This quick read has been authored by Shauree Gaikwad, a 3rd year student at Maharashtra National Law University (MNLU), Aurangabad.
[Ed. Note: Since the post was written, the Bill has become law and the amendments have now come into force.]
A student-run group at NALSAR University of Law
This quick read has been authored by Shauree Gaikwad, a 3rd year student at Maharashtra National Law University (MNLU), Aurangabad.
[Ed. Note: Since the post was written, the Bill has become law and the amendments have now come into force.]
This post on the recent recommended ban on cryptocurrency has been authored by Shivani Malik, a final year law student at the Vivekananda Institute of Professional Studies.
The Ministry of Economic Affairs in its recent press release dated July 22, 2019, prepared a report on the Committee on Virtual Currencies, which proposed a ban on the so-called “private cryptocurrencies”.
Welcome to our fortnightly newsletter, where our Editors put together handpicked stories from the world of tech law! You can find other issues here.
In 2018, Anthony Clement Rubin and Janani Krishnamurthy filed PILs before the Madras High Court, seeking a writ of Mandamus to “declare the linking of Aadhaar of any one of the Government authorized identity proof as mandatory for the purpose of authentication while obtaining any email or user account.” The main concern of the petitioners was traceability of social media users, which would be facilitated by linking their social media accounts with a government identity proof; this in turn could help combat cybercrime. The case was heard by a division bench of the Madras HC, and the scope was expanded to include curbing of cybercrime with the help of online intermediaries. In June 2019, the Internet Freedom Foundation became an intervener in the case to provide expertise in the areas of technology, policy, law and privacy. Notably, Madras HC dismissed the prayer asking for linkage of social media and Aadhaar, stating that it violated the SC judgement on Aadhaar which held that Aadhaar is to be used only for social welfare schemes.
This post, authored by Mr. Srikanth Lakshmanan, is part of TLF’s blog series on Account Aggregators. Other posts can be found here.
Mr. Srikanth Lakshmanan is the founder of CashlessConsumer, a consumer collective working on digital payments to increase awareness, understand technology, represent consumers in digital payments ecosystem to voice perspectives, concerns with a goal of moving towards a fair cashless society with equitable rights.
This post has been authored by Vishal Rakhecha, currently in his 4th year at NALSAR University of Law, Hyderabad, and serves as an introduction for TLF’s upcoming blog series on Account Aggregators.
A few days back, Nandan Nilekani unveiled an ‘industry-body’ for Account Aggregators (AAs), by the name of ‘Sahamati.’ He claimed that AAs would revolutionise the field of fintech, and would give users more control over their financial data, while also making the transfer of financial information (FI) a seamless process. But what exactly are AAs, and how do they make transfer of FI seamless?
The San-Francisco cab-aggregator giant, Uber is working on to kick-start an AC bus service in India. With the introduction of AC bus service, Uber is trying to inch closer toward its goals of reducing individual car ownership, expanding transportation access and helping governments plan transportation. Pradeep Parameswaran, Uber India and South Asia head said that “we are in the process of building the product and refining that. Some pilots are live in parts of Latin America and the Middle East. So they are the archetype of markets that would look like India”.
Uber bus will allow commuters to use the Uber app and reserve their seat on an air-conditioned bus. Uber will scan other passengers travelling in the same direction as the rider and hence reaching the destination with fewer stops. Through its bus service, Uber is emphasizing on educational campuses and business centers. Earlier Ola, Uber’s direct competitor, had launched similar kind of bus service in limited cities in 2015 but was stopped in 2018. At present, Gurgaon based Shuttl provides app based bus service to offices. Uber bus service in India is expected to become a reality in mid-2020.
Further Reading:
The Israeli Research Company, Check Point recently revealed that WhatsApp could be hacked causing serious potential security risks to users at the Annual Black Hat Security Conference on 7thAugust, 2019. According to Roman Zaikin and Oded Vanunu, they were able to change the identity of a sender, alter the text of someone’s reply on a group and even send private messages to another member in the group as a public message, such that the reply is visible to all the participants of a group. They were able to exploit the weaknesses of the application, after they reverse-engineered the source code in 2018 and decrypt its traffic. Since then Check Point has stated that it found three ways to manipulate and alter conversations, all of which are exploited through its quoting feature. The creators did warn WhatsApp in 2018 that the tool could be used by ‘threat actors’ to create and spread misinformation and fake news. Facebook has responded stating that the risk is not serious, and to alter the application would mean having to store data about the sender, leading to lesser privacy for its users.
