13.07.2015 Views

Advanced Copyright Issues on the Internet - Fenwick & West LLP

Advanced Copyright Issues on the Internet - Fenwick & West LLP

Advanced Copyright Issues on the Internet - Fenwick & West LLP

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ADVANCED COPYRIGHT ISSUESON THE INTERNETDavid L. Hayes, Esq. *FENWICK & WEST <strong>LLP</strong>*Chairman of Intellectual Property Practice Group, <strong>Fenwick</strong> & <strong>West</strong> <strong>LLP</strong>, Mountain View & San Francisco,California. B.S.E.E. (Summa Cum Laude), Rice University (1978); M.S.E.E., Stanford University (1980); J.D.(Cum Laude), Harvard Law School (1984). An earlier versi<strong>on</strong> of this paper appeared in David L. Hayes,“<str<strong>on</strong>g>Advanced</str<strong>on</strong>g> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> <str<strong>on</strong>g>Issues</str<strong>on</strong>g> <strong>on</strong> <strong>the</strong> <strong>Internet</strong>,” 7 Tex. Intell. Prop. L.J. 1 (Fall 1998).© 1997-2010 David L. Hayes. All Rights Reserved.(Updated as of Oct. 2010)


TABLE OF CONTENTSI. INTRODUCTION 12II. RIGHTS IMPLICATED BY TRANSMISSION AND USE OF WORKS ON THEINTERNET 13A. The Right of Reproducti<strong>on</strong> 141. The Ubiquitous Nature of “Copies” <strong>on</strong> <strong>the</strong> <strong>Internet</strong> 142. Whe<strong>the</strong>r Images of Data Stored in RAM Qualify as “Copies” 153. The WIPO Treaties & <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive Are Unclear WithRespect to Interim “Copies” 21(a) Introducti<strong>on</strong> to <strong>the</strong> WIPO Treaties & <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>Directive 21(b) The WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty 23(c) The WIPO Performances and Ph<strong>on</strong>ograms Treaty 264. Whe<strong>the</strong>r Voliti<strong>on</strong> Is Required for Direct Liability 28(a) The Netcom Case 29(b) The MAPHIA Case 31(c) The Sabella Case 32(d) The Frena Case 33(e) The Webbworld Case 34(f) The Sanfilippo Case 35(g) The Free Republic Case 36(h) The MP3.com Cases 37(i) The CoStar Case 41(j) The Ellis<strong>on</strong> Case 42(k) Perfect 10 v. Cybernet Ventures 42(l) Field v. Google 43(m) Parker v. Google 44(n) The Cablevisi<strong>on</strong> Case 44(o) Arista Records v. Usenet.com 47(p) Quantum Systems v. Sprint Nextel 48(q) Summary of Case Law 495. The Reproducti<strong>on</strong> Right Under WIPO Implementing Legislati<strong>on</strong> 49(a) United States Legislati<strong>on</strong> 49(1) The Digital Millennium <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act 50(2) Legislati<strong>on</strong> Not Adopted 50(b) The European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive 52- 2 -


6. Peer-to-Peer File Sharing 57(a) BMG Music v. G<strong>on</strong>zalez 57(b) Columbia Pictures v. Bunnell 58(c) S<strong>on</strong>y BMG Music Entertainment v. Tenenbaum 587. The Immunity of <strong>the</strong> Audio Home Recording Act (AHRA) 61(a) The Napster Cases 61(b) The Aimster Case 61(c) Atlantic Recording Corp. v. XM Satellite Radio 62B. The Right of Public Performance 641. Isochr<strong>on</strong>ous Versus Asynchr<strong>on</strong>ous Transmissi<strong>on</strong>s 652. The Meaning of “Publicly” 663. Live Nati<strong>on</strong> Motor Sports v. Davis 674. United States v. ASCAP 685. The Cablevisi<strong>on</strong> Case 686. Ringt<strong>on</strong>es – In re Applicati<strong>on</strong> of Cellco Partnership 70C. The Right of Public Display 721. The Frena, Marobie-FL, Hardenburgh and Webbworld Cases 722. Kelly v. Arriba Soft 743. Ticketmaster v. Tickets.com 774. Perfect 10 v. Google (aka Perfect 10 v. Amaz<strong>on</strong>) 775. Healthcare Advocates, Inc. v. Harding, Earley, Follmer & Frailey 896. ICG-<strong>Internet</strong> Commerce Group, Inc. v. Wolf 91D. The Right of Public Distributi<strong>on</strong> 911. The Requirement of a “Copy” 91(a) Cases Addressing Whe<strong>the</strong>r Mere Posting Is a Distributi<strong>on</strong> 92(1) Cases Holding That Mere Posting Is a Distributi<strong>on</strong> 93(2) Cases Holding That Mere Posting Is Not a Distributi<strong>on</strong> 97(3) Cases Refusing To Decide <strong>the</strong> Issue 1052. The Requirement of a “Public” Distributi<strong>on</strong> 1063. The Requirement of a Rental or Transfer of Ownership 1064. The Right of Distributi<strong>on</strong> Under <strong>the</strong> WIPO Treaties 1075. The Right of Distributi<strong>on</strong> Under WIPO Implementing Legislati<strong>on</strong> 108(a) United States Legislati<strong>on</strong> 108(b) The European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive 108- 3 -


E. The Right of Importati<strong>on</strong> 109F. The New Right of Transmissi<strong>on</strong> and Access Under <strong>the</strong> WIPO Treaties 1101. The Right of Communicati<strong>on</strong> to <strong>the</strong> Public in <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty 1102. The Right of Making Available to <strong>the</strong> Public in <strong>the</strong> WIPO Performancesand Ph<strong>on</strong>ograms Treaty 1123. The Right of Transmissi<strong>on</strong> and Access Under WIPO ImplementingLegislati<strong>on</strong> 113(a) United States Legislati<strong>on</strong> 113(b) The European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive 114G. New Rights and Provisi<strong>on</strong>s Under The Digital Millennium <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act, <strong>the</strong>European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive & Legislati<strong>on</strong> That Did Not Pass 1161. Circumventi<strong>on</strong> of Technological Measures and Rights ManagementInformati<strong>on</strong> Under <strong>the</strong> DMCA 116(a) Circumventi<strong>on</strong> of Technological Protecti<strong>on</strong> Measures 117(1) Prohibiti<strong>on</strong> <strong>on</strong> C<strong>on</strong>duct 117(i) Exempti<strong>on</strong>s Adopted by <strong>the</strong> Librarian of C<strong>on</strong>gress 118a. Scope of <strong>the</strong> Network C<strong>on</strong>necti<strong>on</strong> Exempti<strong>on</strong> – TheTracF<strong>on</strong>e Cases 122(ii) Epic Games v. Altmeyer 125(iii) Facebook v. Power Ventures 126(iv) Bose v. Zavala 126(2) Prohibiti<strong>on</strong> <strong>on</strong> Devices 127(i) S<strong>on</strong>y Computer Entertainment America v. Gamemasters 128(ii) DirecTV, Inc. v. Borow 129(iii) S<strong>on</strong>y Computer Entertainment America v. Divineo 129(iv) DirecTV, Inc. v. Carrillo 130(v) Ticketmaster L.L.C. v. RMG Technologies, Inc 130(vi) The Tracf<strong>on</strong>e Cases 131(vii) Movida Communicati<strong>on</strong>s, Inc. v. Haifa 131(viii) Microsoft Corp. v. EEE Business Inc 131(ix) MDY Industries v. Blizzard Entertainment 132(x) Coup<strong>on</strong>s, Inc. v. Stottlemire 134(xi) CoxCom, Inc. v. Chafee 135(xii) DISH Network v. S<strong>on</strong>icview 136(xiii) Realnetworks v. DVD Copy C<strong>on</strong>trol Associati<strong>on</strong> 136(xiv) Apple v. Psystar 138- 4 -


(xv) Craigslist v. Naturemarket 140(3) What C<strong>on</strong>stitutes an Effective Technological Measure 140(i) Auto Inspecti<strong>on</strong> Services v. Flint Auto Aucti<strong>on</strong> 140(ii) Healthcare Advocates, Inc. v. Harding, Earley, Follmer &Frailey 141(iii) Apple v. Psystar 144(4) No Requirements With Respect to Design of a Product 144(5) O<strong>the</strong>r Rights Not Affected 144(6) Exempti<strong>on</strong> for N<strong>on</strong>profit Organizati<strong>on</strong>s and Law Enforcement 145(7) Reverse Engineering for Interoperability 146(i) Universal City Studios Inc. v. Reimerdes 151(ii) Storage Technology Corporati<strong>on</strong> v. Custom HardwareEngineering & C<strong>on</strong>sulting 152(iii) Chamberlain Group, Inc. v. Skylink Technologies, Inc 152(iv) Lexmark Internati<strong>on</strong>al, Inc. v. Static C<strong>on</strong>trolComp<strong>on</strong>ents, Inc 153(v) Davids<strong>on</strong> Assocs. v. <strong>Internet</strong> Gateway 153(vi) S<strong>on</strong>y Computer Entertainment America v. Divineo 157(8) Encrypti<strong>on</strong> Research 157(9) Protecti<strong>on</strong> of Minors 158(10) Protecti<strong>on</strong> of Pers<strong>on</strong>ally Identifying Informati<strong>on</strong> 158(11) Security Testing 158(12) Copy Restricti<strong>on</strong>s To Be Built Into VCRs and Camcorders 158(13) O<strong>the</strong>r Cases Filed Under <strong>the</strong> Anti-Circumventi<strong>on</strong> Provisi<strong>on</strong>s 159(i) S<strong>on</strong>y Computer Entertainment, Inc. v. C<strong>on</strong>nectix, Inc 159(ii) RealNetworks, Inc. v. Streambox Inc 160(iii) Universal City Studios, Inc. v. Reimerdes 164(iv) A Related DVD Case Involving Trade Secret Claims –DVD Copy C<strong>on</strong>trol Associati<strong>on</strong>, Inc. v. McLaughlin (<strong>the</strong>Bunner case) 169(v)A Related DVD Case – Norwegian Prosecuti<strong>on</strong> of J<strong>on</strong>Johansen 173(vi) Ano<strong>the</strong>r Challenge to <strong>the</strong> DMCA – The Felten Case 173(vii) Pearl Investments, LLC v. Standard I/O, Inc 174(viii) 321 Studios v. Metro Goldwyn Mayer Studios, Inc 175(ix)I.M.S. Inquiry Management Systems, Ltd. v. BerkshireInformati<strong>on</strong> Systems, Inc 176(x) Paramount Pictures Corp. v. 321 Studios 177(xi) Macrovisi<strong>on</strong> Corp. v. 321 Studios 177(xii) Comcast of Illinois X v. Hightech Electr<strong>on</strong>ics, Inc 177- 5 -


(xiii) Davids<strong>on</strong> & Assocs. v. <strong>Internet</strong> Gateway 178(xiv) Agfa M<strong>on</strong>otype Corp. v. Adobe Sys 178(xv) Egilman v. Keller & Heckman 181(xvi) Macrovisi<strong>on</strong> v. Sima Products Corp 181(xvii) Nordstrom C<strong>on</strong>sulting, Inc. v. M&S Technologies, Inc 182(xviii) R.C. Olmstead v. CU Interface 183(xix) Avaya v. Telecom Labs 183(xx) Actuate v. IBM 184(14) Criminal Prosecuti<strong>on</strong>s Under <strong>the</strong> DMCA 185(i) The Sklyarov/Elcomsoft Case 185(ii) O<strong>the</strong>r Criminal Prosecuti<strong>on</strong>s Under <strong>the</strong> DMCA 186(15) O<strong>the</strong>r Uses of <strong>the</strong> Anti-Circumventi<strong>on</strong> Provisi<strong>on</strong>s as a Sword 187(i) Lexmark Internati<strong>on</strong>al, Inc. v. Static C<strong>on</strong>trolComp<strong>on</strong>ents, Inc 187(ii) Chamberlain Group, Inc. v. Skylink Technologies, Inc 193(iii) In re Certain Universal Transmitters for Garage DoorOpeners 199(iv) Storage Technology Corporati<strong>on</strong> v. Custom HardwareEngineering & C<strong>on</strong>sulting 200(b) Integrity of <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Management Informati<strong>on</strong> 204(1) Definiti<strong>on</strong> of CMI 204(i) The IQ Group, Ltd. v. Wiesner Publishing, LLC 205(ii) McClatchey v. The Associated Press 207(iii) Textile Secrets Int’l, Inc. v. Ya-Ya Brand Inc 208(iv) Jacobsen v. Katzer 209(v) Associated Press v. All Headline News Corp 210(vi) Silver v. Lavadeira 210(vii) Fox v. Hildebrand 211(viii) Jacobsen v. Katzer 211(ix) Murphy v. Millennium Radio Group LLC 212(2) Prohibiti<strong>on</strong>s <strong>on</strong> False CMI or Altering CMI 212(i) Thomas M Gilbert Architects v. Accent Builders 212(3) Excepti<strong>on</strong>s and Limitati<strong>on</strong>s 212(4) Cases Filed Under <strong>the</strong> CMI Provisi<strong>on</strong>s 213(i) Kelly v. Arriba Soft Corp 213(ii) Thr<strong>on</strong> v. Harper Collins Publishers 214- 6 -


(iii) Gord<strong>on</strong> v. Nextel Communicati<strong>on</strong>s 214(iv) Schiffer Publishing, Ltd. v. Chr<strong>on</strong>icle Books, LLC 215(v) M<strong>on</strong>otype Imaging, Inc. v. Bitstream Inc 216(vi) Keogh v. Big Lots Corp 218(vii) Goldman v. Healthcare Management Systems 219(c) Remedies for Violati<strong>on</strong>s of Secti<strong>on</strong>s 1201 and 1202 219(1) Statutory Damages 219(i) S<strong>on</strong>y Computer Entertainment America v. Filipiak 219(ii) S<strong>on</strong>y Computer Entertainment v. Divineo 220(iii) McClatchey v. The Associated Press 221(iv) MDY Industries, LLC v. Blizzard Entertainment, Inc 222(2) Jurisdicti<strong>on</strong>al <str<strong>on</strong>g>Issues</str<strong>on</strong>g> – Blueport Co. v. United States 222(d) Alternative Approaches to <strong>the</strong> DMCA That Did Not Pass 222(e) The Battle Between C<strong>on</strong>tent Owners and Technology Companies OverBuilt-In Technological Measures 2232. Anticircumventi<strong>on</strong> Provisi<strong>on</strong>s Under <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive 2243. Anti-Circumventi<strong>on</strong> Provisi<strong>on</strong>s in O<strong>the</strong>r Foreign Countries 2274. Fair Use 228(a) United States Legislati<strong>on</strong> That Did Not Pass 228(b) The European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive 2285. Expansi<strong>on</strong> of Library/Archives Exempti<strong>on</strong>s 2296. Distance Educati<strong>on</strong> 2307. Copying in <strong>the</strong> Course of Computer Maintenance or Repair 2308. O<strong>the</strong>r Provisi<strong>on</strong>s of <strong>the</strong> DMCA 231(a) Evaluati<strong>on</strong> of Impact of <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Law <strong>on</strong> Electr<strong>on</strong>ic Commerce 231(b) Clarificati<strong>on</strong> of <strong>the</strong> Authority of <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office 232(c) Ephemeral Recordings 232(d) Statutory Licenses With Respect to Performances of SoundRecordings 233(e) Assumpti<strong>on</strong> of C<strong>on</strong>tractual Obligati<strong>on</strong>s Related to Transfers of Rightsin Moti<strong>on</strong> Pictures 233(f) Protecti<strong>on</strong> of Certain Industrial Designs 234(1) Protecti<strong>on</strong> of Designs Embodied in Useful Articles 234(2) Originality 235(3) Exclusi<strong>on</strong>s from Protecti<strong>on</strong> 235(4) Adaptati<strong>on</strong>s of Unprotectable Elements 236(5) Durati<strong>on</strong> of Protecti<strong>on</strong> and Design Notice 236- 7 -


(6) Rights of a Design Owner and Limitati<strong>on</strong>s 236(7) Standard of Infringement 237(8) Benefit of Foreign Filing Date 237(9) Vesting and Transfer of Ownership 238(10) Remedies of Injunctive Relief, Damages, Attorneys’ Fees andDestructi<strong>on</strong> 238(11) Private Rights of Acti<strong>on</strong> Against Pirated Designs 238(12) Relati<strong>on</strong> to Design Patents and Retroactive Effect 238(g) Limitati<strong>on</strong> of Liability of Online Service Providers 238(h) Subpoenas to Service Providers 239(1) Jurisdicti<strong>on</strong>al <str<strong>on</strong>g>Issues</str<strong>on</strong>g> 239(2) RIAA v. Veriz<strong>on</strong> <strong>Internet</strong> Services 240(3) The Charter Communicati<strong>on</strong>s Litigati<strong>on</strong> 243(4) Fatwallet v. Best Buy 244(5) In re Subpoena to University of North Carolina at Chapel Hill 244(6) Subpoenas in John Doe Acti<strong>on</strong>s 245(7) Interscope Records v. Does 1-7 2459. Proposed Limitati<strong>on</strong> of Scope of Shrinkwrap and Clickwrap Licenses ThatDid Not Pass 246III. APPLICATION OF COPYRIGHT RIGHTS TO SPECIFIC ACTS ON THEINTERNET 247A. Browsing 247B. Caching 2491. Types of Caching 2502. The Detriments of Caching 2503. The Netcom Case and Applicati<strong>on</strong> of <strong>the</strong> Fair Use Doctrine 252(a) Purpose and Character of <strong>the</strong> Use 253(b) Nature of <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>ed Work 253(c) Amount and Substantiality of <strong>the</strong> Porti<strong>on</strong> Used 254(d) Effect of Use <strong>on</strong> <strong>the</strong> Potential Market 2554. Cases Adjudicating Caching Under <strong>the</strong> Fair Use and Implied LicenseDoctrines 256(a) Field v. Google 256(b) Perfect 10 v. Google (aka Perfect 10 v. Amaz<strong>on</strong>) 260(c) Ticketmaster L.L.C. v. RMG Technologies, Inc 261(d) Parker v. Yahoo!, Inc 2625. O<strong>the</strong>r Caching Cases 263- 8 -


(a) Facebook v. Power Ventures 263C. Liability of Online Service Providers 2631. Direct Liability 263(a) Louis Vuitt<strong>on</strong> v. Akanoc Soluti<strong>on</strong>s 2642. C<strong>on</strong>tributory Liability 265(a) The Netcom Case 266(b) The MAPHIA Case 266(c) The Peer-to-Peer Filing Sharing Cases 267(1) The Napster Cases 267(2) The Scour.com Lawsuit 303(3) The Aimster/Madster Lawsuits 304(4) The StreamCast/Kazaa/Grokster Lawsuits 310(5) The Supreme Court’s Grokster Decisi<strong>on</strong> 317(6) The Grokster Decisi<strong>on</strong> <strong>on</strong> Remand 332(i) The Ruling <strong>on</strong> Liability 332(ii) The Permanent Injuncti<strong>on</strong> 336(7) The Audiogalaxy Case 339(8) The Hummer Winblad/Bertelsmann Litigati<strong>on</strong> 340(d) The CoStar Case 343(e) Ellis<strong>on</strong> v. Roberts<strong>on</strong> 344(f) Perfect 10 v. Cybernet Ventures 345(g) Perfect 10 v. Visa Internati<strong>on</strong>al 346(h) Parker v. Google 348(i) MDY Industries v. Blizzard Entertainment 348(j) Louis Vuitt<strong>on</strong> v. Akanoc Soluti<strong>on</strong>s, Inc 349(k) Arista Records v. Usenet.com 351(l) Summary 3523. Vicarious Liability 353(a) The Netcom Case and its Progeny 354(b) The Napster Cases 355(c) Ellis<strong>on</strong> v. Roberts<strong>on</strong> 355(d) Perfect 10 v. Cybernet Ventures 355(e) The Aimster/Madster Lawsuits 356(f) The StreamCast/Kazaa/Grokster Lawsuits 357(g) Perfect 10 v. Visa Internati<strong>on</strong>al 359(h) Parker v. Google 361- 9 -


(i) Louis Vuitt<strong>on</strong> v. Akanoc Soluti<strong>on</strong>s 361(j) Live Face <strong>on</strong> Web v. Howard Stern Producti<strong>on</strong>s 362(k) Arista Records v. Usenet.com 362(l) Corbis v. Starr 3634. Inducement Liability 364(a) The Supreme Court’s Grokster Decisi<strong>on</strong> 364(b) Arista Records v. Usenet.com 364(c) Columbia Pictures v. Fung 3655. Limitati<strong>on</strong>s of Liability of Online Service Providers in <strong>the</strong> DMCA 368(a) History of <strong>the</strong> Various Legislative Efforts 368(b) The OSP Liability Provisi<strong>on</strong>s of <strong>the</strong> DMCA 369(1) Safe Harbors – Definiti<strong>on</strong> of a “Service Provider” 370(i) Acting as a Mere C<strong>on</strong>duit for Infringing Informati<strong>on</strong> –Secti<strong>on</strong> 512(a) 370a. The Napster Case 371b. Ellis<strong>on</strong> v. Roberts<strong>on</strong> 373c. The Aimster/Madster Lawsuits 378d. Perfect 10 v. CCBill 380e. Columbia Pictures v. Fung 387(ii) Caching – Secti<strong>on</strong> 512(b) 387a. Field v. Google 389b. Parker v. Google 391(iii)Innocent Storage of Infringing Informati<strong>on</strong> – Secti<strong>on</strong>512(c) 391a. The ALS Scan Case – What C<strong>on</strong>stitutes a“Substantially” Compliant Notice 394b. Hendricks<strong>on</strong> v. eBay 397c. CoStar v. LoopNet 401d. Perfect 10 v. Cybernet Ventures 409e. The Aimster/Madster Lawsuits 412f. Hendricks<strong>on</strong> v. Amaz<strong>on</strong>.com 412g. Rossi v. MPAA 414h. Perfect 10 v. CCBill 415i. Corbis Corp. v. Amaz<strong>on</strong>.com, Inc 417j. Tur v. YouTube, Inc 422k. Io Group v. Veoh Networks 423- 10 -


l. UMG Recordings v. Veoh Networks 427m. Perfect 10 v. Amaz<strong>on</strong> 432(iv)Referral or Linking to Infringing Material (Informati<strong>on</strong>Locati<strong>on</strong> Tools) – Secti<strong>on</strong> 512(d) 435a. The Napster Case 436b. Perfect 10 v. Cybernet Ventures 437c. The MP3Board Case 437d. The Aimster/Madster Lawsuits 437e. The Diebold Lawsuit 438f. Perfect 10 v. CCBill 440g. Columbia Pictures v. Fung 441(2) General Requirements for Limitati<strong>on</strong>s of Liability 442(3) Special Provisi<strong>on</strong>s for N<strong>on</strong>profit Educati<strong>on</strong>al Instituti<strong>on</strong>s 442(4) Filing of False DMCA Notices – Secti<strong>on</strong> 512(f) 443(i) Rossi v. MPAA 443(ii) Online Policy Group v. Diebold, Inc 444(iii) Dudnikov v. MGA Entertainment 444(iv) Novotny v. Chapman 444(v) BioSafe-One, Inc. v. Hawks 445(vi) Lenz v. Universal Music Corp 445(vii) UMG Recordings v. Augusto 448(viii) Capitol Records v. MP3tunes, LLC 449(ix) Brave New Films v. Weiner 450(5) O<strong>the</strong>r Provisi<strong>on</strong>s 451(6) Injuncti<strong>on</strong>s Against Service Providers 451(7) Designati<strong>on</strong> of Agent to Receive Notificati<strong>on</strong> of ClaimedInfringement 4526. Limitati<strong>on</strong>s of Liability of Online Service Providers under <strong>the</strong>Communicati<strong>on</strong>s Decency Act 453(a) St<strong>on</strong>er v. eBay 453(b) Perfect 10 v. CCBill 4557. Sec<strong>on</strong>dary Liability of Investors 455(a) The Hummer Winblad/Bertelsmann Litigati<strong>on</strong> 455(b) UMG Recordings v. Veoh Networks 455D. Linking and Framing 4561. The Shetland Times Case 459- 11 -


2. The Total News Case 4603. The Seattle Sidewalk Case 4614. The Futured<strong>on</strong>tics Case 4635. The Bernstein Case 4636. The Intellectual Reserve Case 4647. Ticketmaster v. Tickets.com 4658. The MP3Board Case 4689. Kelly v. Arriba Soft 47110. Batesville Services, Inc. v. Funeral Depot, Inc 47111. Live Nati<strong>on</strong> Sports v. Davis 47312. Perfect 10 v. Google (aka Perfect 10 v. Amaz<strong>on</strong>) 474E. Streaming and Downloading 4741. The Digital Performance Right – The Secti<strong>on</strong> 114(d)(1) Exempti<strong>on</strong> andStreaming by FCC-Licensed Broadcasters 4742. The Digital Performance Right – Statutory Licenses Under Secti<strong>on</strong> 114 forCertain N<strong>on</strong>subscripti<strong>on</strong> and Subscripti<strong>on</strong> Services 478(a) Preexisting Subscripti<strong>on</strong> Services 480(b) Eligible N<strong>on</strong>subscripti<strong>on</strong> Services (Webcasters) 482(c) New Subscripti<strong>on</strong> Services 4883. The Digital Performance Right – What C<strong>on</strong>stitutes an “Interactive” Service 489(a) Arista Records v. Launch Media 4914. The Reproducti<strong>on</strong> Right – Mechanical Licenses andStreaming/Downloading 494(a) Applicability of <strong>the</strong> Secti<strong>on</strong> 115 Compulsory License to Streaming 495(b) The <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office’s Positi<strong>on</strong> – The 2001 DMCA Report andComment Proceedings 497(c) The NMPA/HFA/RIAA Agreement of 2001 500(d) Applicability of <strong>the</strong> Secti<strong>on</strong> 115 Compulsory License to Ringt<strong>on</strong>es 5015. Internati<strong>on</strong>al Licensing Efforts 502F. First Sales in Electr<strong>on</strong>ic Commerce 502G. Pop-Up Advertising 5051. The Gator Litigati<strong>on</strong>s 5052. The WhenU Litigati<strong>on</strong>s 506(a) U-Haul v. WhenU.com 507(b) Wells Fargo v. WhenU.com 508(c) 1-800 C<strong>on</strong>tacts v. WhenU.com 510- 12 -


3. The MetroGuide Litigati<strong>on</strong> 5134. The D Squared Litigati<strong>on</strong> 5135. Internati<strong>on</strong>al Decisi<strong>on</strong>s 514H. Harvesting of Web Data 5141. The FatWallet Dispute 5142. Nautical Soluti<strong>on</strong>s Marketing v. Boats.com 515IV. CONCLUSION 516- 13 -


ADVANCED COPYRIGHT ISSUESON THE INTERNETI. INTRODUCTIONDuring recent years, <strong>the</strong> <strong>Internet</strong> has become <strong>the</strong> basic foundati<strong>on</strong>al infrastructure for <strong>the</strong>global movement of data of all kinds. With c<strong>on</strong>tinued growth at a phenomenal rate, <strong>the</strong> <strong>Internet</strong>has moved from a quiet means of communicati<strong>on</strong> am<strong>on</strong>g academic and scientific research circlesinto ubiquity in both <strong>the</strong> commercial arena and private homes. The <strong>Internet</strong> is now a majorglobal data pipeline through which large amounts of intellectual property are moved. As thispipeline is increasingly used in <strong>the</strong> mainstream of commerce to sell and deliver creative c<strong>on</strong>tentand informati<strong>on</strong> across transnati<strong>on</strong>al borders, issues of intellectual property protecti<strong>on</strong> for <strong>the</strong>material available <strong>on</strong> and through <strong>the</strong> <strong>Internet</strong> are rising in importance.<str<strong>on</strong>g>Copyright</str<strong>on</strong>g> law provides <strong>on</strong>e of <strong>the</strong> most important forms of intellectual propertyprotecti<strong>on</strong> <strong>on</strong> <strong>the</strong> <strong>Internet</strong> for at least two reas<strong>on</strong>s. First, much of <strong>the</strong> material that moves incommerce <strong>on</strong> <strong>the</strong> <strong>Internet</strong> is works of authorship, such as musical works, multimedia works,audiovisual works, movies, software, database informati<strong>on</strong> and <strong>the</strong> like, which are within <strong>the</strong>usual subject matter of copyright. Sec<strong>on</strong>d, because <strong>the</strong> very nature of an electr<strong>on</strong>ic <strong>on</strong>linemedium requires that data be “copied” as it is transmitted through <strong>the</strong> various nodes of <strong>the</strong>network, copyright rights are obviously at issue.Traditi<strong>on</strong>al copyright law was designed to deal primarily with <strong>the</strong> creati<strong>on</strong>, distributi<strong>on</strong>and sale of protected works in tangible copies. 1 In a world of tangible distributi<strong>on</strong>, it is generallyeasy to know when a “copy” has been made. The nature of <strong>the</strong> <strong>Internet</strong>, however, is such that itis often difficult to know precisely whe<strong>the</strong>r a “copy” of a work has been made and, if so, where itresides at any given time within <strong>the</strong> network. As described fur<strong>the</strong>r below, informati<strong>on</strong> is sentthrough <strong>the</strong> <strong>Internet</strong> using a technology known as “packet switching,” in which data is broken upinto smaller units, or “packets,” and <strong>the</strong> packets are sent as discrete units. As <strong>the</strong>se packets passthrough <strong>the</strong> random access memory (RAM) of each interim computer node <strong>on</strong> <strong>the</strong> network, are“copies” of <strong>the</strong> work being made?The case of MAI Systems Corp. v. Peak Computer 2 held that loading a computer programinto <strong>the</strong> RAM of a computer c<strong>on</strong>stituted <strong>the</strong> making of a “copy” within <strong>the</strong> purview of copyrightlaw. This case has been followed by a number of o<strong>the</strong>r courts. Under <strong>the</strong> rati<strong>on</strong>ale of this case, a“copy” may be created under United States law at each stage of transmissi<strong>on</strong> of a work through<strong>the</strong> <strong>Internet</strong>. The language of two treaties discussed extensively in this paper – <strong>the</strong> WIPO<str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty 3 and <strong>the</strong> WIPO Performances and Ph<strong>on</strong>ograms Treaty 4 – leave unclear <strong>the</strong>123For example, under United States law, copyright protecti<strong>on</strong> subsists <strong>on</strong>ly in “works of authorship fixed in anytangible medium of expressi<strong>on</strong>, now known or later developed, from which <strong>the</strong>y can be perceived, reproduced,or o<strong>the</strong>rwise communicated, ei<strong>the</strong>r directly or with <strong>the</strong> aid of a machine or device.” 17 U.S.C. § 102(a).991 F.2d 511 (9th Cir. 1993), cert. dismissed, 114 S. Ct. 672 (1994).World Intellectual Property Organizati<strong>on</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty, Apr. 12, 1997, S. Treaty Doc. No. 105-17 (1997).- 12 -


crucial questi<strong>on</strong> whe<strong>the</strong>r <strong>the</strong> MAI approach will be internati<strong>on</strong>alized. In any event, <strong>the</strong>se twotreaties would streng<strong>the</strong>n copyright holders’ rights of “distributi<strong>on</strong>” and would create new rightsof “making available to <strong>the</strong> public” a copyrighted work, both of which are implicated bytransmissi<strong>on</strong>s through <strong>the</strong> <strong>Internet</strong> nearly as broadly as <strong>the</strong> right of reproducti<strong>on</strong>.The ubiquitous nature of “copying” in <strong>the</strong> course of physical transmissi<strong>on</strong> gives <strong>the</strong>copyright owner potentially very str<strong>on</strong>g rights with respect to <strong>the</strong> movement of copyrightedmaterial through <strong>the</strong> <strong>Internet</strong>, and has moved copyright to <strong>the</strong> center of attenti<strong>on</strong> as a form ofintellectual property <strong>on</strong> <strong>the</strong> <strong>Internet</strong>. If <strong>the</strong> law categorizes all interim and received transmissi<strong>on</strong>sas “copies” for copyright law purposes, or treats all such transmissi<strong>on</strong>s as falling within <strong>the</strong> rightof distributi<strong>on</strong> of <strong>the</strong> copyright owner, <strong>the</strong>n activities that have been permissible with respect totraditi<strong>on</strong>al tangible copies of works, such as browsing and transfer, may now fall within <strong>the</strong>c<strong>on</strong>trol of <strong>the</strong> copyright holder.This paper discusses <strong>the</strong> multitude of areas in which copyright issues arise in an <strong>on</strong>linec<strong>on</strong>text. Although <strong>the</strong> issues will, for simplicity of reference, be discussed in <strong>the</strong> c<strong>on</strong>text of <strong>the</strong><strong>Internet</strong>, <strong>the</strong> analysis applies to any form of <strong>on</strong>line usage of copyrighted works. Part II of thispaper discusses <strong>the</strong> various copyright rights that may be implicated by transmissi<strong>on</strong>s and use ofworks <strong>on</strong> <strong>the</strong> <strong>Internet</strong>, including new rights and remedies, as well as certain limitati<strong>on</strong>s <strong>on</strong>liability for <strong>on</strong>line service providers afforded under federal statutes. Part III <strong>the</strong>n analyzes <strong>the</strong>applicati<strong>on</strong> of those rights to various activities <strong>on</strong> <strong>the</strong> <strong>Internet</strong>, such as browsing, caching,operati<strong>on</strong> of an <strong>on</strong>line service or bulletin board, linking to o<strong>the</strong>r sites, creati<strong>on</strong> of derivativeworks, and resale or subsequent transfer of works downloaded from <strong>the</strong> <strong>Internet</strong>. Part III alsoanalyzes <strong>the</strong> applicati<strong>on</strong> of <strong>the</strong> fair use doctrine and <strong>the</strong> implied license doctrine to various<strong>Internet</strong> activities. Because <strong>the</strong> law is still developing with respect to many of <strong>the</strong>se issues, agreat deal of uncertainty is likely to exist as <strong>the</strong> issues are worked out over time through <strong>the</strong>courts and <strong>the</strong> various relevant legislative bodies and industry organizati<strong>on</strong>s.II.RIGHTS IMPLICATED BY TRANSMISSION AND USEOF WORKS ON THE INTERNETThis Part discusses <strong>the</strong> various rights of <strong>the</strong> copyright holder – <strong>the</strong> right of reproducti<strong>on</strong>,<strong>the</strong> right of public performance, <strong>the</strong> right of public display, <strong>the</strong> right of public distributi<strong>on</strong>, <strong>the</strong>right of importati<strong>on</strong>, and <strong>the</strong> new rights of transmissi<strong>on</strong> and access – that are implicated by <strong>the</strong>transmissi<strong>on</strong> and use of works <strong>on</strong> <strong>the</strong> <strong>Internet</strong>.A. The Right of Reproducti<strong>on</strong>The single most important copyright right implicated by <strong>the</strong> transmissi<strong>on</strong> and use ofworks <strong>on</strong> <strong>the</strong> <strong>Internet</strong> is <strong>the</strong> right of reproducti<strong>on</strong>. As elaborated below, if <strong>the</strong> law categorizes allinterim and received transmissi<strong>on</strong>s as “copies” for copyright law purposes, <strong>the</strong>n a broad range of4World Intellectual Property Organizati<strong>on</strong> Performances and Ph<strong>on</strong>ograms Treaty, Apr. 12, 1997, S. Treaty Doc.No. 105-17 (1997).- 13 -


ordinary activities <strong>on</strong> <strong>the</strong> <strong>Internet</strong>, such as browsing, caching, and access of informati<strong>on</strong>, may fallwithin <strong>the</strong> copyright holder’s m<strong>on</strong>opoly rights.1. The Ubiquitous Nature of “Copies” <strong>on</strong> <strong>the</strong> <strong>Internet</strong>Under current technology, informati<strong>on</strong> is transmitted through <strong>the</strong> <strong>Internet</strong> using atechnique known broadly as “packet switching.” Specifically, data to be transmitted through <strong>the</strong>network is broken up into smaller units or “packets” of informati<strong>on</strong>, which are in effect labeledas to <strong>the</strong>ir proper order. The packets are <strong>the</strong>n sent through <strong>the</strong> network as discrete units, oftenthrough multiple different paths and often at different times. As <strong>the</strong> packets are released andforwarded through <strong>the</strong> network, each “router” computer makes a temporary (ephemeral) copy ofeach packet and transmits it to <strong>the</strong> next router according to <strong>the</strong> best path available at that instant,until it arrives at its destinati<strong>on</strong>. The packets, which frequently do not arrive in sequential order,are <strong>the</strong>n “reassembled” at <strong>the</strong> receiving end into proper order to rec<strong>on</strong>struct <strong>the</strong> data that wassent. 5 Thus, <strong>on</strong>ly certain subsets (packets) of <strong>the</strong> data being transmitted are passing through <strong>the</strong>RAM of a node computer at any given time, although a complete copy of <strong>the</strong> transmitted datamay be created and/or stored at <strong>the</strong> ultimate destinati<strong>on</strong> computer, ei<strong>the</strong>r in <strong>the</strong> destinati<strong>on</strong>computer’s RAM, <strong>on</strong> its hard disk, or in porti<strong>on</strong>s of both.To illustrate <strong>the</strong> number of interim “copies,” in whole or in part, that may be made whentransmitting a work through <strong>the</strong> <strong>Internet</strong>, c<strong>on</strong>sider <strong>the</strong> example of downloading a picture from awebsite. During <strong>the</strong> course of such transmissi<strong>on</strong>, no less than seven interim copies of <strong>the</strong> picturemay be made: <strong>the</strong> modem at <strong>the</strong> receiving and transmitting computers will buffer each byte ofdata, as will <strong>the</strong> router, <strong>the</strong> receiving computer itself (in RAM), <strong>the</strong> Web browser, <strong>the</strong> videodecompressi<strong>on</strong> chip, and <strong>the</strong> video display board. 6 These copies are in additi<strong>on</strong> to <strong>the</strong> <strong>on</strong>e thatmay be stored <strong>on</strong> <strong>the</strong> recipient computer’s hard disk. 72. Whe<strong>the</strong>r Images of Data Stored in RAM Qualify as “Copies”Do <strong>the</strong>se interim and final copies of a work (many of which are <strong>on</strong>ly partial) beingtransmitted through <strong>the</strong> <strong>Internet</strong> qualify as “copies” within <strong>the</strong> meaning of United Statescopyright law? The copyright statute defines “copies” as:material objects, o<strong>the</strong>r than ph<strong>on</strong>orecords, in which a work is fixed by any methodnow known or later developed, and from which <strong>the</strong> work can be perceived,reproduced, or o<strong>the</strong>rwise communicated, ei<strong>the</strong>r directly or with <strong>the</strong> aid of a567If any packet is lost al<strong>on</strong>g <strong>the</strong> way, <strong>the</strong> originating computer automatically resends it, likely al<strong>on</strong>g a differentpath than <strong>the</strong> lost packet was originally sent.Mark A. Lemley, “Dealing with Overlapping <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>s <strong>on</strong> <strong>the</strong> <strong>Internet</strong>,” 22 U. Dayt<strong>on</strong> L. Rev. 547, 555(1997).Even if a complete copy of <strong>the</strong> picture is not intenti<strong>on</strong>ally stored <strong>on</strong> <strong>the</strong> recipient computer’s hard disk, mostcomputers enhance performance of <strong>the</strong>ir memory by swapping certain data loaded in RAM <strong>on</strong>to <strong>the</strong> hard diskto free up RAM for o<strong>the</strong>r data, and retrieving <strong>the</strong> swapped data from <strong>the</strong> hard disk when it is needed again.Some of this swapped data may be left <strong>on</strong> <strong>the</strong> hard disk when <strong>the</strong> computer is turned off, even though <strong>the</strong> copyin RAM has been destroyed.- 14 -


machine or device. The term “copies” includes <strong>the</strong> material object, o<strong>the</strong>r than aph<strong>on</strong>orecord, in which <strong>the</strong> work is first fixed. 8The language of <strong>the</strong> definiti<strong>on</strong> raises two issues c<strong>on</strong>cerning whe<strong>the</strong>r images 9 oftransmitted data in RAM qualify as “copies.” First, depending up<strong>on</strong> where <strong>the</strong> data is in transitthrough <strong>the</strong> <strong>Internet</strong>, <strong>on</strong>ly a few packets – or indeed perhaps <strong>on</strong>ly a single byte – of <strong>the</strong> data mayreside in a given RAM at a given time. For example, <strong>the</strong> modem at <strong>the</strong> receiving andtransmitting computers may buffer <strong>on</strong>ly <strong>on</strong>e or a few bytes of data at a time. A node computermay receive <strong>on</strong>ly a few packets of <strong>the</strong> total data, <strong>the</strong> o<strong>the</strong>r packets being passed through adifferent route and <strong>the</strong>refore a different node computer’s RAM. Should <strong>the</strong> law c<strong>on</strong>sider <strong>the</strong>separtial images a “copy” of <strong>the</strong> work? Should <strong>the</strong> outcome turn <strong>on</strong> whe<strong>the</strong>r all or most of <strong>the</strong>packets of data comprising <strong>the</strong> work pass through a given RAM, or <strong>on</strong>ly a porti<strong>on</strong>? How caninterim partial images of data stored in RAM be deemed a “copy” of a work, in <strong>the</strong> case where<strong>the</strong>re is no point in time at which <strong>the</strong> entire work is available in a single RAM?The White Paper published by <strong>the</strong> Working Group <strong>on</strong> Intellectual Property Rights ofPresident Clint<strong>on</strong>’s Informati<strong>on</strong> Infrastructure Task Force (referred to herein as <strong>the</strong> “NII WhitePaper”) implicitly suggests that at least interim, partial copies of a work created in RAM ininterim node computers during transmissi<strong>on</strong> may not <strong>the</strong>mselves c<strong>on</strong>stitute a “fixed” copy:A transmissi<strong>on</strong>, in and of itself, is not a fixati<strong>on</strong>. While a transmissi<strong>on</strong> may resultin a fixati<strong>on</strong>, a work is not fixed by virtue of <strong>the</strong> transmissi<strong>on</strong> al<strong>on</strong>e. Therefore,“live” transmissi<strong>on</strong>s via <strong>the</strong> NII [Nati<strong>on</strong>al Informati<strong>on</strong> Infrastructure] will notmeet <strong>the</strong> fixati<strong>on</strong> requirement, and will be unprotected by <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act,unless <strong>the</strong> work is being fixed at <strong>the</strong> same time as it is being transmitted. 10The sec<strong>on</strong>d general issue raised by <strong>the</strong> definiti<strong>on</strong> of “copies” is whe<strong>the</strong>r images of datastored in RAM are sufficiently “permanent” to be deemed “copies” for copyright purposes. Thedefiniti<strong>on</strong> of “copies” speaks of “material objects,” suggesting an enduring, tangible embodyingmedium for a work. With respect to an image of data stored in RAM, is <strong>the</strong> RAM itself to bec<strong>on</strong>sidered <strong>the</strong> “material object”? The image of <strong>the</strong> data in RAM disappears when <strong>the</strong> computeris turned off. In additi<strong>on</strong>, most RAM is “dynamic” (DRAM), meaning that even while <strong>the</strong>computer is <strong>on</strong>, <strong>the</strong> data must be c<strong>on</strong>tinually refreshed in order to remain readable. So <strong>the</strong> data isin every sense “fleeting.” Is its embodiment in RAM sufficiently permanent to be deemed a“copy”?The legislative history of <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act of 1976 would suggest that data stored inRAM is not a “copy.” As noted above, a “copy” is defined as a material object in which a workis “fixed.” The statute defines a work to be “fixed in a tangible medium of expressi<strong>on</strong> when its891017 U.S.C. § 101.The word “image” is being used here to refer to an image of data stored in RAM to avoid use of <strong>the</strong> word“copy,” which is a legal term of art. Whe<strong>the</strong>r an image of data in RAM should be deemed a “copy” forcopyright law purposes is <strong>the</strong> questi<strong>on</strong> at issue.Informati<strong>on</strong> Infrastructure Task Force, “Intellectual Property and <strong>the</strong> Nati<strong>on</strong>al Informati<strong>on</strong> Infrastructure: TheReport of <strong>the</strong> Working Group <strong>on</strong> Intellectual Property Rights” at 27 (1995).- 15 -


embodiment in a copy or ph<strong>on</strong>orecord, by or under <strong>the</strong> authority of <strong>the</strong> author, is sufficientlypermanent or stable to permit it to be perceived, reproduced, or o<strong>the</strong>rwise communicated for aperiod of more than transitory durati<strong>on</strong>.” 11 The legislative history states:[T]he definiti<strong>on</strong> of “fixati<strong>on</strong>” would exclude from <strong>the</strong> c<strong>on</strong>cept purely evanescentor transient reproducti<strong>on</strong>s such as those projected briefly <strong>on</strong> a screen, shownelectr<strong>on</strong>ically <strong>on</strong> a televisi<strong>on</strong> or o<strong>the</strong>r cathode ray tube, or captured momentarilyin <strong>the</strong> “memory” of a computer. 12This language suggests that images of data temporarily stored in RAM do not c<strong>on</strong>stitute“copies.” 13Several cases, however, have held to <strong>the</strong> c<strong>on</strong>trary. The leading case is MAI SystemsCorp. v. Peak Computer, Inc., 14 which held that loading an operating system into RAM formaintenance purposes by an unlicensed third party maintenance organizati<strong>on</strong> created an illegal“copy” of <strong>the</strong> program fixed in RAM. 15 When <strong>the</strong> MAI decisi<strong>on</strong> first came down, it was unclearwhe<strong>the</strong>r that decisi<strong>on</strong> would support a legal principle that any storage of a copyrighted work inRAM, no matter how transiently, c<strong>on</strong>stituted a “copy” within <strong>the</strong> purview of copyright law, for<strong>the</strong> Ninth Circuit’s opini<strong>on</strong> in MAI seemed somewhat qualified. The court in MAI noted that <strong>the</strong>“copy” of <strong>the</strong> operating system was stored in RAM for several minutes (ra<strong>the</strong>r than <strong>on</strong>ly a fewsec<strong>on</strong>ds). In additi<strong>on</strong>, <strong>the</strong> court emphasized that while in RAM, output of <strong>the</strong> program wasviewed by <strong>the</strong> user, which c<strong>on</strong>firmed <strong>the</strong> c<strong>on</strong>clusi<strong>on</strong> that <strong>the</strong> RAM “copy” was capable of beingperceived with <strong>the</strong> aid of a machine:[B]y showing that Peak loads <strong>the</strong> software into <strong>the</strong> RAM and is <strong>the</strong>n able to view<strong>the</strong> system error log and diagnose <strong>the</strong> problem with <strong>the</strong> computer, MAI hasadequately shown that <strong>the</strong> representati<strong>on</strong> created in <strong>the</strong> RAM is “sufficientlypermanent or stable to permit it to be perceived, reproduced, or o<strong>the</strong>rwisecommunicated for a period of more than transitory durati<strong>on</strong>.” 16In additi<strong>on</strong>, a decisi<strong>on</strong> from <strong>the</strong> Seventh Circuit handed down shortly after MAI, NLFC,Inc. v. Devcom Mid-Am., Inc., 17 although somewhat unclear <strong>on</strong> both <strong>the</strong> facts involved in <strong>the</strong>case and whe<strong>the</strong>r <strong>the</strong> court really understood <strong>the</strong> issue, c<strong>on</strong>tains language that may suggest thatmerely proving that <strong>the</strong> defendant has remotely accessed <strong>the</strong> plaintiff’s software through a1112131415161717 U.S.C. § 101 (definiti<strong>on</strong> of “fixed in a tangible medium of expressi<strong>on</strong>”).H.R. Rep. No. 94-1476, at 53 (1976), reprinted in U.S.C.C.A.N. 5659, 5666.But see R. Nimmer, Informati<strong>on</strong> Law 4.02[2], at 4-6 (2001) (“This language refers to subject matterprotecti<strong>on</strong> and not whe<strong>the</strong>r particular acts create an infringing copy. The exclusi<strong>on</strong> of transient works refers to<strong>the</strong> work itself, not a copy. It presumes that <strong>the</strong>re was no copy of <strong>the</strong> work o<strong>the</strong>r than <strong>the</strong> transient display ormemory.”)991 F.2d 511 (9th Cir. 1993), cert. dismissed, 114 S. Ct. 672 (1994).Id. at 518.991 F.2d at 518.45 F.3d 231 (7th Cir. 1995).- 16 -


terminal emulati<strong>on</strong> program is not sufficient to prove that a “copy” has been made. 18 Moreover,an earlier Ninth Circuit decisi<strong>on</strong> in <strong>the</strong> case of Lewis Galoob Toys, Inc. v. Nintendo of America,Inc. 19 implied that an image of data stored in RAM may not qualify as a “copy.” At issue in thatcase was whe<strong>the</strong>r a device that altered certain bytes of data of a video game “<strong>on</strong> <strong>the</strong> fly” as suchinformati<strong>on</strong> passed through RAM created an infringing derivative work. The court held that itdid not, because although a derivative work need not be fixed, it must have some “form” or“permanence,” which were lacking in <strong>the</strong> enhanced displays created by <strong>the</strong> device. The courtstated, however, that even if a derivative work did have to be fixed, <strong>the</strong> changes in <strong>the</strong> displayedimages wrought <strong>on</strong> <strong>the</strong> fly by <strong>the</strong> accused device did not c<strong>on</strong>stitute a fixati<strong>on</strong> because <strong>the</strong>transitory images it created were not “embodied” in any form.Notwithstanding <strong>the</strong>se earlier decisi<strong>on</strong>s, however, a great many courts have nowfollowed MAI, 20 and some earlier decisi<strong>on</strong>s also support its c<strong>on</strong>clusi<strong>on</strong>. 21 Although <strong>the</strong> opini<strong>on</strong>18192021Id. at 236.964 F.2d 965 (9th Cir. 1992).See DocMagic, Inc. v. Ellie Mae, Inc., 2010 U.S. Dist. LEXIS 108628 (N.D. Cal. Oct. 12, 2010) at *60-61(unauthorized loading of software into RAM c<strong>on</strong>stitutes an act of copying and thus of infringement); Apple,Inc. v. Psystar Corp., 673 F. Supp. 2d 931, 935 (N.D. Cal. 2009) (turning <strong>on</strong> computers that loaded into RAMcopies of Apple’s Mac OS X operating system c<strong>on</strong>taining unauthorized modificati<strong>on</strong>s c<strong>on</strong>stitute directinfringement of Apple’s reproducti<strong>on</strong> right); Quantum Sys. Integrators, Inc. v. Sprint Nextel Corp., 2009 U.S.App. LEXIS 14766 at *18-19 (4 th Cir. July 7, 2009) (loading of software into RAM from unauthorized copies<strong>on</strong> hard disk was sufficiently fixed for purposes of copyright infringement); SimplexGrinnell LP v. IntegratedSys. & Power, Inc., 2009 U.S. Dist. LEXIS 30657 at *42 (S.D.N.Y. Apr. 8, 2009) (embodiment requirement issatisfied when a program is loaded for use into a computer’s RAM and <strong>the</strong> durati<strong>on</strong> requirement is satisfiedwhen <strong>the</strong> program remains in RAM for several minutes or until <strong>the</strong> computer is shut off); MDY Industries, LLCv. Blizzard Entertainment, Inc., 2008 U.S. Dist. LEXIS 53988 (D. Ariz. July 14, 2008) (under MAI, copyingsoftware into RAM c<strong>on</strong>stitutes making a “copy” within <strong>the</strong> purview of copyright law, so that if a pers<strong>on</strong> is notauthorized by <strong>the</strong> copyright holder through a license or by law (e.g. Secti<strong>on</strong> 117) to copy <strong>the</strong> software to RAM,<strong>the</strong> pers<strong>on</strong> commits copyright infringement when using <strong>the</strong> software in an unauthorized way); TicketmasterL.L.C. v. RMG Technologies, Inc., 507 F. Supp. 2d 1096, 1005 (C.D. Cal. 2007) (copies of web pages storedin a computer’s cache or RAM up<strong>on</strong> a viewing of <strong>the</strong> web page fall within <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act’s definiti<strong>on</strong> of a“copy”); Storage Technology Corp. v. Custom Hardware Engineering & C<strong>on</strong>sulting, Inc., 2004 U.S. Dist.LEXIS 12391 at *11-12 (D. Mass. July 2, 2004) (unauthorized copying of a program into RAM for use of <strong>the</strong>program infringes <strong>the</strong> copyright in <strong>the</strong> program); Lowry’s Reports, Inc. v. Legg Mas<strong>on</strong>, Inc., 271 F. Supp. 2d737, 745 (D. Md. 2003) (“Unauthorized electr<strong>on</strong>ic transmissi<strong>on</strong> of copyrighted text, from <strong>the</strong> memory of <strong>on</strong>ecomputer into <strong>the</strong> memory of ano<strong>the</strong>r, creates an infringing ‘copy’ under <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act.”); StenographL.L.C. v. Bossard Assocs., 144 F.3d 96 (D.C. Cir. 1998) (holding that an infringing copy of a computerprogram was made when that program was loaded into RAM up<strong>on</strong> boot up and used for its principal purposes);Triad Sys. v. Sou<strong>the</strong>astern Express Co., 64 F.3d 1330 (9th Cir. 1995), cert. denied, 116 S. Ct. 1015 (1996);Intellectual Reserve, Inc. v. Utah Lighthouse Ministry, Inc., 53 U.S.P.Q.2d 1425 (D. Utah 1999); TiffanyDesign, Inc. v. Reno-Tahoe Specialty, Inc., 55 F. Supp. 1113 (D. Nev. 1999); Marobie-FL Inc. v. Nati<strong>on</strong>alAssociati<strong>on</strong> of Fire Equipment Distributors, 45 U.S.P.Q.2d 1236 (N.D. Ill. 1997); <str<strong>on</strong>g>Advanced</str<strong>on</strong>g> Computer Servs.v. MAI Sys., 845 F. Supp. 356 (E.D. Va. 1994); see also 2 M. Nimmer & D. Nimmer, Nimmer <strong>on</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> §8.08[A][1], at 8-114 (1999) (suggesting that RAM copies are fixed).See Vault Corp. v. Quaid Software Ltd., 847 F.2d 255, 260 (5th Cir. 1988) (“<strong>the</strong> act of loading a program froma medium of storage into a computer’s memory creates a copy of <strong>the</strong> program”); Apple Computer, Inc. v.Formula Int’l, 594 F. Supp. 617, 621 (C.D. Cal. 1984) (noting that copying a program into RAM creates afixati<strong>on</strong>, albeit a temporary <strong>on</strong>e); Telerate Sys. v. Caro, 8 U.S.P.Q.2d 1740 (S.D.N.Y. 1988) (holding that <strong>the</strong>receipt of data in a local computer c<strong>on</strong>stituted an infringing copy).- 17 -


in <strong>on</strong>e of <strong>the</strong>se decisi<strong>on</strong>s suggests that <strong>on</strong>ly copies that exist for several minutes should c<strong>on</strong>stitutea “copy” within <strong>the</strong> purview of copyright law, 22 <strong>the</strong> o<strong>the</strong>rs appear not to focus <strong>on</strong> howtransitorily an image may be stored in RAM in ruling that such an image c<strong>on</strong>stitutes a “copy” forpurposes of copyright law.One of <strong>the</strong>se decisi<strong>on</strong>s, Intellectual Reserve, Inc. v. Utah Lighthouse Ministry, Inc., 23 was<strong>the</strong> first decisi<strong>on</strong> to focus <strong>on</strong> whe<strong>the</strong>r <strong>the</strong> act of browsing <strong>on</strong> <strong>the</strong> <strong>Internet</strong> involves <strong>the</strong> creati<strong>on</strong> of“copies” that implicate <strong>the</strong> copyright owner’s rights. In that case, <strong>the</strong> court, citing <strong>the</strong> MAIdecisi<strong>on</strong>, flatly stated, “When a pers<strong>on</strong> browses a website, and by so doing displays <strong>the</strong>[copyrighted material], a copy of <strong>the</strong> [copyrighted material] is made in <strong>the</strong> computer’s randomaccess memory (RAM), to permit viewing of <strong>the</strong> material. And in making a copy, even atemporary <strong>on</strong>e, <strong>the</strong> pers<strong>on</strong> who browsed infringes <strong>the</strong> copyright.” 24 This decisi<strong>on</strong>, although quitedirect in its holding, appears to address <strong>on</strong>ly <strong>the</strong> final “copy” that is made in <strong>the</strong> RAM of a Websurfer’s computer in c<strong>on</strong>juncti<strong>on</strong> with viewing a Web page through a browser. It does notaddress <strong>the</strong> trickier issue of whe<strong>the</strong>r whole or partial interim copies made in RAM of nodecomputers during <strong>the</strong> course of transmissi<strong>on</strong> through <strong>the</strong> <strong>Internet</strong> also c<strong>on</strong>stitute “copies” within<strong>the</strong> purview of a copyright owner’s copyright rights.However, a 2004 decisi<strong>on</strong> from <strong>the</strong> Fourth Circuit, CoStar v. Loopnet, 25 held thattransient copies made by an OSP acting merely as a c<strong>on</strong>duit to transmit informati<strong>on</strong> at <strong>the</strong>instigati<strong>on</strong> of o<strong>the</strong>rs does not create fixed copies sufficient to make it a direct infringer ofcopyright. “While temporary electr<strong>on</strong>ic copies may be made in this transmissi<strong>on</strong> process, <strong>the</strong>ywould appear not to be ‘fixed’ in <strong>the</strong> sense that <strong>the</strong>y are ‘of more than transitory durati<strong>on</strong>,’ and<strong>the</strong> ISP <strong>the</strong>refore would not be a ‘copier’ to make it directly liable under <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act.” 26The court drew a distincti<strong>on</strong> between <strong>the</strong> final copy of a work made in <strong>the</strong> RAM of <strong>the</strong> ultimateuser’s computer, and <strong>the</strong> transient copies made by an OSP in <strong>the</strong> course of transmitting suchcopies:In c<strong>on</strong>cluding that an ISP has not itself fixed a copy in its system of more thantransitory durati<strong>on</strong> when it provides an <strong>Internet</strong> hosting service to its subscribers,we do not hold that a computer owner who downloads copyrighted software <strong>on</strong>toa computer cannot infringe <strong>the</strong> software’s copyright. See, e.g., MAI SystemsCorp. v. Peak Computer, Inc., 991 F.2d 511, 518-19 (9 th Cir. 1993). When <strong>the</strong>computer owner downloads copyrighted software, it possesses <strong>the</strong> software,which <strong>the</strong>n functi<strong>on</strong>s in <strong>the</strong> service of <strong>the</strong> computer or its owner, and <strong>the</strong> copyingis no l<strong>on</strong>ger of a transitory nature. See, e.g., Vault Corp. v. Quiad Software, Ltd.,847 F.2d 255, 260 (5 th Cir. 1988). “Transitory durati<strong>on</strong>” is thus both a qualitativeand quantitative characterizati<strong>on</strong>. It is quantitative insofar as it describes <strong>the</strong>period during which <strong>the</strong> functi<strong>on</strong> occurs, and it is qualitative in <strong>the</strong> sense that it2223242526<str<strong>on</strong>g>Advanced</str<strong>on</strong>g> Computer Services v. MAI Systems, 845 F. Supp. 356, 363 (E.D. Va. 1994).53 U.S.P.Q.2d 1425 (D. Utah 1999).Id. at 1428.373 F.3d 544 (4 th Cir. 2004).Id. at 551.- 18 -


describes <strong>the</strong> status of transiti<strong>on</strong>. Thus, when <strong>the</strong> copyrighted software isdownloaded <strong>on</strong>to <strong>the</strong> computer, because it may be used to serve <strong>the</strong> computer or<strong>the</strong> computer owner, it no l<strong>on</strong>ger remains transitory. This, however, is unlike anISP, which provides a system that automatically receives a subscriber’s infringingmaterial and transmits it to <strong>the</strong> <strong>Internet</strong> at <strong>the</strong> instigati<strong>on</strong> of <strong>the</strong> subscriber. 27A 2008 decisi<strong>on</strong> of <strong>the</strong> Sec<strong>on</strong>d Circuit, The Carto<strong>on</strong> Network LP v. CSC Holdings,Inc., 28 addressed <strong>the</strong> issue of RAM copying in c<strong>on</strong>siderable detail, ruling that buffer copies inRAM made by Cablevisi<strong>on</strong> Systems Corp. in <strong>the</strong> course of c<strong>on</strong>verting channels of cableprogramming from <strong>the</strong> head end feed into a format suitable for storage of individual programs bya network digital video recording service up<strong>on</strong> customer demand were not fixed for sufficientdurati<strong>on</strong> to c<strong>on</strong>stitute “copies.” 29 Cablevisi<strong>on</strong> made <strong>the</strong> buffer copies in c<strong>on</strong>juncti<strong>on</strong> withoffering its “Remote Storage” Digital Video Recorder (RS-DVR) service that enabledCablevisi<strong>on</strong> customers to record copies of particular programs, like a normal DVR, but to store<strong>the</strong> recorded programs <strong>on</strong> Cablevisi<strong>on</strong>’s servers ra<strong>the</strong>r than <strong>on</strong> a DVR device at <strong>the</strong>ir homes.Cablevisi<strong>on</strong> created buffer copies, <strong>on</strong>e small piece at a time, of <strong>the</strong> head end programming in twobuffers – a primary ingest buffer and a Broadband Media Router (BMR) buffer – even if nocustomer requested that a copy of particular programming be stored <strong>on</strong> its behalf in <strong>the</strong> RS-DVRservice. The primary ingest buffer held no more than 0.1 sec<strong>on</strong>ds of each incoming channel’sprogramming at any moment. The data buffer in <strong>the</strong> BMR held no more than 1.2 sec<strong>on</strong>ds ofprogramming at any time. The plaintiffs argued that <strong>the</strong>se buffer copies made Cablevisi<strong>on</strong> adirect infringer of <strong>the</strong>ir copyrights. 30The lower court found Cablevisi<strong>on</strong> a direct infringer largely in reliance <strong>on</strong> MAI and casesfollowing it. 31 The Sec<strong>on</strong>d Circuit, however, reversed. The court noted that to satisfy <strong>the</strong>statutory definiti<strong>on</strong> of “copies,” two requirements must be met – an “embodiment” requirement(embodiment in a tangible medium from which it can be perceived or reproduced) and a“durati<strong>on</strong>” requirement (embodiment for a period of more than transitory durati<strong>on</strong>). The Sec<strong>on</strong>dCircuit found that <strong>the</strong> district court had mistakenly limited its analysis to <strong>the</strong> embodimentrequirement, and that its reliance <strong>on</strong> MAI and cases following it was misplaced. 32In general, those cases c<strong>on</strong>clude that an alleged copy is fixed without addressing<strong>the</strong> durati<strong>on</strong> requirement; it does not follow, however, that those cases assume,much less establish, that such a requirement does not exist. Indeed, <strong>the</strong> durati<strong>on</strong>requirement, by itself, was not at issue in MAI Systems and its progeny.…Accordingly, we c<strong>on</strong>strue MAI Systems and its progeny as holding that loading aprogram into a computer’s RAM can result in copying that program. We do not272829303132Id.536 F.3d 121 (2d Cir. 2008), cert. denied sub nom. CNN, Inc. v. CSC Holdings, Inc., 2009 U.S. LEXIS 4828(2009).Id. at 129-30.Id. at 123-24, 127.Twentieth Century Fox Film Corp. v. Cablevisi<strong>on</strong> Sys. Corp., 478 F. Supp. 2d 607, 621-22 (S.D.N.Y. 2007).Carto<strong>on</strong> Network, 2008 U.S. App. LEXIS 16458 at *14-16.- 19 -


ead MAI Systems as holding that, as a matter of law, loading a program into aform of RAM always results in copying. 33Turning to <strong>the</strong> facts of <strong>the</strong> case at hand, <strong>the</strong> Sec<strong>on</strong>d Circuit ruled that, although <strong>the</strong>embodiment requirement was satisfied by <strong>the</strong> buffers because <strong>the</strong> copyrighted works could becopied from <strong>the</strong>m, 34 <strong>the</strong> durati<strong>on</strong> requirement had not been satisfied. The court noted that no bitof data remained in any buffer for more than a fleeting 1.2 sec<strong>on</strong>ds, unlike <strong>the</strong> data in cases likeMAI, which remained embodied in <strong>the</strong> computer’s RAM until <strong>the</strong> user turned <strong>the</strong> computer off. 35“While our inquiry is necessarily fact-specific, and o<strong>the</strong>r factors not present here may alter <strong>the</strong>durati<strong>on</strong> analysis significantly, <strong>the</strong>se facts str<strong>on</strong>gly suggest that <strong>the</strong> works in this case areembodied in <strong>the</strong> buffer for <strong>on</strong>ly a ‘transitory’ period, thus failing <strong>the</strong> durati<strong>on</strong> requirement.” 36Accordingly, <strong>the</strong> acts of buffering in <strong>the</strong> operati<strong>on</strong> <strong>the</strong> RS-DVR did not create “copies” forwhich Cablevisi<strong>on</strong> could have direct liability. 373. The WIPO Treaties & <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive Are UnclearWith Respect to Interim “Copies”The language of two copyright treaties adopted during 1996 by <strong>the</strong> World IntellectualProperty Organizati<strong>on</strong> (WIPO) 38 leaves open <strong>the</strong> issue of whe<strong>the</strong>r transitory images of datastored in RAM c<strong>on</strong>stitute “copies.” 39Directive(a) Introducti<strong>on</strong> to <strong>the</strong> WIPO Treaties & <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>The WIPO treaties were adopted as a result of <strong>the</strong> Diplomatic C<strong>on</strong>ference <strong>on</strong> Certain<str<strong>on</strong>g>Copyright</str<strong>on</strong>g> and Neighboring Rights Questi<strong>on</strong>s hosted by WIPO in Geneva <strong>on</strong> December 2-20,1996. More than 700 delegates from approximately 160 countries attended this C<strong>on</strong>ference,which was aimed at tightening internati<strong>on</strong>al copyright law to resp<strong>on</strong>d to issues arising fromworldwide use of <strong>the</strong> <strong>Internet</strong>. The C<strong>on</strong>ference was also designed to bring existing legislati<strong>on</strong> <strong>on</strong>copyrights more in line with <strong>the</strong> provisi<strong>on</strong>s of <strong>the</strong> Trade Related Intellectual Property (TRIPS)33343536373839Id. at *16, 18.Id. at *22. “The result might be different if <strong>on</strong>ly a single sec<strong>on</strong>d of a much l<strong>on</strong>ger work was placed in <strong>the</strong>buffer in isolati<strong>on</strong>. In such a situati<strong>on</strong>, it might be reas<strong>on</strong>able to c<strong>on</strong>clude that <strong>on</strong>ly a minuscule porti<strong>on</strong> of awork, ra<strong>the</strong>r than ‘a work’ was embodied in <strong>the</strong> buffer. Here, however, where every sec<strong>on</strong>d of an entire workis placed, <strong>on</strong>e sec<strong>on</strong>d at a time, in <strong>the</strong> buffer, we c<strong>on</strong>clude that <strong>the</strong> work is embodied in <strong>the</strong> buffer.” Id. at *22-23.Id. at *23.Id.Id. at *24.WIPO is a United Nati<strong>on</strong>s organizati<strong>on</strong> which handles questi<strong>on</strong>s of copyrights and trademarks.The treaties enter into force three m<strong>on</strong>ths after 30 instruments of ratificati<strong>on</strong> or accessi<strong>on</strong> by member Stateshave been deposited with <strong>the</strong> Director General of WIPO.- 20 -


secti<strong>on</strong>s of <strong>the</strong> Uruguay Round trade agreement, which in 1994 set up <strong>the</strong> World TradeOrganizati<strong>on</strong> (WTO). 40Three new treaties were c<strong>on</strong>sidered, <strong>on</strong>ly two of which were adopted: <strong>the</strong> “WIPO<str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty” and <strong>the</strong> “WIPO Performances and Ph<strong>on</strong>ograms Treaty.” 41 The WIPO<str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty streng<strong>the</strong>ns <strong>the</strong> Berne C<strong>on</strong>venti<strong>on</strong> for <strong>the</strong> Protecti<strong>on</strong> of Literary and ArtisticWorks (<strong>the</strong> “Berne C<strong>on</strong>venti<strong>on</strong>”), 42 established in 1886, which was <strong>the</strong> first internati<strong>on</strong>alcopyright treaty. The WIPO Performances and Ph<strong>on</strong>ograms Treaty streng<strong>the</strong>ns <strong>the</strong> Internati<strong>on</strong>alC<strong>on</strong>venti<strong>on</strong> for <strong>the</strong> Protecti<strong>on</strong> of Performers, Producers of Ph<strong>on</strong>ograms and BroadcastingOrganizati<strong>on</strong>s, completed in Rome in 1961 (<strong>the</strong> “Rome C<strong>on</strong>venti<strong>on</strong>”). 43Each of <strong>the</strong> treaties required 30 nati<strong>on</strong>s to accede to it before it would enter into force.On Dec. 5, 2001, Gab<strong>on</strong> became <strong>the</strong> 30 th nati<strong>on</strong> to accede to <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty, and <strong>on</strong>Feb. 20, 2002, H<strong>on</strong>duras became <strong>the</strong> 30 th nati<strong>on</strong> to accede to <strong>the</strong> WIPO Performances andPh<strong>on</strong>ograms Treaty. Accordingly, each of those treaties entered into force ninety days<strong>the</strong>reafter, <strong>on</strong> March 6, 2002 and May 20, 2002, respectively. 44 The treaties are not selfexecuting under United States law, and implementing legislati<strong>on</strong> will have to be passed byC<strong>on</strong>gress.The two adopted treaties will effect important substantive changes in internati<strong>on</strong>alcopyright law that have potentially far reaching implicati<strong>on</strong>s for <strong>the</strong> <strong>Internet</strong>, and <strong>the</strong> relevantprovisi<strong>on</strong>s of <strong>the</strong>se treaties will be discussed throughout this paper. The legislative history to <strong>the</strong>WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty and <strong>the</strong> WIPO Performances and Ph<strong>on</strong>ograms Treaty took <strong>the</strong> form ofseveral “Agreed Statements.” Under <strong>the</strong> Vienna C<strong>on</strong>venti<strong>on</strong>, an Agreed Statement is evidenceof <strong>the</strong> scope and meaning of <strong>the</strong> treaty language. 45 Relevant porti<strong>on</strong>s of <strong>the</strong> Agreed Statementswill also be discussed in this paper.Each of <strong>the</strong> signatories to <strong>the</strong> WIPO treaties was required to adopt implementinglegislati<strong>on</strong> to c<strong>on</strong>form to <strong>the</strong> requirements of <strong>the</strong> treaties. The scope of legislati<strong>on</strong> required inany particular country depends up<strong>on</strong> <strong>the</strong> substantive extent of that country’s copyright lawexisting at <strong>the</strong> time of <strong>the</strong> treaty, as well <strong>the</strong> country’s own views c<strong>on</strong>cerning whe<strong>the</strong>r its existinglaws already c<strong>on</strong>form to <strong>the</strong> requirements of <strong>the</strong> treaties. As discussed in detail below, WIPO404142434445Agreement <strong>on</strong> Trade-Related Aspects of Intellectual Property Rights, Apr. 15, 1994, Marrakesh AgreementEstablishing <strong>the</strong> World Trade Organizati<strong>on</strong>, Annex 1C, Legal Instruments – Results of <strong>the</strong> Uruguay Round vol.31; 33 I.L.M. 81 (1994).The proposed WIPO Treaty <strong>on</strong> Intellectual Property in Respect of Databases generated huge c<strong>on</strong>troversy, andwas not adopted at <strong>the</strong> C<strong>on</strong>ference. “WIPO Delegates Agree <strong>on</strong> Two Treaties,” 2 BNA’s Electr<strong>on</strong>ic Info. Pol’y& L. Rep. 22, 22 (1997).Berne C<strong>on</strong>venti<strong>on</strong> for <strong>the</strong> Protecti<strong>on</strong> of Literary and Artistic Works, Sept. 9, 1886, 828 U.N.T.S. 221.Internati<strong>on</strong>al C<strong>on</strong>venti<strong>on</strong> for <strong>the</strong> Protecti<strong>on</strong> of Performers, Producers of Ph<strong>on</strong>ograms and BroadcastingOrganizati<strong>on</strong>s, Oct. 26, 1961, 496 U.N.T.X. 43.“WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty Enters Into Force As Gab<strong>on</strong> Becomes 30 th Nati<strong>on</strong> to Accede,” BNA’s Electr<strong>on</strong>icCommerce & Law Report (Dec. 12, 2001) at 1224; “U.N. Announces Music Piracy Pact” (Feb. 21, 2002),available as of Feb. 21, 2002 at http://news.com.com/2100-1023-842169.html.Vienna C<strong>on</strong>venti<strong>on</strong> <strong>on</strong> <strong>the</strong> Law of Treaties, May 23, 1969, art. 31(2), 1155 U.N.T.S. 331.- 21 -


implementati<strong>on</strong> legislati<strong>on</strong> in <strong>the</strong> United States took a largely minimalist view of <strong>the</strong> changes toUnited States copyright law required to c<strong>on</strong>form to <strong>the</strong> WIPO treaties. It is curious that all <strong>the</strong>implementing legislati<strong>on</strong> introduced in C<strong>on</strong>gress implicitly took <strong>the</strong> positi<strong>on</strong> that U.S. lawalready c<strong>on</strong>tains most of <strong>the</strong> rights required under <strong>the</strong> WIPO treaties, in view of <strong>the</strong> fact that, asanalyzed below, much of <strong>the</strong> language describing mandatory copyright rights in <strong>the</strong> WIPOtreaties appears to go bey<strong>on</strong>d <strong>the</strong> correlative rights in current United States law or to set up newrights entirely. The possibility that o<strong>the</strong>r countries would adopt legislati<strong>on</strong> implementing <strong>the</strong>WIPO treaty rights in <strong>the</strong>ir seemingly broader form raises <strong>the</strong> prospect of varying scopes ofrights in different countries, a situati<strong>on</strong> that <strong>the</strong> WIPO treaties were intended to avoid in <strong>the</strong> firstplace. 46 In c<strong>on</strong>trast to <strong>the</strong> United States implementing legislati<strong>on</strong>, <strong>the</strong> European Commissi<strong>on</strong>’s“European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive <strong>on</strong> <strong>the</strong> Harm<strong>on</strong>izati<strong>on</strong> of Certain Aspects of <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> andRelated Rights in <strong>the</strong> Informati<strong>on</strong> Society” 47 to update and harm<strong>on</strong>ize member state copyrightlaws (which will be referred to herein as <strong>the</strong> “European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive”) seems to take amore expansive view, although individual member states are free to interpret <strong>the</strong> extent to which<strong>the</strong>ir own copyright laws already c<strong>on</strong>form to <strong>the</strong> dictates of <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive inadopting legislati<strong>on</strong> in resp<strong>on</strong>se to it. 48 The WIPO implementati<strong>on</strong> legislati<strong>on</strong> in <strong>the</strong> UnitedStates and <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive will be discussed at length throughout this paper as<strong>the</strong>y relate to <strong>the</strong> various issues treated herein.464748WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty, Preamble, at 4; WIPO Performances and Ph<strong>on</strong>ograms Treaty, Preamble, at 22.The text of <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive may be found athttp://europa.eu.int/servlet/portail/RenderServlet?search=DocNumber&lg=en&nb_docs=25&domain=Legislati<strong>on</strong>&coll=&in_force=NO&an_doc=2001&nu_doc=29&type_doc=Directive (available as of January 1, 2002).The European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive was first circulated for comments am<strong>on</strong>g European legal experts. It was<strong>the</strong>n officially published at <strong>the</strong> end of 1997 for a more public debate of its provisi<strong>on</strong>s. The EuropeanParliament approved a final draft of <strong>the</strong> Directive <strong>on</strong> February 14, 2001. The European Commissi<strong>on</strong>, actingthrough <strong>the</strong> European Uni<strong>on</strong> ministers, accepted <strong>the</strong> final draft of <strong>the</strong> Directive <strong>on</strong> April 9, 2001.- 22 -


(b) The WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> TreatyArticle 7 of an earlier draft of <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty would apparently haveadopted <strong>the</strong> approach of MAI to <strong>the</strong> questi<strong>on</strong> of whe<strong>the</strong>r RAM copies fall within <strong>the</strong>reproducti<strong>on</strong> right of <strong>the</strong> copyright holder. 49 The proposed Article 7(1) provided:(1) The exclusive right accorded to authors of literary and artistic works inArticle 9(1) of <strong>the</strong> Berne C<strong>on</strong>venti<strong>on</strong> of authorizing <strong>the</strong> reproducti<strong>on</strong> of <strong>the</strong>irworks, in any manner or form, includes direct and indirect reproducti<strong>on</strong> of <strong>the</strong>irworks, whe<strong>the</strong>r permanent or temporary.The reference to “temporary” reproducti<strong>on</strong>s would have seemed to cover copies in RAM.The reference to “indirect” reproducti<strong>on</strong>s, particularly when coupled with <strong>the</strong> inclusi<strong>on</strong> of“temporary” reproducti<strong>on</strong>s, might have been broad enough to cover interim, partialreproducti<strong>on</strong>s in RAM in <strong>the</strong> course of transmissi<strong>on</strong> of a work through <strong>the</strong> <strong>Internet</strong>, as well ascomplete copies of a work made in RAM and/or <strong>on</strong> a hard disk at <strong>the</strong> receiving computer.49The WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty c<strong>on</strong>tains a number of important provisi<strong>on</strong>s relevant to <strong>the</strong> <strong>Internet</strong> that are notdiscussed elsewhere in this paper. Article 2 codifies <strong>the</strong> idea/expressi<strong>on</strong> dichotomy of copyright law:“<str<strong>on</strong>g>Copyright</str<strong>on</strong>g> protecti<strong>on</strong> extends to expressi<strong>on</strong>s and not to ideas, procedures, methods of operati<strong>on</strong> orma<strong>the</strong>matical c<strong>on</strong>cepts as such.” Article 4 expressly extends copyright protecti<strong>on</strong> to computer programs in allforms as literary works: “Computer programs are protected as literary works within <strong>the</strong> meaning of Article 2 of<strong>the</strong> Berne C<strong>on</strong>venti<strong>on</strong>. Such protecti<strong>on</strong> applies to computer programs, whatever may be <strong>the</strong> mode or form of<strong>the</strong>ir expressi<strong>on</strong>.”Article 5 adopts <strong>the</strong> approach of <strong>the</strong> Supreme Court’s decisi<strong>on</strong> in Feist Publicati<strong>on</strong>s, Inc. v. Rural Teleph<strong>on</strong>eServ., 499 U.S. 340 (1991), which held that <strong>on</strong>ly <strong>the</strong> selecti<strong>on</strong> or arrangement of a compilati<strong>on</strong> of facts such asa database, and not <strong>the</strong> facts <strong>the</strong>mselves, can be protected under copyright. Article 5 provides: “Compilati<strong>on</strong>sof data or o<strong>the</strong>r material, in any form, which by reas<strong>on</strong> of <strong>the</strong> selecti<strong>on</strong> or arrangement of <strong>the</strong>ir c<strong>on</strong>tentsc<strong>on</strong>stitute intellectual creati<strong>on</strong>s, are protected as such. This protecti<strong>on</strong> does not extend to <strong>the</strong> data or <strong>the</strong>material itself and is without prejudice to any copyright subsisting in <strong>the</strong> data or material c<strong>on</strong>tained in <strong>the</strong>compilati<strong>on</strong>.” The proposed WIPO Treaty <strong>on</strong> Intellectual Property in Respect of Databases would haveextended protecti<strong>on</strong> to <strong>the</strong> informati<strong>on</strong> itself in a database where such database was <strong>the</strong> fruit of substantial laborto compile. Basic Proposal for <strong>the</strong> Substantive Provisi<strong>on</strong>s of <strong>the</strong> Treaty <strong>on</strong> Intellectual Property in Respect ofDatabases to be C<strong>on</strong>sidered by <strong>the</strong> Diplomatic C<strong>on</strong>ference, art. 1(1), WIPO Doc. CRNR/DC/6 (Aug. 30, 1996). The c<strong>on</strong>troversy generated by this Treaty precluded its adopti<strong>on</strong>by WIPO.Article 7(1) provides that authors of computer programs, cinematographic works, and works embodied inph<strong>on</strong>ograms shall enjoy <strong>the</strong> exclusive right of authorizing commercial rental to <strong>the</strong> public of <strong>the</strong> originals orcopies of <strong>the</strong>ir works. Under Article 7(2), this rental right does not apply “in <strong>the</strong> case of computer programswhere <strong>the</strong> program itself is not <strong>the</strong> essential object of <strong>the</strong> rental” or “in <strong>the</strong> case of cinematographic works,unless such commercial rental has led to widespread copying of such works materially impairing <strong>the</strong> exclusiveright of reproducti<strong>on</strong>.” The Agreed Statement for Articles 6 and 7 notes that <strong>the</strong> expressi<strong>on</strong>s “copies” and“original and copies,” being subject to <strong>the</strong> right of rental, “refer exclusively to fixed copies that can be put intocirculati<strong>on</strong> as tangible copies.”Article 6 of an earlier draft of <strong>the</strong> treaty would have required C<strong>on</strong>tracting Parties to abolish n<strong>on</strong>-voluntarybroadcasting licenses within seven years of ratifying or acceding to <strong>the</strong> Treaty. This Article was deleted in <strong>the</strong>final adopted versi<strong>on</strong>.- 23 -


