Is the Mark used as a Trademark or a Trade Name?

By Richard Stobbe

Apple Inc. sells Apple-branded computers. Is Apple a trademark or a trade name? And what’s the difference anyway? And perhaps most importantly, why should you even care?

A trademark is a protectable brand that distinguishes the source of goods or services in the marketplace. A trade name is merely a business name that may or may not overlap with a company’s trademark rights. It could be a trading name, doing-business-as, or operating-as, such as 1234567 Alberta Ltd. doing business as ABC Trading, where ABC Trading is the trade name. In the case of Apple, the company name “Apple Inc.” mirrors the company’s core mark (no pun intended). If we think back to earlier times, the trade name “Research in Motion” was used by a certain business whose main product was sold under a different trademark: BLACKBERRY.

If you are a trademark owner, this kind of thing matters because of the requirement in Canada to continually use a trademark in order to maintain trademark rights. This means that a registered trademark is vulnerable to be cancelled if it falls out of use. There is a mechanism in the Trademarks Act to challenge an owner’s entitlement to a registered mark, where the owner must show evidence of use. This is a challenge under Section 45 (and is commonly verbed in Canada, as in “we section fortyfived that mark”).

In the recent decision by the Trademarks Opposition Board in Borden Ladner Gervais LLP v GDC Communities, 2015 TMOB 50 (CanLII), this issue was addressed. Someone challenged the registered mark GDC COMMUNITIES which was registered in association with various services of engineering, development, financing and management of real estate, real estate marketing and residential home construction. The mark owner responded with evidence showing use of the mark:

  • Some of the evidence showed use of the mark in a trade show outside of Canada, which would not qualify as use in Canada;
  • Some of the evidence was in the form of a business card which, according to the owner, was distributed to potential clients in Canada;
  • Some of the evidence showed use of the GDC COMMUNITIES on the owner’s website;
  • Lastly, the owner tendered email correspondence evidence, showing the display of GDC COMMUNITIES.
  • The evidence was unconvincing because the decision-maker concluded that wherever the mark appeared, it functioned as a trade name (the name of the company), as opposed to a brand. The decision puts it this way: “GDC COMMUNITIES is not set apart from the surrounding text, but appears in the same size and font. In addition, the copyright notice at the bottom of the web page lists the copyright owner as GDC COMMUNITIES, immediately followed by the Registrant’s address, suggesting that GDC COMMUNITIES is being used to identify the legal entity that owns the copyright and is not being used as a trade-mark. This is consistent with how GDC COMMUNITIES is used in the rest of the web page. In all cases in which GDC COMMUNITIES appears in the Registrant’s evidence, it is not presented in a manner which sets it apart from other corporate information or in a manner such that it would be perceived by a consumer as a trade-mark.” (Emphasis added).

    The lessons for business?

    • The mark must appear in marketing materials – such as packaging, website materials, email footers, signage – in a way that sets the mark apart from the surrounding text. It is not necessarily fatal to a mark that it appears above the company’s address. For example, an email or webpage showing “Apple, 1 Infinite Loop, Cupertino, CA” will not, by itself, jeopardize the strength of that mark. However, if that is the only use, it will lead to the conclusion that the mark is used merely as a corporate or trade name.
    • The mark should appear in a different font, in bold, in a different size or colour, and the proper notation should be used. In this case, the mark was a registered mark and should be accompanied by the circle-R mark.
    • Note: It is important that a mark is used as registered. Where the mark changes over time, the mark owner should consider filing a new application for the modified form of the mark. Otherwise, the evidence of usage may show use of the modified mark, which may not be accepted as evidence of use of the mark as it was registered.

    Calgary – 07:00 MT

    No comments

    No copyright or trademark protection for metatags

    .
    By Richard Stobbe

    What if a competitor copied the metatags on your website and you watched web traffic bleed from your own site while the competitor’s site enjoyed a bump in hits? Are metatags subject to copyright or trademark protection? The recent Federal Court decision in Red Label Vacations Inc. (redtag.ca) v. 411 Travel Buys Limited (411travelbuys.ca), 2015 FC 19 (CanLII), dealt with just such a dispute when Red Label sued its competitor 411 Travel for copying the title tags, meta descriptions and meta keywords on 48 pages of the 411 Travel website.

    The court reviewed the facts and past metatag decisions and decided that, on balance, the metatags that were copied did not qualify for copyright protection. “In this case there is little evidence of any sufficient degree of skill and judgement in creating these metatags…or for the originality required in compiling data or other compilations… While in some cases there may be sufficient originality in metatags to attract copyright protection when viewed as a whole, the substance of the metatags asserted by the Plaintiff in this case does not meet the threshold required to acquire copyright protection in Canada.” (Emphasis added) There was copying, but without copyright, there can be no infringement.

    As for the trademark claims, the court reviewed the role of the “searcher” (i.e. the potential customer who enters certain search terms into a Google search) in ultimately deciding whether or not trademark infringement had occurred. “Even if a searcher is looking for the website connected with a particular trade name or trademark, once that person reaches the website, there must be confusion as to the source of the entity or person providing the services or goods. If there is no likelihood of confusion with respect to the source of the goods or services on the website, there is no support for finding this prong of the test for passing off. Accordingly, use of a competitor’s trademark or trade name in metatags does not, by itself, constitute a basis for a likelihood of confusion, because the consumer is still free to choose and purchase the goods or services from the website he or she initially searched for.” In this case, there was no use of any of the Plaintiff’s trademarks on the visible portion of the 411 Travel website. Thus, the court dismisses the trademark infringement claims.

