Incontestability is a nearly unique feature of American trademark law, with a unique American implementation. The concept of incontestability allows a trademark registrant to overcome arguments that a symbol is merely descriptive of features or qualities of the registrant’s goods or services—for example, “Juicy” for apples. Incontestability provides a nearly irrebuttable presumption of trademark meaning, which is a powerful tool for trademark owners. Unfortunately, incontestability is not granted as carefully as its power would counsel. Courts may misunderstand either the prerequisites for, or the meaning of incontestability, allowing trademark claimants to assert rights that they don’t actually have. Incontestability needs clearer signals about what it is and when it is available. In the absence of serious substantive examination of incontestability at the PTO—which seems unlikely to materialize any time soon—changes designed to increase the salience of incontestability’s requirements to filers and to courts could provide some protection against wrongful assertions. Incontestability can only serve the trademark system if it is granted properly and consistently.
20 May 2017
Marks
'Fixing Incontestability: The Next Frontier?' by Rebecca Tushnet in (2017) Boston University Journal of Science and Technology Law comments
MoPI
'A socialised conceptualisation of individual privacy: a theoretical and empirical study of the notion of the ‘public’ in UK MoPI cases' by David Mead in (2017) Journal of Media Law 1-32 comments
This article conceptualises a more public, more socialised notion of privacy in contrast to the archetype: that my privacy is of interest and value only to me. Doing so has historically left claims to privacy exposed against claims to free speech, with its long pedigree and generally acknowledged wider instrumental role. This article provides a corrective. The first part offers a typology of rationales at one of two meta-levels: privacy as a means to effect assurance or as a means to protect someone’s activities. The second discusses the results of some small-scale empirical doctrinal research: a sample analysis of 27 UK privacy cases looking to identify the judicial ascription of the value of privacy, specifically whether any judges conceptualise privacy as having a more social, or public, value or utility. The results are perhaps not unexpected. Almost exclusively, judges frame their rationales for protecting privacy in purely individualised terms.Mead concludes
Why does all this matter? I think there are two reasons. The first is a conceptual one. If we are to have newspaper outings of, taking a recent example, MPs such as Keith Vaz, we should be sure the analytical framework is responsive to all the variables, not just to some or, as I would argue, to all of those on one side (freedom of expression) but only to a sample on the other. Second, at a practical level, it matters how cases are argued and resolved and who might claim the benefit of any remedy. Let us take those in turn.
At a conceptual level, if we conceive of privacy as offering wider social utility rather than simply as something of individual value, we can better appreciate that the judicial and policy approach – of private gain against public benefit of free speech – creates a false dichotomy. Ian Leigh and Lawrence Lustgarten wrote about the balance between rights and security in the 1980s and Daniel Solove adopted it in the more specific context of digital privacy and security nearly 20 years later. Rather than being in oppositional tension, protecting privacy may in fact sustain the same sorts of goals that securing protection for free speech might also serve. We see this most obviously when we considered claims to intellectual privacy, to innovative privacy and to facilitative privacy, but insulating privacy allows us to relax before immersing ourselves once more in the public sphere, while coalescing privacy, it was argued above, provides the level playing field necessary for public debate. Viewing the potential harm as connoting something more collective requires the construction of a very different utilitarian calculus. In short, and perhaps counter-intuitively, failing to see that on occasion securing an individual's privacy (that is, not allowing unrestrained publication about someone's private life) might not also lead to a flourishing, rather than a diminution, of free speech constitutes a category error. Privacy and free speech, or elements of each at least, can in fact be the same sides of the coin.
A couple of points flow from that new analytical approach. If privacy is no longer solely an individual but also a social or collective good, does this mean A is or even should be able to waive it? As Jane Bailey put it, in the context of online privacy, especially those victims/subjects of child pornography,
if privacy is, or is becoming, a collective or public good, the weaknesses of policy solutions that establish a property right in personal information or that allow one to waive one’s privacy rights also would become clear. If one individual or a group of individuals waives privacy rights, the level of privacy for all individuals decreases because the value of privacy decreases.
There are two limbs to this. If A really is not bothered by any loss of privacy, what could found B, C and D’s collective right to be aggrieved? Above (in the section ‘The social utility of privacy’), we considered the various social claims that can be made on their behalf. Broadly, even if A feels she has suffered no harm, a strong case can be made that not only are B, C and D impoverished but we all are, or at least there is the potential for us all to be. Put thus, it is not A's right, or not A's right alone, to waive. That thought does not assist in resolving the other difficulty – how can we give practical effect to that collective assertion of harm, especially in the face of A's consent or intransigence? One practical response in the UK setting would be the adjustment of regulatory rules requiring only the affected individual to mount a claim. IPSO requires, for complaints about anything other than accuracy in the Editors' Code, a person to be ‘directly affected’. IMPRESS similarly requires someone to have been personally affected other than for complaints about accuracy where it permits third party complaints. This provides, at best, only a very partial solution. It is one thing to confer standing on third parties and quite another to craft a remedy that adequately responds to those collective, mutual interests. The following (rather inelegantly drafted) sample correction avails a flavour of what might be conveyed.
