commerce Directive includes safe harbour provisions for “information society services”, 1450 including OSPs and applies horizontally. 1451 Recital 46 of the preamble to the E-Commerce Directive states: “In order to benefit from a limitation of liability, the provider of an information society service, consisting of the storage of information, upon obtaining actual knowledge or awareness of illegal activities has to act expeditiously to remove or to disable access to the information concerned; the removal or disabling of access has to be undertaken in the observance of the principle of freedom of expression and of procedures established for this purpose at national level; this Directive does not affect Member States’ possibility of establishing specific requirements which must be fulfilled expeditiously prior to the removal or disabling of information.” 1452 The E-Commerce Directive leaves open the possibility of member states to establish procedures to remove or disable access to alleged infringing information after

1445

European Commission, Electronic commerce: amended proposal for a coherent legal framework in the Single Market, IP/99/652, September 1, 1999. 1446 European Commission, Electronic commerce: Commission welcomes final adoption of legal framework Directive, IP/00/442, May 4, 2000. 1447 Supra note 5. 1448 Information Society is the EU word for the internet. 1449 Supra note 5. 1450 Information Society Service is the EU word for internet intermediary. 1451 “Horizontally” means that it applies to all kinds of infringements, including trademark infringements. “[T]he European legislature has opted for an all-encompassing ‘horizontal’ approach, the US have dealt with copyright liability within the framework of the copyright law.” P. Bernt Hugenholtz and Kamiel Koelman, WIPO Workshop on Service Provider Liability, Online Service Provider Liability for Copright Infringement, Geneva, December 9 and 10, 1999, available at: http://www.ivir.nl/publicaties/hugenholtz/wipo99.pdf (accessed August 21, 2013). See also the Explanatory Memorandum to the Commission's original proposal COM (1998) 586 final. 1452 Recital 46 of the preamble to the E-Commerce Directive, supra note 5.

267 notification. 1453 However, since January 2012, the EU is in the process to draft its own version of notice and takedown procedures, called Notice-and-action procedure. 1454 Since the E-Commerce Directive 1455 does not have developed a Notice-and-action procedure, yet, there are no procedures of counter-notice and replacement prescribed, yet. 1456 So instead of the notice and takedown procedures, some member states have chosen to give the power to assume actual knowledge exclusively to a specialised authority or to courts. 1457

Chapter 7.2 Knowledge A similarity between the DMCA and the E-Commerce Directive 1458 is that both contend that the immunity of intermediary liability is under the condition that the OSP does not have actual 1459 or constructive knowledge, 1460 and if they do so, that they expeditiously remove or disable access to the alleged infringing material. 1461 Compare these two sets of provisions: § 512(c)(1)(A) DMCA (i): does not have actual knowledge that the material or an activity using the material on the system or network is infringing; (ii) in the absence of such actual knowledge, is not aware of facts or circumstances from which infringing activity is apparent; or (iii) upon obtaining such knowledge or awareness, acts expeditiously to remove, or disable access to, the material;

1453

Recital 51 of the preamble to the E-Commerce Directive and Article 14 (3) E-Commerce Directive, id. Notice-and-action Procedures, announced January 2012, European Commission, available at: http://ec.europa.eu/internal_market/e-commerce/notice-and-action/index_en.htm (accessed August 21, 2013). 1455 Supra note 5. 1456 Supra note 1454. 1457 Verbiest et al., supra note 1391, at 41-46/115. 1458 Supra note 5. 1459 § 512(c)(1)(A)i DMCA and article 14(1)(a) E-Commerce Directive, id. 1460 § 512(c)(1)(A)ii DMCA and article 14(1)(a) E-Commerce Directive, id. 1461 § 512(c)(1)(A)iii DMCA and article 14(1)(b) E-Commerce Directive, id. 1454

268 Article 14(1) E-Commerce Directive: (a) the provider does not have actual knowledge of illegal activity or information and, as regards claims for damages, is not aware of facts or circumstances from which the illegal activity or information is apparent; or (b) the provider, upon obtaining such knowledge or awareness, acts expeditiously to remove or to disable access to the information. Recital 46 of the preamble to the E-Commerce Directive puts it succinctly: the OSP “upon obtaining actual knowledge or awareness of illegal activities has to act expeditiously to remove or to disable access to the information concerned.” There is no definition of the term actual knowledge. Member states have each implemented this legislation in different ways and their courts have developed different practices on the interpretation of that term. 1462 As an example, the German Federal Court of Justice decided that actual knowledge can be interpreted as specific actual human knowledge, as opposed to computer knowledge or general awareness of the past presence of illegal material on a server. Beside, negligence and conditional intent do not constitute actual knowledge. 1463 In the U.S., the common law doctrine of wilful blindness occurs when someone suspects wrongdoing and deliberately fails to investigate. 1464 In 1992 in Hard Rock Café, the Seventh Circuit clarified that “wilful blindness is equivalent to actual knowledge for purposes of the Lanham Act.” 1465 Then again, wilful blindness is limited by the Hard Rock Café’s standard to only be able to “understand what a reasonably prudent person would understand” and not impose any care of duty that goes beyond that requirement. 1466 The concept of constructed knowledge or “facts or circumstances” from which “illegal activity” 1467 or “illegal activity or information” 1468 becomes apparent is

1462

Verbiest et al., supra note 1391, at 36-37/115. BGH, 23/09/2003, VI ZR 335/02, NJW 2003, 3764. 1464 Hard Rock Café Licensing Corp. v Concession Services, Inc. 955 F.2d 1143, 1149 (7th Cir. 1992). 1465 Id. In 2010 in Tiffany Inc. v eBay Inc., the Second Circuit held that in case of trademark infringement “[a] service provider is not … permitted wilful blindness. When it has reason to suspect that users of its service are infringing a protected mark, it may not shield itself from learning of the particular infringing transactions by looking the other way.” Tiffany (NJ) Inc. v. eBay Inc., 600 F.3d 93 (2d Cir. 2010). 1466 Supra note 1464. 1467 17 USC § 512(c)(1)(A)(ii), supra note 5. 1468 Article 14(1)(a) E-Commerce Directive, supra note 5. 1463

269 also called “a red flag”, 1469 by which is meant that if the OSP comes across these it must pay special attention to it and act, otherwise the exemption of intermediary liability will be lifted (see Chapter 7.5 about the required level of monitoring). Bliley of the Commission on Commerce of the U.S. House of Representatives, explained the subjective and objective element of the red flag test: “In determining whether the service provider was aware of a ‘‘red flag,’’ the subjective awareness of the service provider of the facts or circumstances in question must be determined. However, in deciding whether those facts or circumstances constitute a ‘‘red flag’’—in other words, whether infringing activity would have been apparent to a reasonable person operating under the same or similar circumstances— an objective standard should be used.” 1470 Ginsburg pointed out that U.S. case law, such as developed in Perfect 10, Inc. v Cybernet Ventures, Inc., 1471 interprets the red flag in such a way that “the flag may need to be an immense crimson banner before the service provider’s obligation to intervene comes into play.” 1472 Recent case law such as Viacom International, Inc. v YouTube, Inc. of 2013, confirms this view. 1473 Trademark holders can only hold OSPs liable if they can prove that they have actual or constructive knowledge, as the DMCA and E-Commerce Directive 1474 require. This is different from the Lanham Act which states that trademark holders can not recover profits or damages from the infringement, unless they can prove that “the acts have been committed with knowledge that such imitation is intended to be used to cause

1469

“In determining whether the service provider was aware of a “red flag” the subjective awareness of the service provider of the facts or circumstances in question must be determined. However, in deciding whether those facts or circumstances constitute a “red flag”—in other words, whether infringing activity would have been apparent to a reasonable person operating under the same or similar circumstances— an objective standard should be used.” Thomas Bliley, Committee on Commerce, submitted the following report to the Committee of the Whole U.S. House of Representatives, together with additional views to accompany H.R. 2281, 1998, at 53. 1470 Id. 1471 Perfect 10, Inc. v Cybernet Ventures, Inc., 213 F. Supp. 2d 1146, April 22, 2002, (C.D. Cal. 2002) at 1177. 1472 Jane C. Ginsburg, Part II User-Generated Content Sites and Section 512 of the US Copyright Act, COPYRIGHT ENFORCEMENT AND THE INTERNET (Irini A. Stamatoudi, ed., 2010), at 190. 1473 The decision by the District Court of the Southern District of New York of April 18, 2013 was not yet published on April 19, 2013, Jonathan Stempel, “Google again beats Viacom in YouTube copyright case”, Reuters, April 18, 2013, available at: http://www.reuters.com/article/2013/04/18/entertainment-us-googleviacom-idUSBRE93H17S20130418 (accessed August 21, 2013). 1474 Supra note 5.

270 confusion, or to cause mistake, or to deceive.” 1475 However, to prove intent of the infringers might be prohibitively difficult for trademark holders.

Chapter 7.2.1 Contributory liability In 1972 the contributory liability for copyright infringement doctrine was established in the Gershwin Publication Corp. v Columbia Artists Management, Inc. case. 1476 Then, in 1982, in Inwood Labs., Inc. v Ives Labs., Inc., 1477 the Supreme Court established contributory liability as a course of action under trademark law. The Inwood test for contributory liability is to determine whether a party induces another to infringe a trademark, or continues its service where he knows or has reason to know the other party is engaging in trademark infringement. In 1984, in Sony Corp. of America v Universal City Studios, Inc., 1478 the Supreme Court “consistently rejected the proposition that a similar kinship exists between copyright law and trademark law, and recognized the basic similarities between copyrights and patents” 1479 in the process. Because of these differences, the Supreme Court did not want to apply the Inwood 1480 trademark standard for contributory infringement in the copyright case of Sony Corp. of America v Universal City Studios, Inc. 1481 The Supreme Court observed that in Inwood 1482 “a manufacturer or distributor could be held liable to the owner of a trademark if it intentionally induced a merchant down the chain of distribution to pass off its product as that of the trademark owner’s or if it continued to supply a product which could readily be passed off to a particular

1475

§ 1114(1)(b) Lanham Act included: “Under subsection (b) hereof, the registrant shall not be entitled to recover profits or damages unless the acts have been committed with knowledge that such imitation is intended to be used to cause confusion, or to cause mistake, or to deceive.” 15 USC § 1114, supra note 1426. 1476 Gershwin Publ’g Corp. v Columbia Artists Mgmt., Inc., 443 F.2d 1159, 1162 (2d Cir. 1971). 1477 Inwood Labs., Inc. v. Ives Labs., Inc. 456 U.S. 844, 854 (1982). 1478 Sony Corp. of America v Universal City Studios, Inc., 464 U.S. 417, 439 n.19 (1984). 1479 Id. An explanation is that the U.S. Constitution is referring to the promotion of works and inventions via the protection of copyright and patents, supra note 300, but not to trademark rights. 1480 Supra note 1477. 1481 Supra note 1478. 1482 Supra note 1477.

271 merchant whom it knew was mislabeling the product with the trademark owner’s mark.” 1483 In 2004, in UMG Recordings, Inc. v Bertelsmann AG, 1484 a copyright case, the question was raised how strong the causality must be between the defendant’s action and the infringement to hold that he attracted contributory liability. In this case, UMG, a record label, sued Bertelsmann, an investor in Napster, because it claimed this investor had assumed control over Napster’s operations and directed the infringing activities that gave rise to Napster’s liability. The court refused to dismiss the claims. 1485 One can argue that Bertelsmann attracted contributory liability on the contributory liability of Napster. The same can be said for vicarious liability: 1486 vicarious liability on the vicarious liability of Napster. One could speak of secondary liability to the second degree. In the 2003 and 2004 MGM Studios, Inc. v Grokster, Ltd. cases, the District Court 1487 and the Ninth Circuit 1488 respectively, concluded that Grokster was not liable for contributory or vicarious copyright infringement. The reason was that in contrast to the Napster case, 1489 Grokster “may have intentionally structured their businesses to avoid secondary liability for copyright infringement, while benefiting financially from the illicit draw of their wares,” 1490 by using a decentralised search index it did not control. Some U.S. senators, disappointed by the Ninth Circuit’s decision on Grokster, tried to make inducement a separate form of secondary infringement in the absence of control to directly prevent infringements. They drafted the Inducing Infringement of Copyrights Act, 1491 which would have been also applicable in case of trademark infringements. By amending § 501 of Title 17 of the U.S. Code, an interpretation of the term ‘intentionally induces’ was given: “intentionally aids, abets, induces, or procures, and intent may be shown by acts from which a reasonable person would find intent to induce infringement

1483

Supra note 1478. UMG Recordings, Inc. v Bertelsmann AG, 222 F.R.D. 408 (N.D. Cal. 2004). 1485 Eventually Bertelsmann and UMG settled the case. John Ottaviani, “The End is Near – Bertelsmann Settles EMI Claims Over Napster”, Eric Goldman Blog, March 28, 2007, available http://blog.ericgoldman.org/archives/2007/03/the_end_is_near.htm (accessed August 21, 2013). 1486 Vicarious liability will be explained in Chapter 7.2.2. 1487 MGM Studios, Inc. v Grokster, Ltd., 259 F. Supp. 2d 1029 (C.D. Cal. 2003). 1488 MGM Studios, Inc. v Grokster, Ltd., 380 F.3d 1154 (9th Cir. 2004). 1489 A&M Records, Inc. v. Napster, Inc., 239 F.3d 1004 (9th Cir. 2001). 1490 Supra note 1487, at 33 1491 Inducing Infringement of Copyrights Act of 2004 (S. 2560). 1484

272 based upon all relevant information about such acts then reasonably available to the actor, including whether the activity relies on infringement for its commercial viability.” 1492 The proposal was not accepted. In 2005 the Supreme Court made a final decision 1493 about whether Grokster had attracted intermediary liability: “[O]ne who distributes a device with the object of promoting its use to infringe copyright, as shown by clear expression or other affirmative steps taken to foster infringement, is liable for resulting acts of infringement by third parties.” 1494 Thus the Supreme Court overturned the Ninth Circuit’s decision. According to Reese, the Grokster test for contributory liability consists of two questions that both need to be answered affirmatively: 1495 Did the defendant take active steps or affirmative steps to, induce, promote, foster, encourage, stimulate, bring about, or cause, the infringement? Did the defendant act with intent, object or purpose? The defendant’s business model could be a complement, not the sole reason, to direct evidence in the establishment of intent to encourage infringement. 1496 If an OSP has attracted contributory or vicarious liability or induced the direct infringer to infringe, the safe harbour provisions do not apply. 1497 One can imagine social media providers contributorily liable for trademark infringement of the trademark logo, since social media providers do have the technology available to know who is engaging in trademark infringement and can actually prevent it (see Chapter 9 “Paradigm shift”).

Inducement As discussed above, in Inwood, 1498 there are two ways to render a third party liable for contributory liability in case of trademark infringement: 1492

Id. MGM Studios, Inc. v Grokster, Ltd., 545 U.S. 913 (2005). 1494 Id. 1495 Anthony Reese, The Relationship Between the ISP Safe Harbors and Liability for Inducement, 8 STAN. TECH. L. REV. 1, 43 (2011). 1496 Reese, id. 1497 The court said that “inducement liability and the Digital Millennium Copyright Act safe harbors are inherently contradictory. Inducement liability is based on active bad faith conduct aimed at promoting infringement; the statutory safe harbors are based on passive good faith conduct aimed at operating a legitimate internet business.” Columbia Pictures Indus., Inc. v Fung, No. CV 06-5578 SVW(JCx), 2009 WL 6355911 (C.D. Cal. Dec. 21, 2009). The Ninth Circuit was scheduled to hear argument in the appeal from the District Court’s decision on May 6, 2011, at 8. 1498 Inwood Labs., Inc. v. Ives Labs., Inc. 456 U.S. 844, 854 (1982). 1493

273 - when a party induces another to infringe a trademark; - when a party continues its service where he knows or has reason to know that the other party is engaging in trademark infringement. Inducement, as one of the bases for contributory liability has been recognised in case law. In the 1971 case Gershwin Publishing Corp. v Columbia Artists Management, Inc. 1499 the court stated: “[O]ne who, with knowledge of the infringing activity, induces, causes or materially contributes to the infringing conduct of another, may be held liable as a ‘contributory’ infringer.” One can argue that Google Images induces internet users to copy and paste protected copyright pictures and protected trademark logos thumbnails. The only guidance Google Images is giving is: “Images might be subject to copyright.” There is no mention of trademark rights. There is no reason why Google has to make copy-andpastable copies of all protected copyright pictures and trademark logos, even bigger than the original and with the same resolution. This goes further than Kelly v Arriba Soft Corporation1500 and Perfect 10 v. Google, Inc., et al. 1501 (as was already discussed in Chapter 1 “Introduction III iii”). In 2005 in the EU, a directive called Intellectual Property Rights Enforcement Directive 2 (IPRED2) 1502 was proposed to supplement IPRED1 1503 of 2004, to no avail. The draft included Article 3: “Member States shall ensure that all intentional infringements of an intellectual property right on a commercial scale, and attempting, aiding or abetting and inciting such infringements, are treated as criminal offences.” 1504 Here too, the idea was to make this form of inducement independent from other forms of secondary liability for internet intermediaries as laid down in the Articles 12 to 15 ECommerce Directive. 1505

1499

Supra note 1476, 18. Kelly v. Arriba Soft Corp. (280 F.3d 934 (CA9 2002) withdrawn, re-filed at 336 F.3d 811 (CA9 2003)). 1501 Perfect 10 v Google, Inc., et al. 416 F. Supp. 2d 828 (C.D. Cal. 2006). 1502 IPRED2, Proposal for a European Parliament And Council Directive on criminal measures aimed at ensuring the enforcement of intellectual property rights, July 12, 2005. 1503 Directive 2004/48/EC of the European Parliament and of the Council of 29 April 2004 on the enforcement of intellectual property rights (Enforcement Directive). 1504 Supra note 1502. 1505 Supra note 5. 1500

274 An important aspect of inducement is that there needs to be intent to cause another to violate the right. This element might be difficult to prove.

Chapter 7.2.2 Vicarious liability Vicarious liability attaches to one who “has the right and ability to supervise the infringing activity and also has a direct financial interest in such activities.” 1506 One can argue that if social media is profiting from infringing activities by internet users, because they attract more internet users and therefore more revenue streams based on advertising and data-mining, it is not difficult to prove the right and ability to supervise this infringing activity. Especially now that social media provide the technical means to infringe, while they also can use their technological skills to prevent content infringements on a massive scale (see Chapter 9 “Paradigm shift”). The DMCA explicitly states vicarious liability, receiving financial benefit and having control over the infringing activity, 1507 as a reason to exclude the limitation of secondary liability for copyright infringement. In contrast, in the Lanham Act vicarious liability is not mentioned. Coleman wrote that “the Supreme Court has not articulated a standard for finding vicarious liability for trademark infringement” 1508 However, the federal courts have developed two doctrines for vicarious liability that can be relevant trademark infringements: - doctrine of the application of agency principles to parties involved in trademark infringement; 1509 - doctrine of the joint tortfeasor liability; 1510

Agency doctrine In 1994, in Am. Tel. & Tel. Co. v Winback & Conserve Program Inc., the Third Circuit held that the sales representatives (agents) of one of AT&T’s resellers Winback & Conserve Program, Inc. (principal) were directly infringing AT&T’s trademarks. Because 1506

Supra note 1476. § 512(c)(1)(B) DMCA, supra note 5. 1508 Jane Coleman, “III. Vicarious Trademark Infringement: A. In General, Secondary Trademark Infringement”, available at: http://www.secondarytrademarkinfringement.com/?p=105 (accessed August 21, 2013). 1509 Am. Tel. & Tel. Co. v Winback & Conserve Program Inc., 42 F.3d 1421, 1437 (3d Cir. 1994). 1510 David Berg & Co. v Gatto Int’l Trading Co., 884 F2d 306, 311 (7th Cir. 1989). 1507

275 there was apparent authority between Winback & Conserve Program and its sales representatives, the common law principles of agency could be applied. The Third Circuit held that the “applicability of common law doctrines in litigation under federal statutes depends on whether those principles advance the goal of the particular federal statute which plaintiffs allege has been violated.” 1511 The Lanham Act derived from tort common law, therefore “it is self-evident that application of at least some tort concepts of liability will ‘advance the goals of [the Lanham Act].” 1512 “The only feasible way for AT&T to assert its federal rights, would be to sue the principal, who, if an agency relationship is established, is able to exercise at least some control over its agents, who authorized the sales representatives to enter into contracts on its behalf, and who receives direct financial benefits from those contracts.” 1513 A more recent case of 2001 is Fare Deals, Ltd. v World Choice Travel.com, Inc. 1514 which follows the same reasoning.

Joint tortfeaser liability In 1984, in David Berg & Co. v Gatto Int’l Trading Co., 1515 a manufacturer of processed meat David Berg agreed with distributor Gatto to sell him substandard meat, that the distributor was supposed to sell outside of the U.S. without using Berg’s trademark. The distributor Gatto sold the substandard meat to Lake Erie Food Sales, Inc., who sold the substandard meat partly in the U.S. and also used the Berg trademark in advertisements. Berg not only sued Lake Erie but also Gatto arguing that the distributor had formed a partnership with the seller Lake Erie. The Seventh Circuit held that “[b]ecause unfair competition and trademark infringement are tortious, the doctrine of joint tortfeasors does apply.” 1516 However, based on findings of fact, including the lack of any partnership agreement, “that there was no evidence that Gatto and Lake Erie had any type of partnership agreement, that they held themselves out to the public or operated as a 1511

Supra note 1509, at 1429, citing Petro-Tech, Inc. v Western Co. of North America, 824 F.2d 1349, 1356 (3d Cir. 1987). 1512 Supra note 1509, at 1433, citing Petro-Tech, Inc. v Western Co. of North America, 824 F.2d at 1356. 1513 Supra note 1509, at 1434. 1514 Fare Deals, Ltd. v World Choice Travel.com, Inc. 180 F.Supp.2d 678, 684 (D.Md. 2001). 1515 Supra note 1510. 1516 Id., at 311.

276 partnership, that either had authority to bind the other in any transaction with any third party, or that they exercised joint ownership of, or control over, the meat products after they were sold to Lake Erie.” 1517 The E-Commerce Directive 1518 contains no vicarious liability provision. It is left to member states’ legislation whether vicarious liability can be used to derogate the exemptions of intermediary liability under the E-Commerce Directive. 1519

Chapter 7.3 Weakening incentives of social media to filter This section will first explain why market forces are either preventing social media to protect and enforce trademark logos or stifle the right to freedom of expression (Chapter 7.3.1). Trademark holders face considerable challenges when they pursue direct infringers; i.e. the internet users. Therefore they often pursue social media providers instead (Chapter 7.3.2). There are effective methods to incentivise OSPs to play a constructive role to keep their walled gardens clean of content infringements: via the bargaining power of the trademark holders (Chapter 7.3.3); or less effective methods, such as self-regulation between OSPs and trademark holders (Chapter 7.3.4); or a method that solves the problem in its entirety: legislation that abolishes the safe harbour provisions and establishes instead strict liability (Chapter 7.3.5).

Chapter 7.3.1 Market forces Attractiveness over accountability Due to the network effects, 1520 it is in the interest of social media providers to have as many internet users as possible, because then the value of the advertisements they sell increases and they will be able to mine and sell more behavioural data from the internet users. There is nothing immoral about the ambition of a social media provider to become as attractive as possible in the eyes of the internet users. However, this changes where social media impose insufficient restrictions to internet users, at the expense of trademark holders. 1517

Id. Supra note 5. 1519 Id. 1520 Arun Sundararajan, An Overview of Network Effects, NYU Stern School of Business, 2006, available at: http://oz.stern.nyu.edu/io/network.html (accessed August 21, 2013). 1518

277 One cannot avoid the impression that the internal emails between the founders of YouTube that emerged during Viacom International, Inc. v YouTube, Inc. 1521 are indicative of the temptations social media providers face. Once the founders of YouTube had to choose on the one hand between monitoring proactively and subsequently removing infringing content from their servers or on the other hand leaving infringing content on their servers as long as possible so that the popularity of their service would increase with internet users under the cover of the safe harbour provisions. As especially co-founder Chen’s reasoning demonstrates, he made a calculated risk and clearly choose for the latter option: “[In] a July 4, 2005 e-mail exchange, YouTube founder Chad Hurley sent an e-mail to his co-founders Steve Chen and Jawed Karim with the subject line “budlight commercials,” and stated: “we need to reject these too.” [Hurley wanted to reject the takedown request by Anheuser-Busch, because of the use of Budweiser Light] Steve Chen responded, “can we please leave these in a bit longer? another week or two can’t hurt.” Karim also replied, indicating that he “added back in all 28 bud videos.” Similarly, in an August 9, 2005 e-mail exchange, Hurley urged his colleagues “to start being diligent about rejecting copyrighted / inappropriate content,” noting that “there is a cnn clip of the shuttle clip on the site today, if the boys from Turner would come to the site, they might be pissed?” Again, Chen resisted: “but we should just keep that stuff on the site. i really don’t see what will happen. what? someone from cnn sees it? he happens to be someone with power? he happens to want to take it down right away. he gets in touch with cnn legal. 2 weeks later, we get a cease & desist letter. we take the video down.” And again, Karim agreed, indicating that “the CNN space shuttle clip, I like. we can remove it once we’re bigger and better known, but for now that clip is fine.” 1522 However, the Second Circuit was not sure whether these clips mentioned in the emails were part of the current clips-in-suit. 1523 The Second Circuit made clear that although “the willful blindness doctrine may be applied, in appropriate circumstances, to demonstrate knowledge or awareness of specific instances of infringement under the DMCA,” 1524 it apparently did not consider the emails as evidence of wilful blindness. 1521

Viacom International, Inc., v. YouTube, Inc., 10-3270-cv, 2012 WL 1130851 (2d Cir. April 5, 2012). Id., at 21. 1523 Id., at 22. 1524 Id. 1522

278 Besides, the “DMCA safe harbor protection cannot be conditioned on affirmative monitoring by a service provider.” 1525 The Second Circuit concluded that the District Court correctly held that the safe harbour provisions require knowledge or awareness of specific infringing activity, but it vacated the order granting summary judgment because “a reasonable jury would find that YouTube had actual knowledge or awareness of specific infringing activity on its website.” 1526 However, when it was remanded to the District Court, it rejected the notion that YouTube exhibited willful blindness or had the ability to control infringing activity or “interacted with infringing users to a point where it might be said to have participated in their infringing activity.” 1527 It held that the burden of proof remained on Viacom, rejecting its “ingenious” yet “extravagant” argument that YouTube did not deserve the safe harbour, and should instead monitor the contents of videos being uploaded at a rate of more than 24 hours of viewing time per minute. 1528 It is very probable that Viacom will appeal also this latest decision.

Excessive yielding to complainants Some social media want to avoid any conflict by trademark holders and either let them remove content manually or automatically after any request by complainants, without checking whether the complainants are authorised by the right holders and whether removal or disabling of access is really needed. This can have serious chilling effects to the right to freedom of expression. Uncritical removal of mistaken or bad faith complaints 1529 has nothing to do with filtering, which is distinguishing infringing from non-infringing material. In 2004 the Dutch organisation Bits of Freedom uploaded a work of the famous Dutch writer Multatuli 1530 from 1871, which was reprinted in 1981, with the explicit disclaimer that it is in the public domain, to ten Dutch OSPs. Subsequently Bits of

1525

Id., at 23. Id., at 9. 1527 Supra note 1473. 1528 Id. 1529 Timothy Lee, “Warner Bros: we issued takedowns for files we never saw, didn't own copyright to”, Ars Technica, November 10, 2011, available at: http://arstechnica.com/tech-policy/news/2011/11/warneradmits-it-issues-takedowns-for-files-it-hasnt-looked-at.ars (accessed August 21, 2013). 1530 Multatuli is in the Netherlands the well known pseudonym of Eduard Douwes Dekker, and ranks number one as the greatest Dutch writer of classical literature. Literaire canon, Wikipedia. 1526

279 Freedom let a fake copyright holder request the OSPs to take down the work, which resulted in 7 out of 10 OSPs taking down the allegedly infringing material. 1531 Urban and Quilter investigated the DMCA notice and takedown procedures and found that 9 percent of all complaints were statutorily insufficient, 30 percent of DMCA notices appeared to present an obvious question for courts, and that no less than 57 percent of DMCA notices referred to competitors. 1532 This can have serious chilling effects to the freedom of expression.

Chapter 7.3.2 Challenges to enforce trademarks rights against direct infringers For practical reasons trademark holders forgo suing the direct infringers which are the internet users that uploaded infringing material: the internet user cannot be traced, or if this is possible, he might not be in a jurisdiction where the trademark holder likes to litigate, or he might not have enough financial resources to compensate for the damages. In case of social media, the identity is hard to verify since most social media do not have a real identity policy, and if they do, the execution of the policy might not be very reliable. 1533 And privacy legislation and an unwillingness to share customer information may make it difficult but not necessarily impossible. 1534 Last but not least, one can argue it is not conducive to sue one’s current or potential customers. As Hugenholtz and Koelman point out: this can lead to situations where the trademark holder cannot protect its rights effectively. 1535

1531

Sjoera Nas, “The Multatuli Project, ISP Notice & take down”, Bits of Freedom, October 27, 2004, available at: http://www.bof.nl/docs/researchpaperSANE.pdf (accessed August 21, 2013). 1532 Jennifer M. Urban & Laura Quilter, Efficient Process or Chilling Effects - Takedown Notices under Section 512 of the Digital Millennium Copyright Act, 22 SANTA CLARA COMPUTER & HIGH TECH. L.J. 621 (2005). 1533 Even if social media have a real name requirement, such as Facebook does, it does not necessarily mean that the execution of the policy is not flawed. Protalinski, supra note 526. 1534 After an exigent circumstances information request, because a New Zealand boy put a message on his fake Texas Facebook page that he would start a killing spree in Texas, Facebook responded and investigators traced the IP address back to an ISP out of Auckland within eight minutes. “NZ teen’s Facebook threat sparks US alarm”, Stuff.co.nz, November 5, 2011, available at: http://www.stuff.co.nz/national/5914950/NZ-teens-Facebook-threat-sparks-US-alarm (accessed August 21, 2013). 1535 “The intermediary may escape liability because the requirements of the liability limitations are fulfilled, whereas the actual infringer cannot be held accountable simply because his identity is unknown,” Hugenholtz & Koelman, supra note 1451, at 31.

280 Because social media are traceable and have financial means, they are frequently sued by trademark holders in different jurisdictions. This adds to the legal uncertainty for social media providers. An interesting development that might be beneficial for trademark holders to go after the direct infringers is to serve them a summons via social media. In Federal Trade Commission v PCCARE247 INC., et al., 1536 the U.S. District Court of the Southern District of New York allowed the Federal Trade Commission (FCC) to serve documents through email to five India based defendants. “For the sake of thoroughness, however, the FTC also proposes to serve the defendants by means of Facebook.” 1537 If defendants only serve via Facebook the question is whether due process was followed. The condition that the Facebook accounts actually were operated by defendants was met, and a likelihood could be demonstrated that service by Facebook message would reach the defendants. 1538 Prior to Federal Trade Commission v PCCARE247 INC., et al., 1539 Jeff Leach, state representative of Texas, introduced Bill HB 1989, 1540 that proposed Texas courts approve substituted service via social media. The conditions are that the court finds that the defendant could be reasonably expected to receive actual notice, that there is confirmation that the account is authentic and that the defendant regularly uses it. 1541 However, one of the challenges is that it is difficult to establish that a social media account is genuine. As already pointed out, even social media with a real name policy, such as Facebook, have problems enforcing it. 1542 Despite these challenges, serving a suit via social media seems promising, especially if they have the functionality to notify a receipt of the message, as for example Facebook provides. In case of service of suits, Facebook could switch off the possibility for users to avoid sidestepping the “receipts read” functionality. 1543

1536

Federal Trade Commission v PCCARE247 Inc., Case 1:12-cv-07189-PAE Document 87, March 7, 2013. 1537 Id., at 8. 1538 Id., at 9. 1539 Id. 1540 Bill HB 1989, filed February 27, 2013. 1541 If accepted Bill HB 1989, would take effective on September 1, 2013. 1542 Protalinski, supra note 526. 1543 Jason Cipriani, “Stop Facebook from marking messages as ‘Seen’”, CNET, August 21, 2012, available at: http://howto.cnet.com/8301-11310_39-57497485-285/stop-facebook-from-marking-messages-as-seen/ (accessed August 21, 2013).

281 Chapter 7.3.3 Bargaining power of trademark holders In theory trademark holders are more powerful than social media, because of the business model of social media providers that depends on selling advertisements and data mined from internet users’ behaviour to the trademark holders. In practice, however, trademark holders are divided, 1544 they seem to lack empathy for trademark holders in different industries, and if they are competing in the same industry, they often do not want to cooperate. However, the dominance of the social media in combination with the legal lag, to paraphrase Veblen, 1545 necessitates trademark holders to unite. With legal lag this thesis means technologies and business models develop faster than the law can catch up with these developments. One of the important developments is that the filtering of servers is becoming cost-efficient. One can compare it to scanning an anti-virus programme. A proactive filter system that automatically enforces infringed content, would save social media providers and trademark holders the trouble of continuing a never ending stream of notice and takedown procedures and avoid legal conflicts with trademark holders and internet users that result in costly litigation (see Chapter 9 “Paradigm shift”). In short: filtering can prevent this conflict and increase legal certainty for social media providers, trademark holders and internet users. One can also consider a reciprocal connection. Trademark holders unharmed by the legal conflicts have more budget to invest in advertising and behavioural data of internet users. This can benefit social media. The inverse is also true: if trademarks are hurt on social media, capital is destroyed and the capacity to safely advertise on social media will diminish and will stimulate trademark holders to bundle their forces or find alternative avenues to advertise.

1544

One of the trademark holders’ leaders, who wants to remain anonymous, described them as divided as loose sand. 1545 Veblen contributed heavily to the theory of cultural lag, that institutions are looking backwards, while technology is oriented toward change. VEBLEN, supra note 40, at 191, 195.