In additi<strong>on</strong>, proposed Article 7(2) of <strong>the</strong> treaty seemed to recognize <strong>the</strong> possibility that<strong>the</strong> language of Article 7(1) might be read to cover interim, partial reproducti<strong>on</strong>s duringtransmissi<strong>on</strong>, for it would have allowed signatory members (referred to as “C<strong>on</strong>tracting Parties”in <strong>the</strong> treaty) to limit <strong>the</strong> right of reproducti<strong>on</strong> in those instances:(2) Subject to <strong>the</strong> c<strong>on</strong>diti<strong>on</strong>s under, and without prejudice to <strong>the</strong> scope ofapplicability of, Article 9(2) of <strong>the</strong> Berne C<strong>on</strong>venti<strong>on</strong>, it shall be a matter forlegislati<strong>on</strong> in C<strong>on</strong>tracting Parties to limit <strong>the</strong> right of reproducti<strong>on</strong> in cases wherea temporary reproducti<strong>on</strong> has <strong>the</strong> sole purpose of making <strong>the</strong> work perceptible orwhere a temporary reproducti<strong>on</strong> is of a transient or incidental nature, providedthat such reproducti<strong>on</strong> takes place in <strong>the</strong> course of use of <strong>the</strong> work that isauthorized by <strong>the</strong> author or permitted by law in accordance with <strong>the</strong> BerneC<strong>on</strong>venti<strong>on</strong> and this Treaty. 50The proposed Article 7, and <strong>the</strong> subject of interim transmissi<strong>on</strong> copies in general,generated a lot of c<strong>on</strong>troversy at <strong>the</strong> C<strong>on</strong>ference. Telecommunicati<strong>on</strong>s companies and <strong>Internet</strong>providers particularly objected to Article 7 because <strong>the</strong>y feared that protecti<strong>on</strong> for temporarycopying would impose liability for <strong>the</strong> interim copying that inherently occurs in computernetworks. On <strong>the</strong> o<strong>the</strong>r hand, c<strong>on</strong>tent providers such as <strong>the</strong> software, publishing and sound50Although this provisi<strong>on</strong> apparently was designed to ameliorate <strong>the</strong> potential mischief that might result fromdeeming all interim copies of a work in <strong>the</strong> course of transmissi<strong>on</strong> to be within <strong>the</strong> copyright owner’s rights, itsuffered from a number of potential problems. First, it would have left <strong>the</strong> issue up to <strong>the</strong> individualC<strong>on</strong>tracting Parties whe<strong>the</strong>r to legislate exempti<strong>on</strong>s. Thus, some C<strong>on</strong>tracting Parties could have legislated suchexempti<strong>on</strong>s, while o<strong>the</strong>rs did not, and <strong>the</strong> scope of <strong>the</strong> exempti<strong>on</strong>s could have varied from country to country.As a result, whe<strong>the</strong>r interim copies during <strong>the</strong> course of transmissi<strong>on</strong> c<strong>on</strong>stitute infringement could have turned<strong>on</strong> <strong>the</strong> countries through which <strong>the</strong> transmissi<strong>on</strong> path passes, which is arbitrary under <strong>the</strong> current transmissi<strong>on</strong>technology of <strong>the</strong> <strong>Internet</strong>.Sec<strong>on</strong>d, Article 7(2) stated that <strong>the</strong> exempti<strong>on</strong>s would apply <strong>on</strong>ly to transient or incidental reproducti<strong>on</strong>s takingplace in <strong>the</strong> course of an authorized use of a work. Thus, if <strong>the</strong> transmissi<strong>on</strong> itself is unauthorized, <strong>the</strong>exempti<strong>on</strong>s would not have applied, and <strong>the</strong>re could still have been potential liability for <strong>the</strong> interimreproducti<strong>on</strong>s. Yet <strong>the</strong> operators of <strong>the</strong> node computers in which <strong>the</strong> interim copies are made would have noway of knowing whe<strong>the</strong>r any particular packet passing through <strong>the</strong> node is part of an authorized transmissi<strong>on</strong>.Article 7(2) <strong>the</strong>refore was flawed.Article 10(1) of <strong>the</strong> adopted versi<strong>on</strong> affords a more generic vehicle for <strong>the</strong> adopti<strong>on</strong> of exempti<strong>on</strong>s orexcepti<strong>on</strong>s to rights c<strong>on</strong>ferred in <strong>the</strong> Treaty: “C<strong>on</strong>tracting Parties may, in <strong>the</strong>ir nati<strong>on</strong>al legislati<strong>on</strong>, provide forlimitati<strong>on</strong>s of or excepti<strong>on</strong>s to <strong>the</strong> rights granted to authors of literary and artistic works under this Treaty to anextent c<strong>on</strong>sistent with excepti<strong>on</strong>s or limitati<strong>on</strong>s provided for in <strong>the</strong> Berne C<strong>on</strong>venti<strong>on</strong> in certain special casesthat do not c<strong>on</strong>flict with a normal exploitati<strong>on</strong> of <strong>the</strong> work and do not unreas<strong>on</strong>ably prejudice <strong>the</strong> legitimateinterests of <strong>the</strong> author.”The requirement that excepti<strong>on</strong>s “not unreas<strong>on</strong>ably prejudice <strong>the</strong> legitimate interests of <strong>the</strong> author” provideslittle guidance as to where <strong>the</strong> boundaries should lie around excepti<strong>on</strong>s that C<strong>on</strong>tracting Parties may wish toadopt in implementing legislati<strong>on</strong>. The Agreed Statement c<strong>on</strong>cerning Article 10 does nothing to clarify <strong>the</strong>uncertainty: “It is understood that <strong>the</strong> provisi<strong>on</strong>s of Article 10 permit C<strong>on</strong>tracting Parties to carry forward andappropriately extend into <strong>the</strong> digital envir<strong>on</strong>ment limitati<strong>on</strong>s and excepti<strong>on</strong>s in <strong>the</strong>ir nati<strong>on</strong>al laws which havebeen c<strong>on</strong>sidered acceptable under <strong>the</strong> Berne C<strong>on</strong>venti<strong>on</strong>. Similarly, <strong>the</strong>se provisi<strong>on</strong>s should be understood topermit C<strong>on</strong>tracting Parties to devise new excepti<strong>on</strong>s and limitati<strong>on</strong>s that are appropriate in <strong>the</strong> digital networkenvir<strong>on</strong>ment.”- 24 -


ecording industries, opposed any open-ended approach that would permit all temporarycopying. 51To resolve <strong>the</strong> c<strong>on</strong>troversy, <strong>the</strong> proposed Article 7 was ultimately simply deleted entirelyfrom <strong>the</strong> adopted versi<strong>on</strong> of <strong>the</strong> treaty. 52 The Agreed Statement pertaining to <strong>the</strong> right ofreproducti<strong>on</strong> (Previous Article 7) provides:The reproducti<strong>on</strong> right, as set out in Article 9 of <strong>the</strong> Berne C<strong>on</strong>venti<strong>on</strong>, and <strong>the</strong>excepti<strong>on</strong>s permitted <strong>the</strong>reunder, 53 fully apply in <strong>the</strong> digital envir<strong>on</strong>ment, inparticular to <strong>the</strong> use of works in digital form. It is understood that <strong>the</strong> storage of aprotected work in digital form in an electr<strong>on</strong>ic medium c<strong>on</strong>stitutes a reproducti<strong>on</strong>within <strong>the</strong> meaning of Article 9 of <strong>the</strong> Berne C<strong>on</strong>venti<strong>on</strong>.The Assistant Secretary of Commerce and Commissi<strong>on</strong>er of Patents and Trademarks at<strong>the</strong> time, Bruce Lehman, who headed <strong>the</strong> U.S. delegati<strong>on</strong> to <strong>the</strong> C<strong>on</strong>ference, stated at <strong>the</strong> end of<strong>the</strong> C<strong>on</strong>ference that <strong>the</strong> Agreed Statement was intended to make clear that <strong>the</strong> reproducti<strong>on</strong> rightincludes <strong>the</strong> right to make digital copies, but also that certain copying, e.g., for temporary digitalstorage, will be permitted. Commissi<strong>on</strong>er Lehman fur<strong>the</strong>r expressed <strong>the</strong> view that <strong>the</strong> treatylanguage is broad enough to permit domestic legislati<strong>on</strong> that would remove any liability <strong>on</strong> <strong>the</strong>part of network providers where <strong>the</strong> copying is simply <strong>the</strong> result of <strong>the</strong>ir functi<strong>on</strong>ing as a c<strong>on</strong>duitfor network services. 54 However, <strong>the</strong> Agreed Statement itself does nothing more than referenceArticle 9 of <strong>the</strong> Berne C<strong>on</strong>venti<strong>on</strong>, which of course was adopted l<strong>on</strong>g before digital copies werean issue under copyright law, and makes no explicit reference to “temporary digital storage.” Inadditi<strong>on</strong>, <strong>the</strong> phrase “storage of a protected work in digital form in an electr<strong>on</strong>ic medium” couldpotentially include temporary digital storage in a node computer during transmissi<strong>on</strong>. It is<strong>the</strong>refore difficult to agree with Commissi<strong>on</strong>er Lehman that <strong>the</strong> Agreed Statement makesanything “clear.”Ra<strong>the</strong>r, <strong>the</strong> Agreed Statement seems to leave virtually open ended <strong>the</strong> questi<strong>on</strong> ofwhe<strong>the</strong>r temporary images in RAM will be treated as falling within <strong>the</strong> copyright owner’s rightof reproducti<strong>on</strong>. The uncertainty surrounding <strong>the</strong> scope of <strong>the</strong> reproducti<strong>on</strong> right in a digitalenvir<strong>on</strong>ment that, at least early <strong>on</strong>, seemed to divide U.S. courts <strong>the</strong>refore appears destined toreplicate itself in <strong>the</strong> internati<strong>on</strong>al arena. The uncertainty is heightened by <strong>the</strong> fact that Article 9of <strong>the</strong> Berne C<strong>on</strong>venti<strong>on</strong> allows signatories to adopt certain excepti<strong>on</strong>s to <strong>the</strong> reproducti<strong>on</strong> right,raising <strong>the</strong> prospect of inc<strong>on</strong>sistent excepti<strong>on</strong>s being adopted from country to country. As aresult, whe<strong>the</strong>r interim copies made during <strong>the</strong> course of transmissi<strong>on</strong> c<strong>on</strong>stitute infringementmay turn <strong>on</strong> <strong>the</strong> countries through which <strong>the</strong> transmissi<strong>on</strong> path passes, which is arbitrary under51525354“WIPO Delegates Agree <strong>on</strong> Two Treaties,” 2 BNA’s Electr<strong>on</strong>ic Info. Pol’y & L. Rep. 22, 22 (1997).Id.Article 9(2) of <strong>the</strong> Berne C<strong>on</strong>venti<strong>on</strong> provides, “It shall be a matter for legislati<strong>on</strong> in <strong>the</strong> countries of <strong>the</strong> Uni<strong>on</strong>to permit <strong>the</strong> reproducti<strong>on</strong> of such works in certain special cases, provided that such reproducti<strong>on</strong> does notc<strong>on</strong>flict with a normal exploitati<strong>on</strong> of <strong>the</strong> work and does not unreas<strong>on</strong>ably prejudice <strong>the</strong> legitimate interests of<strong>the</strong> author.”“WIPO Delegates Agree <strong>on</strong> Two Treaties,” 2 BNA’s Electr<strong>on</strong>ic Info. Pol’y & L. Rep. 22, 22-23 (1997).- 25 -


<strong>the</strong> current transmissi<strong>on</strong> technology of <strong>the</strong> <strong>Internet</strong>. The issue ignited debate in <strong>the</strong> United Statesin c<strong>on</strong>necti<strong>on</strong> with <strong>the</strong> federal legislati<strong>on</strong> to implement <strong>the</strong> treaty.(c) The WIPO Performances and Ph<strong>on</strong>ograms TreatyCuriously, despite <strong>the</strong> focus <strong>on</strong> and ultimate removal of <strong>the</strong> proposed Article 7 of <strong>the</strong>WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty, Article 7 as adopted in <strong>the</strong> WIPO Performances and Ph<strong>on</strong>ogramsTreaty appears to come closer to adopting <strong>the</strong> approach of MAI. Article 7 gives performers <strong>the</strong>exclusive right of “authorizing <strong>the</strong> direct or indirect reproducti<strong>on</strong> of <strong>the</strong>ir performances fixed inph<strong>on</strong>ograms” (emphasis added). As originally proposed, Article 7 c<strong>on</strong>tained language evencloser to <strong>the</strong> MAI logic, for it expressed <strong>the</strong> reproducti<strong>on</strong> right of performers as <strong>on</strong>e of“authorizing <strong>the</strong> direct or indirect reproducti<strong>on</strong>, whe<strong>the</strong>r permanent or temporary, of <strong>the</strong>irperformances fixed in ph<strong>on</strong>ograms” (emphasis added). The use of <strong>the</strong> phrase “permanent ortemporary” would more str<strong>on</strong>gly have suggested that temporary interim reproducti<strong>on</strong>s ofperformances would be within <strong>the</strong> performer’s right of reproducti<strong>on</strong>.In additi<strong>on</strong>, Article 7(2) in an earlier draft was also deleted, which made reference totransient copies as follows:Subject to <strong>the</strong> c<strong>on</strong>diti<strong>on</strong>s under, and without prejudice to <strong>the</strong> scope ofapplicability of, Article 19(2), it shall be a matter for legislati<strong>on</strong> in C<strong>on</strong>tractingParties to limit <strong>the</strong> right of reproducti<strong>on</strong> in cases where a temporary reproducti<strong>on</strong>has <strong>the</strong> sole purpose of making <strong>the</strong> fixed performance perceptible or where atemporary reproducti<strong>on</strong> is of a transient or incidental nature, provided that suchreproducti<strong>on</strong> takes place in <strong>the</strong> course of use of <strong>the</strong> fixed performance that isauthorized by <strong>the</strong> performer or permitted by law in accordance with this Treaty.The Agreed Statement that was issued with respect to <strong>the</strong> right of reproducti<strong>on</strong> in <strong>the</strong>WIPO Performances and Ph<strong>on</strong>ograms Treaty is very similar to <strong>the</strong> Agreed Statement <strong>on</strong> <strong>the</strong>same subject that was issued with <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty. The Agreed Statement issuedwith <strong>the</strong> WIPO Performances and Ph<strong>on</strong>ograms Treaty provides:The reproducti<strong>on</strong> right, as set out in Articles 7 and 11, and <strong>the</strong> excepti<strong>on</strong>spermitted <strong>the</strong>reunder through Article 16, fully apply in <strong>the</strong> digital envir<strong>on</strong>ment, inparticular to <strong>the</strong> use of performances and ph<strong>on</strong>ograms in digital form. It isunderstood that <strong>the</strong> storage of a protected performance or ph<strong>on</strong>ogram in digitalform in an electr<strong>on</strong>ic medium c<strong>on</strong>stitutes a reproducti<strong>on</strong> within <strong>the</strong> meaning of<strong>the</strong>se Articles.Thus, <strong>the</strong> Agreed Statement for <strong>the</strong> WIPO Performances and Ph<strong>on</strong>ograms Treaty c<strong>on</strong>tains <strong>the</strong>same ambiguities noted above with respect to <strong>the</strong> Agreed Statement for <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>Treaty.Similar to Article 7, Article 11 gives producers of ph<strong>on</strong>ograms <strong>the</strong> “exclusive right ofauthorizing <strong>the</strong> direct or indirect reproducti<strong>on</strong> of <strong>the</strong>ir ph<strong>on</strong>ograms, in any manner or form.” As- 26 -


in <strong>the</strong> case of Article 7, an earlier proposed versi<strong>on</strong> of Article 11 c<strong>on</strong>tained <strong>the</strong> phrase “whe<strong>the</strong>rpermanent or temporary,” but this phrase was deleted in <strong>the</strong> final adopted versi<strong>on</strong>. 55Both Articles 7 and 11 define <strong>the</strong> rights recited <strong>the</strong>rein in terms of “ph<strong>on</strong>ograms.”“Ph<strong>on</strong>ogram” is defined in Article 2(b) as any “fixati<strong>on</strong>” of <strong>the</strong> sounds of a performance or ofo<strong>the</strong>r sounds o<strong>the</strong>r than incorporated in a cinematographic or o<strong>the</strong>r audiovisual work.“Fixati<strong>on</strong>” is defined broadly in Article 2(c) as “<strong>the</strong> embodiment of sounds or <strong>the</strong>representati<strong>on</strong>s <strong>the</strong>reof, from which <strong>the</strong>y can be perceived, reproduced or communicated througha device.” Storage in RAM would seem to satisfy this definiti<strong>on</strong> of fixati<strong>on</strong>. Thus, anyunauthorized transmissi<strong>on</strong> of a performance, or of <strong>the</strong> sounds embodied in a ph<strong>on</strong>ogram fixingsuch performance, to RAM memory would potentially violate <strong>the</strong> rights of both <strong>the</strong> owner of <strong>the</strong>performance and of <strong>the</strong> ph<strong>on</strong>ogram. 565556Article 11(2) in an earlier draft, similar to <strong>the</strong> proposed and later deleted Article 7(2), was also deleted. Article11(2) would have provided: “Subject to <strong>the</strong> c<strong>on</strong>diti<strong>on</strong>s under, and without prejudice to <strong>the</strong> scope ofapplicability of, Article 19(2), it shall be a matter for legislati<strong>on</strong> in C<strong>on</strong>tracting Parties to limit <strong>the</strong> right ofreproducti<strong>on</strong> in cases where a temporary reproducti<strong>on</strong> has <strong>the</strong> sole purpose of making <strong>the</strong> ph<strong>on</strong>ogram audible orwhere a temporary reproducti<strong>on</strong> is of a transient or incidental nature, provided that such reproducti<strong>on</strong> takesplace in <strong>the</strong> course of use of <strong>the</strong> ph<strong>on</strong>ogram that is authorized by <strong>the</strong> producer of <strong>the</strong> ph<strong>on</strong>ogram or permittedby law in accordance with this Treaty.”The WIPO Performances and Ph<strong>on</strong>ograms Treaty c<strong>on</strong>tains a number of important provisi<strong>on</strong>s relevant to <strong>the</strong><strong>Internet</strong> that are not discussed elsewhere in this paper. Article 4 requires C<strong>on</strong>tracting Parties to afford nati<strong>on</strong>altreatment to nati<strong>on</strong>als of o<strong>the</strong>r C<strong>on</strong>tracting Parties. Article 5(1) affords moral rights to performers:“Independently of a performer’s ec<strong>on</strong>omic rights, and even after <strong>the</strong> transfer of those rights, <strong>the</strong> performershall, as regards his live aural performances or performances fixed in ph<strong>on</strong>ograms, have <strong>the</strong> right to claim to beidentified as <strong>the</strong> performer of his performances, except where omissi<strong>on</strong> is dictated by <strong>the</strong> manner of <strong>the</strong> use of<strong>the</strong> performance, and to object to any distorti<strong>on</strong>, mutilati<strong>on</strong> or o<strong>the</strong>r modificati<strong>on</strong> of his performances thatwould be prejudicial to his reputati<strong>on</strong>.” A proposed Article 5(4), which was deleted in <strong>the</strong> final versi<strong>on</strong>, wouldhave allowed any C<strong>on</strong>tracting Party to declare in a notificati<strong>on</strong> deposited with <strong>the</strong> Director General of WIPOthat it will not apply <strong>the</strong> provisi<strong>on</strong>s of Article 5.Article 6 grants performers <strong>the</strong> exclusive right of authorizing <strong>the</strong> broadcasting and communicati<strong>on</strong> to <strong>the</strong> publicof <strong>the</strong>ir unfixed performances (except where <strong>the</strong> performance is already a broadcast performance) and <strong>the</strong>fixati<strong>on</strong> of <strong>the</strong>ir unfixed performances. Articles 9 and 13 grant performers and producers of ph<strong>on</strong>ograms,respectively, <strong>the</strong> exclusive right of authorizing <strong>the</strong> commercial rental to <strong>the</strong> public of <strong>the</strong> original and copies of<strong>the</strong>ir performances fixed in ph<strong>on</strong>ograms and of <strong>the</strong>ir ph<strong>on</strong>ograms.Article 15 provides that “[p]erformers and producers of ph<strong>on</strong>ograms shall enjoy <strong>the</strong> right to a single equitableremunerati<strong>on</strong> for <strong>the</strong> direct or indirect use of ph<strong>on</strong>ograms published for commercial purposes for broadcastingor for any communicati<strong>on</strong> to <strong>the</strong> public.” The Agreed Statement for Article 15 provides: “It is understood thatArticle 15 does not represent a complete resoluti<strong>on</strong> of <strong>the</strong> level of rights of broadcasting and communicati<strong>on</strong> to<strong>the</strong> public that should be enjoyed by performers and ph<strong>on</strong>ogram producers in <strong>the</strong> digital age. Delegati<strong>on</strong>s wereunable to achieve c<strong>on</strong>sensus <strong>on</strong> differing proposals for aspects of exclusivity to be provided in certaincircumstances or for rights to be provided without <strong>the</strong> possibility of reservati<strong>on</strong>s, and have <strong>the</strong>refore left <strong>the</strong>issue to future resoluti<strong>on</strong>.”Under Article 17(1), <strong>the</strong> term of protecti<strong>on</strong> to be granted to performers under <strong>the</strong> Treaty is at least 50 yearsfrom <strong>the</strong> end of <strong>the</strong> year in which <strong>the</strong> performance was fixed in a ph<strong>on</strong>ogram. Under Article 17(2), <strong>the</strong> term ofprotecti<strong>on</strong> to be granted to producers of ph<strong>on</strong>ograms under <strong>the</strong> Treaty is at least 50 years from <strong>the</strong> end of <strong>the</strong>year in which <strong>the</strong> ph<strong>on</strong>ogram was published, or failing such publicati<strong>on</strong> within 50 years from fixati<strong>on</strong> of <strong>the</strong>ph<strong>on</strong>ogram, 50 years from <strong>the</strong> end of <strong>the</strong> year in which <strong>the</strong> fixati<strong>on</strong> was made.- 27 -


Thus, <strong>the</strong> WIPO Performances and Ph<strong>on</strong>ograms Treaty replicates <strong>the</strong> same uncertainty as<strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty with respect to <strong>the</strong> issue of whe<strong>the</strong>r transient “copies” ofperformances and ph<strong>on</strong>ograms will fall within <strong>the</strong> copyright owner’s right of reproducti<strong>on</strong>. 57Indeed, <strong>the</strong> definiti<strong>on</strong> of <strong>the</strong> right of reproducti<strong>on</strong> in Article 7 and Article 11 to include “direct orindirect” reproducti<strong>on</strong>s, toge<strong>the</strong>r with <strong>the</strong> broad definiti<strong>on</strong> of “fixati<strong>on</strong>” in Article 2(c), arguablyadopt an approach that is closer to <strong>the</strong> MAI decisi<strong>on</strong> than <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty.4. Whe<strong>the</strong>r Voliti<strong>on</strong> Is Required for Direct LiabilityEven assuming <strong>the</strong> rati<strong>on</strong>ale of <strong>the</strong> MAI case and <strong>the</strong> provisi<strong>on</strong>s of <strong>the</strong> WIPO Treaties areapplied to deem all reproducti<strong>on</strong>s during transmissi<strong>on</strong> of a work through <strong>the</strong> <strong>Internet</strong> to be“copies” within <strong>the</strong> copyright owner’s rights, a difficult issue arises as to who should beresp<strong>on</strong>sible for <strong>the</strong> making of such copies. Multiple actors may be potentially c<strong>on</strong>nected with aparticular copy or copies of a work <strong>on</strong> <strong>the</strong> <strong>Internet</strong>, such as a work posted to a bulletin boardservice (BBS) – <strong>the</strong> original poster of <strong>the</strong> work, <strong>the</strong> BBS operator, <strong>the</strong> Online Service Provider(OSP) through which <strong>the</strong> BBS is offered, a user downloading a copy of <strong>the</strong> work from <strong>the</strong> BBS,and perhaps <strong>the</strong> operators of node computers through which a copy of <strong>the</strong> work may pass during<strong>the</strong> course of such downloading. Which <strong>on</strong>e or more of <strong>the</strong>se actors should be deemed to havemade <strong>the</strong> copy or copies?The most difficult aspect of <strong>the</strong> issue of which actors should be liable for copies made in<strong>the</strong> course of <strong>the</strong> downloading, viewing or o<strong>the</strong>r transmissi<strong>on</strong> of a work through <strong>the</strong> <strong>Internet</strong>stems from <strong>the</strong> fact that many such copies will typically be made automatically. For example,“copies” of <strong>the</strong> work (in whole or in part) will automatically be made in <strong>the</strong> RAM (and possiblyin temporary hard disk storage) of each interim node computer within <strong>the</strong> transmissi<strong>on</strong> path of<strong>the</strong> work through <strong>the</strong> <strong>Internet</strong>. And <strong>the</strong> modems <strong>on</strong> <strong>the</strong> initiating and receiving ends of <strong>the</strong>transmissi<strong>on</strong> will buffer <strong>the</strong> data to be transmitted. <strong>Internet</strong> search engine services may use“spiders” to “crawl” through <strong>the</strong> <strong>Internet</strong> and make copies in RAM of materials <strong>on</strong> websites in<strong>the</strong> course of creating an index of that material.Should a voliti<strong>on</strong>al act be required <strong>on</strong> <strong>the</strong> part of a third party to be liable for a copymade during transmissi<strong>on</strong>? If so, is a direct voliti<strong>on</strong>al act to cause <strong>the</strong> copy to be made required(as in <strong>the</strong> case of <strong>the</strong> original poster or <strong>the</strong> ultimate recipient of <strong>the</strong> copy), or is it sufficient if<strong>the</strong>re was a voliti<strong>on</strong>al act in setting up <strong>the</strong> automatic process that ultimately causes <strong>the</strong> copy to bemade (as in <strong>the</strong> case of <strong>the</strong> BBS operator, <strong>the</strong> OSP or <strong>the</strong> search engine service)? In view of <strong>the</strong>57Article 16 affords a generic vehicle for <strong>the</strong> adopti<strong>on</strong> of exempti<strong>on</strong>s or excepti<strong>on</strong>s to rights c<strong>on</strong>ferred in <strong>the</strong>Treaty. Article 16(1) provides that “C<strong>on</strong>tracting Parties may, in <strong>the</strong>ir nati<strong>on</strong>al legislati<strong>on</strong>, provide for <strong>the</strong> samekinds of limitati<strong>on</strong>s or excepti<strong>on</strong>s with regard to <strong>the</strong> protecti<strong>on</strong> of performers and producers of ph<strong>on</strong>ograms as<strong>the</strong>y provide for in <strong>the</strong>ir nati<strong>on</strong>al legislati<strong>on</strong>, in c<strong>on</strong>necti<strong>on</strong> with <strong>the</strong> protecti<strong>on</strong> of copyright in literary andartistic works.” Article 16(2) provides, however, similar to <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty, that “C<strong>on</strong>tractingParties shall c<strong>on</strong>fine any limitati<strong>on</strong>s of or excepti<strong>on</strong>s to rights provided for in this Treaty to certain special caseswhich do not c<strong>on</strong>flict with a normal exploitati<strong>on</strong> of <strong>the</strong> ph<strong>on</strong>ogram and do not unreas<strong>on</strong>ably prejudice <strong>the</strong>legitimate interests of <strong>the</strong> performer or of <strong>the</strong> producer of ph<strong>on</strong>ograms.”- 28 -


fact that copyright law has traditi<strong>on</strong>ally imposed a standard of strict liability for infringement, 58<strong>on</strong>e could argue that a direct voliti<strong>on</strong>al act may not be required. 59In additi<strong>on</strong> to copies made automatically <strong>on</strong> <strong>the</strong> <strong>Internet</strong>, many infringing copies may bemade innocently. For example, <strong>on</strong>e may innocently receive an e-mail message that infringes <strong>the</strong>copyright rights of ano<strong>the</strong>r and print that message out. Or <strong>on</strong>e may innocently encounter (andcopy into <strong>the</strong> RAM of <strong>on</strong>e’s computer or print out) infringing material in <strong>the</strong> course of browsing.Several cases have addressed <strong>the</strong> issue of direct liability <strong>on</strong> <strong>the</strong> part of OSPs, BBSoperators, and o<strong>the</strong>rs for infringement of <strong>the</strong> reproducti<strong>on</strong> right by users of <strong>the</strong> service, and inparticular how much of a voliti<strong>on</strong>al act is required for direct infringement liability:(a) The Netcom CaseThe well known case of Religious Technology Center v. Netcom On-LineCommunicati<strong>on</strong> Services 60 refused to impose direct infringement liability <strong>on</strong> an OSP for copiesmade through its service, at least where <strong>the</strong> OSP had no knowledge of such infringements. Inthat case <strong>the</strong> plaintiffs sought to hold liable <strong>the</strong> OSP (Netcom) and <strong>the</strong> operator of a BBS whichgained its <strong>Internet</strong> access through <strong>the</strong> OSP for postings of <strong>the</strong> plaintiffs’ copyrighted works <strong>on</strong><strong>the</strong> bulletin board. The works in questi<strong>on</strong> were posted by an individual named Erlich 61 to <strong>the</strong>BBS’s computer for use through Usenet. 62 The BBS’s computer automatically briefly stored<strong>the</strong>m. The OSP <strong>the</strong>n automatically copied <strong>the</strong> posted works <strong>on</strong>to its computer and <strong>on</strong>to o<strong>the</strong>rcomputers <strong>on</strong> <strong>the</strong> Usenet. In accordance with usual Usenet procedures, Usenet serversmaintained <strong>the</strong> posted works for a short period of time – eleven days <strong>on</strong> Netcom’s computer andthree days <strong>on</strong> <strong>the</strong> BBS’s computer. 63 The OSP nei<strong>the</strong>r created nor c<strong>on</strong>trolled <strong>the</strong> c<strong>on</strong>tent of <strong>the</strong>informati<strong>on</strong> available to its subscribers, nor did it take any acti<strong>on</strong> after being told by <strong>the</strong>plaintiffs that Erlich had posted infringing messages through its system. 6458596061626364Religious Technology Center v. Netcom On-Line Communicati<strong>on</strong>s Servs., 907 F. Supp. 1361, 1367 & n.10(N.D. Cal. 1995); R. Nimmer, Informati<strong>on</strong> Law 4.06, at 4-25 (2001). Intent can, however, affect statutorydamages to be awarded to <strong>the</strong> plaintiff. Netcom, 907 F. Supp. at 1367.But cf. R. Nimmer, Informati<strong>on</strong> Law 4.06, at S4-50 (2001 Cum. Supp. No. 2) (“Although copyright is a strictliability statute, <strong>the</strong>re should be some [sort] of voliti<strong>on</strong> or causati<strong>on</strong> which is lacking where a defendant’ssystem is merely used to create a copy by a third party.”).907 F. Supp. 1361 (N.D. Cal. 1995).In an earlier order, <strong>the</strong> court had entered a preliminary injuncti<strong>on</strong> against Erlich himself.The Usenet is “a worldwide community of electr<strong>on</strong>ic BBSs that is closely associated with <strong>the</strong> <strong>Internet</strong> and with<strong>the</strong> <strong>Internet</strong> community. The messages in Usenet are organized into thousands of topical groups, or‘Newsgroups’ .... As a Usenet user, you read and c<strong>on</strong>tribute (‘post’) to your local Usenet site. Each Usenet sitedistributes its users’ postings to o<strong>the</strong>r Usenet sites based <strong>on</strong> various implicit and explicit c<strong>on</strong>figurati<strong>on</strong> settings,and in turn receives postings from o<strong>the</strong>r sites.” Daniel P. Dern, The <strong>Internet</strong> Guide for New Users 196-97(1994).Netcom, 907 F. Supp. at 1367.Id. at 1368.- 29 -


The court cast <strong>the</strong> issue of direct liability as “whe<strong>the</strong>r possessors of computers are liablefor incidental copies automatically made <strong>on</strong> <strong>the</strong>ir computers using <strong>the</strong>ir software as part of aprocess initiated by a third party.” 65 The court distinguished MAI, noting that “unlike MAI, <strong>the</strong>mere fact that Netcom’s system incidentally makes temporary copies of plaintiffs’ works doesnot mean that Netcom has caused <strong>the</strong> copying. The court believes that Netcom’s act ofdesigning or implementing a system that automatically and uniformly creates temporary copiesof all data sent through it is not unlike that of <strong>the</strong> owner of a copying machine who lets <strong>the</strong>public make copies with it.” 66 The court held that, absent any voliti<strong>on</strong>al act <strong>on</strong> <strong>the</strong> part of <strong>the</strong>OSP or <strong>the</strong> BBS operator o<strong>the</strong>r than <strong>the</strong> initial setting up of <strong>the</strong> system, <strong>the</strong> plaintiffs’ <strong>the</strong>ory ofliability, carried to its natural extreme, would lead to unreas<strong>on</strong>able liability:Although copyright is a strict liability statute, <strong>the</strong>re should still be some elementof voliti<strong>on</strong> or causati<strong>on</strong> which is lacking where a defendant’s system is merelyused to create a copy by a third party. 67Accordingly, <strong>the</strong> court refused to hold <strong>the</strong> OSP liable for direct infringement. The courtalso refused to hold <strong>the</strong> BBS operator liable for direct infringement. “[T]his court holds that <strong>the</strong>storage <strong>on</strong> a defendant’s system of infringing copies and retransmissi<strong>on</strong> to o<strong>the</strong>r servers is not adirect infringement by <strong>the</strong> BBS operator of <strong>the</strong> exclusive right to reproduce <strong>the</strong> work where suchcopies are uploaded by an infringing user.” 68 The court fur<strong>the</strong>r held that <strong>the</strong> warning of <strong>the</strong>presence of infringing material <strong>the</strong> plaintiffs had given did not alter <strong>the</strong> outcome with respect todirect infringement liability:Whe<strong>the</strong>r a defendant makes a direct copy that c<strong>on</strong>stitutes infringement cannotdepend <strong>on</strong> whe<strong>the</strong>r it received a warning to delete <strong>the</strong> message. This distincti<strong>on</strong>may be relevant to c<strong>on</strong>tributory infringement, however, where knowledge is anelement. 69The result of <strong>the</strong> Netcom case with respect to liability for direct infringement for <strong>the</strong>transmissi<strong>on</strong> and intermediate storage of copyrighted materials by an OSP was codified in <strong>the</strong>first safe harbor for OSPs set forth in Secti<strong>on</strong> 512(a)(1) of <strong>the</strong> Digital Millennium <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>Act, 70 discussed in detail in Secti<strong>on</strong> III.C below.(b) The MAPHIA CaseAno<strong>the</strong>r well known case, Sega Enterprises Ltd. v. MAPHIA, 71 adopted <strong>the</strong> logic of <strong>the</strong>Netcom case and refused to hold a BBS and its system operator directly liable for <strong>the</strong> uploading65666768697071Id.Id. at 1369.Id. at 1370.Id. at 1370-71 (emphasis in original).Id. at 1370.H.R. Rep. No. 105-551 Part 1, at 11, 24 (1998).948 F. Supp. 923 (N.D. Cal. 1996).- 30 -


and downloading of unauthorized copies of Sega’s video games, even though <strong>the</strong> defendantsparticipated in encouraging <strong>the</strong> unauthorized copying, which was not true in Netcom. (Asdiscussed below, <strong>the</strong> court did, however, find c<strong>on</strong>tributory liability.) The evidence establishedthat <strong>the</strong> system operator had knowledge that <strong>the</strong> infringing activity was going <strong>on</strong> through <strong>the</strong>bulletin board, and indeed that he had specifically solicited <strong>the</strong> uploading of <strong>the</strong> games fordownloading by users of <strong>the</strong> bulletin board. 72 The system operator also sold video game“copiers,” known as “Super Magic Drives,” through <strong>the</strong> MAPHIA BBS, which enabledsubscribers to <strong>the</strong> BBS to play games which had been downloaded from <strong>the</strong> BBS. 73In granting a moti<strong>on</strong> by Sega seeking summary judgment and a permanent injuncti<strong>on</strong>, <strong>the</strong>court refused to impose direct liability for copyright infringement <strong>on</strong> <strong>the</strong> BBS and its systemoperator, Chad Sherman. The court cited <strong>the</strong> Netcom case for <strong>the</strong> propositi<strong>on</strong> that, althoughcopyright is a strict liability statute, <strong>the</strong>re should be some element of voliti<strong>on</strong> or causati<strong>on</strong> whichis lacking where a defendant’s system is merely used to create a copy by a third party. 74 Thecourt fur<strong>the</strong>r stated:While Sherman’s acti<strong>on</strong>s in this case are more participatory than those of <strong>the</strong>defendants in Netcom, <strong>the</strong> Court finds Netcom persuasive. Sega has not shownthat Sherman himself uploaded or downloaded <strong>the</strong> files, or directly caused suchuploading or downloading to occur. The most Sega has shown is that Shermanoperated his BBS, that he knew infringing activity was occurring, and that hesolicited o<strong>the</strong>rs to upload games. However, whe<strong>the</strong>r Sherman knew his BBSusers were infringing <strong>on</strong> Sega’s copyright, or encouraged <strong>the</strong>m to do so, has nobearing <strong>on</strong> whe<strong>the</strong>r Sherman directly caused <strong>the</strong> copying to occur. Fur<strong>the</strong>rmore,Sherman’s acti<strong>on</strong>s as a BBS operator and copier seller are more appropriatelyanalyzed under c<strong>on</strong>tributory or vicarious liability <strong>the</strong>ories. Therefore, becauseSega has not shown that Sherman directly caused <strong>the</strong> copying, Sherman cannot beliable for direct infringement. 7572737475Id. at 928.Id. at 929. The Super Magic Drive c<strong>on</strong>sisted of a c<strong>on</strong>nector which plugged into <strong>the</strong> video game c<strong>on</strong>sole, areceptacle which accepted video game cartridges, a main unit having a RAM to store games, and a floppy diskdrive. “A MAPHIA BBS user can download video programs through his or her computer <strong>on</strong>to a floppy diskand make copies with his or her computer or play those game programs through <strong>the</strong> adaptor drive. To play adownloaded game, <strong>the</strong> user places <strong>the</strong> floppy disk into <strong>the</strong> video game copier. The user can choose <strong>the</strong> ‘runprogram’ opti<strong>on</strong> and run <strong>the</strong> video game program from <strong>the</strong> floppy disk without a video game cartridge. Theadaptor drive also allows <strong>the</strong> user to copy <strong>the</strong> c<strong>on</strong>tents of a game cartridge <strong>on</strong>to a floppy disk.” Id.Id. at 932.Id. (citati<strong>on</strong>s to Netcom omitted). An earlier opini<strong>on</strong> in <strong>the</strong> case, issued in c<strong>on</strong>juncti<strong>on</strong> with <strong>the</strong> granting of apreliminary injuncti<strong>on</strong> to Sega, although somewhat unclear in its holding, seemed to suggest that <strong>the</strong> defendantscould be held liable for direct infringement, at least for <strong>the</strong> unauthorized copies being uploaded through <strong>the</strong>bulletin board, although not for <strong>the</strong> subsequent downloading of copies by user of <strong>the</strong> bulletin board. See SegaEnterprises Ltd. v. MAPHIA, 857 F. Supp. 679, 683 (N.D. Cal. 1994). The court in <strong>the</strong> later opini<strong>on</strong>, however,disavowed this interpretati<strong>on</strong> of its earlier opini<strong>on</strong>. With respect to its earlier order granting a preliminaryinjuncti<strong>on</strong>, <strong>the</strong> court stated, “To <strong>the</strong> extent that order can be read to suggest that Sherman may be liable fordirect copyright infringement, it is clarified and superseded by this order.” Sega Enterprises Ltd. v. MAPHIA,948 F. Supp. 923, 932 n.5 (N.D. Cal. 1996).- 31 -


(c) The Sabella CaseSimilarly, in Sega Enterprises Ltd. v. Sabella, 76 <strong>the</strong> court refused to hold a BBS operatorliable for direct infringement of <strong>the</strong> reproducti<strong>on</strong> right where <strong>the</strong>re was no evidence that <strong>the</strong>operator did any unauthorized copying herself. The defendant, Sabella, was <strong>the</strong> system operatorof a BBS called “The Sewer Line,” which c<strong>on</strong>tained a directory called “Genesis,” into whichwere uploaded and downloaded infringing copies of Sega’s video games by subscribers to <strong>the</strong>BBS. The defendant also sold copiers that enabled users to play Sega games directly fromfloppy disks without <strong>the</strong> need for a Sega game cartridge, and allowed purchasers of her copiersto download files from her BBS without charge for a certain time period.Although <strong>the</strong> court agreed that <strong>the</strong> defendant’s activities were more participatory thanthose of <strong>the</strong> defendant in Netcom, <strong>the</strong> court never<strong>the</strong>less found <strong>the</strong> Netcom court’s logicpersuasive. “Sega has not shown that Sabella herself uploaded or downloaded <strong>the</strong> files, ordirectly caused such uploading or downloading to occur. The most Sega has shown is thatSabella should have known such activity was occurring, that she sold copiers that played gamessuch as those <strong>on</strong> her BBS, and that she gave her copier customers downloading privileges <strong>on</strong> herBBS.” 77 Citing Netcom, <strong>the</strong> court c<strong>on</strong>cluded that “whe<strong>the</strong>r Sabella knew her BBS users wereinfringing <strong>on</strong> Sega’s copyright or encouraged <strong>the</strong>m to do so, has no bearing <strong>on</strong> whe<strong>the</strong>r Sabelladirectly caused <strong>the</strong> copying to occur.” 78The court did rule, however, that Sabella was liable for c<strong>on</strong>tributory infringement. Thecourt cited <strong>the</strong> Ninth Circuit’s holding in F<strong>on</strong>ovisa, Inc. v. Cherry Aucti<strong>on</strong>, Inc. that “providing<strong>the</strong> site and facilities for known infringing activity is sufficient to establish c<strong>on</strong>tributoryliability.” 79 The court noted that Sabella provided <strong>the</strong> BBS as a central depository site for <strong>the</strong>unauthorized copies of games, and allowed subsequent distributi<strong>on</strong> of <strong>the</strong> games by user76777879The court also rejected a fair use defense raised by Sherman. With respect to <strong>the</strong> first fair use factor, <strong>the</strong>purpose and character of <strong>the</strong> use, <strong>the</strong> court found that Sherman’s activities in encouraging <strong>the</strong> uploading anddownloading of Sega’s games was clearly commercial. “Sherman intended to profit directly from <strong>the</strong> c<strong>on</strong>tentof <strong>the</strong> informati<strong>on</strong> made available <strong>on</strong> his BBS because his copier customers could use <strong>the</strong> game files to play <strong>the</strong>games ra<strong>the</strong>r than purchase Sega game cartridges. This distinguishes Sherman from <strong>the</strong> <strong>Internet</strong> provider inNetcom who did not gain anything from <strong>the</strong> c<strong>on</strong>tent of <strong>the</strong> informati<strong>on</strong> available to subscribers.” Id. at 934.With respect to <strong>the</strong> sec<strong>on</strong>d fair use factor, <strong>the</strong> nature of <strong>the</strong> copyrighted work, <strong>the</strong> court noted that <strong>the</strong> Segavideo games were for entertainment uses and involved ficti<strong>on</strong> and fantasy, so that <strong>the</strong> sec<strong>on</strong>d factor weighedagainst fair use. Id. The court found that <strong>the</strong> third factor, <strong>the</strong> extent of <strong>the</strong> work copied, weighed against fairuse because BBS users copied virtually entire copyrighted works, and Sherman had not shown any publicbenefit or explanati<strong>on</strong> for <strong>the</strong> complete copying. Id. at 935. Finally, <strong>the</strong> court found that <strong>the</strong> fourth factor, <strong>the</strong>effect of <strong>the</strong> use up<strong>on</strong> <strong>the</strong> market, also weighed against fair use. “Even if <strong>the</strong> users are <strong>on</strong>ly playing <strong>the</strong> gamesin <strong>the</strong>ir own homes and even if <strong>the</strong>re are currently <strong>on</strong>ly a limited number of users that have copiers, unrestrictedand widespread c<strong>on</strong>duct of this sort would result in a substantial adverse impact <strong>on</strong> <strong>the</strong> market for <strong>the</strong> Segagames.” Id.1997 Copyr. Law. Dec. 27,648 (N.D. Cal. Dec. 18, 1996).Id. at 29,847-48.Id. at 29,848.76 F.3d 259, 264 (9th Cir. 1996).- 32 -


downloads. “She provided <strong>the</strong> facilities for copying <strong>the</strong> games by providing, m<strong>on</strong>itoring, andoperating <strong>the</strong> BBS software, hardware, and ph<strong>on</strong>e lines necessary for <strong>the</strong> users to upload anddownload games.” 80 Accordingly, she was liable for c<strong>on</strong>tributory infringement under <strong>the</strong>F<strong>on</strong>ovisa standard. 81The court went fur<strong>the</strong>r, however, holding that even an alternative and higher standard of“substantial participati<strong>on</strong>,” Sabella was liable. “Sabella did more than provide <strong>the</strong> site andfacilities for <strong>the</strong> known infringing c<strong>on</strong>duct. She provided a road map <strong>on</strong> <strong>the</strong> BBS for easyidentificati<strong>on</strong> of Sega games available for downloading.” 82 The court also rejected Sabella’s fairuse defense, issued a permanent injuncti<strong>on</strong> against Sabella, and awarded Sega statutory damagesof $5,000 per infringed work.In c<strong>on</strong>trast to <strong>the</strong> preceding cases, several cases have held that where a defendant BBSoperator has a more direct participati<strong>on</strong> in <strong>the</strong> acts of infringement of its subscribers or users,<strong>the</strong>re can be direct infringement liability for those acts:(d) The Frena CasePlayboy Enterprises, Inc. v. Frena, 83 decided before Netcom, MAPHIA and Sabella,goes fur<strong>the</strong>r than those cases and established liability for <strong>the</strong> acts of subscribers without a directvoliti<strong>on</strong>al act <strong>on</strong> <strong>the</strong> part of <strong>the</strong> operator. In that case, <strong>the</strong> court held <strong>the</strong> operator of a BBS,Frena, resp<strong>on</strong>sible for infringement of <strong>the</strong> rights of distributi<strong>on</strong> and display (although curiouslynot <strong>the</strong> right of reproducti<strong>on</strong>) with respect to <strong>the</strong> plaintiff’s copyrighted photographs, which weredistributed and displayed through <strong>the</strong> bulletin board by subscribers, despite evidence that <strong>the</strong>operator never himself uploaded any of <strong>the</strong> photographs <strong>on</strong>to <strong>the</strong> bulletin board and removed <strong>the</strong>photographs as so<strong>on</strong> as he was made aware of <strong>the</strong>m. 84 “There is no dispute that DefendantFrena supplied a product c<strong>on</strong>taining unauthorized copies of a copyrighted work. It does notmatter that Defendant Frena claims he did not make <strong>the</strong> copies [himself].” 85 Although <strong>the</strong> casedid not generate a finding of liability with respect to <strong>the</strong> right of reproducti<strong>on</strong>, <strong>the</strong> court’s logicwith respect to finding infringement of <strong>the</strong> rights of distributi<strong>on</strong> and display would seem to applyto <strong>the</strong> reproducti<strong>on</strong> right as well.808182838485Sabella, 1997 Copyr. Law. Dec. 27,648 at 29,849.Ano<strong>the</strong>r recent case applied <strong>the</strong> F<strong>on</strong>ovisa standard to hold <strong>the</strong> defendant Cyrix Corporati<strong>on</strong> liable forc<strong>on</strong>tributory infringement for posting <strong>on</strong> its website some copyrighted applet software of <strong>the</strong> plaintiff fromwhich it could be downloaded for use with <strong>the</strong> defendant’s sound boards. “Cyrix is probably alsoc<strong>on</strong>tributorily liable because it encouraged and provided <strong>the</strong> resources for known infringing activity, i.e. <strong>the</strong>copying by o<strong>the</strong>rs of <strong>the</strong> applet software that Cyrix made available <strong>on</strong> its website.” Creative Labs, Inc. v. CyrixCorp., 42 U.S.P.Q.2d 1872, 1875-76 (N.D. Cal. 1997).Sabella, 1997 Copyr. Law. Dec. 27,648 at 29,849.839 F. Supp. 1552 (M.D. Fla. 1993).Id. at 1554.Id. at 1556.- 33 -


The reach of Frena may be limited, however, because <strong>the</strong> BBS was apparently <strong>on</strong>edevoted to photographs, much of it of adult subject matter, and subscribers routinely uploadedand downloaded images <strong>the</strong>refrom. Thus, <strong>the</strong> court may have viewed Frena as a more directparticipant in <strong>the</strong> infringement, having set up a bulletin board that was devoted to <strong>the</strong> kind ofactivity that would foreseeably lead to infringement. The undisputed evidence of <strong>the</strong> presence<strong>on</strong> <strong>the</strong> bulletin board of <strong>the</strong> plaintiff’s photographs, some of which had been edited to remove <strong>the</strong>plaintiff’s trademarks and to add Frena’s advertisements, was apparently evidence of sufficientinvolvement for <strong>the</strong> court to find direct infringement of <strong>the</strong> public distributi<strong>on</strong> right. Similarly,Frena’s selecti<strong>on</strong> of <strong>the</strong> infringing c<strong>on</strong>tent for inclusi<strong>on</strong> in <strong>the</strong> bulletin board was apparentlysufficient involvement to find direct infringement of <strong>the</strong> public display right. 86In additi<strong>on</strong>, as discussed in detail below, <strong>the</strong> legislative history of <strong>the</strong> Digital Millennium<str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act, which c<strong>on</strong>tains a number of safe harbors that address <strong>the</strong> issue of OSP liability,states that it was intended to overrule <strong>the</strong> Frena case, at least to <strong>the</strong> extent Frena suggested thatpassive, automatic acts engaged in through a technological process initiated by ano<strong>the</strong>r through<strong>the</strong> facilities of an OSP could c<strong>on</strong>stitute direct infringement <strong>on</strong> <strong>the</strong> part of <strong>the</strong> OSP. 87 In a casedecided in 2001, <strong>the</strong> Fourth Circuit held that <strong>the</strong> Digital Millennium <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act had indeedoverruled Frena “insofar as that case suggests that [passive, automatic acts engaged in through atechnological process initiated by ano<strong>the</strong>r] could c<strong>on</strong>stitute direct infringement.” 88(e) The Webbworld CaseIn a case factually similar to Frena, a company operating a website was held directlyliable for <strong>the</strong> posting of copyrighted material <strong>on</strong> its site which could be downloaded bysubscribers. In Playboy Enterprises, Inc. v. Webbworld, Inc., 89 <strong>the</strong> defendant Webbworld, Inc.operated a website called Neptics, which made adult images available to subscribers who paid$11.95 per m<strong>on</strong>th. Over a period of several m<strong>on</strong>ths, images became available through <strong>the</strong>Neptics website which were originally created by or for <strong>the</strong> plaintiff Playboy Enterprises, Inc.The court rejected <strong>the</strong> defendant’s argument that it could not be held directly liable forinfringement under <strong>the</strong> logic of <strong>the</strong> Netcom case. The court distinguished <strong>the</strong> Netcom case <strong>on</strong><strong>the</strong> ground that Netcom did not create or c<strong>on</strong>trol <strong>the</strong> c<strong>on</strong>tent of <strong>the</strong> informati<strong>on</strong> available to itssubscribers, but ra<strong>the</strong>r merely provided access to <strong>the</strong> <strong>Internet</strong>. In c<strong>on</strong>trast, <strong>the</strong> court noted thatNeptics was receiving payment selling <strong>the</strong> images it stored <strong>on</strong> its computers, and <strong>the</strong>refore wasacting as more than merely an informati<strong>on</strong> c<strong>on</strong>duit. 908687888990K. Stuckey, <strong>Internet</strong> and Online Law § 6.10[1][b], at 6-88 – 6-89 (2008).H.R. Rep. No. 105-551 Part 1, at 11 (1998).ALS Scan, Inc. v. RemarQ Communities, Inc., 239 F.3d 619, 622 (4 th Cir. 2001). A subsequent district courtcited with approval <strong>the</strong> Fourth Circuit’s decisi<strong>on</strong> <strong>on</strong> this point. See Costar Group Inc. v. Loopnet, Inc., 164 F.Supp. 2d 688, 695-96 (D. Md. 2001), aff’d, 373 F.3d 544 (4 th Cir. 2004).968 F. Supp. 1171 (N.D. Tex. 1997)Id. at 1175.- 34 -


The defendant also argued that it could not be held liable for direct infringement becauseit had no c<strong>on</strong>trol over <strong>the</strong> pers<strong>on</strong>s who posted <strong>the</strong> infringing images to <strong>the</strong> adult newsgroupsfrom which Neptics obtained its material. The court rejected this argument: “While this may betrue, Neptics surely has c<strong>on</strong>trol over <strong>the</strong> images it chooses to sell <strong>on</strong> <strong>the</strong> Neptics’ website. Even<strong>the</strong> absence of <strong>the</strong> ability to exercise such c<strong>on</strong>trol, however, is no defense to liability. If abusiness cannot be operated within <strong>the</strong> bounds of <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act, <strong>the</strong>n perhaps <strong>the</strong> questi<strong>on</strong> ofits legitimate existence needs to be addressed.” 91(f)The Sanfilippo CaseIn Playboy Enterprises, Inc. v. Sanfilippo, 92 <strong>the</strong> court found <strong>the</strong> defendant operator of awebsite through which 7475 of <strong>the</strong> plaintiff’s copyrighted images were available directly liablefor infringement. The defendant admitted copying 16 files c<strong>on</strong>taining a great many of <strong>the</strong>images from a third party source <strong>on</strong>to his hard drive and CD-ROM. He also admitted that 11o<strong>the</strong>r files c<strong>on</strong>taining such images were uploaded to his hard drive by a third party. The courtfound that, because <strong>the</strong> defendant had authorized <strong>the</strong> third party to upload such files to his site,<strong>the</strong> defendant was directly liable for such upload as a violati<strong>on</strong> of <strong>the</strong> exclusive right underSecti<strong>on</strong> 106 of <strong>the</strong> copyright statute to “authorize” o<strong>the</strong>rs to reproduce a copyrighted work. Thecourt also found that <strong>the</strong> defendant had willfully infringed 1699 of <strong>the</strong> copyrighted images.One of <strong>the</strong> most interesting aspects of <strong>the</strong> Sanfilippo case is <strong>the</strong> amount of damages <strong>the</strong>court awarded. The plaintiff sought statutory damages, and argued that a statutory damagesaward should be made for each individual image that was infringed. The defendant argued that,in awarding damages, <strong>the</strong> court should c<strong>on</strong>sider <strong>the</strong> fact that <strong>the</strong> copied images were taken fromcompilati<strong>on</strong>s and, <strong>the</strong>refore, an award should be made <strong>on</strong>ly with respect to each particularmagazine’s copyright from which <strong>the</strong> images were taken. The court rejected this argument andallowed a statutory damage award for each image <strong>on</strong> <strong>the</strong> grounds that each image had anindependent ec<strong>on</strong>omic value <strong>on</strong> its own, each image represented “a singular and copyrightableeffort c<strong>on</strong>cerning a particular model, photographer, and locati<strong>on</strong>,” 93 and <strong>the</strong> defendant marketed919293Id. The court also held that <strong>the</strong> principals of Webbworld could be held vicariously liable for <strong>the</strong> infringements.Although <strong>the</strong> principals had no c<strong>on</strong>trol over those resp<strong>on</strong>sible for originally uploading <strong>the</strong> infringing images<strong>on</strong>to <strong>the</strong> <strong>Internet</strong> sites from which Webbworld drew its images, <strong>the</strong> principals had <strong>the</strong> right and ability to c<strong>on</strong>trolwhat occurred <strong>on</strong> <strong>the</strong> Neptics website. The court ruled that <strong>the</strong> $11.95 subscripti<strong>on</strong> fee gave <strong>the</strong> principals asufficient direct financial benefit from <strong>the</strong> infringing activity to hold <strong>the</strong>m vicariously liable. Id. at 1177.The court made its rulings in <strong>the</strong> c<strong>on</strong>text of a moti<strong>on</strong> for summary judgment by <strong>the</strong> plaintiff. The court grantedsummary judgment of infringement with respect to sixty-two copyrighted images, but denied summaryjudgment with respect to sixteen additi<strong>on</strong>al images because of <strong>the</strong> presence of material issues of fact. In asubsequent ruling, <strong>the</strong> court found <strong>the</strong> defendants directly and vicariously liable with respect to <strong>the</strong>se sixteenadditi<strong>on</strong>al images based <strong>on</strong> a similar legal analysis of liability. See Playboy Enterprises, Inc. v. Webbworld,Inc., 45 U.S.P.Q.2d 1641 (N.D. Tex. 1997).1998 U.S. Dist. LEXIS 5125 (S.D. Cal. 1998).Id. at *18-19.- 35 -


each <strong>on</strong>e of <strong>the</strong> images separately. The court awarded statutory damages of $500 per image, fora total damage award of $3,737,500. 94(g) The Free Republic CaseEven where <strong>the</strong>re is a direct voliti<strong>on</strong>al act <strong>on</strong> <strong>the</strong> part of a website operator in copyingcopyrighted material <strong>on</strong>to its site, difficult questi<strong>on</strong>s relating to First Amendment and fair userights may arise, particularly where <strong>the</strong> Web is used to facilitate free ranging discussi<strong>on</strong> am<strong>on</strong>gparticipants. For example, in 1998, <strong>the</strong> Los Angeles Times and The Washingt<strong>on</strong> Post filed acopyright infringement lawsuit against <strong>the</strong> operator of a website called <strong>the</strong> Free Republic. Thesite c<strong>on</strong>tained news stories from dozens of sources (including <strong>the</strong> plaintiffs), posted both by <strong>the</strong>operator of <strong>the</strong> site and its users, and users were allowed to attach comments to <strong>the</strong> stories. 95 Theplaintiffs argued that, because verbatim complete copies of <strong>the</strong>ir news stories were often posted<strong>on</strong> <strong>the</strong> website, it was reducing traffic to <strong>the</strong>ir own websites <strong>on</strong> which <strong>the</strong> articles were posted,and was harming <strong>the</strong>ir ability to license <strong>the</strong>ir articles and to sell <strong>on</strong>line copies of archivedarticles. 96 The defendants raised defenses under <strong>the</strong> fair use doctrine and under <strong>the</strong> FirstAmendment. 97 The defendants moved for summary judgment <strong>on</strong> all claims and <strong>the</strong> plaintiffscross moved for summary judgment <strong>on</strong> <strong>the</strong> defendants’ defense of fair use.The court rejected <strong>the</strong> defendants’ fair use argument and ruled that <strong>the</strong> defendants mightbe liable for infringement. 98 The court ruled that <strong>the</strong> first fair use factor (purpose and characterof <strong>the</strong> use) favored <strong>the</strong> plaintiffs, noting <strong>the</strong>re was little transformative about copying <strong>the</strong> entiretyor porti<strong>on</strong>s of <strong>the</strong> articles, since <strong>the</strong> articles <strong>on</strong> <strong>the</strong> defendants’ site served <strong>the</strong> same purpose asthat for which <strong>on</strong>e would normally seek to obtain <strong>the</strong> original – for ready reference if and whenwebsites visitors needed to look at it. 99 The court also rejected <strong>the</strong> additi<strong>on</strong> of commentary to<strong>the</strong> articles as favoring <strong>the</strong> defendants under <strong>the</strong> first factor, noting that <strong>the</strong> first posting of anarticle to <strong>the</strong> site often c<strong>on</strong>tained little or no transforming commentary, and in most cases it wasnot necessary to copy verbatim <strong>the</strong> entire article in order for users to be able to comment <strong>on</strong> <strong>the</strong>article. 100 Finally, <strong>the</strong> court noted that <strong>the</strong> Free Republic site was a for-profit site, for which <strong>the</strong>949596979899100The plaintiff requested an astr<strong>on</strong>omical $285,420,000 in statutory damages ($20,000/image for 5776 imagesthat were not willfully infringed, and $100,000/image for 1699 images that were willfully infringed).Los Angeles Times v. Free Republic, 54 U.S.P.Q.2d 1453, 1455-56 (C.D. Cal. 2000).Id. at 1457.Id. at 1454-55.The court limited its opini<strong>on</strong> to <strong>the</strong> availability of <strong>the</strong> defenses <strong>on</strong> which <strong>the</strong> defendants had moved forsummary judgment. The court stated it was expressing no opini<strong>on</strong> as to whe<strong>the</strong>r, “given that <strong>the</strong> ‘copying’ ofnews articles at issue in this case is to a large extent copying by third-party users,” <strong>the</strong> plaintiffs could prove aclaim against <strong>the</strong> defendants for copyright infringement. Id. at 1458.Id. at 1460-61.Id. at 1461 & 1463-64. The most telling fact <strong>on</strong> <strong>the</strong> latter point was that <strong>the</strong> Free Republic provided a hypertextlink to Jewish World Review’s website at its request, and asked that Free Republic visitors no l<strong>on</strong>ger copy <strong>the</strong>publicati<strong>on</strong>’s articles verbatim. Id. at 1463.- 36 -


copying enhanced <strong>the</strong> defendants’ ability to solicit d<strong>on</strong>ati<strong>on</strong>s and generate goodwill for <strong>the</strong>irwebsite operati<strong>on</strong> and o<strong>the</strong>r businesses of <strong>the</strong> website operator. 101The sec<strong>on</strong>d fair use factor (nature of <strong>the</strong> copyrighted work) favored <strong>the</strong> defendants,because <strong>the</strong> copied news articles were predominantly factual in nature. 102 The third fair usefactor (amount and substantiality of <strong>the</strong> porti<strong>on</strong> used in relati<strong>on</strong> to <strong>the</strong> copyrighted work as awhole) favored <strong>the</strong> plaintiffs, because in many cases exact copies of <strong>the</strong> entire article were madeand <strong>the</strong> court had previously found that copying of <strong>the</strong> entire article was not necessary tocomment <strong>on</strong> it. 103 Finally, <strong>the</strong> fourth fair use factor (effect of <strong>the</strong> use <strong>on</strong> <strong>the</strong> potential market foror value of <strong>the</strong> copyrighted work) favored <strong>the</strong> plaintiffs, because <strong>the</strong> court found that <strong>the</strong>availability of complete copies of <strong>the</strong> articles <strong>on</strong> <strong>the</strong> Free Republic site fulfilled at least to someextent demand for <strong>the</strong> original works and diminished <strong>the</strong> plaintiffs’ ability to sell and license<strong>the</strong>ir articles. 104 On balance, <strong>the</strong>n, <strong>the</strong> court c<strong>on</strong>cluded that <strong>the</strong> defendants could not establish afair use defense. 105The court also rejected <strong>the</strong> defendants’ First Amendment defense <strong>on</strong> <strong>the</strong> ground that <strong>the</strong>defendants had failed to show that copying entire news articles was essential to c<strong>on</strong>vey <strong>the</strong>opini<strong>on</strong>s and criticisms of visitors to <strong>the</strong> site. The court noted that visitors’ critiques could beattached to a summary of <strong>the</strong> article, or Free Republic could have provided a link to <strong>the</strong>plaintiffs’ websites where <strong>the</strong> articles could be found. 106The parties subsequently settled <strong>the</strong> case, pursuant to which <strong>the</strong> court entered a stipulatedfinal judgment enjoining <strong>the</strong> defendants from copying, posting, uploading, downloading,distributing or archiving any of <strong>the</strong> plaintiffs’ works, or encouraging o<strong>the</strong>rs to do so, or operatingany website or o<strong>the</strong>r <strong>on</strong>line service that accomplished or permitted any of <strong>the</strong> foregoing, exceptas o<strong>the</strong>rwise permitted by <strong>the</strong> plaintiffs in writing or by <strong>the</strong> fair use doctrine. The defendantsagreed to pay $1,000,000 in statutory damages for past infringing acts. 107(h) The MP3.com CasesIn 2000, <strong>the</strong> Recording Industry Associati<strong>on</strong> of America, Inc. (RIAA), <strong>on</strong> behalf of 10 ofits members, filed a complaint in federal court in <strong>the</strong> Sou<strong>the</strong>rn District of New York for willful101102103104105106107Id. at 1464-66.Id. at 1467.Id. at 1468.Id. at 1470-71. The court rejected <strong>the</strong> defendants’ argument that its site was increasing hits to <strong>the</strong> plaintiffs’sites through referrals off its own site, noting that <strong>the</strong> defendants had not addressed how many hits to <strong>the</strong>plaintiffs’ sites were diverted away as a c<strong>on</strong>sequence of <strong>the</strong> posting of articles to <strong>the</strong> Free Republic. The courtalso cited several cases rejecting <strong>the</strong> argument that a use is fair because it increases demand for <strong>the</strong> plaintiff’scopyrighted work. Id. at 1471.Id. at 1472.Id. at 1472-73.Los Angeles Times v. Free Republic, 56 U.S.P.Q. 2d 1862 (C.D. Cal. 2000).- 37 -


copyright infringement against MP3.com, based <strong>on</strong> MP3.com’s new “My.MP3” service. 108According to <strong>the</strong> complaint, this service allowed users to gain access through <strong>the</strong> <strong>Internet</strong>, anddownload digital copies of, commercial CDs, using <strong>on</strong>e of two comp<strong>on</strong>ent services:“Instant Listening Service” – Under this service, a user could place an order for a commercialCD through <strong>on</strong>e of several <strong>on</strong>line CD retailers cooperating with MP3.com, and <strong>the</strong>n immediatelyhave access to <strong>the</strong> s<strong>on</strong>g tracks <strong>on</strong> that CD stored <strong>on</strong> an MP3.com server, before arrival of <strong>the</strong>shipment of <strong>the</strong> physical CD ordered by <strong>the</strong> user. 109“Beam-it” – Under this service, a user could insert a commercial CD or a copy <strong>the</strong>reof(authorized or unauthorized) into his or her computer CD-ROM drive. If <strong>the</strong> MP3.com serverwas able to recognize <strong>the</strong> CD, <strong>the</strong> user was <strong>the</strong>n given access to <strong>the</strong> s<strong>on</strong>g tracks c<strong>on</strong>tained <strong>on</strong> <strong>the</strong>CD stored <strong>on</strong> an MP3.com server. 110In order to offer <strong>the</strong> My.MP3 service, MP3.com purchased and copied <strong>the</strong> tracks fromseveral tens of thousands of commercial CDs <strong>on</strong>to its servers. 111 When users accessed soundrecordings through My.MP3, it was <strong>the</strong>se reproducti<strong>on</strong>s made by MP3.com that were accessed,and not any copies made from <strong>the</strong> users’ own CD. 112 The plaintiffs sought a ruling that <strong>the</strong>copying of <strong>the</strong> commercial CDs <strong>on</strong>to <strong>the</strong> MP3.com servers c<strong>on</strong>stituted willful infringement of<strong>the</strong> copyright rights of <strong>the</strong> plaintiffs.The case raised <strong>the</strong> very interesting issue of whe<strong>the</strong>r, assuming that users who are <strong>the</strong>owners of a lawful copy of a CD could lawfully upload a copy <strong>the</strong>reof to an MP3.com server for<strong>the</strong>ir own private use under Secti<strong>on</strong> 1008 113 of <strong>the</strong> Audio Home Recording Act of 1992 114 orunder <strong>the</strong> fair use doctrine, it should be lawful for MP3.com to assist users in accomplishing that,and, if so, whe<strong>the</strong>r it should be permissible to do so by advance copying of tracks in anticipati<strong>on</strong>of a user ordering or already owning a CD c<strong>on</strong>taining those tracks.The court ruled that <strong>the</strong> copying by MP3.com of <strong>the</strong> commercial CDs made out a primafacie case of direct copyright infringement, 115 and rejected <strong>the</strong> defendant’s asserti<strong>on</strong> that such108109110111112113114115Complaint for <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Infringement, UMG Recordings, Inc. v. MP3.com, Inc., No. 00 Civ. 0472 (S.D.N.Y.Jan. 21, 2000).Id. 4 & App. A.Id.UMG Recordings Inc. v. MP3.com Inc., 92 F. Supp. 2d 349, 350 (S.D.N.Y. 2000).Id.Secti<strong>on</strong> 1008 provides: “No acti<strong>on</strong> may be brought under this title alleging infringement of copyright based <strong>on</strong><strong>the</strong> manufacture, importati<strong>on</strong>, or distributi<strong>on</strong> of a digital audio recording device, a digital audio recordingmedium, an analog recording device, or an analog recording medium, or based <strong>on</strong> <strong>the</strong> n<strong>on</strong>commercial use by ac<strong>on</strong>sumer of such a device or medium for making digital musical recordings or analog musical recordings.” 17U.S.C. § 1008.Pub. L. No. 102-563, 106 Stat. 4244 (1992).“Thus, although defendant seeks to portray its service as <strong>the</strong> ‘functi<strong>on</strong>al equivalent’ of storing its subscribers’CDs, in actuality defendant is re-playing for <strong>the</strong> subscribers c<strong>on</strong>verted versi<strong>on</strong>s of <strong>the</strong> recordings it copied,- 38 -


copying was a fair use. The court ruled that <strong>the</strong> first fair use factor (purpose and character of <strong>the</strong>use) weighed against <strong>the</strong> defendant because <strong>the</strong> defendant’s purpose for <strong>the</strong> use was commercial– although defendant was not charging users a fee for <strong>the</strong> service, “defendant seeks to attract asufficiently large subscripti<strong>on</strong> base to draw advertising and o<strong>the</strong>rwise make a profit.” 116 Thecourt rejected <strong>the</strong> defendant’s argument that <strong>the</strong> copying was transformative because it allowedusers to “space shift” <strong>the</strong>ir CDs into ano<strong>the</strong>r format in which <strong>the</strong>y could enjoy <strong>the</strong>ir soundrecordings without lugging around physical CDs, ruling that <strong>the</strong> argument was “simply ano<strong>the</strong>rway of saying that <strong>the</strong> unauthorized copies are being retransmitted in ano<strong>the</strong>r medium – aninsufficient basis for any legitimate claim of transformati<strong>on</strong>.” 117With respect to <strong>the</strong> sec<strong>on</strong>d factor (nature of <strong>the</strong> copyrighted work), <strong>the</strong> court held that,because <strong>the</strong> copyrighted works at issue were creative musical works, this factor weighed againstdefendant. 118 The third factor (amount and substantiality of <strong>the</strong> copyrighted work used) alsoweighed against <strong>the</strong> defendant because <strong>the</strong> defendant had copied, and <strong>the</strong> My.MP3 servicereplayed, <strong>the</strong> copyrighted works in <strong>the</strong>ir entirety. 119Finally, with respect to <strong>the</strong> fourth factor (effect of <strong>the</strong> use up<strong>on</strong> <strong>the</strong> potential market foror value of <strong>the</strong> copyrighted work), <strong>the</strong> court noted that <strong>the</strong> defendant’s activities “<strong>on</strong> <strong>the</strong>ir faceinvade plaintiffs’ statutory right to license <strong>the</strong>ir copyrighted sound recordings to o<strong>the</strong>rs forreproducti<strong>on</strong>.” 120 The defendant argued that its activities enhanced <strong>the</strong> plaintiffs’ sales, sincesubscribers could not gain access to recordings through MP3.com unless had already purchased,or agreed to purchase, <strong>the</strong>ir own CD copies of those recordings. The court rejected thisargument <strong>on</strong> <strong>the</strong> following rati<strong>on</strong>ale:Any allegedly positive impact of defendant’s activities <strong>on</strong> plaintiffs’ prior marketin no way frees defendant to usurp a fur<strong>the</strong>r market that directly derives fromreproducti<strong>on</strong> of <strong>the</strong> plaintiffs’ copyrighted works. This would be so even if <strong>the</strong>copyrightholder had not yet entered <strong>the</strong> new market in issue, for acopyrightholder’s “exclusive” rights, derived from <strong>the</strong> C<strong>on</strong>stituti<strong>on</strong> and <strong>the</strong><str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act, include <strong>the</strong> right, within broad limits, to curb <strong>the</strong> development of116117118119120without authorizati<strong>on</strong>, from plaintiffs’ copyrighted CDs. On its face, this makes out a presumptive case ofinfringement under <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act of 1976 ….” 92 F. Supp. 2d at 350.Id. at 351.Id. C<strong>on</strong>trast this holding with <strong>the</strong> Ninth Circuit’s statement in RIAA v. Diam<strong>on</strong>d Multimedia Sys., 180 F.3d1072, 1079 (9th Cir. 1999), in which <strong>the</strong> Ninth Circuit found space shifting of a recording from a CD <strong>on</strong>to <strong>the</strong>“Rio” portable MP3 player device (through a process known as “ripping,” or re-encoding of music dataencoded in CD format into <strong>the</strong> MP3 file format) to be “paradigmatic n<strong>on</strong>commercial pers<strong>on</strong>al use entirelyc<strong>on</strong>sistent with <strong>the</strong> purposes of <strong>the</strong> [Audio Home Recording Act].”UMG, 92 F. Supp. 2d at 351-52.Id. at 352.Id.- 39 -


such a derivative market by refusing to license a copyrighted work or by doing so<strong>on</strong>ly <strong>on</strong> terms <strong>the</strong> copyright owner finds acceptable. 121The court <strong>the</strong>refore ruled that <strong>the</strong> defendant was not entitled to a fair use defense as amatter of law, and entered partial summary judgment holding <strong>the</strong> defendant to have infringed <strong>the</strong>plaintiffs’ copyrights. 122 Subsequent to <strong>the</strong> court’s ruling of infringement, <strong>the</strong> defendant settledwith all but <strong>on</strong>e of <strong>the</strong> plaintiff record companies (Universal Music Group) by taking a license toreproduce <strong>the</strong> plaintiffs’ recordings <strong>on</strong> its servers and to stream <strong>the</strong>m over <strong>the</strong> <strong>Internet</strong> to itssubscribers, for which MP3.com reportedly paid $20 milli<strong>on</strong> to each of <strong>the</strong> record companies andagreed to pay a few pennies each time a user placed a CD in his or her locker, plus a smalleramount each time a track was played. 123Universal Music Group pursued a claim of statutory damages against MP3.com. Thecourt c<strong>on</strong>cluded that MP3.com’s infringement was willful, and awarded statutory damages of$25,000 per CD illegally copied by MP3.com. 124 Even based <strong>on</strong> <strong>the</strong> defendant’s asserti<strong>on</strong> that<strong>the</strong>re were no more than 4,700 CDs for which <strong>the</strong> plaintiffs qualified for statutory damages (anissue that was to have been <strong>the</strong> subject of a separate trial), <strong>the</strong> statutory damages award wouldhave come to $118,000,000. 125 On <strong>the</strong> eve of trial, <strong>the</strong> defendant settled with Universal MusicGroup by agreeing to pay <strong>the</strong> plaintiff $53.4 milli<strong>on</strong> and to take a license to Universal’s entiremusic catalog in exchange for unspecified royalty payments. 126MP3.com’s legal troubles did not end with <strong>the</strong> settlements with <strong>the</strong> RIAA plaintiffs. OnAug. 8, 2001, a group of over 50 music publishers and s<strong>on</strong>gwriters filed suit against MP3.com<strong>on</strong> claims of copyright infringement very similar to those asserted by <strong>the</strong> RIAA plaintiffs. Theplaintiffs sought to hold MP3.com liable for <strong>the</strong> copies of <strong>the</strong>ir works made in c<strong>on</strong>necti<strong>on</strong> with<strong>the</strong> My.MP3.com service, as well as for <strong>the</strong> subsequent “viral distributi<strong>on</strong>” of copies of <strong>the</strong>irworks allegedly d<strong>on</strong>e through services such as Napster, Gnutella, Aimster, and Music City byMP3.com users after <strong>the</strong>y download digital copies through MP3.com. 127 Numerous o<strong>the</strong>r suits121122123124125126127Id. (citati<strong>on</strong>s omitted).Id. at 353.See J<strong>on</strong> Healey, “MP3.com Settles with BMG, Warner,” San Jose Mercury News (June 10, 2000), at 1A; ChrisO’Brien, “MP3 Sets Final Pact: Universal Music Group Will Get $53.4 Milli<strong>on</strong>,” San Jose Mercury News(Nov. 15, 2000) at 1C, 14C.UMG Recordings Inc. v. MP3.com, Inc., 56 U.S.P.Q.2d 1376, 1379, 1381 (S.D.N.Y. 2000). The court rejected<strong>the</strong> plaintiffs’ argument that a statutory damages award should be made for each s<strong>on</strong>g copied, ra<strong>the</strong>r than eachCD. The court cited 17 U.S.C. § 504(c)(1), which provides that a statutory damages award may be recovered ina specified range “with respect to any <strong>on</strong>e work,” and fur<strong>the</strong>r provides that “all parts of a compilati<strong>on</strong> orderivative work c<strong>on</strong>stitute <strong>on</strong>e work.” UMG Recordings Inc. v. MP3.com Inc., 109 F. Supp. 2d 223, 224-25(S.D.N.Y. 2000).56 U.S.P.Q.2d at 1381.O’Brien, supra note 123, at 1C.“Music Publishers, S<strong>on</strong>gwriters Sue MP3.com for ‘Viral Distributi<strong>on</strong>’ of <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>ed Works,” BNA’sElectr<strong>on</strong>ic Commerce & Law Report (Aug. 29, 2001) at 933. In late August of 2001, MP3.com was acquiredby media company Vivendi Universal.- 40 -


were brought against MP3.com as well. For example, in Sept. of 2001, Isaac, Taylor & ZacharyHans<strong>on</strong> also sued MP3.com for copying of <strong>the</strong>ir copyrighted s<strong>on</strong>gs <strong>on</strong> My.MP3.com. 128Numerous opini<strong>on</strong>s have been issued as a result of <strong>the</strong>se lawsuits, holding MP3.comliable for willful copyright infringement and ruling it collaterally estopped from denying that itwillfully infringed <strong>the</strong> plaintiffs’ various copyrighted works when it created <strong>the</strong> “server copies”of thousands of CDs in late 1999 and early 2000. 129(i)The CoStar CaseIn CoStar Group Inc. v. LoopNet, Inc., 130 <strong>the</strong> plaintiff CoStar maintained a copyrightedcommercial real estate database that included photographs. The defendant LoopNet offered aservice through which a user, usually a real estate broker, could post a listing of commercial realestate available for lease. The user would access, fill out, and submit a form for <strong>the</strong> propertyavailable. To include a photograph of <strong>the</strong> property, <strong>the</strong> user was required to fill out ano<strong>the</strong>rform. The photograph would initially be uploaded into a separate folder <strong>on</strong> LoopNet’s system,where it would first be reviewed by a LoopNet employee to determine that it was in fact aphotograph of commercial property and that <strong>the</strong>re was no obvious indicati<strong>on</strong> <strong>the</strong> photograph wassubmitted in violati<strong>on</strong> of LoopNet’s terms and c<strong>on</strong>diti<strong>on</strong>s. If <strong>the</strong> photograph met LoopNet’scriteria, <strong>the</strong> employee would accept it and post it al<strong>on</strong>g with <strong>the</strong> property listing. CoStar claimedthat over 300 of its copyrighted photographs had been posted <strong>on</strong> LoopNet’s site, and suedLoopNet for both direct and c<strong>on</strong>tributory copyright liability. 131CoStar argued that LoopNet should be directly liable for copyright infringement because,acting through its employees’ review and subsequent posting of <strong>the</strong> photographs, LoopNet wasdirectly copying and distributing <strong>the</strong> photographs, citing <strong>the</strong> Frena case discussed above inSecti<strong>on</strong> II.A.4(d). The district court rejected this argument, noting that <strong>the</strong> Fourth Circuit in <strong>the</strong>ALS Scan case had c<strong>on</strong>cluded that <strong>the</strong> legislative history of <strong>the</strong> DMCA indicated C<strong>on</strong>gress’intent to overrule <strong>the</strong> Frena case and to follow <strong>the</strong> Netcom case, under which an OSP’s liabilityfor postings by its users must be judged under <strong>the</strong> c<strong>on</strong>tributory infringement doctrine. 132The Fourth Circuit affirmed this ruling <strong>on</strong> appeal. 133 Citing its own decisi<strong>on</strong> in <strong>the</strong> ALSScan case, <strong>the</strong> Fourth Circuit noted that it had already held that <strong>the</strong> copyright statute implies arequirement of voliti<strong>on</strong> or causati<strong>on</strong>, as evidenced by specific c<strong>on</strong>duct by <strong>the</strong> purported infringer,128129130131132133Steven B<strong>on</strong>isteel, “Hans<strong>on</strong> Sues Music Locker Service Over <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>” (Sept. 26, 2001), available as of Jan. 6,2002 at www.newsbytes.com/news/01/170530.html.See, e.g., Country Road Music, Inc. v. MP3.com, Inc., 279 F.Supp.2d 325 (S.D.N.Y. 2003); Zomba Enters.,Inc. MP3.com, Inc., No. 00 Civ. 6833 (S.D.N.Y. Jun. 8, 2001); Teevee To<strong>on</strong>s, Inc. v. MP3.com, Inc., 134 F.Supp. 2d 546 (S.D.N.Y. 2001); UMG Recordings, Inc. v. MP3.com, Inc., No. 00 Civ. 472, 200 WL 1262568(S.D.N.Y. 2000).164 F. Supp. 2d 688 (D. Md. 2001).Id. at 691-92.Id. at 695-96.CoStar v. LoopNet, 373 F.3d 544 (4 th Cir. 2004).- 41 -


for direct liability. 134 Mere ownership of an electr<strong>on</strong>ic facility by an OSP that resp<strong>on</strong>dsautomatically to users’ input is not sufficient voliti<strong>on</strong> for direct liability. “There are thousands ofowners, c<strong>on</strong>tractors, servers, and users involved in <strong>the</strong> <strong>Internet</strong> whose role involves <strong>the</strong> storageand transmissi<strong>on</strong> of data in <strong>the</strong> establishment and maintenance of an <strong>Internet</strong> facility. Yet <strong>the</strong>irc<strong>on</strong>duct is not truly ‘copying’ as understood by <strong>the</strong> Act; ra<strong>the</strong>r, <strong>the</strong>y are c<strong>on</strong>duits from or towould-be copiers and have not interest in <strong>the</strong> copy itself.” 135The court also inferred a requirement of voliti<strong>on</strong> from <strong>the</strong> statute’s c<strong>on</strong>cept of “copying,”which requires <strong>the</strong> making of “fixed” copies. For <strong>the</strong> reas<strong>on</strong>s discussed in Secti<strong>on</strong> II.A.2 above,<strong>the</strong> court c<strong>on</strong>cluded that transient copies made by an OSP acting merely as a c<strong>on</strong>duit to transmitinformati<strong>on</strong> at <strong>the</strong> instigati<strong>on</strong> of o<strong>the</strong>rs does not create sufficiently fixed copies to make it adirect infringer of copyright. 136 Accordingly, <strong>the</strong> court c<strong>on</strong>cluded, “[a]greeing with <strong>the</strong> analysisin Netcom, we hold that <strong>the</strong> automatic copying, storage and transmissi<strong>on</strong> of copyrightedmaterials, when instigated by o<strong>the</strong>rs, does not render an ISP strictly liable for copyrightinfringement under §§ 501 and 106 of <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act.” 137 The court also affirmed <strong>the</strong> districtcourt’s ruling that <strong>the</strong> quick review of photographs performed by LoopNet’s employees beforeallowing <strong>the</strong>m to be posted <strong>on</strong> <strong>the</strong> site did not amount to “copying,” nor did it add voliti<strong>on</strong> toLoopNet’s involvement in storing <strong>the</strong> copy. 138(j)The Ellis<strong>on</strong> CaseThe case of Ellis<strong>on</strong> v. Roberts<strong>on</strong>, 139 discussed in detail in Secti<strong>on</strong> III.C.5(b)(1)(i) below,refused to hold an OSP liable for direct infringement based <strong>on</strong> infringing materials posted <strong>on</strong> itsservice by users without its knowledge <strong>on</strong> Usenet servers hosted by AOL (infringing copies officti<strong>on</strong>al works).(k) Perfect 10 v. Cybernet VenturesIn Perfect 10, Inc. v. Cybernet Ventures, Inc., 140 <strong>the</strong> court refused to hold <strong>the</strong> defendantCybernet, an “age verificati<strong>on</strong> service” that enrolled subscribers, after verifying <strong>the</strong>ir age as anadult, to a service that would enable <strong>the</strong>m to gain access for a m<strong>on</strong>thly fee to a large number ofmember sites displaying pornographic pictures, liable as a direct copyright infringer based <strong>on</strong> <strong>the</strong>unauthorized presence of <strong>the</strong> plaintiffs’ copyrighted photographs <strong>on</strong> several of <strong>the</strong> member sites.The court discussed <strong>the</strong> Netcom, MAPHIA, and Hardenburgh cases (<strong>the</strong> Hardenburgh case isdiscussed in Secti<strong>on</strong> II.C below), <strong>the</strong>n c<strong>on</strong>cluded as follows:134135136137138139140Id. at 549.Id. at 551.Id..Id. at 555.Id. at 556.189 F. Supp. 2d 1051 (C.D. Cal. 2002), aff’d in part and rev’d in part, 357 F.3d 1072 (9th Cir. 2004) (districtcourt’s ruling of no direct infringement not challenged <strong>on</strong> appeal).213 F. Supp. 2d 1146 (C.D. Cal. 2002).- 42 -


The principle distilled from <strong>the</strong>se cases is a requirement that defendants mustactively engage in <strong>on</strong>e of <strong>the</strong> activities recognized in <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act. Based<strong>on</strong> <strong>the</strong> evidence before <strong>the</strong> Court it appears that Cybernet does not use itshardware to ei<strong>the</strong>r store <strong>the</strong> infringing images or move <strong>the</strong>m from <strong>on</strong>e locati<strong>on</strong> toano<strong>the</strong>r for display. This technical separati<strong>on</strong> between its facilities and those ofits webmasters prevents Cybernet from engaging in reproducti<strong>on</strong> or distributi<strong>on</strong>,and makes it doubtful that Cybernet publicly displays <strong>the</strong> works. Fur<strong>the</strong>r, <strong>the</strong>re iscurrently no evidence that Cybernet has prepared works based up<strong>on</strong> Perfect 10’scopyrighted material. The Court <strong>the</strong>refore c<strong>on</strong>cludes that <strong>the</strong>re is little likelihoodthat Perfect 10 will succeed <strong>on</strong> its direct infringement <strong>the</strong>ory. 141(l)Field v. GoogleIn Field v. Google, 142 discussed in greater detail in Secti<strong>on</strong> III.B.4(a) below, <strong>the</strong> courtruled that Google should not be liable as a direct infringer for serving up through its searchengine, in resp<strong>on</strong>se to user search queries, copies of <strong>the</strong> plaintiff’s copyrighted materials that hadbeen cached by Google’s automated crawler, <strong>the</strong> Googlebot. Citing <strong>the</strong> Netcom and CoStarcases, <strong>the</strong> court noted that a plaintiff must “show voliti<strong>on</strong>al c<strong>on</strong>duct <strong>on</strong> <strong>the</strong> part of <strong>the</strong> defendantin order to support a finding of direct copyright infringement.” 143 For some unknown reas<strong>on</strong>, <strong>the</strong>plaintiff did not allege that Google committed infringement when its Googlebot made <strong>the</strong> initialcopies of <strong>the</strong> plaintiff’s Web pages <strong>on</strong> which his copyrighted materials had been placed andstored those copies in <strong>the</strong> Google cache, nor did <strong>the</strong> plaintiff assert claims for c<strong>on</strong>tributory orvicarious liability. Instead, <strong>the</strong> plaintiff alleged that Google directly infringed his copyrightswhen a Google user clicked <strong>on</strong> a link <strong>on</strong> a Google search results page to <strong>the</strong> Web pagesc<strong>on</strong>taining his copyrighted materials and downloaded a cached copy of those pages fromGoogle’s computers. 144The court rejected this argument:According to Field, Google itself is creating and distributing copies of his works.But when a user requests a Web page c<strong>on</strong>tained in <strong>the</strong> Google cache by clicking<strong>on</strong> a “Cached” link, it is <strong>the</strong> user, not Google, who creates and downloads a copyof <strong>the</strong> cached Web page. Google is passive in this process. Google’s computersresp<strong>on</strong>d automatically to <strong>the</strong> user’s request. Without <strong>the</strong> user’s request, <strong>the</strong> copywould not be created and sent to <strong>the</strong> user, and <strong>the</strong> alleged infringement at issue inthis case would not occur. The automated, n<strong>on</strong>-voliti<strong>on</strong>al c<strong>on</strong>duct by Google inresp<strong>on</strong>se to a user’s request does not c<strong>on</strong>stitute direct infringement under <strong>the</strong><str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act. 145141142143144145Id. at 1168-69.412 F. Supp. 2d 1106 (D. Nev. 2006).Id. at 1115.Id.Id.- 43 -