Further Reading:
Several privacy commissioners across the world raised concerns over the privacy policy of Facebook’s new Libra digital currency. The countries which have raised concerns are US, UK, EU, Australia, Canada, Albania and Burkina Faso.
Calibra is the new subsidiary of Facebook and its cryptocurrency is called Libra. Calibra hopes to build a financial service on top of the Libra Blockchain. The privacy concerns raised go beyond the question of financial security and privacy because of the expansive collection of data which Facebook accumulates and has access to. Calibra issued a statement that user information will be shared in only certain circumstances but there is no definite understanding of what such situations are.
Apart from privacy concerns, the joint statement issued by the countries includes several concerns on whether Facebook should be given the right to get involved in the banking sector. If they did, they should seek a new banking charter and should be regulated by all the banking laws. These were few of the concerns raised by privacy commissioners.
Further Reading:
University of Oxford researcher James Pavur successfully exposed a design flaw in the GDPR, as a bogus demand for data using the “right to access” feature of the regulation saw about one in four companies reveal significant information about the person regarding whom the request was made. Data provided by the companies contained significant information including credit card information, travel details, account passwords and the target’s social security number, which was used by the researcher as evidence of design flaws in the GDPR. Pavur also found that large tech companies did well when it came to evaluating the requests, whereas mid-sized business didn’t perform as well despite being aware of the coming into force of the data protection regulation.
Further Reading:
Human reviewers will no longer be used to study conversations recorded by Siri, according to a recent announcement by Apple. The move gives users a greater degree of privacy over their communications, and analysis of recordings will be suspended while the “grading” system deployed by the company is reviewed. The system refers to the manner in which contractors grade the accuracy of the digital assistant’s voice recognition system, with the primary task being to determine the phrase that triggered action by i.e. whether the user had actually said, “Hey, Siri” or if it was something else.
Further Reading:
Freedom of speech and expression is the bellwether of the European Union (“EU”) Member States; so much so that its censorship will be the death of the most coveted human right. Europe possesses the strongest and the most institutionally developed structure of freedom of expression through the European Convention on Human Rights (“ECHR”). In 1976, the ECHR had observed in Handyside v. United Kingdom that a “democratic society” could not exist without pluralism, tolerance and broadmindedness. However, the recently adopted EU Copyright Directive in the Digital Single Market (“Copyright Directive”) seeks to alter this fundamental postulate of the European society by introducing Article 13 to the fore. Through this post, I intend to deal with the contentious aspect of Article 13 of the Copyright Directive, limited merely to its chilling impact on the freedom of expression. Subsequently, I shall elaborate on how the Copyright Directive possesses the ability to affect censorship globally.
The adoption of Article 13 of the Copyright Directive hints towards the EU’s implementation of a collateral censorship-based model. Collateral censorship occurs when a state holds one private party, “A” liable for the speech of another private party, “B”. The problem with such model is that it vests the power to censor content primarily in a private party, namely “A” in this case. The implementation of this model is known to have an adverse effect on the freedom of speech, and the adoption of the Copyright Directive has contributed towards producing such an effect.
The Copyright Directive envisages a new concept of online content sharing service providers (“service providers”), which refers to a “provider… whose main purpose is to store and give access to the public to significant amount of protected subject-matter uploaded by its users…” Article 13(1) of the Copyright Directive states that such service providers shall perform an act of “communication to the public” as per the provisions of the Infosoc Directive. Further, Article 13(2a) provides that service providers shall ensure that “unauthorized protected works” shall not be made available. However, this Article also places service providers under an obligation to provide access to “non-infringing works” or “other protected subject matter”, including those covered by exceptions or limitations to copyright. The Copyright Directive’s scheme of collateral censorship is evident from the functions entrusted to the service providers, wherein they are expected to purge their networks and websites of unauthorized content transmitted or uploaded by third parties. A failure to do so would expose service providers to liability for infringement of the content owner’s right to communication to the public, as provided in the Infosoc Directive.