282 Chapter 7.3.4 Self regulation Self regulation seems preferable from a perspective of the principle of freedom of self-determination. Avoiding legal conflicts is in all stakeholders’ interest. A consortium of thirteen companies, copyright owners and OSPs (Content User Generated Services) supports the rather conservative “Principles for User Generated Content Services” 1546 to improve filter technology and remove infringing content. Article 13 clarifies that the principles do not “support disqualification from any limitation on direct 1547 or indirect liability relating to material online under the Copyright Act or substantively similar status of any applicable jurisdiction outside the United States.” Therefore, unfortunately this consortium will not be the catalyst for an improvement of the status-quo. In Hong Kong, the government has set up a tripartite forum of OSPs, copyright holders and internet users to come up with a voluntary framework to prevent the unauthorised copying and dissemination of electronically stored products. 1548 Unfortunately, it did not work. The same problems can arise in a tripartite forum of OSPs, trademark holders and internet users. Because of the asymmetric distribution of power, OSPs are not inclined to change the status quo. Francis Gurry, Director General of WIPO realised that the problem of multilateralism is that it is a slow process of reaching agreements that will not catch up with the exponential speed of technology’s development. Mr Gurry asked the rhetorical question whether treaties can bring about social change just as Facebook, Twitter and other social media. His answer: “No, it is a technology which has enabled an international change of behaviour. Whether that change of behaviour is good or bad is a different question. But the method has been a platform. So what I think we are seeing is the emergence of an increasing number of public private partnerships using platforms to try

1546

October 18, 2007 Principles for User Generated Content Services was founded, available at: http://www.ugcprinciples.com/ (accessed August 21, 2013). 1547 Remarkably, Article 13 of the Principles states “direct liability”. As becomes clear in Chapter 6.2, there is no limitation for direct liability. 1548 Tripartite Forum for Drawing up a Code of Practice for Online Service Providers in Protecting Copyright in the Digital Environment Analysis of Possible Cooperative Items, TF Paper No. 5/2008 (September 12, 2008), available at: http://www.inmediahk.net/files/t%20forum.pdf (accessed August 21, 2013).

283 to achieve policy outcomes that once we may have tried to achieve through a treaty.” 1549 Public private partnerships using platforms seems a logical step forward in organic cooperation and self-regulation but so far it remains elusive.

Chapter 7.3.5 Legislation After more than a decade after the safe harbour provisions were implemented in the U.S. and EU, respectively, one can determine that the objectives of the U.S. Congress and EU Parliament and Council, to develop electronic commerce have been successful. However, one can argue that this is not because of the safe harbour provisions, but despite of it. 1550 The effects of the safe harbour provisions include that social media providers are incentivised to filter content infringements passively and act only reactively after a formal notice and takedown request. This has led to a flood of legal conflicts between trademark holders and social media providers, which causes social media providers to further entrench into their passivity and reactionary behaviour in order to comply with the safe harbour provisions, and which on its turn leads to more legal actions by trademark holders against social media providers and internet users. In order to break this vicious circle this thesis proposes to abolish the safe harbour provisions, so that the concomitant impediments to pro-active filtering must yield.

Chapter 7.4 Seminal cases Before the introduction of safe harbour provisions, case law did not clarify much about intermediary liability. 1551 The advent of the safe harbour provisions in the Lanham Act and E-Commerce Directive 1552 did not really change the capriciousness of case law.

1549

Francis Gurry, Interview carried out on the occasion of the lecture: Changing International Landscape of Innovation and Intellectual Property (14 December 2010), starting at 10:26, http://www.youtube.com/watch?v=h3uRGkkf56o (accessed August 21, 2013). 1550 The causal link between the development of e-commerce and the existence of safe harbour rules can be doubted. In Hong Kong there are no safe harbor rules, and nevertheless, here too e-commerce seems to prosper. Professor Michael Pendleton, during a lecture on digital intellectual property rights, Chinese University of Hong Kong, Graduate Law Centre, Central, November 3, 2010. 1551 Even before the DMCA there was controversy over ISP liability: Playboy Enters., Inc. v. Frena, 839 F. Supp. 1552, 1556 (M.D. Fla. 1993) where the court ruled that the service provider was liable and Religious Tech. Ctr. v. Netcom, Inc., 907 F. Supp. 1361, 1372 (N.D. Cal. 1995), where the court did not find the ISP liable. 1552 Supra note 5.

284 This has been illustrated by comparable cases between trademark holders and internet auction eBay in different jurisdictions which have resulted in opposite rulings. This demonstrates a lack of international consensus on the duty of care of the internet intermediary hosting content uploaded by third parties and whether the safe harbour provisions apply to exempt the internet intermediary from secondary liability. In the U.S., Tiffany, Inc. v eBay, Inc. was won by eBay in first instance 1553 and on appeal, 1554 while in France both Hermès 1555 and LVMH 1556 won cases in first instance against eBay. But in Belgium Lancôme lost from eBay. 1557 First an overview will be provided of these seminal cases. Then an explanation will be given why the rulings of the U.S and French courts, and French courts and Belgian court have resulted in diametrically different outcomes. After that some salient CJEU cases that can shine a light on the matter of intermediary liability; L'Oréal and Others and Google France and Google will be explored. The jurisprudence shows that courts narrowly interpret actual knowledge, but broadly interpret neutrality of the OSPs, so that they fall within the liability exemption.

Chapter 7.4.1 Tiffany, Inc. v eBay, Inc. In Tiffany, Inc. v eBay, Inc., 1558 in which Tiffany sued the internet auction eBay for trademark infringement, trademark dilution and false advertising based on its allegations that eBay was selling counterfeit Tiffany merchandise. The U.S. court found that when eBay was informed that infringing goods were posted on its site, it immediately worked to remove the seller from its site. According to the court it is the trademark holder’s burden to police its mark, and companies like eBay cannot be held liable for trademark infringement based solely on their general knowledge that trademark infringement might be occurring on their websites. Goldwasser concluded that therefore

1553

Tiffany Inc. v eBay, Inc., 576 F. Supp. 2d 463, 527 (S.D.N.Y. 2008). Supra note 1465. The Second Circuit ruled in favour of the service provider. 1555 Hermès v eBay; Tribunaux de grande instance (court of first instance) Troyes, June 4, 2008, 14 (Fr.). 1556 LVMH v eBay, Tribunal de commerce [commercial court] Paris, 1ere ch. B, June 30, 2008, No. 2006077799, 1 (Fr.). 1557 Lancôme v eBay, Tribunal de commerce, Brussels, July 31, 2008, No. A/07/06032, 1-3. 1558 Supra note 1553. 1554

285 eBay is not required to take pre-emptive measures to remove possible or anticipated infringing products. 1559

Chapter 7.4.2 Hermès v eBay France, as a member of the EU, implemented the E-Commerce Directive in its national law. 1560 Article 14 E-Commerce Directive 1561 states that an information society service is not liable provided that the host site “does not have actual knowledge of illegal activity or information ... or ... upon obtaining such knowledge or awareness, acts expeditiously to remove or to disable access to the information.” However, in 2008 in Hermès v eBay, 1562 the French court held that eBay is not just hosting, but “provides tools, permitting to market the sold goods to the sellers, organise object presentation on their site ... and create functioning rules and architecture of their auction service, [and] must be considered as authors of on-line communication services for intermediation purposes.” 1563 As an “author” of online services eBay should police its own site according to the High Court of Troyes. eBay should “ask the sellers who specify in their ads the sold merchandise identification means (product reference, serial number, type number, certificate of authenticity, etc.) by any means and post the references, obtained in this way in clearly legible print, absence of knowledge of such elements or lack of response.” 1564 Because eBay was not considered just an host, but an “author” it should have taken pre-emptive measures to protect itself from contributory liability. Therefore the court ordered eBay to pay Hermès 20,000 euro for the sale of three counterfeit bags. 1565

1559

Kate Goldwasser, Knock it off: An Analysis Of Trademark Counterfeit Goods Regulation In The United States, France, And Belgium, 18 CARDOZO J. INT’L & COMP. L. 207, 220 (2010). 1560 Section 6 Law for Confidence in the Digital Economy Law, No. 2004-575 of June 21, 2004, Journal Officiel de la Republique Francaise, June 22, 2004, at 11168. 1561 Article 14 E-Commerce Directive, supra note 5. 1562 Hermès v eBay, Troyes High Court (June 4, 2008), Docket No. 06/0264. 1563 Id. 1564 Id. 1565 Dan Goodin, “French court fines eBay for sale of counterfeit handbags”, The Register June 5, 2008, http://www.theregister.co.uk/2008/06/05/ebay_counterfeit_ruling/ (accessed August 21, 2013).

286 Chapter 7.4.3 LVMH v eBay In three cases, which are called LVMH v eBay by some scholars, because LVMH or one or more of its companies were the plaintiffs: in 2008 the Paris Court of Commerce; 1566 in 2010 the Paris Court of Appeal, 1567 and in 2012 the French Supreme Court, 1568 confirmed that eBay failed to carry out its duty to ensure that its activity does not generate illegal acts harming other economic operators. It also confirmed eBay’s willingness to accept clearly illegal listings on all its sites which encourage infringement. eBay bought misspelled versions of Louis Vuitton as keyword for Google and Yahoo that triggered advertisements to counterfeit brands of LVMH. Therefore the French courts held that eBay was not merely hosting, but also brokering and therefore does not qualify for the safe harbour exception of Article 6.1.2 Law Number 2004-575 on the confidence of the digital economy, 1569 which is France’s implementation of Article 14(1) ECommerce Directive. eBay was held to be a major participant in the sales on its sites and played a very active role, in particular in commercial campaigns meant to increase the number of transactions. The French court came to the conclusion that eBay, despite its Verified Rights Owners (VeRO) programme “deliberately refused to establish sufficient and appropriate means to fight against counterfeiting.” Therefore the immunity for hosting 1566

Parfums Christian Dior et autres / eBay Inc, eBay International AG, Tribunal de commerce de Paris 1ère chambre B Jugement du 30 juin 2008. Louis Vuitton Malletier / eBay Inc., eBay International AG, Tribunal de commerce de Paris 1ère chambre B Jugement du 30 juin 2008. Christian Dior Couture / eBay Inc., eBay International AG, Tribunal de commerce de Paris 1ère chambre B Jugement du 30 juin 2008. 1567 eBay / Parfums Christian Dior, Kenzo Parfums, Parfums Givenchy, Guerlain, Cour d’appel de Paris Pôle 5, chambre 2 Arrêt du 03 septembre 2010. eBay Inc et eBay International AG / Louis Vuitton Malletier, Cour d’appel de Paris Pôle 5, chambre 2 Arrêt du 03 septembre 2010. eBay Inc, eBay International / Christian Dior Couture, Cour d’appel de Paris Pôle 5, chambre 2 Arrêt du 3 septembre 2010. 1568 eBay Inc., eBay International / LVMH et autres, Cour de cassation Chambre commerciale, financière et économique Arrêt du 3 mai 2012. eBay Inc., eBay International / Louis Vuitton Malletier, Cour de cassation Chambre commerciale, financière et économique Arrêt du 3 mai 2012. eBay Inc., eBay International / Christian Dior Couture, Cour de cassation Chambre commerciale, financière et économique Arrêt du 3 mai 2012. 1569 Article 6.2. Law number 2004-575 of June 21, 2004, on the confidence of the digitial economy: “Natural or legal persons who host even free of charge, for the provision of public services by public communication online, storing signals, writing, images, sounds or messages of any kind provided by recipients of those services, can not be held civilly liable as a result of activities or information stored at the request of a recipient of services, if the provider did not have actual knowledge of the illicit nature or of facts and circumstances showing that character, and from the time when they had this knowledge, they acted promptly to remove the data or make access impossible. The preceding paragraph does not apply when the recipient of the service is acting under the authority or control of the person referred to in that paragraph.”

287 does not apply. Just as in Hermès v eBay, 1570 the court suggested concrete methods to remove counterfeit goods eBay should have used, including “obliging the sellers to provide ... a certificate of authenticity of the products ... punishing any seller of counterfeit merchandise by permanently closing their accounts upon first violation, and immediately withdrawing illegal advertising, reported by LVMH.” 1571 So the internet intermediary needs to prove that it implemented pre-emptive measures in order to avoid contributory liability for trademark infringement.

Chapter 7.4.5 Lancôme v eBay In 2008 in Lancôme v eBay, 1572 the Belgian court found that eBay acted merely as a host for the advertisements on its site. Despite Lancôme’s argument that eBay was utilising the advertisements. eBay argued successfully that it had no control over the advertisements. The court held that eBay fell under the safe harbour provisions of the Belgian law 1573 implementing Article 14 E-Commerce Directive and that it did not have the obligation to monitor the information it was hosting and did not have to actively search for illegal counterfeiting activities of its users. Belgium is like France a member of the EU. But the outcome by the Belgian court was diametrically different from the French courts. So why are the outcomes different? In Tiffany the U.S. court held that eBay was just a hosting site that only had general knowledge and no actual knowledge of infringed trademarks. Therefore it had no affirmative duty to search for counterfeit goods. In the French cases Hermès and LVMH, eBay was not found to be a host, and therefore generalised knowledge was sufficient to establish contributory liability, because eBay did not adhere to its affirmative duty as an “author” of content to search for counterfeit goods. The safe harbour provisions of the E-Commerce Directive have been implemented in both France and Belgium. However in Lancôme the Belgian court decided that eBay was merely a host, and therefore it needed to be proven that it had 1570

Supra note 1562. eBay Inc., eBay International / LVMH et autres, Cour de cassation Chambre commerciale, financière et économique Arrêt du 3 mai 2012. 1572 Lancôme Parfums et Beaute v eBay Int’l AG, Tribunal de Commerce de Bruxelles, July 31, 2008. 1573 Article 20 Loi sur certains aspects juridiques des services de la société de l’information – Wet betreffende bepaalde juridische aspecten van de diensten van de informatiemaatschappij, MB 17 March 2003. 1571

288 actual knowledge of infringing material on its site. As pointed out in Chapter 7.2 actual knowledge of infringement is a key issue to determine whether a host is liable.

CJEU cases

Chapter 7.4.6 L’Oréal and Others In L'Oréal and Others 1574 the CJEU decided that Article 14(1) E-Commerce Directive 1575 could be applied: the operator of an online marketplace has not played an active role, has no knowledge nor control of the data stored. Therefore the operator of the online marketplace could not be held liable as long as he will expeditiously remove or disable access to infringing content when the trademark holder has made him aware of this. However, the CJEU made clear that the operator plays an active role when he “has provided assistance which entails, in particular, optimising the presentation of the offers for sale in question or promoting those offers.” 1576 In such a case he cannot rely on the exemption from secondary liability.

Chapter 7.4.7 Google France and Google Google offered the possibility to not just select keywords, which correspond to the trademark Louis Vuitton or LV, but also in combination with words such as ‘imitation’ and ‘copy’, which triggered the advertisement of a counterfeiter. 1577 However, in 2010 in Google France and Google 1578 the CJEU held that Google did not use the trademark in the course of trade. This is questionable since Google is applying AdWords Broad Match, 1579 which means that the AdWords system automatically runs advertisements on variations of the advertiser’s keywords, even if these words are not in the keyword list the advertiser selected. One can argue that where Google suggests alternative trademarks as keywords, Google no longer is merely a host of third party

1574

L’Oréal and Others, supra note 230. Supra note 5. 1576 L’Oréal and Others, supra note 230, para. 116 1577 Google France and Google, supra note 230, para. 29. 1578 Id. 1579 Google AdWords Broad Match explanatory, available here: http://support.google.com/adwords/bin/answer.py?hl=en&answer=6136 (accessed August 21, 2013). 1575

289 content, and therefore the exemption of secondary liability under the safe harbour provisions should not apply. Recital 42 of the preamble to E-Commerce Directive 1580 makes clear that the exemptions from liability established in that Directive cover only cases in which the activity of the OSP is “of a mere technical, automatic and passive nature,” which implies that the OSP “has neither knowledge of, nor control over the information which is transmitted or stored.” 1581 Google probably used an algorithm that maximises the impressions and conversion of the keywords. eBay had a similar system that bought keywords that trigger advertisements based on keywords people type into Google. When keywords such as ‘imitation’ and ‘copy’ are suggested by Google, 1582 the reference service should be vicariously liable under U.S. law since Google has the control 1583 over the infringing activity and a direct financial interest in such activities. However, the CJEU left the decision whether Google was neutral or not to the national courts. 1584

Chapter 7.5 To what extent have social media an obligation to monitor “Who will guard the guardians?” 1585 A pressing question for social media providers, legislators and scholars, is to what extent should OSPs implement and operate filtering and control mechanisms? 1586 If OSPs fail to monitor would they be held liable to comply with a duty of care? And if they have a filtering system in place, but fail to remove infringing material, is it considered that 1580

Supra note 5. Id. 1582 Google France and Google, supra note 230, para 101. 1583 The question is also whether Google had control over the keywords African Slaves it suggested to eBay in 2005. eBay had automatically bought the keywords African Slaves from Google, which automatically triggered the sponsored link “African Slaves for Sale, eBay.co.uk, Low Prices! Big Selection!” Lester Haines, “Need an African slave? Try eBay. Low Prices! Big Selection!”, The Register, available at: http://www.theregister.co.uk/2005/01/24/ebay_african_slaves/ (accessed August 21, 2013). 1584 Google France and Google, supra note 230, para. 119. 1585 “[Q]uis custodiet ipsos custodes?” JUVENAL, SATIRE VI (around 115 AD) (G.G. Ramsey, transl. 1918), lines 347–8. 1586 Boyden: “There is thus no hard-and-fast rule in tort law or in copyright law what level of specificity is required to obligate an ISP to take action.” Bruce E. Boyden, Viacom International Inc., Comedy Partners, Country Music Television, Inc., Paramount Pictures Corporation, Black Entertainment Television LLC, Brief of Amici Curiae Intellectual Property Law Professors in Support of Plaintiffs-appellants and Urging Reversal, December 10, 2010, available at: http://news.viacom.com/pdf/2010-12-10IP_Law_profs_Boyden_et_al.pdf (accessed August 21, 2013). 1581

290 they should have been able to identify that material? 1587 Or if some infringements are found, is there an obligation to prevent “similar” infringements of the same trademark? Schellekens argued that social media providers’ resistance against filtering content infringements is caused by a fear that if they start filtering to protect content holders, more parties will demand them to filter, “making the social media slide down to the bottom.” 1588

U.S. The level of the duty of care of OSPs in case of trademark infringement is unclear. The safe harbour provisions of the Lanham Act do not give any guidance. However, the Second Circuit in Tiffany Inc. v eBay, Inc. 1589 makes clear that even though eBay knew as a general matter that infringement of the Tiffany trademark took place at its site, this knowledge is insufficient to trigger liability under Inwood. 1590 Only when eBay would have intentionally shielding itself from discovering specific infringements, it would probably trigger secondary liability. 1591 Until there are statutory rules on the duty of care of OSPs to avoid intermediary liability in case of trademark infringements, one can look at the duty of care in the DMCA as a guidance: § 512(m)(1) DMCA states that service providers do not have any obligation to provide monitoring its service or affirmatively seeking facts indicating infringing activity, except to the extent consistent with a standard technical measure complying with the provisions of § 512(i) DMCA. In other words: “§ 512(m) is incompatible with a broad common law duty to monitor or otherwise seek out infringing activity based on general awareness that infringement may be occurring.” 1592 OSPs are eligible for the liability limitations if they adopt and implement a filter system that is conform the standard technical measures of § 512(i)(2):

1587

Kamiel Koelman and Rosa Julià-Barceló, Intermediary Liability In The E-Commerce Directive: So Far So Good, But It's Not Enough, 4 COMPUTER L. & SEC. REP. 231, 231-239 (2000). 1588 Maurice Schellekens, Liability of Internet Intermediaries: A Slippery Slope?, 8 SCRIPTED 154 (2011). 1589 Supra note 1553. 1590 Id., at 110. 1591 Id. 1592 Viacom International, Inc., v. YouTube, Inc., supra note 1521, at 23-24.

291 (A) have been developed pursuant to a broad consensus of copyright owners and service providers in an open, fair, voluntary, multi-industry standards process; (B) are available to any person on reasonable and nondiscriminatory terms; and (C) do not impose substantial costs on service providers or substantial burdens on their systems or networks. However, such a standard for monitoring copyright infringements does not exist. Below it will be explained why § 512(i)(2)(C) DMCA is no longer relevant. A ‘best available technology standard’ of filtering was suggested by Helman and Parchomovsky, but remains elusive. 1593 Ginsburg wrote that “the more reliable and less burdensome the filter, the more likely courts are to favor its implementation.“ 1594

EU Recital 47 of the preamble to and Article 15(1) of the E-Commerce Directive 1595 articulate that member states of the EU are prevented from imposing a general monitoring obligation on OSPs. Monitoring obligations in a specific case are allowed, and do not affect orders by national courts. 1596 Recital 48 of the preamble to and Articles 14(3) and 15(2) of the E-Commerce Directive 1597 explain that member states can require OSPs that host content provided by third parties to apply a duty of care which can reasonably be expected from them and which are specified by national law to monitor, detect and prevent infringements. 1598

1593

Lital Helman & Gideon Parchomovsky, The Best Available Technology Standard, 111 COLUM. L. REV. 1194 (2011). 1594 Jane C. Ginsburg, Separating the Sony Sheep From the Grokster Goats: Reckoning the Future Business Plans of Copyright-Dependent Technology Entrepreneurs, 50 ARIZ. L. REV. 577, 591 (2008). 1595 Supra note 5. 1596 Recital 47 of the preamble to the E-Commerce Directive, id.: “Member States are prevented from imposing a monitoring obligation on service providers only with respect to obligations of a general nature; this does not concern monitoring obligations in a specific case and, in particular, does not affect orders by national authorities in accordance with national legislation.” Article 14(3) E-Commerce Directive: This Article shall not affect the possibility for a court or administrative authority, in accordance with Member States' legal systems, of requiring the service provider to terminate or prevent an infringement, nor does it affect the possibility for Member States of establishing procedures governing the removal or disabling of access to information. 1597 Id. 1598 Recital 48 of the preamble to the E-Commerce Directive, id.: “This Directive does not affect the possibility for Member States of requiring service providers, who host information provided by recipients of their service, to apply duties of care, which can reasonably be expected from them and which are specified by national law, in order to detect and prevent certain types of illegal activities.”

292 In L'Oréal and Others 1599 the CJEU explained that “[f]irst, it follows from Article 15(1) of Directive 2000/31, in conjunction with Article 2(3) of Directive 2004/48, that the measures required of the online service provider concerned cannot consist in an active monitoring of all the data of each of its customers in order to prevent any future infringement of intellectual property rights via that provider’s website. Furthermore, a general monitoring obligation would be incompatible with Article 3 of Directive 2004/48, which states that the measures referred to by the directive must be fair and proportionate and must not be excessively costly.” 1600 In 2011, in Scarlet Extended NV v SABAM, 1601 the CJEU held that member states cannot obligate internet intermediaries to “implement a filter system for all electronic communication via its services, without any distinction between its customers, works preventative, and is exclusively funded by the ISP and does not know any restriction in time.” 1602 The CJEU seemed fearful that such an extensive filter system would be incompatible with guaranteeing a balance between protecting intellectual property on the one hand and allowing free enterprise, the right of privacy protection and the right to receive or send information on the other hand. Unfortunately, the CJEU did not use the opportunity to clarify exactly the degree to which internet intermediaries need to preemptively filter and sustain a business climate which is conducive to both trademark holders and internet intermediaries. The solution envisioned by the Belgian government, to obligate OSPs to filter pre-emptively, is best suitable with the solution envisaged in this thesis. Even though an OSP that meets the criteria of Article 14(1) E-Commerce Directive, 1603 so that it is exempted from liability, it can still be required to filter, based on Article 14(3) E-Commerce Directive, 1604 which promulgates that Member States’ legal systems can require the service provider to terminate or prevent an infringement or establishing procedures governing the removal or disabling of access to information. 1605 1599

L'Oréal and Others supra note 1574, para. 139. Id. 1601 Scarlet Extended NV v SABAM (Case C-70/1024), Judgment of the CJEU, November 24, 2011. 1602 Id. 1603 Supra note 5. 1604 Id. 1605 Recital 48 of the preamble to the E-Commerce Directive, id.: This Directive does not affect the possibility for Member States of requiring service providers, who host information provided by recipients 1600

293 Between 2005 and 2008 the German Federal Court of Justice 1606 has demonstrated in Internet Auction I, 1607 II 1608 and III 1609 that even though an OSP falls within the safe harbour against intermediary liability of § 10 Sentence 1 Telemediagesetz, 1610 which is Germany’s implementation of Article 14(1) E-Commerce Directive, 1611 it can still be held liable based on so called Störerhaftung. 1612 The “Störerhaftung” could be interpreted as the German implementation of the third sentence of Article 11 Enforcement Directive, 1613 which prescribes that member states shall ensure that proprietors are in a position to apply for an injunction against intermediaries whose services are used by a third party to infringe intellectual property. 1614 Consequence of this “interferer liability”, which excludes the possibility of criminal enforcement or compensation of damages, 1615 is that a preventive injunction against the intermediary can still be issued. When pointed by a rights holder to a clearly recognisable infringement, the intermediary should not only immediately stop the specific infringement, but also take fundamental precautions to safeguard that no further corresponding infringement will take place. By applying Störerhaftung based on Article 11 Enforcement Directive, 1616 the Federal Court of Justice demonstrated that the safe harbour provision of Article 14(1) ECommerce Directive 1617 does not relieve OSPs from an obligation to preventive filtering.

of their service, to apply duties of care, which can reasonably be expected from them and which are specified by national law, in order to detect and prevent certain types of illegal activities. 1606 Bundesgerichtshof (BGH), Federal Court of Justice is the highest court in the system of general, i.e. civil and criminal jurisdiction in Germany. 1607 Internet Auction Case I ZR 304/01 I, [2005] ETMR 25, March 11, 2004.. 1608 Internet Auction II Case I ZR 35/04, [2007] ETMR 70, April 17, 2007. 1609 Internet Auction III Case I ZR 73/05 [2008] April 30, 2008. 1610 § 10 Sentence 1 Telemediagesetz = § 11 Satz 1 Teledienstegesetz 2001. 1611 Supra note 5. 1612 Interferer liability is a specific German doctrine codified in § 823 German Civil Code (Liability in damages) and § 1004 German Civil Code Right (Right to satisfaction of the possessor). German Civil Code (Bürgerlichen Gesetzbuches), January 2, 2002. 1613 Supra note 1503. 1614 Article 11 third sentence Enforcement Directive, id.: “Member States shall also ensure that rightholders are in a position to apply for an injunction against intermediaries whose services are used by a third party to infringe an intellectual property right, without prejudice to Article 8(3) of Directive 2001/29/EC.“ 1615 If someone, intentionally or negligently harms the property of someone else, and causality can be established to the infringement of a protected right he can be subject to an injunction. Although fault need to be proven for a compensation claim or intent in case of criminal enforcement, it is not needed for an injunction. 1616 Supra note 1503. 1617 Id.

294 Technology § 512(i)(2)(C) DMCA prescribes that a technical standard for filtering should not impose substantial costs on service providers or substantial burdens on their systems or networks. In the same vein on the other side of the Atlantic, the CJEU implied in L’Oreal and Others 1618 that filtering all data would be disproportionate, and excessively costly. In 2012, in Stokke v Marktplaats, 1619 the Dutch Court of Appeal in Leeuwarden weighed the pecuniary disadvantages for the proprietor Stokke of having to outsource the monitoring and notification process for infringements on the internet auction and those of the internet auction to filter in such a way that repeat infringements will be prevented. The Court of Appeal reasoned that since Stokke had to spend € 700, per year, and adaption of the internet auction’s system to filter its servers, would cost a multitude of € 700, per year, that the proportionality principle of Article 3(2) Enforcement Directive, would preclude that the internet auction needed to adapt its system. 1620 However, the Court of Appeal seems to have forgotten that if one wants to make an economic trade-off, one should realise that not only Stokke but a multitude of other proprietors have to bear the costs of monitoring and notifying the internet auction. If this would have been taken into account, the equation would have looked different. Since filtering technology is based on computing performance, and therefore subject to Moore’s law, 1621 which is the observation that computing performance doubles every two years, the costs have decreased exponentially. Just as the performance of virus and spam filter technologies have increased, while the costs have decreased, the performance of intellectual property filtering software will increase while the costs will further decrease. So the problem of substantial or excessive costs of filtering technology

1618

L'Oréal and Others, supra note 1574, para. 139. Stokke v Marktplaats, Gerechtshof (Court of Appeal) Leeuwarden, 107.001.948/01, BW6296, May 22, 2012. 1620 Id., para 10.5. 1621 Gordon E. Moore, “Cramming more components onto integrated circuits”, Electronics Magazine, 1965, at 4, available at: http://download.intel.com/museum/Moores_Law/ArticlesPress_Releases/Gordon_Moore_1965_Article.pdf. “Excerpts from A Conversation with Gordon Moore: Moore’s Law”, Intel Corporation, Video transcripts, 2005, at 1, available at: ftp://download.intel.com/museum/Moores_Law/VideoTranscripts/Excepts_A_Conversation_with_Gordon_Moore.pdf (sites accessed August 21, 2013). 1619

295 is fictitious. 1622 It is bittersweet that the worldwide rise in censorship also is boosting filter technology. 1623 In Scarlet, 1624 the CJEU came up with three more principled arguments against the obligation to filter all data: that an extensive filter would be incompatible with guaranteeing a balance between protecting intellectual property on the one hand and allowing free enterprise, the right of privacy protection and the right to receive or send information on the other hand. The right of privacy protection is under pressure on social media, because they sell the behavioural data of its users. Then again, this is one of the conditions under which internet users can make “free” use of the service. However, the filtering against content infringements does not interfere with the right of privacy protection to a greater extent than in regard to behavioural data mining. For social media the right to receive or send information will only be restrained where it concerns infringed content (see Chapter 6.4 which already demonstrated that protecting intellectual property is compatible with the right to freedom of expression). The CJEU deemed filtering of all data incompatible with allowing free enterprise. However, one can argue that social media should allow only non-infringing free enterprise: that the freedom of one enterprise stops where it infringes the freedom of another enterprise to exploit its intellectual property rights. 1625 Therefore these reasons are invalid to justify a prohibition to filter all data against content infringements.

Social media providers are best positioned to monitor Because of the safe harbour provisions social media providers only filter in reaction to instigations by the content holders. This means that the content holders need to search for the infringements themselves or pay for these services to third parties or the social media providers to do this for them.

1622

A fortiori, when the safe harbour provisions would be abolished and social media providers made liable for content infringements this would increase the demand for filter technology so that investments into its innovation increasing its efficacy decreasing its costs. 1623 Danny Friedmann, Paradoxes, Google and China - How Censorship Can Harm and Intellectual Property Can Harness Innovation, supra note 9. 1624 Supra note 1601. 1625 Paraphrasing “Your right to swing your arms ends just where the other man's nose begins.” Zechariah Chafee, Freedom of Speech in Wartime, 32 HARV. L. REV. 932, 957 (1919).

296 One can argue that social media are morally in the best position to filter, since it falls within their control and at the same time they benefit financially from it. However, the District Court in Tiffany (NJ) Inc. v eBay, Inc. held that “right holders bear the principal responsibility to police their trademarks.” 1626 The Second Circuit in Tiffany (NJ) Inc. v eBay, Inc. 1627 held that private forces give internet intermediaries “a strong incentive to minimize” intellectual property infringements. 1628 For online auction sites this might be so to a degree, but this does not apply for social media as pointed out in Chapter 7.3.1 “Market forces”. One can also argue that social media are technologically in the best position to filter,

1629

since they know their service from the inside out, have the right technical

people on staff, and have access to all of the information on their servers. A fortiori, social media can set up and organise their services in such a way which makes filtering against content infringements effective, efficient and fast. One can distinguish two groups of monitoring obligations: before and after any notification of infringement. The latter group can be divided into the following monitoring obligations to prevent further infringements: 1630 - In case the identity of the infringer is known and the identity of the goods that are being infringed are known. This degree of monitoring is suggested by the Advocate General in L’Oréal v eBay. 1631 This seems arbitrary, since it would not address known infringers who infringe a slightly different copyright or trademark; nor would it address a repeat infringer operating under a different name. 1626

Citing MDT Corp. v. New York Stock Exch., 858 F.Supp. 1028, 1034 C.D.Cal.1994) “The owner of a trade name must do its own police work.” Supra note 1553, at 518. 1627 Supra note 1554, at 109. 1628 “But we are also disposed to think, and the record suggests, that private market forces give eBay and those operating similar businesses a strong incentive to minimize the counterfeit goods sold on their websites.” Id. 1629 eBay suggested that Tiffany use technological tools, like Ranger Online. Tiffany rejected this technology and did not have the staff to do the monitoring. Tiffany (NJ) Inc. v eBay, Inc., supra note 1553, at 484. 1630 “[O]nce a right has been infringed, the host provider may be required not only to terminate the infringement but also to prevent further infringements (ex post situation). Injunctive relief as to further infringements would therefore not be ruled out.” Judge Bornkamm, E-Commerce Directive vs. IP Rights Enforcement – Legal Balance Achieved given at a conference in Brussels on 6 March 2007, GRUR INT’L 642, 643 (2007). 1631 L’Oréal SA Lancôme parfums et beauté & Cie Laboratoire Garnier & Cie v Bellure NV Malaika Investments Ltd Starion International Ltd (L’Oréal and Others), (Case C-487/07), Opinion of the Advocate General, February 10, 2009, para 182.

297 - In case the identity of the infringer or his internet protocol address is known. This would enable to check whether the known infringer has changed his ways for the good. - In case the kind of infringement is known. This can provide clues of how to prevent similar infringements. For example, in the Internet Auction cases, 1632 one could monitor watches that were offered as new Rolex hours, under a certain price. Or obviously keywords that Google AdWords suggested, such as “imitation” or “copy”, in combination with the trademark Louis Vuitton, as was established in Google France and Google. 1633 However, preventing content infringements before they are uploaded in an automatic way, makes post-upload filtering and the costly manual notice and takedown procedures unnecessary and prevents litigation altogether (see Chapter 9 “Paradigm shift”).

