New generic Top Level Domain (gTLD) – ICANN Trademark Clearinghouse Goes Live

Lewis and Roca LLP eading business law firm in the Southwest U.S.

Trademark Clearinghouse Launch

Complaints regarding inadequate protection for trademark owners will apparently not stop the Internet Corporation for Assigned Names and Numbers (“ICANN“) from launching its new unlimited gTLD (generic Top Level Domain) program as quickly as possible in 2013. The new web environment will include hundreds of different words appearing to the right of the dot in domain names, in sharp contrast to the existing limited number of authorized strings such as .com, .biz, .net, and .info. Initial evaluations of over 1900 applications for new Top Level Domains have begun to be published by ICANN and will continue through August. Strings containing non-Latin script, known as Internationalized Domain Names (“IDNs”), of which there are over 100 in Chinese, Arabic and other alphabets, will launch first in May or June.

Trademark owners concerned about cybersquatting and counterfeit goods or services that could be sold at websites created at second level (before the dot) urls via domain name registrations obtained in the new gTLDs should consider filing registered trademarks with ICANN’s Trademark Clearinghouse (TMCH) which goes live this week. For example, a manufacturer of food products may consider recording its registered brand names with the TMCH to help protect against use of the brand name by an infringer who might purchase the name to the left of the dot in the new (dot)food domain. As long as the registration was applied for before the particular TLD application was published and was also registered before that TLD contract is awarded, entry of a trademark registration record into the TMCH will provide two benefits: (1) eligibility for Sunrise registrations before the general launch of any particular new TLD if a specimen of use is filed at the time the registration record is entered into the TMCH and (2) notification to the owner if a third party proceeds to register the owner’s trademark at the second level after being notified by the TMCH of the owner’s claim. Common law marks and state registrations are not eligible for entry into the TMCH, but marks validated through judicial process or by statute will qualify

There are caveats associated with these benefits because eligibility for Sunrise does not guarantee the trademark owner will get the Sunrise registration if other parties also own the same registered mark (perhaps for different goods or services). It’s easy to see how this might become a problem in proposed TLDs such as (dot)store. For example, Apple Records may want to sell downloadable music at apple.store, but Apple Inc. may also want to sell consumer electronics at apple.store. Registries will have a method in place for resolving Sunrise registration disputes and this may not be first come, first served. It could ultimately involve a bidding or auction process. Further, the notification described above will only be in place for the first 90 days after general launch of a new TLD so the holder may need to employ a watch service to track registrations purchased by third parties after that 90 day period.

Unlike the recent launch of the XXX domain, there is no “blocking” mechanism available to trademark holders in connection with the new TLDs. This puts a premium on obtaining a preventive Sunrise registration or being willing to follow up with cybersquatters on an “after-the-fact” basis once they have already obtained a registration.

In a decision issued at the end of last week, ICANN confirmed requested improvements for (a) 30 days prior notice of the launch of Sunrise, (b) extending IP claims notification from 60 days to 90 days out from general launch and (c) allowing previously “abused names” (such as those established as “abused” by way of prior UDRP proceedings) to be entered into the TMCH alongside the registered trademark even if not identical to the registered trademark. Presumably these previously abused names would then give rise to IP Claims notifications, but the implications are unclear since the TMCH has yet to issue its final Submission Guidelines based on these latest changes to the system. Entry of TMCH records will involve legal decisions, including, but not limited to (1) whether to enter a registration into the TMCH or not, (2) whether to seek Sunrise registration or not, (3) how best to provide proof of use if a Sunrise registration is desired in any new TLD, (4) which period of protection to select (1, 3, or 5 years), and (5) which domain names and previously “abused names” will qualify for TMCH protection.

