Rosa Parks Name and Likeness Free for Use?

Rosa and Raymond Parks Institute for Self Development v. Target Corp.

Addressing the balance between privacy rights and matters of public interest, the U.S. Court of Appeals for the Eleventh Circuit affirmed the district court’s dismissal of the plaintiff’s complaint, holding that the defendant was shielded by the First Amendment from a lawsuit claiming the retailer violated the publicity rights of civil rights icon Rosa Parks by selling various products that included the plaintiff’s picture.Rosa and Raymond Parks Institute for Self Development v. Target Corp., Case No. 15-10880 (11th Cir., Jan. 4, 2016) (Rosenbaum, J.).

Target Corporation (the defendant), a national retail chain, sold books, a movie and a plaque that included pictures of Rosa Parks, an icon of the civil rights movement who, in 1955, refused to surrender her seat to a white passenger on a racially segregated Montgomery, Alabama bus. The Rosa and Raymond Parks Institute for Self Development (the plaintiff) owns the right and likeness of Rosa Parks. The plaintiff filed a complaint against the defendant, alleging unjust enrichment, right of publicity and misappropriation under Michigan common law for the defendant’s sales of all items using the name and likeness of Rosa Parks. The plaintiff complained that by selling the products, the defendant had unfairly and without the plaintiff’s prior knowledge, or consent, used Rosa Parks’ name, likeness and image as used on the products. The plaintiff further argued that the defendant promoted and sold the products using Rosa Parks’ name, likeness and image for the defendant’s own commercial advantage. After the defendant filed a motion for summary judgment, the district court dismissed the complaint. The plaintiff appealed.

On appeal, the 11th Circuit, sitting in diversity, applied Alabama’s choice-of-law rules, which holds that the procedural law of the forum state should be applied, while the law of the state in which the injury occurred governs the substantive rights of the case. Accordingly, the 11th Circuit applied the procedural rules of Alabama and the substantive law of Michigan.

In Michigan, the common-law right of privacy protects against four types of invasions of privacy: intrusion upon the plaintiff’s seclusion or solitude, or into his private affairs; public disclosure of embarrassing private facts about the plaintiff; publicity which places the plaintiff in a false light in the public eye; and appropriation for the defendant’s advantage, of the plaintiff’s name or likeness. The right of privacy is not absolute, and Michigan courts have long recognized that individual rights must yield to the qualified privilege to communicate on matters of public interest.

Applying Michigan law, the Court affirmed the district court’s dismissal of the plaintiff’s complaint, concluding that “the use of Rosa Parks’ name and likeness in the books, movie, and plaque is necessary to chronicling and discussing the history of the Civil Rights Movement” and that these matters therefore are protected by Michigan’s qualified privilege. As the 11th Circuit noted, “it is difficult to conceive if a discussion of the Civil Rights Movement without reference to Rosa Parks and her role in it.”

© 2016 McDermott Will & Emery

February 2016 – gTLD Sunrise Periods Now Open

As first reported in our December 2013 newsletter, the first new generic top-level domains (gTLDs, the group of letters after the “dot” in a domain name) have launched their “Sunrise” registration periods.

As of December 31, Sunrise periods are open for the following new gTLDs:

  • .YACHTS
  • .BOATS
  • .xn--tckwe (.コム – Japanese for “.com”)
  • .HOTELES
  • .BET
  • .BIBLE
  • .barcelona
  • .PET
  • .istanbul
  • .ist

ICANN maintains an up-to-date list of all open Sunrise periods here. This list also provides the closing date of the Sunrise period. We will endeavor to provide information regarding new gTLD launches via this monthly newsletter, but please refer to the list on ICANN’s website for the most up-to-date information – as the list of approved/launched domains can change daily.

Because new gTLD options will be coming on the market over the next year, brand owners should review the list of new gTLDs to identify those that are of interest.

© 2016 Sterne Kessler

Criminal or Civil Liability for Sharing Streaming Accounts?

We are at the beginning of a new era of media consumption.  Traditional content delivery systems such as satellite and cable television are hemorrhaging customers to a wave of “cord cutting” that has been facilitated by the availability of streaming services such as Hulu Plus, Netflix and HBO Go.[1]  Now that smart televisions are becoming more common place, cord cutting is no longer limited to the technologically hip youth, as accessing a Netflix account is as easy as changing the channel.