The implementation of a collateral censorship model will serve as a conduit to crackdown on the freedom of expression. The reason for the same emanates from the existence of certain content which necessarily falls within the grey area between legality and illegality. Stellar examples of this content are memes and parodies. It is primarily in respect of such content that the problems related to censorship may arise. To bolster this argument, consider Facebook, the social media website which boasts 1.49 billion daily active users. As per an official report in 2013, users were uploading 350 million photos a day, the number has risen exponentially today. When intermediaries like Facebook are faced with implementation of the Copyright Directive, it will necessarily require them to employ automated detecting mechanisms for flagging or detecting infringing material, due to the sheer volume of data being uploaded or transmitted. The accuracy of such software in detecting infringing content has been the major point of contention towards its implementation. Even though content like memes and parodies may be flagged as infringing by such software, automated blocking of content is prohibited under Article 13(3) of the Copyright Directive. This brings up the question of human review of such purportedly infringing content. In this regard, first, it is impossible for any human agency to review large tracts of data even after filtration by an automatic system. Second, in case such content is successfully reviewed somehow, a human agent may not be able to correctly decide the nature of such content with respect to its legality.
This scenario shall compel the service providers to resort to taking down the scapegoats of content, memes and parodies, which may even remotely expose them to liability. Such actions of the service providers will certainly censor freedom of expression. Another problem arising from this framework is that of adversely affecting net neutrality. Entrusting service providers with blocking access to content may lead to indiscriminate blocking of certain type of content.
Though the Copyright Directive provides certain safeguards in this regard, they are latent and ineffective. For example, consider access to a “complaints and redress mechanism” provided by Article 13(2b) of the Copyright Directive. This mechanism offers a latent recourse after the actual takedown or blocking of access to certain content. This is problematic because the users are either oblivious to/ unaware of such mechanisms being in place, do not have the requisite time and resources to prove the legality of content or are just fed up of such repeated takedowns. An easy way to understand these concerns is through YouTube’s current unjustified takedown of content, which puts the content owners under the same burdens as expressed above. Regardless of the reason for inaction by the content owners, censorship is the effect.
John Perry Barlow had stated in his Declaration of the Independence of Cyberspace that “Cyberspace does not lie within your borders”. This statement is true to a large extent. Cyberspace and the internet does not lie in any country’s border, rather its existence is cross-border. Does this mean that the law in the EU affects the content we view in India? It certainly does!
The General Data Protection Regulation (“GDPR”) applies to countries beyond the EU. The global effect of the Copyright Directive is similar, as service providers do not distinguish European services from those of the rest of the world. It only makes sense for the websites in this situation to adopt a mechanism which applies unconditionally to each user regardless of his/ her location. This is the same line of reasoning which was adopted by service providers in order to review user and privacy policies in every country on the introduction of the GDPR. Thus, the adoption of these stringent norms by service providers in all countries alike due to the omnipresence of internet-based applications may lead to a global censorship motivated by European norms.
The UN Special Rapporteur had envisaged that Article 13 would have a chilling effect on the freedom of expression globally. Subsequent to the Directive’s adoption, the Polish government protested against its applicability before the CJEU on the ground that it would lead to unwarranted censorship. Such action is likely to be followed by dissenters of the Copyright Directive, namely Italy, Finland, Luxembourg and the Netherlands. In light of this fierce united front, hope hinges on these countries to prevent the implementation of censoring laws across the world.
Every enterprise wants its Uniform Resource Locator (URL) to appear among the top links on search engines because these links get the most clicks. Research reveals that the 10 highest-ranking generic search results on the first page together generally received approximately 95% of all clicks on generic search results.[1] While some enterprises pay huge advertisement costs to ensure that their links appear at the top (paid links), others resort to Search Engine Optimization (“SEO”) from a service like the SEO services in Provo
to acquire top spots among unpaid links. SEO may include regularly uploading quality content to the website, creating a user-friendly browsing experience, ensuring that the website is compatible with computers and hand-held devices, engaging in social media marketing, etc.
As a large part of the market has shifted to online platforms (e-commerce platforms), it becomes important to understand the interface between the working of Search Engines and Competition Law. This post seeks to explain the concept of “abuse of dominance” in the context of search engines. First things first, let us look at Google Search Shopping case to understand the relevance of Search Neutrality.
