Wednesday, February 19, 2014

James Dean Rumbles With Twitter Over Alleged Trademark Infringement

A complaint, originally filed in an Indiana state court, was moved to federal court last week alleging that Twitter’s failure to terminate the @JamesDean handle and site violates various laws including, among other laws, right of publicity, trademark infringement and false endorsement under the Lanham Act.


Indiana, which is home to one of the most expansive right of publicity laws, is also home to CMG Worldwide, which manages the commercial estates and licensing rights of many deceased celebrities, including James Dean.  The complaint was brought by James Dean, Inc. against both Twitter and certain John Doe defendants who are the currently unidentified owners of the James Dean Twitter site.  According to the complaint, “On numerous occasions since October 11, 2012, CMG, by and on behalf of its client, JDI, has contacted TI [Twitter, Inc.] in an attempt to have the Unauthorized Use’…’ceased.” 

The complaint notes that JDI holds federally registered trademarks to the James Dean name and that both Twitter’s and Does’ conduct “is likely to cause confusion, to cause mistake, or to deceive as to source, sponsorship, connection, association or affiliation between CMG, JDI, and TI and Does.”  The JDI complaint also asserts both Indiana state statutory and common law right of publicity violations.  Among other remedies, the complaint seeks an injunction requiring Twitter to turn over the names of the site’s owners, which Twitter has so far refused to do.  Interestingly, in correspondence attached to the complaint, CMG in early correspondence with Twitter asserts that the @JamesDean site is in violation of Twitter’s own trademark policy and guidelines for “Fan Accounts,” writing “First, you state that ‘the username should not be the trademarked name of the subject of the news feed, commentary, or fan account. Here, the subject of the Twitter feed is James Dean, and the username @JamesDean consists solely of the trademarked name.  Second, you state that ‘[t]he profile name should not be the trademarked name of the company or include the trademarked name in a misleading manner.  The profile name for the account in question is listed as ‘James Dean.”  “Your third guideline states, “The bio should include a statement to distinguish it from the real company, such as ‘Unofficial Account,’ ‘Fan Account’ or ‘Not affiliated with…”.  The @JamesDean account’s bio contains none of these distinguishing statements.” 

A piece in the Hollywood Reporter notes, “Over the years there have been many disputes over Twitter handles, but not quite like this one.  The social media site has an “impersonation policy” that forbids accounts portraying another person in a confusing or deceptive manner as well as a trademark policy,” but apparently the service has drawn a line in the sand when it comes to dead celebrities.”

Friday, January 17, 2014

Tweet in NY Times Ad Ruffles Feathers

The BBC reports that a full page advertisement appearing in The New York Times, which included an actual tweet, raises copyright concerns regarding the reprinting of tweets for such purposes.

The ad was a promotion for the film, Inside Llewyn Davis and the tweet belonged to the New York Times’ very own film critic, A.O. Scott.  Scott, apparently a fan of the Inside Llewyn Davis soundtrack, tweeted, “You all keep fighting about Wolf of Wall St. and Am Hustle. I’m gonna listen to the Llewyn Davis album again.  Fare thee well, my honeys.”  Scott said the firm behind the full-page ad had originally sought his permission to use a portion of the tweet, which he denied stating that it was “a slippery slope and contrary to the ad hoc and informal nature of the medium.”  Regardless, the edited version of the tweet appeared in the ad.

Of interest here is the convergence of copyright, advertising and contract law.  Namely, Scott’s ownership of his tweet, the use of his tweet as an endorsement for a product and Twitter’s apparent prohibition against using tweets in ads without the user’s permission.  With respect to Twitter’s own rules, it states that one must get the user’s permission before, among other things, “creating an advertisement that implies the sponsorship or endorsement on behalf of the user.”


While it does not appear as though Scott will be taking any action other than registering his annoyance with the film promoter’s actions, the incident does serve as a reminder that, when using content found on social media, one must be careful to consider both the intellectual property rights of the creator as well as the terms and conditions of the social media site itself.

You can read A.O. Scott's piece on the episode here.

Thursday, January 9, 2014

LinkedIn Brings John Doe Claim Against Scrapers

LinkedIn has filed a lawsuit in the U.S. District Court for the Northern District of California claiming that bots have been used to impermissibly scrape data from the profiles of hundreds of thousands of users. Thousands of fake accounts were created with the objective of using the bots to collect information from the profiles of legitimate accounts. While LinkedIn claims to have traced the accounts to an Amazon Web Services account, the identity of the actual culprits is still undetermined leading the social media site to identify the defendants as “The Doe Defendants.”

