A Legal Blog by Aaron | Sanders, PLLC


WOO! What Bachelorette Parties in Nashville Can Teach You About Trademarks and Trademark Registrations

A PEDAL TAVERN by Any Other Name Would Still Be as Annoying

On my way back to Nashville (from Los Angeles) last week, I found myself in the back of the plane with not one, but two bachelorette parties. It wasn’t quite noon (Pacific time), but several of the members were already pretty drunk, and they all had a grand time. You might assume that I was just really unlucky, but when you consider how many bachelorette parties there are at any one time in Nashville, and that almost all have to fly into Nashville, you’d conclude that it was amazing I hadn’t encountered two on the same plane before.

Now, I don’t want to say anything bad or dismissive about bachelorette parties, even though we all find them a trifle annoying. They constitute 16.67% of the overall Nashville economy and give rise to about 20% of all civil lawsuits here, so it’s sort of important that we bite our tongues and tolerate them. Without them, the local AirBNB market would collapse, which would hurt the market for tearing down old homes and replacing them with two-towers-on-a-single-lot. Bars and honky-tonks would be hurt, and several of them would probably go out…

Read More»

Honey Catches Flies and Hackers, But Not A Trademark Registration

In honor of Valentine’s Day, the Trademark Trial and Appeal Board has offered us honey. You know, that stuff with which you catch more flies.

The lines between descriptive and suggestive marks has never been easy to define.  Bitvoyant, a Virginia-based software company, found that out this week.  Bitvoyant applied to register the mark HONEYFILE in connection with the following:
Computer software platforms for use in the field of computer network security that assist in the tracking of data exfiltration and network intelligence in Class 9; and

Computer security consultancy; Computer security service, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer virus protection services; Design and development of electronic data security systems; Platform as a service (PAAS) featuring computer software platforms for use in the field of computer network security that assist in the tracking of data exfiltration and network intellegence in Class 42.
The Examining Attorney found the mark descriptive, based on evidence that the cybersecurity industry used the term to denote files that would…

Read More»