IP Law and Tech “One of the constant themes in the history of British copyright law is that it has been influenced by foreign and international trends and developments” [1]

PREFACE: This post is only discussing cases related to tech in respect of Copyright and Trademarks/Passing Off, I found it difficult to find interesting Patent cases regarding tech.

Copyright

There are many pre-stage tests one must do before asking whether copyright has been infringed. For example, one must first ask whether the subject matter in question is 'original' enough to be protected (the ‘skill, labour and judgement’ test). [2] One must also ask if a 'substantial part' of the work has been copied to amount to infringement. [3] For the sake of keeping this blog post as short and sweet as possible. We will be glossing over these details to focus on the cases and juicy bits.


CDPA 1988, s. 3(1)(b)

Computer programs protected as literary works [4]

  • Even computer-generated works could be protected [5]

CDPA 1988, s. 17 - Infringement by Copying

e.g. IBCOS Computers Ltd v Barclays Mercantile Highland Finance Ltd (copying computer code). [6]

  • Right-holder needs to prove defendant is not simply emulating the function of the program [7]

Includes copies which are transient or are incidental to some other use of the work. [8]

Person will infringe (absent a defence) where e.g. they store work (or other subject matter) on a USB. [9]

CDPA 1988, s. 20 - Infringement by Communication to the Public

Infringing person(s) need to make infringing subject matter 'available to the public'. [10]

  • Includes uploading material onto publicly accessible web. [11]

  • Includes installing peer-to-peer software that allows third parties to access works from the installer’s computer. [12]

  • Does not apply if work is already publicly available? [13]

e.g. Ziggo case [14]

  • Concerned notorious torrent site ‘The Pirate Bay’

  • various acts of indexing and classifying of the torrent files made them 'readily accessible' to users.

  • Pirate Bay’s intervention amounted to infringement by communication. [15]

CDPA 1988, s. 28A - Making of temporary copies

No copyright liability for making temporary copies if:

  • Copies are transient/incidental e.g. caching websites [16]

  • Copies are ‘essential part of a technological process’, ‘no independent economic significance’ [17]
Doesn't include unauthorised streams [18]

CDPA 1988, s. 50A, 50B, 50BA, 50C - Exceptions/Defences

1) Making a back-up copy [19]

  • But not necessary to back-up a computer game. [20]
2) Decompilation [21]

Suggested that this defence helps producers in making systems which are compatible/interoperable [22]

  • Not allowed to decompile for research or study [23]

  • Not allowed if information already readily available [24]

  • Not allowed if decompilation not confined to acts necessary to achieve the permitted objective [25]

  • Not allowed if attempting to create a program that is substantially similar in its expression to the program decompiled, or to do any act restricted by copyright. [26]
3) Observing, studying and testing of computer programs [27]

  • Not permissible if doing so would breach license terms [28]
4) Other acts permitted to lawful users

  • Copying/adapting necessary for lawful use [29] e.g. necessary to correct program error. [30]

CDPA 1988, s. 56 - Transfers of copies of works in electronic form.

  • Transfer is allowed (even if perpetual license instead of a sale), provided the seller destroys their own copy. [31]

CDPA 1988, s. 97A - Injunctions against service providers

EMI Records Ltd v. British Sky Broadcasting Ltd [32]

  • Website indexing BitTorrent files

  • Operators ‘authorising’ infringements of the users
Newzbin [33]

  • Provider was indexing site (active involvement) [34]

  • Newzbin enabled users to download infringing files uploaded by third parties. [35]
Twentieth Century Fox v. Sky UK [36]

  • Website which allowed peer-to-peer users to watch unauthorised streams of films.

Electronic Commerce (EC Directive) Regulations 2002

The idea that ISPs will only be found liable where they have active involvement is reflected in the Electronic Commerce (EC Directive) Regulations 2002 [37]

regs 17, 18, and 19 allow providers 3 actions where they will have immunity from copyright [38]

  • ‘mere conduits’, ‘caching’, and ‘hosting’
They also compel providers to act expeditiously to remove infringing content once they obtain knowledge of its existence [39]

  • But immunity is forfeited if ISP plays an ‘active role' allowing it to be aware of the infringing material. [40]
It is suggested that this immunity 'shields' cloud providers, such as Microsoft’s OneDrive, DropBox, and iCloud [41]

Digital Economy Act 2010

  • Important in this context as it creates an obligation on copyright holders to report infringements to ISPs. [42]

  • It also compels providers to give copyright infringement reports at the request of copyright owners. [43]

CDPA 1988 s. 296 - Devices designed to circumvent copy-protection.

  • ‘Technical devices are those intended to restrict acts that are not authorised by the copyright owner of that computer program and are restricted by copyright’ [44]
1) 296ZA-ZE applies to technological measures for non-computer programs

Sony Entertainment v. Ball [45]

  • Defendants designed and marketed a ‘mod-chip’ for PS2, which bypassed the copy-protection system.
Nintendo v. PC Box [46]

  • The right holder must not deploy technological measures that disproportionately inhibit lawful activities of third parties. [47]

2) 296ZB applies to technological measures for computer programs

3) 296ZG – DRM/ERM – allows copyright owner to prevent removal of rights management information (e.g. metadata) and the further circulation of copies from which such information has been removed.