Until 2010, Google, which is the most used search engine, misused its dominant position to place certain links above others. In 2010, European Union’s Commissioner for Competition began investigating Google’s conduct and held it liable for abuse of dominance. In 2017, the biggest fine ever imposed by an antitrust regulator was slapped on Google (Google Search Shopping Decision). After this, Google corrected the bias advertised and sponsored links were distinctly marked and search order was based on relevance, popularity, design and so on.
The principle of Search Neutrality requires that search engines should have no editorial policies other than that their results be comprehensive, impartial and based solely on “relevance”. For instance, Google Search uses certain algorithms to rank web pages based on their relevance. For e.g., PageRank that works by counting the number and quality of links to a page to determine a rough estimate of how important the website is. Moreover, several updates (like Panda) are also used to improve the user experience by identifying and demoting low-quality sites that do not provide useful original content or otherwise add much value.
Any manipulation of the organic/natural order of the links in search results amounts to a search bias. Such bias is inbuilt in the very business model of the search engines. As per the founders of Google: “ . . . we expect that advertising funded search engines will be inherently biased towards the advertisers and away from the needs of the consumers”.[2] So, the pertinent question is – what is the basis of such bias?
In the domain of search engines, neutrality does not mean equal treatment regardless of the content. As mentioned earlier, search engines try to push up more relevant and quality links for a better user experience. Therefore, some amount of bias is inherent. Relevance is used as the basis of refining search results; it is defined in the search engine, so that the results are subject to the user’s preferences and the user is satisfied.
For example, a search for “Flights from Delhi to Mumbai”, would show several links. Some would be advertisements and sponsored links, while others would be unpaid links of travel gateways like MakeMyTrip, Goibibo, etc. Additionally, some other links for travel blogs, news items, maps, etc. would show up . Here, the search engine uses various algorithms to ensure that the most relevant links appear at the top. However, as relevance is subjective, bias based on relevance is contentious. At times, search engines tweak the algorithm to place their own or associated links higher up in the order to limit or eliminate competition.
Search Bias may become anti-competitive when it violates Section 4 of Competition Act, 2002. Section 4(1) prohibits abuse of dominant position. The explanation to Section 4(2)(b) defines “dominant position” as a position of strength, enjoyed by an enterprise, in the relevant market, in India, which enables it to- (i) operate independently of competitive forces prevailing in the relevant market; or (ii) affect its competitors or consumers or the relevant market in its favor.
Further, clauses (c) and (e) of Section 4(2) prohibit practices resulting in denial of market access and use of dominant position in one relevant market to enter into or protect other relevant market. In case of search engines, the peculiar feature of the sector is that there are a few enterprises that enjoy a dominant position in relevant markets (e.g. Google, Amazon, etc.) and such position may be abused.
To understand the interface of these provisions with search bias, let’s take a look at the Competition Commission of India’s (“CCI”) ruling on Google (2018).
In 2012, two cases were filed against Google alleging contravention of Section 4 of the Act. It was alleged that while conducting the core business of search and advertising, Google had been manipulating the search results and favoring its own services and partners, such as Google Video, YouTube, Google Maps, etc. Pages in the search results did not appear solely according to their relevance, popularity, etc. It was further averred that Google is widely recognized as enjoying a dominant status in the search advertisement market because of its market share, size, resources, reputation etc. Therefore, its search bias amounts to abuse of its dominant position.
The CCI confirmed that Google is a dominant enterprise with respect to the relevant markets of Online General Web Search Services and Online Search Advertising in India based on factors such as size and resources, economic power and commercial advantages, entry barriers, etc.
The CCI held that Google violated Section 4 by extending and preserving its dominance through:
The decision did not deal with the question of effect-based versus form-based approaches to determine abuse of dominance. The dissent order indirectly referred to the latter approach as it emphasized the need for greater economic evidence and its implications for competition and consumers to consider an alleged conduct as abusive. The form-based approach is the traditional approach to look at the abuse of dominance where perfect competition is the goal. Whereas, the effect-based approach aims at weighing the pro-competitive and anti-competitive effects of a firm’s action keeping in mind special considerations for an industry, rather than simply protecting competition. It recognizes that firms continuously look for new opportunities to maximize their profits through innovation. For this, a firm may adopt strategies that enhance its market power or eliminate a competitor, however, its actions may result in more efficient processes and enhanced consumer welfare (E.g. Reliance Jio case).
