SlideShare a Scribd company logo
1 of 26
Download to read offline
Defending Corporate Identity OnlineDefending Corporate Identity Online
David Strouse, Manager, Intellectual Property, Iron MountainDavid Strouse, Manager, Intellectual Property, Iron Mountain
Edward Fenster, CEO, AvestarEdward Fenster, CEO, Avestar--IPIP
September 13, 2006September 13, 2006
©2006 Iron Mountain Incorporated. All rights reserved.
Iron Mountain Digital is a trademark of Iron Mountain Incorporated.
CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 2
AgendaAgenda
• Iron Mountain – Overview
• Current Online Challenges / Environment
• Online Crime & Punishment
• Common Forms of Online Threats
– Domain Name
– Counterfeit Goods
– Channel Management
• Closing Remarks
• Questions & Answers
CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 3
Iron Mountain – A Global
Organization With Local Reach
Iron Mountain – A Global
Organization With Local Reach
At a Glance:At a Glance:
• Dedicated focus since 1951
• Over 850 Locations in 26 Countries
• NYSE listed – IRM
• #763 on the Fortune 1000 list
• Clients include 75% of the Fortune 1000
CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 4
Iron Mountain ServicesIron Mountain Services
• Records Management
• Health Information Management
• Document Management
• Energy Data Services
• Film & Sound Archive
• Off-Site Tape Vaulting
• Disaster Recovery Support
Services
• Secure Shredding
• Compliant Shredding Programs
• E-Records Management
• Data Restoration
• E-Discovery & Litigation
Support
• Domain Name Management &
Trademark Enforcement
• Technology Escrow
• PC & Server Data Protection
• E-Mail Continuity
• DataDefense
• Decru Encryption
Services
CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 4
CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 5
Current Online ChallengesCurrent Online Challenges
• Unauthorized use of trademarks
• Sale of counterfeit goods
• Brand exploitation
• Increased difficulty in managing online
distribution channel
CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 6
Current Online EnvironmentCurrent Online Environment
• Barriers-to-entry for
establishing online presence
are low
– Easy to establish a professional-looking
website
– Easy to copy trademarks, images and
text from legitimate websites
– Easy to “hide in plain sight”
– Difficult to track infringements
– Easy to confuse customers due to the
high quality of digital copies
CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 7
Online Threats Present Challenges to
Legitimate Companies That…
Online Threats Present Challenges to
Legitimate Companies That…
• …rely on strong product or corporate brand
• …manufacture products that are sold online
• …experience reduced sales when website traffic
declines
CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 8
Online Crime & PunishmentOnline Crime & Punishment
• There are laws, but no enforcement
– Online crime laws are weak and rarely enforced
– Penalties are minimal
– Global reach of the Internet is vast
– Perpetrators are too many
– The threat is constant
CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 9
Security – The Next FrontierSecurity – The Next Frontier
Business Impact
Off-site Back-up
Encryption
Controlled Network
Access
Firewalls
Proxy filters
Antivirus
Online Brand
Management
/ Monitoring
Internet
Internet
Tangible
Asset Protection
Intangible
Asset Protection
Security
CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 10
Common Forms of Online ThreatsCommon Forms of Online Threats
• Trademark and Brand Infringement
– Domain Name
• Commercial sites (e.g., offensive content or competing
companies)
• Domain name monetization (e.g., click-through advertising)
• Unhappy consumer sites (e.g., xxx-sucks.com) (generally,
protected)
– Sale of Counterfeit Goods in Auction Sites
– Logo, Text, and Meta Tag Use in Commercial Sites
• Stopping unauthorized parties from using your trademarks
• Managing partners’ use of logos and trademarks
• Protecting against “Google bombing”
CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 11
Typical Domain Name Online ThreatsTypical Domain Name Online Threats
• Domain name monetization
– Revenue from text advertising on monetized websites totaled $400–$600
million in 2005 and could reach up to $1 billion by 2007, according to
Susquehanna Financial Group
– Tasting/Taste Testing
– Certain jurisdictions are more permissive of this activity than others
• Commercial sites
– Designed to drive traffic to a website rather than through it
• Information on arbitration can be found online
– Word Intellectual Property Organization (WIPO): in Geneva, WIPO
administers 23 international treaties dealing with different aspects of
intellectual property protection, including domain name arbitration
• Results: http://arbiter.wipo.int/domains/search/index.html
CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 12
Addressing Domain Name Online
Threats
Addressing Domain Name Online
Threats
• Automated Filters
– Domain name monetization “wait & see”
• For high-traffic websites, consider waiting five days after
domains are registered to see if the registrant abandons
domains.
– Streamlined trademark infringement query
• In an active domain name query for a large hardware company,
over 50,000 domain names were found that included the
company’s trademark.
– After crawling associated web pages to (a) determine
whether the site is active and (b) whether it includes
relevant terms (e.g., notebook, desktop, server, the
company’s name as a stand-alone word), the list was
reduced to 2,140 entries, and over half those websites
were parked.
CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 13
Addressing Domain Name Online
Threats
Addressing Domain Name Online
Threats
• Action Prioritization
HIGH
MEDIUM
LOW
• Multiple infringing sites run by a single party
• Sites with offensive content
• Sites designed to draw away business
• Monetized sites with infringing domain names
• Infringing domain names that are registered
but don’t have websites
CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 14
Taking Action Against Domain Name
Online Threats
Taking Action Against Domain Name
Online Threats
• UDRP Fillings
– Easier, since it does not require identifying the owner of the
website.
• In UDRP filings, showing a pattern of abuse and having registered
your domain names as trademarks can be helpful.