(m) Parker v. GoogleIn Parker v. Google, 146 pro se plaintiff Gord<strong>on</strong> Parker was <strong>the</strong> owner of copyright in an e-book titled “29 Reas<strong>on</strong>s Not To Be A Nice Guy.” He posted Reas<strong>on</strong> # 6 <strong>on</strong> USENET. Parkerasserted that Google’s automatic archiving of this USENET posting c<strong>on</strong>stituted a directinfringement of his copyright. He also claimed that when Google produced a list of hyperlinksin resp<strong>on</strong>se to a user’s query and excerpted his web site in that list, Google again directlyinfringed his copyrighted work. 147The district court rejected <strong>the</strong>se claims. Citing <strong>the</strong> Costar and Netcom cases, <strong>the</strong> districtcourt held that “when an ISP automatically and temporarily stores data without humaninterventi<strong>on</strong> so that <strong>the</strong> system can operate and transmit data to its users, <strong>the</strong> necessary elementof voliti<strong>on</strong> is missing. The automatic activity of Google’s search engine is analogous. It is clearthat Google’s automatic archiving of USENET postings and excerpting of websites in its resultsto users’ search queries do not include <strong>the</strong> necessary voliti<strong>on</strong>al element to c<strong>on</strong>stitute directcopyright infringement.” 148On appeal, <strong>the</strong> Third Circuit affirmed in an unpublished decisi<strong>on</strong>. 149 The court noted that,“to state a direct copyright infringement claim, a plaintiff must allege voliti<strong>on</strong>al c<strong>on</strong>duct <strong>on</strong> <strong>the</strong>part of <strong>the</strong> defendant,” and Parker’s allegati<strong>on</strong>s failed to allege any voliti<strong>on</strong>al c<strong>on</strong>duct <strong>on</strong> <strong>the</strong> partof Google. 150(n) The Cablevisi<strong>on</strong> CaseIn Twentieth Century Fox Film Corp. v. Cablevisi<strong>on</strong> Sys., 151 <strong>the</strong> district court ruled thatCablevisi<strong>on</strong> was liable for direct copyright infringement based <strong>on</strong> <strong>the</strong> offering of a networkdigital video recording system known as <strong>the</strong> “Remote-Storage DVR System” (RS-DVR), whichpermitted customers to record cable programs <strong>on</strong> central servers at Cablevisi<strong>on</strong>’s facilities andplay <strong>the</strong> programs back for viewing at home. The technology underlying <strong>the</strong> RS-DVR workedas follows. Cablevisi<strong>on</strong> took <strong>the</strong> linear programming signal feed received at its head end andrec<strong>on</strong>figured it by splitting <strong>the</strong> feed into a sec<strong>on</strong>d stream, which was <strong>the</strong>n reformatted through aprocess known as “clamping” to c<strong>on</strong>vert <strong>the</strong> bitrate of <strong>the</strong> stream into <strong>on</strong>e that was moreefficient. In <strong>the</strong> process of clamping, porti<strong>on</strong>s of programming were placed into buffer memory.The stream was <strong>the</strong>n c<strong>on</strong>verted into a number of single program transport streams, <strong>on</strong>e channelper stream. The c<strong>on</strong>verted streams were <strong>the</strong>n fed into a special set of “Arroyo” servers, which atany given moment in time, stored in a buffer three frames of video from each of <strong>the</strong> linearchannels carried by Cablevisi<strong>on</strong>, so that if a customer requested that a particular program be146147148149150151422 F. Supp. 2d 492 (E.D. Pa. 2006), aff’d, 2007 U.S. App. LEXIS 16370 (3d Cir. July 10, 2007).Id. at 496.Id. at 497.Parker v. Google, 2007 U.S. App. LEXIS 16370 (3d Cir. July 10, 2007).Id. at *6, 8.478 F. Supp. 2d 607 (S.D.N.Y. 2007).- 44 -


ecorded, <strong>the</strong> appropriate packets could be retrieved from <strong>the</strong> buffer memory and copied to <strong>the</strong>customer’s designated hard drive storage space <strong>on</strong> <strong>the</strong> Arroyo server. 152The RS-DVR service allowed customers to request that a program be recorded in <strong>on</strong>e oftwo ways. The customer could navigate an <strong>on</strong>-screen program guide and select a future programto record, or while watching a program, <strong>the</strong> customer could press a “record” butt<strong>on</strong> <strong>on</strong> a remotec<strong>on</strong>trol. In resp<strong>on</strong>se, <strong>the</strong> Arroyo server would receive a list of recording requests, find <strong>the</strong>packets for <strong>the</strong> particular programs requested for recording, <strong>the</strong>n make a copy of <strong>the</strong> relevantprogram for each customer that requested it be recorded. A separate copy would be stored ineach customer’s designated hard drive storage space <strong>on</strong> <strong>the</strong> Arroyo server. If no customerrequested that a particular program be recorded, no copy of that program was made <strong>on</strong> <strong>the</strong> harddrives of <strong>the</strong> Arroyo server. When <strong>the</strong> customer selected a recorded program for playback, <strong>the</strong>Arroyo server would locate <strong>the</strong> copy of <strong>the</strong> desired program stored <strong>on</strong> <strong>the</strong> customer’s designatedhard drive storage space, <strong>the</strong>n cause <strong>the</strong> program to be streamed out. The stream c<strong>on</strong>taining <strong>the</strong>program would be transmitted to every home in <strong>the</strong> node where <strong>the</strong> requesting customer waslocated, but <strong>on</strong>ly <strong>the</strong> requesting set-top box would be provided <strong>the</strong> key for decrypting <strong>the</strong> streamfor viewing. 153The plaintiffs alleged direct copyright infringement based <strong>on</strong> Cablevisi<strong>on</strong>’s creati<strong>on</strong> of<strong>the</strong> copies <strong>on</strong> <strong>the</strong> hard drives of <strong>the</strong> Arroyo servers and of <strong>the</strong> buffer copies. AlthoughCablevisi<strong>on</strong> did not deny that <strong>the</strong>se copies were being made, it argued that it was entirely passivein <strong>the</strong> process and <strong>the</strong> copies were being made by its customers. It also argued, based <strong>on</strong> <strong>the</strong>S<strong>on</strong>y case, that it could not be liable for copyright infringement for merely providing customerswith <strong>the</strong> machinery to make <strong>the</strong> copies. 154The court rejected <strong>the</strong>se arguments, ruling that <strong>the</strong> RS-DVR was not merely a device, butra<strong>the</strong>r a service, and that, by providing <strong>the</strong> service, it was Cablevisi<strong>on</strong> doing <strong>the</strong> copying. Inparticular, <strong>the</strong> court found <strong>the</strong> relati<strong>on</strong>ship between Cablevisi<strong>on</strong> and RS-DVR customers to besignificantly different from <strong>the</strong> relati<strong>on</strong>ship between S<strong>on</strong>y and VCR users. Unlike a VCR, <strong>the</strong>RS-DVR did not have a stand-al<strong>on</strong>e quality. Cablevisi<strong>on</strong> retained ownership of <strong>the</strong> RS-DVRset-top box, and <strong>the</strong> RS-DVR required a c<strong>on</strong>tinuing relati<strong>on</strong>ship between Cablevisi<strong>on</strong> and itscustomers. Cablevisi<strong>on</strong> not <strong>on</strong>ly supplied <strong>the</strong> set-top box for <strong>the</strong> customer’s home, but alsodecided which programming channels to make available for recording, and housed, operated, andmaintained <strong>the</strong> rest of <strong>the</strong> equipment that made <strong>the</strong> RS-DVR’s recording process possible.Cablevisi<strong>on</strong> also determined how much memory to allot to each customer and reserved storagecapacity for each customer <strong>on</strong> a hard drive at its facility. Customers were offered <strong>the</strong> opti<strong>on</strong> ofacquiring additi<strong>on</strong>al capacity for a fee. 155In sum, <strong>the</strong> court c<strong>on</strong>cluded that <strong>the</strong> RS-DVR was more akin to a video-<strong>on</strong>-demand(VOD) service than to a VCR or o<strong>the</strong>r time-shifting device. The court noted that <strong>the</strong> RS-DVR152153154155Id. at 613-14.Id. at 614-16.Id. at 617-18.Id. at 618-19.- 45 -


service was in fact based <strong>on</strong> a modified VOD platform. With both systems, Cablevisi<strong>on</strong> decidedwhat c<strong>on</strong>tent to make available to customers for <strong>on</strong>-demand viewing. As in VOD, <strong>the</strong> number ofavailable pathways for programming delivery was limited; if <strong>the</strong>re were n<strong>on</strong>e available, <strong>the</strong>customer would get an error message or busy signal. Thus, in its architecture and deliverymethod, <strong>the</strong> court c<strong>on</strong>cluded that <strong>the</strong> RS-DVR bore a striking resemblance to a VOD service – aservice that Cablevisi<strong>on</strong> provided pursuant to licenses negotiated with programming owners. 156Accordingly, <strong>the</strong> court ruled that a reas<strong>on</strong>able fact finder could c<strong>on</strong>clude <strong>on</strong>ly that <strong>the</strong> copying atissues was being d<strong>on</strong>e not by <strong>the</strong> customers, but by Cablevisi<strong>on</strong> itself. 157With respect to <strong>the</strong> buffer copies, Cablevisi<strong>on</strong> argued that <strong>the</strong> buffer copies were notsufficiently fixed to be cognizable as “copies” under copyright law. The court rejected thisargument, noting that <strong>the</strong> buffer copies were sufficiently permanent to make <strong>the</strong> Arroyo harddisk copies from, and were <strong>the</strong>refore capable of being reproduced, as required by <strong>the</strong> definiti<strong>on</strong>of “fixati<strong>on</strong>.” The court also cited <strong>the</strong> numerous court decisi<strong>on</strong>s, and <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office’sAugust 2001 report <strong>on</strong> <strong>the</strong> DMCA, c<strong>on</strong>cluding that RAM copies are “copies” for purposes of <strong>the</strong>copyright act. Accordingly, <strong>the</strong> court c<strong>on</strong>cluded that summary judgment of direct infringementwas warranted with respect to both <strong>the</strong> Arroyo server copies and <strong>the</strong> buffer copies. 158Finally, <strong>the</strong> court ruled, based <strong>on</strong> similar logic, that Cablevisi<strong>on</strong> was engaged ininfringing transmissi<strong>on</strong>s and public performances to its customers. 159 The court noted that,“where <strong>the</strong> relati<strong>on</strong>ship between <strong>the</strong> party sending a transmissi<strong>on</strong> and party receiving it iscommercial, as would be <strong>the</strong> relati<strong>on</strong>ship between Cablevisi<strong>on</strong> and potential RS-DVR customers,courts have determined that <strong>the</strong> transmissi<strong>on</strong> is <strong>on</strong>e made ‘to <strong>the</strong> public.’” 160On appeal, <strong>the</strong> Sec<strong>on</strong>d Circuit reversed in The Carto<strong>on</strong> Network LP v. CSC Holdings,Inc. 161 The Sec<strong>on</strong>d Circuit’s rulings with respect to <strong>the</strong> issue of buffer copies are discussed inSecti<strong>on</strong> II.A.2 above. With respect to <strong>the</strong> copies created <strong>on</strong> <strong>the</strong> hard drives of <strong>the</strong> Arroyoservers, <strong>the</strong> court noted that Netcom and its progeny direct attenti<strong>on</strong> to <strong>the</strong> voliti<strong>on</strong>al c<strong>on</strong>ductthat causes <strong>the</strong> copy to be made. In <strong>the</strong> case of an ordinary VCR, <strong>the</strong> court noted that it seemedclear that <strong>the</strong> operator of <strong>the</strong> VCR – <strong>the</strong> pers<strong>on</strong> actually pressing <strong>the</strong> butt<strong>on</strong> to make <strong>the</strong>recording, supplies <strong>the</strong> necessary element of voliti<strong>on</strong>, not <strong>the</strong> manufacturer of <strong>the</strong> device. Thecourt c<strong>on</strong>cluded that <strong>the</strong> RS-DVR customer was not sufficiently distinguishable from a VCRuser to impose liability as a direct infringer <strong>on</strong> a different party for copies that were madeautomatically up<strong>on</strong> that customer’s command. The court distinguished cases holding liable acopy shop making course packs for college professors, finding a significant different betweenmaking a request to a human employee, who <strong>the</strong>n voluntarily operates <strong>the</strong> copying system tomake <strong>the</strong> copy, and issuing a command directly to a system, which automatically obeys156157158159160161Id. at 619.Id. at 621.Id. at 621-22.Id. at 622-23.Id. at 623.536 F.3d 121 (2d Cir. 2008), cert. denied sub nom. CNN, Inc. v. CSC Holdings, Inc., 2009 U.S. LEXIS 4828(2009).- 46 -


commands and engages in no voliti<strong>on</strong>al c<strong>on</strong>duct. 162 “Here, by selling access to a system thatautomatically produces copies <strong>on</strong> command, Cablevisi<strong>on</strong> more closely resembles a storeproprietor who charges customers to use a photocopier <strong>on</strong> his premises, and it seems incorrect tosay, without more, that such a proprietary ‘makes’ any copies when his machines are actuallyoperated by his customers.” 163Nor was Cablevisi<strong>on</strong>’s discreti<strong>on</strong> in selecting <strong>the</strong> programming that it would makeavailable for recording sufficiently proximate to <strong>the</strong> copying to displace <strong>the</strong> customer as <strong>the</strong>pers<strong>on</strong> who “made” <strong>the</strong> copies. Cablevisi<strong>on</strong>’s c<strong>on</strong>trol was limited to <strong>the</strong> channels ofprogramming available to a customer and not to <strong>the</strong> programs <strong>the</strong>mselves. Cablevisi<strong>on</strong> had noc<strong>on</strong>trol over what programs were made available <strong>on</strong> individual channels or when those programswould air, if at all. In that respect, Cablevisi<strong>on</strong> possessed far less c<strong>on</strong>trol over recordable c<strong>on</strong>tentthat it did in <strong>the</strong> VOD c<strong>on</strong>text, where it actively selected and made available beforehand <strong>the</strong>individual programs available for viewing. Thus, Cablevisi<strong>on</strong> could not have direct liability for<strong>the</strong> acts of its customers, and any liability <strong>on</strong> its part would have to be based <strong>on</strong> c<strong>on</strong>tributoryliability. The district court’s noted “c<strong>on</strong>tinuing relati<strong>on</strong>ship” with its RS-DVR customers, itsc<strong>on</strong>trol over recordable c<strong>on</strong>tent, and <strong>the</strong> instrumentality of copying would be relevant toc<strong>on</strong>tributory liability, but not direct liability. 164With respect to <strong>the</strong> issue of direct liability, <strong>the</strong> Sec<strong>on</strong>d Circuit c<strong>on</strong>cluded: “We need notdecide today whe<strong>the</strong>r <strong>on</strong>e’s c<strong>on</strong>tributi<strong>on</strong> to <strong>the</strong> creati<strong>on</strong> of an infringing copy may be so greatthat it warrants holding that party directly liable for <strong>the</strong> infringement, even though ano<strong>the</strong>r partyhas actually made <strong>the</strong> copy. We c<strong>on</strong>clude <strong>on</strong>ly that <strong>on</strong> <strong>the</strong> facts of this case, copies produced by<strong>the</strong> RS-DVR system are ‘made’ by <strong>the</strong> RS-DVR customer, and Cablevisi<strong>on</strong>’s c<strong>on</strong>tributi<strong>on</strong> to thisreproducti<strong>on</strong> by providing <strong>the</strong> system does not warrant <strong>the</strong> impositi<strong>on</strong> of direct liability.” 165The Sec<strong>on</strong>d Circuit’s rulings with respect whe<strong>the</strong>r Cablevisi<strong>on</strong> was engaged inunauthorized public performances through <strong>the</strong> playback of <strong>the</strong> RS-DVR copies are discussed inSecti<strong>on</strong> II.B.5 below.(o) Arista Records v. Usenet.comIn Arista Records LLC. V. Usenet.com, Inc., 166 <strong>the</strong> defendants operated a Napster-likeUsenet service that advertised to and targeted users who wanted to download music files. Unlikepeer-to-peer filing sharing networks, <strong>the</strong> files were stored <strong>on</strong> “spool” news servers operated by162163164165166Id. at 131.Id. at 132.Id. at 132-33.Id. at 133.633 F. Supp. 2d 124 (S.D.N.Y. 2009).- 47 -


<strong>the</strong> defendants. The defendants created designated servers for newsgroups c<strong>on</strong>taining musicbinary files to increase <strong>the</strong>ir retenti<strong>on</strong> time over o<strong>the</strong>r types of Usenet files. 167The plaintiffs c<strong>on</strong>tended that <strong>the</strong> defendants directly infringed <strong>the</strong>ir copyrights byengaging in unauthorized distributi<strong>on</strong> of copies of <strong>the</strong>ir musical works to subscribers whorequested <strong>the</strong>m for download. The court, relying <strong>on</strong> <strong>the</strong> Netcom and Cablevisi<strong>on</strong> cases, ruledthat a finding of direct infringement of <strong>the</strong> distributi<strong>on</strong> right required a showing that <strong>the</strong>defendants engaged in some voliti<strong>on</strong>al c<strong>on</strong>duct sufficient to show that <strong>the</strong>y actively participatedin distributi<strong>on</strong> of copies of <strong>the</strong> plaintiffs’ copyrighted sound recordings. The court foundsufficient voliti<strong>on</strong>al c<strong>on</strong>duct from <strong>the</strong> following facts. The defendants were well aware thatdigital music files were am<strong>on</strong>g <strong>the</strong> most popular files <strong>on</strong> <strong>the</strong>ir service, and took active measuresto create spool servers dedicated to MP3 files and to increase <strong>the</strong> retenti<strong>on</strong> times of newsgroupsc<strong>on</strong>taining digital music files. They took additi<strong>on</strong>al active steps, including both automatedfiltering and human review, to remove access to certain categories of c<strong>on</strong>tent (such aspornography), while at <strong>the</strong> same time actively targeting young people familiar with o<strong>the</strong>r filesharingprograms to try <strong>the</strong>ir services as a supposedly safe alternative to peer-to-peer music filesharing programs that were getting shut down for infringement. From <strong>the</strong>se facts, <strong>the</strong> court ruledthat <strong>the</strong> defendants’ service was not merely a passive c<strong>on</strong>duit that facilitated <strong>the</strong> exchange ofc<strong>on</strong>tent between users who uploaded infringing c<strong>on</strong>tent and users who downloaded such c<strong>on</strong>tent,but ra<strong>the</strong>r <strong>the</strong> defendants had so actively engaged in <strong>the</strong> distributi<strong>on</strong> process so as to satisfy <strong>the</strong>voliti<strong>on</strong>al c<strong>on</strong>duct requirement. Accordingly, <strong>the</strong> court granted <strong>the</strong> plaintiffs’ moti<strong>on</strong> forsummary judgment <strong>on</strong> <strong>the</strong>ir claim for direct infringement of <strong>the</strong> distributi<strong>on</strong> right. 168(p) Quantum Systems v. Sprint NextelIn Quantum Sys. Integrators, Inc. v. Sprint Nextel Corp., 169 Quantum sued Sprint forcopyright infringement based <strong>on</strong> <strong>the</strong> automated loading of Quantum’s software into <strong>the</strong> RAM of13 Sprint computers from unauthorized copies <strong>on</strong> <strong>the</strong> hard disk when those computers wereturned <strong>on</strong> or rebooted. The jury found liability and Sprint argued <strong>on</strong> appeal that <strong>the</strong> district courterred in denying its JMOL moti<strong>on</strong> and sustaining <strong>the</strong> jury’s finding of infringement because<strong>the</strong>re was no evidence that Sprint engaged in voliti<strong>on</strong>al copying, since <strong>the</strong> RAM copies wereautomatically generated when <strong>the</strong> computers c<strong>on</strong>taining unauthorized, but unutilized, copies of<strong>the</strong> software <strong>on</strong> <strong>the</strong> hard disk were turned <strong>on</strong>. The court rejected this argument, distinguishing itsCostar decisi<strong>on</strong>, which involved an ISP that merely provided electr<strong>on</strong>ic infrastructure forcopying, storage, and transmissi<strong>on</strong> of material at <strong>the</strong> behest of its users. By c<strong>on</strong>trast, in <strong>the</strong>instant case <strong>the</strong> copying was instigated by <strong>the</strong> voliti<strong>on</strong>al acts of Sprint’s own employees who167168169Id. at 130-31.Id. at 132, 146-49. As a sancti<strong>on</strong> for litigati<strong>on</strong> misc<strong>on</strong>duct, including spoliati<strong>on</strong> of evidence and sending keyemployees out of <strong>the</strong> country <strong>on</strong> paid vacati<strong>on</strong>s so <strong>the</strong>y could not be deposed, <strong>the</strong> court precluded <strong>the</strong>defendants from asserting an affirmative defense of protecti<strong>on</strong> under <strong>the</strong> DMCA’s safe harbor provisi<strong>on</strong>s. Id. at137-42.2009 U.S. App. LEXIS 14766 (4 th Cir. July 7, 2009).- 48 -


loaded <strong>the</strong> original copies of <strong>the</strong> software <strong>on</strong>to Sprint computers and <strong>the</strong>n rebooted <strong>the</strong>computers, <strong>the</strong>reby causing <strong>the</strong> RAM copies. 170(q) Summary of Case LawIn sum, under a majority of <strong>the</strong> cases decided to date, a direct voliti<strong>on</strong>al act of some kindis required for liability for direct copyright infringement. The MAPHIA and Sabella casessuggest that it is insufficient for direct liability for an actor such as a BBS operator to haveprovided <strong>on</strong>ly encouragement of <strong>the</strong> acts (such as initial uploading of unauthorized copies) thatlead to infringement. Similarly, <strong>the</strong> CoStar, Ellis<strong>on</strong> and Perfect 10 v. Cybernet Ventures casessuggest that an OSP will not have direct liability for infringing material posted <strong>on</strong> its service byusers or available through its service <strong>on</strong> third party sites where <strong>the</strong> OSP has not encouraged suchposting or had advance knowledge of it. And <strong>the</strong> Field v. Google and Parker v. Google caseshold that a search engine operator will not have direct liability for serving up cached copies ofcopyrighted materials in an automated resp<strong>on</strong>se to user requests based <strong>on</strong> search results. Ra<strong>the</strong>r,for direct liability <strong>the</strong> defendant must have engaged in <strong>the</strong> very acts of infringement <strong>the</strong>mselvesin a voliti<strong>on</strong>al way.However, <strong>the</strong> Frena, Webbworld and Sanfilippo cases (as well as <strong>the</strong> Hardenburgh andWebbworld cases discussed in Secti<strong>on</strong> II.C below with respect to <strong>the</strong> public display anddistributi<strong>on</strong> rights) suggest that where an actor such as a BBS operator or website operator hassome form of direct involvement in <strong>the</strong> anticipated acts that lead to infringement or in <strong>the</strong>infringing acts <strong>the</strong>mselves (such as resale of <strong>the</strong> infringing material), <strong>the</strong>re may be a finding ofsufficient voliti<strong>on</strong>al activity to impose direct liability. And <strong>the</strong> Arista Records v. Usenet.comcase suggests that direct liability for violati<strong>on</strong> of <strong>the</strong> distributi<strong>on</strong> right can be premised <strong>on</strong> activepromoti<strong>on</strong> of sharing of illicit files coupled with close c<strong>on</strong>trol over what types of material arefeatured for distributi<strong>on</strong> in <strong>the</strong> first instance. Thus, to establish direct liability for infringement<strong>on</strong>e must look at whe<strong>the</strong>r <strong>the</strong> defendant participated in <strong>the</strong> very acts of infringement <strong>the</strong>mselves.As discussed in Secti<strong>on</strong> III.C below, <strong>the</strong> Digital Millennium <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act 171 (referred toherein as <strong>the</strong> “DMCA”) defines certain safe harbors against liability for OSPs who act as merelypassive c<strong>on</strong>duits for infringing informati<strong>on</strong> and without knowledge of <strong>the</strong> infringement. An OSPmust meet quite specific detailed requirements to qualify for <strong>the</strong> safe harbors relating to acting asa passive c<strong>on</strong>duit and innocent storage of infringing informati<strong>on</strong>. Where an OSP does notqualify for <strong>the</strong>se safe harbors, <strong>the</strong> standards under <strong>the</strong> case law discussed above will apply todetermine liability.5. The Reproducti<strong>on</strong> Right Under WIPO Implementing Legislati<strong>on</strong>(a) United States Legislati<strong>on</strong>Four bills were introduced in C<strong>on</strong>gress to implement <strong>the</strong> WIPO treaties. Two of <strong>the</strong>m,nei<strong>the</strong>r of which were ultimately enacted, would have attempted to clarify <strong>the</strong> issue of whe<strong>the</strong>r170171Id. at *1-3 & 15-18.Pub. L. No. 105-304, 112 Stat. 2860 (1998).- 49 -


interim copies made during <strong>the</strong> course of transmissi<strong>on</strong> infringe <strong>the</strong> reproducti<strong>on</strong> right. The billthat was adopted – The Digital Millennium <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act – c<strong>on</strong>tains nothing explicitlyaddressing <strong>the</strong> scope of <strong>the</strong> reproducti<strong>on</strong> right in a digital envir<strong>on</strong>ment.(1) The Digital Millennium <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> ActThe DMCA was signed into law by President Clint<strong>on</strong> <strong>on</strong> Oct. 28, 1998. It is essentiallyan enactment of H.R. 2281, introduced in <strong>the</strong> House in July of 1997 by Rep. Howard Coble, andits nearly identical counterpart in <strong>the</strong> Senate, S. 1121, introduced by Sen. Orrin Hatch also inJuly of 1997, which was later combined with ano<strong>the</strong>r bill and, as combined, denominated S.2037. Both H.R. 2281 and S. 1121 were introduced with <strong>the</strong> support of <strong>the</strong> Clint<strong>on</strong>administrati<strong>on</strong>.Title I of <strong>the</strong> DMCA, entitled <strong>the</strong> “WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> and Performances and Ph<strong>on</strong>ogramsTreaties Implementati<strong>on</strong> Act of 1998” and comprised of Secti<strong>on</strong>s 101 through 105, implements<strong>the</strong> WIPO treaties. Title I takes a minimalist approach to implementing <strong>the</strong> requirements of <strong>the</strong>WIPO treaties. The Clint<strong>on</strong> administrati<strong>on</strong> took <strong>the</strong> view that most of <strong>the</strong> enhanced copyrightprotecti<strong>on</strong>s set forth in <strong>the</strong> treaties were already available under United States law, so that nomajor changes to U.S. law were believed necessary to implement <strong>the</strong> treaties.Specifically, <strong>the</strong> DMCA addresses <strong>on</strong>ly <strong>the</strong> requirements of Arts. 11 and 12 of <strong>the</strong> WIPO<str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty, and of Arts. 18 and 19 of <strong>the</strong> WIPO Performances and Ph<strong>on</strong>ograms Treaty, toprovide adequate legal protecti<strong>on</strong> and effective legal remedies against (i) <strong>the</strong> circumventi<strong>on</strong> ofeffective technological measures that are used by rights holders to restrict unauthorized acts withrespect to <strong>the</strong>ir protected works, and (ii) <strong>the</strong> removal or alterati<strong>on</strong> of any electr<strong>on</strong>ic rightsmanagement informati<strong>on</strong> (informati<strong>on</strong> which identifies <strong>the</strong> work, <strong>the</strong> author of <strong>the</strong> work, <strong>the</strong>owner of any right in <strong>the</strong> work, or informati<strong>on</strong> about <strong>the</strong> terms and c<strong>on</strong>diti<strong>on</strong>s of use of <strong>the</strong>work), or <strong>the</strong> distributi<strong>on</strong> or communicati<strong>on</strong> to <strong>the</strong> public of copies of works knowing that <strong>the</strong>electr<strong>on</strong>ic rights management informati<strong>on</strong> has been removed or altered. The specific provisi<strong>on</strong>sof <strong>the</strong>se bills are discussed in fur<strong>the</strong>r detail below. These bills c<strong>on</strong>tain nothing addressing <strong>the</strong>reproducti<strong>on</strong> right or how that right relates to <strong>the</strong> digital envir<strong>on</strong>ment.(2) Legislati<strong>on</strong> Not AdoptedAn alternative bill to implement <strong>the</strong> WIPO treaties, S. 1146, entitled <strong>the</strong> “Digital<str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Clarificati<strong>on</strong> and Technology Educati<strong>on</strong> Act of 1997,” was introduced <strong>on</strong> Sept. 3,1997 by Sen. John Ashcroft. Like <strong>the</strong> DMCA, S. 1146 c<strong>on</strong>tained language to implementprohibiti<strong>on</strong>s against <strong>the</strong> circumventi<strong>on</strong> of technologies to prevent unauthorized access tocopyrighted works and to provide electr<strong>on</strong>ic rights management informati<strong>on</strong> about a work,although it adopted a different approach to doing so than <strong>the</strong> DMCA, as discussed fur<strong>the</strong>r below.S. 1146 also c<strong>on</strong>tained, however, a much broader package of copyright-related measures.With respect to <strong>the</strong> reproducti<strong>on</strong> right, S. 1146 would have clarified that ephemeral copies of awork in digital form that are incidental to <strong>the</strong> operati<strong>on</strong> of a device in <strong>the</strong> ordinary course oflawful use of <strong>the</strong> work do not infringe <strong>the</strong> reproducti<strong>on</strong> right. Specifically, S. 1146 would haveadded a new subsecti<strong>on</strong> (b) to Secti<strong>on</strong> 117 of <strong>the</strong> copyright statute to read as follows:- 50 -


(b) Notwithstanding <strong>the</strong> provisi<strong>on</strong>s of secti<strong>on</strong> 106, it is not an infringement tomake a copy of a work in a digital format if such copying –(1) is incidental to <strong>the</strong> operati<strong>on</strong> of a device in <strong>the</strong> course of <strong>the</strong> use of awork o<strong>the</strong>rwise lawful under this title; and(2) does not c<strong>on</strong>flict with <strong>the</strong> normal exploitati<strong>on</strong> of <strong>the</strong> work and doesnot unreas<strong>on</strong>ably prejudice <strong>the</strong> legitimate interests of <strong>the</strong> author.The proposed new clause (b)(1) was similar to <strong>the</strong> right granted in <strong>the</strong> existing Secti<strong>on</strong>117 of <strong>the</strong> copyright statute with respect to computer programs, which permits <strong>the</strong> making ofcopies of <strong>the</strong> program “as an essential step in <strong>the</strong> utilizati<strong>on</strong> of <strong>the</strong> computer program inc<strong>on</strong>juncti<strong>on</strong> with a machine.” 172 Clause (b)(1) would have extended this right to <strong>the</strong> o<strong>the</strong>rwiselawful use of o<strong>the</strong>r types of works in a digital format, to <strong>the</strong> extent that copying is necessary forsuch use. It would seem to have covered activities such as <strong>the</strong> loading of a musical work intomemory in c<strong>on</strong>juncti<strong>on</strong> with playing <strong>the</strong> work, <strong>the</strong> incidental copies of a movie or o<strong>the</strong>r workordered <strong>on</strong> demand that are made in memory in <strong>the</strong> course of <strong>the</strong> downloading and viewing of<strong>the</strong> movie, and <strong>the</strong> various interim copies of a work that are made in node computers in <strong>the</strong>routine course of an authorized transmissi<strong>on</strong> of <strong>the</strong> work through <strong>the</strong> <strong>Internet</strong>.The limiting language c<strong>on</strong>tained in new clause (b)(2) was drawn directly from <strong>the</strong> WIPOtreaties <strong>the</strong>mselves. Specifically, Article 10 of <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty permits treatysignatories to provide for limitati<strong>on</strong>s of or excepti<strong>on</strong>s to <strong>the</strong> rights granted under <strong>the</strong> treaty “incertain special cases that do not c<strong>on</strong>flict with a normal exploitati<strong>on</strong> of <strong>the</strong> work and do notunreas<strong>on</strong>ably prejudice <strong>the</strong> legitimate interests of <strong>the</strong> author.” The scope of reach of thislanguage is obviously not self evident, and <strong>the</strong> boundaries of this excepti<strong>on</strong> to <strong>the</strong> reproducti<strong>on</strong>right are <strong>the</strong>refore not entirely clear. However, <strong>the</strong> excepti<strong>on</strong> should apply to at least <strong>the</strong> mostcomm<strong>on</strong> instances in which incidental copies must be made in <strong>the</strong> course of an authorized use ofa digital work, including in <strong>the</strong> course of an authorized transmissi<strong>on</strong> of that work through anetwork.Ano<strong>the</strong>r bill introduced into C<strong>on</strong>gress to implement <strong>the</strong> WIPO copyright treaties wasH.R. 3048, entitled <strong>the</strong> “Digital Era <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Enhancement Act,” which was introduced <strong>on</strong>Nov. 14, 1997 by Rep. Rick Boucher. With respect to <strong>the</strong> reproducti<strong>on</strong> right, H.R. 3048c<strong>on</strong>tained an identical amendment to Secti<strong>on</strong> 117 as S. 1146 that would have permitted <strong>the</strong>making of incidental copies of a work in digital form in c<strong>on</strong>juncti<strong>on</strong> with <strong>the</strong> operati<strong>on</strong> of adevice in <strong>the</strong> ordinary course of lawful use of <strong>the</strong> work.The clarifying amendment to Secti<strong>on</strong> 117 c<strong>on</strong>cerning <strong>the</strong> reproducti<strong>on</strong> right that <strong>the</strong>sealternative bills would have set up was not ultimately adopted by C<strong>on</strong>gress in <strong>the</strong> DMCA.17217 U.S.C. § 117.- 51 -


(b) The European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> DirectiveThe European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive c<strong>on</strong>tains str<strong>on</strong>g statements of copyright owners’ rightsto c<strong>on</strong>trol <strong>the</strong> reproducti<strong>on</strong>, distributi<strong>on</strong> and presentati<strong>on</strong> of <strong>the</strong>ir works <strong>on</strong>line. The European<str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive requires legislative acti<strong>on</strong> by EC member states with respect to four rights:<strong>the</strong> reproducti<strong>on</strong> right, 173 <strong>the</strong> communicati<strong>on</strong> to <strong>the</strong> public right, 174 <strong>the</strong> distributi<strong>on</strong> right, 175 andprotecti<strong>on</strong> against <strong>the</strong> circumventi<strong>on</strong> or abuse of electr<strong>on</strong>ic management and protecti<strong>on</strong>systems. 176With respect to <strong>the</strong> reproducti<strong>on</strong> right, <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive adoptsessentially <strong>the</strong> same broad language of proposed Article 7(1) of <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty thatprovoked so much c<strong>on</strong>troversy and was ultimately deleted from <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty.Specifically, Article 2 of <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive provides that member states must“provide <strong>the</strong> exclusive right to authorize or prohibit direct or indirect, temporary or permanentreproducti<strong>on</strong> by any means and in any form” of copyrighted works. The extensi<strong>on</strong> of <strong>the</strong>reproducti<strong>on</strong> right to “direct or indirect” and “temporary or permanent” reproducti<strong>on</strong>s wouldseem to cover even ephemeral copies of a work made during <strong>the</strong> course of transmissi<strong>on</strong> or use ofa copyrighted work in an <strong>on</strong>line c<strong>on</strong>text. Indeed, <strong>the</strong> official commentary to Article 2 notes that<strong>the</strong> definiti<strong>on</strong> of <strong>the</strong> reproducti<strong>on</strong> right covers “all relevant acts of reproducti<strong>on</strong>, whe<strong>the</strong>r <strong>on</strong>-lineor off-line, in material or immaterial form.” 177 The commentary also appears to adopt <strong>the</strong>approach of <strong>the</strong> MAI case in recognizing copies of a work in RAM as falling within <strong>the</strong>reproducti<strong>on</strong> right: “The result of a reproducti<strong>on</strong> may be a tangible permanent copy, like a book,but it may just as well be a n<strong>on</strong>-visible temporary copy of <strong>the</strong> work in <strong>the</strong> working memory of acomputer.” 178To provide counterbalance, however, Article 5(1) of <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directiveprovides an automatic exempti<strong>on</strong> from <strong>the</strong> reproducti<strong>on</strong> right for “[t]emporary acts ofreproducti<strong>on</strong> … which are transient or incidental, which are an integral and essential part of atechnological process whose sole purpose is to enable: (a) a transmissi<strong>on</strong> in a network betweenthird parties by an intermediary or (b) a lawful use of a work or o<strong>the</strong>r subject-matter to be made,and which have no independent ec<strong>on</strong>omic significance.” This provisi<strong>on</strong> is very similar to <strong>the</strong>new clause (b) that would have been added to Secti<strong>on</strong> 117 of <strong>the</strong> U.S. copyright statute under S.1146 and H.R. 3048 (discussed in Secti<strong>on</strong> II.A.5(a)(2) above). The Article 5(1) excepti<strong>on</strong> wouldappear to cover <strong>the</strong> store and forward procedure adopted by routers and <strong>the</strong> RAM copy producedas a result of browsing at least by a private user (whe<strong>the</strong>r browsing for a commercial purpose173174175176177178European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive, art. 2.Id. art. 3.Id. art. 4.Id. arts. 6-7.Commentary to Art. 2, 2.Id. 3.- 52 -


would have “independent ec<strong>on</strong>omic significance” is unclear). 179 The excepti<strong>on</strong> does not apply tocomputer programs or databases because <strong>the</strong>y are separately regulated in o<strong>the</strong>r Directives. 180Thus, <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive adopts an approach that affords <strong>the</strong> reproducti<strong>on</strong>right a very broad inherent scope, but provides an explicit and automatic exempti<strong>on</strong> for copiesthat are made incidental to <strong>the</strong> use 181 of a work through a technological process, such astransmissi<strong>on</strong> through a network or loading into memory for viewing or playing of <strong>the</strong> work.Indeed, Recital (33) of <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive notes that <strong>the</strong> excepti<strong>on</strong> of Article 5(1)“should include acts which enable browsing as well as acts of caching to take place, includingthose which enable transmissi<strong>on</strong> systems to functi<strong>on</strong> efficiently, provided that <strong>the</strong> intermediarydoes not modify <strong>the</strong> informati<strong>on</strong> and does not interfere with <strong>the</strong> lawful use of technology, widelyrecognized and used by industry, to obtain data <strong>on</strong> <strong>the</strong> use of <strong>the</strong> informati<strong>on</strong>.”According to Recital (32) of <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive, <strong>the</strong> final Directive, unlikeits predecessor drafts, opted for an approach of listing “an exhaustive enumerati<strong>on</strong> of excepti<strong>on</strong>sand limitati<strong>on</strong>s to <strong>the</strong> reproducti<strong>on</strong> right and <strong>the</strong> right of communicati<strong>on</strong> to <strong>the</strong> public.” Theseexcepti<strong>on</strong>s and limitati<strong>on</strong>s are enumerated in Articles 5(2) and 5(3). The excepti<strong>on</strong>s andlimitati<strong>on</strong>s in Article 5(2) apply <strong>on</strong>ly to <strong>the</strong> reproducti<strong>on</strong> right, whereas <strong>the</strong> excepti<strong>on</strong>s andlimitati<strong>on</strong>s in Article 5(3) apply to both <strong>the</strong> reproducti<strong>on</strong> right and <strong>the</strong> right of communicati<strong>on</strong> to<strong>the</strong> public.Under Article 5(2), member states may provide for excepti<strong>on</strong>s or limitati<strong>on</strong>s to <strong>the</strong>reproducti<strong>on</strong> right in <strong>the</strong> following cases:(a) in respect of reproducti<strong>on</strong>s <strong>on</strong> paper or any similar medium, effected by <strong>the</strong>use of any kind of photographic techniques or by some o<strong>the</strong>r process havingsimilar effects, with <strong>the</strong> excepti<strong>on</strong> of sheet music, provided that <strong>the</strong> rightholdersreceive fair compensati<strong>on</strong>;(b) in respect of reproducti<strong>on</strong>s <strong>on</strong> any medium made by a natural pers<strong>on</strong> forprivate use and for ends that are nei<strong>the</strong>r directly or indirectly commercial, <strong>on</strong>c<strong>on</strong>diti<strong>on</strong> that <strong>the</strong> rightholders receive fair compensati<strong>on</strong> which takes account of<strong>the</strong> applicati<strong>on</strong> or n<strong>on</strong>-applicati<strong>on</strong> of technological measures referred to in Article6 to <strong>the</strong> work or subject-matter c<strong>on</strong>cerned;179180181Justin Harringt<strong>on</strong> & Tina Berking, “Some C<strong>on</strong>troversial Aspects of <strong>the</strong> EU <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive (Directive2001/29/EC),” Cyberspace Lawyer, Jan. 2003, at 2, 3-4. The Electr<strong>on</strong>ic Commerce Directive c<strong>on</strong>tainsexempti<strong>on</strong>s in respect of hosting, caching and acting as a mere c<strong>on</strong>duit. Id. at 4.David Schollenberger, “Entertainment Without Borders” (Mar. 2003), at 9 (seminar paper <strong>on</strong> file with <strong>the</strong>author).An earlier versi<strong>on</strong> of Art. 5(1) provided that <strong>the</strong> use of <strong>the</strong> work must be “authorized or o<strong>the</strong>rwise permitted bylaw.” A copy of an earlier versi<strong>on</strong> of <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive and comments may be found atwww.bna.com/e-law/docs/ecdraft.html (last modified Dec. 2, 1997).- 53 -


(c) in respect of specific acts of reproducti<strong>on</strong> made by publicly accessiblelibraries, educati<strong>on</strong>al establishments or museums, or by archives, which are notfor direct or indirect ec<strong>on</strong>omic or commercial advantage;(d) in respect of ephemeral recordings of works made by broadcastingorganizati<strong>on</strong>s by means of <strong>the</strong>ir own facilities and for <strong>the</strong>ir own broadcasts; <strong>the</strong>preservati<strong>on</strong> of <strong>the</strong>se recordings in official archives may, <strong>on</strong> <strong>the</strong> ground of <strong>the</strong>irexcepti<strong>on</strong>al documentary character, be permitted;(e) in respect of reproducti<strong>on</strong>s of broadcasts made by social instituti<strong>on</strong>s pursuingn<strong>on</strong>-commercial purposes, such as hospitals or pris<strong>on</strong>s, <strong>on</strong> c<strong>on</strong>diti<strong>on</strong> that <strong>the</strong>rightholders receive fair compensati<strong>on</strong>.It is interesting to note that <strong>the</strong> majority of <strong>the</strong>se excepti<strong>on</strong>s are c<strong>on</strong>diti<strong>on</strong>ed up<strong>on</strong> <strong>the</strong>rightholders receiving fair compensati<strong>on</strong>, and <strong>the</strong>y cover <strong>on</strong>ly copying that is for n<strong>on</strong>commercialpurposes. Excepti<strong>on</strong> (b) is of particular interest, for it provides a right for naturalpers<strong>on</strong>s to make copies for private use and for purposes that are nei<strong>the</strong>r directly or indirectlycommercial, provided <strong>the</strong> rightholders receive fair compensati<strong>on</strong>. Presumably <strong>the</strong> excepti<strong>on</strong>would apply where a natural pers<strong>on</strong> has purchased a copy of a copyrighted work, <strong>the</strong>rebyproviding fair compensati<strong>on</strong> to <strong>the</strong> rightholders, and <strong>the</strong>reafter makes additi<strong>on</strong>al copies forpers<strong>on</strong>al, n<strong>on</strong>commercial uses – e.g., by making a copy of <strong>on</strong>e’s purchased music CD <strong>on</strong>to acassette for use in <strong>on</strong>e’s car. The drafters of <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive deemed this rightof private use to be of such significance that under Article 6(4), member states are permitted totake measures to ensure that beneficiaries of this right are able to take advantage of it, “unlessreproducti<strong>on</strong> for private use has already been made possible by rightholders to <strong>the</strong> extentnecessary to benefit from <strong>the</strong> excepti<strong>on</strong> or limitati<strong>on</strong> c<strong>on</strong>cerned and in accordance with <strong>the</strong>provisi<strong>on</strong>s of Article 5(2)(b) and (5), without preventing rightholders from adopting adequatemeasures regarding <strong>the</strong> number of reproducti<strong>on</strong>s in accordance with <strong>the</strong>se provisi<strong>on</strong>s.” 182The right of private use c<strong>on</strong>tained in Article 5(2)(b) is similar to a right afforded in <strong>the</strong>United States under <strong>the</strong> Audio Home Recording Act (AHRA), 17 U.S.C. § 1008, whichprovides, “No acti<strong>on</strong> may be brought under this title alleging infringement of copyright based <strong>on</strong><strong>the</strong> manufacture, importati<strong>on</strong>, or distributi<strong>on</strong> of a digital audio recording device, a digital audiorecording medium, an analog recording device, or an analog recording medium, or based <strong>on</strong> <strong>the</strong>n<strong>on</strong>commercial use by a c<strong>on</strong>sumer of such a device or medium for making digital musicalrecordings or analog musical recordings.” This statute is discussed in detail in Secti<strong>on</strong> II.A.7below, and in Secti<strong>on</strong> III.C.2.(c)(1) below in c<strong>on</strong>necti<strong>on</strong> with <strong>the</strong> Napster litigati<strong>on</strong>s. Napster,Inc., <strong>the</strong> operator of a service that enabled subscribers to share music files in MP3 audio formatwith <strong>on</strong>e ano<strong>the</strong>r, asserted <strong>the</strong> AHRA as a defense to an allegati<strong>on</strong> by copyright owners that itwas c<strong>on</strong>tributorily and vicariously liable for <strong>the</strong> unauthorized sharing of copyrighted soundrecordings through its service. Napster argued that <strong>the</strong> AHRA permitted its subscribers to share182Under <strong>the</strong> last paragraph of Article 6(4), this right of member states to take measures to ensure thatbeneficiaries of <strong>the</strong> right of private use are able to take advantage of it does not apply “to works or o<strong>the</strong>rsubject-matter made available to <strong>the</strong> public <strong>on</strong> agreed c<strong>on</strong>tractual terms in such a way that members of <strong>the</strong>public may access <strong>the</strong>m from a place and at a time individually chosen by <strong>the</strong>m.”- 54 -


such sound recordings because <strong>the</strong>y were shared for pers<strong>on</strong>al use by its subscribers. Asdiscussed in detail below, <strong>the</strong> courts rejected this argument.Perhaps in resp<strong>on</strong>se to <strong>on</strong>line systems like Napster, <strong>the</strong> drafters of <strong>the</strong> European<str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive seem to have been c<strong>on</strong>cerned that <strong>the</strong> excepti<strong>on</strong> for pers<strong>on</strong>al use in Article5(2)(b) not be c<strong>on</strong>strued to permit <strong>the</strong> unauthorized sharing of copyrighted works in digital formthrough <strong>on</strong>line systems, at least without compensati<strong>on</strong> to <strong>the</strong> rightholders affected. Specifically,Recital (38) of <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive states:Member States should be allowed to provide for an excepti<strong>on</strong> or limitati<strong>on</strong> to <strong>the</strong>reproducti<strong>on</strong> right for certain types of reproducti<strong>on</strong> of audio, visual and audiovisualmaterial for private use, accompanied by fair compensati<strong>on</strong>. This mayinclude <strong>the</strong> introducti<strong>on</strong> or c<strong>on</strong>tinuati<strong>on</strong> of remunerati<strong>on</strong> schemes to compensatefor <strong>the</strong> prejudice to rightholders. … Digital private copying is likely to be morewidespread and have a greater ec<strong>on</strong>omic impact. Due account should <strong>the</strong>refore betaken of <strong>the</strong> differences between digital and analogue private copying and adistincti<strong>on</strong> should be make in certain respects between <strong>the</strong>m.In additi<strong>on</strong>, <strong>the</strong> drafters of <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive seemed to c<strong>on</strong>template that“intermediaries” providing services through which infringing activities take place <strong>on</strong>line shouldbe subject to injunctive relief to stop unauthorized transmissi<strong>on</strong>s of copyrighted works throughits service. Recital (58) of <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive provides:In <strong>the</strong> digital envir<strong>on</strong>ment, in particular, <strong>the</strong> services of intermediaries mayincreasingly be used by third parties for infringing activities. In many cases suchintermediaries are best placed to bring such infringing activities to an end.Therefore, without prejudice to any o<strong>the</strong>r sancti<strong>on</strong>s and remedies available,rightholders should have <strong>the</strong> possibility of applying for an injuncti<strong>on</strong> against anintermediary who carries a third party’s infringement of a protected work or o<strong>the</strong>rsubject-matter in a network. This possibility should be available even where <strong>the</strong>acts carried out by <strong>the</strong> intermediary are exempted under Article 5. The c<strong>on</strong>diti<strong>on</strong>sand modalities relating to such injuncti<strong>on</strong>s should be left to <strong>the</strong> nati<strong>on</strong>al law of <strong>the</strong>Member States.Under Article 5(3), member states may provide for fur<strong>the</strong>r excepti<strong>on</strong>s or limitati<strong>on</strong>s to<strong>the</strong> reproducti<strong>on</strong> right and <strong>the</strong> right of communicati<strong>on</strong> to <strong>the</strong> public in <strong>the</strong> following cases:(a) use for <strong>the</strong> sole purpose of illustrati<strong>on</strong> for teaching or scientific research, asl<strong>on</strong>g as <strong>the</strong> source, including <strong>the</strong> author’s name, is indicated, unless this provesimpossible, and to <strong>the</strong> extent justified by <strong>the</strong> n<strong>on</strong>-commercial purpose to beachieved;(b) uses, for <strong>the</strong> benefit of people with a disability, which are directly related to<strong>the</strong> disability and of a n<strong>on</strong>-commercial nature, to <strong>the</strong> extent required by <strong>the</strong>specific disability;- 55 -


(c) reproducti<strong>on</strong> by <strong>the</strong> press, communicati<strong>on</strong> to <strong>the</strong> public or making available ofpublished articles <strong>on</strong> current ec<strong>on</strong>omic, political or religious topics or ofbroadcast works or o<strong>the</strong>r subject-matter of <strong>the</strong> same character, in cases wheresuch use is not expressly reserved, and as l<strong>on</strong>g <strong>the</strong> source, including <strong>the</strong> author’sname, is indicated, or use of works or o<strong>the</strong>r subject-matter in c<strong>on</strong>necti<strong>on</strong> with <strong>the</strong>reporting of current events, to <strong>the</strong> extent justified by <strong>the</strong> informatory purpose andas l<strong>on</strong>g as <strong>the</strong> source, including <strong>the</strong> author’s name, is indicated, unless this provesimpossible;(d) quotati<strong>on</strong>s for purposes such as criticism or review, provided that <strong>the</strong>y relateto a work or o<strong>the</strong>r subject-matter which has already been lawfully made availableto <strong>the</strong> public, and that, unless this proves impossible, <strong>the</strong> source, including <strong>the</strong>author's name, is indicated, and that <strong>the</strong>ir use is in accordance with fair practice,and to <strong>the</strong> extent required by <strong>the</strong> specific purpose;(e) use for <strong>the</strong> purposes of public security or to ensure <strong>the</strong> proper performance orreporting of administrative, parliamentary or judicial proceedings;(f) use of political speeches as well as extracts of public lectures or similar worksor subject-matter to <strong>the</strong> extent justified by <strong>the</strong> informatory purpose and providedthat <strong>the</strong> source, including <strong>the</strong> author's name, is indicated, except where this provesimpossible;(g) use during religious celebrati<strong>on</strong>s or official celebrati<strong>on</strong>s organized by a publicauthority;(h) use of works, such as works of architecture or sculpture, made to be locatedpermanently in public places;(i) incidental inclusi<strong>on</strong> of a work or o<strong>the</strong>r subject-matter in o<strong>the</strong>r material;(j) use for <strong>the</strong> purpose of advertising public exhibiti<strong>on</strong> or sale of artistic works, to<strong>the</strong> extent necessary to promote <strong>the</strong> event, excluding any o<strong>the</strong>r commercial use;(k) use for <strong>the</strong> purpose of caricature, parody or pastiche;(l) use in c<strong>on</strong>necti<strong>on</strong> with <strong>the</strong> dem<strong>on</strong>strati<strong>on</strong> or repair of equipment;(m) use of an artistic work in <strong>the</strong> form of a building or a drawing or plan of abuilding for <strong>the</strong> purposes of rec<strong>on</strong>structing <strong>the</strong> building;(n) use by communicati<strong>on</strong> or making available, for <strong>the</strong> purpose of research orprivate study, to individual members of <strong>the</strong> public by dedicated terminals <strong>on</strong> <strong>the</strong>premises of establishments referred to in paragraph 2(c) of [Article 5(2)] of worksand o<strong>the</strong>r subject-matter not subject to purchase or licensing terms which arec<strong>on</strong>tained in <strong>the</strong>ir collecti<strong>on</strong>s;- 56 -


(o) use in certain o<strong>the</strong>r cases of minor importance where excepti<strong>on</strong>s or limitati<strong>on</strong>salready exist under nati<strong>on</strong>al law, provided that <strong>the</strong>y <strong>on</strong>ly c<strong>on</strong>cern analogue usesand do not affect <strong>the</strong> free circulati<strong>on</strong> of goods and services within <strong>the</strong>Community, without prejudice to <strong>the</strong> o<strong>the</strong>r excepti<strong>on</strong>s and limitati<strong>on</strong>s c<strong>on</strong>tainedin this Article.Note that, unlike many of <strong>the</strong> excepti<strong>on</strong>s of Article 5(2), <strong>the</strong> excepti<strong>on</strong>s of Article 5(3)are not c<strong>on</strong>diti<strong>on</strong>ed up<strong>on</strong> fair compensati<strong>on</strong> to <strong>the</strong> rightholders.6. Peer-to-Peer File Sharing(a) BMG Music v. G<strong>on</strong>zalezIn BMG Music v. G<strong>on</strong>zalez, 183 defendant Cecilia G<strong>on</strong>zalez sought to defend herdownloading of more than 1370 copyrighted s<strong>on</strong>gs through <strong>the</strong> Kazaa file-sharing network byarguing that her acti<strong>on</strong>s should fall under <strong>the</strong> fair use doctrine <strong>on</strong> <strong>the</strong> <strong>the</strong>ory that she was justsampling <strong>the</strong> music to determine what she liked sufficiently to buy at retail. 184 The SeventhCircuit rejected this argument out of hand. Focusing principally <strong>on</strong> <strong>the</strong> fourth fair use factor –<strong>the</strong> effect of <strong>the</strong> use up<strong>on</strong> <strong>the</strong> potential market for or value of <strong>the</strong> copyrighted work – JudgeEasterbrook noted that as file sharing had increased over <strong>the</strong> last four years, sales of recordedmusic had dropped by approximately 30%. Although o<strong>the</strong>r ec<strong>on</strong>omic factors may havec<strong>on</strong>tributed, he noted that <strong>the</strong> events were likely related. 185He fur<strong>the</strong>r noted that rights holders had ec<strong>on</strong>omic interests bey<strong>on</strong>d selling compact discsc<strong>on</strong>taining collecti<strong>on</strong>s of works – specifically, <strong>the</strong>re was also a market in ways to introducepotential c<strong>on</strong>sumers to music. Noting that many radio stati<strong>on</strong>s stream <strong>the</strong>ir c<strong>on</strong>tent over <strong>the</strong><strong>Internet</strong>, paying a fee for <strong>the</strong> right to do so, he noted that G<strong>on</strong>zalez could have listened tostreaming music to sample s<strong>on</strong>gs for purchase, and had she d<strong>on</strong>e so, <strong>the</strong> rights holders wouldhave received royalties from <strong>the</strong> broadcasters. 186 Rejecting <strong>the</strong> proffered fair use defense, JudgeEasterbrook stated, “<str<strong>on</strong>g>Copyright</str<strong>on</strong>g> law lets authors make <strong>the</strong>ir own decisi<strong>on</strong>s about how best topromote <strong>the</strong>ir works; copiers such as G<strong>on</strong>zalez cannot ask courts (and juries) to sec<strong>on</strong>d-guess <strong>the</strong>market and call wholesale copying ‘fair use’ if <strong>the</strong>y think that authors err in understanding <strong>the</strong>irown ec<strong>on</strong>omic interests or that C<strong>on</strong>gress erred in granting authors <strong>the</strong> rights in <strong>the</strong> copyrightstatute.” 187The plaintiffs sought statutory damages for G<strong>on</strong>zalez’ unauthorized copying, seeking <strong>the</strong>minimum amount of $750 per work infringed. G<strong>on</strong>zalez sought to reduce <strong>the</strong> award below <strong>the</strong>$750 minimum by arguing under Secti<strong>on</strong> 504(c)(2) that she was not aware and had no reas<strong>on</strong> tobelieve that her acts c<strong>on</strong>stituted infringement of copyright. The district court rejected <strong>the</strong> request183184185186187430 F.3d 999 (7 th Cir. 2005).Id. at 889-90.Id. at 890.Id. at 891.Id.- 57 -


under <strong>the</strong> provisi<strong>on</strong>s of Secti<strong>on</strong> 402(d), which provides that if a valid notice of copyright appears<strong>on</strong> <strong>the</strong> ph<strong>on</strong>orecords to which a defendant had access, <strong>the</strong>n no weight shall be given to <strong>the</strong>defendant’s interpositi<strong>on</strong> of a defense based <strong>on</strong> innocent infringement in mitigati<strong>on</strong> of actual orstatutory damages. 188 G<strong>on</strong>zalez sought to avoid Secti<strong>on</strong> 402(d) by arguing that <strong>the</strong>re were nocopyright notices <strong>on</strong> <strong>the</strong> data she downloaded. The court rejected this argument: “Shedownloaded data ra<strong>the</strong>r than discs, and <strong>the</strong> data lacked copyright notices, but <strong>the</strong> statutoryquesti<strong>on</strong> is whe<strong>the</strong>r ‘access’ to legitimate works was available ra<strong>the</strong>r than whe<strong>the</strong>r infringersearlier in <strong>the</strong> chain attached copyright notices to <strong>the</strong> pirated works. G<strong>on</strong>zalez readily could havelearned, had she inquired, that <strong>the</strong> music was under copyright.” 189(b) Columbia Pictures v. BunnellIn Columbia Pictures Industries, Inc. v. Bunnell, 190 <strong>the</strong> court entered judgment againstdefendant Valence Media LLC, operator of <strong>the</strong> web site at www.torrentspy.com, for willfulinducement of copyright infringement, c<strong>on</strong>tributory copyright infringement, and vicariouscopyright infringement. The court awarded <strong>the</strong> plaintiffs statutory damages of $30,000 perinfringement for each of 3,699 infringements shown, for a total judgment of $110,970,000. Thecourt also issued a permanent injuncti<strong>on</strong> enjoining <strong>the</strong> defendants from encouraging, inducing, orknowingly c<strong>on</strong>tributing to <strong>the</strong> reproducti<strong>on</strong>, download, distributi<strong>on</strong>, upload, or publicperformance or display of any copyrighted work at issue, and from making available forreproducti<strong>on</strong>, download, distributi<strong>on</strong>, upload, or public performance or display any such work. 191(c) S<strong>on</strong>y BMG Music Entertainment v. TenenbaumIn S<strong>on</strong>y BMG Music Entertainment v. Tenenbaum, 192 <strong>the</strong> court rejected a broadside fairuse defense for <strong>the</strong> file-sharing by a college sophomore of 30 copyrighted s<strong>on</strong>gs bel<strong>on</strong>ging to <strong>the</strong>plaintiffs. Describing <strong>the</strong> defense raised by <strong>the</strong> defendant’s counsel as “truly chaotic,” 193 <strong>the</strong>court noted that it represented a versi<strong>on</strong> of fair use so broad that it would excuse all file sharingfor private enjoyment. As <strong>the</strong> court described counsel’s defense, “a defendant just needs to showthat he did not make m<strong>on</strong>ey from <strong>the</strong> files he downloaded or distributed – i.e., that his use was‘n<strong>on</strong>-commercial’ – in order to put his fair use defense before a jury. Bey<strong>on</strong>d that threshold, <strong>the</strong>188189190191192193Id. at 891-92.Id. at 892. G<strong>on</strong>zalez also challenged <strong>the</strong> district court’s award of <strong>the</strong> $750 amount <strong>on</strong> summary judgment,arguing that <strong>the</strong> choice of amount is a questi<strong>on</strong> for <strong>the</strong> jury. The Seventh Circuit noted that, although a suit forstatutory damages under Secti<strong>on</strong> 504(c) is a suit at law to which <strong>the</strong> seventh amendment applies, this does notmean that a jury must resolve every dispute. When <strong>the</strong>re are no disputes of material fact, a court may entersummary judgment without transgressing <strong>the</strong> C<strong>on</strong>stituti<strong>on</strong>. The court noted that G<strong>on</strong>zalez had argued for <strong>the</strong>minimum amount of $750 per s<strong>on</strong>g and <strong>the</strong> plaintiffs had been c<strong>on</strong>tent with that amount, which <strong>the</strong> districtcourt <strong>the</strong>n awarded <strong>on</strong> summary judgment. Id.2008 U.S. Dist. LEXIS 63227 (C.D. Cal. July 10, 2008).Id. at *1-3.672 F. Supp. 2d 217 (D. Mass. 2009).Id. at 220.- 58 -


matter bel<strong>on</strong>gs entirely to <strong>the</strong> jury, which is entitled to c<strong>on</strong>sider any and all factors touching <strong>on</strong>its innate sense of fairness – nothing more and nothing less.” 194The court first turned to <strong>the</strong> threshold issue of whe<strong>the</strong>r fair use is an equitable defense.Noting that a number of courts had suggested that it is, <strong>the</strong> court never<strong>the</strong>less opined that even iffair use is an entirely equitable defense, it is not clear that its determinati<strong>on</strong> requires a jury trial,because judges, not juries, traditi<strong>on</strong>ally resolve equitable defenses. However, given that twoleading copyright historians had suggested that <strong>the</strong> equitable label may be a misnomer, andbecause nei<strong>the</strong>r party pressed <strong>the</strong> point, <strong>the</strong> court assumed that fair use is a jury questi<strong>on</strong>, withoutresolving <strong>the</strong> questi<strong>on</strong> of <strong>the</strong> equitable origins of <strong>the</strong> defense. But because fair use is ultimately alegal questi<strong>on</strong>, <strong>the</strong> court noted that, in <strong>the</strong> face of <strong>the</strong> plaintiff’s moti<strong>on</strong> for summary judgment<strong>on</strong> <strong>the</strong> fair use issue, <strong>the</strong> defendant could put <strong>the</strong> defense to a jury <strong>on</strong>ly if he showed throughspecific, credible evidence that <strong>the</strong> facts relevant to that legal analysis were in dispute. Thedefendant had failed to do so. 195Turning to an applicati<strong>on</strong> of <strong>the</strong> four fair use factors, <strong>the</strong> court found that <strong>the</strong> first factor –purpose and character of <strong>the</strong> use – favored <strong>the</strong> plaintiffs. The court rejected <strong>the</strong> defendant’sbinary distincti<strong>on</strong> between “commercial” and “n<strong>on</strong>-commercial” uses under <strong>the</strong> first factor,noting that <strong>the</strong> purpose and character of a use must be classified al<strong>on</strong>g a spectrum that rangesfrom pure, large-scale profit-seeking to uses that advance important public goals, like thoserecognized in <strong>the</strong> statute. The defendant’s file sharing fell somewhere in between. Although <strong>the</strong>court was not willing to label it “commercial,” as <strong>the</strong> plaintiffs urged, <strong>the</strong> court ruled thatbecause <strong>the</strong> use was not accompanied by any public benefit or transformative purpose, <strong>the</strong> firstfactor cut against fair use. 196 The sec<strong>on</strong>d factor – nature of <strong>the</strong> copyrighted work – also cutagainst fair use because musical works command robust copyright protecti<strong>on</strong>. 197The defendant argued that <strong>the</strong> third factor – porti<strong>on</strong> of <strong>the</strong> work used – cut against <strong>the</strong>plaintiffs because he was alleged to have downloaded <strong>on</strong>ly individual s<strong>on</strong>gs, but not full albums,and it was <strong>the</strong> albums in which <strong>the</strong> plaintiffs registered <strong>the</strong>ir copyrights, while <strong>the</strong> individuals<strong>on</strong>gs were works made for hire. The court rejected this argument, noting that under existing filesharing case law, individual s<strong>on</strong>gs were regularly treated as <strong>the</strong> relevant unit for evaluatinginfringement and fair use of musical works. 198With respect to <strong>the</strong> fourth factor – effect <strong>on</strong> <strong>the</strong> potential market for <strong>the</strong> work – <strong>the</strong>defendant argued that his file sharing made little ec<strong>on</strong>omic difference to <strong>the</strong> plaintiffs because<strong>the</strong> s<strong>on</strong>gs at issue were immensely popular and <strong>the</strong>refore widely available <strong>on</strong> file sharingnetworks. The court rejected this as an improper framework for <strong>the</strong> analysis. Ra<strong>the</strong>r, <strong>on</strong>e mustc<strong>on</strong>sider <strong>the</strong> effect <strong>on</strong> <strong>the</strong> market of <strong>the</strong> sum of activity if thousands of o<strong>the</strong>rs were engaged in<strong>the</strong> same c<strong>on</strong>duct. The plaintiffs had provided evidence that <strong>the</strong> widespread availability of free194195196197198Id. at 221.Id. at 223-24.Id. at 227-29.Id. at 229.Id. at 229-30.- 59 -


copies of copyrighted works <strong>on</strong> <strong>the</strong> <strong>Internet</strong> had decreased <strong>the</strong>ir sales revenue, and <strong>the</strong> defendanthad offered no affidavits or expert report to disprove or dispute that evidence. 199The court’s opini<strong>on</strong> c<strong>on</strong>tains a few o<strong>the</strong>r interesting observati<strong>on</strong>s with respect to <strong>the</strong>doctrine of fair use as applied to file sharing. First, citing <strong>the</strong> case of American GeophysicalUni<strong>on</strong> v. Texaco Inc., 200 <strong>the</strong> court noted that a fair use determinati<strong>on</strong> may be affected by <strong>the</strong>availability or absence of authorized ways to obtain <strong>the</strong> work in questi<strong>on</strong>. The defendantasserted that <strong>the</strong> emergence of easy-to-use, paid outlets for digital music, such as <strong>the</strong> iTunesmusic store, had lagged well behind <strong>the</strong> advent of file sharing, and this fact should affect <strong>the</strong> fairuse analysis. The court resp<strong>on</strong>ded that, whatever <strong>the</strong> availability of authorized digitalalternatives was when peer-to-peer networks first because widespread in 1999, it was clear thatby August 2004 – when <strong>the</strong> defendant’s file sharing was detected – a commercial market fordigital music had fully materialized. In light of that chr<strong>on</strong>ology, <strong>the</strong> unavailability of paid digitalmusic was simply not relevant to <strong>the</strong> court’s applicati<strong>on</strong> of <strong>the</strong> fair use doctrine. 201Although granting <strong>the</strong> plaintiffs’ moti<strong>on</strong> for summary judgment <strong>on</strong> <strong>the</strong> defendant’s fairuse defense, <strong>the</strong> court c<strong>on</strong>cluded with <strong>the</strong> following two interesting dicta:– “[T]he Court does not believe <strong>the</strong> law is so m<strong>on</strong>olithic, or <strong>the</strong> principles of fair use s<strong>on</strong>arrow that <strong>the</strong>y could not encompass some instances of file sharing copyrighted works. ThisCourt, unlike o<strong>the</strong>rs that have spoken <strong>on</strong> <strong>the</strong> subject, can envisi<strong>on</strong> a scenario in which adefendant sued for file sharing could assert a plausible fair use defense – for example, <strong>the</strong>defendant who ‘deleted <strong>the</strong> mp3 files after sampling <strong>the</strong>m, or created mp3 files exclusively forspace-shifting purposes from audio CDs <strong>the</strong>y had previously purchased.’ (Berkman Center Br. at36-37, document # 177-3.) The Court can also envisi<strong>on</strong> a fair use defense for a defendant whoshared files during a period before <strong>the</strong> law c<strong>on</strong>cerning file sharing was clear and paid outletswere readily available. … A defendant who shared files <strong>on</strong>line during this interregnum, sampling<strong>the</strong> new technology and its possibilities, but later shifted to paid outlets <strong>on</strong>ce <strong>the</strong> law becauseclear and authorized sources available, would present a str<strong>on</strong>g case for fair use.” 202– “As this Court has previously noted, it is very, very c<strong>on</strong>cerned that <strong>the</strong>re is a deeppotential for injustice in <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act as it is currently written. It urges – no implores –C<strong>on</strong>gress to amend <strong>the</strong> statute to reflect <strong>the</strong> realities of file sharing. There is something wr<strong>on</strong>gwith a law that routinely threatens teenagers and students with astr<strong>on</strong>omical penalties for anactivity whose implicati<strong>on</strong>s <strong>the</strong>y may not have fully understood. The injury to <strong>the</strong> copyrightholder may be real, and even substantial, but, under <strong>the</strong> statute, <strong>the</strong> record companies do not evenhave to prove actual damage.” 203199200201202203Id. at 230-31.60 F.3d 913, 931 (2d Cir. 1994).Tenenbaum, 672 F. SAupp. 2d at 235-36.Id. at 237-38.Id. at 237.- 60 -


7. The Immunity of <strong>the</strong> Audio Home Recording Act (AHRA)The Audio Home Recording Act of 1992 (AHRA) 204 made two major substantivechanges to copyright law. First, Subchapter D of <strong>the</strong> AHRA (Secti<strong>on</strong> 1008) immunizes certainn<strong>on</strong>commercial recording and use of musical recordings in digital or analog form. 205 Secti<strong>on</strong>1008 provides:No acti<strong>on</strong> may be brought under this title alleging infringement of copyright 206based <strong>on</strong> <strong>the</strong> manufacture, importati<strong>on</strong>, or distributi<strong>on</strong> of a digital audio recordingdevice, a digital audio recording medium, an analog recording device, or ananalog recording medium, or based <strong>on</strong> <strong>the</strong> n<strong>on</strong>commercial use by a c<strong>on</strong>sumer ofsuch a device or medium for making digital musical recordings or analog musicalrecordings.Sec<strong>on</strong>d, Subchapters B and C (Secti<strong>on</strong>s 1002-1007) of <strong>the</strong> AHRA require (i) that any“digital audio recording device” (DARD) c<strong>on</strong>form to <strong>the</strong> “Serial <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> ManagementSystem” (SCMS), which allows unlimited first generati<strong>on</strong> copies of an original source, butprohibits sec<strong>on</strong>d generati<strong>on</strong> copies (i.e., copies of a copy), and (ii) that manufacturers anddistributors of digital audio recording devices and digital audio recording media (such as DATtape and recordable CDs) pay royalties and file various notices and statements to indicatepayment of those royalties. 207(a) The Napster CasesFor a discussi<strong>on</strong> of <strong>the</strong> rulings with respect to <strong>the</strong> AHRA in <strong>the</strong> Napster cases, seeSecti<strong>on</strong> III.C.2(c)(1) below.(b) The Aimster CaseIn In re Aimster <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Litigati<strong>on</strong>, 208 <strong>the</strong> plaintiffs brought copyright infringementclaims against <strong>the</strong> Aimster peer-to-peer file sharing site and its operators for sec<strong>on</strong>dary liabilityfor <strong>the</strong> infringing distributi<strong>on</strong> of <strong>the</strong> plaintiffs’ copyrighted sound recordings. On a moti<strong>on</strong> for apreliminary injuncti<strong>on</strong>, <strong>the</strong> defendants asserted that <strong>the</strong> plaintiffs had failed to establish thatAimster’s users were engaged in direct copyright infringement because <strong>the</strong> AHRA provided anaffirmative defense. The defendants argued that <strong>the</strong> AHRA shielded <strong>the</strong>m from liability becauseit was intended to immunize from liability pers<strong>on</strong>al use of copyrighted material by protecting all204205206207208Pub. L. No. 102-563, 106 Stat. 4244 (1992), codified at 17 U.S.C. §§ 1001-1010.Nimmer § 8B.01 (2000).The immunity applies with respect to copyrights in both <strong>the</strong> sound recordings and any musical compositi<strong>on</strong>sembodied <strong>the</strong>rein. Id. § 8B.07[C][2], at 8B-90.Id. §§ 8B.02 & 8B.03 (2000).252 F. Supp. 2d 634 (N.D. Ill. 2002), aff’d <strong>on</strong> o<strong>the</strong>r grounds, 334 F.3d 643 (7th Cir. 2003), cert. denied, 124 S.Ct. 1069 (2004).- 61 -


n<strong>on</strong>commercial copying by c<strong>on</strong>sumers of digital and analog musical recordings, relying <strong>on</strong> <strong>the</strong>Ninth Circuit’s Diam<strong>on</strong>d Multimedia case, discussed in Secti<strong>on</strong> III.C.2(c)(1) above. 209The court rejected <strong>the</strong> defendants’ reliance <strong>on</strong> <strong>the</strong> AHRA, distinguishing <strong>the</strong> Diam<strong>on</strong>dMultimedia case as follows:The facts of <strong>the</strong> instant case and Diam<strong>on</strong>d Multimedia are markedly different.The activity at issue in <strong>the</strong> present case is <strong>the</strong> copying of MP3 files from <strong>on</strong>euser’s hard drive <strong>on</strong>to <strong>the</strong> hard drive of ano<strong>the</strong>r user. The Rio in Diam<strong>on</strong>dMultimedia, by c<strong>on</strong>trast, “merely [made] copies in order to render portable, or‘space shift,’ those files that already reside <strong>on</strong> a user’s hard drive.” 180 F.3d at1079. The difference is akin to a[n] owner of a compact disc making a copy of<strong>the</strong> music <strong>on</strong>to a tape for that owner’s sole use while away from home versus <strong>the</strong>owner making thousands of copies of <strong>the</strong> compact disk <strong>on</strong>to a tape for distributi<strong>on</strong>to all of his friends. Fur<strong>the</strong>rmore, Diam<strong>on</strong>d Multimedia had nothing whatsoeverto do with whe<strong>the</strong>r <strong>the</strong> MP3 files <strong>on</strong> <strong>the</strong> owner’s computers <strong>the</strong>mselves infringedcopyrights. Ra<strong>the</strong>r, <strong>the</strong> decisi<strong>on</strong> was limited solely to <strong>the</strong> infringement issueregarding <strong>the</strong> act of shifting files from a computer to a pers<strong>on</strong>al device andwhe<strong>the</strong>r that copying was subject to <strong>the</strong> particular requirements of <strong>the</strong> AHRA. Inshort, Defendant’s reliance <strong>on</strong> Diam<strong>on</strong>d Multimedia is entirely misplaced. 210(c) Atlantic Recording Corp. v. XM Satellite RadioIn Atlantic Recording Corp. v. XM Satellite Radio, Inc., 211 numerous record companiessued XM Satellite Radio for c<strong>on</strong>tributory, vicarious and inducement copyright liability based <strong>on</strong>XM’s offering of digital radio broadcast services toge<strong>the</strong>r with special receivers marketed as“XM + MP3” players that allowed subscribers to record, retain and library individuallydisaggregated and indexed audio files from XM broadcast performances. The record companieschallenged <strong>the</strong>se capabilities as an infringing “digital download delivery service.” 212XM offered several services specifically to XM + MP3 player users that were <strong>the</strong> subjectof <strong>the</strong> plaintiff’s challenge. First, while listening to XM programming, an XM + MP3 user couldinstantly record any s<strong>on</strong>g at <strong>the</strong> touch of a butt<strong>on</strong>. To facilitate such recording, <strong>the</strong> XM + MP3player maintained a short-term buffered copy of every broadcast s<strong>on</strong>g a user listened to. As aresult, a user could record and store in its entirety any broadcast s<strong>on</strong>g he or she heard, even if <strong>the</strong>user started listening to <strong>the</strong> s<strong>on</strong>g after it began to play. 213Sec<strong>on</strong>d, XM provided XM + MP3 users with playlists from blocks of broadcastprogramming which had been disaggregated into individual tracks. XM sent users such digital209210211212213Id. at 648-49.Id. at 649.2007 U.S. Dist. LEXIS 4290 (S.D.N.Y. Jan. 19, 2007).Id. at *6.Id. at *9.- 62 -


playlists with title and artist informati<strong>on</strong> included. The playlists identified all s<strong>on</strong>gs broadcastover a particular channel and during a particular period of time. Users could <strong>the</strong>n scroll througha playlist and select which s<strong>on</strong>gs to store for future replay, and which to delete. Using thisutility, users could hear and store individual s<strong>on</strong>gs without actually listening to XM broadcastprogramming. 214Third, XM provided to users a search functi<strong>on</strong> toge<strong>the</strong>r with “ArtistSelect” and“TuneSelect” utilities that made it easy for a user to find out when a requested s<strong>on</strong>g was beingbroadcast. XM would send <strong>the</strong> listener immediate notice when his or her chosen artists or s<strong>on</strong>gswere played <strong>on</strong> any XM channel. The user could <strong>the</strong>n immediately switch channels and store <strong>the</strong>requested track <strong>on</strong>to his or her XM + MP3 player. 215Fourth, <strong>the</strong> XM + MP3 players enabled users to store <strong>the</strong> approximate equivalent of1,000 s<strong>on</strong>gs recorded from XM broadcasts for as l<strong>on</strong>g as <strong>the</strong> user maintained an XMsubscripti<strong>on</strong>. Accordingly, <strong>the</strong> court found that <strong>the</strong>se s<strong>on</strong>gs were effectively leased to <strong>the</strong> XMsubscriber for as l<strong>on</strong>g as he or she maintained status as a subscriber. 216XM brought a moti<strong>on</strong> to dismiss <strong>the</strong> copyright claims <strong>on</strong> <strong>the</strong> ground that it was shieldedfrom infringement acti<strong>on</strong>s by Secti<strong>on</strong> 1008 of <strong>the</strong> AHRA because it was acting as a distributor ofa digital audio recording device (DARD) immunized by <strong>the</strong> AHRA. The court first turned towhe<strong>the</strong>r <strong>the</strong> XM + MP3 players c<strong>on</strong>stituted a DARD. The plaintiffs argued that <strong>the</strong>y did not,citing <strong>the</strong> Ninth Circuit’s decisi<strong>on</strong> in Recording Industry Ass’n of Am. v. Diam<strong>on</strong>d MultimediaSys., 217 which held that <strong>the</strong> Diam<strong>on</strong>d Rio device at issue was not a DARD because it could notmake copies from a transmissi<strong>on</strong> but instead could make copies <strong>on</strong>ly from a computer hard drive,which is exempted under Secti<strong>on</strong> 1001(5)(B) of <strong>the</strong> AHRA. The court distinguished <strong>the</strong> facts of<strong>the</strong> Diam<strong>on</strong>d case, noting that <strong>the</strong> XM + MP3 players could receive from transmissi<strong>on</strong>s and werecapable of copying without an external computer or computer hard drive. 218 “Accordingly, atthis stage of <strong>the</strong> proceeding, relying <strong>on</strong> plain meaning statutory interpretati<strong>on</strong> and <strong>the</strong> definiti<strong>on</strong>of a DARD c<strong>on</strong>tained in Diam<strong>on</strong>d, until proven o<strong>the</strong>rwise by means of discovery, <strong>the</strong> Courttreats <strong>the</strong> [XM + MP3 players] as DARDs.” 219The court next turned to whe<strong>the</strong>r <strong>the</strong> AHRA offered XM complete immunity from <strong>the</strong>plaintiffs’ copyright claims. XM argued that, because it was a distributor of DARDs, it did havesuch immunity. The court rejected this argument, noting that, while Secti<strong>on</strong> 1008 would protectXM from suit for acti<strong>on</strong>s based <strong>on</strong> <strong>the</strong> distributi<strong>on</strong> of DARDs, such protecti<strong>on</strong> would not act as awholesale, blanket protecti<strong>on</strong> for o<strong>the</strong>r c<strong>on</strong>duct that XM might be engaged in bey<strong>on</strong>d suchdistributi<strong>on</strong>. In particular, XM’s acts as a satellite radio broadcaster could form a separate basisfor copyright liability. Indeed, <strong>the</strong> plaintiffs’ complaint made clear that <strong>the</strong>ir claims of copyright214215216217218219Id.Id. at *9-10.Id. at *10-11.180 F.3d 1072 (9th Cir. 1999).XM Satellite, 200 U.S. Dist. LEXIS 4290 at *14 n.4.Id.- 63 -


infringement were based <strong>on</strong> XM’s acting without authorizati<strong>on</strong> as a commercial c<strong>on</strong>tent deliveryprovider that delivered permanent digital copies of sound recordings to those devices withoutpermissi<strong>on</strong> from <strong>the</strong> copyright owner. 220More specifically, <strong>the</strong> plaintiffs alleged that, in providing services specific to users ofXM + MP3 players, XM was acting outside <strong>the</strong> scope of its statutory license for broadcastservice under Secti<strong>on</strong> 114 of <strong>the</strong> copyright statute – XM’s <strong>on</strong>ly source of permissi<strong>on</strong> to use <strong>the</strong>plaintiffs’ recordings. Such unauthorized acts, according to <strong>the</strong> plaintiffs, were encroachingdirectly <strong>on</strong> <strong>the</strong>ir digital download business. 221 The court agreed, finding that by broadcastingand storing copyrighted music <strong>on</strong> DARDs for later recording by <strong>the</strong> c<strong>on</strong>sumer, XM was acting asa both a broadcaster and a distributor, but was paying license fees <strong>on</strong>ly to be a broadcaster. 222XM argued that its XM + MP3 player was much like a traditi<strong>on</strong>al radio/cassette playerand should <strong>the</strong>refore not be viewed as an improper adjunct to broadcasts. The court rejected thisanalogy, noting that, in <strong>the</strong> case of traditi<strong>on</strong>al radio/cassette players, <strong>the</strong> <strong>on</strong>ly c<strong>on</strong>tact betweenmanufacturers of <strong>the</strong> devices and users occurred at <strong>the</strong> point of sale. The court found it quiteapparent that <strong>the</strong> use of a radio/cassette player to record s<strong>on</strong>gs played over free radio did notthreaten <strong>the</strong> market for copyrighted works as would <strong>the</strong> use of a recorder which stores s<strong>on</strong>gsfrom private radio broadcasts <strong>on</strong> a subscripti<strong>on</strong> fee basis. The court fur<strong>the</strong>r noted that, althoughXM subscribers might put XM + MP3 players to private use, several court decisi<strong>on</strong>s had rejectedattempts by for profit users to stand in <strong>the</strong> shoes of <strong>the</strong>ir customers making n<strong>on</strong>-profit orn<strong>on</strong>commercial uses. 223The court <strong>the</strong>refore denied XM’s moti<strong>on</strong> to dismiss: “The Court finds that because of <strong>the</strong>unique circumstances of XM being both a broadcaster and a DARD distributor and its access to<strong>the</strong> copyrighted music results from its license to broadcast <strong>on</strong>ly, that <strong>the</strong> alleged c<strong>on</strong>duct of XMin making that music available for c<strong>on</strong>sumers to record well bey<strong>on</strong>d <strong>the</strong> time when broadcast, inviolati<strong>on</strong> of its broadcast license, is <strong>the</strong> basis of <strong>the</strong> Complaint, and being a distributor of aDARD is not. Thus <strong>the</strong> AHRA, <strong>on</strong> <strong>the</strong>se facts, provides no protecti<strong>on</strong> to XM merely because<strong>the</strong>y are distributors of a DARD.” 224B. The Right of Public PerformanceSecti<strong>on</strong> 106(4) of <strong>the</strong> copyright statute grants <strong>the</strong> owner of copyright in a work <strong>the</strong>exclusive right to perform <strong>the</strong> work publicly. The right applies to literary, musical, dramatic,and choreographic works, pantomimes, moti<strong>on</strong> pictures and o<strong>the</strong>r audiovisual works. It does notapply to pictorial, graphic, sculptural, and architectural works. It also does not apply to sound220221222223224Id. at *16-18.Id. at *19.Id. at *20.Id. at *21-22.Id. at *23-24.- 64 -