Thus, the argument of improving quality of search results cannot be disregarded, as it ultimately benefits the users. However, we must not overlook the implications of bias e-commerce platforms such as Amazon, Grofers, Nykaa, etc. where products that are not necessarily better in quality appear high up in the search result to the disadvantage of third-party sellers. For instance, if products sold by Cloudtail (in which Amazon has a substantial stake) on Amazon appeared higher in the search result not on the basis of relevance but as part of the strategy to push Cloudtail’s products, that would be an anti-competitive practice. The provisions under Section 4 of Competition Act could be invoked in these cases as well.
CCI’s decision demonstrates the ability of the Indian law to deal with new forms of abuse. Further, the Competition Law jurisprudence is to evolve with changing times including the propounding of the effects-based approach by the CCI. However, the effect of Search bias is not just limited to the visibility of business enterprises, but it has an over-arching impact in shaping public opinion and even affecting political outcomes (e.g. Cambridge Analytica Case). Today, when more people have access to the internet than ever before, it is important that search engines ensure transparency in their bias. It will ensure that the rights of all stakeholders such as consumers, business enterprises and citizens in general are protected. Relevance as the basis has stood the test of time, but other markers like popularity, design, quality etc. used by search engines may also affect search neutrality. Therefore, there is a need for an informed debate over the most appropriate basis of bias that keeps a check on the abuse of dominance in the market as well as suppression of information in the society in general.
[1] https://www.epw.in/engage/article/should-google-search-engine-be
[2] The Anatomy of a Large-Scale Hypertextual Web Search Engine (1998)
The past month saw a slew of antitrust investigations being opened against big tech companies such as Facebook, Google, Amazon, etc. From the EU’s announcement of an investigation into Amazon’s use of third-party retailers’ data, to the CCI’s order against Google for abusing its dominance in the Android market—the wave against Big Tech’s threats to fair competition has spanned jurisdictions.
In the latest development, the US Justice Department has decided to open a broad investigation into Big Tech companies. The investigation follows bipartisan calls from lawmakers for reigning in the threats posed by big tech to the competitive market. According to the agency, the effort aims to explore grievances raised by consumers and business regarding search, social media and online retail services. This could lead to a heightening of calls for Amazon, Google and Facebook to be broken up. Such companies, especially Facebook, have already faced heat for the way they handle vast amounts of data and jeopardise privacy of individual people.
Further Reading:
Spelling further trouble for Big Tech, The Australia Competition and Consumer Commission (ACCC) submitted the Digital Report Inquiry on 26 July, 2019 which limits the market dominance of major players including Facebook and Google. The report had 23 recommendations to promote competition and increase privacy of consumers due to the lack of informed consent of consumers that presently exists. Josh Frydenberg, the treasurer of the ACCC, stated that a new division would “lift the veil” on the advertising and marketing algorithms being used by these companies. The division would also be able to conduct public inquiries and require companies to furnish any relevant information. Inquiries can be held about supply of ad services, sufficient transparency over prices and the existence of competition within the market. The report also recommended the implementation of the Australian Law Commission Report, which suggested the introduction of a statutory tort for serious invasions of privacy and a general prohibition on all unfair trade practices. Additionally, the Chairman of the ACCC, Rod Sims, stated that five investigations were underway against Facebook and Google and more could follow.
Further Reading:
The Protection of Children from sexual Offences (POCSO) Amendment Bill, 2019 introduced in Rajya Sabha by the Women and Child Development Minister Smriti Irani widened the definition of child pornography that now goes beyond videos. The amended definition now involves any photography, video, digital or computer-generated image indistinguishable from an actual child, and image created, adapted, modified, but appears to depict a child. A new section 15 has also been introduced, which proposes penalties for storage and possession of pornographic material involving children. Although the bill succeeded in garnering support from across the political spectrum, but few MPs criticised the bill for overtly emphasising on punishing the offenders and neglecting the measures to curb sexual assault of children and child pornography.