• If handled internally, UDRP filings rarely cost more than several
thousand dollars.
• Also Consider:
– Contacting the web hosting provider
– Contacting the provider of ads served by the website (if
monetized)
– Litigation
CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 15
Typical Counterfeit Online ThreatTypical Counterfeit Online Threat
• Most Frequent Manufacturer Concerns
– Counterfeit products
• Image on website may be of authentic product, even when
good is fake
– Similar products with unlawful comparisons to drive
search results
– Use of copyrighted images
• Most Frequent Challenges
– Determining who are the big offenders
– Archiving and tracking all activity, particularly given
auction turnover
– Corresponding effectively with eBay to remove auctions
CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 16
Counterfeit Goods - In the NewsCounterfeit Goods - In the News
Tiffany and eBay Clash Over Sales of Fake Goods
New York Law Journal, August 19, 2004 (Image from The Economist,,July 1, 2004)
“Tiffany also bought 186 pieces of jewelry described as original Tiffany goods a few months ago and
found that only 5 percent of the items were genuine, the complaint said.”
Diesels Are the New Heroin
Wired News, June 19, 2006
“The traveler in Thailand is no longer sticking baggies of smack up his crack
and praying for a short-fingered customs official; he's hawking designer
knockoffs on auction sites like eBay.”
What Happens When an eBay Steal Is a Fake
We Sought Redress From Site
And Sellers After Our Fendi,
Gucci, Tiffany Proved Faux
By LORETTA CHAO
June 29, 2006; Page D1
CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 17
Addressing Counterfeit Online ThreatsAddressing Counterfeit Online Threats
• eBay offers the Verified Rights Owner (“VeRO”)
program
– Permits manufacturers to report potentially infringing auctions
to eBay and receive seller information
– Most manufacturers are satisfied with eBay’s actions following
requests made through the VeRO system
– However, manufactures are less satisfied with their ability to
identify sellers of counterfeit goods through eBay, as VeRO
offers:
• No sophisticated search process with alarms and/or priorities
• No access to older auctions
CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 18
Addressing Counterfeit Online ThreatsAddressing Counterfeit Online Threats
• Time-savings automated search tool
– Continuous monitoring of eBay for potentially
infringing auctions
– Automated e-mail preparation to VeRO
– Auction tracking by sellers
CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 19
Typical Online Channel Management
Challenge
Typical Online Channel Management
Challenge
• Rampant Unauthorized Usage of…
– Logos
– Trademarks
– Product offerings
CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 20
Addressing Online Channel ManagementAddressing Online Channel Management
• Authorized or Subsidiary Websites
– Use of existing channels for communications
• Unauthorized Websites
– Unless an owned trademark (or variant) is used in the domain
name of the infringing website, a UDRP process is not possible
– Therefore, one must positively identify the owner of the website
• Owner(s) of websites that perform actual commerce activities are
often among the easiest to positively identify
– Once ownership has been established, more standard methods
of enforcement can be used:
• Cease and Desist Letters
• Litigation
CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 21
Online Infringements Impact BusinessOnline Infringements Impact Business
Loss of confidence in product
Loss of business
Loss of brand value
Higher pay-per-click costs
CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 22
Protecting Online Corporate IdentityProtecting Online Corporate Identity
Cutting-edge ApproachTraditional Approach
• Web Search
– Manual, inconsistent
effort
– Insufficient in policing
worldwide use of
trademarks and sales
channels
• Sophisticated Online
Monitoring Tool
– 24x7 automated
monitoring protection
and enforcement
activity
• Web crawling
• Targeted data retrieval
• Sophisticated analysis
• Real-time information
CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 23
Domain Name Records ManagementDomain Name Records Management
• Registration, Management, & Enforcement
Services
– Custom Projects and Expert Consulting
• Reduce time, costs and risks associated with
managing domain name records
– Audit, validate, consolidate, modify, register, manage
and protect domain name records across multiple
corporate cost centers, domain registrars and registries
– Protect, promote and manage your company’s key
names in top country-specific Internet markets
• Personal service and web tools
– Dedicated and experienced Client Service Managers
– Iron Mountain Connect™ Domain Name Center saves
time and effort, providing single point of access to
portfolio
• Accredited by ICANN, EURid and country-
specific registries
• 41,000+ domain names under management
CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 24
Online Brand Enforcement ServicesOnline Brand Enforcement Services
• Maintain Brand Purity
– Uncover unauthorized use of your
brands and trademarks
• Avoid Loss of Revenues
– Control unauthorized or pirated
commerce
• Take Action
– Watch for infringing registrations and
stop them through Cease & Desist
letters and/or Dispute Resolution
options
CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 25
Thank You!Thank You!
http://www.avestar-ip.com
efenster@avestar-ip.com
http://www.avestar-ip.com
efenster@avestar-ip.com
www.ironmountain.com
david.strouse@ironmountain.com
To request a Live Demo: 323-269-0200 x101
www.ironmountain.com
david.strouse@ironmountain.com
To request a Live Demo: 323-269-0200 x101
CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 26
Questions & AnswersQuestions & Answers
• Iron Mountain’s Services
– Online Intellectual Property Protection Services:
• http://www.ironmountain.com/ipm/dns/enforce.asp
– Domain Names Management Services:
• http://www.ironmountain.com/ipm/dns/manage.asp
– Domain Names Registration Services:
• http://www.ironmountain.com/ipm/dns/register.asp
– Domain Names Implementation Services:
• http://www.ironmountain.com/ipm/dns/implement.asp
• All participants will receive a copy of this presentation via email
• For more information: david.strouse@ironmountain.com
• Thank you!