Chapter 7.6 Lack of legal certainty “In all mercantile transactions the great object should be certainty: and therefore, it is of more consequence that a rule should be certain, than whether the rule is established one way or the other: because speculators in trade then know which ground to go upon.” 1634 Although cost-efficient technology is already available to social media providers to monitor and enforce against content infringements, the safe harbour provisions force them to feign that ignorance is bliss. 1635 The opposite is true: the feigned ignorance makes social media providers vulnerable, since there is little space between being 1632

Supra notes 1607, 1608 and 1609. Google France and Google, supra note 230, para 101. 1634 Shrieval lecture of Lord Bingham in which he quoted Lord Mansfield, in Vallejo v Wheeler (1774) 1 COWP. 143, 153. Lord Mance, “Should the law be certain?”, The Oxford Shrieval lecture, October 11, 2011, available at: http://www.supremecourt.gov.uk/docs/speech_111011.pdf (accessed August 21, 2013). 1635 Reed argued that Google Images’ biggest threat is when social media sites, such as Pinterest, Facebook and Twitter start with an effective and complete search function. “The worst thing that could happen for Google is that each of the other social outlets like Facebook, Twitter, Pinterest etc develop robust, functional and complete search functions.” Frank Reed, “In the Age of Pinterest, Google Wants To Know How To Index Images”, Marketing Pilgrim, April 25, 2012, available at: http://www.marketingpilgrim.com/2012/04/in-the-age-of-pinterest-google-wants-you-to-know-how-toindex-images.html (accessed August 21, 2013). If these social media providers start with such a search function, it becomes even harder for them to hide behind the argument that they cannot know what has been uploaded to their sites, which is relevant to fall within the safe harbour provisions which indemnifies them from intermediary liability. 1633

298 considered an OSP and protected under the safe harbour provisions and being held liable for intermediary liability, as the jurisprudence shows. One can argue that safe harbour provisions provide especially legal uncertainty to social media, trademark holders and internet users. In the U.S. the safe harbour provisions of the Lanham Act apply only partly to trademark infringements, but if they do apply just as the E-Commerce Directive 1636 safe harbour provisions, they do not provide any real refuge for social media providers, due to their multi-interpretable terms and uncertain duty of care to filter, as discussed in Chapter 7.5. If the safe harbour provisions do not apply, then social media providers could be held contributorily or vicariously liable for infringing user-generated content. In the EU the safe harbour provisions of the E-Commerce Directive do apply to all trademark infringements, but here too, the unknown required level of filtering provides for legal uncertainty. Trademark holders file lawsuits against OSPs if they cannot get a hold of the direct infringers, the internet users. U.S. and EU case law, as discussed in Chapter 7.5, demonstrate that no predictable outcomes are to be expected. Urban and Quilter have researched DMCA notices and found out “that copyright claims have stated concerns beyond or in addition to copyright infringement, including trademark-type claims”, 1637 which only increases the legal uncertainty. The excessive and uncritical removal of alleged infringing content, as discussed in Chapter 7.3.1, also does not contribute to legal certainty for those internet users including trademark holders in the role of internet user, that upload authorised content. Many internet users do not know what is authorised use of a trademark logo on social media. Transparency about what use of a trademark is authorised can be a first step to increase legal certainty for social media providers, trademark holders and internet users (see Chapter 9 “Paradigm shift”). Social media are resistant to filter actively and on their own initiative for infringing content, because that can expel them from the safe harbour. However, OSPs

1636

Supra note 5. “A number of notices (193) appear to include claims in addition to, or instead of, copyright infringement - such as unfair competition, trademark-type claims, or privacy concerns. In some instances, a sender may have had a cognizable copyright claim, but they stated concerns beyond or in addition to copyright infringement.” Urban & Quilter, supra note 1532, at 678.

1637

299 have discovered that they have been positioned in the “squeezed middle”. 1638 They may seek refuge in a safe harbour, but they are still target of litigation by content holders, because moored they are an easy target. Therefore ultimately, Hypothesis 2. “The safe harbour provisions in the law of intermediary liability of trademark infringement is not effective”, can be confirmed. In order to close the gap, the safe harbour provisions should be abolished. Instead strict liability of OSPs, including social media providers, over intellectual property infringements on their servers should be introduced, after a transition period.

1638

The word combination “squeezed middle” of the year 2011 could apply to OSPs, because they are the “squeezed middle” of the internet, between trademark holders and the users. “Squeezed middle”, Oxford University Press (U.S. and UK) word of the year 2011, available at: http://www.prnewswire.com/newsreleases/squeezed-middle-is-named-oxford-dictionaries-word-of-the-year-2011-134361588.html (accessed August 21, 2013).

300

Part III Paradigm Change Part II has demonstrated that trademark law cannot sufficiently protect the unauthorised use of the trademark logo on social media, especially not the alleged noncommercial use. Also it has become clear that the impotence of the safe harbour provisions are not only adversely affecting trademark holders but also OSPs and internet users. These fundamental problems cannot be solved by small tweaks to the system. Only a paradigm shift can provide a real solution. Part III provides such a paradigm shift in two chapters: Chapter 8 will examine whether a moral rights doctrine can be applied to trademark rights. The moral rights solution to protect trademark logos against unauthorised use and non-commercial use on social media implies that the law must be changed. Chapter 9 will propose a contractual solution, that can serve as a testing ground until such a juridical solution is actualised. Part III is testing two hypotheses: Hypothesis 4. “The unauthorised use (including non-commercial use) of the trademark logo on social media should be protected by the moral right of integrity;” Hypothesis 5. “A contractual solution (walled gardens of social media) can pave the way for an automated solution for the trademark logo on social media.”

301

Chapter 8 Moral Right of Integrity Moral right of integrity applicable to unauthorised and non-commercial use of trademark logo, regardless the level of fame/reputation Introduction “Although corporations may embrace their brands with fervor and take pride in their creation, they do not have the type of soul that cries out for protection via a moral right.” 1639 This chapter is posing questions about that statement and asks whether trademark holders have the “type of soul” that cries out for protection of their trademark logo on social media via moral rights. Moral rights predominantly apply to copyright works and neighbouring rights, but in regard to attribution also to patent law. 1640 One can find the first theories on the legal position of the author which included non-economical aspects in Germany, while in France they coined the name “droit moral” (moral right), and France was most successful in propagating its version of moral rights doctrine (Chapter 8.1). Chapter 8.2 will discuss how moral rights made their way into some international treaties. After that Chapter 8.3 will investigate the reception of the concept in two common law countries, the UK and U.S. Then Chapter 8.4 examines the relation between the trademark logo and moral rights. Chapter 8.5 examines the trademark logo as personification of the trademark holder, followed by trademark dilution as de facto moral rights for trademarks (Chapter 8.6 and a rationale of moral rights for the trademark logo (Chapter 8.7).

1639

Rierson, supra note 216, at 305. 35 U.S.C. § 111: “An application for patent shall be made, or authorized to be made, by the inventor, except as otherwise provided …” The European Patent Convention (EPC) has a rule to publish the mention of the inventor, unless he has waived this right. Rule 20(1) EPC: “The designated inventor shall be mentioned in the published European patent application and the European patent specification, unless he informs the European Patent Office in writing that he has waived his right to be thus mentioned.”

1640

302 Chapter 8.1 The origin of moral rights Theories on moral rights Strömholm wrote that towards the end of the 1880s German legal writers had created three schools of thought on the legal position of the author 1641: The first school of thought is based on the work of Josef Kohler, who was a proponent of a dualistic theory of copyright. Kohler distinguished between economic and personal rights and advocated that the latter falls outside the law of intellectual property. 1642 The second school of thought is based on the work of Otto von Gierke, who was a proponent of a monistic theory of copyright and asserted that the whole of copyright was of a personal character. 1643 This prevailed in German copyright law and was implemented in § 11 German Copyright Act (Urheberrechtsgesetz) since 1965: “Copyright law protects the author in his intellectual and personal relations to the work and in the exploitation of the work. At the same time it also serves to guarantee an appropriate reimbursement for exploitation of the work.” 1644 The third school of thought is based on the work of Philipp Allfeld, who advocated that copyright was a right with both economic and personal elements, each having its own special rules. 1645 This hybrid theory became the prevailing doctrine in France and other EU member states except for the UK and Ireland, since they are common law countries. Interestingly, the EU has consistently excluded the harmonisation of moral rights in case of author’s rights. 1646

1641

Stig Strömholm, Droit Moral – The International and Comparative Scene from a Scandinavian Viewpoint, 14 INT’L REV. INDUS. PROP. & COPYRIGHT L. 1 (1983). 1642 Friedemann Kawohl, Commentary on Josef Kohler's The Author's Right (1880), in PRIMARY SOURCES ON COPYRIGHT (1450-1900) (eds L. Bently & M. Kretschmer, 2008). 1643 OTTO VON GIERKE, DEUTSCHES PRIVATRECHT, Band I 1868, 756. Cited by Artur-Axel Wandtke, Zukunft des Urheberrechts und eine monistisch geprägte Urheberrechtskonzeption – Entwicklungslinien seit Josef Kohler, in FESTSCHRIFT 200 JAHRE JURISTISCHE FAKULTÄT DER HUMBOLDT-UNIVERSITÄT ZU BERLIN: GESCHICHTE, GEGENWART UND ZUKUNFT, (Stefan Grundmann et al., Walter de Gruyter, 2010), at 1180. 1644 § 11 German Copyright Act (Urheberrechtsgesetz) September 9, 1965 (BGBl. I S. 1273), last amended by Article 12 § 4 Law of December 13, 2007 (BGBl. I S. 2897): “Das Urheberrecht schützt den Urheber in seinen geistigen und persönlichen Beziehungen zum Werk und in der Nutzung des Werkes. Es dient zugleich der Sicherung einer angemessenen Vergütung für die Nutzung des Werkes.” 1645 PHILIPP ALLFELD, DAS URHEBERRECHT AN WERKEN DER LITERATUR UND DER TONKUNST. KOMMENTAR ZU DEM GESETZ VOM 19.JUNI 1901 SOWIE DEN INTERNATIONALEN VERTRÄGEN ZUM SCHUTZE DES URHEBERRECHTES. 2., (vielfach veränd. Aufl., München: C.H.Beck 1928). 1646 Rigamonti, supra note 1646, at 357.

303 Moral rights avant la lettre Even earlier, in 1769, in Millar v Taylor, 1647 the Court of King's Bench decided that despite the Statute of Anne 1648 an author enjoyed the exclusive right of publishing his work in perpetuity and recognised de facto: - the right of attribution (“It is just, that Another should not use his Name, without his consent.”), 1649 - right of disclosure (“It is fit, that He should judge when to publish, or whether he will ever publish. It is fit he should not only choose the Time, but the Manner of Publication; how Many; what Volume; what Print.”), 1650 - right of integrity (“It is fit, that he should choose to Whose care he will Trust the Accuracy and Correctness of the Impression; in whose Honesty he will confide it, not to foist in Additions”). 1651 Only the right of withdrawal was not de facto recognised. However, in 1774 in Donaldson v Becket 1652 the fledgling right of disclosure and the future of moral rights in the UK were at one fell swoop sidelined, until the introduction of the Copyright, Designs and Patents Act in 1988 1653 (see Chapter 8.3).

French and main stream moral rights Morillot coined the term moral rights in 1878. 1654 “Even if Morillot was the first one to identify moral right as a bundle of prerogatives they are distinct from the exclusive right of the author, he merely founded it on rules of civil responsibility.” 1655

1647

Millar v. Taylor, London (1769), supra note 1642. . Statute of Anne prescribed a copyright term of 14 years. An Act for the Encouragement of Learning, by Vesting the Copies of Printed Books in the Authors or Purchasers of such Copies, during the Times therein mentioned (Statute of Anne), commenced on April 10, 1710. Copyright History, available at: http://www.copyrighthistory.com/anne.html (accessed August 20, 2013). 1649 Millar v. Taylor, London (1769), supra note 1642. Text can be found Millar v Taylor (1769), Copyright, Plagiarism and …McGuffey’s Readers, “A Critical Resource on Intellectual Property in the Eighteenth and Nineteenth Centuries”, available at: http://web.ics.purdue.edu/~epflugfe/McGuffey%20project/624.3.html (accessed August 20, 2013). 1650 Id. Millar v. Taylor, London (1769), supra note 1642. Text can be found Millar v Taylor (1769), Copyright, Plagiarism and …McGuffey’s Readers, A Critical Resource on Intellectual Property in the Eighteenth and Nineteenth Centuries, supra note 1649. 1651 Id. 1652 Text of Donaldson v Becket (1774), supra note 1649. 1653 Copyright, Designs and Patents Act, 1988 c. 48. 1648

304 Lucas asserted that the moral rights doctrine in France was developed first in case law, followed by some scholarly writings 1656 and only in 1957 moral rights were codified in the version as advocated by Desbois, in which “the relation that exists between the author and the work, the mirror of his personality.” 1657 The current French author’s right is codified 1658 in the Code propriété intellectuelle as Articles L121-1 to L121-9 (1992), 1659 which previously was scattered throughout La propriété littéraire et artistique of 1957. 1660 Article L121-1 Code de la propriété intellectuelle (1992) gives a definition of moral rights: “The author has the right to respect for his name, his quality and his work. This right is attached to his person. It is perpetual, inalienable and absolute. It is transferable upon death to the heirs of the author. The exercise can be given to a third party under a will.” 1661 There are four different kind of moral rights: right of disclosure, right of withdrawal, right of attribution and right of integrity. Right of disclosure 1662 Articles L121-2 and L121-8 Code de la propriété intellectuelle (1992): The author has the sole right to make his work available to the public and no one can force him. 1663 This doctrine was developed in the French Eden v Whistler case, 1664 in which the painter

1654

ANDRÉ MORILLOT, DE LA PROTECTION ACCORDÉE AUX OEUVRES D’ART, AUX PHOTOGRAPHIES, AUX DESSINS ET MODÈLES INDUSTRIELS ET AUX BREVETS D’INVENTION DANS L’EMPIRE D’ALLEMAGNE (Paris, Cotillon, 1878). André Lucas, Moral right in France: toward a pragmatic approach? ALAI 2009 Congress From 1710 to Cyberspace: Celebrating 300 years of copyright and looking to its future, bla©a, (2009). available at: http://www.blaca.org/Moral%20right%20in%20France%20by%20Professor%20Andre%20Lucas.pdf (accessed August 20, 2013). bla©a is the UK national group of the International Literary and Artistic Association (ALAI) founded in Paris in 1878 under the presidency of Victor Hugo. 1656 LOUIS MARIE EUGÈNE POUILLET, TRAITÉ THÉORIQUE ET PRATIQUE DE LA PROPRIÉTÉ LITTÉRAIRE ET ARTISTIQUE ET DU DROIT DE REPRESENTATION (Georges Maillard & Charles Claro eds., 3d ed. 1908). 1657 HENRI DESBOIS, LE DROIT D’AUTEUR EN FRANCE: PROPRIÉTÉ LITTÉRAIRE ET ARTISTIQUE, 1978, viii. 1658 Law No. 92-597 of July 1, 1992, Journal Officiel de la Republique Francaise [J.O.] [Official Gazette of France], July 3, 1992, at 8801. 1659 Articles L121-1 to L121-9 Code de la propriété intellectuelle, July 1, 1992. 1660 Law numbers 57-298 of March 11, 1957 sur la propriété littéraire et artistique. 1661 Supra note 1659. 1662 Right of disclosure is called droit de divulgation in French. 1663 ANDRÉ LUCAS & HENRI-JACQUES, TRAITÉ DE LA PROPRIÉTÉ LITTÉRAIRE ET ARTISTIQUE 307 (2d ed. 2001) at 309. Rigamonti, supra note 1646, at 364 and 362 footnote 57. 1664 Eden v Whistler, Cour de cassation, ch. civ., , Mar. 14, 1900, D.P. 1900, I, 497 (Fr.). 1655

305 Eden did not want to disclose the painting of Whistler’s wife, ordered by Whistler, because they disagreed about the price. Right of withdrawal 1665 Article L121-3 Code de la propriété intellectuelle (1992) points to the high court in case of manifest abuse in the use or non-use of the right of disclosure. Articles L121-4 and L121-7-1(2) Code de la propriété intellectuelle (1992) deals with the right to reconsider or withdrawal, in case an author can no longer reconcile the publication of his work with his personal convictions. Merely pecuniary reasons are not sufficient according to the Cour de cassation. 1666 Although courts rarely exercise this right of withdrawal. 1667 After the publication of his work, the author can reconsider or withdraw the work, as long as he indemnifies the assignee beforehand for any prejudice the reconsideration or withdrawal may cause him. Right of attribution 1668 Article L121-1 Code de la propriété intellectuelle prescribes (1992) to respect the name of the author, also known as right of paternity. Hughes articulated that the right of attribution “guarantees that the author’s selected form of identification with the work remains - whether the author used her own name, used a pseudonym, or wanted to remain anonymous.” 1669 Right of integrity 1670 Article L121-1 Code de la propriété intellectuelle (1992) states that the quality and work should be respected, regardless the objectively positive or objectively negative influence of the modification on the work. 1671 This includes dividing the work so that it is no longer complete, resizing a work for reproduction on a stamp 1672 and putting the work 1665

Right of withdrawal is called droit de retrait et de repentir in French. Cour de cassation, le civ., May 14, 1991, 151 RIDA 1992, 272, note Sirinelli (Fr.). 1667 CORNISH & LLEWELYN, supra note 237, at 461 1668 Right of attribution is called droit de paternité in French. 1669 Justin Hughes, American Moral Rights and Fixing the Dastar “Gap”, UTAH L. REV. 659, 660, (2007). 1670 Right of integrity is called droit au respect de l'intégrité de l'oeuvre in French. 1671 Rigamonti, supra note 1646, at 364. 1672 Echaurren v Italian Post Office [2001] E.C.D.R. 14 (Court of Rome). 1666

306 in an undesirable context according to the author. 1673 France’s and Germany’s right of integrity goes further than Article 6bis Berne Convention, which only protects the right to claim authorship of the work and to object to any distortion, mutilation or other modification of, or other derogatory action in relation to, the said work, if it would be prejudicial to the author’s honour or reputation. However, in France the exception is the modification of software (Article L121-7(1) Code de la propriété intellectuelle (1992)) and a work-for-hire (Article L121-7-1(1) Code de la propriété intellectuelle (1992)) which are as restrictive as Article 6bis Berne Convention. The same can be said for German’s motion pictures or works in motion pictures. 1674 The wording that moral rights are inalienable, 1675 even after the death of the author, was tested in 2004 when an heir of Victor Hugo claimed that the author of a publication of two sequels to Les Misérables, a work in the public domain, violated Hugo’s right of integrity. 1676

Chapter 8.2 International treaties Moral rights doctrine spread successfully via a number of international treaties, including the Universal Declaration of Human Rights 1677 and International Covenant on Economic, Social, and Cultural Rights. 1678 One can argue that these two treaties cover all moral rights as discussed in Chapter 8.1. A more limited set of moral rights, namely the moral rights of attribution and integrity, is codified in the Berne Convention for the Protection of Literary and Artistic

1673

This is well illustrated by the Hundertwasser case in Germany. The court held that putting a painting in a frame which extends the patterns of the painting can be perceived as a new “Gesamtkunstwerk”, made by the author, and therefore violates the right of integrity of the work. Hundertwasser, BGHZ 150, 32. Relevant are §§ 14 and 23 Gesetz über Urheberrecht und verwandte Schutzrechte (Urheberrechtsgesetz), Sept. 9, 1965 amended on December 22, 2011. 1674 § 93(1) Urheberrechtsgesetz: “only grossly disfigurement or other grossly impairments to their works can be banned.” Id. 1675 In France Article L121-1 Code de la propriété intellectuelle. 1676 CA Paris, 4e ch., Mar. 31, 2004, 202 RIDA 2004, 292, note Pollaud-Dulian (Fr.). 1677 Universal Declaration of Human Rights, G.A. Res 217A (III), Article 27(2), U.N. Doc. A/810 (Dec. 10, 1948): “the right to the protection of the moral and material interests resulting from any scientific, literary or artistic production of which he is the author.” 1678 International Covenant on Economic, Social, and Cultural Rights (ICESC), G.A. Res 2200A (XXI), Article 15(1)(c), U.N. GAOR, 21st Sess., Supp. No. 16, at 49, U.N. Doc. A/6316 (1966), 993 U.N.T.S. 3 “benefit from the protection of the moral and material interests resulting from any scientific, literary or artistic production of which he is the author.”

307 Works (Berne Convention). 1679 Article 6bis(1) Berne Convention 1680 was added with the Rome Act in 1928: “Independently of the author's economic rights, and even after the transfer of the said rights, the author shall have the right to claim authorship of the work and to object to any distortion, mutilation or other modification of, or other derogatory action in relation to, the said work, which would be prejudicial to his honor or reputation.” Article 1(4) WIPO Copyright Treaty1681 incorporates Article 6bis Berne Convention 1682 and Article 5(1) WIPO Performances and Phonograms Treaty 1683 provided the moral right of attribution and integrity to performers, followed by Article 5 Beijing Treaty on Audiovisual Performances. 1684 The right of attribution of Article 6bis Berne Convention 1685: “the author shall have the right to claim authorship of the work,” does not merely mean a right to prevent non-attribution. Hughes explained the comprehensive character of the provision that is generally understood to mean the right to publish anonymously or pseudonymously and to prevent misattribution on other works and to prevent others’ names attached to ones works. 1686

Economic rights and moral rights dichotomy Where a trademark is used in a non-commercial way, the trademark, including the trademark logo, cannot be protected against trademark infringement (as discussed in Chaper 5) nor trademark dilution (as discussed in Chapter 6). Moral rights stem from the fact that the work is a reflection of the personality of its creator. Economic and moral

1679

Supra note 138. Id. 1681 Supra note 18. 1682 Supra note 138. 1683 Article 5(1) WIPO Performances and Phonograms Treaty: “Independently of a performer's economic rights, and even after the transfer of those rights, the performer shall, as regards his live aural performances or performances fixed in phonograms, have the right to claim to be identified as the performer of his performances, except where omission is dictated by the manner of the use of the performance, and to object to any distortion, mutilation or other modification of his performances that would be prejudicial to his reputation.” WIPO Performances and Phonograms Treaty, December 20, 1996. 1684 Beijing Treaty on Audiovisual Performances, adopted by the Diplomatic Conference on June 24, 2012. 1685 Supra note 138. 1686 Hughes, supra note 1669, at 662-663. 1680

308 rights belong to each other just as a body belongs to a soul, as the WIPO Guide to the Berne Convention poetically puts it. 1687 Moral rights of author’s rights are called non-economic rights to distinguish them from the economic or exploitive rights of author’s rights. A better term would be nonexploitive rights, since moral rights can have a severe economic impact on the author, just as in the case of trademark dilution or trademark infringement or unauthorised noncommercial use of the trademark logo on social media. In case of unauthorised use by third parties, the copyright holder can use his economic rights to stop them. The only benefit in this situation is that claiming both economic and moral rights might result in increased damage awards. 1688 In case of unauthorised non-commercial 1689 use of the trademark logo by internet users on social media, the trademark holder can not assert his economic rights, since trademark infringement and trademark dilution are not applicable. Therefore, one can argue that it would be desirable that the law would enable trademark holders to apply moral rights in such situations.

Right of attribution and/or right of integrity Article 6bis(1) Berne Convention 1690 provides at least one of the prerogatives to the author: 1691 so either to claim authorship of the work, also known as the right of paternity or the right of attribution or the right of integrity, also known as the right of respect, or both these rights. According to WIPO Guide to the Berne Convention the author can assert that he is the creator of the work. 1692 This right may be exercised by the author in the way he wishes, including publishing under his pseudonym or anonymously. The author can at any time change his mind and reject his pseudonym or abandon his anonymity. Under the right of attribution an author can refuse that his name is used to a

1687

Claude Masouyé, Guide to the Berne Convention for the Protection of Literary and Artistic Works (Paris Act, 1971), WIPO PUBL. No. 615(E) (Geneva 1978), at 41. 1688 Rigamonti, supra note 1646, at 369. 1689 Although as already discussed in Chapter 5, on social media the non-commercial use of unauthorised trademarks is hignly unlikely, because the social media provider uses advertisements and the data of the internet users. 1690 Berne Convention for the Protection of Literary and Artistic Works, July 24, 1971. 1691 Masouyé, supra note 1687, at 44. 1692 Id., at 41.

309 work that is not his. The right of attribution is exercisable against those permitted to reproduce the work or to take excerpts from it. According to Article 6bis(1) Berne Convention 1693 the author can object to any distortion, mutilation or other modification of, or other derogatory action in relation to, the work which would be prejudicial to the author’s honour or reputation. According to WIPO Guide to the Berne Convention the formula for the right of integrity is very elastic and leaves room for discretion to the courts. A person permitted to make a reproduction cannot omit or add to the work. In case of adaptations this can become problematic. In general one can assume that one violates the moral rights if one changes the nature of the work or the author’s basic message. 1694 Article 6bis(2) Berne Convention 1695 states that the moral rights will be exercisable after the death of the author at least until the expiry of his economic rights, but the countries that do not provide protection of all the rights in the work after the death of the author may provide that some of these rights may, after the death of the author, cease to be maintained. 1696 This means that those countries still need to protect after the death of the author either the right of attribution or the right of integrity. 1697

Chapter 8.3 Common law’s functional equivalents of moral rights In Drummond v Altemus 1698 in 1894, the court enjoined a publisher from selling a book that contained lectures by a professor that included additions and omissions. The plaintiff based his claim not on copyright law, but “upon his right, quite distinct from any conferred by copyright, to protection against having any literary matter published as his work which is not actually his creation, and, incidentally, to prevent fraud upon purchasers. That such right exists is too well settled, upon reason and authority, to require demonstration.” 1699

1693

Supra note 138. Masouyé, supra note 1687, at 42. 1695 Supra note 138. 1696 Masouyé, supra note 1687, at 43. 1697 Id., at 44. 1698 Drummond v Altemus, 60 F. 338 (C.C.E.D. Pa. 1894). 1699 Id., at 338-339. 1694

310 Common law countries, including the U.S. and UK have proved that one does not need to implement Article 6bis Berne Convention 1700 by implementing explicit moral rights legislation, instead court decisions can apply other doctrines that de facto protect moral rights. The patchwork of laws based on “breach of implied license, unfair competition, libel, and other relatively flexible legal categories that were shown to be expandable to include something like a moral right,” 1701 are being used as what Kwall called “vehicles for redressing alleged violations of interests” 1702 protected elsewhere by moral rights. This has led to similar results as in civil law countries with a moral rights doctrine. 1703 There are also some state laws that are used for this purpose. 1704

Moral rights in the U.S. The right of withdrawal in the U.S. and other common law countries can be found, if at all, in contracts. 1705 The right to prepare derivative works based upon the copyright work, 1706 can provide a right of integrity. Common law courts have recognised that even if a contract is silent about modification of a work, the assignee or licensee of a copyright may not modify the work to the point where the publication of the modified work would harm the author’s reputation, as that would amount to libel. 1707 According to Masouyé, the law of defamation is especially used as a common law protection for moral right protection. 1708 1700

Supra note 138. John Henry Merryman, The Refrigerator of Bernard Buffet, 27 HASTINGS L.J. 1023, 1038 (1976). 1702 “[T]he increasingly liberal applications of unfair competition law generally and § 43(a) of the Lanham Act in particular” had made these causes of action popular “vehicles for redressing alleged violations of interests protected elsewhere by the right of integrity and paternity.” Roberta Rosenthal Kwall, Copyright and the Moral Right: Is an American Marriage Possible?, 38 VAND. L. REV. 1, 18 (1985). 1703 WILLIAM STRAUSS, THE MORAL RIGHT OF THE AUTHOR (1959) (Arthur Fisher ed., 1963), at 991. 1704 Some states have laws with moral rights implications. These will not be explored in this dissertation. See Hughes, supra note 1669, at 666. 1705 Neil Netanel, Alienability Restrictions and the Enhancement of Author Autonomy in United States and Continental Copyright Law, 12 CARDOZO ARTS & ENT. L.J. 1 (1994) at 29-30. 1706 17 U.S.C. § 106(2). 1707 In Carroll v Paramount Pictures, Inc., plaintiff libelant filed an action against defendant libelee for alleged breach of contract and libel, arising out of the release and publication of a motion picture of “poor quality and vastly inferior to the plays and motion pictures with which the plaintiff has been associated as producer in the past and reflects adversely on his name, standing and reputation.” Carroll v Paramount Pictures, Inc., 3 F.R.D. 95 (S.D.N.Y. 1942). In Ben-Oliel v Press Publ'g Co. the court held that the newspaper need not directly attack the writer as ignorant to libel her; the same result would be accomplished by attributing statements to her that would make her appear so. Ben-Oliel v Press Publ'g Co., 1701

311 Another example of the right of integrity by different means is in case of compulsory licenses for making a musical arrangement of a work, the arrangement cannot change the basic melody or fundamental character of the work. 1709 The author or after his death his heirs can terminate a grant of a transfer or license of copyright or of any right under a copyright, including the right of attribution or the right of integrity, in the five year period after the grant was executed for thirty-five years (in certain cases forty years). 1710 The protection of the integrity of the copyright management information (CMI) in the DMCA 1711 can be seen as a source of the rights of attribution and integrity under certain conditions. 1712 If the name of the author was put in the CMI, it needs to be protected against the removal or alteration of this information that facilitates copyright infringement. However, Ginsburg pointed out that outside the narrow context of the Visual Artists Rights Act, which will be discussed below, there is no right under copyright to attribute authorship. 1713 The equivalent of the right of disclosure was recognised in the U.S. after Warren and Brandeis’ seminal Harvard Law Review article; 1714 as the author’s right to object to the unauthorised disclosure of unpublished works that laid the foundation for the doctrinal construction of the right of privacy. Privacy is also a cause of action in case of an infringement of the right of attribution. 1715

167 N.E. 432 (N.Y. 1929). In Ellis v Hurst the court held that the author who has disclosed his work to the public, but did want attribution under his pseudonym rather than his own name, could do so, relying on his state privacy rights. Because, using his name for the purpose of trade and advertising was without his consent. Ellis v Hurst, 121 N.Y.S. 438 (Sup. Ct. 1910). 1708 Masouyé, supra note 1687, at 44. 1709 17 U.S.C. § 115(a)(2). 1710 17 U.S.C. § 203. See Mary LaFrance, Authorship and Termination Rights in Sound Recordings, 75 S. CAL. L. REV. 375 (2002). 1711 Supra note 5. 1712 17 USC § 1202. 1713 Jane C. Ginsburg, Thirtieth Anniversary Special Issue Updates And Reflections: Article: Moral Rights In The U.S.: Still In Need Of A Guardian Ad Litem, 30 CARDOZO ARTS & ENT. L.J. 73, 74 (2012). 1714 Samuel D. Warren & Louis D. Brandeis, The Right to Privacy, 4 HARV. L. REV. 193, 198 (1890). 1715 In Kerby v Hal Roach Studies, the court reversed in appeal, holding that to suggest that the plaintiff, who was a woman, wrote an compromising invitation letter to men whom she did not know was to impute to her a laxness of character, and to spread such imputations abroad, as defendants did, was an invasion of the right of privacy. Kerby v. Hal Roach Studios, Inc., 127 P.2d 577 (Cal. Dist. Ct. App. 1942).

312 Via contract law the contract parties have the freedom to agree on whatever right of integrity or attribution. 1716 In contrast to moral rights doctrine assignees or licensees of a copyright do not have the general obligation to give attribution to the author’s name, if they did not arrange this contractually. 1717 Cornish and Llewelyn pointed to collective bargaining agreements that avoid non-attribution of screen credits. 1718 Sprigman, Buccafusco and Burns have done some interesting experiments to determine the perception of the value of attribution of creative works. 1719 The tort of unfair competition 1720 can also be used as an equivalent for moral rights. 1721 § 43(a) Lanham Act 1722 can be seen as the federal counterpart to state unfair competition laws. Misrepresentation of the product’s origin has also been used as a cause of action to protect the right of attribution. 1723 Attribution and integrity are linked: One can argue that if the integrity of a work is breached one cannot use the name of the author of the work as if its integrity was still maintained. In 1968 in Geisel v Poynter Prods. Inc. 1724 the court held that defendants violated plaintiff’s trade name by their use of plaintiff’s trade name in connection with the advertising and sale of dolls prior to a certain date. However, the most famous misappropriation case is Gilliam v American Broadcasting Cos. 1725 in 1976. § 43(a) Lanham Act was used as one of the claims made in the famous misappropriation case. The Monty Python group had written and performed three TV programmes originally to be broadcast for the British Broadcasting Company (BBC). The Monty Python group and the BBC had a script writers’ agreement in which the procedure for the BBC were detailed in case they wanted to make minor 1716

The court in Granz v Harris held that substantially abbreviating recordings constituted breach of contract or unfair competition. Granz v Harris, 198 F.2d 585 (2d Cir. 1952). 1717 Cleary v News Corp., 30 F.3d 1255, 1259-60 (9th Cir. 1994). 1718 CORNISH & LLEWLYN, supra note 237, at 458. 1719 Sprigman, Buccofusco and Burns have found out that when creators are given a right to attribution as a default they value credit four times higher than when attribution is not the default option. Because of the “creativity effect”, that creators over-value their works too much, so that they will not be used, they prefer to make the non-attribution the default option. Christopher Jon Sprigman et al., What’s a Name Worth?: Experimental Tests of the Value of Attribution in Intellectual Property. 93 B.U. L. REV. 1, (2012). 1720 Granz v Harris, 198 F.2d 585 (2d Cir. 1952). 1721 Prouty v National Broadcasting Co., 26 F.Supp. 265 (D.Mass.1939). 1722 § 43(a) Lanham Act, 15 U.S.C.S. § 1125(a). 1723 Id. 1724 Geisel v. Poynter Prods., Inc., 295 F. Supp. 331 (S.D.N.Y. 1968). 1725 Gilliam v. American Broadcasting Cos., 538 F.2d 14 (2d Cir. 1976).