1-26-2016 3-38-45 PMBut with the proliferation of streaming services, users have elected to share the benefits of the accounts―i.e. their passwords―with others.  A staggering 46% of accountholders admit to sharing their streaming account password with people outside of their household.[2]  This raises some interesting questions of federal and state criminal, tort and contract laws.  What sort of liability might someone have for sharing their account with friends or family?  For using a shared account of a friend?

But in order to figure out if sharing of passwords violates the law, we first have to see if it violates the streaming service’s terms of service.

Netflix

Netflix is arguably the pioneer in password sharing.  For years Netflix has allowed multiple user profiles to better enable its suggestion algorithm to tailor its offerings to a targeted user.  By tactical use of user profiles, parents can limit the likelihood that Netflix will suggest the latest episode of Barney and Friends based on their child’s viewing of Teletubbies the week before.[3]  Netflix has also long offered the ability to stream its services on a limited number of devices simultaneously. [4]  Netflix’s commitment to account sharing was recently echoed by its CEO Reed Hastings who stated:  “As kids move on in their life, they like to have control of their life, and as they have an income, we see them separately subscribe. It really hasn’t been a problem.”[5]  But Netflix’s position on non-family members sharing the passwords has been a little more vague.

Hulu Plus

Hulu has not taken the vocal stance on account sharing that Netflix has.  Though it is apparent that Hulu has at least contemplated password sharing to some degree.  In section 5 of its terms of use, Hulu acknowledges that people within the same household are likely to use the account, and holds the primary account holder accountable  for their activities:  “You are responsible for all use of your account, including use of your account by other members of your household. By allowing others to access your account, you agree to be responsible for ensuring that they comply with these Terms and you agree to be responsible for their activity using the Services.”[6]  However unlike Netflix, Hulu Plus accounts are limited to streaming on one device at a time, which minimizes the advantage of sharing.

HBO Go

Like Netflix, HBO Go specifically contemplates the idea of multiple users within the same household.  HBO has two tiers of accounts.  The first is a “Registered Account” which consists of account holders who meet certain eligibility criteria, namely, they subscribe to HBO and HBO On Demand or Cinemax and Cinemax on Demand.[7]  These Registered Account holders can create “Household Member Accounts” for members of their household.  The Register Account serves as the master account for the Household Member Accounts and can control what content the junior accounts have access to.  However, despite the ability to create Household Member Accounts, HBO Go appears to take an antagonistic view of sharing the master account password itself.  HBO Go’s terms of service specifically state that “You are responsible for all activity occurring under your Registered Account and any Subaccount authorized by you, including maintaining the confidentiality of each Username and Password, and you agree that any household member account users authorized by you will not permit the disclosure of any Username and Password to any person.”   Contrast the above statements to Hulu’s request to “Please keep your password confidential,” and it is apparent that one is an order, and the other a request.

But statements by HBO’s CEO bely the strict terms of their agreement. In an interview with Buzzfeed, HBO’s CEO stated:  “It’s not that we’re ignoring it, and we’re looking at different ways to affect password sharing. I’m simply telling you: it’s not a fundamental problem, and the externality of it is that it presents the brand to more and more people, and gives them an opportunity hopefully to become addicted to it. What we’re in the business of doing is building addicts, of building video addicts. The way we do that is by exposing our product, our brand, our shows, to more and more people.”[8]

So HBO intends on building a legion of addicts, and with shows like Game of Thrones, they are well on their way to being the Pablo Escobar of digital content.  But like any drug dealer, the first sample is free, but the second is going to cost you.  No one knows for sure when HBO will start demanding money for that next “hit.”

It is apparent that these three streaming services all authorize sharing of an account among members of a household. A reasonable argument could be made that this extends to college age children who are away from the home during the school year, but whose primary residence is still their family home.

But what about sharing the account with third parties?  What liability might an individual incur if they use a friend’s account with the friend’s permission?  Arguably such activity goes beyond the terms of service of a user’s account, and presents some interesting questions of both state and federal law.

Trouble in Tennessee

In 2011, Tennessee, the home of Nashville and the birthplace of country music, became one of the first states to formally criminalize user account sharing.  HB1783, effective July 1, 2011, modifies Tennessee Code Annotated Section 39-11-106 subdivision 35 by adding “entertainment subscription service” to the list of services protected by its theft of services offence.[9]   Section 39-14-104 defines theft of services as any person who: “(1) intentionally obtains services by deception, fraud, coercion, false pretense or any other means to avoid payment for the service; (2) having control over the disposition of services to others, knowingly diverts those services to the person’s own benefit or to the benefit of another not entitled thereto.”  The punishment for violation of this provision ranges from a misdemeanor to a felony depending on the value of the services rendered.