More Related Content

Viewers also liked

Engage mooc samtaler_norsk
Engage  mooc samtaler_norskEngage  mooc samtaler_norsk
Engage mooc samtaler_norskHaraldBjar
 
Reishi (Ganoderma) : το Βότανο της Μακροζωίας στην Ανατολή - μέρος β'
Reishi (Ganoderma) : το Βότανο της Μακροζωίας στην Ανατολή - μέρος β'Reishi (Ganoderma) : το Βότανο της Μακροζωίας στην Ανατολή - μέρος β'
Reishi (Ganoderma) : το Βότανο της Μακροζωίας στην Ανατολή - μέρος β'Μυκοθεραπεία Mycotherapy
 
Presentación histogramas y diagramas de relación
Presentación histogramas y diagramas de relaciónPresentación histogramas y diagramas de relación
Presentación histogramas y diagramas de relaciónCarlos del Razo
 
Proporcionalidade inversa
Proporcionalidade inversaProporcionalidade inversa
Proporcionalidade inversaMarta Pereira
 
新卒2年目のchef guy
新卒2年目のchef guy新卒2年目のchef guy
新卒2年目のchef guy祐樹 夏目
 
LIBERTY THEO 104 ALL Quizzes
LIBERTY THEO 104 ALL QuizzesLIBERTY THEO 104 ALL Quizzes
LIBERTY THEO 104 ALL QuizzesHomework Simple
 