    Interestingly, the role of the searcher was also reviewed in a case between Vancouver Community College and Vancouver Career College. Vancouver Community College sued for trademark infringement, on the basis of the rival college using “VCC” as part of a search-engine optimization and keyword advertising strategy. While this recent decision (Vancouver Community College v. Vancouver Career College (Burnaby) Inc., 2015 BCSC 1470 (CanLII)) didn’t deal directly with metatags, it dealt with the use of trademarks in Google AdWords, and the court noted: “The authorities on passing off provide that it is the ‘first impression’ of the searcher at which the potential for confusion arises which may lead to liability. In my opinion, the ‘first impression’ cannot arise on a Google AdWords search at an earlier time than when the searcher reaches a website.”

    In other words, it is the point at which a searcher reaches the website when this “first impression” is gauged. Where the website is clearly identified without the use of any of the competitor’s trademarks, then there will be no confusion.

    This helps clarify the laws around the use of metatags and Google AdWords; it also leaves open the possibility that metatags, in other circumstances, could qualify for copyright protection.

    Calgary – 07:00 MT

    1 comment

    Court of Appeal Upholds Injunction Against Google (Equustek Solutions Inc. v. Google Inc.)

    .
    By Richard Stobbe

    Apparently Google does not appreciate being ordered by a Canadian court to remove worldwide search results. In Update on Injunction Against Google (Equustek Solutions Inc. v. Google Inc.) we reviewed a 2014 decision in which Google was ordered to de-index certain offending websites which were selling goods that were the subject of an intellectual property (IP) infringement claim (that decision was Equustek Solutions Inc. v. Jack, 2014 BCSC 1063 (CanLII)). Google appealed that decision to the B.C. Court of Appeal.

    Last week, in Equustek Solutions Inc. v. Google Inc., 2015 BCCA 265, the B.C. Court of Appeal upheld the original order.

    In the underlying action, Equustek alleged that Mr. Jack and Datalink Technologies designed and sold product which infringed the IP rights of Equustek. The original lawsuit was based on trademark infringement and misappropriation of trade secrets. Equustek successfully obtained injunctions prohibiting this original infringement. The infringement, however, continued through a variety of websites, and relying on search engines (such as Google) to attract customers. Equustek obtained another injunction prohibiting Google (“the world’s most popular search engine” – those are the court’s words) from delivering search results which directed customers to the offending websites.

    Google appealed, arguing that this injunction was overreaching since it was beyond the Canadian court’s jurisdiction. After all, Google has no employees, business offices, or servers within British Columbia. The appeal court observed that Google’s “activities in gathering data through web crawling software, in distributing targeted advertising to users in British Columbia, and in selling advertising to British Columbia businesses are sufficient to uphold the chambers judge’s finding that it does business in the Province.” The court, therefore, was entitled to assert jurisdiction over Google even though it was not a party to the underlying litigation. Put another way, “the underlying litigation clearly has a “real and substantial connection” to British Columbia. Equally, Google’s services, which provide a link between the defendant’s products and potential customers, are substantially connected to the substance of the lawsuit.”

    The court drew a parallel with a recent English case, Cartier International AG v. British Sky Broadcasting Limited, [2014] EWHC 3354 (Ch.), where Cartier sought an injunction against a number of ISPs in the UK in order to block access to the offending websites which sold counterfeit Cartier products. The court granted the order in that case.

    The B.C. court rejected a creative free-speech argument (the argument that the injunction may have the effect of stifling freedom of expression from the blocked websites). (“There is no evidence that the websites in question have ever been used for lawful purposes, nor is there any reason to believe that the domain names are in any way uniquely suitable for any sort of expression other than the marketing of the illegal product.”)

    The court also gave short shrift to the argument that the injunction should be restricted to “Canadian” results from google.ca as opposed to an injunction with worldwide effect (“…an order limited to the google.ca search site would not be effective.”)

    If Google successfully appeals this decision, it will undoubtedly attract even more intervenors and will provide an opportunity for Canada’s top court to clarify the law in this area.

    Need assistance with intellectual property disputes and internet law? Get advice from experienced counsel.

    Calgary – 07:00 MDT

    No comments

    Outsourcing by Canadian Companies after the USA PATRIOT Act

    capture2.JPGBy Richard Stobbe

    Wondering about outsourcing your data to the U.S.? What follows is an update to one of our most popular posts: Outsourcing by Canadian Companies: Another Look at the USA PATRIOT Act, originally written in January 2013.

    In that post, we discussed the concern that U.S. government authorities may use the provisions of the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (“PATRIOT Act”) to access the personal information of Canadians where that information is stored in the United States in the context of outsourcing or cloud-computing.

    We also noted that for private sector businesses there are no specific legal prohibitions on outsourcing to the United States in light of the PATRIOT Act, provided (1) reasonable safeguards are built into the outsource contract (including confidentiality, use-restrictions, security, and provisions to meet monitoring and audit requirements), and (2) customers are notified in a clear way when their personal information will be stored or handled outside Canada. The only exceptions to this are within the public sector, as reviewed in our earlier post.

    What Has Changed and What Remains the Same

    This is a complicated area of law. Starting in June 2013, Edward Snowden’s revelations about N.S.A.’s pervasive warrantless surveillance programs triggered a broader debate about privacy, as well as the specific risks of outsourcing to U.S. companies.

    Certain provisions of the PATRIOT Act expired under a sunset clause on June 1, 2015. The U.S. Congress passed the USA FREEDOM Act on June 2, 2015 (in keeping with the American penchant for legislative acronyms, the full name is “Uniting and Strengthening America by Fulfilling Rights and Ending Eavesdropping, Dragnet-collection and Online Monitoring Act“).

    The USA FREEDOM Act restores many of the expired provisions of the PATRIOT Act through 2019. Some provisions of the Foreign Intelligence Surveillance Amendments Act will expire in 2017 (including Section 702, a provision which underpins some of the N.S.A.’s bulk surveillance of online communications). Under the FREEDOM Act, certain sections of the Foreign Intelligence Surveillance Act of 1978 were amended in an effort to delimit the NSA’s mass data collection programs. However, the restrictions on bulk data collection don’t take effect for 6 months after the USA FREEDOM Act is enacted. There is also a carve-out to permit the government to obtain FISA orders during this 180-day period. The effect of this is unclear, but commentators have speculated that during this 6-month grace period the N.S.A. can continue bulk collection, and obtain FISA orders which are not constrained by the requirement for a “selection term”.