ecordings, o<strong>the</strong>r than with respect to public performances by digital transmissi<strong>on</strong>, 225 although apublic performance of a sound recording may infringe <strong>the</strong> right of public performance of <strong>the</strong>underlying musical work that is recorded in <strong>the</strong> sound recording.Secti<strong>on</strong> 101 provides that to perform a work “publicly” means:(1) to perform ... it at a place open to <strong>the</strong> public or at any place where asubstantial number of pers<strong>on</strong>s outside of a normal circle of a family and its socialacquaintances is ga<strong>the</strong>red; or(2) to transmit or o<strong>the</strong>rwise communicate a performance ... of <strong>the</strong> work to a placespecified by clause (1) or to <strong>the</strong> public, by means of any device or process,whe<strong>the</strong>r <strong>the</strong> members of <strong>the</strong> public capable of receiving <strong>the</strong> performance ordisplay receive it in <strong>the</strong> same place or in separate places and at <strong>the</strong> same time or atdifferent times.Because this definiti<strong>on</strong> encompasses transmissi<strong>on</strong>s of works, it clearly implicates <strong>on</strong>lineactivity. However, to fall within <strong>the</strong> public performance right, <strong>the</strong>re must be a transmissi<strong>on</strong> of aperformance of <strong>the</strong> work, not merely of <strong>the</strong> work itself. Thus, for example, transmissi<strong>on</strong> of <strong>the</strong>digitally encoded sounds of a musical work to <strong>the</strong> hard disk of a recipient computer may infringe<strong>the</strong> right of distributi<strong>on</strong> of <strong>the</strong> work (as well as <strong>the</strong> reproducti<strong>on</strong> right), but not <strong>the</strong> publicperformance right, because <strong>the</strong> work is not being performed 226 at <strong>the</strong> recipient’s end.1. Isochr<strong>on</strong>ous Versus Asynchr<strong>on</strong>ous Transmissi<strong>on</strong>sOne of <strong>the</strong> most hotly debated issues c<strong>on</strong>cerning <strong>the</strong> scope of <strong>the</strong> public performanceright in <strong>on</strong>line c<strong>on</strong>texts is whe<strong>the</strong>r, to fall within <strong>the</strong> copyright owner’s right of publicperformance, <strong>the</strong> “performance” must be accomplished by a transmitted signal that is capable ofimmediate c<strong>on</strong>versi<strong>on</strong> to a performance moment-by-moment in time (referred to as an“isochr<strong>on</strong>ous transmissi<strong>on</strong>”), or whe<strong>the</strong>r it is sufficient that <strong>the</strong> transmitted signal is sent ei<strong>the</strong>rfaster or slower (overall or moment-by-moment) than <strong>the</strong> embodied performance (referred to asan “asynchr<strong>on</strong>ous transmissi<strong>on</strong>”). 227The definiti<strong>on</strong> of performing a work publicly in Secti<strong>on</strong> 101 of <strong>the</strong> copyright statute wasdrafted at a time when “transmissi<strong>on</strong>s” were generally isochr<strong>on</strong>ous transmissi<strong>on</strong>s, as in225226227The Digital Performance Right in Sound Recordings Act of 1995 created a limited public digital performanceright in sound recordings as of February 1, 1996. Pub. L. No. 104-39, 109 Stat. 336 (codified at 17 U.S.C. §§106, 114, 115). Certain transmissi<strong>on</strong>s of performances are exempt. The exempti<strong>on</strong>s do not apply, however, toan “interactive” service, which <strong>the</strong> copyright statute defines as a service “<strong>on</strong>e that enables a member of <strong>the</strong>public to receive a transmissi<strong>on</strong> of a program specially created for <strong>the</strong> recipient, or <strong>on</strong> request, a transmissi<strong>on</strong> ofa particular sound recording, whe<strong>the</strong>r or not as part of a program, which is selected by or <strong>on</strong> behalf of <strong>the</strong>recipient.” 17 U.S.C. §§ 114(d)(1), 114(j)(7).The copyright statute provides that “[t]o ‘perform’ a work means to recite, render, play, dance, or act it, ei<strong>the</strong>rdirectly or by means of any device or process or, in <strong>the</strong> case of a moti<strong>on</strong> picture or o<strong>the</strong>r audiovisual work, toshow its images in any sequence or to make <strong>the</strong> sounds accompanying it audible.” 17 U.S.C. § 101.K. Stuckey, <strong>Internet</strong> and Online Law § 6.08[4][b], at 6-63 – 6-64 (2008).- 65 -


oadcasting. If this definiti<strong>on</strong> is read to require an isochr<strong>on</strong>ous transmissi<strong>on</strong> – and to date all of<strong>the</strong> types of transmissi<strong>on</strong>s that courts have held to be public performances have been isochr<strong>on</strong>oustransmissi<strong>on</strong>s 228 – <strong>the</strong>n many acts of downloading of works <strong>on</strong> <strong>the</strong> <strong>Internet</strong> (being asynchr<strong>on</strong>oustransmissi<strong>on</strong>s), even if followed by in-home playback, may not fall within <strong>the</strong> publicperformance right. The issue is far from settled, however, and performing rights societies haveargued to <strong>the</strong> c<strong>on</strong>trary. 229 The issue is particularly significant for musical works becausedifferent organizati<strong>on</strong>s are often resp<strong>on</strong>sible for licensing and collecting royalties for publicdistributi<strong>on</strong> and public performance of musical works.Even if an isochr<strong>on</strong>ous transmissi<strong>on</strong> is required for a public performance, <strong>the</strong> distincti<strong>on</strong>between isochr<strong>on</strong>ous and asynchr<strong>on</strong>ous transmissi<strong>on</strong>s becomes highly blurred <strong>on</strong> <strong>the</strong> <strong>Internet</strong>.Because <strong>the</strong> <strong>Internet</strong> is based <strong>on</strong> packet switching technology, all transmissi<strong>on</strong>s through <strong>the</strong><strong>Internet</strong> are in some sense “asynchr<strong>on</strong>ous.” Moreover, through use of buffering in memory orstorage of informati<strong>on</strong> <strong>on</strong> magnetic or optical storage, ei<strong>the</strong>r at <strong>the</strong> transmitting or <strong>the</strong> receivingend or both, of all or parts of transmitted data, even an asynchr<strong>on</strong>ous transmissi<strong>on</strong> can effect asmooth, moment-by-moment performance at <strong>the</strong> receiving end.One can argue that <strong>the</strong> determinative factor of whe<strong>the</strong>r a public performance has beenaccomplished should be judged from <strong>the</strong> perspective of what <strong>the</strong> recipient perceives, not <strong>the</strong>transmissi<strong>on</strong> technology used (whe<strong>the</strong>r isochr<strong>on</strong>ous or asynchr<strong>on</strong>ous), especially if <strong>the</strong>transmitting party c<strong>on</strong>trols when and what <strong>the</strong> recipient sees. For example, <strong>the</strong> Senate Reportaccompanying <strong>the</strong> Digital Performance Right in Sound Recordings Act of 1995 suggests thatburst transmissi<strong>on</strong>s for prompt playback may c<strong>on</strong>stitute public performances:[I]f a transmissi<strong>on</strong> system was designed to allow transmissi<strong>on</strong> recipients to hearsound recordings substantially at <strong>the</strong> time of transmissi<strong>on</strong>, but <strong>the</strong> soundrecording was transmitted in a high-speed burst of data and stored in a computermemory for prompt playback (such storage being technically <strong>the</strong> making of aph<strong>on</strong>orecord), and <strong>the</strong> transmissi<strong>on</strong> recipient could not retain <strong>the</strong> ph<strong>on</strong>orecord forplayback <strong>on</strong> subsequent occasi<strong>on</strong>s (or for any o<strong>the</strong>r purpose), delivering <strong>the</strong>ph<strong>on</strong>orecord to <strong>the</strong> transmissi<strong>on</strong> recipient would be incidental to <strong>the</strong>transmissi<strong>on</strong>. 2302. The Meaning of “Publicly”Secti<strong>on</strong> 106(4) grants <strong>the</strong> exclusive right to perform a work “publicly.” Secti<strong>on</strong> 101defines performing a work “publicly” to include performance by transmissi<strong>on</strong> to an audience thatmay receive <strong>the</strong> transmissi<strong>on</strong> at different times, at different places, or both. Thus, <strong>the</strong> mere factthat recipients may download performances of a work at dispersed times <strong>on</strong> demand through <strong>the</strong><strong>Internet</strong> does not diminish <strong>the</strong> “public” nature of such performances. For example, in OnCommand Video Corp. v. Columbia Pictures Industries, Inc., 231 <strong>the</strong> court held that <strong>the</strong> public228229230231Id. at 6-64.Id.S. Rep. No. 104-128, at 39 (1995), reprinted in 1995 U.S.C.C.A.N. 356, 386.777 F. Supp. 787 (N.D. Cal. 1991).- 66 -


performance right was implicated by a system of video cassette players wired to hotel roomswhich was capable of transmitting guest-selected movies to <strong>the</strong> occupants of <strong>on</strong>e room at a time.In sum, <strong>the</strong> breadth of definiti<strong>on</strong> of “public” performances makes a variety of <strong>on</strong>linetransmissi<strong>on</strong>s of “<strong>on</strong> demand” informati<strong>on</strong> potentially within <strong>the</strong> public performance right. Howc<strong>on</strong>temporaneously <strong>the</strong> playback of that informati<strong>on</strong> must be with <strong>the</strong> transmissi<strong>on</strong> in order for<strong>the</strong>re to be deemed a “performance” under current United States law remains to be seen. TheWIPO treaties could render many of <strong>the</strong>se issues largely academic in view of <strong>the</strong> fact that <strong>the</strong>current public performance right could become subsumed in <strong>the</strong> potentially broader right of“communicati<strong>on</strong> to <strong>the</strong> public” or “making available to <strong>the</strong> public” c<strong>on</strong>tained in <strong>the</strong> WIPOtreaties discussed below. However, as discussed fur<strong>the</strong>r below, <strong>the</strong> implementati<strong>on</strong> of <strong>the</strong> WIPOtreaties in <strong>the</strong> DMCA takes a minimalist approach and does not adopt separate rights of“communicati<strong>on</strong> to <strong>the</strong> public” or “making available to <strong>the</strong> public.” Accordingly, <strong>the</strong> noteduncertainties with respect to <strong>the</strong> right of public performance are likely to await fur<strong>the</strong>rclarificati<strong>on</strong> through judicial development.3. Live Nati<strong>on</strong> Motor Sports v. DavisIn Live Nati<strong>on</strong> Motor Sports, Inc. v. Davis, 232 <strong>the</strong> plaintiff promoted and producedmotorcycle racing events and streamed webcasts of <strong>the</strong> events <strong>on</strong> its web site. Although <strong>the</strong>facts are unclear from <strong>the</strong> court’s opini<strong>on</strong>, <strong>the</strong> defendant provided links to <strong>the</strong> plaintiff’s web sitethat enabled users of <strong>the</strong> defendant’s web site to view <strong>the</strong> webcasts from <strong>the</strong> defendant’s website. The plaintiff sought a preliminary injuncti<strong>on</strong> against <strong>the</strong> defendant, arguing that <strong>the</strong>defendant’s links to <strong>the</strong> plaintiff’s web site c<strong>on</strong>stituted an unauthorized display and performanceof <strong>the</strong> plaintiff’s copyrighted broadcasts. 233The court granted a preliminary injuncti<strong>on</strong> enjoining <strong>the</strong> defendant from providing<strong>Internet</strong> links to <strong>the</strong> plaintiff’s webcasts of its racing events or o<strong>the</strong>rwise displaying orperforming <strong>the</strong> plaintiff’s webcasts. 234 With almost no analysis, <strong>the</strong> court ruled that <strong>the</strong> plaintiffhad a likelihood of success <strong>on</strong> its copyright claim because “<strong>the</strong> unauthorized ‘link’ to <strong>the</strong> livewebcasts that [<strong>the</strong> defendant] provides <strong>on</strong> his website would likely qualify as a copied display orperformance of [<strong>the</strong> plaintiff’s] copyrightable material.” 235 The court found a threat ofirreparable harm to <strong>the</strong> plaintiff because <strong>the</strong> defendant’s links would cause <strong>the</strong> plaintiff to lose itsability to sell sp<strong>on</strong>sorships or advertisements <strong>on</strong> <strong>the</strong> basis that its website was <strong>the</strong> exclusivesource of <strong>the</strong> webcasts. 236Although <strong>the</strong> unclear facts of this case make its reach uncertain, it could potentiallyimply that any unauthorized link that causes material available <strong>on</strong> ano<strong>the</strong>r site to be streamedthrough an unauthorized site could c<strong>on</strong>stitute an infringing public display or performance.2322332342352362006 U.S. Dist. LEXIS 89552 (N.D. Tex. Dec. 11, 2006).Id. at *3-4.Id. at *18.Id. at *12.Id. at *15.- 67 -


4. United States v. ASCAPIn United States v. ASCAP, 237 <strong>the</strong> court ruled that <strong>the</strong> downloading of a digital music fileembodying a particular s<strong>on</strong>g does not c<strong>on</strong>stitute a public performance of that s<strong>on</strong>g. The casearose out of an applicati<strong>on</strong> that Yahoo, RealNetworks and AOL made to ASCAP for a license topublicly perform <strong>the</strong> musical works of <strong>the</strong> ASCAP repertoire by means of <strong>the</strong>ir respective<strong>Internet</strong> services. After <strong>the</strong> parties were unable to agree <strong>on</strong> a licensing fee, ASCAP applied to<strong>the</strong> court for a determinati<strong>on</strong> of a reas<strong>on</strong>able fee. The parties cross-moved for partial summaryjudgment <strong>on</strong> <strong>the</strong> issue of whe<strong>the</strong>r downloading a digital music file embodying a s<strong>on</strong>g c<strong>on</strong>stitutesa public performance of <strong>the</strong> s<strong>on</strong>g. 238The court noted that <strong>the</strong> copyright statute provides that, to “perform” a work means to“recite,” “render,” or “play” it, and <strong>the</strong> plain meanings of each of those terms requirec<strong>on</strong>temporaneous perceptibility. Accordingly, <strong>the</strong> court c<strong>on</strong>cluded that for a s<strong>on</strong>g to be“performed,” it must be transmitted in a manner designed for c<strong>on</strong>temporaneous percepti<strong>on</strong>. Thedownloading of a music file is more accurately characterized as a method of reproducing thatfile, ra<strong>the</strong>r than performing it. 239 The court also noted that its interpretati<strong>on</strong> was c<strong>on</strong>sistent with<strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office’s positi<strong>on</strong> in its 2001 DMCA Secti<strong>on</strong> 104 Report to C<strong>on</strong>gress, in which <strong>the</strong><str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office stated that “we do not endorse <strong>the</strong> propositi<strong>on</strong> that a digital downloadc<strong>on</strong>stitutes a public performance even when no c<strong>on</strong>temporaneous performance takes place.” 2405. The Cablevisi<strong>on</strong> CaseIn The Carto<strong>on</strong> Network LP v. CSC Holdings, Inc. 241 <strong>the</strong> Sec<strong>on</strong>d Circuit ruled <strong>on</strong>whe<strong>the</strong>r <strong>the</strong> playback through Cablevisi<strong>on</strong>’s network of copies of cable programs stored <strong>on</strong> itsservers at <strong>the</strong> instance of its customers as part of its “Remote Storage” Digital Video Recorder(RS-DVR) system c<strong>on</strong>stituted unauthorized public performances of <strong>the</strong> stored works. Thedetailed facts of how <strong>the</strong> RS-DVR system worked are set forth in Secti<strong>on</strong> II.A.4(n) above.Cablevisi<strong>on</strong> argued that <strong>the</strong> transmissi<strong>on</strong>s generated in resp<strong>on</strong>se to customer requests forplayback of programs stored <strong>on</strong> its network servers by customers did not c<strong>on</strong>stitute public237238239240241485 F. Supp. 2d 438 (S.D.N.Y. 2007).Id. at 440-41. The applicants c<strong>on</strong>ceded that <strong>the</strong> streaming of a musical work does c<strong>on</strong>stitute a publicperformance. Id. at 442.Id. at 443-44. The court also found this interpretati<strong>on</strong> c<strong>on</strong>sistent with <strong>the</strong> holdings of those courts that haveaddressed downloading of music over <strong>the</strong> <strong>Internet</strong> using peer-to-peer file transfer programs. For example, <strong>the</strong>court cited <strong>the</strong> holding in Maverick Recording Co. v. Goldshteyn, 2006 U.S. Dist. LEXIS 52422, at *8(E.D.N.Y. July 31, 2006) (“Downloading and uploading copyrighted files from a peer-to-peer networkc<strong>on</strong>stitutes, respectively, reproducing and distributing copyrighted material in violati<strong>on</strong> of 17 U.S.C. § 106.”)(emphasis added). ASCAP, 2007 U.S. Dist. LEXIS 31910 at *14.Id. at 444 (quoting U.S. <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office, Digital Millennium <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act Secti<strong>on</strong> 104 Report to <strong>the</strong> UnitedStates C<strong>on</strong>gress at xxvii-xxviii (Aug. 29, 2001)).536 F.3d 121(2d Cir. 2008), cert. denied sub nom. CNN, Inc. v. CSC Holdings, Inc., 2009 U.S. LEXIS 4828(2009).- 68 -


performances because <strong>the</strong> RS-DVR customer, not Cablevisi<strong>on</strong>, invoked <strong>the</strong> transmitting and thus<strong>the</strong> performing, and <strong>the</strong> transmissi<strong>on</strong>s were not “to <strong>the</strong> public.” 242The court ruled that it need not address Cablevisi<strong>on</strong>’s first argument because, even if <strong>the</strong>court were to assume that Cablevisi<strong>on</strong> made <strong>the</strong> transmissi<strong>on</strong>s when RS-DVR playbacksoccurred, <strong>the</strong> RS-DVR playbacks did not involve <strong>the</strong> transmissi<strong>on</strong> of a performance “to <strong>the</strong>public.” The court began its analysis by noting that <strong>the</strong> sec<strong>on</strong>d, or “transmit,” clause of <strong>the</strong>definiti<strong>on</strong> of public performance applies “whe<strong>the</strong>r <strong>the</strong> members of <strong>the</strong> public capable ofreceiving <strong>the</strong> performance or display receive it in <strong>the</strong> same place or in separate places and at <strong>the</strong>same time or at different times.” 243 The court observed, “The fact that <strong>the</strong> statute says ‘capableof receiving <strong>the</strong> performance,’ instead of ‘capable of receiving <strong>the</strong> transmissi<strong>on</strong>,’ underscores <strong>the</strong>fact that a transmissi<strong>on</strong> of a performance is itself a performance.” 244The Sec<strong>on</strong>d Circuit <strong>the</strong>refore focused <strong>on</strong> who was “capable of receiving” performancesthrough playbacks via <strong>the</strong> RS-DVR system. Cablevisi<strong>on</strong> argued that, because each RS-DVRtransmissi<strong>on</strong> was made using a single unique copy of a work, made by an individual subscriber,<strong>on</strong>e that could be decoded exclusively by that subscriber’s cable box, <strong>on</strong>ly <strong>on</strong>e subscriber wascapable of receiving any given RS-DVR transmissi<strong>on</strong>. By c<strong>on</strong>trast, <strong>the</strong> district court hadsuggested that, in c<strong>on</strong>sidering whe<strong>the</strong>r a transmissi<strong>on</strong> was “to <strong>the</strong> public,” <strong>on</strong>e should c<strong>on</strong>sidernot <strong>the</strong> potential audience of a particular transmissi<strong>on</strong>, but <strong>the</strong> potential audience of <strong>the</strong>underlying work whose c<strong>on</strong>tent was being transmitted. The Sec<strong>on</strong>d Circuit ruled that <strong>the</strong> districtcourt’s approach was inc<strong>on</strong>sistent with <strong>the</strong> language of <strong>the</strong> transmit clause, which speaks ofpers<strong>on</strong>s capable of receiving a particular “transmissi<strong>on</strong>” or “performance,” and not of <strong>the</strong>potential audience of a particular “work.” 245On appeal, <strong>the</strong> plaintiffs presented a slightly different argument, insisting that <strong>the</strong> sameoriginal performance of a work was being transmitted to Cablevisi<strong>on</strong>’s various subscribers atdifferent times up<strong>on</strong> request. The court noted that <strong>the</strong> implicati<strong>on</strong> of <strong>the</strong> plaintiffs’ argument wasthat, to determine whe<strong>the</strong>r a given transmissi<strong>on</strong> of a performance was to <strong>the</strong> public, <strong>on</strong>e shouldc<strong>on</strong>sider not <strong>on</strong>ly <strong>the</strong> potential audience of that transmissi<strong>on</strong>, but also <strong>the</strong> potential audience ofany transmissi<strong>on</strong> of <strong>the</strong> same underlying “original” performance. The court rejected thisargument, noting that it would obviate any possibility of a purely private transmissi<strong>on</strong>. 246We do not believe C<strong>on</strong>gress intended such odd results. Although <strong>the</strong> transmitclause is not a model of clarity, we believe that when C<strong>on</strong>gress speaks oftransmitting a performance to <strong>the</strong> public, it refers to <strong>the</strong> performance created by<strong>the</strong> act of transmissi<strong>on</strong>. Thus, HBO transmits its own performance of a work242243244245246Id. at 134.Id.Id.Id. at 135.Id. at 135-36.- 69 -


when it transmits to Cablevisi<strong>on</strong>, and Cablevisi<strong>on</strong> transmits its own performanceof <strong>the</strong> same work when it retransmits <strong>the</strong> feed from HBO. 247Accordingly, <strong>the</strong> Sec<strong>on</strong>d Circuit c<strong>on</strong>cluded that a court must look downstream, ra<strong>the</strong>rthan upstream or laterally, to determine whe<strong>the</strong>r any link in a chain of transmissi<strong>on</strong>s made by aparty c<strong>on</strong>stitutes a public performance, and should not examine <strong>the</strong> potential recipients of <strong>the</strong>c<strong>on</strong>tent provider’s initial transmissi<strong>on</strong> to determine who was capable of receiving <strong>the</strong> RS-DVRplayback transmissi<strong>on</strong>. Because <strong>the</strong> RS-DVR system, as designed, made transmissi<strong>on</strong>s <strong>on</strong>ly to<strong>on</strong>e subscriber using a copy made by that particular subscriber, <strong>the</strong> court c<strong>on</strong>cluded that <strong>the</strong>universe of people capable of receiving an RS-DVR transmissi<strong>on</strong> was <strong>the</strong> single subscriberwhose self-made copy was used to <strong>the</strong> create <strong>the</strong> transmissi<strong>on</strong>, and <strong>the</strong> transmissi<strong>on</strong>s through <strong>the</strong>RS-DVR system were <strong>the</strong>refore not public performances. 248 The court cauti<strong>on</strong>ed, however, thatits holding “does not generally permit c<strong>on</strong>tent delivery networks to avoid all copyright liabilityby making copies of each item of c<strong>on</strong>tent and associating <strong>on</strong>e unique copy with each subscriberto <strong>the</strong> network, or by giving <strong>the</strong>ir subscribers <strong>the</strong> capacity to make <strong>the</strong>ir own individual copies.We do not address whe<strong>the</strong>r such a network operator would be able to escape any o<strong>the</strong>r form ofcopyright liability, such as liability for unauthorized reproducti<strong>on</strong>s or liability for c<strong>on</strong>tributoryinfringement.” 2496. Ringt<strong>on</strong>es – In re Applicati<strong>on</strong> of Cellco PartnershipIn In re Applicati<strong>on</strong> of Celleco Partnership d/b/a Veriz<strong>on</strong> Wireless, 250 <strong>the</strong> courtruled that <strong>the</strong> sale of ringt<strong>on</strong>es by Veriz<strong>on</strong> to its cell ph<strong>on</strong>e customers did not require payment toASCAP for a public performance license for <strong>the</strong> musical works embodied in <strong>the</strong> ringt<strong>on</strong>es.ASCAP argued that Veriz<strong>on</strong> engaged in public performances of <strong>the</strong> musical works when itdownloaded ringt<strong>on</strong>es to its customers. It also argued that Veriz<strong>on</strong> was both directly andsec<strong>on</strong>darily liable for public performances of musical works when its customers played ringt<strong>on</strong>es<strong>on</strong> <strong>the</strong>ir teleph<strong>on</strong>es up<strong>on</strong> incoming calls. 251The court rejected both <strong>the</strong>se arguments. As to <strong>the</strong> first, citing <strong>the</strong> Cablevisi<strong>on</strong> casediscussed in <strong>the</strong> previous subsecti<strong>on</strong>, <strong>the</strong> court ruled that, because <strong>on</strong>ly <strong>on</strong>e subscriber wascapable of receiving a particular transmissi<strong>on</strong> of a ringt<strong>on</strong>e during download, such transmissi<strong>on</strong>was not itself made to <strong>the</strong> “public,” regardless of whe<strong>the</strong>r a download could be c<strong>on</strong>sidered atransmissi<strong>on</strong> of a “performance” of <strong>the</strong> musical works in <strong>the</strong> ringt<strong>on</strong>e. 252 The court did note that,247248249250251252Id. at 136.Id. at 137, 139. “If <strong>the</strong> owner of a copyright believes he is injured by a particular transmissi<strong>on</strong> of aperformance of his work, he may be able to seek redress not <strong>on</strong>ly for <strong>the</strong> infringing transmissi<strong>on</strong>, but also for<strong>the</strong> underlying copying that facilitated <strong>the</strong> transmissi<strong>on</strong>. Given this interplay between <strong>the</strong> various rights in thisc<strong>on</strong>text, it seems quite c<strong>on</strong>sistent with <strong>the</strong> Act to treat a transmissi<strong>on</strong> made using Copy A as distinct from <strong>on</strong>emade using Copy B, just as we would treat a transmissi<strong>on</strong> made by Cablevisi<strong>on</strong> as distinct from an o<strong>the</strong>rwiseidentical transmissi<strong>on</strong> made by Comcast.” Id. at 138.Id. at 139.663 F. Supp. 2d 363 (S.D.N.Y. 2009).Id. at 368.Id. at 371.- 70 -


“[w]here a transmissi<strong>on</strong> is of a digital file ra<strong>the</strong>r than a performance that can bec<strong>on</strong>temporaneously observed or heard, and where that transmissi<strong>on</strong> is but a link in a chain to adownstream public performance, it may be that <strong>the</strong> transmissi<strong>on</strong> is not an act of infringement forwhich <strong>the</strong> transmitter is directly liable under § 106(4), but ra<strong>the</strong>r an act that may subject <strong>the</strong>transmitter to c<strong>on</strong>tributory liability under § 106(4) for <strong>the</strong> infringement created by any ultimatepublic performance.” 253 That could not be <strong>the</strong> case here, however, because <strong>the</strong> court c<strong>on</strong>cludedthat <strong>the</strong>re was no qualifying public performance under § 106(4) when <strong>the</strong> customer used <strong>the</strong>ringt<strong>on</strong>e up<strong>on</strong> an incoming call.Specifically, <strong>the</strong> court ruled that, when a ringt<strong>on</strong>e plays <strong>on</strong> a cellular teleph<strong>on</strong>e, evenwhen that occurs in public, <strong>the</strong> user is exempt from copyright liability under Secti<strong>on</strong> 110(4) of<strong>the</strong> copyright statute, which exempts any “performance of a n<strong>on</strong>dramatic literary or musicalwork o<strong>the</strong>rwise than in a transmissi<strong>on</strong> to <strong>the</strong> public, without any purpose of direct or indirectcommercial advantage and without payment of any fee or o<strong>the</strong>r compensati<strong>on</strong> for <strong>the</strong>performance to any of its performers, promoters, or organizers, if [] <strong>the</strong>re is no direct or indirectadmissi<strong>on</strong> charge.” 254 The court held that <strong>on</strong> occasi<strong>on</strong>s when Veriz<strong>on</strong> customers had activated<strong>the</strong>ir ringt<strong>on</strong>es and <strong>the</strong> teleph<strong>on</strong>es rang in <strong>the</strong> presence of members of <strong>the</strong> public at a level whereit could be heard by o<strong>the</strong>rs, such playing of <strong>the</strong> musical works embodied in <strong>the</strong> ringt<strong>on</strong>essatisfied all of <strong>the</strong> requirements of <strong>the</strong> §110(4) exempti<strong>on</strong>: Veriz<strong>on</strong> customers were not playing<strong>the</strong> ringt<strong>on</strong>es for any commercial advantage, <strong>the</strong>y did not get paid any fee or compensati<strong>on</strong> forthose performances, and <strong>the</strong>y did not charge admissi<strong>on</strong>. Accordingly, <strong>the</strong>re was no n<strong>on</strong>-exemptpublic performance by <strong>the</strong> users of <strong>the</strong> ringt<strong>on</strong>es to which Veriz<strong>on</strong> could be sec<strong>on</strong>darily liable. 255The court also rejected ASCAP’s argument that Veriz<strong>on</strong> was directly liable for itselfengaging in a public performance of copyrighted musical works when ringt<strong>on</strong>es played in public<strong>on</strong> customers’ cell ph<strong>on</strong>es because it c<strong>on</strong>trolled <strong>the</strong> entire series of steps that allowed andtriggered <strong>the</strong> cellular teleph<strong>on</strong>e to perform <strong>the</strong> musical works in public. The court noted thatVeriz<strong>on</strong>’s <strong>on</strong>ly role in <strong>the</strong> playing of a ringt<strong>on</strong>e was <strong>the</strong> sending of a signal to alert a customer’steleph<strong>on</strong>e to an incoming call, and that signal was <strong>the</strong> same whe<strong>the</strong>r <strong>the</strong> customer haddownloaded a ringt<strong>on</strong>e or not, whe<strong>the</strong>r she had set <strong>the</strong> ph<strong>on</strong>e to play a ringt<strong>on</strong>e up<strong>on</strong> receiving acall or not, whe<strong>the</strong>r she was in a public setting or not, and whe<strong>the</strong>r she had <strong>the</strong> ringt<strong>on</strong>e volumeturned high or low. And it was <strong>the</strong> caller, not Veriz<strong>on</strong>, who initiated <strong>the</strong> entire process that ledto <strong>the</strong> playing of <strong>the</strong> ringt<strong>on</strong>e. Accordingly, Veriz<strong>on</strong> did not engage in activity c<strong>on</strong>stitutingdirect liability, even if <strong>the</strong> ringing of its customers’ ph<strong>on</strong>es in public c<strong>on</strong>stituted publicperformances. 256253254255256Id. at 374 n.14.Id. at 374 (quoting 17 U.S.C. § 110(4)).Id. at 375. Nor, in order to avoid sec<strong>on</strong>dary liability, was Veriz<strong>on</strong> obligated to show that each and everycustomer would be able to meet its burden of proof that its performance of ringt<strong>on</strong>es in public satisfied <strong>the</strong> §110(4) exempti<strong>on</strong>. “The law does not impose an insurmountable burden <strong>on</strong> Veriz<strong>on</strong> to show precisely howeach of its customers has actually used her teleph<strong>on</strong>e, but <strong>on</strong>ly requires it to dem<strong>on</strong>strate that customers as agroup do not exhibit any expectati<strong>on</strong> of profit when <strong>the</strong>y permit <strong>the</strong> teleph<strong>on</strong>es to ring in public.” Id. at 376.Id. at 376-79.- 71 -


C. The Right of Public DisplaySecti<strong>on</strong> 106(5) of <strong>the</strong> copyright statute grants <strong>the</strong> owner of copyright in a literary,musical, dramatic, and choreographic work, a pantomime, and a pictorial, graphic or sculpturalwork, including <strong>the</strong> individual images of a moti<strong>on</strong> picture or o<strong>the</strong>r audiovisual work, 257 <strong>the</strong>exclusive right to display <strong>the</strong> work publicly. 258 Secti<strong>on</strong> 101 defines <strong>the</strong> meaning of “to display awork publicly” in virtually identical terms as <strong>the</strong> definiti<strong>on</strong> of “to perform a work publicly.”Thus, a public display can be accomplished by a transmissi<strong>on</strong> of a display of <strong>the</strong> work tomembers of <strong>the</strong> public capable of receiving <strong>the</strong> display in <strong>the</strong> same place or separate places andat <strong>the</strong> same time or at different times.The WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty does not c<strong>on</strong>tain a right of public display per se. However,<strong>the</strong> right of public display is arguably subsumed under <strong>the</strong> right of communicati<strong>on</strong> to <strong>the</strong> publicin <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty.1. The Frena, Marobie-FL, Hardenburgh and Webbworld CasesIn Playboy Enterprises, Inc. v. Frena, 259 <strong>the</strong> court held that <strong>the</strong> making of photographsavailable <strong>on</strong> a BBS was a “public” display, even though <strong>the</strong> display was limited to subscribers,and subscribers viewed <strong>the</strong> photographs <strong>on</strong>ly up<strong>on</strong> downloading <strong>the</strong> photographs from <strong>the</strong> BBS<strong>on</strong> demand. Thus, making material available through <strong>the</strong> <strong>Internet</strong> even to <strong>on</strong>ly a small and selectaudience may still c<strong>on</strong>stitute a “public” display. The point at which a selected audience becomesso small that a display to such audience can no l<strong>on</strong>ger be c<strong>on</strong>sidered a “public” display isunclear. The Playboy court seemed to define an audience as “public” if it c<strong>on</strong>tains “a substantialnumber of pers<strong>on</strong>s outside of a normal circle of family and its social acquaintances.” 260Similarly, in Marobie-FL, Inc. v. Nati<strong>on</strong>al Associati<strong>on</strong> of Fire Equipment Distributors, 261<strong>the</strong> administrator of <strong>the</strong> Web page of <strong>the</strong> defendant, Nati<strong>on</strong>al Associati<strong>on</strong> of Fire EquipmentDistributors (NAFED), placed certain files <strong>on</strong> NAFED’s Web page c<strong>on</strong>taining three volumes ofcopyrighted clip art of <strong>the</strong> plaintiff. The court ruled that <strong>the</strong> placement of <strong>the</strong> files c<strong>on</strong>taining <strong>the</strong>clip art <strong>on</strong> <strong>the</strong> Web page c<strong>on</strong>stituted a direct violati<strong>on</strong> of both <strong>the</strong> plaintiff’s distributi<strong>on</strong> rightand public display right. The court c<strong>on</strong>cluded that <strong>the</strong> mere making available of <strong>the</strong> files fordownloading was sufficient for liability, because “<strong>on</strong>ce <strong>the</strong> files were uploaded [<strong>on</strong>to <strong>the</strong> Webserver], <strong>the</strong>y were available for downloading by <strong>Internet</strong> users and … <strong>the</strong> [OSP] servertransmitted <strong>the</strong> files to some <strong>Internet</strong> users when requested.” 262 The court, citing <strong>the</strong> Netcomcase, refused to hold <strong>the</strong> OSP supplying <strong>Internet</strong> service to NAFED directly or vicariously liable,257258259260261262To display a moti<strong>on</strong> picture, <strong>on</strong>e must display individual images “n<strong>on</strong>sequentially.” K. Stuckey, <strong>Internet</strong> andOnline Law § 6.03[5], at 6-17 (2008).The right of public display does not apply to sound recordings, architectural works, and audiovisual works(except for display of individual images of an audiovisual work).839 F. Supp. 1552 (M.D. Fla. 1993).Id. at 1557.45 U.S.P.Q.2d 1236 (N.D. Ill. 1997).Id. at 1241.- 72 -


although <strong>the</strong> court noted that <strong>the</strong> OSP might be liable for c<strong>on</strong>tributory infringement, dependingup<strong>on</strong> whe<strong>the</strong>r <strong>the</strong> OSP knew that any material <strong>on</strong> NAFED’s Web page was copyrighted, when itlearned of that fact, and <strong>the</strong> degree to which <strong>the</strong> OSP m<strong>on</strong>itored, c<strong>on</strong>trolled, or had <strong>the</strong> ability tom<strong>on</strong>itor or c<strong>on</strong>trol <strong>the</strong> c<strong>on</strong>tents of NAFED’s Web page. 263And in Playboy Enterprises, Inc. v. Hardenburgh, 264 <strong>the</strong> defendants operated a BBSwhich made available graphic image files to subscribers for a fee, many of which c<strong>on</strong>tained adultmaterial. To increase its stockpile of available informati<strong>on</strong>, and <strong>the</strong>reby its attractiveness to newcustomers, defendants provided an incentive to encourage subscribers to upload informati<strong>on</strong> <strong>on</strong>to<strong>the</strong> BBS. Subscribers were given “credit” for each megabyte of electr<strong>on</strong>ic data that <strong>the</strong>yuploaded <strong>on</strong>to <strong>the</strong> system, which entitled <strong>the</strong>m to download defined amounts of data from <strong>the</strong>system in return. Informati<strong>on</strong> uploaded <strong>on</strong>to <strong>the</strong> BBS went directly to an “upload file” where anemployee of <strong>the</strong> BBS briefly checked <strong>the</strong> new files to ascertain whe<strong>the</strong>r <strong>the</strong>y were “acceptable,”meaning not pornographic and not blatantly protected by copyright. 265 Many of <strong>the</strong> plaintiff’scopyrighted photographs appeared <strong>on</strong> <strong>the</strong> BBS and <strong>the</strong> plaintiff brought suit for infringement.With respect to <strong>the</strong> issue of direct liability for <strong>the</strong> infringing postings of its subscribers,<strong>the</strong> court agreed with <strong>the</strong> Netcom decisi<strong>on</strong>’s requirement of some direct voliti<strong>on</strong>al act orparticipati<strong>on</strong> in <strong>the</strong> infringement. However, <strong>the</strong> court found that <strong>the</strong> facts of <strong>the</strong> case, unlikethose of Frena, MAPHIA, and Netcom, were sufficient to establish direct liability forinfringement of both <strong>the</strong> public display and distributi<strong>on</strong> rights. The court based its c<strong>on</strong>clusi<strong>on</strong> <strong>on</strong>“two crucial facts: (1) Defendants’ policy of encouraging subscribers to upload files, includingadult photographs, <strong>on</strong>to <strong>the</strong> system, and (2) Defendants’ policy of using a screening procedure inwhich [its] employees viewed all files in <strong>the</strong> upload file and moved <strong>the</strong>m into <strong>the</strong> generallyavailable files for subscribers. These two facts transform Defendants from passive providers of aspace in which infringing activities happened to occur to active participants in <strong>the</strong> process ofcopyright infringement.” 266Finally, in Playboy Enterprises, Inc. v. Webbworld, Inc., 267 <strong>the</strong> court held <strong>the</strong> defendantsdirectly liable for infringing public displays of copyrighted images for making such imagesavailable through a website for downloading by subscribers.2. Kelly v. Arriba SoftAn important case c<strong>on</strong>struing <strong>the</strong> scope of <strong>the</strong> public display right <strong>on</strong> <strong>the</strong> <strong>Internet</strong> is thatof Kelly v. Arriba Soft Corp. 268 In that case, <strong>the</strong> defendant Arriba was <strong>the</strong> operator of a “visualsearch engine” <strong>on</strong> <strong>the</strong> <strong>Internet</strong> that allowed users to search for and retrieve images. In resp<strong>on</strong>seto a search query, <strong>the</strong> search engine produced a list of reduced, “thumbnail” images. To provide263264265266267268Id. at 1245.982 F. Supp. 503 (N.D. Ohio 1997).Id. at 506.Id. at 513.45 U.S.P.Q.2d 1641 (N.D. Tex. 1997).336 F.3d 811 (9 th Cir. 2003).- 73 -


this functi<strong>on</strong>ality, Arriba developed a program called a “crawler” that would search <strong>the</strong> Weblooking for images to index, download full-sized copies of <strong>the</strong> images <strong>on</strong>to Arriba’s server, <strong>the</strong>nuse those images to generate lower resoluti<strong>on</strong> thumbnails. Once <strong>the</strong> thumbnails were created,<strong>the</strong> program deleted <strong>the</strong> full-sized originals from <strong>the</strong> server. 269When <strong>the</strong> user double-clicked <strong>on</strong> <strong>the</strong> thumbnail, a full-sized versi<strong>on</strong> of <strong>the</strong> image wasdisplayed. During <strong>on</strong>e period of time, <strong>the</strong> full-sized images were produced by “inline linking” –i.e., by retrieving <strong>the</strong> image from <strong>the</strong> original web site and displaying it <strong>on</strong> <strong>the</strong> Arriba web pagewith text describing <strong>the</strong> size of <strong>the</strong> image and a link to <strong>the</strong> originating site – such that <strong>the</strong> userwould typically not realize <strong>the</strong> image actually resided <strong>on</strong> ano<strong>the</strong>r web site. During a subsequentperiod of time, <strong>the</strong> thumbnails were accompanied by two links, a “source” and a “details” link.The “details” link produced a separate screen c<strong>on</strong>taining <strong>the</strong> thumbnail image with textdescribing <strong>the</strong> size of <strong>the</strong> image and a link to <strong>the</strong> originating site. Alternatively, by clicking <strong>on</strong><strong>the</strong> “source” link or <strong>the</strong> thumbnail itself, <strong>the</strong> Arriba site produced two framed windows <strong>on</strong> top of<strong>the</strong> Arriba page: <strong>the</strong> window in <strong>the</strong> forefr<strong>on</strong>t c<strong>on</strong>tained <strong>the</strong> full-sized image, imported directlyfrom <strong>the</strong> originating site; underneath that was a sec<strong>on</strong>d window displaying <strong>the</strong> home pagec<strong>on</strong>taining <strong>the</strong> image from <strong>the</strong> original site. 270Arriba’s crawler copied 35 photographs <strong>on</strong> which <strong>the</strong> plaintiff, Kelly, held <strong>the</strong> copyrightsinto <strong>the</strong> Arriba database. When he complained, Arriba deleted <strong>the</strong> thumbnails of images thatcame from Kelly’s own web sites and placed those sites <strong>on</strong> a list of sites that it would not crawlin <strong>the</strong> future. Several m<strong>on</strong>ths later, Kelly sued Arriba, identifying in <strong>the</strong> complaint o<strong>the</strong>r imagesof his that came from third party web sites. 271 The district court ruled that Arriba’s use of both<strong>the</strong> thumbnails and <strong>the</strong> full sized images was a fair use, and Kelly appealed. 272The Ninth Circuit, in an opini<strong>on</strong> issued in July of 2003, 273 affirmed <strong>the</strong> ruling that <strong>the</strong> useof <strong>the</strong> thumbnails was a fair use. Applying <strong>the</strong> first of <strong>the</strong> four statutory fair use factors, <strong>the</strong>court held that <strong>the</strong> thumbnails were a transformative use of Kelly’s works because <strong>the</strong>y weremuch smaller, lower resoluti<strong>on</strong> images that served an entirely different functi<strong>on</strong> than Kelly’soriginal images. Users would be unlikely to enlarge <strong>the</strong> thumbnails and use <strong>the</strong>m for artisticpurposes because <strong>the</strong> thumbnails were of much lower resoluti<strong>on</strong> than <strong>the</strong> originals. Thus, <strong>the</strong>first fair use factor weighted in favor of Arriba. 274The court held that <strong>the</strong> sec<strong>on</strong>d factor, <strong>the</strong> nature of <strong>the</strong> copyrighted work, weighedslightly in favor of Kelly because <strong>the</strong> photographs were creative in nature. The third factor, <strong>the</strong>amount and substantiality of <strong>the</strong> porti<strong>on</strong> used, was deemed not to weigh in ei<strong>the</strong>r party’s favor.Although <strong>the</strong> entire images had been copied, it was necessary for Arriba to copy <strong>the</strong> entire269270271272273274Id. at 815.Id. at 815-16.Id. at 816.Id. at 816-17.The 2003 opini<strong>on</strong> withdrew an earlier and highly c<strong>on</strong>troversial opini<strong>on</strong> issued by <strong>the</strong> court in 2002, discussedfur<strong>the</strong>r below.Id. at 818-19.- 74 -


images to allow users to recognize <strong>the</strong> image and decide whe<strong>the</strong>r to pursue more informati<strong>on</strong>about it or <strong>the</strong> originating web site. 275Finally, <strong>the</strong> court held that <strong>the</strong> fourth factor, <strong>the</strong> effect of <strong>the</strong> use up<strong>on</strong> <strong>the</strong> potentialmarket for or value of <strong>the</strong> copyrighted work, weighed in favor of Arriba. The court found thatArriba’s use of <strong>the</strong> thumbnail images would not harm <strong>the</strong> market for Kelly’s use of his images or<strong>the</strong> value of his images. By displaying <strong>the</strong> thumbnails, <strong>the</strong> search engine would guide users toKelly’s web site ra<strong>the</strong>r than away from it. Nor would Arriba’s use of <strong>the</strong> images harm Kelly’sability to sell or license <strong>the</strong> full-sized images. Any<strong>on</strong>e downloading <strong>the</strong> thumbnails would not besuccessful selling full sized-images from <strong>the</strong>m because of <strong>the</strong> low resoluti<strong>on</strong> of <strong>the</strong> thumbnails,and <strong>the</strong>re would be no way to view, create, or sell clear, full-sized images without going toKelly’s web sites. Accordingly, <strong>on</strong> balance, <strong>the</strong> court found fair use. 276The court reversed, however, <strong>the</strong> district court’s ruling that Arriba’s use of <strong>the</strong> full-sizedimages through inline linking or framing was a fair use and remanded for fur<strong>the</strong>r proceedings.The Ninth Circuit’s ruling <strong>on</strong> this issue was c<strong>on</strong>trary to a result <strong>the</strong> Ninth Circuit had reached inan earlier opini<strong>on</strong> in <strong>the</strong> case issued in 2002, 277 which it withdrew when issuing its 2003 opini<strong>on</strong>.In <strong>the</strong> 2002 ruling, <strong>the</strong> Ninth Circuit had held, in a highly c<strong>on</strong>troversial ruling, that Arriba’sinline linking to and framing of <strong>the</strong> full-sized images violated <strong>the</strong> plaintiff’s public displayrights. 278 Interestingly, <strong>the</strong> court ruled that Kelly’s reproducti<strong>on</strong> rights had not been infringed:“This use of Kelly’s images does not entail copying <strong>the</strong>m but, ra<strong>the</strong>r, importing <strong>the</strong>m directlyfrom Kelly’s web site. Therefore, it cannot be copyright infringement based <strong>on</strong> <strong>the</strong> reproducti<strong>on</strong>of copyrighted works …. Instead, this use of Kelly’s images infringes up<strong>on</strong> Kelly’s exclusiveright to ‘display <strong>the</strong> copyrighted work publicly.’” 279 Apparently <strong>the</strong> court’s observati<strong>on</strong> that <strong>the</strong>offering of <strong>the</strong> full-sized images through linking “does not entail copying” was meant to refer todirect copying by Arriba, because a copy of <strong>the</strong> images is certainly made in <strong>the</strong> user’s computerRAM, as well as <strong>on</strong> <strong>the</strong> screen, when <strong>the</strong> user clicks <strong>on</strong> <strong>the</strong> thumbnail to display <strong>the</strong> full sizedimage.With respect to infringement of <strong>the</strong> display right, <strong>the</strong> court ruled in its 2002 opini<strong>on</strong> that<strong>the</strong> mere act of linking to <strong>the</strong> images c<strong>on</strong>stituted infringement. First, <strong>the</strong> court ruled that <strong>the</strong>rewas an unauthorized “display”: “By inline linking and framing Kelly’s images, Arriba isshowing Kelly’s original works without his permissi<strong>on</strong>.” 280 Sec<strong>on</strong>d, <strong>the</strong> court held that such“showing” was a “public” <strong>on</strong>e: “A display is public even if <strong>the</strong>re is no proof that any of <strong>the</strong>potential recipients was operating his receiving apparatus at <strong>the</strong> time of <strong>the</strong> transmissi<strong>on</strong>. Bymaking Kelly’s images available <strong>on</strong> its web site, Arriba is allowing public access to thoseimages. The ability to view those images is unrestricted to any<strong>on</strong>e with a computer and internet275276277278279280Id. at 820-21.Id. at 821-22.Kelly v. Arriba Soft Corp., 280 F.3d 934 (9th Cir. 2002).Kelly had never argued, ei<strong>the</strong>r in <strong>the</strong> proceedings below or <strong>on</strong> appeal, that his public display rights had beeninfringed. The Ninth Circuit raised this issue <strong>on</strong> its own.Id. at 944.Id. at 945.- 75 -


access.” 281 The court thus c<strong>on</strong>cluded that Arriba had directly infringed Kelly’s public displayrights: “By allowing <strong>the</strong> public to view Kelly’s copyrighted works while visiting Arriba’s website, Arriba created a public display of Kelly’s works. … Allowing this capability is enough toestablish an infringement; <strong>the</strong> fact that no <strong>on</strong>e saw <strong>the</strong> images goes to <strong>the</strong> issue of damages, notliability.” 282The court went <strong>on</strong> in its 2002 opini<strong>on</strong> to hold that Arriba’s display of Kelly’s full-sizedimages was not a fair use. Unlike <strong>the</strong> case of <strong>the</strong> thumbnails, <strong>the</strong> court held that <strong>the</strong> use of <strong>the</strong>full-sized images was not transformative. “Because <strong>the</strong> full-sized images <strong>on</strong> Arriba’s site actprimarily as illustrati<strong>on</strong>s or artistic expressi<strong>on</strong> and <strong>the</strong> search engine would functi<strong>on</strong> <strong>the</strong> samewithout <strong>the</strong>m, <strong>the</strong>y do not have a purpose different from Kelly’s use of <strong>the</strong>m.” 283 Accordingly,<strong>the</strong> first factor weighed against fair use. For <strong>the</strong> same reas<strong>on</strong>s as before, <strong>the</strong> sec<strong>on</strong>d factorweighed slightly in favor of Kelly. 284 The third factor weighed in favor of Kelly because,although it was necessary to provide whole images “to suit Arriba’s purpose of giving usersaccess to <strong>the</strong> full-sized images without having to go to ano<strong>the</strong>r site, such a purpose is notlegitimate.” 285 Finally, <strong>the</strong> fourth factor weighed in Kelly’s favor, because “[b]y giving usersaccess to Kelly’s full-sized images <strong>on</strong> its own web site, Arriba harms all of Kelly’s markets.” 286The Ninth Circuit’s ruling in its 2002 decisi<strong>on</strong> <strong>on</strong> <strong>the</strong> public display issue generated a lotof c<strong>on</strong>troversy, since <strong>the</strong> reach of that ruling was potentially so broad. In particular, <strong>the</strong> logic <strong>the</strong>Ninth Circuit adopted in its 2002 decisi<strong>on</strong> – that <strong>the</strong> mere act of inline linking to or framing of awork, whe<strong>the</strong>r or not users actually view <strong>the</strong> linked work – c<strong>on</strong>stitutes a public display of <strong>the</strong>linked work, could call into questi<strong>on</strong> <strong>the</strong> legality of many types of linking or framing that has notbeen expressly authorized by <strong>the</strong> owner of <strong>the</strong> linked material. Apparently in resp<strong>on</strong>se to <strong>the</strong>c<strong>on</strong>troversy, <strong>on</strong> Oct. 10, 2002, <strong>the</strong> Ninth Circuit ordered additi<strong>on</strong>al briefing <strong>on</strong> issues of publicdisplay and derivative use rights raised by <strong>the</strong> case. 287In its 2003 decisi<strong>on</strong>, <strong>the</strong> Ninth Circuit omitted entirely <strong>the</strong> discussi<strong>on</strong> of <strong>the</strong> publicdisplay right that had appeared in its 2002 decisi<strong>on</strong>. Instead, <strong>the</strong> court held that <strong>the</strong> district courtshould not have decided whe<strong>the</strong>r <strong>the</strong> display of <strong>the</strong> full-sized images violated Kelly’s publicdisplay rights because <strong>the</strong> parties never moved for summary judgment <strong>on</strong> that issue. 288 In <strong>the</strong>proceedings below, Kelly had moved <strong>on</strong>ly for summary judgment that Arriba’s use of <strong>the</strong>thumbnail images violated his display, reproducti<strong>on</strong> and distributi<strong>on</strong> rights. Arriba cross-movedfor summary judgment and, for purposes of <strong>the</strong> moti<strong>on</strong>, c<strong>on</strong>ceded that Kelly had established a281282283284285286287288Id.Id. at 946.Id. at 947.Id. at 947-48.Id. at 948.Id.“Ninth Circuit Orders Added Briefs <strong>on</strong> Hyperlinking <str<strong>on</strong>g>Issues</str<strong>on</strong>g> in Arriba Soft Appeal,” BNA’s Electr<strong>on</strong>icCommerce & Law Report (Oct. 30, 2002) at 1082.Kelly v. Arriba Soft Corp., 336 F.3d 811, 822 (9th Cir. 2003).- 76 -


prima facie case of infringement as to <strong>the</strong> thumbnail images, but argued that its use of <strong>the</strong>thumbnail images was a fair use. The Ninth Circuit c<strong>on</strong>cluded that, by ruling that use of both <strong>the</strong>thumbnail images and <strong>the</strong> full-sized images was fair, <strong>the</strong> district court had improperly broadened<strong>the</strong> scope of both Kelly’s original moti<strong>on</strong> to include a claim for infringement of <strong>the</strong> full-sizedimages and <strong>the</strong> scope of Arriba’s c<strong>on</strong>cessi<strong>on</strong> to cover <strong>the</strong> prima facie case for both <strong>the</strong> thumbnailimages and <strong>the</strong> full-sized images. 289 Accordingly, <strong>the</strong> court remanded for fur<strong>the</strong>r proceedingswith respect to <strong>the</strong> full-sized images to give <strong>the</strong> parties an opportunity to fully litigate thoseissues. 2903. Ticketmaster v. Tickets.comSee Secti<strong>on</strong> III.D.7 below for a discussi<strong>on</strong> of this case, which distinguished <strong>the</strong> Kelly v.Arriba Soft case and held that Tickets.com’s deep linking to pages <strong>on</strong> Ticketmaster’s web sitewhere tickets could be purchased for events listed <strong>on</strong> Tickets.com’s site did not c<strong>on</strong>stitute aninfringing public display.4. Perfect 10 v. Google (aka Perfect 10 v. Amaz<strong>on</strong>)Perfect 10 v. Google set forth a detailed adjudicati<strong>on</strong> of <strong>the</strong> boundaries of <strong>the</strong> displayright <strong>on</strong> <strong>the</strong> <strong>Internet</strong>, and in particular, which entity should be deemed to perform <strong>the</strong> display forpurposes of copyright liability when <strong>the</strong> display results through links to a web site from ano<strong>the</strong>rsite storing copies of <strong>the</strong> copyrighted material at issue. Because both <strong>the</strong> district court and <strong>the</strong>Ninth Circuit issued very thorough, thoughtful opini<strong>on</strong>s, <strong>the</strong> holdings of both courts will beexplained in detail.The plaintiff Perfect 10 sought to preliminarily enjoin Google from displayingthumbnails and full size versi<strong>on</strong>s of its copyrighted photographs through <strong>the</strong> “Google ImageSearch” functi<strong>on</strong> in resp<strong>on</strong>se to user search queries. Google Image Search allowed a user toinput a text search string and returned thumbnail images organized into a grid potentiallyresp<strong>on</strong>sive to <strong>the</strong> search query. 291To operate Google Image Search, Google created and stored in its cache thumbnailversi<strong>on</strong>s of images appearing <strong>on</strong> web sites crawled by Google’s web crawler. The thumbnailschosen for display in resp<strong>on</strong>se to search queries depended solely up<strong>on</strong> <strong>the</strong> text surrounding <strong>the</strong>image at <strong>the</strong> original site from which <strong>the</strong> image was drawn. When a user clicked <strong>on</strong> a thumbnailimage, Google displayed a page comprised of two distinct frames divided by a gray horiz<strong>on</strong>talline, <strong>on</strong>e frame hosted by Google and <strong>the</strong> sec<strong>on</strong>d <strong>on</strong>e hosted by <strong>the</strong> underlying web site thatoriginally hosted <strong>the</strong> full size image. 292 In <strong>the</strong> upper frame, Google displayed <strong>the</strong> thumbnail,retrieved from its cache, and informati<strong>on</strong> about <strong>the</strong> full size image, including <strong>the</strong> original289290291292Id. at 817.Id. at 822.Perfect 10 v. Google, 416 F. Supp. 2d 828, 832-33 (C.D. Cal. 2006), aff’d sub nom. Perfect 10 v. Amaz<strong>on</strong>.com,Inc., 508 F.3d 1146, 1169 (9 th Cir. 2007).Id. at 833.- 77 -


esoluti<strong>on</strong> of <strong>the</strong> image and <strong>the</strong> specific URL associated with that image. The upper frame madeclear that <strong>the</strong> image might be subject to copyright and that <strong>the</strong> upper frame was not <strong>the</strong> originalc<strong>on</strong>text in which <strong>the</strong> full size image was found. The lower frame c<strong>on</strong>tained <strong>the</strong> original webpage <strong>on</strong> which <strong>the</strong> original image was found. Google nei<strong>the</strong>r stored nor served any of <strong>the</strong>c<strong>on</strong>tent displayed in <strong>the</strong> lower frame, which was stored and served by <strong>the</strong> underlying third partyweb site c<strong>on</strong>taining <strong>the</strong> original image. 293 Perfect 10 brought claims against Google for direct,vicarious and c<strong>on</strong>tributory copyright infringement.Direct Infringement Claims. Perfect 10 alleged that Google directly infringed itscopyrights by displaying and distributing <strong>the</strong> full size images hosted by third party web sites, andby creating, displaying and distributing thumbnails of its copyrighted full size images. Googlec<strong>on</strong>ceded that it created and displayed thumbnails, but denied that it displayed, created, ordistributed what was depicted in <strong>the</strong> lower frame of search results displays, which weregenerated via in-line links to third party sites storing <strong>the</strong> original images of interest. 294The district court began with a c<strong>on</strong>siderati<strong>on</strong> of how “display” should be defined in <strong>the</strong>c<strong>on</strong>text of in-line linking, noting that two approaches were possible: (1) a “sever” test, in whichdisplay is defined as <strong>the</strong> act of serving c<strong>on</strong>tent over <strong>the</strong> web, i.e., physically sending bits over <strong>the</strong><strong>Internet</strong> to <strong>the</strong> user’s browser, and (2) an “incorporati<strong>on</strong>” test, in which display is defined as <strong>the</strong>mere act of incorporating c<strong>on</strong>tent into a web page that is <strong>the</strong>n pulled up by <strong>the</strong> browser throughan in-line link. Under <strong>the</strong> server test, advocated in <strong>the</strong> case by Google, <strong>the</strong> entity that should bedeemed liable for <strong>the</strong> display of infringing c<strong>on</strong>tent is <strong>the</strong> entity whose server served up <strong>the</strong>infringing material. Under <strong>the</strong> incorporati<strong>on</strong> test, advocated by Perfect 10, <strong>the</strong> entity that shouldbe deemed liable for <strong>the</strong> display of infringing c<strong>on</strong>tent is <strong>the</strong> entity that uses an in-line link in itsweb page to direct <strong>the</strong> user’s browser to retrieve <strong>the</strong> infringing c<strong>on</strong>tent. 295The district court reviewed <strong>the</strong> existing decisi<strong>on</strong>s dealing with <strong>the</strong> questi<strong>on</strong> of whe<strong>the</strong>rlinking c<strong>on</strong>stitutes infringing “displaying” of copyrighted material. The court noted that in <strong>the</strong>Webbworld and Hardenburg cases, 296 <strong>the</strong> material was stored <strong>on</strong> <strong>the</strong> defendant’s servers, and in<strong>the</strong> Perfect 10 v. Cybernet Ventures case, 297 it was unclear whe<strong>the</strong>r <strong>the</strong> defendant stored orserved any of <strong>the</strong> infringing c<strong>on</strong>tent. The court fur<strong>the</strong>r noted that <strong>the</strong> Ninth Circuit hadwithdrawn its opini<strong>on</strong> in Kelly v. Arriba Soft 298 adopting <strong>the</strong> incorporati<strong>on</strong> test in <strong>the</strong> face ofwidespread criticism of that decisi<strong>on</strong>. The court <strong>the</strong>refore found that n<strong>on</strong>e of <strong>the</strong>se cases, or anyo<strong>the</strong>r existing precedent, resolved <strong>the</strong> questi<strong>on</strong> before it. 299293294295296297298299Id. at 833-34.Id. at 838.Id. at 838-40.These cases are discussed in Secti<strong>on</strong> II.C.1 above.This case is discussed in Secti<strong>on</strong> II.A.4(k) above.This case is discussed in Secti<strong>on</strong> II.C.2 above.416 F. Supp. 2d at 840-43.- 78 -


The district court c<strong>on</strong>cluded that <strong>the</strong> server test was <strong>the</strong> most appropriate <strong>on</strong>e fordetermining whe<strong>the</strong>r Google’s lower frames were a “display” of infringing material. The courtarticulated several reas<strong>on</strong>s for adopting <strong>the</strong> server test. First, it is based <strong>on</strong> what happens at <strong>the</strong>technological level as users browse <strong>the</strong> web, and thus reflects <strong>the</strong> reality of how c<strong>on</strong>tent actuallytravels over <strong>the</strong> <strong>Internet</strong> before it is shown <strong>on</strong> users’ computers. Sec<strong>on</strong>d, it precludes searchengines from being held directly liable for in-line linking and/or framing infringing c<strong>on</strong>tentstored <strong>on</strong> third party web sites, but allows copyright owners still to seek to impose c<strong>on</strong>tributoryor vicarious liability <strong>on</strong> web sites for including such c<strong>on</strong>tent. Third, web site operators canreadily understand <strong>the</strong> server test and courts can apply it relatively easily. Fourth, in <strong>the</strong> instantcase, it imposes direct liability <strong>on</strong> <strong>the</strong> web sites that took Perfect 10’s full size images and posted<strong>the</strong>m <strong>on</strong> <strong>the</strong> <strong>Internet</strong> for all to see. Finally, <strong>the</strong> server test promotes <strong>the</strong> balance of copyright lawto encourage <strong>the</strong> creati<strong>on</strong> of works by protecting <strong>the</strong>m while at <strong>the</strong> same time encouraging <strong>the</strong>disseminati<strong>on</strong> of informati<strong>on</strong>. The server test would avoid imposing direct liability for merelyindexing <strong>the</strong> web so that users can more readily find <strong>the</strong> informati<strong>on</strong> <strong>the</strong>y seek, while imposingdirect liability for <strong>the</strong> hosting and serving of infringing c<strong>on</strong>tent. 300Applying <strong>the</strong> server test, <strong>the</strong> district court ruled that for purposes of direct infringement,Google’s use of frames and in-line links did not c<strong>on</strong>stitute a “display” of <strong>the</strong> full size imagesstored <strong>on</strong> and served by infringing third party web sited, but Google did “display” <strong>the</strong> thumbnailsof Perfect 10’s copyrighted images because it created, stored, and served those thumbnails <strong>on</strong> itsown servers. 301On appeal, <strong>the</strong> Ninth Circuit agreed with <strong>the</strong> district court that <strong>the</strong> “server” test should beused to determine which entity displays an image <strong>on</strong> <strong>the</strong> web, c<strong>on</strong>cluding that <strong>the</strong> test wasc<strong>on</strong>sistent with <strong>the</strong> statutory language of <strong>the</strong> copyright statute. Under that test, Perfect 10 hadmade a prima facie case that Google’s communicati<strong>on</strong> of its stored thumbnail images directlyinfringed Perfect 10’s display rights. However, Google had not publicly displayed a copy of <strong>the</strong>full size infringing images when it framed in-line linked images that appeared <strong>on</strong> a user’scomputer screen. 302 The Ninth Circuit found that Google’s activities with respect to <strong>the</strong> full sizeimages did not meet <strong>the</strong> statutory definiti<strong>on</strong> of public display “because Google transmits orcommunicates <strong>on</strong>ly an address which directs a user’s browser to <strong>the</strong> locati<strong>on</strong> where a copy of <strong>the</strong>full-size image is displayed. Google does not communicate a display of <strong>the</strong> work itself.” 303 Thecourt also ruled that, because Google’s cache merely stored <strong>the</strong> text of web pages, and not <strong>the</strong>images <strong>the</strong>mselves, Google was not infringing <strong>the</strong> display right by virtue of its cache. 304Fair Use. The district court evaluated Google’s asserti<strong>on</strong> of <strong>the</strong> fair use defense to <strong>the</strong>display of <strong>the</strong> thumbnails. With respect to <strong>the</strong> first fair use factor, <strong>the</strong> purpose and character of<strong>the</strong> use, <strong>the</strong> court found that Google’s display of <strong>the</strong> thumbnails was a commercial use, sinceGoogle derived significant commercial benefit from Google Image Search in <strong>the</strong> form of300301302303304Id. at 843-44.Id. at 844.Perfect 10 v. Amaz<strong>on</strong>.com, Inc., 508 F.3d 1146, 1159-60 (9 th Cir. 2007).Id. at 1161 n.7.Id. at 1162.- 79 -


increased user traffic and, in turn, increased advertising revenue. The court distinguished <strong>the</strong>Ninth Circuit’s decisi<strong>on</strong> in <strong>the</strong> Kelly v. Arriba Soft case by noting that, unlike Arriba Soft,Google derived direct commercial benefit from <strong>the</strong> display of thumbnails through its “AdSense”program, under which third party web sites could place code <strong>on</strong> <strong>the</strong>ir sites to request Google’sserver to algorithmically select relevant advertisements for display based <strong>on</strong> <strong>the</strong> c<strong>on</strong>tent of <strong>the</strong>site, and <strong>the</strong>n share revenue flowing from <strong>the</strong> advertising displays and click-throughs. If thirdparty web sites participating in <strong>the</strong> AdSense program c<strong>on</strong>tained infringing copies of Perfect 10photographs, Google would serve ads <strong>on</strong> those sites and split <strong>the</strong> revenue generated from userswho clicked <strong>on</strong> <strong>the</strong> Google-served ads. 305 Accordingly, <strong>the</strong> court c<strong>on</strong>cluded that “AdSenseunquesti<strong>on</strong>ably makes Google’s use of thumbnails <strong>on</strong> its image search far more commercial thanArriba’s use in Kelly II. Google’ thumbnails lead users to sites that directly benefit Google’sbottom line.” 306Relying <strong>on</strong> <strong>the</strong> Kelly v. Ariba Soft decisi<strong>on</strong>, <strong>the</strong> court c<strong>on</strong>cluded that <strong>the</strong> use of <strong>the</strong>thumbnails was transformative because <strong>the</strong>ir creati<strong>on</strong> and display enabled <strong>the</strong> display of visualsearch results quickly and efficiently, and did not supersede Perfect 10’s us of <strong>the</strong> full sizeimages. But <strong>the</strong> court noted that <strong>the</strong> transformative nature of <strong>the</strong> thumbnail use did not end <strong>the</strong>analysis, because <strong>the</strong> use was also “c<strong>on</strong>sumptive.” In particular, <strong>the</strong> court noted that after it filedsuit against Google, Perfect 10 entered into a licensing agreement with a third party for <strong>the</strong> saleand distributi<strong>on</strong> of Perfect 10 reduced-size images for download to and use <strong>on</strong> cell ph<strong>on</strong>es. 307“Google’s use of thumbnails does supersede this use of P10’s images, because mobile users candownload and save <strong>the</strong> thumbnails displayed by Google Image Search <strong>on</strong>to <strong>the</strong>ir ph<strong>on</strong>es.” 308 Onbalance, <strong>the</strong>n, <strong>the</strong> court c<strong>on</strong>cluded that, because Google’s use of thumbnails was morecommercial than Arriba Soft’s and because it was c<strong>on</strong>sumptive with respect to Perfect 10’sreduced-size images, <strong>the</strong> first factor weighed “slightly in favor” of Perfect 10. 309The district court ruled that <strong>the</strong> sec<strong>on</strong>d fair use factor, <strong>the</strong> nature of <strong>the</strong> copyrighted work,weighed “<strong>on</strong>ly slightly in favor” of Perfect 10 because, although its photographs were creative,as in <strong>the</strong> case of <strong>the</strong> Kelly v. Arriba Soft case, <strong>the</strong>y had appeared <strong>on</strong> <strong>the</strong> <strong>Internet</strong> before use inGoogle’s search engine. 310 The court found that <strong>the</strong> third factor, <strong>the</strong> amount and substantiality of<strong>the</strong> porti<strong>on</strong> used, favored nei<strong>the</strong>r party because Google’s use of <strong>the</strong> copies of Perfect 10’s images305306307308309310Perfect 10 v. Google, 416 F. Supp. 2d 828, 834, 846-47 (C.D. Cal. 2006), aff’d sub nom. Perfect 10 v.Amaz<strong>on</strong>.com, Inc., 508 F.3d 1146, 1169 (9 th Cir. 2007).Id. at 846. Google counterargued that its AdSense program policies prohibited a web site from registering as anAdSense partner if <strong>the</strong> site’s web pages c<strong>on</strong>tained images that appeared in Google Image Search results. Thecourt noted, however, that Google had not presented any informati<strong>on</strong> regarding <strong>the</strong> extent to which <strong>the</strong>purported policy was enforced nor had it provided examples of AdSense partners who were terminated becauseof violati<strong>on</strong>s of <strong>the</strong> policy. In c<strong>on</strong>trast, Perfect 10 submitted numerous screenshots of third party web sites thatserved infringing c<strong>on</strong>tent and also appeared to be receiving and displaying AdSense ads from Google. Id. at846-47.Id. at 847-49.Id. at 849.Id.Id. at 849-50.- 80 -


was no greater than necessary to achieve <strong>the</strong> objective of providing effective image searchcapabilities. 311 Finally, <strong>the</strong> court found that <strong>the</strong> fourth factor, <strong>the</strong> effect of <strong>the</strong> use up<strong>on</strong> <strong>the</strong>potential market for and value of <strong>the</strong> copyrighted work, weighed slightly in Perfect 10’s favorbecause of <strong>the</strong> court’s finding that Google’s use of thumbnails likely would harm <strong>the</strong> potentialmarket for <strong>the</strong> downloading of Perfect 10’s reduced-size images <strong>on</strong>to cell ph<strong>on</strong>es. On balance,<strong>the</strong>n, <strong>the</strong> court found that <strong>the</strong> fair use doctrine likely would not cover Google’s use of <strong>the</strong>thumbnails. 312On appeal, <strong>the</strong> Ninth Circuit reached <strong>the</strong> opposite c<strong>on</strong>clusi<strong>on</strong> under <strong>the</strong> fair use doctrine.Before beginning its specific analysis of <strong>the</strong> four fair use factors, <strong>the</strong> Ninth Circuit made someimportant preliminary rulings c<strong>on</strong>cerning <strong>the</strong> burden of proof with respect to <strong>the</strong> fair usedoctrine. The district court had ruled that, because Perfect 10 had <strong>the</strong> burden of showing alikelihood of success <strong>on</strong> <strong>the</strong> merits, it also had <strong>the</strong> burden of dem<strong>on</strong>strating a likelihood ofovercoming Google’s fair use defense. The Ninth Circuit held <strong>the</strong> district court’s ruling <strong>on</strong> thispoint to be err<strong>on</strong>eous. Citing cases from <strong>the</strong> Supreme Court and <strong>the</strong> Federal Circuit holding that<strong>the</strong> burdens at <strong>the</strong> preliminary injuncti<strong>on</strong> stage track <strong>the</strong> burdens at trial, <strong>the</strong> Ninth Circuit ruledthat, <strong>on</strong>ce Perfect 10 had shown a likelihood of success <strong>on</strong> <strong>the</strong> merits, <strong>the</strong> burden shifted toGoogle to show a likelihood that its affirmative defenses – including that of fair use – wouldsucceed. 313The Ninth Circuit’s analysis of <strong>the</strong> fair use factors is significant in its recogniti<strong>on</strong> of <strong>the</strong>need, when judging <strong>the</strong> transformative nature of <strong>the</strong> use, to balance <strong>the</strong> public benefit from <strong>the</strong>use against <strong>the</strong> potential harm to <strong>the</strong> rights holder from superseding commercial uses, as well asin its requirement of a showing that alleged potential superseding commercial uses are both realand significant in <strong>the</strong>ir impact. Specifically, with respect to <strong>the</strong> first factor, <strong>the</strong> Ninth Circuit,citing <strong>the</strong> Kelly v. Arriba Soft case, noted that Google’s use of <strong>the</strong> thumbnails was highlytransformative because its search engine transformed each image into a pointer directing a user311312313Id. at 850.Id. at 850-51.Perfect 10 v. Amaz<strong>on</strong>.com, Inc., 508 F.3d 1146, 1158 (9 th Cir. 2007). This holding was <strong>the</strong> opposite of <strong>on</strong>e <strong>the</strong>Ninth Circuit had reached in an earlier issued opini<strong>on</strong> in <strong>the</strong> appeal, which <strong>the</strong> instant opini<strong>on</strong> replaced. In <strong>the</strong>earlier opini<strong>on</strong>, <strong>the</strong> Ninth Circuit had c<strong>on</strong>cluded that, because a plaintiff has <strong>the</strong> burden of showing a likelihoodof success <strong>on</strong> <strong>the</strong> merits in order to obtain a preliminary injuncti<strong>on</strong>, <strong>the</strong> plaintiff should also have <strong>the</strong> burden ofdem<strong>on</strong>strating a likelihood of overcoming <strong>the</strong> defendant’s fair use defense. However, because <strong>the</strong> defendant inan infringement acti<strong>on</strong> has <strong>the</strong> burden of proving fair use, <strong>the</strong> Ninth Circuit had ruled in its earlier opini<strong>on</strong> that<strong>the</strong> defendant is resp<strong>on</strong>sible for introducing evidence of fair use in <strong>the</strong> first instance in resp<strong>on</strong>ding to a moti<strong>on</strong>for preliminary relief, whereup<strong>on</strong> <strong>the</strong> burden would <strong>the</strong>n shift to <strong>the</strong> plaintiff to dem<strong>on</strong>strate that it willovercome <strong>the</strong> fair use defense. Perfect 10 v. Amaz<strong>on</strong>.com, Inc., 487 F.3d 701, 714 (9 th Cir. 2007) (supersededby 508 F.3d 1146 (9 th Cir. 2007)). The court fur<strong>the</strong>r elaborated its rati<strong>on</strong>ale in <strong>the</strong> earlier opini<strong>on</strong> as follows:“In order to dem<strong>on</strong>strate its likely success <strong>on</strong> <strong>the</strong> merits, <strong>the</strong> moving party must necessarily dem<strong>on</strong>strate it willovercome defenses raised by <strong>the</strong> n<strong>on</strong>-moving party. This burden is correctly placed <strong>on</strong> <strong>the</strong> party seeking todem<strong>on</strong>strate entitlement to <strong>the</strong> extraordinary remedy of a preliminary injuncti<strong>on</strong> at an early stage of <strong>the</strong>litigati<strong>on</strong>, before <strong>the</strong> defendant has had <strong>the</strong> opportunity to undertake extensive discovery or develop itsdefenses.” 487 F.3d at 714. The Ninth Circuit apparently c<strong>on</strong>cluded that this earlier holding was inc<strong>on</strong>sistentwith established precedent that <strong>the</strong> burdens at <strong>the</strong> preliminary injuncti<strong>on</strong> stage track <strong>the</strong> burdens at trial, leading<strong>the</strong> court to issue a revised opini<strong>on</strong>.- 81 -


to a source of informati<strong>on</strong>. 314 In additi<strong>on</strong>, “a search engine provides social benefit byincorporating an original work into a new work, namely, an electr<strong>on</strong>ic reference tool.” 315In a significant ruling, <strong>the</strong> Ninth Circuit disagreed, <strong>on</strong> two grounds, with <strong>the</strong> districtcourt’s c<strong>on</strong>clusi<strong>on</strong> that Google’s use of thumbnail images was less transformative than <strong>the</strong> videosearch engine at issue in Kelly v. Arriba Soft because Google’s use of thumbnails supersededPerfect 10’s right to sell its reduced-size images for use <strong>on</strong> cell ph<strong>on</strong>es. First, <strong>the</strong> Ninth Circuitnoted that <strong>the</strong> alleged superseding use was not significant at <strong>the</strong> present time, because <strong>the</strong> districtcourt had not found that any downloads of Perfect 10’s photos for mobile ph<strong>on</strong>e use had actuallytaken place. 316 Sec<strong>on</strong>d, <strong>the</strong> court c<strong>on</strong>cluded “that <strong>the</strong> significantly transformative nature ofGoogle’s search engine, particularly in light of its public benefit, outweighs Google’ssuperseding and commercial uses of <strong>the</strong> thumbnails in this case.” 317 Accordingly, <strong>the</strong> first fairuse factor weighed in favor of Google.The Ninth Circuit found that <strong>the</strong> district court had correctly analyzed <strong>the</strong> sec<strong>on</strong>d and thirdfactors. 318 With respect to <strong>the</strong> fourth factor, Perfect 10 challenged <strong>the</strong> district court’s finding ofno harm to <strong>the</strong> market for <strong>the</strong> full sized images <strong>on</strong> <strong>the</strong> ground that likelihood of market harm maybe presumed if <strong>the</strong> intended use of an image is for commercial gain. The court noted, however,that this presumpti<strong>on</strong> does not arise when a work is transformative because market substituti<strong>on</strong> isless certain. Because Google’s use of thumbnails for search engine purposes was highlytransformative and market harm could <strong>the</strong>refore not be presumed, and because Perfect 10 had notintroduced evidence that Google’s thumbnails would harm its existing or potential market forfull size images, <strong>the</strong> Ninth Circuit rejected Perfect 10’s argument. 319With respect to harm to Perfect 10’s alleged market for reduced size images, <strong>the</strong> NinthCircuit noted that <strong>the</strong> district court did not make a finding that Google users had actuallydownloaded thumbnail images for cell ph<strong>on</strong>e use, so any potential harm to that alleged marketremained hypo<strong>the</strong>tical. Accordingly, <strong>the</strong> court c<strong>on</strong>cluded that <strong>the</strong> fourth factor favored nei<strong>the</strong>rparty. 320 Balancing <strong>the</strong> four factors, and particularly weighing Google’s highly transformativeuse and its public benefit against <strong>the</strong> unproven use of thumbnails for cell ph<strong>on</strong>e downloads, <strong>the</strong>314315316317318319320508 F.3d at 1165.Id. The Ninth Circuit rejected Perfect 10’s argument that providing access to infringing web sites cannot bedeemed transformative and is inherently not fair use. The court noted that Google was operating acomprehensive search engine that <strong>on</strong>ly incidentally indexed infringing web sites. “This incidental impact doesnot amount to an abuse of <strong>the</strong> good faith and fair dealing underpinnings of <strong>the</strong> fair use doctrine. Accordingly,we c<strong>on</strong>clude that Google’s inclusi<strong>on</strong> of thumbnail images derived from infringing websites in its <strong>Internet</strong>-widesearch engine activities does not preclude Google from raising a fair use defense.” Id. at 1164 n.8.Id. at 1166.Id.Id. at 1167-68Id. at 1168.Id.- 82 -


court c<strong>on</strong>cluded that Google’s use of Perfect 10’s thumbnails was a fair use. Accordingly, <strong>the</strong>court vacated <strong>the</strong> preliminary injuncti<strong>on</strong> regarding Google’s use of thumbnail images. 321C<strong>on</strong>tributory Infringement. Perfect 10 argued to <strong>the</strong> district court that Google wasc<strong>on</strong>tributing to <strong>the</strong> infringement of two direct infringers – third party web sites hosting andserving infringing copies of Perfect 10 photographs, and Google Image Search usersdownloading such images. The district court ruled as a preliminary matter that Perfect 10 couldnot base its c<strong>on</strong>tributory infringement claim <strong>on</strong> users’ acti<strong>on</strong>s, because Perfect 10 haddem<strong>on</strong>strated <strong>on</strong>ly that users of Google search were capable of directly infringing bydownloading <strong>the</strong> images, but had not submitted sufficient evidence showing <strong>the</strong> extent to whichusers were in fact downloading Perfect 10’s images through Google Image Search. Thus, <strong>the</strong>c<strong>on</strong>tributory infringement claim had to be based <strong>on</strong> knowledge and material c<strong>on</strong>tributi<strong>on</strong> byGoogle to <strong>the</strong> infringing activities of third party web sites hosting Perfect 10’s images. 322With respect to <strong>the</strong> knowledge pr<strong>on</strong>g, <strong>the</strong> district court, citing <strong>the</strong> Supreme Court’sGrokster case, noted that ei<strong>the</strong>r actual or c<strong>on</strong>structive knowledge is sufficient for c<strong>on</strong>tributoryliability. The court rejected Perfect 10’s argument that Google had actual knowledge from <strong>the</strong>presence of copyright notices <strong>on</strong> Perfect 10’s images or from <strong>the</strong> fact that Google’s AdSensepolicy stated that it m<strong>on</strong>itored <strong>the</strong> c<strong>on</strong>tent of allegedly infringing sites. The court noted thatGoogle would not necessarily know that any given image <strong>on</strong> <strong>the</strong> <strong>Internet</strong> was infringingsome<strong>on</strong>e’s copyright merely because <strong>the</strong> image c<strong>on</strong>tained a copyright notice. With respect to <strong>the</strong>alleged m<strong>on</strong>itoring by Google, Google had changed its AdSense policy to remove <strong>the</strong> languagereserving to Google <strong>the</strong> right to m<strong>on</strong>itor its AdSense partners. The court fur<strong>the</strong>r noted that, inany event, merely because Google may have reserved <strong>the</strong> right to m<strong>on</strong>itor its AdSense partnersdid not mean that it could <strong>the</strong>reby discern whe<strong>the</strong>r <strong>the</strong> images served by those web sites weresubject to copyright. 323The district court <strong>the</strong>n turned to an analysis of whe<strong>the</strong>r numerous notices of infringementsent by Perfect 10 to Google were sufficient to give Google actual knowledge of infringingactivity. Google challenged <strong>the</strong> adequacy of those notices <strong>on</strong> <strong>the</strong> grounds that <strong>the</strong>y frequentlydid not describe in sufficient detail <strong>the</strong> specific URL of an infringing image and frequently didnot identify <strong>the</strong> underlying copyrighted work. Some notices listed entire web sites as infringing,or entire directories within a web site. Google claimed that despite <strong>the</strong>se shortcomings, itpromptly processed all of <strong>the</strong> notices it received, suppressing links to specific web pages that itcould c<strong>on</strong>firm displayed infringing Perfect 10 copies. The court c<strong>on</strong>cluded, however, that itneed not resolve <strong>the</strong> questi<strong>on</strong> of whe<strong>the</strong>r Google had adequate actual knowledge of infringement,321322323Id. In a side, but significant, issue, Google argued that <strong>the</strong> Ninth Circuit lacked jurisdicti<strong>on</strong> over <strong>the</strong>preliminary injuncti<strong>on</strong> to <strong>the</strong> extent it enforced unregistered copyrights. The court rejected this argument:“Once a court has jurisdicti<strong>on</strong> over an acti<strong>on</strong> for copyright infringement under secti<strong>on</strong> 411 [of <strong>the</strong> copyrightstatute], <strong>the</strong> court may grant injunctive relief to restrain infringement of any copyright, whe<strong>the</strong>r registered orunregistered.” Id. at 1154 n.1.Perfect 10 v. Google, 416 F. Supp. 2d 828, 851-52 (C.D. Cal. 2006), aff’d sub nom. Perfect 10 v. Amaz<strong>on</strong>.com,Inc., 508 F.3d 1146, 1169 (9 th Cir. 2007).Id. at 853-54.- 83 -


in view of <strong>the</strong> court’s c<strong>on</strong>clusi<strong>on</strong> that Google had not materially c<strong>on</strong>tributed to <strong>the</strong> infringingactivity of third party web sites. 324The district court articulated <strong>the</strong> following grounds for its finding that Perfect 10 had notadequately met its burden to show that Google sufficiently c<strong>on</strong>tributed to <strong>the</strong> infringing activityfor c<strong>on</strong>tributory liability. First, <strong>the</strong> court set forth numerous differences between Google’sactivity and <strong>the</strong> activity that had been found to materially c<strong>on</strong>tribute to infringement in <strong>the</strong>Napster cases. For example, unlike in <strong>the</strong> case of <strong>the</strong> Napster system, in <strong>the</strong> instant case <strong>the</strong>infringing third party web sites existed, were publicly accessible, and engaged in <strong>the</strong> infringingactivity irrespective of <strong>the</strong>ir inclusi<strong>on</strong> or exclusi<strong>on</strong> from Google’s index. Unlike Napster,Google did not provide <strong>the</strong> means of establishing c<strong>on</strong>necti<strong>on</strong>s between users’ computers tofacilitate <strong>the</strong> downloading of <strong>the</strong> infringing material. Even absent Google, third party web siteswould c<strong>on</strong>tinue to exist and would c<strong>on</strong>tinue to display infringing c<strong>on</strong>tent (an observati<strong>on</strong> whichwould seem true of all search engines). And unlike Napter, Google did not boast about howusers could easily download infringing c<strong>on</strong>tent, nor did it facilitate <strong>the</strong> transfer of files stored <strong>on</strong>users’ o<strong>the</strong>rwise private computers. 325In sum, <strong>the</strong> district court found that Perfect 10 had overstated Google’s actual c<strong>on</strong>ductand c<strong>on</strong>fused <strong>the</strong> mere provisi<strong>on</strong> of search technology with active encouragement and promoti<strong>on</strong>of infringing activity. The court also rejected Perfect 10’s argument based <strong>on</strong> <strong>the</strong> SupremeCourt’s Grokster case that Google had materially c<strong>on</strong>tributed to <strong>the</strong> infringing activity byproviding through AdSense a revenue stream to <strong>the</strong> infringing web sites. The court held that,although <strong>the</strong> AdSense program might provide some level of additi<strong>on</strong>al revenue to <strong>the</strong> infringingweb sites, Perfect 10 had not presented any evidence establishing what that revenue was, muchless that it was material, ei<strong>the</strong>r in its own right or relative to those web sites’ total income.Accordingly, <strong>the</strong> court ruled that Perfect 10 was not likely to prevail <strong>on</strong> its claim for c<strong>on</strong>tributoryliability. 326In an important ruling <strong>on</strong> appeal, 327 <strong>the</strong> Ninth Circuit reversed and remanded for factualfindings under a specialized test for c<strong>on</strong>tributory infringement for computer system operators.The Ninth Circuit began its analysis by examining <strong>the</strong> issue of whe<strong>the</strong>r Perfect 10 hadadequately proved direct infringements to which Google could potentially c<strong>on</strong>tribute. Perfect 10alleged that three parties directly infringed its images – third party web sites that copied,displayed and distributed unauthorized Perfect 10 images, individual users of Google’s searchengine who stored full size Perfect 10 images <strong>on</strong> <strong>the</strong>ir computers, and users who linked toinfringing web sites, <strong>the</strong>reby automatically making cache copies of full size images in <strong>the</strong>ircomputers. Google did not dispute that third party web sites directly infringed Perfect 10’scopyrights by copying, displaying and distributing unauthorized copies of Perfect 10 images. 328324325326327328Id. at 854.Id.Id. at 855-56.Perfect 10 v. Amaz<strong>on</strong>.com, Inc., 508 F.3d 1146 (9 th Cir. 2007).Id. at 1169.- 84 -