#EmpleoVerde_LaColmenaQueDiceSi
#EmpleoVerde_LaColmenaQueDiceSi#EmpleoVerde_LaColmenaQueDiceSi
#EmpleoVerde_LaColmenaQueDiceSiUpSocial
 
Country Report on Singapore
Country Report on SingaporeCountry Report on Singapore
Country Report on SingaporeYakshika Vats
 
обзор рынка платежных карточек беларуси выпуск12
обзор рынка платежных карточек беларуси выпуск12 обзор рынка платежных карточек беларуси выпуск12
обзор рынка платежных карточек беларуси выпуск12 Инфобанк бай
 

Viewers also liked (12)

Engage mooc samtaler_norsk
Engage  mooc samtaler_norskEngage  mooc samtaler_norsk
Engage mooc samtaler_norsk
 
Reishi (Ganoderma) : το Βότανο της Μακροζωίας στην Ανατολή - μέρος β'
Reishi (Ganoderma) : το Βότανο της Μακροζωίας στην Ανατολή - μέρος β'Reishi (Ganoderma) : το Βότανο της Μακροζωίας στην Ανατολή - μέρος β'
Reishi (Ganoderma) : το Βότανο της Μακροζωίας στην Ανατολή - μέρος β'
 
Presentación histogramas y diagramas de relación
Presentación histogramas y diagramas de relaciónPresentación histogramas y diagramas de relación
Presentación histogramas y diagramas de relación
 
Proporcionalidade inversa
Proporcionalidade inversaProporcionalidade inversa
Proporcionalidade inversa
 
新卒2年目のchef guy
新卒2年目のchef guy新卒2年目のchef guy
新卒2年目のchef guy
 
LIBERTY THEO 104 ALL Quizzes
LIBERTY THEO 104 ALL QuizzesLIBERTY THEO 104 ALL Quizzes
LIBERTY THEO 104 ALL Quizzes
 
창업에 대한 잡담들
창업에 대한 잡담들 창업에 대한 잡담들
창업에 대한 잡담들
 
#EmpleoVerde_LaColmenaQueDiceSi
#EmpleoVerde_LaColmenaQueDiceSi#EmpleoVerde_LaColmenaQueDiceSi
#EmpleoVerde_LaColmenaQueDiceSi
 
Country Report on Singapore
Country Report on SingaporeCountry Report on Singapore
Country Report on Singapore
 
MYGraduation
MYGraduationMYGraduation
MYGraduation
 
Pigeon control products
Pigeon control productsPigeon control products
Pigeon control products
 
обзор рынка платежных карточек беларуси выпуск12
обзор рынка платежных карточек беларуси выпуск12 обзор рынка платежных карточек беларуси выпуск12
обзор рынка платежных карточек беларуси выпуск12
 

Similar to im_defending_corporate_identity_online_webinar_91306

Iron Mountain Training 3
Iron Mountain Training 3Iron Mountain Training 3
Iron Mountain Training 3Al Ewers
 
Online Security and Privacy Issues
Online Security and Privacy IssuesOnline Security and Privacy Issues
Online Security and Privacy Issuesebusinessmantra
 
If I want a perfect cyberweapon, I'll target ERP
If I want a perfect cyberweapon, I'll target ERPIf I want a perfect cyberweapon, I'll target ERP
If I want a perfect cyberweapon, I'll target ERPERPScan
 
Shining a Light on Cyber Threats from the Dark Web
Shining a Light on Cyber Threats from the Dark WebShining a Light on Cyber Threats from the Dark Web
Shining a Light on Cyber Threats from the Dark WebSurfWatch Labs
 
Protecting your IP and Data Trustee Responsibilities by Brian Miller (Solici...
Protecting your IP and Data  Trustee Responsibilities by Brian Miller (Solici...Protecting your IP and Data  Trustee Responsibilities by Brian Miller (Solici...
Protecting your IP and Data Trustee Responsibilities by Brian Miller (Solici...Brian Miller, Solicitor
 