Encrypted information, which has been made available in the public domain, tends not to be protected.

e.g.

Mars v. Teknowledge [48]

  • 'Anyone with the necessary skill to de-crypt had access to the information', 'mere fact of encryption' does not imply information is confidential. [49]
But, if information has been obtained by illegitimate means, it will be protected. [50]


Trademarks & Passing Off

Trade Marks Act 1994, s 10(2) – likelihood of confusion

Jadebay v. Clarke-Coles Ltd [51]

  • Use of a sign similar to the claimant’s mark as part of Amazon product listings was an actionable misrepresentation.
Louis Vuitton v. Google France [52]

  • Google did not use the mark ‘in its own commercial communication’ - just generating adverts in response to keyword - no infringement - the competing business simply won a bid on the key word
L’Oréal SA v. eBay International AG [53]

  • can the ‘average consumer...ascertain whether the goods or services originate from the proprietor of the trade mark or an undertaking economically connected to it?' [54]


Cyber-Squatting and Trademarks/Passing Off

British Telecommunications v. One in a Million [55]

  • defendant registered domain names such as ‘virgin.com' without the consent of the organisation that owned the goodwill in the names – defendant's aim was to make a profit

  • HELD: act of registering names amounted to an actionable misrepresentation. Injunction given

  • any ‘realistic use of them as domain names would result in passing off’ [56]
French Connection v. Sutton [57]

  • Compare with 'One in a Million' case - Defendant registered ‘fcuk.com’

  • Held: defendant had not registered domain name with a view to passing off.
Easyjet Airline Co. v. Dainty [58]

  • Court may order transfer of domain name if you are found to be passing off a domain name.


References

1. Bently, Sherman, Gangjee, & Johnson, Intellectual Property Law (5th edn, OUP, 2018), 44. [1]

2. Ladbroke v William Hill [1964] 1 All ER 465; see also Infopaq case (2009) [2]

3. Copyright, Designs and Patents Act (CDPA) 1988, s 16(3) [3]

4. see also Trips, Art. 10(1); Software Dir., Art. 1; IBCOS Computers Ltd v Barclays Mercantile Highland Finance Ltd, [1994] FSR 275; Sega Enterprises v Richards [1983] FSR 73 [4]

5. CDPA 1988, ss. 9(3), 12(7), 178 [5]

6. [1994] FSR 275 [6]

7. Navitaire Inc v easyJet Airline Company [2006] RPC 3; see also Nova Productions Ltd v Mazooma Games Ltd . [2007] RPC 25 [7]

8. CDPA 1988, s. 17(6); But, note CDPA 1988, s. 28A (transient copies allowed if temporary copy). [8]

9. Technische Universität Darnstadt v. Eugen Ulmer KG, Case C-117/13, EU:C:2014:2196, [37], [52] (ECJ). [9]

10. CDPA 1988, s. 20(2) [10]

11. Public Relations Consultants Association v. NLA, Case C-360/13, EU:C:2014:1195, [57]. [11]

12. Dramatico Entertainment v. British Sky Broadcasting [2012] EWHC 268 (Ch), [2012] RPC (27) 665, [69] (Arnold J). [12]

13. GS Media BV v. Sanoma Media Netherlands BV et al., Case C-160/15, EU:C:2016:221 [AG54] (AG Wathelet), [48]; (hyperlinks leading to protected works that were freely accessible on another website); see also Svensson v. Retriever Sverige AB, Case C-466/12, EU:C:2014:76 (ECJ), [24]-[30]. [13]

14. Stichting Brein v. Ziggo BV, Case C-610/15, EU:C:2017:456, [38], [45] (ECJ). [14]

15. Ibid, [26]-[36], (ECJ); [AG50] (AG Szpunar); see also Stichting Brein v. Jack Frederik Wullems, Case C-527/15, EU:C:2017:300 (ECJ) (structured menu of hyperlinks on multimedia player helped users to access unauthorised streams.); EMI Records Ltd v. British Sky Broadcasting Ltd [2013] EWHC 379 (Ch), [45]-[46], [52]-[70]. [15]

16. Info. Soc. Dir., Recital 33; see also Bently, Sherman, Gangjee, & Johnson, Intellectual Property Law (5th edn, OUP, 2018), 236. [16]

17. FAPL, Joined Cases C-403/08 and C-429/08 [2011] ECR I-9083 (ECJ, Grand Chamber), [175]-[177] (copies created in the buffer of a broadcast receiver); Newspaper Licensing Agency (NLA) v. Public Relations Consultants Association (PRCA) [2013] UKSC 18; see also Infopaq I, [2009] ECR I-6569; Infopaq International A/S v. Danske Dagblades Forening, Case C-302/10, EU:C:2012:16 (’Infopaq II’); FAPL, Joined Cases C-403/08 and C-429/08 [2011] ECR I-9083 (ECJ, Grand Chamber). [17]

