Quia Timet: First Line of Defense Against Domain Name Hijacking
by
Carl S. Wosmek
CSWosmek@aol.com
in satisfaction of the requirements for the
Cyberlaw Seminar at the University of Iowa College of Law
Spring Semester, 1999

Table of Contents

I. Introduction. . . . . . . . . .1

 A. Domain Name Hijacking Scenario. . . . .1

 B. Problem Background. . . . . . . .2

 C. Domain Names. . . . . . . . .4

 D. Cybersquatting. . . . . . . .7

II. Quia Timet Relief. . . . . . . . .9

 A. British Telecom. And Others v. One In A
  Million And Others. . . . . . . .9

 B. Quia Timet Relief in the United States. . . .12

  (1) Quia Timet in Validating Marital Status. .12

  (2) Quia Timet in Real Property Dispute. . .14

  (3) Quia Timet in Personal Property Dispute. .15

  (4) Quia Timet in Nuisance Action. . . .19

  (5) Quia Timet in Surety Contract Dispute. . .20

 C. Reasons for Quia Timet Obscurity. . . . .25

 D. One In A Million Approach to Quia Timet. . .26

 E. Possible United States Judicial Approaches
  To One In A Million Factual Situation. . . .27

 F. Hijacking Is An Extraordinary Circumstance
  Warranting the Intrusion of Equity. . . .28

 G. Danger of Misapplication of Quia Timet
  By Courts. . . . . . . . .32

 H. Applying Traditional Quia Timet Requirements
  to Hijacking Scenario. . . . . . .35

III. Substantive Legal Protection Against Hijackers
 in the United States. . . . . . . .38

 A. Trademark and Servicemark Infringement
  Under the Lanham Act. . . . . . .39

 B. Trademark Anti-Dilution Act. . . . . .40

 C. Common Law Service Mark. . . . . . .41

 D. Other Protections. . . . . . . .42

IV. Conclusion: When it Happens To You. . . . .43   



I. Introduction

  A. Domain Name Hijacking Scenario

Imagine yourself as an attorney for Dew, Good & Wright.
Your biggest client is Goodtillnow Antacid.  Goodtillnow is a large corporation that has been in business many years and is a household name.  Last month, the younger executives convinced the Board of Directors to launch a large scale marketing campaign focusing on a contemplated high-tech website allowing customers greater access to Allwellangoodtillnow products in emergency situations.  The campaign is scheduled to start next month.
Last week, Goodtillnow's CEO, Len Bremer, received a letter from Showmedamoney Associates.  The letter said that Showmedamoney had registered the name Goodtillnow.com with NSI (the national registry for .com domain names).  Showmedamoney is a business comprised of two recent university graduates who have a telephone and a computer in the basement of one of their parents' home.  Showmedamoney said in its letter that it will give Goodtillnow the domain name registration for $20,000.00.  Otherwise, Showmedamoney will have to spend the next year figuring out how to best use the registration itself.  Len Bremer is irate.  He just called you and said that he refuses to write a check to anyone who call themselves Showmedamoney, and he wants the name Goodtillnow.com by next month when the advertising campaign is scheduled to begin.  After all, Goodtillnow paid Dew, Good & Wright thousands of dollars over the years to obtain patent and trademark protection.
 You told Len Bremer that you would review the law and get back to him.  After satisfying yourself that a court will most likely find jurisdiction over the dispute, you discover that the court will not grant injunctive relief - or any relief at this point because there has been no legal harm.  All of the precedent you can find on the subject states that mere registration of a domain name does not constitute legal harm for which relief will be granted.  Can it be true that the law will allow Showmedamoney to benefit from trademark and related common law not created with the Internet in mind?  The answer is no.  This paper sets forth one way to seek equitable relief in the form of Quia Timet.  This should allow Goodtillnow to obtain relief prior to a finding of legal harm, as is typically required in the preliminary injunction context.

B. Problem Background

 The use of the Internet has increased significantly over the past few years.  This growth was fueled by both expanded personal and commercial use.  The increased use of the Internet has created a corresponding increase in the need for companies to have a presence on the Internet to remain competitive.  Maintaining a web site allows companies to advertise, conduct commercial transactions and exchange valuable information with current or potential customers.  Some enterprising individuals have found a way to translate the value of an Internet presence for companies into cash for themselves.  This practice is known by terms such as: "cybersquatting", "hijacking", "pirating" and most likely other creative names by businesspeople who encounter it.
The typical scenario involves someone registering a domain name with Network Solutions, Inc. ("NSI") that contains the name of a well-known business.  The registration fee is modest, and NSI grants the domain names on a first-come first-served basis.  The registrant does have to make certain representations regarding the legality of using the domain name; however, affected third party businesses are forced to pursue remedies that take valuable time.  This valuable time combined with the legal costs of pursuing such remedies translate into bargaining chips for the enterprising registrants who are happy to part with their registration for a cash payment.
 Affected businesses view this practice as extortion.  Undoubtedly, the enterprising individuals who engage in this practice view it as using the registration system to their advantage.  The purpose of this paper is to explore quia timet as a way in which to use the legal system to attack the practice of hijacking as quickly and inexpensively as possible.
Quia timet relief is unique in the fact that it is judicial relief based on the threat of irreparable harm.  As such, quia timet relief is available at a very early stage.  A hijacker's bargaining capacity relies heavily on the elements of time and expense in companies seeking a remedy. Depending upon the sophistication and financial position of the hijacker, forcing an injunction proceeding at an early stage may even persuade the hijacker to forego defending the proceeding.
The remainder of the introduction will provide an overview of domain names, the NSI registration system, and the various types of cybersquatting that currently exist.  The next section of the paper will explore the use of quia timet relief in a variety of different contexts with an eye toward discerning whether courts will or should expand quia timet to hijacking cases.  The third section of the paper will discuss the substantive law which has been used to defend against hijacking practices.  The fourth and final section of the paper will provide a procedure for companies to follow when they fall victim to a hijacker.

 C. Domain Names

 Each web page on the Internet has its own web site.  Technically, each web site has its own Internet Protocol ("IP") number.  For the purpose of convenience to web users, each web site also has its own "domain name".  A "domain name" is a plain language description of a name or other alphanumerical sequence.  A domain name system translates domain names into IP numbers that serve as routing addresses.1  Domain names encompass two different levels.  Top level domains are the end designations such as .gov for government institutions, .edu for educational institutions, .org for non-profit organizations, .net for networks, and .com for commercial which is the catchall designation for business and personal sites.  The secondary domain is the beginning portion of a "domain name" which is the unique name or alphanumerical sequence that identifies the site.  For example, the "domain name" mcdonalds.com is broken down into the top-level domain (.com) and the secondary domain (mcdonalds).2
 Pursuant to the manner in which the Internet was created, the United States Government has retained supervisory authority over the assignment of IP Numbers and Domain Name assignments.  For all domain names with the .com designation, the United States government designated the authority for registering/assigning domain names to Network Solutions, Inc.  Registering a domain name with NSI is a relatively simple process.  All that a prospective registrant needs to do is pay a modest registration fee (in 1997 it was $100.00), and
[r]epresent and warrant as an express condition of registering a domain name that (1) the applicant's statements are true and the applicant has the right to use the requested domain name; (2) the 'use or registration of the domain name ... does not interfere with or infringe the rights of any third party in any jurisdiction with respect to trademark, service mark, trade name, company name or any other intellectual property right'; and (3) the applicant is not seeking to use the domain name for any unlawful purpose, including unfair competition.3

