Can Exchanged Emails Constitute an Enforceable Contract?

by Rob Hassett

Before sending an email to seal a deal, consider this scenario:

“I sent an email offering to buy an acquaintance’s car for a particular price. I added my name at the end of the email. The person I made the offer to sent an email back accepting the offer and included her name. I’ve decided I would rather buy a different car. Am I required to buy hers?”

The sale should have been contingent on an inspection. However, the emails as written appear to be sufficient to constitute a valid contract. If the buyer backs out, the seller may be able to convince a court to require him to buy the car, or at least pay the difference in price between the market value of the car and what he offered.

For a contract to be enforceable the parties involved must agree to all essential terms, and each has to manifest that party’s intention to enter into an agreement with the other. Additionally, certain types of contracts, including those for the sale of goods for a sum equal to or in excess of $500, must be in writing and signed by the parties.

The emails as described indicate an intent to buy and sell the vehicle. Sufficient terms are included to complete the transaction. Consequently, an exchange of emails can satisfy the requirement of a signed writing.

Any person asserting that a contract has been entered into via email must still prove that the other party actually sent and received the emails in question. Contrary to what you might think, sufficient proof will usually not be that difficult to provide.

Be sure about what you are emailing – as it may be enough to form a contract.

Rob Hassett is of counsel with the Atlanta, Georgia law firm of Casey Gilson, P.C. This column is provided for general information only and does not constitute legal advice.

Spam Laws and Entertainment

By Rob Hassett

Casey Gilson P.C.

Six Concourse Parkway, Suite 2200

Atlanta, Georgia 30328

(770) 512-0300, ext. 557

rob@internetlegal.com

Law Firm Website:  www.caseygilson.com

Personal Website:  http://www.internetlegal.com/

Posted: May 8, 2006

* Mr. Hassett is a co-author of Volume 5 (which volume is entitled Internet and Interactive Media) of the 10 volume treatise entitled Entertainment Industry Contracts which is published by Lexis Nexus.  This article is adapted from Chapter 109Q of Volume 5 of that treatise.

109Q.01   Background

One of the goals of any entertainment oriented website is to encourage individuals to view the site.  Websites generally earn income by selling products or services, charging for subscriptions or advertising.  No matter what approach is used, the more “eyeballs” the better.  Therefore, one of, if not the primary, goal of any entertainment website is to attract viewers.

One way to attract viewers is by sending promotional emails to customers and potential customers.  However, if the email is unsolicited, or, even if consented to, if the recipient believes it is unsolicited or if the recipient otherwise does not want it, the sender risks serious adverse consequences which may include:

(1)       Alienation of customers and potential customers irritated by the email;

(2)       Blocking of all email from the sender either by the recipient or by the recipient’s use of certain types of software and services that block out all email from a sender’s address; and

(3)       Violating applicable law including incurring substantial civil and/or even criminal penalties.

109Q.02         Alienation of Customers and Potential Customers

Most recipients of spam hate receiving it and a significant percentage of recipients of email will in effect “boycott” any vendor that sends them unsolicited email.  Unfortunately, many spammers will weigh this fact against the fact that a significant portion of the population (according to some reports, as high as eight (8%) percent) will, on at least some occasions, purchase products or services in which they are interested from a vendor they learn about from spam.  Still, the likely alienation of customers and potential customers should be enough, without more, to dissuade most owners of entertainment websites from trying to attract viewers by using unsolicited email.

109Q.03         Blocking of Emails

Email recipients can take steps to block a substantial percentage of email sent to them by spammers.  One option, available to most recipients of email, is to intentionally block all email from a particular email address or from an entire domain.  There are two (2) major drawbacks to this approach.  First, many times the spammers use the return email addresses of other innocent parties. This practice, called spoofing, is illegal and even criminal, but does make it impossible for any recipient to be sure that they are blocking email from the address of the spammer as opposed to the address of an innocent third party.  Second, this approach is reactive, as opposed to proactive, in that the recipient must first receive the unwanted email before being able to block future email from that same address.

There are also software programs, such as the “SafetyBar” software available at http://www.spamnet.com/, that are community based and use algorithms to redirect email received that purportedly constitutes spam into a spam folder.  Such software does not rely on the purported return address to determine whether an email is spam.  Instead the software blocks emails based on whether a certain number of its over 1 million users report that they have seen the email and that it is spam.  If the email is confirmed as spam, then it is sent to the spam folders of all users of the software (the users can always view the software and elect to receive email from that source).  Then, using proprietary algorithms, emails from the same source, which, as addressed above, may not be the same as the purported return address on the email, are also blocked.

Additionally, many business users run all of their email through outside spam and virus blocking services such as the service available from AppRiver at http://www.appriver.com/ and Postini at http://www.postini.com/.  With these services the user routes all email to a particular domain through the spam and virus blocking service of the third party provider.  The advantage of these third party services is that the email is blocked before it ever reaches the user’s computer and so the services are much better for users who also view their email with BlackBerries, cell phones and other wireless devices.  Products like SafetyBar work only on the computer on which the software resides and so are no help for blocking spam to BlackBerries and similar devices.

The problem for the owner of a website is that if the owner sends out mass emails not wanted by the recipients, with widespread use of the above described software and/or services, all emails from that owner may be blocked.  In that situation a customer who, by signing up, is supposed to receive  an email,  may never receive it and, if they do not check to see what is blocked, may never know they did not receive it.

109Q.04         Anti-Spam Laws

Prior to January 1, 2004 there was no federal law prohibiting spam.  However, 29 states had enacted laws prohibiting unsolicited email.  There was variation among these statutes.  The most restrictive statutes were Delaware’s (prohibited all unsolicited bulk commercial email) and California’s (prohibited all unsolicited commercial email).  Other states included one or more of the following four prohibitions on commercial and/or bulk email:

(1)       Must not include false or missing routing information, misleading subject line and/or use another’s domain name;

(2)       Must not include sexually explicit material;

(3)       Must include “ADV” or “ADV ADLT” (or similar, but differing) language in the subject line (generally at the beginning); and/or

(4)       Must include an easy method to opt out from future emails.

One question many lawyers had was whether the Delaware and California laws were constitutional.  If constitutional, the law in these states would legally prohibit most unsolicited commercial email.  With respect to commercial speech that concerns lawful activity and is not misleading, the test of constitutionality is:

(1)       Is there a substantial governmental interest;

(2)       Does the law directly advance that governmental interest; and

(3)       Is there a reasonable fit between the purpose of the restriction and the scope of the restriction?

The Delaware and California statutes did meet the first two tests.  There is a substantial governmental interest in reducing unsolicited commercial email in that there is now so much of it that it slows down the Internet and most people hate receiving it.  A prohibition on unsolicited commercial email advances that interest since, if spammers are prohibited from sending unsolicited commercial email to Delaware and California, their citizens would, at least theoretically, not receive any.

The interesting question is whether or not the third test is met.  Is there a reasonable relation between the objective being achieved and the scope of the restriction?  There are certain other, less drastic, ways to reduce unsolicited commercial email such as requiring “ADV” in the subject line.  With “ADV” in the subject line any individual or ISP could screen out the email.  Proponents of the Delaware law would probably argue that the constitutionality of the Delaware law is supported by the cases holding that the federal anti-fax statute, which prohibits all unsolicited faxes, is constitutional.  However, there is no way for individual fax machine owners to screen out unwanted faxes while there is a way to screen out unsolicited commercial bulk email other than to bar all of it.

In any event the state laws only applied to unsolicited “commercial” email.  The reason is that under the “free speech” clause of the First Amendment to the U.S. Constitution any restriction of non-commercial speech must be narrowly tailored (in other words there is less room to go beyond what is necessary to advance the interest of concern).  So sending out a bulk email that contains primarily informative, literary or artistic content, even if it also contains a promotional or advertising element, would seemingly not have been barred under any state law.

All of the state statutes of which the author is aware defined “unsolicited” as having no pre-existing relationship.  So if there was a pre-existing relationship, these statutes would not apply.

Until January of 2004, there was no federal law expressly prohibiting spam.  Probably partially due to lobbying by bulk emailers who were operating in the United States and believed themselves to be vulnerable to lawsuits based on state anti-spam laws at the end of 2003 Congress enacted a federal anti-spam law that became effective as of January 1, 2004.  The bulk emailers who lobbied for passage probably preferred one anti-spam law that applied across the country and allowed mass emailings provided certain requirements were met as opposed to a large number of different, sometimes contradictory, laws that in a few states completely prohibited mass commercial emailings.  The Act is entitled:  “The Controlling the Assault of Non-Solicited Pornography and Marketing Act” and is referred to as the “CAN-SPAM Act of 2003.”  Most  sections of the Act are codified at 15 USC 7701 et. seq.  Important features of the CAN-SPAM Act include:

(1)       It only applies to “commercial electronic mail.”  “Commercial electronic mail” is defined as “electronic mail . . . the primary purpose of which is the commercial advertisement or promotion of a commercial product or service (including content on an Internet website operated for a commercial purpose).”  The Federal Trade Commission was assigned the task of enacting regulations for determining “the primary purpose of an electronic mail message.”  One reason the Act was written to apply only to “commercial email” was to reduce the likelihood of a court finding that the Act violates the free speech clause of the first amendment.  The term “commercial email” is ambiguous.  However, an email newsletter with primarily informative or entertainment content concerning computers, the Internet, news, sports,  political or other matters sent out by an entity that promotes nothing or includes ads and/or solicitations which are placed deep in the newsletter and from multiple sources would not, in the opinion of the author, be within the scope of the CAN-SPAM Act.  On the other hand, an email from an entertainment website inviting recipients to try out the site would certainly be within the scope.  Whether an emailed newsletter from a business, such as a law firm, that provides goods and services but does not distribute, in either a printed or electronic format, publications as its main business is within the scope of the CAN-SPAM Act can be a close question.  The author believes that if the newsletter consisted primarily of informative material, it would not be considered “commercial” and therefore not subject to the requirements of the Act.

(2)       The Act “supersedes any statute, regulation or rule of a State or political subdivision of a State that … regulates or restricts the use of electronic mail to send commercial messages, except to the extent that such statute, regulation, or rule prohibits falsity or deception [or laws that are not specifically focused on electronic mail such as state trespass, contract or tort law or state laws that relate to acts of fraud or computer crime].”

(3)       The law does not prohibit the sending of commercial email messages, but instead prohibits certain activities in conjunction with sending out such electronic mail.

(4)       Unlike the state laws, although an exemption may be introduced by regulation, the Federal law does not exempt email just because there is a prior relationship between the parties except that it does provide an exception from requirements not related to deception as to the source of the email to the extent the email is a follow-up to a previous transaction such as related to warranty rights.  It is important to note that this exemption does not, by definition, apply if the email contains advertising or a solicitation.

(5)       Unlike as was the case under state law, obtaining a consent only exempts a spammer from being required to clearly and conspicuously indicate that a commercial email is an advertisement or solicitation (See “7(g)” below).  The state law prohibitions only applied to email that was “unsolicited.”

(6)       The following constitute criminal violations:

(a)      Assessing a computer without authorization and sending out multiple commercial email messages from such computer (some of the worst spammers have been using computers of unaware consumers with fixed connections to the Internet such as over cable modems or DSL to send out their commercial email);

(b)      Deceiving recipients of email as to the source of the email message (this would cover one of the most insidious, but common, practices whereby spammers “spoof” the email domain name of an unknowing website owner misleading all email recipients into believing that that innocent website owner sent the spam thereby harming the reputation of the website owner).

(7)       The following constitute civil violations:

(a)       The above criminal violations can also be the basis for civil claims;

(b)       Inclusion of deceptive subject headings;

(c)        Failure to include a functioning return electronic mail address;

(d)       Failing to clearly provide an opportunity to decline further communications via email;

(e)       Continuing to send email ten (10) days after being requested to stop;

(f)         Failing to provide a valid physical postal address of the sender; and

(g)  Failing to clearly and conspicuously indicate that the message is an advertisement or solicitation.

(8)       Any sexually oriented email must contain a warning in the subject heading.

(9)       The prohibitions apply to any person that “initiates” a commercial electronic mail message which includes both originating or transmitting the message and procuring the origination or transmission of the message.  So a website owner that hires a bulk emailer to send out the emails can be liable for all the above violations.

(10)     A supplier of products or services to an affiliate (an entity in which the supplier holds a greater than 50% controlling or economic interest) or to an unrelated third party when the supplier has actual knowledge of a violation is required to take reasonable actions to prevent the transmission of or detect and report to the Federal Trade Commission the sending of commercial email with misleading information in the header of the email regarding the sender of the email.

(11)     Enforcement of criminal penalties is handled by the United States Department of Justice.  The right to enforce civil penalties is vested in the Federal Trade Commission except for bulk emailers which are regulated by specific agencies such as member banks of the Federal Reserve System, brokers and dealers under the Securities & Exchange Commission and insurance companies under state insurance commissioners, with respect to which enforcement of civil penalties is vested in such other agencies.  There are no private rights of action.  Attorney Generals of various states can file actions on behalf of the citizens of those states.  For certain violations, application service providers may file actions to recover damages to them.

(12)     Penalties and liabilities include:

(a)       For a criminal violation – fines up to $500,000 for organizations and $250,000 for individuals and imprisonment for up to 5 years and forfeiture of all gross proceeds obtained as a result of the offense and of any equipment, and/or software used to commit or facilitate the offense;

(b)       For a civil violation –

(i)         If subject to enforcement by specific agencies such as the Securities & Exchange Commission, penalties are set by the statute specific to regulation of those agencies; otherwise, penalties are set under the Federal Trade Commission Act and include penalties of up to $11,000 per violation.

(ii)        Enforcement by states – the attorney general of any state may file a civil action on behalf of residents of the state denominated as an action “as parens patriae” – the courts are unclear as to whether that money is kept by the state or provided to the citizens –  equal to the greater of $250 per email to each recipient in the state or the amount of actual damages proved.  The court may triple the award and also award attorney fees.

(c)        Internet Access Services – have the right to file actions to enjoin actual losses and collect up to $100 per email per recipient.

The FTC reports on its website (www.ftc.gov/spam) that it has already filed actions for violations of the Anti-Spam Act, although the descriptions of cases on the website indicate that the initial actions are against spammers that are involved in some sort of deception as opposed to other types of violations such as failures to indicate that the spam is an advertisement or promotion.

Various state cases have held that the sending of large volumes of unsolicited email to the customers of particular internet service providers, after being notified not to do that, can constitute trespass under state law because of the damage to the computers of the internet service providers.

For additional information about anti-spam laws see Professor David Sorkin’s excellent website at http://www.spamlaws.com/ and the Federal Trade Commission’s website concerning its anti-spam activities at www.ftc.gov/spam.

