1oz61wa
1oz61wa
1oz61wa
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Chapter 2<br />
72. Perfect 10, 508 F.3d at 1173.<br />
73. See Fonovisa, Inc. v. Cherry Auction, Inc., 76 F.3d 259, 262-64 (9th Cir. 1996) (flea market owner had<br />
control over vendors selling counterfeit music recordings based on the flea market’s contractual “right to<br />
terminate vendors for any reason whatsoever and through that right . . . the ability to control the activities of<br />
vendors.”); Perfect 10, Inc. v. Cybernet Ventures, Inc., 213 F. Supp. 2d 1146, 1173-74 (C.D. Cal. 2002) (right<br />
and ability test satisfied where defendant had a monitoring program in place, purportedly refused to allow sites<br />
to use the system until they complied with polices prohibiting infringement, and “control[led] consumer access”<br />
and promoted sites).<br />
74. Napster, 239 F.3d at 1023.<br />
75. See CoStar Group, 373 F.3d at 550 (no direct liability where ISP “designed and managed as a conduit of<br />
information and data”; holding that “in the context of the conduct typically engaged in by an ISP,” Copyright Act<br />
requires “some aspect of volition and meaningful causation-as distinct from passive ownership and management<br />
of an electronic Internet facility”); Cablevision, 536 F.3d at 131 (no direct liability for violation of reproduction<br />
right where cable service’s RS-DVR service copied programs at direction of end-users). As noted, not all courts<br />
have explicitly adopted the “volitional” conduct requirement for direct infringement. See WTV Sys., 824 F. Supp.<br />
2d at 1010 n.7.<br />
76. Perfect 10, Inc. v. Amazon.com, Inc., 508 F.3d 1146, 1162 (9th Cir. 2007).<br />
77. See, e.g., Napster, 239 F.3d at 1021 (“[A]bsent any specific information which identifies infringing<br />
activity, a computer system operator cannot be liable for contributory infringement merely because the structure<br />
of the system allows for the exchange of copyrighted material.”); Parker v. Google, Inc., 422 F. Supp. 2d 492,<br />
501 (E.D. Pa. 2006), aff’d 242 Fed. Appx. 833 (3rd Cir. 2007) (holding that plaintiff “fails to allege that Google<br />
had requisite knowledge of a third party’s infringing activity, a failure that is fatal to this claim”; finding<br />
insufficient letter to Google that “merely states that the USENET archives contain links to a website that<br />
‘contains several postings of mine for which I have not authorized reproduction’ and does not make any mention<br />
of specific registered works.”).<br />
78. See Capitol Records, Inc. v. MP3tunes, LLC, 821 F. Supp. 2d 627, 648 (S.D.N.Y. Oct. 25, 2011)<br />
(“EMI also established that thousands of MP3tunes users visited those infringing links and sideloaded EMI’s<br />
copyrighted works into their lockers. Moreover, it is undisputed that MP3tunes kept track of that activity. . . .<br />
Thus, there is no genuine dispute that MP3tunes had actual knowledge its users had stored and continued to<br />
have access to infringing copies of Plaintiffs’ works.”); Usenet.com, 633 F. Supp. 2d at 148-49 (rejecting<br />
“passive conduit” defense where, inter alia, defendants were “aware that digital music files were among the<br />
most popular articles on their service”).<br />
79. No. CV 06-5578, 2009 WL 6355911 (C.D. Cal. Dec. 21, 2009).<br />
80. See, e.g., Ellison, 357 F.3d at 1077 (finding that plaintiff emailed AOL about his copyright infringement<br />
claim and that AOL, despite its changed email address, should have been on notice of the infringing activity);<br />
Capitol Records, Inc., 821 F. Supp. 2d at 648 (“MP3tunes’ knowledge of the unauthorized use of infringing<br />
sideloaded material is manifest. EMI sent three separate takedown notifications identifying hundreds of specific<br />
copyrighted works and the specific links on the Sideload website unlawfully distributing those works.”); Vulcan<br />
Golf, LLC v. Google Inc., 552 F. Supp. 2d 752, 770 (N.D. Ill. 2008) (in trademark context, refusing to dismiss<br />
complaint where complaint “alleges that Google was aware of the allegedly infringing nature of the purportedly<br />
deceptive domains” where “notice” provided and “Defendants intentionally and blatantly continue to engage in<br />
the Deceptive Domain Scheme and the other illegal action alleged herein....’)”). But see Costar Group Inc. v.<br />
Loopnet, Inc., 164 F. Supp. 2d 688, 707 (D. Md. 2001) (“notification did not automatically equate to knowledge<br />
for the purpose of assessing liability. Netcom stands for the proposition that the bare claim of infringement by a<br />
copyright holder does not necessarily give rise to knowledge of an infringement.”).<br />
81. See ALS Scan, Inc. v. RemarQ Communities, Inc., 239 F.3d 619, 622 (4th Cir. 2001) (plaintiff alerted<br />
the defendant to infringement in sufficient detail for DMCA safe harbor purposes when it “identified two sites<br />
created for the sole purpose of publishing ALS Scan’s copyrighted works” and “virtually all the images at the<br />
two sites were [ALS Scan’s] copyrighted material’”).<br />
82. For example, some advertising networks have terms of service that define websites to which they will<br />
not provide advertisements, including sites that violate copyright laws. Postings on blogs and other Internet<br />
commentaries indicate that ad networks do review and reject some applicants. Ad networks may also audit the<br />
actual appearance of the ad and ensure that other terms of the agreement have been honored.<br />
83. 213 F. Supp. 2d 1146 (C.D. Cal. 2002).<br />
38