Of course problems with hijacking arise when registrants make the above representations without following the spirit, if not the letter of such representations.
 NSI was given the authority to assign the popular .com domain names in 1992 by the U.S. government.  That agreement has come to an end in so far as the U.S. has decided to open up the registration process to other privately run corporations which will compete with NSI.  On January 30, 1998 the Department of Commerce issued for comment "A Proposal to Improve the Technical Management of Internet Names and Addresses". This document is commonly referred to as the "Green Paper".4  The Green Paper recognized six current elements of the domain name registration system which evidenced a need for change:
[1] There is widespread dissatisfaction about the absence of competition in domain name registration. [2] Conflicts between trademark holders and domain name holders are becoming more common.  Mechanisms for resolving these conflicts are expensive and cumbersome. [3] Many commercial interests, staking their future on the successful growth of the Internet, are calling for a more formal and robust management structure. [4] An increasing percentage of Internet users reside outside of the U.S., and those stakeholders want to participate in Internet coordination. [5] As Internet names increasingly have commercial value, the decision to add new top-level domains cannot be made on an ad hoc basis by entities or individuals that are not formally accountable to the Internet community. [6] As the Internet becomes commercial, it becomes less appropriate for U.S. research agencies to direct and fund these functions.5

The Green Paper raised further concerns about unlawful use of company names stemming from the fact that NSI registrants obtain access to domain name addresses prior to paying the registration charge.  NSI also does not keep records of individuals that register domain names.  This leads to hijackers having fast access to companies' domain names, and to companies having a difficult time contacting the hijackers.
 The Green Paper discussed ways in which to provide increased formalism and legitimacy to the domain name registration system.  Details of the identified principles will largely depend on decisions made by proposed advisory panels or councils comprised of various stakeholder groups with an interest in the system. Private corporations that enter the new market of domain name registries will also be included.6  The two main elements of the domain name registration system that have provided the opportunity for hijacking are: (1) first-come first-served registration, and (2) the lack of initial protection of third-party trademark or service mark holders in the registration system.  These elements will likely survive this transition period.  The domain name registries will continue to be privately run, and making drastic changes to the registration process to counter hijacking is extremely difficult without upsetting goals of efficiency in operation and fairness to all prospective registrants.  The change in governance of the .com registration system will therefore remain vulnerable to hijacking.

 B. Cybersquatting

 There are three different ways in which registration of domain names conflicts with laws protecting businesses with trademarks or common law service marks.  The first situation occurs when someone registers a domain name that is the same or legally similar enough to a company's registered trademark or common law service mark that problems of confusion arise.  The second type of dispute arises when two different companies have the same trademarks that are either registered in different jurisdictions or are legally distinguishable types of products under trademark law.
Hijacking, which is the third way, and the focus of this paper, is where an individual registers a domain name s/he knows is a trademark or service mark that is valued by a business or other organization.  The intent of the individual is to translate the value of the domain name to the trademark or service mark holder into a cash payment for agreeing to transfer the mark to such mark holder.7
 The hijacking of a name before a company or organization registers it's trademark or service mark also arises in situations where the individual who registers the domain name doesn't seek cash payment, but rather intends to create a web site that serves to advance a personal or commercial interest that is diametrically opposed to the interests of the mark holder.  This may be done by a competing corporation advertising an alternative product, or by an individual that wants to protest the policies or ideology of the mark holder.  An example of this would be Pepsi registering Coca-Cola.com to advertise Pepsi products, or a pro-choice organization registering pro-life.com to send a pro-choice message to web users.



II. Quia Timet Relief
 
When a company discovers that someone else has registered it's trademark or service mark with NSI, the company or organization is faced with having no judicial relief initially. This is because mere registration of a domain name without further action fails to trigger applicable substantive laws protecting mark holders.
The period between registration and subsequent activities by a hijacker harms an affected company. This time period translates into a threat which affects the relative bargaining positions of the hijacker vis-à-vis the company while the company is weighing the costs and benefits of pursuing formal actions against making a cash payment to make the hijacker go away.
 
A. British Telecommunications and Others v. One In A Million and Others

 Perhaps the earliest point at which a mark holder attained judicial relief against a hijacker occurred in British Telecommunications Plc and Others v. One In A Million and Others.8  This case was tried and appealed in the United Kingdom and it allowed the Plaintiff companies to attain an injunction based on quia timet relief.  The Defendants were companies dedicated to registering famous trade names with Nominet UK (the British equivalent of NSI) prior to the name holders doing so, for the purpose of attaining cash payments from the famous name holders.  The Plaintiffs obtained injunctions against the hijackers when the only actions taken by the hijackers was the registration of the famous domain names with Nominet UK and correspondence with the Plaintiffs offering to sell the registrations.
 Quia timet literally means 'to fear or apprehend' in Latin.9  Quia Timet relief is an equitable remedy deeply entrenched in the common law of both the United Kingdom and the United States.  It gives relief to parties who face an imminent threat or danger of tortious harm for which there is no adequate later legal relief available.10  The harms identified by the plaintiffs in One In A Million and Others were the tort of passing off and trademark infringement, both under United Kingdom Law.
Under United Kingdom law, five characteristics must be present to create an action for passing off:
(1) a misrepresentation (2) made by a trader in the course of trade (3) to prospective customers of his or ultimate consumers of goods or services supplied by him, (4) which is calculated to injure the business or goodwill of another trader (in the sense that this is a reasonably foreseeable consequence) and (5) which causes actual damage or (in a quia timet action) will probably do so.11

The relevant portions of United Kingdom Trade Mark law are Section 9(1) and Section 10(3) of the Trade Marks Act 1994.
Section 9(1) states: (1) the proprietor of a registered trade mark has exclusive rights in the trade mark which are infringed by use of the trade mark in the United Kingdom without his consent.  The acts amounting to infringement, if done without the consent of the proprietor, are specified in section 10.  Section 10(3) is in these terms: (3) A person infringes a registered trade mark if he uses, in the course of trade a sign which - (a) is identical with or similar to the trade mark, and (b) is used in relation to goods or services which are not similar to those for which the trade mark is registered, where the trade mark has a reputation in the United Kingdom and the use of the sign, being without due cause, takes unfair advantage of, or is detrimental to, the distinctive character or the repute of the trade mark.12

The trial judge granted injunctive relief on the basis of quia timet under the substantive law of both passing off and trade mark infringement.  The trial judge's analysis which was approved by the appellate court was:
For a dealer in Internet domain names there are in principle only four uses to which the names can be put.  The first and most obvious is that it may be sold to the enterprise whose name or trade mark has been used, which may be prepared to pay a high price to avoid the inconvenience of there being a domain name comprising its own name or trade mark which is not under its control.  Secondly, it may be sold to a third party unconnected with the name, so that he may try to sell it to the company whose name is being used , or else for the purposes of deception.  Thirdly, it may be sold to someone with a distinct interest of his own in the name...with a view to its use by him.  Fourthly, it may be retained by the dealer unused and unsold, in which case it serves only to block the use of that name as a registered domain name by others, including those whose name or trade mark it comprises.13

In upholding this analysis by the lower court, the appeals court noted the language of the correspondence between the hijackers and the famous companies discussing sale terms of the domain name registrations.  The appeals court also discussed evidence presented to the trial court obtained by private investigators showing that the hijacking companies had engaged in similar practices in the past, including receiving cash payments by other famous companies.  Undoubtedly, the above evidence had an impact on the appellate judges in disregarding the arguments of the trial defendants that they intended merely to add the famous names to their "personal collection"14, and therefore did not present a threat of passing off or trade mark infringement to the plaintiff companies.

