Feeds

Businessman loses battle for gripe site domain name

Fails to sway WIPO

The Essential Guide to IT Transformation

The figure behind controversial business schemes has failed in his bid to gain control of the .com internet address consisting of his name. A site that criticises his activities has been allowed to keep the name.

In arguments before the World Intellectual Property Organisation's (WIPO) domain name arbitration panel, Australian body Consumer Protection described the man, Stephen Cleeve, as a con man. Its website contains links to and excerpts from a number of articles from the BBC, News of the World, and others detailing Cleeve's business exploits.

Cleeve argued that the domain name was being used to tarnish his reputation and that of his businesses and to disrupt those businesses.

Consumer protection said that its "website does not tarnish the complainant's [Cleeve's] name as it is the activities of the complainant that tarnish his name not the reporting of them".

Cleeve argued that "the respondent [Consumer Protection] continues to use the domain name in dispute and continues to intentionally degrade and smear the name of the complainant and intentionally harm his business activities".

Consumer Protection said, though, that Cleeve is free to take legal action over the content of the site, but that that should not alter its right to own the address. "If there are libellous contents on the respondent website, the complainant should take the issues up with the appropriate court but no action has been taken, only threatened, as the respondent believes that there are no grounds for any action," it said in the case.

In order to gain control of an internet address through the WIPO dispute resolution process, a complainant must satisfy three tests. That person must show that the domain name in dispute is identical or confusingly similar to a trade mark or service mark held by the person; that the owner of the address has no rights or legitimate interests in the domain, and that it was registered and is being used in bad faith.

In order to gain control of the domain the person must show that all three conditions are satisfied. Failure on just one will mean that the original owner can keep the domain, though both parties are free to resort to court action after a decision from WIPO.

The WIPO panel said the domain was identical to Stephen Cleeve's trade mark in his own name, which he registered in 2006. It found, though, that Cleeve failed to show that Consumer Protection did not have legitimate rights in the name.

"The panel finds that the respondent's use of the disputed domain is to establish a website for criticism and commentary about the complainant's business activities. This constitutes legitimate commercial use and fair use within the meaning of the policy," said the ruling.

Cleeve also failed to prove that the domain was being used in bad faith, in part because his trade mark registrations took place more than a year after the domain name was registered by Consumer Protection.

"When a domain name is registered before a trademark right is established, the registration of the domain name was not in bad faith because the registrant could not have contemplated the complainant's non-existent right," said the ruling.

"The merits of the complainant's assertions that the respondent's claims are defamatory and libellous are beyond the scope of the present proceeding and to the extent that the complainant wishes to pursue the issue should in the panel's view be adjudicated in an appropriate judicial forums," it said.

Struan Robertson, editor of OUT-LAW.COM and a technology lawyer with Pinsent Masons, said the case could make others think about their own online identity and brand management.

"If you Google someone's name or brand and the first results are negative, as was the case here, you have a problem whether the comments are true or not," he said. "Consequently we're seeing a shifting focus in the Search Engine Optimisation business. It's becoming an increasingly important aspect of wider brand management and protection strategies and it's wrong to always see it as just a marketing exercise."

"SEO should not just be about getting your site ranked higher than all rivals," said Robertson. "There needs to be attention on the ranking of third party results that comment on your brand. Some firms have begun to specialise in helping their clients to promote the good third party results and, in doing so, burying the bad."

Copyright © 2007, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

Build a business case: developing custom apps

More from The Register

next story
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.