Weather Underground, Incorporated v. Navigation Catalyst Systems, Incorporated et al

Filing 264

RESPONSE to 240 MOTION in Limine No. 1 filed by Weather Underground, Incorporated. (Attachments: # 1 Exhibit E) (Schaefer, Enrico)

Download PDF
IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF MICHIGAN THE WEATHER UNDERGROUND, INC., a Michigan corporation, Case No. 2:09-cv-10756 Hon. Marianne O. Battani Plaintiff, vs. NAVIGATION CATALYST SYSTEMS, INC., a Delaware corporation; BASIC FUSION, INC., a Delaware corporation; CONNEXUS CORP., a Delaware corporation; and FIRSTLOOK, INC., a Delaware corporation, Defendant. / Enrico Schaefer (P43506) Brian A. Hall (P70865) TRAVERSE LEGAL, PLC 810 Cottageview Drive, Unit G-20 Traverse City, MI 49686 231-932-0411 enrico.schaefer@traverselegal.com brianhall@traverselegal.com Lead Counsel for Plaintiff Nicholas J. Stasevich (P41896) Benjamin K. Steffans (P69712) BUTZEL LONG, PC 150 West Jefferson, Suite 100 Detroit, MI 48226 (313) 225-7000 stasevich@butzel.com steffans@butzel.com Local Counsel for Defendants Anthony Patti (P43729) HOOPER HATHAWAY, P.C. 126 South Main Street Ann Arbor, MI 48104 734-662-4426 apatti@hooperhathaway.com Co-counsel for Plaintiff William A. Delgado (admitted pro hac vice) WILLENKEN WILSON LOH & LIEB LLP 707 Wilshire Blvd., Ste. 3850 Los Angeles, CA 90017 213-955-9240 williamdelgado@willenken.com Lead Counsel for Defendants / PLAINTIFF’S RESPONSE TO DEFENDANTS’ MOTION IN LIMINE NO. 1 REGARDING OTHER LAWSUITS OR DISPUTES BETWEEN DEFENDANTS AND OTHER PARTIES 1 NOW COME Plaintiff, by and through counsel, TRAVERSE LEGAL, PLC and HOOPER HATHAWAY, P.C., and hereby submits its response to Defendants’ Motion in Limine No. 1 regarding other lawsuits or disputes between Defendants and other parties and states as follows: A. The Existence of Threat Letters, UDRPs and ACPA lawsuits is Relevant. Defendants have taken the interesting position that third party threat letters alleging trademark infringement, UDRP arbitrations for cybersquatting and ACPA lawsuits filed against them are not relevant to this case. Essentially, Defendants seeks to make this case purely about the 270 or so domains that are typos, words swaps and other variations of Plaintiff’s trademarks. In this regard, Defendants argue: This is a lawsuit about one unique set of allegations, specifically whether Defendants’ registration of various domain names violated Plaintiff‘s purported rights in its trademarks. It is not a lawsuit about Defendants’ business practices, in general, or what disputes other parties have had over domain names. Nor is this a lawsuit about Defendants’ character or behavior patterns. (Defendants’ Brief p. 3.) 1. Defendants’ Business Model Contrary to Defendants’ argument, this is a lawsuit about Defendants business practice of using DNS error data (data which shows when internet users misspell a domain name of a “real web site” and where there is no domain registered yet) to register domains which have enough typo-traffic to show advertisements, get paid for advertising “clicks”, and drive profits based on volume or bulk registration. Where a single typo variation of a trademark protected domain 2 name might only yield $100 in profits per year, registration of hundreds of thousands of such infringing domains can result in tens of millions in dollars in profits, or more. Defendants’ business model was to make as much profit off infringing domains until and unless a trademark owner caught them. Only after getting caught would Defendants transfer the domain name to the trademark owner, delete the domain name, or make any real effort to avoid further infringement. 2. Defendants Intent & Behavior Patterns Contrary to Defendants arguments, its business practices, motive, and intent are the primary issues in this case. Defendants have argued in deposition that their handling of trademark threat letters and turning over domains to trademark owners is evidence of good faith. Plaintiff argues that the handling of those threat letters is merely a part of their effort to minimize risk of being sued under a knowingly unlawful business model, but more importantly further notice of trademark rights. 