 B. Quia Timet Relief In The United States

Quia Timet relief has been sought in a number of different factual situations in the United States.  "Bills quia timet are in the nature of writs known at the common law as brevia anticipantia, or writs of prevention, to accomplish the ends of precautionary justice.  They are ordinarily applied to prevent wrongs or anticipated mischief, and not merely to redress them when done."15  Not surprisingly, the basic requirements for obtaining this kind of equitable relief are similar to the requirements in the United Kingdom.  Each situation in which it is successfully used generally contains three elements: (1) no actual present injury, (2) a reasonable fear of future harm, and (3) a danger of irreparable harm if the requested relief is not granted.16
  (1) Quia Timet in Validating Marital Status
In Untermann v. Untermann, 117 A.2d 599 (N.J. 1955), the plaintiff wife sought a declaratory judgment which was fashioned as quia timet relief.  The wife sought a ruling that her husband's divorce was not valid at the time of his death.  This would entitle her, and not a woman the husband married subsequent to the Mexican divorce, to a house owned (according to the plaintiff wife) by the husband and plaintiff wife as tenants by the entirety.  Neither the trial court, nor the Supreme Court of New Jersey, questioned the right to seek equitable quia timet relief.  However, under the facts of the case, both courts refused to grant the relief sought because the validity of the plaintiff wife's marriage to her deceased husband depended on the status of the plaintiff wife's marriage with her own prior husband which she tried to end.  She did that by going to Las Vegas, living there for a day, claiming domicile in Nevada, and getting a divorce decree without ever giving notice to her prior husband.
  The New Jersey Courts agreed that granting quia timet relief in equity involves a great deal of discretion by the court to determine whether granting the relief will serve the ends of justice considering the entire factual and legal context.  Because the plaintiff wife did not come to the court with "clean hands" due to her employing the same questionable legal tactics as her deceased second husband in obtaining a divorce, the courts did not feel quia timet relief was justified.  Furthermore, a determination in the case depended on facts of an earlier divorce in Nevada which precluded the New Jersey court from having all of the material facts necessary to make a reasoned judgment.
Had the plaintiff wife not entered the New Jersey court with "unclean hands", the requirements for quia timet may have been met.  At the time of seeking quia timet relief, she had no actual present harm because title to the deceased husband's estate had not yet been determined. There was a threat of future harm to the plaintiff wife's title to the house because the next wife of the deceased husband was seeking his interest in the house. In addition, there was arguably a danger of irreparable harm because title of the house being transferred to another would deprive the plaintiff wife of both use of the house as well as the value of the house for a minimum period of the time it would take to litigate the issue in the probate court and elsewhere.
  (2) Quia Timet in Real Property Dispute
In Lenett v. Lutz, 110 S.E.2d 628 (Ga. 1959), a husband and wife were divorced and the husband was directed to pay child support.  Subsequent to the divorce, the husband attained custody of the children and made all required payments to the wife. Despite this, the wife filed a false affidavit with the court issuing the divorce and received an execution order against the husband for $1,000.00.  At the time, a Georgia statute provided for quia timet relief in certain situations:
Ga. Code ( 37-1407: The proceeding quia timet is sustained in equity for the purpose of causing to be delivered up and canceled any instrument which has answered the object of its creation, or any forged or other iniquitous deed or other writing, which, though not enforced at the time, either casts a cloud over complainant's title or otherwise subjects him to future liability or present annoyance, and the cancellation of which is necessary to his perfect protection.17