How to Prevent Your Organisation’s IP from Being Stolen by Brian Miller Solic...
How to Prevent Your Organisation’s IP from Being Stolen by Brian Miller Solic...How to Prevent Your Organisation’s IP from Being Stolen by Brian Miller Solic...
How to Prevent Your Organisation’s IP from Being Stolen by Brian Miller Solic...Brian Miller, Solicitor
 
ULTRA Cooley Presentation
ULTRA Cooley PresentationULTRA Cooley Presentation
ULTRA Cooley PresentationAl Ewers
 
How to protect the IP of luxury and fashion brands with other means than the ...
How to protect the IP of luxury and fashion brands with other means than the ...How to protect the IP of luxury and fashion brands with other means than the ...
How to protect the IP of luxury and fashion brands with other means than the ...Annabelle Gauberti
 
Retail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewRetail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewOCTF Industry Engagement
 
DomainSkate NYEBN Presentation 5-14-14
DomainSkate NYEBN Presentation 5-14-14DomainSkate NYEBN Presentation 5-14-14
DomainSkate NYEBN Presentation 5-14-14domainskate
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessLucy Denver
 
Planning Your Business Web Site
Planning Your Business Web SitePlanning Your Business Web Site
Planning Your Business Web SiteDonny Shimamoto
 
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Gathering Intel from the Dark Web to Identify and Prioritize Critical RisksGathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Gathering Intel from the Dark Web to Identify and Prioritize Critical RisksSurfWatch Labs
 
Super Show - Driving Traffic with Domain Names
Super Show - Driving Traffic with Domain NamesSuper Show - Driving Traffic with Domain Names
Super Show - Driving Traffic with Domain NamesiGB Affiliate
 
The Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet PrivacyThe Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet PrivacyeBoost Consulting
 
Gareth Young - Creating A Global Internet Anti-Piracy Strategy
Gareth Young - Creating A Global Internet Anti-Piracy StrategyGareth Young - Creating A Global Internet Anti-Piracy Strategy
Gareth Young - Creating A Global Internet Anti-Piracy StrategyEleonora Rosati
 

Similar to im_defending_corporate_identity_online_webinar_91306 (20)

Iron Mountain Training 3
Iron Mountain Training 3Iron Mountain Training 3
Iron Mountain Training 3
 
Online Security and Privacy Issues
Online Security and Privacy IssuesOnline Security and Privacy Issues
Online Security and Privacy Issues
 
Data Breach Detection: Are you ready for GDPR?
Data Breach Detection: Are you ready for GDPR?Data Breach Detection: Are you ready for GDPR?
Data Breach Detection: Are you ready for GDPR?
 
If I want a perfect cyberweapon, I'll target ERP
If I want a perfect cyberweapon, I'll target ERPIf I want a perfect cyberweapon, I'll target ERP
If I want a perfect cyberweapon, I'll target ERP
 
Shining a Light on Cyber Threats from the Dark Web
Shining a Light on Cyber Threats from the Dark WebShining a Light on Cyber Threats from the Dark Web
Shining a Light on Cyber Threats from the Dark Web
 
Protecting your IP and Data Trustee Responsibilities by Brian Miller (Solici...
Protecting your IP and Data  Trustee Responsibilities by Brian Miller (Solici...Protecting your IP and Data  Trustee Responsibilities by Brian Miller (Solici...
Protecting your IP and Data Trustee Responsibilities by Brian Miller (Solici...
 
How to Prevent Your Organisation’s IP from Being Stolen by Brian Miller Solic...
How to Prevent Your Organisation’s IP from Being Stolen by Brian Miller Solic...How to Prevent Your Organisation’s IP from Being Stolen by Brian Miller Solic...
How to Prevent Your Organisation’s IP from Being Stolen by Brian Miller Solic...
 
Social and ethical issues in commerce
Social and ethical issues in commerceSocial and ethical issues in commerce
Social and ethical issues in commerce
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
ULTRA Cooley Presentation
ULTRA Cooley PresentationULTRA Cooley Presentation
ULTRA Cooley Presentation
 
How to protect the IP of luxury and fashion brands with other means than the ...
How to protect the IP of luxury and fashion brands with other means than the ...How to protect the IP of luxury and fashion brands with other means than the ...
How to protect the IP of luxury and fashion brands with other means than the ...
 