3. General Background Plaintiffs have not identified as exhibits, in bulk, the tens of thousands of trademark infringement threat letters and responses thereto. Instead, Plaintiff is offering a spreadsheet produced by Defendants which supposedly shows each threat letter received, the domains at issue, whether Defendants agreed that their domain was confusingly similar, and whether they transferred or deleted that domain. Sample pages from that spreadsheet are attached as Exhibit A. In certain instances, emails and other communications related to threat letters are being introduced to show notice, internal procedures for handling trademark claims, and admission of registering domain names that are confusingly similar to third party trademarks. 3 The president of Firstlook, Seth Jacoby, testified about their standard process of always giving back domain names to third parties who had legitimate trademark rights. The fact that they give domain names back to trademark owners with legitimate trademark claims is being used as a primary defense to Plaintiff’s claim of bad faith. Seth Jacoby testified: “The policy of the company has always been, if there’s a cease and desist letter of someone with legitimate rights, then the domain name is transferred to the complainant.” (Exhibit B; Deposition of Seth Jacoby at pg. 114.) “we made the decision that legal should hand over domain names that, through their legal advice, infringed on third parties.” (Exhibit B; Deposition of Seth Jacoby at pg. 115.) “God forbid we missed a trademark holder who had a legitimate claim ..” (Exhibit B; Deposition of Seth Jacoby at pg. 299.) “Q. Would it have been the standard process that, upon receiving a UDRP complaint asserting trademark rights, that there would have been a review internally as to whether or not they were quote/unquote, legitimate? A. Yeh, that’s right. Q. Okay. And if legitimate, what would be the standard process? If the trademark complaints were legitimate, what would you typically do? A: We would typically put those marks on the blacklist. Q. Okay, and would you also potentially offer to transfer those domains – A. Of course, yes, in all cases. “(Exhibit B; Deposition of Seth Jacoby at pgs. 331-332.) 4 Defendants’ in house compliance manager and in house counsel, Chris Pirrone, stated that he transferred domains to third parties who complained where he “thought there as a valid trademark claim.” (Exhibit C, Deposition of Chris Pirrone at pgs. 75, 87.) Mr. Pirrone also confirmed that when threat letters and UDRPs came across his desk, “the business people knew that – that if it [the trademark] was marked or identified, that they - that they were going to lose that argument …” (Exhibit C, Deposition of Chris Pirrone at pgs. 162-163.) Numerous exhibits describe the trademark review process as one where Defendants determine when third parties have asserted legitimate trademark rights in a domain and then transfer it to the trademark owner. (Exhibit C, Deposition of Chris Pirrone at pgs. 229-230.) Numerous witnesses also testified that Defendants blacklist, discussed below, was compiled from threat letters, UDRP complaints and ACPA lawsuits. (Exhibit C, Deposition of Chris Pirrone at pgs. 216-217.) Compliance Manger Lily Stevenson testified: “The blacklist database is a list that we have. Any C&Ds that come in, any UDRPs, any WIPOs, I’ll put in the extensions of the trademark and the variations that I think it will trigger.” (Exhibit D, Deposition of Lily Stevenson at pgs. 109-110.) President Seth Jacoby confirmed that the source of blacklist terms came from third party trademark threats. (Exhibit B; Deposition of Seth Jacoby at pgs. 80-81.) This blacklist was the primary tool Defendants say they used to avoid registering trademark-protected domains. Since the blacklist is Defendants primary piece of evidence, the jury is entitled to know how and why the blacklist was compiled, as well as the key fact that it contained character strings of trademarks for which Defendants had received a trademark threat. 