Wednesday, August 6, 2008
Saturday, July 5, 2008
E. & J. Gallo Winery v Lion Nathan Australia Pty Limited [2008] FCA 934
Here is a good little case on trade mark infringement - E. & J. Gallo Winery v Lion Nathan Australia Pty Limited [2008] FCA 934 which outlines the approach one should adopt when determining if there is a trade mark infringement pursuant to the Trade Marks Act 1995.
To establish a trade mark infringement, one must establish that s120 Trade Marks Act 1995 has been satisfied. Section 120(2) provides as follows:
When is a registered trade mark infringed?
…
A person infringes a registered trade mark if the person uses as a trade mark a sign that is substantially identical with, or deceptively similar to, the trade mark in relation to:
(a) goods of the same description as that of goods (registered goods) in respect of which the trade mark is registered; or
(b) services that are closely related to registered goods; or
(c) services of the same description as that of services (registered services) in respect of which the trade mark is registered; or
(d) goods that are closely related to registered services.
However, the person is not taken to have infringed the trade mark if the person establishes that using the sign as the person did is not likely to deceive or cause confusion.
In determining whether s120 has been breached, one should note that a trade mark has the following meaning,
A “trade mark” is defined by s 17 of the Trade Marks Act 1995 (Cth) as being:
… a sign used, or intended to be used, to distinguish goods or services dealt with or provided in the course of trade by a person from goods or services so dealt with or provided by any other person.
The function of a trade mark, it has repeatedly been said, is “to give an indication to the purchaser or possible purchaser as to the manufacture or quality of the goods — to give an indication to his eye of the trade source from which the goods come, or the trade hands through which they pass on their way to the market”: In re Powell’s Trade Mark [1893] 2 Ch 388 at 403–4 per Bowen LJ. Use “as a trade mark” in s 120(1) is use of the mark as a “badge of origin” in the sense that it indicates a connection in the course of trade between goods and the person who applies the mark to the goods: Coca Cola Co v All-Fect Distributors Ltd [1999] FCA 1721 at [19], 96 FCR 107 at 115 per Black CJ, Sundberg and Finkelstein JJ; Global Brand Marketing Inc v YD Pty Ltd [2008] FCA 605 at [45] per Sundberg J. See also: Shell Co of Australia Ltd v Esso Standard Oil (Australia) Ltd (1964) 109 CLR 407 at 424–5 per Kitto J; Rothnie W, Gray Goods Billow onto the Open Main: Section 123 of the Trade Marks Act 1995 (1996) 7 AIPJ 87 at 89–90.
This is not an exhaustive meaning but a list of indicia.
To be able to fully determine whether s120 applies, the following questions would therefore need to be answered,
(i) what is the "sign" being used as a trade mark by the infringer?
(ii) is the "sign" being used by the infringer "substantially identical with" the trade mark of registered trade mark owner?
(iii) is the "sign" being used by infringer "deceptively similar to" the trade mark of registered trade mark owner?
(iv) are the products and or services of the infringer "goods of the same description" as the products and or services of registered trade mark owner?
(v) is the manner in which infringer uses its sign "not likely to deceive or cause confusion"?
(vi) has there been a "non-use" of the trade mark? The resolution of this question involves a consideration as to:
(a) whether there were sales of the products and or services displaying the trademark during the non-use period;
(b) whether the products and or services displaying the trademark were offered for sale during the non-use period;
(c) if the products and or services displaying the trademark were sold or offered for sale during the non-use period, whether there was a use of the trade mark by any authorised user;
(d) whether there were negotiations between registered trade mark owner and other persons durign the non-use period constituted a use of the trade mark;
(e) whether there was an "obstacle" (for example an objection lodged with IP Australia with respect to the registration of the registered trade mark) to the use of the registered trade mark owner trade mark;
(f) even if there was a use, which mark was in fact being used; and
(g) whether any use was a use "in good faith".
(vii) if there has been a "non-use" of the trade mark by registered trade mark owner, should the discretion conferred by s 101(3) of the 1995 Act be exercised so as to allow its trade mark to remain on the Register?
Answering these questions will point you in the right direction when trying to determine if there has been a trade mark infringement.
Friday, July 4, 2008
GSK Australia Pty Ltd v Richie & Anors [2008] VSC 164
An recent case relating to confidential information and its use by former employees is GSK Australia Pty Ltd v Richie & Anors [2008] VSC 164 (“GSK v Ritchie”) which was heard before Harper J. This case deals with the issues as to what a trade secret means, how to reconcile an employer’s right to protect their trade secrets and an individual’s right to use knowledge they have developed during their former employment and the necessity of precise pleadings in the context of confidential information. These issues will be discussed hereafter.