Further Reading:
The Indian cryptocurrency market received a major jolt on 22nd July 2019, with the Inter-Ministerial Committee set up under the Chairmanship of Economic Affairs Secretary Subhash Chandra Garg recommending a ban on the use of such cryptocurrencies in India. Set up to look into the legality of cryptocurrencies and blockchain technology, the Committee submitted that private currencies should be completely banned in India, and drafted the Banning of Cryptocurrency & Regulation of Official Digital Currency Bill, 2019 which mandates a fine and imprisonment of up to 10 years for offences involving the use of such currencies. However, the Committee approved of the advantages of the underlying blockchain technology and floated the idea of an official RBI-backed cryptocurrency in the future, perhaps suggesting that the future of cryptocurrencies is yet to be resolved.
Further Reading:
Proclaimed to be among the most valuable start-ups in the world, ByteDance plans to invest USD 1 Billion in India over the next three years. ByteDance is the parent company of TikTok, a Chinese video making app which allows users to create and share videos online. On July 17th 2019, the cyber e-security arm of the Ministry of Electronics and Information Technology sent a notice to TikTok and Helo raising issues related to anti-Indian activities. They were given an ultimatum to respond by July 22nd or face severe consequences. Previously, they had also faced a one week ban in April 2019. Despite all these encumbrances, ByteDance has a promising plan for India. It plans on investing USD 1 billion over the next three years. They would also be increasing the number of employees in India to 1000 by the end of this year. ByteDance implemented several regulatory and safety measures in order to comply with the cultural and political ideologies of the country.
Further Reading:
A recent dispute between PVR and Justdial has highlighted the connection between various facets of networking and IP infringement that ensues through the use of regular networking tools like deep links, meta tags and frames. With the interim order by the Delhi High Court against Justdial, it seems that new age digital awareness is catching up with the old and still relevant IP laws in the country. Before discussing the facts of the dispute, it is relevant to discuss the implications of the networking tools forming the dispute.
The parties PVR Pvt. Ltd. and Justdial were parties to a non-exclusive ticketing agreement that gave Justdial access to PVR’s ticketing software to book tickets for the cinema halls. The agreement expired in August 2018 after two subsequent extensions in 2016.
The defendants, i.e. Justdial, continued to offer online ticket booking services even after the expiry of the arrangement. The bookings were redirected to the BookMyShow platform through deep-links. The plaintiffs (PVR) approached the defendants regarding the same and were orally assured that the service will be discontinued.
Subsequently, in January 2019, a third party informed the plaintiff that the defendant was still offering online ticket booking for PVR Cinemas. It made web pages that displayed images of the defendant’s cinema halls and used their registered trademark to give the impression that the two parties were still commercially associated. PVR’s registered trademark was used in meta-tags of the web pages that had deep links to the websites of authorised third-party sellers.
While these networking tools are a great way of maintaining a good web presence, they can also be a notorious means of stealing the rightful web traffic of websites. The issue of deep links arises when the web traffic of the homepage of a website is deviated to an internal webpage of the same that reduces the possible revenue for the websites from the advertisements on the homepage.
While meta tags are not visible on the website, it still is a contentious tool discussed extensively in global and Indian jurisprudence. It is very common that a business uses a competitor’s trademark in the meta tags of its own website so that the search engine indexes the website in the search results when the keyword is entered. This again, results in diversion of web traffic to the competing website.
However, some people use meta tags to describe their services without the mala-fide intention of diverting traffic and still become entangled in an IP infringement suit. While ignorance of the law is no excuse, unawareness about a particular trademark is often possible and may result in unfair punishment. For instance, a second-hand car dealer might use descriptors like Honda or Maruti to index his website in the search engine. While his act might lead the user to click the link believing it to be the intended website, (thereby qualifying the initial interest confusion doctrine) it will not materially harm the companies if the website states that the owner deals in second hand cars. The diverted web traffic will not be of any utility to the shop owner if he has no advertisements listed on his website and the user has to re-surf the web for the intended address. While consent from the party whose trademark has been used can be a way to evade the infringement, it is not practically possible for small businesses to receive permission from all the companies in the field. Hence, the dealer may find himself in a suit for infringing IPR of various companies, despite the mere intention to publicise.
An individual employing framing is likely to be held liable for trademark or copyright infringements if the material is modified without authorisation in the framed page or if the framed page endorses the parties’ commercial association when there is no such commercial relation between the two sites.
