The internet and social media have allowed people, businesses, and brands to communicate and interact more than ever before. As much benefit as that brings, it also brings significant risks to the reputation of both people and brands. The internet allows people to post using a pseudonym, or to appropriate someone else’s name. The appropriated name could be that of a prominent individual or (“public figure”), but online “persona hijacking” can affect anyone.

Generally, the motive of most persona hijacking is profit or fraud. Someone may appropriate the name or likeness of a famous person to profit from public goodwill towards that person. It could include setting up social media accounts, e-mail addresses, or websites using the person’s name, or some other effort to spoof the person’s identity. For a person who is not famous, persona hijacking may serve a function much like identity theft, using that person’s credentials to obtain, for example, fraudulent credit.

In some cases, the purpose of persona hijacking is to submit a person’s name to criticism or parody. The line between legitimate commentary and unlawful harassment, however, can be very fine, and parody can easily become a “false light” portrayal of a person. Use of a person’s name or likeness for the purpose of criticism or parody may, in certain limited circumstances, be protected by the First Amendment. In other cases, it may constitute unlawful infringement of a person’s trademark rights or right of publicity.

A person who uses their own name in commerce, usually someone prominent in business or entertainment, may obtain trademark protection. This generally prohibits others from using the name commercially. For most people, the right of publicity prohibits use of their name or likeness without their consent, especially for commercial purposes. The Fair Use doctrine, however, may allow use of a name or likeness for legitimate criticism or parody, where it is clear that the work is not originating from the person being appropriated.

You can take several steps to protect yourself from online persona hijacking:

Continue Reading ›

We have submitted a petition to ask Congress to review and modify section 230 of the Communications Decency Act in order to limit the protection granted to interactive online services, such as news websites, blogs, forums, and listservs. Also, Congress should set new policies and procedures for interactive online services to confirm the true identity of their users and members. This confirmation of a user’s or member’s true identity promotes protection against bogus statements made against innocent individuals and prevents the victimization of businesses.

This petition should be signed because consumers and businesses are facing various problems such as defamation, harassment, or retaliation by anonymous users on interactive online services without recourse and protection. Unfortunately, section 230 of the Communications Decency Act grants broad immunity to interactive online services. By doing so, such immunity tilts the scale of justice and creates an unreasonable result for innocent individuals who are being targeted by anonymous users and have no remedy for protection.

Please visit this link, review and sign it if you are willing to support our request for change in legislation.

In general, small businesses are often a labor of love for their owners. They require a massive commitment of time and energy to build, nurture, and grow, but along the way, small businesses can get caught in a wide variety of legal quagmires. Understanding these risks, and knowing how to prepare for and mitigate them, is key to avoiding time- and resource-consuming legal disputes that can hinder or even ruin a business. Legal risks of small businesses could fit into seven very broad categories:

1. Maintaining a Safe and Secure Premises: Brick and mortar businesses may encounter claims from customers or others injured by an unsafe condition on business property, such as a broken step or a spilled substance on the ground. Regular maintenance of the premises, along with liability insurance, can mitigate this risk.

2. Consumer Complaints: Businesses that do not promptly respond to customer complaints about products or services may encounter legal claims. Customers should receive prompt responses to reasonable complaints or concerns.  All advertising and marketing materials must accurately portray the company’s products or services in order to avoid deceptive trade practice claims.  Robust quality control may help a business avoid putting faulty or defective products into the marketplace. This can help companies avoid product liability claims.

California entrepreneurs should carefully consider the structure of their new business. There are many ways to organize a business, and their suitability depends on factors like the nature of the business, the number of owners and investors, and even the personalities of the principals. We will examine four business structures and discuss their advantages and the differences: DBA’s (for “doing business as”), C corporations, S corporations, and limited liability companies (LLC). Three major factors come into play in evaluating these business structures: the taxation of income, the liability of the owners for business debts, and the desired level of formality versus flexibility in running the business.

DBA (“Doing Business As”)

A DBA, also known as an assumed business name or a sole proprietorship, is the simplest business organization, because there is no organization. It is simply a business name used by an individual to transact business. The owner pays taxes on business income with a Schedule C attached to a federal income tax return. A major pitfall of a DBA is that it provides no liability protection for the owner whatsoever, since the business is not a separate legal entity. In terms of flexibility, any recordkeeping requirements would depend on the nature of the business. Any requirements imposed on DBA’s in general are minimal.