How to protect the IP of luxury and fashion brands with other means than the ...
How to protect the IP of luxury and fashion brands with other means than the ...How to protect the IP of luxury and fashion brands with other means than the ...
How to protect the IP of luxury and fashion brands with other means than the ...
 
Retail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 OverviewRetail Excellence Ireland - Cyber Threats 2015 Overview
Retail Excellence Ireland - Cyber Threats 2015 Overview
 
DomainSkate NYEBN Presentation 5-14-14
DomainSkate NYEBN Presentation 5-14-14DomainSkate NYEBN Presentation 5-14-14
DomainSkate NYEBN Presentation 5-14-14
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
 
Planning Your Business Web Site
Planning Your Business Web SitePlanning Your Business Web Site
Planning Your Business Web Site
 
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Gathering Intel from the Dark Web to Identify and Prioritize Critical RisksGathering Intel from the Dark Web to Identify and Prioritize Critical Risks
Gathering Intel from the Dark Web to Identify and Prioritize Critical Risks
 
Super Show - Driving Traffic with Domain Names
Super Show - Driving Traffic with Domain NamesSuper Show - Driving Traffic with Domain Names
Super Show - Driving Traffic with Domain Names
 
The Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet PrivacyThe Ins, Outs, and Nuances of Internet Privacy
The Ins, Outs, and Nuances of Internet Privacy
 
Gareth Young - Creating A Global Internet Anti-Piracy Strategy
Gareth Young - Creating A Global Internet Anti-Piracy StrategyGareth Young - Creating A Global Internet Anti-Piracy Strategy
Gareth Young - Creating A Global Internet Anti-Piracy Strategy
 