The first provision of 39-14-104 targets the friend who is using the primary account holder’s password without permission from the streaming service.  The person has “obtain[ed] services by . . . any other means to avoid payment for the service.”  The second provision targets the account holder who has shared his password with a friend.  That person has control of a subscription service and diverts it to his friend, who is not entitled to the service.

California is Not the Golden State For Sharing

It is unsurprising that California would not take kindly to people sharing the fruits of its most visible industry.  California Penal Code Section 502 is an “anti-hacking” statute that covers a broad variety of activities.  To the extent that sharing a primary accountholder’s password with people outside of the household is beyond the scope of the terms of use of the streaming service, there are several provisions of Section 502 that would criminalize such activity (along with giving a private cause of action), including subsections: (1) “knowingly accesses and without permission  . . . otherwise uses any data in order to . . . wrongfully control or obtain . . . data;” (3) “knowingly and without permission uses or causes to be used computer services;” (6) “knowingly and without permission provides or assists in providing a means of accessing a computer, computer system, or computer network in violation of this section;”  and (7) “knowingly and without permission accesses or causes to be accessed any computer, computer system or computer network.”  Violation of these sections can range from a misdemeanor to a felony.

Like the Tennessee law, sections 1, 3 and 7 apply to the friend who is using the account without permission of the streaming service.  Section 6 applies to the account holder who is sharing the account with a friend without the permission of the streaming service.

It Might Be A Federal Offense

The Computer Fraud and Abuse Act offers broad protection against unauthorized access to computers.  It has been amended a half dozen times in its nearly 20 year history, and likely covers password sharing that is beyond the scope of the terms of service of a streaming account.

18 U.S.C. § 1030(a)(2) makes it a crime to “intentionally access a computer without authorization or exceeds authorized access, and thereby obtains . . . (c) information from any protected computer.”  A “protected computer” is defined by 18 U.S.C. § 1030(e)(2) as any computer “which is used in or affecting interstate or foreign commerce or communication.”  A streaming service’s streaming servers undoubtedly qualify as a protected computer under the Act as they stream their stored media all across the country.

Using a third party’s password to access a streaming service clearly “exceeds authorized access” as it is beyond the scope of the access defined in Netflix, Hulu Plus, or HBO Go’s terms of use.  The user of the password is “obtaining information”―the streamed media―from the protected computer.

An interesting wrinkle is that the Act arguably has a jurisdictional requirement of $5,000 in damages over the course of one year.  18 U.S.C. § 1030(c)(4).   This would probably be hard for a streaming site to demonstrate, especially against an individual who is making use of a friend’s password.  However, it would be easier to meet the limit for the primary account holder who decided to share the account with a group of friends.  All it takes is sharing a $20 dollar a month account with 21 people to meet the $5,000 threshold.

So what does all of this mean?  Sharing an account with members of a household is just fine under Netflix, Hulu Plus, and HBO Go’s terms of use.  Arguably this extends to children of the account holder who are away at school but whose primary residence is still the family home.

But sharing the password with people outside of the household or using someone else’s account opens up the potential for liability.  Not only does sharing a password expose the primary account holder to the possibility of a claim of breach of contract, it also gives rise to various causes of action under both state and federal law for everyone involved.

At the moment none of the sharing services seem to care all that much, and it would be easy for them to mitigate their exposure to shared accounts by simply limiting the number of devices that the account can be used on simultaneously.  Some seem to view account sharing as a marketing tool.  But all that may change without notice.  Sharer beware.

© 2016 Proskauer Rose LLP.


[1] Todd Spangler, Cord-Cutting Gets Ugly: U.S. Pay-TV Sector Drops 566,000 Customers in Q2, Variety (August 8, 2015).

[2] Is it Okay to Share Log-Ins for Amazon Prime, HBO Go, Hulu Plus, or Netflix?, Consumerreports.org (Jan. 28, 2015).

[3] Netflix User Profiles, Netflix (Jan 14, 2016) https://help.netflix.com/en/node/10421.

[4] Terms of Use, Netflix (Jan 14, 2016) https://help.netflix.com/legal/termsofuse.