109Q.05         Foreign Anti-Spam Laws

Although beyond the scope of this Chapter, the sending of promotional email to residents of many countries outside the United States, including countries that are members of the European Union and Canada, is restricted by the laws of those countries.

109Q.06         Conclusions

To avoid alienating customers, being added to numerous block lists and violating applicable law, choices for website owners are:

(1)       Not to use email to promote the website;

(2)       Send email only to visitors to the website that have consented to the sending of email to them, or have otherwise consented to receiving email at seminars, trade shows and the like, not to exceed the scope of such consents and comply with the provisions of the CAN-SPAM Act that apply even when a consent has been obtained; or

(3)       Include an ad in established well-received email publications such as emails sent daily by the New York Times, the emails sent weekly by email services such as the Leebow Letter published by 300incredible.com (see http://www.300incredible.com/), or the CNET newsletter available at (http://www.seenet.com/).

Because of the uncertainty about what constitutes “commercial electronic mail” the undersigned is currently cautioning clients against sending “educational” emails that are apparently sent for the purpose of drawing potential customers to a website except in strict compliance with the CAN-SPAM Act.  Although a very strong argument can be made that if informative and where directly promotional material is only a minor part of such emails and placed toward the end, such emails are not covered by the CAN-SPAM Act, unless and until it is made clear by applicable regulations or case decisions that such emails are not covered, the potential exposure is too great to justify sending those materials out except in compliance.  Additionally, no matter how valuable the newsletters may be, many recipients will block further emails from such address which could interfere with later communications.

Even if the bulk email your client is planning to send out is in compliance with federal law, it is also necessary for your client to comply with the terms of use of its own internet service provider.    Also, if the volume of email being sent out is sufficiently large, your client may receive a notice to stop sending to customers of a particular ISP and, if not stopped, there are cases that would indicate that action could be considered trespass.

© 2006 LexisNexis and Rob Hassett, All rights reserved.

The information above is provided for general educational purposes and not as legal advice. Laws in areas in which we practice change continually and also vary from jurisdiction to jurisdiction. Therefore no visitor to our site should rely on any of the articles provided for legal advice, but should always consult their own attorney regarding legal matters.


Entity Comparison Chart

By Rob Hassett

CAUTION – THIS CHECKLIST HAS BEEN PREPARED FOR GENERAL EDUCATION PURPOSES ONLY AND DOES NOT CONSTITUTE SPECIFIC LEGAL ADVICE. THERE ARE MANY EXCEPTIONS TO THE INFORMATION SET FORTH IN THIS CHART AND THEREFORE ANY READER SHOULD RELY ONLY ON THE ADVICE OF A PROFESSIONAL TAX ADVISER WITH RESPECT TO TAX RELATED MATTERS.

(1)  Applies to All Three:

CONSIDERATION

C CORP

S CORP

LIMITED LIABILITY COMPANY*

Limited Liability

Yes

Yes

Yes

(2)  Reasons to Use C:

CONSIDERATION

C CORP

S CORP

LIMITED LIABILITY COMPANY*

Number of Owners

No restrictions

1-75

No restrictions unless publicly traded

Tax Year

May be fiscal

Usually calendar

Usually calendar

Deductions for health insurance

Yes

Yes

Yes

Fed tax on income left in business

Essentially 34%

Up to 35%

Up to 35%

Qualified small business stock (10% on capital gain)

Yes

No

No

(3)  Reasons to Use C or S:

CONSIDERATION

C CORP

S CORP

LIMITED LIABILITY COMPANY*

Expenses of setup

Inexpensive w/out shareholder agreements, incentive stock options, etc.

Inexpensive w/out shareholder agreements

Usually more expensive where advantageous (to deal with allocations, capital accounts, etc.)

1244 Stock (ordinary loss on sale or liquidation)

Yes

Yes

No

Tax deferred reorganization

Yes

Yes

No

ISO’s allowed

Yes

Yes

No

Gain on redemption taxed at ordinary income rates to extent of receivables

No

No

Yes

(4)  Reasons to Use C or LLC:

CONSIDERATION

C CORP

S CORP

LIMITED LIABILITY COMPANY*

Allowed Owners

No restrictions

Individuals and Certain Trusts, or 100% by S

No restrictions

Classes of Ownership

Yes

Voting v. non-voting only

Equivalent to C available

(5)  Reasons to Use S:

CONSIDERATION

C CORP

S CORP

LIMITED LIABILITY COMPANY*

FICA including Medicare reductions

No

Yes

No

(6) Reasons to Use S or LLC:

CONSIDERATION

C CORP

S CORP

LIMITED LIABILITY COMPANY*

Levels of Federal Taxation

2

1

1

Levels of State Taxation

2

1

1 in most states

Long-Term Capital Gain

Federal Income Tax at full rate on corporation’s gains

Federal Income Tax at 15% to shareholders

Federal Income Tax at 15% to Members

Accumulated Earnings Tax

Yes

No

No

Cash method of accounting

Generally allowed if under $5 million in sales (Restrictions apply when primary business is sale of inventory)

Generally allowed (Restrictions apply when primary business is sale of inventory)

Generally allowed if not owned by particular types of C corporations (Restrictions apply when primary business is sale of inventory)

(7)  Reasons to Use LLC:

CONSIDERATION

C CORP

S CORP

LIMITED LIABILITY COMPANY*

Losses

Don’t pass through

Can’t be allocated

May be allocated

Later Conversion subject to tax on built in gains

C to S (yes ultimately)

C to LLC (yes)

S to C (no)

S to LLC (yes)

LLC to S (no)

LLC to C (no)

* The members of a limited liability company may elect that the limited liability company be treated for tax purposes as a C corporation, an S corporation or a partnership. For purposes of this checklist, it is assumed that the members have elected that the limited liability company be treated for tax purposes as a partnership.

Rob Hassett 3/15/2000 Revision.

 

Film & Television 101: Acquiring Life Story, Publishing & Other Related Rights

For:  Fourth Annual Entertainment and Sports Law: A Basics Boot Camp

Friday, September 26, 2003

Grand Hyatt Hotel, Atlanta

 

By Rob Hassett[1], Casey Gilson Leibel P.C., Atlanta, Georgia.

TABLE OF CONTENTS

I. INTRODUCTION ……………………………………………..…………………..

II. PROTECTING IDEAS ………………………………………………………….

III. LEGAL ISSUES RELATING TO DISTRIBUTION ………..…………………

IV. LIFE STORY RIGHTS …………………………………………………………

V. AUDIOVISUAL RIGHTS IN LITERARY MATERIALS ……………………..

VI. NEGOTIATIONS AND ACQUIRING RIGHTS ……….…………………….

VII. RECORDING EXCLUSIVE LICENSES …………………………………….

VIII. CONCLUSION ……………………………………….……………………….

I.          INTRODUCTION

An individual with an idea for a film or television program (hereinafter referred to as a “Filmmaker”) will want to reduce the likelihood that:

1.         his or her idea will be stolen; and

2.         legal concerns or uncertainties will make it difficult for the Filmmaker to obtain a distribution deal.

Obtaining life story rights, audiovisual rights to a pre-existing literary work, or other exclusive rights can reduce or eliminate these concerns.

II.        PROTECTING IDEAS

A well-established Filmmaker can generally discuss their ideas with actors, studios and potential distributors with little fear of the idea being stolen. This is because it is likely that people with whom the established Filmmaker discusses the deal:

1.         Would not want to cross the Filmmaker and face the consequences of making an enemy of someone with connections in the business; and

2.         Would prefer to work with that proven Filmmaker if only to avoid competing with someone that is likely to complete production long before that actor, distributor, etc. could complete a competitive film or program.

This is not the case with a new Filmmaker. Ideas of new Filmmakers are frequently stolen. Of course, a new Filmmaker can have a non-disclosure agreement prepared which service providers (production companies, less well-known actors, etc.) would probably sign. However, the film studios and networks will not be willing to sign non-disclosures. In fact, they will require that the Filmmaker sign a submission release before submitting the idea. The submission release will usually provide that unless the studio or network violates the Filmmaker’s copyrights, the Filmmaker has no claim against the studio or network. So the Filmmaker should try to develop assets that are connected with the film or series that the studio would want. Assets could include an exceptionally well written script, audiovisual rights in a novel or other book, special skills, such as, if the film will involve underwater photography, talent as an underwater photographer, or if the film involves esoteric knowledge, exclusive agreements with a particular professor in the field. If the film involves a person’s life, exclusive rights to personal interviews, documentation and old footage would be helpful. The objective is to make it so that the studio wants something that the studio can get only if it works with the Filmmaker. Exclusive rights to base a film on a novel and exclusive life story rights are excellent ways for a Filmmaker to try to protect his or her idea.

III.       LEGAL ISSUES RELATING TO DISTRIBUTION

A distributor of a film or series does not want to be concerned about lawsuits. Lawsuits relating to a film or program may be brought on a variety of grounds including:

1.         Violation of privacy and publicity rights of an individual who is a subject of the film or program including:

(a)        Wrongful appropriation of identity, likeness, image or name (this form of the right of privacy, with minor differences, also constitutes the right of publicity);

(b)        Wrongful intrusion (peeping Tom scenario);

(c)        Wrongful disclosure of embarrassing private facts; and

(d)        False light;

2.         Defamation, libel or slander of an individual who is a subject of the film or program; or

3.         Copyright infringement of an underlying work such as a book.

Each of the above rights, except for copyrights, are governed by state, rather than federal, law and therefore vary from state to state. However, the statutes, in those states with statutes that concern privacy and publicity rights, tend to be similar. In those states, such as Georgia, where the rights are based on case law, the principles applied are generally similar both to other states where the rights are based on case law and those where the rights are set forth in statutes. Additionally, application of these laws is subject to the free speech clause of the first amendment, which curbs the impact that privacy and publicity rights can have on films and television programs. Of course, because of the differences that still exist, it is necessary to specifically check the law of each state that may be relevant. Likewise, most states have enacted statutes relating to defamation that are generally similar and their impact is subject to the free speech clause of the first amendment.

Wrongful appropriation and wrongful disclosure of embarrassing private facts are the areas of privacy law most likely to be violated by Filmmakers. Both are addressed in detail in the author’s article on privacy and publicity rights provided with this paper.

The type of wrongful intrusion that constitutes a violation of the right of privacy is wrongful intrusion into private activities in such a manner as to outrage or cause mental suffering, shame, or humiliation to a person of ordinary sensibilities. To constitute a violation of the right of privacy an intrusion must occur in a situation where there is first a reasonable expectation of privacy.

False light invasion of privacy is the same as defamation except that the false statement need not be disparaging. For instance, if you say that a person went to Harvard when that person did not, you have not defamed that person, but you may have violated that person’s false light version of the right of privacy.

Often the subject of a biography or other work based on historical events will have created paintings, writings, photographs or other materials protected by copyright which could be useful in a film or series. Obtaining copies without cooperation of the subject of the film or series may not be possible. Use without authorization of the author will often constitute copyright infringement.

Films and television programs are also often based on literary works such as books and screenplays. These works are also usually protected by copyright law (unless because of the length of time since the author died or other reasons they are in the public domain) and therefore use as the basis of a film or program would constitute copyright infringement.

IV.       LIFE STORY RIGHTS

Drafting and negotiating agreements is much more than a logical exercise where the attorney throws in every term favorable to his or her client. The attorney also has to try to determine in the particular circumstances what the client can live with and reasonably expect to obtain and help guide the client in determining what can be asked for without destroying any chance of obtaining the rights that are needed. Generally, for a first time Filmmaker who is not paying a substantial sum to the subject of a film or program, it is probably best to seek:

(a)        Exclusive rights to interviews for any audiovisual work for a period of time (obviously the longer the better);

(b)        A release from all privacy and publicity rights; and

(c)        An exclusive right to use any documents, film footage or other materials that may pertain to the matter, especially photographs and audiovisual materials, for a period of time (at least 5 years).

For a first time Filmmaker who is not paying a substantial sum for the grant of rights, it is probably better not to seek a release of claims for libel and/or slander since this tends to cause the subject to reject the entire proposal. Producers, writers and directors should always be warned not to defame anyone in their works and have their productions reviewed by a qualified lawyer at each level (scripts, first cuts and final cuts) to flag potential problems.

V.        AUDIOVISUAL RIGHTS IN LITERARY MATERIALS

Because of the great quantity of nonfiction books, novels and short stories published each year, and those that have been published in the past and not been used as the basis for audiovisual works, literary materials can be a great resource for Filmmakers. Many writers are as eager to see a film made based on their books as Filmmakers are to make one. A good approach is to find a terrific book that was popular many years ago, has since been forgotten, and has never been used as the basis for a movie or television program. A typical arrangement is to obtain either an agreement for exclusive rights or an option. Typically for a low option price (such as $1,000 to $5,000), the option can be extended from year to year for a similar low payment for up to 5 years. Exclusive rights can be exercised, for a much higher payment( $100,000 or more), at any time during the option period. Once exercised, the Filmmaker would have the exclusive right to make an audiovisual work based on that book for the life of the copyright subject to any applicable right of reversion, such as, for grants of exclusive rights by an individual author on or after January 1, 1978, the right of reversion set forth in 17 U.S.C. §203 of the United States Copyright Act.

VI.       NEGOTIATIONS AND ACQUIRING RIGHTS

Acquiring Life Story and Audiovisual rights in literary works is usually not easy. It often takes many months and requires a great deal of energy, persistence, and patience. Expressing frustration is a sure fire way to kill any chance of putting the deal together.

VII.     RECORDING EXCLUSIVE LICENSES

No one would think of purchasing a house without first assuring that a chain of title to the property is established in the courthouse. A transfer of the property is obtained in writing and that transfer is then recorded in the courthouse of the county in which the property is located. However, acquirers of exclusive licenses to literary works frequently fail to take the analogous steps provided for under the Copyright Act. This is detrimental because grants of copyrights and exclusive rights in copyrights are not valid unless they are in writing, and are subject to loss due to bankruptcy of the grantor or unscrupulous conduct of the grantor who resells the rights (even though the acquirer would have a right to sue such unscrupulous grantor for damages) if the grant is not recorded in the U.S. Copyright Office. The copyright of the original author should be registered in the name of the original author and each grant of an assignment or exclusive license should be recorded. Rather than record the entire agreement, the parties will often sign a short form exclusive license that sets forth the terms of the license to be recorded. This maintains the confidentiality of the overall deal while still meeting the requirements of the Copyright Act.

VIII.    CONCLUSION

Life story and audiovisual rights in literary works can be extremely valuable, especially for a new Filmmaker. Acquiring such rights can mean the difference between having an idea stolen and making one’s own film or program. These rights can also increase the chances that the Filmmaker can obtain distribution of his or her film or proposed program.