C Corporation

A C corporation, named for the subchapter in the Internal Revenue Code governing corporate taxation, is a very common business structure, providing a high level of liability protection for its owners. Owners in a corporation are called shareholders, and they are usually not liable for the business’ debts. Income in a C corp is subject to “double taxation,” meaning that the business entity pays income tax on its revenue, and then shareholders pay income tax on dividends distributed to them by the company. The C corp requires a high degree of formality, with regular shareholder and director meetings, minutes, and annual financial reports required by law.

Continue Reading ›

Copyright law, which protects a person’s rights to his or her own creative works, dates back nearly to the invention of the printing press. It protects a creator’s ownership of a creative work and the rights to use the work publicly. It also gives a creator remedies against anyone who infringes those rights. Where trademark law protects brand names, logos, and other “marks” representing a product or service, copyright law protects creative works like novels, songs, photographs, designs, or software. Computer technology, particularly the internet, has made copyright infringement quite easy and created new challenges for copyright owners.

Nearly any original creative work has copyright protection. Online, this can include graphics and designs, text, photo or video files, music, or code. A website created for a business most likely contains content subject to the protections of U.S. copyright laws. Technically speaking, copyright protection applies the moment a work is created in a physical form, which includes creation as a digital file. While copyright laws apply to a work upon its creation, enforcement is very difficult unless the creator takes additional steps to document the work’s creation and ownership with the government.

The U.S. Copyright Office allows copyright owners to formally register their works in a central location. Registration may deter others from infringing on a work, and it allows a copyright owner to effectively defend a work through the litigation process. Evidence of registration with the Copyright Office serves as prima facie evidence of ownership in a legal dispute. Most importantly, registering a work in a timely manner allows the owner to claim statutory damages in an infringement suit. Courts can award damages of up to $150,000 per act of intentional infringement, but only if the copyright owner follows the registration procedures.

Continue Reading ›

Advertising that a product is “made in America” or “made in the U.S.A.” is a very effective sales strategy, according to recent polls. An Adweek Media/Harris Poll conducted in July 2010 found substantial support for domestic-made products, with sixty-one percent of nationwide respondents saying they would be more likely to purchase a product labelled “made in the U.S.A.” Only three percent said they would be less likely to buy something. In California and the rest of the West Coast, about fifty-seven percent said they would be more likely to buy “Made in the U.S.A.” products.

Because labelling or claiming a product as “Made in the U.S.A.” makes a statement about the product’s origin or quality, the Federal Trade Commission (FTC) views it as a form of advertising. It is therefore subject to deceptive trade practice regulations. Labelling can be express, meaning an actual label appears on the product, or implied, meaning that the product’s marketing states or strongly implies U.S. origin. The rules apply not only to product labels, but to any marketing activity, such as print, television, or internet advertising.

The FTC’s rules can be complex and cumbersome, but every California business that wants to use the label needs to understand their responsibilities. Businesses that make unqualified claims that a product is “made in the U.S.A.” could face legal consequences if their claim is false or unsupportable. The federal Lanham Act allows anyone damaged by a false or misleading claim of a product’s origin, such as a competitor, to sue for damages.

Continue Reading ›

Companies cannot survive, let alone thrive, in today’s business environment without an Internet presence. Businesses and brands maintain websites and social media profiles in order to advertise and market products and services, but also to interact with customers. Social media in particular has given businesses an unprecedented ability to reach out to customers and to respond to their concerns. With this ability, however, comes the risk that unauthorized third parties will register an Internet domain with a company’s or brand’s name, or a deceptively similar name, and create a misleading or even harmful website. The practice of registering an Internet domain using the name of a trademarked brand is often known as “cyber-squatting.” Businesses and people who are the victim of cyber-squatting have remedies through a process established by several organizations that oversee and regulate Internet domain names.

The Internet Corporation for Assigned Names and Numbers (ICANN) is a private nonprofit corporation based in Los Angeles, California. It represents a collaboration between government agencies and several private organizations. ICANN has final responsibility for assignment of domain names, IP addresses, and other identifying information used by machines on the Internet.