The Ninth Circuit agreed, however, with <strong>the</strong> district court that Perfect 10 failed toprovide any evidence directly establishing that users of Google’s search engine had storedinfringing images <strong>on</strong> <strong>the</strong>ir computers. Finally, <strong>the</strong> Ninth Circuit agreed with <strong>the</strong> district courtthat any cache copies of full size images made by users who linked to infringing web sites were afair use. The copying performed automatically by a user’s computer to assist in accessing <strong>the</strong><strong>Internet</strong> was a transformative use and did not supersede <strong>the</strong> copyright holder’s exploitati<strong>on</strong> of <strong>the</strong>work. 329 “Such automatic background copying has no more than a minimal effect <strong>on</strong> Perfect10’s rights, but a c<strong>on</strong>siderable public benefit.” 330 Accordingly, <strong>the</strong> Ninth Circuit assessedGoogle’s sec<strong>on</strong>dary liability based solely with respect to activities of third party web sites thatreproduced, displayed, and distributed unauthorized copies of Perfect 10’s images <strong>on</strong> <strong>the</strong><strong>Internet</strong>. 331Turning to whe<strong>the</strong>r Google could be sec<strong>on</strong>darily liable for <strong>the</strong> infringing acts of thosethird party web sites, <strong>the</strong> Ninth Circuit first noted that under <strong>the</strong> S<strong>on</strong>y doctrine, Google could notbe held liable for c<strong>on</strong>tributory infringement based solely <strong>on</strong> <strong>the</strong> fact that <strong>the</strong> design of its searchengine facilitated such infringement. Nor, under footnote 12 of <strong>the</strong> Supreme Court’s Groksterdecisi<strong>on</strong>, could Google be held liable solely because it did not develop technology that wouldenable its search engine to automatically avoid infringing images. 332The Ninth Circuit next held that Google could not be liable under <strong>the</strong> Supreme Court’sinducement test in Grokster, because Google had not promoted <strong>the</strong> use of its search enginespecifically to infringe copyrights. 333 In reaching this result, however, <strong>the</strong> Ninth Circuit appearsto have put a gloss <strong>on</strong> <strong>the</strong> Supreme Court’s test for inducement liability, for in additi<strong>on</strong> to notingthat inducement liability could result from intenti<strong>on</strong>ally encouraging infringement throughspecific acts, <strong>the</strong> Ninth Circuit stated that intent could be imputed “if <strong>the</strong> actor knowingly takessteps that are substantially certain to result in … direct infringement.” 334Finally, turning to whe<strong>the</strong>r Google could have sec<strong>on</strong>dary liability under <strong>the</strong> traditi<strong>on</strong>alcomm<strong>on</strong> law doctrine of c<strong>on</strong>tributory liability, <strong>the</strong> Ninth Circuit, citing its Napster decisi<strong>on</strong>s,noted that it had “fur<strong>the</strong>r refined this test in <strong>the</strong> c<strong>on</strong>text of cyberspace to determine whenc<strong>on</strong>tributory liability can be imposed <strong>on</strong> a provider of <strong>Internet</strong> access or services.” 335 The NinthCircuit noted that under both Napster and Netcom, a service provider’s knowing failure toprevent infringing acti<strong>on</strong>s could be <strong>the</strong> basis for imposing c<strong>on</strong>tributory liability, because undersuch circumstances, <strong>the</strong> intent required under <strong>the</strong> Supreme Court’s Grokster decisi<strong>on</strong> may beimputed. Accordingly, <strong>the</strong> Ninth Circuit articulated <strong>the</strong> following test for c<strong>on</strong>tributory liabilityin <strong>the</strong> c<strong>on</strong>text of cyberspace:329330331332333334335Id.Id.Id. at 1170.Id.Id. at 1171 n.11.Id. at 1171.Id.- 85 -


[W]e hold that a computer system operator can be held c<strong>on</strong>tributorily liable if it“has actual knowledge that specific infringing material is available using itssystem,” Napster, 239 F.3d at 1002, and can “take simple measures to preventfur<strong>the</strong>r damage” to copyrighted works, Netcom, 907 F. Supp. At 1375, yetc<strong>on</strong>tinues to provide access to infringing works. 336This articulated test leaves open at least <strong>the</strong> following questi<strong>on</strong>s, with respect to which<strong>the</strong> Ninth Circuit’s decisi<strong>on</strong> gives little guidance:-- Is this <strong>the</strong> exclusive test for c<strong>on</strong>tributory infringement in “<strong>the</strong> c<strong>on</strong>text of cyberspace”?-- What are <strong>the</strong> boundaries of “<strong>the</strong> c<strong>on</strong>text of cyberspace” within which this test willapply?-- Does <strong>the</strong> reference to “actual” knowledge preclude sec<strong>on</strong>dary liability <strong>on</strong> <strong>the</strong>alternative traditi<strong>on</strong>al comm<strong>on</strong> law formulati<strong>on</strong> of “reas<strong>on</strong> to know” in <strong>the</strong> c<strong>on</strong>text ofcyberspace?-- Do “simple measures” extend <strong>on</strong>ly to taking down specific infringing material, or topreventing its recurrence also?Applying this specialized test, <strong>the</strong> Ninth Circuit ruled that <strong>the</strong> district court had erred inc<strong>on</strong>cluding that, even if Google had actual knowledge of infringing material available <strong>on</strong> itssystem, it did not materially c<strong>on</strong>tribute to infringing c<strong>on</strong>duct because it did not undertake anysubstantial promoti<strong>on</strong>al or advertising efforts to encourage visits to infringe web sites, notprovide a significant revenue stream to <strong>the</strong> infringing web sites. 337 The Ninth Circuit stated:There is no dispute that Google substantially assists websites to distribute <strong>the</strong>irinfringing copies to a worldwide market and assists a worldwide audience ofusers to access infringing materials. We cannot discount <strong>the</strong> effect of such aservice <strong>on</strong> copyright owners, even though Google’s assistance is available to allwebsites, not just infringing <strong>on</strong>es. Applying our test, Google could be heldc<strong>on</strong>tributorily liable if it had knowledge that infringing Perfect 10 images wereavailable using its search engine, could take simple measures to prevent fur<strong>the</strong>rdamage to Perfect 10’s copyrighted works, and failed to take such steps. 338Noting that <strong>the</strong>re were factual disputes over whe<strong>the</strong>r <strong>the</strong>re are “reas<strong>on</strong>able and feasiblemeans” for Google to refrain from providing access to infringing images, <strong>the</strong> Ninth Circuitremanded <strong>the</strong> c<strong>on</strong>tributory infringement claim for fur<strong>the</strong>r c<strong>on</strong>siderati<strong>on</strong> of whe<strong>the</strong>r Perfect 10336337338Id. at 1172 (emphasis in original).Id.Id.- 86 -


would likely succeed in establishing that Google was c<strong>on</strong>tributorily liable for in-line linking tofull size infringing images under <strong>the</strong> test <strong>the</strong> court had enunciated. 339Similarly, <strong>the</strong> Ninth Circuit remanded for fur<strong>the</strong>r proceedings <strong>on</strong> whe<strong>the</strong>r Amaz<strong>on</strong>.com,which Perfect 10 had also sued based <strong>on</strong> its offering of <strong>the</strong> A9.com search engine, should be heldc<strong>on</strong>tributorily liable. “It is disputed whe<strong>the</strong>r <strong>the</strong> notices gave Amaz<strong>on</strong>.com actual knowledge ofspecific infringing activities available using its system, and whe<strong>the</strong>r Amaz<strong>on</strong>.com could havetaken reas<strong>on</strong>able and feasible steps to refrain from providing access to such images, but failed todo so.” 340Vicarious Liability. Perfect 10 also asserted claims against Google for vicarious liability.With respect to <strong>the</strong> financial benefit pr<strong>on</strong>g, <strong>the</strong> district court found that Google obtained a directfinancial benefit from <strong>the</strong> infringing activity through its AdSense revenues under <strong>the</strong> standardarticulated in <strong>the</strong> Ninth Circuit’s F<strong>on</strong>ovisa decisi<strong>on</strong>, 341 in which it held that <strong>the</strong> financial benefitpr<strong>on</strong>g can be satisfied where <strong>the</strong> availability of infringing material acts as a “draw” forcustomers to <strong>the</strong> site. Under that standard, <strong>the</strong> district court found it likely that at least someusers were drawn to Google Image Search because <strong>the</strong>y knew that copies of Perfect 10’s photoscould be viewed for free, and Google derived a direct financial benefit when users visitedAdSense partners’ web sites that c<strong>on</strong>tained such infringing photos. 342Notwithstanding <strong>the</strong> financial benefit to Google, however, <strong>the</strong> district court found thatGoogle had insufficient c<strong>on</strong>trol over <strong>the</strong> infringing activity to impose vicarious liability because<strong>the</strong> Web is an open system. “Google does not exercise c<strong>on</strong>trol over <strong>the</strong> envir<strong>on</strong>ment in which itoperates – i.e., <strong>the</strong> web. Google’s ability to remove a link from its search index does not render<strong>the</strong> linked-to site inaccessible. The site remains accessible both directly and indirectly (i.e., viao<strong>the</strong>r search engines, as well as via <strong>the</strong> mesh of websites that link to it). If <strong>the</strong> phrase ‘right andability to c<strong>on</strong>trol’ means having substantial input into or authority over <strong>the</strong> decisi<strong>on</strong> to serve orc<strong>on</strong>tinue serving infringing c<strong>on</strong>tent, Google lacks such right or ability.” 343 Moreover, Google’ssoftware lacked <strong>the</strong> ability to analyze every image <strong>on</strong> <strong>the</strong> <strong>Internet</strong>, compare each image to allo<strong>the</strong>r copyrighted images that existed in <strong>the</strong> world, or even to that much smaller subset of imagesthat had been submitted to Google by copyright owners such as Perfect 10, and determinewhe<strong>the</strong>r a certain image <strong>on</strong> <strong>the</strong> web infringed some<strong>on</strong>e’s copyright. 344 Finally, <strong>the</strong> court ruledthat <strong>the</strong> “right and ability to c<strong>on</strong>trol” pr<strong>on</strong>g required more than Google’s reservati<strong>on</strong> in itsAdSense policy of <strong>the</strong> right to m<strong>on</strong>itor and terminate partnerships with entities that violatedo<strong>the</strong>rs’ copyrights. Accordingly, <strong>the</strong> district court held that Perfect 10 had not established alikelihood of proving <strong>the</strong> sec<strong>on</strong>d pr<strong>on</strong>g necessary for vicarious liability. 345339340341342343344345Id.at 1172-73Id. at 1176.F<strong>on</strong>ovisa, Inc. v. Cherry Aucti<strong>on</strong>, Inc., 76 F.3d 259 (9 th Cir. 1996).Perfect 10 v. Google, 416 F. Supp. 2d at 856-57.Id. at 857-58.Id. at 858.Id.- 87 -


Based <strong>on</strong> its various rulings, <strong>the</strong> district court c<strong>on</strong>cluded that it would issue a preliminaryinjuncti<strong>on</strong> against Google prohibiting <strong>the</strong> display of thumbnails of Perfect 10’s images, andordered <strong>the</strong> parties to propose jointly <strong>the</strong> language of such an injuncti<strong>on</strong>. 346On appeal, <strong>the</strong> Ninth Circuit affirmed <strong>the</strong> district court’s ruling that Perfect 10 had notshown a likelihood of establishing Google’s right and ability to stop or limit <strong>the</strong> directlyinfringing c<strong>on</strong>duct of third party web sites. The Ninth Circuit began its analysis by noting that,under Grokster, “a defendant exercises c<strong>on</strong>trol over a direct infringer when he has both a legalright to stop or limit <strong>the</strong> directly infringing c<strong>on</strong>duct, as well as <strong>the</strong> practical ability to do so.” 347With respect to <strong>the</strong> first part of this test, <strong>the</strong> court noted that, unlike in F<strong>on</strong>ovisa where <strong>the</strong> swapmeet operator had c<strong>on</strong>tracts with its vendors giving it <strong>the</strong> right to stop <strong>the</strong> vendors from sellingcounterfeit recordings <strong>on</strong> its premises, Perfect 10 had not shown that Google had c<strong>on</strong>tracts withthird party web sites that empowered Google to stop or limit <strong>the</strong>m from reproducing, displayingand distributing infringing copies of Perfect 10’s images. Although Google had AdSenseagreements with various web sites, an infringing third party web site could c<strong>on</strong>tinue toreproduce, display, and distribute its infringing copies after its participati<strong>on</strong> in <strong>the</strong> AdSenseprogram was ended. 348 And unlike <strong>the</strong> Napster system, in which Napster’s c<strong>on</strong>trol over itsclosed system that required user registrati<strong>on</strong> and enabled Napster to terminate its users’ accountsand block <strong>the</strong>ir access to <strong>the</strong> Napster system, Google could not terminate third party web sitesdistributing infringing photographs or block <strong>the</strong>ir ability to host and serve infringing full sizeimages <strong>on</strong> <strong>the</strong> <strong>Internet</strong>. 349The Ninth Circuit also affirmed <strong>the</strong> district court’s findings that Google lacked <strong>the</strong>practical ability to policy <strong>the</strong> third party web sites’ infringing c<strong>on</strong>duct. “Without imagerecogniti<strong>on</strong>technology, Google lacks <strong>the</strong> practical ability to police <strong>the</strong> infringing activities ofthird-party websites.” 350 Google’s inability to police distinguished it from <strong>the</strong> defendants heldliable in <strong>the</strong> Napster and F<strong>on</strong>ovisa cases. Accordingly, Perfect 10 had failed to establish <strong>the</strong>right and ability to c<strong>on</strong>trol pr<strong>on</strong>g of vicarious liability. 351 Having so c<strong>on</strong>cluded, <strong>the</strong> Ninth Circuitdetermined that it need not reach Perfect 10’s argument that Google received a direct financialbenefit. 352Based <strong>on</strong> its rulings, <strong>the</strong> Ninth Circuit reversed <strong>the</strong> district court’s determinati<strong>on</strong> thatGoogle’s thumbnail versi<strong>on</strong>s of Perfect 10’s images likely c<strong>on</strong>stituted a direct infringement. Italso reversed <strong>the</strong> district court’s c<strong>on</strong>clusi<strong>on</strong> that Perfect 10 was unlikely to succeed <strong>on</strong> <strong>the</strong> merits346347348349350351352Id. at 859.Perfect 10 v. Amaz<strong>on</strong>.com, Inc., 508 F.3d 1146, 1173 (9 th Cir. 2007).Id.Id. at 1174.Id.Id. The Ninth Circuit also stated, without analysis, that it agreed with <strong>the</strong> district court’s c<strong>on</strong>clusi<strong>on</strong> thatAmaz<strong>on</strong>.com did not have <strong>the</strong> right and ability to supervise <strong>the</strong> infringing activity of Google or third parties,and that <strong>the</strong> district court did not clearly err in c<strong>on</strong>cluding that Amaz<strong>on</strong>.com lacked a direct financial interest insuch activities. Id. at 1176.Id. at 1175 n.15.- 88 -


of its sec<strong>on</strong>dary liability claims because <strong>the</strong> district court failed to c<strong>on</strong>sider whe<strong>the</strong>r Google andAmaz<strong>on</strong>.com knew of infringing activities yet failed to take reas<strong>on</strong>able and feasible steps torefrain from providing access to infringing images. Accordingly, <strong>the</strong> Ninth Circuit remanded <strong>the</strong>case to <strong>the</strong> district court for fur<strong>the</strong>r proceedings <strong>on</strong> this point, as well as to c<strong>on</strong>sider whe<strong>the</strong>rGoogle and Amaz<strong>on</strong>.com would qualify for any of <strong>the</strong> safe harbors of <strong>the</strong> DMCA, an issuewhich <strong>the</strong> district court did not c<strong>on</strong>sider because of its rulings. Because <strong>the</strong> district court wouldneed to rec<strong>on</strong>sider <strong>the</strong> appropriate scope of injunctive relief after addressing <strong>the</strong> sec<strong>on</strong>daryliability issues, <strong>the</strong> Ninth Circuit decided that it need not address <strong>the</strong> parties’ dispute overwhe<strong>the</strong>r <strong>the</strong> district court abused its discreti<strong>on</strong> in determining that Perfect 10 satisfied <strong>the</strong>irreparable harm element of a preliminary injuncti<strong>on</strong>. 3535. Healthcare Advocates, Inc. v. Harding, Earley, Follmer & FraileyIn Healthcare Advocates, Inc. v. Harding, Earley, Follmer & Frailey, 354 <strong>the</strong> court ruledthat display of copyrighted images <strong>on</strong> computer m<strong>on</strong>itors within a law office c<strong>on</strong>stituted a publicdisplay, but was permitted under <strong>the</strong> fair use doctrine. Healthcare Advocates had filed a lawsuitalleging that a competitor infringed trademarks and copyrights and misappropriated trade secretsbel<strong>on</strong>ging to Healthcare Advocates. The defendants in that case were represented by <strong>the</strong>boutique IP law firm of Harding, Earley, Follmer & Frailey. To aid in preparing a defense, <strong>on</strong>two occasi<strong>on</strong>s employees of <strong>the</strong> Harding firm accessed screenshots of old versi<strong>on</strong>s of HealthcareAdvocates’ web sites that had been archived by <strong>the</strong> <strong>Internet</strong> Archive’s web site(www.archive.org). The old versi<strong>on</strong>s of <strong>the</strong> web site were accessed through <strong>the</strong> “WaybackMachine,” an informati<strong>on</strong> retrieval system offered to <strong>the</strong> public by <strong>the</strong> <strong>Internet</strong> Archive thatallowed users to request archived screenshots c<strong>on</strong>tained in its archival database. Viewing <strong>the</strong>c<strong>on</strong>tent that Healthcare Advocates had included <strong>on</strong> its public web site in <strong>the</strong> past was very usefulto <strong>the</strong> Harding firm in assessing <strong>the</strong> merits of <strong>the</strong> trademark and trade secret allegati<strong>on</strong>s broughtagainst <strong>the</strong> firm’s clients. The Harding firm printed copies of <strong>the</strong> archived screenshots of interestand used <strong>the</strong> images in <strong>the</strong> litigati<strong>on</strong> against <strong>the</strong>ir clients. Healthcare Advocates <strong>the</strong>n sued <strong>the</strong>Harding firm, alleging that viewing <strong>the</strong> screenshots of <strong>the</strong> old versi<strong>on</strong>s of <strong>the</strong>ir web site <strong>on</strong>computers within <strong>the</strong> firm c<strong>on</strong>stituted an infringing public display, and that printing of copies ofthose screenshots and storing <strong>the</strong>m <strong>on</strong> hard drives at <strong>the</strong> firm also infringed <strong>the</strong> company’scopyrights. 355The court ruled that, “[u]nder <strong>the</strong> expansive definiti<strong>on</strong> of a public display, <strong>the</strong> display ofcopyrighted images <strong>on</strong> computers in an office c<strong>on</strong>stitutes a public display.” 356 The courtc<strong>on</strong>cluded, however, that <strong>the</strong> Harding firm’s display and copying of those images for purposes ofdefending its clients in <strong>the</strong> litigati<strong>on</strong> brought by Healthcare Associates c<strong>on</strong>stituted a fair use.With respect to <strong>the</strong> purpose of <strong>the</strong> use, <strong>the</strong> court noted that <strong>the</strong> images were used to betterunderstand what Healthcare Associates’ complaint, which did not specify what had been353354355356Id. at 1176-77.2007 U.S. Dist. LEXIS 52544 (E.D. Pa. July 20, 2007).Id. at *2-10.Id. at *19.- 89 -


infringed nor have any documents attached to it depicting <strong>the</strong> infringement, was based <strong>on</strong>. 357Only a small group of employees were able to see <strong>the</strong> images within <strong>the</strong> law firm’s office, which<strong>the</strong> court found was “similar to a family circle and its acquaintances.” 358 The purpose of <strong>the</strong>printing was <strong>on</strong>ly to make a record of what had been viewed and for use as supportingdocumentati<strong>on</strong> for <strong>the</strong> defense <strong>the</strong> firm planned to make for its clients. 359 “It would be an absurdresult if an attorney defending a client against charges of trademark and copyright infringementwas not allowed to view and copy publicly available material, especially material that his clientwas alleged to have infringed.” 360The sec<strong>on</strong>d fair use factor weighed in favor of <strong>the</strong> firm because <strong>the</strong> nature of HealthcareAssociates’ web sites was predominantly informati<strong>on</strong>al. The third factor weighed in favor of <strong>the</strong>firm because, although entire images were copied, employees at <strong>the</strong> firm needed to copyeverything <strong>the</strong>y viewed because <strong>the</strong>y were using <strong>the</strong> screenshots to defend <strong>the</strong>ir clients againstcopyright and trademark infringement claims. The firm also had a duty to preserve relevantevidence. Finally, <strong>the</strong> court found that <strong>the</strong> fourth fair use factor also favored <strong>the</strong> firm, because<strong>the</strong> value of Healthcare Associates’ web sites was not affected by <strong>the</strong> Harding’s firm’s use, and<strong>the</strong> images viewed and copied were archived versi<strong>on</strong>s of <strong>the</strong> web site that Healthcare Associatesno l<strong>on</strong>ger utilized, suggesting <strong>the</strong>ir worth was negligible. Accordingly, <strong>the</strong> court held that <strong>the</strong>Harding firm’s use of <strong>the</strong> images obtained through <strong>the</strong> Wayback Machine c<strong>on</strong>stituted a fairuse. 361 6. ICG-<strong>Internet</strong> Commerce Group, Inc. v. WolfIn ICG-<strong>Internet</strong> Commerce Group, Inc. v. Wolf, 362 <strong>the</strong> court held that <strong>the</strong> defendant hadinfringed <strong>the</strong> plaintiff’s copy and public display rights in an adult video by posting <strong>the</strong> video to<strong>the</strong> defendant’s web site. The court also ruled that <strong>the</strong> inserti<strong>on</strong> into <strong>the</strong> plaintiff’s video of aURL link to <strong>the</strong> defendant’s web site c<strong>on</strong>stituted <strong>the</strong> creati<strong>on</strong> of an infringing derivative work. 363D. The Right of Public Distributi<strong>on</strong>Secti<strong>on</strong> 106(3) of <strong>the</strong> copyright statute grants <strong>the</strong> copyright owner <strong>the</strong> exclusive right todistribute copies or ph<strong>on</strong>orecords of <strong>the</strong> copyrighted work to <strong>the</strong> public by sale or o<strong>the</strong>r transfer357358359360361362363Id. at *22-23.Id. at *24. The copyright statute defines a “public” display as <strong>on</strong>e made in a place “where a substantial numberof pers<strong>on</strong>s outside of a normal circle of a family and its social acquaintances is ga<strong>the</strong>red.” 17 U.S.C. § 101.Id. at *24.Id. at *24-25.Id. at *26-29. The court also ruled that <strong>the</strong> firm’s failure to preserve temporary cache files of <strong>the</strong> screenshotsthat were automatically created by <strong>the</strong> computers used by <strong>the</strong> firm’s employees to view <strong>the</strong> images through <strong>the</strong><strong>Internet</strong>, and were also automatically deleted by <strong>the</strong> computers’ operating system, did not c<strong>on</strong>stitute spoliati<strong>on</strong>of evidence. Id. at *30-38.519 F. Supp. 2d 1014 (E.D. Pa. 2007).Id. at 1018.- 90 -


of ownership, or by rental, lease, or lending. Thus, to implicate <strong>the</strong> right of public distributi<strong>on</strong>,three c<strong>on</strong>diti<strong>on</strong>s must obtain: (a) a “copy” must be distributed; (b) <strong>the</strong> distributi<strong>on</strong> must be to <strong>the</strong>“public”; and (c) <strong>the</strong> distributi<strong>on</strong> must be by sale, rental, lease, lending or “o<strong>the</strong>r transfer ofownership.”1. The Requirement of a “Copy”Whe<strong>the</strong>r transmissi<strong>on</strong>s of a work <strong>on</strong> <strong>the</strong> <strong>Internet</strong> implicate <strong>the</strong> public distributi<strong>on</strong> rightturns in <strong>the</strong> first instance <strong>on</strong> whe<strong>the</strong>r <strong>the</strong>re has been a distributi<strong>on</strong> of a “copy” of <strong>the</strong> work. Thebroadcasting and cable industries have traditi<strong>on</strong>ally treated broadcasts and cable transmissi<strong>on</strong>s asnot c<strong>on</strong>stituting distributi<strong>on</strong>s of copies of a work. With respect to <strong>Internet</strong> transmissi<strong>on</strong>s,however, if a complete copy of a work ends up <strong>on</strong> <strong>the</strong> recipient’s computer, it may be easy toc<strong>on</strong>clude that a “copy” has been distributed. Indeed, to remove any doubt from this issue, <strong>the</strong>NII White Paper proposed to include “transmissi<strong>on</strong>” within <strong>the</strong> copyright owner’s right ofdistributi<strong>on</strong>, 364 where transmissi<strong>on</strong> is defined essentially as <strong>the</strong> creati<strong>on</strong> of an electr<strong>on</strong>ic copy in arecipient system. 365It is less clear whe<strong>the</strong>r o<strong>the</strong>r types of transmissi<strong>on</strong>s c<strong>on</strong>stitute distributi<strong>on</strong>s of “copies.”For example, what about an artistic work that is transmitted and simultaneously performed liveat <strong>the</strong> recipient’s end? Although <strong>the</strong> public performance right may be implicated, has <strong>the</strong>re beena distributi<strong>on</strong> of a “copy” that would implicate <strong>the</strong> right of distributi<strong>on</strong>? Should it matterwhe<strong>the</strong>r significant porti<strong>on</strong>s of <strong>the</strong> work are buffered in memory at <strong>the</strong> recipient’s computer?Many of <strong>the</strong>se distincti<strong>on</strong>s could be rendered moot by <strong>the</strong> potentially broader right of“communicati<strong>on</strong> to <strong>the</strong> public” c<strong>on</strong>tained in <strong>the</strong> WIPO treaties discussed below, were that rightever to be expressly adopted in implementing legislati<strong>on</strong> in <strong>the</strong> United States (<strong>the</strong> DMCA doesnot c<strong>on</strong>tain such a right).Even if a “copy” is deemed to have been distributed in <strong>the</strong> course of an <strong>Internet</strong>transmissi<strong>on</strong> of an infringing work, difficult questi<strong>on</strong>s will arise as to who should be treated ashaving made <strong>the</strong> distributi<strong>on</strong> – <strong>the</strong> original poster of <strong>the</strong> unauthorized work, <strong>the</strong> OSP or BBSthrough which <strong>the</strong> work passes, <strong>the</strong> recipient, or some combinati<strong>on</strong> of <strong>the</strong> foregoing? Thus, <strong>the</strong>same issue of voliti<strong>on</strong> arises with respect to <strong>the</strong> distributi<strong>on</strong> right as was discussed above inc<strong>on</strong>necti<strong>on</strong> with <strong>the</strong> reproducti<strong>on</strong> right.(a) Cases Addressing Whe<strong>the</strong>r Mere Posting Is a Distributi<strong>on</strong>Several decisi<strong>on</strong>s have addressed <strong>the</strong> questi<strong>on</strong> of whe<strong>the</strong>r <strong>the</strong> mere posting – i.e., <strong>the</strong>“making available” – of a work <strong>on</strong> a BBS or o<strong>the</strong>r <strong>Internet</strong> site, or in a “shared file” folder withinpeer-to-peer client software, from which it can be downloaded by members of <strong>the</strong> public364365The copyright statute currently defines “transmissi<strong>on</strong>” or “transmit” solely in reference to performances ordisplays of a work. The NII White Paper does not, however, argue for removal of <strong>the</strong> requirement that anoffending distributi<strong>on</strong> be <strong>on</strong>e to <strong>the</strong> “public.” NII White Paper at 213-15.NII White Paper at 213. Appendix 1 of <strong>the</strong> NII White Paper proposes <strong>the</strong> following definiti<strong>on</strong>: “To ‘transmit’a reproducti<strong>on</strong> is to distribute it by any device or process whereby a copy or ph<strong>on</strong>orecord of <strong>the</strong> work is fixedbey<strong>on</strong>d <strong>the</strong> place from which it was sent.” Id. App. 1, at 2.- 91 -


c<strong>on</strong>stitutes a public distributi<strong>on</strong> of <strong>the</strong> work, and have reached quite c<strong>on</strong>trary results, as detailedin <strong>the</strong> next two subsecti<strong>on</strong>s. In additi<strong>on</strong> to those decisi<strong>on</strong>s, several o<strong>the</strong>r decisi<strong>on</strong>s have declinedto reach <strong>the</strong> issue and/or left <strong>the</strong> questi<strong>on</strong> open, often acknowledging <strong>the</strong> existence of c<strong>on</strong>flictingauthority:– In Arista Records LLC v. Greubel, 453 F. Supp. 2d 961 (N.D. Tex. 2006), <strong>the</strong> court,although not deciding <strong>on</strong> a moti<strong>on</strong> to dismiss whe<strong>the</strong>r <strong>the</strong> electr<strong>on</strong>ic transmissi<strong>on</strong> over acomputer network (here, transmissi<strong>on</strong> of copyrighted recordings through a file sharing network)or <strong>the</strong> mere listing of such copyrighted recordings in a directory as available for download, issufficient to violate a copyright owner’s distributi<strong>on</strong> right, <strong>the</strong> court cited numerous decisi<strong>on</strong>s soholding or suggesting that ei<strong>the</strong>r of such acts is sufficient for infringement of <strong>the</strong> distributi<strong>on</strong>right, and c<strong>on</strong>cluded that such decisi<strong>on</strong>s were sufficient to deny <strong>the</strong> defendant’s moti<strong>on</strong> todismiss <strong>the</strong> complaint <strong>on</strong> <strong>the</strong> pleadings. 366 The court stated, “[M]aking copyrighted worksavailable to o<strong>the</strong>r may c<strong>on</strong>stitute infringement by distributi<strong>on</strong> in certain circumstances.” 367– Maverick Recording Co. v. Goldshteyn, 2006 U.S. Dist. LEXIS 52422 at *3 (E.D.N.Y.July 31, 2006) (“[T]he ‘making available’ argument need not be decided here.”).– F<strong>on</strong>ovisa, Inc. v. Alvarez, 2006 U.S. Dist. LEXIS 95559 at *8 (N.D. Tex. July 24,2006) (“This Court is not making a determinati<strong>on</strong> as to whe<strong>the</strong>r ‘making works available’violates <strong>the</strong> right of distributi<strong>on</strong>.”).– Warner Bros. Records, Inc. v. Payne, 2006 U.S. Dist. LEXIS 65765 at *4 (W.D. Tex.July 17, 2006) (declining to “rule out <strong>the</strong> Plaintiffs’ ‘making available’ <strong>the</strong>ory as a possibleground for imposing liability”).– Atlantic Recording Corp. v. Brennan, 2008 U.S. Dist. LEXIS 23801 at *3 (D. C<strong>on</strong>n.Feb. 13, 2008) (denying plaintiffs’ entry of default against defendant, in part, by finding thatdefendant may have a meritorious defense against plaintiffs’ “problematic” make availableargument).– Electra Entertainment Group, Inc. v. Doe, 2008 U.S. Dist. LEXIS 98145 at *8-9(E.D.N.C. Dec. 4, 2008) (court need not decide whe<strong>the</strong>r “making available” a sound recordingover <strong>the</strong> <strong>Internet</strong> c<strong>on</strong>stitutes a distributi<strong>on</strong> because <strong>the</strong> plaintiffs’ complaint sufficiently allegedan actual disseminati<strong>on</strong> of copies of <strong>the</strong> recordings had occurred).– Warner Bros. Records, Inc. v. Doe, 2008 U.S. Dist. LEXIS 98143 at *8-9 (E.D.N.C.Dec. 4, 2008) (same).366367Id. at 967-71.Id. at 969 (emphasis added).- 92 -


(1) Cases Holding That Mere Posting Is a Distributi<strong>on</strong>In Playboy Enterprises, Inc. v. Frena, 368 <strong>the</strong> court, with very little analysis of <strong>the</strong> issue,held a BBS operator liable for infringement of <strong>the</strong> public distributi<strong>on</strong> right for <strong>the</strong> making ofphotographs available through <strong>the</strong> BBS that were downloaded by subscribers, even though <strong>the</strong>defendant claimed he did not make copies of <strong>the</strong> photographs himself. But because <strong>the</strong> BBS wasapparently <strong>on</strong>e devoted to photographs, much of it of adult subject matter, and subscribersroutinely uploaded and downloaded images <strong>the</strong>refrom, <strong>the</strong> court seems to have viewed <strong>the</strong>defendant as a direct participant in <strong>the</strong> distributi<strong>on</strong>s to <strong>the</strong> public that took place through <strong>the</strong>BBS.Similarly, in Playboy Enterprises, Inc. v. Chuckleberry Publishing Inc., 369 <strong>the</strong> court ruledthat uploading copyrighted pictorial images <strong>on</strong>to a computer in Italy which could be accessed byusers in <strong>the</strong> United States c<strong>on</strong>stituted a public distributi<strong>on</strong> in <strong>the</strong> United States. In c<strong>on</strong>trast to <strong>the</strong>Netcom case, <strong>the</strong> court noted that <strong>the</strong> defendant did more than simply provide access to <strong>the</strong><strong>Internet</strong>. Instead, <strong>the</strong> defendant provided services and supplied <strong>the</strong> c<strong>on</strong>tent for those services,which gave users <strong>the</strong> opti<strong>on</strong> to ei<strong>the</strong>r view or download <strong>the</strong> images. By actively solicitingUnited States customers to <strong>the</strong> services, <strong>the</strong> court c<strong>on</strong>cluded that <strong>the</strong> defendant had distributed itsproduct within <strong>the</strong> United States.In Playboy Enterprises, Inc. v. Webbworld, Inc., 370 <strong>the</strong> court held <strong>the</strong> defendants directlyliable for infringing <strong>the</strong> distributi<strong>on</strong> right by making copyrighted images available through awebsite for downloading by subscribers. The court found that, in c<strong>on</strong>trast to <strong>the</strong> Netcom case,<strong>the</strong> defendants took “affirmative steps to cause <strong>the</strong> copies to be made.” 371The court in Marobie-FL, Inc. v. Nati<strong>on</strong>al Associati<strong>on</strong> of Fire Equipment Distributors 372ruled that <strong>the</strong> placement of three files c<strong>on</strong>taining copyrighted clip art <strong>on</strong> <strong>the</strong> Web page of <strong>the</strong>defendant c<strong>on</strong>stituted a direct violati<strong>on</strong> of <strong>the</strong> plaintiff’s distributi<strong>on</strong> right because <strong>the</strong> files wereavailable for downloading by <strong>Internet</strong> users and were transmitted to <strong>Internet</strong> users up<strong>on</strong> request.In all of <strong>the</strong> preceding four cases, it was apparent that actual downloads of completecopies of <strong>the</strong> copyrighted material had taken place, and this fact, coupled with affirmative stepstaken by <strong>the</strong> defendants to promote <strong>the</strong> acts of downloading, seem to have led those courts tofind a violati<strong>on</strong> of <strong>the</strong> distributi<strong>on</strong> right. The more difficult cases of line drawing have arisen in<strong>the</strong> peer-to-peer file sharing cases, many of which are discussed in <strong>the</strong> remainder of thissubsecti<strong>on</strong> and <strong>the</strong> next subsecti<strong>on</strong>, in which <strong>the</strong> defendant often merely makes availablecopyrighted files for sharing (through a “shared file” folder used by <strong>the</strong> peer-to-peer clientsoftware), but does not take additi<strong>on</strong>al affirmative steps to promote <strong>the</strong> downloading of copies ofthose files. In additi<strong>on</strong>, <strong>the</strong>re often is not clear proof in those cases whe<strong>the</strong>r actual downloads368369370371372839 F. Supp. 1552 (M.D. Fla. 1993).939 F. Supp. 1032, 1039 (S.D.N.Y. 1996).45 U.S.P.Q.2d 1641 (N.D. Tex. 1997).Id. at 1647.45 U.S.P.Q.2d 1236 (N.D. Ill. 1997).- 93 -


have taken place from <strong>the</strong> defendant’s particular shared file folder, and if so, to what extent –including whe<strong>the</strong>r complete copies have been downloaded from <strong>the</strong> defendant’s shared filefolder or <strong>on</strong>ly bits and pieces of files, as is <strong>the</strong> inherent nature of <strong>the</strong> peer-to-peer protocolmechanisms.In its decisi<strong>on</strong> in Napster I, <strong>the</strong> Ninth Circuit held, without any discussi<strong>on</strong>, that “Napsterusers who upload files names to <strong>the</strong> search index for o<strong>the</strong>rs to copy violate plaintiff’sdistributi<strong>on</strong> rights.” 373 Although <strong>the</strong> Ninth Circuit’s opini<strong>on</strong> addressed whe<strong>the</strong>r Napster could besec<strong>on</strong>darily liable for <strong>the</strong> infringing acts of its users through <strong>the</strong> system, it did not address <strong>the</strong>questi<strong>on</strong> of whe<strong>the</strong>r Napster itself directly violated <strong>the</strong> plaintiff’s distributi<strong>on</strong> rights bymaintaining its search index. That questi<strong>on</strong> was subsequently adjudicated by <strong>the</strong> district courtin <strong>the</strong> Napster litigati<strong>on</strong>, which answered <strong>the</strong> questi<strong>on</strong> in <strong>the</strong> negative, as discussed in <strong>the</strong> nextsubsecti<strong>on</strong>.In Interscope Records v. Duty, 374 <strong>the</strong> court held that <strong>the</strong> mere placement of copyrightedworks in a share folder c<strong>on</strong>nected to <strong>the</strong> Kazaa peer-to-peer service c<strong>on</strong>stituted a publicdistributi<strong>on</strong> of those works. The court noted that, although “distribute” is not defined in <strong>the</strong>copyright statute, <strong>the</strong> right of distributi<strong>on</strong> is syn<strong>on</strong>ymous with <strong>the</strong> right of publicati<strong>on</strong>, which isdefined to include <strong>the</strong> “offering to distribute copies or ph<strong>on</strong>orecords to a group of pers<strong>on</strong>s forpurposes of fur<strong>the</strong>r distributi<strong>on</strong>, public performance, or public display.” 375 The court also cited<strong>the</strong> Ninth Ciruit’s decisi<strong>on</strong> in Napster I, which held that “Napster users who upload files namesto <strong>the</strong> search index for o<strong>the</strong>rs to copy violate plaintiff’s distributi<strong>on</strong> rights.” 376In Warner Bros. Records, Inc. v. Payne, 377 <strong>the</strong> court ruled, <strong>on</strong> a moti<strong>on</strong> to dismiss <strong>the</strong>plaintiff’s complaint against a defendant who was making <strong>the</strong> plaintiff’s recordings availablethrough <strong>the</strong> Zazaa network, that “[l]isting unauthorized copies of sound recordings using an<strong>on</strong>line file-sharing system c<strong>on</strong>stitutes an offer to distribute those works, <strong>the</strong>reby violating acopyright owner’s exclusive right of distributi<strong>on</strong>.” 378 The court relied <strong>on</strong> <strong>the</strong> Supreme Court’sequating of <strong>the</strong> term “distribute” with “publicati<strong>on</strong>” in Harper & Row Publishers, Inc. v. Nati<strong>on</strong>Enterprises, 379 noting that publicati<strong>on</strong> is defined to include <strong>the</strong> “offering to distribute copies.”The court also relied <strong>on</strong> <strong>the</strong> logic of Hotaling v. Church of Jesus Christ of Latter-Day Saints, 380which held a library engages in <strong>the</strong> distributi<strong>on</strong> of a copyrighted work when it adds <strong>the</strong> work toits collecti<strong>on</strong>s, lists <strong>the</strong> work in its index or catalog and makes <strong>the</strong> work available for borrowingor browsing. 381 Accordingly, <strong>the</strong> court denied <strong>the</strong> defendant’s moti<strong>on</strong> to dismiss: “Making an373374375376377378379380381A&M Records, Inc. v. Napster, Inc., 239 F.3d 1004, 1014 (9 th Cir. 2001) (emphasis added).2006 U.S. Dist. LEXIS 20214 (D. Ariz. Apr. 14, 2006).Id. at *7 (citing 17 U.S.C. § 101) (emphasis by <strong>the</strong> court).Id. at *8 (quoting A&M Records, Inc. v. Napster, Inc., 239 F.3d 1004, 1014 (9 th Cir. 2001)).2006 U.S. Dist. LEXIS 65765 (W.D. Tex. July 17, 2006).Id. at *8.471 U.S. 539 (1985).118 F.3d 199 (4 th Cir. 1997).2006 U.S. Dist. LEXIS at *9-10.- 94 -


unauthorized copy of a sound recording available to countless users of a peer-to-peer system forfree certainly c<strong>on</strong>templates and encourages fur<strong>the</strong>r distributi<strong>on</strong>, both <strong>on</strong> <strong>the</strong> <strong>Internet</strong> andelsewhere. Therefore, <strong>the</strong> Court is not prepared at this stage of <strong>the</strong> proceedings to rule out <strong>the</strong>Plaintiffs’ ‘making available’ <strong>the</strong>ory as a possible ground for imposing liability. A more detailedunderstanding of <strong>the</strong> Kazaa technology is necessary and Plaintiffs may yet bring forth evidenceof actual uploading and downloading of files, rendering use of <strong>the</strong> ‘making available’ <strong>the</strong>oryunnecessary.” 382In Universal City Studios Producti<strong>on</strong>s v. Bigwood, 383 <strong>the</strong> court granted summaryjudgment of infringement against <strong>the</strong> defendant, a user of Kazaa who had made two of <strong>the</strong>plaintiffs’ copyrighted moti<strong>on</strong> pictures available in his shared folder. Citing Hotaling andNapster I and no c<strong>on</strong>trary authority, and without any fur<strong>the</strong>r analysis of its own, <strong>the</strong> court ruledthat “by using KaZaA to make copies of <strong>the</strong> Moti<strong>on</strong> Pictures available to thousands of peopleover <strong>the</strong> internet, Defendant violated Plaintiffs’ exclusive right to distribute <strong>the</strong> Moti<strong>on</strong>Pictures.” 384In Motown Record Co. v. DePietro, 385 <strong>the</strong> court, citing <strong>the</strong> Ninth Circuit’s Napster I case,held that a “plaintiff claiming infringement of <strong>the</strong> exclusive-distributi<strong>on</strong> right can establishinfringement by proof of actual distributi<strong>on</strong> or by proof of offers to distribute, that is, proof that<strong>the</strong> defendant ‘made available’ <strong>the</strong> copyrighted work [in this case, via a peer-to-peer system].” 386In United States v. Carani, 387 <strong>the</strong> court ruled that storing child pornography in a sharedfolder <strong>on</strong> <strong>the</strong> Kazaa peer-to-peer network where it could be downloaded by o<strong>the</strong>rs qualified as anillegal “distributi<strong>on</strong>” of child pornography, thus justifying an enhanced punishment. 388In ICG-<strong>Internet</strong> Commerce Group, Inc. v. Wolf, 389 <strong>the</strong> court denied a moti<strong>on</strong> forsummary judgment that <strong>the</strong> defendant had infringed <strong>the</strong> plaintiff’s distributi<strong>on</strong> right in an adultvideo by posting <strong>the</strong> video to <strong>the</strong> defendant’s web site, because it was unclear from a screenshotof <strong>the</strong> defendant’s web site showing a hyperlink to “[s]ex tape download souces [sic]” whe<strong>the</strong>r<strong>the</strong> hyperlink linked to a streaming or downloadable source file c<strong>on</strong>taining <strong>the</strong> plaintiff’s video.The court did, however, find that <strong>the</strong> plaintiff’s copy and public display rights had been violatedby <strong>the</strong> posting of <strong>the</strong> video <strong>on</strong> <strong>the</strong> defendant’s site from which it could be viewed publicly. 390382383384385386387388389390Id. at *11.441 F. Supp. 2d 185 (D. Me. 2006).Id. at 190.2007 U.S. Dist. LEXIS 11626 (E.D. Pa. Feb. 16, 2007).Id. at *12.2007 U.S. App. LEXIS 16148 (7 th Cir. July 6, 2007).Id. at *21-23; accord United States v. Shaffer, 472 F.3d 1219, 1123-24 (10 th Cir. 2007).519 F. Supp. 2d 1014 (E.D. Pa. 2007).Id. at 1018-19.- 95 -


In Maverick Recording Co. v. Harper, 391 in c<strong>on</strong>sidering a copyright infringement claimagainst <strong>the</strong> defendant for having copies of <strong>the</strong> plaintiffs’ copyrighted sound recordings in ashared folder <strong>on</strong> a peer-to-peer network, <strong>the</strong> court held that a complete download of a givenwork over <strong>the</strong> network is not required for copyright infringement to occur. Citing <strong>the</strong> WarnerBros. v. Payne and Interscope decisi<strong>on</strong>s, <strong>the</strong> court stated, “The fact that <strong>the</strong> Recordings wereavailable for download is sufficient to violate Plaintiffs’ exclusive rights of reproducti<strong>on</strong> anddistributi<strong>on</strong>. It is not necessary to prove that all of <strong>the</strong> Recordings were actually downloaded;Plaintiffs need <strong>on</strong>ly prove that <strong>the</strong> Recordings were available for download due to Defendant’sacti<strong>on</strong>s.” 392On appeal, <strong>the</strong> Fifth Circuit ruled that it need not address whe<strong>the</strong>r merely makingavailable files for download violates <strong>the</strong> distributi<strong>on</strong> right because <strong>the</strong> defendant did not appeal<strong>the</strong> district court’s finding that she had infringed <strong>the</strong> plaintiffs’ copyrights by downloading and<strong>the</strong>refore reproducing <strong>the</strong> audio files. Thus, <strong>the</strong> distributi<strong>on</strong> issue was moot since <strong>the</strong>defendant’s liability would remain even if <strong>the</strong> Fifth Circuit were to agree with <strong>the</strong> district court<strong>on</strong> <strong>the</strong> distributi<strong>on</strong> issue. 393 The Fifth Circuit also ruled that <strong>the</strong> defendant was not entitled to aninnocent infringer defense as a matter of law because Secti<strong>on</strong> 402(d) makes that defenseunavailable when a proper copyright notice appears <strong>on</strong> <strong>the</strong> published ph<strong>on</strong>orecords to which adefendant had access. There was no dispute that each of <strong>the</strong> published ph<strong>on</strong>orecords from which<strong>the</strong> shared audio files were taken had proper copyright notices <strong>on</strong> <strong>the</strong>m, and lack of legalsophisticati<strong>on</strong> as to what <strong>the</strong> notices meant was irrelevant. 394 (The court does not menti<strong>on</strong>whe<strong>the</strong>r <strong>the</strong> audio files <strong>the</strong>mselves that <strong>the</strong> defendant shared had copyright notices <strong>on</strong> <strong>the</strong>m.)Accordingly, <strong>the</strong> court c<strong>on</strong>cluded that <strong>the</strong> plaintiffs must be awarded statutory damages of $750per infringed work. 395In Columbia Pictures Industries, Inc. v. Fung, 396 <strong>the</strong> court ruled, in <strong>the</strong> c<strong>on</strong>text of aBitTorrent site, that “uploading a copyrighted c<strong>on</strong>tent file to o<strong>the</strong>r users (regardless of wherethose users are located) violates <strong>the</strong> copyright holder’s § 106(3) distributi<strong>on</strong> right.” 397 Becauseof <strong>the</strong> nature of <strong>the</strong> BitTorrent protocol, users were not uploading <strong>the</strong> infringing c<strong>on</strong>tent itself to<strong>the</strong> defendants’ site, but ra<strong>the</strong>r were uploading dot-torrent files that c<strong>on</strong>tained <strong>on</strong>ly informati<strong>on</strong>about hosts from which <strong>the</strong> infringing c<strong>on</strong>tent could be downloaded using <strong>the</strong> BitTorrentprotocol. The dot-torrent files were indexed <strong>on</strong> <strong>the</strong> defendants’ site for searching. Thus, <strong>the</strong>quoted language seems to implicitly hold that an actual distributi<strong>on</strong> of infringing c<strong>on</strong>tent is notrequired to infringe <strong>the</strong> distributi<strong>on</strong> right, since <strong>the</strong> mere upload of <strong>the</strong> dot-torrent file throughwhich <strong>the</strong> infringing c<strong>on</strong>tent could be located was sufficient to infringe.391392393394395396397Order, Maverick Recording Co. v. Harper, No. 5:07-CV-026-XR (W.D. Tex. Aug. 7, 2008).Id., slip op. at 10.Maverick Recording Co. v. Harper, 2010 U.S. App. LEXIS 3912 (5 th Cir. Feb. 25, 2010) at *9.Id. at *14-16.Id. at *17.2009 U.S. Dist. LEXIS 122661 (C.D. Cal. Dec. 21, 2009).Id. at *29.- 96 -


(2) Cases Holding That Mere Posting Is Not a Distributi<strong>on</strong>In Religious Technology Center v. Netcom On-Line Communicati<strong>on</strong> Services, 398 <strong>the</strong>court refused to hold ei<strong>the</strong>r an OSP or a BBS operator liable for violati<strong>on</strong> of <strong>the</strong> publicdistributi<strong>on</strong> right based <strong>on</strong> <strong>the</strong> posting by an individual of infringing materials <strong>on</strong> <strong>the</strong> BBS. Withrespect to <strong>the</strong> BBS, <strong>the</strong> court stated: “Only <strong>the</strong> subscriber should be liable for causing <strong>the</strong>distributi<strong>on</strong> of plaintiffs’ work, as <strong>the</strong> c<strong>on</strong>tributing acti<strong>on</strong>s of <strong>the</strong> BBS provider are automatic andindiscriminate.” 399 With respect to <strong>the</strong> OSP, <strong>the</strong> court noted: “It would be especiallyinappropriate to hold liable a service that acts more like a c<strong>on</strong>duit, in o<strong>the</strong>r words, <strong>on</strong>e that doesnot itself keep an archive of files for more than a short durati<strong>on</strong>.” 400In In re Napster, Inc. <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Litigati<strong>on</strong>, 401 <strong>the</strong> district court rejected <strong>the</strong> plaintiffs’argument that Napster’s indexing of MP3 files that its users posted <strong>on</strong> <strong>the</strong> Napster network madeNapster a direct infringer of <strong>the</strong> plaintiffs’ exclusive distributi<strong>on</strong> rights. The plaintiffs relied <strong>on</strong>Hotaling v. Church of Jesus Christ of Latter-Day Saints, 402 which held a library engages in <strong>the</strong>distributi<strong>on</strong> of a copyrighted work when it adds <strong>the</strong> work to its collecti<strong>on</strong>s, lists <strong>the</strong> work in itsindex or catalog and makes <strong>the</strong> work available for borrowing or browsing. The Napster courtdistinguished <strong>the</strong> Hotaling case, arguing that <strong>the</strong> library had itself made actual, unauthorizedcopies of copyrighted materials made available to its borrowers. By c<strong>on</strong>trast, Napster did notitself have a “collecti<strong>on</strong>” of recordings <strong>on</strong> its servers, but ra<strong>the</strong>r merely an index of recordings. 403“This might c<strong>on</strong>stitute evidence that <strong>the</strong> listed works were available to Napster users, but it iscertainly not c<strong>on</strong>clusive proof that <strong>the</strong> s<strong>on</strong>gs identified in <strong>the</strong> index were actually uploaded <strong>on</strong>to<strong>the</strong> network in a manner that would be equivalent to <strong>the</strong> way in which <strong>the</strong> genealogical materialsat issue in Hotaling were copied and distributed to <strong>the</strong> church’s branch libraries.” 404The court fur<strong>the</strong>r noted that <strong>the</strong> definiti<strong>on</strong> of “publicati<strong>on</strong>” in <strong>the</strong> copyright statute, which<strong>the</strong> Supreme Court observed in a 1985 case that <strong>the</strong> legislative history equated with <strong>the</strong> right ofdistributi<strong>on</strong>, 405 requires <strong>the</strong> distributi<strong>on</strong> of copies or ph<strong>on</strong>orecords of a work to <strong>the</strong> public or <strong>the</strong>offering to distribute copies of that work for purposes of fur<strong>the</strong>r distributi<strong>on</strong>, public performance,or public display. The court held that merely by indexing works available through its system,Napster was not offering to itself distribute copies of <strong>the</strong> works for fur<strong>the</strong>r distributi<strong>on</strong> by itsusers. 406398399400401402403404405406907 F. Supp. 1361, 1372 (N.D. Cal. 1995).Id. at 1372.Id.377 F. Supp. 2d 796 (N.D. Cal. 2005).118 F.3d 199 (4 th Cir. 1997).In re Napster, Inc. <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Litigati<strong>on</strong>, 377 F. Supp. 2d at 802-03.Id. at 803.Harper & Row, Publishers, Inc. v. Nati<strong>on</strong> Enterprises, 471 U.S. 539 (1985).In re Napster, Inc. <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Litigati<strong>on</strong>, 377 F. Supp. 2d at 803-05.- 97 -


The plaintiffs argued that <strong>the</strong> requirement of a transmissi<strong>on</strong> of a material object in orderto find a violati<strong>on</strong> of <strong>the</strong> distributi<strong>on</strong> right was no l<strong>on</strong>ger viable in view of <strong>the</strong> recently enactedArtists’ Rights and Theft Preventi<strong>on</strong> Act of 2005 (<strong>the</strong> ART Act). 407 The plaintiffs cited Secti<strong>on</strong>103(a)(1)(C) of <strong>the</strong> ART Act, codified at 17 U.S.C. § 506(a), which provides criminal sancti<strong>on</strong>sfor any pers<strong>on</strong> who willfully infringes a copyright by <strong>the</strong> distributi<strong>on</strong> of a work being preparedfor commercial distributi<strong>on</strong>, by making it available <strong>on</strong> a computer network accessible tomembers of <strong>the</strong> public. The plaintiffs interpreted this provisi<strong>on</strong> as imposing criminal liability <strong>on</strong>any pers<strong>on</strong> who willfully makes an unauthorized copy of a copyrighted work available <strong>on</strong> apublicly accessible computer network while that work is being prepared for commercialdistributi<strong>on</strong>, and argued that C<strong>on</strong>gress must have understood civil liability for copyrightinfringement to be equally broad. 408The court rejected this argument, noting that <strong>the</strong> ART Act did not amend Secti<strong>on</strong> 106(3)of <strong>the</strong> copyright statute, and in any event Secti<strong>on</strong> 103(a)(1)(C) of <strong>the</strong> ART Act makes clear thatwillful copyright infringement and making <strong>the</strong> work available <strong>on</strong> a computer network areseparate elements of <strong>the</strong> criminal offense. Hence, <strong>the</strong> mere making available of an unauthorizedwork <strong>on</strong> a computer network should not be viewed as sufficient to establish a copyrightinfringement. 409 Accordingly, <strong>the</strong> court ruled that <strong>the</strong> defendants were entitled to summaryjudgment <strong>on</strong> <strong>the</strong> issue of direct liability <strong>on</strong> Napster’s part by virtue of its index. 410 However,note that <strong>the</strong> Ninth Ciruit’s earlier decisi<strong>on</strong> in Napster I held that “Napster users [as opposed toNapster itself] who upload files names to <strong>the</strong> search index for o<strong>the</strong>rs to copy violate plaintiff’sdistributi<strong>on</strong> rights.” 411In Perfect 10 v. Google, 412 discussed in detail in Secti<strong>on</strong> II.C.4 above, <strong>the</strong> district courtruled that Google did not publicly distribute infringing copies of Perfect 10’s copyrighted imagesthat could be located through <strong>the</strong> Google Image Search functi<strong>on</strong>. “A distributi<strong>on</strong> of acopyrighted work requires an ‘actual disseminati<strong>on</strong>’ of copies. … In <strong>the</strong> internet c<strong>on</strong>text, anactual disseminati<strong>on</strong> means <strong>the</strong> transfer of a file from <strong>on</strong>e computer to ano<strong>the</strong>r. AlthoughGoogle frames and in-line links to third-party infringing websites, it is those websites, notGoogle, that transfer <strong>the</strong> full-size images to users’ computers [up<strong>on</strong> clicking <strong>on</strong> a thumbnail407408409410411412Pub. L. No. 109-9, 119 Stat. 218 (2005).In re Napster, Inc. <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Litigati<strong>on</strong>, 377 F. Supp. 2d at 804.Id. at 804-05.Id. at 805. The court held, however, that <strong>the</strong> plaintiffs had submitted sufficient evidence of direct infringementby Napster’s users in <strong>the</strong> form of a showing of massive uploading and downloading of unauthorized copies ofworks, toge<strong>the</strong>r with statistical evidence str<strong>on</strong>gly suggesting that at least some of <strong>the</strong> plaintiffs’ copyrightedworks were am<strong>on</strong>g <strong>the</strong>m. Id. at 806. “It may be true that <strong>the</strong> link between such statistical evidence ofcopyright infringement and <strong>the</strong> uploading or downloading of specific copyrighted works is at <strong>the</strong> moment aweak <strong>on</strong>e. However, to avoid summary judgment, plaintiffs need <strong>on</strong>ly establish that triable issue of materialfact preclude entry of judgment as a matter of law. … Here in particular, <strong>the</strong> court is mindful of <strong>the</strong> fact that <strong>the</strong>parties have not even completed discovery relating to issues of copyright ownership and infringement.” Id. at806-07.A&M Records, Inc. v. Napster, Inc., 239 F.3d 1004, 1014 (9 th Cir. 2001).416 F. Supp. 2d 828 (C.D. Cal. 2006), aff’d sub nom. Perfect 10 v. Amaz<strong>on</strong>.com, Inc., 508 F.3d 1146, 1169(9 th Cir. 2007).- 98 -


versi<strong>on</strong> of <strong>the</strong> image displayed in <strong>the</strong> Google search results]. Because Google is not involved in<strong>the</strong> transfer, Google has not actually disseminated – and hence, [] has not distributed – <strong>the</strong>infringing c<strong>on</strong>tent.” 413On appeal, <strong>the</strong> Ninth Circuit affirmed this ruling. Because Google’s search enginecommunicated <strong>on</strong>ly HTML instructi<strong>on</strong>s telling a user’s browser where to find full size images <strong>on</strong>web site, and Google did not itself distribute copies of <strong>the</strong> infringing photographs, Google didnot have liability for infringement of <strong>the</strong> right of distributi<strong>on</strong> with respect to full size images thatcould be located and displayed through <strong>the</strong> Image Search functi<strong>on</strong>. 414 Perfect 10 argued that,under <strong>the</strong> Napster I and Hotaling cases discussed above, <strong>the</strong> mere making available of imagesviolates <strong>the</strong> copyright owner’s distributi<strong>on</strong> right. The Ninth Circuit held that this “deemeddistributi<strong>on</strong>” rule did not apply to Google, because, unlike <strong>the</strong> users of <strong>the</strong> Napster system or <strong>the</strong>library in Hotaling, Google did not own a collecti<strong>on</strong> of stored full size images that it madeavailable to <strong>the</strong> public. 415In Latin American Music Co. v. Archdiocese of San Juan, 416 although not a caseinvolving <strong>on</strong>line activity, <strong>the</strong> First Circuit held that <strong>the</strong> defendant’s mere listing in its licensingcatalog of s<strong>on</strong>gs that it did not own <strong>the</strong> copyright for did not c<strong>on</strong>stitute infringement. The courtruled that mere authorizati<strong>on</strong> of an infringing act is insufficient basis for copyright infringement,as infringement depends up<strong>on</strong> whe<strong>the</strong>r an actual infringing act, such as copying or performing,has taken place. 417In L<strong>on</strong>d<strong>on</strong>-Sire Records, Inc. v. Doe 1, 418 <strong>the</strong> court ruled that merely listing recordings asavailable for downloading <strong>on</strong> a peer-to-peer service did not infringe <strong>the</strong> distributi<strong>on</strong> right. Thecourt held that authorizing a distributi<strong>on</strong> is sufficient to give rise to liability, but <strong>on</strong>ly if aninfringing act occurs after <strong>the</strong> authorizati<strong>on</strong>. 419 The court rejected <strong>the</strong> plaintiff’s argument to <strong>the</strong>c<strong>on</strong>trary based <strong>on</strong> <strong>the</strong> Supreme Court’s equating of <strong>the</strong> term “distribute” with “publicati<strong>on</strong>” inHarper & Row Publishers, Inc. v. Nati<strong>on</strong> Enterprises. 420 The court noted that <strong>the</strong> Supreme Courtstated <strong>on</strong>ly that Secti<strong>on</strong> 106(3) recognized for <strong>the</strong> first time a distinct statutory right of firstpublicati<strong>on</strong>, and quoted <strong>the</strong> legislative history as establishing that Secti<strong>on</strong> 106(3) gives acopyright holder <strong>the</strong> right to c<strong>on</strong>trol <strong>the</strong> first public distributi<strong>on</strong> of an authorized copy of his413414415416417418419420Id. at 844 (citing In re Napster, Inc. <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Litigati<strong>on</strong>, 377 F. Supp. 2d 796, 802-04 (N.D. Cal. 2005)).Perfect 10 v. Amaz<strong>on</strong>.com, Inc., 508 F.3d 1146, 1162 (9 th Cir. 2007).Id. at 1162-63. Cf. Nati<strong>on</strong>al Car Rental Sys. v. Computer Assocs. Int’l, Inc., 991 F.2d 426, 434 (8 th Cir. 1993)(stating that infringement of <strong>the</strong> distributi<strong>on</strong> right requires <strong>the</strong> actual disseminati<strong>on</strong> of copies or ph<strong>on</strong>orecords).499 F.3d 32 (1 st Cir. 2007).Id. at 46-47.542 F. Supp. 2d 153 (2008).Id. at 166.471 U.S. 539 (1985).- 99 -


work. 421 The court went <strong>on</strong> to state, however, “That is a far cry from squarely holding thatpublicati<strong>on</strong> and distributi<strong>on</strong> are c<strong>on</strong>gruent.” 422The court noted that <strong>the</strong> statutory language itself suggests <strong>the</strong> terms are not syn<strong>on</strong>ymous.Noting that “publicati<strong>on</strong>” incorporates “distributi<strong>on</strong>” as part of its definiti<strong>on</strong> (“publicati<strong>on</strong>” is“<strong>the</strong> distributi<strong>on</strong> of copies or ph<strong>on</strong>orecords of a work to <strong>the</strong> public”), <strong>the</strong> court reas<strong>on</strong>ed:By <strong>the</strong> plain meaning of <strong>the</strong> statute, all “distributi<strong>on</strong>s … to <strong>the</strong> public” arepublicati<strong>on</strong>s. But not all publicati<strong>on</strong>s are distributi<strong>on</strong>s to <strong>the</strong> public – <strong>the</strong> statuteexplicitly creates an additi<strong>on</strong>al category of publicati<strong>on</strong>s that are not <strong>the</strong>mselvesdistributi<strong>on</strong>s. For example, suppose an author has a copy of her (as yetunpublished) novel. If she sells that copy to a member of <strong>the</strong> public, it c<strong>on</strong>stitutesboth distributi<strong>on</strong> and publicati<strong>on</strong>. If she merely offers to sell it to <strong>the</strong> samemember of <strong>the</strong> public, that is nei<strong>the</strong>r a distributi<strong>on</strong> nor a publicati<strong>on</strong>. And if <strong>the</strong>author offers to sell <strong>the</strong> manuscript to a publishing house “for purposes of fur<strong>the</strong>rdistributi<strong>on</strong>,” but does not actually do so, that is a publicati<strong>on</strong> but not adistributi<strong>on</strong>. 423Accordingly, <strong>the</strong> court c<strong>on</strong>cluded that <strong>the</strong> defendants could not be liable for violating <strong>the</strong>plaintiffs’ distributi<strong>on</strong> right unless a “distributi<strong>on</strong>” actually occurred. 424 But that c<strong>on</strong>clusi<strong>on</strong>, didnot, however, mean that <strong>the</strong> plaintiffs’ pleadings and evidence were insufficient: “The Court candraw from <strong>the</strong> Complaint and <strong>the</strong> current record a reas<strong>on</strong>able inference in <strong>the</strong> plaintiffs’ favor –that where <strong>the</strong> defendant has completed all <strong>the</strong> necessary steps for a public distributi<strong>on</strong>, areas<strong>on</strong>able fact-finder may infer that <strong>the</strong> distributi<strong>on</strong> actually took place.” 425The court also made <strong>the</strong> following additi<strong>on</strong>al rulings:-- That <strong>the</strong> Secti<strong>on</strong> 106(3) distributi<strong>on</strong> right is not limited to physical, tangible objects,but also c<strong>on</strong>fers <strong>on</strong> copyright owners <strong>the</strong> right to c<strong>on</strong>trol purely electr<strong>on</strong>ic distributi<strong>on</strong>s of <strong>the</strong>irwork. The court reas<strong>on</strong>ed that electr<strong>on</strong>ic files are “material objects” in which a sound recordingcan be fixed, and electr<strong>on</strong>ic distributi<strong>on</strong>s entail <strong>the</strong> movement of such electr<strong>on</strong>ic files, <strong>the</strong>rebyimplicating <strong>the</strong> distributi<strong>on</strong> right. 426-- That actual downloads of <strong>the</strong> plaintiffs’ works made by <strong>the</strong> plaintiffs’ investigatorwere “sufficient to allow a statistically reas<strong>on</strong>able inference that at least <strong>on</strong>e copyrighted work421422423424425426L<strong>on</strong>d<strong>on</strong>-Sire, 542 F. Supp. 2d at 168.Id.Id. at 169.Id.Id.Id. at 169-71 & 172-74.- 100 -


was downloaded at least <strong>on</strong>ce [by pers<strong>on</strong>s o<strong>the</strong>r than <strong>the</strong> investigator]. That is sufficient to makeout a prima facie case for present purposes.” 427In Elektra Entertainment Group, Inc. v. Barker, 428 c<strong>on</strong>trary to <strong>the</strong> L<strong>on</strong>d<strong>on</strong>-Sire Recordsdecisi<strong>on</strong> (which incidentally was decided <strong>on</strong> <strong>the</strong> same day), <strong>the</strong> court ruled that, based <strong>on</strong> <strong>the</strong>legislative history of <strong>the</strong> copyright statute and <strong>the</strong> Supreme Court’s Harper & Row decisi<strong>on</strong>, <strong>the</strong>words “distributi<strong>on</strong>” and “publicati<strong>on</strong>” should be c<strong>on</strong>strued as syn<strong>on</strong>ymous, and <strong>the</strong>refore <strong>the</strong>right of distributi<strong>on</strong> should be equated to <strong>the</strong> right of publicati<strong>on</strong>. 429 Accordingly, <strong>the</strong> court ruledthat <strong>the</strong> same acts that would c<strong>on</strong>stitute a publicati<strong>on</strong> as defined in Secti<strong>on</strong> 101 of <strong>the</strong> copyrightstatute – namely, <strong>the</strong> “offer[] to distribute copies or ph<strong>on</strong>orecords to a group of pers<strong>on</strong>s forpurposes of fur<strong>the</strong>r distributi<strong>on</strong>, public performance, or public display” – would also violate <strong>the</strong>distributi<strong>on</strong> right, and that proof of an actual transfer need not be shown. 430However, <strong>the</strong> court rejected <strong>the</strong> plaintiff’s argument that a violati<strong>on</strong> of <strong>the</strong> distributi<strong>on</strong>right could be established by a mere showing of <strong>the</strong> “making available” of copyrighted works by<strong>the</strong> defendant, as <strong>the</strong> plaintiffs had pled in <strong>the</strong>ir complaint. The court rejected <strong>the</strong> plaintiffs’argument that C<strong>on</strong>gress’ adopti<strong>on</strong> of <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty, which c<strong>on</strong>tains an expressright of “making available” a copyrighted work to <strong>the</strong> public, should c<strong>on</strong>trol <strong>the</strong> interpretati<strong>on</strong> ofSecti<strong>on</strong> 106(3)’s distributi<strong>on</strong> right. The court noted that, because <strong>the</strong> WIPO treaties were notself-executing, <strong>the</strong>y created no private right of acti<strong>on</strong> <strong>on</strong> <strong>the</strong>ir own. The court was also unwillingto infer <strong>the</strong> intent of an earlier C<strong>on</strong>gress when enacting amendments to <strong>the</strong> definiti<strong>on</strong> of <strong>the</strong>distributi<strong>on</strong> right from <strong>the</strong> acts of a later C<strong>on</strong>gress in ratifying <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty. 431Accordingly, <strong>the</strong> court was unwilling to equate C<strong>on</strong>gress’ words, that <strong>the</strong> distributi<strong>on</strong> right maybe infringed by “[t]he offer[] to distribute copies or ph<strong>on</strong>orecords to a group of pers<strong>on</strong> forpurposes of fur<strong>the</strong>r distributi<strong>on</strong>, public performance, or public display,” to what <strong>the</strong> courtdescribed as “<strong>the</strong> c<strong>on</strong>tourless ‘make available’ right proposed by Plaintiff.” 432The court also rejected <strong>the</strong> argument in an amicus brief submitted by <strong>the</strong> MPAA that <strong>the</strong>plaintiffs’ “make available” claim was supported by <strong>the</strong> introductory clause of Secti<strong>on</strong> 106,which gives <strong>the</strong> owner of a copyright <strong>the</strong> exclusive right “to authorize” <strong>the</strong> enumerated rights.The court cited and followed authority noting that C<strong>on</strong>gress had added <strong>the</strong> “authorize” languageto Secti<strong>on</strong> 106 in order to avoid any c<strong>on</strong>fusi<strong>on</strong> that <strong>the</strong> statute was meant to reach c<strong>on</strong>tributoryinfringers, not to create a separate basis for direct infringement. 433427428429430431432433Id. at 176. “As noted above, merely exposing music files to <strong>the</strong> internet is not copyright infringement. Thedefendants may still argue that <strong>the</strong>y did not know that logging <strong>on</strong>to <strong>the</strong> peer-to-peer network would allowo<strong>the</strong>rs to access <strong>the</strong>se particular files, or c<strong>on</strong>test <strong>the</strong> nature of <strong>the</strong> files, or present affirmative evidence rebutting<strong>the</strong> statistical inference that downloads occurred.” Id.551 F. Supp. 2d 234 (S.D.N.Y. 2008).Id. at 239-41.Id. at 242 (quoting 17 U.S.C. § 101’s definiti<strong>on</strong> of “publicati<strong>on</strong>”).Id. at 242 n.7.Id. at 243.Id. at 245-46.- 101 -


The court did, however, give <strong>the</strong> plaintiffs <strong>the</strong> opportunity to amend <strong>the</strong>ir complaint to befaithful to <strong>the</strong> language of <strong>the</strong> copyright statute by alleging that <strong>the</strong> defendant had made an offerto distribute, and that <strong>the</strong> offer to distribute was for <strong>the</strong> purpose of fur<strong>the</strong>r distributi<strong>on</strong>, publicperformance, or public display. 434 In additi<strong>on</strong>, <strong>the</strong> court denied <strong>the</strong> defendant’s moti<strong>on</strong> todismiss <strong>the</strong> complaint entirely because <strong>the</strong> plaintiffs had adequately alleged that, in additi<strong>on</strong> tomaking <strong>the</strong>ir works available, <strong>the</strong> defendant had actually distributed <strong>the</strong> plaintiffs’ copyrightedworks in direct violati<strong>on</strong> of <strong>the</strong> distributi<strong>on</strong> right. 435 In August of 2008 <strong>the</strong> case settled. 436In Atlantic Recording Corp. v. Howell, 437 seven major recording companies brought suitagainst <strong>the</strong> defendants, who had allegedly made over 4,000 files available for download in ashared folder <strong>on</strong> Kazaa. The private investigati<strong>on</strong> company MediaSentry took screen shotsshowing <strong>the</strong> files that were available for download. The plaintiffs owned registered copyrightsin 54 of <strong>the</strong> sound recordings in <strong>the</strong> folder. MediaSentry downloaded 12 of <strong>the</strong> copyrightedrecordings from <strong>the</strong> defendants’ computer, and <strong>the</strong> plaintiffs traced <strong>the</strong> computer to <strong>the</strong>defendants and filed an acti<strong>on</strong> for copyright infringement. The plaintiffs filed a moti<strong>on</strong> forsummary judgment of infringement. 438The court denied <strong>the</strong> moti<strong>on</strong>. Citing numerous decisi<strong>on</strong>s and two copyright treatises, <strong>the</strong>court noted <strong>the</strong> general rule that infringement of <strong>the</strong> distributi<strong>on</strong> right requires an actualdisseminati<strong>on</strong> of ei<strong>the</strong>r copies or ph<strong>on</strong>orecords. The court rejected <strong>the</strong> plaintiffs’ reliance <strong>on</strong> <strong>the</strong>Hotaling case and <strong>the</strong> Ninth Circuit’s Napster I decisi<strong>on</strong>. With respect to Hotaling, <strong>the</strong> courtnoted that in that case <strong>the</strong> plaintiff had already proved that <strong>the</strong> library made unlawful copies andplaced <strong>the</strong>m in its branch libraries, so <strong>the</strong>re had been actual distributi<strong>on</strong>s of copies in additi<strong>on</strong> tolisting of <strong>the</strong> unlawful copies in <strong>the</strong> library’s catalog. With respect to <strong>the</strong> Napster I decisi<strong>on</strong>, <strong>the</strong>court noted that <strong>the</strong> Ninth Circuit in <strong>the</strong> later Perfect 10 v. Amaz<strong>on</strong> case had grouped <strong>the</strong>holdings of Hotaling and Napster I toge<strong>the</strong>r based up<strong>on</strong> <strong>the</strong> factual similarity that in both cases<strong>the</strong> owner of a collecti<strong>on</strong> of works made <strong>the</strong>m available to <strong>the</strong> public. Only in such a situati<strong>on</strong>could <strong>the</strong> holding of Hotaling potentially apply to relieve <strong>the</strong> plaintiff of <strong>the</strong> burden to proveactual disseminati<strong>on</strong> of an unlawful copy of a work. The defendant in <strong>the</strong> Perfect 10 case did notown a collecti<strong>on</strong> of copyrighted works or communicate <strong>the</strong>m to <strong>the</strong> public, so <strong>the</strong> Ninth Circuitfound Hotaling inapplicable. 439 The Howell court went <strong>on</strong> to note <strong>the</strong> following:However, <strong>the</strong> court did hold that “<strong>the</strong> district court’s c<strong>on</strong>clusi<strong>on</strong> [that distributi<strong>on</strong>requires an ‘actual disseminati<strong>on</strong>’] is c<strong>on</strong>sistent with <strong>the</strong> language of <strong>the</strong>434435436437438439Id. at 244-45.Id. at 245.“RIAA Settles Pending ‘Making Available’ Claim,” BNA’s Electr<strong>on</strong>ic Commerce & Law Report (Aug. 27,2008) at 1160.554 F. Supp. 2d 976 (D. Ariz. 2008).Id. at 978.Id. at 981-82.- 102 -