©2013 All Rights Reserved. Lewis and Roca LLP

The IP Strategy Summit (TIPSS): Monetization – Harvesting Your IP

The National Law Review is pleased to bring you information about the upcoming Monetization:  Harvesting Your IP conference:

Monetization IP - April 23-24 2013

April 23-24, 2013

New York

KEY TOPICS THAT WILL BE COVERED:

  • Evaluation of your IP
  • Monetization Models
  • Building a Monetization Strategy
  • Managing and communication across your organization
  • Selling your IP
  • Running a licensing program
  • Discover the Best Enforcement Strategies
  • Multi-National Litigation
  • Financial reporting of revenues

The IP Strategy Summit (TIPSS): Monetization – Harvesting Your IP

The National Law Review is pleased to bring you information about the upcoming Monetization:  Harvesting Your IP conference:

Monetization IP - April 23-24 2013

April 23-24, 2013

New York

KEY TOPICS THAT WILL BE COVERED:

  • Evaluation of your IP
  • Monetization Models
  • Building a Monetization Strategy
  • Managing and communication across your organization
  • Selling your IP
  • Running a licensing program
  • Discover the Best Enforcement Strategies
  • Multi-National Litigation
  • Financial reporting of revenues

East Coast Spotlight on Design Patents: Spanx v. Yummie Tummie

The National Law Review recently featured an article, East Coast Spotlight on Design Patents: Spanx v. Yummie Tummie, written by Michael A. Cicero with Womble Carlyle Sandridge & Rice, PLLC:

Womble Carlyle

 

Certainly the recent design patent litigation between Apple and Samsung in the Northern District of California garnered significant media attention.  Design patents now reside in the media spotlight once again, but this time through East Coast litigants.  The president of a New York-based maker of women’s control tops that is a named owner of several design patents openly declared that she hopes her Georgia-based competitor “is ready for war because [she] will not lie down.”  The accused infringer actually started the litigation following its receipt of a cease-and-desist letter from the New York company’s legal counsel.

On March 5, 2013, Spanx, Inc. (“Spanx”) filed a declaratory judgment complaint in the Northern District of Georgia against Times Three Clothier, LLC d/b/a Yummie Tummie (“Yummie Tummie”), requesting the court to declare that three Spanx products do not infringe seven design patentsclaimed to be owned by Yummie Tummie.  The lawsuit has already generated a considerable amount of media coverage, including sources cited below and NBC’s Today Show.

The lawsuit pits two prominent entrepreneurs against one another.  Heather Thomson, the president of Yummie Tummie, is not only the sole inventor named in each of the patents-in-suit (as Heather Thomson Schindler), but was also one of the “Real Housewives of New York.”[1]  Sara Blakely, according to ABC News, “founded Spanx in 2000, introducing what Spanx calls a shaping camisole in 2005,” and is “the youngest woman on Forbes’ billionaires list.”

Referring to an interview Thomson gave to the publication WWD (Women’s Wear Daily),lifeinc.today.com reports:

Thomson told WWD that she first learned of the product this past November when she received an anonymous package containing the Spanx Total Taming Tank and a note saying it was on sale at QVC.  “I immediately recognized it as my original Yummie Tummie tank,” Thomson told WWD.  The unsigned note said Spanx was selling it at QVC.  A spokeswoman for Thomson declined to comment further.

“The Patents-in-Suit are related to one another,” states Spanx’s complaint, “in that [six of the patents] all claim priority to the [oldest] Patent.”  Excerpts from two of these patents appear in Figure 1, below, for purposes of illustration.

The complaint alleges that Yummie Tummie’s counsel sent Spanx a cease-and-desist letter on or around January 18, 2013, identifying the accused products as Spanx’s “Total Taming Tank,” the “Top This Tank Style 1847,” and the “Top This Cami Style 1846.”  (See Figure 2 below, depicting two of those products.)  Spanx responded to that letter on or around February 14, 2013, according to the complaint, “describing in detail significant differences between the Accused Products and the Patents-in-Suit and stating, among other things, that it does not believe the Accused Products infringe the Patents-in-Suit.”

Figure 1: Depictions of Fig. 1 from Yummie Tummie’s U.S. Patents Nos. D606,285S (left) and D632,052S (right)
Figure 2: Two accused Spanx products as shown in its website: Styles Nos. 1846 (left) and 1847 (right)

Counsel for each party then communicated with one another several times but, states the complaint, Yummie Tummie “continued to maintain that the Accused Products infringe the Patents-in-Suit and expressed a willingness to enforce its patents against Spanx.”  Thus, Spanx alleges, it has grounds for seeking a declaratory judgment of noninfringement of the Patents-in-Suit.  The complaint requests such declaratory relief plus “costs, expenses, and reasonable attorneys’ fees as provided by law.”