© 2003 Rob Hassett, All Rights Reserved.


[1] The writer wishes to thank Laura Hassett for her help in preparing this paper.

The information above is provided for general educational purposes and not as legal advice. Laws in areas in which we practice change continually and also vary from jurisdiction to jurisdiction. Therefore no visitor to our site should rely on any of the articles provided for legal advice, but should always consult their own attorney regarding legal matters.

Will Internet Radio Stations That Stream Music Have to Shut Down?

First Published in the Atlanta Lawyer March 2009

by Rob Hassett

Introduction
Creative and adventurous entrepreneurs, who could never afford to buy a broadcast radio station, have set up many internet radio stations that stream music and offer features that could only be made available over the internet. www.live365.com allows you to find stations that play almost  any type of music imaginable. Yahoo’s Launchcast, (http://music.-yahoo.com/launchcast/), now  managed by CBS Radio, (http://yahoo.client.shareholder.com/) and Pandora, (http://www.pandora.com/) allow you to type in names of favorite artists or songs and will then play songs, based upon those choices. With Pandora you can set up as many “channels” as you want, with each based on a different artist or set of artists (i.e. with each song by the artist selected or an artist with a similar sound). Although Congress has passed laws to promote experimentation, growth and development on the internet by limiting liability exposure of the owners of commercial websites, Congress has also  passed laws that have put internet radio, and all that it offers, on the verge of extinction.

Background
In the United States, songwriters (and publishers for songwriters) have traditionally received “public performance” royalties when their songs were played on broadcast radio and in other public forums. Royalties for songs are collected by ASCAP, BMI and SESAC and, for internet radio, total royalties have been in the range of 3.5 – 5% of gross income derived from the broadcast of the music. Owners of the copyrights in sound recordings have traditionally received  no royalties for public performances in the United States. This continued to be the case until enactment of the Digital Performance Right in Sound Recordings Act of 1995. This Act provided that copyright owners of sound recordings would have a public performance right in  audio recordings that were transmitted by a station requiring a subscription, such as satellite radio, and in any digital transmission that was “interactive.”  In 1998, the Digital Millennium Copyright Act was enacted, which, among other things, included provisions, codified in 17 USC § 106(6) and §114, that expanded performing rights of  the owners of sound recordings to include sound recordings transmitted digitally over the internet (i.e. via internet radio). In connection with this right, Congress also provided for a set  (“statutory”) royalty rate to be established for non-interactive internet radio stations that met  certain other criteria. If not decided by negotiation among stakeholders, it provided that the royalty rate would be determined by an ad hoc Copyright Arbitration Royalty Panel.  The statutory rates would only apply if the webcast was not “interactive” and other criteria were met, such as, limiting notice of when songs would be played, to make it unlikely that webcast streaming would become a substitute for music downloads.

2 Problems
There were two problems with Congress’ approach. First, to benefit from a set royalty rate (which would be better for each station than having to negotiate separately with each record label), the station could not be “interactive.” Unfortunately, Congress defined “interactive” broadly and ambiguously so many stations do not know whether they are interactive or not.  Second, Congress’ wording of the standard the arbitrators were to use for determining the statutory rates encouraged the arbitrators to impose unreasonably high royalties.

Determining Whether a Station Is Interactive
The definition of “interactive” set forth in the Digital Millennium Copyright Act reads, in pertinent part, as follows:

An “interactive service” is one that enables a member of the public to receive a transmission of a program specially created for the recipient, or on request, a transmission of a particular sound recording, whether or not as part of a program, which is selected by or on behalf of the recipient.  17 USC § 114(j)(7).

The phrase “a program specially created for the recipient” is ambiguous. As referred to in the above Introduction, using advanced techniques, some of the most popular internet radio stations utilize input from the listener to create a “personalized station.” So does that result in programs that are “specially created for the listener”?

In 2001, Sony BMG, and other record labels, filed a lawsuit against Launchcast internet radio for copyright infringement, claiming Launchcast was an “interactive” radio station and had no right to stream music under the statutory license granted to non-interactive radio stations. On November 3, 2005, the United States District Court for the Southern District of New York held that whether or not Launchcast was “interactive” was a jury question. Arista Records, Inc. v.  Launch Media, Inc., 2005 WL 2898735 (S.D.N.Y.), and on April 27, 2007, a jury found that Launchcast was not interactive. Sony BMG said it would appeal. As of this writing, the author has not seen any order relating to the appeal of that decision.

Statutory (Set) Rates
For reasons that are likely related to which groups had the more effective lobbyists, the standard for determining statutory rates as provided for in the acts referred to above, was made much more favorable to existing satellite radio, than to webcasters. The Digital Performance Right in Sound Recordings Act of 1995, in a provision codified at 17 USC § 801(b), directed ad hoc Copyright Arbitration Panels to set royalty rates for pre-existing satellite radio that are reasonable and are calculated to maximize the availability of creative works to the public, to afford the copyright owner a fair return on his or her investment and the copyright user a fair income, to consider the contributions and risks taken by each party and to minimize any disruptive impact on the industries involved. The Digital Millennium Copyright Act, in a provision codified at 17 USC §§ 114(f) (2) (A), directed the Copyright Arbitration Royalty Panels to set royalty rates for webcasters (as well as others including new, i.e. not  preexisting, satellite radio stations) “that would have been negotiated between a willing buyer and a willing seller.” No language indicated that the Panels should be concerned about maximizing the availability of creative works or the disruptive impact on internet radio.  As a result, in 2002, royalties for internet radio were set at an amount that would put many internet radio stations, already earning little if any money, out of business. Webcasters appealed the decision to the D.C. Circuit Court of Appeals. The D.C. Circuit Court of Appeals affirmed the decision. See, Beethoven.com LLC v. Library of Congress, 394 F.3d 939 (D.C. Cir. 2005); and See generally, Melville B. Nimmer and David Nimmer, Nimmer on Copyright 8-352.  (Rel.61-8/2003).  In 2002, partly because of concerns over the adverse effects of the high rates, Congress passed  the Small Webcaster Settlement Act of 2002. The new Act led to an agreement among the participating stake holders of an alternative rate equal to 5% of expenses or 8% of gross revenues, depending on which is greater, through 2002 for “small webcasters,” with increases scheduled for 2003 and 2004. See, Nimmer on Copyright, 8-352.12 (Rel.61-8/2003).

Current Royalties for Webcasting
On March 7, 2007, the Copyright Royalty Judges, who had replaced the ad hoc Copyright  Arbitration Panels and are sometimes referred to as the Copyright Royalty Board, set the rates for webcasting beginning at .08 cents per performance for 2006 with yearly increases reaching  .19 cents per performance for 2010, with a minimum fee of $500 per channel per year. The $500 per channel fee could be interpreted to require the payment of much more than the rates per song for stations like Pandora, that permit each user to set up multiple “stations.” Daniel McSwain, Radio and Internet Newsletter, “CRB Coverage,” March 2, 2008.  http://textpattern.kurthanson.com/crb/58/webcast-royalty-rate-decision-announced; See also, “free103point9 Newsroom,” tp://blog.free103point-9.org/labels/internet%20radio.html. On  April 17, 2007, the Copyright Royalty Board rejected an appeal. David DeJean, Information Week, April 17, 2007. “Copyright Royalty Board Puts Internet Radio On Death Watch,”  http://www.informationweek.com/blog/main/archives/2007/04/copyright_royal.html; See also,  “free103point9 Newsroom”, http://blog.free103point9.org/labels/internet%20radio.html.

In contrast, based on the differences in the statutory formulas for setting royalties for webcasters versus pre-existing satellite radio, in 2006, the Copyright Royalty Judges set royalty rates for  pre-existing satellite radio that were much more favorable to the owners of the radio stations, resulting in fees of anywhere between 6.0% to 8.0% of gross income. Most internet radio stations would much prefer having their royalties based on their revenue rather than on the number of times songs are played.
An appeal from the order setting the rates for webcasters was filed in the US Court of Appeals for the District of Columbia. No court decision has been published to date. David Oxenford, Broadcast Law Blog, http://www.broadcastlaw-g.com/archives/internet-radio-nab-joins-thefray-on-internet-radio-appeals-and-a-request-for-stay-are-filed-and-a-settlement-offer-is-madeto-noncommercial-webcasters.html; See also, “free103point9 Newsroom”  http://blog.free103point9.org/labels/internet%20radio.html.

Finally, on October 1, 2008, Congress enacted the Webcaster Settlement Act that permits the 4 webcasters and SoundExchange (the collecting agency for the record labels and performers) to negotiate rates lower than the statutory rates, which helps only to the extent the record labels recognize that internet radio can promote the sale of records and be another source of revenue.

Conclusion
The law relating to internet radio is still evolving, but up to now fails to support internet radio as it has other web based businesses. The royalty payments required for internet radio have been set at levels so high that they could cause many popular webcasters to shut down. As Congress did with pre-existing satellite radio, to “unleash the power of the internet,” with respect to internet radio, Congress should set standards for maximum royalties that do not exceed 8% of a radio station’s gross income.

Rob Hassett is an attorney with Casey Gilson P.C. in Atlanta and focuses on technology, entertainment and corporate law.

Five Most Common Legal Mistakes Involving Commercial Websites

July 2008 Article for Business to Business Magazine

by Rob Hassett

Do you have a privacy policy posted on your business website?  If so, did you have an attorney review it?  If the answer to this question is “no,” there is a good chance that there is a difference between what you state in your privacy policy and what your actual practices are.  If there is, you could be subject to actions by the Federal Trade Commission and by private companies and individuals for fraud.  In a recent case, a jury awarded $4.5M in damages against a company that helped students apply to colleges online, because the policy stated that personal information was not being shared, but it was.  This is an example of the type of legal mistakes that are often made in connection with commercial websites.

 The five most common legal mistakes involving commercial websites are:

             1.         The company’s privacy policy does not accurately state what the true privacy policy of the company is.  If nothing else, you should make sure that your privacy policy says that in the event of the sale of your business, you reserve the right to transfer the data you have collected from customers to the purchasers of the business, while making it clear that the new owners will continue to be subject to the commitments that you make regarding privacy.

             2.         The business is required to have a privacy policy but does not.  There are a number of laws that  require the posting of a privacy policy under certain circumstances including the Graham Leach Bliley Act (GLB), which applies only to “financial institutions,” but which defines the term “financial institutions” very broadly; the Health Insurance Portability and Accountability Act (HIPAA), which applies to health care providers, health care plans and “health care clearing houses” (i.e. companies that collect and sort health related billing data); the Children’s Online Privacy Protection Act (COPPA), which applies to websites that are directed to children under 13 or knowingly obtain data from children under 13; and the California Online Privacy Protection Act , which requires that any commercial website that collects data from individuals residing in California post their privacy policies.  The consequences of not complying with privacy laws can be very severe.  Violations of GLB can result in a bank’s loss of FDIC insurance – which would likely put the bank out of business.  Violations of HIPAA can result in criminal penalties of up to 10 years in prison and a $250,000 fine.  For violations of COPPA, Mrs. Fields Cookies paid a civil penalty of $100,000 and Hershey’s paid $85,000.  Violations of the California Online Privacy Protection Act can result in private lawsuits — possibly a business person’s worst nightmare.

             3.         Third parties are able to post materials on the website and the company fails to post a “Copyright Policy” and file a designation of a representative to receive any complaints regarding copyright infringement with the U.S. Copyright Office.  Properly posting such a policy helps to insulate the company from liability for the posting of infringing materials by third parties.

             4.         Failure to screen  all photos of individuals posted on the website.  Posting of a recognizable individual on a website without permission of that individual that is not posted for a newsworthy purpose, or other situation protected by the First Amendment freedom of speech clause, can result in liability.

             5.         Failure of the owner to register copyrights in the owner’s website.  If ownership of the copyrights in the website are owned by the owner of the website, but the owner of the website does not register the copyrights in the U.S. Copyright Office, the owner may still register the copyrights after an infringement and sue to stop such copying and collect damages provable (it is very difficult to prove any) but may not recover what are called statutory damages (much easier to prove) or attorney fees.

 CONCLUSION

Any business owner with a website should take steps to assure that the use of the website is not resulting in a violation of another person’s rights and is taking all steps to protect its own rights.

Rob Hassett is an attorney who practices in technology, entertainment and corporate law with Casey Gilson P.C. in Atlanta,Georgia.

This article provides general information only and does not constitute legal advice.  Any reader should consult with his or her own attorney before making any decisions regarding legal matters.

Online Contracting

by Rob Hassett

This article was prepared for the seminar on Advanced Internet and Computer Law sponsored by the National Business Institute scheduled for October 29, 1998 in Atlanta. This advanced level and lengthy article addresses legal issues relating to online contracting. (43 pages)

ACKNOWLEDGEMENTS

The writer wishes to thank Robert Port, who is of counsel to the writer’s law firm, for his help in preparing this section of these materials.

I. INTRODUCTION

Online contracting takes place over the Internet, over online services such as America Online and through private networks such as has traditionally been the case with electronic data interchange.(1) Online contracting can be broken down into four (4) categories:

(1)  The online ordering of software, books, parts and other products with shipment by common carrier;

(2)  The online ordering of digitally formatted products such as computer software and sound recordings followed by transmission of the products to the customer;

(3)  The online ordering of, followed by access to, databases, encyclopedias and other similar services; and

(4)  Any other agreements which are negotiated or confirmed online, including real estate purchases, development agreements and joint venture agreements.

The law governing online contracting is unsettled. Model acts have been proposed to clarify that law and to conform it to current commercial practices.

The subject of online contracting is addressed in this article as follows:

Section II – current and proposed laws;

Section III – requirements for a binding agreement;

Section IV – determination of terms included in any agreement

Section V – requirement that agreement be in writing and/or signed and satisfaction of those requirements; and

Section VI – applicability of implied warranties.

II.  LAW APPLICABLE

A. Current Law.

In determining what body of law governs an online transaction, the first question is whether or not the transaction is governed by Article 2 of the Uniform Commercial Code (UCC). The UCC has been adopted in every state other than Louisiana.(2) Different rules apply to transactions governed by the UCC than to those outside its scope. Differences include whether or not the parties are required to agree to all of the essential terms of the agreement in order to have a binding contract, the circumstances under which the contract is required to be in writing and what, if any, implied warranties are applicable.

Article 2 is entitled “sales” and expressly covers “transactions in goods.”(3) Determining whether some transactions are covered is easy. An online agreement for the providing of services is not governed by Article 2, whereas an online contract for the sale of hardware is governed by Article 2.

