18.11.2014 Views

1oz61wa

1oz61wa

1oz61wa

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Civil Remedies<br />

ISPs and web hosting services play a direct role in the distribution of copyrighted content, the<br />

reproduction of copies on their servers (in the ISP context, such copies are likely transient, or<br />

“cache,” copies), and the public performance and display of such content. The case law regarding<br />

the “volitional” conduct requirement, discussed in footnote 88, generally precludes a theory of<br />

direct infringement, at least as to reproduction and distribution claims in which end users, and not<br />

the intermediaries, initiate the process of copying and transferring files. 75<br />

Various types of services may provide links to infringing content (along with links to non-infringing<br />

content), and may “frame” the display or playback of such content on their own sites. These<br />

services thus may play an important role in the unauthorized performance or display of content.<br />

However, in a significant decision regarding such links and displays, the Ninth Circuit held that<br />

search engine services were not subject to direct liability in these circumstances. The court held<br />

that, while a “search engine communicates HTML instructions that tell a user’s browser where to<br />

find” infringing content, it “does not itself distribute copies of the infringing [content].” Rather, the<br />

court held, it is the infringing website’s “computer that distributes copies” of the infringing content<br />

“by transmitting [it] electronically to the user’s computer.” 76<br />

b) Secondary Liability of Intermediaries—Copyright<br />

Many ISP and web hosting service subscribers and search engine users are engaged in the direct<br />

infringement by transmitting, uploading, and downloading unauthorized copies of copyright<br />

content. Such infringement obviously occurs via the “conduit” services and Internet connectivity<br />

offered by ISPs, on the servers provided by web hosting services, and through the Internet links<br />

generated by search engines. Other intermediaries, such as advertising networks, provide a source<br />

of revenue for infringing websites. This section discusses the potential bases under current law for<br />

claims of secondary liability against such intermediaries.<br />

(1) Contributory Infringement<br />

Knowledge. Courts generally have been hesitant to find that an intermediary has actual knowledge<br />

of infringement without the provision of notice of specific infringing sites. 77 To the extent intermediaries<br />

use technologies to track and analyze user behavior, that may result in them being found to<br />

have imputed knowledge of infringing conduct even in the absence of any specific notice. 78 For<br />

example, to the extent an intermediary’s technology responds to user behavior, and that behavior is<br />

infringing conduct, an intermediary may be found to have knowledge of infringement. In Columbia<br />

Pictures Industries, Inc. v. Fung, 79 the court found knowledge under the DMCA safe harbor<br />

provisions where “Defendants designed their website to include lists such as ‘Top Searches,’ ‘Top<br />

20 Movies,’ ‘Top 20 TV Shows,’ and ‘Box Office Movies,’ and Defendants designed these lists to<br />

automatically update to reflect user activities. These lists included numerous copyrighted works.”<br />

Id. at *17 (emphasis added).<br />

If notice of specific instances of infringement is provided, courts generally have found that actual<br />

knowledge exists. 80 Where the underlying sites at issue are predominantly populated with infringing<br />

material, courts have suggested that notice of the general site with a list of infringing works<br />

available on that site may be sufficient for notice purposes. 81<br />

To the extent that the intermediary conducts some sort of pre-approval review before allowing<br />

websites to engage in the intermediary’s network, 82 such review has been found sufficient to<br />

establish knowledge for contributory infringement. In Perfect 10, Inc. v. Cybernet Ventures, Inc., 83<br />

for example, the defendant’s “site reviewers review[ed] every site before allowing the sites to<br />

utilize the Adult Check system… Although they might not detect every copyright violation, there<br />

is evidence that many sites contain disclaimers to the effect, ‘we do not hold copyrights for these<br />

17

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!