04.11.2014 Views

cyckV4

cyckV4

cyckV4

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The Stakes of Contributory Infringement 517<br />

name of a song or an artist as the object of the search. The form is then<br />

transmitted to a Napster server and automatically compared to the MP3 file<br />

names listed in the server’s search index. Napster’s server compiles a list of<br />

all MP3 file names pulled from the search index which include the same<br />

search terms entered on the search form and transmits the list to the searching<br />

user. The Napster server does not search the contents of any MP3 file; rather,<br />

the search is limited to “a text search of the file names indexed in a particular<br />

cluster. . . .<br />

D. Transferring Copies of an MP3 file: To transfer a copy of the contents of<br />

a requested MP3 file, the Napster server software obtains the Internet address<br />

of the requesting user and the Internet address of the “host user” (the user with<br />

the available files). See generally Brookfield Communications, Inc. v. West<br />

Coast Entm’t Corp., 174 F.3d 1036, 1044 (9th Cir.1999) (describing, in detail,<br />

the structure of the Internet). The Napster servers then communicate the host<br />

user’s Internet address to the requesting user. The requesting user’s computer<br />

uses this information to establish a connection with the host user and<br />

downloads a copy of the contents of the MP3 file from one computer to the<br />

other over the Internet, “peer-to-peer.”<br />

[T]he district court concluded that Napster harms the market in “at<br />

least” two ways: it reduces audio CD sales among college students and it<br />

‘raises barriers to plaintiffs’ entry into the market for the digital downloading<br />

of music. . . .” †<br />

What would you need to prove in order to find liability? What would be the<br />

defenses? How would you frame your argument? What would be your opening 60<br />

seconds if you were the lawyer arguing either for the plaintiff or the defendant?<br />

[These are the crucial moments when you have a chance to frame the issue before<br />

the judges interrupt. If you are lucky.] Which, if any, of the frames discussed in<br />

Chapter One could each side use? On what precedents would you rely? What policy<br />

arguments would you stress? What “escape hatches” would you offer to a court<br />

contemplating the possibility that Napster might not be liable? What vision of doom<br />

would you conjure up were the court not to find Napster liable?<br />

1.) The Stakes of Contributory Infringement<br />

As Tiffany v. eBay showed in the trademark context, contributory infringement assumes<br />

particular importance in the world of the internet. Or perhaps, more broadly, in the<br />

world of devices and networks which give powers to individuals that were formerly held—<br />

to any significant extent—exclusively by large commercial intermediaries. The internet<br />

allows any individual to set up a global storefront. Your laptop or tablet or phone can<br />

implicate many of the rights in § 106 of the Copyright Act—a dramatic technologically<br />

enabled change to the legal significance of your actions. You can copy, distribute, and<br />

modify existing works—indeed on a daily basis, you would be hard put not to. At the same<br />

time, these devices and networks also allow an unprecedented flowering of creativity,<br />

innovation and disruptive business models. From Amazon and eBay to blogs, Wikipedia,<br />

open source software and the world of social media, the devices and networks of the digital<br />

†<br />

A&M Records v. Napster, 239 F.3d 1004 (9th Cir. 2001).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!