<str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act.” That holding c<strong>on</strong>tradicts Hotaling and casts doubt <strong>on</strong> <strong>the</strong> singleunsupported line from Napster up<strong>on</strong> which <strong>the</strong> recording companies rely. 440After surveying <strong>the</strong> many decisi<strong>on</strong>s addressing <strong>the</strong> issue, <strong>the</strong> court c<strong>on</strong>cluded that itagreed “with <strong>the</strong> great weight of authority that § 106(3) is not violated unless <strong>the</strong> defendant hasactually distributed an unauthorized copy of <strong>the</strong> work to a member of <strong>the</strong> public. … Merelymaking an unauthorized copy of a copyrighted work available to <strong>the</strong> public does not violate acopyright holder’s exclusive right of distributi<strong>on</strong>.” 441 In reaching its c<strong>on</strong>clusi<strong>on</strong>, <strong>the</strong> courtrejected <strong>the</strong> plaintiffs’ argument that “distributi<strong>on</strong>” and “publicati<strong>on</strong>” are syn<strong>on</strong>ymous terms in<strong>the</strong> statute for all purposes. Ra<strong>the</strong>r, <strong>the</strong> court noted it was not clear that “publicati<strong>on</strong>” and“distributi<strong>on</strong>” are syn<strong>on</strong>ymous outside <strong>the</strong> c<strong>on</strong>text of first publicati<strong>on</strong>, which was <strong>the</strong> subject ofdiscussi<strong>on</strong> in <strong>the</strong> Supreme Court’s Harper & Row decisi<strong>on</strong>. Citing L<strong>on</strong>d<strong>on</strong>-Sire, <strong>the</strong> court notedthat while all distributi<strong>on</strong>s to <strong>the</strong> public are publicati<strong>on</strong>s, not all publicati<strong>on</strong>s are distributi<strong>on</strong>s. 442The court c<strong>on</strong>cluded: “A plain reading of <strong>the</strong> statute indicates that a publicati<strong>on</strong> can be ei<strong>the</strong>r adistributi<strong>on</strong> or an offer to distribute for <strong>the</strong> purposes of fur<strong>the</strong>r distributi<strong>on</strong>, but that a distributi<strong>on</strong>must involve a ‘sale or o<strong>the</strong>r transfer of ownership’ or a ‘rental, lease, or lending’ of a copy of<strong>the</strong> work.” 443Finally, <strong>the</strong> court noted that <strong>the</strong> plaintiffs’ moti<strong>on</strong> for summary judgment must also failbecause <strong>the</strong>y had not proved that a Kazaa user who places a copyrighted work into <strong>the</strong> sharedfolder distributes a copy of that work when a third party downloads it. The court noted that in<strong>the</strong> Kazaa system <strong>the</strong> owner of <strong>the</strong> shared folder does not necessarily ever make or distribute anunauthorized copy of <strong>the</strong> work. And if <strong>the</strong> owner of <strong>the</strong> shared folder simply provides a memberof <strong>the</strong> public with access to <strong>the</strong> work and <strong>the</strong> means to make an unauthorized copy, <strong>the</strong> ownerwould not be liable as a primary infringer of <strong>the</strong> distributi<strong>on</strong> right, but ra<strong>the</strong>r would bepotentially liable <strong>on</strong>ly as a sec<strong>on</strong>dary infringer of <strong>the</strong> reproducti<strong>on</strong> right. 444 The court <strong>the</strong>reforec<strong>on</strong>cluded that <strong>the</strong> plaintiffs’ moti<strong>on</strong> for summary judgment must fail because “<strong>the</strong>y have notexplained <strong>the</strong> architecture of <strong>the</strong> KaZaA file-sharing system in enough detail to determinec<strong>on</strong>clusively whe<strong>the</strong>r <strong>the</strong> owner of <strong>the</strong> shared folder distributes an unauthorized copy (directviolati<strong>on</strong> of <strong>the</strong> distributi<strong>on</strong> right), or simply provides a third-party with access and resources tomake a copy <strong>on</strong> <strong>the</strong>ir own (c<strong>on</strong>tributory violati<strong>on</strong> of <strong>the</strong> reproducti<strong>on</strong> right).” 445In Capitol Records Inc. v. Thomas, 446 <strong>the</strong> court sua sp<strong>on</strong>te raised <strong>the</strong> issue of whe<strong>the</strong>r ithad erred in instructing <strong>the</strong> jury that making sound recordings available for distributi<strong>on</strong> <strong>on</strong> apeer-to-peer network, regardless of whe<strong>the</strong>r actual distributi<strong>on</strong> was shown, qualified as440441442443444445446Id. at 982 (quoting Perfect 10 v. Amaz<strong>on</strong>.com, Inc., 487 F.3d 701, 718 (9 th Cir. 2007) (superseded by 508 F.3d1146 (9 th Cir. 2007)).554 F. Supp. 2d at 983.Id. at 984.Id. at 985.Id. at 986.Id.579 F. Supp. 2d 1210 (D. Minn. 2008).- 103 -


distributi<strong>on</strong> under <strong>the</strong> copyright act. The court c<strong>on</strong>cluded that it had erred and ordered a newtrial for <strong>the</strong> defendant. 447 The parties agreed that <strong>the</strong> <strong>on</strong>ly evidence of actual disseminati<strong>on</strong> ofcopyrighted works was that plaintiffs’ infringement policing agent, MediaSentry, haddownloaded s<strong>on</strong>gs. The defendant argued that disseminati<strong>on</strong> to an investigator acting as anagent for <strong>the</strong> copyright owner cannot c<strong>on</strong>stitute infringement. The court rejected this argument,noting that Eighth Circuit precedent clearly approved of <strong>the</strong> use of investigators by copyrightowners, and distributi<strong>on</strong> to an investigator can c<strong>on</strong>stitute infringement. 448The court <strong>the</strong>n turned to <strong>the</strong> issue of whe<strong>the</strong>r merely making available recordings fordownload c<strong>on</strong>stitutes unauthorized distributi<strong>on</strong>. The court first noted that <strong>the</strong> plain language ofSecti<strong>on</strong> 106(3) does not state that making a work available for sale, transfer, rental, lease orlending c<strong>on</strong>stitutes distributi<strong>on</strong>, and two leading copyright treatises (Nimmer and Patry) agreethat making a work available is insufficient to establish distributi<strong>on</strong>. C<strong>on</strong>gress’ choice not toinclude offers to do <strong>the</strong> acts enumerated in Secti<strong>on</strong> 106(3) fur<strong>the</strong>r indicated its intent that anactual distributi<strong>on</strong> or disseminati<strong>on</strong> is required by Secti<strong>on</strong> 106(3). 449The court rejected <strong>the</strong> holding of o<strong>the</strong>r courts that <strong>the</strong> definiti<strong>on</strong> of “distributi<strong>on</strong>” shouldbe taken to be <strong>the</strong> same as that of “publicati<strong>on</strong>,” noting that <strong>the</strong> legislative history does notexpressly state that distributi<strong>on</strong> should be given <strong>the</strong> same broad meaning as publicati<strong>on</strong>, and inany case, even if <strong>the</strong> legislative history indicated that some members of C<strong>on</strong>gress equatedpublicati<strong>on</strong> with distributi<strong>on</strong> under Secti<strong>on</strong> 106(3), that fact could not override <strong>the</strong> plain meaningof <strong>the</strong> statute. The court c<strong>on</strong>cluded that <strong>the</strong> statutory definiti<strong>on</strong> of publicati<strong>on</strong> is broader than <strong>the</strong>term “distributi<strong>on</strong>” as used in Secti<strong>on</strong> 106(3). Specifically, under <strong>the</strong> definiti<strong>on</strong> in Secti<strong>on</strong> 101, apublicati<strong>on</strong> can occur by means of <strong>the</strong> distributi<strong>on</strong> of copies of a work to <strong>the</strong> public, but it canalso occur by offering to distribute copies to a group of pers<strong>on</strong>s for purposes of fur<strong>the</strong>rdistributi<strong>on</strong>, public performance, or public display. Thus, while a publicati<strong>on</strong> effected bydistributing copies of <strong>the</strong> work is a distributi<strong>on</strong>, a publicati<strong>on</strong> effected by merely offering todistribute copies to <strong>the</strong> public is merely an offer of distributi<strong>on</strong>, an actual distributi<strong>on</strong>. 450The court rejected <strong>the</strong> plaintiffs’ argument that Secti<strong>on</strong> 106 affords an exclusive right toauthorize distributi<strong>on</strong> (based <strong>on</strong> Secti<strong>on</strong> 106’s language that “<strong>the</strong> owner of copyright under thistitle has <strong>the</strong> exclusive rights to do and to authorize any of <strong>the</strong> following …”) and that makingsound recordings available <strong>on</strong> a peer-to-peer network would violate such an authorizati<strong>on</strong> right.The court c<strong>on</strong>cluded that <strong>the</strong> authorizati<strong>on</strong> clause merely provides a statutory foundati<strong>on</strong> forsec<strong>on</strong>dary liability, not a means of expanding <strong>the</strong> scope of direct infringement liability. Thecourt reas<strong>on</strong>ed that if simply making a copyrighted work available to <strong>the</strong> public c<strong>on</strong>stituted adistributi<strong>on</strong>, even if no member of <strong>the</strong> public ever accessed that work, copyright owners would447448449450Id. at 1212 & 1227. The instructi<strong>on</strong> to <strong>the</strong> jury read: “The act of making copyrighted sound recordingsavailable for electr<strong>on</strong>ic distributi<strong>on</strong> <strong>on</strong> a peer-to-peer network, without license from <strong>the</strong> copyright owners,violates <strong>the</strong> copyright owners’ exclusive right of distributi<strong>on</strong>, regardless of whe<strong>the</strong>r actual distributi<strong>on</strong> has beenshown.” Id. at 1212.Id. at 1214-15.Id. at 1217-18.Id. at 1219-20.- 104 -


e able to make an end run ar4ound <strong>the</strong> standards for assessing c<strong>on</strong>tributory copyrightinfringement. 451Finally, <strong>the</strong> court rejected <strong>the</strong> arguments of <strong>the</strong> plaintiffs and various amici that <strong>the</strong> WIPOtreaties require <strong>the</strong> U.S. to provide a making-available right and that right should <strong>the</strong>refore beread into Secti<strong>on</strong> 106(3). The court noted that <strong>the</strong> WIPO treaties are not self-executing and lackany binding legal authority separate from <strong>the</strong>ir implementati<strong>on</strong> through <strong>the</strong> copyright act. Thec<strong>on</strong>tents of <strong>the</strong> WIPO treaties would be relevant <strong>on</strong>ly insofar as Secti<strong>on</strong> 106(3) was ambiguous,and <strong>the</strong>re was no reas<strong>on</strong>able interpretati<strong>on</strong> of Secti<strong>on</strong> 106(3) that would align with <strong>the</strong> UnitedStates’ treaty obligati<strong>on</strong>s. C<strong>on</strong>cern for compliance with <strong>the</strong> WIPO treaties could not override <strong>the</strong>clear c<strong>on</strong>gressi<strong>on</strong>al intent in <strong>the</strong> language of Secti<strong>on</strong> 106(3). 452(3) Cases Refusing To Decide <strong>the</strong> IssueIn Arista Records LLC v. Does 1-16, 453 several record labels brought a copyrightinfringement claim against 16 unidentified defendants for illegally downloading and distributing<strong>the</strong> plaintiffs’ copyrighted music through a peer-to-peer network and issued a subpoena seekinginformati<strong>on</strong> from <strong>the</strong> State University of New York at Albany sufficient to identify eachdefendant. The defendants sought to quash <strong>the</strong> subpoena, in part <strong>on</strong> <strong>the</strong> basis that <strong>the</strong> plaintiffs’complaint was defective in that, in essence, according to <strong>the</strong> defendants, it alleged that <strong>the</strong>defendants were infringers because <strong>the</strong>y were making available copyrighted s<strong>on</strong>g files, butwithout any evidence of actual distributi<strong>on</strong> of those files to <strong>the</strong> public. The court refused todecide whe<strong>the</strong>r <strong>the</strong> mere “making available” of s<strong>on</strong>g files would be sufficient to violate <strong>the</strong>distributi<strong>on</strong> right because <strong>the</strong> complaint did not use that language, but ra<strong>the</strong>r alleged that eachdefendant downloaded and/or distributed to <strong>the</strong> public copies of sound recordings. 454 “We arepersuaded by <strong>the</strong> majority of cases and <strong>the</strong> school of thought that Plaintiffs have adequately pledthat Defendants distributed Plaintiffs’ copyrighted work, by merely stating, within <strong>the</strong> fourcorners of <strong>the</strong> Complaint, <strong>the</strong> distributi<strong>on</strong> allegati<strong>on</strong> al<strong>on</strong>e. The tasks of pleading and provingthat each Defendant actually distributed <strong>the</strong> copyright work do not necessarily collide at thisjuncture of <strong>the</strong> case, and dismissal of <strong>the</strong> Complaint would not be appropriate at this stage.” 4552. The Requirement of a “Public” Distributi<strong>on</strong>Unlike <strong>the</strong> case of <strong>the</strong> public performance and public display rights, <strong>the</strong> copyright statutedoes not define what c<strong>on</strong>stitutes a “public” distributi<strong>on</strong>. However, <strong>on</strong>e might expect courts toafford a similarly broad interpretati<strong>on</strong> of “public” with respect to <strong>the</strong> right of public distributi<strong>on</strong>.Some distributi<strong>on</strong>s will clearly be “public,” such as <strong>the</strong> posting of material <strong>on</strong> a Usenetnewsgroup, and some will clearly not, such as sending e-mail to a single individual. Many o<strong>the</strong>r<strong>Internet</strong> distributi<strong>on</strong>s will fall in between. However, <strong>on</strong>e might expect courts to treat distributi<strong>on</strong>451452453454455Id. at 1220-21.Id. at 1225-26.2009 U.S. Dist. LEXIS 12159 (N.D.N.Y. Feb. 18, 2009).Id. at *15-16.Id. at *16-17.- 105 -


to members of <strong>the</strong> public by <strong>Internet</strong> access at different times and places as never<strong>the</strong>less“public,” by analogy to <strong>the</strong> public performance and public display rights.As previously discussed with respect to <strong>the</strong> public display right, <strong>the</strong> court in PlayboyEnterprises, Inc. v. Hardenburgh, 456 held <strong>the</strong> defendant operators of a BBS directly liable forinfringement of <strong>the</strong> public distributi<strong>on</strong> right by virtue of making available photographs tosubscribers of <strong>the</strong> BBS for a fee, many of which were copyrighted photographs of <strong>the</strong> plaintiffPlayboy Enterprises. The court’s basis for finding liability was derived principally from <strong>the</strong> factthat <strong>the</strong> defendants had a policy of encouraging subscribers to c<strong>on</strong>tribute files, including adultphotographs, to an “upload file” <strong>on</strong> <strong>the</strong> BBS and <strong>the</strong> defendants’ practice of using a screeningprocedure in which its employees screened all files in <strong>the</strong> upload file to remove pornographicmaterial and moved <strong>the</strong>m into <strong>the</strong> generally available files for subscribers. These facts led <strong>the</strong>court to c<strong>on</strong>clude that <strong>the</strong> defendants were active participants in <strong>the</strong> process of copyrightinfringement.With respect to <strong>the</strong> requirement that <strong>the</strong> distributi<strong>on</strong>s be “to <strong>the</strong> public” in order toinfringe <strong>the</strong> distributi<strong>on</strong> right, <strong>the</strong> court ruled that “Defendants disseminated unlawful copies of[<strong>the</strong> plaintiff’s] photographs to <strong>the</strong> public by adopting a policy in which [<strong>the</strong> defendants’]employees moved those copies to <strong>the</strong> generally available files instead of discarding <strong>the</strong>m.” 457The court also c<strong>on</strong>cluded that <strong>the</strong> defendants were liable for c<strong>on</strong>tributory infringement by virtueof <strong>the</strong>ir encouraging of subscribers to upload informati<strong>on</strong> to <strong>the</strong> BBS with at least c<strong>on</strong>structiveknowledge that infringing activity was likely to be occurring <strong>on</strong> <strong>the</strong>ir BBS. 4583. The Requirement of a Rental or Transfer of OwnershipThe public distributi<strong>on</strong> right requires that <strong>the</strong>re have been ei<strong>the</strong>r a rental or a transfer ofownership of a copy. If material is distributed free, as much of it is <strong>on</strong> <strong>the</strong> <strong>Internet</strong>, <strong>the</strong>re is nosale, rental, or lease, and it is <strong>the</strong>refore unclear whe<strong>the</strong>r a sale or a “transfer of ownership” hastaken place. With respect to distributi<strong>on</strong>s in which <strong>the</strong> recipient receives a complete copy of <strong>the</strong>work <strong>on</strong> <strong>the</strong> recipient’s computer, perhaps a “transfer of ownership” should be deemed to havetaken place, since <strong>the</strong> recipient has c<strong>on</strong>trol over <strong>the</strong> received copy.It is unclear precisely what a “rental” means <strong>on</strong> <strong>the</strong> <strong>Internet</strong>. For example, is a downloadof an <strong>on</strong>-demand movie a “rental”? In a sense, <strong>the</strong> user pays a “rental” fee to watch <strong>the</strong> movie<strong>on</strong>ly <strong>on</strong>ce. However, <strong>the</strong> downloaded bits of informati<strong>on</strong> comprising <strong>the</strong> movie are never“returned” to <strong>the</strong> owner, as in <strong>the</strong> case of <strong>the</strong> usual rental of a copy of a work. These unansweredquesti<strong>on</strong>s lend uncertainty to <strong>the</strong> scope of <strong>the</strong> distributi<strong>on</strong> right <strong>on</strong> <strong>the</strong> <strong>Internet</strong>.4. The Right of Distributi<strong>on</strong> Under <strong>the</strong> WIPO TreatiesArticle 6 of <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty provides that authors of literary and artisticworks shall enjoy “<strong>the</strong> exclusive right of authorizing <strong>the</strong> making available to <strong>the</strong> public of <strong>the</strong>456457458982 F. Supp. 503 (N.D. Ohio 1997).Id. at 513.Id. at 514.- 106 -


original and copies of <strong>the</strong>ir works through sale or o<strong>the</strong>r transfer of ownership.” This right seemspotentially broader than <strong>the</strong> public distributi<strong>on</strong> right under current U.S. law, because it includes<strong>the</strong> mere “making available” of copies of works to <strong>the</strong> public, whereas U.S. law currentlyreaches <strong>on</strong>ly <strong>the</strong> actual distributi<strong>on</strong> of copies.It is unclear whe<strong>the</strong>r this “making available” right reaches <strong>the</strong> mere posting of copies <strong>on</strong><strong>the</strong> <strong>Internet</strong>. The Agreed Statement for Article 6 provides: “As used in <strong>the</strong>se Articles, <strong>the</strong>expressi<strong>on</strong>s ‘copies’ and ‘original and copies,’ being subject to <strong>the</strong> right of distributi<strong>on</strong> and <strong>the</strong>right of rental under <strong>the</strong> said Articles, refer exclusively to fixed copies that can be put intocirculati<strong>on</strong> as tangible objects.” One interpretati<strong>on</strong> of <strong>the</strong> Agreed Statement is that a copy posted<strong>on</strong> <strong>the</strong> <strong>Internet</strong>, being electr<strong>on</strong>ic in format, is not capable of being “put into circulati<strong>on</strong> astangible objects.”On <strong>the</strong> o<strong>the</strong>r hand, <strong>on</strong>e might argue that at least complete copies downloaded topermanent storage at recipient computers should be treated as <strong>the</strong> equivalent of circulati<strong>on</strong> ofcopies “as tangible objects.” If, for example, copies of a book were sold <strong>on</strong> floppy disks ra<strong>the</strong>rthan <strong>on</strong> paper, such floppy disks might well be treated as <strong>the</strong> placement of copies into circulati<strong>on</strong>as tangible objects. Yet a network download can result in a copy <strong>on</strong> a floppy disk (or a harddisk) at <strong>the</strong> recipient’s computer. One could <strong>the</strong>refore argue that <strong>the</strong> transmissi<strong>on</strong> of electr<strong>on</strong>iccopies to “physical” storage media at <strong>the</strong> receiving end should be treated as within <strong>the</strong>distributi<strong>on</strong> right of <strong>the</strong> WIPO treaty.In any event, this “making available” right might more easily reach BBS operators andOSPs through which works are “made available” <strong>on</strong> <strong>the</strong> <strong>Internet</strong>. It is unclear whe<strong>the</strong>r arequirement of voliti<strong>on</strong> will be read into Article 6 for liability, as some U.S. courts have requiredfor liability under <strong>the</strong> current rights of public distributi<strong>on</strong>, display and performance. Moreover,because <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty does not define <strong>the</strong> “public,” <strong>the</strong> same ambiguities will ariseas under current U.S. law c<strong>on</strong>cerning what type of availability will be sufficient to be “public,”particularly with respect to <strong>the</strong> “making available” of works to limited audiences.Articles 8 and 12 of <strong>the</strong> WIPO Performances and Ph<strong>on</strong>ograms Treaty c<strong>on</strong>tain rights ofdistributi<strong>on</strong> very similar to that of Article 6 of <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty, 459 so <strong>the</strong> sameambiguities noted above will arise.459Article 8(1) provides, “Performers shall enjoy <strong>the</strong> exclusive right of authorizing <strong>the</strong> making available to <strong>the</strong>public of <strong>the</strong> original and copies of <strong>the</strong>ir performances fixed in ph<strong>on</strong>ograms through sale or o<strong>the</strong>r transfer ofownership.” Article 12(1) provides, “Producers of ph<strong>on</strong>ograms shall enjoy <strong>the</strong> exclusive right of authorizing<strong>the</strong> making available to <strong>the</strong> public of <strong>the</strong> original and copies of <strong>the</strong>ir ph<strong>on</strong>ograms through sale or o<strong>the</strong>r transferof ownership.”Like <strong>the</strong> Agreed Statement for <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty quoted in <strong>the</strong> text, <strong>the</strong> Agreed Statement for Articles8 and 12 of <strong>the</strong> WIPO Performances and Ph<strong>on</strong>ograms Treaty provides: “As used in <strong>the</strong>se Articles, <strong>the</strong>expressi<strong>on</strong>s ‘copies’ and ‘original and copies,’ being subject to <strong>the</strong> right of distributi<strong>on</strong> and <strong>the</strong> right of rentalunder <strong>the</strong> said Articles, refer exclusively to fixed copies that can be put into circulati<strong>on</strong> as tangible objects.”- 107 -


5. The Right of Distributi<strong>on</strong> Under WIPO Implementing Legislati<strong>on</strong>(a) United States Legislati<strong>on</strong>The DMCA does not c<strong>on</strong>tain any provisi<strong>on</strong>s that would modify <strong>the</strong> right of distributi<strong>on</strong>as it exists under current United States law. Thus, <strong>the</strong> DMCA implicitly deems <strong>the</strong> current rightof public distributi<strong>on</strong> to be equivalent to <strong>the</strong> Article 6 right.(b) The European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> DirectiveArticle 4(1) of <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive requires member states to “provide forauthors, in respect of <strong>the</strong> original of <strong>the</strong>ir works or of copies <strong>the</strong>reof, <strong>the</strong> exclusive right toauthorize or prohibit any form of distributi<strong>on</strong> to <strong>the</strong> public by sale or o<strong>the</strong>rwise.” Use of <strong>the</strong>phrase “any form” of distributi<strong>on</strong> suggests that a broad right is intended, although, as in <strong>the</strong>United States, <strong>the</strong> right applies <strong>on</strong>ly with respect to <strong>the</strong> distributi<strong>on</strong> of “copies.” 460 C<strong>on</strong>sistentwith <strong>the</strong> Agreed Statement of <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty, <strong>the</strong> comments to Article 4(1) of <strong>the</strong>European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive recite that “<strong>the</strong> expressi<strong>on</strong>s ‘copies’ and ‘originals and copies,’being subject to <strong>the</strong> distributi<strong>on</strong> right, refer exclusively to fixed copies that can be put intocirculati<strong>on</strong> as tangible objects.” 461Thus, although use of <strong>the</strong> phrase “any form” of distributi<strong>on</strong> might suggest that all <strong>on</strong>linetransmissi<strong>on</strong>s of copyrighted works would fall within <strong>the</strong> distributi<strong>on</strong> right of <strong>the</strong> European<str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive, <strong>the</strong> comments limit <strong>the</strong> distributi<strong>on</strong> right “to fixed copies that can be putinto circulati<strong>on</strong> as tangible objects.” It seems that <strong>the</strong> drafters of <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>Directive intended <strong>the</strong> right of communicati<strong>on</strong> to <strong>the</strong> public, ra<strong>the</strong>r than <strong>the</strong> right of distributi<strong>on</strong>,to cover <strong>on</strong>line transmissi<strong>on</strong>s of copyrighted works, for Recital (23) states that <strong>the</strong> right ofcommunicati<strong>on</strong> to <strong>the</strong> public “should be understood in a broad sense covering all communicati<strong>on</strong>to <strong>the</strong> public not present at <strong>the</strong> place where <strong>the</strong> communicati<strong>on</strong> originates. This right shouldcover any such transmissi<strong>on</strong> or retransmissi<strong>on</strong> of a work to <strong>the</strong> public by wire or wireless means,including broadcasting. This right should not cover any o<strong>the</strong>r acts.”E. The Right of Importati<strong>on</strong>Secti<strong>on</strong> 602(a) of <strong>the</strong> copyright statute provides that “importati<strong>on</strong> into <strong>the</strong> United States... of copies or ph<strong>on</strong>orecords of a work that have been acquired outside <strong>the</strong> United States is aninfringement of <strong>the</strong> exclusive right to distribute copies ....” One purpose of Secti<strong>on</strong> 602(a) wasto allow a copyright owner to prevent distributi<strong>on</strong> into <strong>the</strong> United States of copies of works that,if made in <strong>the</strong> United States, would have been infringing, but were made abroad outside <strong>the</strong>reach of United States copyright law.460461Art. 4(2) deals with exhausti<strong>on</strong> of <strong>the</strong> distributi<strong>on</strong> right under <strong>the</strong> first sale doctrine, and will be discussed inSecti<strong>on</strong> III.F below.Commentary to Art. 4, 1.- 108 -


Secti<strong>on</strong> 602(a) was obviously drafted with a model of physical copies in mind.“Importati<strong>on</strong>” is not defined in <strong>the</strong> copyright statute, but <strong>the</strong> requirement that copies of a work be“acquired outside <strong>the</strong> United States” might suggest that “importati<strong>on</strong>” means <strong>the</strong> movement ofphysical copies into <strong>the</strong> United States. 462 It is unclear how this right will be applied to <strong>Internet</strong>transmissi<strong>on</strong>s into <strong>the</strong> United States, with respect to which no physical copies in a traditi<strong>on</strong>alsense are moved across nati<strong>on</strong>al borders. Because <strong>the</strong> NII White Paper takes <strong>the</strong> positi<strong>on</strong> that<strong>the</strong> stream of data sent during a transmissi<strong>on</strong> does not c<strong>on</strong>stitute a “copy” of a copyrighted work,<strong>the</strong> NII White Paper c<strong>on</strong>cludes that <strong>the</strong> Secti<strong>on</strong> 602(a) importati<strong>on</strong> right does not apply t<strong>on</strong>etwork transmissi<strong>on</strong>s into <strong>the</strong> United States, 463 and recommends that Secti<strong>on</strong> 602 be amendedto include importati<strong>on</strong> by transmissi<strong>on</strong> of copies, as well as by carriage or shipping of <strong>the</strong>m. 464However, because physical copies often end up <strong>on</strong> a computer in <strong>the</strong> United States as aresult of network transmissi<strong>on</strong>s into <strong>the</strong> United States, it is possible that <strong>the</strong> importati<strong>on</strong> rightwill be c<strong>on</strong>strued analogously to <strong>the</strong> distributi<strong>on</strong> right with respect to transmissi<strong>on</strong>s, especiallysince <strong>the</strong> importati<strong>on</strong> right is defined in Secti<strong>on</strong> 602(a) in terms of <strong>the</strong> distributi<strong>on</strong> right. Thus, ifa transmissi<strong>on</strong> is deemed to be within <strong>the</strong> distributi<strong>on</strong> right, <strong>the</strong>n it is possible that <strong>the</strong>importati<strong>on</strong> right will be c<strong>on</strong>strued to apply when transmissi<strong>on</strong>s of copies are made into <strong>the</strong>United States from abroad.In any event, <strong>the</strong> new right of communicati<strong>on</strong> to <strong>the</strong> public afforded under <strong>the</strong> WIPOtreaties, discussed in <strong>the</strong> next secti<strong>on</strong>, could help plug any hole that may exist in <strong>the</strong> traditi<strong>on</strong>alimportati<strong>on</strong> right, at least with respect to transmissi<strong>on</strong>s into <strong>the</strong> United States that qualify as“communicati<strong>on</strong>s to <strong>the</strong> public,” if <strong>the</strong> such right is adopted in implementing legislati<strong>on</strong> (asnoted in <strong>the</strong> next secti<strong>on</strong>, however, <strong>the</strong> DMCA does not c<strong>on</strong>tain an explicit right ofcommunicati<strong>on</strong> to <strong>the</strong> public).F. The New Right of Transmissi<strong>on</strong> and Access Under <strong>the</strong> WIPO TreatiesThe WIPO treaties each afford a broad new right of transmissi<strong>on</strong> and access to acopyrighted work. The right is denominated a “right of communicati<strong>on</strong> to <strong>the</strong> public” in <strong>the</strong>WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty, and is denominated a “right of making available to <strong>the</strong> public” in <strong>the</strong>WIPO Performances and Ph<strong>on</strong>ograms Treaty. Despite <strong>the</strong> difference in denominati<strong>on</strong>, <strong>the</strong> rightsappear to be very similar.462463464Lemley, supra note 6, at 564.NII White Paper at 68.Id. at 135.- 109 -


1. The Right of Communicati<strong>on</strong> to <strong>the</strong> Public in <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>TreatyArticle 8 of <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty provides a new right of “communicati<strong>on</strong> to <strong>the</strong>public” as follows:Without prejudice to <strong>the</strong> provisi<strong>on</strong>s of Articles 11(1)(ii), 11bis(1)(i) and (ii),11ter(1)(ii), 14(1)(ii) and 14bis(1) of <strong>the</strong> Berne C<strong>on</strong>venti<strong>on</strong>, authors of literaryand artistic works shall enjoy <strong>the</strong> exclusive right of authorizing anycommunicati<strong>on</strong> to <strong>the</strong> public of <strong>the</strong>ir works, by wire or wireless means, including<strong>the</strong> making available to <strong>the</strong> public of <strong>the</strong>ir works in such a way that members of<strong>the</strong> public may access <strong>the</strong>se works from a place and at a time individually chosenby <strong>the</strong>m.This new extended right of communicati<strong>on</strong> to <strong>the</strong> public is clearly meant to cover <strong>on</strong>linedisseminati<strong>on</strong> of works, and in that sense is broader than <strong>the</strong> existing rights of communicati<strong>on</strong> to<strong>the</strong> public in <strong>the</strong> Berne C<strong>on</strong>venti<strong>on</strong>, which are c<strong>on</strong>fined to performances, broadcasts, andrecitati<strong>on</strong>s of works. Specifically, Article 11(1)(ii) of <strong>the</strong> Berne C<strong>on</strong>venti<strong>on</strong> provides thatauthors of dramatic, dramatico-musical and musical works shall enjoy <strong>the</strong> exclusive right ofauthorizing “any communicati<strong>on</strong> to <strong>the</strong> public of <strong>the</strong> performance of <strong>the</strong>ir works.” Article11bis(1)(ii) provides that authors of literary and artistic works shall enjoy <strong>the</strong> exclusive right ofauthorizing “any communicati<strong>on</strong> to <strong>the</strong> public by wire or by rebroadcasting of <strong>the</strong> broadcast of<strong>the</strong> work, when this communicati<strong>on</strong> is made by an organizati<strong>on</strong> o<strong>the</strong>r than <strong>the</strong> original <strong>on</strong>e.”Finally, Article 11ter(1)(ii) provides that authors of literary works shall enjoy <strong>the</strong> exclusive rightof authorizing “any communicati<strong>on</strong> to <strong>the</strong> public of <strong>the</strong> recitati<strong>on</strong> of <strong>the</strong>ir works.”The new right of communicati<strong>on</strong> to <strong>the</strong> public in <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty appears tobe broader than <strong>the</strong> existing rights of reproducti<strong>on</strong>, display, performance, distributi<strong>on</strong>, andimportati<strong>on</strong> under current United States law in <strong>the</strong> following ways:No Requirement of a Copy. The right does not require <strong>the</strong> making or distributi<strong>on</strong> of“copies” of a work. It <strong>the</strong>refore removes <strong>the</strong> potential limitati<strong>on</strong>s <strong>on</strong> <strong>the</strong> rights ofreproducti<strong>on</strong> and distributi<strong>on</strong> under United States law stemming from <strong>the</strong> requirementof a “copy.”Right of Transmissi<strong>on</strong>. It affords <strong>the</strong> exclusive right to c<strong>on</strong>trol any “communicati<strong>on</strong>to <strong>the</strong> public” of a work “by wire or wireless means.” Although “communicati<strong>on</strong>” isnot defined in <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty, <strong>the</strong> reference to a communicati<strong>on</strong> “bywire or wireless means” seems clearly applicable to electr<strong>on</strong>ic transmissi<strong>on</strong>s of works(a right of transmissi<strong>on</strong>). This c<strong>on</strong>clusi<strong>on</strong> is bolstered by <strong>the</strong> fact that Article 2(g) of<strong>the</strong> WIPO Performances and Ph<strong>on</strong>ograms Treaty does c<strong>on</strong>tain a definiti<strong>on</strong> of“communicati<strong>on</strong> to <strong>the</strong> public,” which is defined in terms of “transmissi<strong>on</strong> to <strong>the</strong>public by any medium, o<strong>the</strong>r than broadcasting.” 465 This transmissi<strong>on</strong> right will465Article 2(f) of <strong>the</strong> WIPO Performances and Ph<strong>on</strong>ograms Treaty defines “broadcasting” to mean “<strong>the</strong>transmissi<strong>on</strong> by wireless means for public recepti<strong>on</strong> of sounds or of images and sounds or of <strong>the</strong> representati<strong>on</strong>s<strong>the</strong>reof ....” This definiti<strong>on</strong> seems to c<strong>on</strong>template isochr<strong>on</strong>ous transmissi<strong>on</strong>.- 110 -


potentially site <strong>the</strong> infringement at <strong>the</strong> place of transmissi<strong>on</strong>, in additi<strong>on</strong> to <strong>the</strong> pointof receipt of a transmitted work (under <strong>the</strong> reproducti<strong>on</strong> right).Right of Authorizati<strong>on</strong>. It also affords <strong>the</strong> exclusive right of “authorizing” anycommunicati<strong>on</strong> to <strong>the</strong> public. No actual communicati<strong>on</strong>s to <strong>the</strong> public are apparentlynecessary to infringe <strong>the</strong> right.Right of Access. The right of authorizing communicati<strong>on</strong>s to <strong>the</strong> public explicitlyincludes “making available to <strong>the</strong> public” a work “in such a way that members of <strong>the</strong>public may access” <strong>the</strong> work “from a place and a time individually chosen by <strong>the</strong>m”(a right of access). 466 This access right would seem to allow <strong>the</strong> copyright holder toremove an infringing posting of a work prior to any downloading of that work. Thisright may also expand potential liability bey<strong>on</strong>d just posters or recipients ofinfringing material <strong>on</strong> <strong>the</strong> <strong>Internet</strong> to include OSPs and BBS operators, who could besaid to make a work available to <strong>the</strong> public in such a way that members of <strong>the</strong> publicmay access it.The Agreed Statement for Article 8, however, appears aimed at limiting <strong>the</strong> breadth of<strong>the</strong> net of potential liability that Article 8 might establish. The Agreed Statement provides: “Itis understood that <strong>the</strong> mere provisi<strong>on</strong> of physical facilities for enabling or making acommunicati<strong>on</strong> does not in itself amount to communicati<strong>on</strong> within <strong>the</strong> meaning of this Treaty or<strong>the</strong> Berne C<strong>on</strong>venti<strong>on</strong>. It is fur<strong>the</strong>r understood that nothing in Article 8 precludes a C<strong>on</strong>tractingParty from applying Article 11bis(2).” It is unclear who <strong>the</strong> “mere” provider of “physicalfacilities” was meant to reference – <strong>on</strong>ly <strong>the</strong> provider of telecommunicati<strong>on</strong>s lines (such asph<strong>on</strong>e companies) through which a work is transmitted, or o<strong>the</strong>r service providers such as OSPsor BBS operators, who may provide “services” in additi<strong>on</strong> to “facilities.”Ano<strong>the</strong>r unclear point with respect to <strong>the</strong> scope of <strong>the</strong> right of communicati<strong>on</strong> to <strong>the</strong>public is who <strong>the</strong> “public” is. Nei<strong>the</strong>r <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty nor <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>Directive provide any explanati<strong>on</strong> of “to <strong>the</strong> public,” although <strong>the</strong> Commissi<strong>on</strong> in its 1997commentary to <strong>on</strong>e of <strong>the</strong> earlier drafts of <strong>the</strong> Directive stated that “public” included “individualmembers of <strong>the</strong> public,” but went <strong>on</strong> to state that “<strong>the</strong> provisi<strong>on</strong> does not cover mere privatecommunicati<strong>on</strong>s.” 467The right of transmissi<strong>on</strong> and access under Article 8 of <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty issimilar to (and potentially broader than) <strong>the</strong> amendment to U.S. copyright law proposed in <strong>the</strong>NII White Paper “to expressly recognize that copies or ph<strong>on</strong>orecords of works can be distributedto <strong>the</strong> public by transmissi<strong>on</strong>, and that such transmissi<strong>on</strong>s fall within <strong>the</strong> exclusive distributi<strong>on</strong>466467Although “public” is not defined in <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty, <strong>the</strong> reference in Article 10 to access bymembers of <strong>the</strong> public “from a place and at a time individually chosen by <strong>the</strong>m” is very similar to <strong>the</strong> definiti<strong>on</strong>of display or performance of a work “publicly” in Secti<strong>on</strong> 101 of <strong>the</strong> U.S. copyright statute, which applies“whe<strong>the</strong>r <strong>the</strong> members of <strong>the</strong> public capable of receiving <strong>the</strong> performance or display receive it in <strong>the</strong> same placeor in separate places and at <strong>the</strong> same time or at different times.”Harringt<strong>on</strong> & Berking, supra note 179, at 4.- 111 -


ight of <strong>the</strong> copyright owner.” 468 The NII White Paper’s proposal would expand <strong>the</strong> distributi<strong>on</strong>right, as opposed to creating a wholly new right, as <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty does. Theamendment proposed by <strong>the</strong> NII White Paper proved to be very c<strong>on</strong>troversial, and implementinglegislati<strong>on</strong> introduced in C<strong>on</strong>gress in 1996 ultimately did not win passage.2. The Right of Making Available to <strong>the</strong> Public in <strong>the</strong> WIPO Performancesand Ph<strong>on</strong>ograms TreatyArticles 10 and 14 of <strong>the</strong> WIPO Performances and Ph<strong>on</strong>ograms Treaty grant analogousrights for performers and producers of ph<strong>on</strong>ograms to <strong>the</strong> right of “communicati<strong>on</strong> to <strong>the</strong> public”c<strong>on</strong>tained in Article 8 of <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty. The WIPO Performances andPh<strong>on</strong>ograms Treaty, however, casts <strong>the</strong>se rights as <strong>on</strong>es of “making available to <strong>the</strong> public.”Specifically, Article 10 of <strong>the</strong> WIPO Performances and Ph<strong>on</strong>ograms Treaty provides:Performers shall enjoy <strong>the</strong> exclusive right of authorizing <strong>the</strong> making available to<strong>the</strong> public of <strong>the</strong>ir performances fixed in ph<strong>on</strong>ograms, by wire or wireless means,in such a way that members of <strong>the</strong> public may access <strong>the</strong>m from a place and at atime individually chosen by <strong>the</strong>m.Thus, Article 10 provides an exclusive right with respect to analog and digital <strong>on</strong>-demandtransmissi<strong>on</strong> of fixed performances. 469Similarly, Article 14 provides:Producers of ph<strong>on</strong>ograms shall enjoy <strong>the</strong> exclusive right of authorizing <strong>the</strong>making available to <strong>the</strong> public of <strong>the</strong>ir ph<strong>on</strong>ograms, by wire or wireless means, insuch a way that members of <strong>the</strong> public may access <strong>the</strong>m from a place and at atime individually chosen by <strong>the</strong>m.No Agreed Statements pertaining to Articles 10 and 14 were issued.Article 2(b) of <strong>the</strong> WIPO Performances and Ph<strong>on</strong>ograms Treaty defines a “ph<strong>on</strong>ogram”to mean “<strong>the</strong> fixati<strong>on</strong> of <strong>the</strong> sounds of a performance or of o<strong>the</strong>r sounds, or of a representati<strong>on</strong> ofsounds o<strong>the</strong>r than in <strong>the</strong> form of a fixati<strong>on</strong> incorporated in a cinematographic or o<strong>the</strong>raudiovisual work.” Article 2(c) defines “fixati<strong>on</strong>” broadly as “<strong>the</strong> embodiment of sounds, or of<strong>the</strong> representati<strong>on</strong>s <strong>the</strong>reof, from which <strong>the</strong>y can be perceived, reproduced or communicatedthrough a device.” Under this definiti<strong>on</strong>, storage of sounds <strong>on</strong> a computer would c<strong>on</strong>stitute a468469NII White Paper at 130.Rebecca F. Martin, “The WIPO Performances and Ph<strong>on</strong>ograms Treaty: Will <strong>the</strong> U.S. Whistle a New Tune?”, J.<str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Soc’y U.S.A., Spring 1997, at 157, 178. Art. 8 provides a correlative distributi<strong>on</strong> right with respectto more traditi<strong>on</strong>al forms of distributi<strong>on</strong>: “Performers shall enjoy <strong>the</strong> exclusive right of authorizing <strong>the</strong> makingavailable to <strong>the</strong> public of <strong>the</strong> original and copies of <strong>the</strong>ir performances fixed in ph<strong>on</strong>ograms through sale oro<strong>the</strong>r transfer of ownership.” The WIPO Performances and Ph<strong>on</strong>ograms Treaty also grants to authors in Art. 6<strong>the</strong> exclusive right of authorizing “<strong>the</strong> broadcasting and communicati<strong>on</strong> to <strong>the</strong> public of <strong>the</strong>ir unfixedperformances except where <strong>the</strong> performance is already a broadcast performance” as well as “<strong>the</strong> fixati<strong>on</strong> of<strong>the</strong>ir unfixed performances.”- 112 -


“fixati<strong>on</strong>,” and <strong>the</strong> fixed copy of such sounds would <strong>the</strong>refore c<strong>on</strong>stitute a “ph<strong>on</strong>ogram.”Accordingly, <strong>the</strong> making available to <strong>the</strong> public of sounds stored <strong>on</strong> a computer would seem tofall within <strong>the</strong> access rights of Articles 10 and 14.Because <strong>the</strong>re were no Agreed Statements generated in c<strong>on</strong>juncti<strong>on</strong> with Secti<strong>on</strong>s 10 and14 of <strong>the</strong> WIPO Performances and Ph<strong>on</strong>ograms Treaty, <strong>the</strong>re is no Agreed Statement similar tothat accompanying Article 8 in <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty for limiting liability for <strong>the</strong> mereprovisi<strong>on</strong> of physical facilities for enabling or making transmissi<strong>on</strong>s. Accordingly, <strong>on</strong>e will haveto await <strong>the</strong> implementing legislati<strong>on</strong> in <strong>the</strong> various countries to know how broadly <strong>the</strong> rights setup in Articles 10 and 14 will be codified into copyright laws throughout <strong>the</strong> world.3. The Right of Transmissi<strong>on</strong> and Access Under WIPO ImplementingLegislati<strong>on</strong>(a) United States Legislati<strong>on</strong>The DMCA does not c<strong>on</strong>tain any express implementati<strong>on</strong> of a right of “communicati<strong>on</strong>to <strong>the</strong> public” or of “making available to <strong>the</strong> public.” In view of this, <strong>the</strong> uncertainties discussedpreviously c<strong>on</strong>cerning whe<strong>the</strong>r <strong>the</strong> mere transmissi<strong>on</strong> or access of a copyrighted work throughan <strong>on</strong>line medium falls within existing United States rights of reproducti<strong>on</strong>, distributi<strong>on</strong>, publicdisplay, or public performance remain under <strong>the</strong> DMCA.With respect to <strong>the</strong> Article 10 right of making available to <strong>the</strong> public of fixedperformances, <strong>the</strong> recently enacted Digital Performance Rights in Sound Recordings Act grants<strong>the</strong>se rights for digital transmissi<strong>on</strong>s, although not for analog transmissi<strong>on</strong>s. 470 However,because <strong>the</strong> WIPO Performances and Ph<strong>on</strong>ograms Treaty grants <strong>the</strong>se rights with respect to bothdigital and analog transmissi<strong>on</strong>s, as well as with respect to spoken or o<strong>the</strong>r sounds in additi<strong>on</strong> tomusical works, it would seem that <strong>the</strong> United States might have to amend its copyright laws tocomply with <strong>the</strong> requirements of Article 10. 471Although <strong>the</strong> DMCA does not c<strong>on</strong>tain any express rights of transmissi<strong>on</strong> or access,recent case law suggests that courts may interpret existing copyright rights to afford <strong>the</strong>equivalent of a right of transmissi<strong>on</strong> and access. For example, in <strong>the</strong> recent case of Marobie-FL,Inc. v. Nati<strong>on</strong>al Associati<strong>on</strong> of Fire Equipment Distributors, 472 discussed previously, <strong>the</strong> courtc<strong>on</strong>cluded that <strong>the</strong> mere making available of <strong>the</strong> files for downloading was sufficient for liability,because “<strong>on</strong>ce <strong>the</strong> files were uploaded [<strong>on</strong>to <strong>the</strong> Web server], <strong>the</strong>y were available fordownloading by <strong>Internet</strong> users and … <strong>the</strong> [OSP] server transmitted <strong>the</strong> files to some <strong>Internet</strong>users when requested.” 473 From this statement, it appears that <strong>the</strong> court c<strong>on</strong>strued <strong>the</strong>distributi<strong>on</strong> and public display rights to cover both <strong>the</strong> making available of <strong>the</strong> clip art to <strong>the</strong>47047147247317 U.S.C. § 106(6).Martin, supra note 469, at 178-79.45 U.S.P.Q.2d 1236 (N.D. Ill. 1997).Id. at *12.- 113 -


public <strong>on</strong> <strong>the</strong> Web page (a right of access), as well as subsequent downloads by users (a right oftransmissi<strong>on</strong>).(b) The European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> DirectiveThe European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive explicitly adopts both <strong>the</strong> right of communicati<strong>on</strong> to<strong>the</strong> public of copyrighted works and <strong>the</strong> right of making available to <strong>the</strong> public of fixedperformances, by wire or wireless means, in language that parallels that of <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>Treaty and <strong>the</strong> WIPO Performances and Ph<strong>on</strong>ograms Treaty. Specifically, Article 3(1) of <strong>the</strong>European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive provides <strong>the</strong> following with respect to copyrighted works:Member States shall provide authors with <strong>the</strong> exclusive right to authorize orprohibit any communicati<strong>on</strong> to <strong>the</strong> public of <strong>the</strong>ir works, by wire or wirelessmeans, including <strong>the</strong> making available to <strong>the</strong> public of <strong>the</strong>ir works in such a waythat members of <strong>the</strong> public may access <strong>the</strong>m from a place and at a timeindividually chosen by <strong>the</strong>m.The comments to Article 3 define “communicati<strong>on</strong> to <strong>the</strong> public” to cover “any means orprocess o<strong>the</strong>r than <strong>the</strong> distributi<strong>on</strong> of physical copies. This includes communicati<strong>on</strong> by wire orby wireless means,” 474 which clearly encompasses a right of transmissi<strong>on</strong>. Indeed, <strong>the</strong> commentsexplicitly note: “One of <strong>the</strong> main objectives of <strong>the</strong> provisi<strong>on</strong> is to make it clear that interactive‘<strong>on</strong>-demand’ acts of transmissi<strong>on</strong>s are covered by this right.” 475 This <strong>the</strong>me is picked up inRecital (25) of <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive, which states, “It should be made clear that allrightholders recognized by this Directive should have an exclusive right to make available to <strong>the</strong>public copyright works or any o<strong>the</strong>r subject-matter by way of interactive <strong>on</strong>-demandtransmissi<strong>on</strong>s. Such interactive <strong>on</strong>-demand transmissi<strong>on</strong>s are characterized by <strong>the</strong> fact thatmembers of <strong>the</strong> public may access <strong>the</strong>m from a place and at a time individually chosen by <strong>the</strong>m.”Recital (27), however, echoes similar statements in <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty when it statesthat <strong>the</strong> “mere provisi<strong>on</strong> of physical facilities for enabling or making a communicati<strong>on</strong> does notin itself amount to communicati<strong>on</strong> within <strong>the</strong> meaning of this Directive.” The Recitals do notclear up <strong>the</strong> ambiguity previously noted in <strong>the</strong> WIPO Treaty as to who <strong>the</strong> “mere” provider of“physical facilities” was meant to reference – <strong>on</strong>ly <strong>the</strong> provider of telecommunicati<strong>on</strong>s lines(such as ph<strong>on</strong>e companies) through which a work is transmitted, or o<strong>the</strong>r service providers suchas OSPs or BBS operators.The comments to <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive also make clear that Article 3(1)affords a right to c<strong>on</strong>trol <strong>on</strong>line access to a work, apart from actual transmissi<strong>on</strong>s of <strong>the</strong> work:As was stressed during <strong>the</strong> WIPO Diplomatic C<strong>on</strong>ference, <strong>the</strong> critical act is <strong>the</strong>“making available of <strong>the</strong> work to <strong>the</strong> public,” thus <strong>the</strong> offering a work <strong>on</strong> apublicly accessible site, which precedes <strong>the</strong> stage of its actual “<strong>on</strong>-demand474475Commentary to Art. 3, 1.Id. 2.- 114 -


transmissi<strong>on</strong>.” It is not relevant whe<strong>the</strong>r it actually has been retrieved by anypers<strong>on</strong> or not. The “public” c<strong>on</strong>sists of individual “members of <strong>the</strong> public.” 476Similarly, Article 3(2) of <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive affords a right of makingavailable to <strong>the</strong> public of fixed performances by wire or wireless means:Member States shall provide for <strong>the</strong> exclusive right to authorize or prohibit <strong>the</strong>making available to <strong>the</strong> public, by wire or wireless means, in such a way thatmembers of <strong>the</strong> public may access <strong>the</strong>m from a place and at a time individuallychosen by <strong>the</strong>m:(a) for performers, of fixati<strong>on</strong>s of <strong>the</strong>ir performances;(b) for ph<strong>on</strong>ogram producers, of <strong>the</strong>ir ph<strong>on</strong>ograms;(c) for <strong>the</strong> producers of <strong>the</strong> first fixati<strong>on</strong> of films, of <strong>the</strong> original andcopies of <strong>the</strong>ir films;(d) for broadcasting organizati<strong>on</strong>s, of fixati<strong>on</strong>s of <strong>the</strong>ir broadcasts,whe<strong>the</strong>r <strong>the</strong>se broadcasts are transmitted by wire or over <strong>the</strong> air, including bycable or satellite.The right of Article 3(2) of <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive is actually broader than <strong>the</strong>right required under Article 10 of <strong>the</strong> WIPO Performances and Ph<strong>on</strong>ograms Treaty. The Article10 right of making available to <strong>the</strong> public applies <strong>on</strong>ly to performances fixed in “ph<strong>on</strong>ograms,”which Article 2 defines to mean <strong>the</strong> fixati<strong>on</strong> of <strong>the</strong> “sounds of a performance or of o<strong>the</strong>r soundso<strong>the</strong>r than in <strong>the</strong> form of a fixati<strong>on</strong> incorporated in a cinematographic or o<strong>the</strong>r audiovisualwork.” The Article 3(2) right of <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive goes fur<strong>the</strong>r, covering fixedperformances of audiovisual material as well. The comments to Article 3(2) of <strong>the</strong> European<str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive justify this extensi<strong>on</strong> of <strong>the</strong> right <strong>on</strong> <strong>the</strong> ground that audiovisual producti<strong>on</strong>sor multimedia products are as likely to be available <strong>on</strong>line as are sound recordings. 477In sum, <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive explicitly grants a right of transmissi<strong>on</strong> andaccess to copyrighted works and fixed performances, whereas <strong>the</strong> DMCA does not. It remains tobe seen how broadly <strong>the</strong>se rights mandated under <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive will beadopted in implementing legislati<strong>on</strong> in EC member countries. However, this disparity between<strong>the</strong> express rights afforded under United States law and <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive raisesc<strong>on</strong>siderable potential uncertainty. First, at a minimum, use of different language to denominate<strong>the</strong> various rights am<strong>on</strong>g countries may breed c<strong>on</strong>fusi<strong>on</strong>. Sec<strong>on</strong>d, differences of scope of <strong>the</strong>rights of transmissi<strong>on</strong> and access are likely to arise between <strong>the</strong> United States and <strong>the</strong> EC byvirtue of <strong>the</strong> fact that <strong>the</strong>se rights are spelled out as separate rights in <strong>the</strong> EC, whereas, if <strong>the</strong>yexist at all, <strong>the</strong>y are subsumed under a collecti<strong>on</strong> of various o<strong>the</strong>r rights in <strong>the</strong> United States.Adding fur<strong>the</strong>r to <strong>the</strong> potential c<strong>on</strong>fusi<strong>on</strong> is <strong>the</strong> possibility that some EC member countries may476477Id.Id. 3.- 115 -


adopt <strong>the</strong>se rights expressly, as mandated by <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive, whereas o<strong>the</strong>rcountries may, like <strong>the</strong> United States, deem <strong>the</strong>m to be subsumed in o<strong>the</strong>r rights already affordedunder that country’s laws.Because <strong>on</strong>line transmissi<strong>on</strong>s through <strong>the</strong> <strong>Internet</strong> are inherently global, <strong>the</strong>se disparitiesraise <strong>the</strong> possibility that rights of varying scope will apply to an <strong>on</strong>line transmissi<strong>on</strong> as it travelsthrough computers in various countries <strong>on</strong> <strong>the</strong> way to its ultimate destinati<strong>on</strong>. Similarly, legalrights of varying scope may apply depending up<strong>on</strong> in which country a work is actually firstaccessed. Given <strong>the</strong> ubiquitous nature of caching <strong>on</strong> <strong>the</strong> <strong>Internet</strong>, <strong>the</strong> site of <strong>the</strong> access may bearbitrary from a technical point of view, but significant from a legal point of view. Such asituati<strong>on</strong> would not afford <strong>the</strong> internati<strong>on</strong>al uniformity that <strong>the</strong> WIPO treaties seek to establish.G. New Rights and Provisi<strong>on</strong>s Under The Digital Millennium <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act, <strong>the</strong>European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive & Legislati<strong>on</strong> That Did Not PassThis Secti<strong>on</strong> discusses a number of new rights and provisi<strong>on</strong>s related to various areas ofcopyright law that are c<strong>on</strong>tained in <strong>the</strong> DMCA and <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive. Inadditi<strong>on</strong>, this Secti<strong>on</strong> discusses a number of interesting rights and provisi<strong>on</strong>s c<strong>on</strong>cerningcopyright in <strong>the</strong> <strong>on</strong>line c<strong>on</strong>text that were c<strong>on</strong>tained in proposed legislati<strong>on</strong> that did not passC<strong>on</strong>gress. These provisi<strong>on</strong>s are indicators of areas where future legislati<strong>on</strong> and/or debate mayarise.1. Circumventi<strong>on</strong> of Technological Measures and Rights ManagementInformati<strong>on</strong> Under <strong>the</strong> DMCABoth <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty and <strong>the</strong> WIPO Performances and Ph<strong>on</strong>ograms Treatyrequire signatories to establish certain obligati<strong>on</strong>s with respect to circumventi<strong>on</strong> of technologicalmeasures to protect copyrighted works and <strong>the</strong> preservati<strong>on</strong> and use of certain “rightsmanagement informati<strong>on</strong>.”With respect to <strong>the</strong> circumventi<strong>on</strong> of technological measures, Article 11 of <strong>the</strong> WIPO<str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty and Article 18 of <strong>the</strong> WIPO Performances and Ph<strong>on</strong>ograms Treaty requiretreaty signatories to “provide adequate legal protecti<strong>on</strong> and effective legal remedies against <strong>the</strong>circumventi<strong>on</strong> of effective technological measures” that are used by authors, performers andproducers of ph<strong>on</strong>ograms to restrict acts with respect to <strong>the</strong>ir copyrighted works that are notauthorized by <strong>the</strong> rights holders or permitted by law. 478With respect to <strong>the</strong> preservati<strong>on</strong> and use of rights management informati<strong>on</strong>, Article 12 of<strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty and Article 19 of <strong>the</strong> WIPO Performances and Ph<strong>on</strong>ograms Treaty478Shortly after <strong>the</strong> WIPO treaties were adopted, Assistant Secretary of Commerce and Commissi<strong>on</strong>er of Patentsand Trademarks Bruce Lehman, who headed <strong>the</strong> U.S. delegati<strong>on</strong> at <strong>the</strong> WIPO C<strong>on</strong>ference, noted that thisprovisi<strong>on</strong> is somewhat broader than <strong>the</strong> statutory language proposed <strong>on</strong> <strong>the</strong> subject in C<strong>on</strong>gress before adopti<strong>on</strong>of <strong>the</strong> treaties. He noted that implementati<strong>on</strong> of this treaty provisi<strong>on</strong> would <strong>the</strong>refore require new legislati<strong>on</strong>.“WIPO Delegates Agree <strong>on</strong> Two Treaties,” BNA’s Electr<strong>on</strong>ic Informati<strong>on</strong> Policy & Law Report (Jan. 3, 1997)at 23.- 116 -


equire treaty signatories to provide adequate and effective legal remedies against any pers<strong>on</strong>performing any of <strong>the</strong> following acts knowing (or, with respect to civil remedies, havingreas<strong>on</strong>able grounds to know) “that it will induce, enable, facilitate or c<strong>on</strong>ceal an infringement ofany right covered by this Treaty or <strong>the</strong> Berne C<strong>on</strong>venti<strong>on</strong>”: (i) removing or altering anyelectr<strong>on</strong>ic rights management informati<strong>on</strong> without authority or (ii) distributing, importing fordistributi<strong>on</strong>, broadcasting or communicating to <strong>the</strong> public, without authority, copies of worksknowing that electr<strong>on</strong>ic rights management informati<strong>on</strong> has been removed or altered withoutauthority. The treaties define “rights management informati<strong>on</strong>” as “informati<strong>on</strong> which identifies<strong>the</strong> work, <strong>the</strong> author of <strong>the</strong> work, <strong>the</strong> owner of any right in <strong>the</strong> work, or informati<strong>on</strong> about <strong>the</strong>terms and c<strong>on</strong>diti<strong>on</strong>s of use of <strong>the</strong> work, and any numbers or codes that represent suchinformati<strong>on</strong>, when any of <strong>the</strong>se items of informati<strong>on</strong> is attached to a copy of a work or appears inc<strong>on</strong>necti<strong>on</strong> with <strong>the</strong> communicati<strong>on</strong> of a work to <strong>the</strong> public.”This subsecti<strong>on</strong> 1 discusses <strong>the</strong> implementati<strong>on</strong> of <strong>the</strong>se rights in <strong>the</strong> DMCA. Thefollowing subsecti<strong>on</strong> 2 discusses <strong>the</strong> implementati<strong>on</strong> of <strong>the</strong>se rights under <strong>the</strong> European<str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive.The four bills that were introduced in C<strong>on</strong>gress to implement <strong>the</strong> WIPO treaties adopted<strong>on</strong>e of two approaches to <strong>the</strong> circumventi<strong>on</strong> of technological measures and rights managementinformati<strong>on</strong>. The first approach, c<strong>on</strong>tained in H.R. 2281 and S. 2037 and ultimately adopted in<strong>the</strong> DMCA, outlawed both c<strong>on</strong>duct and devices directed toward or used for circumventingtechnological copyright protecti<strong>on</strong> mechanisms. The sec<strong>on</strong>d approach, c<strong>on</strong>tained in S. 1146 andH.R. 3048 but not passed by C<strong>on</strong>gress, outlawed <strong>on</strong>ly c<strong>on</strong>duct involving <strong>the</strong> removal ordeactivati<strong>on</strong> of technological protecti<strong>on</strong> measures. Although Bruce Lehman c<strong>on</strong>ceded that <strong>the</strong>WIPO treaties do not mandate adopti<strong>on</strong> of a device-based approach, he and o<strong>the</strong>r supporters ofthis approach argued that a c<strong>on</strong>duct-<strong>on</strong>ly approach would be difficult to enforce and thatmeaningful legislati<strong>on</strong> should c<strong>on</strong>trol <strong>the</strong> devices used for circumventi<strong>on</strong>. 479The DMCA adds several new provisi<strong>on</strong>s to <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act, which are c<strong>on</strong>tained in anew Chapter 12.(a) Circumventi<strong>on</strong> of Technological Protecti<strong>on</strong> Measures(1) Prohibiti<strong>on</strong> <strong>on</strong> C<strong>on</strong>ductSecti<strong>on</strong> 1201(a)(1) of <strong>the</strong> DMCA outlaws c<strong>on</strong>duct to circumvent protecti<strong>on</strong> mechanismsthat c<strong>on</strong>trol access to a copyrighted work: “No pers<strong>on</strong> shall circumvent a technological measurethat effectively c<strong>on</strong>trols access to a work protected under this title.” Note that this provisi<strong>on</strong>does not expressly require ei<strong>the</strong>r knowledge or intent, and is <strong>the</strong>refore potentially very broad inits reach – <strong>the</strong> language states that <strong>the</strong> mere act of circumventi<strong>on</strong> is a violati<strong>on</strong>, and does notexpressly require that an infringement follow <strong>the</strong> circumventi<strong>on</strong> act (although some courts havegrafted such a requirement as discussed below). Secti<strong>on</strong> 1201(a)(3) defines “circumvent atechnological measure” as “to descramble a scrambled work, to decrypt an encrypted work, or479Cunard & Coplan, “WIPO Treaty Implementati<strong>on</strong>: Debate Over OSP Liability,” Computer Law Strategist(Oct. 1997) 1, 3.- 117 -


o<strong>the</strong>rwise to avoid, bypass, remove, deactivate, or impair a technological measure, without <strong>the</strong>authority of <strong>the</strong> copyright owner.” That secti<strong>on</strong> fur<strong>the</strong>r provides that a technological protecti<strong>on</strong>measure “effectively c<strong>on</strong>trols access to a work” if “<strong>the</strong> measure, in <strong>the</strong> ordinary course of itsoperati<strong>on</strong>, requires <strong>the</strong> applicati<strong>on</strong> of informati<strong>on</strong>, or a process or a treatment, with <strong>the</strong> authorityof <strong>the</strong> copyright owner, to gain access to <strong>the</strong> work.”Secti<strong>on</strong> 1201(a)(1) provides that <strong>the</strong> prohibiti<strong>on</strong> <strong>on</strong> circumventing a technologicalmeasure to gain unauthorized access to a work does not take effect until <strong>the</strong> end of a two-yearperiod beginning <strong>on</strong> <strong>the</strong> date of enactment of <strong>the</strong> bill – <strong>the</strong> two year waiting period expired <strong>on</strong>October 28, 2000, and <strong>the</strong> prohibiti<strong>on</strong> is now in effect.(i)Exempti<strong>on</strong>s Adopted by <strong>the</strong> Librarian of C<strong>on</strong>gress.Secti<strong>on</strong> 1201(a)(1) requires <strong>the</strong> Librarian of C<strong>on</strong>gress, up<strong>on</strong> recommendati<strong>on</strong> of <strong>the</strong>Register of <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>s and in c<strong>on</strong>sultati<strong>on</strong> with <strong>the</strong> Assistant Secretary of Commerce forCommunicati<strong>on</strong>s and Informati<strong>on</strong>, to c<strong>on</strong>duct a rulemaking 480 during <strong>the</strong> initial two-year period,and during each succeeding three-year period, to determine whe<strong>the</strong>r certain types of users ofcopyrighted works are, or are likely to be, adversely affected by <strong>the</strong> prohibiti<strong>on</strong> in Secti<strong>on</strong>1201(a)(1). 481 The Librarian must publish a list of particular classes of copyrighted works forwhich <strong>the</strong> rulemaking determines that n<strong>on</strong>infringing uses have been, or are likely to be,adversely affected, and <strong>the</strong> prohibiti<strong>on</strong>s of Secti<strong>on</strong> 1201(a) shall not apply to such users withrespect to such class of works for <strong>the</strong> ensuing three-year period.The Exempti<strong>on</strong>s of 2000. On Oct. 27, 2000, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office published <strong>the</strong> first setof classes of copyrighted works that <strong>the</strong> Librarian of C<strong>on</strong>gress determined would be exemptfrom <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>s of Secti<strong>on</strong> 1201(a)(1), with <strong>the</strong> exempti<strong>on</strong> to be in effectuntil Oct. 28, 2003. 482 Those classes, which were <strong>on</strong>ly two in number and very narrowlydefined, were as follows:1. Compilati<strong>on</strong>s c<strong>on</strong>sisting of lists of websites blocked by filtering software andapplicati<strong>on</strong>s. The Librarian determined that an exempti<strong>on</strong> was necessary to avoid an adverseeffect <strong>on</strong> pers<strong>on</strong>s who wish to criticize and comment <strong>on</strong> such lists, because <strong>the</strong>y would not beable to ascertain which sites are <strong>on</strong> <strong>the</strong> lists unless <strong>the</strong>y circumvented encrypti<strong>on</strong> protecting <strong>the</strong>c<strong>on</strong>tents of <strong>the</strong> lists. 483480481482483As originally passed by C<strong>on</strong>gress, secti<strong>on</strong> 1201(a)(1) required that <strong>the</strong> rulemaking be <strong>on</strong> <strong>the</strong> record. However,<strong>the</strong> Intellectual Property and Communicati<strong>on</strong>s Omnibus Reform Act of 1999, P.L. 106-113, passed by C<strong>on</strong>gress<strong>on</strong> Nov. 19, 1999 and signed by <strong>the</strong> President in late 1999, removed <strong>the</strong> requirement that <strong>the</strong> rulemaking be “<strong>on</strong><strong>the</strong> record.”Secti<strong>on</strong> 1201(a)(C) provides that in c<strong>on</strong>ducting <strong>the</strong> rulemaking, <strong>the</strong> Librarian shall examine <strong>the</strong> availability foruse of copyrighted works; <strong>the</strong> availability for use of works for n<strong>on</strong>profit archival, preservati<strong>on</strong>, and educati<strong>on</strong>alpurposes; <strong>the</strong> impact that <strong>the</strong> prohibiti<strong>on</strong> <strong>on</strong> <strong>the</strong> circumventi<strong>on</strong> of technological measures applied tocopyrighted works has <strong>on</strong> criticism, comment, news reporting, teaching, scholarship, or research; and <strong>the</strong> effectof circumventi<strong>on</strong> of technological measures <strong>on</strong> <strong>the</strong> market for or value of copyrighted works.65 Fed. Reg. 64556 (Oct. 27, 2000).Id. at 64564.- 118 -


2. Literary works, including computer programs and databases, protected by accessc<strong>on</strong>trol mechanisms that fail to permit access because of malfuncti<strong>on</strong>, damage or obsoleteness.The Librarian determined that an exempti<strong>on</strong> was necessary to gain access to literary worksprotected by access c<strong>on</strong>trol mechanisms, such as d<strong>on</strong>gles or o<strong>the</strong>r mechanisms, that malfuncti<strong>on</strong>or become obsolete. 484The Exempti<strong>on</strong>s of 2003. On Oct. 27, 2003, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office issued <strong>the</strong> sec<strong>on</strong>ddeterminati<strong>on</strong> of <strong>the</strong> classes of copyrighted works that <strong>the</strong> Librarian decided should have anexempti<strong>on</strong>, with <strong>the</strong> exempti<strong>on</strong> to be in effect until Oct. 27, 2006. 485 The classes, which are <strong>on</strong>lyfour in number and even more specifically defined than <strong>the</strong> first set of classes, 486 were asfollows:1. Compilati<strong>on</strong>s c<strong>on</strong>sisting of lists of <strong>Internet</strong> locati<strong>on</strong>s blocked by commerciallymarketed filtering software applicati<strong>on</strong>s that are intended to prevent access to domains, websitesor porti<strong>on</strong>s of websites, but not including lists of <strong>Internet</strong> locati<strong>on</strong>s blocked by softwareapplicati<strong>on</strong>s that operate exclusively to protect against damage to a computer or computernetwork or lists of <strong>Internet</strong> locati<strong>on</strong>s blocked by software applicati<strong>on</strong>s that operate exclusively toprevent receipt of email. 487 The Librarian defined “<strong>Internet</strong> locati<strong>on</strong>s” to “include domains,uniform resource locators (URLs), numeric IP addresses or any combinati<strong>on</strong> <strong>the</strong>reof. 488 Thisclass is similar to <strong>the</strong> first class of exempti<strong>on</strong>s in <strong>the</strong> Librarian’s first determinati<strong>on</strong>, but wasnarrowed so as to exclude <strong>the</strong> ability to circumvent blocked lists associated with firewalls, antivirussoftware and anti-spam software. 4892. Computer programs protected by d<strong>on</strong>gles that prevent access due to malfuncti<strong>on</strong> ordamage and which are obsolete. This class is similar to <strong>the</strong> sec<strong>on</strong>d class of exempti<strong>on</strong>s in <strong>the</strong>Librarian’s first determinati<strong>on</strong>, but was narrowed to cover <strong>on</strong>ly <strong>the</strong> case of obsolete d<strong>on</strong>glesbecause <strong>the</strong> Librarian found that this was <strong>the</strong> <strong>on</strong>ly class for which adequate factual support of484485486487488489Id. at 64564-66. For <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office’s rati<strong>on</strong>ale for rejecting an exempti<strong>on</strong> for a host of o<strong>the</strong>r proposedclasses of works, see id. at 64566-74.68 Fed. Reg. 62011 (Oct. 31, 2003).A statement accompanying <strong>the</strong> Librarian’s decisi<strong>on</strong> with respect to <strong>the</strong> exempted classes partially explained <strong>the</strong>narrowness of <strong>the</strong> classes: “It is important to understand <strong>the</strong> purposes of this rulemaking, as stated in <strong>the</strong> law,and <strong>the</strong> role I have in it. The rulemaking is not a broad evaluati<strong>on</strong> of <strong>the</strong> successes or failures of <strong>the</strong> DMCA.The purpose of <strong>the</strong> proceeding is to determine whe<strong>the</strong>r current technologies that c<strong>on</strong>trol access to copyrightedworks are diminishing <strong>the</strong> ability of individuals to use works in lawful, n<strong>on</strong>infringing ways. The DMCA doesnot forbid <strong>the</strong> act of circumventing copy c<strong>on</strong>trols, and <strong>the</strong>refore this rulemaking proceeding is not abouttechnologies that c<strong>on</strong>trol copying. Some of <strong>the</strong> people who participated in <strong>the</strong> rulemaking did not understandthat and made proposals based <strong>on</strong> <strong>the</strong>ir dissatisfacti<strong>on</strong> with copy c<strong>on</strong>trols. O<strong>the</strong>r participants soughtexempti<strong>on</strong>s that would permit <strong>the</strong>m to circumvent access c<strong>on</strong>trols <strong>on</strong> all works when <strong>the</strong>y are engaging inparticular n<strong>on</strong>infringing uses of those works. The law does not give me that power.” Statement of <strong>the</strong>Librarian of C<strong>on</strong>gress Relating to Secti<strong>on</strong> 1201 Rulemaking, available as of Oct. 30, 2003 atwww.copyright.gov/1201/docs/librarian_statement_01.html.68 Fed. Reg. at 62013.Id.Id.- 119 -


potential harm had been submitted in <strong>the</strong> sec<strong>on</strong>d rulemaking proceeding. 490 The Librariandefined “obsolete” as “no l<strong>on</strong>ger manufactured or reas<strong>on</strong>ably available in <strong>the</strong> commercialmarketplace.” 4913. Computer programs and video games distributed in formats that have become obsoleteand which require <strong>the</strong> original media or hardware as a c<strong>on</strong>diti<strong>on</strong> of access. A format shall bec<strong>on</strong>sidered obsolete if <strong>the</strong> machine or system necessary to render perceptible a work stored inthat format is no l<strong>on</strong>ger manufactured or is no l<strong>on</strong>ger reas<strong>on</strong>ably available in <strong>the</strong> commercialmarketplace. The Librarian determined that this exempti<strong>on</strong> is necessary to allow archiving orc<strong>on</strong>tinued use of computer programs and video games that are subject to “original media <strong>on</strong>ly”restricti<strong>on</strong>s, are stored <strong>on</strong> media no l<strong>on</strong>ger in use, such as 5.25” floppy disks, or require use of anobsolete operating system. 4924. Literary works distributed in ebook format when all existing ebook editi<strong>on</strong>s of <strong>the</strong>work (including digital text editi<strong>on</strong>s made available by authorized entities) c<strong>on</strong>tain accessc<strong>on</strong>trols that prevent <strong>the</strong> enabling of <strong>the</strong> ebook’s read-aloud functi<strong>on</strong> and that prevent <strong>the</strong>enabling of screen readers to render <strong>the</strong> text into a specialized format. The Librarian defined“specialized format,” “digital text” and “authorized entities” to have <strong>the</strong> same meaning as in 17U.S.C. § 121. 493 The Librarian determined that this exempti<strong>on</strong> is necessary in resp<strong>on</strong>se toproblems experienced by <strong>the</strong> blind and visually impaired in gaining meaningful access to literaryworks distributed as ebooks. 494For <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office’s rati<strong>on</strong>ale for rejecting an exempti<strong>on</strong> for a host of o<strong>the</strong>rproposed classes of works, see 68 Fed. Reg. at 62014-18. One of <strong>the</strong> more interesting proposedexempti<strong>on</strong>s that <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office rejected was <strong>on</strong>e submitted by Static C<strong>on</strong>trol Comp<strong>on</strong>ents,Inc. in resp<strong>on</strong>se to <strong>the</strong> district court’s ruling in <strong>the</strong> case of Lexmark Internati<strong>on</strong>al, Inc. v. StaticC<strong>on</strong>trol Comp<strong>on</strong>ents, Inc., 495 discussed in Secti<strong>on</strong> II.G.1(o)(1) below. In that case, <strong>the</strong> districtcourt ruled <strong>on</strong> a moti<strong>on</strong> for a preliminary injuncti<strong>on</strong> that Static C<strong>on</strong>trol violated Secti<strong>on</strong>1201(a)(2) by distributing microchips that were used to replace <strong>the</strong> microchip found in plaintiffLexmark’s t<strong>on</strong>er cartridges so as to circumvent Lexmark’s au<strong>the</strong>nticati<strong>on</strong> sequence thatprevented <strong>the</strong> printer engine software <strong>on</strong> <strong>the</strong> Lexmark printer from allowing <strong>the</strong> printer tooperate with a refilled t<strong>on</strong>er cartridge. In view of this ruling, Static C<strong>on</strong>trol submitted aproposed exempti<strong>on</strong> to <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office to permit circumventi<strong>on</strong> of access c<strong>on</strong>trols <strong>on</strong>computer programs embedded in computer printers and t<strong>on</strong>er cartridges and that c<strong>on</strong>trol <strong>the</strong>interoperati<strong>on</strong> and functi<strong>on</strong>s of <strong>the</strong> printer and t<strong>on</strong>er cartridge. The <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office c<strong>on</strong>cludedthat <strong>the</strong> statutory exempti<strong>on</strong> set forth in Secti<strong>on</strong> 1201(f), discussed in Secti<strong>on</strong> II.G.1(g) below,490491492493494495Id. at 62013-14.Id. at 62018.Id. at 62014.Id.Id.253 F. Supp. 2d 943, 948-49 (E.D. Ky. 2003), rev’d, 387 F.3d 522 (6 th Cir. 2004), reh’g denied, 2004 U.S.App. LEXIS 27,422 (Dec. 29, 2004), reh’g en banc denied, 2005 U.S. App. LEXIS 3330 (6rh Cir. Feb. 15,2005).- 120 -


already adequately addressed <strong>the</strong> c<strong>on</strong>cerns of t<strong>on</strong>er cartridge re-manufacturers. 496 The rati<strong>on</strong>alefor <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office’s c<strong>on</strong>clusi<strong>on</strong> is discussed fur<strong>the</strong>r in Secti<strong>on</strong> II.G.1(g) below.The Exempti<strong>on</strong>s of 2006. On Nov. 27, 2006, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office issued <strong>the</strong> thirddeterminati<strong>on</strong> of <strong>the</strong> classes of copyrighted works that <strong>the</strong> Librarian decided should have anexempti<strong>on</strong>, with <strong>the</strong> exempti<strong>on</strong> to be in effect until Oct. 27, 2009. 497 In previous rulemakings,<strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office had determined that an exempted class must be based primarily <strong>on</strong>attributes of <strong>the</strong> work itself and not <strong>the</strong> nature of <strong>the</strong> use or <strong>the</strong> user. In its 2006 ruling, <strong>the</strong><str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office determined for <strong>the</strong> first time that in certain circumstances it would bepermissible to refine <strong>the</strong> descripti<strong>on</strong> of a class of works by reference to <strong>the</strong> type of user who maytake advantage of <strong>the</strong> exempti<strong>on</strong> or by reference to <strong>the</strong> type of use of <strong>the</strong> work that may be madepursuant to <strong>the</strong> exempti<strong>on</strong>, and <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office applied this refinement to some of <strong>the</strong>classes of works exempted. 498The exempted classes of works in <strong>the</strong> 2006 ruling are <strong>the</strong> following:1. “Audiovisual works included in <strong>the</strong> educati<strong>on</strong>al library of a college or university’sfilm or media studies department, when circumventi<strong>on</strong> is accomplished for <strong>the</strong> purpose ofmaking compilati<strong>on</strong>s of porti<strong>on</strong>s of those works for educati<strong>on</strong>al use in <strong>the</strong> classroom by mediastudies or film professors.” 499 This exempti<strong>on</strong> was <strong>the</strong> first <strong>on</strong>e to define <strong>the</strong> class by referenceto particular types of uses and users.2. “Computer programs and video games distributed in formats that have becomeobsolete and that require <strong>the</strong> original media or hardware as a c<strong>on</strong>diti<strong>on</strong> of access, whencircumventi<strong>on</strong> is accomplished for <strong>the</strong> purpose of preservati<strong>on</strong> or archival reproducti<strong>on</strong> ofpublished digital works by a library or archive. A format shall be c<strong>on</strong>sidered obsolete if <strong>the</strong>machine or system necessary to render perceptible a work stored in that format is no l<strong>on</strong>germanufactured or is no l<strong>on</strong>ger reas<strong>on</strong>ably available in <strong>the</strong> commercial marketplace.” 500 Thisexempti<strong>on</strong> is <strong>the</strong> same as <strong>the</strong> third class in <strong>the</strong> 2003 ruling, except that a definiti<strong>on</strong> of whatrenders c<strong>on</strong>stitutes an obsolete format was added.3. “Computer programs protected by d<strong>on</strong>gles that prevent access due to malfuncti<strong>on</strong> ordamage and which are obsolete. A d<strong>on</strong>gle shall be c<strong>on</strong>sidered obsolete if it is no l<strong>on</strong>germanufactured or if a replacement or repair is no l<strong>on</strong>ger reas<strong>on</strong>ably available in <strong>the</strong> commercialmarketplace.” 501 This exempti<strong>on</strong> is <strong>the</strong> same as <strong>the</strong> sec<strong>on</strong>d class in <strong>the</strong> 2003 ruling.4. “Literary works distributed in ebook format when all existing ebook editi<strong>on</strong>s of <strong>the</strong>work (including digital text editi<strong>on</strong>s made available by authorized entities) c<strong>on</strong>tain access49649749849950050168 Fed. Reg. at 62017.71 Fed. Reg. 68472 (Nov. 27, 2006).Id. at 68473-74.Id.Id. at 68474.Id. at 68475.- 121 -


c<strong>on</strong>trols that prevent <strong>the</strong> enabling ei<strong>the</strong>r of <strong>the</strong> book’s read-aloud functi<strong>on</strong> or of screen readersthat render <strong>the</strong> text into a specialized format.” 502 This exempti<strong>on</strong> is similar to <strong>the</strong> fourth class in<strong>the</strong> 2003 ruling, except that <strong>the</strong> two requirements in <strong>the</strong> descripti<strong>on</strong> of <strong>the</strong> access c<strong>on</strong>trols isphrased in <strong>the</strong> disjunctive, whereas in <strong>the</strong> 2003 ruling it was phrased in <strong>the</strong> c<strong>on</strong>junctive.5. “Computer programs in <strong>the</strong> form of firmware that enable wireless teleph<strong>on</strong>e handsetsto c<strong>on</strong>nect to a wireless teleph<strong>on</strong>e communicati<strong>on</strong> network, when circumventi<strong>on</strong> is accomplishedfor <strong>the</strong> sole purpose of lawfully c<strong>on</strong>necting to a wireless teleph<strong>on</strong>e communicati<strong>on</strong> network.” 503This is a new exempti<strong>on</strong>, and is ano<strong>the</strong>r <strong>on</strong>e defined by reference to a particular type of use. Thepurpose of this exempti<strong>on</strong> is to address <strong>the</strong> use of software locks that prevent customers fromusing <strong>the</strong>ir handsets <strong>on</strong> a competitor’s network, even after all c<strong>on</strong>tractual obligati<strong>on</strong>s to <strong>the</strong>original wireless carrier have been satisfied, by c<strong>on</strong>trolling access to <strong>the</strong> firmware that operates<strong>the</strong> mobile ph<strong>on</strong>e. The <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office justified <strong>the</strong> exempti<strong>on</strong> by noting that “in this case, <strong>the</strong>access c<strong>on</strong>trols do not appear to actually be deployed in order to protect <strong>the</strong> interests of <strong>the</strong>copyright owner or <strong>the</strong> value or integrity of <strong>the</strong> copyrighted work; ra<strong>the</strong>r, <strong>the</strong>y are used bywireless carriers to limit <strong>the</strong> ability of subscribers to switch to o<strong>the</strong>r carriers, a business decisi<strong>on</strong>that has nothing whatsoever to do with <strong>the</strong> interests protected by copyright. … When applicati<strong>on</strong>of <strong>the</strong> prohibiti<strong>on</strong> <strong>on</strong> circumventi<strong>on</strong> of access c<strong>on</strong>trols would offer no apparent benefit to <strong>the</strong>author or copyright owner in relati<strong>on</strong> to <strong>the</strong> work to which access is c<strong>on</strong>trolled, but simply offersa benefit to a third party who may use § 1201 to c<strong>on</strong>trol <strong>the</strong> use of hardware which, as isincreasingly <strong>the</strong> case, may be operated in part through <strong>the</strong> use of computer software or firmware,an exempti<strong>on</strong> may well be warranted.” 504 The rati<strong>on</strong>ale underlying this class is an important<strong>on</strong>e, and may be applied to justify more exempted classes in future rulemakings by <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>Office.TracF<strong>on</strong>e Cases.a. Scope of <strong>the</strong> Network C<strong>on</strong>necti<strong>on</strong> Exempti<strong>on</strong> – TheIn TracF<strong>on</strong>e Wireless, Inc. v. Dix<strong>on</strong>, 505 <strong>the</strong> court ruled that this exempti<strong>on</strong> did not applyto <strong>the</strong> defendants’ resale of unlocked TracF<strong>on</strong>e ph<strong>on</strong>es that would work <strong>on</strong> wireless serviceso<strong>the</strong>r than TracF<strong>on</strong>e’s, because <strong>the</strong> defendants’ unlocking activity “was for <strong>the</strong> purpose ofreselling those handsets for a profit, and not ‘for <strong>the</strong> sole purpose of lawfully c<strong>on</strong>necting to awireless teleph<strong>on</strong>e communicati<strong>on</strong> network.’” 506 Thus, under this court’s view, <strong>the</strong> exempti<strong>on</strong>appears to be targeted to acts by individual owners of handsets who circumvent <strong>the</strong> ph<strong>on</strong>e’s lockto enable <strong>the</strong>ir pers<strong>on</strong>al use of <strong>the</strong>ir own handset <strong>on</strong> ano<strong>the</strong>r wireless network. It is unclear from<strong>the</strong> court’s brief analysis whe<strong>the</strong>r <strong>the</strong> exempti<strong>on</strong> would cover those who sell <strong>the</strong> “computerfirmware” referenced in <strong>the</strong> exempti<strong>on</strong> (and not <strong>the</strong> unlocked ph<strong>on</strong>e itself) that enables anindividual to accomplish unlocking of his or her ph<strong>on</strong>e. It also unclear whe<strong>the</strong>r <strong>the</strong> reference in502503504505506Id.Id. at 68476.Id.475 F. Supp. 2d 1236 (M.D. Fla. 2007).Id. at 1238.- 122 -


<strong>the</strong> exempti<strong>on</strong> <strong>on</strong>ly to “computer firmware” means that it would not apply to services renderedby a third party in assisting an individual to unlock a ph<strong>on</strong>e for a fee.In TracF<strong>on</strong>e Wireless, Inc. v. Riedeman, 507 TracF<strong>on</strong>e brought claims under Secti<strong>on</strong> 1201of <strong>the</strong> DMCA based <strong>on</strong> <strong>the</strong> defendant’s resale of TracF<strong>on</strong>e ph<strong>on</strong>es for which <strong>the</strong> prepaidsoftware had been disabled. The defendant failed to file a resp<strong>on</strong>se to <strong>the</strong> complaint and <strong>the</strong>clerk entered a default against <strong>the</strong> defendant. The court entered a judgment finding that <strong>the</strong>defendant had violated Secti<strong>on</strong> 1201 by circumventing technological measures that c<strong>on</strong>trolledaccess to proprietary software in <strong>the</strong> ph<strong>on</strong>es and by trafficking in services that circumventedtechnological measures protecting <strong>the</strong> software. The court also ruled that <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Officeexempti<strong>on</strong> did not apply to <strong>the</strong> defendant’s activities because <strong>the</strong> defendant’s “purchase andresale of <strong>the</strong> TracF<strong>on</strong>e handsets was for <strong>the</strong> purpose of reselling those handsets for a profit, andnot ‘for <strong>the</strong> sole purpose of lawfully c<strong>on</strong>necting to a wireless teleph<strong>on</strong>e communicati<strong>on</strong>network.’” 508 The court entered a judgment against <strong>the</strong> defendant for statutory damages in <strong>the</strong>amount of $1,020,800. 509 Interestingly, <strong>the</strong> court entered an injuncti<strong>on</strong> against <strong>the</strong> defendant thatprohibited <strong>the</strong> defendant from even “purchasing … any wireless mobile ph<strong>on</strong>e that <strong>the</strong>y know orshould know bears any TracF<strong>on</strong>e Trademark ….” 510In TracF<strong>on</strong>e Wireless, Inc. v. GSM Group, Inc., 511 <strong>the</strong> defendant was engaged in bulkpurchase, reflashing, and redistributing TracF<strong>on</strong>e ph<strong>on</strong>es. The plaintiff brought claims underSecti<strong>on</strong> 1201 for circumventi<strong>on</strong> and trafficking in circumventi<strong>on</strong> technology, and <strong>the</strong> defendantmoved to dismiss for failure to state a claim, relying <strong>on</strong> <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office exempti<strong>on</strong>. Thecourt denied <strong>the</strong> moti<strong>on</strong>, ruling that <strong>the</strong> exempti<strong>on</strong> did not apply because, citing <strong>the</strong> Dix<strong>on</strong> case,<strong>the</strong> purpose of <strong>the</strong> defendant’s circumventi<strong>on</strong> was to resell wireless teleph<strong>on</strong>e handsets for profitand not for <strong>the</strong> sole purpose of lawfully c<strong>on</strong>necting to a wireless teleph<strong>on</strong>e communicati<strong>on</strong>snetwork. 512 The court subsequently entered final judgment and a permanent injuncti<strong>on</strong> against<strong>the</strong> defendants based <strong>on</strong> <strong>the</strong> DMCA claims <strong>on</strong> <strong>the</strong> same rati<strong>on</strong>ale. The permanent injuncti<strong>on</strong>prohibited <strong>the</strong> defendants from purchasing or selling any wireless mobile ph<strong>on</strong>e that <strong>the</strong>defendants knew or should have known bore any TracF<strong>on</strong>e trademark and from reflashing orunlocking any such ph<strong>on</strong>e. The court retained jurisdicti<strong>on</strong> over <strong>the</strong> matter to punish anyviolati<strong>on</strong> of <strong>the</strong> permanent injuncti<strong>on</strong> in an amount of not less than $5,000 for each TracF<strong>on</strong>ehandset that a defendant was found to have purchased, sold, or unlocked in violati<strong>on</strong> of <strong>the</strong>injuncti<strong>on</strong>, or $250,000, whichever was greater. 5135075085095105115125132007 Copyr. L. Dec. 29,500 (M.D. Fla. 2007).Id. at p. 40,531.Id.Id.555 F. Supp. 2d 1331 (S.D. Fla. 2008).Id. at 1336-37.TracF<strong>on</strong>e Wireless, Inc. v. GSM Groups, Inc., No. 07-23166-C1V Martinez-Brown, slip op. at 4-6 (S.D. Fla.Aug. 15, 2008).- 123 -


