Feeds

Cisco's iPhone trademark also under threat in US

Defective Declaration of Use?

The essential guide to IT transformation

Cisco may lose the rights to the term iPhone in the US, it has emerged. The news follows last week's revelation by OUT-LAW that the company is in danger of losing the European trademark.

Last week, OUT-LAW exposed the legal loophole that could be used to put the trademark rights in Apple's hands. A US lawyer has found a similar loophole there.

Cisco currently holds the trademark rights to the term iPhone, but Apple last week launched its mobile telephone which it called iPhone, even though it had been negotiating under 24 hours earlier with Cisco over a licensing deal. Cisco immediately filed a law suit claiming infringement of its mark.

In Europe, Cisco's hold on the trademark is less secure than was previously thought. OUT-LAW revealed that a revocation application filed by a German law firm could exploit the fact that the mark appears not to have been used in Europe for over five years prior to the 18 December launch of iPhone products.

That application was filed on 18 December, the very day on which Cisco launched its products. Trademark law in Europe states that a mark must be used and, if it lies idle for five years, can be challenged.

A similar law has been reported in the US, where in order to keep a trademark a company has to file a Declaration of Use to the US Patents and Trademarks Office by the sixth anniversary of the registration of the mark.

Cisco did this, but the photographic evidence it presented in its filing was of an existing Cisco product with a sticker saying "iPhone" put on the outside of the packaging. This may not constitute use for the purposes of the law, said an expert.

Jay Behmke, a partner at trademark law specialists CMPR in the US, told Ed Burnette's ZDNet blog in the US that the company's filing may not be good enough.

"It is possible that the Declaration of Use is defective, as there was no continuous use, and the sample that Cisco submitted was for a product not released until seven months later," he said. "The fact that the Declaration of Use was submitted only days before the deadline expires gives me the impression that they were scrambling to get a product to market, and had to file the Declaration before the product was ready."

Cisco spokesman John Noh rebutted the claims. "We maintain that Cisco has taken all actions necessary to satisfy all elements to prove the validity of our trademark under trademark law in the United States and elsewhere where we hold the trademark," he told Burnette's blog.

Copyright © 2007, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

The essential guide to IT transformation

More from The Register

next story
GCHQ protesters stick it to British spooks ... by drinking urine
Activists told NOT to snap pics of staff at the concrete doughnut
Britain's housing crisis: What are we going to do about it?
Rent control: Better than bombs at destroying housing
What do you mean, I have to POST a PHYSICAL CHEQUE to get my gun licence?
Stop bitching about firearms fees - we need computerisation
Top beak: UK privacy law may be reconsidered because of social media
Rise of Twitter etc creates 'enormous challenges'
Redmond resists order to hand over overseas email
Court wanted peek as related to US investigation
Ex US cybersecurity czar guilty in child sex abuse website case
Health and Human Services IT security chief headed online to share vile images
NZ Justice Minister scalped as hacker leaks emails
Grab your popcorn: Subterfuge and slur disrupts election run up
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.