What if the transaction involves the providing of both goods and services? Most courts that have addressed the issue, including the Georgia courts, apply the “predominant nature” test. Applying this test, the courts determine whether the transaction predominantly involves goods or services. If it predominantly involves a sale of goods, Article 2 applies. If services are the predominant feature of the transaction, traditional common law rules on contract interpretation govern.(4)

What about an online contract for a license for computer software? Must the transaction be a “sale” to be governed by Article 2 or is any “transaction” covered? There is no definition of “transaction” in the Uniform Commercial Code. The Uniform Commercial Code defines “goods” in pertinent part as follows:

“Goods” means all things (including specially manufactured goods) which are movable at the time of identification to the contract for sale other than the money in which the price is to be paid, investment securities …. and things in action.(5)

Most courts that have decided the issue have held that licenses of computer software are governed by Article 2.(6) A few courts have held to the contrary.(7)

Another question is how to treat computer software, movies and music that are ordered and transmitted online. If these products were placed on a compact disk, CD ROM or tape and shipped, they would be subject to Article 2. However, when downloaded from a web site, the answer is not clear. The writer was not able to find any case on point. There are a few cases that are somewhat analogous. An Ohio court held that the sale of metered amounts of electricity was governed by Article 2.(8) A Pennsylvania court held that the supplying of water was governed by Article 2.(9)

On the other hand, a New York court held that electricity is not governed by Article 2.(10) A Pennsylvania court held that the providing of cable television programming was not governed by Article 2.(11)

Interestingly, the United States Patent & Trademark Office views a mark associated with software transmitted over the Internet as a service mark rather than a trademark. This supports the argument that products delivered by online transmission are outside Article 2. In spite of this, the writer believes that applying current law most courts would hold that such transactions were governed by Article 2. The reason is that whether transmitted or shipped, these products are still moveable and therefore constitute goods and there is no reason to apply different rules to products that provide the same function because of the manner in which they are delivered.

What law applies to the online accessing of databases and other information? Again, there are no cases directly on point. The only somewhat analogous case is one in which an Illinois court held that demographic information and mailing lists provided to a publisher of a magazine would be covered by Article 2.(12) The writer believes that most courts would not apply Article 2 to these transactions simply because accessing information from databases is just too far removed from the definition of “goods.” It does not create an inconsistency to treat accessing of databases differently from the purchase of goods as the purposes are completely different.

There is one other Georgia Act that applies. The Georgia Electronics Records and Signatures Act was enacted in 1997. This Act defines “an electronic signature” and a “record” and provides for when an “electronic signature” and/or a “record” can substitute for a signature and/or a writing.(13)

B. Proposed New Laws.

1.  Introduction. There are two model codes currently subject to review and revision which will, in some form, eventually be recommended for adoption by the states. Each would have a major impact on online contracting. One is proposed Article 2B to the UCC. The other is the Electronic Transactions Act. The scope and purpose of each are discussed below. The impact on various issues important to online contracting are discussed in later sections.

2.  Article 2B. The National Conference of Commissioners on Uniform State Laws (NCCUSL) and the American Law Institute (ALI) are responsible for overseeing updates to the Uniform Commercial Code. In 1995 a committee was formed to draft a separate UCC article to specifically address software licensing and electronic commerce. Various versions have been proposed and debated. The goal is to propose a version that most, if not all, of the state legislatures will adopt. The latest version was reported on August 1, 1998, which is the version referred to in this paper.(14)

Section 2B-103 of proposed Article 2B governs the scope of the Article and reads in pertinent part:

Except as otherwise provided in Section 2B-104 on excluded transactions and in subsection (b), this article applies to:

(1)  Any transaction that creates a software contract, access contract, or license; and

(2)  Any agreement to provide support for, maintain, or modify information related to a contract within the scope of this article.

Section 2B-102 of Article 2B provides the following definitions important to Section 2B-103:

(1)  “Access contract” means a contract to electronically obtain access to, or information in electronic form from, an information processing system. ….

(24) “Information” means data, text, images, sounds, mask works, or works of authorship. (Regarding this definition, the reporter’s notes show that “works of authorship” is based on the definition set forth in Section 102 of the Copyright Act.(15) Copyright law protects work of authorship which include literary works, musical works (i.e., songs), pictorial and graphic works, motion pictures and other audiovisual works and sound recordings. Literary works have been defined to include computer programs.)

(44)  “Software” means a computer program, any informational content included in the program, and any supporting information provided by licensor as a part of an agreement.

(28) “License” means a contract that authorizes access to or use of information or of informational rights and expressly limits the contractual rights or permissions granted … “License” includes an access contract …

(27) “Informational rights” include all rights and information created under laws governing, patents, copyrights, mask works, trade secrets, trademarks, publicity rights, or any other law that permits a person, independently of contract, to control or preclude another person’s use of the information on the basis of the right holder’s interest in the information.

(25) “Information processing system” means an electronic system or facility for generating, sending, receiving, storing, displaying, or processing electronic information.

Section 2B-104 of Article 2B sets forth transactions excluded from the Article, providing in pertinent part:

This article does not apply to the extent that a transaction:

….

(8)  is a license of a linear motion picture or sound recording or of information to be included therein, except in connection with providing access to such motion picture or sound recording under an access contract covered by this article.

With respect to online transactions, to the extent Article 2B is enacted as currently configured:

(1)  The online purchase of goods (other than computer software) followed by the shipment of the goods by common carrier would not be covered;

(2)  The online placement of an order for computer software followed by a shipment or transmission of that computer software would be covered;

(3)  The online ordering of audio recordings and videos would not be covered when recorded on CD ROM or by other media and shipped by common carrier;

(4)  The online ordering of audio recordings and videos followed by transmission appears to be covered as it would be a “contract to electronically obtain …. Information” and is therefore an “access contract;”

(5)  The online ordering and transmission of any interactive media products and any licensing of interactive media products would be covered; and

(6)  The online ordering and obtaining of information over private lines, through access to web sites, through email or in any other online manner would be covered.

2. Uniform Electronic Transactions Act. In 1996 the NCCUSL approved a Drafting Committee to “draft an act consistent with but not duplicative of the Uniform Commercial Code, relating to the use of electronic communications and records in contractual transactions.”(16) The proposed Act is entitled the “Electronic Transactions Act” (ETA).

Under Section 103, the scope of the ETA would be as follows:

Except as otherwise provided in Section 104, this Act applies to electronic records and electronic signatures that relate to any transaction.

Section 104(b) provides that any transaction subject to the ETA that is also subject to the UCC or any other applicable law is to be construed consistent with that other substantive law and, where such construction is unreasonable, that the UCC or other substantive law will control.

III. WHAT CONSTITUTES AN AGREEMENT?

A. Current Law.

1.  General Law. Under common law there is no agreement, even where the parties agree that there is an agreement, unless the parties have agreed to all of the terms. Georgia has adopted this principal in O.C.G.A. §13-3-1 as follows:

Essentials of Contracts Generally.

To constitute a valid contract, there must be parties able to contract, a consideration moving to the contract, the assent of the parties to the terms of the contract, and a subject matter upon which the contract can operate. Any acceptance of an offer must be unconditional, unequivocal, and without variance of any sort.(17)

O.C.G.A. §13-3-2 reiterates the above as follows:

Contract incomplete without assent of parties to terms thereof; withdrawal of bid or proposition by party

The consent of the parties being essential to a contract, until each has assented to all the terms, there is no binding contract; until assented to, each party may withdraw his bid or proposition.

2.  Article of the Uniform Commerical Code. With regard to transactions and goods covered under the scope of Article 2 of the UCC, assent to all of the terms is not required for the parties to be bound by a contract. All that is required is that the parties agree, either expressly or by their conduct, that they have an agreement and agree to the quantity of goods being purchased. Section 204 of Article 2 of the UCC reads in pertinent part:

Formation in General

(1)  A contract for sale of goods may be made in any manner sufficient to show agreement, including conduct by both parties which recognizes the existence of such a contract.

(2)  An agreement sufficient to constitute a contract for sale may be found even though the moment of its making is undetermined.

(3)  Even though one or more terms are left open, a contract for sale does not fail for indefiniteness if the parties have intended to make a contract and there is a reasonably certain basis for giving an appropriate remedy.

B.  Proposed Laws.

1.  Article 2 B.

The currently proposed version of Section 2B – 202 is composed of five provisions, three of which are the same as the three provisions of Section 204 of Article 2 except that the first provision of Article 2B Section 202 expressly provides that a contract may be formed by the “operations of electronic agents which recognize the existence of a contract.” Section 2B – 202 goes further to provide:

(d) In the absence of conduct or performance by both parties to the contrary, a contract is not formed if there is a material disagreement about a material term, including scope.

The reporter’s note to this section states that the addition of (d) emphasizes that if there is a material disagreement about a material term, and the parties’ conduct does not indicate otherwise, there is no agreement. It is likely that if there was a material disagreement about a material term in a licensing transaction, it would involve the scope of the license and make it impossible to determine a remedy. A court construing a license under Article 2 would likely treat a disagreement about the scope of a license in the same way as Article 2 treats a disagreement about quantity — determine that there was insufficient information to fashion a remedy and therefore that there was no enforceable licensing agreement.

IV. WHAT TERMS ARE INCLUDED IN AGREEMENT?

A.  Current Law.

1.  General Law. Inasmuch as outside the UCC the parties must agree to all material terms of the agreement in order to have an agreement, if the agreement is enforceable, all the material terms have been agreed upon. These are the terms included in the agreement.

2.  Article 2. Under Article 2 of the UCC, the parties have a contract whenever they agree they have a contract or their conduct indicates that they have a contract. This is true even if they have not agreed to all the terms, provided they have agreed to sufficient terms for the court to fashion a remedy, i.e., the quantity of the goods involved. So what happens when the forms sent by each of the parties, or the parties’ conduct, show that the parties have agreed that they have a contract and agree on the quantity of goods to be purchased but have a conflict about the other terms? This is answered by Section 2-207 of the UCC. That section reads as follows:

Additional terms in acceptance or confirmation.

(1)  A definite and seasonable expression of acceptance or a written confirmation which is sent within a reasonable time operates as an acceptance even though it states terms additional to or different from those offered or agreed upon, unless acceptance is expressly made conditional on assent to the additional or different terms.

(2)  The additional terms are to be construed as proposals for addition to the contract. Between merchants such terms become part of the contract unless,

(a)  The offer expressly limits acceptance to the terms of the offer;

(b)  They materially alter it; or

(c)  Notification of objection to them has already been given or is given within a reasonable time after notice of the additional terms is received.

(3)  Conduct by both parties which recognizes the existence of a contract is sufficient to establish a contract for sale although the writings of the parties do not otherwise establish a contract. In such case the terms of the particular contract consist of those terms on which the writings of the parties agree, together with any supplementary terms incorporated under any other provisions of this title.

The terms “merchants” and “between merchants” are defined in Section 2-104 of the UCC as follows:

(1)  “Merchant” means a person who deals in goods of the kind or otherwise by his occupation holds himself out as having knowledge or skill peculiar to the practices or goods involved in the transaction or to whom such knowledge or skill may be attributed by his employment of an agent or broker or other intermediary who by his occupation holds himself out as having such knowledge or skill.

(3)  “Between merchants” means any transaction with respect to which both parties are chargeable with the knowledge or skill of merchants.

Under 2-207(2) where the transaction is “between merchants” (in other words where the online customer “is chargeable with the knowledge or skill of a merchant”) then the proposed additions by the online customer could end up being additions to the contract. To avoid this kind of situation from arising, anyone selling goods over the Internet should include a clause expressly limiting acceptance to the terms of the offer and not ship where different terms are proposed by a customer.

The more interesting provision is 2-207(3), which provides that where the parties’ conduct recognizes the existence of a contract and the parties have in fact agreed on a quantity term, the terms of the contract are those on which the parties agree “together with any supplementary terms incorporated under any other provisions of this title.” This is what as known as the “Battle of the Forms” or the “knockout” clause in that the terms on which the forms of the parties “disagree” are “knocked out.” The courts are not clear as to how the battle of the forms should apply. In American Aluminum Products Co., Inc. v. Binswanger Glass Co., 194 Ga. App. 703, 391 S.E.2d 688 (1990) regarding whether specifications in a proposal were part of the contract, the court held that the counter-proposal constituted the contract and did not apply O.C.G.A. §11-2-207(3) to knock out any conflicting terms. A New York court has also held that the terms of a counter-proposal constituted the entire contract and the “knockout” rules wouldn’t apply.(18) However, there are many situations in which the “knockout” provisions have been held to apply.(19) The trick is that the rule applies only if the forms sent by each of the parties are all part of the agreement. An example would be Party A emails its proposal with its terms and conditions to Party B. Party B emails back that the proposal is accepted including its own different terms and conditions. Then Party A ships the goods. The “knockout” rule would apply. On the other hand, if Party B does not indicate acceptance of Party A’s proposal and sends a counterproposal and then Party A ships the goods then the “knockout” rule wouldn’t apply. This is because by shipping the goods, A has accepted B’s counterproposal. As can be seen from reading the cases, the actual application of all of these rules is more difficult than the discussion of the rules themselves.

The lesson here is that for mass market online transactions, the seller should make sure that goods are shipped only following express and unqualified acceptance of the seller’s terms. Those online sellers that are not involved in mass market transactions have to make sure there is a procedure to examine all messages received to avoid a “battle of the forms” surprise. Even where a seller’s proposal provides that “no change in terms is allowed,” shipping goods in response to a counterproposal that does change the terms is going to be construed by a court either to be an acceptance of the counter-proposal or as an agreement to which the “knock out” rule should apply. Note that when warranty disclaimers are “knocked out” the agreement is going to be governed by the default terms of the code which include such terms as implied warranty provisions – in other words the buyer wins.

B. Proposed Laws.

If enacted as presently proposed, Article 2B would cover online transactions involving:

(a) The online ordering and shipment or transmission of computer software, whether copies are sold or licensed;

(b) Computer software development agreements entered into online;

(c) The online ordering of “linear” movies and sound recordings followed by transmission;

(d) The online ordering and transmission of interactive media including educational CD ROM titles and computer games; and

(e) The online access to databases and/or other information.

Where Article 2B applies the following sections would be relevant to determining the terms of the agreement:

Section 2B-203. OFFER AND ACCEPTANCE, ACCEPTANCE WITH VARYING TERMS; ACCEPTANCE OF CONDITIONAL OFFERS.

Section 2B-207. ADOPTING TERMS OF RECORD.

Section 2B-208. MASS-MARKET LICENSES.

Section 2B-209. TERMS WHEN CONTRACT FORMED BY CONDUCT.

Section 2B-111. MANIFESTING ASSENT.