Similarly, in TracF<strong>on</strong>e Wireless, Inc. v. Bitcell Corp., 514 <strong>the</strong> court found <strong>the</strong> defendant’sunlocking and resale of TracF<strong>on</strong>e ph<strong>on</strong>es to c<strong>on</strong>stitute a violati<strong>on</strong> of Secti<strong>on</strong> 1201. The courtnoted that TracF<strong>on</strong>e ph<strong>on</strong>es were sold subject to terms and c<strong>on</strong>diti<strong>on</strong>s restricting use and sale of<strong>the</strong> ph<strong>on</strong>es that were set forth in printed inserts included in <strong>the</strong> packaging with <strong>the</strong> ph<strong>on</strong>es, wereavailable to <strong>the</strong> public <strong>on</strong> TracF<strong>on</strong>e’s web site, and were referenced in printed warnings placed<strong>on</strong> <strong>the</strong> outside of <strong>the</strong> retail packaging of <strong>the</strong> ph<strong>on</strong>es. 515 With no legal analysis, <strong>the</strong> court simplystated that <strong>the</strong> “Terms and C<strong>on</strong>diti<strong>on</strong>s and language <strong>on</strong> <strong>the</strong> packaging c<strong>on</strong>stitute a valid bindingc<strong>on</strong>tract.” 516 The court ruled that <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office exempti<strong>on</strong> did not apply because <strong>the</strong>defendant’s c<strong>on</strong>duct “was for <strong>the</strong> purpose of reselling those Ph<strong>on</strong>es for a profit, and not ‘for <strong>the</strong>sole purpose of lawfully c<strong>on</strong>necting to a wireless teleph<strong>on</strong>e communicati<strong>on</strong> network.’” 517 As in<strong>the</strong> Riedeman case, <strong>the</strong> court entered an injuncti<strong>on</strong> against <strong>the</strong> defendant that prohibited <strong>the</strong>defendant from even “purchasing … any wireless mobile ph<strong>on</strong>e that <strong>the</strong>y know or should knowbears any Registered TracF<strong>on</strong>e Trademark ….” 518 The court ruled that any violati<strong>on</strong> of <strong>the</strong>injuncti<strong>on</strong> would be subject to a finding of c<strong>on</strong>tempt and a payment of liquated damages toTracF<strong>on</strong>e of <strong>the</strong> greater of $250,000 or $5,000 for each TracF<strong>on</strong>e handset purchased, sold,unlocked, altered in any way, or shipped. 519In a virtually identical opini<strong>on</strong> under similar facts, in TracF<strong>on</strong>e Wireless, Inc. v. AnadiskLLC, 520 <strong>the</strong> same court found a violati<strong>on</strong> of Secti<strong>on</strong> 1201, imposed <strong>the</strong> maximum statutorydamages award of $2,500 per ph<strong>on</strong>e <strong>on</strong> 4,990 ph<strong>on</strong>es for a total award of $12,375,000, andentered a similar injuncti<strong>on</strong>. The court ruled that any violati<strong>on</strong> of <strong>the</strong> injuncti<strong>on</strong> would besubject to a finding of c<strong>on</strong>tempt and a payment of liquated damages to TracF<strong>on</strong>e of <strong>the</strong> greater of$1,000,000 or $5,000 for each TracF<strong>on</strong>e handset purchased, sold, unlocked, altered in any way,or shipped. 521And again in TracF<strong>on</strong>e Wireless, Inc. v. SND Cellular, Inc., <strong>the</strong> same court imposed <strong>the</strong>maximum statutory damages award of $11,370,000 based <strong>on</strong> trafficking in a minimum of 4,548ph<strong>on</strong>es and entered a similar injuncti<strong>on</strong>. Again <strong>the</strong> court ruled that any violati<strong>on</strong> of <strong>the</strong>injuncti<strong>on</strong> would be subject to a finding of c<strong>on</strong>tempt and a payment of liquated damages toTracF<strong>on</strong>e of <strong>the</strong> greater of $1,000,000 or $5,000 for each TracF<strong>on</strong>e handset purchased, sold,unlocked, re-flashed, altered in any way, or shipped. 5225145155165175185195205215222008 U.S. Dist. LEXIS 41955 (S.D. Fla. May 28, 2008).Id. at *3.Id.Id. at *8.Id. at *9.Id. at *12.685 F. Supp. 2d 1304 (S.D. Fla. 2010).Id. at 1317-18 & 1319-20.TracF<strong>on</strong>e Wireless, Inc. v. SND Cellular, Inc., 2010 U.S. Dist. LEXIS 64064 (S.D. Fla. May 21, 2010) at *36-40.- 124 -


6. “Sound recordings, and audiovisual works associated with those sound recordings,distributed in compact disc format and protected by technological protecti<strong>on</strong> measures thatc<strong>on</strong>trol access to lawfully purchased works and create or exploit security flaws or vulnerabilitiesthat compromise <strong>the</strong> security of pers<strong>on</strong>al computers, when circumventi<strong>on</strong> is accomplished solelyfor <strong>the</strong> purpose of good faith testing, investigating, or correcting such security flaws orvulnerabilities.” 523 This exempti<strong>on</strong> was prompted by <strong>the</strong> notorious case of <strong>the</strong> DRM technologythat S<strong>on</strong>y BMG Music added to some music CDs distributed in 2005 and that went awry,causing damage to users’ computers.Am<strong>on</strong>g <strong>the</strong> proposed classes that <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office rejected was <strong>the</strong> interesting <strong>on</strong>e ofan exempti<strong>on</strong> for “space-shifting” to permit circumventi<strong>on</strong> of access c<strong>on</strong>trols applied toaudiovisual and musical works in order to copy <strong>the</strong>se works to o<strong>the</strong>r media or devices and toaccess <strong>the</strong>se works <strong>on</strong> those alternative media or devices. The <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office rejected <strong>the</strong>proposal <strong>on</strong> <strong>the</strong> ground that those proposing <strong>the</strong> exempti<strong>on</strong> “uniformly failed to cite legalprecedent that establishes that such space-shifting is, in fact, a n<strong>on</strong>infringing use. The Registerc<strong>on</strong>cludes that <strong>the</strong> reproducti<strong>on</strong> of those works <strong>on</strong>to new devices is an infringement of <strong>the</strong>exclusive reproducti<strong>on</strong> right unless some exempti<strong>on</strong> or defense is applicable. In <strong>the</strong> absence ofany persuasive legal authority for <strong>the</strong> propositi<strong>on</strong> that making copies of a work <strong>on</strong>to any deviceof <strong>the</strong> user’s choosing is a n<strong>on</strong>infringing use, <strong>the</strong>re is no basis for recommending an exempti<strong>on</strong>to <strong>the</strong> prohibiti<strong>on</strong> <strong>on</strong> circumventi<strong>on</strong>.” 524 The <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office also rejected a proposedexempti<strong>on</strong> for all works protected by access c<strong>on</strong>trols that prevent <strong>the</strong> creati<strong>on</strong> of backup copies,reas<strong>on</strong>ing that “<strong>the</strong> prop<strong>on</strong>ents offered no legal arguments in support of <strong>the</strong> propositi<strong>on</strong> that <strong>the</strong>making of backup copies is n<strong>on</strong>infringing.” 525(ii)Epic Games v. AltmeyerIn this case, <strong>the</strong> court issued a TRO enjoining <strong>the</strong> defendant from offering services tomodify Microsoft’s Xbox 360 to play pirated copies of <strong>the</strong> plaintiff’s video game Gears of War2. The Xbox c<strong>on</strong>tained <strong>the</strong> capability to allow users to play <strong>the</strong> game live <strong>on</strong>line, and to do so,players were required to c<strong>on</strong>nect through an official web site. The software involved in playinglive was programmed to detect modificati<strong>on</strong>s to <strong>the</strong> Xbox and to recognize pirated games. Ifmodificati<strong>on</strong> or piracy was detected, <strong>the</strong> user would be banned from playing live. The defendantoffered a service to modify <strong>the</strong> Xbox to that nei<strong>the</strong>r <strong>the</strong> system itself nor <strong>the</strong> live software couldrecognize pirated games or any modificati<strong>on</strong>. The court found a likelihood of establishing that<strong>the</strong> offered services violated Secti<strong>on</strong> 1201(a)(2), and issued a TRO enjoining <strong>the</strong> defendant fromperforming, advertising, marketing, distributing, or selling game c<strong>on</strong>sole modificati<strong>on</strong>services. 52652352452552671 Fed. Reg. 68477.Id. at 68478.Id. at 68479.Epic Games, Inc. v. Altmeyer, 2008 U.S. Dist. LEXIS 89758 at * 3-4, 9-10 & 19 (S.D. Ill. Nov. 5, 2008).- 125 -


(iii) Facebook v. Power VenturesIn this case, <strong>the</strong> defendants operated an <strong>Internet</strong> service called Power.com that collecteduser informati<strong>on</strong> from Facebook’s web site outside of <strong>the</strong> “Facebook C<strong>on</strong>nect” applicati<strong>on</strong>programmer’s interface (API). After a user provided his or her user names and passwords, <strong>the</strong>Power.com service used <strong>the</strong> access informati<strong>on</strong> to scrape user data from those accounts.Facebook’s Terms of Use broadly prohibited <strong>the</strong> downloading, scraping, or distributing of anyc<strong>on</strong>tent <strong>on</strong> <strong>the</strong> web site, except that a user was permitted to download his or her own userc<strong>on</strong>tent. Facebook alleged that it had implemented specific technical measures to block accessby Power.com after <strong>the</strong> defendants informed Facebook that <strong>the</strong>y intended to c<strong>on</strong>tinue <strong>the</strong>irservice without using Facebook C<strong>on</strong>nect, and that <strong>the</strong> defendants <strong>the</strong>n attempted to circumventthose technological measures in violati<strong>on</strong> of <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>s of <strong>the</strong> DMCA.The defendants brought a moti<strong>on</strong> to dismiss <strong>the</strong> DMCA claims, arguing that <strong>the</strong> unauthorized userequirement of a Secti<strong>on</strong> 1201(a)(1) claim was not met because it was <strong>the</strong> users who werec<strong>on</strong>trolling access (via Power.com) to <strong>the</strong>ir own c<strong>on</strong>tent <strong>on</strong> <strong>the</strong> Facebook web site. The courtdenied <strong>the</strong> moti<strong>on</strong>, in view of <strong>the</strong> fact that <strong>the</strong> defendants’ argument relied <strong>on</strong> an assumpti<strong>on</strong> thatFacebook users were authorized to use Power.com or similar services to access <strong>the</strong>ir useraccounts, and <strong>the</strong> Terms of Use barred users from using automated programs to access <strong>the</strong>Facebook web site. 527(iv) Bose v. ZavalaIn this case, <strong>the</strong> defendant sold Bose Lifestyle Media Centers in aucti<strong>on</strong>s <strong>on</strong> eBay. In hisaucti<strong>on</strong>s, he offered to unlock <strong>the</strong> regi<strong>on</strong> coding within <strong>the</strong> Media Center’s DVD player byaltering Bose’s firmware in <strong>the</strong> device or to give <strong>the</strong> purchaser directi<strong>on</strong>s <strong>on</strong> how to do so.Unlocking <strong>the</strong> regi<strong>on</strong> code would permit <strong>the</strong> Media Centers to play DVDs distributed anywherein <strong>the</strong> world. Bose brought claims against <strong>the</strong> defendant under Secti<strong>on</strong> 1201 of <strong>the</strong> DMCA and<strong>the</strong> defendant moved to dismiss <strong>the</strong>m under Fed. R. Civ. Pro. 12(b)(6) <strong>on</strong> <strong>the</strong> ground that Boselacked standing to assert <strong>the</strong> claims because it was not <strong>the</strong> type of party protected by <strong>the</strong> DMCA,since it did not sell digital media or regi<strong>on</strong> code-changing services. The court rejected thisargument, ruling that a party who c<strong>on</strong>trols <strong>the</strong> technological measures that protect copyrightedworks is a “pers<strong>on</strong> injured” by <strong>the</strong> circumventi<strong>on</strong> of <strong>the</strong> measures within <strong>the</strong> meaning of Secti<strong>on</strong>1203(c). 528 The court c<strong>on</strong>cluded, “Bose c<strong>on</strong>trols regi<strong>on</strong> coding, a technological measure thatprotects copyrighted DVDs. This is sufficient to allege that it is a ‘pers<strong>on</strong> injured’ within <strong>the</strong>meaning of <strong>the</strong> DMCA.”(2) Prohibiti<strong>on</strong> <strong>on</strong> DevicesThe DMCA also outlaws devices and technology directed to circumventi<strong>on</strong> oftechnological copyright protecti<strong>on</strong> measures. Specifically, Secti<strong>on</strong>s 1201(a)(2) and 1201(b)prohibit <strong>the</strong> manufacture, import, offer to <strong>the</strong> public, or trafficking in any technology, product,service, device, comp<strong>on</strong>ent, or part <strong>the</strong>reof that is primarily designed or produced for <strong>the</strong> purpose527528Facebook, Inc. v. Power Ventures, Inc., 2009 U.S. Dist. LEXIS 42367 (N.D. Cal. May 11, 2009) at *1-2, 9-10& 13-14.Bose BV v. Zavala, 2010 U.S. Dist. LEXIS 2719 (D. Mass. Jan. 14, 2010) at *1-5.- 126 -


of circumventing a technological measure that effectively “c<strong>on</strong>trols access to” a copyrightedwork or “protects a right of a copyright owner,” or has <strong>on</strong>ly limited commercially significantpurpose or use o<strong>the</strong>r than to circumvent such technological measure, or is marketed for use incircumventing such technological protecti<strong>on</strong> measure. Secti<strong>on</strong> 1201(b)(2) provides that atechnological measure “effectively protects a right of a copyright owner” if <strong>the</strong> measure “in <strong>the</strong>ordinary course of its operati<strong>on</strong>, prevents, restricts, or o<strong>the</strong>rwise limits <strong>the</strong> exercise of a right of acopyright owner.” Although trafficking in <strong>the</strong>se types of prohibited devices might wellc<strong>on</strong>stitute c<strong>on</strong>tributory infringement, Secti<strong>on</strong>s 1201(a)(2) and 1201(b) make it a direct statutoryviolati<strong>on</strong> subject to criminal and civil penalties.It should be noted that, although Secti<strong>on</strong>s 1201(a)(2) and 1201(b) in combinati<strong>on</strong> prohibitdevices designed to circumvent both technological measures that c<strong>on</strong>trol access to a copyrightedwork and that protect a right of a copyright owner, Secti<strong>on</strong> 1201(a)(1) prohibits c<strong>on</strong>duct that isdirected <strong>on</strong>ly to <strong>the</strong> former, but not <strong>the</strong> latter. The rati<strong>on</strong>ale for this distincti<strong>on</strong> was apparently abelief that any<strong>on</strong>e should be free to circumvent a measure protecting rights of a copyright ownerin order to make fair use of a work, 529 whereas gaining access in <strong>the</strong> first instance to acopyrighted work without <strong>the</strong> owner’s permissi<strong>on</strong> cannot be a fair use. 530Unlike <strong>the</strong> case of <strong>the</strong> prohibiti<strong>on</strong> of circumventi<strong>on</strong> to gain unauthorized access to a workunder Secti<strong>on</strong> 1201(a)(1), <strong>the</strong> prohibiti<strong>on</strong>s of Secti<strong>on</strong>s 1201(a)(2) and 1201(b) were notsuspended for a two year period and went into effect immediately under <strong>the</strong> DMCA. Thus, <strong>the</strong>DMCA set up <strong>the</strong> curious situati<strong>on</strong> in which, for <strong>the</strong> initial two year period, it did not directlyprohibit circumventi<strong>on</strong> of a technological measure to gain access to a work, but did prohibit <strong>the</strong>manufacture, sale or importati<strong>on</strong> of devices that would enable or assist <strong>on</strong>e to gain such access.Ano<strong>the</strong>r curious aspect of <strong>the</strong> DMCA is that it authorizes <strong>the</strong> Librarian to createadditi<strong>on</strong>al excepti<strong>on</strong>s via rulemaking <strong>on</strong>ly to Secti<strong>on</strong> 1201(a)(1), but not to Secti<strong>on</strong>s 1201(a)(2)and 1201(b). Thus, <strong>the</strong> DMCA appears to allow <strong>the</strong> Librarian to permit acts of circumventi<strong>on</strong> inadditi<strong>on</strong>al situati<strong>on</strong>s, but not <strong>the</strong> devices necessary to enable or assist such acts.529530See The Digital Millenium <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act of 1998, U.S. <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office Summary (Dec. 1998) at 4(explaining that <strong>the</strong> distincti<strong>on</strong> between Secti<strong>on</strong> 1201(a) and (b) as to <strong>the</strong> act of circumventi<strong>on</strong> in itself was “toassure that <strong>the</strong> public will have <strong>the</strong> c<strong>on</strong>tinued ability to make fair use of copyrighted works. Since copying maybe a fair use under appropriate circumstances, secti<strong>on</strong> 1201 does not prohibit <strong>the</strong> act of circumventing atechnological measure that prevents copying.”). Similarly, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office noted in its rati<strong>on</strong>ale for <strong>the</strong>first set of exempti<strong>on</strong>s it established from <strong>the</strong> prohibiti<strong>on</strong> against circumventi<strong>on</strong> of technological measuresc<strong>on</strong>trolling access to a work: “The decisi<strong>on</strong> not to prohibit <strong>the</strong> c<strong>on</strong>duct of circumventing copy c<strong>on</strong>trols wasmade, in part, because it would penalize some n<strong>on</strong>infringing c<strong>on</strong>duct such as fair use.” 65 Fed. Reg. 64556,64557 (Oct. 27, 2000).Realnetworks, Inc. v. DVD Copy C<strong>on</strong>trol Ass’n, 641 F. Supp. 2d 913, 942 (N.D. Cal. 2009) (“The prohibiti<strong>on</strong><strong>on</strong> individual circumventi<strong>on</strong> c<strong>on</strong>duct <strong>on</strong>ly applies with respect to access protecti<strong>on</strong> technologies (because fairuse can never be an affirmative defense to <strong>the</strong> act of gaining unauthorized access), not to technologies thatprevent copying.”); Inna Fayens<strong>on</strong>, “Anti-Circumventi<strong>on</strong> Provisi<strong>on</strong>s of The Digital Millennium <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>Act,” Journal of <strong>Internet</strong> Law, Apr. 1999, at 9, 10.- 127 -


Gamemasters(i) S<strong>on</strong>y Computer Entertainment America v.In this lawsuit, S<strong>on</strong>y Computer Entertainment America (SCEA) obtained a preliminaryinjuncti<strong>on</strong> against <strong>the</strong> defendants, who were distributing a device called <strong>the</strong> “Game Enhancer”that enabled players to play S<strong>on</strong>y PlayStati<strong>on</strong> games sold in Japan or Europe, and intended bySCEA for use exclusively <strong>on</strong> Japanese or European PlayStati<strong>on</strong> c<strong>on</strong>soles, <strong>on</strong> U.S. PlayStati<strong>on</strong>c<strong>on</strong>soles. 531 The S<strong>on</strong>y PlayStati<strong>on</strong> c<strong>on</strong>sole was designed to operate <strong>on</strong>ly when encrypted datawas read from a game CD-ROM verifying that <strong>the</strong> CD was an authorized, legitimate productlicensed for distributi<strong>on</strong> in <strong>the</strong> same geographical territory of <strong>the</strong> c<strong>on</strong>sole’s sale. 532The Game Enhancer enabled a player to trick a U.S. PlayStati<strong>on</strong> c<strong>on</strong>sole into playing aJapanese or European authorized game CD by <strong>the</strong> following method. After inserting anauthorized CD game, <strong>the</strong> user was instructed to hold down <strong>the</strong> disk cover switch of <strong>the</strong> c<strong>on</strong>solewhile keeping <strong>the</strong> lid or disk cover open. The Game Enhancer was <strong>the</strong>n turned <strong>on</strong> and itsinternal operating system selected for executi<strong>on</strong>, <strong>the</strong>reby replacing <strong>the</strong> PlayStati<strong>on</strong> c<strong>on</strong>sole’sinternal operating system. The validity and territorial codes were read from <strong>the</strong> authorized CD,<strong>the</strong>reby instructing <strong>the</strong> c<strong>on</strong>sole that <strong>the</strong> inserted CD was valid and authorized. The user was <strong>the</strong>ninstructed to hit <strong>the</strong> “select” butt<strong>on</strong> <strong>on</strong> <strong>the</strong> game c<strong>on</strong>troller to signal <strong>the</strong> c<strong>on</strong>sole to stop <strong>the</strong> CDmotor, enabling <strong>the</strong> player to remove <strong>the</strong> U.S. authorized game CD and replace it with a CD thatwas authorized for play <strong>on</strong>ly <strong>on</strong> a Japanese or European c<strong>on</strong>sole. Once <strong>the</strong> game was loaded, <strong>the</strong>Game Enhancer <strong>the</strong>n returned c<strong>on</strong>trol to <strong>the</strong> PlayStati<strong>on</strong>’s operating system, and <strong>the</strong>unauthorized game could be played.The court ruled that, because <strong>the</strong> Game Enhancer was a device whose primary functi<strong>on</strong>was to circumvent <strong>the</strong> mechanism <strong>on</strong> <strong>the</strong> PlayStati<strong>on</strong> c<strong>on</strong>sole that ensured <strong>the</strong> c<strong>on</strong>sole operated<strong>on</strong>ly when encrypted data was read from an authorized CD-ROM, <strong>the</strong> Game Enhancer had aprimary functi<strong>on</strong> to circumvent a technological measure that effectively c<strong>on</strong>trols access to acopyrighted work and was <strong>the</strong>refore a violati<strong>on</strong> of Secti<strong>on</strong> 1201(a)(2)(A). The court ruled thatSCEA was <strong>the</strong>refore entitled to a preliminary injuncti<strong>on</strong> against sale of <strong>the</strong> device under Secti<strong>on</strong>1203. 533 (ii) DirecTV, Inc. v. BorowThis straightforward case found defendant Randy Borow in violati<strong>on</strong> of Secti<strong>on</strong>1201(a)(1) for using an emulator to circumvent DirecTV’s encrypti<strong>on</strong> <strong>on</strong> its signals and tosimulate certain functi<strong>on</strong>s of <strong>the</strong> DirecTV access card in order to watch DirecTV’s programmingwithout paying subscripti<strong>on</strong> fees. 534531532533534S<strong>on</strong>y Computer Entertainment America v. Gamemasters, 87 F. Supp. 2d 976, 981 (N.D. Cal. 1999).Id.Id. at 987-88. A similar case finding a violati<strong>on</strong> of <strong>the</strong> DMCA as a result of sales of a cable descrambler anddecoder is CSC Holdings, Inc. v. Greenleaf Electr<strong>on</strong>ics, Inc., 2000 U.S. Dist. LEXIS 7675 (N.D. Ill. 2000).DirecTV, Inc. v. Borow, 2005 U.S. Dist. LEXIS 1328 (N.D. Ill. Jan. 6, 2005), at *3 & *12-13.- 128 -


(iii) S<strong>on</strong>y Computer Entertainment America v. DivineoIn S<strong>on</strong>y Computer Entertainment America, Inc. v. Divineo, 535 <strong>the</strong> court granted summaryjudgment to <strong>the</strong> plaintiff that several devices sold by <strong>the</strong> defendant violated <strong>the</strong> anticircumventi<strong>on</strong>provisi<strong>on</strong>s of <strong>the</strong> DMCA. The devices all could be used to circumvent anau<strong>the</strong>nticati<strong>on</strong> process designed by S<strong>on</strong>y into <strong>the</strong> Playstati<strong>on</strong> system to verify that an inserteddisc was au<strong>the</strong>ntic before <strong>the</strong> Playstati<strong>on</strong> would play it. If a user burned a copy of a copyrightedPlaystati<strong>on</strong> game, a unique code that was part of every au<strong>the</strong>ntic disc would not be copied, thuspreventing <strong>the</strong> user from playing <strong>the</strong> copy <strong>on</strong> <strong>the</strong> Playstati<strong>on</strong>. The defendant sold <strong>the</strong> followingdevices that could be used to circumvent this process: (i) HDLoader, software that permitted auser to make an unauthorized copy of Playstati<strong>on</strong>-compatible video games <strong>on</strong>to a separate harddrive c<strong>on</strong>nected to <strong>the</strong> Playstati<strong>on</strong> system; (ii) mod chips that, when wired to a Playstati<strong>on</strong>c<strong>on</strong>sole, circumvented <strong>the</strong> au<strong>the</strong>nticati<strong>on</strong> system and allowed <strong>the</strong> system to play <strong>the</strong>unauthorized software; and (iii) devices that allowed a user to boot up a Playstati<strong>on</strong> c<strong>on</strong>sole andperform a disc swap without triggering <strong>the</strong> software and hardware mechanisms within <strong>the</strong>Playstati<strong>on</strong> that initiated <strong>the</strong> au<strong>the</strong>nticati<strong>on</strong> system. 536The defendant argued against liability <strong>on</strong> <strong>the</strong> ground that <strong>the</strong>re were several ways inwhich <strong>the</strong> devices could be used that did not result in infringement of <strong>the</strong> plaintiff’s copyrightedvideo games. First, <strong>the</strong> devices could be used to allow more than 150 items of “homemade”software to execute <strong>on</strong> <strong>the</strong> Playstati<strong>on</strong>. Sec<strong>on</strong>d, software developers could use <strong>the</strong> devices to test<strong>the</strong>ir own games as a less expensive alternative to purchasing a specialized S<strong>on</strong>y c<strong>on</strong>sole thatwould run any game. Third, HDLoader made playing games more c<strong>on</strong>venient by allowing usersto avoid having to swap out discs to change games and because <strong>the</strong> Playstati<strong>on</strong> could read harddrive data more quickly than data stored <strong>on</strong> CDs or DVDs. The defendant also gave a legalnotice <strong>on</strong> its web site warning users that <strong>the</strong>y were resp<strong>on</strong>sible for <strong>the</strong> legality of <strong>the</strong>ir own use ofmaterials obtained through <strong>the</strong> web site. 537 The defendant also invoked <strong>the</strong> reverse engineeringdefense of Secti<strong>on</strong> 1201(f) of <strong>the</strong> DMCA, arguing that users of mod chips could use <strong>the</strong>m toensure <strong>the</strong> interoperability of an independently created computer program with <strong>the</strong> Playstati<strong>on</strong>. 538The court rejected all of <strong>the</strong>se arguments, holding that <strong>the</strong> challenged devices wereprimarily designed for <strong>the</strong> purpose of circumventing <strong>the</strong> Playstati<strong>on</strong> au<strong>the</strong>nticati<strong>on</strong> system whicho<strong>the</strong>rwise c<strong>on</strong>trolled access to software played <strong>on</strong> <strong>the</strong> system, and that “downstream customers’lawful or fair use of circumventi<strong>on</strong> devices does not relieve [defendant] from liability fortrafficking in such devices under <strong>the</strong> DMCA.” 539 The court also ruled that <strong>the</strong> defendant’s legalnotice to users of its devices was not relevant to its own liability under <strong>the</strong> DMCA. 540 Theapplicati<strong>on</strong> of <strong>the</strong> court’s ruling to <strong>the</strong> Secti<strong>on</strong> 1201(f) interoperability rights is interesting. It535536537538539540457 F. Supp. 2d 957 (N.D. Cal. 2006).Id. at 958-59.Id. at 961.Id. at 965.Id.Id.- 129 -


means that, even though it may be permissible to circumvent a technological measure to obtaininformati<strong>on</strong> necessary for interoperability of an independently developed computer program, orfor <strong>the</strong> user of an independently developed computer program to circumvent an access c<strong>on</strong>trolmeasure in order to interoperate with a program c<strong>on</strong>trolled by <strong>the</strong> measure, it is never<strong>the</strong>lessillegal for a third party to sell such user a device that would enable <strong>the</strong> circumventi<strong>on</strong>, if <strong>the</strong>device is designed primarily for circumventi<strong>on</strong>. Ano<strong>the</strong>r implicati<strong>on</strong> of <strong>the</strong> ruling is that legaluses that may result after use of a device to accomplish circumventi<strong>on</strong> are not to be factored intowhe<strong>the</strong>r <strong>the</strong> device is primarily designed for circumventi<strong>on</strong>. Under this decisi<strong>on</strong>, <strong>the</strong> DMCAfocuses <strong>on</strong>ly <strong>on</strong> <strong>the</strong> capability of <strong>the</strong> device to accomplish circumventi<strong>on</strong> in <strong>the</strong> first instance,and if that is its primary technical functi<strong>on</strong>, it is illegal.(iv) DirecTV, Inc. v. CarrilloIn this case, <strong>the</strong> court found <strong>the</strong> defendant liable under Secti<strong>on</strong> 1201 based <strong>on</strong> hispossessi<strong>on</strong> and transfer of equipment used to pirate satellite TV signals. The court found that <strong>the</strong>devices were primarily designed to intercept encrypted signals. 541(v)Ticketmaster L.L.C. v. RMG Technologies, Inc.In this case, <strong>the</strong> plaintiff Ticketmaster alleged <strong>the</strong> defendant had violated Secti<strong>on</strong>s1201(a)(2) and 1201(b)(1) by distributing an automated tool that enabled users (such as ticketbrokers) to access and navigate rapidly through <strong>the</strong> Ticketmaster site and purchase largequantities of tickets. The tool enabled users to bypass Ticketmaster’s “CAPTCHA” system, asecurity system designed to distinguish between human users and automated programs byrequiring <strong>the</strong> user to read a distorted sequence of letters and numbers <strong>on</strong> <strong>the</strong> screen and enterthose letters and numbers correctly into <strong>the</strong> system in order to gain access to <strong>the</strong> ticket purchasepage. 542 On a moti<strong>on</strong> for a preliminary injuncti<strong>on</strong>, <strong>the</strong> court found <strong>the</strong> plaintiff likely to prevail <strong>on</strong><strong>the</strong>se claims. The court rejected <strong>the</strong> defendant’s argument that CAPTCHA was not a system or aprogram that qualified as a technological measure under <strong>the</strong> DMCA because it was simply animage, and it was designed to regulate ticket sales, not to regulate access to a copyrighted work.The court ruled that <strong>the</strong> DMCA does not equate its use of <strong>the</strong> term “technological measure” with<strong>the</strong> defendant’s terms “system” or “program,” and that in any case <strong>the</strong> CAPTCHA system was atechnological measure within <strong>the</strong> DMCA because most automated devices could not decipherand type <strong>the</strong> stylized random characters <strong>the</strong> system generated in order to proceed to <strong>the</strong>copyrighted ticket purchase pages. 543 Thus, CAPTCHA qualified as a technological measurethat restricted access to copyrighted works within <strong>the</strong> purview of Secti<strong>on</strong> 1201(a)(2). Similarly,it also fell within <strong>the</strong> purview of Secti<strong>on</strong> 1201(b)(1) because it protected rights of <strong>the</strong> copyrightowner by preventing automated access to <strong>the</strong> Ticketmaster ticket purchase web pages, <strong>the</strong>rebypreventing users from copying those pages. Accordingly, <strong>the</strong> court issued a preliminary541542543DirecTV, Inc. v. Carrillo, 227 Fed. Appx. 588, 589-90 (9 th Cir. 2007).Ticketmaster L.L.C. v. RMG Technologies, Inc., 507 F. Supp. 2d 1096, 1102, 1111-12 (C.D. Cal. 2007).Id. at 1112.- 130 -


injuncti<strong>on</strong> prohibiting <strong>the</strong> defendant from trafficking in any computer program or o<strong>the</strong>rautomatic devices to circumvent copy protecti<strong>on</strong> systems in Ticketmaster’s web site and fromusing any informati<strong>on</strong> gained from access to Ticketmaster’s web site to create computerprograms to circumvent Ticketmaster’s copy protecti<strong>on</strong> and web site regulati<strong>on</strong> systems. 544(vi) The Tracf<strong>on</strong>e CasesThe Tracf<strong>on</strong>e cases are discussed in Secti<strong>on</strong> II.G.1(a)(1) above.(vii) Movida Communicati<strong>on</strong>s, Inc. v. HaifaIn this case, <strong>the</strong> court ruled that <strong>the</strong> defendant’s acti<strong>on</strong>s of tampering with or altering prepaidc<strong>on</strong>trol software resident <strong>on</strong> Movida pre-paid wireless handsets, entering unauthorized PINnumbers into <strong>the</strong> ph<strong>on</strong>es for purposes of unlocking or re-flashing <strong>the</strong> ph<strong>on</strong>es, and reselling <strong>the</strong>ph<strong>on</strong>es for use <strong>on</strong> networks o<strong>the</strong>r than Movida’s, violated Secti<strong>on</strong> 1201 of <strong>the</strong> DMCA. Thecourt issued a permanent injuncti<strong>on</strong> against <strong>the</strong> defendant, prohibiting him even from purchasingany model of Movida handsets, in additi<strong>on</strong> to re-flashing or unlocking any Movida handset, andaccessing, altering, erasing, tampering with, deleting or o<strong>the</strong>rwise disabling Movida’sproprietiary prepaid cellular software c<strong>on</strong>tained within any model of Movida handset. The orderalso provided that any violati<strong>on</strong> would be punished in an amount of not less than $5,000 perMovida handset. 545(viii) Microsoft Corp. v. EEE Business Inc.In this case, <strong>the</strong> defendant engaged in <strong>the</strong> unauthorized distributi<strong>on</strong> of Microsoft softwarethat was available <strong>on</strong>ly under a Volume License Agreement. The agreement permitted <strong>on</strong>lyauthorized volume licensees to install software to unlock <strong>the</strong> media programming to enable <strong>the</strong>user to enter a 25-character alphanumeric code, called <strong>the</strong> Volume License Key (VLK), whichwas unique to <strong>the</strong> licensee and required to be kept c<strong>on</strong>fidential under <strong>the</strong> terms of <strong>the</strong> VolumeLicense Agreement. The court ruled that, by distributing a VLK without authorizati<strong>on</strong>, <strong>the</strong>defendant had effectively circumvented Microsoft’s technological measure to c<strong>on</strong>trol access to acopyrighted work in violati<strong>on</strong> of Secti<strong>on</strong> 1201(a)(2) of <strong>the</strong> DMCA. 546(ix) MDY Industries v. Blizzard EntertainmentIn this case, <strong>the</strong> defendant distributed bot software called “Glider” that was able to playBlizzard Entertainment’s multiplayer <strong>on</strong>line role-playing game known as World of Warcraft(WoW) for its owner while <strong>the</strong> owner was away from his or her computer, <strong>the</strong>reby enabling <strong>the</strong>owner to advance more quickly within WoW than would o<strong>the</strong>rwise be possible. 547 BlizzardEntertainment brought claims under <strong>the</strong> DMCA, alleging that Glider evaded Blizzard544545546547Id. at 1112, 1116.Movida Communicati<strong>on</strong>s, Inc. v. Haifa, 2008 Copyr. L. Dec. 29,528 (C.D. Cal. 2008).Microsoft Corp. v. EEE Business Inc., 555 F. Supp. 2d 1051, 1059 (N.D. Cal. 2008).MDY Industries, LLC v. Blizzard Entertainment, Inc., 2008 U.S. Dist. LEXIS 53988 (D. Ariz. 2008 July 14,2008) at *2.- 131 -


technologies known as “Warden” to detect and prevent <strong>the</strong> use of bots by WoW players.Warden included two different software comp<strong>on</strong>ents. The first comp<strong>on</strong>ent, known as “scan.dll,”scanned <strong>the</strong> user’s computer for unauthorized programs such as Glider before <strong>the</strong> user logged<strong>on</strong>to <strong>the</strong> WoW servers to play <strong>the</strong> game, and if it detected such programs, scan.dll would deny<strong>the</strong> user access to <strong>the</strong> game servers. The sec<strong>on</strong>d comp<strong>on</strong>ent, known as <strong>the</strong> “resident” comp<strong>on</strong>entof Warden, ran periodically while a user played WoW and if it detected <strong>the</strong> use of a bot program,Blizzard would revoke access to <strong>the</strong> game. 548Blizzard argued that scan.dll and <strong>the</strong> resident software c<strong>on</strong>trolled access to copyrightedsoftware, as required by Secti<strong>on</strong> 1201(a)(2) of <strong>the</strong> DMCA, in two ways. First, when scan.dllprevented a user from playing WoW, or when <strong>the</strong> resident software terminated a user’s playingof WoW, <strong>the</strong>y prevented additi<strong>on</strong>al code in <strong>the</strong> game client software from being written to RAM.Sec<strong>on</strong>d, scan.dll and <strong>the</strong> resident software barred access to WoW’s n<strong>on</strong>-literal elements (<strong>the</strong>multi-media presentati<strong>on</strong> of <strong>the</strong> WoW universe and character interacti<strong>on</strong>s) generated by <strong>the</strong>code’s interacti<strong>on</strong> with <strong>the</strong> computer hardware and operating systems. 549The court rejected Blizzard’s claim under Secti<strong>on</strong> 1201(b)(2). With respect to access to<strong>the</strong> code of WoW, <strong>the</strong> court, citing <strong>the</strong> Lexmark case, ruled that a holder of Blizzard’s gameclient software had full and complete access to that code <strong>on</strong> both <strong>the</strong> CD that c<strong>on</strong>tained it and <strong>on</strong><strong>the</strong> user’s hard drive <strong>on</strong>ce <strong>the</strong> software had been loaded <strong>on</strong>to <strong>the</strong> user’s computer. The user<strong>the</strong>reafter could view a copy of <strong>the</strong> game client software code, regardless of whe<strong>the</strong>r <strong>the</strong> useractually played WoW or encountered Warden. The user did not need to pass through Blizzard’ssecurity devices to gain access to <strong>the</strong> code. Accordingly, <strong>the</strong> court granted summary judgment to<strong>the</strong> defendant <strong>on</strong> this issue. The court ruled that it could not similarly grant summary judgmentwith respect to <strong>the</strong> n<strong>on</strong>-literal elements of WoW because <strong>the</strong> parties’ statement of facts filed inc<strong>on</strong>juncti<strong>on</strong> with <strong>the</strong>ir moti<strong>on</strong>s for summary judgment said virtually nothing about this aspect of<strong>the</strong> game. Finally, <strong>the</strong> court noted that nei<strong>the</strong>r scan.dll nor <strong>the</strong> resident software appeared torequire <strong>the</strong> applicati<strong>on</strong> of informati<strong>on</strong> by <strong>the</strong> game user, or <strong>the</strong> applicati<strong>on</strong> of a process or atreatment by <strong>the</strong> game user, before granting access to copyrighted informati<strong>on</strong>, as required bySecti<strong>on</strong> 1201(b)(2). Instead, <strong>the</strong>y merely scanned for unauthorized programs. However, becausenei<strong>the</strong>r party had addressed this issue in <strong>the</strong>ir briefs, <strong>the</strong> court noted that it would be a factualissue for trial. 550The court also rejected a claim by Blizzard under Secti<strong>on</strong> 1201(b)(1) of <strong>the</strong> DMCA.Blizzard asserted that scan.dll and <strong>the</strong> resident software prevented users from copying softwarecode to RAM and accessing <strong>the</strong> n<strong>on</strong>-literal elements of <strong>the</strong> game <strong>on</strong>ce <strong>the</strong>y were caught usingGlider. MDY disputed this factual asserti<strong>on</strong>, c<strong>on</strong>tending that code from <strong>the</strong> game client softwarewas not written to RAM after a user passed by scan.dll or <strong>the</strong> resident software. The courtc<strong>on</strong>cluded that, because <strong>the</strong>re was a factual dispute with respect to <strong>the</strong> extent to which Blizzard’sWarden software protected against <strong>the</strong> copying of software code to RAM, and because <strong>the</strong>parties did not submit sufficient facts from which <strong>the</strong> court could decide whe<strong>the</strong>r <strong>the</strong> protective548549550Id. at *34.Id. at *34-35.Id. at 18*35-40.- 132 -


measures protected Blizzard’s rights in <strong>the</strong> n<strong>on</strong>-literal elements of <strong>the</strong> game, summary judgment<strong>on</strong> <strong>the</strong> Secti<strong>on</strong> 1201(b)(1) claim was denied. 551In a subsequent opini<strong>on</strong> issued after a bench trial, <strong>the</strong> court held that Blizzard’scircumventi<strong>on</strong> claims against Glider under Secti<strong>on</strong>s 1201(a)(2) and 1201(b)(1) failed withrespect to <strong>the</strong> discrete n<strong>on</strong>literal comp<strong>on</strong>ents of <strong>the</strong> games stored <strong>on</strong> <strong>the</strong> game player’s harddrive, because <strong>the</strong>y could be accessed and viewed without signing <strong>on</strong>to <strong>the</strong> server (and <strong>the</strong>reforeinvolving <strong>the</strong> Warden software) by independently purchased computer programs that could callup <strong>the</strong> individual visual images or recorded sounds within <strong>the</strong> game client software. However,<strong>the</strong> circumventi<strong>on</strong> claims were valid with respect to <strong>the</strong> “dynamic” n<strong>on</strong>literal elements of WoW– i.e., <strong>the</strong> real-time experience of traveling through different worlds, hearing <strong>the</strong>ir sounds,viewing <strong>the</strong>ir structures, encountering <strong>the</strong>ir inhabitants and m<strong>on</strong>sters, and encountering o<strong>the</strong>rplayers – because those dynamic elements could be accessed and copied <strong>on</strong>ly when <strong>the</strong> user wasc<strong>on</strong>nected to a Blizzard server that c<strong>on</strong>trolled <strong>the</strong>ir dynamic display, which in turn required <strong>the</strong>user successfully to pass scan.dll when logging <strong>on</strong> and to survive <strong>the</strong> periodic scrutiny of <strong>the</strong>resident comp<strong>on</strong>ent. 552Six weeks later, <strong>the</strong> court entered two permanent injuncti<strong>on</strong>s against <strong>the</strong> marketing, saleand distributi<strong>on</strong> of Glider for use in c<strong>on</strong>necti<strong>on</strong> with WoW – <strong>on</strong>e <strong>on</strong> <strong>the</strong> basis of <strong>the</strong> copyrightinfringement and DMCA claims, and ano<strong>the</strong>r <strong>on</strong> <strong>the</strong> basis of a tortious interference with c<strong>on</strong>tractclaim for which <strong>the</strong> court had ruled in favor of Blizzard. The court stayed <strong>the</strong> injuncti<strong>on</strong> <strong>on</strong> <strong>the</strong>copyright and DMCA claims pending <strong>the</strong>ir appeal, but refused to stay <strong>the</strong> injuncti<strong>on</strong> <strong>on</strong> <strong>the</strong>tortious interference claims. 553 In a subsequent opini<strong>on</strong>, <strong>the</strong> court awarded Blizzard statutorydamages of $6.5 milli<strong>on</strong>. 554 (x) Coup<strong>on</strong>s, Inc. v. StottlemireThe plaintiff offered coup<strong>on</strong> printing software that enabled <strong>on</strong>line, printable coup<strong>on</strong>s tobe delivered to c<strong>on</strong>sumers. The software placed a registry key file <strong>on</strong> <strong>the</strong> user’s pers<strong>on</strong>alcomputer that acted as a counter, limiting <strong>the</strong> number of times each coup<strong>on</strong> could be printed <strong>on</strong>that computer (typically, two prints per coup<strong>on</strong>). The defendant discovered how to remove <strong>the</strong>counter, created a computer program that automated its removal, and distributed <strong>the</strong> program.The plaintiff alleged that, because each coup<strong>on</strong> had its own unique bar code and date stamp, <strong>the</strong>coup<strong>on</strong>s were subject to copyright protecti<strong>on</strong>, and <strong>the</strong> defendant’s distributi<strong>on</strong> of its computerprogram violated <strong>the</strong> DMCA by allowing users to access more than <strong>the</strong> limit for each coup<strong>on</strong>.551552553554Id. at *41-43.MDY Industries, LLC v. Blizzard Entertainment, Inc., 616 F. Supp. 2d 958, 964-68 (D. Ariz. 2009). The courtnoted that Warden did not prevent all WoW users from copying <strong>the</strong> dynamic n<strong>on</strong>literal elements of <strong>the</strong> gamebecause players who did not use Glider could copy that c<strong>on</strong>tent while c<strong>on</strong>nected to Blizzard servers. The courtnoted, however, that Secti<strong>on</strong> 1201(b)(1)(A) requires <strong>on</strong>ly that <strong>the</strong> technological measure restrict or o<strong>the</strong>rwiselimit unauthorized copying. Id. at 968 n.3.MDY Industries, LLC v. Blizzard Entertainment, Inc., 2009 U.S. Dist. LEXIS 24151 (Mar. 10, 2009). Thecourt denied a moti<strong>on</strong> for rec<strong>on</strong>siderati<strong>on</strong> of <strong>the</strong> denial of <strong>the</strong> stay of <strong>the</strong> tortious interference injuncti<strong>on</strong>. MDYIndustries, LLC v. Blizzard Entertainment, Inc., 2009 U.S. Dist. LEXIS 25650 (Mar. 25, 2009).MDY Industries, LLD v. Blizzard Entertainment, Inc., 2009 U.S. Dist. LEXIS 38260 (D. Ariz. Apr. 1, 2009).- 133 -


The plaintiff also claimed that <strong>the</strong> act of printing c<strong>on</strong>stituted unauthorized copying. Thedefendant brought a moti<strong>on</strong> to dismiss. 555 The court found fault with <strong>the</strong> plaintiff’s DMCAclaims:These c<strong>on</strong>cepts seem to be logically inc<strong>on</strong>sistent and, when asserted toge<strong>the</strong>r, doappear to blur <strong>the</strong> carefully c<strong>on</strong>structed distincti<strong>on</strong> between “access c<strong>on</strong>trols” and“rights c<strong>on</strong>trols.” If <strong>the</strong> court accepts Coup<strong>on</strong>s’ argument that each coup<strong>on</strong> is“unique,” <strong>the</strong>n can <strong>the</strong>re be a claim of improper copying ….? On <strong>the</strong> o<strong>the</strong>r hand,if <strong>the</strong> coup<strong>on</strong>s are not unique, <strong>the</strong>n <strong>the</strong> allegati<strong>on</strong>s against Stottlemire appear tofall within <strong>the</strong> “rights c<strong>on</strong>trols” (i.e., permitting users to print more copies ofcoup<strong>on</strong>s than were authorized by Plaintiff). 556The court was also not c<strong>on</strong>vinced that <strong>the</strong> additi<strong>on</strong> of a bar code or o<strong>the</strong>r functi<strong>on</strong>aldevice <strong>on</strong> <strong>the</strong> coup<strong>on</strong> qualified it as a unique copyrighted work. But in any event, if Coup<strong>on</strong>swanted to make <strong>the</strong> argument, <strong>the</strong>n <strong>the</strong> court noted that it needed to actually allege it in <strong>the</strong>complaint, and <strong>the</strong> plaintiff’s reference to “unique coup<strong>on</strong>s” in <strong>the</strong> complaint was not sufficientto put <strong>the</strong> defendant <strong>on</strong> notice of <strong>the</strong> claims against him. The court ruled that <strong>the</strong> plaintiff neededto clarify which <strong>the</strong>ory it was pursuing (a “unique” coup<strong>on</strong> <strong>the</strong>ory or a “general” coup<strong>on</strong> <strong>the</strong>ory).Accordingly, <strong>the</strong> court dismissed <strong>the</strong> DMCA cause of acti<strong>on</strong> with leave to amend <strong>the</strong> complaintto clarify whe<strong>the</strong>r <strong>the</strong> plaintiff was asserting a claim under a Secti<strong>on</strong> 1201(b) “rights c<strong>on</strong>trols”<strong>the</strong>ory (i.e., allowing users to print more than <strong>the</strong> authorized number of copies) or a claim undera Secti<strong>on</strong> 1201(a) “access c<strong>on</strong>trols” <strong>the</strong>ory (i.e., “unique” coup<strong>on</strong>s). 557After <strong>the</strong> plaintiff amended its complaint, <strong>the</strong> defendant again brought a moti<strong>on</strong> todismiss, which <strong>the</strong> court denied. 558 In <strong>the</strong> amended complaint, <strong>the</strong> plaintiff claimed that eachprinted coup<strong>on</strong>’s identificati<strong>on</strong> number marked it as an authorized copy of a copyrighted work,and did not create a derivative work. The plaintiff asserted claims under both Secti<strong>on</strong>s 1201(a)and 1201(b). The court ruled that <strong>the</strong> plaintiff had sufficiently alleged facts that its softwarec<strong>on</strong>trolled access to <strong>the</strong> printing of <strong>the</strong> copyrighted coup<strong>on</strong> to state a claim under Secti<strong>on</strong>1201(a). With respect to Secti<strong>on</strong> 1201(b), <strong>the</strong> court ruled that <strong>the</strong> plaintiff had adequatelyalleged that its software c<strong>on</strong>trolled copying and distributi<strong>on</strong> in two ways: <strong>the</strong> registry keylimited <strong>the</strong> number of coup<strong>on</strong>s distributed to a single computer (simultaneously limiting <strong>the</strong>number of au<strong>the</strong>ntic copies that <strong>the</strong> computer could print), and <strong>the</strong> software’s counter limited <strong>the</strong>number of au<strong>the</strong>ntic coup<strong>on</strong>s distributed as a whole. The court held that, although <strong>the</strong> plaintiffwould have to prove that its software actually worked as both an access and use c<strong>on</strong>trol, it hadsufficiently alleged facts that supported its <strong>the</strong>ory that <strong>the</strong> defendant had violated Secti<strong>on</strong>1201(b), and <strong>the</strong> moti<strong>on</strong> to dismiss was denied. 559555556557558559Coup<strong>on</strong>s, Inc. v. Stottlemire, No. CV 07-03457 HRL (N.D. Cal. July 2, 2008), slip op. at 1, 4.Id. at 4-5.Id. at 5.Coup<strong>on</strong>s, Inc. v. Stottlemire, 588 F. Supp. 2d 1069, 1072 (N.D. Cal. 2008).Id. at 1073-75.- 134 -


(xi) CoxCom, Inc. v. ChafeeCoxCom leased cable boxes to its subscribers that enabled <strong>the</strong>m to descramble incomingsignals for viewing and that transmitted certain informati<strong>on</strong> from subscribers back to CoxCom,including billing informati<strong>on</strong> associati<strong>on</strong> with purchase of pay-per-view programming. Thedefendant sold a digital cable filter that filtered out low-frequency signals, including <strong>the</strong> returntransmissi<strong>on</strong>s from <strong>the</strong> cable box c<strong>on</strong>taining purchase informati<strong>on</strong>. The court noted that <strong>the</strong>filters were not illegal, and had innocuous uses, such as allowing cable televisi<strong>on</strong> subscribers toenhance viewing quality by filtering out interference from FM radio broadcast towers, shortwaveradios, and home appliances. However, <strong>the</strong> defendants marketed <strong>the</strong> filters to <strong>the</strong>ir customers ascapable of filtering out pay-per-view charges. 560 The plaintiffs brought claims under <strong>the</strong> DMCAanti-circumventi<strong>on</strong> provisi<strong>on</strong>s and <strong>the</strong> district court granted summary judgment to <strong>the</strong> plaintiffs<strong>on</strong> those claims. 561On appeal, <strong>the</strong> First Circuit affirmed, rejecting <strong>the</strong> defendants’ argument that <strong>the</strong>ir filtersdid not “circumvent” technological measures. The court found <strong>the</strong> technological measure atissue to be CoxCom’s pay-per-view delivery and billing system that scrambled pay-per-viewprogramming to make it not viewable unless subscribers chose to purchase it. 562 Without fur<strong>the</strong>ranalysis, <strong>the</strong> First Circuit simply c<strong>on</strong>cluded: “A digital cable filter allows subscribers to ‘avoid’or ‘bypass’ that technological measure. Given <strong>the</strong> factual record, we have little troublec<strong>on</strong>cluding that <strong>the</strong> district court properly granted summary judgment to CoxCom as toappellants’ liability under <strong>the</strong> DMCA.” 563(xii) DISH Network v. S<strong>on</strong>icviewDISH Network transmitted encrypted programming signals that were <strong>the</strong>n received by anEchoStar receiver, which processed and decrypted <strong>the</strong> signals using data and encrypti<strong>on</strong>technology stored in a DISH Network access card loaded into <strong>the</strong> receiver. The access cardcommunicated with <strong>the</strong> receiver to assure that <strong>on</strong>ly signals <strong>the</strong> subscriber was authorized toreceived would be decrypted. DISH Network brought anti-circumventi<strong>on</strong> claims against <strong>the</strong>defendants, whom DISH Network alleged were involved in <strong>the</strong> manufacture of receivers,software and o<strong>the</strong>r devices used to intercept and steal DISH Network’s encrypted signals. Up<strong>on</strong>a moti<strong>on</strong> for a TRO, <strong>the</strong> court ruled that DISH Network’s security access cards functi<strong>on</strong>ed asboth access c<strong>on</strong>trols and copyright c<strong>on</strong>trols, and that <strong>the</strong> defendants’ distributi<strong>on</strong> of softwarefiles through a website that allowed individuals to decrypt and view DISH Network c<strong>on</strong>tentlikely violated both Secti<strong>on</strong> 1201(a)(2) and 1201(b)(1). 564560561562563564CoxCom, Inc. v. Chafee, 536 F.3d 101, 104-05 (1 st Cir. 2008).Id. at 106.Id. at 110.Id.Dish Network L.L.C. v. S<strong>on</strong>icview USA, Inc., 2009 U.S. Dist. LEXIS 63429 at *2-3 &*7-8 (S.D. Cal. July 23,2009).- 135 -


(xiii) Realnetworks v. DVD Copy C<strong>on</strong>trol Associati<strong>on</strong>.In Realnetworks, Inc. v. DVD Copy C<strong>on</strong>trol Associati<strong>on</strong>, Inc., 565 <strong>the</strong> DVD Copy C<strong>on</strong>trolAssociati<strong>on</strong> (DVDCCA) brought claims alleging that distributi<strong>on</strong> of Realnetworks’ RealDVDproduct violated <strong>the</strong> anti-trafficking provisi<strong>on</strong>s of <strong>the</strong> DMCA. DVDCCA licenses <strong>the</strong> C<strong>on</strong>tentC<strong>on</strong>trol System (CSS) technology, which combines multiple layers of encrypti<strong>on</strong> with anau<strong>the</strong>nticati<strong>on</strong> process to protect <strong>the</strong> c<strong>on</strong>tent <strong>on</strong> DVDs. CSS requires that a DVD drive lockup<strong>on</strong> inserti<strong>on</strong> of a CSS-protected DVD and prevent access to its c<strong>on</strong>tents until a CSS-authorizedplayer engages in an au<strong>the</strong>nticati<strong>on</strong> procedure, akin to a secret handshake, to establish mutualtrust. It also requires that players au<strong>the</strong>nticate <strong>the</strong>mselves to DVD drives to establish mutualtrust, both to unlock <strong>the</strong> DVD and gain access to its protected video c<strong>on</strong>tents and also separatelyto gain access to keys stored in secure areas of <strong>the</strong> DVD, which <strong>the</strong>n decrypt and descramble <strong>the</strong>DVD c<strong>on</strong>tent. The process of au<strong>the</strong>nticati<strong>on</strong> with <strong>the</strong> DVD drive, and subsequent c<strong>on</strong>tentdecrypti<strong>on</strong>, will fail if a DVD is not in <strong>the</strong> DVD drive. Finally, <strong>the</strong> CSS technology creates asystem whereby c<strong>on</strong>tent <strong>on</strong> a DVD may be played back <strong>on</strong>ly in decrypted and unscrambled formfrom <strong>the</strong> physical DVD and not any o<strong>the</strong>r source, such as a computer hard drive. 566The RealDVD product provided a variety of functi<strong>on</strong>s, including playing back DVDsplaced in a computer’s DVD drive, looking up informati<strong>on</strong> about <strong>the</strong> DVD from <strong>Internet</strong>databases, providing links to various informati<strong>on</strong> web sites relevant to <strong>the</strong> chosen DVD, and –<strong>the</strong> functi<strong>on</strong> at issue in <strong>the</strong> lawsuit – saving an image of <strong>the</strong> copy-protected c<strong>on</strong>tent <strong>on</strong> <strong>the</strong>device’s hard drive for later playback without <strong>the</strong> physical DVD being present. 567The court ruled that <strong>the</strong> CSS technology was both an access c<strong>on</strong>trol and a copy c<strong>on</strong>trol(<strong>the</strong> au<strong>the</strong>nticati<strong>on</strong> process functi<strong>on</strong>ed as an access c<strong>on</strong>trol and <strong>the</strong> encrypti<strong>on</strong> functi<strong>on</strong>ed as acopy c<strong>on</strong>trol), 568 and that distributi<strong>on</strong> of RealDVD <strong>the</strong>refore violated <strong>the</strong> anti-traffickingprovisi<strong>on</strong>s of both Secti<strong>on</strong>s 1201(a)(2) and 1201(b). RealDVD circumvented <strong>the</strong> access c<strong>on</strong>trolsof CSS in violati<strong>on</strong> of Secti<strong>on</strong> 1201(a)(2) by allowing access of CSS c<strong>on</strong>tent <strong>on</strong> <strong>the</strong> hard drivewithout going through most of <strong>the</strong> CSS protecti<strong>on</strong> steps, such as DVD drive-locking, CSSau<strong>the</strong>nticati<strong>on</strong>, and CSS bus encrypti<strong>on</strong>. Once RealDVD had copied a DVD, it did notau<strong>the</strong>nticate <strong>the</strong> DVD drive or receive encrypted keys for playback from <strong>the</strong> hard drive.Accordingly, <strong>the</strong> process of au<strong>the</strong>nticati<strong>on</strong> with <strong>the</strong> DVD drive, and subsequent c<strong>on</strong>tentdecrypti<strong>on</strong>, were <strong>the</strong>reby circumvented by RealDVD. 569 RealDVD circumvented <strong>the</strong> copyc<strong>on</strong>trols of CSS in violati<strong>on</strong> of Secti<strong>on</strong> 1201(b) by using <strong>the</strong> CSS au<strong>the</strong>nticati<strong>on</strong> codes andalgorithms to make an unauthorized copy of <strong>the</strong> DVD c<strong>on</strong>tent. 570565566567568569570641 F. Supp. 2d 913 (N.D. Cal. 2009).Id. at 919-20.Id. at 924. The RealDVD und user license agreement provided, “You may use <strong>the</strong> saving functi<strong>on</strong>ality of <strong>the</strong>Software <strong>on</strong>ly with DVDs that you own. You may not use <strong>the</strong> Software to save DVDs that tyou do not own,such as rental or borrowed DVDs.” Id. at 926.Id. at 935.Id. at 933.Id. at 935.- 136 -


The court rejected a number of defenses asserted by Realnetworks. First, Realnetworksargued that CSS was not an “effective” technological measure because it had been widelycracked. The court found this fact of no moment, because <strong>the</strong> DMCA is predicated <strong>on</strong> <strong>the</strong>authority of <strong>the</strong> copyright owner, not whe<strong>the</strong>r or not <strong>the</strong> technological measure is a str<strong>on</strong>gmeans of protecti<strong>on</strong>. The court held that it is sufficient under <strong>the</strong> statutory language if an accessc<strong>on</strong>trol prevents <strong>the</strong> easy creati<strong>on</strong> at <strong>the</strong> c<strong>on</strong>sumer level of widely available and usable copies ofcopyrighted works. 571The court rejected Realnetworks’ argument that <strong>the</strong> copyright holder plaintiffs (<strong>the</strong> moviestudios) could not bring a DMCA claim against a co-licensee to CSS technology. Realnetworkscited cases holding that copyright licenses are governed by c<strong>on</strong>tract law and copyright ownerswho enter into such licenses waive <strong>the</strong>ir rights to sue <strong>the</strong> licensee for copyright infringement andare limited to breach of c<strong>on</strong>tract claims. The court distinguished those cases, noting that <strong>the</strong>studios were not bringing copyright infringement claims, nor were <strong>the</strong>y <strong>the</strong> direct licensors ofCSS technology. Because Realnetworks had acted outside <strong>the</strong> scope of its license with <strong>the</strong>DVDCCA, <strong>the</strong> studios were permitted to bring circumventi<strong>on</strong> claims under <strong>the</strong> DMCA. 572The court also rejected Realnetworks defenses that distributi<strong>on</strong> of RealDVD wasprotected by <strong>the</strong> S<strong>on</strong>y doctrine because it was capable of substantial n<strong>on</strong>infringing uses and byvirtue of <strong>the</strong> fact that <strong>the</strong> copying it permitted fell within <strong>the</strong> fair use rights of users who madecopies for pers<strong>on</strong>al, n<strong>on</strong>commercial use. First, <strong>the</strong> court held that <strong>the</strong> DMCA supersedes S<strong>on</strong>y to<strong>the</strong> extent that <strong>the</strong> DMCA broadened copyright owners’ rights bey<strong>on</strong>d <strong>the</strong> S<strong>on</strong>y holding.Sec<strong>on</strong>d, <strong>the</strong> court ruled that whe<strong>the</strong>r c<strong>on</strong>sumer copying of a DVD for pers<strong>on</strong>al use is a fair usewas not at issue, because while <strong>the</strong> DMCA provides for a limited fair use excepti<strong>on</strong> for certainend users of copyrighted works, <strong>the</strong> excepti<strong>on</strong> does not apply to manufacturers or traffickers of<strong>the</strong> devices prohibited by Secti<strong>on</strong> 1201(a)(2). 573 “So while it may well be fair use for anindividual c<strong>on</strong>sumer to store a backup copy of a pers<strong>on</strong>ally-owned DVD <strong>on</strong> that individual’scomputer, a federal law has n<strong>on</strong>e<strong>the</strong>less made it illegal to manufacture or traffic in a device ortool that permits a c<strong>on</strong>sumer to make such copies.” 574Accordingly, <strong>the</strong> court granted a preliminary injuncti<strong>on</strong> against <strong>the</strong> distributi<strong>on</strong> ofRealDVD. 575(xiv) Apple v. PsystarIn Apple, Inc. v. Psystar Corp. 576 Apple c<strong>on</strong>tended that Psystar’s distributi<strong>on</strong> of modifiedcopies of its Mac OS X operating system <strong>on</strong> n<strong>on</strong>-Apple computers c<strong>on</strong>stituted copyrightinfringement and illegal trafficking in circumventi<strong>on</strong> devices. Apple distributed Mac OS X571572573574575576Id. at 932.Id. at 933.Id. at 941-43.Id. at 942.Id. at 952.673 F. Supp. 2d 931 (N.D. Cal. 2009).- 137 -


subject to a license agreement that prohibited its use <strong>on</strong> any n<strong>on</strong>-Apple-labeled computer. Appleused lock-and-key technological measures to prevent Mac OS X from operating <strong>on</strong> n<strong>on</strong>-Applecomputers. Specifically, it encrypted <strong>the</strong> files of Mac OS X and used a kernel extensi<strong>on</strong> thatcommunicated with o<strong>the</strong>r kernel extensi<strong>on</strong>s to locate a decrypti<strong>on</strong> key in <strong>the</strong> hardware and usethat key to decrypt <strong>the</strong> encrypted files of Mac OS X. Psystar distributed a line of computerscalled Open Computers that c<strong>on</strong>tained copies of Mac OS X, modified to run <strong>on</strong> Psystar’s ownhardware, which was not authorized by Apple. 577Psystar’s had engaged in <strong>the</strong> following c<strong>on</strong>duct at issue. It bought a copy of Mac OS Xand installed it <strong>on</strong> an Apple Mac Mini computer. It <strong>the</strong>n copied Mac OS X from <strong>the</strong> Mac Mini<strong>on</strong>to a n<strong>on</strong>-Apple computer for use as an “imaging stati<strong>on</strong>.” Once <strong>on</strong> <strong>the</strong> imaging stati<strong>on</strong>, MacOS X was modified. Psystar <strong>the</strong>n replaced <strong>the</strong> Mac OS X bootloader (a program that runs whena computer first powers up and locates and loads porti<strong>on</strong>s of <strong>the</strong> operating system into randomaccess memory) and disabled and/or removed Mac OS X kernel extensi<strong>on</strong> files and replaced<strong>the</strong>m with its own kernel extensi<strong>on</strong> files. Psystar’s modificati<strong>on</strong>s enabled Mac OS X to run <strong>on</strong>n<strong>on</strong>-Apple computers. The modified copy of Mac OS X became a master copy that was used formass reproducti<strong>on</strong> and installati<strong>on</strong> <strong>on</strong>to Psystar’s Open Computers. 578The court first ruled that Psystar had violated Apple’s exclusive right to copy Mac OS Xby making copies of <strong>the</strong> modified versi<strong>on</strong> of OS X and installing <strong>the</strong>m <strong>on</strong> n<strong>on</strong>-Apple computers,and by making copies of such software in random access memory when turning <strong>on</strong> its computersrunning Mac OS X. The court refused to allow Psystar to assert a defense to such copying underSecti<strong>on</strong> 117 of <strong>the</strong> copyright statute, ruling that Psystar had waived such a defense by failing toplead it. 579 The court also held that distributi<strong>on</strong> of Psystar’s computers infringed Apple’sexclusive distributi<strong>on</strong> rights with respect to Mac OS X. The court rejected Psystar’s defenseunder <strong>the</strong> first sale doctrine, based <strong>on</strong> <strong>the</strong> fact that it allegedly included a legitimately purchasedMac OS X DVD with every Psystar computer. The court held that <strong>the</strong> first sale defense underSecti<strong>on</strong> 109 provides immunity <strong>on</strong>ly when copies are lawfully made, and <strong>the</strong> master copy of <strong>the</strong>modified Mac OS X residing <strong>on</strong> Psystar’s imaging stati<strong>on</strong> was unauthorized, as were all <strong>the</strong>many unauthorized copies that were made from such master copy. 580 The court also c<strong>on</strong>cludedthat Psystar had violated Apple’s exclusive right to create derivative works by replacing <strong>the</strong> MacOS X bootloader with a different bootloader to enable an unauthorized copy of Mac OS X to run<strong>on</strong> Psystar’s computers, by disabling and removing Apple kernel extensi<strong>on</strong> files, and by addingn<strong>on</strong>-Apple kernel extensi<strong>on</strong> files. The court rejected Psystar’s c<strong>on</strong>tenti<strong>on</strong> that <strong>the</strong>semodificati<strong>on</strong>s did not amount to creati<strong>on</strong> of a derivative work because Apple’s source code,object code and kernel extensi<strong>on</strong>s had not been modified. The court held that <strong>the</strong> replacement of577578579580Id. at 933-34.Id. at 934.Id. at 935. Without giving any reas<strong>on</strong>s why, <strong>the</strong> court also observed that “<strong>the</strong> asserti<strong>on</strong> of Secti<strong>on</strong> 117 is sofrivolous in <strong>the</strong> true c<strong>on</strong>text of how Psystar has used Mac OS X that a belated attempt to amend <strong>the</strong> pleadingswould not be excused.” Id. at 936.Id. at 937.- 138 -


entire files within <strong>the</strong> software while copying o<strong>the</strong>r porti<strong>on</strong>s resulted in a substantial variati<strong>on</strong>from <strong>the</strong> underlying copyrighted work and <strong>the</strong>refore an infringing derivative work. 581Turning to Apple’s trafficking claim, <strong>the</strong> court noted that Apple’s encrypti<strong>on</strong> of <strong>the</strong> MacOS X operating system files, although aimed primarily at c<strong>on</strong>trolling access, also effectivelyprotected its right to copy, at least for copies made in RAM. Accordingly, <strong>the</strong> encrypti<strong>on</strong>scheme c<strong>on</strong>stituted both an access c<strong>on</strong>trol measure and a copy c<strong>on</strong>trol measure. Psystar’sdistributi<strong>on</strong> of “decrypti<strong>on</strong> software” (apparently referring to Psystar’s substituted kernelextensi<strong>on</strong> files that obtained Apple’s decrypti<strong>on</strong> key from <strong>the</strong> hardware and <strong>the</strong>n used that key todecrypt <strong>the</strong> Mac OS X modules) violated both Secti<strong>on</strong> 1201(a)(1)(A) and Secti<strong>on</strong> 1201(b)(1)because it enabled obtaining unauthorized access to Mac OS X and resulted in an unauthorizedcopy of Mac OS X being loaded into RAM. 582The court rejected Psystar’s argument that Apple’s technological protecti<strong>on</strong> measure wasnot effective because <strong>the</strong> decrypti<strong>on</strong> key for circumventi<strong>on</strong> was publicly available <strong>on</strong> <strong>the</strong><strong>Internet</strong>. “The fact that circumventi<strong>on</strong> devices may be widely available does not mean that atechnological measure is not, as <strong>the</strong> DMCA provides, effectively protecting <strong>the</strong> rights ofcopyright owners in <strong>the</strong> ordinary course of its operati<strong>on</strong>s.” 583 Accordingly, <strong>the</strong> court grantedApple’s moti<strong>on</strong> for summary judgment. 584(xv) Craigslist v. NaturemarketIn Craigslist, Inc. v. Naturemarket, 585 <strong>the</strong> defendants distributed software that bypassed<strong>the</strong> CAPTCHA system of <strong>the</strong> Craigslist site and enabled users to post ads automatically inwhatever quantity, frequency, and locati<strong>on</strong> <strong>the</strong> user wished, in violati<strong>on</strong> of <strong>the</strong> Craigslist siteTerms of Use. 586 Up<strong>on</strong> a moti<strong>on</strong> for a default judgment, a magistrate judge issued an opini<strong>on</strong>recommending that <strong>the</strong> defendants’ distributi<strong>on</strong> of <strong>the</strong> software be found in violati<strong>on</strong> of Secti<strong>on</strong>s1201(a)(2) and 1201(b)(1) because <strong>the</strong> software “enabled unauthorized access to and copies ofcopyright-protected porti<strong>on</strong>s of Plaintiff’s website c<strong>on</strong>trolled by [<strong>the</strong> CAPTCHA system] –particularly <strong>the</strong> ad posting and account creati<strong>on</strong> porti<strong>on</strong>s of <strong>the</strong> website.” 587 The magistrate581582583584585586587Id. at 938. The court also rejected Psystar’s argument that Apple’s alleged attempt to use copyright to tie MacOS X to Apple hardware c<strong>on</strong>stituted copyright misuse. Because Apple had not prohibited o<strong>the</strong>rs fromindependently developing and using <strong>the</strong>ir own operating system, it had not violated <strong>the</strong> public policyunderlying copyright law or engaged in copyright misuse. The court noted that Apple had not prohibitedpurchasers of Mac OS X from using competitor’s products. Ra<strong>the</strong>r, it had simply prohibited purchasers fromusing OS X <strong>on</strong> competitor’s products. Thus, Apple’s license agreement was simply an attempt to c<strong>on</strong>trol <strong>the</strong>use of its own software. Id. at 939-40.Id. at 941.Id. at 942 (quoting S<strong>on</strong>y Computer Entm’t Am., Inc. v. Divineo, Inc., 457 F. Supp. 2d 957, 965 (N.D. Cal.2006)).Psystar, 673 F. Supp. 2d at 942.2010 U.S. Dist. LEXIS 19992 (N.D. Cal. Mar. 5, 2010) (report and recommendati<strong>on</strong> of magistrate judge replaintiff’s moti<strong>on</strong> for default judgment).Id. at *5.Id. at *27.- 139 -


judge also recommended an award of statutory damages in <strong>the</strong> amount of $1,000 per copy ofsoftware distributed, estimated at 470 copies (obtained by dividing <strong>the</strong> defendants’ estimatedrevenue of $40,000 by <strong>the</strong> list price of $84.95 for <strong>the</strong> software), for a total statutory damagesaward of $470,000. 588 The district court adopted <strong>the</strong> magistrate judge’s recommendati<strong>on</strong>s andopini<strong>on</strong> in every respect, and entered a permanent injuncti<strong>on</strong> against <strong>the</strong> defendants enjoining<strong>the</strong>m from distributing software that enabled postings <strong>on</strong> Craigslist without each posting beingentered manually or that used automated means to download or o<strong>the</strong>rwise obtain data fromCraigslist, from circumventing <strong>the</strong> CAPTCHA system or o<strong>the</strong>r technological measuresc<strong>on</strong>trolling access to <strong>the</strong> site, from repeatedly posting <strong>the</strong> same or similar c<strong>on</strong>tent <strong>on</strong> <strong>the</strong> site or inmore than <strong>on</strong>e category, and from accessing or using <strong>the</strong> site for any commercial purposewhatsoever. 589(3) What C<strong>on</strong>stitutes an Effective Technological Measure(i)Auto Inspecti<strong>on</strong> Services v. Flint Auto Aucti<strong>on</strong>In Auto Inspecti<strong>on</strong> Services v. Flint Auto Aucti<strong>on</strong>, 590 <strong>the</strong> plaintiff was <strong>the</strong> owner of anautomotive inspecti<strong>on</strong> program that provided a uniform method of inspecting vehicles after <strong>the</strong>term of a lease or use had expired. The plaintiff included a quality c<strong>on</strong>trol feature as part of <strong>the</strong>program that allowed it to m<strong>on</strong>itor all informati<strong>on</strong> collected using <strong>the</strong> program. For example,when a vehicle inspector collected data for a vehicle and entered it into <strong>the</strong> program, <strong>the</strong> data hadto be sent to <strong>the</strong> plaintiff for quality c<strong>on</strong>trol inspecti<strong>on</strong> before <strong>the</strong> informati<strong>on</strong> could beforwarded to <strong>the</strong> owner of <strong>the</strong> vehicle. In this way, <strong>the</strong> plaintiff could m<strong>on</strong>itor who was using<strong>the</strong> program to protect against unauthorized use. 591The defendant, a former licensee of <strong>the</strong> plaintiff’s program, wrote its own automotiveinspecti<strong>on</strong> program to replace <strong>the</strong> plaintiff’s program. The plaintiff claimed that <strong>the</strong> defendant’sprogram was a copyright infringement. The plaintiff also claimed that its quality c<strong>on</strong>trol featurec<strong>on</strong>stituted a technical protecti<strong>on</strong> measure to restrict access and use of its software, and that <strong>the</strong>defendant had violated <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>s of <strong>the</strong> DMCA by circumventing <strong>the</strong>quality c<strong>on</strong>trol feature to gain access to <strong>the</strong> plaintiff’s source code to copy it. 592The court found it questi<strong>on</strong>able that <strong>the</strong> quality c<strong>on</strong>trol feature was a technical measurethat effectively c<strong>on</strong>trolled access to a protected work within <strong>the</strong> purview of <strong>the</strong> DMCA. Thecourt noted that <strong>the</strong> protected work at issue was <strong>the</strong> source code of <strong>the</strong> program, and <strong>the</strong> userdetecti<strong>on</strong> feature was a part of <strong>the</strong> program itself that in no way c<strong>on</strong>trolled access to <strong>the</strong> sourcecode. Ra<strong>the</strong>r, it merely alerted <strong>the</strong> plaintiff as to who was using <strong>the</strong> program. C<strong>on</strong>sequently, <strong>the</strong>588589590591592Id. at *48-49. The magistrate judge also recommended that an award of actual damages be made against <strong>the</strong>defendants based <strong>on</strong> <strong>the</strong> liquidated damages clause of <strong>the</strong> Terms of Use, which provided for $200 for every ad<strong>the</strong> defendants posted as posting agents <strong>on</strong> behalf of users, for a total of $840,000. Id. at *50-52.Craigslist, Inc. v. Naturemarket, Inc., 2010 U.S. Dist. LEXIS 19977 (N.D. Cal. Mar. 5, 2010) at *1-5y.2006 U.S. Dist. LEXIS 87366 (E.D. Mich. Dec. 4, 2006).Id. at *1-2.Id. at *4-5, 22.- 140 -


user detecti<strong>on</strong> feature would not prevent any<strong>on</strong>e from gaining access to <strong>the</strong> source code andcopying it verbatim. Moreover, <strong>the</strong> feature came into play <strong>on</strong>ly after a user had c<strong>on</strong>ducted aninspecti<strong>on</strong>, and did not prevent unauthorized users from accessing <strong>the</strong> program in <strong>the</strong> firstinstance. 593 (ii) Healthcare Advocates, Inc. v. Harding, Earley,Follmer & FraileyIn Healthcare Advocates, Inc. v. Harding, Earley, Follmer & Frailey, 594 <strong>the</strong> courtaddressed <strong>the</strong> issue of whe<strong>the</strong>r a robots.txt file applied to a web site to indicate no archivalcopying by robots should take place c<strong>on</strong>stitutes an effective technological measure. HealthcareAdvocates had filed a lawsuit alleging that a competitor infringed trademarks and copyrights andmisappropriated trade secrets bel<strong>on</strong>ging to Healthcare Advocates. The defendants in that casewere represented by <strong>the</strong> boutique IP law firm of Harding, Earley, Follmer & Frailey. To aid inpreparing a defense, <strong>on</strong> two occasi<strong>on</strong>s employees of <strong>the</strong> Harding firm accessed screenshots ofold versi<strong>on</strong>s of Healthcare Advocates’ web sites that had been archived by <strong>the</strong> <strong>Internet</strong> Archive’sweb site (www.archive.org). The old versi<strong>on</strong>s of <strong>the</strong> web site were accessed through <strong>the</strong>“Wayback Machine,” an informati<strong>on</strong> retrieval system offered to <strong>the</strong> public by <strong>the</strong> <strong>Internet</strong>Archive that allowed users to request archived screenshots c<strong>on</strong>tained in its archival database.Viewing <strong>the</strong> c<strong>on</strong>tent that Healthcare Advocates had included <strong>on</strong> its public web site in <strong>the</strong> pastwas very useful to <strong>the</strong> Harding firm in assessing <strong>the</strong> merits of <strong>the</strong> trademark and trade secretallegati<strong>on</strong>s brought against <strong>the</strong> firm’s clients. 595The <strong>Internet</strong> Archive had a policy to respect robots.txt files and not to archive sitesc<strong>on</strong>taining a robots.txt file that indicated <strong>the</strong> site should not be archived. In additi<strong>on</strong>, for thoseweb sites that did not have a robots.txt file present at <strong>the</strong> web site’s incepti<strong>on</strong>, but included itlater, <strong>the</strong> <strong>Internet</strong> Archive would remove <strong>the</strong> public’s ability to access any previously archivedscreenshots stored in its database. The archived images were not deleted, but were insteadrendered inaccessible to <strong>the</strong> general public, and <strong>the</strong> <strong>Internet</strong> Archive’s web crawler wasinstructed not to ga<strong>the</strong>r screenshots of that web site in <strong>the</strong> future. 596Healthcare Advocates had not included a robots.txt file <strong>on</strong> its web site prior to July 7,2003. C<strong>on</strong>sequently, <strong>Internet</strong> Archive’s database included screenshots from HealthcareAdvocates’ web site when <strong>the</strong> Harding firm’s employees accessed that database through <strong>the</strong>Wayback Machine <strong>on</strong> July 9, 2003 and July 14, 2003. On those two dates of access, however,<strong>the</strong> <strong>Internet</strong> Archive’s servers, which checked for robots.txt files and blocked <strong>the</strong> images frombeing displayed from <strong>the</strong> corresp<strong>on</strong>ding web site, were malfuncti<strong>on</strong>ing due to a cache exhausti<strong>on</strong>c<strong>on</strong>diti<strong>on</strong>. Because of this malfuncti<strong>on</strong>, employees of <strong>the</strong> Harding firm were able to view andprint copies of <strong>the</strong> archived screenshots of Healthcare Advocates’ web site stored in <strong>Internet</strong>Archive’s database, c<strong>on</strong>trary to <strong>Internet</strong> Archives’ normal policy. Healthcare Advocates sued593594595596Id. at *23.2007 U.S. Dist. LEXIS 52544 (E.D. Pa. July 20, 2007).Id. at *1-3.Id. at *7-8.- 141 -


<strong>the</strong> Harding firm, alleging that it has manipulated <strong>the</strong> Wayback Machine <strong>on</strong> <strong>the</strong> two dates inquesti<strong>on</strong> in a way that rendered useless <strong>the</strong> protective measure of <strong>the</strong> robots.txt file thatHealthcare Advocates had placed <strong>on</strong> its web site, in violati<strong>on</strong> of <strong>the</strong> anti-circumventi<strong>on</strong>provisi<strong>on</strong>s of <strong>the</strong> DMCA. 597The court turned first to <strong>the</strong> questi<strong>on</strong> of whe<strong>the</strong>r <strong>the</strong> robots.txt file used by HealthcareAdvocates qualified as a technological measure effectively c<strong>on</strong>trolling access to its web site asdefined in <strong>the</strong> Secti<strong>on</strong> 1201(a)(3)(B) of <strong>the</strong> DMCA. The court c<strong>on</strong>cluded <strong>on</strong> <strong>the</strong> particular factsof <strong>the</strong> case that it did, although <strong>the</strong> court refused to hold that a robots.txt file universallyc<strong>on</strong>stitutes a technological protecti<strong>on</strong> measure:The measure at issue in this case is <strong>the</strong> robots.txt protocol. No court has foundthat a robots.txt file universally c<strong>on</strong>stitutes a “technological measure effectivelyc<strong>on</strong>troll[ing] access” under <strong>the</strong> DMCA. The protocol by itself is not analogous todigital password protecti<strong>on</strong> or encrypti<strong>on</strong>. However, in this case, when allsystems involved in processing requests via <strong>the</strong> Wayback Machine are operatingproperly, <strong>the</strong> placement of a correct robots.txt file <strong>on</strong> Healthcare Advocates’current website does work to block users from accessing archived screenshots <strong>on</strong>its website. The <strong>on</strong>ly way to gain access would be for Healthcare Advocates toremove <strong>the</strong> robots.txt file from its website, and <strong>on</strong>ly <strong>the</strong> website owner canremove <strong>the</strong> robots.txt file. Thus, in this situati<strong>on</strong>, <strong>the</strong> robots.txt file qualifies as atechnological measure effectively c<strong>on</strong>trolling access to <strong>the</strong> archived copyrightedimages of Healthcare Advocates. This finding should not be interpreted as afinding that a robots.txt file universally qualifies as a technological measure thatc<strong>on</strong>trols access to copyrighted works under <strong>the</strong> DMCA. 598However, <strong>the</strong> court found no violati<strong>on</strong> of <strong>the</strong> DMCA by <strong>the</strong> acti<strong>on</strong>s of <strong>the</strong> Harding firmemployees because those employees had not acted to “avoid” or “bypass” <strong>the</strong> technologicalmeasure. The court noted that those choice of words in <strong>the</strong> DMCA “imply that a pers<strong>on</strong>circumvents a technological measure <strong>on</strong>ly when he affirmatively performs an acti<strong>on</strong> that disablesor voids <strong>the</strong> measure that was installed to prevent <strong>the</strong>m from accessing <strong>the</strong> copyrightedmaterial.” 599 The employees of <strong>the</strong> Harding firm had not taken such affirmative acti<strong>on</strong>. As faras <strong>the</strong>y knew, no protective measures were in place with respect to <strong>the</strong> archived screenshots <strong>the</strong>ywere able to view, and <strong>the</strong>y could in fact not avoid or bypass any protective measure because <strong>on</strong><strong>the</strong> dates in questi<strong>on</strong> nothing stood in <strong>the</strong> way of <strong>the</strong>m viewing <strong>the</strong> screenshots. 600Healthcare Advocates argued that liability under <strong>the</strong> DMCA should be judged <strong>on</strong> what<strong>the</strong> Harding firm knew, not what acti<strong>on</strong>s it took. Healthcare Advocates argued that <strong>the</strong> Hardingfirm knew it was not permitted to view certain archived images, because some of <strong>the</strong> imageswere blocked. Healthcare Advocates <strong>the</strong>refore claimed that <strong>the</strong> firm knew or should have known597598599600Id. at *4, 8-10, 43.Id. at *41-42 (citati<strong>on</strong> omitted).Id. at *46.Id. at *47.- 142 -


that it was not supposed to be able to view any of <strong>the</strong> screenshots at issue, and that any requestmade for archived images after <strong>the</strong> first request resulted in a denial c<strong>on</strong>stitute circumventi<strong>on</strong> ofits robots.txt file. The court rejected this argument, ruling that simply making fur<strong>the</strong>r requests isnot circumventi<strong>on</strong> under <strong>the</strong> DMCA. The requests did not alter any computer code to render <strong>the</strong>robots.txt file void. <strong>Internet</strong> Archive’s servers indicated that no lock existed when <strong>the</strong> requestswere made. Accordingly, <strong>the</strong> Harding firm could not avoid or bypass a digital wall that was not<strong>the</strong>re. 601 The court also ruled that Healthcare Advocates’ inference that <strong>the</strong> Harding firm shouldhave known it was not allowed to view any archived images via <strong>the</strong> Wayback Machine was bothunreas<strong>on</strong>able and irrelevant. When a screenshot was blocked, <strong>the</strong> Wayback Machine returned amessage stating that <strong>the</strong> page was blocked by <strong>the</strong> web site owner, but <strong>the</strong> message also includedlinks, <strong>on</strong>e of which said, “Try ano<strong>the</strong>r request or click here to search for all pages <strong>on</strong>healthcareadvocates.com.” When this page appeared, <strong>the</strong> firm’s employee clicked <strong>on</strong> <strong>the</strong> linkand received a list of all available screenshots. 602 The court held that, even if <strong>the</strong> firm knew thatHealthcare Advocates did not give it permissi<strong>on</strong> to see its archived screenshots, “lack ofpermissi<strong>on</strong> is not circumventi<strong>on</strong> under <strong>the</strong> DMCA.” 603 Accordingly, <strong>the</strong> court granted <strong>the</strong>Harding firm summary judgment <strong>on</strong> Healthcare Advocates’ claim of a violati<strong>on</strong> of <strong>the</strong> DMCA. 604(iii) Apple v. PsystarThe facts of this case are set forth in Secti<strong>on</strong> II.G.1(b)(14) above. The court rejected <strong>the</strong>defendant’s argument that Apple’s encrypti<strong>on</strong> of its Mac OS X operating system files, whichwere decrypted by a decrypti<strong>on</strong> key stored within Apple’s hardware, was not an effectivetechnological protecti<strong>on</strong> measure because <strong>the</strong> decrypti<strong>on</strong> key was publicly available <strong>on</strong> <strong>the</strong><strong>Internet</strong>. “The fact that circumventi<strong>on</strong> devices may be widely available does not mean that atechnological measure is not, as <strong>the</strong> DMCA provides, effectively protecting <strong>the</strong> rights ofcopyright owners in <strong>the</strong> ordinary course of its operati<strong>on</strong>s.” 605(4) No Requirements With Respect to Design of a ProductSecti<strong>on</strong> 1201(c)(3) provides that nothing in <strong>the</strong> bills “shall require that <strong>the</strong> design of, ordesign and selecti<strong>on</strong> of parts and comp<strong>on</strong>ents for, a c<strong>on</strong>sumer electr<strong>on</strong>ics, telecommunicati<strong>on</strong>s,or computing product provide for a resp<strong>on</strong>se to any particular technological measure ….”601602603604605Id. at *47-50.Id. at *50-51.Id. at *51.Id.Apple, Inc. v. Psystar Corp., 673 F. Supp. 2d 931, 942 (quoting S<strong>on</strong>y Computer Entm’t Am., Inc. v. Divineo,Inc., 457 F. Supp. 2d 957, 965 (N.D. Cal. 2006)).- 143 -