“Bots” refers to automated software applications that execute tasks over the Internet.  “Scraping” refers to the extraction of information from websites and is often restricted by a site’s terms of use, including LinkedIn’s.

Three important issues tied to the scraping include (i) the mere fact that the information was collected by parties who have not signed on to LinkedIn’s terms and conditions, (ii) determining how the scraped information will ultimately be used; and (iii) the impact on the integrity of LinkedIn’s profiles if many are found to be fake.  Moreover, in an InformationWeek article, LinkedIn’s concern with the degrading of its LinkedIn Recruiter services is noted.

LinkedIn is currently seeking the names of the owners of the fake accounts from Amazon. 

Wednesday, December 18, 2013

Important Social Media Guidance Issued for Financial Institutions

The Federal Financial Institutions Examination Council (FFIEC) issued final supervisory guidance that financial institutions are expected to use in "their efforts to ensure that their policies and procedures provide oversight and controls commensurate with the risks posed by their involvement with social media."

The FFIEC is the formal inter-agency body empowered to prescribe uniform principles, standards, and report forms for the federal examination of financial institutions by, among others, the Federal Reserve System, the Federal Deposit Insurance Company (FDIC) and the Consumer Financial Protection Bureau (CFPB).  The memorandum issued by the Council, "Social Media: Consumer Compliance Risk Management Guidance,"  is meant to "address the applicability of federal consumer protection and compliance laws, regulations, and policies to activities conducted via  social media by banks, savings associations, and credit unions, as well as nonbank entities supervised" by the CFPB.  Compliance officers with financial institutions as well as other senior managers at such institutions would be well served to review the Council's Guidance not only pursuant to their own responsibilities and obligations as outlined in the memorandum, but also because the memorandum provides a brief, yet substantive, overview of a wide variety of laws applicable to the financial sector's use of social media.  The Guidance makes reference to, and provides relevant summaries of, a variety of laws including, but not limited to, the Truth in Savings Act, the Equal Credit Opportunity Act, the Truth in Lending Act and the Fair Debt Collection Practice Act.

The Guidance  states that a "financial institution should have a risk management program that allows it to measure, monitor, and control the risks related to social media."  It also specifies that the risk management program should provide guidance and training for employee official use of social media.  The components of the risk management program include, in brief, the following:

  • a governance structure with clear roles and responsibilities;
  • policies and procedures regarding the use and monitoring of social media and compliance with all applicable  consumer protection laws and regulations, and incorporation of guidance as appropriate;
  • a risk management process for selecting and managing third-party relationships in connection with social media;
  • an employee training program;
  • an oversight process for monitoring information posted to the financial institution's social media site;
  • audit and compliance functions to ensure ongoing compliance; and
  • parameters for providing appropriate reporting to the financial institution's directors and senior management  for periodic evaluation.
The Guidance points out that "Since this form of customer interaction tends to be both informal and dynamic, and may occur in a less secure environment, it can present some unique challenges to financial institutions."

Wednesday, December 4, 2013

Court Says Social Media Sites Off Limits to Sex Offenders

A New Jersey appellate court has upheld the state parole board’s restriction disallowing convicted sex offenders from accessing social media or other comparable web sites.


Superior Court Judge,  Jack Sabatino, writing for the three judge panel, said, “we are satisfied that the Internet restrictions adopted here by the Parole Board have been constitutionally tailored to attempt to strike a fair balance.”  Judge Sabatino continued, “We recognize that websites such as Facebook and LinkedIn have developed a variety of uses apart from interactive communications with third parties.  Even so, the Parole Board has reasonably attempted to draw the line of permitted access in a fair manner that balances the important public safety interests at stake with the offenders’ interests in free expression and association.”

The defendants, several convicted sexual offenders whose cases were consolidated, challenged the constitutionality of the restrictions as infringing their First Amendment rights of free speech and association, a violation of their Due Process rights and  corresponding rights under New Jersey’s Constitution.  The restrictions stem from Megan’s Law, which is a series of laws, originally passed in New Jersey, aimed at sex offenders.  One component of Megan’s law includes a requirement that those persons convicted between 1994 and 2004 of certain sexual offenses must serve, in addition to any existing sentence, a special sentence of  “community supervision for life,” and those convicted after that date range are sentenced to “parole supervision for life.”

