Anti Cybersquatting Protection Act Summary

Great Essays
The Anti-Cybersquatting Consumer Protection Act (ACPA) is a law under the Lanham Act which is created to protect the domain names from trademark violation. The ACPA has certain elements which must be proven to institute cybersquatting under the Anti-Cybersquatting Protection Act. One of the requirements in this Act is that the plaintiff needs to show that the defendant registers, trafficked in, or used a domain name. So in the Moon Microsystem v Zucchini trial, John Zucchini who is a coffee shop owner and a self-styled coffee expert who enjoyed notable success with his online blog, “Mixing Moonlight & Mocha.” Moon Microsystems, Inc. is a developer of computer software in 1982 and it is responsible for developing Mocha which is a highly-portable programming language that has become extensively popular and is presently used for all types of …show more content…
(n.d.). Retrieved October 16, 2014.from http://www.cybertelecom.org/dns/acpa1.htm

Internet Library of Law and Court Decisions. (n.d.). Retrieved October 16, 2014.from http://www.internetlibrary.com/publications/anticybsquattSamson9-05_art.cfm

• Type-in traffic. (2014, October 10). Retrieved October 16, 2014. from http://en.wikipedia.org/wiki/Type-in_traffic

• What are the Elements for Establishing Cybersquatting under the Anti-Cybersquatting Consumer Protection Act ("ACPA")? (n.d.). Retrieved October 16, 2014. From http://tcattorney.typepad.com/domainnamedispute/cybersquatting_cases_under_acpa/

• Internet Law Firm | Internet Attorney, Internet Lawyer – HinchNewman.com. (n.d.). Retrieved October 17, 2014. from http://www.hinchnewman.com/internet-law-blog/2014/08/use-of-privacy-service-leads-to-in-rem-jurisdiction-in-anticyberquatting-consumer-protection-act-case/

• Walczak, C. (n.d.). Contributory cybersquatting. In The New and Evolving tort of Contributory Cybersquatting: Did the Courts get it right? From

Related Documents

  • Improved Essays

    I believe that the defendant would have chosen a domain name closer to his blog’s name if he did not have a bad faith intent. “Mixing Moonlight & Mocha” is a blog name that could have led to many different domain names, for example: moonlightandmocha.com, moonlightmocha.com, moonlight-and-mocha.com, mixmoonlightandmocha.com, or even moonmocha.blog which would have cleared any confusion between Zucchini’s blog and Moon’s programming language. I think that Zucchini had intentions of gaining popularity by using Moon Microsystem’s Mocha trademark because the two words “moon” and “mocha” are the entire trademark while only a small portion of Zucchini’s blog name. I do not think it makes sense for Zucchini to use a domain name that differs so greatly from the name of his coffee shop, LateNightGrinds. Even if his coffee shop was named Moonlight Mocha, I do not think moonmocha.com is a domain name that his customers would stumble upon.…

    • 779 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Study Guide

    • 432 Words
    • 2 Pages

    1. Name three specific cyber issues that have necessitated new laws. 1) Credit card fraud. 2) Cyberstalking. 3) Theft of intellectual property and Identity theft.…

    • 432 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Ctc Vs Coscia Case

    • 763 Words
    • 4 Pages

    QUESTION PRESENTED What factors do the U.S. Commodity Futures Trading Commission (“CFTC”) and Department of Justice (“DOJ”) examine to determine whether spoofing violations have occurred for prosecution under the 2010 Frank-Dodd Act? How is this demonstrated in the context of the United States v. Coscia case? SHORT ANSWER Intent is the biggest factor in whether the CFTC and DOJ can successfully prosecute under the anti-spoofing laws. To prove an anti-spoofing violation has occurred, the prosecutor must show that the defendants systematically placed orders they didn’t intend to execute.…

    • 763 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Its a well known fact that technology is becoming more embodied in our lives. The Pew Internet and American Life Project released a study stating the number of adults that own cellphones, laptops or tablets is rising. This increase in ownership of technology has revolutionized access to information through the internet. One notable case is O’Grady v. Superior Court of Santa Clara County (2006). Apple filed a case against an unnamed individual who allegedly leaked information on several online sites regarding new Apple products.…

    • 315 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    This case took into account when Nolan Bates, a subscriber to an Internet program to find his “Match” online, sued its software developer Apricot.com for deactivating the software program. This was done after he had declined to pay the license fees of $200 monthly required for using the software for three months. Apricot.com then decided to disable the software without notifying Bates. Also, it sent a letter containing disrespectful language to Bates stating that: “Loser, the license was canceled!”.…