313 alterations before the recording of the programme. 1726 Time-Life Films acquired the right to distribute in the U.S. BBC programmes including Monty Python. ABC and TimeLife Films agreed that ABC had the right to broadcast two ninety minutes specials, each comprising three thirty minutes Monty Python programmes. 1727 However, of the ninety minutes special ABC omitted 24 minutes, to make space for commercials and to accommodate the interests of the advertisers by removing “offensive or obscene matters.” 1728 Monty Python sought a preliminary injunction but although Judge Lasker of the U.S. District Court of the Southern District found impairment of the integrity of the work and damages, he rejected the request. 1729 Instead Judge Lasker ruled that ABC needed to broadcast a disclaimer, that the Monty Python group dissociated itself from the programme because of the editing. However, a panel of the court granted a stay of the order that required ABC to broadcast a disclaimer that ABC had edited the programme, until Monty Python’s appeal could be heard and permitted ABC to broadcast. 1730 The Monty Python group sought review of this decision by the U.S. District Court that denied them injunctive relief in their action against ABC for copyright infringement, breach of contract, and unfair competition and violation of § 43(a) Lanham Act. 1731 The court held that the editing and cuts made to the work constituted an actionable mutilation of Monty Python’s work. 1732 Because the editing and cuts constituted an unauthorised creation of a derivative work of the underlying script and therefore copyright infringement, the question whether ABC had the ownership of the copyright, became irrelevant. The public would attribute the distorted work to Monty Python and therefore, Monty Python would suffer irreparable injury to its professional reputation.

1726

Id., at 2. Id., at 4-5. 1728 Id., at 6. 1729 According to judge Lasker it was unclear who owned the copyright and that ABC would suffer significant financial loss if it were enjoined a week before the scheduled broadcast; and that Monty Python displayed a "somewhat disturbing casualness" in their pursuance of the matter. However, judge Lumbard acknowledged that “even if BBC owned the copyright in the recorded program, its use of that work would be limited by the license granted to BBC by Monty Python for use of the underlying script.” Id., 6-7, 10. 1730 Id., at 7. 1731 § 43(a) Lanham Act, 15 U.S.C. § 1125(a). 1732 Gilliam v. American Broadcasting Cos., supra note 1725, at 25. 1727

314 The misrepresentation of the product’s origin is cause of action under § 43(a) Lanham Act. 1733 In 1980 in Follett v New American Library, Inc. 1734 The court granted plaintiffs’ motion author under § 43 Lanham Act, codified as 15 U.S.C § 1125, although plaintiff editor’s revisions were more substantial than those which an editor would ordinarily perform, it was misleading to depict him as principal. The Lanham Act was designed to prevent the presentation of an author’s work to the public in a distorted form and to protect the public and artist from misrepresentations of the artist’s contribution to a finished work. The court held that defendants were required to make some accommodation to prevent such misrepresentation. In 1981 in Smith v Montoro 1735 it was held that misattribution can be seen as false description or representation in advertising. In 1992 in King v Innovation Books, 1736 author Stephen King sought to enjoin defendants, a movie production company and distributor, from associating plaintiff’s name with defendants’ movie, titled after plaintiff's short story, based on claims under § 43(a) Lanham Act, 15 U.S.C.S. § 1125(a). 1737 The order granting plaintiff's preliminary injunction was affirmed to the extent it prohibited use of a possessory credit, but reversed to the extent it prohibited use of a “based upon” credit.

Moral rights legislation in the UK Instead of the author’s inalienable right to determine when his work is fit for publication, in English law if an author fails to publish according to his contractual obligation, he cannot be held to his specific performance but he will be held liable for damages. 1738 To explicitly implement Article 6bis Berne Convention, which was introduced with the Rome Act in 1928, and which was in force in the UK since 1931, the Copyright,

1733

§ 43(a) Lanham Act, 15 U.S.C.S. § 1125(a). Follett v New Am. Library, Inc., 497 F. Supp. 304 (S.D.N.Y. 1980). 1735 Smith v Montoro, 648 F.2d 602 (9th Cir. 1981). 1736 King v Innovation Books, 976 F.2d 824 (2d Cir. 1992). 1737 § 43(a) Lanham Act, 15 U.S.C.S. § 1125(a). 1738 Clarke v Price (1819) 37 Eng. Rep. 270 (Ch.). 1734

315 Designs and Patents Act (CDPA) 1739 was enacted in 1988, which laid a second layer of moral rights 1740 over the above mentioned rights and privileges under the common law. 1741 The moral rights in the CDPA are the right of attribution, 1742 the right of integrity, 1743 the right against false attribution of authorship, 1744 and the right of privacy relating to certain photographs and films. 1745 However, the waiver provisions under the CDPA 1746 can be extremely broad and any unconditional blanket waivers counteract with the theory of inalienability.

Moral rights legislation in the U.S. Although according to the House Report on the implementation of the Berne Convention, 1747 to which the U.S. acceded only in 1988, 1748 the existence of “a composite of laws” 1749 justified it that no changes were needed to provide protection according to Article 6bis Berne Convention. 1750 However, on December 1, 1990, a very select group of works of visual art 1751 was favoured for the right of attribution via the Visual Artists Rights Act (VARA), 1752 only “accentuating the lack of such rights for other expressive works.” 1753 1739

Copyright, Designs and Patents Act (CDPA), 1988 c. 48. § 77-89, 94-95, 103 CDPA, id. 1741 § 171(4) CDPA, id. 1742 § 77 CDPA, id. 1743 § 80 CDPA, id. 1744 § 84 CDPA, id. 1745 § 85 CDPA, id. 1746 § 87 CDPA, id. 1747 H.R. Rep. No. 100-609 at 34 (1988). 1748 U.S. acceded to the Berne Convention for the Protection of Literary and Artistic Works on November 16, 1988. The treaty entered in force for the U.S. on March 1, 1989. 1749 H.R. Rep. No. 100-609 at 34 (1988). 1750 Hughes, supra note 1669, at 665-666. 1751 17 U.S.C. § 101 VARA gives a definition of what is a work of visual art and what is not: A “work of visual art” is—(1) a painting, drawing, print, or sculpture, existing in a single copy, in a limited edition of 200 copies or fewer that are signed and consecutively numbered by the author, or, in the case of a sculpture, in multiple cast, carved, or fabricated sculptures of 200 or fewer that are consecutively numbered by the author and bear the signature or other identifying mark of the author; or (2) a still photographic image produced for exhibition purposes only, existing in a single copy that is signed by the author, or in a limited edition of 200 copies or fewer that are signed and consecutively numbered by the author. A work of visual art does not include— (A)(i) any poster, map, globe, chart, technical drawing, diagram, model, applied art, motion picture or other audiovisual work, book, magazine, newspaper, periodical, data base, electronic information service, electronic publication, or similar publication; (ii) any merchandising item or advertising, promotional, descriptive, covering, or packaging material or container; (iii) any portion or part of any item described in clause (i) or (ii); 1740

316 In VARA the right of attribution means: the right to claim authorship of that work, 1754 right to prevent the use of his or her name as the author of any work of visual art which he or she did not create, 1755 the right to prevent the use of his or her name as the author of the work of visual art in the event of a distortion, mutilation, or other modification of the work which would be prejudicial to his or her honour or reputation. 1756 In VARA the right of integrity means the right to prevent any intentional distortion, mutilation, or other modification of that work which would be prejudicial to his or her honour or reputation, and any intentional distortion, mutilation, or modification of that work is a violation of that right, 1757 to prevent any destruction of a work of recognised stature, and any intentional or grossly negligent destruction of that work is a violation of that right. 1758 These rights of attribution and of integrity are protected only during the author’s lifetime. 1759 Works outside this definition can only rely on the abovementioned common law causes of action. To waive the moral rights unconditionally is not possible. 1760

Chapter 8.4 Trademark logo and moral rights In Gilliam v American Broadcasting Co., 1761 a misattribution case in the preVARA U.S., the connection between trademark and moral rights seemed natural. Although concurring Judge Gurfein noted that the Lanham Act is “not a substitute for

(B) any work made for hire; or (C) any work not subject to copyright protection under this title. 1752 Edward J. Damich, The Visual Artists Rights Act of 1990: Toward a Federal System of Moral Rights Protection for Visual Art, 39 CATH. U. L. REV. 945, 958-64 (1990). Dana L. Burton, Artists’ Moral Rights: Controversy and the Visual Artists Rights Act of 1990, 13 VAND. J. ENT. & TECH. L. 463, 505 (2011). 1753 Hughes, supra note 1669, at 673. 1754 17 USC § 106A (a)1(A). 1755 17 USC § 106A (a)1(B). 1756 17 USC § 106A (a)(2). 1757 17 USC § 106A (a)(3)(A). 1758 17 USC § 106A (a)(3)(B). 1759 17 USC § 106A (d)(1). An exception: “In the case of a joint work prepared by two or more authors, a waiver of rights under this paragraph made by one such author waives such rights for all such authors.” Last sentence of 17 U.S.C. § 106A(e)(1). 1761 Gilliam v American Broadcasting Co., supra note 1725. 1760

317 droit moral which authors in Europe enjoy”, because the “Lanham Act does not deal with artistic integrity. It only goes to misdescription of origin and the like.” 1762 In 2003, the U.S. Supreme Court in Dastar Corp. v Twentieth Century Fox Film Corp.

1763

ruled that § 43(a)(1) Lanham Act, 1764 cannot be used as a cause of action for

non-attribution. Fox, SFM Entertainment and New Line Home Video accused Dastar of reverse passing off, because it marketed the Fox’ video (whose film rights were in the public domain) as its own. However, the Supreme Court interpreted that “origin” in § 43(a)(1)(A) Lanham Act 1765 did not mean the source of any idea, concept, or communication. 1766 “Recognizing a § 43(a) 15 U.S.C. § 1125(a), cause of action here would render superfluous the provisions of the Visual Artists Rights Act that grant an artistic work’s author “the right . . . to claim authorship.”” 1767 However, the substitution argument is not convincing since VARA provides its protection to a very select group of visual artists. Hughes pointed out that § 43(a)(1) Lanham Act 1768 used the word “or” no less than 16 times. 1769 To demonstrate that Hughes’ qualification of § 43(a)(1) Lanham Act as “unencumbered by clarity” 1770 was well chosen, § 43(a)(1)(A-B) Lanham Act will be displayed whereby the word “or” has been shown every time in bold 1771: (1) Any person who, on or in connection with any goods or services, or any container for goods, uses in commerce any word, term, name, symbol, or device, or any combination thereof, or any false designation of origin, false or misleading description of fact, or false or misleading representation of fact, which (A) is likely to cause confusion, or to cause mistake, or to deceive as to the affiliation, connection, or association of such person with another person, or as to the origin, sponsorship, or approval of his or her goods, services, or commercial activities by 1762

Id., para. 4. Dastar Corp. v Twentieth Century Fox Film Corp. Et Al, 539 U.S. 23 (2003). 1764 Trademark (Lanham) Act of 1946 § 43(a)(1), Pub. L. 79-489, 60 Stat. 441 15 U.S.C. § 1125(a)(1) (2006). 1765 Id. 1766 Supra note 1763, at 37. 1767 Supra note 1763, at 24. 1768 Supra note 1764, 1769 Hughes, supra note 1669, at 686. 1770 Id., at 682. 1771 One can argue since § 43(a)(1)(A) Lanham Act refers to (B) using another “or”, that the number is for (A) is 17 plus the 6 times “or” in (B), which brings the total to 23. 1763

318 another person, or, (B) in commercial advertising or promotion, misrepresents the nature, characteristics, qualities, or geographic origin of his or her or another person’s goods, services, or commercial activities, shall be liable in a civil action by any person who believes that he or she is or is likely to be damaged by such act.

Trademark as vehicle of communication As Schechter asserted, trademarks do not only symbolise the proprietor’s goodwill but also create it. 1772 The trademark functions to identify a product as satisfactory and thereby to stimulate further purchases by the consuming public. 1773 By asserting that origin in § 43(a)(1)(A) Lanham Act does not mean the source of any idea, concept, or communication, the Supreme Court in Dastar 1774 is ignoring the communication function of the trademark. Judge Scalia asserted that brand-loyal consumers do not believe that brands such as Coca-Cola Company or PepsiCo that those companies were the origin of the drink, in the sense that they were the first to devise the formula. “The consumer who buys a branded product does not automatically assume that the brand-name company is the same entity that came up with the idea for the product, or designed the product - and typically does not care whether it is.” 1775 Hughes refuted Judge Scalia’s examples by showing the unbroken line between the persons who devised the formula, name and logo, and the respective corporations. Hughes made clear that neither company produces most of the Cola marketed under their names and that origin here does not mean manufacturing entity, but rather license their brands. 1776 One can also think about original equipment manufacturers (OEM) in China and EU and U.S. licensors. Judge Scalia acknowledges that origin of goods “might be stretched … to include not only the actual producer, but also the trademark owner who commissioned or assumed responsibility for (“stood behind”) production of the physical product, so that “origin” can be interpreted as 1772

Schechter, supra note 100, at 818. Id., at 818. 1774 Supra note 1763. 1775 Id., at 32. 1776 Hughes points out that § 43(a)(1) Lanham Act has no less than 16 times the word “or” in the provision. Hughes, supra note 1669, at 687. 1773

319 “sponsorship” or “approval,” conform § 43(a)(1)(A), 1777 which can be categorised as protection against a likelihood of confusion. Excluding a likelihood of confusion, what is the link between moral rights and trademark dilution?

Chapter 8.5 Trademark as the personification of the trademark holder One must make a distinction between personality rights on the one hand and the personality of the copyright holder on the other. Here the personification of the trademark by the trademark holder will be proposed as a linkage between the personalities of trademark holder and trademark.

Personality rights Doctrinarily, the distinction between moral rights and personality rights is that the rights of personality is a category of rights that includes but is not limited to the moral rights. The rights of personality are also inalienable and are premised on the personality and not on the existence of any work. 1778 Patrimonial rights 1779 in Swiss law could be protected via rights of personality even before Switzerland introduced moral rights into its Law on Copyright and Neighbouring Rights which entered into force on July 1, 1993. 1780

1777

Hughes points out that § 43(a)(1) Lanham Act has no less than 16 times the word “or” in the provision. Id., at 688. 1778 Rigamonti, supra note 1646, at 393. 1779 Rigamonti points to 1 FRIEDRICH CARL VON SAVIGNY, SYSTEM DES HEUTIGEN RÖMISCHEN RECHTS (1840), at 339–40, for a classic definition of patrimony: the totality of an individual’s property rights and obligations. Id., at 392, footnote 221. 1780 François Dessemontet, Letter from Switzerland: The New Copyright Act, at 6-8, available at: http://www.unil.ch/webdav/site/cedidac/shared/Articles/New%20Copyright%20Act.pdf (accessed August 20, 2013).

320 Stability-dynamism paradox According to Heraclitus one never enters the same river twice. 1781 But when one enters the river for the second time, the river is still named the same. The same can be said of authors, who regenerate all of their cells each seven years 1782 and accumulate experiences which might influence their work, but often still go by the same name. Trademark holders’ products and services oftentimes change over time due to changes in the market demands and innovation. However, oftentimes, the trademark remains stable during these changes of the product, in order to accumulate goodwill and not destroy the investments made via advertisements in the brand. The trademark holders cultivate their trademark logo as a beacon of goodwill, welcoming customers back and inviting new ones. In some civil law countries the author has moral rights even after his life, in order to protect the honour of the family of the author. In this way, moral rights can be seen as intergenerational. Like the family of an author that passed away and that share the name with the deceased, trademark holders operate under the same logo as their predecessors. Just as families cultivate values pass them on to the next generation, so have trademark holders corporate cultures they cultivate and continue. Trademark holders can continuously keep a trademark registered for generations. 1783 As already pointed out in the literature review, Hughes clarified the interest of non-owners in stable marks, that might outweigh the interests of those who want to be able to recode the mark. 1784 And paradoxically some kind of stability is required in order to recode at all, because otherwise the difference of the recode in relation to the encoded version cannot even be perceived. 1785

1781

“Everything changes and nothing remains still (...) and (...) you cannot step twice into the same stream.” PLATO, CRATYLUS (360 B.C.E.) (Benjamin Jowett, transl. 1871), para. 402, sect. a line 8. 1782 “Every single cell in our skeleton is replaced every 7 years.” Institute for Stem Cell Biology and Regenerative Medicine, Stanford School of Medicine, available at: http://stemcell.stanford.edu/research/ (accessed August 20, 2013). 1783 The iconic red triangle trademark of Bass Brewery was registered in 1875 and has been registered continuously ever since. 1784 Justin Hughes, “Recoding” Intellectual Property and Overlooked Audience Interests, 77 TEX. L. REV. 923, 941 (1999). 1785 Id.

321 Personification of the trademark holder in the trademark Just as the work include constant idiosyncrasies of its author, the trademark has unique everlasting DNA of its trademark holder. Feldman does not concur to this assertion. 1786 To continue the metaphor used above, the name of the ever changing river might stay the same, but what if someone without permission is changing the stones in the river so that the course of the river is repositioned and that some shores will be inundated? When the content of a copyright work is adapted a bit without the permission of the copyright holder, this would constitute copyright infringement and a violation of the right of integrity of the work. But if the work is adapted in such a rigorous way, a transformation could take place, so that a new work comes into being of which the transformer is the author. A trademark is encoded with meaning by the trademark holders, then the trademark is decoded by the consumers who come across it. Just as the copyright of a work can be infringed and the right of integrity of its content violated, the recoding can constitute trademark dilution if the famous trademark, or trademark with a reputation is used in an unsavoury way (as discussed in Chapter 6 “Trademark Dilution and Its Defences”). Copyright can be assigned but the moral right of the work cannot. The question is whether a trademark can be assigned or transferred without the accompanying goodwill. For example, when The Body Shop, a cosmetics chain that was known for its corporate social responsibility and environmental policies, was sold to cosmetics manufacturer L’Oréal, some were concerned that the goodwill that The Body Shop built up with social activism would de facto be lost. Especially there was a controversy about whether The Body Shop as part of L’Oréal would still honour their pledge not to test on animals. 1787

1786

“Unlike copyrights, trademarks do not equally express the “personality” of the creator.” Feldman, supra note 212, at 173 (2003). 1787 Founder of The Bodyshop Roddick countered the criticism. “Rather, she sees herself as a kind of "trojan horse" who by selling her business to a huge firm will be able to influence the decisions it makes.” Claudia Cahalane, “Interview: Anita Roddick, ‘I believe they are honourable and the work they do is honourable’,” The Guardian, November 3, 2006, available at: http://www.guardian.co.uk/business/2006/nov/03/ethicalliving.environment (accessed August 20, 2013).

322 Art becoming commoditised, trademarks becoming art Professor Tan proposed to shift away from art’s classic “personhood” or “anticommodification” arguments, and asserted that due to the commodification of art, moral rights can do for art what trademark law has done for other commodities by “avoiding post-sale consumer confusion, promoting truthful source identification, and encouraging active mark policing.” 1788 Based on the fact that trademarks have developed from commodious vehicles to carriers of meaning, and that there is a continuum from commerce to culture, it can be argued that the trademark logo can be well aligned with personhood. This dissertation asserts that the trademark could be better protected if moral rights were added to the actionable rights for trademark infringement and dilution.

Transforming and trans-coding Transformation can be understood as the introduction of new insights, understandings, expression and meaning to a work. Therefore it looks a lot like recoding of a trademark. When trademarks are recoded in a counter-majoritarian manner, which media scholar Stuart Hall would call “trans-coding,” 1789 Tan argued that they should be able to obtain protection under the freedom of speech guarantees. 1790 No bright line test is available to determine when transformation has taken place. However in Kelly v Ariba Soft Corp.1791 and in Perfect 10, Inc. v Google Inc. 1792 each court determined that repurposing of a work to aid identification of the original work is transformative. This repurposing of a work to aid identification of the original work, is similar to the descriptive use of trademarks as discussed in Chapter 5 “Trademark Infringement and Its Defences”.

1788

Xiyin Tang, The Artist as Brand : Toward a Trademark Conception of Moral Rights, 122 YALE L.J. 218, 222, 248-249 (2012). 1789 [T]aking an existing meaning and re-appropriating it for new meanings.” Stuart Hall, The Spectacle of the ‘Other’ in REPRESENTATION: CULTURAL REPRESENTATIONS AND SIGNIFYING PRACTICES, (Stuart Hall, ed., 1997), at 270. 1790 David Tan, Lady Gaga and Popular Culture: Rethinking Personality Rights and Trademarks, presentation, University of Hong Kong, October 10, at 7, available at: http://www.lawtech.hk/wpcontent/uploads/2012/10/David-Tan-HKU-Oct-2012amend.pdf (accessed August 20, 2013). 1791 Supra note 15. 1792 Supra note 10.

323 The thumbnails in Kelly 1793 and Perfect 10 1794 representations of images were allowed to make these images searchable via search engines Ditto.com and Google. In these cases the object of contention were the reproductions of copyrighted photographs by Les Kelly and Perfect 10, respectively. The question remains why these search engines have to make the images copy-and-pasteable, and why Google Images has only a “Images may be subject to copyright” disclaimer. Google Images does not limit itself to indexing the pictures and providing thumbnails which link to the original websites. Instead it provides first an overview with thumbnails, then after clicking on one thumbnail the image is given in high resolution and even in a bigger size than the original imposed over the original website, so that the picture can be copied without even visiting the original website. On the right hand side there is a link to the original site, a link to full-size image, that also does not show anything of the original site. Chs. 1 III iii and 7.3.1, discusses that this presentation of images, including trademark logos can pose serious problems for trademark holders.

Personality of the trademark “For what are our faculties, but the extension of our personality? and what is property, but an extension of our faculties.” 1795 Rierson described famous trademarks as “anthropomorphized corporate children that have fictional personalities and “friends” on Facebook.” 1796 She illustrated this phenomenon with the Barbie trademark owned by Mattel. The doll Barbie has over 2.5 million Facebook friends. “Mattel deliberately uses Barbie’s online image to create a specific persona associated with the famous Barbie trademark.” 1797 Rierson pointed out that one should consider the intensely personal relationship the corporate world has with its brands to understand the analogy between moral rights law and dilution. 1798 Trademarks often become at least as famous as celebrities. Trademark holders often follow the same path as celebrated personalities, by presenting their trademark as a 1793

Supra note 15. Supra note 10. 1795 FRÉDÉRIC BASTIAT, THE LAW (1850), (Ludwig von Mises Institute, republished 2007) at 2. 1796 Rierson, supra note 216, at 214. 1797 Id., at 274. 1798 Id. 1794

324 persona. Therefore Tan’s scholarly work on celebrity, culture studies and the right of publicity has been enlightening. 1799 David Marshall’s Celebrity and Power citation 1800 by Tan, the word “celebrities” can be substituted for “trademarks” without compromising any of its veracity: “[Celebrities] are the active agents that in the public spectacle stand in for the people ... Celebrities, in this fluid construction of identity through consumption, represent flags, markers, or buoys for the clustering of cultural significance through patterns of consumption ... The celebrity functions as a semistable identity and cultural icon that runs through several cultural forms and establishes an identity through which an audience can estimate the cultural forms’ relative value.” 1801

Chapter 8.6 Trademark dilution seen as moral right Bird compared trademark dilution with moral rights in 2009. 1802 Port remarked that the trademark right in the U.S. has become “more similar to the nature and extent of moral right protection, rather than the mere right to exclude.” 1803 Port argued that “[t]he only justification that makes sense [for U.S. dilution laws] is to say that the holders of famous marks obtain a personality right in and to that mark much like the notion of a moral right.” 1804 Rierson asserted that trademark dilution is an unjustifiable moral right for trademark owners and recommended that it be amended or eliminated: “A better explanation for dilution, as well as its practical utilization, is that it is a moral right that has been statutorily conferred upon the corporations that create, nurture, and profit from famous trademarks. Like the authors of creative works, these corporate entities would like to control all uses of their marks, particularly those that are offensive to them, and not just those that cause them economic harm.” 1805 One can argue that use of trademarks

1799

David Tan, Beyond Trademark law: What the Right of Publicity Can learn from Cultural Studies 25 CARDOZO ARTS & ENT. L.J. 913 (2008). 1800 DAVID MARSHALL, CELEBRITY AND POWER: FAME IN CONTEMPORARY CULTURE 61, 244-245 (1997). Tan, supra note 1799, at 947, footnote 165. 1801 MARSHALL, id., Tan, supra note 1799, at 947, footnote 165. 1802 Robert C. Bird, Moral Rights: Diagnosis and Rehabilitation, 46 AM. BUS. L. J. 407, 438-39 (2009). 1803 Kenneth L. Port, The Expansion Trajectory: Trademark Jurisprudence in the Modern Age, 92 J. PAT. & TRADEMARK OFF. SOC’Y 474 (2010). 1804 Kenneth L. Port, Judging Dilution in the United States and Japan, 17 TRANSN’L L. & CONTEMP. PROBS 667, 681-82 (2008). 1805 Rierson, supra note 216, at 269.

325 that is offensive has a negative impact on the value of the trademark therefore causes economic harm. In contrast, Port asserted that the only justification for trademark dilution law is that holders of famous marks obtain a personality right, much like the notion of a moral right. 1806 However, trademark dilution law does not protect any non-famous trademark logo.

Why trademark dilution does not pre-empt the need for a moral right for the trademark logo As illustrated above by proponents and opponents trademark dilution law can be seen as a kind of moral right for trademarks. However, trademark dilution only protects those trademark logos that are famous or have a reputation. However, Chapters 5 and 6 made clear that the unauthorised non-commercial use of a trademark logo, that has not reached the requested level of fame or reputation, can cause substantial damages to the reputation and goodwill of the trademark logo. Arguably, the unauthorised non-commercial use of the trademark logo can lead to confusion and or to a violation of the integrity of the trademark logo, therefore a special moral right to integrity for the trademark logo, in contrast to trademark names could be a remedy that could be automatically enforced as will be demonstrated in Chapter 9 “Paradigm shift”. Trademark dilution doctrine is discriminatory against trademarks that have not yet reached a certain level of fame or reputation, as concluded in Chapter 6. There is no convincing reason, but a semantic one, to provide only famous trademarks or trademarks with a reputation the protection against trademark dilution. Often the argument is made that because if a trademark is not famous or has no reputation there is nothing to dilute. A glass of wine can be diluted by adding water. However, fame, notoriety or reputation of a trademark is unlike wine. The difference between a trademark that is considered famous and one that is for example famous in a smaller market is relative. To withhold the protection against trademark dilution by tarnishment only for famous brands seems to be arbitrary and perverse. Why should it be possible to tarnish a trademark that is only 1806

Port, supra note 1804, at 681.

326 famous in a small market? Besides, each trademark that is not recognised as famous has the potential to reach that stage at some moment. One can also argue that to reward a trademark with extra protection once it has become famous or gained a reputation becomes effective and cannot be seen as an ex ante incentive. Compare this with the sensible principle in author’s right that the moral right protects the reputation or honour of each author, regardless of his level of reputation. To automatically enforce famous trademark logos against trademark dilution is not possible, unless these trademarks are first acknowledged famous or in the possession of a reputation by the relevant trademark authority and a database must be set up in which the famous trademark logos can be distinguished from the non-famous trademarks. This thesis holds it preferable that logos that have passed the threshold of distinctiveness, inherently or acquired, and are registered as trademarks should be protected against unauthorised use, including non-commercial use by the moral right of integrity. As already alluded to in Chapter 6, the moral right of integrity is fully compatible with the right to freedom of expression on social media, by linking back to the original trademark logo. As will be explained in Chapter 9, the application of the moral right of integrity opens up the possibility of automatic enforcement.

Chapter 8.7 Rationale for moral right of integrity for the trademark logo “Trademarks, trade names, logos, and the other symbols of commerce have evolved. The law must evolve with them.” Judge Kozinski of the Ninth Circuit (1993) 1807 To copy-and-paste a trademark logo on social media and profiting from its attractiveness or reputation, is reaping where one has not sown. This equals misappropriation of or unjust enrichment from the trademark holder who has expended labour, skills and money 1808 on its trademark logo. The rationale for moral right of integrity for the trademark logo is not only its proprietary 1809 nature 1810 which deserves protection against plunder, 1811 but also the 1807

Kozinski, supra note 56. Compare for misappropriation in copyright law Internat’l News Service v Associated Press, 248 US 215 (Sup Ct, 1918). 1809 Locke: “Whatsoever then [man] removes out of the State that Nature hath provided, and left it in, he hath mixed his Labour with, and joyned to it something that is his own, and thereby makes it his Property.” LOCKE, supra note 302, Ch. 5, § 27. 1808

327 destruction of capital invested in its reputation and the need for stable trademark logos, as discussed in Chapter 8.4. Aoki asserted that a trademark logo can be seen as the result of a creative process, “which leads to their ability to be owned.” 1812 Lastowka demonstrated that some courts use trademark law to protect creativity, 1813 which leads to a call to limit the scope of ownership when third persons use existing trademarks for their successive creative efforts. 1814 Trademark logos are nothing more than, but also nothing less than signifiers of the source of origin and carriers of reputation. Therefore the trademark holder should not only be the sole determinant of this property when used in a commercial manner, but also in a non-commercial manner, 1815 just like the proprietor of any property used for commercial purposes does not have to tolerate third parties using his property if he is not using it commercially.

No excuse for copying someone’s trademark name, even more so for someone’s trademark logo According to Professor Beebe: “[o]ne reason why trademark law has traditionally granted broader protection to inherently distinctive marks is to provide an incentive to trademark producers to generate new words rather than appropriate from the language preexisting words for commercial purposes.” 1816 Judge Kozinski in Dreamwerks Prod.

1810

The Lockean notion that one is entitled to the fruits of one’s labor – and the converse, that one is not entitled to profit from the results of someone’s else’s labor – was dominant in the nineteenth century and prevalent in early trademark law. Mark P. McKenna, The Normative Foundations of Trademark Law, 82 NOTRE DAME L. REV. 1839 (2007). 1811 “Man can only derive life and enjoyment from a perpetual search and appropriation; that is, from a perpetual application of his faculties to objects, or from labor. This is the origin of property. “But also he may live and enjoy, by seizing and appropriating the productions of the faculties of his fellow men. This is the origin of plunder.” BASTIAT, supra note 1795, at 5 1812 Keith Aoki, Authors, Inventors and Trademark Owners: Private Intellectual Property and the Public Domain, Part II, 18 COLUM.-VLA J.L. & ARTS 191, 242 (1994). 1813 Greg Lastowka, Trademark’s Daemons, 48 HOUS. L. REV. 779, 791–98 (2011). 1814 Dreyfuss, supra note 35. 1815 When testifying before Congress on the subject of the Federal Trademark Dilution Act, counsel for Warner Brothers Studios said: “[T]he trademark owner, who has spent the time and investment needed to create and maintain the property, should be the sole determinant of how that property is to be used in a commercial manner.” Federal Trademark Dilution Act of 1995: Hearing Before the Subcomm. on Courts and Intellectual Property of the H. Comm. on the Judiciary, 104th Cong. 111 (1995) (statement of Nils Victor Montan, Vice President and Senior Intellectual Property Counsel, Warner Brothers). 1816 Beebe, supra note 92, at 673.

328 Group., Inc. v SKG Studio 1817 cast doubt on the defendant’s contention that “almost every combination of words has been taken by someone doing business somewhere in what may be a loosely related field,” 1818 suggesting that the defendant could easily have authored a new trademark. “A clever new trademark”, judge Kozinski wrote, “diversifies both the marketplace and the marketplace of ideas; a takeoff or copy of a mark, even if accidental, adds nothing but confusion. This dispute could have been avoided had DreamWorks been more careful, or a tad more creative, in choosing its name.” Judge Kozinski’s words are a fortiori applicable to the trademark logo.

“Warming up” of undesirable user-generated content Lessig explained that online behaviour is influenced by “laws, market forces, social norms, and code, the equivalent of architecture in real-life, the physical and digital infrastructure of what we call cyberspace.” 1819 Norms are “social attitudes of approval and disapproval,” according to Sunstein. 1820 Many internet users do not know that there is anything wrong with copying and pasting a trademark on social media without the authorisation of the trademark holder. Their idea is that they can use everything they find on Google Images which is copy-and-pasteable. “Why otherwise did Google make this technically possible?” This rhetorical question is understandable. The norm of the internet users and the social media providers clearly differs from that of the trademark holders. The trademark holders have been overwhelmed by the opportunities but also risks of social media, and some have been defeatist about what can be done to teach internet users a norm that they should not use the trademark logo unauthorisedly and respect its moral right of integrity. Because internet users see others use trademark logos unauthorisedly Lee argued that this can lead to a “warming up” instead of a chilling effect on user-generated content. 1821 Smith wrote that “[w]here the harms of imprecise exclusion outweigh the benefits of simple interface conditions, a governance regime, using more complex interface

1817

Dreamwerks Prod. Grp., Inc. v. SKG Studio, 142 F.3d 1127 (9th Cir. 1998). Id., at 1132. 1819 LAWRENCE LESSIG, CODE V.2.0 (New York: Basic Books, 2006), at 5-6, 24. 1820 Cass R. Sunstein, Social Norms and Social Roles, 96 COLUM. L. REV. 903, 914 (1996). 1821 E. Lee, Warming Up to User-Generated Content, U. ILL. L. REV. 1459, 1459 (2008). 1818

329 conditions, is justified.” 1822 The implication is that trademark law would be expanded with the moral right of integrity for the trademark logo. Therefore Hypothesis 4. can be answered in the affirmative: the unauthorised use (including the non-commercial use) of the trademark logo should be protected by the moral right of integrity. However, until this becomes a reality trademark holders can already start protecting their trademark logo on social media in a contractual way, see Chapter 9.2 “Contractual solution”.