im_defending_corporate_identity_online_webinar_91306

  • 1. Defending Corporate Identity OnlineDefending Corporate Identity Online David Strouse, Manager, Intellectual Property, Iron MountainDavid Strouse, Manager, Intellectual Property, Iron Mountain Edward Fenster, CEO, AvestarEdward Fenster, CEO, Avestar--IPIP September 13, 2006September 13, 2006 ©2006 Iron Mountain Incorporated. All rights reserved. Iron Mountain Digital is a trademark of Iron Mountain Incorporated.
  • 2. CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 2 AgendaAgenda • Iron Mountain – Overview • Current Online Challenges / Environment • Online Crime & Punishment • Common Forms of Online Threats – Domain Name – Counterfeit Goods – Channel Management • Closing Remarks • Questions & Answers
  • 3. CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 3 Iron Mountain – A Global Organization With Local Reach Iron Mountain – A Global Organization With Local Reach At a Glance:At a Glance: • Dedicated focus since 1951 • Over 850 Locations in 26 Countries • NYSE listed – IRM • #763 on the Fortune 1000 list • Clients include 75% of the Fortune 1000
  • 4. CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 4 Iron Mountain ServicesIron Mountain Services • Records Management • Health Information Management • Document Management • Energy Data Services • Film & Sound Archive • Off-Site Tape Vaulting • Disaster Recovery Support Services • Secure Shredding • Compliant Shredding Programs • E-Records Management • Data Restoration • E-Discovery & Litigation Support • Domain Name Management & Trademark Enforcement • Technology Escrow • PC & Server Data Protection • E-Mail Continuity • DataDefense • Decru Encryption Services CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 4
  • 5. CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 5 Current Online ChallengesCurrent Online Challenges • Unauthorized use of trademarks • Sale of counterfeit goods • Brand exploitation • Increased difficulty in managing online distribution channel
  • 6. CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 6 Current Online EnvironmentCurrent Online Environment • Barriers-to-entry for establishing online presence are low – Easy to establish a professional-looking website – Easy to copy trademarks, images and text from legitimate websites – Easy to “hide in plain sight” – Difficult to track infringements – Easy to confuse customers due to the high quality of digital copies
  • 7. CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 7 Online Threats Present Challenges to Legitimate Companies That… Online Threats Present Challenges to Legitimate Companies That… • …rely on strong product or corporate brand • …manufacture products that are sold online • …experience reduced sales when website traffic declines
  • 8. CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 8 Online Crime & PunishmentOnline Crime & Punishment • There are laws, but no enforcement – Online crime laws are weak and rarely enforced – Penalties are minimal – Global reach of the Internet is vast – Perpetrators are too many – The threat is constant
  • 9. CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 9 Security – The Next FrontierSecurity – The Next Frontier Business Impact Off-site Back-up Encryption Controlled Network Access Firewalls Proxy filters Antivirus Online Brand Management / Monitoring Internet Internet Tangible Asset Protection Intangible Asset Protection Security
  • 10. CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 10 Common Forms of Online ThreatsCommon Forms of Online Threats • Trademark and Brand Infringement – Domain Name • Commercial sites (e.g., offensive content or competing companies) • Domain name monetization (e.g., click-through advertising) • Unhappy consumer sites (e.g., xxx-sucks.com) (generally, protected) – Sale of Counterfeit Goods in Auction Sites – Logo, Text, and Meta Tag Use in Commercial Sites • Stopping unauthorized parties from using your trademarks • Managing partners’ use of logos and trademarks • Protecting against “Google bombing”
  • 11. CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 11 Typical Domain Name Online ThreatsTypical Domain Name Online Threats • Domain name monetization – Revenue from text advertising on monetized websites totaled $400–$600 million in 2005 and could reach up to $1 billion by 2007, according to Susquehanna Financial Group – Tasting/Taste Testing – Certain jurisdictions are more permissive of this activity than others • Commercial sites – Designed to drive traffic to a website rather than through it • Information on arbitration can be found online – Word Intellectual Property Organization (WIPO): in Geneva, WIPO administers 23 international treaties dealing with different aspects of intellectual property protection, including domain name arbitration • Results: http://arbiter.wipo.int/domains/search/index.html
  • 12. CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 12 Addressing Domain Name Online Threats Addressing Domain Name Online Threats • Automated Filters – Domain name monetization “wait & see” • For high-traffic websites, consider waiting five days after domains are registered to see if the registrant abandons domains. – Streamlined trademark infringement query • In an active domain name query for a large hardware company, over 50,000 domain names were found that included the company’s trademark. – After crawling associated web pages to (a) determine whether the site is active and (b) whether it includes relevant terms (e.g., notebook, desktop, server, the company’s name as a stand-alone word), the list was reduced to 2,140 entries, and over half those websites were parked.
  • 13. CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 13 Addressing Domain Name Online Threats Addressing Domain Name Online Threats • Action Prioritization HIGH MEDIUM LOW • Multiple infringing sites run by a single party • Sites with offensive content • Sites designed to draw away business • Monetized sites with infringing domain names • Infringing domain names that are registered but don’t have websites
  • 14. CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 14 Taking Action Against Domain Name Online Threats Taking Action Against Domain Name Online Threats • UDRP Fillings – Easier, since it does not require identifying the owner of the website. • In UDRP filings, showing a pattern of abuse and having registered your domain names as trademarks can be helpful. • If handled internally, UDRP filings rarely cost more than several thousand dollars. • Also Consider: – Contacting the web hosting provider – Contacting the provider of ads served by the website (if monetized) – Litigation