In deciding that the action brought by the husband to nullify the fraudulently obtained execution fell within the parameters of the statute, the court rejected the arguments of the wife that the husband's petition failed to state a claim, and that there was an adequate remedy at law.  The fact that quia timet relief in this case was derived from statute, not common law, tends to distinguish its application in the facts of the Goodtillnow scenario.
It is important to note, however, that there was strong reason for equity to intervene in this circumstance. At the time the plaintiff husband filed a petition for quia timet relief, no legal harm had been suffered.  The wife was simply in possession of the execution order and had not taken any further steps of having the sheriff levy the property of the husband.  There was a danger of harm to the husband if and when the wife followed through with the execution order.  The husband could have filed suit later once legal harm had taken place, however, in this case it was the defendant wife who fraudulently obtained the execution order.  The only result of the wife having possession of the execution order could be harassment or legal harm.  Disallowing the trial court discretion to let equity intervene in the case would have been tantamount to letting the wife use the court to further a scheme to advance her malicious interests at the expense of her husband.
  (3) Quia Timet in Personal Property Dispute
In Newman Machine Co., Inc. v. George F. Newman, Jr., Trustee,18 the defendant ("George"), who was a former officer and majority shareholder of the plaintiff corporation ("Machine Co."), sold all of his shares to the corporation.  Six years after the sale of the shares, George's attorney sent a letter to the Machine Co. stating that the sale of the shares was not valid because of the grossly undervalued price they were sold for.  The letter threatened legal action if a settlement could not be reached.  For two years after the letter was sent, George continued to make threats of bringing legal action, but never did so.
Machine Co. brought suit at that point for a declaratory judgment that the sale of the stock was valid, and therefore George had no further legal interest in the stock.  The Supreme Court of North Carolina did not make a decision on whether the complaint stated a cause of action under the Declaratory Judgment Act. It decided that the complaint did state a cause of action in equity that could be maintained as quia timet relief.  The Court noted that North Carolina had a statute similar to the statute in the Lennett case providing that an action in the form of quia timet relief was available to parties seeking to remove a cloud over title to real property. However, in this case the statute did not apply to personal property which was the subject of the suit.  This led the Court to examine common law equitable quia timet.
The Court held that even where there is not a statute providing for quia timet relief, the same equitable principles govern whether quia timet relief may be sought where "due to exceptional circumstances, there is no adequate remedy at law."19  The Court was not clear about which facts satisfied which prongs of the requirements ordinarily required when quia timet relief is granted.  The Court, however, based it's holding on the fact that, because plaintiff was in possession of the corporation stock at issue, there was a lack of justiciable legal harm.  Defendant had continuously made threats of bringing suit, but had failed to do so.  Therefore, there was a threat of legal harm stemming from defending a subsequent lawsuit as well as a possible threat to the reputation of the company.  The Court further recognized the fact that at the indeterminate future time when suit could be brought by George, Machine Co.'s evidence to rebut it may be lost.  A key officer of Machine Co. was seventy years old at the time Machine Co. sought relief.  The Court further stated: "With the ever increasing importance of personal property in the business world of today, especially stocks, bonds, and other intangibles, there is no sound reason why this equitable remedy should not be available to quiet title to personalty as well as realty."20
The analysis of the Court in Newman Machine Co. is interesting because the description of "exceptional circumstances" arising from the facts of the case either mitigates, replaces, or serves as satisfaction of the third prong of ordinary quia timet analysis.  This is the requirement that irreparable harm would result if relief wasn't granted at the time Machine Co. sought equitable relief.  Ordinarily, something more than just monetary loss is required to show irreparable harm.21
An argument can be made that loss of potential evidence
for a subsequent action brought by George would take
place.  However, that interest is normally set by public policy in limitations statutes.  The irreparable harm could also be an intangible loss to the reputation of Machine Co., however, this interest could be presumably tracked in profit margins and equity valuation.
Another possibility is that the Court looked to the three ordinary requirements for granting equitable quia timet relief and decided that the prongs of the standard test are not individual conditions precedent to relief.  Instead, they are factors to be viewed as a whole, along with the entire factual situation in which courts of equity view a broad situation to effectuate justice between the parties.
It may also be the case that the Court used "extraordinary circumstance" to describe another situation.  A party which has created a threat of harm may rely on the fact that no legal harm has yet occurred and thus no judicial relief being available.  This is an inducement or a bargaining chip in persuading the innocent party to take the non-judicial approach of settlement.  It is asking a lot of a court sitting in equity to remain silent when that silence is a part of a threat designed to induce inequitable non-judicial settlement.
(4) Quia Timet in Nuisance Action
Quia timet relief is a traditional part of nuisance law which continues today.  In Village of Wilsonville et al. v. SCA Services, Inc.22, the Defendant was the operator of a chemical waste disposal site which was located over abandoned coal mines.  Prior to suit there were problems with leakage and dust affecting adjoining properties.  Such problems, however, had yet to become serious enough to cause significant legal harm to the adjoining properties.  The Plaintiff town, county, county farm bureau, and state attorney general obtained a permanent injunction against the disposal site operator on the basis of public and private nuisance in equity.  This would not only force the operator to cease waste storage activities, but would also force the operator to remove all current waste and transport it to another site.
The reason Plaintiff sought such a drastic remedy was due to the prospective danger of subsidence23 at the site resulting in a serious contamination of drinking water.  The Defendant site operator did not dispute the availability of relief based upon the threat of future harm.  The Defendant did, however, argue that the trial court position should be reversed because the court failed to balance the interests of the parties and take into account the general societal policy toward risk-taking before declaring a nuisance.
The Supreme Court of Illinois started it's analysis by citing Professor Prosser and previous Illinois precedent for the proposition that an Illinois court sitting in equity may enjoin a defendant from activities which show a "dangerous probability that the threatened or potential injury will occur."24 The Court then proceeded to uphold the trial court's application of the permanent injunction on the grounds that it was inherently clear in the trial court's statement of facts that it did properly use it's equitable powers in taking a wide view of the facts to fashion appropriate relief.  The Court said: "Under these circumstances, if a court can prevent any damage from occurring, it should do so."25
 (5) Quia Timet in Surety Contract Dispute
Currently, the most popular area of law in which quia timet relief is sought is commercial surety law.  A surety is similar to an insurer in some respects.  A commercial surety is a company or other organization which guarantees an obligation of another business.  Ordinarily, the surety is in turn fully indemnified by the business which it guarantees, often in the form of a bond or separate indemnity agreement.  An example is the Miller Act26 which requires that contractors on government projects obtain surety bonds that guarantee things such as the work being completed in satisfactory form, and that all subcontractors, etc. are paid for their work on the project.  If something goes wrong on the project, the government can seek damages from either the contractor or the surety company.  However, under standard indemnity provisions in surety contracts, the surety may seek payment in full from the contractor for any payments the surety is forced to make.  In essence, the surety company is guaranteeing or insuring the solvency of the contractor.
The situation in which quia timet relief is sought in this area is where a surety is fully indemnified by the principal (the business guaranteed by the surety).  When the surety learns that they will have to make payment under their guarantee, there is a common problem of the principal spending, transferring, declaring bankruptcy, etc.  This leaves the surety with no way to collect from the principal the money the surety is obligated to pay the party benefiting from the surety's guarantee.  The surety wants a way to guarantee that funds will be available to satisfy the principal's obligations under the indemnity agreement.
At this point, the surety often has suffered no legal harm because the principal isn't yet required to make the payment required by the indemnity agreement.  There is a danger of legal harm when a principal takes actions that indicate it is likely it will spend, transfer, etc. it's assets, such that the surety will lose the benefit of it's bargain in the indemnity agreement.  This threat of legal harm is irreparable because if the principal's assets are squandered, the surety will never be able to get relief.
In Escrow Agents' Fidelity Corporation v. Superior Court of Los Angeles County27, the surety guaranteed the obligations of licensed escrow agents against loss of trust obligations resulting from embezzlement, theft, or mysterious disappearance.  One agent allegedly embezzled over four million dollars from a guaranteed trust fund.  The surety filed a petition for quia timet relief and imposition of a constructive trust on the agent after the agent filed for bankruptcy.  The attorney for the agent, in defending the action before the Superior Court of Los Angeles "without citing any specific authority to support her argument, persuaded the respondent court that quia timet was a concept that pre-dates movable type, and has virtually no application in modern society."28  The appeals court took strong exception to the Superior Court's ruling and quoted Fireman's Fund Ins. Co. v. S.E.K. Construction Co.29, by stating:
No principle in equity is more familiar, or more firmly established, than that a surety, after the debt for which he is liable has become due, without paying or being called to pay on it, may file a bill in equity in the nature of a bill quia timet to compel the principal to exonerate him from liability by its payment, provided no rights of the creditor are prejudiced thereby.30

In the surety context, the first two ordinary requirements of quia timet relief, no present legal harm and a threat of future harm, are easy to see from an equity perspective.  Because of the unique positions of the surety contract parties, without quia timet relief, a principal would have an unfettered opportunity to perpetrate a fraud on the surety company by liquidating it's assets in order to avoid having to meet it's contractual obligations in the indemnity agreement.
By traditionally holding that the third requirement of irreparable legal harm is satisfied, however, courts are protecting surety companies that profit from insuring the solvency of another business from insolvency.  When a principal takes the action of liquidating assets in order to avoid indemnifying a surety, this is a drastic measure.  The reality of the situation is that a principal could not make a practice of doing this because without assets, the principal could not continue doing business.  Furthermore, a surety would not guarantee the business in the future without being grossly negligent in assessing the risk of the transaction.
As professional risk allocation organizations, surety companies are in a unique position prior to guaranteeing the solvency of a principal.  It can analyze the financial records of the principal.  It can ascertain how long the principal has been in business.  It can analyze the success of past principal operations and it can include contractual guarantees, such as having at least a portion of the proceeds of the principal's operation go into an account that is not accessible to the principal until the guaranteed operation is complete to the point of the surety being released from it's obligation.
 When focusing on the surety's position, the equity of a court finding that irreparable legal harm will result if quia timet relief is not granted would simply result in monetary loss. This monetary loss would not be recoverable because the defendant principal is judgment proof.  An argument can be made that monetary loss against a company in the business of allocating risk is not an extraordinary circumstance warranting the intrusion of equity.
A stronger argument for the use of equitable quia timet relief is made when the focus is on the activities of the defendant principal.  The surety, like an insurer, guarantees the risk of certain occurrences.  The definition of occurrences in surety or insurance contracts seldom include the future actions of the principal or insured taking specific measures to destroy the other party's interest in the contract.31
The extraordinary circumstance warranting a judge to exercise the highly discretionary quia timet action in equity after viewing the facts and legal positions of the parties should come from the outrage of a judge when a defendant's legal argument to the court is essentially: Your honor, in looking at the facts it may appear as though we are clearly engaged in activities designed to do legal harm to the plaintiff.  But there is nothing you can do about it because no legal harm has yet occurred, and there is a small chance that our activities are purely accidental, and hence are not part of a scheme to benefit from threatening to harm the legal rights of the plaintiff.