5 The importance of threat letters as relevant across many key issues in the case is illustrated by Mr. Pirrone. Pirrone defended the registration of “trave3locity.com” by stating essentially that until he received a threat letter from Travelocity, he would not be aware that the word “Travelocity” infringed third party trademark rights. (Exhibit C, Deposition of Chris Pirrone at pgs. 167-173). Threat letters are the primary way that Defendants state they have “actual notice” of third party trademark rights. Once they receive third party notice, they transfer the domain in “good faith.” Defendants use this same “actual notice” defense with regard to Plaintiff’s trademarks. Until they received Plaintiff’s UDRP Complaint, they had allegedly never heard of Plaintiff. Once they received the UDRP, they analyzed the claims and agreed they needed to transfer the domains. They then blacklisted the domains and trademarks from Plaintiff’s UDRP as a “good faith” effort to avoid further infringement. With regard to the ACPA lawsuit filed by Verizon, the lawsuit is highly relevant since Defendants countersued Verizon for cybersquatting under the ACPA asking for statutory damages of up to $100,000 for thousands of alleged violations of their own trademarks. Essentially, Defendants sued Verizon for cybersquatting on nearly the exact same facts alleged by Plaintiff against Defendants here. (Exhibit E, Verizon v. Navigation Catalyst Counterclaim.) In fact, Defendants claimed cybersquatting on their own registered trademarks, many of which are dictionary words such as “acrophobia”, “backstage pass”, “blank”, “new.net”, and “uproar”. Defendants’ defense in this case is that registration of dictionary words as stand alone words or in combination with other dictionary words – i.e., “weather” and “underground”, or a typo of “underground” – can never be considered bad faith under the ACPA. The Verizon counterclaims are an admission, are completely contrary to the defenses offered, and go directly to credibility. 6 Ultimately, Rule 404(b)(2) applies and it shows intent, knowledge, identity (notice of trademark rights), absence of mistake, and lack of an accident. Note a cautionary instruction about the limited permissible use and not to show propensity for cybersquatting is likely. That said, ACPA Bad Faith Factor 8 specifically incorporates a propensity/pattern of conduct element. Under 17 USC 1125(d), the jury is provided extremely broad consideration of evidence that might evidence a bad faith intent to profit from trademark infringing domains. 17 USC § 1125(d) makes Defendants’ portfolio of domains and other third party trademark violations directly relevant to the primary issue in this case of bad faith. The Jury may consider “factors such as, but not limited to – (VIII) the person's registration or acquisition of multiple domain names which the person knows are identical or confusingly similar to marks of others that are distinctive at the time of registration of such domain names, or dilutive of famous marks of others that are famous at the time of registration of such domain names, without regard to the goods or services of the parties;” “This factor was intended by Congress to target the “practice known as ‘warehousing,’ in which a cyberpirate registers multiple domain names—sometimes hundreds, even thousands— that mirror the trademarks of others.” H.R.Rep. No. 106–412, at 13. See also Sen. Rep. No. 106– 140, at 16.” Harrods Ltd. v. Sixty Internet Domain Names, 302 F.3d 214, 239 (4th Cir. 2002). Federal Rule of Evidence 402 defines relevant evidence as “evidence having any tendency to make the existence of any fact that is of consequence to the determination of the action more probable or less probable than it would be without the evidence.” The fact that 7 Defendants were under constant threat of third party cybersquatting, near constant UDRP arbitrations and approximately nine ACPA lawsuits certainly makes it more probable that: (a) Defendants knew (i.e. were on notice) their portfolio contained domains that violated third party trademarks. (b) Defendants’ portfolio in fact contained large numbers of trademark-protected domains. (c) Defendants knew their business model of using DNS error data to identify unregistered domain names was feeding trademark-protected domains into their system. (d) Defendants supposed trademark-screening process was wholly inadequate. (e) Defendants were only turning over domain names after getting caught, keeping the remaining infringing domains until a trademark owner complained. (f) Defendants had the bad faith intent to profit from third party trademarks under 17 USC 1125(d)(VIII). In each instance of receiving notice of a trademark claim by a third party, through whatever source, Defendants analyzed the third party claim the exact same way they supposedly reviewed the domain for trademark issues prior to registration. In instances where Defendants admit that their domain name is confusingly similar to a third party mark, Defendants either transferred