    Furthermore, bulk collection of phone data is not necessarily coming to an end – arguably, it is merely being delegated to the telecoms: “The Freedom Act does take the bulk collection of Americans’ telephone records out of the hands of the National Security Agency and leaves those records with the phone companies; it sets up procedures for the NSA to get access to those records when it wants to.

    The new law does introduce reforms for oversight of government surveillance. In a nod to transparency, some FISA Court opinions may become available, and technology companies will have the ability to publicly report the number of government surveillance requests or investigation inquiries they receive. Previously, companies were prohibited from reporting that such requests had been received.

    Generally, under the FREEDOM Act, indiscriminate bulk data collection is to be reformed by requiring the use of “specific selection terms”. In other words, government agencies such as the NSA must use a search term – the name of a specific person, account, address, or personal device, or any other specific identifier – to limit the scope of data collection “to the greatest extent reasonably practicable”.

    In 2004, after the initial flurry of anxiety about US government surveillance under the PATRIOT Act, the Privacy Commissioner of Canada noted: “The [PATRIOT] Act is simply one example of a law that can give the United States government or its agencies access to personal information about Canadians that has been transferred to the United States. Research done by the Office of the Privacy Commissioner and discussions with the Department of Justice suggest that the USA PATRIOT Act is not likely in the normal course of events to be used to obtain personal information held in the United States about Canadians.” (Emphasis added)

    In light of the 2013 Snowden revelations (and the 2007 Mark Klein disclosures), we now know that, in fact, the bulk collection of phone and internet data by the N.S.A. would have resulted in a lot of personal information about Canadians being collected by the N.S.A. in the United States through the N.S.A.’s PRISM, ECHELON and related surveillance programs.

    Data access by Canadian or American government authorities in the course of investigations is not new. Don’t forget that the PATRIOT Act itself was merely an amendment and expansion to a series of existing government investigation tools which were already part of U.S. law, such as the Electronic Communications Privacy Act, Computer Fraud and Abuse Act, Foreign Intelligence Surveillance Act, Money Laundering Control Act and the Bank Secrecy Act. Going back even further, NSA’s cooperation and information-sharing with Canadian security agencies actually dates to the 1940s (see: the UK-USA Agreement). However, the sheer scope, breadth and depth of surveillance was new.

    The Americans are not the only ones who carry on surveillance. There are a number of Canadian laws that enable police, security agencies and government investigators to obtain access to information held in Canada in the course of an investigation. And as in the U.S., Canadian security agencies have also been caught exceeding the legal limits on their online surveillance (see X (Re), 2013 FC 1275; aff’d 2014 FCA 249, where the Federal Court and Federal Court of Appeal decided that CSIS breached the duty of candour owing to the Court in seeking and obtaining search warrants fro surveillance on Canadians outside Canada).

    Canadian police and security agencies can also obtain information held in the U.S., just as American security agencies can obtain records held in Canada through information-sharing agreements, protocols and a bilateral treaty between the United States and Canada known as the Mutual Legal Assistance Treaty (the “MLAT”). Other countries have similar investigative powers.

    While the Americans are making some modest reforms to their surveillance laws, Canadian authorities are actually expanding their reach; the Anti-terrorism Act, 2015 (Bill C-51) was passed on June 9, 2015, and is awaiting royal assent. This new law expands the information-gathering powers between CSIS, police investigators and other Canadian government agencies.

    Further, the effect of so-called “boomerang routing” means that online information flowing between a Canadian sender and Canadian recipient is still often routed through the US. (See: IXMaps.ca) Thus, even where data is not physically stored in the US, it may be caught by ongoing N.S.A. surveillance at the point the data traverses through an internet exchange point located within the United States.

    Conclusion

    As a matter of risk-assessment for Canadian companies outsourcing data to cloud-computing service providers, should you be concerned that your (or your customers’) Canadian online data will be subject to access by the U.S. government?

    1. We know that for Canadian private sector businesses there are still no legal prohibitions against outsourcing data to the United States (note that the public sector is treated differently);

    2. Best practices still dictate that (a) reasonable safeguards should be built into the outsource contract (including confidentiality, use-restrictions, security, and provisions to meet monitoring and audit requirements), and (b) customers should notified in a clear way when their personal information will be stored or handled outside Canada.

    3. There can be no doubt that surveillance practices under the (old) PATRIOT Act resulted in the mass indiscriminate collection of internet and phone data for many years (and very likely continues within the 6-month period after enactment of the FREEDOM Act). It appears very likely that Canadian data outsourced to the U.S. was subject to bulk collection by the N.S.A. Due to “boomerang routing”, it appears likely that even data stored on servers located within Canada often flows through internet exchange locations within the U.S., and therefore would be susceptible to bulk collection by the N.S.A. The USA FREEDOM Act (which is really the PATRIOT Act 2.0) does impose some mild but important reforms on the scope of N.S.A. surveillance. If bulk data and phone-record collection is actually curtailed, the ongoing risk is associated with “targeted” or “selection term” access, in situations where government security and law enforcement agencies exercise rights of accessing and monitoring online data in the course of investigations of a “specific person, account, address, or personal device” in the U.S. It is worth noting that this ongoing risk of access is similar on both sides of the Canada/U.S. border, since Canadian security and law enforcement agencies have similar powers of investigation, and the two governments can rely on MLAT requests and other information sharing protocols to share data.

    When you weigh the issues and risks associated with outsourcing Canadian data to the U.S., consider these points and seek advice from experienced IT and privacy counsel.

    Further reading: Law, Privacy and Surveillance in Canada in the Post-Snowden Era.