Section 2B-112. OPPORTUNITY TO REVIEW; REFUND.

Section 2B-102. DEFINITIONS.

Section 33. MERCHANT

Section 11. CONSUMER

Section2B-110. UNCONSCIONABLE CONTRACT OR TERM

Applying these provisions, the terms of an agreement would be determined as follows:

(1)  If the terms proposed by each of the parties agree, the parties are governed by those terms, except to the extent that the court considers any of such terms to be unconscionable.

(2)  The new scheme will permit sellers other than in mass-market transactions to obtain an agreement that certain terms will be subject to later agreement with minimal risk if agreement is not reached, but impose substantial costs on sellers who do not provide all the terms of the agreement to mass-market purchasers prior to purchase. In any transaction, other than a mass-market transaction, where a term is to be fixed by later agreement and the parties intend not to be bound until the term is so fixed, if the parties are not able to reach agreement on that term, each party must return all copies of information and other materials already received and return any sums paid for performance which has not been received. Contractual use restrictions will continue to apply. For mass-market transactions, terms that were not available when the purchaser obtained the software or information and to which the purchaser is not willing to later agree, entitle the purchaser to a refund, reimbursement of any reasonable expenses incurred relating to the return, and compensation for any foreseeable loss caused by the installation.(20)

(3) An acceptance which contains terms that vary, but not materially, from the terms of the offer results in the terms of the contract being those of the offer except that, between merchants, the proposed non-material additional terms become part of the contract unless notice of objection has been given or is given within a reasonable time.

(4) Where the terms that vary result in a material conflict, a contract is not formed unless all of the other circumstances, including the conduct of the parties, indicate that an agreement existed. If neither party agrees to the other party’s terms and the parties go ahead and act as though they have a contract anyway, the contract is considered to be formed by “conduct” and, rather than apply the “knockout” rules of the current Article 2, the court is supposed to take into account all relevant circumstances to determine the intent of the parties.

(5) Where either of the parties to an online transaction include in their standard form language that any agreement is conditioned on acceptance of their terms, such conditional language will have no effect unless the party using such form acts in a manner consistent with the language such as refusing to perform when its terms are not accepted.

With respect to most issues, Article 2B would simply clarify ambiguities in current law by codifying the law that the courts would likely apply anyway. There are a few differences in determining what terms would apply including:

(1) The knockout rule under 2-207 would be replaced by a sort of “all of the circumstances” determination by a court of the intent of the parties;

(2) Clickwrap licenses(21) would be enforceable but only to the extent they were accepted by the purchaser after the purchaser had an opportunity to review all of the terms. However, there would not be a lack of certainty about whether they would be enforceable at all. (Clickwrap licenses in the mass-market context would require reimbursement to the purchaser of all costs and expenses associated with a purchase if the purchaser did not accept the license after having an opportunity to review all of the terms.)

(3) With regard to access to databases which is currently governed by general common and statutory law outside of the UCC, the major difference is that where the parties make it clear that they believe they have an agreement, even if they haven’t agreed to all of the terms, they would have an agreement.

Also, it should be noted that Article 2B encourages, but does not require, that the parties set up commercially reasonable procedures for determining the authenticity of orders and provides that where one of the parties requires that a procedure be followed that is not commercially reasonable, the risk of loss falls on the party requiring such unreasonable procedure.(22)

C. Clickwrap Licenses.

Except where there may be a statute of frauds issue (requirements of writings and signatures are discussed later in this paper), clickwrap licenses are as likely to be enforceable to the same extent as agreements in any other form.(23) The writer is aware of only one case that apparently involved the enforceability of clickwrap licenses.(24) In that case, the United States District Court for the Northern District of California granted a preliminary injunction relying in part upon a claim for breach of contract for the defendant’s allegedly breaching the terms of service for using its e-mail service. The court did not discuss how the agreement was entered into and just assumed it was enforceable; however, agreements with “Hotmail” are clickwrap agreements.

Although there are no cases directly addressing the issue of enforceability of clickwrap licenses, there have been cases addressing the enforceability of shrinkwrap licenses. (Shrinkwrap licenses are licenses included with computer software that provide that the purchaser manifests assent by opening the package.) The 5th Circuit, applying Louisiana law (Louisiana is the only state that has never enacted Article 2 of the UCC), in the first case considering the enforceability of a shrinkwrap license, held that it was unenforceable.(25) In that case, the Plaintiff, Vault Corporation, had developed software which Vault’s software developer customers embedded in their software to prevent their end user customers from using the software on more than one computer. When the Vault Corporation sold its software, it included a shrinkwrap license that was expressly authorized by a Louisiana statute and prohibited reverse engineering of the software. The defendant, Quaid, had purchased the software and reversed engineered it. The 5th Circuit held that the shrinkwrap license and the related statute were unenforceable because they were “preempted” by copyright law.(26)

In Step-Saver Systems v. Wyse Technology and The Software Link, 939 F.2d 91 (3rd Cir. 1991), The Software Link had provided an operating system for Step-Saver to use for its professional office customers. The operating system did not work properly. Step-Saver had ordered many copies of the package. Step-Saver would telephone The Software Link and place an order for a number of copies. The Software Link would accept the order and promise, on the telephone, to ship the goods promptly. After the telephone order, Step-Saver would send a purchase order, detailing the items to be purchased, their price and shipping and payment terms. The Software Link would ship the order promptly along with an invoice. The invoice would contain terms essentially the same as the purchase order. No reference was made during the telephone calls or on the purchase orders or in the invoices to any disclaimer of warranties. There was a shrinkwrap license enclosed with the software packages that disclaimed all warranties and limited damages. The shrinkwrap license did provide that the customer could return the software for a full refund if the customer didn’t accept the shrinkwrap license. The court applied the “battle of the forms” rules and determined that the agreement was complete with the telephone conversation when the goods were ordered coupled with the purchase order. The court held that the shrinkwrap license was sent after the fact and therefore could have no effect under the circumstances. The Software Link’s shrinkwrap license was also held unenforceable for the same reasons in Arizona Retail Systems, Inc. v. The Software Link, 831 F.Supp. 759 (D. Ariz. 1993).

In ProCD, Inc., v. Matthew Zeidenberg and Silken Mountain Web Services, Inc., 86 F.3rd 1447 (7th Cir. 1996), ProCD had developed and was selling copies of a CD ROM with a database of telephone numbers. Zeidenberg purchased the CD ROM at a store. The box showed that inside there was a shrinkwrap license. The shrinkwrap license provided that the purchaser was only receiving a license and that the purchaser was not to make copies of the product. Zeidenberg then made copies of the database onto his own web site and was providing access to the database to customers for a fee. There was no “battle of the forms” issue because the outside of the box gave notice to Zeidenberg at the time of purchase that the purchase would be subject to a license contained inside the box. The court rejected the preemption decision of Vault Corporation, supra, and held that the shrinkwrap license was enforceable. The court thus provided a way for database developers to protect their databases (by contract) even though the database here was probably not protectable under copyright law.(27) A district court for the Southern District of California in a case involving copying from a computer game,(28) the 7th Circuit again in a case involving a shrinkwrap license sent with a Gateway computer,(29) and an appellate court in New York state which allowed Gateway 2000 to require that any disputes be resolved by arbitration in Chicago, Illinois(30) have all approved and followed the decision in ProCD, supra.

Note that as discussed in end note 24, Article 2B, Section 2B-208 would modify the ProCD case somewhat in that where a mass-market purchaser could not view the terms of the license until the mass-market purchaser had taken the package home, the mass-market purchaser would also be entitled to reimbursement of all related expenses.

V. REQUIREMENT OF SIGNED WRITING

A. When is a writing and/or signature required?

1. Current law.

(a) General.

Every state of which the writer is aware, including Georgia, has a “statute of frauds” that requires certain agreements to be in writing and signed by the party to be charged in order to be enforceable. The Georgia statute reads in pertinent part:

To make the following obligations binding on the promisor, the promise must be in writing and signed by the party to be charged therewith or some person lawfully authorized by him:

(1) A promise by an executor, administrator, guardian, or trustee [to be personally liable for the debts of the estate, etc.];

(2) A promise to answer for the debt … of another;

(3) Any agreement made upon consideration of marriage …;

(4) Any contract for sale of lands, or any interest in, or concerning land;

(5) Any agreement that is not be performed within one year from the making thereof;

(6) Any promise to revive a debt barred by a statute of limitations; and

(7) Any commitment to lend money.(31)

Every state of which the author is aware will enforce agreements that are covered by the statute of frauds, even if not in writing or not signed, under certain specified circumstances. Those exceptions are:

(1) When the contract has been fully executed;

(2) Where there has been performance on one side, accepted by the other in accordance with the contract; or

(3) Where there has been such part performance of the contract as would render it a fraud by the party refusing to comply if the court did not compel a performance.(32)

The only sections of the general statute of frauds that are likely to have much effect on online transactions are the ones relating to sales of interests in land and to agreements not to be performed within one (1) year. Where the transaction is governed by Article 2 of the UCC, there is some controversy about whether courts would still also apply the general statute of frauds. The courts of which the writer is aware have held that if Article 2 applies, the general statute does not apply.(33) That leaves at least transactions involving an interest in land and agreements providing access to databases for more than a year subject to the general statute.

Can a transaction that takes place purely over the Internet result in a writing signed by the person to be charged? The answer to this question is likely to vary from jurisdiction to jurisdiction. In Department of Transportation v. Norris, 222 Ga. App. 361; 474 S.E.2d 216 (1996) the Georgia Court of Appeals held that the plaintiff’s claim was subject to dismissal because the plaintiff had not timely provided an “ante litem” notice. The requirement was that notice of any claim against the state must be given in writing within twelve (12) months of the date the loss was discovered or should have been discovered. The plaintiff had mailed and faxed the notice within the requisite period but the mailed notice was received after the expiration of the twelve months. The court decided that the facsimile transmission did not satisfy the statutory requirement that notice be given in writing stating in pertinent part:

Such a transmission is an audio signal via a telephone line containing information from which a writing may be accurately duplicated, but the transmission of beeps and chirps along a telephone line is not a writing, as that term is customarily used.

On certiorari, the Georgia Supreme Court reversed the Court of Appeals decision holding that the mailing of the notice was sufficient and left open the question of whether the sending of a facsimile constitutes notice in “writing.”(34)

In considering what constitutes a writing, it is also necessary to consider what constitutes a signature. In Troutt v. Nash AMC/Jeep, Inc., 157 Ga. App. 399, 278 S.E.2d 54 (1981), Troutt argued, among other things, that an automobile dealer was liable for failure to “sign the installment agreement” as required by the Georgia Motor Vehicle Sales Finance Act. The Act at that time provided in pertinent part:

A retail installment contract shall be in writing, shall be signed by both the buyer and the seller …

The installment agreement was fully typed out and filled in and the name of the dealer was on the paperwork. However, no one had signed on behalf of the dealer. Even though the Georgia Motor Vehicle Sales Finance Act is separate from the Uniform Commercial Code, the court applied the definition provided under the Uniform Commercial Code which reads:

“Signed” includes any symbol executed or adopted by a party with present intention to authenticate a writing,

in holding that the printed name of the dealership on the form was sufficient to constitute a signature. If definitions under the Uniform Commercial Code are going to be applied outside the code, then it is appropriate to apply the definition of “written” or “writing” in O.C.G.A. §11-1-201 (46) which reads:

“Written” or “writing” includes printing, typewriting, or any other intentional reduction to tangible form.

Does the completion and online transmission of an order form, or other online communication such as an email message, constitute a “reduction to tangible form”? When an order or email is transmitted with the intention of entering into an agreement, it is certainly expected that the recipient will save the order or message in some way such as on the hard drive of a server. That is sufficient to meet the definition of “fixed in a tangible medium of expression” under the Copyright Act which reads in pertinent part:

A work is “fixed” in a tangible medium of expression when its embodiment in a copy or phonorecord, by or under the authority of the author, is sufficiently permanent or stable to permit it to be perceived, reproduced, or otherwise communicated for a period of more than transitory duration.(35)

Under this analysis, it would be helpful for the parties to an agreement subject to the general statute of frauds to type in their name next to or with the addition of language substantially the same as:

I intend this to be my signature and for this document to be considered a writing.

Even assuming the Georgia appellate courts do not resurrect the rule that electronic transmissions, such as faxes, are not writings, there is a problem with the above analysis. Since the decision in Troutt v. Nash AMC/Jeep, Inc., supra, the Georgia Legislature enacted the “Georgia Electronic Records and Signatures Act” which became effective April 22, 1997.(36) Section 10-12-4. Agreement to Electronic Record or Signature reads in pertinent part:

Any person may, but shall not be required to, accept or agree to be bound by an electronic record which is executed or adopted with an electronic signature and, where that acceptance or agreement is otherwise required to be witnessed or notarized, which is witnessed or notarized, using an electronic signature. Where a person or other entity accepts or agrees to be bound by an electronic record as provided in this Code section, then:

(1) Any rule of law which requires a record of that type to be in writing shall be deemed satisfied;

(2) Any rule of law which requires a signature shall be deemed satisfied, and

(3) Any rule of law which requires a witness or notary shall be deemed satisfied by the electronic signature of such witness or notary.

“Electronic signature” is defined as:

an electronic or digital method executed or adopted by a party with the intent to be bound by or to authenticate a record, which is unique to the person using it, is capable of verification, is under the sole control of the person using it, and is linked to data in such a manner that if the data are changed, the electronic signature is invalidated.(37)

The term “Record” is defined as:

information that is inscribed on a tangible medium or that is stored in an electronic or other medium and is retrievable in perceivable form. “Record” includes both electronic records and printed, typewritten and tangible records.(38)

Section 10-12-2 of the Act relating to construction reads:

The provisions of this chapter shall be construed to promote the development of electronic government and electronic commerce.

So here we have a statute that was designed to promote electronic commerce but seems to provide that at least where the statute of frauds is applicable to be effective an electronic signature must be “unique to the person using it,” “capable of verification,” under the “sole control” of the person using it and be “linked to data in such a manner that if the data are changed the electronic signature is invalidated.”

Although it is by no means clear, without a new statute, it was reasonably likely that a court would have held that a clickwrap agreement or email with language showing that the parties intended that what they were transmitting be a signed writing would be held to constitute a signed agreement. With this statute, that proposition is very questionable and anyone needing to meet the requirements of the statute of frauds should assure that both parties are utilizing an encryption methodology to accomplish the requirements of the statute. It should be noted that the Georgia Electronic Signature Act is as liberal as any that have been enacted and other electronic signature statutes, such the Utah statute, require that much more elaborate procedures be followed, such as requiring the use of certification authorities.(39)

B. Uniform Commercial Code.

Although the above discussion regarding what constitutes a “writing” and/or “signature” also applies to any online transactions governed by the Uniform Commercial Code, there is more to consider with respect to transactions governed by the UCC.