On 1 January, we published an item indicating that A had done X [in circumstances Y]. While A did not contact us to complain, The Daily News acknowledges that in publishing that item, we acted improperly. That item might have led many others to believe that doing X [in circumstances Y] was a proper subject for a newspaper to report on. In doing so, we may have dissuaded others from doing or even from trying to do X. The Daily News accepts that doing X is or has the potential to be a socially useful activity, contributing to [β and δ] and thus has long term or wider benefits for us all.
Remaining with our conceptual strand, James Nehf identifies two further issues that flow from framing privacy as implicating only individualised utility. First, those not affected, or rather those perceiving themselves as not being affected, may disengage from the debate. This is, as Solove points out, a general response in the surveillance and security debate – I’ve got nothing to hide, so what’s the problem? Additionally, and this flows from its non-absolute nature requiring privacy to compete with other rights and social interests, he notes that ‘the influence of interest group politics could not be overcome’. He adverts to the changed frame within which we now debate environmental harms – as something that now no longer effects simply the neighbour onto whose land waste spills but as a general societal problem calling for a public collective regulatory response.
If we turn back to the practical realisation of our expanded notion of privacy, Part IV showed that there was no evidence of wider social utility in court judgments (though the survey has not so far considered how cases were presented and argued by counsel). It is impossible to determine if appeals to social utility would have affected the outcome in any one case. It would be easy enough to locate claims to a more socially responsive conception of privacy within the current doctrinal framework. Even given the very clear contextual steer in Murray by the Master of the Rolls (and endorsed by the Supreme Court in In re JR 38), the first stage – whether or not there was a reasonable expectation – while objective, has as its focus the effect on the claimant, not the effect on wider society. Nothing though would seem to prevent it being argued at the second stage of the ultimate balancing test that it is not simply the comparative importance to the claimant that should be on one side of the equation but the social good that protecting privacy could effect or would be capable of effecting.
While the appropriateness of the balancing test is contested at a normative level, primarily because of the difficulty, indeed inherent impossibility, of attributing value to and then weighing against each other two things that are both immeasurable and incommensurable, this paper takes as a given its continued traction. This is not the place to rehearse, let alone resolve that argument. That said, while re-framing privacy, in collective terms, would complicate that balancing exercise, by pairing public interest expression with of public interest privacy, we might explore this a little more before ending. While, clearly, it would be impossible to prove or even quantify the social utility of preventing a particular privacy-invading publication, that should not matter. The claim that a free press contributes to democratic self-governance has never been put to proof; its truth has now simply been asserted so long and so vociferously that it is self-evident – judicial notice is simply taken of this now undisputed fact. Further, it is not being asserted that all invasions of A's privacy would implicate a more collective notion of privacy. This though is, or should be true, for free speech (on the other side of the equation) – not all speech goes to enhancing democracy or offering different versions of truth in the market place for acceptance or rejection; it is hard to see how tittle tattle can ever do so. Our more socialised conception of privacy entails rejection of the monolithicism of free speech and, now, of privacy and calls for a more nuanced judicial analysis of both sides, evaluating more precisely the exact harms alleged to be suffered if the material is (not) published. Of course, to repeat the point made above, what we are dealing with on the privacy side is more likely an inchoate harm but this is likely as true of many claims made about the collective harms, or gains, of free speech.
In all this, it would be critical properly to frame the various interests at play and in tension. This might be the wider social utility or the countervailing public interest. Tugendhat J was alert to the difficulties in Green Corns. There, the issue – to remind ourselves – was whether or not to restrain a local paper publishing certain details of a planned children's care home. He accepted that there was no public interest properly defined at all in publishing the information that was subject to restraint.
The public interest was in how (perhaps by whom) the children were to be cared for. That was not the material the paper sought to publish, which was the location of the home. Essentially, what was being set up in opposition, he continued, was a series of private interests in, for example, house values which the paper sought to aggregate and to wrap up collectively as a public interest. This goes to an earlier discussion: that there is a difference between a common or collective public interest, in Regan's (n 2) terms, and aggregative or cumulative private interests.
In conclusion, one matter should be made clear. This paper is not arguing that privacy should always or even invariably trump free speech: we should not always have a right to know about the love child of a leading politician. There will quite properly be times – many and frequent perhaps – as a matter both of plain doctrine and of policy and theory – when the interest in protecting someone's privacy is outweighed by the greater interest in publication, even where there might also be some consequent social or collective (future) loss if the private facts become publicly known. It is making the much simpler point. That it is time we reconceptualised privacy and its instrumental possibilities, and thus reconfigured the balancing matrix, avoiding (in footballing terms) free speech always being the team able to play at home.