    Calgary – 07:00 MDT

    No comments

    Competing After Employment (Part 2)

    .
    By Richard Stobbe

    A few weeks ago, Jawbone, a fitness tracking hardware and software maker, sued its arch-rival Fitbit, alleging that Fitbit lured its employees away to obtain access Jawbone’s confidential information and product plans. How would this play out in Canada? In our earlier post (Competing After Employment (Part 1)) we considered a case in which the employer could not describe the confidential information with enough specificity and detail, and the employer was unable to get its injunction form the court.

    In Brandt Engineering Products Ltd v Rockford Engineering Works Ltd., 2014 SKQB 339 (CanLII), the employer enjoyed a different result.

    After several employees left BEPL to join a competitor, BEPL sued its competitor alleging that the former employees of BEPL each breached their fiduciary duties, breached confidence, and breached their employment contracts, among other things. BEPL sought an injunction to prevent the use of confidential information by the ex-employees and their new employer.

    The court noted that “each of these individuals were either professionals or they were engaged in doing, assisting or supporting the work of the professional/design team at BEPL. I am satisfied from the evidence that each of them would have been aware of the confidential and proprietary nature of the designs, processes, customer and supplier lists and generally and specifically financial, organizational and technical information respecting BEPL and its operations. Whether by virtue of their employment contracts, their status as professionals, the confidentiality and proprietary notices which much of BEPL’s documentation contained, or the role that each of the individual defendants played as members of the design group at BEPL, each could not help but be aware of and recognize the confidential and proprietary nature and character of much of the information to which they had access and were privy.” (Emphasis added)

    It was discovered during the course of the lawsuit that the ex-employees had downloaded or removed various confidential documents (“approximately 9,713 documents” burned onto discs and a “banker’s box of BEPL materials”) and provided some of this information to the new employer, BEPL’s competitor.

    The court granted the injunction restricting the ex-employees and their new employer from using confidential information and upholding the non-solicitation covenants. The court made a few important points which bear repeating:

    1. “Where employees have a non-competition clause in their contract of employment or they are determined to be employees having fiduciary obligations – the employee has a continuing duty to maintain confidences for a reasonable period of time and the employee is not permitted to actively solicit the former employer’s customers nor to use confidential information to the employee’s own employment advantage…”

    2. “An interim injunction should not issue for the sole purpose of eliminating competition or effectively reducing it. In cases such as this, the purpose of the injunction is to constrain improper competition — that is to say the use or potential use by former employees of confidential and proprietary information, the property of and acquired from a previous employer to whom the employees owe a fiduciary duty of confidentiality, to compete with that employer.”

    3. It is also worth noting that:
    – the terms of the employment agreements as well as internal confidentiality notices helped bolster the argument that these ex-employees were aware of their confidentiality obligations, and
    – the evidence of misappropriation of specific documents avoided the problem in the JTT Electronics case regarding the need to describe the confidential information with enough specificity and detail.

    In summary, this case succeeded in enjoining improper competition by departing employees. Get advice on departing employees, restrictive covenants and intellectual property protection from experienced counsel.

    Calgary – 07:00 MDT

    No comments

    Employee Ownership of Patentable Inventions

    By Richard Stobbe

    A startup in the oil-and-gas service sector sought to improve downhole well stimulation technology. After a few years, differences between the three founders culminated in the ouster of Mr. Groves, one of the founders. Mr. Groves was removed as President and then his employment was terminated. The company had, during those few years, filed for patent protection on a number of inventions which were invented by Mr. Groves. After his termination, he promptly sued his former employer based on a claim of ownership of those inventions which were created during the course of his employment.

    In the recent decision in Groves v Canasonics Inc., 2015 ABQB 314 (CanLII), the court noted that the employment agreement between Mr. Groves and Canasonics included the following condition:

    “The Company shall own any and all Copyright and Intellectual Property created in the course of Employment. Further, in the event there is a period when the Employee might be considered an independent contractor, all Copyright created and any Intellectual Property created shall be owned by the Company.” The Court had no trouble in concluding that the inventions were patented in the U.S. and Canada by their inventor, Mr. Groves in his capacity as an employee, who then assigned the inventions to Canasonics as the employer pursuant to terms of the employment agreement.

    The lesson for business in any industry is clear: ensure that your employment agreements – and by extension, independent contractor and consulting agreements – are clear. Intellectual property and ownership of inventions should be clearly addressed. Get advice from experienced counsel to ensure that the IP legal issues are covered – including confidentiality, consideration, invention ownership, IP assignment, non-competition and non-solicitation.

    Calgary – 07:00 MDT

    1 comment

    Reverse Engineering Cloud-Based Software

    .
    By Richard Stobbe

    Let’s say you provide web-based software in a SaaS subscription model. What if your reseller or strategic business partner works against you to redesign and reverse engineer your software so they can launch a competing product?

    This is what happened to Warehouse Solutions (WSI) in the recent U.S. case Warehouse Solutions, Inc. v. Integrated Logistics, LLC (May 8, 2015, Fed. CA 11th Cir.). WSI developed and sold a web-based software product known as “Intelligent Audit” which interfaced with UPS and FedEx tracking systems to allow companies to track and manage packages. Integrated acted as a reseller of “Intelligent Audit”, but was also a competitor to WSI, in the sense that Integrated sold its own package-tracking software. The reseller relationship between WSI and Integrated, however, was never documented in a written agreement. The parties had verbal discussions about the confidential and proprietary nature of the “Intelligent Audit” software.

    Although Integrated never had access to the source code for “Intelligent Audit”, it had high level administrator access rights to the software, and therefore had much broader insight into the features, functionality and structure of the software, compared to the typical end-user.

    On the side, unknown to WSI, Integrated developed its own web-based package-tracking software product that was visually and functionally similar to “Intelligent Audit”. Integrated even went so far as to give its own software developer access to “Intelligent Audit”. Eventually, Integrated dropped “Intelligent Audit” and began selling its own competing product under the ShipLink brand name.