1822

Henry E. Smith, Intellectual Property as Property: Delineating Entitlements in Information, 116 YALE L.J. 1742, 1765 (2007).

330

Chapter 9 Implementation of a Paradigm Shift Proactive solutions in walled gardens of social media as testing grounds towards algorithmic justice Introduction Lessig wrote: “When commerce writes code, then code can be controlled, because commercial entities can be controlled.” 1823 He added prophetically that: “Commerce has a purpose, and government can exploit that to its own end. It will, increasingly and more frequently, and when it does, the character of the Net will change. Radically so.” 1824 However, this does not need to be dystopian as will be shown in this chapter. In order to provide sufficient protection of the trademark logo on social media, a paradigm shift is needed. Chapter 9.1 proposes an amendment of the law. Until the legislation has been adapted, a contractual solution with a comparable outcome could be implemented as a testing ground for the juridical solution as will be proposed in Chapter 9.2. Mindful of the automatic enforcement requirement, Chapter 9.3 makes the authorised use of the trademark transparent. Then, Chapter 9.4 explains that the unauthorised use of the trademark needs to be removed. Chapter 9.5 suggests instead of the ineffective safe harbour provisions an effective pre-upload filtering solution. Beside the advantage of automatic enforcement, Chapter 9.6 makes clear that the pre-upload filtering system also provides the possibility of optimising policy goals. Chapter 9.7 discusses that when the abovementioned system has been implemented the paradigm will shift which can lead to a situation which can be called algorithmic justice. If that happens legal certainty and predictability for all stakeholders can be enhanced and trust 1825 in a fair system where the trademark logo is respected can be restored.

1823

LESSIG, supra note 1819, at 72. Id., at 80. 1825 “Trust is the expectation that arises within a community of regular, honest, and cooperative behavior, based on commonly shared norms, on the part of members of that community. FRANCIS FUKUYAMA, TRUST: THE SOCIAL VIRTUES AND THE CREATION OF PROPERITY 26 (1995). 1824

331 Chapter 9.1 Juridical solution “For every day we stand entrenched in the legacy models of the past we are denying the opportunity of the future.” 1826 Often, law is perceived as lapidary. But it is a living creature. It can give birth to more law, or if it is cut off from the oxygen of societal utility, it can become obsolete and perish. In 1927, Schechter placed his vision of trademark expansion in a historical perspective: “There is no part of the law which is more plastic than unfair competition, and what was not reckoned an actionable wrong 25 years ago may have become such today” 1827 Schechter’s vision of trademark expansion was partly implemented 68 years later and only in a diluted form (as pointed out in Chapter 6 “Trademark Dilution and Its Defences”). Then, the protection and enforcement of content was impacted by the most disrupting medium so far: the internet, which led to accommodations in the U.S. and EU via safe harbor provisions which lead to undesirable behaviour and which increased legal uncertainty (see Chapter 7 “Intermediary liability”). But the rise of social media with its user-generated content was not factored in, thanks to the legal lag. 1828 Therefore a right to protect and enforce the moral rights for the trademark logo is proposed (see also Chapter 8 “Moral rights”). One can distinguish three moral rights, which will be demonstrated in respectively Chapter 9.1.1 “The right to disclose and withdrawal”, Chapter 9.1.2 “The right of attribution” and Chapter 9.1.3 “The right of integrity”. These rights could be implemented together with a proactive model of OSP liability that must substitute the de facto defunct safe harbour provisions.

1826

Brian Fitzgerald, Ch. 9 - Copyright 2010: the future of copyright law; in COPYRIGHT LAW, DIGITAL CONTENT AND THE INTERNET IN THE ASIA-PACIFIC (Brian Fitzgerald, Fuping Gao, Damien O'Brien, Sampsung Xiaoxiang Shi, eds., 2008) at 173. 1827 Schechter opens his 1927 article, which became the fundament of the dilution doctrine, with a sentence from the case Ely-Norris Safe Co. v Mosler Safe Co., 7 F. (2nd) 603, 604 (C.C.A. 2nd, 1925). Supra note 100, at 813, footnote 1. 1828 This author proposes to apply the theory of the cultural lag by Veblen on the fact that the law is drafted in response to changes in society, but when the law is implemented, after a complex and lengthy legislative cycle, new changes in society require new law. VEBLEN, supra note 40.

332 Chapter 9.1.1 Right to disclose and withdraw The right to disclose and withdraw a trademark logo should be reserved for trademark holders. Just as an author is the only one who can decide when and where his work will be disclosed, so too should the trademark holder be the only one who decides when and where his trademark logo will be disclosed or withdrawn. Internet users should exclusively be able to use a trademark with the permission of the trademark holder as long as the trademark holder does not want to withdraw its trademark logo from the social media sites, which is more practical than one would expect at first glance, as can be read below (see Chapter 9.5 “Making unauthorised trademark use disappear”).

Chapter 9.1.2 Right of attribution The trademark logo has been described as a way to clarify what the origin of the source is (see Chapter 2.8.1 under “Source of origin”). This could be seen as the trademark version of the right of attribution. Chapter 6 “Trademark Dilution and Its Defences” concluded that the right to extend the trademark logo to other activities should be protected. This would make dilution by blurring superfluous, because at least the trademark logo could distinguish between two companies that use the same trademark name. The right to extend the trademark logo can be compared in copyright to the protection of a derivative work, that can only take place with the permission of the author. If the trademark logo is used as an illustration with a critical comment this thesis argues that it would show respect for the journalistic principle of a fair hearing to all parties involved to link back to the site of the trademark holder as proposed in Chapter 6 “Trademark Dilution and Its Defences”. Metadata is now exclusively used or abused 1829 for copyright protection, 1830 but there is no reason why the use of metadata cannot be extended to the protection of the trademark logo as well.

1829

Jonathan Bailey, “Facebook, Flickr Strip Copyright Data from Images”, Plagiarism Today, November 5, 2008, available at: http://www.plagiarismtoday.com/2008/11/05/facebook-flickr-strip-copyright-data-fromimages/ (accessed August 20, 2013). 1830 Conrad Chavez, “Facebook now displays image copyright and caption metadata in photo albums”, Conrad Chaves Blog, June 27, 2011, available at: http://blog.conradchavez.com/2011/06/27/facebooknow-displays-image-copyright-caption-metadata/. Exchangeable image file format (Exif) is a standard that specifies the formats for images, sound, using metadata tags, covering a broad spectrum, including copyright information. Exchangeable image file format, Wikipedia, available at: http://en.wikipedia.org/wiki/Exchangeable_image_file_format (both sites accessed August 20, 2013).

333 Chapter 9.1.3 Right of integrity Dilution by tarnishment, in which a trademark with a reputation or a famous trademark is protected against usage in an unsavoury way, is comparable to the right of integrity that protects against any distortion, mutilation or other modification of, or other derogatory action in relation to a copyright work. This thesis opines that all trademark logos should be protected from tarnishment and not just the trademark logos from famous trademarks or trademarks with a reputation. Trademark logos that fall outside the scope of a famous trademark or trademark with a reputation can still be famous or have a reputation within a more limited market or will be famous in the future. 1831 Thus, there is no reason why such trademark logos should be declared outlaws. The right to freedom of expression can be respected together with the right of integrity of the trademark. For example if the trademark logo is used in an online parody, the right of integrity of the trademark logo can be maintained by linking back to the original version of the trademark logo. 1832

Chapter 9.2 Contractual solution Until the law is amended, the protection and enforcement of the trademark logo on social media can be tested using contractual solutions. 1833 Samuelson’s words can be used again: “Both bodies of law [contract law and intellectual property law] must have to work together if the information economy is to achieve its full potential.” 1834 Chapter 9.2.1 explains the walled garden phenomenon, then Chapter 9.2.2 discusses the advantages of diversity, Chapter 9.2.3. investigates how the market forces shape law in

1831

As pointed out in Chapter 6, the stability-dynamism paradox makes any determination of the fame or reputation of a trademark logo a historic snapshot. 1832 It is relevant to also read Litman on linking back for copyright works: “Authors have a legitimate concern, and that concern is often shared by the public. Finding the authentic version of whatever document you are seeking can in many cases be vitally important.” Jessica Litman, Symposium: Innnovation And The Information Environment: Revising Copyright Law for the Information Age, 75 OR. L. REV. 19, 47 (1996). 1833 Anthony Lester’s remark about U.K. defamation law could be applied here to trademark law: “Our law suffers from the twin vices of uncertainty and overbreadth. The litigation that it engenders is costly and often protracted. It has a severe chilling effect on the freedom of expression (..)” Anthony Lester, “These disgraceful libel laws must be torn up, The Times”, March 15, 2011, available at: http://www.thetimes.co.uk/tto/opinion/columnists/article2946193.ece (accessed August 20, 2013). 1834 Pamela Samuelson, Intellectual Property and Contract Law for the Information Age: Foreword to a Symposium, 87 CAL. L. REV. 1 (1999).

334 the private sphere. Finally Chapter 9.2.4 looks at how technological developments can benefit a contractual solution.

Chapter 9.2.1 Walled garden phenomenon Social media, such as Facebook, Twitter and Pinterest, have brought applications together behind what can be called walled gardens, whose functions once could only be found at different places on the internet. Helmond and Gerlitz articulated it thus: “The move from link to like as the dominant web currency symbolizes the shift in the attention economy from search-driven navigation to the self-referential or gated dwelling in social media.” 1835 The implications are that these applications can amplify each other, but also that all of these applications where internet users used to have a more private relationship to the applications, were brought into a more public place. However, although the character of these walled gardens might seem in some aspects rather public, 1836 they are walled and fall within the contractual barriers set by the walled garden owner. Therefore, inside a walled garden a different micro-ecology of rules and regulations prevail in comparison to the outside. To demonstrate the walled garden phenomenon first some physical world examples will be given, such as the World Cup Football and the Olympic Summer and Winter Games, where more restrictive rules of brand use are imposed in and even outside the stadiums. 1837 Cities that want to have a chance to host one of the abovementioned international sports events, have to abide by the rules of the organisers, thanks to the fierce competition between bidding countries. Fédération Internationale de Football Association 1835

Anne Helmond & Carolin Gerlitz, Hit, Link, Like and Share. Organizing the social and the fabric of the web in a Like economy, DMI-mini conference University of Amsterdam, January 24-25, 2011, available: http://www.annehelmond.nl/wordpress/wp-content/uploads//2011/04/GerlitzHelmondHitLinkLikeShare.pdf (accessed August 20, 2013). 1836 Social media allow the internet user’s profile to be partially searched and found by people that are not a connection of that particular internet user, depending on the privacy settings of the internet user. 1837 For example within a one kilometre radius of a stadium no advertising activity is allowed except with the prior approval of the municipality; see Article 2.1.2.2. of the 2010 FIFA World Cup South Africa Bylaws of the eThekwini Municipality, Published in terms of Municipal Systems Act 32 of 2000, at 25, available at: http://ccs.ukzn.ac.za/files/Fifa%20ethekwini%20law.pdf (accessed August 20, 2013). Aparna Watal gives a workable definition for ambush marketing: “Casted as an “amorphous concept” by some academics, ambush marketing can be broadly described to encompass activities that exploit the publicity value of an event without incurring any obligations of a sponsor.” Aparna Watal, FIFA World Cup 2010: An Analytical Study of the Effectiveness of South African Intellectual Property Regime to Combat Ambush Marketing and Counterfeiting (2010), at 4, available at: http://ssrn.com/abstract=1699722 (accessed August 20, 2013).

335 (FIFA) and International Olympic Committee (IOC), demand candidate countries to agree with a long list of requirements: from investments in infrastructure to rules in regard to advertisements and marketing activities. These so called Rights Protection Programmes, are rules to guarantee sponsors of these events complete exclusivity, prevent ambush marketing, 1838 combat counterfeit merchandise and trade, and to keep ‘clean venues’, where no advertising or commercial identification is allowed. 1839 By purchasing a ticket the visitor agrees to abide by the rules of the stadium, including the rules on brand use. 1840 One should realise that in case of ambush marketing the perpetrator is not using the trademark in a trademark sense, because not in the course of trade or in a commercial way (see Chapter 5.1. “Commercial use”). That the rules can be more restrictive for users of a brand inside the walled gardens than outside could also be observed during the match between the Netherlands and Denmark, at the World Cup Football in South Africa. 1841 A group of women, who were first dressed in the Danish colours, changed into orange skirts. That raised a lot of attention. 1842 Although the dresses did not bear any logo of beer brewer Bavaria, who initiated the action, the women became rapidly known as the “Bavaria Babes” after they were expelled from the stadium. The action by Bavaria, a competitor of Anheuser-Busch who was an official sponsor of FIFA's World Cup, was considered ambush marketing, and was therefore prohibited in the stadium. FIFA had pressured the South African authorities to intervene, which they did. Two women were charged with “unauthorised use of a trademark at a protected event” and “entry into a designated area while in possession of a prohibited commercial object.” 1843 In other words, organisations such as FIFA and IOC can stop the use of brands that compete with the brands of their sponsors 1838

Engaging in “ambush marketing” is prohibited by article 2.1.1.1. of the 2010 FIFA World Cup South Africa By-laws of the eThewkini Municipality, id., at. 25, footnote 58.. 1839 FIFA’s Rights Protection in the run-up to the World Cup 2010, available at: http://www.fifa.com/mm/document/affederation/marketing/01/18/98/99/march2010rightsprotection_a5_20 100308.pdf (accessed August 20, 2013). 1840 A distinction must be made between use of a trademark in a commercial way, or use of a trademark not as such, which will be called here brand use, using the jargon of the organising entity. 1841 Match between the Netherlands and Denmark, FIFA's World Cup Football in South Africa, June 20, 2010. 1842 “Bavaria Babes” in action on YouTube, available at: http://www.youtube.com/watch?v=U7Ih7hPTn4w&feature=player_embedded (accessed August 20, 2013). 1843 Based on South Africa’s Article 9(d) Trade Practice Act 1976 and article 15A Merchandise Marks Act number 17, 1941, which outlaw the misuse of registered marks and unfair competition.

336 in their stadiums. Outside these walled gardens such an exclusion of competition would be unthinkable. Interestingly, the walled garden phenomenon can be applied to the online world as well. Here too, the contractual solution can be more restrictive than the law. This can be illustrated by comparing the law on registration of trademark names in the Lanham Act 1844 with the Terms of Service of Second Life, 1845 where users can build virtual objects and engage in commerce. In the outside world, a refusal to register a trademark cannot prevent that an unregistered trademark will be still used in commerce. However an account name that is considered “vulgar, offensive, or otherwise inappropriate” by Second Life will be prohibited for all uses. One of the first social media sites The Well described itself as “one of the most noted ‘walled gardens’ in the world.” 1846 Conditions at one social media site are different from the other, which is reflected in the respective Terms of Use (as discussed in Chapters 3.2.5-8). Heymann wrote that “in any online environment, the system’s corporate owner can control almost every aspect of the experience, either through the architecture of the system or by policies that exact compliance as a condition of participation.” 1847 Heymann pointed out that especially in large or disparate communities or social networks that are not cohesive one can argue that the OSP has the responsibility to make the recognition more formal and to enforce such interests. 1848

Chapter 9.2.2 Diversity A plethora of walled gardens, each with a different set of contractual conditions leads to a diversity that can lead to real innovations in systems. An example could be chartered cities, as proposed by economist Paul Romer. 1849 Chartered cities are city-scale

1844

Lanham Act § 2(a), 15 U.S.C. § 1052(a). Second Life, Terms of Service, available at: http://secondlife.com/corporate/tos.php (accessed August 20, 2013). 1846 “The WELL – Learn About The WELL”, The Well, available at: http://www.well.com/aboutwell.html (accessed August 20, 2013). 1847 Laura A. Heymann, A Name I Call Myself: Creativity and Naming, 2 U.C. IRVINE L. REV., 585, 614 (2012). 1848 Id., at 624. 1849 Paul Romer, Why the world needs charter cities, TED presentation, July 2009, available at: http://www.ted.com/talks/paul_romer.html (accessed August 20, 2013). 1845

337 administrative zones, with their own rules and regulations and institutions, which could be governed by another government than the rest of the country. 1850 Seasteading, 1851 a system for living and working, whereby working units connect to sea settlements, are floating walled gardens, and each owner of a unit has the power to connect to or disconnect from these settlements. This could make the doctrine of social contract from a fictitious to a pragmatic one. Seasteading founder Patri Friedman foresees “a Cambrium explosion of governance” 1852 at the different settlements. Those floating walled gardens that attract the most units obviously have the most attractive contract. This can lead to competition by the other settlements to come up with an even better contract. Social media, the online walled gardens, can also be hatcheries of innovation. 1853 In respect of technical features: Facebook first made it possible to put pictures and video on its Facebook page, then Twitter followed with the same features. In respect of terms of use: theoretically one could imagine one social media becoming more popular by protecting and enforcing a better privacy policy. However, in practice social media have high exit barriers. In case there would be an alternative for Facebook with the same or better fundamental features and a better privacy policy, the fact is that one is connected to friends, family, business connections and acquaintances through this particular social media. The advantages of a better social media will be weighed against the disadvantages of having to learn how the new social media works, build up a new profile, again uploading cherished content, inviting the old connections to the new social media and losing some of the existing connections in the process. Also there is a fear for a fragmentation of ones activities over several similar social media to keep contact with all ones connections which is locking in most internet users to one particular social media for a certain purpose. 1850

Chana Joffe-Walt & Jacob Goldstein, “Almost a chartered city, named Dot, was established in Honduras,” 483: Self-Improvement Kick, Act Two, Some Like it Dot, This American Life radio, January 4, 2013, available at: http://www.thisamericanlife.org/radio-archives/episode/483/self-improvementkick?act=2#play (accessed August 20, 2013). 1851 The Seasteading Institute, available at: http://www.seasteading.org/. 1852 Patri Friedman, “Our Oceans and the Evolution of Societies”, TEDxSF, April 30, 2012, available at: http://www.youtube.com/watch?v=BU92FVeO0qs (accessed August 20, 2013). 1853 Here competition induced innovation is meant. Not the ad hoc innovation by the internet users. Axel Bruns, Ad Hoc Innovation by Users of Social Networks: The Case of Twitter, ZSI DISCUSSION PAPER (2012).

338 Just as the chartered cities or sea settlements, the walled gardens of social media are exclusively based on the opt-in principle.

Chapter 9.2.3 Market forces will shape law in the private sphere Mayer-Schönberger and Crowley wrote that the experience of LambdaMoo, one of the first user-generated content sites, demonstrated that it is difficult to establish a legitimate, transparent and inclusive mechanism governed by the internet users themselves. 1854 And as pointed out in Chapter 3 “Protagonists of the legal conflict”, internet users are just one of the relevant parties in the trinity of social media. Trademark holders, united, could hold the key to improving the protection and enforcement of their trademark logos. “No taxation without representation!” 1855 was one of the sparks that caused the American revolution. The rationale that the one who pays, should be able to determine its own faith, could also be applied in the case of trademark holders and social media. As pointed out in Chapter 3.2.4 and Chapter 3.3.6, the business model of service providers such as Facebook, Twitter and Blogger is based on the revenue streams generated by the advertisements of trademark holders, and on the data these social media sites sell to the trademark holders. In other words, the trademark holders are the most important clients for the social media sites, and therefore it is reasonable that the trademark holders expect that their interests are taken into account by social media providers. The service providers have invested money in social media sites and can expect the users to abide by the rules they set. Each extra user adds value to social media, because of the network effect; 1856 actively by creating user-generated content, and passively by watching advertisements, and by exposing their habits on the internet which are assessed, analysed and sold.

1854

Viktor Mayer-Schönberger & John Crowley, Napster’s Second Life?: The Regulatory Challenges of Virtual Worlds, 100 N.W. U.L. REV. 1775, 1796 (2006). 1855 “’No taxation without representation!’, is a slogan originating during the 1750s and 1760s that summarised a primary grievance of the British colonists in the Thirteen Colonies, which was one of the major causes of the American Revolution. “No taxation without representation”, Wikipedia. 1856 Network effects or network externalities. “We say that there are network effects if one agent’s adoption of a good (a) benefits other adopters of the good (a “total effect”) and (b) increases others’ incentives to adopt it (a “marginal effect”),” Joseph Farrell & Paul Klemperer, Chapter 31 Coordination and Lock-in: Competition with Switching Costs and Network Effects, in HANDBOOK OF INDUSTRIAL ORGANIZATION, VOLUME 3 (M. Armstrong & R. Porter, eds., 2007).

339 The Hong Kong government proposed that the copyright holders and social media start to work together to solve emergent problems. 1857 Another laudable objective would be that trademark holders and social media work together. A proactive system of protection and enforcement of trademark logos as will be proposed below could play the role of trait d'union between these parties. Because social media service providers set up the rules, they should be held liable for upholding these rules (see Chapter 7 “Intermediary liability”). If they will be held liable, it will push them to set up only enforceable rules. Given the scale of the internet users on social media, the only rules that are capable of being enforced are automatically enforced rules. If trademark holders are financially healthy, service providers can benefit. But the inverse is also true.

Chapter 9.2.4 Technological developments To monitor whether a word mark is used on a website without authorisation is already for a long time possible. And the possibilities to monitor pictures of trademarked logos are getting fine-tuned. This monitoring of unauthorised use of a trademark by the trademark holder can be done by the OSPs 1858 in combination with trademark holders or third parties, in a completely automatic way. But the workload starts when unauthorised use is determined and a follow-up is needed. So far the course of action has been to look into the matter more closely, and then decide whether a notice and takedown action is required. If this happens, the user can complain and the process can continue. The uploader can sue the OSP for illicit removal and breach of contract, and the trademark holder can sue the OSP for primary and secondary liability for trademark infringement. Harper argued that to the maximum extent possible wrongdoers should be held responsible for the wrongdoing. 1859

1857

Supra note 1548. “[The] specific characteristics of the internet make intermediary liability relatively more attractive than it has been in traditional offline contexts: the ease of identifying intermediaries, the relative ease of intermediary monitoring of end-users; and the relative difficulty of direct regulation of the conduct of the end-user.” Ronald J. Mann & Seth R. Belzley, The Promise of Internet Intermediary Liability, 47 WM. & MARY L. REV. 1, 8 (2005). 1859 “To the maximum extent possible, responsibility for wrongdoing must stay with wrongdoers. Responsibility for protection must stay at the edges with users.” Jim Harper, “Against ISP Liability”, Telecommunications & Technology, 28 REGUL. MAG. 30, 33 (2005). 1858

340

Technology improves at an exponential rate. 1860 This makes the acquisition of knowledge about the user-generated content faster and more predictabler 1861 and exercising actual control: monitoring, analysing and enforcing, over this user-generated content easier and more precise. Therefore, it is arguable that the duty of care for service providers needs to be upgraded, so it is aligned to the available technology.

Chapter 9.3 Making authorised trademark use transparent Unlike copyright law, 1862 trademark law does not have any prohibition on formalities. Next to registration, one can imagine that there is an extra formality for the trademark logo: namely to make transparent what kind of use is authorised. A substantial problem is that many internet users do not know what they can do with a trademark logo on social media sites. Madison posed the question whether the laws and regulations should reflect the norms and preferences that have developed over time in particular communities or should impose policy choices on those subjects to its reach? 1863 However, it does not have to be an either/or question. Until now the internet users do not know what they can do with the trademark logo. At best, if internet users are diligent, they can read the Terms of Use of the OSP. In order to increase the legal certainty for all stakeholders involved, this thesis proposes the following proactive standardised solution. 1. Trademark holders go to a database filled with trademark logos, authorised by the trademark holders; 2. Trademark holders can upload a picture of their trademarked logo; 1860

Ray Kurzweil, “The Law of Accelerating Returns”, Kurzweil AI, March 7, 2001, available at: http://www.kurzweilai.net/the-law-of-accelerating-returns (accessed August 20, 2013). 1861 David Kirkpatrick writes in his book THE FACEBOOK EFFECT (2010) that Facebook founder Mark Zuckerberg asserts that based on friend relationships and communication patterns he can forecast with a 33 percent accuracy who is going to be in a relationship in a week from now, according to Nick O'Neill, “Facebook Knows Your Relationship Will End In A Week” All Facebook, May 17, 2010, available at: http://www.allfacebook.com/facebook-knows-that-your-relationship-will-end-in-a-week-2010-05 (accessed August 20, 2013). 1862 Stef van Gompel, Formalities in the digital era: an obstacle or opportunity?, GLOBAL COPYRIGHT: THREE HUNDRED YEARS SINCE THE STATUTE OF ANNE, FROM 1709 TO CYBERSPACE, (L. Bently, U. Suthersanen & P. Torremans, eds., 2010) at 395-424. Read James Gibson, Once and Future Copyright, 81 NOTRE DAME L. REV. 167 (2005) and Christopher Sprigman, Reform(aliz)ing Copyright, 57 STAN. L. REV. 485 (2004). 1863 Michael J. Madison, A Pattern-Oriented Approach to Fair Use, 45 WM. & MARY L. REV. 1525 (2004).

341 3. With proprietary technology this picture can be changed into a link; 4. The trademark holder selects the conditions under which the link of their trademark logo can be used by internet users; 1864 5. The link to the trademark logo with the license conditions that authorise certain use will be findable directly via the database online, or via search engines after they have been indexed. Current trademark logos on digital media are often accompanies with the ®, to symbolise that the trademark logo has been registered. However, this thesis proposes that the symbol of ® or preferably another symbol is made into a link to a pop-up screen to make transparent what is authorised use of that particular trademark logo on social media sites.

Chapter 9.3.1 License conditions Conform the license system of Creative Commons, 1865 which makes attribution and use of online copyright works transparent, one can imagine a similar system for trademark logos on social media sites. Below a set of license conditions is suggested.

1864

Click-wrap is a shrink wrapped contract used on digital media, including the internet, which can be read and accepted by the consumer after clicking. Batya Goodman, Honey, I Shrink-Wrapped the Consumer: The Shrink-Wrap Agreement as an Adhesion Contract, 21 CARDOZO L. REV. 319 (1999); Charles R. McManis, The Privatization (or "Shrink-Wrapping") of American Copyright Law, 87 CAL. L. REV. 173 (1999); Dan Streeter, Into Contract's Undiscovered Country: A Defense of BrowseWrap Licenses, 39 SAN DIEGO L. REV. 1363 (2002). 1865 Creative Commons, co-founded by Lawrence Lessig in 2001, available at: http://creativecommons.org (accessed August 20, 2013).

342 Non-commercial license If you sell any product or service, even though they have nothing to do with the products or services of the trademark logo, it is considered commercial use, and not allowed under this condition. Any attempt to remove, edit, override or hack this feature will be viewed as unauthorised use. It will result in immediate loss of control over the use of this logo, liability and may lead to a lawsuit.

Fig. 9.3.1.1 Icon: Non-commercial license

Newest version license This condition guarantees that the newest version of the logo is used. Most trademark holders propagate a standarised trademark solution. Any attempt to remove, edit, override or hack this feature will be viewed as unauthorised use. It will result in immediate loss of control over the use of this logo, liability and may lead to a lawsuit.

Fig. 9.3.1.2 Icon: Newest version license

343 Linked license To make sure that the logo is not linked to a competitor, which would lead to confusion, or an unrelated subject, which would lead to dilution. In case the trademark logo is used for criticism purposes, internet users can easily get information of the brand according to the adversarial principle. Any attempt to remove, edit, override or hack this feature will be viewed as unauthorised use. It will result in immediate loss of control over the use of this logo, liability and may lead to a lawsuit.

Fig. 9.3.1.3 Icon: Linked license

Unchanged license In order not to destroy the value invested in the brand and advertising, by building goodwill and reputation, the integrity of the trademark is guaranteed. Any attempt to remove, edit, override or hack this feature will be viewed as unauthorised use. It will result in immediate loss of control over the use of this logo, liability and may lead to a lawsuit.

Fig. 9.3.1.4 Icon: Unchanged license

344 Open license The trademark holder invites users to use their trademark in creative ways, so that the trademark becomes part of art and culture and has maximum opportunities to spread.

Fig. 9.3.1.5 Icon: Open license

It is expected that the license chosen by the brands are based on their brand personalities. One can argue that brands have, just as people do, different personalities, that vary along a continuum, with on one side of the spectrum complete introvertedness and on the other side complete extravertedness. A brand such as United Colors of Benetton might choose for an Open license, given its history to actively link itself with societal relevant topics such as hunger, war and AIDS, shunned by most other brands, in the words of co-founder Luciano Benetton, “to develop citizen consciousness.” 1866

Chapter 9.4 Making unauthorised trademark use disappear If the user is using the trademark logo in an authorised way he knows his use is legitimate. If he is using the trademark logo from the database and after agreeing with the license conditions in an unauthorised way he can be held liable, traced and sued. Any trademark logo, even edited ones, can be found with reverse image search. 1867 However, if the license system is used in combination with the pre-upload filtering system as will be outlined in Chapter 9.5, unauthorised logos can no longer be uploaded at all. Another method would be if social media sites agree that a trademark holder will be able to remove content that was put on the social media without his permission. 1866

“Top 10 Controversial United Colors of Benetton Ads, Buzz!”, March 22, 2012, available at: http://top10buzz.com/top-ten-controversial-united-colors-of-benetton-ads/ (accessed August 20, 2013). 1867 TinEye Reverse Image Search, available at: http://www.tineye.com/. May 23, 2012, TinEye has indexed 2,155,840,279 pictures. On its blog TinEye gives an example of what you can do to find back even edited photos. Read also Leila Boujnane, “How to use image recognition?”TinEye, available at: http://blog.tineye.com/category/image-recognition/, TinEye,http://blog.tineye.com/2012/05/23/tineye-index-4/ (accessed August 20, 2013) .

345 Compare this with Megaupload’s system where, according to its founder Kim Dotcom, content holders could remove infringing links by themselves. 1868

Chapter 9.5 Pre-upload filtering to substitute safe harbour provisions Content holders have been suing OSPs frequently for secondary liability for soaring copyright and trademark infringements, contrary to what the U.S. legislator intended, 1869 since the introductions 1870 of the safe harbour provisions for secondary liability for copyright 1871 and trademark infringement, 1872 respectively (see Chapter 7 “Intermediary liability”). The same happened in the EU. 1873 In the EU SABAM v Scarlet 1874 made clear that there is no general monitoring requirement for internet intermediaries, yet. But the space for OSPs to look the other way, also known as willful blindness, is getting smaller. In trademark law willful blindness is accepted as knowledge

1868

“Of course everybody knows that the internet is being used for legitimate and illegitimate uses. And I think every online service provider has the same challenges that we had; YouTube, Google, everybody is in the same boat. What you need to understand here is that we provided the content owners with an opportunity to remove links that were infringing on their rights. So not only did they have an online form where they could take down infringing links, they had direct delete access to our service. So they could access our system and remove any link that they would find anywhere on the internet without us involved. They had full access. And we are talking about 180 partners, including every major movie studio, including Microsoft, and all big content producers. And they have used that system heavily. And you need to understand that that system was not even something that was required by the law, we provided that voluntarily. And they have removed over 15 million links.” Dotcom, supra note 674. 1869 U.S. Congress was concerned that OSPs were forced to operate a human compiled directory of websites or to monitoring a site for inappropriate content. Liability should only arise if the infringement was “obvious”. H.R. Rep. No. 105-551 pt. 2 at 57-58; S. Rep. 105-190 at 48-49. 1870 Patry alleged that the Commerce Commission was “captured” by the OSPs and therefore advocated for a safe harbor in the DMCA. William F. Patry, Chief Copyright Counsel, Google Inc., presentation: What would leadership in copyright policy look like?, IBIL UCL, April 3, 2012. 1871 17 U.S.C. § 512 Digital Millennium Copyright Act 1998, which gives a safe harbor for secondary liability of copyright infringement to passive OSPs that provide transitory digital network communications, system caching, information residing on systems or networks at direction of users, information location tools or non-profit educational institutions, and remove copyright infringements expeditiously after a notification. 17 U.S.C. § 111(a)(3) deals with cable retransmission, any ‘passive carrier’ who has no direct or indirect control over the content or selection of the primary transmission, and whose activities with respect to secondary transmission consist solely of providing wires, cables, or other communication channels, is exempted from liability, but only with respect to the restricted acts of performing and publicly displaying a work. 1872 § 32(2) Lanham Act codified into 15 U.S.C. § 1114(2) 2000. 1873 The safe harbour for secondary liability for all infringing material can be found in the Articles 12-15 ECommerce Directive, supra note 5 1874 Although the dispute concerned whether there can be a general obligation to filter file sharing activities and thus deep package inspection, no reference was made to the respect for communications, Article 7 EU Charter, supra note 169. SABAM v Scarlet, supra note 1601.