C. Reasons for Quia Timet Obscurity

Quia timet is not a familiar form of equitable relief primarily because of its rare use in a relatively small number of substantive legal areas.  Even before the Declaratory Judgment Act and other statutory enactments which provided alternatives to parties in need of early relief, quia timet relief was not widely used.32  Furthermore, an increase in statutory enactments has provided increased protections for parties who would otherwise be in need of quia timet relief.33
For example, in property disputes, harmed parties have the use of lis pendens statutes which give public notice of the harmed party's claim to property, and therefore hinders transactions that would cause future harm.  By virtue of attachment statutes, creditors are in a better situation to protect themselves against debtors liquidating assets in violation of contract.  In the area of nuisance, where parties were once forced to rely on quia timet when another person's activities would result in imminent and irreparable harm, there are now widespread city planning and zoning ordinances that protect against numerous forms of nuisance.34  And the list goes on.
The decrease in the use of quia timet resulting from this increase in legislation may serve to decrease the equity of a court employing quia timet because some parties are now in a better position to engage in planning which should avoid a situation calling for equitable intrusion.  However, where it is not reasonable to punish a party for failing to engage in reasonable planning, there is no legal reason why a party's access to equitable quia timet relief should be any different now than it was at early common law.

D. One In A Million Judicial Approach To Quia Timet

In a hijacking case such as the one presented in the British case of British Telecom, Plc. and Others v. One In A Million, Inc. and Others35, the only activities the hijackers had taken was to register the famous domain names, and send correspondence to the famous name trade or service mark holders.  The correspondence was to the effect of - make a cash payment to us if you want an Internet presence, or at a minimum we will simply hold the registration and add it to our personal collection of domain names36.  Under substantive laws of the United Kingdom and United States, no legal harm has occurred to the famous name trade or service mark holders at this point.
There is certainly a threat of legal harm if and when the hijacker takes just about any additional action with the domain registration under one of a number of substantive laws.  The subject of controversy in all areas of law in which quia timet is used is that irreparable legal harm will occur if plaintiff's quia timet remedy is not granted.
There are two relevant questions to a company in British Telecom's position: (1) what should a court do, and (2) what will the court do?  The British trial court in One In A Million37 took the position that it had wide discretion to look at all facts and substantive legal arguments of the parties, and then incorporate any traditional requirements of quia timet relief into a broad ruling on the equity of the situation.  The appellate court focused not on whether each element of a quia timet action was independently satisfied, but rather on the range of allowable equitable discretion of the trial court given the facts of the case.
E. Possible United States Judicial Approaches to One In A
Million Factual Situation

A United States federal or state court could either engage in a similar analysis as was made by the United Kingdom Courts in One In A Million, or it could follow a different approach such as looking at the three traditional requirements for equitable quia timet relief as being independent conditions precedent for such relief.  Alternatively, a court could employ an even more narrow analysis by not considering the traditional elements of a successful quia timet action.  This would involve a simple initial inquiry into whether there is any precedent of quia timet use in the relevant trade mark or other substantive actions which have been used to address hijacking or factually analogous situations.  If there is no such precedent, the analysis could end there.
  While the type of analysis used by a court faced with a quia timet request may vary due to the individual judge or court, it also depends heavily upon the pleadings and briefs of the parties.  The less familiar a decision maker is with the history and use of quia timet, the less predictable her decision will be.

F. Hijacking Is An Extraordinary Circumstance Warranting the Intrusion of Equity

Quia timet is a relief in equity.  It has not traditionally been used in the area of domain name hijacking or trademark infringement.  In determining whether quia timet is appropriate in such areas, it is important to inquire into the way equity has been applied by courts.  Equity is unique because its rules often take the form of principles and maxims to be applied with discretion in a wide range of diverse factual situations.  So long as no constitutional or statutory terms preclude or override the use of equity in a given circumstance38, courts should be flexible in applying such principles and maxims when asked to do so.
The term "equity jurisdiction" does not mean the power granted to a court by higher authorities such as a legislature or constitution to decide controversies and enforce its decisions.  Instead, it means all of the different types of controversies in which a court sitting in equity may use its power to grant equitable relief.39  Usually, equity jurisdiction will be found when either an equitable remedy such as an injunction is sought, or alternatively, when an equitable right is sought.  An example of an equitable right would be the right of a trust beneficiary to demand an accounting by the trustee.40
In order to get equity jurisdiction, the plaintiff needs to make it clear in the pleadings that the main focus of the complaint is equitable41.  Usually, the basis of distinction between legal and equitable actions focuses on the remedy sought by the plaintiff42 In Goodtillnow's case, a complaint seeking injunctive relief against Showmedamoney's use and ownership of Goodtillnow.com would be equitable.
A prerequisite to equity jurisdiction is when a party has a legal right, but no legal remedy.  Therefore, when a plaintiff seeks equitable relief, no new legal right is being sought, but rather only a new remedy is being sought for a right that already exists43.  In Goodtillnow's situation, it has the legal right for Showmedamoney not to illegally use its trademark.  While registration of the domain name alone does not constitute use, it is for a court to decide whether Showmdamoney's intent to extort money for the registration does harm a legal right for which there is no existing remedy.
There are no hard and fast rules about when equity should be applied.  Instead, a court should look to the individual circumstances of each case to decide which party has the burden of proof on individual issues44, and to what extent relief should be given45.  Goodtillnow can therefore request that Showmedamoney bear the burden of showing it has a legitimate use for the registration.  It can also ask that Showmedamoney prove that it has enough funds to sustain a later adverse award of damages in a suit brought by Goodtillnow.  This should be granted because if Showmedamoney has insufficient funds, Goodtillnow will be irreparably harmed by refusal of an injunction.  That is the important third prong of the quia timet test.
The unique role of equity calls for its use on a case-by-case basis46.  Furthermore, in deciding whether or not to grant equitable relief, courts should take into consideration a wide range of circumstances as well as a wide range of equitable procedures47  The Supreme Court of Connecticut cited J. Pomeroy in saying: "A hallmark of equity is its capacity of expansion [beyond the common law], so as to keep abreast of each succeeding generation and age."48
In Harper v. Adametz49,  the Plaintiff purchaser offered $7,000.00 for an entire lot of land.  The Defendant agent, however, told the seller that the offer was $6500.00, which the seller accepted. The agent then erroneously told the purchaser that the seller would only sell a portion of the land.  The purchaser made a counteroffer for the portion of the land for $6,000.00. The agent then arranged to have the remaining portion of the land conveyed to his son. The Plaintiff sued in equity for fraud seeking conveyance of the remainder of the land when the agent's activities were discovered.
There was a problem with the damages requirement for fraud, however, because the Plaintiff purchaser got exactly what he bargained for in his counteroffer.  Therefore, it was difficult for the court to order conveyance of the remainder of the farm as relief.  Furthermore, the agent did not have a fiduciary duty to the Plaintiff purchaser because the agency relationship was only between the seller and the agent.  Ordinarily, such a fiduciary relationship was required to grant such extraordinary relief.  The Court granted the Plaintiff his requested relief despite such problems and said: "Equity is a system of positive jurisprudence founded upon established principles which can be adapted to new circumstances where a court of law is powerless to give relief."50
When a court faces a domain name hijacking situation involving facts similar to the Goodtillnow and One in a Million situations, where a party is seeking early injunctive quia timet relief, it should not simply look to whether quia timet has been used in hijacking or trademark cases in the past.  Instead, the court should look at the wide range of facts and circumstances in which that form of relief has been granted in the past.  It should also look at all of the facts of the present case, and then make a reasoned comparison with precedent.  The traditional tests for quia timet relief should at a minimum be applied to the situation using applicable precedent as a guide to defining the individual tests.
In deciding whether to grant quia timet relief, the court should take into consideration that the need for equitable relief arises from the conduct of the parties in combination with an absence of applicable statutory or common law protection of a legal right of one of the parties.  Therefore, if a court is to deny quia timet relief to a party in the position of Goodtillnow, it would not be well-reasoned to do so merely on the basis that quia timet has not been traditionally used in that substantive area of law.
An argument against granting quia timet relief may be asserted on the grounds that equity should be used only in extraordinary circumstances.  A twenty thousand dollar payment to a large business may not constitute such an extraordinary circumstance.  Equity, however, can be offended in different ways.  "Some courts have held that pecuniary loss need only be slight [for equitable relief to be granted]."51  A hijacker relying on the inaction of a court to serve as a bargaining tool in getting money for a domain name for which it has no legitimate use should be offensive to equity.

