Feeds

Google pressed to reveal AdWords secrets

Much ado about recreational flooring

Maximizing your infrastructure through virtualization

Goldman, who obtained and posted a copy of the the subpoena (PDF), believes that the case could be a watershed, paving the way for particularly-cunning businesses to weasel information about their competitors from Google and other search sites. "Today, a trademark owner has to bid for their own trademark on Google, and they never quite know what they're bidding against," he says. "But this could give them great insight into how to bid optimally on their trademark." All they have to do, says Goldman, is file a suit and issue a subpoena.

According to Edward J. Naughton, a partner with the international law firm of Holland and Knight who specializes in intellectual property, it is unusual for a company like Google receive a subpoena in a case like this. Typically, he says, a court will ensure that the plaintiff only collect keyword data from the defendant itself, ensuring that other parties are left alone.

Several lawyers we talked to also said they wouldn't be surprised if Google complies with the injunction. "Companies like Google are getting less litigious on these types of issues," says Doug Wolf, co-chair of the trademark group at the Boston-based firm Wolf, Greenfield, and Sacks. "When it's only third-party information involved and there's no clear benefit to them in trying to suppress a subpoena, they'll comply with it."

But both Naughton and Wolf question whether others could use this sort of court action simply to collect data about competitors. "I suppose there's a risk here to businesses, but I think it's pretty small," says Naughton. "It's hard to say that this is going to open the floodgates. In the average case, the court is going to understand the information is competitively sensitive." In the event of a subpoena, the court could also issue a "protective order," which would only allow a company's lawyers to see the subpoenaed information - not the company itself.

Gregory Rutchik, founder of the arts and technology law group, a California-based infringement litigation firm, agrees. "First of all, litigation is incredibly expensive," he says. "But even if a business were willing to spend the thousands of dollars needed to get this sort of information, there's a risk - to the lawyers and to the business - that they'll be sued in return." ®

Seven Steps to Software Security

More from The Register

next story
Whoah! How many Google Play apps want to read your texts?
Google's app permissions far too lax – security firm survey
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
Do YOU work at Microsoft? Um. Are you SURE about that?
Nokia and marketing types first to get the bullet, says report
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Big Blue Apple: IBM to sell iPads, iPhones to enterprises
iOS/2 gear loaded with apps for big biz ... uh oh BlackBerry
OpenWRT gets native IPv6 slurping in major refresh
Also faster init and a new packages system
Microsoft's anti-bug breakthrough: Wire devs to BRAIN SCANNERS
Clippy: It looks your hands are shaking, are you sure you want to commit this code?
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.