As of the time of this writing, Yummie Tummie has not yet filed a formal answer to the complaint (its allotted time for doing so under procedural rules has not yet expired).  Yummie Tummie has, though, already  issued a public statement regarding the lawsuit.  In a March 14, 2013 letter addressed directly to Blakely and published on Yummie Tummie’s website, Thomson states, among other things: “We brought this to your attention expecting you to stop.  Instead you’ve chosen to sue us, no doubt thinking that your massive company could intimidate ours.  We have successfully enforced our design patents in the past and will continue to do so.”

The case is Spanx, Inc. v. Times Three Clothier, LLC d/b/a Yummie Tummie, No. 1:13-cv-0710-WSD,filed 03/05/13 in the U.S. District Court for the Northern District of Georgia, Atlanta Division, assigned to U.S. District Judge William S. Duffey, Jr.


[1] Coincidentally, the Northern District of Georgia is also the site of a legal battle between two “Real Housewives of Atlanta,” filed just one week after the Spanx lawsuit.  See prior post.

Copyright © 2013 Womble Carlyle Sandridge & Rice, PLLC

IP Law Summit – March 21-23, 2013

The National Law Review is pleased to bring you information about the upcoming IP Law Summit:

IP-LAW Sept 13-15 2012

The IP Law Summit is the premium forum for bringing senior IP Counsel and service providers together. As an invitation-only event taking place behind closed doors, the Summit offers an intimate environment for a focused discussion of cutting edge technology, strategy and products driving the IP market place.

The one-on-one business meetings provide access to Senior IP Counsel within the largest corporations across the United States. A thorough selection process ensures a qualified audience, which grants unparalleled business and networking opportunities in a luxurious and stimulating environment.

March 21-23, 2013

The Broadmoor, Colorado Springs, CO

Protect Your Trademark Online: Global Trademark Clearinghouse to Begin Accepting Submissions

The National Law Review recently published an article by Karen Artz AshBret J. DanowRoger P. FureyDoron S. GoldsteinPeter J. Riebling, and David B. Sherman of Katten Muchin Rosenman LLP regarding Trademarks and the Global Clearinghouse:

Katten Muchin

 

On March 26, 2013, the Internet Corporation for Assigned Names and Numbers (ICANN) will begin to allow trademark owners to submit their marks for inclusion in a newly created Trademark Clearinghouse, which is intended to serve as a single centralized database of verified information that will enable trademark holders throughout the world to better protect their rights on the Internet. This follow-up to “New Generic Top-Level Domain Names: What Brand Owners Need to Know” (June 15, 2012) introduces brand owners (and their licensees, assignees and agents) to several key elements of the Trademark Clearinghouse submission process, and describes the primary benefits that the Trademark Clearinghouse promises to provide to trademark rights holders.

Background

ICANN, the private nonprofit corporation that manages most top-level domains (TLDs) and IP addresses, developed the Trademark Clearinghouse (in connection with Deloitte and IBM) as part of its new generic Top-Level Domain (New gTLD) Program. Generally speaking, the New gTLD Program allows any legal entity to file an application to create a new gTLD—the general domain name address extensions that come after the last dot (such as .com, .net., .org)—and, as a result, has the potential to significantly expand the existing Internet infrastructure by increasing the number of gTLDs to an almost unlimited amount (and simultaneously expanding the potential for online trademark infringement). Amid this expansion, the Trademark Clearinghouse was created to protect trademark rights holders by permitting them to more easily register second-level domain names under new gTLDs (e.g., YOURNAME.example), and to allow gTLD operators and registries to better review and assess trademark claims.

The Submission Process

The Trademark Clearinghouse will initially accept and verify for registration (1) nationally or regionally (i.e., multi-nationally) registered trademarks; (2) court-validated marks; and (3) marks protected by statute or treaty. Trademarks that are the subjects of pending applications or are inactive or invalid may not be registered.