2-201 of the Uniform Commercial Code entitled “Formal Requirements; Statute of Frauds” reads in pertinent part:

(1) Except as otherwise provided in this Code section, a contract for the sale of goods for the price of $500 or more is not enforceable by way of action or defense unless there is some writing sufficient to indicate that a contract for sale has been made between the parties and signed by the party against whom enforcement is sought or by his authorized agent or broker. A writing is not insufficient because it omits or incorrectly states a term agreed upon but the contract is not enforceable under this paragraph beyond the quantity of goods shown in such writing.

(2) Between merchants if within a reasonable time a writing in confirmation of the contract and sufficient against the sender is received and the party receiving it has reason to know its contents, it satisfies the requirements of subsection (1) of this code section against such party unless written notice of objection to its contents is given within ten days after it is received.

(3) A contract which does not satisfy the requirements of subsection (1) of this Code section but which is valid in other respects is enforceable:

(a) If the goods are to be specially manufactured for the buyer and are not suitable for sale to others in the ordinary course of the seller’s business and the seller, before notice of repudiation is received and under circumstances which reasonably indicate the goods are for the buyer, has made either a substantial beginning of their manufacturer or commitments for their procurement; or

(b) If the party against whom enforcement is sought admits in his pleading, testimony or otherwise in court that a contract for sale was made, but the contract is not enforceable under this provision beyond the quantity of goods admitted; or

(c) With respect to goods for which payment has been received, made and accepted or which have been received and accepted.

Under the Uniform Commercial Code where the price equals or exceeds $500, a signed writing is required subject to the exceptions set forth above. However, the only term that must be in writing under Article 2 is the quantity of goods shown. Where the transaction is between merchants, all that is needed is a ” writing in confirmation” that is “sufficient against the sender” sent to the other party unless written notice of objection is given within ten (10) days after the writing is received.

When a transaction is between merchants, there still must be proof that a confirmation was sent.(40) The question remains in connection with an online transaction, even when the transaction is between merchants, whether the transmission of an order form and/or sending of an email constitutes a “writing” in Georgia unless it meets the requirements of The “Electronic Signatures Act” and, in other states, unless it meets requirements of other statutes of that nature.

C. Transfer of Copyrights

The Copyright Act provides that a voluntary “transfer of copyright ownership” is not valid unless made in a signed writing. The courts have interpreted this provision to also apply to exclusive licenses.(41) In order to protect one’s ownership of a copyright, or exclusive rights therein, it is necessary to record the transfer.(42) The words “writing” and “signed” are not defined in the Copyright Act. There is an open question whether interpretations of these terms under State law including construction under proposed acts would be accepted by Federal courts in construing the Copyright Act.

2. Proposed Laws

A. Article 2B. Section 2B-201 entitled “FORMAL REQUIREMENTS” provides that agreements requiring the payment of $5,000 or more are not enforceable unless there is a “record” which is “authenticated” by the party against which enforcement is sought or unless the contract involves a license with an agreed duration of less than one year. These requirements also do not apply if performance is provided and accepted or to the extent that the party against whom enforcement is sought admits the agreement. Additionally, like the Article 2 provision relating to “merchants,” Article 2B provides that between merchants where one merchant sends an authenticated record to the other merchant confirming an agreement and the other merchant does not respond within ten (10) days, such confirmation satisfies the statute of frauds with respect to both merchants. This section further provides that no other statute of frauds is applicable which has been assumed, but not expressly stated, with regard to the writing and signature requirements stated in Article 2.

Section 2B-113 entitled “LEGAL RECOGNITION OF ELECTRONIC RECORDS AND AUTHENTICATION” provides that a record or authentication may not be denied legal effect solely on the grounds that it is in electronic form.

So Article 2B, in order to avoid the technicalities that may be implied by the words “writing” and “signature,” uses the term “record” and “authentication” and expressly provides that electronic form is acceptable. To the extent Article 2B is enacted, it would be a simple matter to add language to order forms and emails so as to comply with the Article 2B statute of frauds. The problem is that even if enacted, Article 2B would not affect a substantial portion of online transactions including those involving the sale of goods, other than computer software, which are not transmitted in the online transaction.

In light of the requirements of the Georgia Electronic Records and Signatures Act, it is likely that even if Article 2B were enacted in Georgia, those transactions which are not covered by Article 2B would still be subject to unenforceability not expected by the parties acting in the ordinary course of business. Even if that statute were changed, the same risk would continue from similar and, in many cases, far stricter electronic signature statutes that have been enacted in many other states.

B. Electronic Transactions Act.

Under the proposed Electronic Transactions Act, if enacted in its current form, all online transactions in which the parties show that they intended the transmission to constitute a writing and to incorporate their signature would satisfy the statute of frauds in those states that passed that statute. Even if enacted in every state, the Electronic Transactions Act would not directly affect Section 204 of the Copyright Act and therefore would not directly apply to the transfer of copyrights.

VI. IMPLIED WARRANTIES

A major reason that licensees of software have tried to avoid application of the Uniform Commercial Code is to avoid imposition of implied warranties and the other warranty provisions of Article 2. Under common law, warranties were not implied. However, in light of the Uniform Commercial Code courts have, from time to time, applied Article 2 of the Uniform Commercial Code by analogy and held that implied warranties were applicable other than in connection just with the sale of goods.(43) The 5th Circuit in 1964 held that under Florida law implied warranties apply under common law.(44) On the other hand, there have been many cases in which the courts have held that implied warranties were not applicable outside of Article 2. With respect to online transactions, the implied warranties of Section 2-314 would apply to any purchases of goods and likely licenses of computer software and other goods, whether obtained through shipment or by transmissions. Although an implied warranty relating to accuracy of a database probably should not be governed by Article 2, any company offering information in a database would be taking an unreasonable risk not to include a disclaimer since, as stated above, courts might, by analogy, apply implied warranties to transactions that are not covered by Article 2. For example the Restatement of Torts 2d Section 552 provides that a provider of information is liable for failure to exercise care in obtaining or communicating information.

Proposed Article 2B-404 would provide that ordinarily there is no implied warranty of the accuracy of databases. Article 2B would apply the warranty only where the provider of information is a merchant in a “special relationship of reliance” with the purchaser of the information.(45)

ENDNOTES

1 Electronic Data Interchange (EDI) is the process whereby standardized forms or documents are transferred online for placing orders, billing, etc. See, Harry Newton, Newton’s Telecom Dictionary, Flatiron Publishing,1998. The ABA offers a form trading partner agreement for use in ongoing EDI transactions between the same parties.

2 Benjamin Wright and Jane K. Winn, The Law of Electronic Commerce, Aspen Law & Business, 3rd Ed. (1998)

3 See, e.g., O.C.G.A. §11-2-102.

4 See, Corporate Counsel’s Guide To The Uniform Commercial Code, Business Laws, Inc. at pp. 2.001 – 2.002 (1997) and J. Lee Gregory, Inc. v. Scandinavian House, L.P., 209 Ga. App. 285, 433 S.E.2d 687 (1993).

5 See, e.g., O.C.G.A. §11-2-105.

6 Validity, Construction and Application of Computer Software Licensing Agreements, 38 ALR 5th 1 and see, Schroeders, Inc. v. Hogan Systems, Inc., 522 N.Y.S.2d 404 (N.Y. Supp. Ct. 1987, Colonial Life Ins. Co. v. Electronic Data Systems Corporation, 817 F.Supp. 235 (D.N.H. 1993), Advent Systems v. Unisys Corp., 925 F.2d 670 (3rd Cir. 1991), and NMP Corporation v. Parametric Technology Corporation, 958 F.Supp. 1536 (N.D. Okla., 1997).

7 See, Michael D. Scott, Scott On Computer Law, 2nd Edition, Section 7.09[B].

8 See, Cincinnati Gas & Electric Co. v. Goebel, 28 Ohio Misc. 2d, 502 N.E.2d 713 (1986).

9 See, Gall v. Allegheny County Health Department, 555 A.2d 786 (Penn. 1989).

10 See, Farina v. Mohawk Power Corp., 438 N.Y. Sub. 2d 645 (1981).

11 See, Kaplan v. Cablevision of Pa., Inc., 671 A.2d 716 (1996).

12 See, Colonial Life Ins. Co. v. Electronic Data Systems Corporation, 817 F.Supp. 235 (D.N.H. 1993).

13 O.C.G.A. §10-12-1 et. seq.

14The latest versions may be downloaded from http://www.SoftwareIndustry.org and from http://www.law.upenn.edu/library/ulc/ulc.htm.

15 See, 17 U.S.C. §102.

16 See, Prefatory Note to Uniform Electronic Transactions Act. The Act is available at http://www.law.upenn.edu/bll/ulc/uecicta/98am.htm. Copies may also be obtained from the National Conference of Commissioners of Uniform State Laws, 211 East Ontario Street, Suite 1300, Chicago, IL 60611. The most recent draft of the Uniform Electronic Transactions Act (ETA) was prepared for the July 24-31, 1998 meeting of the National Conference of Commissioners of Uniform State laws.

17 See, Panfel v. Boyd, 187 Ga. App. 639, 371 S.E.2d 222 (1988).

18 See, CVS, Inc. v. Auburn Plastics, Inc., 67 A.D.2d 811, 413 N.Y.Supp.2d 50 (1979).

19 See, Corporate Counsel’s Guide To The Uniform Commercial Code, supra, pp. 2.088 and 2.089 and Diamond Fruit Growers, Inc., 794 F.2d at 1444 (9th Cir. 1986)

20 Contrary to ProCD, Inc. v. Zeidenberg and Silk & Mountain Web Services, Inc., 86 F.3rd 1147 (7th Cir. 1996), and other recent cases, a shrinkwrap license in connection with a license for computer software enclosed in a box in connection with a retail (mass market) sale where the purchaser is only notified that there is a license and for which the terms are not available until the purchaser has opened the box and/or installed the software would be subject, under Article 2B, not only to the right of refund; but also, to reimbursement of reasonable expenses and costs.

21 A clickwrap license is a license agreed to by a purchaser using a mouse to click an on-screen button to indicate assent to an agreement.`

22 Sections 2B-114, 2B-115 and 2B-116.

23 See, CompuServe, Inc. v. Richard S. Patterson, 89 F.3d 1257 (6th Cir. 1996). The 6th Circuit Court of Appeals held that an attorney who entered into a “shareware registration agreement” which required that the attorney type “agree” at various points in the document was bound by its terms including being subject to jurisdiction in the State of Ohio on any dispute regarding the agreement.

24 See, Hotmail Corporation v. Van Money Pie, Inc., 47 U.S.P.Q. 2nd (BNA) 1020 (1998); 1998 U.S.Dis. Lexis 10729 (April 16, 1998).

25 See, Vault Corporation v. Quaid Software Limited, 847 F.2d 255 (5th Cir. 1988).

26 Of course the court’s holding would imply that if preemption didn’t apply that the shrinkwrap license would be enforceable. Most courts that have decided the issue have held that agreements prohibiting reverse engineering and disclosure of confidential information are not preempted by the Copyright Act because they involve an agreement between consenting parties, and therefore are different from copyright which is imposed by law. See, e.g., Computer Associates v. Altai, 982 F2d 693 (2nd Cir. 1992).

27 See, e.g., Feist Publications, Inc. v. Rural Telephone Company Service, 499 U.S. 340 (1991). See also the section on copyright law being provided with this manual. For additional materials on copyright law, see the writer’s law firm web site at http://www.internetlegal.com. There is some concern among commentators that to allow unlimited use of shrinkwrap and clickwrap licenses to protect material not otherwise protected by copyright law could vitiate the copyright fair use doctrine.

28 See, Microstar v. Formgen, Inc., 942 F.Supp. 1312 (S.D. Cal. 1996).

29 See, Rich Hill and Enza Hill v. Gateway 2000, Inc., 105 F.3rd 1147 (7th Cir. 1997).

30 1998 N.Y. App. Div. Lexis 8872.

31 O.C.G.A. §13-5-30.

32 See, e.g., O.C.G.A § 13-5-31.

33 Corporate Counsel’s Guide To The Uniform Commercial Code, supra, at pp. 2.058 – 2.060.

34 See, Norris v. Department of Transportation, 268 Ga. 192, 486 S.E.2d 826 (1997).

35 See, 17 U.S.C. §101.

36 O.C.G.A. §10-12-1, et. seq.

37 See, O.C.G.A. §10-12-3.

38 O.C.G.A. §10-12-3.

39 See, Utah Digital Signatures Act, Utah Code Ann. §46-3-101, et. seq. (Supp. 1996).

40 See, Entertainment Sales Co. v. SNK, Inc., 232 Ga. App. 669, 1998 Ga. App. Lexis 641 (April 15, 1998).

41 See, 17 U.S.C.A. §§101 and 204.

42 See, 17 U.S.C.A. §205.

43 See, e.g., Holmes v. Worthey, 159 Ga. App. 262, 282 S.E.2d 919 (Ga. App. 1981) in which the court held that although ordinarily implied warranties wouldn’t apply, where a seller/builder is in direct privity with the buyer, the buyer has an implied warranty .

44 Sperry Rand Corp v. Industrial Supply Corp., 337 F.2d 363 (5th Cir. 1964).

45 Section 2B-404.

Rob Hassett is an attorney who practices in technology, entertainment and corporate law with Casey Gilson P.C. in Atlanta, Georgia.

The information above is provided for general educational purposes and not as legal advice. Laws in areas in which we practice change continually and also vary from jurisdiction to jurisdiction. Therefore no visitor to our site should rely on any of the articles provided for legal advice, but should always consult their own attorney regarding legal matters.

© 1998, Rob Hassett, Atlanta, Georgia. All Right Reserved

Historical Chart of Privacy Laws in the United States

Featured

FOR GEORGIA TECH PROFESSIONAL EDUCATION PROGRAM INFORMATION SECURITY LAW  

By:  Rob Hassett

www.internetlegal.com

770-393-0990

 October 21, 2003   

LAW DESCRIPTION EFFECTIVE DATE
4th Amendment to US Constitution Prohibits unreasonable search and seizure      1791
5th Amendment to US Constitution Cannot be compelled to testify against oneself regarding criminal activities       1791
Bill of Rights Generally According to Griswold v. Connecticut – right to privacy provided in bill of rights and voided statutes that made the sale or use of contraceptives illegal       1791

Griswald v.