G. Danger of Misapplication of Quia Timet Relief by Courts

When a court is faced with a party seeking quia timet relief, which is a somewhat obscure use of equity, there is an obvious danger of the court making an overly restrictive analysis of it's use.  In In re Lockwood52, a case which is not good precedent because it was vacated at a late stage of the appeals process, an alleged patent infringer made an analogy to quia timet relief in arguing for the power of the court to grant declaratory relief. The other party argued that it was entitled to a jury resolution of the underlying facts under the Seventh Amendment of the United States Constitution.  In response to the analogy to quia timet the court stated: "Contrary to American's assertions, it does not appear that an alleged infringer could have used a bill quia timet to challenge patent validity in a court of equity.  We have not been informed of any such cases by American." 53  The court then went on to list the substantive legal areas in which quia timet had been used.
In NTN Communications, Inc. v. Interactive Network, Inc.54, NTN Communications, Inc. ("NTN") sought injunctive relief under the Lanham Act for threatened use of its trademark relating to an interactive game played in conjunction with televised football games.  NTN had an exclusive licensing agreement with the National Football League ("NFL"), and prior to this action Interactive Network, Inc. ("Interactive") had a sub-license for the same.  When Interactive entered into a licensing agreement with the Canadian Football League ("CFL"), NTN brought this action for injunctive relief against Interactive's alleged unlawful use and competition.
At the point NTN sought injunctive relief, Interactive had not taken any actions beyond entering the CFL licensing agreement.  Interactive filed a 12(b)(6) motion to dismiss for failure to state a claim because it argued that NTN's claim for injunctive relief was not ripe because Interactive's use of the trademark "was merely intended or threatened."55  NTN claimed the injunctive relief was sought in equity; however, neither the court opinion, nor the cases cited in the opinion as attributable to NTN even referenced quia timet relief.  Interactive argued that NTN could only seek relief for intended or threatened use of a trademark under the Declaratory Judgment Act, which doesn't provide such a remedy.
The trademark cases briefed by NTN, and found dispositive by the court were National Lampoon, Inc. v. American Broadcasting Co.56, Bertolli U.S.A., Inc. v. Filipo Bertolli Fine Foods, LTD.57, and Monsanto Chemical Co. v. Perfect Fit Manufacturing & Co.58.  None of these cases appeared to be plead in terms of quia timet, as the words quia timet did not appear in the text of the opinions.  The discussion in the cases rather focused on obtaining preliminary injunctions under Rule 65 of the Federal Rules of Civil Procedure.  That rule requires a plaintiff to demonstrate irreparable harm, and either the likelihood of being successful on the merits, or there being sufficiently serious questions on the merits to show fair grounds for litigation.  The rule also requires a balance of hardships favoring the moving party59
The NTN court granted Interactive's 12(b)(6) motion for failure to state a claim on the grounds that even the authorities cited by NTN granting early relief required that not only must Interactive show intent to infringe a trade mark, but it must also take steps to market it's infringing product or somehow use it in commerce as well.  This case is an example of quia timet relief simply not being sought when it could have been.

 H. Applying Traditional Quia Timet Requirements to Hijacking Scenario

In One In A Million and the Goodtillnow scenarios, the only actions the defendant hijackers had taken was to register the plaintiffs' famous names and then correspond with the plaintiffs regarding a sale of the registration.
At this stage, courts will not likely find that the plaintiff has suffered legal harm.  Therefore, the first requirement of no present legal harm is satisfied.  The second requirement of there being a threat should also be satisfied.  Given the facts that the plaintiff's name/trade or service mark has been registered as a domain name with NSI, it is clear that the defendant hijacker is both aware of the plaintiff company and the plaintiff's interest in having unique access to it's commercial name(s) on the Internet.  Otherwise, it would not have contacted the mark holders requesting a substantial cash payment.
In the above Bertolli USA, Inc.60 case in which the Defendant shared the same last name as the Plaintiff, the court even in that situation quoted Judge Friendly in A.T. Cross Co. v. Jonathan Bradley Pens, Inc.61 in saying: "we do not look with much favor on the businessman who, out of the wealth of words available, chooses as a trademark one which comes as close as he dares to a well-known mark on the identical product."  Because practically any use of the domain name beyond simply holding the registration will cause legal harm pursuant to at least one of the substantive laws applicable to the facts.  And also considering the fact that simply holding the registration would evidence some form of malicious intent such as seeking a settlement with the plaintiff for the registration, or looking for another person like a competitor who has a similar malicious interest in the name.  There should be a sufficient threat of future legal harm.
For the third traditional requirement of quia timet relief, which has already been discussed in some length above, a number of different approaches can be taken to argue that there is a sufficient danger of irreparable harm stemming from the threat.  In a hijacking situation such as this, it may very well be the case that the hijacker does not have significant assets.
If the term "irreparable harm" is used by the court in the same way it is used in a straight preliminary injunction analysis, Omega Importing Corp. v. Petri-Kine Camera Company, Inc.62 becomes relevant.  In Omega Importing Corp., which was an action for a temporary injunction based on trademark infringement, the Second Circuit overruled the District Court's conclusion that the temporary injunction should not be granted.  In it's analysis of 'irreparable harm', the court found that receiving money damages in the future for trademark infringement, unfair competition, and passing off does not afford the affected party full compensation due to the nature of the harm involved.  The stated reasons in Omega were that calculating damages resulting from such harms is "notoriously difficult"63.  Even if the damages can be accurately calculated, there is still a likelihood of harm to the plaintiff's reputation which cannot be quantified.  The court's final consideration was that since the defendant had just emerged from Chapter 11 bankruptcy, it would be unlikely that it could afford to pay the damages caused by it's alleged activities.  The same factors should apply in a hijacking situation, i.e. calculating damages, loss of reputation, and the financial situation of the defendant. All of these weigh in favor of finding that the threatened harm is irreparable.
If irreparable harm is analyzed in the same way courts have analyzed it in the traditional areas of the law that equitable quia timet actions have been used, it is important to focus on the analysis of such past courts in reaching their conclusions.  The fact that most of the opinions do not follow an element by element breakdown of the traditional quia timet action tends to guide toward taking a wide look at the facts and legal positions of the parties.  After that, incorporate the traditional requirements as considerations in making a broad equitable determination.  Irrespective of the analysis a court makes, it is important to bring to light the unspoken traditional analysis of courts granting quia timet relief, which is to also take into account the actions, intent and designs of the defendants in making an equitable ruling. 