the domain to the trademark owner or deleted the domain from their portfolio. A key question for the jury will be how easily Defendants can identify trademark violations after receiving a threat from a trademark owner, but not when they reviewed the 8 domain for trademark issues originally for registration. Receiving dozens of threat letters for trademark infringement, and agreeing with the vast majority of complaints, is powerful evidence tending to make ‘bad faith’ more probable than not. Since Defendants deny that they knew that tens of thousands of otherwise clearly infringing domain names were trademark protected, a key issue in the case has become “notice” of such trademarks. The jury can find that Defendants’ registered domains which they knew were identical or confusingly similar to marks of others (i.e. “notice”) from a variety of evidence including actual notice from trademark owners generally, and specifically, given the volume of threat letters, UDRP proceedings and ACPA lawsuits they were receiving, a jury could conclude that Defendants were aware that their portfolio contained large numbers of infringing domains. At a minimum, the threat letters should have triggered an early complete review of their registration process. Defendants’ primary defenses are that registration of domains typographically similar to Plaintiff’s marks were a mistake, inadvertent or otherwise incidental to their business process. Defendants will argue that they were trying really hard to avoid third party trademarks by developing internal processes and software to avoid trademarks. A key piece of evidence involves Defendants “Blacklist” which they say they developed in 2004. This Blacklist is comprised of character strings (i.e. “microsoft” or “micros” or “crosoft”) compiled and assembled from third party trademark infringement claims (the threat letters, UDRP proceedings and ACPA lawsuits). Defendants seek to establish “good faith” registration by arguing that once they received actual notice of a trademark through threat letter, UDRP or ACPA lawsuit, they 9 transferred the domains and precluded registration of any further domains similar to those marks through the Blacklist. How can Defendants seek to introduce exhibits and testimony about their use of the Blacklist to avoid trademarks without allowing Plaintiff to tell the jury how the list was compiled? How the Blacklist, which is one of Defendants’ key defense exhibits, was compiled is highly relevant and inescapable given Defendants defenses. Intent is the key issue in this case. Defendants say that Blacklisting character strings is powerful evidence of ‘good faith.’ Plaintiff argues that Defendants only avoided trademarks in cases where they had gotten caught. Plaintiff can further show the jury that even after receiving third party notice of trademark infringement and concluding that the claims were indeed valid, Defendants continued to register infringing domains. B. Threat Letters, UDRPs and ACPA Lawsuits Are Not Being Offered for the Truth of the Matter Asserted. Defendants also argue that third party letters, emails and related evidence should be excluded under the rule against hearsay. Federal Rule of Evidence 801 defines hearsay as a statement that the declarant does not make while testifying at the current trial or hearing; and a party offers into evidence to prove the truth of the matter asserted in the statement. Third party infringement letters, UDRPs and ACPA complaints are not being offered for the truth of the matter asserted in those letters. They are being offered to show notice of third party claims, knowledge of third party identity and marks, and as absence of mistake or accident in registration despite Defendants’ process of supposedly avoiding trademark infringement. To 10 the extent Defendants transferred the alleged infringing domain to the trademark owner after receiving a complaint, Defendants have admitted that they registered and used a domain name that was confusingly similar to a third party trademark. In Defendants’ language, these are “legitimate” and “valid” third party trademark infringement claims. So while the initial threat letters may not prove infringement, defendants transfer of domains to the trademark owner are admissions against interest under Rule 801(d)(2). Defendants' process of transferring domains after receiving “legitimate” trademark threats from third parties is