In order to effectively handle disputes or complaints relating to domain name registrations, ICANN enacted the Uniform Domain Name Dispute Resolution Policy (UDRP). Anyone who owns or registers a domain name with a “.com,” “.org,” or “.net” top-level domain has agreed to abide by the terms of the UDRP by virtue of their agreement with their domain name registrar.

Continue Reading ›

U.S. News recently reported that since mid-2010 over 220,000 individuals have been sued in mass copyright lawsuits regarding the sharing of files over bittorrent. However, with the growth of these types of lawsuits, courts are concerned because of the possibility that subpoenas to obtain internet subscriber information may bring in innocent parties in litigation and improper joinder of parties.

Generally, Bittorrent is a peer-to-peer internet file-sharing protocol that allows a “swarm” of users to download and upload content from each other simultaneously. A user who supplies an entire copy of a file is called a “seeder,” while users in the process of downloading a file who have not yet completed their downloads are called “peers.” Peers download portions of the file at random, and upload those portions to other members of the swarm. Peers do not choose which pieces are downloaded and they do not choose who to share those portions with. Nevertheless, a peer is able to see the IP addresses of the other swarm members. Accordingly, it is possible for a copyright owner to join a swarm and obtain the IP addresses of the users sharing a given file.

It seems that bittorrent litigation will not be slowing down. Thus, courts are now more resistant to mass-joinder cases clogging up their dockets especially when the plaintiffs have no intention of litigation, but rather are merely seeking identifying information and authorization to pursue discovery in the interest of gaining settlement leverage. As more defendants file motions to quash suggesting that that they did not participate in the alleged activity, courts are also becoming sensitive to the idea that IP addresses may not be as likely to identify defendants as previously suspected. Plaintiffs, on the other hand, continue to refine their practices and theories of liability. See Liberty Media Holdings LLC v. Hawaii Members of Swarm…, Case No. 11-CV-00262-DAE-RLP, (Jan. 30, 2012 Order, denying motion to dismiss as to direct and indirect infringement and civil conspiracy, but dismissing allegation that failure to secure WiFi amounts to actionable negligence).

As some of readers, who have active facebook profiles know, the like button is a way to express your support for a cause or idea. However, a federal judge states that, clicking it doeos not constitute constitutionally protected speech.

For example, the employees of a local police department sued their boss (Sheriff B.J. Roberts) for firing them after they supported his opponent in his 2009 re-election campaign. One of those workers, Daniel Ray Carter, had “liked” the Facebook page of Roberts’ opponent, Jim Adams. Exactly what a “like” means – if anything is the main question. The ex-employees posit that their First Amendment rights were violated.

While public employees are allowed to speak as citizens on matters of public concern, the United States District Judge, the Honorable Raymond Jackson, ruled that clicking the “like” button does not amount to expressive speech. Express conduct, also referred to as “symbolic speech,” relates to the communication of ideas through one’s conduct. Expressive conduct raises some interesting constitutional questions because it combines expression, which typically receives First Amendment protection, and conduct, which typically does not receive First Amendment protection. This dualistic nature may account for the court’s position of affording expressive conduct some constitutional protection, but substantially less protection than pure speech.

What is personal jurisdiction? It is the court’s authority to determine a claim affecting a specific person. Generally, providing any type of data or information on the world-wide-web (i.e., Internet) is insufficient to subject a person to personal jurisdiction in each state wherein the date or information is accessed. However, a nonresident’s online activity, must be expressly targeted at, or directed to, the forum state in order to establish minimum contacts necessary to support the exercise of personal jurisdiction. In general, personal jurisdiction may not be exercised against a nonresident whose website was not directed toward any state.

If a non-resident defendant publishes statements that fall under the category of defamatory comments concerning the plaintiff on a website, the effects of which were clearly directed at the forum state, result in sufficient contact with the forum to warrant the assertion of jurisdiction over the nonresident defendant. On the other hand, the publication of defamatory comments concerning the plaintiff on a website is not, by itself enough to support the exercise of jurisdiction over a nonresident defendant (e.g., when an article was not specifically directed to residents in the forum state, or was not primarily directed at the plaintiff in that state).

Our readers must keep in mind that the tort of defamation can be committed in the jurisdiction (i.e., the state), even if the message was not directed there, if it has effects in that state.