Connecticut   (1965)

14th Amendment to US Constitution All individuals born in the U.S. are citizens of state where they reside and no state shall make or enforce laws which abridge privileges or immunities and no state shall deprive any person of life, liberty or property without due process nor deny equal protection of the law

1868 (In Roe v. Wade, the U.S. Supreme Court held that state laws that made abortion a crime were unconstitutional 410 U.S. 959, 35 Lawyers Ed. 2nd 694 (1973)) (Court held that state could exercise some regulation after the first trimester and much more after the second trimester)

General state based laws regarding privacy and publicity rights

Based on article that appeared in the Harvard Law Review and one of the first cases was a Georgia case; wrongful intrusion, wrongful disclosure of embarrassing private facts; wrongful appropriation and false light

Article 1890; Ga. Case 1905

Federal wire tap statutes 18 USC §2510 and 47 USC §605, FCC Rule 47 CFER 164.501 Restricts listening to telephone conversations

1934

O.C.G.A. §31-12-2 Government agencies are prohibited from identifying people with sexually transmitted diseases

1964

United States Privacy Act5 USC §552.a Prohibits federal agency from disclosing personal data except for publicly announced purposes and requires agencies to keep an account of all disclosures

1966

Mail Privacy Statute, 39 U.S.C. §3623 Prohibits opening of mail without search warrant or consent

1971

Family Education Rights & Privacy Act, 20 U.S.C.  §1232 Restricts disclosures of educational records

1974

The Right to Financial Privacy Act, 12 U.S.C. §3401-3403 Restricts disclosure to government of financial records of banks and similar financial institutions

1978

O.C.G.A. §33-21-23 HMO’s may not disclose any information pertaining to diagnosis without express consent of patient with some exceptions

1979

Identity Theft and Deterrence Act, 18 U.S.C. §1028 Prohibits identity theft

1982

Computer Fraud and Abuse Act, 18 U.S.C. §1030 Prohibits unauthorized access together with either obtaining financial information, causing damage, obtaining something of value or affecting medical records

1984

Cable Communications Privacy Act, 47 U.S.C. §551 Requires notice and consent before cable service provider may collect data of viewing habits

1984

O.C.G.A. §33-39-1, et. seq. Insurance companies are required to keep personal health information confidential with exceptions

1984

Electronic Communications Privacy Act, 18 U.S.C. §2701 Restrictions on accessing another person’s electronic mail

1986

O.C.G.A. §24-9-47 Information about AIDS is confidential

1987

Video Privacy Protection Act, 18 U.S.C. §2710 Prohibits video tape sale and rental companies from disclosing data

1988

Employee Polygraph Protection Act, 29 U.S.C. §2001 Imposes restrictions on employer use of polygraph testing employees

1988

Driver’s Privacy Protection Act, 18 U.S.C.  §2721-2725 Restricts states from disclosing state drivers’ license and motor vehicle records (held constitutional by U.S. Supreme Court)

1994

O.C.G.A. §33-54-3 Information derived from genetic testing is confidential

7/1/1995

The Telecommunications Act , 47 U.S.C. §222 Imposes privacy protection on information held by telecommunications companies

1996

The Children’s’ Online Privacy Protection Act, 15 U.S.C. §6501 Restricts collection of data from children under 13 over Internet

2000

O.C.G.A. §31-33-2, et seq. Requires healthcare providers to provide copies of medical records to patients when requested

7/1/2001

Gramm-Leach-Bliley Act Restricts disclosure of personally identifiable information by financial institutions (broadly defined)

Privacy rules effective 7/1/2001; security rules FTC effective 5/23/2003; security rules for FDIC, Federal Reserve System, Etc. effective 7/1/2001

Georgia – Title 10, Chapter 15 Requires shredding, erasure, making unreadable or other reasonable action regarding medical information, customer accounts or identification numbers, account balances and the like

7/1/03

Health Insurance Portability & Accountability Act

Privacy rules effective 4/14/2003; security rules effective 4/20/2005

 

 

Rights of Privacy and Publicity in Interactive Media

Featured

(REVISED FOR NBI PROGRAM ON THE LAW OF THE INTERNET IN GEORGIA)

By Rob Hassett, Casey Gilson P.C., Atlanta, Georgia

Earlier versions of this article appeared in the program materials for the internet law seminar sponsored by NBI, Inc. which was held in Atlanta, Georgia on February 18, 1998 and the January 1997 issue of The Multimedia & Technology Licensing Law Report published, at that time, by Warren, Gorham & Lamont, and currently published by West Group. That article was based on program materials developed by the writer in connection with his presentation at the Cutting Edge Music Conference in New Orleans, Louisiana in August of 1996.

The writer wishes to thank Lori Brill and Lynn Hassett, attorneys in his law firm when he wrote the article, as well as Adam Alexander, an attorney at the law firm of Cooper & Scully, in Dallas, Texas, for their help in updating this Article.

© 2000 Rob Hassett, All Rights Reserved.

RIGHT OF PUBLICITY AND RIGHT OF PRIVACY

Today, interactive media incorporates video, music and still photography. When may a producer of interactive media use an individual’s name, likeness, or identity without permission? Restrictions on the use of names, likenesses and identities of individuals are governed by the right of publicity and two categories of the right of privacy.

Restatements

Section 46 of the Restatement of the Law Third, Unfair Competition, states in pertinent part:

One who appropriates the commercial value of a person’s identity by using without consent the person’s name, likeness, or other indicia of identity for purposes of trade is subject to liability for the relief appropriate. (1)

Section 652A of the Restatement of the Law, Torts 2d, states in pertinent part:

The right of privacy is invaded by: … (b) appropriation of the other’s name or likeness…; (c) unreasonable publicity given to the other’s private life….; (2)

The elements of appropriation of invasion of privacy are the same as for violation of the right of publicity with one exception. The invasion of the right of privacy is a personal tort and it generally may not be assigned or inherited. Whereas, the right of publicity, a property right, may generally be assigned and inherited. See, e.g., Martin Luther King Jr. Center For Social Change v. American Heritage Products, 250 Ga. 135, 296 S.E.2d 697 (Ga. 1982).

Origins

English common law did not recognize the right of privacy or publicity except to the extent that such rights existed tangentially under copyright and trademark law. In 1890, Samuel D. Warren and future Supreme Court Justice Louis D. Brandeis wrote an article arguing that a right of privacy should exist. Samuel D. Warren & Louis D. Brandeis, The Right to Privacy, 4 Harv. L. Rev. 193 (1890). The first court to accept the right of privacy was the Georgia Supreme Court in Pavesich v. New England Life Ins. Co., 122 Ga. 190, 50 S.E. 68 (1905). The Georgia Supreme Court held that Mr. Pavesich stated a claim against New England Life for alleged wrongful use of his picture in an advertisement for the Defendant’s insurance products. Today, privacy and publicity rights are based on state common and statutory law. Because these rights are relatively new and different legislatures and courts decide how they apply, there are variations in the interpretation and application of these rights.

Acceptance

Since the Pavesich case, some form of the right of privacy relating to appropriation and/or the right of publicity has been adopted either by statute or court decision in every state that has addressed the issue. Minnesota and Virginia appear to be the only states which have rejected right to privacy involving giving unreasonable publicity to an individual’s private life. See Hendry v. Conner, 303 Minn. 317, 226 N.W.2d 921 (1975) and Williams v. Nathan, 21 Med. L. Rptr. 1339 (E.D. Va. 1993); Brown v. American Broadcasting Co., 704 F.2d 1296 (4th Cir. 1983).

Written Consent

To avoid violating these rights, the best approach is to obtain a written consent from each person whose name, likeness, or identity will be included in a multimedia production. There are three reasons why consent should be obtained in writing. First, unless in writing, some state statutes provide that such consents are not valid. See, J. Thomas McCarthy, The Right of Publicity and Privacy, § 10.6 (1996). Second, there could be a dispute about the existence of an oral consent. Finally, unless the consent is in writing, there could be confusion concerning its scope.

Uses Permitted

There are often situations in which it is impractical to obtain written consent, and one must decide whether or not to use a particular photograph or video for an interactive media production. Situations in which such use is permitted include the reporting of newsworthy events and uses in which no person is identified or identifiable. Courts generally hold the reporting of newsworthy events to be allowed under the First Amendment which forbids any laws “abridging the freedom of speech or of the press.”

Assuming that the individual is not violating anyone’s copyrights, there are four circumstances in which the use of photographs, films and/or videos is permitted. First, the use of photographs, films and videos of buildings or other structures taken from public streets and similar non-restricted areas in which individuals are not recognizable does not violate anyone’s privacy or publicity rights. The exception to this rule is the unusual situation where false information or embarrassing private facts about an individual connected with a building or structure is included in the production. The reason is that privacy and publicity rights relate to individuals and not to buildings or other structures. See, e.g., Jaubert v. Crowley Post-Signal, Inc., 375 So.2d 1386 (La. 1979).

Second, only individuals who are recognizable in a photograph or video have any claim for misappropriation of likeness or identity. Therefore, morphing pictures and videos so individuals are not recognizable eliminates any privacy and publicity right claims. See, e.g., Cheatham v. Paisano Publications, 891 F.Supp. 381 (W.D. Ken. 1995), where the Court said that there was a jury question whether or not the Plaintiff’s posterior was recognizable in the particular photograph.

In Pesina v. Midway, 948 F. Supp. 40 (N.D. Ill.1996), a martial artist hired to model for characters of the coin operated arcade games Mortal Kombat and Mortal Kombat II alleged that use of his name and likeness in subsequent home video games violated his common law right of publicity. Mr. Pesina’s movements had been captured on video, digitized, and incorporated into the games after extensive editing. The district court granted Midway’s motion for summary judgment in part because Midway was able to show that the public did not recognize Mr. Pesina within the game. “[A]fter comparing Mr. Pesina and the game character, Johnny Cage, who allegedly resembles the plaintiff, only 6% of 306 Mortal Kombat users identified Mr. Pesina as the model.” Id. at 42. The brief use of Pesina’s name in the game (for eight seconds only when a player won), although unauthorized, also was held to not constitute a right of publicity claim.

Third, photographs, videos, and films taken of participants and spectators in connection with a newsworthy event may be used in photo essays and documentaries of the event. In Cheatham v. Paisano Publications, supra, the Plaintiff was a jean “designer” who wore one of her own “designs” to a Kentucky bikers’ convention. She had cut out the bottom of a pair of jeans and replaced it with fishnet fabric. A magazine published a photo essay of the event which included pictures of her wearing her special outfit. She sued the magazine and claimed that it misappropriated her identity. In dismissing her claim, the Court held that the photo essay was a report of a newsworthy event. See also, Time, Inc. and Steve Kagan v. Sand Creek Partners, L.P., 825 F.Supp. 210 (S.D. Ind. 1993). The Court in Cheatham also held that use of the Plaintiff’s pictures on T-shirts was not a protected newsworthy use and, if the Plaintiff were recognizable from the picture, then Plaintiff would have a basis for a claim.

There are limitations on the use of name, likeness, and identity in connection with reporting news. For example, in the movie “Woodstock” there is an extensive interview with an individual responsible for cleaning latrines. This interviewee sued for misappropriation of his right of privacy. The Court held that he was made an “involuntary performer” due to the extensive interview and allowed the case to proceed to trial. See Taggart v. Wadleigh-Maurice, Ltd., 489 F.2d 434 (3d Cir. 1973). Additionally, copying a performer’s entire performance goes beyond the allowed reporting of a newsworthy event and constitutes a violation of the performer’s right of publicity. See Zacchini v. Scripps-Howard Broadcasting, Co., 433 U.S. 564 (1977). Also where a performance is staged using actors, such as a professional wrestling match, it is unlikely a Court would hold it to be newsworthy. See, e.g., Ventura v. Titan Sports, Inc., 65 F.3d 725 (8th Cir. 1995).

Finally, use of names, pictures and identities in connection with the production of biographies of newsworthy individuals is permissible. In Harris Matthews v. Random House, 15 F.3d 432 (5th Cir. 1994), the Fifth Circuit U.S. Court of Appeals, applying Texas law, held that a book detailing the author’s and her ex-husband’s experiences as undercover agents did not violate the privacy or publicity rights of her ex-husband. Information concerning their activities and convictions were the subject of news reports. Thus, it was a matter of public record and considered newsworthy events. See, also, Mickey Dora v. Frontline Video, Inc., 18 Cal. Rptr. 2D 790 (Cal. App. 1993), in which Mickey Dora, a surfing legend, appeared in a video documentary entitled “The Legends of Malibu.” The Court held that the use of Dora’s picture was newsworthy.

Uses Not Permitted

There are at least three (3) categories of uses of names, likenesses, and identities of individuals which are never permissible. Those uses involve advertising, using actors and actresses, and exceeding the scope of agreements limiting use of interviews or photographs. First, use of an individual’s name, likeness, or identity in advertising, without that individual’s consent is not permitted. For example, in Town & Country Properties, Inc. v. Riggins, 249 Va. 387, 457 S.E.2d 356 (1995), the Plaintiff, who had been a successful football player for the Washington Redskins, transferred his interest in a house he owned in Virginia to his ex-wife as part of a divorce settlement. When his wife decided to sell the house, she placed his name and picture prominently on flyers promoting her sale of the house. The Supreme Court of Virginia held that Riggins had a claim for infringement of what was, in effect, his right of publicity. See also, Pooley v. National Hole-N-One Assoc., 89 F. Supp. 2d 1108 (D.C. Az. 2000) (holding that Plaintiff’s right of publicity was violated because Defendant used video footage of Plaintiff making a “hole in one” in a commercial manner to promote its fundraising program). The aforementioned situation is treated differently from the use of an individual’s name, picture, or identity in connection with advertising in a legitimate newsworthy context. This kind of advertising is permitted. See, e.g., Montana v. San Jose Mercury News, Inc., 40 Cal. Rptr. 2d 639 (6th Cir. 1995); Lane v. Random House, Inc., 23 Med. L. Rptr. 1385 (D.D.C. 1995). Second, there is no exception to privacy and publicity rights with respect to individuals performing as actors and actresses in dramatic productions. See, e.g., Ventura v. Titan Sports, Inc., supra.

Third, even where use is newsworthy and does not constitute advertising, unauthorized usage is illegal in instances where the limited purpose for which the interview or pictures was intended is exceeded. In Multimedia WMAZ, Inc. v. Kubach, 212 Ga. App. 707, 443 S.E.2d 491 (Ga. App. 1994), the Plaintiff appeared on a television program in which he was interviewed about having contracted AIDS. Prior to the program, the Plaintiff and Defendant reached an understanding that the Plaintiff’s face would be disguised digitally so that he could not be identified. Apparently, due to the negligence of station employees, the Plaintiff was recognizable at the beginning of the show. The Court held that the Plaintiff had a claim. See also, Daughtry v. Booth & Random House, 23 Med. L. Rptr. 1215 (Glynn County, Georgia Superior Court 1994).

