Download Full Issue in PDF - Academy Publisher
Download Full Issue in PDF - Academy Publisher
Download Full Issue in PDF - Academy Publisher
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
JOURNAL OF COMPUTERS, VOL. 8, NO. 6, JUNE 2013 1557<br />
issue of secondary liability to the trademark <strong>in</strong>fr<strong>in</strong>gement,<br />
based upon the <strong>in</strong>terpretation of the Supreme Court <strong>in</strong><br />
Inwood case [45], the liability lies when “a manufacturer<br />
or distributor <strong>in</strong>tentionally <strong>in</strong>duces another to <strong>in</strong>fr<strong>in</strong>ge a<br />
trademark, or if it cont<strong>in</strong>ues to supply its product to one<br />
whom it knows or has reason to know is engag<strong>in</strong>g <strong>in</strong><br />
trademark <strong>in</strong>fr<strong>in</strong>gement.” eBay def<strong>in</strong>itely did not <strong>in</strong>duce<br />
the trademark <strong>in</strong>fr<strong>in</strong>gement <strong>in</strong> this case, that left the<br />
question to whether eBay was contributory liable to the<br />
trademark <strong>in</strong>fr<strong>in</strong>gement. The court <strong>in</strong> this case discarded<br />
the “reasonable anticipation standard” as the mean<strong>in</strong>g of<br />
“knows or has reason to know”, <strong>in</strong>stead the knowledge<br />
requirement is “a contextual and fact-specific test” judged<br />
by all the surround<strong>in</strong>g circumstances, for example the<br />
specific <strong>in</strong>cident of trademark <strong>in</strong>fr<strong>in</strong>gement, which is a<br />
higher standard than “reasonable anticipation standard”.<br />
In this case, the court concluded that Tiffany could not<br />
satisfy with the high criteria for “knows or has reason to<br />
know” requirement, especially eBay has abovementioned<br />
anti-fraud measurement <strong>in</strong> force, and eBay<br />
was not liable for contributory trademark <strong>in</strong>fr<strong>in</strong>gement.<br />
The Tiffany case demonstrates two k<strong>in</strong>ds of policy<br />
attitude. One observation is that the court <strong>in</strong> the United<br />
States is reluctant to impute the liability to the <strong>in</strong>ternet<br />
service provider probably due to the concern of free flow<br />
of <strong>in</strong>formation. And the other observation is the court<br />
would enhance the mental requirement for the secondary<br />
liability <strong>in</strong>fr<strong>in</strong>ger to some extent, at least near to the<br />
requirement of “willful bl<strong>in</strong>dness” <strong>in</strong>stead of reasonable<br />
anticipation. From the description of shift<strong>in</strong>g attitude to<br />
the secondary liability of the <strong>in</strong>ternet service provider,<br />
this judicial attitude also put the preventive measure to<br />
the protection of <strong>in</strong>formation privacy with<strong>in</strong> Internet <strong>in</strong><br />
the even more important position for such <strong>in</strong>frastructure.<br />
D. The Def<strong>in</strong>ition of Information Privacy and the<br />
Suggested Model Build<strong>in</strong>g Up the Information Privacy<br />
Protection for Intelligent Vehicle Telematics<br />
After understand<strong>in</strong>g the general idea of <strong>in</strong>formation<br />
privacy and the tendency of protect<strong>in</strong>g such legal <strong>in</strong>terest<br />
<strong>in</strong> the United States, how to build the protection<br />
<strong>in</strong>frastructure of <strong>in</strong>formation privacy and strike the<br />
balance with other k<strong>in</strong>ds of conflict<strong>in</strong>g legal <strong>in</strong>terest for<br />
Intelligent Vehicle Telematics operation br<strong>in</strong>gs the<br />
discussion to the next level. With regard to the issue of<br />
protection of <strong>in</strong>formation privacy <strong>in</strong> Intelligent Vehicle<br />
Telematics operation, this article would attempt to divide<br />
it <strong>in</strong>to two different aspects: non-legal –b<strong>in</strong>d<strong>in</strong>g self<br />
regulation and legal measurements for preventive or<br />
remedial purpose to the system operator. First, to the part<br />
of self regulation with<strong>in</strong> the system operator, the<br />
proposed estimation <strong>in</strong> this article is that the self<br />
regulation wouldn’t be able to play any significant role <strong>in</strong><br />
striv<strong>in</strong>g to preserve the legal <strong>in</strong>terest of <strong>in</strong>formation<br />
privacy before the competition <strong>in</strong> market has reached<br />
sufficient status. That is not to say the idea of selfmanagement<br />
for the <strong>in</strong>formation privacy protection is not<br />
important. The statement is just to express the th<strong>in</strong>k<strong>in</strong>g<br />
