1oz61wa
1oz61wa
1oz61wa
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Civil Remedies<br />
ISPs and web hosting services play a direct role in the distribution of copyrighted content, the<br />
reproduction of copies on their servers (in the ISP context, such copies are likely transient, or<br />
“cache,” copies), and the public performance and display of such content. The case law regarding<br />
the “volitional” conduct requirement, discussed in footnote 88, generally precludes a theory of<br />
direct infringement, at least as to reproduction and distribution claims in which end users, and not<br />
the intermediaries, initiate the process of copying and transferring files. 75<br />
Various types of services may provide links to infringing content (along with links to non-infringing<br />
content), and may “frame” the display or playback of such content on their own sites. These<br />
services thus may play an important role in the unauthorized performance or display of content.<br />
However, in a significant decision regarding such links and displays, the Ninth Circuit held that<br />
search engine services were not subject to direct liability in these circumstances. The court held<br />
that, while a “search engine communicates HTML instructions that tell a user’s browser where to<br />
find” infringing content, it “does not itself distribute copies of the infringing [content].” Rather, the<br />
court held, it is the infringing website’s “computer that distributes copies” of the infringing content<br />
“by transmitting [it] electronically to the user’s computer.” 76<br />
b) Secondary Liability of Intermediaries—Copyright<br />
Many ISP and web hosting service subscribers and search engine users are engaged in the direct<br />
infringement by transmitting, uploading, and downloading unauthorized copies of copyright<br />
content. Such infringement obviously occurs via the “conduit” services and Internet connectivity<br />
offered by ISPs, on the servers provided by web hosting services, and through the Internet links<br />
generated by search engines. Other intermediaries, such as advertising networks, provide a source<br />
of revenue for infringing websites. This section discusses the potential bases under current law for<br />
claims of secondary liability against such intermediaries.<br />
(1) Contributory Infringement<br />
Knowledge. Courts generally have been hesitant to find that an intermediary has actual knowledge<br />
of infringement without the provision of notice of specific infringing sites. 77 To the extent intermediaries<br />
use technologies to track and analyze user behavior, that may result in them being found to<br />
have imputed knowledge of infringing conduct even in the absence of any specific notice. 78 For<br />
example, to the extent an intermediary’s technology responds to user behavior, and that behavior is<br />
infringing conduct, an intermediary may be found to have knowledge of infringement. In Columbia<br />
Pictures Industries, Inc. v. Fung, 79 the court found knowledge under the DMCA safe harbor<br />
provisions where “Defendants designed their website to include lists such as ‘Top Searches,’ ‘Top<br />
20 Movies,’ ‘Top 20 TV Shows,’ and ‘Box Office Movies,’ and Defendants designed these lists to<br />
automatically update to reflect user activities. These lists included numerous copyrighted works.”<br />
Id. at *17 (emphasis added).<br />
If notice of specific instances of infringement is provided, courts generally have found that actual<br />
knowledge exists. 80 Where the underlying sites at issue are predominantly populated with infringing<br />
material, courts have suggested that notice of the general site with a list of infringing works<br />
available on that site may be sufficient for notice purposes. 81<br />
To the extent that the intermediary conducts some sort of pre-approval review before allowing<br />
websites to engage in the intermediary’s network, 82 such review has been found sufficient to<br />
establish knowledge for contributory infringement. In Perfect 10, Inc. v. Cybernet Ventures, Inc., 83<br />
for example, the defendant’s “site reviewers review[ed] every site before allowing the sites to<br />
utilize the Adult Check system… Although they might not detect every copyright violation, there<br />
is evidence that many sites contain disclaimers to the effect, ‘we do not hold copyrights for these<br />
17