The first main issue raised by Harper J’s judgement is definition of a ‘trade secret’. Despite that there is no settled definition as to what a trade secret means, which Harper J acknowledge, Harper J stated the following with respect to what a trade secret means, citing Printers & Finishers Ltd v Holloway (No. 2) [1965] RPC 239,
“For present purposes, I take a trade secret to be information which “can fairly be regarded as a separate part of an employee’s stock of knowledge which a man of ordinary honesty and intelligence would recognise to be the property of his old employer, and not his own to do as he likes with”: Printers & Finishers Ltd v Holloway (No. 2) [1965] RPC 239 at 255 per Lord Cross. For the purposes of this case, I therefore take a trade secret to be an item of confidential information, learnt during employment, the confidentiality of which, as an employee of ordinary honesty and intelligence would acknowledge, must be maintained even after that employment has come to an end. In other words, a trade secret has an inherent quality that takes it above and beyond more general knowledge, albeit that the general knowledge may to a lay person be very specialised. Whether information amounts to a trade secret is a question of fact, to be determined in the particular circumstances. A trade secret is to be distinguished from knowledge of no special significance such as that which an employee with familiarity with the relevant art might acquire (without employing any more skill than that of an ordinary practitioner of the art) simply by building upon the information necessarily made available to him in the ordinary course of his employment”
It appears that Harper J views trade secrets to include information of a “quality that takes it above and beyond more general knowledge, albeit that the general knowledge may to a lay person be very specialised.” The biggest problem with such a definition is that it is limited in scope by the second category of confidential information as defined in the Faccenda Chicken case as discussed by Harper J.
The Faccenda Chicken case as cited in GSK v Ritchie by Harper J in fact limits the scope of what a trade secret is. At paragraph 250 of GSK v Ritchie, Harper J notes the second category of confidential information as,
“Goulding J in the Faccenda Chicken case: information which, while in the possession of the employee, must be treated as confidential because from its character it is obviously so; but which, once learnt, remains in the employee’s head, and becomes part of his or her inherent body of skill and knowledge, upon which - as an ex-employee - he or she cannot help but call when performing a task the successful accomplishment of which necessarily invokes its exercise”
Does Faccenda Chicken merely limit the scope of the trade secret definition as proposed by Harper J to current employees? If Faccenda Chicken were to apply then this would result in trade secrets losing their confidential status once an employee ends their employment in situations where that trade secret forms part of the “inherent body of skill and knowledge” which the ex-employee cannot help but call when performing a task which “necessarily invokes its exercise.” This means that scope of protection provided to trade secrets is quite limited because of the public interest policy expounded in Faccenda Chicken. Furthermore, the protection provided by trade secrets would also be limited due to the heavy burden imposed on those seeking protection.
The heavy burden imposed on those seeking protection is that their pleadings must be so precise that they identify the specific confidential information or trade secret that has misused by the confident. If pleadings were at all lax and accepted by the court then this would empower employers to create an ‘industrial slavery’. Such slavery would be enforced by means of injunctions preventing the confidents using, not only the confidential information, but other information that may be closely related to the confidential information. However, the courts impose heavy burdens on such pleadings and Harper J, at paragraph 38, respectfully adopted the words of Laddie J in Ocular Sciences v Aspect Vision Care Ltd when emphasising the heavy burden imposed,
“The requirement of particularity may impose a heavy burden on the plaintiff. In a case where the plaintiff has a large quantity of confidential information and much of it has been taken by the defendant, the obligation to identify all of it might involve a great deal of work and time. … The normal approach of the court is that if a plaintiff wishes to seek relief against a defendant for misuse of confidential information it is his duty to ensure that the defendant knows what information is in issue. This is not only for the reasons set out by Edmund Davies LJ in Zink (John) & Co Ltd v Lloyds Bank Ltd [1973] RPC 717 but for at least two other reasons. First, the plaintiff usually seeks an injunction to restrain the defendant from using its confidential information. Unless the confidential information is properly identified, an injunction in such terms is of uncertain scope and may be difficult to enforce … Secondly, the defendant must know what he has to meet. He may wish to show that the items and information relied on by the plaintiff are matters of public knowledge. His ability to defend himself will be compromised if the plaintiff can rely on matters of which no proper warning was given. It is for all these reasons that failure to give proper particulars may be a particular damaging abuse of process.
These principles do not apply only to the question of the content of the pleadings. Just as it may be an abuse of process to fail properly to identify the information on which the plaintiff relies, it can be an abuse to give proper particulars but of information which is not, in fact, confidential. A claim based even in part on wide and unsupportable claims of confidentiality can be used as an instrument of oppression or harassment against a defendant. It can be used to destroy an ex-employee’s ability to obtain employment or a competitor’s ability to compete. The wider the claims, the longer and more expensive the litigation. … A competitor or ex-employee is entitled to copy non-confidential material, but if the plaintiff mixes a large amount of technology together, some of which has been copied by the defendant, there is a risk that the court will jump to the conclusion that some of what was copied must have been confidential.”
GSK v Ritchie demonstrates that an employer’s right to protect trade secrets and confidential information is limited especially when an ex-employee will automatically use such information in exercise their skills. The protection is also limited by the heavy burden imposed on the courts which require pleadings to precisely identify the information that has been misused. These considerations should be taken on board when parties are contemplating confidentiality agreements.