The New Jersey Parole Board’s restriction does provide for parolees to seek special permission for gaining access to certain sites for work or another “reasonable purpose.”  The state’s Deputy Attorney General said, “It is not the Parole Board’s intention that these provisions bar appellants from having Internet access to news, entertainment, and commercial transactions.”

The New Jersey restriction is hardly novel as these cases have been sprouting up throughout the nation with varied outcomes.  You can read the full opinion here.  

Thursday, November 21, 2013

Law Enforcement and the Social Media Stakeout

Law enforcement techniques that were previously used by only federal agencies are becoming more readily accessible to law enforcement at the local level.

Police sitting in a car, with a cup of coffee in hand, waiting for something to "go down" at the building across the street is a scene we have all watched countless times in movies over the years.  While possibly not as dramatic for cinematic purposes, today police are able participate in big data stakeouts from their own desks.  At a meeting last month for the International Chiefs of Police (IACP), a cloud based service was unveiled that will allow local law enforcement to monitor social networks for evidence and clues of crimes committed in the brick and mortar world.

A piece in ArsTechnica noted that a poll of 1,200 law enforcement officers, as conducted by LexisNexis, found that four out of five officers are now using social media as part of their investigations.  New SaaS programs allow police to aggregate information culled from social media sources and then link to databases with public records to enable law enforcement to cross reference the information gathered.  The article also noted that one of the services providing this type of assistance will even "monitor the general mood of postings and pick up potential threats of violence."

While police have been using social media for some time as an aid to investigations, new technology and services are providing them with more elaborate tools to assist them with their online efforts.

Wednesday, November 13, 2013

Creating Fake Profile of Your Competitor on LinkedIn…Bad Idea

If you think making bad choices on social media is limited to high school students and politicians, you should take a look at AvePoint, Inc. and AvePoint Public Sector, Inc. v. Power Tools, Inc. d/b/a Axceler and Michael X. Burns.

In this Virginia, District Court case, the court refused to dismiss most counts in the complaint brought by AvePoint, Inc. against its software competitor, Axceler.  The complaint alleges that Axceler and its agents made false, defamatory, and deceptive claims and statements regarding Avepoint through both Twitter and LinkedIn, as well as through direct communications with customers and prospective customers.  Specifically, the allegations against Axceler state that the company attempted to confuse customers into falsely believing that (i) AvePoint is a Chinese company, not an American company, (ii)  AvePoint’s software is not made, developed or supported in the U.S., (iii) AvePoint’s software is maintained in India, (iv) that Axceler’s ControlPoint software is “Microsoft recommended” over AvePoint’s DocAve software, (v) AvePoint’s customers are “dumping out of 3 year deals in year 2 to buy Axceler’s ControlPoint, and (vi) Axceler uses its maintenance revenue to improve its customers’ existing products, whereas AvePoint uses its maintenance revenue to develop new products to which its customers have no access.

If all of the allegations are true, it appears the defendant went to remarkable lengths to execute its campaign against the plaintiff.  The complaint alleges that the defendant created an account on LinkedIn for a fictitious AvePoint representative named Jim Chung and, in connection with the account, used the plaintiff’s registered trademark.  Emphasizing the confusion caused by the defendant’s actions, the plaintiff noted Jim Chung’s LinkedIn connection list.  Further, taking full advantage of the opportunities afforded by social media, the defendant’s Regional Vice President of Sales for Western North America, while at the SharePoint conference in Las Vegas, tweeted in regard to the fictitious AvePoint representative, “Just ran into jim chung from avePoint Good guy.” To add further credibility to Jim Chung’s existence, another Axceler employee tweeted, “@MICHAELBURNS Free Jimmy! #Axceler.”

The District Court refused Axceler’s request to dismiss most of the nine counts set out in AvePoint’s complaint.  The counts the court refused to dismiss included defamation, breach of contract (defendant also allegedly acquired trial software from the plaintiff through deceptive means), trademark infringement, false association or false endorsement under the Lanham Act, False Advertisement under the Lanham Act and certain violations of Virginia law.

The court’s full opinion is available here