that to establish the management system for the<br />
protection of <strong>in</strong>formation privacy is not easy compared<br />
with the <strong>in</strong>tellectual property management system<br />
because the concept of <strong>in</strong>formation privacy is further<br />
develop<strong>in</strong>g. So, it is argued <strong>in</strong> this article, <strong>in</strong> this stage,<br />
there is no substantial mean<strong>in</strong>g to emphasize the<br />
mechanism of self regulation. As to the preventive or<br />
remedial legal measurements for the protection of<br />
<strong>in</strong>formation privacy related to the system provider for<br />
Intelligent Vehicle Telematics, the bottom l<strong>in</strong>e is<br />
described as the old say<strong>in</strong>g: “One stitch <strong>in</strong> time safes<br />
n<strong>in</strong>e.”. That leads to the <strong>in</strong>dication that the preventive<br />
measurements of <strong>in</strong>formed consent and technology<br />
prevention are much better than the remedial<br />
measurements (the obligation of notification, civil<br />
liability or even crim<strong>in</strong>al punishment). To sum up the<br />
<strong>in</strong>frastructure for the protection of <strong>in</strong>formation privacy <strong>in</strong><br />
Intelligent Vehicle Telematics, it is fairly to say <strong>in</strong><br />
protect<strong>in</strong>g <strong>in</strong>formation privacy <strong>in</strong> operat<strong>in</strong>g Intelligent<br />
Vehicle Telematics, there is a hierarchy to construct the<br />
protection, from the legal to the non-legal <strong>in</strong> general<br />
concept, from the preventive to the remedial<br />
measurement <strong>in</strong> real practice.<br />
As to the def<strong>in</strong>ition of <strong>in</strong>formation privacy, this really<br />
means the balance of <strong>in</strong>terest. In compar<strong>in</strong>g the different<br />
<strong>in</strong>terests to confirm the legitimacy of <strong>in</strong>formation privacy<br />
<strong>in</strong> the situation of Intelligent Vehicle Teleatics, the safety<br />
concern will def<strong>in</strong>itely get its priority to the <strong>in</strong>formation<br />
privacy concern. To other comparisons between the<br />
protection of <strong>in</strong>formation privacy and proprietary<br />
<strong>in</strong>terests of the system operator, the odds are that the<br />
<strong>in</strong>formation privacy will have a good chance to fight <strong>in</strong><br />
the battlefield of balanc<strong>in</strong>g <strong>in</strong>terests. One problematic<br />
situation of protect<strong>in</strong>g <strong>in</strong>formation privacy with<strong>in</strong> the<br />
environment of <strong>in</strong>telligent vehicle telematics is its<br />
possible <strong>in</strong>teraction with the concept of protect<strong>in</strong>g critical<br />
<strong>in</strong>frastructure. General speak<strong>in</strong>g, under the idea of<br />
protect<strong>in</strong>g critical <strong>in</strong>frastructure, the Bureau of Homeland<br />
Security can acquire and reasonably use the <strong>in</strong>formation<br />
related to the critical <strong>in</strong>frastructure processed by the<br />
private sector or government agencies for the purpose of<br />
anti-terrorism, which <strong>in</strong>formation might be under the<br />
protection of <strong>in</strong>formation privacy [46]. Even under the<br />
balance of <strong>in</strong>terest approach, the legal <strong>in</strong>terest of<br />
<strong>in</strong>formation privacy will be no doubt succumbed to the<br />
<strong>in</strong>terest of national security if these two k<strong>in</strong>ds of <strong>in</strong>terest<br />
directly conflict with each other, the question is whether<br />
the environment of <strong>in</strong>telligent vehicle telematics would<br />
be treated as the critical <strong>in</strong>frastructure and to what extent<br />
of us<strong>in</strong>g the <strong>in</strong>formation conta<strong>in</strong>ed with<strong>in</strong> is reasonable<br />
[47]. The potential impact of critical <strong>in</strong>frastructure<br />
protection to <strong>in</strong>formation privacy protection is unknown<br />
and needs to wait and see. As the protection of<br />
<strong>in</strong>formation privacy is gett<strong>in</strong>g more and more importance<br />
<strong>in</strong> the hierarchy of different k<strong>in</strong>ds of legal <strong>in</strong>terest, the<br />
national security rema<strong>in</strong>s the strongest opposition. What<br />
is the l<strong>in</strong>e need to be drawn between the protection of<br />
national security and <strong>in</strong>formation privacy, especially <strong>in</strong><br />
talk<strong>in</strong>g about the <strong>in</strong>telligent vehicle telematics<br />
environment, cannot be answered until the day comes.<br />
V. CONCLUSION<br />
© 2013 ACADEMY PUBLISHER