[5] Sarah Perez, Netflix CEO Says Account Sharing is OK, TechCrunch (Jan 11, 2016),

[6] Terms of Use, Hulu (Jan 14, 2016), http://www.hulu.com/terms

[7] Terms of Use, HBO Go (Jan. 14, 2016), http://www.hbogo.com/#terms/

[8] Greg Kumparak, HBO Doesnt Care if You Share Your HBO Go Acccount . . . For Now, TechCrunch (Jan 20, 2014),

[9] http://www.capitol.tn.gov/Bills/107/Bill/HB1783.pdf

Amazon to Control Delivery by Drone?

People are talking about and news organizations are covering Amazon’s announced plans to deliver goods by drone in the not-too-distant future.  However, fewer are talking about or covering Amazon’s effort to be the only company that can autonomously deliver goods by drone.  On March 25, 2014, Amazon filed a United States patent application directed to aspects of a drone delivery system.  Pursuant to current patent law, the application was published on October 1, 2015, roughly 18 months after the application was filed.  While the application is still pending and not yet an issued patent, it provides an interesting look at the scope of protection Amazon is seeking for its drone delivery system.

Under current proposed FAA regulations, drones cannot be flown outside of the line of sight of the operator.  A much greater range will be needed for an effective drone delivery network.  Amazon is proposing to send its drones as far as 15 miles from a regional fulfillment center.  The drones would take off vertically from a warehouse floor, fly at low altitude over a suburban landscape and then descend into the backyards of their destination points.  There they would lay the package on the lawn before lifting off to return to the warehouse for another run.  The success of such a system will depend upon receiving FAA approval.  FAA approval of such a system is likely to be contingent upon demonstrating that the system can be operated without causing a hazard.  In other words, the drones will need to be equipped  with “sense and avoid” technology that prevents them from crashing into things.

Amazon’s pending patent application, Pub. No. US 2015/0277440 A1, contains claims that are broadly directed to a propeller driven automated mobile vehicle having a laser based rangefinder configured to determine a distance to an object, to a distance determining system for an automated mobile vehicle having a distance determining element positioned to emit a laser signal that reflects off a reflective exterior surface of a motor, and to an automated mobile vehicle having a plurality of motors where the alignment axis of at least two of the motors are not parallel and each motor has a distance determining element.  These claims have not yet been examined by the Patent Office.  Upon examination, the scope of the claims will likely have to be narrowed to distinguish them from prior art.  However, it seems clear that Amazon is interested in pursuing broad protection for “drones” having a distance determining element, which is likely to be a necessary component of any “sense and avoid” technology.  Thus, the potential exists that Amazon will obtain patent protection broadly covering drone delivery systems.

The way the Amazon patent application is written, it seeks to avoid the need for human involvement to ensure that vehicles do not collide with other drones, manned aircraft, or other objects or structures on the ground.  It also discusses a system for automatically sensing and avoiding objects.  Thus, the “automated mobile vehicles” of the application and recited in the claims appear to be directed to autonomous drones.  However, at this stage it is not yet clear whether the claims in any patent that issues will be limited to autonomous drones, but might also cover remotely-piloted drones.  It remains to be seen whether the examination process will push Amazon into limiting the claims to autonomous operation.

The Amazon patent application also discusses the distance determining elements being used to detect the presence of objects and to then cause the automated mobile vehicle to alter its path to avoid the object.  Thus, the distance determining elements seem to be used not only for unloading positioning, but also for sense and avoid in flight.  While in a remotely piloted context, a sense and avoid system may not need to actually determine distances to other objects.  The remote pilot could rely on visual displays of the surrounding environment of the drone to avoid collisions.  However, in an autonomous operation, it is difficult to envision any sense and avoid system that would not need to know at least the distance from the drone to surrounding objects to function.  Amazon appears to be using this need to know such distances in the autonomous context to preempt the field.  In other words, a patent covering any autonomous drone that determines distance to surrounding objects might preclude any other drones from being able to have a functioning sense and avoid capability.

The broadest claims in the Amazon patent application just recite a “distance determining element.”  In a narrower claim, the application specifies “the distance determining element is at least one of an ultrasonic ranging module, a laser rangefinder, a radar distance measurement module, stadiametric based rangefinder, a parallax based rangefinder, a coincidence based rangefinder, a Lidar based rangefinder, Sonar based rangefinder, or a time-of-flight based rangefinder.”  Thus, at this stage, Amazon is trying to cover all of the named techniques, any combination of those techniques, as well as anything else that could broadly be considered a distance determining element.