The jurisprudence around deep linking/meta tagging and IP rights has been varied. Canada, Denmark, Italy and the Netherlands have mostly ruled in favour of the party alleging IP infringement.
The Imax Corporation case, in the Federal Court of Canada, was an IP infringement suit filed by Imax against Showmax for framing web pages in a manner that would convey commercial connections between the two parties. The Court, in this case passed an injunction against the defendants due to harm caused to the plaintiff’s goodwill and reputation.
The Courts of Rome and Milan have ruled in favour of the plaintiffs in cases of deep linking and framing web pages that could confuse users as to the relation between the parties. The Court of first instance Leeuwarden, a case adjudged in Netherlands followed similar rationale as discussed above.
However, cases in USA tend to sway both ways. While the Ninth Circuit Court in the Brookfield Communications case injuncted the defendant, West Coast Co. from using “moviebuff.com” which would have infringed on their trademark of ‘Moviebuff’. The Court discussed the doctrine of initial confusion according to which when the user browses the internet, the link by west coast could create a confusion in the mind of the user about Brookfield’s Moviebuff website.
On the other hand, the District Court of California, in the case of Ticketmaster Corporation held that Microsoft’s unauthorised deep linking of its ‘sidewalk.com’ to Ticketmaster’s events pages circumventing the plaintiff’s homepage did not constitute unfair competition or passing off because the ultimate sale of tickets was done through the plaintiffs. The present controversy between PVR and Justdial is similar to the Imax and the Ticketmaster’s Case.
The Jurisprudence around meta tags/deep links and IP infringement in India has been pro-plaintiff. The Court has followed a similar reasoning as was discussed in the global scenario in various Indian cases like Mattel, Inc, Consim Info Ltd. vs Google, Kapil Wadhwa vs. Samsung, and Christian Louboutin.
However, in cases of meta tagging, the Court has also accepted the defence for use of meta tags by competing businesses. The Madras High Court discussed “nominative use” of meta tags while referring to some cases of the Ninth Circuit in USA. The Court laid down the following parameters for a meta tag to qualify for nominative use:
However, these conditions are quite onerous to prove and hence, in practice, Courts often rules in favour of the party alleging infringement. While this protects the goodwill of the plaintiff, it invariably restricts the bona fide users of trademark who use the trademarks for purely descriptive purposes.
In the present dispute, between PVR and Justdial, the Court has passed an order holding it to be a prima facie case of infringement and passing off in favour of the plaintiff. It has said that unless an interim injunction was passed, the plaintiff would suffer irreparable harm and hence, restrained the defendants from using the registered trademark for PVR or any deceptive variant.
This dispute provides an opportunity to the judiciary to instate guidelines to regulate the use of different networking techniques and prevent piling of litigation. It should be acknowledged that IPR awareness in relation to the use of the internet is not enough and explainers for different avenues that internet provides for proliferating e-business and regulations around them to ensure a reduction in IPR suits would help.
References:
In favour: Oppedahl & Larson v. Advanced Concepts, United States District Court for the District of Colorado, Civil Action Number 97-CV-1592 ; Playboy Enterprises, Inc. v. Netscape Communications Corp., 354 F.3d 1020 (9th Cir. 2004) ; Nissan Motor Co., et al. v. Nissan Computer Corp. 378 F.3d 1002 (9th Cir., 2004) ; SFX Motor Sports Inc., v. Davis, 2006 WL 3616983.
Against: Bijur Lubricating Corp. v. Devco Corporation 332 F.Supp.2d 722, Civ. No. 00-5157 (WHW) (D.N.J., August 26, 2004) ; Online Policy Group v. Diebold, Inc., 337 F. Supp. 2d 1195; 72 U.S.P.Q.2d 1200 ; Perfect 10, Inc. v. Amazon.com, Inc., 487 F.3d 701, 2007 U.S. App. LEXIS 11420, 99 U.S.P.Q.2D (BNA) 1746, Copy. L. Rep. (CCH) P29,380 (9th Cir. Cal. May 16, 2007); Kelly v. Arriba Soft Corp. (U.S. Court of Appeals for the Ninth Circuit, July 7, 2003) 336 F.3d 811.