Although the specific type of information and documentation required to verify a trademark record will vary depending on the type of mark, the Trademark Clearinghouse will generally require trademark rights holders to submit information regarding the mark itself, details about any applicable registration, court reference numbers or other documentation evidencing rights, the goods and/or services covered and the corresponding Nice classification(s), the country(ies) in which the mark is protected, the name and contact information of the trademark rights holder, and, for purposes of obtaining applicable Sunrise Services, certain verification of proof of use of the mark, which may include a signed declaration and specimen(s) of trademark use (e.g., labels, tags, containers, advertising and marketing materials). All trademark submissions will be subject to verification by Deloitte Enterprise Risk Services.

This verified trademark data will support the two primary benefits that the Trademark Clearinghouse promises to provide to trademark rights holders: Sunrise Services and “Trademark Claims” for all new gTLDs. The cost charged by ICANN for making a submission to the Trademark Clearinghouse will vary from US$95 to US$150 per year for a single mark, with discounted fees available to trademark rights holders who seek registration for three years (US$435) or five years (US$725). The Trademark Clearinghouse’s submission guidelines and basic fee structure are available for download at its official website.

Sunrise Services

By registering a trademark with the Trademark Clearinghouse, a trademark rights holder will be permitted to register second-level domain names under new gTLDs (e.g., YOURNAME.example) during a “Sunrise” period of at least thirty (30) days before registration of such names is made available to the general public. All new gTLD applicants are subject to this mandatory “Sunrise” period after the registration of the new gTLD with a registry. Access to “Sunrise” registration will provide trademark rights holders with a relatively low-cost means by which to obtain some level of control of, and some ability to safeguard, second-level domain names comprised of their trademarks.

Trademark Claims

Registering a trademark with the Trademark Clearinghouse will also entitle a rights holder to a “Trademark Claims” service following the “Sunrise” period. This “Trademark Claims” service will extend for at least the first sixty (60) days after a new gTLD is open for registration with the general public. At the outset, the “Trademark Claims” service will provide a warning of potential infringement to any third party attempting to register a domain name that matches a trademark registered with the Trademark Clearinghouse. In the event that the third party proceeds to register the domain name despite such a notice, the “Trademark Claims” service would send an automated notification to the trademark holder alerting it to the potential infringement. Although the Trademark Clearinghouse will not bar registration of the potentially infringing domain name, the “Trademark Claims” notice will expeditiously inform the rights holder and enable it to consider whether to take action.

As a practical matter, the “Trademark Claims” service will only identify identical matches to eligible trademarks. In other words, “Trademark Claims” notices will only be generated if the domain name label consists of the complete and identical textual elements of the trademark registered with the Trademark Clearinghouse. As a result, even a domain name containing a plural version of the mark would not be considered an identical match. Typos and “trademark + generic term” domain name labels also would not be considered identical matches. To the extent a trademark contains any special character that cannot be represented in a domain name, e.g., “@” or “!,” such character may be either omitted, replaced by hyphens, or spelled out with appropriate words of the official language(s) of the country/jurisdiction in which the mark is protected. Accordingly, if a trademark rights holder is interested in obtaining additional protection against the use and registration of infringing domain names, it may wish to work with legal counsel and use a private domain name watching service.

Conclusion

The launch of the Trademark Clearinghouse marks a phase of ICANN’s New gTLD Program that would appear to be particularly significant to brand owners and licensees. In view of the numerous ways in which the New gTLD Program promises to alter the existing Internet infrastructure, trademark rights holders may wish to consider the benefits of early registration with the Trademark Clearinghouse and work with counsel to develop other cost-effective strategies to protect their trademarks and other valuable intellectual property rights.

©2013 Katten Muchin Rosenman LLP

A New Era of U.S. Patent Law Will Begin on March 16, 2013

The National Law Review recently published an article regarding New Patent Laws written by Gregory L. Porter with Andrews Kurth LLP:

Andrews Kurth

The America Invents Act brought a host of changes to U.S. patent law. One of these changes that will take effect on March 16th, 2013 is a change from a “first to invent” system to a “first to file” system. All new applications filed on or after March 16, 2016 that do not claim priority to an earlier application will fall under the new law. Under the new law, the first inventor to file a patent application will normally prevail in obtaining a patent over a second inventor who filed later in time, regardless of which inventor was first to invent. This change will bring the U.S. patent system in harmony with most of the world in this respect.