346 in Louis Vuitton S.A. v Lee. 1875 The concept of willful blindness was revisited in the copyright infringement case Viacom v YouTube,1876 where the Second Circuit explained that in case of constructed or red flag knowledge, it is not a question between specific or generalised knowledge, but instead between a subjective and objective standard. The court distinguishes “actual knowledge”, which refers to subjective awareness of specific infringing acts, from the red flag provision, an objective standard asking whether the service provider was aware of facts from which a reasonable person would have inferred the existence of specific infringing acts. 1877 The Ninth Circuit used the same red flag doctrine in UMG Recordings v Shelter Capital Partners, 1878 and it is unlikely that the matter will be revisited by the Supreme Court anytime soon. The questions are: how to spot red flags, and which shades of colour are still considered red. It seems that the safe harbor still caused OSPs to have become colour blind. How to transform the vicious circle, where internet intermediaries, including social media providers, filter less to be more passive and eligible for the safe harbor, and therefore are getting sued more for secondary liability, and forge it into a virtuous circle? 1879 Goldman argued probably too optimistically that there is a “tertiary visible hand” that stops OSPs from a race to the bottom: they care about their reputation. 1880 Some content owners have sought refuge in software that will detect and automatically send the notice and takedown requests to the OSP. This has helped to further deluge OSPs with notice and takedown requests, 1881 to which some of these OSPs

1875

Louis Vuitton SA v Lee, 875 F.2d 584, 590 (7th Cir. 1989). Viacom International, Inc. v YouTube, Inc., 676 F.3d 19 (2d Cir. 2012). 1877 COPYRIGHT LAW — WILLFUL BLINDNESS — SECOND CIRCUIT HOLDS THAT WILLFUL BLINDNESS IS KNOWLEDGE IN DIGITAL MILLENNIUM COPYRIGHT ACT SAFE HARBOR PROVISION. — Viacom International, Inc. v YouTube, Inc., 676 F.3d 19 (2d Cir. 2012), 126 HARV. L. REV. 645. 1878 UMG Recordings, Inc. v Shelter Capital Partners LLC, 667 F.3d 1022 (9th Cir. 2011). 1879 Self-regulation is not working if these incentives are continued. 1880 Sites want to be perceived as credible. Then again, Goldman makes clear he understands that the reputation as an infringer of copyright might be profitable for some sites. Eric Goldman, The Regulation of Reputational Information, in THE NEXT DIGITAL DECADE: ESSAYS ON THE FUTURE OF THE INTERNET, (Berin Szoka, Adam Marcus, eds., 2010). 1881 According to Von Lohmann, Google receives 3 million notice-and-takedown requests, in more than 70 languages each year. Fred von Lohmann, presentation at Stanford Technology Law Review, 2011 Symposium, Secondary and Intermediary Liability on the Internet. Gibbons wrote that 37 percent of the DMCA notices it receives are invalid. T. Gibbons, “Google Submission Hammer Section 92A”, PC World, March 16, 2009, cited in Disney Enterprises Inc. et al., v Hotfile Corp. et al. amicus brief final, Electronic Frontier Foundation, May 5, 2012, at 5, footnote 3. 1876

347 have responded by implementing overly accommodating and uncritical removal policies (see Chapter 7.3.1 “Market forces” under “Excessive yielding to complainants”). A call for online service providers to proactively filter is becoming louder and seems inevitable. This thesis recommends the following model for liability for OSPs as a substitute of the safe harbour provisions: 1. Content holders (trademark and copyright holders) upload their content to the database of the OSPs. The data remain hidden for internet users. It works according to a first-tofile system and applies the legal fiction that the one who uploads the content first is authorised to do so. 2. The OSPs filter all information to be hosted on their sites and compare it with the content already in their database. If there is a match, it will not be possible to upload the unauthorised version or if only later the match is discovered it will be still removed. Parodies and critical comments that take the license conditions into account will not be removed. 3. If a content holder is unable to upload content 1882 or whose content is automatically removed, can sue the content holder who uploaded that content first but illegally. After a court order the OSP will substitute the content of the illegal content holder for the content of the legal content holder. 4. By logging in to the database, content holders can make their content visible via dedicated sites hosted by the OSP to internet users. So, when the filter technology comes across this content, it knows it is authorised. Even after disclosing content, content holders can withdraw it again, so that filter technology will remove this content, conform the moral right of withdrawal (see Chapter 8.1 “The origin of moral rights”). 5. Content holders who put their content on an OSP in the hidden mode, and still find out that their content is published on some site hosted by the OSP can hold the OSP liable. 6. If content holders find that someone uploaded for the first time their content, because that person has appropriated that content, then they can sue that uploader. The content will be removed after a court order. Only if the OSP refuses to remove the content, the 1882

This goes much further than for example the Terms of Service of Megaupload which lets its users tick a box with: “I accept the Terms of Service”, which include “You can not upload anything that is infringing anybody’s rights. You can only upload things that belongs to you. ”So we have a legally binding agreement with these users that they are not supposed to upload anything that does not belong to them.” Dotcom, supra note 674.

348 OSP will be held liable. The illegal uploader can be sanctioned by the OSP and by the law. 7. This way content holders can upload their content at the databases of OSPs, so that they have complete control over their content on these OSPs and are guaranteed that infringing material cannot be uploaded or is removed automatically. Compared to the flood of notice and takedown requests, the proactive system of OSP liability is much more effective, especially since the litigious scenarios as sketched under points 3 and 6 will only rarely take place.

Chapter 9.6 Optimising policy goals Beside automatic enforcement by pre-upload filtering this proactive system of OSP liability has the potential to make trademark law (Chapter 9.6.1) and copyright law (Chapter 9.6.2) more effective in achieving policy goals.

Chapter 9.6.1 Trademark law The proactive system can prevent internet users using a trademarked logo on a site that is incompatible with the trademark logo’s license conditions. For example, when the internet user is authorised to use the trademarked logo in a non-commercial environment, and he or she is using it in an environment with advertisements, the trademark logo will automatically be removed. Certain use of trademarked logos, that have been judged by a court as tarnishing can be stored on the database of the OSP but not visible for the users, so that any uploading of this infringing material on the servers of the OSP will not be possible, or when found will be automatically removed. In this way, the storing of the infringing material on the OSP’s database can be seen as “vaccinating” against this kind of trademark abuse.

Chapter 9.6.2 Copyright law Experiments can be done with the automatic protection of copyrights with variable durations. For example, the amount of visitors some content is getting can be made proportional to the duration of the copyright. For example: the more visitors the

349 content is attracting, the longer it is automatically protected. This system does not deviate from the regular copyright law since it never exceeds the legal copyright terms of duration, but is offering variable degrees of automatic protection within the legal term. In the U.S. “the amount and substantiality of the portion used in relation to the copyrighted work as a whole” 1883 is part to assess whether the use of a copyright work is within the scope of Fair Use. Experiments can be done with allowing a certain percentage of the work to be used without permission, and removing the surplus automatically. This refers to the “amount of the work”. In the U.K. “a substantial part is not defined in copyright law but has been interpreted by the courts to mean a ‘qualitatively significant part of a work’ even where this is not a large part of the work.” 1884 However, quantity has a quality all its own 1885 and will make an automatic enforcement possible. One can argue that this suggested system is compatible with the prohibition on formalities of the Berne Convention 1886. The benefits of automatic enforcement and the avoidance of a lot of legal procedures is a benefit that outweighs the full liability.

Chapter 9.7 Algorithmic Justice If the abovementioned proposals for pre-upload filtering in combination with a proactive system of OSP liability are implemented so that a paradigm shift is made, it will lead to algorithmic justice. Judges or arbitrators are humans and their interpretations of the law or contracts are by definition subjective, and their capacity is not scalable. Automated enforcement is scalable, and has an air of objectivity. But, as Lessig made clear, 1887 the choices that go into the programming are subjective too. As discussed in Chapter 9.6.2. “Copyright law”, algorithmic justice can make the protection and

1883

17 U.S.C. § 107: Limitations on Exclusive Rights: Fair Use. What is meant by a substantial part of a copyright work? IPO U.K. “The defendants had infringed the plaintiffs' copyright in the compilation by reproducing a substantial part of it, even though large parts of the coupon had not been copied. The test of infringement depended on the worth of the part taken, not the quantity,” Ladbroke (Football) Ltd. v William Hill (Football) Ltd., (1962). Reports of Patent, Design and Trade Mark Cases (1980) 97 (25): 539-552. Read also ‘Taking a substantial part of a copyright work’ by MICHAEL PENDLETON & ALICE LEE, INTELLECTUAL PROPERTY IN HONG KONG, (LexisNexis 2008), at 147. 1885 Attributed to Joseph Stalin, “Joseph Stalin”, WikiQuote. 1886 Article 5(2) Berne Convention, supra note 138. Whether this prohibition is in the interest of copyright holders in the digital era is discussed by Van Gompel, supra note 1862. 1887 LESSIG, supra note 1819. 1884

350 enforcement of intellectual property rights effective and much more refined towards social policy goals. Although, it is to be expected that there will also be a cat and mouse game between developers of enforcement systems 1888 that use fair-use algorithms to filter infringing material on the one hand and those that want to abuse these systems 1889 on the other hand. But even a good faith effort to automatically distinguish infringements from fair-use will have its fair share of challenges. 1890 Yen would perhaps argue that it is still fair-use, because eventually in the end everybody will make mistakes. 1891 In contrast to this view one could also argue, like the EFF 1892 did, that because one does not take into account that fact that mistakes are going to be made, this will qualify as willful blindness, which on its turn can be seen as knowledge. 1893 Already in 1998 Goldsmith articulated a rational assessment of control of the online realm thus: “the question is whether regulation will heighten the cost of the activity sufficiently to achieve its acceptable control from whatever normative perspective is appropriate.” 1894 This thesis applied a rational assessment, and concluded that the current trademark laws are insufficient, that a paradigm shift to the proactive protection and enforcement of the trademark logo via the moral right of integrity in legislation or via contractual solutions in the walled gardens of social media is needed, which will inevitably lead to algorithmic justice.

1888

This happened before with filtering spam and viruses and is still happening. Ginsburg, supra note 1594, at 589-591. 1890 Supra note 1881, at 5. 1891 Alfred C. Yen, Torts and the Construction of Inducement and Contributory Liability in Amazon and Visa, 32 COLUM. J. L. & ARTS 513 (2009). 1892 Supra note 1881, at 7-8, footnote 6. 1893 In re Barboza, 545 F.3d 702, 707, 708 (9th Cir. 2008). 1894 J. Goldsmith, Against Cyberanarchy, 65 U. CHI. L. REV. 1199, 1223-1224 (1998). 1889

351

Part IV Conclusions Part I “Stage, Protagonists and Legal Conflict” tested - Hypothesis 1. “An automated enforcement solution for the unauthorised trademark logo on social media is the only feasible solution.” Chapter 2. “Stage of The Legal Conflict” confirms that Hypothesis 1 is correct.

Part II “Inadequacy of the law” tested: - Hypothesis 2. “The current trademark law is insufficiently protecting the unauthorised use of the trademark logo;” - Hypothesis 3. “The safe harbour provisions about the law of intermediary liability of trademark infringement are not effective;” Chapters 4-7 confirm that Hypothesis 2 is correct. Chapter 7 confirms that Hypothesis 3 is correct.

Part III “Paradigm Shift” tested: - Hypothesis 4. “Should the unauthorised use (including non-commercial use) of the trademark logo on social media be protected by the moral right of integrity;” - Hypothesis 5. “A contractual solution (walled gardens) can pave the way for an automated solution for the trademark logo on social media.” Chapter 8 confirms that Hypothesis 4 is correct. Chapter 9 confirms that Hypothesis 5 is correct.

352

Chapter 10 Conclusions Given the massive unauthorised use of the trademark logo on social media, and the frequent legal conflicts it causes between trademark holders, social media providers and internet users, this thesis determines that the current trademark legislation in the U.S. and EU – where the most valuable brands in the world are located and popular social media sites originated – are insufficient to solve the problem and subsequently proposes a paradigm shift that takes into account the special signalling properties of the trademark logo and the public desirability of its stability. The ample access to the unauthorised use of the trademark logo has led to the massive proliferation, scale and speed of the unauthorised use of the trademark logo. This in combination with the permanence of the uploaded unauthorised trademark logos on the internet has led to the perception by internet users, social media providers and image search engines that the trademark logo is without protection. Trademark holders feel a loss of control, and all parties involved suffer from the uncertain boundaries of the trademark logo. The emergence of new technology complicates the resolution of the legal conflict. Given the massive number of unauthorised use of trademark logos and the nonscalability of litigation and arbitration, automation is a sine qua non for any feasible solution. The laws against trademark infringement in the U.S. and EU are insufficient to solve the legal conflict. One of the problems is that non-commerciality of trademark use has been broadly interpreted, while this thesis asserts that every trademark use on a social media which includes advertisements is commercial use. The descriptive use defence is not compatible to any unauthorised use of a trademark logo. Although some courts have explicitly or implicitly acknowledged this, it has not been codified in a statute. Also, this thesis argues that the choice for the Nice Classification doctrine has non-favourable outcomes for the trademark holders in particular and society at large, since it excludes the protection of the non-famous trademark to non-related goods or services and therefore stifles an expansion of the trademark holder into new activities, whereby he does not need to start up building a reputation from scratch but can profit from his reputation (which might be high within a

353 certain market or region) in an unrelated field. Therefore Schechter’s proposal to protect against identical trademarks for non-competing products is still relevant. This thesis contends unauthorised use of the trademark logo on social media should be prevented. However, the use of the trademark logo on social media will be always authorised where it is applied to exercise one’s right to freedom of expression, parody or critical comment, with the proviso that the trademark logo links back to the website of the trademark holder. This small formality is beneficial to the adversarial process, which is a well established doctrine within the courts and also meets the journalistic standard, and decreases legal uncertainty for all parties involved. As the massive number of litigation cases against OSPs demonstrate, the safe harbour provisions are not effective. This thesis asserts that the premium for ignorance has adverse effects on the willingness of OSPs, including social media providers, to monitor, although they are best positioned to proactively filter infringing unauthorised use of content, including trademark logos. Therefore this thesis asserts that the safe harbour provisions must be substituted for strict intermediary liability. The trademark logo can be seen as the personification of the trademark holder, and one can argue that the stability of the trademark logo is not only in the interest of the trademark holder but also of society at large. One can argue that trademark dilution already provides a kind of moral right of integrity for the trademark logo. However, this right is limited to trademark logos that are considered famous or have a reputation, and, moreover, that are used in a commercial way. This thesis argues that also the trademark logo that did not reach the requested level of fame or reputation and is used in a noncommercial way should also be protected against unauthorised use on social media. Therefore the moral right of integrity is proposed for the trademark logo. Until the law will be amended to include a moral right of integrity for the trademark logo, so that it will be protected in case of unauthorised use, regardless of whether it is commercial or not and regardless of its level of fame/reputation, this thesis suggests to implement proactive solutions in the walled gardens of social media as a testing ground for potential legislation. First authorised use of the trademark logo on social media should be made transparent, so that the internet user can contractually agree to abide to the authorised use of the trademark logo. Then the unauthorised use of the

354 trademark logo can be filtered during the upload process, or removed after the upload process. This automated solution is scalable, makes intellectual property protection and enforcement not only effective but also more calibratable to social policy goals, such as fair use, and will ineluctably lead to algorithmic justice.

355

Bibliography Abel, Sally, & Albert Sieber, The Supreme Court’s KP Permanent Decision Opens a Can of Worms, Fenwick & West LLP, 2006, available at: http://www.fenwick.com/docstore/publications/ip/fair_use_palooza.pdf. About.com, “Tommy Hilfiger “Racist” Rumor Is Fashionable Again”, About.com, available at: http://urbanlegends.about.com/library/weekly/aa121698.htm. Adams, Richard, “Huffington Post sold to AOL for $315m”, The Guardian, http://www.guardian.co.uk/world/richard-adams-blog/2011/feb/07/huffington-post-sale-aolariana. adidas – “the story of a logo”, available at: http://www.adidasgroup.com/en/ourgroup/assets/History/pdfs/logohistory-e.pdf. Aldred, Jonathan, The economic rationale of trademarks: an economist’s critique, in TRADE MARKS AND BRANDS: AN INTERDISCIPLINARY CRITIQUE (L. Bently, J. Davis and J.C. Ginsburg, eds., 2008). Allemann, Andrew, “Facebook Usernames Set Dangerous Precedent”, June 23, 2009, Domain Name Wire, available at: http://domainnamewire.com/2009/06/23/facebook-usernames-set-dangerous-precedent/. ALLFELD, PHILIPP, DAS URHEBERRECHT AN WERKEN DER LITERATUR UND DER TONKUNST. KOMMENTAR ZU DEM GESETZ VOM 19.JUNI 1901 SOWIE DEN INTERNATIONALEN VERTRÄGEN ZUM SCHUTZE DES URHEBERRECHTES. 2. (vielfach veränd. Aufl., München: C.H.Beck 1928). ALTMAN, LOUIS & MALLA POLLACK, CALLMANN ON UNFAIR COMPETITION, TRADEMARKS AND MONOPOLIES (Eagan: Thomson Reuters/West 2008). Anomymous, Trade-Marks, Manufacturer of Wall Board Materials Not Entitled to Registration of Mark Used for Pneumatic Pressure Systems, 8 BUS. L.J. 51 (1926) Anonymous, Dilution: Trademark Infringement or Will-O-The-Wisp, 77 HARV. L. REV. 520 (1963-1964). Anonymous, COPYRIGHT LAW — WILLFUL BLINDNESS — SECOND CIRCUIT HOLDS THAT WILLFUL BLINDNESS IS KNOWLEDGE IN DIGITAL MILLENNIUM COPYRIGHT ACT SAFE HARBOR PROVISION. — Viacom International, Inc. v YouTube, Inc., 676 F.3d 19 (2d Cir. 2012), 126 HARV. L. REV. 645 (2012). Aoki, Keith, Authors, Inventors and Trademark Owners: Private Intellectual Property and the Public Domain, Part II, 18 COLUM.-VLA J.L. & ARTS 191, 242 (1994). Aoki, Keith, How the World Dreams Itself to be American: Reflections on the Relationship Between the Expanding Scope of Trademark Protection and Free Speech Norms,17 LOY. L.A. ENT. L. REV. 523 (1997). Aretz, Yafit Lev, Second Level Agreements, 45 AKRON L. REV. 137 (2012). Arnold, Justice, Brand Protection and Competition, IBIL, January 27, 2010, available at: http://www.ucl.ac.uk/laws/ibil/index.shtml?events_past. Ashmead, Richard, “IP TRANSLATOR: a sun-drenched perspective”, IPKat, July 9, 2012, available at: http://ipkitten.blogspot.hk/2012/07/ip-translator-sun-drenched-perspective.html. Assaf, Katya, The Dilution of Culture and the Law of Trademarks, 49 IDEA 1 (2008).

356

Associated Press, “Jay-Z launches bubbly boycott of Cristal”, June 15, 2006, via USA Today, available at: http://www.usatoday.com/life/people/2006-06-15-jayz-cristal_x.htm. Atkins, Michael G., Social Media Law: Trademark Issues, Seattle Trademark Lawyer, undated, at 2, available at: http://seattletrademarklawyer.com/storage/Social%20Media%20Law.pdf. Austin, Graeme W., Trademarks and the Burdened Imagination, 69 BROOK. L. REV. 827 (2004). Bailey, Jonathan, “Facebook, Flickr Strip Copyright Data from Images”, Plagiarism Today, November 5, 2008, available at: http://www.plagiarismtoday.com/2008/11/05/facebook-flickr-strip-copyright-data-fromimages/. Baker, C. Edwin, Commercial Speech: A Problem in the Theory of Freedom, 62 IOWA L. REV. 1 (1976) Baker, C. Edwin, Paternalism, Politics, And Citizen Freedom: The Commercial Speech Quandry in Nike, 54 CASE W. RES L. REV. 1161 (2004). Banko, James Richard, Schlurppes Tonic Bubble Bath”: In Defense of Parody, 11 U. PA. J. INT’L BUS. L. 627 (1990). Barber, William G., A "Rational" Approach for Analyzing Dilution Claims: The Three Hallmarks of True Trademark Dilution, 33 AIPLA Q.J. 25 (2005). Barnes, David W., Misappropriation of Trademark (2007). 9 N.C. J.L. & TECH. 171 (2008). BASTIAT, FRÉDÉRIC, THE LAW (1850), (Ludwig von Mises Institute, republished 2007). BAUDRILLARD, JEAN, SYMBOLIC EXCHANGE AND DEATH, (London: Sage Publications 1993). BAUDRILLARD, JEAN, SIMULACRA AND SIMULATION, (Ann Arbor: University of Michigan Press 1994). Bauer, Stephanie, Austria: Trademark Parody - Humour is ..., February 17, 2010, available at: http://www.mondaq.com/x/94072/. Bavaria Babes” in action on YouTube, available at: http://www.youtube.com/watch?v=U7Ih7hPTn4w&feature=player_embedded. BBC News, “AOL Acquires Bebo Social Network”, March 13, 2008, available at: http://news.bbc.co.uk/2/hi/business/7294174.stm. Bechtold, Stefan and Catherine Tucker, Trademarks, Triggers and Online Search, March 2013 (paper available upon request to Prof. Bechtold), available at: http://www.ip.ethz.ch/people/bechtold/publications/. BECKER, SÖNKE, PARODIE UND KOMMERZ, EINE RECHTSVERGLEICHENDE UNTERSUCHUNG DES AMERIKANISCHEN UND DEUTSCHEN URHEBER- UND MARKENRECHTS (2004). Beebe, Barton, The Semiotic Analysis of Trademark Law, 51 UCLA L. REV. 621 (2004). Beebe, Barton, Search and Persuasion in Trademark Law, 103 MICH. L. REV. 2020 (2005). Beebe, Barton, A Defense of the New Federal Trademark Antidilution Law, 16 FORDHAM INTELL. PROP. MEDIA & ENT. L.J. 1143 (2006).

357 Beebe, Barton, The Semiotic Account of Trademark Doctrine and Trademark Culture, Chapter 2 in, TRADEMARK LAW AND THEORY: A HANDBOOK OF CONTEMPORARY RESEARCH (Graeme B Dinwoodie and Mark D Janis (eds) Edward Elgar, Cheltenham, 2008).

358 Berg, Josine van den, & Maarten Haak, IE-Rechten en uitingsvrijheid, naar een fair balance, 39 BMM BULL. 2 (2013). BERGH, VAN DEN, JOERIE & MATTIAS BEHRER, Chapter Seven Happiness: Gen Y’s adoration for branded emotions, in BRANDING TO GENERATION Y, HOW COOL BRANDS STAY HOT 181 (2009). Berners-Lee, “developerWorks Interviews: Tim Berners-Lee”, August 22, 2006, available at: http://www.ibm.com/developerworks/podcast/dwi/cm-int082206txt.html. BESSEN JAMES & MICHAEL JAMES MEURER, PATENT FAILURE: HOW JUDGES, BUREAUCRATS, AND LAWYERS PUT INNOVATORS AT RISK (2008). Bingham, Lord, The Oxford Shrieval lecture, October 11, 2011, available at: http://www.supremecourt.gov.uk/docs/speech_111011.pdf. Bird, Robert C., Moral Rights: Diagnosis and Rehabilitation, 46 AM. BUS. L. J. 407 (2009). Bishop, Bill, “Rumors of a Real Name Registration Requirement Coming For Weibo And Other Chinese Social Media?”, DigiCha, August 29, 2011, available at: http://digicha.com/index.php/2011/08/real-nameregistration-requirement-coming-for-weibo-and-other-chinese-social-media/. BLACKSHAW, PETE, SATISFIED CUSTOMERS TELL THREE FRIENDS, ANGRY CUSTOMERS TELL 3,000: RUNNING A BUSINESS IN TODAY’S CONSUMER-DRIVEN WORLD (2008). Blakely, Timothy W., Comment: Beyond The International Harmonization Of Trademark Law: The Community Trade Mark As A Model Of Unitary Transnational Trademark Protection, 149 U. PA. L. REV. 309 (2000). Blakley, Johanna, “Lessons from fashion’s free culture”, presentation TEDxUSC, filmed April 2010, available at: http://www.ted.com/talks/lang/en/johanna_blakley_lessons_from_fashion_s_free_culture.html. Blanke, Jordan M., Victor's Little Secret: Supreme Court Decision Means More Protection for Trademark Parody, 13 FORDHAM INTELL. PROP. MEDIA & ENT. L.J. 1053 (2003). Block, Josh is interviewing Chris Spigman at Bloomberg Law, May 23, 2012, available at: http://www.youtube.com/watch?v=9Pgl4V9AURU. Bornkamm, Judge, E-Commerce Directive vs. IP Rights Enforcement – Legal Balance Achieved given at a conference in Brussels on 6 March 2007, GRUR INT’L 642 (2007). Boudreaux, Chris, “Policy Database, Social Media Governance, 2009-2013”, available at: http://socialmediagovernance.com/policies.php. Boujnane, Leila, “How to use image recognition?”, TinEye, available at: http://blog.tineye.com/category/image-recognition/http://blog.tineye.com/2012/05/23/tineyeindex-4/. Boyd D.M., & N.B. Ellison, Social network sites: Definition, history, and scholarship, 11 J. COMPUT.MEDIAT COMM. 210 (2007). Boyd, Danah, Social Network Sites as Networked Publics: Affordances, Dynamics, and Implications in NETWORKED SELF: IDENTITY, COMMUNITY, AND CULTURE ON SOCIAL NETWORK SITES (Z. Papacharissi, ed., 2010).

359 Boyden, Bruce E., Viacom International Inc., Comedy Partners, Country Music Television, Inc., Paramount Pictures Corporation, Black Entertainment Television LLC, Brief of Amici Curiae Intellectual Property Law Professors in Support of Plaintiffs-appellants and Urging Reversal, December 10, 2010, available at: http://news.viacom.com/pdf/2010-12-10-IP_Law_profs_Boyden_et_al.pdf. Breezy Creative Design, “5 Different Types Of Logos”, January 21, 2010, available at: http://breezycreativedesign.com/2010/01/21/5-different-types-of-logos/. Brown, Jr., Ralph S., Advertising and the Public Interest: Legal Protection of Trade Symbols, 57 YALE L. J. 1165 (1948). Brown, Scott, “I Tweeted on Facebook Today:” Re-Evaluating Trademark Genericide of InternetBased Trademarks, 7 I/S: J.L. & POL'Y FOR INFO. SOC'Y 457 (2012). Bruns, Axel, Ad Hoc Innovation by Users of Social Networks: The Case of Twitter, ZSI DISCUSS. PAPER (2012). Bryer, Lanning, & Matthew Asbell, Combining Trademarks in a Jointly Owned IP Holding Company, 98 TMR 834 (2008). 3 Bubble Advert – subject of O2 Bubble case, campaign video, available at: http://www.youtube.com/watch?v=U_XFVYrQbzg&feature=plcp. Bucknell, Duncan, “Copyright ‘evergreening’”, March 2, 2008, available at: http://www.thinkipstrategy.com/ipthinktank/273/copyright-evergreening/. Burroughs Miggs, interview with Paul Rand, filmed for the TV show “Miggs B. on TV” in Connecticut, 1991, available at: http://www.paul-rand.com/foundation/video_miggsInterview_1991/#.UDA3sKkgcR8. Burton, Dana L., Artists’ Moral Rights: Controversy and the Visual Artists Rights Act of 1990, 13 VAND. J. ENT. & TECH. L. 463 (2011). Cahalane, Claudia, “Interview: Anita Roddick, ‘I believe they are honourable and the work they do is honourable’”, The Guardian, November 3, 2006, available at: http://www.guardian.co.uk/business/2006/nov/03/ethicalliving.environment. Calabresi, Guido & A. Douglas Melamed, Property Rules, Liability Rules, and Inalienability: One View of the Cathedral, 85 HARV. L. REV. 1089 (1972). Calboli, Irene, The Sunset of ‘Quality Control’ in Modern Trademark Licensing, 57 AM. U. L. REV. 341 (2007). Calkins, Tim, The Challenge of Branding, in KELLOG ON BRANDING (Tim Calkins and Alice Tybout, eds. 2005). Callmann, Rudolf, Thoughts on the Protection of World Marks, 44 TMR 1134 (1954). Callmann, Rudolf, Trademark Infringement and Unfair Competition, 14 LAW & CONTEMP. PROB. 185 (1949). Callmann, Rudolf, Unfair Competition Without Competition? The Importance of the Property Concept in the Law of Trade-Marks, 95 U. PA. L. REV. 443 (1947). Cantwell, Michael K., Confusion, Dilution, and Speech, First Amendment Limitations on the Trademark Estate: An Update, 94 TMR 547 (2004).

360 Century, Douglas, “Jay-Z Puts a Cap on Cristal”, N.Y. Times, July 2, 2006, available at: http://select.nytimes.com/gst/abstract.html?res=F40815FE3E540C718CDDAE0894DE404482. Cerf, Vinton G., “Internet Access Is Not a Human Right”, New York Times, January 4, 2012, available at: http://www.nytimes.com/2012/01/05/opinion/internet-access-is-not-a-human-right.html?_r=0. Chafee, Zechariah, Unfair Competition, 53 HARV. L. REV. 1289 (1940). CHANDLER, DANIEL, SEMIOTICS, THE BASICS (London: Routledge 2002). Chavez, Conrad, “Facebook now displays image copyright and caption metadata in photo albums”, Conrad Chaves Blog, June 27, 2011, available at: http://blog.conradchavez.com/2011/06/27/facebook-nowdisplays-image-copyright-caption-metadata/. Chilling Effects Clearinghouse, “Frequently Asked Questions (and Answers) about Trademark What to Expect When You're Expecting to Be Sued for Trademark Infringement”, available at: https://www.chillingeffects.org/trademark/faq#QID872. Christensen, Brett M., “Hoax-Slayer, Facebook Deleting Inactive Users Hoax”, September 19, 2007, availabel at: http://www.hoax-slayer.com/facebook-overpopulated-hoax.shtml. Cipriani, Jason, “Stop Facebook from marking messages as ‘Seen’”, CNET, August 21, 2012, available at: http://howto.cnet.com/8301-11310_39-57497485-285/stop-facebook-from-marking-messages-as-seen/. Clifford, Stephanie, “Video Prank at Domino’s Taints Brand”, New York Times, April 15, 2009, available at: http://www.nytimes.com/2009/04/16/business/media/16dominos.html. Coleman, Jane “III. Vicarious Trademark Infringement: A. In General, Secondary Trademark Infringement” (undated), available at: http://www.secondarytrademarkinfringement.com/?p=105. COLLINS, M., THE LAW OF DEFAMATION AND THE INTERNET, (3rd ed., 2010). Colon, Geoffrey, “Thinking Social / Value, Facebook Algorithmic Change to Decrease Reach on Brand Page Posts”, Social@Ogilvy, September 25, 2012, available at: https://social.ogilvy.com/facebookalgorithmic-change-to-decrease-reach-on-brand-page-posts/. Communication No. 4/03 of OHIM President, June 16 June, 2003. Community Trade Mark As A Model Of Unitary Transnational Trademark Protection, 149 U. PA. L. REV. 309 (2000). Conference "Searching for the Boundaries of Intellectual Property Law", Universities of Hong Kong, December 15, 2012. COOLEY, Charles Horton, HUMAN NATURE AND THE SOCIAL ORDER (1902). Coombe, Rosemary J., Objects of Property and Subjects of Politics: Intellectual Property Laws and Democratic Dialogue, 69 TEX. L. REV. 1853 (1991). Coombe, Rosemary J., Tenth Anniversary Symposium: New Direction: Critical Cultural Legal Studies, 10 YALE J.L. & HUMAN. 463 (1998). COOMBE, ROSEMARY J., THE CULTURAL LIFE OF INTELLECTUAL PROPERTIES: AUTHORSHIP, APPROPRIATION, AND THE LAW 55 (Durham, NC: Duke University Press, 1998). CORNISH, WILLIAM & DAVID LLEWELYN, INTELLECTUAL PROPERTY: PATENTS, COPYRIGHTS, TRADEMARKS & ALLIED RIGHTS (sixth ed. 2007).

361 Creative Commons, available at: http://creativecommons.org (accessed August 7, 2013). Curtis, Carlton, VP Corporate Communications, Coca Cola. Laurent Muzellec, What is in a Name Change? Re-Joycing Corporate Names to Create Corporate Brands, 8 CORP. REPUTATION REV. 305 (2006). Daft R.L., & R.H. Lengel, Organizational information requirements, media richness, and structural design, 32 MANAGE. SCI. 554 (1986). Damich, Edward J., The Visual Artists Rights Act of 1990: Toward a Federal System of Moral Rights Protection for Visual Art, 39 CATH. U. L. REV. 945 (1990). Denicola, Robert C., Institutional Publicity Rights: An Analysis of the Merchandising of Famous Symbols, 62 N.C. L. REV. 603 (1984). Denicola, Robert C., Trademarks as Speech: Constitutional Implications of the Emerging Rationales For the Protection of Trade Symbols, 1982 WIS. L. REV. 158 (1982). DERENBERG, WALTER J.TRADE-MARK PROTECTION AND UNFAIR TRADING 48 (1936). Derenberg, Walter J., The Problem of Trademark Dilution and the Antidilution Statutes, 44 CAL. L. REV. 439 (1956). Desai Deven R., & Sandra L. Rierson, Confronting the Genericism Conundrum, 28 CARDOZO L. REV. 1789 (2007). Desai, Deven R., Individual Branding: How the rise of individual creation and distribution of cultural products confuses the intellectual property system in CREATIVITY, LAW AND ENTREPRENEURSHIP (Shubha Ghosh & Robin Paul Malloy, eds., 2011). DESBOIS, HENRI, LE DROIT D’AUTEUR EN FRANCE: PROPRIÉTÉ LITTÉRAIRE ET ARTISTIQUE (1978). Dessemontet, François, Letter from Switzerland: The New Copyright Act (1993), available at: http://www.unil.ch/webdav/site/cedidac/shared/Articles/New%20Copyright%20Act.pdf. Diamond, Sidney A., The Historical Development of Trademarks, 65 TMR 265 (1975). Dilbary, S., Famous Trademarks and the Rational Basis for Protecting “Irrational Beliefs” 14 GEO. MASON L. REV. 605 (2007). Doellinger, Chad J., Nominative Fair Use: Jardine and the Demise of a Doctrine, 1 NW. J. TECH. & INTELL. PROP. 66 (2003). Dogan, Stacey L., & Mark A. Lemley, Trademarks and Consumer Search Costs on the Internet, 41 HOUS. L. REV. 777 (2004). Dogan, Stacey L.& Mark A. Lemley, What the Right of Publicity Can Learn from Trademark Law, 58 STAN. L. REV. 1161 (2006). Dogan, Stacey & Mark Lemley, The Trademark Use Requirement In Dilution Cases, 24 SANTA CLARA COMPUTER & HIGH TECH. L.J. 541 (2008). Dominos Pizza on the Today Show - Workers Fired for Dominos Prank Video, April 17, 2009, available at: http://www.youtube.com/watch?v=xaNuE3DsJHM. Dotcom (Schmitz), Kim, founder of Megaupload, was interviewed by John Campbell of 3NewsNz, March 1, 2012, available at: http://www.youtube.com/watch?v=ZvrRaeHD5TE (accessed August 20, 2013).