  • 15. CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 15 Typical Counterfeit Online ThreatTypical Counterfeit Online Threat • Most Frequent Manufacturer Concerns – Counterfeit products • Image on website may be of authentic product, even when good is fake – Similar products with unlawful comparisons to drive search results – Use of copyrighted images • Most Frequent Challenges – Determining who are the big offenders – Archiving and tracking all activity, particularly given auction turnover – Corresponding effectively with eBay to remove auctions
  • 16. CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 16 Counterfeit Goods - In the NewsCounterfeit Goods - In the News Tiffany and eBay Clash Over Sales of Fake Goods New York Law Journal, August 19, 2004 (Image from The Economist,,July 1, 2004) “Tiffany also bought 186 pieces of jewelry described as original Tiffany goods a few months ago and found that only 5 percent of the items were genuine, the complaint said.” Diesels Are the New Heroin Wired News, June 19, 2006 “The traveler in Thailand is no longer sticking baggies of smack up his crack and praying for a short-fingered customs official; he's hawking designer knockoffs on auction sites like eBay.” What Happens When an eBay Steal Is a Fake We Sought Redress From Site And Sellers After Our Fendi, Gucci, Tiffany Proved Faux By LORETTA CHAO June 29, 2006; Page D1
  • 17. CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 17 Addressing Counterfeit Online ThreatsAddressing Counterfeit Online Threats • eBay offers the Verified Rights Owner (“VeRO”) program – Permits manufacturers to report potentially infringing auctions to eBay and receive seller information – Most manufacturers are satisfied with eBay’s actions following requests made through the VeRO system – However, manufactures are less satisfied with their ability to identify sellers of counterfeit goods through eBay, as VeRO offers: • No sophisticated search process with alarms and/or priorities • No access to older auctions
  • 18. CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 18 Addressing Counterfeit Online ThreatsAddressing Counterfeit Online Threats • Time-savings automated search tool – Continuous monitoring of eBay for potentially infringing auctions – Automated e-mail preparation to VeRO – Auction tracking by sellers
  • 19. CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 19 Typical Online Channel Management Challenge Typical Online Channel Management Challenge • Rampant Unauthorized Usage of… – Logos – Trademarks – Product offerings
  • 20. CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 20 Addressing Online Channel ManagementAddressing Online Channel Management • Authorized or Subsidiary Websites – Use of existing channels for communications • Unauthorized Websites – Unless an owned trademark (or variant) is used in the domain name of the infringing website, a UDRP process is not possible – Therefore, one must positively identify the owner of the website • Owner(s) of websites that perform actual commerce activities are often among the easiest to positively identify – Once ownership has been established, more standard methods of enforcement can be used: • Cease and Desist Letters • Litigation
  • 21. CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 21 Online Infringements Impact BusinessOnline Infringements Impact Business Loss of confidence in product Loss of business Loss of brand value Higher pay-per-click costs
  • 22. CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 22 Protecting Online Corporate IdentityProtecting Online Corporate Identity Cutting-edge ApproachTraditional Approach • Web Search – Manual, inconsistent effort – Insufficient in policing worldwide use of trademarks and sales channels • Sophisticated Online Monitoring Tool – 24x7 automated monitoring protection and enforcement activity • Web crawling • Targeted data retrieval • Sophisticated analysis • Real-time information
  • 23. CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 23 Domain Name Records ManagementDomain Name Records Management • Registration, Management, & Enforcement Services – Custom Projects and Expert Consulting • Reduce time, costs and risks associated with managing domain name records – Audit, validate, consolidate, modify, register, manage and protect domain name records across multiple corporate cost centers, domain registrars and registries – Protect, promote and manage your company’s key names in top country-specific Internet markets • Personal service and web tools – Dedicated and experienced Client Service Managers – Iron Mountain Connect™ Domain Name Center saves time and effort, providing single point of access to portfolio • Accredited by ICANN, EURid and country- specific registries • 41,000+ domain names under management
  • 24. CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 24 Online Brand Enforcement ServicesOnline Brand Enforcement Services • Maintain Brand Purity – Uncover unauthorized use of your brands and trademarks • Avoid Loss of Revenues – Control unauthorized or pirated commerce • Take Action – Watch for infringing registrations and stop them through Cease & Desist letters and/or Dispute Resolution options
  • 25. CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 25 Thank You!Thank You! http://www.avestar-ip.com efenster@avestar-ip.com http://www.avestar-ip.com efenster@avestar-ip.com www.ironmountain.com david.strouse@ironmountain.com To request a Live Demo: 323-269-0200 x101 www.ironmountain.com david.strouse@ironmountain.com To request a Live Demo: 323-269-0200 x101
  • 26. CONFIDENTIAL AND PROPRIETARY INFORMATION OF IRON MOUNTAIN 26 Questions & AnswersQuestions & Answers • Iron Mountain’s Services – Online Intellectual Property Protection Services: • http://www.ironmountain.com/ipm/dns/enforce.asp – Domain Names Management Services: • http://www.ironmountain.com/ipm/dns/manage.asp – Domain Names Registration Services: • http://www.ironmountain.com/ipm/dns/register.asp – Domain Names Implementation Services: • http://www.ironmountain.com/ipm/dns/implement.asp • All participants will receive a copy of this presentation via email • For more information: david.strouse@ironmountain.com • Thank you!