    WSI then sued Integrated for reverse engineering and copying its software, and through various court proceedings, the claims came down to the issue of trade secrets. The court drew a distinction between a software program’s underlying source code, which may be a trade secret, and the program’s “look and feel” and “functionality,” which cannot be protected as a trade secret, since these features are readily apparent to any user. Since WSI did not enter into a written confidentiality agreement with Integrated, the trade secret claim failed, and WSI’s claim was dismissed.

    Lessons for business?

    1. It’s worth noting that this case turns largely on U.S. concepts of “trade secret” protection under the Trade Secrets Act, and there is no equivalent legislation in Canada. Canadian software vendors are frequently bound by local U.S. laws in their dealings with American customers, resellers and strategic partners, so this case is an important one for Canadian SaaS providers, even though it involves U.S. law.

    2. There are situations – such as in AirWatch, LLC v. Mobile Iron, Inc., (Unpublished) No. 1:12-cv-3571 (N.D. Ga. Sept. 4, 2013) – where a software licensor can protect its software as a trade secret, where it uses written agreements to clearly preserve the secrecy of the program’s functions and specifications.

    3. Overall, the message for software vendors and SaaS providers is that clear written agreements will always be preferable to handshake deals and verbal warnings about confidentiality.

    Calgary – 07:00 MDT

    No comments

    Canadian Copyright Term Extensions

    By Richard Stobbe

    As we noted in our earlier post (See: this link) the bill known as Economic Action Plan 2015 Act, No. 1 was tabled in the House of Commons on May 7, 2015. It passed Second Reading in the House of Commons on May 25th and is now with the House of Commons Standing Committee on Finance.

    The bill proposes to amend the Copyright Act to extend the term of copyright protection for sound recordings and performances fixed in sound recordings.

    Copyright in a sound recording currently subsists until the end of 50 years after the end of the calendar year in which the first fixation of the sound recording occurs. However, if the sound recording is published before the copyright expires, then copyright protection would be extended to the earlier of the end of 70 years after the end of the calendar year in which the first publication of the sound recording occurs and the end of 100 years after the end of the calendar year in which that first fixation occurs.

    The bill is expected to pass. Stay tuned.

    Calgary – 07:00 MDT

    No comments

    What, exactly, does industrial design protect?

    By Richard Stobbe

    What, exactly, does industrial design protect? The recent decision Zero Spill Systems Inc. v. Heide, 2015 FCA 115, reviewed this question. In the trial level decision, Zero Spill sued a competitor for infringement of Canadian Industrial Design No. 86,793 (the ’793 Design), based on the competitor’s sales of a similar-looking tray. The ‘793 Design protected a fluid containment tray for use in oil field operations. The Federal Court decided that there was no infringement because many features of the ’793 Design were in some way functional, and were therefore unprotectable under the Industrial Design Act by virtue of section 5.1(a) of the Act. The court of appeal reversed in part and clarified:

    1. First, the Court made it clear that the right to sue for industrial design infringement depends on registration. Without a registered industrial design, there can be no basis for infringement. With a registered design, the law recognizes a presumption of validity. In other words, a presumption that the registered industrial design complies with the Act.

    2. Secondly, it is worth noting that this presumption favours the owner, and places the onus on the alleged infringer to plead invalidity. If invalidity is not raised in the defence, and evidence is not raised on the issue of invalidity, then the court cannot make a determination of invalidity.

    3. Third, the Court said clearly that “functional features of an industrial design may be protected by the Industrial Design Act.” Looking at section 5.1(a) of the Act, it is clear that features that are dictated solely by a utilitarian function of the article are ineligible for protection. Therefore, “features may be simultaneously useful and visually appealing.” The Court went so far as to say that Industrial Design Act would serve no purpose if it did not protect functional features. Only those features whose form are dictated solely by function are not protected.

    Talk to experienced IP counsel at Field Law for advice on exploring the possible advantages of industrial design protection for your products.

    Calgary – 07:00 MDT

    1 comment

    Trade Dress Updates: “Beauty” does not cut it

    By Richard Stobbe

    A recent decision of the US Federal Court (see: Apple, Inc. v. Samsung Electronics Co., Ltd. May 18, 2015) reviewed the jury decision in Apple’s famous infringement lawsuit against Samsung. You may recall that Apple’s 2011 lawsuit alleged that Samsung infringed Apple’s utility patent rights, design patents, and trade dress rights.

    See our previous posts here Pinch and Zoom: Apple vs. Samsung and here Apple and Samsung: The Design Patent Wars Continue.

    In the latest decision, the Federal Court left the design and utility patent verdicts untouched, but knocked down the finding of trade dress infringement, on the basis that trade dress cannot protect functional elements of the design.

    The court observed that “Apple emphasizes a single aspect of its design, beauty, to imply the lack of other advantages. But the evidence showed that the iPhone’s design pursued more than just beauty.” In its conclusion, the court noted: “Apple has failed to show that there was substantial evidence in the record to support a jury finding in favor of non-functionality for the unregistered trade dress … Apple fails to rebut the evidence that the elements in the unregistered trade dress serve the functional purpose of improving usability. Rather, Apple focuses on the ‘beauty’ of its design, even though Apple pursued both ‘beauty’ and functionality in the design of the iPhone.” Accordingly, the court reversed the jury’s verdicts on the unregistered and registered trade dress claims.

    Watch for our upcoming updates on Canadian industrial design law.

    Calgary – 07:00 MDT

    No comments

    Patent Licensee’s Standing to Sue for Infringement

    By Richard Stobbe

    Although you might not think so, given the proliferation of litigation, courts are actually very particular about who can bring a lawsuit. In order for a plaintiff to file a lawsuit, it must have ‘standing’ or put another way, “A court may exercise jurisdiction only if a plaintiff has standing to sue on the date it files suit.” A recent US case examined when a patent licensee has standing to sue for patent infringement.