18. Stichting Brein v. Jack Frederik Wullems, Case C-527/15, EU:C:2017:300, [69]-[72] (ECJ) (multimedia device which produced transient and unlawful copies of stream) [18]

19. CDPA 1988, ss 50A [19]

20. Sony Computer Entertainment Inc. v. Owen [2002] EMLR (34) 742; EWHC 742 (defendant reverse engineered Japanese PS2 game to be compatible with region specific PS2). [20]

21. CDPA 1988, ss 50B [21]

22. CDPA 1988, s. 50B(2); see also Bently, Sherman, Gangjee, & Johnson, Intellectual Property Law (5th edn, OUP, 2018), 274; CDPA 1988, s. 81(2) also exempts computer programs from the right to integrity. [22]

23. CDPA 1988, s. 29(4) [23]

24. CDPA 1988, s. 50B(3) [24]

25. CDPA 1988, s. 50B(3)(b) [25]

26. CDPA 1988, s. 50B(3)(d) [26]

27. CDPA 1988, ss 50BA [27]

28. SAS Institute v. World Programming (WPL) [2010] EWHC 1829 (Ch), [290]. [28]

29. CDPA 1988, s 50C(1) [29]

30. CDPA 1988, s 50C(2) [30]

31. UsedSoft GmbH v. Oracle, Case C-128/11, EU:C:2012:407, [78], [87]. See also CDPA 1988, s. 56(2)-(3) ‘any copy, adaptation or copy of an adaptation made by the purchaser which is not also transferred shall be treated as an infringing copy for all purposes after the transfer.’ [31]

32. [2013] EWHC 379 (Ch), [45]-[46], [52]-[70] [32]

33. Twentieth Century Fox Film v. Newzbin [2010] EWHC 608 (Ch), [46], [78], [102]. [33]

34. For more discussion on what amounts to active involvement, see Football Association Premier League v. British Sky Broadcasting [2013] EWHC 2058 (Ch), [2013] ECDR (14) 377, [39]-[42]; for other cases involving s97A see Paramount Home Entertainment International v. British Sky Broadcasting [2014] EWHC 937 (Ch) (Viooz website). [34]

35. See also Metro-Goldwyn-Mayer Studios Inc v. Grokster, 545 US 913, 125 S. Ct. 2764 (2005); A & M Records, Inc. v. Napster, Inc 239 F.3d 1004 (Court of Appeals, 9th Circuit 2001) [35]

36. [2015] EWHC 1082 (Ch). [36]

37. e-Commerce Regs, SI 2002/2013. [37]

38. Ibid, regs. 17, 18, 19 [38]

39. Ibid, regs. 18(b)(v), 19(ii) [39]

40. L’Oréal SA v. eBay International AG, Case C-324/09 [2011] ECR I-6011, EU:C:2011:474, [123] (ECJ, Grand Chamber). [40]

41. Bently, Sherman, Gangjee, & Johnson, Intellectual Property Law (5th edn, OUP, 2018), 1291. [41]

42. Digital Economy Act 2010, s. 3 [42]

43. for Norwich Pharmacal orders, see Golden Eye International Ltd v. Telefónica UK Ltd [2012] RPC (28) 698 (in this case, although information disclosed was regulated by the Court, O2 was forced to disclose information related to 9,000 of its customers who were allegedly infringing copyright via peer-to-peer sharing.); Rugby Football Union v. Viagogo Ltd [2012] 1 WLR 3333, [45] (Lord Kerr of Tonaghmore JSC). [43]

44. CDPA 1988, s. 296(6) [44]

45. [2004] ECDR (33) 323 [45]

46. Case C-355/12, EU:C:2014:25 (ECJ). (non computer program, console itself) [46]

47. Ibid, [32]-[33]. [47]

48. [2000] FSR 138 [48]

49. Ibid, 149-150 [49]

50. Volkswagen Aktiengesellschaft v. Flavio D Garcia and ors [2014] FSR 12, [38] [50]

51. [2017] EWHC 1400 (IPEC); see also Cosmetic Warriors Ltd v. Amazon.co.uk Ltd [2014] EWHC 181 (Ch); Victoria Plum Ltd v. Victorian Plumbing Ltd [2016] EWHC 2911 (Ch) [51]

52. Cases C-236/08-238/08 [2010] ECR I-2417 (ECJ, Grand Chamber) [52]

53. Case C-324/09 [2011] ECR I-6011 (ECJ, Grand Chamber) [53]

54. Ibid, [94]-[104]. [54]

55. [1998] 4 All ER 476 [55]

56. Ibid, 497; see also Phones4U Ltd v. Phone4u.co.uk Internet Ltd [2006] EWCA Civ 244, [2007] RPC 5 (defendant’s misrepresentation is deceptive, passing off); Tesco Stores Ltd v. Elogicom Ltd [2006] EWHC 403 (Ch), [2007] FSR (4) 83 (injunction). [56]

57. [2000] ETMR 341 [57]

58. [2002] FSR 6 [58]