III. Substantive Legal Protection Against Hijackers in the United States

When a company having a trade or service name that is registered by someone else as a domain name for the purposes attributable to hijacking, there are a number of statutory and common laws for such company to use in both identifying the threat and the point at which legal harm will occur. These substantive protections can also be used together in a well plead complaint to foreclose the possibility that any use of the trade or service mark by the hijacker short of simply sitting on the registration will be an infraction of at least one of the protections.

 A. Trademark and Service Mark Infringement Under the Lanham Act

Under 15 U.S.C. ( 1127, a "trademark" is defined as:
[A]ny word, name, symbol, or device, or any combination thereof (1) used by a person, or (2) which a person has a bona fide intention to use in commerce and applies to register on the principal register established by this chapter, to identify and distinguish his or her goods, including a unique product, from those manufactured or sold by others and to indicate the source of the goods, even if that source is unknown.

   Under that same Section, a "service mark" is defined as:
[A]ny word, name, symbol, or device, or any combination thereof (1) used by a person, or (2) which a person has a bona fide intention to use in commerce and applies to register on the principal register established by this chapter, to identify and distinguish the services of one person, including a unique service, from the services of others and to indicate the source of the services, even if that source is unknown.

If a company wants to show that a hijacker is infringing the company's legal rights under the Lanham Act, the company has to show that "(1) the mark is valid and legally protectable, (2) the mark is owned by the plaintiff and (3) use of the same mark by the defendant is likely to create confusion among the relevant consumers."64  It is important that any complaint for injunctive or declaratory relief contain proof or sufficient allegations of these requirements.
For legal harm to occur under this section in the hijacking context, it would be necessary for the hijacker to take the step beyond domain name registration and correspondence with the name holder of posting a web site that relevant consumers of the company's business may think is related to the company.  It is not a valid defense for a hijacker to argue that the registered domain name is not identical to the company's trade or service mark because courts have consistently held that the questioned use is similar enough to the trade or service mark that the relevant consumers of the business be deceived.65 It would be ironic for a hijacker to defend on this ground, as the point of hijacking is to satisfy this requirement as much as possible.

B. Trademark Anti-Dilution Act

The Federal Trademark Dilution Act says: "The owner of a famous mark shall be entitled ... to an injunction against another person's commercial use in commerce of a mark or trade name, if such use begins after the mark has become famous and causes dilution of the distinctive quality of the mark."66 If a company wants to use this section to protect against a hijacker, the company must show: "(1) the mark is famous; (2)the defendant is making a commercial use of the mark in commerce; (3) the defendant's use began after the mark became famous; and (4) the defendant's use of the mark dilutes the quality of the mark by diminishing the capacity of the mark to identify goods and services."67  Trademark Anti-Dilution is a useful protection to defend against hijacking because a company simply needs to show that the use by another of it's famous mark will harm the usefulness of the mark by limiting an Internet user's ability both to locate and distinguish between the company's and the hijackers use.
Furthermore, it is not a defense for the hijacker to claim that it's use of the name is not "commercial" because the web site they established is for personal use.  The fact that they have corresponded with the mark-holding company to sell the domain name registration back to the company satisfies the commercial use requirement of the section because of the evidence that the hijacker sought profit from registering the trademark as a domain name and seeking remuneration from the trademark holder. This is the business of a hijacker.68 Again, under this section, no justiciable legal harm takes place until the hijacker takes the further step of setting up a web site with the domain registration name.  This section does, however, significantly narrow the possible use of a domain name registration by anyone other than the famous-name mark holder.

C. Common Law Service Mark

Under common law, a business can attain rights to a service mark which is often the name of the business or a product which the business sells.  This is similar to protections afforded under the Anti-Dilution Act; however, the source of the right to the service mark is common law and not a statute.  Therefore a company which has not registered a service mark under trademark legislation will still receive protection.  A business acquires common law service mark protection by using it's mark in connection with services it offers69.  Such protection is granted when another entity uses a sufficiently similar mark in such a way as to create confusion about the origin of the business using the mark or the origin of the services offered in connection with the mark70.
The amount of protection provided depends upon how distinctive the mark is71.  In order to determine the relative distinctiveness of a mark, courts classify marks into the following categories: "(1) fanciful, (2) arbitrary, (3) suggestive, (4) descriptive and (5) generic"72.  The above classifications are listed in order of the amount of protection they receive.  Fanciful marks are given a high level of protection, while generic marks are not protected at all73.  In order to determine which classification a mark falls under, courts employ further multi-factor tests for each classification74.
Depending on the classification of a business's mark therefore, a business with a distinctive mark is able to seek relief irrespective of whether it has registered the mark as a trademark when someone creates a web site that will likely create confusion amongst relevant web users as to the owner of the site and the services the web site may offer.

D. Other Protections

There are a number of other common law protections which may be applicable to hijacking situations such as common law unfair competition, consumer fraud, and state deceptive practices acts based on the Uniform Deceptive Practices Act. Depending upon the facts of a particular hijacking case, any number of different substantive protections will need to be used.  The Court must see that any use of the domain name beyond simply holding the registration will result in legal harm for which there is existing legal protection.  By eliminating any possible legitimate uses of the domain name registration, it shows the court that the hijacker will not be harmed by forfeiting the registration.  It will also show the futility or malicious intent of a hijacker making an argument that it simply wants to hold on to the name. 



IV. Conclusion: When It Happens To You

 If you find yourself in the Goodtillnow situation, it is first necessary to correspond with Hijacker in order to better ascertain their position and intentions.  It is easiest if the hijacker contacts you first, because their knowledge of your existence is evidence of their intent to engage in hijacking.  If you are forced to contact the hijacker, it may be useful to do so in the form of a demand letter.  In the letter, you should both ask about the hijackers position and intentions and also detail your substantive legal right to all uses of the domain name they registered.  Be sure to include a reasonable time period in which you expect them to respond.  The ideal letter will therefore have goals of acquiring information, getting evidence of bad intent, sending a threatening message, and setting a reasonable time for reply.
If you find that the facts are similar to the Goodtillnow or One In A Million Situation, then file a temporary restraining order and complaint for injunctive relief.  This should get you before a judge within a matter of weeks.  If the hijacker makes an appearance at the TRO conference, be well versed on the judge's discretion to place the burden of proof of individual issues on either party.  Also be well versed on the history and nuances of quia timet.  At the TRO conference request that the hijacker provide evidence of financial stability sufficient to sustain an award of later financial damages in an infringement or other suit.  Also request that the hijacker provide a legitimate anticipated use for the registered domain name.  It is also important to provide proof of your trademarks, or if you are relying on common law protection, proof that you have a legal right to the name.
If the case proceeds to a preliminary injunction hearing, be prepared to further elaborate to the judge exactly why defendant's domain name hijacking is an extraordinary circumstance that warrants the intrusion of equity.  At best, Showmedamoney does not show up for court in the first place and you win by default.  At worst, you are able to avoid calling Len Bremer to tell him there is nothing you can do about Showmedamoney's hijacking. 