As noted, the Amazon patent application is still just pending and has yet to be examined.  Amazon may have other patent applications pending that have not yet been published, and therefore are not yet open to review by the public.  FAA regulations are also still developing.  Thus, much remains to be determined even as it relates to Amazon itself.  Other entities may also be working on drone delivery systems and/or have pending patent applications that have not yet been published.  Domino’s Pizza is said to have tested delivering pizzas by drone.  Skype’s co-founders have set up Starship Technologies to develop a ground-based drone that would be able to deliver groceries to customer’s homes.  It will be very interesting to see how the intellectual property protection for drone delivery systems plays out.

©2015 All Rights Reserved. Lewis Roca Rothgerber LLP

Top Patent Law Stories In 2015

There was a lot of IP action in 2015 – much involving the Fed. Cir. and Supreme Court’s resolution of cases in progress in 2014. In no particular order, I pick:

top patent stories of 20151.  Ariosa v Sequenom. This Fed. Cir. decision that a method for isolating “cffDNA” from maternal blood is no more than a natural phenomenon was a big step backwards for the development of patent law in the area of “precision medicine” and clouds the future patent-eligibility of both natural products and methods of diagnosis and treatment. It is a pick to click with the Supreme Court. (There was also a PTO “July 2015 Update” of the December 2014 s. 101 Guidelines that really did not clarify anything.)

2.  Biosimilars Hit the Shelves. In April, the FDA finalized its biosimilars guidance and Sandoz soon launched the first biosimilar, a generic version of Neuprogen.

3.  Nautilus v Biosig. The Supreme Court redefined the “indefiniteness standard” of s. 112(2) so that a claim term must be reasonably certain to the POSA, not simply amenable to construction. In Dow v. Nova, this new standard compelled invalidation of the claims-in-suit.

4.  The Rise of the PTAB. While it seems clear that the Fed. Cir. does not want to review every decision made by the PTAB in IPR, it released important decisions relating to its authority. In re Cuozzo, the court preserved the application of the PTO’s broadest reasonable claim construction rule in IPRs. In Merck v. Gnossis, the court affirmed that it would review PTAB decisions under the deferential “substantial evidence” standard, and not review PTAB decisions for proper application of the preponderance of the evidence standard.

5.  Obviousness Post-KSR. With the Supreme Court’s rejection of the teaching-suggestion-motivation by the art requirement, the Fed. Cir. has been developing the legal standards around obviousness questions derived from decisions that the Supreme Court left intact. These include a greater reliance on evaluating whether or not the art “teaches away” from the claimed invention, and evidence tending to show that hindsight was employed by the lower court or the Board. Closer evaluations of secondary considerations such as commercial success, failure of others, long-felt need, etc. are appearing in recent decisions. For example, see Judge Newman’s dissent in Merck v. Gnossis, Appeal no. 2014-1779 (Fed. Cir. 2015); see also Shire v. Anneal.

6.  Teva v. Sandoz Reverses Cybor. Fed. Cir. can still review questions of law de novo, but must give deference to the lower court’s findings of fact.

7.  Kimbel v. Marvel. In this “Spiderman” decision, the S. Ct. upheld the viability of Brulotte v. Thys: “No royalties for you” patentee/licensee, after the patents have expired. Impact: not huge, since patentees have been designing work-arounds for years.

8.  The Gradual but Steady Demise of Invalidations Based on Inequitable Conduct. Even though the decisions on appeals post-Therasense affirmed findings of IC about half the time, there were no important decisions involving IC in 2015. Either it is being pled less or being dismissed earlier in the proceedings. The Fed. Cir. earlier had upheld the invalidation of an Apotex patent, and Apotex has petitioned for cert., calling the Therasense decision just one more rigid Fed. Cir. rule, but I don’t think the Supreme Court will bite.

9.  The Gaggle of Decisions on Divided Infringement. This includes Akami v. Limelight (direct infringement can involve multiple actors if one “mastermind” controls their actions), Commil v. Cisco (belief in invalidity does not negate intent to induce infringement), Life Techs. Corp. v. Promega (self-active inducement under 271(f)(1)) and others that never quite captured my interest.

10.  The Trans-Pacific Partnership. According to Republicans, one more thing that President Obama got wrong.

So Happy New Year to All! 2016 Promises to be equally interesting – as in the old Chinese curse – “May You Live in Interesting Times.”

