BATTLING FRAUD
the panel concluded that relief should be granted and ordered that the ‘juicycoutureusa. com’ domain name be transferred from the respondent to the complainant.
Defending your ground with powerful domain research tools
If you have fallen victim to a cybersquatter, here is what you should do to build your case:
• Do a Whois lookup. Discover all current ownership details, including individuals or companies listed, the registrar that holds the domain, the name servers, and more. This will give you a foundational understanding of who you are up against.
• Review Whois history. Find out how long the domain has been registered and used in fraudulent activities. Look at hosting history details as well to gather additional name servers and Internet protocol (IP) addresses that can be used in your case. If you come up against privacy protection issues in a Whois record, Whois history can be instrumental at uncovering that latest ‘real’ Whois data prior to the onset of the privacy records.
• Capture screenshot images of website home pages. Tis will provide you with dated evidence that illustrates content, including ads and images. Tis is particularly helpful in showing how the respondent created confusion with your customers or tried to profit from your brand or from selling your products on the sites in question.
Ongoing defensive safeguarding is also key in ensuring that your valuable trademarks and brands aren’t being targeted by criminals or bad actors:
• That the current domain registrant does not have any rights in the mark in question; and
• That the current domain registrant has used the domain name in bad faith. A UDRP win means you gain control and ownership of the domain name(s) in question, but there are no monetary or other damages awarded in a UDRP decision.
In the August 13, 2010, Juicy Couture, Inc v Huang Fengchu/Qin Xiao case, the respondent registered the domain name in question, which resolved to a website that displayed the complainant’s mark and sold counterfeit versions of the complainant’s products. The respondent failed to submit a response to the UDRP proceeding and, since the complainant satisfied the three proof elements listed above,
www.worldipreview.com
• Uncover common typographical errors associated with any brand name. Use an online resource such as a domain typo finder tool. Discovering both registered and unregistered domains allows brands to take preventive measures and register available typo domains themselves.
• Be the first to know when someone registers a domain name. Use brand alerts to receive email notifications when any given term or phrase is used in a domain name registration. Taking action promptly on newly registered domains containing specific brand strings oſten results in quick resolution.
• Expose Whois record changes in domain names you already own. Receive an email notification via domain monitor alerts if anything changes with respect to your in-house domain names. Sometimes cyber
“ONCE YOU HAVE IDENTIFIED A BAD ACTOR IT MAKES SENSE TO KEEP AN EYE ON IT, THE COMPANY, ITS NAME SERVERS AND ITS IP ADDRESSES.”
criminals go after the domains you already own rather than the typos they can simply register themselves.
• Spot whenever a person or company registers a new domain. Use registrant alerts to receive email notification when a known perpetrator registers new domain names. Once you have identified a bad actor it makes sense to keep an eye on it, the company, its name servers and its IP addresses.
Using available domain and DNS research tools along with current legislation is the right plan to respond to significant and organised fraud activity. Taking the appropriate steps can safeguard your reputation, revenue and brand in the long run. n
Susan Prosser is vice president of partner and industry relations at DomainTools. She can be contacted at:
susan@domaintools.com
Susan Prosser has more than 15 years of Internet industry experience, handling clients from a range of sectors. Her role at DomainTools focuses on industry relations, client services and marketing, while raising the important needs of the legal and security community to the business.
Trademarks Brands and the Internet Volume 1, Issue 3
35
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56