There are other implications of the March 16th change in the law. Among these implications is that the prior art scope potentially broadens for those new applications filed after March 16th. That is, sales outside of the U.S., as well as any prior public use, may be considered prior art under the new law, whereas these would not have been considered prior art previously. Moreover, published applications (both international and U.S.) will be considered prior art dated as of their earliest filing date, even if such filing date is a foreign application. Therefore, companies should not only ensure they win the race to the patent office after the March 16th date change to the patent system, they should also consider filing applications prior to March 16th when possible.

© 2013 Andrews Kurth LLP

The IP Strategy Summit (TIPSS): Monetization – Harvesting Your IP

The National Law Review is pleased to bring you information about the upcoming Monetization:  Harvesting Your IP conference:

Monetization IP - April 23-24 2013

April 23-24, 2013

New York

KEY TOPICS THAT WILL BE COVERED:

  • Evaluation of your IP
  • Monetization Models
  • Building a Monetization Strategy
  • Managing and communication across your organization
  • Selling your IP
  • Running a licensing program
  • Discover the Best Enforcement Strategies
  • Multi-National Litigation
  • Financial reporting of revenues

IP Law Summit – March 21-23, 2013

The National Law Review is pleased to bring you information about the upcoming IP Law Summit:

IP-LAW Sept 13-15 2012

The IP Law Summit is the premium forum for bringing senior IP Counsel and service providers together. As an invitation-only event taking place behind closed doors, the Summit offers an intimate environment for a focused discussion of cutting edge technology, strategy and products driving the IP market place.

The one-on-one business meetings provide access to Senior IP Counsel within the largest corporations across the United States. A thorough selection process ensures a qualified audience, which grants unparalleled business and networking opportunities in a luxurious and stimulating environment.

March 21-23, 2013

The Broadmoor, Colorado Springs, CO

Administration Launches Strategy on Mitigating Theft of U.S. Trade Secrets

The National Law Review recently published an article, Administration Launches Strategy on Mitigating Theft of U.S. Trade Secrets, written by Lauren M. Papenhausen with McDermott Will & Emery:

McDermottLogo_2c_rgb

 

The strategy announced on February 20, 2013, should serve as both a wake-up call from the government and an offer of assistance.  Given the losses that can arise from competitors’ purposeful theft of trade secrets, entities should review the announcement and decide whether they need to be more active in protecting their trade secrets.  The strategy also offers opportunities for increased collaboration with the government.

On February 20, 2013, the White House announced an “Administration Strategy on Mitigating the Theft of U.S. Trade Secrets.”  Companies should view the announcement of this strategy as both a wake-up call from the government and an offer of assistance.  Given the losses that can arise from competitors’ purposeful theft of trade secrets, entities should review this government announcement and decide whether they need to be more active in protecting their trade secrets.

The administration strategy articulates a broad governmental commitment to addressing an “accelerating” threat to U.S. intellectual property.  The strategy encompasses five action items:

  • Focusing diplomatic efforts to protect trade secrets through diplomatic pressure, trade policy and cooperation with international entities
  • Promoting voluntary best practices by private industry to protect trade secrets
  • Enhancing domestic law enforcement, including through outreach and information-sharing with the private sector
  • Improving domestic legislation to combat trade secret theft
  • Improving public awareness and stakeholder outreach

Three main themes emerge from the administration strategy that are important for U.S. businesses.

First, the strategy and its supporting documentation highlight how frighteningly real the prospect of trade secrets theft is.  The White House report is peppered with references to household name companies that have been victimized by trade secrets theft over the past few years, often at a cost of tens of millions of dollars or more.  Mandated reports from the defense industry to the government indicate a 75 percent increase between FY2010 and FY2011 in reports of suspicious activity aimed at acquiring protected information.  Coupled with a recent New York Times article asserting Chinese government involvement in more than 100 attempted cyber attacks on U.S. companies since 2006, these reports warrant sitting up and taking notice.  According to a report by the Office of the National Counterintelligence Executive, particular targets include companies that possess the following:

  • Information and communications technologies
  • Business information that relates to supplies of scarce natural resources or that gives foreign actors an edge in negotiations with U.S. businesses or the U.S. government
  • Military technologies, particularly in connection with marine systems, unmanned aerial vehicles and other aerospace/aeronautic technologies
  • Civilian and dual-use technologies in sectors likely to experience fast growth, such as clean energy, health care and pharmaceuticals, advanced materials and manufacturing techniques, and agricultural technology

Second, the government alone cannot solve the problem.  The administration commits to making the investigation and prosecution of trade secret theft a “top priority” and states that the Federal Bureau of Investigation has increased the number of trade secret theft investigations by 29 percent since 2010.  On its face, however, a 29 percent increase in investigations cannot keep pace with a 75 percent increase in attempted trade secret thefts.  Historically, as a result of limited resources, the government has been able to address only a tiny fraction of trade secret thefts, and there is no indication that there will be the massive influx of resources necessary to change this dynamic materially.  Indeed, the administration strategy recognizes the need for public-private partnerships on this issue and asks companies and industry associations to develop and adopt voluntary best practices to protect themselves against trade secret theft.  And, of course, there are significant drawbacks to any after-the-fact solution, whether relying on government intervention or a private lawsuit.

The best solution is to prevent a trade secret theft from ever occurring.  Even if that is not possible, having taken strong measures to protect trade secrets will aid success both in any civil litigation against the perpetrator and in any criminal action the government may bring.  Entities should consider at least the following types of protective measures:

  • Research and development compartmentalization, i.e., keeping information on a “need to know” basis, particularly where outside contractors are involved in any aspect of the process
  • Information security policies, e.g., requiring multiple passwords or multi-factor authentication measures and providing for data encryption
  • Physical security policies, e.g., using controlled access cards and an alarm system
  • Human resources policies, e.g., using employee non-disclosure agreements, conducting employee training on the protection of trade secrets and performing exit interviews.

It also will be important in any future litigation that a company has clearly designated as confidential any materials it may wish to assert are trade secrets.

Third, the new administration approach to trade secrets offers some opportunities for U.S. companies.

The government interest in enhancing law enforcement operations indicates that businesses may have a better chance of encouraging the government to investigate and bring criminal charges under the Economic Espionage Act (EEA) against the perpetrators of trade secret thefts.  The possibility of seeking government involvement is a powerful tool that should be considered and discussed with counsel any time there is a significant suspected trade secret theft.  Obtaining government involvement in specific instances of trade secret theft can allow businesses to take advantage of information learned via government tactics such as undercover investigations and search warrants.  It also can significantly enhance any civil litigation—for example, a finding of criminal liability can make a civil outcome a foregone conclusion.

The administration strategy’s focus on improving domestic legislation and increasing communication with the private sector suggests that there is an opportunity for the private sector to collaborate with government actors in communicating industry needs and shaping policy.  For example, it is possible that the time is ripe for an amendment to the EEA (currently a federal criminal statute that offers no private right of action) to create a federal, private cause of action for misappropriation of trade secrets.  A bill to this effect was introduced in Congress in 2012 and did not progress, but two other amendments to strengthen the EEA that passed overwhelmingly in December 2012, plus the recently issued administration strategy, suggest there may be gathering momentum for such a change.

In an executive order signed on February 12, 2013, entitled “Improving Critical Infrastructure Cybersecurity,” President Obama outlined government plans to significantly increase the amount of information that the government shares with private sector entities about cyber threats.  Specifically, the order directs government agencies to develop procedures to create and disseminate to targeted entities unclassified reports of cyber threats that identify them as targets, to disseminate classified reports of cyber threats under certain circumstances to “critical infrastructure entities,” and to expand the Enhanced Cybersecurity Services program (previously available only to defense contractors to assist in information-sharing about cyber threats and protection of trade secrets) to “eligible critical infrastructure companies or commercial service providers that offer security services to critical infrastructure.”  The directives in the executive order are in addition to and complement various information-sharing tactics set forth in the administration strategy designed to provide warnings, threat assessments and other information to industry.  Companies, particularly those involved in the power grid or the provision of other utilities or critical systems, should be aware of the possibility of obtaining additional information from the government about threats to protected information.

© 2013 McDermott Will & Emery