Endnotes

1 Dept. of Commerce, Statement of Policy, Management of Internet Names and Addresses, Docket No. 980212036-8146-02.
2 For a good introduction to the technical background of the Internet and domain names giving rise to cybersquatting disputes, See Panavision v. Toeppen, 141 F.3d 1316, 1318 (9th Cir. 1998)
3 Panavision, 141 F.3d at 1319.
4 The Green Paper and comments thereto can be found at <http://www.ntia.doc.gov>
5 Dept. of Commerce, Statement of Policy, Docket Number 980212036-8146-02.
6 Id.
7 Fitzgerald, Gamertsfelder and Gulliksen, UNSW Law Journal: Marketing Your Website: Legal Issues Relating to the Allocation of Domain Names, <http://law.unsw.edu.au>
8 British Telecom Plc And Others v. One In A Million And Others, [1998] Masons C.L.R. 165, See also <http://www.nic.uk/news/oiam-judgment.html>.
9 Blacks Law Dictionary, 1415 (rev. 4th ed.).
10 1956 ABA Section of Insurance, Negligence and Compensation Law Proceedings 173.
11 One In A Million at [1998] Masons C.L.R. 165.
12 Id.
13 Id.
14 Id.
15 Escrow Agents' Fidelity Corp. v. Superior Court of Los Angeles, 5 Cal.Rptr.2d 698, 700, quoting Connors, California Surety & Fidelity Bond Practice (C.E.B. 1969), ( 13.13. p. 176, citing Roman Catholic Archbishop of San Francisco v. Shipman, 11 P. 343 (Cal. 1886).
16 Jay M. Mann and Curtis A. Jennings, Quia Timet: A Remedy for the Fearful Surety, 20 Forum 685, 687.
17 Lennett, 110 S.E.2d at 628.
18 166 S.E.2d 63 (N.C. 1969).
19 Newman Machine Co. v. George F. Newman, Jr., Trustee, 166 S.E.2d 63, 69 (N.C. 1969).
20 Newman Machine Co., 166 S.E.2d at 69.
21 See Jews for Jesus v. Brodsky, 993 F. Supp. 282 (D. N. J. 1998).
22 426 N.E.2d 824 (Ill. 1981).
23 Subsidence is the settling of ground caused from insufficient underground support structure.
24 Restatement (Second) of Torts sec. 933(1), at 561, comment b (1979)), 426 N.E.2d at 836.
25 426 N.E.2d at 837.
26 40 U.S.C.A. ( 270 et seq.
27 5 Cal.Rptr.2d 698 (2d Dist. Div. 5 1992).
28 Escrow Agents Fidelity Corp., 5 Cal.Rptr.2d at 701.
29 436 F.2d 1345, 1349 (10th Cir. 1971).
30 Id. at 701.
31 Ambassador Ins. Co. v. Montes, 388 A.2d 603 (N.J. 1978)
32 Roman Catholic Archbishop of San Francisco, 11 P. at 343.
33 Escrow Agents' Fidelity Corporation, 5 Cal.Rptr.2d at 700.
34 Id. at 701.
35 One In A Million.
36 Id.
37 Id.
38  See state statutory interpretation acts for limitations on the use of equity where there is possible conflict.
39 See McClintock, Equity ( 40 (West Pub. Co. 2d Ed. 1948) and Clark v. Teeven Holding Co, Inc. v. M&M Cleaners, 625 A.2d 869, 876 (Del. Chanc. 1992).
40 See Bird v. Lida, 681 A.2d 399, 402 (Del. Chanc. 1996).
41 See Synacek v. Oklahoma Cold Storage, 527 N.W.2d 91 (Neb. 1995), See also State of Nebraska ex. rel. Stenberg v. Moore, 571 N.W.2d 317, 321 (Neb. 1997).
42 See Hammons v. Ehney, 924 S.W.2d 843, 846 (MO 1996).
43 See Juaire v. Juaire, 259 A.2d 786, 788 (Vt. 1969), See also Chapman v. Sheridan - Wyoming Coal Co., 338 U.S. 621, 630-31 (1950).
44 See Boone v. Lightner, 319 U.S. 561, 569-70 (1943).
45 See International Salt Co. v. United States, 332 U.S. 392, 400-01 (1947).
46 See In re Marriage of Cargill, 843 P.2d 1335 (Colo. 1993).
47 See Assoc. Home Utilities, Inc. v. Town of Bedford, 424 A.2d 186, 189 (N.H. 1980).
48 Associated Investment Co. L.P. v. Williams Associates IV, 645 A.2d 505, 511 (Conn. 1994) partially quoting 1 J. Pomeroy, Equity Jurisprudence (5th ed. 1941) ( 67, p. 89.
49 113 A.2d 136 (Conn. 1955).
50 Harper, 113 A.2d at 138 citing 1 Pomeroy, Equity Jurisprudence (5th Ed.) p. 78.
51 Harper, 113 A.2d at 139.
52 50 F.3d 966 (Fed. Cir. 1995).
53 In re Lockwood, 50 F.3d at 979.
54 1995 WL 569419 (N.D. Cal. 1995) (Not Reported in F. Supp.)
55 NTN Communications, Inc. v. Interactive Network, Inc., 1995 WL 569419 (N.D. Cal. 1995).
56 376 F. Supp. 733 (S.D.N.Y.), aff'd 407 F.2d 1343 (2d Cir. 1974).
57 662 F. Supp. 203 (S.D.N.Y. 1972).
58 349 F.2d 389 (2d Cir. 1965).
59 Bertolli, 662 F. Supp. At 205, citing Church of Scientology International v. Elmira Mission, 794 F.2d 38, 41 (2d Cir. 1986)
60 662 F. Supp. 203, 206 (S.D.N.Y. 1987).
61 470 F.2d 689, 692 (2d Cir. 1972).
62 451 F.2d 1190, 1195 (2d Cir. 1971.
63 See also Pure Foods, Inc. v. Minute Maid Corp., 214 F.2d 792, 797 (5th Cir.), cert. denied, 348 U.S. 888 (1954).
64 Jews for Jesus, 993 F. Supp. at 294.
65 Fisons Horticulture, Inc. v. Vigoro Industrial, Inc., 30 F.3d 466, 477 (3d Cir. 1994).
66 Panavision International L.P. v. Toeppen, 141 F.3d 1316, 1324 (9th Cir. 1998) quoting 15 U.S.C. ( 1125(c).
67 Id. at 1324 citing 15 U.S.C. ( 1125(c).
68 Id. at 1325.
69 Caesars World, Inc. v. Caesar's Palace, 490 F. Supp. 818, 821 (D.N.J. 1980).
70 Id. at 823.
71 Id. at 821.
72 Dranoff-Perlstein Assoc. v. Sklar, 967 F.2d 852, 858-59 (3d Cir. 1992).
73 Jews For Jesus, 993 F. Supp. at  296.
74 For "generic" analysis see Blinded Veteran's Assoc. v. Blinded Am. Veterans Found., 872 F.2d 1035 (D.C. Cir. 1989), for "descriptive" and "suggestive" analysis see Trustco Bank, 903 F. Supp. at 342, for ""arbitrary" and "fanciful" analysis see Thomas McCarthy, McCarthy on Trademarks and Unfair Competition (( 11.20 - 11.25.