Can One's Trademark Be Another's Keyword? Recent Case Developments and the Future of Keyword Advertising
19 January 2010
This installment of our Internet Generation Web conference series focused on the current state of the law with respect to whether keyword advertising constitutes actionable “use” under the Lanham Act, whether it gives rise to trademark infringement or other claims, and what protections are, or should, be available to search engines and advertisers.
Guest Speaker: R. Holland Campbell, Counsel, ESPN, INC.
Ms. Campbell joined Foley attorneys Jonathan Moskin and Craig S. Fochler for a discussion of the following:
- Some of the key cases in this area, including relevant statutory, precedential, and public policy issues
- Whether, under principles of fair use, safe harbors or other protections exist for search engines or advertisers who offer and use keyword advertising
- Practical suggestions for both brand owners and others who use keyword advertising
People
Related Insights
27 May 2025
Events
The RIF Roadmap: Tools and Tactics for a Smooth and Compliant Transition
Join us for an insightful discussion on proactive workforce planning in today's dynamic economic and regulatory landscape.
16 May 2025
Manufacturing Industry Advisor
Reese’s Law: The Evolving Regulatory and Enforcement Landscape for Consumer Products Containing Button Cell or Coin Batteries
Over the past year, manufacturers, importers, distributors, and retailers of consumer products containing button cell and coin batteries (or products intended to contain them) have continued to adapt to the requirements of Reese’s Law and the Consumer Product Safety Commission’s corresponding enforcement efforts.
29 May 2025
Events
May 2025 Midwest Cyber Security Alliance Meeting | What Happens After a Breach: Practical Tips for the Notification Process
Join us on Thursday, May 29, 2025, at the next Midwest Cyber Security Alliance Meeting. Brandon Hollinder, Esq., and Adam Botter from Epiq will provide practical tips and insights on organizing the data mining and subsequent notification process after a cybersecurity breach.