Brand Protection |
Sponsored by |
|
The FCC has posed a number of provocative questions to AT&T regarding the fact that iPhone subscribers cannot download and use the Google Voice application. AT&T should stifle every motivation to play cute or clever with the FCC. Apple adopted such a strategy when it suggested to the Library of Congress and others that it would be curtains for the free world if iPhone owners could hack, jailbreak, tether, and otherwise use their handsets without fear of violating the prohibition on circumventing copyright laws contained in the Digital Millennium Copyright Act. more
A report released today by Public Knowledge points out that their recent analysis indicates filtering Internet content, as advocated by media companies, will not be effective and in fact harmful to the Internet. An accompanying 60-page whitepaper contains the full report including a number of reasons why the user of copyright filters should not be allowed, encouraged or mandated on U.S. Internet Service Provider (ISP) networks. more
A Swedish court on Friday found all four defendants guilty in a copyright test case involving one of the world's biggest free file-sharing websites. "The Stockholm disctrict court has today found guilty the four individuals that were charged with accessory to breaching copyright laws," the court said in a statement. "The court has sentenced each of them to one year in prison." more
The Recording Industry Association of America (RIAA) has been taking a lot of people to court -- basically, harassing folks in an attempt to curb file-sharing. The $220,000 verdict against Jammy Thomas got a lot of news (and probably worried a lot of folks). However, on appeal (i.e., after a new court not cherry-picked by the RIAA to try the case looked things over), the RIAA lost... again. ...At its heart, the verdict reaffirms that simply making a copyrighted work available is not the same as actually distributing the work. more
Have you ever thought of how reputation is created in cyberspace? Beth Noveck wrote an article, 'Trademark Law and the Social Construction of Trust: Creating the Legal Framework for On-Line Identity' in which she argues that, to determine what rules should govern on-line identity, we should look to trademark law, which has the best set of rules to deal with the way reputation is created in cyberspace. more
Recent attention to the Eighth Circuit decision in Coca-Cola v. Purdy brings to mind the class of sometimes difficult cases involving the use of another's trademark as a domain name for criticism. An ICANN UDRP decision, Full Sail Inc. v. Ryan Spevack, Case No. D2003-0502 (WIPO October 3, 2003), by Mark VB Partridge, presiding panelist, with Frederick M. Abbott and G. Gervaise Davis III, included a review and analysis of the "your trademark sucks.com" cases that remains a useful reference worthy (I hope) of the lengthy quote below. more
DOTZON's 2025 study analyzes over 410 corporate dotBrands to reveal how companies strengthen digital identities through custom top-level domains. Audi retains first place, while newcomers like CRS and rising performers such as Schwarz demonstrate growing strategic use. more
As artificial intelligence reshapes how users navigate the web, domain names may undergo explosive growth, potentially reaching tens of billions. A new infrastructure of trusted digital identities could become essential for AI agents. more
Many previous pieces of research have focused on the desirability of a comprehensive scoring system, to be used for ranking results identified as part of a brand-protection solution, according to their potential level of threat. Such scoring systems offer the capability for identifying prioritised targets for further analysis, content tracking or enforcement actions. more
As published on June 24, 2025, it is with no surprise that the AFNIC was renewed as the backend registry provider of the .PARIS new generic Top-Level Domain. What caught my attention in the announcement was this paragraph: “Afnic’s remit will also be expanded to include communication and promotion of the .paris TLD, as well as the development of initiatives designed to increase its adoption by businesses and private individuals.” more
The ability to rank results according to the level of threat they pose (based on factors such as, for example, the extent to which a webpage relates to a brand of interest) is a key component of many brand protection services. The prioritisation process has a number of purposes, including the identification of: (a) priority targets for further analysis; (b) candidates for content tracking (i.e. regular reinspection of content or configuration, and the generation of an alert if high-concern findings are identified) - as may be appropriate in cases where a domain name presents a high potential level of risk but is not currently associated with any live site content; and (c) priority targets for enforcement actions. more
When major events like the Super Bowl are on the horizon, cybercriminals exploit public trust by creating fraudulent domains for fake betting sites, phishing, and malware distribution. CSC's research into top online sportsbooks highlights the hidden risks of dormant domains, which, though inactive, can quickly be repurposed for cyber attacks. Overlooked yet dangerous, these domains play a key role in impersonation, misinformation, and scams targeting event-driven traffic, underscoring the need for continuous monitoring of lookalike, dropped, re-registered, and newly registered domains. more
One major element of many brand-protection programmes is the use of an algorithm to sort the findings identified through monitoring, according to their relevance or level of potential threat. This prioritisation process offers a number of benefits, including the identification of priority targets for further analysis, content tracking, or enforcement. more
As counterfeit networks grow more elusive, AI-driven clustering could revolutionize brand protection. By linking disparate findings, identifying serial infringers, and enabling bulk enforcement, AI offers a smarter approach to monitoring and takedown efforts. Yet, challenges remain - from data reliability to analyzing complex content. Companies that master AI-driven clustering may gain a significant advantage in the fight against brand abuse. more
The global debate over Internet privacy and security took center stage in a webinar hosted by CircleID in partnership with the Edgemoor Research Institute. The event marked the first in a series exploring the delicate balance between safeguarding personal data and ensuring legitimate access to domain name registration details. As governments, cybersecurity experts, law enforcement, and intellectual property holders grapple with the evolving regulatory landscape, Project Jake seeks to establish a framework that prioritizes policy clarity, efficiency, and adaptability. more