© 2015 Schwegman, Lundberg & Woessner, P.A. All Rights Reserved.

Year End 2015 Update – gTLD Sunrise Periods Now Open

New generic top-level domains (gTLDs, the group of letters after the “dot” in a domain name) have launched their “Sunrise” registration periods. As of the date of this newsletter, Sunrise periods are open for the following new gTLDs:

.OFFICE

.feedback

.family

.auto

.cars

.car

.lasalle

.cloud

.wine

.vin

.theatre

.SECURITY

.PROTECTION

.xn--tckwe (.コム – Japanese for “com”)

.YACHTS

.BOATS

.HOTELES

ICANN maintains an up-to-date list of all open Sunrise periods here. This list also provides the closing date of the Sunrise period. We will endeavor to provide information regarding new gTLD launches via this monthly newsletter, but please refer to the list on ICANN’s website for the most up-to-date information, as the list of approved/launched domains can change daily.

Because new gTLD options will be coming on the market over the next year, brand owners should review the list of new gTLDs to identify those that are of interest.

© 2015 Sterne Kessler

Four New Year’s Resolutions to Avoid the Damaging Loss of Trade Secrets

On December 21, 2015, an Illinois jury awarded Miller UK Ltd. $73.6 million against Caterpillar Inc.  Miller supplied couplers for Caterpillar’s equipment, and the jury concluded that Caterpillar used its leverage as Miller’s largest customer to demand access to information that Caterpillar then used to manufacturer its own version of the coupler.  As a result of the alleged theft, Miller claimed it had to terminate roughly seventy-five percent of its workforce, close an office, and scale back a new business venture.  This lawsuit was not between an employer and an employee, but it holds important lessons for employers that operate in industries and environments with valuable trade secrets.

1.   Audit Non-Disclosure Agreements

Trade secrets laws across the country provide a layer of protection for misappropriated trade secrets.  Non-disclosure and confidentiality agreements can often provide additional protection, by catching disclosures that would not be covered by trade secrets laws.

In the New Year, audit company records to confirm that any company or person who has access to the company’s trade secrets and proprietary information has signed a non-disclosure or confidentiality agreement.  If any of these parties did not sign an agreement during the contracting process, get an agreement in place immediately.

2.  Review Materials

In the New Year, review the company’s handbooks, policies, offer letters, and employment agreements to ensure that they prohibit theft and misappropriation of trade secrets and proprietary information from third parties (and not just the company).

Not only will this hopefully prevent employees from engaging in misconduct for which the company could be held liable (i.e. engaging in misappropriation), it could help the company avoid being held liable for any misconduct that does occur.

3.  Audit Restrictive Covenants

To the extent that your company has trade secrets and proprietary information that can be protected through restrictive covenants under applicable law, in the New Year, audit the company’s agreements with employees to ensure that all employees who have access to that information have signed the required restrictive covenants.  If an employee has not signed an agreement, identify what legal consideration will be required to obtain enforceable restrictive covenants. For those employees who have signed restrictive covenants, confirm that the company has signed (if required) and that the company records consist of both the employee’s signature and the body of the agreement that the employee signed.  Finally, review the company’s form restrictive covenants to ensure that they have kept up with the growth and development of the company (i.e. that they protect all of the company’s trade secrets and proprietary information) and with the latest developments in the law.

4.  Resolve

In the New Year, resolve to follow the three steps above at least once per year.  As the verdict demonstrates, an ounce of prevention is worth a pound of cure.  Following a regular maintenance schedule is the best way for a company to minimize the risks associated with trade secrets and proprietary information.

© Polsinelli PC, Polsinelli LLP in California

Delicious Look At Cookie Press Patent

I like to bake cookies, and this time of year gives me the perfect excuse to bake a lot of cookies. One of my favorite recipes uses a cookie press, which made me curious about cookie press patents. There are only a few granted U.S. patents with “Cookie Press” in the title, but U.S. Patent 6,708,853 seems to claim technology that I put to good use every December.

The Cookie Press Patent

U.S. Patent 6,708,853 names Hugh Melling asthe inventor and is assigned to Wilton Industries, Inc. Claim 1 recites:

1. An apparatus for dispensing a food substance comprising: a) a housing; b) a barrel connected to the housing and adapted to receive the food substance; c) a plunger slidably positioned within the barrel; d) a rod having teeth thereon and connected to the plunger; e) an advancing mechanism movably positioned within the housing and including: i) an escapement body; ii) a driver slidably positioned within the escapement body; iii) a spring engaging the driver and the escapement body so that the driver is biased toward said rod so that the driver engages a tooth of said rod; f) a lever pivotally attached to the housing and engaging said advancing mechanism so that when said lever is pressed towards said barrel, the driver moves said rod so that said plunger is advanced to dispense the food substance from the barrel.