    According to the US court in Luminara Worldwide, LLC v. Liown Electronics Co.: Even if the patent holder does not transfer formal legal title, the patent holder may effect a transfer of ownership for the purposes of standing in a lawsuit if it conveys “all substantial rights in the patent to the transferee.” One of those “substantial rights” must include an “exclusive license” to practice the patent in question. In the event that a licensee obtains an exclusive license and all substantial rights, then the licensee is effectively treated just like a patent owner, and has standing to sue for infringement in its own name.

    When negotiating patent licenses, ensure that you pay attention to the grant of rights. Do you intend to grant rights to permit the licensee to sue in its own name, or should that right be reserved to the patent owner / licensor?

    In Canada, compare the finding of the Federal Court in the copyright context in Milliken & Co. v. Interface Flooring Systems (Canada) Inc.(FC): “A non-exclusive licensee does not derive any right, title or interest in the copyright that could give it the standing to sue. It has no right to sue alone in a copyright infringement action.”

    Calgary – 07:00 MST

    No comments

    Apple Watch Design Patent

    By Richard Stobbe

    applewatchcapture.JPG
    As we reviewed in our previous post – Industrial Design as a Competitive Tool – the value of strategic industrial design protection (also called a “design patent” in the US) should not be underestimated.

    Yesterday, the USPTO issued a registration for the Apple Watch, which provides protection for a term of 14 years in the US. US design patents which are registered based on applications filed after May 13, 2015 will have a 15-year term. That would be 10 years if registered in Canada, though this term is soon to increase to 15 years once the changes to the Canadian Industrial Design Act come into force. Remember, industrial design law in Canada protects the visual features of shape, configuration, pattern or ornamentation which are applied to a product. Functional elements are not protected. For protection, registration is required. While it is likely that Apple has filed a corresponding Canadian application, such a filing would most likely be based upon the US registration.

    Will this be enforced against competitors? Probably – don’t forget that industrial design infringement formed the basis of successful recent claims by Blackberry (BlackBerry sued Typo Products LLC for infringement of U.S. Design Patent No. D685,775) and by Apple (Apple sued Samsung for infringement of Apple’s D504,889 design patent).

    Talk to experienced IP counsel at Field Law for advice on exploring the possible advantages of industrial design protection for your products.

    Calgary – 08:00 MST

    No comments

    Privilege for IP Advisors in Canada

    It’s budget time… therefore, time for changes to Canada’s IP laws!

    No, there is no logical connection between the two, but that seems to be how the government functions these days (the last budget brought in major changes to Canada’s patent and trademark laws without any consultation, but hey, who’s keeping track of these things anyway?). The Intellectual Property Institute of Canada has noted that the latest budget bill has introduced statutory privilege for communications between IP advisors and their clients.

    “With this,” IPIC notes, “Canadian businesses are better assured that they can speak openly with their intellectual property advisors in order to obtain the best possible advice, knowing that these conversations will not be revealed to their competitors through a court process or litigation.”

    Calgary – 07:00 MST

    No comments

    Copyright in Survey Plans

    By Richard Stobbe

    As a follow-up to our earlier post about Copyright in House Plans, an class action case is proceeding in Ontario on the subject of ownership of copyright in survey plans (See:  Ontario land surveyors can sue land registry managers for copyright infringement, court says).

    In the course of their work, land surveyors in Ontario prepare a survey document, and that document is routinely scanned into the province’s land registry database. Copies of survey documents can be ordered from the registry for a fee. The Ontario Court of Appeal has certified a class action which permits the province’s land surveyors to continue their copyright lawsuit against Teranet Inc., the manager of the land registry system. The case is Keatley Surveying Ltd. v. Teranet (Case No. cv-10-414169).

    Calgary – 07:00 MST

    1 comment

    Amendments to Canadian Intellectual Property Laws by 2017

    - 

    By Richard Stobbe

    The Canadian Intellectual Property Office has indicated that the amendments to the Trade-marks Regulations (and in particular the accession to international trademark treaties), the amendments to the Industrial Design Regulations and amendments to the Patent Rules will not be finalized until later 2016, and possibly as late as 2017.

    A note on the CIPO website says that stakeholders will have the opportunity to comment when the proposed amendments/regulations are pre-published in Canada Gazette, Part 1 (expected late 2016). If the proposed regulations are published in late 2016, then the regulations will not be finalized until 2017 at the earliest.

     

    Calgary – 07:00 MST

    No comments

    Online Infringement & Norwich Orders: Best Practices

    By Richard Stobbe

    When a copyright owner suspects online infringement, but lacks evidence of the identity of the alleged infringers, it can seek an order to disclose those details. Canadian law is clear that “A court order is required in every case as a condition precedent to the release of subscriber information.”

    A Norwich order is a “litigation tool requiring non-parties to a litigation to be subject to discovery or being compelled to provide information.” In a recent case, Voltage Pictures LLC v. John Doe, 2014 FC 161, a decision released in February, 2015, this tool was used by the Plaintiff (Voltage) to obtain the names and addresses of some 2,000 subscribers of an ISP known TekSavvy Solutions Inc.

    Teksavvy said it would only disclose subscriber information if Voltage obtained a court order compelling disclosure. Voltage did obtain its so-called Norwich order, and Teksavvy was compelled to release subscriber information to Voltage, with some controls.

