Feeds

What’s in a name, asks Bodog founder Calvin Ayre

Is a seized domain worth the paper it’s written on?

Top three mobile application threats

Whether a trademark is a true property right, such as might be enforced against piece of personal property, or a somewhat lesser right appurtenant to the operation of a business, American courts have ignored ICANN's position and held that domains, which are bought and sold freely, entail property rights suitable to such a fungible entity.

Fair enough. But can a court really force the transfer of a trademark from an entity operating a business utilizing that trademark to one that is not? Can a trademark, or a domain based thereon, be severed and transferred from the very business from which it grew? More importantly, how can a mark devoid of the history and usage to which it has previously been attached have any value at all?

A Bodog by any other name

1st Technology thinks it can force a transfer, and so far the Washington state court has agreed.

1st Technology bases its claim on the landmark Sex.com case, Kremen v. Cohen, which first established property rights in domains. Of course, as anyone familiar with the Sex.com drama knows, the facts of that case involved a fraudulent transfer of a generic, though valuable, domain name.

Whether or not that same 9th Circuit Court of Appeals - or the US Supreme Court, for that matter - would view the forcible transfer of a domain based on an already registered trademark is another question entirely. Trademarks are intimately associated with a certain business style and established good will – not exactly the kind of business asset that transfers from one business to another easily.

The universal reach of the internet provides unique difficulties as well. 1st Technology claims that Bodog’s trademarks are unenforceable in the US because they are based on illegal activity, which could well be true but which ignores the fact that Bodog could well have enforceable trademark claims in jurisdictions around the world, and that taking over the company's websites might breach Bodog trademark rights elsewhere.

Bodog has been operating for the time being from the site BodogLife.com, registered with Network Solutions, based in Virginia - a jurisdiction that seems to be a little more sympathetic to Bodog's claims in an admittedly unsettled area of law. That won’t reverse the tide in this case, but it might make it easier to defend future domains that might be at risk.

Ultimately, the victory for 1st Technology could be pyrrhic. Bodog's customers have already switched to its new site, and 1st Technology's suggestion that an unrelated business might be run off the site seems wistful. Legalization of internet gambling in America is really the company's only hope that Bodog will find it worthwhile to maintain significant assets in the US.

1st Technology has quite a wait in front of it to satisfy this judgment, if ever, in full.

PDFs of the filings can be found here

Burke Hansen, attorney at large, heads a San Francisco law office

Combat fraud and increase customer satisfaction

More from The Register

next story
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
US Supreme Court supremo rakes Aereo lawman in oral arguments
Antenna-array content streamers: 'Ruling against us could dissipate the cloud'
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.