According to the description in the specification, the spring may be a feature that distinguishes this cookie press over prior art cookie presses.The spring is located in the “escapement assembly 50″ but is not identified in Figure 3, reproduced below.

Cookie Press Patent Figure

As explained in the patent “a disc 20 is positioned at the bottom of the cookie barrel. The disc 20 includes openings 21 arranged in a variety of patterns to form a template for dispensing cookie dough. A bottom cap 16 with an opening 17 therethrough secures the disc 20 to the bottom of the cookie barrel. … [C]ookie dough is dispensed through the openings 21 of the disc 20 when the lever 22 of FIGS. 1 and 2 is manipulated.” This makes it easy to make fancy-looking cookies like these:

holiday cookies

Happy Holidays!

When Quirk of Copyright Law Creates Christmas Classic: It’s Wonderful Life and Public Domain

Christmas treeGeorge Bailey stands on a bridge begging for another chance at life. Upon being granted a second chance, he joyously runs home to embrace his family. As the community of Bedford Falls rallies around him and raises funds to save the endangered Building and Loan and George Bailey personally from an unjustified failure, someone proclaims a toast to George Bailey, “the richest man in town.” It’s a powerful ending to a beloved holiday classic, and it would have been forgotten over time but for accidentally allowing a copyright to expire.

The 1909 Act is the copyright act that governs copyrightable works created before 1964. The Act created two, distinct copyright terms for each individual work: a 28-year initial term and a 28-year renewal term. The initial term applied automatically, but the copyright owner had to file a renewal application with the U.S. Copyright Office to get the second term. If the owner failed to file a renewal application before the first 28-year term expired, the work automatically entered the public domain.

Into this copyright framework, a movie called It’s a Wonderful Life was released in December 1946. It was directed by Frank Capra and starred James Stewart. Upon its release, it was not the booming success that one might imagine based on its reputation now. While it was not a complete box-office failure, it struggled financially and never came close to reaching its break-even point. Capra and Stewart would never work together again. In fact, it was a major blow to Capra’s reputation, and in the aftermath of the film, Capra’s production company went bankrupt.

More holiday movies were created over the years, and the film was largely forgotten. At the end of the initial 28-year copyright term in 1974, a clerical mistake prevented the copyright owner of It’s a Wonderful Life from filing a renewal application, and the movie went into the public domain. TV studios, eager for inexpensive content to show during the holidays, began showing the movie every year because they were not required to pay any royalties while the film was in the public domain. Over the next approximately 20 years, the film was shown repeatedly every holiday and claimed its current status as a holiday classic.

Everything changed in 1993. In response to a Supreme Court ruling in Stewart v. Abend, the current copyright owners of It’s a Wonderful Life were able to enforce a copyright claim to the movie. The Court in Steward v. Abend held that a current copyright owner has the exclusive right to exploit derivative works, even in light of potentially conflicting agreements by prior copyright holders. Coincidentally, the Steward v. Abend case involved another James Stewart movie, Rear Window.

Because the current copyright owners of It’s a Wonderful Life still owned the movie rights of the original story on which the movie is based, the current copyright owners argued that their rights to the story told in It’s a Wonderful Life still existed and were enforceable to prevent unauthorized showing of the movie in its current form. The newly-returned owners were thus able to stop any unauthorized showings of the movie, but by then the movie was firmly entrenched as a holiday classic. It has been popular ever since. So the next time you sit down to watch George Bailey offer to lasso the moon for Mary or watch them dancing over an expanding swimming pool, just remember that we all might have missed this movie entirely if not for a clerical mistake causing a renewal application not to be filed.

©1994-2015 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. All Rights Reserved.

Smartphone Wars – Supreme Court Awakens: Samsung Files Petition for Certiorari in New Hope to Harmonize Design Patent Law

On Monday, in the latest episode of the smartphone wars, Samsung filed a petition for certiorari with the Supreme Court.