    Then Voltage and Teksavvy argued about who should bear the costs for correlating and compiling the subscriber info. The resulting court opinion in Voltage Pictures LLC v. Teksavvy Solutions Inc. 2015 FC 339, makes for interesting reading (if you’re into this sort of thing) regarding best practices for copyright owners and ISPs to manage costs:

    • The copyright owner should first ascertain, in advance “with clarity and precision”, the method used by the ISP to correlate IP addresses with subscriber information, and the investment in time and costs based on a hypothetical number of IP addresses. In other words, the copyright owner should ask the ISP: “What methods do you use, how long would it take and how much would it cost if we wanted you to correlate 100 or 1000 IP addresses?”
    • Next, the copyright owner and ISP should agree on these timelines and costs in advance (in writing if possible) before the copyright owner files and serves its motion for a Norwich order.
    • For smaller ISPs, the copyright owner should not make the assumption that the smaller ISP will handle IP address and subscriber info in the same way as larger ISPs, where such processes are likely automated.

     

    Calgary – 07:00 MST

     

    No comments

    Competing After Employment (Part 1)

    - 

    By Richard Stobbe

    A key employee departs. The employer, worried that confidential information has leaked out of the company, scrambles to respond. After a frenzied period of preparation, the employer starts a lawsuit and seeks an injunction against the ex-employee.

    In these two recent Canadian cases, those same basic facts apply but with very different results. First, let’s look at the BC case decided in December 2014 (JTT Electronics Ltd. v. Farmer, 2014 BCSC 2413). In that case, the employer sued the ex-employee and the employee countered with an argument that the employer could not actually identify the confidential info it sought to protect.

    The Court agreed, noting: “The need to identify with some reasonable degree of specificity what a plaintiff asserts is confidential or proprietary serves three important and related functions.” To summarize:

    1. It enables the ex-employee to respond to the lawsuit, and to bring into question whether the purported confidential information is actually confidential or whether it is information that is in the public domain.
    2. If the employer can establish that specific information in its possession is confidential, and the remaining elements of an injunction are made out, the ex-employee can understand (by virtue of the court order) what it is that he or she can or cannot do.
    3. Unless there is a “reasonable level of precision or definition”, it is difficult or impossible for the court to enforce the order.

    Because the employer could not describe the confidential information with enough specificity and detail, the order was not granted.

    Next, the non-solicitation and non-competition clauses which purportedly bound the ex-employee were, by the court’s analysis, “undefined”, “ambiguous”, “overly broad”, since they appeared to impose a worldwide ban which imposed a “blanket prohibition of unlimited geographic scope on any post-employment competition” by the ex-employee. On that basis, the Court refused to grant an order to enforce these restrictive covenants. 

    Lessons for business?

    • “Confidential information” is broadly understood to be “anything that is valuable because it is secret to the company.” But in the case of an injunction application, courts will require a clear, specific definition of what exactly constitutes confidential information in this case, as it relates to this company and this ex-employee. While the definition in the underlying agreement – for example, a confidentiality agreement, non-disclosure agreement, employment agreement or even a shareholders agreement – is likely to remain broad, the specificity must come into play at the point where the court order is sought.
    • Ensure that non-competition restrictions are carefully drafted, are reasonable in their scope, and consistently use defined terms. For example, in this case, the defined term “Business” was given a particular meaning in one section, but the seemingly generic term “business” was used in another section. This caused the court to question why the two terms would be different, and merely added to the court’s finding of ambiguity.

     

    Calgary – 07:00 MST

    No comments

    What Happens When a Franchise Agreement Ends, Part Two: Cancellation

    By Richard Stobbe 

    In some cases, a franchise relationship ends after many years of business. At the point of termination, the parties must wrestle with a number of issues, including customers, inventory, and (as we reviewed in Part 1) the impact of any post-termination restrictive covenants.

    In other cases, however, the franchise relationship barely gets off the ground. Remember, Section 13 of the Alberta Franchises Act states that, if a franchisor fails to give a prospective franchisee a complete “disclosure document,” then the franchisee may rescind (or cancel) the franchise agreement and end the relationship. However, the franchisee must send the cancellation within certain time limits: either 60 days after receiving the disclosure document, or within 2 years after the franchisee is granted the franchise, whichever occurs first.

    A failure to give complete disclosure allows the franchisee to cancel. So what does it mean to give complete disclosure?

    Under the Act, a franchisor must make a number of disclosures, including (but not limited to):

    • Basic information about the name and address of the franchisor and the length of time the franchisor has operated the business;
    • The names of the directors, general partners and officers of the franchisor who will have management responsibilities;
    • Details on convictions for the previous 10 years relating to the franchisor and its associates, and any of the directors, general partners and officers of the franchisor;
    • Lawsuits or pending lawsuits involving misrepresentation, and unfair or deceptive acts or practices;
    • Details of any bankruptcy or insolvency proceedings, voluntary or otherwise;
    • The names, mailing addresses and phone numbers of all existing franchisees presently operating an outlet in Alberta under the same trade name as the franchise being offered, and the addresses and phone numbers of those outlets; and
    • Financial statements of the franchisor, among other information.

    If proper disclosure is not made, a franchisee may cancel and recover any net losses incurred in acquiring, setting up and operating the franchised business.

    In 1448244 Alberta Inc. v. Asian Concepts Franchising Corporation, 2013 ABQB 221 (CanLII), an Alberta court reviewed a franchisee’s claim that it did not receive proper disclosure. Specifically, the franchisee alleged that the disclosure document was deficient and therefore not ‘substantially complete’ within the meaning of the Act because the document was signed by only one director. The Regulations are clear that a disclosure document must include a certificate that is to be signed by at least two officers or directors of the franchisor. The fundamental question: Does the lack of two signatures to the disclosure document provided by the franchisor mean that it is not ‘substantially complete’ within the meaning of the Act?

    Described another way: the substance of the disclosure document itself was not challenged in this case. The only complaint was that the certificate, which accompanies the disclosure document, was only signed by one, instead of two, directors.