    • 597 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Name: Aishwarya Kachala Trial: Moon Micro. v. Zucchini Counsel for: Plaintiff Partner: Damian O'Leary The Anti-Cybersquatting Consumer Protection Act (ACPA) is a law under the Lanham Act which is created to protect the domain names from trademark violation. The ACPA has certain elements which must be proven to institute cybersquatting under the Anti-Cybersquatting Protection Act. One of the requirements in this Act is that the plaintiff needs to show that the defendant registers, trafficked in, or used a domain name. So in the Moon Microsystem v Zucchini trial, John Zucchini who is a coffee shop owner and a self-styled coffee expert who enjoyed notable success with his online blog, “Mixing Moonlight & Mocha.”…

    • 1749 Words
    • 7 Pages
    Great Essays
  • Great Essays

    H.R. 5800/S. 2981- Secure Data Act of 2014 The United States Constitution under the Fourth Amendment ensures our right to be free from unreasonable searches and seizures, and by extension has been interpreted to protect our right of privacy. The Fourth Amendment states: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized” (The Charters of Freedom). There has been much controversy as to what is considered to be protected under constitutional law relating to one’s right of privacy. Although a reasonable right to privacy is not explicitly stated in the Constitution, this particular right has developed into a civil liberty protected by the Fourth, Fifth and Fourteenth amendments.…

    • 1800 Words
    • 8 Pages
    Great Essays
  • Great Essays

    E., Cosway, R., & Dole, R. F. (1985). UNIFORM TRADE SECRETS ACT. In A. B. Association (Ed.), NATIONAL CONFERENCE OF COMMISSIONERS (pp. 1-17). Minneapolis: NATIONAL CONFERENCE OF COMMISSIONERS. GUDENKAUF, v. STAUFFER COMMUNICATIONS, No. 94-4228-SAC.…

    • 1805 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    The very idea of a worldwide system that could send messages instantly was a mere fantasy until the year of 1969. Of which the first internet message was sent, “Lo”. In direct result, the era of the Internet was kickstarted into existence. It would be twenty years, in 1989, until the first service providers were erected into existence. Major companies such as Comcast wouldn’t start to provide high speed internet until the late 2000’s.…

    • 713 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    2a. The criminal act that Rodriguez has committed of violating the Computer Fraud and Abuse Act. The Administration prohibits accessing information on its databases for nonbusiness reasons, and Rodriguez at trial admitted that he accessed information for nonbusiness reasons when he obtained personal identifying information, such as birth dates and home addresses, of 17 persons he knew or their relatives. 2b. Rodriguez was charged with 17 misdemeanor counts because Rodriguez violated policy from his employer because he accesses a computer without authorized access and thereby obtaining information from any department or agency of the united states.…

    • 147 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Without these two Acts in place today in our country who knows what our privacy would be like when it comes to gaining access to records. These two Acts almost contradict one another because for The Freedom of Information Act it allows a much easier access to government information in executive branch agency records. This Act also goes beyond that and will give one permission to get access to veteran’s military information of veterans who were deceased on duty. The Privacy Act then makes it harder for an individual to obtain someone’s personal privacy records. This Act protects your privacy which can be great under certain circumstances.…

    • 1113 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Computer Misuse Act 1990

    • 116 Words
    • 1 Pages

    Another legal issue is the Computer Misuse Act (1990). This is when one tries to intrude an ICT system, this includes unauthorized entry into ICT systems, planting any sort of virus, copying programs illegally, hacking, using an ICT system to commit a crime etc. There are 3 levels of offences. Level one is unauthorized access to computers (data or programs). Trying to attempt access to a system which you are not allowed in is level 1.…

    • 116 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    To support this we look at Nicholas Thompson’s article “Bigger Brother: The Exponential Law of Privacy Loss.” Thompson argues that the internet is designed to collect information from people therefore, even with privacy laws in place, owners of sites will continue to find creative ways to socially connect people (Thompson 284). He continues by referencing software designed by carrier IQ that is specifically created to track searches, locations, and purchases. Thompson states that the purpose of this software is to better enhance the network as well as peoples average everyday lives (285). Nicholas later goes into detail explaining the exponential law of privacy loss.…

    • 974 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Lawmakers could not possibly anticipate how cyber-technology would develop. In the last three decades, it has played such a pivotal role in expanding how we communicate and share information on a global scale – a world of smart phones and Internet-of-Things (IoT) devices. But computers and the internet are also used for illegitimate purposes. The government must have adequate enforcement measures in place for maintaining cyber-security.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Bullying can be traumatizing and the effects can be devastating. As technology today improves, cyberbullying becomes more and more common. Cyberbullying is repeated and hostile, and has “severe intent to threaten, embarrass, or harass”. Now with all of the new technology this harassment is virtually inescapable. Because of the negative effects that cyberbullying creates, it has become a largely debated issue whether an individual’s actions online should be prosecuted.…

    • 981 Words
    • 4 Pages
    Improved Essays