Feeds

iPod designer's private nature costs him jonathanive.com

I will surf Ive

High performance access to file storage

Jonathan Ive, designer of the iMac, iPod and iPhone, has lost a claim for domain names carrying his name because his name is not a trade mark and because he shuns publicity. His name is not used enough in commerce to be protected, an arbitrator has ruled.

Ive has applied for European Community trade marks but they have not yet been registered.

UK-based Harry Jones registered jonathan-ive.com, jonathanive.com, jony-ive.com and jonyive.com in 2004 and operates a website at those addresses carrying news about and praise for Ive and his designs.

Ive came to international prominence when he designed the iMacs that helped to revitalise computer-maker Apple's fortunes in the late 1990s. He has since also designed the iPod and iPhone for Apple, for whom he works full time.

Apple offered Jones $10,000 for control of the domain names, but Jones had already told the company that he would sell the names for $400,000, and was aware that the company had paid $1 million for the iphone.com domain name.

Ive took a case to the World Intellectual Property Organisation (WIPO)'s arbitration centre under its domain name dispute resolution policy (UDRP), which can transfer domain names under certain criteria.

The first criterion for transfer is that the person seeking to gain control of a domain name demonstrates that they have trade mark rights in it. Ive did not apply for any trade mark registrations for his name until October 2008, and those applications are still pending.

"These applications were filed in October 2008. As they are pending applications, they are not sufficient to show registered trade mark rights," said the WIPO Panel.

A name can, of itself, acquire some of the properties of a trade mark though, the panel said.

"A complainant also has the right to claim a common law mark where there is no registered trade mark," it said. "The usual test to ascertain common law rights applies, namely, considering whether the trade mark has acquired secondary meaning, and become a distinctive identifier associated with the complainant’s goods and services."

"In the case of personal names, the complainant must show that its name/trade mark has been used in trade or commerce. Evidence of the complainant’s reputation or renown (on its own) will not necessarily be sufficient to demonstrate unregistered trade mark rights … previous complainants in these type of cases include authors, actors, artists, performers, athletes, royalty, politicians and business people."

The panel noted that the products Ive has designed are marketed as Apple products and never reference him in their promotion or packaging. It also noted that Ive actively shuns publicity and self-promotion.

"I only occasionally accept speaking engagements and only accept payment of direct expenses," said Ive in his declaration to the WIPO panel. "I am a very private person. My reputation has been established by the work I do, not through self-publicity. I do not usually give interviews … I seek to avoid publicity.”

"[Ive and Apple] do not promote [his] name as a brand or trade mark, and therefore do not use it in trade or commerce. [Ive's] work for which he is most famous is publicly recognised and primarily attributable to Apple Inc. rather than [him]," said the ruling. "Despite having the opportunity to pursue individual endeavours outside his employment, which under certain circumstances might be branded under his personal name, [Ive] has made a conscious decision not to do so. In fact, [he] has actively sought to keep his personal name out of trade and commerce."

"[Ive] has failed to establish that he has unregistered trade mark rights in his name, and accordingly the first element has not been met," said the WIPO panel.

Jones retained the right to the domain names, but the panel warned that Ive can take a future case if his circumstances change.

"A different result under this element could occur if or when the [Ive's] Community Trade Marks are registered, or if for instance Apple Inc., takes different steps in relation to the branding and use of [his] personal name. In such circumstances, [Ive] may be entitled to file another…case," it said.

The ruling can be accessed here.

Copyright © 2009, OUT-LAW.com

OUT-LAW.COM is part of international law firm Pinsent Masons.

High performance access to file storage

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.