admissible as admissions of a party opponent under Rule 801(d)(2)(A). See Donlin v. Aramark Corp., 162 F.R.D. 149, 150 (D. Utah 1995); United States v. Ammar, 714 F.2d 238, 254 (3d Cir.1983); Mahlandt v. Wild Canid Survival & Research Center, 588 F.2d 626 (8th Cir.1978); see Comment to 1972 Proposed Rules to Rule 801(d)(2)(A). Under Rule 801(d)(2)(A), an admission in opinion form may be admissible even if it is an opinion of law. Specht v. Jensen, 832 F.2d 1516 (10th Cir.1987) rev'd in part on unrelated issue 853 F.2d 805 (10th Cir.1988) (“we screwed up and now were in trouble”); Owens v. Atchinson Topeka & Santa Fe Ry. Co., 393 F.2d 77, 79 (5th Cir.1968); Russell v. United Parcel Service Inc., 666 F.2d 1188, 1190 n. 1 (8th Cir.1981); McCormick, Evidence, Vol. 2 § 256 4th ed. (1992) (“The statements normally include an application of a standard to the facts; thus they reveal the facts as the declarant thinks them to be, to which the standard of ‘fault’ or other legal or moral standard in involved in the statement was applied”); Wigmore, Evidence (Chadbourn rev. § 1053(3) (1972) ( “The opinion rule (§ 1917 infra) does not limit the use of a party's admissions”). 11 The spreadsheets kept by Defendants in the regular course of business to track third party trademark threats and transfer domains are also admissions under Rule 801(d)(2)(A). See Misener v. Gen. Motors, 165 F.R.D. 105, 107 (D. Utah 1996). These spreadsheets are also admissible as Records of a Regularly Conducted Activity under Rule 803. (6) Records of a Regularly Conducted Activity. A record of an act, event, condition, opinion, or diagnosis if:(A) the record was made at or near the time by-or from information transmitted by--someone with knowledge;(B) the record was kept in the course of a regularly conducted activity of a business, organization, occupation, or calling, whether or not for profit;(C) making the record was a regular practice of that activity;(D) all these conditions are shown by the testimony of the custodian or another qualified witness, or by a certification that complies with Rule 902(11) or (12) or with a statute permitting certification; and(E) neither the source of information nor the method or circumstances of preparation indicate a lack of trustworthiness. Fed. R. Evid. 803. C. Conclusion Trademark infringement notices to Defendants are integral to Defendants’ process of registering domain names. Defendants argue that until they receive notice from a trademark owner, they cannot have a “bad faith intent” to profit from the mark. When Defendants conclude they are infringing a third party trademark, they transfer the domain. The evidence is relevant to a variety of core issues in the case. / 12 / / / / 13 Respectfully submitted this 27th day of February, 2012. /s/Enrico Schaefer Enrico Schaefer (P43506) Brian A. Hall (P70865) TRAVERSE LEGAL, PLC 810 Cottageview Drive, Unit G-20 Traverse City, MI 49686 231-932-0411 enrico.schaefer@traverselegal.com Lead Counsel for Plaintiff Anthony P. Patti (P43729) HOOPER HATHAWAY, PC 126 South Main Street Ann Arbor, MI 48104 734-662-4426 apatti@hooperhathaway.com Co-Counsel for Plaintiff 14 CERTIFICATE OF SERVICE I hereby certify that on the 27th day of February, 2012, I electronically filed the foregoing paper with the Court using the ECF system which will send notification of such filing to the following: Enrico Schaefer (P43506) Brian A. Hall (P70865) TRAVERSE LEGAL, PLC 810 Cottageview Drive, Unit G-20 Traverse City, MI 49686 231-932-0411 enrico.schaefer@traverselegal.com brianhall@traverselegal.com Lead Counsel for Plaintiff Nicholas J. Stasevich (P41896) Benjamin K. Steffans (P69712) BUTZEL LONG, PC 150 West Jefferson, Suite 100 Detroit, MI 48226 (313) 225-7000 stasevich@butzel.com steffans@butzel.com Local Counsel for Defendants Anthony Patti (P43729) HOOPER HATHAWAY, P.C. 126 South Main Street Ann Arbor, MI 48104 734-662-4426 apatti@hooperhathaway.com Co-counsel for Plaintiff William A. Delgado (admitted pro hac vice) WILLENKEN WILSON LOH & LIEB LLP 707 Wilshire Blvd., Ste. 3850 Los Angeles, CA 90017 213-955-9240 williamdelgado@willenken.com Lead Counsel for Defendants /s/Enrico Schaefer Enrico Schaefer (P43506) Brian A. Hall (P70865) TRAVERSE LEGAL, PLC 810 Cottageview Drive, Unit G-20 Traverse City, MI 49686 231-932-0411 enrico.schaefer@traverselegal.com Lead Counsel for Plaintiff 15

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?