12 May 2017
Automation
'Privacy in Automation: An Appraisal of the Emerging Australian Approach' by Angela Daly in Computer Law & Security Review
offers
an initial appraisal of the emerging Australian approach to applying privacy and data protection laws to automated technologies. These laws and the general context in which they operate will be explained, with appropriate comparisons made to the European Union frameworks. In order to examine their specific application vis-à-vis automated technologies, three case studies - Automated facial recognition technologies (AFRT), unmanned aerial vehicles (UAVs – better known as ‘drones’) and autonomous vehicles (or ‘driverless cars’) – are selected to examine the extent to which existing privacy and data protection laws, and their application, can be considered adequate to address privacy and data protection risks that these technologies bring. These case studies evidence existing deficiencies with privacy protection in Australia and the inadequacy of recent reform processes, demonstrating that Australian data privacy laws are not well placed to protect individuals’ rights vis-a-vis automated technologies.
09 May 2017
FOI and 'Forgetting'
'Inside FOIA, Inc.' by Margaret B. Kwoka in (2016) 126 The Yale Law Journal Forum 265 comments
Commercial use of FOIA has, by all accounts, always been significant. As I documented in previous work, FOIA, Inc., businesses use FOIA for a variety of purposes and, at some agencies, can form the vast majority of requesters. One thing is constant across business use of FOIA, however, and that is the routine nature of commercial FOIA requests. Over and over again, commercial requesters seek the same kinds of documents, whether it be bid abstracts for defense contracts or licensing agreements filed by public corporations. I therefore proposed an aggressive affirmative disclosure regime in which agencies would identify the types of records routinely requested and publish comprehensive databases of those documents, thereby preempting the flood of commercial requesting.
For large regulatory agencies to whom single businesses submit hundreds and sometimes thousands of requests a year, however, my previous findings came as no surprise. FOIA officers at these agencies see their offices swamped with routine commercial requests and have adapted to become experts in responding to them. This essay explores the practicality of the affirmative disclosure methods I previously proposed from their perspective. In particular, using EPA, SEC, and FDA as case studies, it sheds light on actual agency experience implementing and considering these sorts of measures, including notable success stories. Beyond demonstrating that affirmative disclosure can be practical in some circumstances, however, it sheds light on obstacles agencies face as well. To that end, it seeks out outline circumstances in which affirmative disclosure is most immediately promising, as well as structural reforms that can reduce the barriers to success in a wider range of circumstances.'The Right to Be Forgotten' by Michael J. Kelly and David Satola in (2017) 1 University of Illinois Law Review comments
The right to be forgotten refers to the ability of individuals to erase, limit, delink, delete or correct personal information on the Internet that is misleading, embarrassing, irrelevant or anachronistic. This legal right was cast into the spotlight by the European Court of Justice decision in the Google Spain case, confirming it as a matter of EU law. This “right,” however, has existed in many forms around the world, usually applying a balance-of-rights analysis between the right to privacy and the right to freedom of expression. The new European version, though, is based on a legal theory of intermediary liability where Internet search engines are now considered “data controllers,” and as such have liability for managing some content online. As it has evolved in Europe, this right has focused attention on key underlying policy considerations, as well as practical difficulties, in implementation under the new European regime. In particular, shifting the burden of creating compliance regimes and supervising important human rights from government to the private sector. Thus, in Europe, the function of balancing rights (privacy versus speech) in the digital context has been “outsourced” to the private sector. Recent experience in Europe under this regime shows that there is no uniform approach across countries. Moreover, different national approaches to the “right” make it almost impossible for multinational entities to comply across jurisdictions. Apart from the data controller threshold, civil-law jurisdictions seem to give greater weight to privacy concerns in striking this balance. Common-law jurisdictions tend to give greater weight to expression. The right to be forgotten is another example of an evolving transatlantic data struggle with potentially serious trade implications. This Article explores the historical and theoretical foundations of the right to be forgotten and assesses practical legal issues including whether North American “free speech” rights are an effective buffer to what is sometimes a very controversial and evolving issue.