Parody

Parodies are entitled to a substantial degree of First Amendment protection. However, this protection must be balanced against intellectual property rights. See, for example, the Supreme Court’s application of the Doctrine of Fair Use in the copyright law context in Luther R. Campbell, et al. v. Acuff-Rose Music, Inc., 114 S.Ct. 1164 (1994). In Cardtoons, L.C. v. Major League Baseball Players Ass’n, 838 F. Supp. 1501 (N.D. Okla. 1993), the Plaintiff sought a declaratory judgment claiming that it was not a violation of the publicity rights of well-known baseball players to produce and distribute cards with caricatures and names similar to those baseball players and containing text on the back that ridicules the players. The Tenth Circuit Court of Appeals balanced the publicity rights of the baseball players against the Plaintiff’s First Amendment right to use parody to criticize activities of public figures. The Court held that the Plaintiff was entitled to produce and distribute the cards. But see, White v. Samsung Electronics America, 971 F.2d 1395 (9th Cir. 1991) in which the Ninth Circuit Court of Appeals held, over two vigorous dissents, that a print advertisement using a robot that mimicked and parodied the persona of Vanna White infringed her right of publicity. Critics argued that celebrities’ monopolization of words, names and images of general cultural significance would lead to the depletion of the public domain and the stifling of free expression.(3) However, recently, the Ninth Circuit Court of Appeals held that California’s right of publicity protects against uses of one’s image in advertising. Newcombe v. Adolph Coors Co., 157 F.3d 686 (9th Cir. 1998).

Artistic and Literary Uses

Many times artists employ the use of a name or likeness of a real person in their artistic and literary projects. Although this may not fall under the umbrella of newsworthy events, the First Amendment’s right to free speech often shields forms of expressive art. “The use of the name of a real person as the name … in a title of a work of entertainment” can be immune from liability where it has “some real artistic relevance” to the work and is “not chosen just to exploit the publicity value of the person”. J. Thomas McCarthy, 2 Rights of Publicity and Privacy § 8:72 (2d ed. 2000).

First amendment protection and the right of publicity recently clashed in a case involving the music industry. In Parks v. LaFace Records, 76 F. Supp. 2d 775 (E.D. Mich. 1999), Rosa Parks sued the Defendants to prevent the use of her name as the title of a rap song written, performed, marketed and distributed by the Defendants. Ms. Parks objected to the use of her name due to the content of the song. The United States District Court for the Eastern District of Michigan held that “because the title ‘Rosa Parks’ is not ‘wholly unrelated’ to Defendants’ song, and because the title is the name of an expressive work and not a disguised commercial for a product” the right of publicity did not exist. Id. at 782.

In Guglielmi v. Spelling Goldberg, 25 Cal. 3d 860, 603 P.2d 454 (1979), the Supreme Court of California skirted the issue by declaring that the right of publicity is not descendible. However, in Chief Justice Bird’s concurrence, he discussed the issue of whether the use of a celebrity’s name and likeness in a fictional film exhibited on television constituted an actionable infringement of that person’s right of publicity. Id. The Chief Justice emphasized that film is “a significant medium for the communication of idea”…and “is protected by the constitutional guarantees of free expression”. Id. at 865. Film is an expression of ideas and is entitled to constitutional protection irrespective of its contribution to the market place. The nature of celebrity and prominence is that they will invite creative comment. Chief Justice Bird concluded that in this situation the value of first amendment protections outweighs the right of publicity. Additionally, the use of likeness in advertisements of the film was considered merely an adjunct to the exhibition of the film and therefore, not actionable. Id.

Although many instances encompass the use of famous personalities, cases involving private individuals also arise. Recently, the Second Circuit, upheld a New York Court of Appeals ruling stating that a Plaintiff could not recover under New York’s right of privacy statute “regardless of any false implication that might be reasonably drawn from the use of her photographs to illustrate” a magazine column on sexual regrets. Messenger v. Gruner + Jahr Printing and Publ’g, 208 F.3d 122 (2nd Cir. 2000). This decision was based on the determination that the column was newsworthy, the Plaintiff’s picture bore a relationship to the article and the article was not an “advertisement in disguise.” Id. The model whose photograph accompanied the article was not informed of its use prior to publication. Individuals are cautioned to review the pertinent statutes and/or common law in each state. The case in question was in New York, a jurisdiction which has exemptions to the laws of right of publicity which many other states do not follow.

Advertising Versus Other Use

Under the law in most states, use of a person’s name, likeness, or picture other than as part of a public event or for a newsworthy purpose would not be allowed. See, e.g., Estate of Elvis Presley v. Robb Russen, 513 F.Supp. 1339 (D.Ct. N.J. 1981) where an Elvis impersonator was held to have violated the rights of the Elvis estate. In some states, misappropriation of privacy rights and publicity rights prohibit only advertising. Courts applying Tennessee and Virginia law have construed applicable statutes that way. See, e.g., Apple Corps. Ltd. v. A.D.P.R., Inc., 843 F.Supp. 342 (M.D. Tenn. 1993) (holding that a band impersonating the Beatles could not be restricted from performing its act but was restricted from advertising it). See also, Williams v. Nathan, 21 Med. L. Rptr. 1339 (E.D. Va. 1993). On the other hand, although the California statute relating to privacy and publicity rights prohibits only use of an individual’s name, likeness, or identity in advertising, the California common law dictates that individuals have such rights in situations not involving advertising. See, e.g., Perfect 10, Inc. v. Talisman Communs. Inc., 2000 U.S. Dist. LEXIS 4564 (C.D. Ca. 2000). In Perfect 10, the Court granted a default judgment to Plaintiff as a result of Defendant’s appropriation of photographs of Plaintiff’s assignors. The photographs were appropriated for the purpose of advertising and soliciting “sale of photographs and other works on Defendant’s website and for the purpose of selling the appropriated photographs through paid subscriptions to restricted areas of Defendant’s website.” The Court ruled that this constituted a violation of California’s right of publicity law. See also, Dora v. Frontline Video, Inc., 15 Cal. App. 4th 536 (1993).

Unreasonable Publicity Concerning Private Facts

The tort of unreasonable publicity of private facts is applicable only where the facts being publicized are not newsworthy or, if arguably newsworthy, go beyond the “information to which the public is entitled, and becomes a morbid and sensational prying into private lives for its own sake.” See, e.g., Baugh v. CBS, Inc., Group W. Television, 28 F.Supp. 745 (N.D. Cal. 1993), infra. In addition, the facts must be at least relatively confidential. In Cox Communications v. Lowe, 173 Ga. App. 812, 328 S.E.2d 384 (Ga. App. 1985), a prison inmate who incidentally appeared in a television report concerning prison abuse had no claim for public disclosure of the fact that he was imprisoned as his incarceration was a matter of public record. In Batts v. Capital City Press, Inc., 479 So.2d 534 (La. App. 1985), the Louisiana Court of Appeals held that because the Plaintiff was attacked in a public place, the information was public and could not be the subject of a claim for public disclosure of embarrassing private facts. Haynes v. Alfred A. Knopf, Inc., 8 F.3d 1222 (7th Cir. 1993), involved a book which detailed historical events. In the book, the writer discusses the life stories of various individuals. In a section regarding a particular woman, the author disclosed information about the woman’s ex-husband. The District Court rejected the ex-husband’s claim regarding publicity given to embarrassing private facts on the grounds that the information disclosed was either public record or publicly known prior to publication of the book. On the other hand, in Baugh v. CBS Company, Inc. Group W Television, 828 F.Supp. 745 (N.D. Cal. 1993), the Court held that there was a jury question whether the producers and broadcasters of Street Stories had gone too far in publicly disclosing private facts about a woman who was the victim of spousal abuse. See also, Johnson v. Sawyer, 4 F.3d 369 (5th Cir. 1993), in which a Texas court held that the IRS was liable for wrongfully disclosing confidential information relating to a taxpayer’s tax return.

With the explosion of the Internet, the rights of publicity and privacy have entered a new battlefield. In a manner of seconds, photography, music and streaming video can be distributed to subscribers worldwide, posing increasing threats to the protection of these rights. Once posted on the Web, users can copy items almost instantaneously. This issue of unreasonable publicity of private facts was recently addressed in Michaels v. Internet Entertainment Group Inc., et. al., 5 F.Supp. 2d 823 (D.C. Cal. 1998). Singer Bret Michaels and actress Pamela Anderson Lee sought to enjoin Defendants from disseminating videotape via the Internet of Michaels and Lee engaged in sexual intercourse. Plaintiffs filed a preliminary injunction, inter alia, for violation of right of privacy and right of publicity. The Defendant argued that Ms. Anderson’s nude appearances in magazines, movies and publicly distributed videotapes rendered the facts on the Michaels videotape no longer private. The Court disagreed concluding that the private facts depicted on the video were not public by either the “virtue of Lee’s professional appearances or by dissemination of the Tommy Lee videotape.”(4) Id. at 841. Furthermore, the Court disposed of the newsworthiness argument by noting that the “privilege to report newsworthy information is not without limit. ‘Where the publicity is so offensive as to constitute a morbid and sensational prying into private lives for its own sake, it serve no legitimate public interest and is not deserving of protection’.” Id. at 840 (citing Diaz v. Oakland Tribune, Inc., 188 Cal. Rptr. 762 at 767 (1983)). However, the United States District Court granted summary judgment to Paramount Pictures and Viacom noting that the California Supreme Court had recently restated the principle that the newsworthiness defense was to be construed broadly and reiterated that it is “not limited to high-minded discussion of politics and public affairs.” Michaels v. Internet Entertainment Group Inc., et. al., 48 U.S.P.Q. 2d (BNA) 1891(D.C. Cal. 1998).

Right to Privacy on the Internet

Legislation

Right to privacy has become a fervently debated topic with the advent of the Internet. Concerns over improper use of information gathered on-line has prompted special interest groups and Congress to regulate the dissemination of personal information. The latest developments concerning privacy on the Internet relate to the passage of the Children’s Online Privacy Protection Act of 1998 and the effect of the European Privacy Directive.

Children’s Online Privacy Protection Act of 1998 (COPPA)

The Children’s Online Privacy Protection Act of 1998 (COPPA), 15 U.S.C. §§ 6501, et. seq. prohibits the collection and distribution of personal information regarding children under 13 and restricts distribution and use of that information. This Act became effective April 21, 2000 and rules written by the Federal Trade Commission govern its operation. The applicable rules are available in the federal register at 16 C.F.R. Part 312 and at www.ftc.gov/privacy/index.html. These rules apply to Web sites that target children under 13 years old or know that personal information is being provided by children under 13 years old. For the first two years after implementation, the more verifiable forms of parental consent are only required for those activities that pose the greatest risk to the safety and privacy of children (i.e., disclosing personal information to third parties or making that information publicly available through chatrooms or similar activities). The more reliable methods are mail, use of credit cards and digital signatures. The less reliable method is e-mail from a parent (because it is easier for a child to send that form of consent and pretend it is from a parent).

European Union Privacy Directive

The European Union (EU), in its European Union Privacy Directive, has granted broad rights to individuals whose personal information is collected and stored in databases. (For the official text of the European Union Privacy Directive, see Official Journal of the European Communities of 23 November 1995 No L. 281 p. 31. For an unofficial version, visit http://www.cdt.org/privacy/eudirective/EU_Directive_.html.) This EU position, based on the idea that privacy is a fundamental human right, is more rigorous than that of the United States. The United States does not provide as extensive access to individuals to review personal information and has relatively few restrictions on the its use.(5) The conflict between the EU position and the US position has threatened international electronic commerce.(6) Therefore, the US Department of Commerce negotiated with EU representatives and proposed safe harbor principles for American companies to utilize in determining whether they comply with EU data protection laws. See Joint Report on Data Protection Dialogue to the EU/US Summit, June 21, 1999. The data privacy accord “safe harbor” provision was approved in May 2000. Now, the European parliament and the European Union executive body must decide on a plan. The plan is expected to be approved in July.(7)

Major companies are now requiring sites on which they advertise to meet the European Union standards and the safe harbor provision. For example, IBM’s policy on personal information states that it will inform the consumer how it will use the personal information collected (See http://www.ibm.com/privacy/.):

At IBM, we intend to give you as much control as possible over your personal information. In general, you can visit IBM on the Web without telling us who you are or revealing any information about yourself. There are times, however, when we may need information from you, such as your name and address. It is our intent to let you know before we collect personal information from you on the Internet.

If you choose to give us personal information via the Internet that we or our business partners may need — to correspond with you, process an order or provide you with a subscription, for example – it is our intent to let you know how we will use such information. If you tell us that you do not wish to have this information used as a basis for further contact with you, we will respect your wishes. We do keep track of the domains from which people visit us. We analyze this data for trends and statistics, and then we discard it.

Conclusion

It is always better to obtain a written consent which permits the use of the name, likeness, or identity of any individual appearing in or who is the subject of disclosure of events in any publication or production. As outlined above, there are limited situations in which one may make such use without permission. However, because of the legal uncertainty in this area, it is necessary to have competent counsel review the situation presented prior to any such proposed use.

1 This videotape depicting sexual relations between Lee and her husband Tommy Lee was widely distributed.

2 Anne K. Mosceyunas, On-Line Privacy: The Push and Pull of Self-Regulation and Law, Computer Law Section Newsletter, State Bar of Georgia, July, August, September, 1999, pp. 13-15; Kevin A. Cranman, Internet and Electronic Communication Privacy Issues: An Overview and Legislative Update, 14th Annual Computer Law Institute, Program Materials 1999, Part 10.

3 Jane K. Winn, Digital Signatures, Smart Cards, and Electronic Payment Systems, ICLE Fourteenth Annual Computer Law Institute, Sept. 24, 1999, p. 22.

4 Jason Spingard-Koff, European Union OKs “Safe Harbor,” Wired News, May 31, 2000.

5 Relief is granted in the form of an injunction and recovery of the value of the appropriation.

6 Note that there are two other categories of the right of privacy, wrongful intrusion and false light, that are not addressed in this article.

7 Michael Higgins, A Pitch for the Right of Publicity, IP Magazine, December 1998.

Rob Hassett is an attorney with Hassett Cohen Goldstein & Port, LLP in Atlanta, Georgia.

The information above is provided for general educational purposes and not as legal advice. Laws in areas in which we practice change continually and also vary from jurisdiction to jurisdiction. Therefore no visitor to our site should rely on any of the articles provided for legal advice, but should always consult their own attorney regarding legal matters.

© 2000, Rob Hassett, Atlanta, Georgia. All Right Reserved