362 Dreier, Thomas, Balancing Proprietary and Public Domain Interests: Inside or Outside of Proprietary Rights?, in EXPANDING THE BOUNDARIES OF INTELLECTUAL PROPERTY, INNOVATION POLICY FOR THE KNOWLEDGE SOCIETY (R. Dreyfuss, D. Leenheer Zimmerman and H. First, eds., 2001). Drescher, Thomas D., The Transformation and Evolution of Trademarks - from Signals to Symbols to Myth, 82 TMR 301 (1992). Dreyfuss, Rochelle Cooper, Expressive Genericity: Trademarks as Language in the Pepsi Generation, 65 NOTRE DAME L. REV. 397 (1990). Dreyfuss, Rochelle Cooper, Reconciling trademark rights and expressive values: how to stop worrying and learn to love abiguity, in TRADEMARK LAW AND THEORY: A HANDBOOK OF CONTEMPORARY RESEARCH, (Graeme B. Dinwoodie & Mark D. Janis, eds., 2007). Economides, Nicholas S., The Economics of Trademarks, 78 TMR 523 (1988). Economist, The, “Who’s wearing the trousers?”, September 6, 2001 available at; http://www.economist.com/node/770992?story_id=770992. Economist, The, “Bubbles and bling”, May 8, 2006, available at: http://www.economist.com/node/6905921. Edwards, Jim, “Facebook Accused Of Changing A Key Algorithm To Hurt Advertisers”, Business Insider, October 3, 2012, available at: http://www.businessinsider.com/facebook-changed-edgerank-algorithm-tohurt-advertisers-2012-10. Effross, Walter A., Withdrawal of the Reference: Rights, Rules, and Remedies for Unwelcomed WebLinking, Summer, 49 S.C. L. REV. 651 (1998). EU-Rights Clinic, “Background Note: ECAS’s Requests for Access to Commission Documents Concerning the Opt-Out from the EU Charter of Fundamental Rights”, available at: http://blogs.kent.ac.uk/eu-rights-clinic/files/2013/03/Background-Note-Access-to-Documents-onCharter-Opt-Out-04.03.13.pdf. European Commission, Electronic commerce: amended proposal for a coherent legal framework in the Single Market, IP/99/652, September 1, 1999. European Commission, Electronic commerce: Commission proposes legal framework, IP/98/999, November 18, 1998. European Commission, Electronic commerce: Commission welcomes final adoption of legal framework Directive, IP/00/442, May 4, 2000. European Commission, Notice-and-action Procedures, announced January 2012, available at: http://ec.europa.eu/internal_market/e-commerce/notice-and-action/index_en.htm . European Perspectives, “Make Your Marks”, available at: http://www.jenkins.eu/mym-autumn2002/alicante-abstracts-.asp. Facebook, Inc., Securities and Exchange Commission, Form 10-Q, (Quarterly Report), May 2, 2013. Farber, Daniel A., Commercial Speech and First Amendment Theory, 74 NW. U. L. REV. 372, (1979). Farrell, Joseph, & Paul Klemperer, Chapter 31 Coordination and Lock-in: Competition with Switching Costs and Network Effects, in HANDBOOK OF INDUSTRIAL ORGANIZATION, VOLUME 3 (M. Armstrong & R. Porter, eds., 2007).

363 Favier, Jaap, “Calculate the ROI of Social Media”, Brian Solis October 8, 2012, available at: http://www.briansolis.com/2012/10/calculate-the-roi-of-social-media/. Fechter, Gary H.& Elina Slavin, Practical Tips on Avoiding Genericide, 66 INTA BULL. 20 (2011). Feldman, Joel R., Reverse Confusion in Trademarks: Balancing the Interest of the Public, the Trademark Owner, and the Infringer, 8 J. TECH. L. & POL'Y 163 (2003). Ficsor, Mihály, “Munich Declaration” on the three-step test – respectable objective; wrong way to try to achieve it, May 11, 2012, available at: http://www.copyrightseesaw.net/data/documents/documents/0/6/6/0665a0ebfa425ceb829cc8fb4f3bf03f. doc. Fine, Aden, “Twitter Appeals Ruling in Battle Over Occupy Wall Street Protester’s Information”, August 27, 2012, ACLU, available at: http://www.aclu.org/blog/technology-and-liberty-national-security-freespeech/twitter-appeals-ruling-battle-over-occupy. Fisher, William, Overview of Trademark Law, HARV. L. SCHOOL, (undated), available at: http://cyber.law.harvard.edu/metaschool/fisher/domain/tm.htm#8. Fisher, William, Property and Contract on the Internet, 73 CHI.-KENT. L. REV. 1203 (1998). Fisher, William, Theories of Intellectual Property, in NEW ESSAYS IN THE LEGAL AND POLITICAL THEORY OF PROPERTY (Stephen R. Munzer ed., 2001). Fitzgerald, Brian, Ch. 9 - Copyright 2010: the future of copyright law; in COPYRIGHT LAW, DIGITAL CONTENT AND THE INTERNET IN THE ASIA-PACIFIC (Brian Fitzgerald, Fuping Gao, Damien O'Brien, Sampsung Xiaoxiang Shi, eds., 2008). Fleet, Dave, “57 Social Media Policy Examples and Resources”, Social Media Today, July 26, 2010, available at: http://socialmediatoday.com/davefleet/151761/57-social-media-policy-examples-andresources&ei=L7AoUOjrCMuviQfx. FOX, HAROLD G, THE CANDADIAN LAW OF TRADE MARKS AND UNFAIR COMPETITION (2d ed., Carswell, 1956). Franzen, Carl, “Facebook Surveying Users About Their Friends’ Fake Usernames”, TPMIdeaLab, September 20, 2012, available at: http://idealab.talkingpointsmemo.com/2012/09/facebook-confirms-itssurveying-users-about-their-friends-fake-usernames.php. Fredrix, Emily, “Gap's logo back to blue after fans gripe about new”, October 11, 2010 available at: http://finance.yahoo.com/news/Gaps-logo-back-toblue-after-apf-3578440916.html?x=0. Frey, Michael G., Comment, Is it Fair to Confuse? An Examination of Trademark Protection, the Fair Use Defense, and the First Amendment, 65 U. CIN. L. REV. 1255 (1997). Friedman, Patri, “Our Oceans and the Evolution of Societies”, TEDxSF, April 30, 2012, available at: http://www.youtube.com/watch?v=BU92FVeO0qs. Friedmann, Danny, Extended Trademark Protection v Extended Trademark Use, Pendulum Might Be Swinging From Avoidance of Trademark Dilution to Competition, TMR (expected 2013). Friedmann, Danny, Paradoxes, Google and China - How Censorship Can Harm and Intellectual Property Can Harness Innovation, in GOOGLE AND THE LAW: IT AND THE LAW 169-202 (Aurelio Lopez-Tarruella, ed., 2012).

364 Friedmann, Danny, Rise and demise of U.S. social media in China, A touchstone of WTO and BIT regulations (Sept. 2011), CHINA’S INFLUENCE ON NON-TRADE CONCERNS IN INTERNATIONAL ECONOMIC LAW, (Paolo Farah, ed., forthcoming 2013). Friedmann, Danny, Sinking the Safe Harbour With the Legal Certainty of Strict Liability in Sight (2013). FUKUYAMA, FRANCIS, TRUST: THE SOCIAL VIRTUES AND THE CREATION OF PROPERITY (1995). Fuller, Michael, ‘Fair Use’ Trumps Likelihood of Confusion in Trademark Law The Supreme Court Rules in KP Permanent Make-Up, Inc. v Lasting Impression I, Inc., B.C. INTELL. PROP. & TECH. F. 011001 (2006). Gabrielides John T., & Thomas M. Williams, “The sound of unconventional marks in the United States”, WORLD TM REV. (July/August 2007). Gaines-Ross, Leslie, Reputational Warfare, HARV. BUS. REV. 70 (2010). Galperin, Eva, “Randi Zuckerberg Runs in the Wrong Direction on Pseudonymity Online”, EFF, August 2, 2011, available at: https://www.eff.org/deeplinks/2011/08/randi-zuckerberg-runs-wrong-directionpseudonymity. Gasparek, Katherine E., Applying the Fair Use Defense in Traditional Trademark Infringement and Dilution Cases to Internet Meta Tagging or Linking Cases, 7 GEO. MASON L. REV. 787 (1999). Gatewood, Christopher E., Web Links, Trademarks and the First Amendment, 5 RICH. J.L. & TECH. 12 (1999). Geek Feminisim Wiki, “Who is harmed by a “Real Names” policy?”, undated, available at: http://geekfeminism.wikia.com/wiki/Who_is_harmed_by_a_"Real_Names"_policy%3F. Geiger, Christophe, et al., Declaration, A Balanced Interpretation of the “Three-step Test” in Copyright Law, 1 JIPITEC 119 (2010). Geiger, Christophe, The Role Of The Three-Step Test In The Adaptation Of Copyright Law To The Information Society, UNESCO, e-Copyright Bulletin, January – March, 2002. Geist, Michael, Is There A There There, Toward Greater Certainty for Internet Jurisdiction, 16 BERKELEY TECH. L.J. 1345 (2002). Gerhardt, Deborah R., Consumer Investment in Trademarks 88 N.C. L. REV. 427 (2010). Geron, Tomio, “PostRocket's ‘News Feed Optimization’ For Facebook Raises Seed Funding”, Forbes, May 31, 2012, available at: http://www.forbes.com/sites/tomiogeron/2012/05/31/postrockets-news-feedoptimization-for-facebook-raises-seed-funding/. Gibbons, T., “Google Submission Hammer Section 92A”, PC World, March 16, 2009. Gibson, James, Once and Future Copyright, 81 NOTRE DAME L. REV. 167 (2005) GIERKE, OTTO VON, DEUTSCHES PRIVATRECHT, Band I (1868). GILLMOR, DAN, WE THE MEDIA: GRASSROOTS JOURNALISM BY THE PEOPLE, FOR THE PEOPLE (Sebastopol, CA: O'Reilly Media 2004-08).

365 Gilson, Jerome, Trademarks: The Future of the Advertising Function (an American Perspective), University College London Institute of Brand and Innovation Law, London, March 23, 2011, available at: http://www.ucl.ac.uk/laws/ibil/docs/11_brands_gilson.pdf. Ginsburg, Jane C., Separating the Sony Sheep From the Grokster Goats: Reckoning the Future Business Plans of Copyright-Dependent Technology Entrepreneurs, 50 ARIZ. L. REV. 577 (2008). Ginsburg, Jane C., Part II User-Generated Content Sites and Section 512 of the US Copyright Act, COPYRIGHT ENFORCEMENT AND THE INTERNET (Irini A. Stamatoudi, ed., 2010). Ginsburg, Jane C., Thirtieth Anniversary Special Issue Updates And Reflections: Article: Moral Rights In The U.S.: Still In Need Of A Guardian Ad Litem, 30 CARDOZO ARTS & ENT. L.J. 73 (2012). Godin, Seth “Define: Brand”, December 13, 2009, available at: http://sethgodin.typepad.com/seths_blog/2009/12/define-brand.html. GOFFMAN, E., THE PRESENTATION OF SELF IN EVERYDAY LIFE (New York: Doubleday Anchor Books 1959). Goldman, Eric, The Regulation of Reputational Information, in THE NEXT DIGITAL DECADE: ESSAYS ON THE FUTURE OF THE INTERNET, (Berin Szoka, Adam Marcus, eds., 2010). Goldman, Russell and Jason Stine, Star of Domino's Pizza Gross-Out Video Is Sorry, ABC Good Morning America, May 2009, available at: http://abcnews.go.com/GMA/Business/story?id=7500551#.UYjfKqIhpDM. Goldsmith, J., Against Cyberanarchy, 65 U. CHI. L. REV. 1199 (1998). Goldwasser, Kate, Knock it off: An Analysis Of Trademark Counterfeit Goods Regulation In The United States, France, And Belgium, 18 CARDOZO J. INT’L & COMP. L. 207 (2010). Gompel, Stef van, Formalities in the digital era: an obstacle or opportunity?, GLOBAL COPYRIGHT: THREE HUNDRED YEARS SINCE THE STATUTE OF ANNE, FROM 1709 TO CYBERSPACE (L. Bently, U. Suthersanen & P. Torremans, eds., 2010). Goodin, Dan, “French court fines eBay for sale of counterfeit handbags”, The Register, June 5, 2008, available at: http://www.theregister.co.uk/2008/06/05/ebay_counterfeit_ruling/. Goodman, Batya, Honey, I Shrink-Wrapped the Consumer: The Shrink-Wrap Agreement as an Adhesion Contract, 21 CARDOZO L. REV. 319 (1999). Goschen Committee, Board of Trade, Report of the Departmental Committee on the Law and Practice Relating to Trade Marks 80, Section 185 (1934). Greenstein, Howard, “5 Things You Don't Know About Facebook Exposure, Inc.com”, July 25, 2012, available at: http://www.inc.com/howard-greenstein/facebook-promoted-posts-for-small-business.html. Griffiths, Jonathan, The 'Three-Step Test' in European Copyright Law - Problems and Solutions, QUEEN MARY SCHOOL OF LAW LEGAL STUDIES RESEARCH PAPER No. 31 (2009). Guibault, Lucie, The Netherlands: Darfurnica, Miffy and the right to parody!, 3 JIPITEC 237 (2011). Gurry, Francis, Interview carried out on the occasion of the lecture: Changing International Landscape of Innovation and Intellectual Property (14 December 2010), available at: http://www.youtube.com/watch?v=h3uRGkkf56o.

366 Haines, Lester, “Need an African slave? Try eBay. Low Prices! Big Selection!”, The Register, available at: http://www.theregister.co.uk/2005/01/24/ebay_african_slaves/. Hall, Stuart, The Spectacle of the ‘Other’ in REPRESENTATION: CULTURAL REPRESENTATIONS AND SIGNIFYING PRACTICES, (Stuart Hall, ed., 1997). Harnad, S., Post-Gutenberg Galaxy: The Fourth Revolution in the Means of Production and Knowledge, 2 PUB.-ACCESS COMP. SYS. REV. 39 (1991). Harper, Jim, “Against ISP Liability”, Telecommunications & Technology, 28 REGUL. MAG. 30 (2005). Harrison, Jeffrey L., Trademark Law and Status Signaling: Tattoos for the Privileged, 59 FLA. L. REV. 195 (2007). HARVEY, DAVID, THE CONDITION OF POSTMODERNITY 89 (1989). Heath, A.P. & D. Scott, The self-concept and image congruence hypothesis, 32 EUR. J. MARKETING 1110 (1997). HELLER, MICHAEL, THE GRIDLOCK ECONOMY: HOW TOO MUCH OWNERSHIP WRECKS MARKETS, STOPS INNOVATION, AND COSTS LIVES (Basic Books, 2008). Helman, Lital & Gideon Parchomovsky, The Best Available Technology Standard, 111 COLUM. L. REV. 1194 (2011). Helmond, Anne & Carolin Gerlitz, Hit, Link, Like and Share. Organizing the social and the fabric of the web in a Like economy, DMI-mini conference University of Amsterdam, January 24-25, 2011, available: http://www.annehelmond.nl/wordpress/wp-content/uploads//2011/04/GerlitzHelmondHitLinkLikeShare.pdf. Heritage, The Origin of the Swoosh, Nikebiz.com, available via the Internet Archive, http://web.archive.org/web/20070408190641/http://www.nike.com/nikebiz/nikebiz.jhtml?page=5 &item=origin. Heymann, Laura A.,The Public’s Domain In Trademark Law: A First Amendment Theory Of The Consumer, 43 GA. L. REV. 651 (2009). Heymann, Laura A., A Name I Call Myself: Creativity and Naming, 2 U.C. IRVINE L. REV., 585 (2012). Heymann, Laura A.,The Scope of Trademark Law in the Age of the Brand Persona, 98 VA. L. REV. IN BRIEF 68 (2012). Hindes, Tatiana, “7 different types of logos for small to medium businesses, which one is the right for yours?”, June 10, 2011, available at: http://www.soulspace.com.au/7-different-types-of-logos-for-small-tomedium-businesses-which-one-is-the-right-for-yours/. Holiday, Ryan, “Broken on Purpose: Why Getting It Wrong Pays More Than Getting It Right”, New York Observer, November 11, 2012, http://observer.com/2012/09/broken-on-purpose/. Horn, Greg & Matthew Malm, Sex Changes Everything, But The Trademark Dilution Revision Act Shouldn’t: V Secret Catalogue, Inc. V. Moseley And The Burden Of Proof In Trademark Dilution Actions, 79 U. CIN. L. REV. 1583 (2011). Horowitz, Bradley, blog of July 26, 2011, available at: https://plus.google.com/113116318008017777871/posts/VJoZMS8zVqU.

367 Hugenholtz, P. Bernt & Kamiel Koelman, WIPO Workshop on Service Provider Liability, Online Service Provider Liability for Copright Infringement, Geneva, December 9 and 10, 1999, available at: http://www.ivir.nl/publicaties/hugenholtz/wipo99.pdf. Hugenholtz, P. Bernt & Martin Senftleben, Fair Use in Europe: In Search of Flexibilities (study commissioned by Google) November 14, 2011. Hughes, Justin, The Philosophy of Intellectual Property, 77 GEO. L.J. 287 (1988). Hughes, Justin, “Recoding” Intellectual Property and Overlooked Audience Interests, 77 TEX. L. REV. 923, (1999). Hughes, Justin, American Moral Rights and Fixing the Dastar “Gap”, UTAH L. REV. 659 (2007). Illyes, Gary, “1000 Words About Images”, Google Webmaster Central Blog, April 25, 2012, available at: http://googlewebmastercentral.blogspot.in/2012/04/1000-words-aboutimages.html?utm_source=twitterfeed&utm_medium=facebook. Indvik, Lauren, “Confirmed: Pinterest Raises $ 100 Million to Fund International Expansion”, Mashable Business, May 17, 2012, available at: http://mashable.com/2012/05/17/pinterest-120-million/. Institute for Stem Cell Biology and Regenerative Medicine, Stanford School of Medicine, undated, available at: http://stemcell.stanford.edu/research/. INTA, Global Trademark Research, Fact Sheets Types of Protection, Nontraditional Trademarks, undated, available at: http://www.inta.org/TrademarkBasics/FactSheets/Pages/NontraditionalTrademarksFactSheet.aspx. Intel Corporation, “Excerpts from A Conversation with Gordon Moore: Moore’s Law”, Video transcripts, 2005, at 1, available at: ftp://download.intel.com/museum/Moores_Law/VideoTranscripts/Excepts_A_Conversation_with_Gordon_Moore.pdf. IPRED2, Proposal for a European Parliament And Council Directive on criminal measures aimed at ensuring the enforcement of intellectual property rights, July 12, 2005. Jacobs, Brian A., Note, Trademark Dilution on the Constitutional Edge, 104 COLUM. L. REV. 161 (2004). JEREMY PHILLIPS, INTRODUCTION TO INTELLECTUAL PROPERTY LAW (1986). Jetter, Sherry L., Oral Statement of Vice President, Intellectual Property, Polo Ralph Lauren Corporation, before the Hearing of the Subcommittee on Courts, The Internet, and Intellectual Property of the Committee on the Judiciary, 107th Cong., 2d Sess., Serial No. 53 (Feb. 14, 2003). Joffe-Walt, Chana & Jacob Goldstein, “Almost a chartered city, named Dot, was established in Honduras,” 483: Self-Improvement Kick, Act Two, Some Like it Dot, This American Life radio, January 4, 2013, available at: http://www.thisamericanlife.org/radio-archives/episode/483/self-improvementkick?act=2#play. John McCarthy, “The sayings of John McCarthy”, March 1, 2007, available at: http://wwwformal.stanford.edu/jmc/sayings.html. John Ottaviani, “The End is Near – Bertelsmann Settles EMI Claims Over Napster”, Eric Goldman Blog, March 28, 2007, available http://blog.ericgoldman.org/archives/2007/03/the_end_is_near.htm.

368 Johnson, Bobbie, “Finland makes broadband access a legal right”, The Guardian, October 14, 2009, available at: http://www.guardian.co.uk/technology/2009/oct/14/finland-broadband (accessed August 9, 2013). Johnson, Peter, BOOK REVIEW: Can You Quote Donald Duck?: Intellectual Property in Cyberculture Rosemary J. Coombe, The Cultural Life of Intellectual Properties: Authorship, Appropriation, and the Law, 13 YALE J.L. & HUMAN. 451 (2001). Jou, Chi-Ru, The Perils of a Mental Association Standard of Liability: The Case Against the Subliminal Confusion Cause of Action, 11 VA. J.L. & TECH. 2 (2006). Judge, Paul, Barracuda Labs, Annual Report 2009, at 7, available at: http://barracudalabs.com/downloads/BarracudaLabs2009AnnualReport-FINAL.pdf. JUVENAL, SATIRE VI (around 115 AD) (G.G. Ramsey, transl. 1918). Kaiser, Brian Contributory Trademark Infringement By Internet Service Providers: An Argument For Limitation, 7 J. TECH. L. & POL’Y 65 (2002). Kaplan, Andreas M. & Michael Haenlein, Users of the world, unite! The challenges and opportunities of Social Media, 53 BUSINESS HORIZONS 59 (2010). Katyal, Sonia K., Stealth Marketing and Antibranding: The Love that Dare Not Speak Its Name, 58 BUFF. L. REV. 795 (2010). Kawohl, Friedemann, Commentary on Josef Kohler's The Author's Right (1880), in PRIMARY SOURCES ON COPYRIGHT (1450-1900) (eds L. Bently & M. Kretschmer, 2008). Kerr, Dara, “Facebook's mobile-only use jumps 23 percent since March”, CNET, July 31, 2012, available at: http://news.cnet.com/8301-1023_3-57484036-93/facebooks-mobile-only-use-jumps-23-percent-sincemarch/. Kesselheim, Aaron S., Intellectual Property Policy in the Pharmaceutical Sciences: The Effect of Inappropriate Patents and Market Exclusivity Extensions on the Health Care System, 9 AAPS J. E306 (2007). Khan, Azam, “Google Launches Business Pages”, Social Times, November 7, 2011, available at: http://socialtimes.com/google-launches-business-pages_b83409. Khan, Urmee, “Tatooed pigs banned from modern art exhibition”, The Telegraph, November 4, 2008, available at: http://www.telegraph.co.uk/news/newstopics/howaboutthat/3382201/Tattooed-pigs-bannedfrom-modern-art-exhibition.html. Khermouch, Gerry, “The Best Global Brands”, BusinessWeek, August 4, 2002. Klaassen, Abbey, “How Two Coke Fans Brought The Brand To Facebook Fame”, March 16, 2009, available at: http://adage.com/digital/article?article_id=135238. KLEIN, NAOMI, NO LOGO: TAKING AIM AT THE BRAND BULLIES (Knopf Canada, 2000). Kobayashi, Susumu, Theoretical Issues Concerning Superiority of Pictures over Words and Sentences in Memory, 63 PERCEPTUAL & MOTOR SKILLS 783 (1986). Koelman, Kamiel & Rosa Julià-Barceló, Intermediary Liability In The E-Commerce Directive: So Far So Good, But It's Not Enough, 4 COMPUTER L. & SEC. REP. 231 (2000).

369 Koelman, Kamiel, Fixing the Three-Step Test, EIPR 3 (2006). Kozinski, Alex & Stuart Banner, Who’s Afraid of Commercial Speech?, 76 VA. L. REV. 627 (1990). Kozinski, Alex, Trademarks Unplugged, 68 N.Y. U. L. REV. 960 (1993). Krause, Ernst-Günther, “Nichtraucher-Initiative München e.V.”, May 18, 2011, available at: http://www.nimuenchen.de/content/view/331/20/. Kremerskothen, Kay “6,000,000,000”, Flickr, August 4, 2011, http://blog.flickr.net/en/2011/08/04/6000000000/. Kwall, Roberta Rosenthal, Copyright and the Moral Right: Is an American Marriage Possible?, 38 VAND. L. REV. 1 (1985). La Rue, Frank, “Document U.N. report: Internet access is a human right”, May 16, 2011, available at: http://documents.latimes.com/un-report-internet-rights/. Ladas, Dr. Stephen P., Chairman and Charles Magnin, Rapporteur of the International Chamber of Commerce, Commission on International Protection of Industrial Property, “Well-known Trade Marks”, 13th I.C.C. Congress, Lisbon, June 1951. LaFrance, Mary, Authorship and Termination Rights in Sound Recordings, 75 S. CAL. L. REV. 375 (2002). Landes, William M., & Richard A. Posner, The Economics of Trademark Law, 78 TMR 267 (1988). LANDES, WILLIAM M. & RICHARD A. POSNER, THE ECONOMIC STRUCTURE OF INTELLECTUAL PROPERTY LAW 166-209 (2003). LANGEVELD, MARNIX, BUCKLER? PROOST! (Amsterdam: Otto Cramwinckel 2004). Larson, Joseph A., Taming The Wild West: An Examination Of Private Student Loan Consolidation Companies' Violations Of § 43(A) Of The Lanhan Act By Using Trade Names And Logos That Closely Resemble Those Used By The United States Department Of Education, 41 CREIGHTON L. REV. 515 (2008). Lastowka, Greg, Trademark’s Daemons, 48 HOUS. L. REV. 779 (2011). Laura A. Heymann, The Grammar of Trademarks 14 LEWIS & CLARK L. REV. 1313 (2010). Leaffer, Marshall A., The New World of Intellectual Trademark Law, 2 MARQ. INTELL. PROP. L. REV. 1 (1998). Lee, E., Warming Up to User-Generated Content, U. ILL. L. REV. 1459 (2008). Lee, Timothy, “Warner Bros: we issued takedowns for files we never saw, didn't own copyright to”, Ars Technica, November 10, 2011, available at: http://arstechnica.com/tech-policy/news/2011/11/warneradmits-it-issues-takedowns-for-files-it-hasnt-looked-at.ars. Lemley, Mark The Modern Lanham Act and the Death of Common Sense, 108 YALE L. J. 1687 (1999). Lemley, Mark, & Stacey Dogan, Merchandising Right: Fragile Theory or Fait Accompli, 54 EMORY L.J. 461 (2005). Lemley Mark A., & Mark McKenna, Irrelevant Confusion, 62 STAN. L. REV. 413 (2010). LESSIG, LAWRENCE, FREE CULTURE (Penguin Press 2004).

370 LESSIG, LAWRENCE, CODE V.2.0 (New York: Basic Books, 2006). LESSIG, LAWRENCE, REMIX: MAKING ART AND COMMERCE THRIVE IN THE HYBRID ECONOMY (Bloomsbury Academic Press 2008). Lester, Anthony, “These disgraceful libel laws must be torn up, The Times”, March 15, 2011, available at: http://www.thetimes.co.uk/tto/opinion/columnists/article2946193.ece. Levin, Elizabeth, A Safe Harbor For Trademark: Reevaluating Secondary Trademark Liability After Tiffany V. Ebay, 24 BERK. TECH. L. J. 491 (2009). Levin, Gabrielle, Misappropriation of Goodwill, 5 WAKE FOREST INTELL. PROP. L.J. 89 (2005). Libling, D.F., The Concept of Property: Property in Intangibles, 92 LAW Q. REV. 103 (1978). Lipton, Jacqueline, Information Wants to be Property: Legal Commodification of E-Commerce Assets, 16 INT'L REV. L. COMP. & TECH. 53 (2002). Lipton, Jacqueline, A Framework for Information Law and Policy, 82 OR. L. REV. 695 (2003). Litman, Jessica, Symposium: Innnovation And The Information Environment: Revising Copyright Law for the Information Age, 75 OR. L. REV. 19 (1996). Litman, Jessica, Breakfast with Batman: The Public Interest in the Advertising Age, 108 YALE L.J. 1717 (1999). Litman, Jessica, Information Privacy/Information Property, 52 STAN. L. REV. 1283 (2000). LLEWELYN, DAVID, INVISIBLE GOLD IN ASIA: CREATING WEALTH THROUGH INTELLECTUAL PROPERTY (2010). LOCKE, JOHN, THE SECOND TREATISE OF CIVIL GOVERNMENT (1690) (Peter Laslett, ed., 1988). Lockridge, Lee Ann W., When is a Use in Commerce a Noncommercial Use?, 37 FLA. ST. U. L. REV. 337 (2010). Loeb, Pat, “Penn Law Goes Head-To-Head Against Copyright Lawyer Over Student Poster”, CBS, March 20, 2012, available at: http://philadelphia.cbslocal.com/2012/03/20/penn-law-goes-head-to-head-againstcopyright-lawyer-over-student-poster/. Logo Design Love, Unilever icons explained, December 1, 2011, available at: http://www.logodesignlove.com/unilever-icons. Logodesignsource.com, “Types of Logodesign”, 2005, available at: http://www.logodesignsource.com/types.html. Lohmann, Fred von, presentation at STAN. TECH. L. REV., Symposium, Secondary and Intermediary Liability on the Internet (2011). Lombardi, Candace, “Google joins Xerox as a verb”, CNET, July 6, 2006, available at: http://news.cnet.com/Google-joins-Xerox-as-a-verb/2100-1025_3-6091289.html. LUCAS, ANDRÉ & HENRI-JACQUES, TRAITÉ DE LA PROPRIÉTÉ LITTÉRAIRE ET ARTISTIQUE 307 (2d ed. 2001).

371 Lucas, André, Moral right in France: toward a pragmatic approach? ALAI 2009 Congress From 1710 to Cyberspace: Celebrating 300 years of copyright and looking to its future, bla©a, (2009), available at: http://www.blaca.org/Moral%20right%20in%20France%20by%20Professor%20Andre%20Lucas.pdf. Luepke, Marcus, Taking Unfair Advantage or Diluting a Famous Mark—A 20/20 Perspective on the Blurred Differences Between U.S. and E.U. Dilution Law, 98 TMR 789 (2008). Lunardi, Jason J., Guerrilla Video: Potential Copyright Liability for Websites that Index Links to Unauthorized Streaming Content, 19 FORDHAM INTELL. PROPO. MEDIA & ENT. L.J. 1077 (2009). Lungescu, Oana, “Tiny Estonia leads internet revolution”, BBC News, April 7, 2004, available at: http://news.bbc.co.uk/2/hi/europe/3603943.stm. LUTTER, MARCUS, et al., DER EINFLUSS DEUTSCHER EMIGRANTEN AUF DIE RECHTSENTWICKLUNG IN DEN USA UND IN DEUTSCHLAND (Mohr Siebeck, 1993). Machat, Michael, The Practical Significance Of The Supreme Court Decision In KP Permanent Make-Up, Inc. v Lasting Impression I, Inc., 95 TMR 825 (2005). MacKinnon, Rebecca, The Netizen, 55 DEVELOPMENT 201 (2012). Madison, Michael J., A Pattern-Oriented Approach to Fair Use, 45 WM. & MARY L. REV. 1525 (2004). Madrigal, Alexis, “Why Facebook and Google's Concept of 'Real Names' Is Revolutionary”, The Atlantic, August 5, 2011, available at: http://www.theatlantic.com/technology/archive/2011/08/why-facebook-andgoogles-concept-of-real-names-is-revolutionary/243171/. Magliocca, Gerard N., ne and Inseparable: Dilution and Infringement in Trademark Law, 85 MINN. L. REV. 949 (2001). Manas, Alayne E., Harvard as a Model in Trademark and Domain Name Protection, 29 RUTGERS COMPUTER & TECH. L.J. 475 (2003). Mann, Ronald J.& Seth R. Belzley, The Promise of Internet Intermediary Liability, 47 WM. & MARY L. REV. 1 (2005). MARSHALL, DAVID, CELEBRITY AND POWER: FAME IN CONTEMPORARY CULTURE (1997). Marshall, Juli Wilson & Nicholas J. Siciliano, The Satire/Parody Distinction in Copyright and Trademark Law— Can Satire Ever Be a Fair Use? ABA Section of Litigation Intellectual Property Litigation Committee Roundtable Discussion Online, available at: http://apps.americanbar.org/litigation/committees/intellectual/roundtables/0506_outline.pdf. Masnick, Mike, “Does No One Remember The Friendster Fakester Fiasco? Facebook Now Dealing With Fakebookers”, TechDirt, November 2, 2007, available at: http://www.techdirt.com/articles/20071101/194615.shtml. Masnick, Mike, “Friendster Fakesters – Goodster Or Badster”, TechDirt, August 13, 2003, available at: http://www.techdirt.com/articles/20030813/2010251.shtml. Masouyé, Claude, Guide to the Berne Convention for the Protection of Literary and Artistic Works (Paris Act, 1971), WIPO PUBL. No. 615(E) (Geneva 1978). Matos, Cassi G., The Unbranding of Brands: Advocating for Source Disclosure in Corporate America, 20 FORDHAM INTELL. PROP. MEDIA & ENT. L.J. 1307 (2010).