Doxing
'Doxfare – Politically Motivated Leaks and the Future of the Norm on Non-Intervention in the Era of Weaponized Information' by Ido Kilovaty in (2017) 9 Harvard National Security Journal comments
Alleged Russian intervention during the 2016 U.S. presidential election presented international law with a challenge of characterizing the phenomenon of politically motivated leaks by foreign actors, carried out in cyberspace. Typically, international law’s norm of non-intervention applies only to acts coercive in nature, leaving disruptive acts outside of the scope of prohibited intervention. That raised a host of questions on the relevancy and inflexibility of traditional international law in relation to new threats and challenges in cyberspace. The discourse on transnational cyberspace operations highlights it becomes increasingly difficult to deal with nuanced activities that cause unprecedented harms, such as the Democratic National Committee Hack. This article argues foreign actors meddling with a legitimate political process in another State through cyberspace are violating the norm of non-intervention. Although the coercion requirement is absent, international law should consider non-coercive interfering acts that constitute sabotage and result in disruptive effects to domestic processes. As this paper contends cyberspace operations are distinctly different in their effects, so that a traditional standard of coercion for the norm on non-intervention is simply unattainable and requires the introduction of a new standard based on disruption. Finally, this article explores a few challenges and tensions ahead for harmful transnational cyberspace activities and offers a few directions to resolve these difficulties.
08 May 2017
Data Availability
The Productivity Commission's Productivity Commission Data Availability and Use report released today features the following 'key points' -
- Extraordinary growth in data generation and usability has enabled a kaleidoscope of new business models, products and insights. Data frameworks and protections developed prior to sweeping digitisation need reform. This is a global phenomenon and Australia, to its detriment, is not yet participating.
- Improved data access and use can enable new products and services that transform everyday life, drive efficiency and safety, create productivity gains and allow better decision making.
- The substantive argument for making data more available is that opportunities to use it are largely unknown until the data sources themselves are better known, and until data users have been able to undertake discovery of data.
- Lack of trust by both data custodians and users in existing data access processes and protections and numerous hurdles to sharing and releasing data are choking the use and value of Australia’s data. In fact, improving trust community-wide is a key objective.
- Marginal changes to existing structures and legislation will not suffice. Recommended reforms are aimed at moving from a system based on risk aversion and avoidance, to one based on transparency and confidence in data processes, treating data as an asset and not a threat. Significant change is needed for Australia’s open government agenda and the rights of consumers to data to catch up with achievements in competing economies.
- A new Comprehensive Right for consumers would give individuals and small/medium businesses opportunities for active use of their own data and represent fundamental reform to Australia’s competition policy in a digital world. This right would create for consumers:
- powers comparable to those in the Privacy Act to view, request edits or corrections, and be advised of the trade to third parties of consumer information held on them
- a new right to have a machine-readable copy of their consumer data provided either to them or directly to a nominated third party, such as a new service provider.
- A key facet of the recommended reforms is the creation of a data sharing and release structure that indicates to all data custodians a strong and clear cultural shift towards better data use that can be dialled up for the sharing or release of higher-risk datasets.
- For datasets designated as national interest, all restrictions to access and use contained in a variety of national and state legislation, and other program-specific policies, would be replaced by new arrangements under the Data Sharing and Release Act. National Interest Datasets would be resourced by the Commonwealth as national assets.
- A suite of Accredited Release Authorities would be sectoral hubs of expertise and enable the ongoing maintenance of, and streamlined access to, National Interest Datasets as well as to other datasets to be linked and shared or released. − A streamlining of ethics committee approval processes would provide more timely access to identifiable data for research and policy development purposes.
- Incremental costs of more open data access and use
- including those associated with better risk management and alterations to business data systems
- will exist but should be substantially outweighed by the opportunities presented.
- Governments that ignore potential gains through consumer data rights will make the task of garnering social licence needed for other data reforms more difficult. Decoupling elements of this Framework runs the risk of limiting benefits to, and support from, the wider public.
05 May 2017
Mammoth Fever
'Frankenstein's Mammoth: Anticipating the Global Legal Framework for De-Extinction' by Erin Okuno in (2016) 43(3) Ecology Law Quarterly comments
Scientists around the world are actively working toward de-extinction, the concept of bringing extinct species back to life. Before herds of woolly mammoths roam and flocks of passenger pigeons soar once again, the international community needs to consider what should be done about de-extinct species from a legal and policy perspective. In the context of international environmental law, the precautionary principle counsels that the absence of scientific certainty should not be used as an excuse for failing to prevent environmental harm. No global legal framework exists to protect and regulate de-extinct species, and this Article seeks to fill that gap by anticipating how the global legal framework for de-extinction could be structured.
The Article recommends that the notions underlying the precautionary principle should be applied to de-extinction and that the role of international treaties and other international agreements should be considered to determine how they will or should apply to de-extinct species. The Article explains the concepts of extinction and de-extinction, reviews relevant international treaties and agreements, and analyzes how those treaties and agreements might affect de-extinct species as objects of trade, as migratory species, as biodiversity, as genetically modified organisms, and as intellectual property.
The Article provides suggestions about how the treaties and the international legal framework could be modified to address de-extinct species more directly. Regardless of ongoing moral and ethical debates about de-extinction, the Article concludes that the international community must begin to contemplate how de-extinct species will be regulated and protected under existing and prospective international laws and policies.
Subscribe to:
Posts (Atom)