    The Alberta Court of Appeal reviewed this situation in 2008 in the Hi Hotel case. In that case, the certificate accompanying the disclosure document contained no signatures, and was therefore found not to be “substantially complete” within the requirements of the Act. In the Asian Concepts decision, the Court concluded that a disclosure document with only one signature was deficient, since it deprived the franchisee of a potential cause of action against a second signatory to the disclosure document. This finding opened the door for the franchisee to recover losses incurred in acquiring, setting up and operating the franchised business. The Court confirmed: “…the lack of misrepresentation, or the lack of reliance on representations, are irrelevant to the issue at hand. What matters is whether the disclosure document which was provided was substantially complete or not. And when the statute requires two signatories responsible for and liable for the required disclosure, yet only one is provided, the disclosure statement cannot be said to be ‘substantially complete.’ This is plain and obvious.”

    What are the lessons? Franchisors in Alberta should take care to ensure that the disclosure document follows the strict requirements of the Act and Regulations, both as to form and substance. Seemingly minor gaps in compliance can result in serious consequences for the franchisor. Franchisees, on the other hand, will be reviewing compliance with a careful eye in situations where the franchisee wishes to extricate itself and end the relationship. Of course, both parties should always seek appropriate legal advice when entering into and concluding franchising relationships in Alberta.

    No comments

    Enforcing Keyboard Patents (BlackBerry v. Typo)

    .
    By Richard Stobbe

    A year ago, BlackBerry sued Typo Products LLC for patent infringement, based on the design of a snap-on keyboard. Typo’s physical keyboard was designed to attach to an iPhone, in order to mimic a BlackBerry-style QWERTY keyboard. The design was, in BlackBerry’s view, imitation that went beyond flattery and into infringement of U.S. Design Patent No. D685,775 and U.S. Patent No. 7,629,964 (Our original post Can BlackBerry Patent a Keyboard? gives more details).

    A California granted a preliminary injunction (See: Ok… so BlackBerry Can Patent a Keyboard!) which took effect in April, 2014. Typo, after the preliminary injunction took effect, flouted the injunction by selling products, providing warranty replacements, and promoting products which were subject to the court order. In a judgement yesterday, the same California judge ordered Typo to pay BlackBerry $860,600 in sanctions, plus attorneys’ fees and costs incurred in connection with Typo’s contempt of court. See: BlackBerry Limited v. Typo Products LLC, Case No. 14-cv-00023-WHO for the full court order.The broader infringement issues have yet to be decided, and the litigation continues.

    The interesting part of this case is how it illustrates the competitive use of IP protection for incremental improvements – in this case, an improvement to a basic QWERTY design (a design which has been around since the 1800s). It also illustrates the value of IP analysis in the competitive response by Typo. Their designers (undoubtedly working closely with patent counsel), have designed a “Typo 2” product which is not caught by the original injunction.  

    Calgary – 10:00 MST

    1 comment

    Open Source Software: The Costs of Non-Compliance

    By Richard Stobbe

    For software vendors, open source software (OSS) should be treated like a compliance issue – in the same way that corporate, securities or environmental compliance is a concern for many companies. The failure to manage compliance can be costly - just like it would be if a company ignored its environmental or securities compliance obligations. An environmental remediation order or a cease-trade order might result from compliance failures in those other areas.

    What does it look like in the case of OSS compliance failures?

    We need look no further than the Versata litigation which has spawned no less than 5 cases in the US:

    1. Versata Software Inc. f/k/a Trilogy Software, Inc. and Versata Development Group Inc. f/k/a Trilogy Development Group Inc. v. Ameriprise Financial Inc., Ameriprise Financial Services, Inc. and American Enterprise Investment Services, Inc., Case No. D-1-GN-12-003588; 53rd Judicial District Court of Travis County, Texas
    2. Versata Software Inc. v. Infosys, Case No. 1:10cv792, U.S. District Court, Western District of Texas
    3. Versata Software Inc. v. Ameriprise Financial Services Inc. et al., Case No. 1:14-cv-12, U.S. District Court, Western District of Texas, Case No. 1:14-cv-12, U.S. District Court, Western District of Texas
    4. XimpleWare Corp. v. Versata Software Inc., Trilogy Development Group, Inc., Ameriprise Financial, Inc., Ameriprise Financial Services, Inc., Aurea Software, Inc., Case No. 3:13cv5160, U.S. District Court, Northern District of California
    5. XimpleWare Corp. v. Versata Software Inc., Aurea Software Inc., Trilogy Development Group, Inc., Ameriprise Financial Services, Inc., Ameriprise Financial, Inc., United HealthCare Services, Inc., Waddell & Reed, Inc., Aviva USA Corporation, Metropolitan Life Insurance Company, Pacific Life Insurance Company, The Prudential Insurance Company of America, Inc., Wellmark, Inc., Case No. 5:13cv5161, U.S. District Court, Northern District of California (San Jose).
    6. In a nutshell, the lawsuits centre around the use of an open source component in Versata’s Distribution Channel Management (DCM) software. Versata originally sued Ameriprise for breach of a software license agreement for the use of the DCM software. In the course of that litigation between Versata and Ameriprise, it became clear that there were significant underlying issues related to an XML-parsing component called VTD-XML, distributed by XimpleWare

      While XimpleWare does offer VTD-XML under a “closed” commercial license, Versata had not obtained a commercial license for the component, and thus the component was governed by GPLv2, an open source license.  This in turn laid bare the gaps in Versata’s OSS compliance and raised questions of whether the DCM was a derivative, making the whole of Versata’s proprietary code subject to the GPLv2. XimpleWare, for its part sued Versata, Ameriprise and all of Versata’s DCM customers based on breach of the GPLv2 and patent infringement.

      We will be watching whether any judicial guidance comes out of this US litigation. In the meantime, it serves as a cautionary tale for software vendors: OSS compliance must be addressed with the same attention and diligence as a regulatory compliance issue.

    Our group can assist with compliance and risk mitigation, leaving software vendors to focus on their business.

    Related Reading: Lawsuit threatens to break new ground on the GPL and software licensing issues 

    Calgary – 07:00 MST

     

     

     

    No comments

    « Previous PageNext Page »