372 Mayer-Schönberger, Viktor & John Crowley, Napster’s Second Life?: The Regulatory Challenges of Virtual Worlds, 100 N.W. U.L. REV. 1775 (2006). MCCARTHY, J. THOMAS, MCCARTHY ON TRADEMARK AND UNFAIR COMPETITION (4th ed. 2001). McCarthy, J. Thomas, The American Experience with Trademark Anti-Dilution Law, IBIL, February 2009, presentation slides, available at: http://www.ucl.ac.uk/laws/ibil/docs/ibil_11feb09_mccarthy_ppt.pdf . McClure, Daniel M., Trademarks and Unfair Competition: A Critical History of Legal Thought, 69 TMR 320 (1979). McCuaig, Dan, Halve The Baby: An Obvious Solution To The Troubling Use Of Trademarks As Metatags, 18 J. MARSHALL J. COMPUTER & INFO. L. 643 (2000). McGeveran, William, Disclosure, Endorsement, and Identity in Social Marketing, 4 U. ILL. L. REV. 1105 (2009). McKenna, Mark P., The Normative Foundations of Trademark Law, 82 NOTRE DAME L. REV. 1839 (2007). McKenna, Mark P., A Consumer Decision-Making Theory of Trademark Law, 98 VA. L. REV. 67 (2012). McManis, Charles R., The Privatization (or "Shrink-Wrapping") of American Copyright Law, 87 CAL. L. REV. 173 (1999). MENCKEN, HENRY L., THE AMERICAN LANGUAGE (1921). Mercurio, Bryan Christopher, Awakening the Sleeping Giant: Intellectual Property Rights in International Investment Agreements, 15 J. INT’L ECON. L. 871 (2012). Merryman, John Henry, The Refrigerator of Bernard Buffet, 27 HASTINGS L.J. 1023, (1976). Metsch, Seth A., Embedded Media: Apps, Widgets, RSS and Embedded Content, 978 PLI/PAT 235 (2009). MIKHAILOVICH BAKHTIN, MIKHAIL, THE DIALOGIC IMAGINATION: FOUR ESSAYS (Austin: University of Texas Press 1981). Mikkelson, Barbara & David P. Mikkelson, “Tommy Rot, Urban Legends Reference Pages”, May 6, 2006, available at: http://www.snopes.com/racial/business/Hilfiger.asp. Millar v Taylor (1769), Copyright, Plagiarism and …McGuffey’s Readers, “A Critical Resource on Intellectual Property in the Eighteenth and Nineteenth Centuries”(undated), available at: http://web.ics.purdue.edu/~epflugfe/McGuffey%20project/624.3.html. Miller, Miranda, “Google+ Adoption Among Big Brands Growing, Pages Featured More in SERPs”, August 1, 2012, available at: http://searchenginewatch.com/article/2196139/Google-Adoption-Among-BigBrands-Growing-Pages-Featured-More-in-SERPs. Mills, Elinor, “Google says no ‘googling’ in trademark warning”, CNET, August 14, 2006, available at: http://news.cnet.com/8301-10784_3-6105481-7.html. Millward Brown “BrandZ Top 100 Most Valuable Global Brands 2011”, (2011), available at: http://www.millwardbrown.com/libraries/optimor_brandz_files/2011_brandz_top100_chart.sflb.ashx. Milton Handler & Charles Pickett, Trade-Marks and Trade Names – An Analysis and Synthesis, 30 COLUM. L. REV. 168 (1930).

373 Milton W. Handler, Are the State anti-dilution laws compatible with the national protection of trademarks?, 88 TMR 419 (1998). MOLHO, RENATA, BEING ARMANI: A BIOGRAPHY 91-92 (Antony Shugaar trans., 2007). Monti, Mario, Orientations for Electronic Commerce: discussion at Council of Economy and Finance Ministers, March 10, 1998, available at: http://ec.europa.eu/internal_market/e-commerce/orientation_fr.htm. Moore, Gordon E., “Cramming more components onto integrated circuits”, Electronics Magazine, 1965, available at: http://download.intel.com/museum/Moores_Law/ArticlesPress_Releases/Gordon_Moore_1965_Article.pdf. MORILLOT, ANDRÉ, DE LA PROTECTION ACCORDÉE AUX OEUVRES D’ART, AUX PHOTOGRAPHIES, AUX DESSINS ET MODÈLES INDUSTRIELS ET AUX BREVETS D’INVENTION DANS L’EMPIRE D’ALLEMAGNE (Paris, Cotillon, 1878). Moskin, Jonathan, Dilution or Delusion: the Rational Limits of Trademark Protection, 83 TMR 122 (1993). Moskin, Jonathan, Virtual Trademark Use - The Parallel World of Keyword Ads, 98 TMR 873 (2008). Musat, Anca, “Trademark infringement: Any room for the parody defense in Romania?”, Business Review /Bucharest Lawyer, June 2007, at 10, available at: http://www.musat.ro/pdf/Bucharest%20Lawyer%20%20Anca%20Musat%20-%20June.pdf. Nas, Sjoera, “The Multatuli Project, ISP Notice & take down”, Bits of Freedom, October 27, 2004, available at: http://www.bof.nl/docs/researchpaperSANE.pdf. Neff, Jack, “Nielsen: Facebook's Ads Work Pretty Well”, Advertisement Age, April 19, 2010, available at: http://adage.com/digital/article?article_id=143381. Nekovee, Maziar, et al., Theory of rumour spreading in complex social networks, 374 PHYS. A 457 (2007). Nelson, Sara Stadler, The Wages of Ubiquity in Trademark Law, 88 IOWA L. REV. 776 (2003). Netanel, Neil, Alienability Restrictions and the Enhancement of Author Autonomy in United States and Continental Copyright Law, 12 CARDOZO ARTS & ENT. L.J. 1 (1994). NIMS, HARRY D., THE LAW OF UNFAIR COMPETITION AND TRADE-MARKS (3d ed., 1929). NOCK, STEVEN L., THE COSTS OF PRIVACY: SURVEILLANCE AND REPUTATION IN AMERICA (1993). O’Dell interviewed 6 experts: Jolie O’Dell, “6 Challenges to Managing a Brand on the Social Web”, June 30, 2010, available at: http://mashable.com/2010/06/30/brands-social-web. OECD, “Participative Web: User-Created Content”, document DSTI/ICCP/IE(2006)7/Final, dated April 12, 2007. Olinsky, Frank, “MTV Logo Story”, available at: http://www.frankolinsky.com/mtvstory1.html. Olson, Alexandra, Dilution by Tarnishment: An Unworkable Cause of Action in Cases of Artistic Expression, 53 B. C. L. REV. 693 (2012). OLSTHOORN, PETER, ‘IT’S COMPLICATED’, THE POWER OF FACEBOOK, EXTENDED EDITION (2012).

374 O’Neill, Nick, “Facebook Knows Your Relationship Will End In A Week”, All Facebook, May 17, 2010, available at: http://www.allfacebook.com/facebook-knows-that-your-relationship-will-end-in-a-week-201005. O’Reilly, Tim, “What is Web 2.0”, September 30, 2005, available at: http://oreilly.com/pub/a/web2/archive/what-is-web-20.html. O’Rourke, Maureen A., Defining the Limits of Free-Riding in Cyberspace: Trademark Liability for Metatagging, 33 GONZ. L. REV. 277 (1997-98). O’Rourke, Maureen A., Fencing Cyberspace: Drawing Borders in a Virtual World, 82 MINN. L. REV. 609 (1998). Owano, Nancy, “Google team: Self-teaching computers recognize cats”, Phys.org, June 26, 2012, avadilable at: http://phys.org/news/2012-06-google-team-self-teaching-cats.html. Owyang, Jeremiah, “How “Janet” Fooled the Twittersphere (and me) She's the Voice of ExxonMobil”, August 1, 2008, available at: http://www.web-strategist.com/blog/2008/08/01/how-janet-fooled-thetwittersphere-shes-the-voice-of-exxonmobil/ . Palm, Jukka, “The ECJ’s puzzling concept of a “change in economic behaviour”, Brands in the Boardroom 2009, IAM-Magazine, 20 (2009). Pantalony, Michael, Director of Civil Enforcement, North America, Louis Vuitton Malletier, who sent cease-and-desist letter to dean of U. PA L. School, February 29, 2012, available at: https://www.law.upenn.edu/fac/pwagner/DropBox/lv_letter.pdf. Parekh, Rupal, “GM, Kellogg, Nestle Beat to the Tweet as Squatters Take Over Twitter Names”, Advertisement Age, November 9, 2009, available at: http://adage.com/digital/article?article_id=140377. Park Jaram, et al., Managing Bad News in Social Media: A Case Study on Domino’s Pizza Crisis, International AAAI Conference on Weblogs and Social Media (ICWSM) (2012), available at: http://mia.kaist.ac.kr/publication/icwsm2012_park.pdf. Park, Jaram, et al., Sentiment Analysis on Bad News Spreading, CSCW Workshop on Design, Influence, and Social Technologies (DIST) (2012), available at: http://distworkshop.files.wordpress.com/2012/02/dist2012-workshop_2-2.pdf. Patry, William F., Chief Copyright Counsel, Google Inc., presentation: What would leadership in copyright policy look like?, IBIL UCL, April 3, 2012. Pattishall, Beverly W., The Dilution Rationale for Trademark-Trade Identity Protection, Its Progress and Prospects, 67 TMR 607 (1977). Pattishall, Beverly W.Dawning Acceptance of the Dilution Rationale For Trade-Mark Identity Protection, 74 TMR 289 (1984). Peguera, Miquel, Copyright Issues Regarding Google Images and Google Cache, in GOOGLE AND THE LAW: IT AND THE LAW 169-202 (Aurelio Lopez-Tarruella, ed., 2012). PENDLETON, MICHAEL & ALICE LEE, INTELLECTUAL PROPERTY IN HONG KONG, (LexisNexis, 2008). Pfitzmann, Andreas & Marit Hansen, Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology, Version v0.25 (2005), available: http://freehaven.net/anonbib/cache/terminology.pdf. .

375 Philips, Jeremy, Google AdWords: Trade Mark Law and Liability of Internet Service Providers, in GOOGLE LAW: IT AND THE LAW 169-202 (Aurelio Lopez-Tarruella, ed., 2012).

AND THE

PILON, ROGER, THE CONSTITUTIONAL PROTECTION OF PROPERTY RIGHTS: AMERICA AND EUROPE, Economic Education Bulletin, AIER (2008). Pinto, Timothy Too stripy for Adidas, 3 J.I.P.L.P. 624 (2008). PLATO, CRATYLUS (360 B.C.E.) (Benjamin Jowett, transl. 1871). Polet, Robert, President, CEO and Chairman of the Managing Board of Gucci Group, pointed out during Google Zeitgeist Europe 2010, May 17, 2010, available at: http://www.youtube.com/user/eurozeitgeist#p/u/13/B8v2tMJmeg0. Pollack, Malla, Your Image Is My Image: When Advertising Dedicates Trademarks to the Public Domain with an Example from the Trademark Counterfeiting Act of 1984, 14 CARDOZO L. REV. 1391 (1993). Popper, Ben, “Anti-social networking, Google+ Clarifies Brand Pages and Mashable Drops Profile, Betabeat”, July 21, 2011, available at: http://betabeat.com/2011/07/has-the-google-brand-purge-begunford-motors-next-web-down-yet-mashable-remains/. Port, Kenneth L., The ‘Unnatural’ Expansion of Trademark Rights: Is a Federal Dilution Statute Necessary?, 18 SETON HALL LEGIS. J. 433 (1994). Port, Kenneth L., Judging Dilution in the United States and Japan, 17 TRANSN’L L. & CONTEMP. PROBS 667 (2008). Port, Kenneth L., The Expansion Trajectory: Trademark Jurisprudence in the Modern Age, 92 J. PAT. & TRADEMARK OFF. SOC’Y 474 (2010). Post, Robert C., The Social Foundations of Defamation Law: Reputation and the Constitution, 74 CAL. L. REV. 691 (1986) POSTER, MARK, THE MODE OF INFORMATION, POST-STRUCTURALISM AND SOCIAL CONTEXTS (University of Chicago Press 1990). POUILLET, LOUIS MARIE EUGÈNE, TRAITÉ THÉORIQUE ET PRATIQUE DE LA PROPRIÉTÉ LITTÉRAIRE ET ARTISTIQUE ET DU DROIT DE REPRESENTATION (Georges Maillard & Charles Claro eds., 3d ed. 1908). PRENSKY, MARK, DIGITAL NATIVES, DIGITAL IMMIGRATION (2001). Principles for User Generated Content Services, October 18, 2007, available at: http://www.ugcprinciples.com/. Protalinski, Emil, “Facebook hit with $15 billion class action user tracking lawsuit”, ZDNET, May 18, 2012, available at: http://www.zdnet.com/blog/facebook/facebook-hit-with-15-billion-class-action-usertracking-lawsuit/13358. Protalinski, Emil, “Facebook: 8.7 percent are fake users”, CNET, August 1, 2012, available at: http://news.cnet.com/8301-1023_3-57484991-93/facebook-8.7-percent-are-fake-users/. Quek, Regina, “Louis Vuitton defeated on appeal in ‘quatrefoil’ case”, January 15, 2010, available at: http://www.onelegal.sg/pdf/Louis%20Vuitton%20defeated%20on%20appeal%20in%20quatrefoil%20ca se.pdf.

376 Ray Kurzweil, “The Law of Accelerating Returns”, Kurzweil AI, March 7, 2001, available at: http://www.kurzweilai.net/the-law-of-accelerating-returns. Raymond, Matt, “How Tweet It Is!: Library Acquires Entire Twitter Archive”, Library of Congress, April 14, 2010, available at: http://blogs.loc.gov/loc/2010/04/how-tweet-it-is-library-acquires-entire-twitterarchive/. Redding, Dan, “The Evolution of The Logo”, Smashing Magazine, July 6, 2010, http://www.smashingmagazine.com/2010/07/06/the-evolution-of-the-logo/. Reed, Frank, “In the Age of Pinterest, Google Wants To Know How To Index Images”, Marketing Pilgrim, April 25, 2012, available at: http://www.marketingpilgrim.com/2012/04/in-the-age-of-pinterest-googlewants-you-to-know-how-to-index-images.html. Reed, Nora, “6 Different Types of Logo Designs – Choose The Right One!”, Logo blog, April 2, 2012, available at: http://www.logoblog.org/types-of-logo-design/. Reese, Anthony, The Relationship Between the ISP Safe Harbors and Liability for Inducement, 8 STAN. TECH. L. REV. 1 (2011). Reichman, Court L., & M. Melissa Cannady, False Advertising Under the Lanham Act, 21 FRAN. L. J. 187 (2002). RHEINGOLD, HOWARD, THE VIRTUAL COMMUNITY: HOMESTEADING ON THE ELECTRONIC FRONTIER (Addison-Wesley Publishing Company, Reading, MA, 1993). Richardson, Megan, Trade Marks and Language, 26 SYDNEY L. REV. 193 (2004). Rierson, Sandra L., The Myth and Reality of Dilution, 11 DUKE L. & TECH. REV. 212 (2012). Roberts, Jeff John, “‘Friends’ can share your Facebook profile with the government, court rules”, PaidContent, August 15, 2012, available at: http://gigaom.com/2012/08/15/friends-can-share-yourfacebook-profile-with-the-government-courtrules/?utm_source=General+Users&utm_campaign=cd049c36d7-c%3Amed+d%3A0816&utm_medium=email. Rochat, Leslie C., “I See What You're Saying”: Trademarked Terms and Symbols as Protected Consumer Commentary in Consumer Opinion Websites, 24 SEATTLE U. L. REV. 599 (2000). RODYK, “Watch out! You Might Be Infringing Someone’s Trade Mark”, available at: http://www.rodyk.com/front/poppage/261. Rogers, Edward Sidney, Comments on the Modern Law of Unfair Trade, 3 ILL. L. REV. 551 (1909). Rogers, Will, Warning to Jokers: Lay Off the Prince, in THE ILLITERATE DIGEST, I-3 THE WRITINGS OF WILL ROGERS (1974). Romer, Paul, Why the world needs charter cities, TED presentation, July 2009, available at: http://www.ted.com/talks/paul_romer.html. Rose, Simone A., Will Atlas Shrug? Dilution Protection For ‘Famous’ Trademarks: Anti-Competitive ‘Monopoly’ Or Earned ‘Property’ Right?, 47 FLA. L. REV. 653 (1995). Rose, Simone A., Will Atlas Shrug? Dilution Protection For ‘Famous’ Trademarks: Anti-Competitive ‘Monopoly’ Or Earned ‘Property’ Right?, 47 FLA. L. REV. 653 (1995).

377 Rouse, Margaret, “Definition What is sharding?”, Search Cloud Computing, December 2011, available at: http://searchcloudcomputing.techtarget.com/definition/sharding. Rowbottom, Jacob, To Rant, Vent and Converse: Protecting Low Level Digital Speech, 71 CLJ 365 (2012). RUSHKOFF, DOUGLAS, PLAYING THE FUTURE (Riverhead Books June 1996). Ryanair Limited v Robert Tyler, Dispute Resolution Service, D00008527, Decision of Independent Expert, available at: Nominet Dispute-Resolution Service Policy, July 28, 2008, available at: http://www.nic.uk/disputes/drs/decisions/decisionssearch/?searchText=Ryanair&x=28&y=14. Sakulin, Wolfgang, Note under Vzr. Rb. The Hague May 4, 2011, Plesner v Louis Vuitton, LJN BQ3525; IEPT20110504, IER 39 (2011); NJF 264 (2011). Sakulin, Wolfgang, Trademark Protection and Freedom of Expression, An Inquiry into the Conflict between Trademark Rights and Freedom of Expression under European, German, and Dutch Law, Dissertation IViR (2010). Sammons, Stephanie, “With Blogging and Social Media, Focus on What You Can Control”, September 18, 2010, Build Online Influence, available at: http://www.stephaniesammons.com/with-blogging-and-socialmedia-focus-on-what-you-can-control/. Samuelson, Pamela, Intellectual Property and Contract Law for the Information Age: Foreword to a Symposium, 87 CAL. L. REV. 1 (1999). Sanders, Anselm Kamperman, Ch. 4. Odol: The Introduction of a Watery Concept with Steeled Resilience, in LANDMARK INTELLECTUAL PROPERTY CASES AND THEIR LEGACY (Christopher Heath & Anselm Kamperman Sanders, eds., 2011). Santini, Laura, “Market for Vanity Plates Grows Despite Hard Economic Times”, Wall Street Journal, January 27, 2010, available at: http://online.wsj.com/article/SB10001424052748703410004575028380283025678.html. SAVIGNY, FRIEDRICH CARL VON, SYSTEM DES HEUTIGEN RÖMISCHEN RECHTS 1 (1840). Schaffer-Goldman, Regina, Cease-and-Desist: Tarnishment's Blunt Sword in Its Battle Against the Unseemly, the Unwholesome, and the Unsavory, 20 FORDHAM INTELL. PROP. MEDIA & ENT. L.J. 1241 (2010). Schau H.J., & M.C. Gilly, We are what we post? Selfpresentation in personal web space, 30 J. CONS. RES. 385 (2003) SCHECHTER, FRANK I., THE HISTORICAL FOUNDATION OF THE LAW RELATING TO TRADEMARKS 1925 (The Lawbook Exchange, NJ, 2002 - reprint). Schechter, Frank I., 40 HARV. L. REV. 813 (1927). Schechter, Frank I., testimony: Hearings Before the House Committee on Patents, 72d Cong., 1st Sess. 15 (1932). Schellekens, Maurice, Liability of Internet Intermediaries: A Slippery Slope?, 8 SCRIPTED 154 (2011). Schlosser, Sarah Mayhew, The High Price of (Criticizing) Coffee: The Chilling Effect of the Federal Trademark Dilution Act on Corporate Parody, 43 ARIZ. L. REV. 931 (2001).

378 SCHNEIDER, BERNADETTE, DIE MARKENPARODIE IN DEUTSCHLAND (Peter Lang Internationaler Verlag der Wissenschaft, Cologne, University dissertation 2010). Schubert, Maximilian, “STYRIAGRA: Pfizer Getting Seriously “Excited” About The Sale Of Blue Coloured Pumpkin Seeds”, Austrotrabant, December 3, 2009, available at: http://austrotrabant.wordpress.com/2009/12/03/styriagra-pfizer-getting-seriously-excited-about-the-saleof-blue-coloured-pumpkin-seeds/, Schwerha IV, Joseph J., Law Enforcement Challenges in Transborder Acquisition of Electronic Evidence from “Cloud Computing Providers” Draft Discussion Paper, Council of Europe, January 15, 2010. Scott, Dominic, et al., Trade marks as property: a philosophical perspective, in TRADE MARKS AND BRANDS: AN INTERDISCIPLINARY CRITIQUE (L. Bently, J. Davis and J.C. Ginsburg, eds., 2008). Senftleben, Martin, Towards a Horizontal Standard for Limiting Intellectual Property Rights? WTO Panel Reports Shed Light on the Three-Step Test in Copyright Law and Related Tests in Patent and Trademark Law, 37 IRIPC 407 (2006). SHAKESPEARE, WILLIAM, THE TRAGEDY OF OTHELLO, THE MOOR OF VENICE (1603). Sharma, Prashant, “Core Characteristics of Web 2.0 Services”, TechPluto, November 28, 2008, available at: http://www.techpluto.com/web-20-services/. SHORT J., et al., THE SOCIAL PSYCHOLOGY OF TELECOMMUNICATIONS (Hoboken, NJ: John Wiley & Sons, Ltd., 1976). Shull, Michael C., Biting The Hand That Feeds: How Trademark Protection Might Threaten School Spirit, 21 MARQ. SPORTS L. REV. 641 (2011). Siebrasse, Norman, Comparative Advertising, Dilution: and the Meaning of Section 22 of the Trade-marks Act, available at http://www.law.unb.ca/Siebrasse/Download/Section22.pdf. Simon Fhima, Ilanah, How Does 'Essential Function' Doctrine Drive European Trade Mark Law? 36 INT’L REV. INTELL. PROP. & COMPETITION L. 401 (2005). Simon Fhima, Ilanah, Dilution by blurring – a conceptual roadmap, IPQ 44 (2010). SIMON FHIMA, ILANAH, TRADE MARK DILUTION IN EUROPE AND THE UNITED STATES, OUP, November 3, 2011. Singel, Ryan, “Kicking Square Pegs Out of Round Circles: Why Google’s Banishment of Companies from Google+ is a Bad Sign”, Wired, July 22, 2011, available at: http://www.wired.com/business/2011/07/companies-google-plus/. Singhal, Amit, “An update to our search algorithms”, Inside Search, The official Google Search blog, August 10, 2012, available at: http://insidesearch.blogspot.ca/2012/08/an-update-to-our-searchalgorithms.html?m=1. Smith, Ethan, “How Old Media Can Survive In a New World”, Wall Street Journal, May 23, 2005, available at: http://online.wsj.com/public/article/SB111643067458336994dZdpfVsBBc8Y17yRcFtFhF_8YWk_20060522.html?mod=blogs. Smith, Henry E., Intellectual Property as Property: Delineating Entitlements in Information, 116 YALE L.J. 1742 (2007).

379 Smith, Justin, “How Do You Treat A Fan Who Owns Your Facebook Page?”, Inside Facebook, March 18, 2009, available at: http://www.insidefacebook.com/2009/03/18/how-do-you-treat-a-fan-who-owns-yourfacebook-page/. SOLOVE, DANIEL, THE FUTURE OF REPUTATION, GOSSIP, RUMOR, AND PRIVACY ON THE INTERNET (Yale University Press 2007). Solove, Daniel, Speech, Privacy and Reputation on the Internet in THE OFFENSIVE INTERNET (Martha Nussbaum & Saul Levmore, eds., 2011). Spiesel, Christina, Responding to Rebecca Tushnet, Worth a Thousand Words: The Images of Copyright, 125 HARV. L. REV. 683 (2012). Sprigman, Christopher, Reform(aliz)ing Copyright, 57 STAN. L. REV. 485 (2004). Sprigman, Christopher Jon, et al., What’s a Name Worth?: Experimental Tests of the Value of Attribution in Intellectual Property. 93 B.U. L. REV. 1 (2012). Standfield, Alyson, “Social Media Is Only a Tool”, Artbizblog, February 23, 2011, available at: http://www.artbizblog.com/2011/02/social-media-is-a-tool.html. Stempel, Jonathan, “Google again beats Viacom in YouTube copyright case”, Reuters, April 18, 2013, available at: http://www.reuters.com/article/2013/04/18/entertainment-us-google-viacomidUSBRE93H17S20130418. Stern, Jared Paul, “The Brothel Prince & His Louis Vuitton Rolls-Royce”, Luxist, May 11, 2009, available at: http://www.luxist.com/2009/05/11/the-brothel-prince-and-his-louis-vuitton-rolls-royce/. Stigler, George J. The Economics of information, 69 J. POLIT. ECON. 213 (1961). STRAUSS, WILLIAM, THE MORAL RIGHT OF THE AUTHOR (1959) (Arthur Fisher ed., 1963). Streeter, Dan, Into Contract's Undiscovered Country: A Defense of Browse-Wrap Licenses, 39 SAN DIEGO L. REV. 1363 (2002). Strömholm, Stig, Droit Moral – The International and Comparative Scene from a Scandinavian Viewpoint, 14 INT’L REV. INDUS. PROP. & COPYRIGHT L. 1 (1983). Strong, Adam, “Social Media User Names Becoming More Like Domain Names”, Domain Name News, December 22, 2008, available at: http://www.domainnamenews.com/miscellaneous/social-media-usernames-becoming-more-like-domainnames/3556. Strowel, Alain & Nicolas Ide, Liability with Regard to Hyperlinks, 24 COLUM.-VLA J.L. & ARTS 403 (2001). Stuff.co.nz, “NZ teen’s Facebook threat sparks US alarm”, November 5, 2011, available at: http://www.stuff.co.nz/national/5914950/NZ-teens-Facebook-threat-sparks-US-alarm. Sundararajan, Arun, An Overview of Network Effects, NYU Stern School of Business, 2006, available at: http://oz.stern.nyu.edu/io/network.html. Sunderji, Fara S., Protecting Online Auction Sites from the Contributory Trademark Liability Storm: A Legislative Solution to the Tiffany Inc. v eBay Inc. Problem, 74 FORDHAM L. REV. 909 (2005). Sunstein, Cass R., Social Norms and Social Roles, 96 COLUM. L. REV. 903 (1996).

380 Tan, David, Beyond Trademark law: What the Right of Publicity Can learn from Cultural Studies 25 CARDOZO ARTS & ENT. L.J. 913 (2008). Tan, David, Affective Transfer & the Appropriation of Commercial Value: A Cultural Analysis of the Right of Publicity 9 VA. SPORTS & ENT. L.J. 272 (2010). Tan, David, The Business of Luxury Brands and Trademark Protection, Powerpoint presentation at NUS, (2011), available at: http://www.lawtech.hk/wp-content/uploads/2011/01/Presentation-powerpoint1.pdf. Tan, David, Goo Goo Gaga: The Chilling Effect of the Trade Mark Monster, 17 MALR 84 (2012). Tan, David, Lady Gaga and Popular Culture: Rethinking Personality Rights and Trademarks, presentation, University of Hong Kong, October 10, 2012, available at: http://www.lawtech.hk/wpcontent/uploads/2012/10/David-Tan-HKU-Oct-2012amend.pdf. Tang, Xiyin, The Artist as Brand : Toward a Trademark Conception of Moral Rights, 122 YALE L.J. 218 (2012). Taran, Jessica, Dilution by Tarnishment: A Case for Vulgar Humor, 7 INTELL. PROP. L. BULL. 1 (2002). The Seasteading Institute, undated, available at: http://www.seasteading.org/. The WELL – Learn About The WELL”, The Well, undated, available at: http://www.well.com/aboutwell.html. Top 10 Buzz, “Top 10 Controversial United Colors of Benetton Ads, Buzz!”, March 22, 2012, available at: http://top10buzz.com/top-ten-controversial-united-colors-of-benetton-ads/. Trademark Estate, 87 TMR 547 (1997). Tripartite Forum for Drawing up a Code of Practice for Online Service Providers in Protecting Copyright in the Digital Environment Analysis of Possible Cooperative Items, TF PAPER No. 5/2008 (2008), available at: http://www.inmediahk.net/files/t%20forum.pdf. Tushnet, Rebecca, Copy This Essay: How Fair Use Harms Free Speech and How Copying Serves It, 114 YALE L. J. 535 (2005). Tushnet, Rebecca, “keywords revisited: goods versus services”, Rebecca Tushnet’s 43(B)log, May 26, 2006, available at: http://tushnet.blogspot.hk/2006/05/keywords-revisited-goods-versus_26.html. Tushnet, Rebecca, Truth and Advertising: The Lanham Act and Commercial Speech Doctrine, 58 S.C. L. REV. 737 (2007). Tushnet, Rebecca, Worth a Thousand Words: The Images of Copyright Law, 125 HARV. L. REV. 683 (2012). Tushnet, Rebecca, Make Me Walk, Make Me Talk, Do Whatever You Please: Barbie and Exceptions, in INTELLECTUAL PROPERTY AT THE EDGE, (Rochelle Dreyfuss & Jane Ginsburg eds., forthcoming 2013). Urban, Jennifer M. & Laura Quilter, Efficient Process or Chilling Effects - Takedown Notices under Section 512 of the Digital Millennium Copyright Act, 22 SANTA CLARA COMPUTER & HIGH TECH. L.J. 621 (2005). VEBLEN, THORSTEIN, THE THEORY OF THE LEISURE CLASS: AN ECONOMIC STUDY OF INSTITUTIONS (A.M. Kelley 1975) (1899).

381 Verbiest, Thibault, et al., Study on the Liability of the Internet Intermediaries, Markt/2006/09/E, November 12, 2007. Voeten, Eric, “Similarities and Differences between Eastern Europe in 1989 and the Middle East in 2011. Summarized remarks from a panel discussion sponsored by Middle East Studies”, AM. U., May 30, 2011, available at: http://themonkeycage.org/blog/2011/05/30/similarities-and-differences-between-easterneurope-in-1989-and-the-middle-east-in-2011/. VOLTAIRE, ADRIEN JEAN QUENTIN BEUCHOT, PIERRE-AUGUSTE-MARIE MIGER “ŒUVRES DE VOLTAIRE, VOLUME 48” ( Lefèvre, 1832). Walden, Ian, Accessing Data in the Cloud: The Long Arm of the Law Enforcement Agent, QUEEN MARY SCHOOL OF LAW LEGAL STUDIES RESEARCH PAPER No. 74/2011. Wandtke, Artur-Axel, Zukunft des Urheberrechts und eine monistisch geprägte Urheberrechtskonzeption – Entwicklungslinien seit Josef Kohler, in FESTSCHRIFT 200 JAHRE JURISTISCHE FAKULTÄT DER HUMBOLDTUNIVERSITÄT ZU BERLIN: GESCHICHTE, GEGENWART UND ZUKUNFT (Stefan Grundmann et al., Walter de Gruyter, 2010). Warren, Samuel D.& Louis D. Brandeis, The Right to Privacy, 4 HARV. L. REV. 193 (1890). Warschauer, M., & T. Matuchniak, New Technology and Digital Worlds: Analyzing Evidence of Equity in Access, Use, and Outcomes, 34 REV. RES. EDU. 179 (2010). Watal, Aparna, FIFA World Cup 2010: An Analytical Study of the Effectiveness of South African Intellectual Property Regime to Combat Ambush Marketing and Counterfeiting (2010), available at: http://ssrn.com/abstract=1699722. Watters, Audrey, “How the Library of Congress is Building the Twitter Archive”, O’reilly Radar, June 2, 2011, available at: http://radar.oreilly.com/2011/06/library-of-congress-twitter-archive.html. WCBC, Charlotte New Caroline, available at: http://www.youtube.com/watch?v=OhBmWxQpedI. websites. WELKOWITZ, DAVID S., TRADEMARK DILUTION: FEDERAL, STATE, AND INTERNATIONAL LAW 117 (2002). WELLS, H.G., THE WORLD OF WILLIAM CLISSOLD, Vol. 1 (1926). Wheatley, Mike, “Google Wins ‘Ungoogleable’ Usage Fight In Sweden, But At What Cost To Its Brand?”, Silicon Angle, March 26, 2013, available at: http://siliconangle.com/blog/2013/03/26/google-winsungoogleable-usage-fight-in-sweden-but-at-what-cost-to-its-image/. WHEELER, ALINE, DESIGNING BRAND IDENTITY, (John Wiley & Sons, Inc., 2006). Whittaker, Zack, “Facebook hits 1 billion active user milestone”, CNET, October 4, 2012, available at: http://news.cnet.com/8301-1023_3-57525797-93/facebook-hits-1-billion-active-user-milestone/. Wilf, Steven, Who Authors Trademarks?, 17 CARDOZO ARTS & ENT. L.J. 4 (1999). WILKOF NEIL J.& DANIEL BURKITT, TRADE MARK LICENSING, (Second Edition, Sweet & Maxwell, 2005). Wilkof, Neil, “When Rodney Dangerfield Meets the Naked Trade Mark Licence”, The IPKat, January 3, 2011, available at: http://ipkitten.blogspot.com/2011/01/when-rodney-dangerfield-meets-naked.html. Winer, Dave, “Why Google cares if you use your real name”, Scripting News, July 25, 2011, available at: http://scripting.com/stories/2011/07/25/whyGoogleCaresIfYouUseYour.html.

382 Winner, Ellen P., Right of Identity: Right of Publicity and Protection for a Trademark’s ‘Persona’, 71 TRM 193 (1981). WIPO, Well-known marks, available at: http://www.wipo.int/sme/en/ip_business/marks/well_known_marks.htm. Wittermann, Andres, The global social media challenge: a social marketer’s guide to managing brands across borders, IPRA, April 10, 2013, available at: http://ipra.org/itl/04/2013/the-global-social-mediachallenge-a-social-marketer-s-guide-to-managing-brands-across-borders. Wu, Tim, Tolerated Use, 31 COLUM. J.L. & ARTS 617 (2008). Wyckoff, Andrew & Alessandra Colecchia, The Economic and Social Impact of Electronic Commerce, Preliminary Findings and Research Agenda, OECD, (1998). Yahoo! “Flickr – Advertising Solution”, Yahoo!. After June 2011, available at: http://advertising.yahoo.com/article/flickr.html. Yahoo! “Why did GeoCities close down, Yahoo!”, April 24, 2012, available at: http://help.yahoo.com/l/us/yahoo/geocities/close/close01.html;_ylt=ApHd2xR2VGNeoKi6ZFn.7QRWFHdG. Yen, Alfred C., Torts and the Construction of Inducement and Contributory Liability in Amazon and Visa, 32 COLUM. J. L. & ARTS 513 (2009). Yglesias, Matthew, “Louis Vuitton’s Campaign Against Free Speech”, Slate, March 9, 2012, available at: http://www.slate.com/blogs/moneybox/2012/03/09/louis_vuitton_s_campaign_against_free_speech.html. Yu, Peter K., The Graduated Response, 62 FLA. L. REV. 1373 (2010). Zaphiriou, George A., Unification and Harmonization of Law Relating to Global and Regional Trading, 14 N. ILL. U. L. REV. 407 (1994).