Smartphone Wars

Samsung is appealing a Federal Circuit decision that upheld a $399 million judgment against Samsung for infringing three of Apple’s design patents. Samsung argues that the decision, if left unchecked by the Supreme Court, could dramatically increase the value of design patents. While the Supreme Court is the ultimate power in patent jurisprudence, it was a long time ago that it last considered a design patent case; more than 120 years ago according to Samsung. Samsung’s petition presents two fundamental questions concerning design patents:

1. Where a design patent includes unprotected non-ornamental features, should a district court be required to limit that patent to its protected ornamental scope?

2. Where a design patent is applied to only a component of a product, should an award of infringer’s profits be limited to those profits attributable to the component?

With respect to the first question – whether a district court should be required to limit the protection of a design patent to only ornamental features – Samsung argues that the Federal Circuit’s decision conflicts with both Section 171 of the Patent Act and with the Supreme Court’s precedent requiring judicial construction of patent claims.

According to Samsung, the Federal Circuit refusal “to cabin design patents to their protected ornamental scope” conflicts with Section 171 and allows infringement to be “found based on the use of nonornamental attributes.” Thus, argues Samsung, the Federal Circuit broadened the protectable scope of design patents, which are limited to “any new, original and ornamental design for an article of manufacture,” under section 171. Samsung argues the Federal Circuit’s ruling also creates tension with other areas of intellectual property law that routinely enforce limitations to protectable scope, such as copyright doctrine of “filtration” and trademark law’s doctrine of functionality.

Samsung also maintains that the ruling is contrary to Supreme Court precedents in the analogous context of utility patents, which recognize that district courts have a duty to construe patent claims and eliminate unprotected features. In Samsung’s view, similar to a Markman hearing, a district court should instruct a jury to identify non-ornamental features of a design patent and exclude them from the infringement analysis.

Turning to the second question – whether damages should be limited to the profits attributable to the infringing component – Samsung argues that the Federal Circuit’s decision conflicts with Section 289 of the Patent Act and the basic principles of causation and equity.

Samsung urges that “the Federal Circuit’s holding as a matter of law that an infringer of a design patent is liable for all of the profits it made from its entire product, no matter how little the design contributed to the product’s value or sales” be corrected. Samsung argues that the Federal Circuit’s conclusion that the article of manufacture is the entire smartphone, and not specific subcomponents, is wrong based on a natural reading and purpose of Section 289 of the Patent Act, contemporary extrinsic evidence regarding the definition of “articles of manufacture,” and non-controlling case law (see note below).

According to Samsung, the Federal Circuit’s “interpretation of Section 289 also flies in the face of well-settled tort principles of causation” and “ignores that disgorgement of the defendant’s profits is a classic equitable remedy for which the accepted measure of recovery generally is ‘the net profit attributable to the underlying wrong.’” “The cardinal principle of damages in Anglo-American law is that of compensation for the injury caused to plaintiff by defendant’s breach of duty,” This is the backdrop in which Section 289 was adopted. “Where disgorgement is available in patent cases, it has [] been ‘given in accordance with the principles governing equity jurisdiction, not to inflict punishment but to prevent an unjust enrichment by allowing injured complainants to claim ‘that which … is theirs, and nothing beyond this.’”

Samsung claims that certiorari should be granted because the Federal Circuit’s decision dramatically increases the value of design patents relative to other forms of intellectual property. Without correction, design patents will have whatever scope juries choose to give them, and a design-patent holder will be entitled to the infringer’s profits on the entire product even if the patented design applies only to a part of the product, and contributes to only a minor faction of the overall value. The Federal Circuit’s decision allows design patent owners to obtain the infringer’s total profits – a remedy not available under utility-patent law. Samsung contends that such leverage “poses a real danger for companies everywhere,” that it will lead to an “explosion of design patent assertions and lawsuits.”

Will the Supreme Court agree with Samsung that the Federal Circuit has caused a great disturbance in design patent jurisprudence? Difficult to see. Always in motion is the future.

Bush & Lane Piano Co. v. Becker Bros., 222 F. 902, 904 (2d Cir. 1915), (allowed an award of infringer’s profits from the patented design of a piano case but not from the sale of the entire piano, holding that “recovery should be confined to the subject of the patent.”); Young v. Grand Rapids Refrigerator Co., 268 F. 966 (6th Cir. 1920), (Affirmed the denial of all profits from the sale of refrigerators where the infringed patent related only to the design of the refrigerator’s door latch, explaining that it was not even “seriously contended” that the patentee could recover all profits from sales of refrigerators containing that latch.)

©1994-2015 Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C. All Rights Reserved.