Search for Free 150,000+ Essays

Find more results for this search now!
CLICK the BUTTON to the RIGHT!

Need a Brand New Custom Essay Now?  click here

Cyber Squatting

Cyber-Squatting

Cyber-squatting is a derogatory term and means registering, selling or using a domain name with the intent of profiting from the goodwill of someone else's trademark. It generally refers to the practice of buying up domain names that use the names of existing businesses with the intent to sell the names for a profit to those businesses.

Cyber-squatters usually ask for prices far greater than that at which they purchased it. Some cyber-squatters put up derogatory remarks about the person or company the domain is meant to represent in an effort to encourage the subject to buy the domain from them.

The World Intellectual Property Organisation (WIPO) saw a 20 per cent increase in the number of cyber squatting (abusive registration of trademarks as domain names) cases filed in 2005 as compared to 2004. In 2005, a total of 1,456 cyber squatting cases were filed with WIPO's Arbitration and Mediation Centre, according to a WIPO release.

Many cyber-squatters also register many variants of a popular trademarked name, a practice known as typo squatting.

The practice that's come to be known as cyber-squatting originated at a time when most businesses were not savvy about the commercial opportunities on the Internet. Some entrepreneurial souls registered the names of well-known companies as domain names, with the intent of selling the names back to the companies when they finally woke up. Panasonic, Fry's Electronics, Hertz and Avon were among the "victims" of cyber-squatters. Opportunities for cyber-squatters are rapidly diminishing, because most businesses now know that nailing down domain names is a high priority.

Common examples of cyber squatting include the reservation of sites that include the names of celebrities or companies. This guarantees the cyber-squatters a profit whenever a celebrity or company decides to set up an official Web site and needs that domain name.

A 1999 law and an international arbitration procedure crack down on people looking to profit from other people's trademarks.

If a person owns a trademark and find that someone is holding it hostage as a domain name until the owner of the trademark pays a large sum for it, the owner of the trademark is the victim of cyber-squatting.

Amitabh Singhal, Acting CEO of National Internet Exchange of India (NIXI), says that all domain names, except those which have been reserved for use by the Government, constitutional bodies and the registry, are open for registration on a first-come-first-served basis. This is a standard global practice.

The...

Sign In Now to Read Entire Essay

Not a Member?   Create Your FREE Account »

Comments / Reviews

read full essay >>

Already a Member?   Login Now >

This essay and THOUSANDS of
other essays are FREE at eCheat.

Uploaded by:  

Date:  

Category:   Law

Length:   18 pages (4,054 words)

Views:   10673

Report this Essay Save Essay
Professionally written essays on this topic:

Cyber Squatting

  • Law Enforcement and Cyber Crime

    cyber crimes are actually reported (Joint Council on Information Age Crime, 2004). Consider the impact of one incident such as the...

  • Conflict Progresses into Cyber Mediation

    and professional secrets online. As for the question of security, everyones legal, medical, banking, and personal information is a...

  • Data Security and Cyber Crime

    and copying the auction data from the web site. The judge; Ronald M. Whyte, granted the company the ability to temporarily ban the...

  • Strategies for Cyber Security

    must do their part to instill and spread an organizational culture devoted to cyber security wherein all employees do their part t...

  • Cyberterrorism

    government of Estonia moved a Soviet war memorial from the center of its capital city, Tallinn, to a military cemetery on the outs...

  • Cyber Crime Task Forces - The Reality

    common response was the development of a task force. For instance, the sudden influx of narcotics into an area and a rise in narco...

  • CHS Cybersecurity

    This report discusses the need for the Department of Homeland Security to refocus its resources to include fighting cyber threats....

  • Cyber Attacks in Healthcare

    Few people realize how vulnerable healthcare operations systems, from electronic health records to connected medical devices, are ...

  • Cyber-terrorism vs. Terrorism

    This research paper pertains to traditional terrorism vs. cyber-terrorism and discusses similarities and differences. The writer ...

  • CASE STUDY FOR VL BANK

    Analyzes the legal and security factors occurring around the cyber attack against VL Bank. There are 3 sources listed in the bibli...

View more professionally written essays on this topic »