(5) O<strong>the</strong>r Rights Not AffectedSecti<strong>on</strong>s 1201(c)(1), (2), and (4) provide that Secti<strong>on</strong> 1201 is not intended to affectrights, remedies, limitati<strong>on</strong>s, or defenses (including fair use) to copyright infringement; or toenlarge or diminish vicarious or c<strong>on</strong>tributory liability in c<strong>on</strong>necti<strong>on</strong> with any technology orproduct; or to enlarge or diminish any rights of free speech of <strong>the</strong> press for activities usingc<strong>on</strong>sumer electr<strong>on</strong>ics, telecommunicati<strong>on</strong>s, or computing products.Notwithstanding <strong>the</strong>se provisi<strong>on</strong>s, groups such as <strong>the</strong> Digital Future Coaliti<strong>on</strong> (DFC)have criticized <strong>the</strong> approach of <strong>the</strong> DMCA. In a positi<strong>on</strong> paper dated August 1997, 606 <strong>the</strong> DFCargued that Secti<strong>on</strong> 1201 would effectively negate fair use rights, because it imposes liability for“circumventi<strong>on</strong>” even when <strong>the</strong> purpose of <strong>the</strong> activity is permitted by <strong>the</strong> copyright act (such asreverse engineering or o<strong>the</strong>r activities that o<strong>the</strong>rwise c<strong>on</strong>stitute fair use). The DFC also arguedthat Secti<strong>on</strong> 1201 would outlaw legitimate devices with substantial n<strong>on</strong>infringing uses,effectively overruling <strong>the</strong> Supreme Court’s decisi<strong>on</strong> in S<strong>on</strong>y Corp. v Universal City Studios. 607The DFC argued that <strong>the</strong> savings clauses of Secti<strong>on</strong> 1201(c) are inadequate because“while Secti<strong>on</strong> 1201 will not as a formal matter restrict existing limitati<strong>on</strong>s and excepti<strong>on</strong>s tocopyright, it will as a practical matter preclude <strong>the</strong> exercise of <strong>the</strong>se limitati<strong>on</strong>s and excepti<strong>on</strong>sby preventing <strong>the</strong> manufacture and use of <strong>the</strong> technologies necessary for <strong>the</strong>ir existence. Norwould <strong>the</strong> savings clause protect individuals who gain ‘access’ to works in violati<strong>on</strong> of1201(a)(1), even if <strong>the</strong>y do so for entirely lawful purposes.” 608Ano<strong>the</strong>r positi<strong>on</strong> paper filed <strong>on</strong> behalf of <strong>the</strong> Informati<strong>on</strong> Technology Industry Councilraised c<strong>on</strong>cern that Secti<strong>on</strong> 1201 will impose liability too broadly in view of <strong>the</strong> broad definiti<strong>on</strong>of “circumventi<strong>on</strong>”:Thus, if a device does not resp<strong>on</strong>d to a technological protecti<strong>on</strong> measure that isintended to c<strong>on</strong>trol copying, which in some cases may be a simple 1 or 0 inheader informati<strong>on</strong> included with <strong>the</strong> digital c<strong>on</strong>tent, <strong>the</strong> device may be c<strong>on</strong>struedas avoiding, bypassing, deactivating or impairing that measure.… Companiesthat make devices that do not resp<strong>on</strong>d to copy flags – because <strong>the</strong>y d<strong>on</strong>’t knowabout <strong>the</strong> flags or because of technological difficulties associated with complying– could be liable under Secti<strong>on</strong> 1201 even though <strong>the</strong>y had no intent tocircumvent. 609606607608609The positi<strong>on</strong> paper may be found at www.ari.net/dfc/docs/stwip.htm.464 U.S. 417 (1984).Positi<strong>on</strong> paper at 3.Prepared Statement of Chris Byrne of Silic<strong>on</strong> Graphics, Inc. <strong>on</strong> Behalf of <strong>the</strong> Informati<strong>on</strong> Technology IndustryCouncil Before <strong>the</strong> House Judiciary Committee Courts and Intellectual Property Subcommittee (Wed., Sept. 17,1997) (available from Federal News Service, 620 Nati<strong>on</strong>al Press Building, Washingt<strong>on</strong>, D.C. 20045, and <strong>on</strong> filewith <strong>the</strong> author). Secti<strong>on</strong> 1201(c)(3), discussed above, appears to be directed at least in part to addressing thisissue.- 144 -


The paper also raised c<strong>on</strong>cern about broadening <strong>the</strong> standard for liability for third partyuse of devices that infringe copyright owner’s rights from that of <strong>the</strong> S<strong>on</strong>y case, which imposesliability <strong>on</strong>ly for sale of devices having no substantial n<strong>on</strong>infringing uses, to <strong>the</strong> prohibiti<strong>on</strong>under <strong>the</strong> bill of devices that are “primarily designed or produced” for circumventi<strong>on</strong>, or have“<strong>on</strong>ly limited commercially significant purpose” o<strong>the</strong>r than circumventi<strong>on</strong>, or are marketed foruse in circumventi<strong>on</strong>.Enforcement(6) Exempti<strong>on</strong> for N<strong>on</strong>profit Organizati<strong>on</strong>s and LawSecti<strong>on</strong> 1201(d) sets up an exempti<strong>on</strong> from <strong>the</strong> circumventi<strong>on</strong> prohibiti<strong>on</strong>s of Secti<strong>on</strong>1201(a)(1) for n<strong>on</strong>profit libraries, archives, or educati<strong>on</strong>al instituti<strong>on</strong>s that gain access to acommercially exploited copyrighted work solely in order to make a good faith determinati<strong>on</strong> ofwhe<strong>the</strong>r to acquire a copy of that work, provided that a copy of <strong>the</strong> work is not retained l<strong>on</strong>gerthan necessary to make <strong>the</strong> good faith determinati<strong>on</strong>, is used for no o<strong>the</strong>r purpose, and <strong>the</strong>re isnot o<strong>the</strong>rwise reas<strong>on</strong>ably available an identical copy of <strong>the</strong> work in ano<strong>the</strong>r form. Secti<strong>on</strong>1201(e) provides that <strong>the</strong> prohibiti<strong>on</strong>s of Secti<strong>on</strong> 1201 do not apply to lawfully authorizedinvestigative, protective, informati<strong>on</strong> security, 610 or intelligence activity of law enforcementofficers.(7) Reverse Engineering for InteroperabilitySecti<strong>on</strong> 1201(f) provides three exempti<strong>on</strong>s to <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>s relatingto reverse engineering and interoperability:Reverse Engineering for Interoperability of an Independently Created ComputerProgram. Secti<strong>on</strong> 1201(f)(1) provides that, notwithstanding <strong>the</strong> prohibiti<strong>on</strong>s in Secti<strong>on</strong>1201(a)(1)(A), “a pers<strong>on</strong> who has lawfully obtained <strong>the</strong> right to use a copy of a computerprogram may circumvent a technological measure that effectively c<strong>on</strong>trols access to a particularporti<strong>on</strong> of that program for <strong>the</strong> sole purpose of identifying and analyzing those elements of <strong>the</strong>program that are necessary to achieve interoperability of an independently created computerprogram with o<strong>the</strong>r programs, and that have not previously been readily available to <strong>the</strong> pers<strong>on</strong>engaging in <strong>the</strong> circumventi<strong>on</strong>, to <strong>the</strong> extent any such acts of identificati<strong>on</strong> and analysis do notc<strong>on</strong>stitute infringement under this title.” The language in Secti<strong>on</strong> 1201(f) requiring that <strong>the</strong>reverse engineering be for <strong>the</strong> sole purpose of “identifying and analyzing those elements of <strong>the</strong>program that are necessary to achieve interoperability of an independently created computerprogram with o<strong>the</strong>r programs” comes directly from Article 6 of <strong>the</strong> European Uni<strong>on</strong> SoftwareDirective, and appears to be <strong>the</strong> first time that language from an EU Directive has beenincorporated verbatim into <strong>the</strong> United States Code. 611610611Secti<strong>on</strong> 1201(e) defines “informati<strong>on</strong> security” to mean activities carried out to identify and address <strong>the</strong>vulnerabilities of a government computer, computer system, or computer network.J<strong>on</strong>athan Band & Taro Issihiki, “The New Anti-Circumventi<strong>on</strong> Provisi<strong>on</strong>s in <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act: A FlawedFirst Step,” Cyberspace Lawyer, Feb. 1999, at 2, 4. Secti<strong>on</strong> 1201(f) may also represent <strong>the</strong> first C<strong>on</strong>gressi<strong>on</strong>alrecogniti<strong>on</strong> of <strong>the</strong> legitimacy of software reverse engineering. Id.- 145 -


Development and Employment of a Technological Means for Enabling Interoperability.Secti<strong>on</strong> 1201(f)(2) provides that, notwithstanding <strong>the</strong> prohibiti<strong>on</strong>s in Secti<strong>on</strong>s 1201(a)(2) and1201(b), “a pers<strong>on</strong> may develop and employ technological means to circumvent a technologicalmeasure, or to circumvent protecti<strong>on</strong> afforded by a technological measure, in order to enable <strong>the</strong>identificati<strong>on</strong> and analysis under paragraph (1), or for <strong>the</strong> purpose of enabling interoperability ofan independently created computer program with o<strong>the</strong>r programs, if such means are necessary toachieve such interoperability, to <strong>the</strong> extent that doing so does not c<strong>on</strong>stitute infringement underthis title.”The scope of this exempti<strong>on</strong> is uncertain from its language in several respects. First, it isunclear what kinds of “technological means” C<strong>on</strong>gress had in mind for falling within thisexempti<strong>on</strong>. The reference to allowing a pers<strong>on</strong> to “develop and employ” such technologicalmeans may suggest that <strong>the</strong> exempti<strong>on</strong> is limited to <strong>on</strong>ly those means developed by <strong>the</strong> pers<strong>on</strong>desiring to circumvent, as opposed to commercially available circumventi<strong>on</strong> means. Thelegislative history suggests o<strong>the</strong>rwise, however, for it c<strong>on</strong>templates that <strong>the</strong> rights under Secti<strong>on</strong>1201(f)(2) may be exercised through ei<strong>the</strong>r generally available tools or specially developedtools:[Secti<strong>on</strong> 1201(f)(2)] recognizes that to accomplish <strong>the</strong> acts permitted under[Secti<strong>on</strong> 1201(f)(1)] a pers<strong>on</strong> may, in some instances, have to make and usecertain tools. In most instances <strong>the</strong>se will be generally available tools thatprogrammers use in developing computer programs, such as compilers, traceanalyzers and disassemblers, which are not prohibited by this secti<strong>on</strong>. In certaininstances, it is possible that a pers<strong>on</strong> may have to develop special tools to achieve<strong>the</strong> permitted purpose of interoperability. Thus this provisi<strong>on</strong> creates anexcepti<strong>on</strong> to <strong>the</strong> prohibiti<strong>on</strong> <strong>on</strong> making circumventi<strong>on</strong> tools c<strong>on</strong>tained insubsecti<strong>on</strong>s 1201(a)(2) and (b). These tools can be ei<strong>the</strong>r software or hardware. 612From this legislative history, it is apparent that <strong>the</strong> phrase “develop and employ” in Secti<strong>on</strong>1201(f)(2) was probably intended to mean “develop and/or employ.”A sec<strong>on</strong>d ambiguity is whe<strong>the</strong>r <strong>the</strong> “technological means” of Secti<strong>on</strong> 1201(f)(2) wereintended to be limited to <strong>the</strong> kinds of reverse engineering “tools” cited in <strong>the</strong> legislative history(compilers, trace analyzers, disassemblers and <strong>the</strong> like), or whe<strong>the</strong>r <strong>the</strong>y could be read morebroadly to encompass computer programs, such as applicati<strong>on</strong> programs, that in <strong>the</strong>ir ordinaryoperati<strong>on</strong> are designed to circumvent technological measures protecting ano<strong>the</strong>r computerprogram so as to interoperate with it. For example, c<strong>on</strong>sider <strong>the</strong> fact pattern at issue in <strong>the</strong> caseof Lexmark Internati<strong>on</strong>al, Inc. v. Static C<strong>on</strong>trol Comp<strong>on</strong>ents, Inc., 613 discussed in Secti<strong>on</strong>II.G.1(o)(1) below. In that case, <strong>the</strong> district court ruled <strong>on</strong> a moti<strong>on</strong> for a preliminary injuncti<strong>on</strong>that Static C<strong>on</strong>trol violated Secti<strong>on</strong> 1201(a)(2) by distributing microchips that were used toreplace <strong>the</strong> microchip found in <strong>the</strong> plaintiff Lexmark’s t<strong>on</strong>er cartridges. Static C<strong>on</strong>trol’s612613S. Rep. No. 105-190, at 33 (1998).253 F. Supp. 2d 943, 948-49 (E.D. Ky. 2003), rev’d, 387 F.3d 522 (6 th Cir. 2004), reh’g denied, 2004 U.S.App. LEXIS 27,422 (Dec. 29, 2004), reh’g en banc denied, 2005 U.S. App. LEXIS 3330 (6 th Cir. Feb. 15,2005).- 146 -


microchip c<strong>on</strong>tained a computer program that circumvented Lexmark’s au<strong>the</strong>nticati<strong>on</strong> sequencethat prevented <strong>the</strong> printer engine software <strong>on</strong> <strong>the</strong> Lexmark printer from allowing <strong>the</strong> printer tooperate with a refilled t<strong>on</strong>er cartridge.The district court in that case ruled that <strong>the</strong> exempti<strong>on</strong>s of Secti<strong>on</strong> 1201(f) did not applybecause Static C<strong>on</strong>trol’s microchips could not be c<strong>on</strong>sidered to c<strong>on</strong>tain independently createdcomputer programs, since <strong>the</strong> t<strong>on</strong>er loading program <strong>on</strong> those microchips was an exact copy of<strong>the</strong> t<strong>on</strong>er loading program c<strong>on</strong>tained <strong>on</strong> Lexmark’s microchips. 614 However, suppose StaticC<strong>on</strong>trol had independently developed <strong>the</strong> computer program c<strong>on</strong>tained <strong>on</strong> its microchips. 615Would <strong>the</strong> exempti<strong>on</strong> of Secti<strong>on</strong> 1201(f)(2) apply? Static C<strong>on</strong>trol could argue yes, <strong>on</strong> <strong>the</strong>ground that Secti<strong>on</strong> 1201(f)(2) permits it to “employ technological means [<strong>the</strong> computer program<strong>on</strong> its microchip] to circumvent a technological measure [<strong>the</strong> au<strong>the</strong>nticati<strong>on</strong> sequenceimplemented by <strong>the</strong> Lexmark printer engine software] … for <strong>the</strong> purpose of enablinginteroperability of an independently created computer program [again, <strong>the</strong> computer program <strong>on</strong>Static C<strong>on</strong>trol’s microchip] with o<strong>the</strong>r programs [<strong>the</strong> Lexmark printer engine program].”On <strong>the</strong> o<strong>the</strong>r hand, Lexmark could argue no, <strong>on</strong> <strong>the</strong> ground that <strong>the</strong> legislative historyindicates that <strong>the</strong> “technological means” referenced in Secti<strong>on</strong> 1201(f)(2) were meant to belimited to reverse engineering “tools,” and <strong>the</strong> program <strong>on</strong> <strong>the</strong> Static C<strong>on</strong>trol microchip is not areverse engineering tool, but ra<strong>the</strong>r an applicati<strong>on</strong> program. In sum, <strong>the</strong> issue is whe<strong>the</strong>r <strong>the</strong>“independently created computer program” referenced in Secti<strong>on</strong> 1201(f)(2) can also c<strong>on</strong>stitute<strong>the</strong> “technological means” of circumventi<strong>on</strong>, or whe<strong>the</strong>r <strong>the</strong> “technological means” is limited to<strong>the</strong> reverse engineering tool used to develop <strong>the</strong> independently created computer program in <strong>the</strong>first place. Stated differently, <strong>the</strong> issue is whe<strong>the</strong>r Secti<strong>on</strong> 1201(f)(2) was meant to be narrow tocover <strong>on</strong>ly <strong>the</strong> development and employment of special tools used to aid <strong>the</strong> reverse engineeringpermitted by Secti<strong>on</strong> 1201(f)(1), or whe<strong>the</strong>r it was intended to permit more generalizedcircumventi<strong>on</strong> of technological measures by <strong>on</strong>e computer program in order to interoperate withano<strong>the</strong>r computer program whose technological protecti<strong>on</strong> measures are being circumvented by<strong>the</strong> first program. A similar ambiguity is embedded in Secti<strong>on</strong> 1201(f)(2)’s reference to “o<strong>the</strong>r”programs – can a program whose technological measure is circumvented by an independentlycreated computer program, both in <strong>the</strong> ordinary operati<strong>on</strong> of <strong>the</strong> independently created computerprogram and in <strong>the</strong> reverse engineering that was d<strong>on</strong>e to create such program, qualify as an“o<strong>the</strong>r” program? The legislative history c<strong>on</strong>tains no guidance <strong>on</strong> <strong>the</strong> interpretati<strong>on</strong> of “o<strong>the</strong>r” in<strong>the</strong> exempti<strong>on</strong>.614615As discussed fur<strong>the</strong>r in Secti<strong>on</strong> II.G.1(a)(13)(i) below, <strong>the</strong> Sixth Circuit <strong>on</strong> appeal reversed <strong>the</strong> district court’sgrant of a preliminary injuncti<strong>on</strong> and remanded. Am<strong>on</strong>g o<strong>the</strong>r things, <strong>the</strong> Sixth Circuit questi<strong>on</strong>ed whe<strong>the</strong>rLexmark’s t<strong>on</strong>er loading program was even copyrightable, ruling that <strong>on</strong> <strong>the</strong> preliminary injuncti<strong>on</strong> recordLexmark had made inadequate showings with respect to originality of its t<strong>on</strong>er loading program and whe<strong>the</strong>rthat program functi<strong>on</strong>ed as a “lock-out code” that had to be copied for functi<strong>on</strong>al purposes. Lexmark Int’l v.Static C<strong>on</strong>trol Comp<strong>on</strong>ents, 387 F.3d 522, 536-41 (6 th Cir. 2004), reh’g denied, 2004 U.S. App. LEXIS 27,422(Dec. 29, 2004), reh’g en banc denied, 2005 U.S. App. LEXIS 3330 (6 th Cir. Feb. 15, 2005).The Sixth Circuit also ruled that, whe<strong>the</strong>r or not <strong>the</strong> t<strong>on</strong>er loading program <strong>on</strong> Static C<strong>on</strong>trol’s microchips wasindependently created, <strong>the</strong> record established that <strong>the</strong>re were o<strong>the</strong>r programs <strong>on</strong> Static C<strong>on</strong>trol’s microchips thatwere independently created, and those computer programs also interoperated with Lexmark’s printer engineprogram <strong>on</strong> Lexmark’s microchips. Id. at 550.- 147 -


It appears that <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office agrees with an expansive reading of <strong>the</strong> Secti<strong>on</strong>1201(f) exempti<strong>on</strong>. After <strong>the</strong> district court’s decisi<strong>on</strong> in <strong>the</strong> Lexmark case came down, StaticC<strong>on</strong>trol submitted a proposed exempti<strong>on</strong> to <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office in its 2003 rulemakingproceeding under Secti<strong>on</strong> 1201(a)(1) to determine classes of works exempt from <strong>the</strong> anticircumventi<strong>on</strong>prohibiti<strong>on</strong>s. In particular, Static C<strong>on</strong>trol asked for an exempti<strong>on</strong> for <strong>the</strong>following classes of works:1. Computer programs embedded in computer printers and t<strong>on</strong>er cartridges and thatc<strong>on</strong>trol <strong>the</strong> interoperati<strong>on</strong> and functi<strong>on</strong>s of <strong>the</strong> printer and t<strong>on</strong>er cartridge.2. Computer programs embedded in a machine or product and which cannot be copiedduring <strong>the</strong> ordinary operati<strong>on</strong> or use of <strong>the</strong> machine or product.3. Computer programs embedded in a machine or product and that c<strong>on</strong>trol <strong>the</strong> operati<strong>on</strong>of a machine or product c<strong>on</strong>nected <strong>the</strong>reto, but that do not o<strong>the</strong>rwise c<strong>on</strong>trol <strong>the</strong> performance,display or reproducti<strong>on</strong> of copyrighted works that have an independent ec<strong>on</strong>omic significance. 616The <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office set forth its analysis of Static C<strong>on</strong>trol’s requested exempti<strong>on</strong>s,am<strong>on</strong>g many o<strong>the</strong>r requested exempti<strong>on</strong>s, in a lengthy memorandum issued <strong>on</strong> Oct. 27, 2003 by<strong>the</strong> Register of <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>s to <strong>the</strong> Librarian of C<strong>on</strong>gress. Although it is not clear from <strong>the</strong>memorandum whe<strong>the</strong>r <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office took a positi<strong>on</strong> with request to Static C<strong>on</strong>trol’ssec<strong>on</strong>d and third proposed exempti<strong>on</strong>s, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office determined that no exempti<strong>on</strong> waswarranted for <strong>the</strong> first proposed exempti<strong>on</strong> because “Static C<strong>on</strong>trol’s purpose of achievinginteroperability of remanufactured printer cartridges with Lexmark’s … printers could have beenlawfully achieved by taking advantage of <strong>the</strong> defense found in §1201(f), <strong>the</strong> reverse engineeringexempti<strong>on</strong>.” 617The <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office read <strong>the</strong> purpose behind Secti<strong>on</strong> 1201(f) broadly: “Not <strong>on</strong>ly didC<strong>on</strong>gress intend that ‘interoperability’ include <strong>the</strong> exchange of informati<strong>on</strong> between computerprograms; it also intended ‘for such programs mutually to use <strong>the</strong> informati<strong>on</strong> which has beenexchanged.’ Interoperability necessarily includes, <strong>the</strong>refore, c<strong>on</strong>cerns for functi<strong>on</strong>ality and use,and not <strong>on</strong>ly of individual use, but for enabling competitive choices in <strong>the</strong> marketplace.” 618 The<str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office elaborated that <strong>the</strong> statutory exempti<strong>on</strong>s of Secti<strong>on</strong> 1201(f) afford broaderexempti<strong>on</strong>s than even <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office itself could grant by virtue of rulemaking. Inparticular, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office’s exempti<strong>on</strong>s are limited to individual acts of exempti<strong>on</strong>prohibited by Secti<strong>on</strong> 1201(a)(1), whereas <strong>the</strong> statutory exempti<strong>on</strong>s of Secti<strong>on</strong> 1201(f) include<strong>the</strong> distributi<strong>on</strong> of <strong>the</strong> means of circumventi<strong>on</strong> into <strong>the</strong> marketplace:616617618Memorandum from Marybeth Peters, Register of <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>s, to James H. Billingt<strong>on</strong>, Librarian of C<strong>on</strong>gress,“Recommendati<strong>on</strong> of <strong>the</strong> Register of <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>s in RM 2002-4; Rulemaking <strong>on</strong> Exempti<strong>on</strong>s from Prohibiti<strong>on</strong><strong>on</strong> Circumventi<strong>on</strong> of <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Protecti<strong>on</strong> Systems for Access C<strong>on</strong>trol Technologies,” Oct. 27, 2003, p. 172,available as of Jan. 10, 2004 at www.copyright.gov/1201/docs/registers-recommendati<strong>on</strong>.pdf.Id. at 176.Id. at 178 (quoting <strong>the</strong> House Manager’s Report at 14).- 148 -


[T]he statutory exempti<strong>on</strong> found in §1201(f) not <strong>on</strong>ly permits circumventi<strong>on</strong> oftechnological measures to analyze and identify interoperable elements of aprotected computer program, but also provides exempti<strong>on</strong>s to <strong>the</strong> traffickingprovisi<strong>on</strong>s in §1201(a)(2) and 1201(b). Even if <strong>the</strong> Register had found a factualbasis for an exempti<strong>on</strong>, it would <strong>on</strong>ly exempt <strong>the</strong> act of circumventi<strong>on</strong>. It wouldnot exempt <strong>the</strong> creati<strong>on</strong> and distributi<strong>on</strong> of <strong>the</strong> means to circumvent or <strong>the</strong>distributi<strong>on</strong> of interoperable computer programs embedded in devices. Since it isclear that Static C<strong>on</strong>trol’s goal was not merely to privately circumvent, but ra<strong>the</strong>rto facilitate <strong>the</strong> distributi<strong>on</strong> of competitive t<strong>on</strong>er cartridges to o<strong>the</strong>rs, arecommendati<strong>on</strong> for an exempti<strong>on</strong> in this rulemaking would have little effect <strong>on</strong><strong>the</strong> intended use. 619Accordingly, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office c<strong>on</strong>cluded that “C<strong>on</strong>gress has comprehensivelyaddressed <strong>the</strong> important c<strong>on</strong>cern of interoperability for competiti<strong>on</strong> and functi<strong>on</strong>ality within itsown statutory exempti<strong>on</strong>” and that an exempti<strong>on</strong> through rulemaking was not necessary. 620Providing Informati<strong>on</strong> or Means for Interoperability to O<strong>the</strong>rs. Secti<strong>on</strong> 1201(f)(3)provides that <strong>the</strong> “informati<strong>on</strong> acquired through <strong>the</strong> acts permitted under paragraph (1), and <strong>the</strong>means permitted under paragraph (2), may be made available to o<strong>the</strong>rs if <strong>the</strong> pers<strong>on</strong> referred to inparagraph (1) or (2), as <strong>the</strong> case may be, provides such informati<strong>on</strong> or means solely for <strong>the</strong>purpose of enabling interoperability of an independently created computer program with o<strong>the</strong>rprograms, and to <strong>the</strong> extent that doing so does not c<strong>on</strong>stitute infringement under this title orviolate applicable law o<strong>the</strong>r than this secti<strong>on</strong>.”Secti<strong>on</strong> 1201(f)(3) c<strong>on</strong>tains ambiguities with respect to its scope that are similar to thosenoted with respect to Secti<strong>on</strong> 1201(f)(2). The legislative history for Secti<strong>on</strong> 1201(f)(3) states <strong>the</strong>following:[Secti<strong>on</strong> 1201(f)(3)] recognizes that developing complex computer programsoften involves <strong>the</strong> efforts of many pers<strong>on</strong>s. For example, some of <strong>the</strong>se pers<strong>on</strong>smay be hired to develop a specific porti<strong>on</strong> of <strong>the</strong> final product. For that pers<strong>on</strong> toperform <strong>the</strong>se tasks, some of <strong>the</strong> informati<strong>on</strong> acquired through <strong>the</strong> permittedanalysis, and <strong>the</strong> tools to accomplish it, may have to be made available to thatpers<strong>on</strong>. This subsecti<strong>on</strong> allows developers of independently created software torely <strong>on</strong> third parties ei<strong>the</strong>r to develop <strong>the</strong> necessary circumventi<strong>on</strong> tools or toidentify <strong>the</strong> necessary informati<strong>on</strong> to achieve interoperability. The ability to rely<strong>on</strong> third parties is particularly important for small software developers who do nothave <strong>the</strong> capability of performing <strong>the</strong>se functi<strong>on</strong>s in-house. This provisi<strong>on</strong>permits such sharing of informati<strong>on</strong> and tools. 621619620621Id. at 180-81 (emphasis in original).Id. at 183.S. Rep. No. 105-190, at 33 (1998).- 149 -


Although Secti<strong>on</strong> 1201(f)(3) clearly c<strong>on</strong>templates an exempti<strong>on</strong> for distributi<strong>on</strong> to thirdparties of <strong>the</strong> “technological means” referenced in Secti<strong>on</strong> 1201(f)(2), as well as <strong>the</strong>“informati<strong>on</strong>” gleaned from reverse engineering under Secti<strong>on</strong> 1201(f)(1), <strong>the</strong> same issues of <strong>the</strong>scope of “technological means” intended to be within <strong>the</strong> exempti<strong>on</strong> arise as in Secti<strong>on</strong>1201(f)(2). As noted, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office seems to read Secti<strong>on</strong> 1201(f)(3) broadly to permit<strong>the</strong> distributi<strong>on</strong> of independently developed computer programs that circumvent <strong>the</strong>technological protecti<strong>on</strong> measures of o<strong>the</strong>r programs in order to interoperate with such o<strong>the</strong>rprograms. The legislative history quoted above, however, seems to read Secti<strong>on</strong> 1201(f)(3) morenarrowly as directed to distributi<strong>on</strong> of reverse engineering “tools” or informati<strong>on</strong> to third partydevelopers who may be hired to assist in <strong>the</strong> development of an independent computer program,as opposed to a distributi<strong>on</strong> of a competitive product into <strong>the</strong> marketplace.These ambiguities in <strong>the</strong> scope of <strong>the</strong> Secti<strong>on</strong> 1201(f) exempti<strong>on</strong>s will need to beresolved over time through litigati<strong>on</strong>. In additi<strong>on</strong>, it is worth observing that, although Secti<strong>on</strong>1201(f) provides useful exempti<strong>on</strong>s, it leaves open <strong>the</strong> issue of whe<strong>the</strong>r circumventi<strong>on</strong> of accessrestricti<strong>on</strong>s in order to perform reverse engineering for purposes o<strong>the</strong>r than interoperability, suchas error correcti<strong>on</strong>, is prohibited. The <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office’s exempti<strong>on</strong> rulemaking procedures mayafford a mechanism to fur<strong>the</strong>r flesh out or clarify <strong>the</strong> Secti<strong>on</strong> 1201(f) exempti<strong>on</strong>s.Several cases have adjudicated <strong>the</strong> scope of <strong>the</strong> Secti<strong>on</strong> 1201(f) exempti<strong>on</strong>:(i)Universal City Studios Inc. v. ReimerdesIn Universal City Studios, Inc. v. Reimerdes, 622 discussed in fur<strong>the</strong>r detail in Secti<strong>on</strong>II.G.1(m)(4) below, <strong>the</strong> court rejected <strong>the</strong> applicability of Secti<strong>on</strong> 1201(f) to <strong>the</strong> defendants’posting <strong>on</strong> <strong>the</strong>ir Web site of, and posting links to, a descrambling computer program known as“DeCSS,” which circumvented <strong>the</strong> encrypti<strong>on</strong> of movies stored in digital form <strong>on</strong> a digitalversatile disk (“DVD”) encoded with <strong>the</strong> industry standard C<strong>on</strong>tent Scramble System (“CSS”).The defendants argued that DeCSS had been created to fur<strong>the</strong>r <strong>the</strong> development of a DVD playerthat would run under <strong>the</strong> Linux operating system, as <strong>the</strong>re allegedly were no Linux-compatibleplayers <strong>on</strong> <strong>the</strong> market at <strong>the</strong> time. 623 They fur<strong>the</strong>r c<strong>on</strong>tended that DeCSS was necessary toachieve interoperability between computers running <strong>the</strong> Linux operating system and DVDs, andthat <strong>the</strong> excepti<strong>on</strong> of Secti<strong>on</strong> 1201(f) <strong>the</strong>refore applied. 624The court rejected this argument for several reas<strong>on</strong>s. First, Secti<strong>on</strong> 1201(f)(3) permitsinformati<strong>on</strong> acquired through reverse engineering to be made available to o<strong>the</strong>rs <strong>on</strong>ly by <strong>the</strong>pers<strong>on</strong> who acquired <strong>the</strong> informati<strong>on</strong>, and <strong>the</strong> defendants did not <strong>the</strong>mselves do any reverseengineering (DeCSS had been created by a third party). Even if <strong>the</strong> defendants had authoredDeCSS, <strong>the</strong> court ruled that Secti<strong>on</strong> 1201(f)(3) would allow <strong>the</strong> disseminati<strong>on</strong> <strong>on</strong>ly ofinformati<strong>on</strong> gleaned from <strong>the</strong> reverse engineering and solely for <strong>the</strong> purpose of achievinginteroperability as defined in <strong>the</strong> statute (which was not <strong>the</strong> reas<strong>on</strong> <strong>the</strong> defendants posted622623624111 F. Supp. 2d 294 (S.D.N.Y. 2000).Id. at 319.Id. at 320.- 150 -


DeCSS), and not disseminati<strong>on</strong> of <strong>the</strong> means of circumventi<strong>on</strong> itself. 625 Sec<strong>on</strong>d, <strong>the</strong> defendantscould not claim that <strong>the</strong> sole purpose of DeCSS was to create a Linux DVD player, becauseDeCSS was developed <strong>on</strong> and ran under <strong>the</strong> Windows operating system, and could <strong>the</strong>reforedecrypt and play DVD movies <strong>on</strong> Windows as well as Linux machines. 626 In additi<strong>on</strong>, in anearlier opini<strong>on</strong>, <strong>the</strong> court ruled that Secti<strong>on</strong> 1201(f) was inapplicable because <strong>the</strong> legislativehistory of <strong>the</strong> DMCA makes clear that Secti<strong>on</strong> 1201(f) permits reverse engineering ofcopyrighted computer programs <strong>on</strong>ly and does not authorize circumventi<strong>on</strong> of technologicalsystems that c<strong>on</strong>trol access to o<strong>the</strong>r copyrighted works, such as movies. 627(ii) Storage Technology Corporati<strong>on</strong> v. CustomHardware Engineering & C<strong>on</strong>sultingThis case rejected an asserti<strong>on</strong> of a Secti<strong>on</strong> 1201(f) defense because <strong>the</strong> defendant’scircumventi<strong>on</strong> resulted in an infringing copy of <strong>the</strong> plaintiff’s copyrighted program being madein RAM, and <strong>the</strong> Secti<strong>on</strong> 1201(f) defense exempts circumventi<strong>on</strong> <strong>on</strong>ly if it does not result incopyright infringement. For a discussi<strong>on</strong> of <strong>the</strong> details of <strong>the</strong> case, see Secti<strong>on</strong> II.G.1(o)(4)below.Inc.(iii) Chamberlain Group, Inc. v. Skylink Technologies,The facts of this case are set forth in Secti<strong>on</strong> II.G.1(o)(2) below. Although this case didnot directly adjudicate <strong>the</strong> scope of <strong>the</strong> Secti<strong>on</strong> 1201(f) exempti<strong>on</strong>s, <strong>the</strong> court made a fewstatements in dicta suggesting that Secti<strong>on</strong> 1201(f) acts to immunize interoperability from anticircumventi<strong>on</strong>liability. In that case, <strong>the</strong> Federal Circuit ruled that <strong>the</strong> anti-circumventi<strong>on</strong>provisi<strong>on</strong>s of Secti<strong>on</strong> 1201 do not apply to all forms of circumventi<strong>on</strong> to gain access to a work,but ra<strong>the</strong>r <strong>on</strong>ly to circumventi<strong>on</strong>s that facilitate some form of copyright infringement. 628 Thecourt reached this c<strong>on</strong>clusi<strong>on</strong> in part <strong>on</strong> <strong>the</strong> rati<strong>on</strong>ale that a broad interpretati<strong>on</strong> of <strong>the</strong> anticircumventi<strong>on</strong>provisi<strong>on</strong>s to prohibit all forms of unauthorized access, whe<strong>the</strong>r or not protectedcopyright rights were <strong>the</strong>reby implicated, would be tantamount to “ignoring <strong>the</strong> explicit625626627628Id.Id.Universal City Studios Inc. v. Reimerdes, 82 F. Supp. 2d 211, 218 (S.D.N.Y. 2000) (citing S. Rep. No. 105-190(1998) and H.R. Rep. 105-551 (II) (1998)). Secti<strong>on</strong> 1201(f) would seem applicable to <strong>the</strong> original reverseengineering that <strong>the</strong> developers of DeCSS engaged in, but <strong>the</strong> trickier issue dealt with by <strong>the</strong> court is whe<strong>the</strong>r itshould apply to subsequent use of <strong>the</strong> DeCSS to gain access to copyrighted works stored <strong>on</strong> a DVD in order toplay such works under <strong>the</strong> Linux operating system. Such access is for use of <strong>the</strong> work stored <strong>on</strong> <strong>the</strong> DVD(albeit in an interoperable way), whereas <strong>the</strong> excepti<strong>on</strong> speaks in terms of “identifying and analyzing” <strong>the</strong>copyrighted work to achieve interoperability. In additi<strong>on</strong>, Secti<strong>on</strong> 1201(f) appears to be a defense <strong>on</strong>ly to <strong>the</strong>c<strong>on</strong>duct of circumventi<strong>on</strong> prohibited by Secti<strong>on</strong> 1201(a)(1), and not to <strong>the</strong> distributi<strong>on</strong> of devices prohibitedunder Secti<strong>on</strong>s 1201(a)(2) and 1201(b). Because <strong>the</strong> court found that DeCSS is a device within <strong>the</strong> prohibiti<strong>on</strong>of Secti<strong>on</strong> 1201(a)(2), it was not subject to <strong>the</strong> excepti<strong>on</strong> of Secti<strong>on</strong> 1201(f).Chamberlain Group, Inc. v. Skylink Technologies, Inc., 381 F.3d 1178, 1195, 1203 (Fed. Cir. 2004), cert.denied, 161 L. Ed. 2d 481 (2005).- 151 -


immunizati<strong>on</strong> of interoperability from anticircumventi<strong>on</strong> liability under § 1201(f).” 629 Thislanguage, although dicta, characterizes <strong>the</strong> Secti<strong>on</strong> 1201(f) exempti<strong>on</strong> very broadly. 630Ano<strong>the</strong>r dictum by <strong>the</strong> court in c<strong>on</strong>necti<strong>on</strong> with articulating its rati<strong>on</strong>ale for rejectingsuch a broad interpretati<strong>on</strong> of anti-circumventi<strong>on</strong> liability makes clear <strong>the</strong> court’s belief that <strong>the</strong>anti-circumventi<strong>on</strong> provisi<strong>on</strong>s should not be c<strong>on</strong>strued to prevent interoperability of computerprograms:Chamberlain’s proposed c<strong>on</strong>structi<strong>on</strong> would allow any manufacturer of anyproduct to add a single copyrighted sentence or software fragment to its product,wrap <strong>the</strong> copyrighted material in a trivial “encrypti<strong>on</strong>” scheme, and <strong>the</strong>reby gain<strong>the</strong> right to restrict c<strong>on</strong>sumers’ rights to use its products in c<strong>on</strong>juncti<strong>on</strong> withcompeting products. In o<strong>the</strong>r words, Chamberlain’s c<strong>on</strong>structi<strong>on</strong> of <strong>the</strong> DMCAwould allow virtually any company to attempt to leverage its sales intoaftermarket m<strong>on</strong>opolies – a practice that both <strong>the</strong> antitrust laws and <strong>the</strong> doctrineof copyright misuse normally prohibit. 631Comp<strong>on</strong>ents, Inc.(iv) Lexmark Internati<strong>on</strong>al, Inc. v. Static C<strong>on</strong>trolFor a discussi<strong>on</strong> of <strong>the</strong> applicability of <strong>the</strong> reverse engineering excepti<strong>on</strong> of Secti<strong>on</strong>1201(f) in this case, see Secti<strong>on</strong> II.G.1(o)(1) below.(v)Davids<strong>on</strong> Assocs. v. <strong>Internet</strong> GatewayIn this case, <strong>the</strong> plaintiff Davids<strong>on</strong> & Assocs., doing business as Blizzard Entertainment,owned <strong>the</strong> copyrights in several computer games. The games could be played in ei<strong>the</strong>r a singleplayermode or in an <strong>on</strong>line multi-player mode called “Battle.net mode.” 632 Blizzard operated a24-hour <strong>on</strong>line gaming service known as <strong>the</strong> Battle.net service that allowed owners of certainBlizzard games to play those games against each o<strong>the</strong>r in Battle.net mode by linking toge<strong>the</strong>rover <strong>the</strong> <strong>Internet</strong> through Battle.net servers. In additi<strong>on</strong> to multi-player game play, Battle.netmode allowed users to chat with o<strong>the</strong>r potential players, to record wins and losses and saveadvancements in a password protected individual game account, and to set up private games <strong>on</strong><strong>the</strong> Battle.net service to allow players to determine whom <strong>the</strong>y wished to interact with <strong>on</strong> <strong>the</strong>Battle.net service. 633 The court noted that <strong>the</strong>se Battle.net mode features were “accessed from629630631632633Id. at 1200.The court noted that it had no occasi<strong>on</strong> to reach <strong>the</strong> argument, raised by an amicus, that Secti<strong>on</strong> 1201(f) shouldcover <strong>the</strong> defendant’s acti<strong>on</strong>s in distributing a product that circumvented technological measures restrictingaccess to <strong>the</strong> plaintiff’s computer program so as to interoperate with it. Because Secti<strong>on</strong> 1201(f) is anaffirmative defense, <strong>the</strong> court noted that it would become relevant <strong>on</strong>ly if <strong>the</strong> plaintiff could prove a prima faciecase of anti-circumventi<strong>on</strong> liability to shift <strong>the</strong> burden to <strong>the</strong> defendant, which <strong>the</strong> court ruled <strong>the</strong> plaintiff hadultimately failed to do. Id. at 1200 n.15.Id. at 1201 (citati<strong>on</strong>s omitted).Davids<strong>on</strong> & Assocs. v. <strong>Internet</strong> Gateway, 334 F. Supp. 2d 1164, 1168 (E.D. Mo. 2004).Id.- 152 -


within <strong>the</strong> games <strong>the</strong>mselves,” which seems to mean that <strong>the</strong>re was particular code within <strong>the</strong>Blizzard games that allowed <strong>the</strong>m to operate in Battle.net mode and communicate with <strong>the</strong>Battle.net servers. 634The Battle.net service was designed to prohibit access and use of Battle.net mode byunauthorized or pirated copies of Blizzard games. In particular, in order to log <strong>on</strong> to <strong>the</strong>Battle.net service and access Battle.net mode, <strong>the</strong> Blizzard games were designed to initiate anau<strong>the</strong>nticati<strong>on</strong> sequence or “secret handshake” between <strong>the</strong> game and <strong>the</strong> Battle.net server based<strong>on</strong> <strong>the</strong> “CD Key” of <strong>the</strong> game, a unique sequence of alphanumeric characters that was printed <strong>on</strong>a sticker attached to <strong>the</strong> case in which each game was packaged. The game would pass <strong>the</strong> CDKey to <strong>the</strong> Battle.net server, which would verify its validity and determine whe<strong>the</strong>r <strong>the</strong> same CDKey was already being used by ano<strong>the</strong>r game that was currently logged <strong>on</strong> to <strong>the</strong> server. If <strong>the</strong>CD Key was determined to be valid by <strong>the</strong> server and not already in use, <strong>the</strong> server would send asignal to <strong>the</strong> game allowing it to enter <strong>the</strong> Battle.net mode and to use <strong>the</strong> Battle.net gamingservices. 635In order to install a copy of a Blizzard game, <strong>the</strong> user was required to click acceptance ofa clickwrap license agreement that prohibited reverse engineering of <strong>the</strong> software and thatrequired <strong>the</strong> user to agree to <strong>the</strong> Terms of Use of <strong>the</strong> Battle.net service, which prohibitedemulati<strong>on</strong> or redirecti<strong>on</strong> of <strong>the</strong> communicati<strong>on</strong> protocols used by Blizzard as part of Battle.netservice for any purpose. 636The defendants developed a server, known as <strong>the</strong> bnetd server, that was designed toemulate <strong>the</strong> Battle.net service so as to allow players to play <strong>the</strong>ir Blizzard games in an <strong>on</strong>linemulti-player mode through <strong>the</strong> bnetd server. 637 In order to develop <strong>the</strong> bnetd server, <strong>the</strong>defendants had to reverse engineer <strong>the</strong> Blizzard games to learn <strong>the</strong> Battle.net protocol. Inadditi<strong>on</strong>, because Blizzard games were designed to c<strong>on</strong>nect <strong>on</strong>ly to Battle.net servers, <strong>the</strong>defendants had to modify a computer file in <strong>the</strong> Blizzard games c<strong>on</strong>taining <strong>the</strong> <strong>Internet</strong> addressof <strong>the</strong> Battle.net servers so as to cause <strong>the</strong> games to c<strong>on</strong>nect to a bnetd server instead. Thedefendants distributed a utility known as “BNS” that modified such file and caused Blizzardgames to c<strong>on</strong>nect to <strong>the</strong> bnetd server ra<strong>the</strong>r than <strong>the</strong> Battle.net server. Once c<strong>on</strong>nected to <strong>the</strong>bnetd server through <strong>the</strong> modified <strong>Internet</strong> address file, a Blizzard game would send its CD Keyto <strong>the</strong> bnetd server. When <strong>the</strong> bnetd server received <strong>the</strong> CD Key, unlike Battle.net, it did notdetermine whe<strong>the</strong>r <strong>the</strong> CD Key was valid or currently in use by ano<strong>the</strong>r player. Instead, <strong>the</strong>bnetd server would always send <strong>the</strong> game an “okay” reply. Thus, both authorized as well asunauthorized or pirated copies of Blizzard games could be played in <strong>on</strong>line mode through <strong>the</strong>bnetd server. 638634635636637638Id.Id. at 1169.Id. at 1169-71.Id. at 1172.Id. at *1172-73.- 153 -


The plaintiffs alleged two violati<strong>on</strong>s of <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>s of <strong>the</strong> DMCA.First, <strong>the</strong>y alleged that <strong>the</strong> defendants had violated Secti<strong>on</strong> 1201(a)(1)(A) in <strong>the</strong> course ofdevelopment of <strong>the</strong> bnetd emulator by circumventing Blizzard’s technological measures (<strong>the</strong>secret handshake) to gain access to Battle.net mode in <strong>the</strong> course of <strong>the</strong>ir reverse engineering. 639Although not clear from <strong>the</strong> court’s opini<strong>on</strong>, <strong>the</strong> copyrighted work that <strong>the</strong> defendant’s gainedaccess to via <strong>the</strong>ir circumventi<strong>on</strong> was apparently <strong>the</strong> code in <strong>the</strong> Blizzard games that allowed<strong>the</strong>m to operate in Battle.net mode and to communicate with <strong>the</strong> Battle.net service.The defendants argued that <strong>the</strong>ir circumventi<strong>on</strong> in <strong>the</strong> course of reverse engineering waspermitted by Secti<strong>on</strong> 1201(f)(1) because it was d<strong>on</strong>e for <strong>the</strong> sole purpose of creating anddistributing interoperable computer programs such as <strong>the</strong> bnetd server. They also argued that<strong>the</strong>y had authority to access <strong>the</strong> Battle.net mode because <strong>the</strong>y lawfully purchased <strong>the</strong> Blizzardsoftware <strong>the</strong>y reverse engineered.The district court rejected <strong>the</strong>se defenses. First, it ruled that it was “undisputed thatdefendants circumvented Blizzard’s technological measure, <strong>the</strong> ‘secret handshake,’ betweenBlizzard games and Battle.net, that effectively c<strong>on</strong>trol access to Battle.net mode.” 640 By itsreference to “Battle.net mode,” <strong>the</strong> court was again presumably referring to <strong>the</strong> code in <strong>the</strong>Blizzard games that allowed <strong>the</strong>m to operate in Battle.net mode. The court rejected <strong>the</strong>defendants’ reliance <strong>on</strong> Secti<strong>on</strong> 1201(f)(1), because <strong>the</strong> defendants had not developed anindependently created computer program. The court noted that <strong>the</strong> defendants’ acti<strong>on</strong>s indeveloping <strong>the</strong> bnetd server “extended into <strong>the</strong> realm of copyright infringement” because <strong>on</strong>cegame play started, “<strong>the</strong>re are no differences between Battle.net and <strong>the</strong> bnetd emulator from <strong>the</strong>standpoint of a user who is actually playing <strong>the</strong> game.” 641 It is unclear from this languageprecisely what <strong>the</strong> basis was <strong>on</strong> which <strong>the</strong> court found copyright infringement. Perhaps <strong>the</strong> courtbelieved that <strong>the</strong> defendants had copied code from <strong>the</strong> Battle.net server into <strong>the</strong> bnetd server, forearlier in <strong>the</strong> opini<strong>on</strong> <strong>the</strong> court noted that <strong>the</strong> plaintiffs c<strong>on</strong>tended “that <strong>the</strong> defendants not <strong>on</strong>lycopied code that would achieve interoperability, but also copied elements that would preserveplayer account informati<strong>on</strong>, display of ic<strong>on</strong>s, and presentati<strong>on</strong> of ad banners.” 642 However, <strong>the</strong>opini<strong>on</strong> <strong>on</strong> appeal suggests that <strong>the</strong>re was no copying of battle.net server code into <strong>the</strong> bnetdserver. 643The court also rejected <strong>the</strong> Secti<strong>on</strong> 1201(f)(1) defense because it found that <strong>the</strong>defendants’ acti<strong>on</strong>s c<strong>on</strong>stituted more than enabling interoperability, since <strong>the</strong> emulator did not639640641642643Id. at 1183.Id. at 1184-85.Id. at 1185.Id. at 1184.Davids<strong>on</strong> & Assocs. v. Jung, 422 F.3d 630, 636 (8 th Cir. 2005) (“By necessity, Appellants used reverseengineering to learn Blizzard’s protocol language and to ensure that bnetd.org worked with Blizzard games.Combs used reverse engineering to develop <strong>the</strong> bnetd.org server, including a program called ‘tcpdump’ to logcommunicati<strong>on</strong>s between Blizzard games and <strong>the</strong> Battle.net server.”).- 154 -


check <strong>the</strong> validity of <strong>the</strong> CD Key code passed from <strong>the</strong> game to <strong>the</strong> emulator, <strong>the</strong>reby allowingunauthorized copies of <strong>the</strong> Blizzard games to play <strong>on</strong> bnetd servers. 644The plaintiffs also asserted that by distributing <strong>the</strong> bnetd software, <strong>the</strong> defendants hadviolated Secti<strong>on</strong> 1201(a)(2) by trafficking in devices whose <strong>on</strong>ly purpose was to circumvent <strong>the</strong>irsecret handshake and allow access to Battle.net mode. The defendants did not dispute <strong>the</strong>plaintiffs’ factual asserti<strong>on</strong>s, but instead asserted <strong>the</strong> defense of Secti<strong>on</strong>s 1201(f)(2)-(3) <strong>on</strong> <strong>the</strong>ground that those secti<strong>on</strong>s entitled <strong>the</strong>m to distribute software to o<strong>the</strong>rs for <strong>the</strong> purpose ofenabling interoperability with <strong>the</strong> Blizzard games. 645 The court rejected <strong>the</strong> defenses <strong>on</strong> twogrounds. First, <strong>the</strong> court ruled that <strong>the</strong> defendants’ purpose in distributing <strong>the</strong>ir software was notsolely to enable interoperability, but ra<strong>the</strong>r to “avoid <strong>the</strong> restricted access to Battle.net.” 646 Inadditi<strong>on</strong>, <strong>the</strong> court reiterated its c<strong>on</strong>clusi<strong>on</strong> that <strong>the</strong> development and distributi<strong>on</strong> of <strong>the</strong> bnetdsoftware was infringing, and “pers<strong>on</strong>s who commit copyright infringement cannot benefit from<strong>the</strong> exempti<strong>on</strong>s of § 1201(f).” 647 Accordingly, <strong>the</strong> court granted <strong>the</strong> plaintiffs’ moti<strong>on</strong> forsummary judgment <strong>on</strong> <strong>the</strong>ir anti-circumventi<strong>on</strong> and trafficking in anti-circumventi<strong>on</strong> technologyclaims. 648On appeal, <strong>the</strong> Eight Circuit affirmed in an opini<strong>on</strong> that is even more terse and difficult tounderstand than <strong>the</strong> district court’s opini<strong>on</strong>. The court found a violati<strong>on</strong> of Secti<strong>on</strong> 1201(a)(1)merely because unauthorized copies of Blizzard games were allowed to play through <strong>the</strong> bnetdserver, even though <strong>the</strong> circumventi<strong>on</strong> of <strong>the</strong> secret handshake did not cause <strong>the</strong> illegal copy of<strong>the</strong> Blizzard games to be made in <strong>the</strong> first place:Blizzard games, through Battle.net, employed a technological measure, a software“secret handshake” (CD key), to c<strong>on</strong>trol access to its copyrighted games. Thebnetd.org emulator developed by Appellants allowed <strong>the</strong> Blizzard game to accessBattle.net mode features without a valid or unique CD key. As a result,unauthorized copies of <strong>the</strong> Blizzard games were played <strong>on</strong> bnetd.org servers. 649644645646647648649334 F. Supp. 2d at 1185.Id. at 1185-86.Id. at 1186.Id. at 1187.Id.Davids<strong>on</strong> & Assocs. v. Jung, 422 F.3d 630, 640 (8 th Cir. 2005). The Eighth Circuit distinguished <strong>the</strong> Lexmarkdecisi<strong>on</strong> by noting that in Lexmark, <strong>the</strong> Sixth Circuit had found Lexmark’s au<strong>the</strong>nticati<strong>on</strong> sequence did noteffectively c<strong>on</strong>trol access to <strong>the</strong> T<strong>on</strong>er Loading Program and Printer Engine Program at issue, because it wasnot Lexmark’s au<strong>the</strong>nticati<strong>on</strong> sequence that c<strong>on</strong>trolled access to such programs, but ra<strong>the</strong>r <strong>the</strong> purchase of aLexmark printer that allowed access to <strong>the</strong> programs. “Here, Battle.net’s c<strong>on</strong>trol measure was not freelyavailable. Appellants could not have obtained a copy of Battle.net or made use of <strong>the</strong> literal elements ofBattle.net mode without acts of reverse engineering, which allowed for a circumventi<strong>on</strong> of Battle.net andBattle.net mode. Unlike in Lexmark Int’l, Inc., Battle.net mode codes were not accessible by simply purchasinga Blizzard game or logging <strong>on</strong>to Battle.net, nor could data from <strong>the</strong> program be translated into readable sourcecode after which copies were freely available without some type of circumventi<strong>on</strong>.” Id. at 641. Although <strong>the</strong>preceding passage is c<strong>on</strong>fusing, it seems to imply (by <strong>the</strong> reference to “literal elements of Battle.net mode”) that- 155 -


The court also ruled that <strong>the</strong> anti-trafficking provisi<strong>on</strong>s of Secti<strong>on</strong> 1201(a)(2) had been violatedbecause <strong>the</strong> bnetd.org emulator had as its sole purpose “to avoid <strong>the</strong> limitati<strong>on</strong>s of Battle.net.” 650With respect to <strong>the</strong> Secti<strong>on</strong> 1201(f) defense asserted by <strong>the</strong> defendants, <strong>the</strong> Eighth Circuitgeneralized all subsecti<strong>on</strong>s of Secti<strong>on</strong> 1201(f) into <strong>on</strong>e set of requirements as follows:To successfully provide <strong>the</strong> interoperability defense under § 1201(f), Appellantsmust show: (1) <strong>the</strong>y lawfully obtained <strong>the</strong> right to use a copy of a computerprogram; (2) <strong>the</strong> informati<strong>on</strong> ga<strong>the</strong>red as a result of <strong>the</strong> reverse engineering wasnot previously readily available to <strong>the</strong> pers<strong>on</strong> engaging in <strong>the</strong> circumventi<strong>on</strong>; (3)<strong>the</strong> sole purpose of <strong>the</strong> reverse engineering was to identify and analyze thoseelements of <strong>the</strong> program that were necessary to achieve interoperability of anindependently created computer program with o<strong>the</strong>r programs; and (4) <strong>the</strong> allegedcircumventi<strong>on</strong> did not c<strong>on</strong>stitute infringement. 651In a very c<strong>on</strong>fusing porti<strong>on</strong> of its opini<strong>on</strong>, <strong>the</strong> court <strong>the</strong>n ruled that <strong>the</strong> exempti<strong>on</strong> ofSecti<strong>on</strong> 1201(f) was not available to <strong>the</strong> defendants because <strong>the</strong>ir circumventi<strong>on</strong> c<strong>on</strong>stitutedinfringement. Precisely what that “infringement” was is unclear, although <strong>the</strong> court seems tobase its holding <strong>on</strong> <strong>the</strong> fact that infringement by third parties was encouraged because piratedcopies of Blizzard games could be played in multi-player mode through <strong>the</strong> bnetd server (eventhough <strong>the</strong> circumventi<strong>on</strong> at issue did not cause or allow <strong>the</strong> pirated copies of <strong>the</strong> Blizzard gamesto be made in <strong>the</strong> first instance):As detailed earlier, Blizzard’s secret handshake between Blizzard games andBattle.net effectively c<strong>on</strong>trolled access to Battle.net mode within its games. Thepurpose of <strong>the</strong> bnetd.org project was to provide matchmaking services for users ofBlizzard games who wanted to play in a multi-player envir<strong>on</strong>ment without usingBattle.net. The bnetd.org emulator enabled users of Blizzard games to accessBattle.net mode features without a valid or unique CD key to enter Battle.net.The bnetd.org emulator did not determine whe<strong>the</strong>r <strong>the</strong> CD key was valid orcurrently in use by ano<strong>the</strong>r player. As a result, unauthorized copies of <strong>the</strong>Blizzard games were freely played <strong>on</strong> bnetd.org servers. Appellants failed toestablish a genuine issue of material fact as to <strong>the</strong> applicability of <strong>the</strong>interoperability excepti<strong>on</strong>. 652Based <strong>on</strong> <strong>the</strong>se terse and c<strong>on</strong>fusing rulings, <strong>the</strong> court affirmed summary judgment infavor of <strong>the</strong> plaintiffs. 653650651652653<strong>the</strong> secret handshake c<strong>on</strong>trolled access to some Battle.net code within <strong>the</strong> Blizzard game itself. The Court’sreference to “Battle.net” seems to be referring to <strong>the</strong> Battle.net server software.Id.Id. at 641-42.Id. at 642.Id.- 156 -


(vi) S<strong>on</strong>y Computer Entertainment America v. DivineoIn S<strong>on</strong>y Computer Entertainment America, Inc. v. Divineo, 654 <strong>the</strong> court ruled thatdownstream lawful or fair uses of a circumventi<strong>on</strong> device, including use to exercise Secti<strong>on</strong>1201(f) rights, did not relieve <strong>the</strong> defendant from liability for trafficking in such devices under<strong>the</strong> DMCA. For a discussi<strong>on</strong> of <strong>the</strong> details of <strong>the</strong> facts and rulings of <strong>the</strong> court, see Secti<strong>on</strong>II.G.1(b)(3) above.(8) Encrypti<strong>on</strong> ResearchSecti<strong>on</strong> 1201(g) provides that it is not a violati<strong>on</strong> of <strong>the</strong> regulati<strong>on</strong>s prohibitingcircumventing a technological measure if such circumventi<strong>on</strong> is d<strong>on</strong>e as an act of good faith“encrypti<strong>on</strong> research.” “Encrypti<strong>on</strong> research” is defined as “activities necessary to identify andanalyze flaws and vulnerabilities of encrypti<strong>on</strong> technologies applied to copyrighted works, if<strong>the</strong>se activities are c<strong>on</strong>ducted to advance <strong>the</strong> state of knowledge in <strong>the</strong> field of encrypti<strong>on</strong>technology or to assist in <strong>the</strong> development of encrypti<strong>on</strong> products.” “Encrypti<strong>on</strong> technology” isdefined as “<strong>the</strong> scrambling and descrambling of informati<strong>on</strong> using ma<strong>the</strong>matical formulas oralgorithms.” Secti<strong>on</strong>s 1201(g)(2)(C) and (D) require, however, that <strong>the</strong> pers<strong>on</strong> have made agood faith effort to obtain authorizati<strong>on</strong> before <strong>the</strong> circumventi<strong>on</strong>, and that such acts noto<strong>the</strong>rwise c<strong>on</strong>stitute a copyright infringement or violate o<strong>the</strong>r applicable law. Secti<strong>on</strong>1201(g)(5) required that a report be generated to C<strong>on</strong>gress <strong>on</strong> encrypti<strong>on</strong> technologies, withlegislative recommendati<strong>on</strong>s (if any), not later than <strong>on</strong>e year after enactment of <strong>the</strong> bill.(9) Protecti<strong>on</strong> of MinorsSecti<strong>on</strong> 1201(h) provides that a court, in applying <strong>the</strong> prohibiti<strong>on</strong>s of Secti<strong>on</strong> 1201(a)against <strong>the</strong> manufacture or trafficking in a comp<strong>on</strong>ent or part designed to circumventtechnological measures, may c<strong>on</strong>sider <strong>the</strong> necessity of such comp<strong>on</strong>ent or part for its intendedand actual incorporati<strong>on</strong> into a product whose sole purpose is to prevent <strong>the</strong> access of minors tomaterial <strong>on</strong> <strong>the</strong> <strong>Internet</strong>. 655(10) Protecti<strong>on</strong> of Pers<strong>on</strong>ally Identifying Informati<strong>on</strong>Secti<strong>on</strong> 1201(i) provides that it is not a violati<strong>on</strong> of <strong>the</strong> Secti<strong>on</strong> 1201(a)(1)(A) prohibiti<strong>on</strong><strong>on</strong> circumventing a technological measure if such measure, or <strong>the</strong> work it protects, is capable ofcollecting or disseminating pers<strong>on</strong>ally identifying informati<strong>on</strong> reflecting <strong>the</strong> <strong>on</strong>line activities of anatural pers<strong>on</strong> who seeks to gain access to <strong>the</strong> work protected, or if <strong>the</strong> measure in <strong>the</strong> normalcourse of its operati<strong>on</strong> or <strong>the</strong> work it protects, collects or disseminates pers<strong>on</strong>ally identifyinginformati<strong>on</strong> about <strong>the</strong> pers<strong>on</strong> who seeks to gain access to <strong>the</strong> work, without providingc<strong>on</strong>spicuous notice of such collecti<strong>on</strong> or disseminati<strong>on</strong> to such pers<strong>on</strong> and <strong>the</strong> capability to654655547 F. Supp. 2d 957 (N.D. Cal. 2006).An earlier versi<strong>on</strong> of H.R. 2281 would have expanded this excepti<strong>on</strong> to also allow a parent to circumvent atechnological measure c<strong>on</strong>trolling access to a test or evaluati<strong>on</strong> of that parent’s minor child’s abilities by an<strong>on</strong>profit educati<strong>on</strong>al instituti<strong>on</strong> if <strong>the</strong> parent attempted to obtain authorizati<strong>on</strong> before <strong>the</strong> circumventi<strong>on</strong> and<strong>the</strong> circumventi<strong>on</strong> was necessary to obtain a copy of <strong>the</strong> test or evaluati<strong>on</strong>.- 157 -


prevent or restrict <strong>the</strong> same, and <strong>the</strong> circumventi<strong>on</strong> is carried out solely to prevent suchcollecti<strong>on</strong> or disseminati<strong>on</strong>. If a technological measure is disclosed to a user as not beingcapable of collecting or disseminating pers<strong>on</strong>ally identifying informati<strong>on</strong>, <strong>the</strong>n <strong>the</strong> excepti<strong>on</strong> ofSecti<strong>on</strong> 1201(i) does not apply.(11) Security TestingSecti<strong>on</strong> 1201(j) provides that it is not a violati<strong>on</strong> of <strong>the</strong> prohibiti<strong>on</strong>s of Secti<strong>on</strong>s1201(a)(1)(A) and 1201(a)(2) if a pers<strong>on</strong> is engaged in “security testing,” which is defined tomean accessing a computer, computer system, or computer network solely for <strong>the</strong> purpose ofgood faith testing, investigating or correcting a security flaw or vulnerability with <strong>the</strong>authorizati<strong>on</strong> of <strong>the</strong> owner or operator, provided that such act does not o<strong>the</strong>rwise c<strong>on</strong>stitute aviolati<strong>on</strong> of applicable law (including <strong>the</strong> Computer Fraud and Abuse Act of 1986).(12) Copy Restricti<strong>on</strong>s To Be Built Into VCRs and CamcordersSecti<strong>on</strong> 1201(k) dictates that certain technological capabilities be built into c<strong>on</strong>sumeranalog video cassette recorders (VCRs) and camcorders (professi<strong>on</strong>al analog video cassetterecorders are exempted) to protect certain analog televisi<strong>on</strong> programming and prerecordedmovies. Specifically, effective 18 m<strong>on</strong>ths after enactment of <strong>the</strong> DMCA, most formats ofc<strong>on</strong>sumer analog 656 VCRs and camcorders must c<strong>on</strong>tain <strong>on</strong>e of two forms of copy c<strong>on</strong>troltechnology in wide use in <strong>the</strong> market today – ei<strong>the</strong>r <strong>the</strong> “automatic gain c<strong>on</strong>trol technology”(which causes distorti<strong>on</strong> in <strong>the</strong> images up<strong>on</strong> playback) or <strong>the</strong> “colorstripe copy c<strong>on</strong>troltechnology” (which causes distracting visible color stripes to appear through porti<strong>on</strong>s of <strong>the</strong>viewable picture in normal viewing mode). Effective immediately, Secti<strong>on</strong> 1201(k) alsoprohibits tampering with <strong>the</strong>se analog copy c<strong>on</strong>trol technologies to render <strong>the</strong>m ineffective. TheC<strong>on</strong>ference Report accompanying H.R. 2281 657 states that C<strong>on</strong>gress intended this Secti<strong>on</strong> toprohibit <strong>the</strong> manufacture and sale of “black box” devices and software “hacking” that defeat<strong>the</strong>se copy c<strong>on</strong>trol technologies.Secti<strong>on</strong> 1201(k) defines certain specific encoding rules that such devices must implementin order to preserve <strong>the</strong> capability to perform l<strong>on</strong>g-standing c<strong>on</strong>sumer home taping practices.Specifically, such devices cannot limit <strong>the</strong> copying of traditi<strong>on</strong>al broadcasts of programmingthrough basic or extended basic tiers of programming services, although <strong>the</strong>y may limit <strong>the</strong>copying of pay-per-view, near video-<strong>on</strong>-demand or video-<strong>on</strong>-demand transmissi<strong>on</strong>, or c<strong>on</strong>tentstored <strong>on</strong> prerecorded media, as well <strong>the</strong> making of sec<strong>on</strong>d generati<strong>on</strong> copies where <strong>the</strong> originaltransmissi<strong>on</strong> was through a pay televisi<strong>on</strong> service (such as HBO, Showtime or <strong>the</strong> like).656657Page 68 of <strong>the</strong> C<strong>on</strong>ference Report states, “The c<strong>on</strong>ferees also acknowledge that numerous o<strong>the</strong>r activities areunderway in <strong>the</strong> private sector to develop, test, and apply copy c<strong>on</strong>trol technologies, particularly in <strong>the</strong> digitalenvir<strong>on</strong>ment. Subject to <strong>the</strong> o<strong>the</strong>r requirements of this secti<strong>on</strong>, circumventi<strong>on</strong> of <strong>the</strong>se technologies may beprohibited under this Act.”H.R. Rep. No. 105-796, at 78 (1998).- 158 -


Provisi<strong>on</strong>s(13) O<strong>the</strong>r Cases Filed Under <strong>the</strong> Anti-Circumventi<strong>on</strong>Several anti-circumventi<strong>on</strong> cases have been filed under <strong>the</strong> DMCA:Inc.(i)S<strong>on</strong>y Computer Entertainment, Inc. v. C<strong>on</strong>nectix,On Jan. 27, 1999, S<strong>on</strong>y Computer Entertainment, Inc. and its U.S. subsidiary S<strong>on</strong>yComputer Entertainment America, manufacturers and distributors of <strong>the</strong> S<strong>on</strong>y PlayStati<strong>on</strong>, filedsuit against C<strong>on</strong>nectix, Inc., a company that had developed a software emulator called <strong>the</strong>“Virtual Game Stati<strong>on</strong>” that would enable video games written for <strong>the</strong> PlayStati<strong>on</strong> to run <strong>on</strong>Apple computers. In order to create <strong>the</strong> emulator, C<strong>on</strong>nectix disassembled and reverseengineered <strong>the</strong> PlayStati<strong>on</strong>’s operating system. The plaintiff’s complaint included claims forcopyright infringement, trademark diluti<strong>on</strong>, and circumventi<strong>on</strong> of technological protecti<strong>on</strong>measures. 658The circumventi<strong>on</strong> claim was based <strong>on</strong> <strong>the</strong> fact that <strong>the</strong> PlayStati<strong>on</strong> and its video gameseach c<strong>on</strong>tain embedded technological measures to prevent counterfeit games from running <strong>on</strong> <strong>the</strong>PlayStati<strong>on</strong>, and <strong>the</strong> alleged fact that C<strong>on</strong>nectix’s emulator software did not c<strong>on</strong>tain suchtechnological measures, thus enabling counterfeit games to run <strong>on</strong> it. The plaintiffs c<strong>on</strong>tendedthat omissi<strong>on</strong> of <strong>the</strong> PlayStati<strong>on</strong>’s technological measures c<strong>on</strong>stituted an unlawful circumventi<strong>on</strong>of those measures. In its oppositi<strong>on</strong> to <strong>the</strong> plaintiffs’ moti<strong>on</strong> for a temporary restraining order,C<strong>on</strong>nectix asserted that its emulator did in fact implement <strong>the</strong> PlayStati<strong>on</strong>’s technologicalmeasures and could not run counterfeit games. Thus, <strong>the</strong> alleged factual predicate <strong>on</strong> which <strong>the</strong>plaintiffs based <strong>the</strong>ir circumventi<strong>on</strong> claim was apparently missing. On Feb. 4, 1999, <strong>the</strong> districtcourt judge denied <strong>the</strong> plaintiffs’ moti<strong>on</strong> for a temporary restraining order. 659Even if C<strong>on</strong>nectix’s emulator software did not c<strong>on</strong>tain <strong>the</strong> technological measures of <strong>the</strong>PlayStati<strong>on</strong>, <strong>the</strong> plaintiffs’ circumventi<strong>on</strong> claim appears to be flawed for several reas<strong>on</strong>s. First,<strong>the</strong> DMCA’s prohibiti<strong>on</strong> under Secti<strong>on</strong> 1201(a)(1) <strong>on</strong> circumventi<strong>on</strong> of technological measuresc<strong>on</strong>trolling access was not yet in effect at <strong>the</strong> time <strong>the</strong> complaint was filed, and <strong>the</strong> DMCAc<strong>on</strong>tains no prohibiti<strong>on</strong> <strong>on</strong> <strong>the</strong> act of circumventing copy c<strong>on</strong>trols. Sec<strong>on</strong>d, C<strong>on</strong>nectix’semulator did not actively “circumvent” anything in <strong>the</strong> games it could run. At most, it simplyallegedly operated regardless of whe<strong>the</strong>r <strong>the</strong> video games c<strong>on</strong>tained <strong>the</strong> au<strong>the</strong>nticati<strong>on</strong> signalsrequired by <strong>the</strong> PlayStati<strong>on</strong> (i.e., it allegedly ignored <strong>the</strong> au<strong>the</strong>nticati<strong>on</strong> signal of <strong>the</strong>PlayStati<strong>on</strong>). But Secti<strong>on</strong> 1201(c)(3) provides that Secti<strong>on</strong> 1201 does not require a computingproduct to “provide for a resp<strong>on</strong>se to any particular technological measure,” so l<strong>on</strong>g as <strong>the</strong>product is not primarily designed or produced for <strong>the</strong> purpose of circumventing a technologicalmeasure or has <strong>on</strong>ly limited commercially significant purposes or uses o<strong>the</strong>r than <strong>the</strong> same.Because <strong>the</strong> C<strong>on</strong>nectix emulator was not primarily designed to circumvent technological658659See Band & Issihiki, supra note 611, at 8.Id. at 8-9. On appeal, <strong>the</strong> Ninth Circuit ultimately held that C<strong>on</strong>nectix’s reverse engineering of <strong>the</strong> S<strong>on</strong>yPlaystati<strong>on</strong> fell within <strong>the</strong> fair use doctrine. See S<strong>on</strong>y Computer Entertainment, Inc. v. C<strong>on</strong>nectix Corp., 203F.3d 596 (9th Cir. 2000). The Ninth Circuit’s opini<strong>on</strong> did not address <strong>the</strong> DMCA issues.- 159 -


measures, but ra<strong>the</strong>r to run legitimate PlayStati<strong>on</strong> games, it should probably fall within <strong>the</strong>savings clause of Secti<strong>on</strong> 1201(c)(3). 660(ii)RealNetworks, Inc. v. Streambox Inc.On Dec. 20, 1999, RealNetworks, Inc., <strong>the</strong> developer and distributor of various versi<strong>on</strong>sof <strong>the</strong> “RealPlayer,” which embodied “streaming” technology that allowed <strong>Internet</strong> users toobtain real-time delivery and instant playback of audio and video c<strong>on</strong>tent over <strong>the</strong> <strong>Internet</strong>,brought suit against Streambox, Inc. 661 RealNetworks’ products embodied anti-piracytechnology. Specifically, RealNetworks supplied copyright holders with a product known as“RealProducer,” which c<strong>on</strong>verted ordinary audio and video files into digitized “RealAudio” and“RealVideo” files. RealNetworks also offered a “RealServer” product to copyright holders thatallowed <strong>the</strong>m to distribute <strong>the</strong>ir copyrighted material in a secure format designed to interact <strong>on</strong>lywith RealPlayers to fur<strong>the</strong>r prevent unauthorized access to copyrighted c<strong>on</strong>tent. 662RealNetworks based its complaint <strong>on</strong> <strong>the</strong> following three products developed anddistributed by Streambox:“Streambox Ripper,” which c<strong>on</strong>verted any RealAudio file to a file in <strong>the</strong> format ofWindows Media Audio (WMA), MPEG-Layer 3 (MP3), or Microsoft WindowsWave Format (WAV). Once in any of <strong>the</strong>se three formats, an audio file could becopied, stored, or freely distributed, <strong>the</strong>reby circumventing RealNetworks’ securitymeasures. 663“Streambox VCR,” which mimicked a RealPlayer, tricking RealServers into interactingwith it and distributing both RealAudio and RealMedia files to it, <strong>the</strong>reby alsocircumventing <strong>the</strong> RealNetworks’ security measures. 664“Streambox Ferret,” which was supposedly designed to work with and enhance <strong>the</strong>functi<strong>on</strong>ality of RealPlayers. RealNetworks alleged, however, that Streambox Ferretreplaced <strong>the</strong> “snap.com” search engine <strong>on</strong> <strong>the</strong> RealPlayer’s search bar with a“Streambox” logo that diverted those using <strong>the</strong> RealPlayer’s search functi<strong>on</strong> fromSnap’s search services (with whom RealNetworks had an exclusive arrangement) to acompeting service operated by Streambox. In additi<strong>on</strong>, RealNetworks alleged that660661662663664Band & Issihiki, supra note 611, at 8-9.Complaint for Violati<strong>on</strong> of The Digital Millennium <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act, C<strong>on</strong>tributory, Vicarious and Direct<str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Infringement, Tortious Interference with C<strong>on</strong>tract, and Lanham Act Violati<strong>on</strong>s, RealNetworks, Inc.v. Streambox Inc., No. C99-2070Z (W.D. Wa. Dec. 20, 1999), available as of Dec. 30, 1999 atwww.realnetworks.com/company/pressroom/pr/99/rnwk_complaint.html.Id. 6.Id. 12-13.Id. 17-19.- 160 -


Streambox Ferret corrupted completely <strong>the</strong> search functi<strong>on</strong>ality of <strong>the</strong> more recentversi<strong>on</strong>s of <strong>the</strong> RealPlayer. 665RealNetworks alleged, am<strong>on</strong>g o<strong>the</strong>r things, that (i) by circumventing RealNetworks’technological measures that protect <strong>the</strong> rights of copyright owners to c<strong>on</strong>trol whe<strong>the</strong>r an end-usercan copy and distribute copyright owners’ works, both Streambox Ripper and Streambox VCRviolated Secti<strong>on</strong> 1201(b) of <strong>the</strong> DMCA, 666 and (ii) because <strong>the</strong> installati<strong>on</strong> of Streambox Ferretmodified <strong>the</strong> graphical user interface and computer code of RealPlayer, <strong>the</strong>reby creating anunauthorized derivative work, Streambox’s distributi<strong>on</strong> of Streambox Ferret made itc<strong>on</strong>tributorily liable for copyright infringement, as well as vicariously liable, since Streamboxallegedly c<strong>on</strong>trolled and profited from <strong>the</strong> infringement. 667In a decisi<strong>on</strong> issued Jan. 18, 2000, <strong>the</strong> court entered a preliminary injuncti<strong>on</strong> againstStreambox, enjoining <strong>the</strong> manufacturing and distributi<strong>on</strong> of Streambox VCR and StreamboxFerret, but not of Streambox Ripper. 668 This case raised three important procedural issues withrespect to <strong>the</strong> DMCA. First, <strong>the</strong> case raised <strong>the</strong> interesting issue of who has standing to invoke<strong>the</strong> remedies of <strong>the</strong> DMCA – specifically, whe<strong>the</strong>r RealNetworks should be c<strong>on</strong>sidered a properparty to bring <strong>the</strong> lawsuit, since <strong>the</strong> material that Streambox Ripper and Streambox VCR placedinto a different file format (i.e., allegedly circumvented a protecti<strong>on</strong> measure for) wascopyrighted, not by RealNetworks, but by its customers. As discussed fur<strong>the</strong>r below, Secti<strong>on</strong>1203 of <strong>the</strong> DMCA provides: “Any pers<strong>on</strong> injured by a violati<strong>on</strong> of secti<strong>on</strong> 1201 or 1202 maybring a civil acti<strong>on</strong> in an appropriate United States district court for such violati<strong>on</strong>.”Significantly, <strong>the</strong> reference to “any pers<strong>on</strong>” suggests that Secti<strong>on</strong> 1203 does not limit its scope to<strong>the</strong> copyright owner of <strong>the</strong> material with respect to which a technological protecti<strong>on</strong> measure hasbeen circumvented, and <strong>the</strong> court so held. Specifically, <strong>the</strong> court ruled that RealNetworks hadstanding to pursue DMCA claims under Secti<strong>on</strong> 1203 based <strong>on</strong> <strong>the</strong> fact that it affords standing to“any pers<strong>on</strong>” allegedly injured by a violati<strong>on</strong> of Secti<strong>on</strong> 1201 and 1202 of <strong>the</strong> DMCA. 669Sec<strong>on</strong>d, <strong>the</strong> case raised <strong>the</strong> issue of what type of “injury” a plaintiff must show underSecti<strong>on</strong> 1203. Nei<strong>the</strong>r Secti<strong>on</strong> 1203 itself nor <strong>the</strong> legislative history illuminate this issue. In <strong>the</strong>instant case, RealNetworks was apparently relying <strong>on</strong> <strong>the</strong> argument that, because its customerswere potentially injured by Streambox’s violati<strong>on</strong> of Secti<strong>on</strong> 1201(b), RealNetworks itself wasalso injured. Although <strong>the</strong> court did not explicitly address this issue, by issuing a preliminaryinjuncti<strong>on</strong>, it implicitly accepted that RealNetworks was exposed to injury cognizable by <strong>the</strong>DMCA.665666667668669Id. 22-24.Id. 33-35 & 41-43.Id. 48-49.RealNetworks, Inc. v. Streambox Inc., 2000 U.S. Dist. LEXIS 1889 (W.D. Wa. 2000).Id. at *15-16. This holding is c<strong>on</strong>sistent with CSC Holdings, Inc. v. Greenleaf Electr<strong>on</strong>ics, Inc., 2000 U.S.Dist. LEXIS 7675 (N.D. Ill. 2000). In that case <strong>the</strong> plaintiff was a cable provider bringing suit againstdefendants under <strong>the</strong> DMCA for selling and distributing pirate cable descrambling equipment. The court heldthat <strong>the</strong> plaintiff was authorized to bring suit under Secti<strong>on</strong> 1203(a), as it was a pers<strong>on</strong> injured by a violati<strong>on</strong> of<strong>the</strong> DMCA.- 161 -


Third, <strong>the</strong> case raised <strong>the</strong> issue of whe<strong>the</strong>r a plaintiff who dem<strong>on</strong>strates a likelihood ofsuccess <strong>on</strong> <strong>the</strong> merits of claims under Secti<strong>on</strong> 1201 of <strong>the</strong> DMCA is entitled to a presumpti<strong>on</strong> ofirreparable harm for purposes of a preliminary injuncti<strong>on</strong>, as would be <strong>the</strong> case in a showing oflikely success <strong>on</strong> a claim for copyright infringement. The court noted that this must bec<strong>on</strong>sidered an open issue: “Because <strong>the</strong> DMCA is a recently-enacted statute, <strong>the</strong>re appears to beno authority holding that a plaintiff seeking a preliminary injuncti<strong>on</strong> who shows a reas<strong>on</strong>ablelikelihood of success <strong>on</strong> a claim arising under secti<strong>on</strong> 1201 of <strong>the</strong> DMCA is entitled to apresumpti<strong>on</strong> of irreparable harm.” 670 Accordingly, <strong>the</strong> court c<strong>on</strong>sidered in each instance whe<strong>the</strong>rSteambox’s violati<strong>on</strong>s of <strong>the</strong> DMCA were likely to cause irreparable harm.Turning to <strong>the</strong> plaintiff’s claims under <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>s of <strong>the</strong> DMCA,<strong>the</strong> court noted that RealNetworks’ products embodied two technological measures to c<strong>on</strong>trolagainst unauthorized access or copying of c<strong>on</strong>tent. First, a “Secret Handshake” – anau<strong>the</strong>nticati<strong>on</strong> sequence that <strong>on</strong>ly RealServers and RealPlayers knew – ensured that files hosted<strong>on</strong> a RealServer could be sent <strong>on</strong>ly to a RealPlayer. Sec<strong>on</strong>d, a “Copy Switch” was used, whichwas a piece of data in all RealMedia files that c<strong>on</strong>tained <strong>the</strong> c<strong>on</strong>tent owner’s preferenceregarding whe<strong>the</strong>r or not <strong>the</strong> stream could be copied by end users. 671 RealPlayers were designedto read <strong>the</strong> Copy Switch and obey <strong>the</strong> c<strong>on</strong>tent owner’s wishes.The court ruled that <strong>the</strong> Secret Handshake c<strong>on</strong>stituted a technological measure thateffectively c<strong>on</strong>trolled access to copyrighted works within <strong>the</strong> meaning of Secti<strong>on</strong> 1201(a)(3)(B),and that <strong>the</strong> Copy Switch c<strong>on</strong>stituted a technological measure that effectively protected <strong>the</strong> rightof a copyright owner to c<strong>on</strong>trol <strong>the</strong> unauthorized copying of its work within <strong>the</strong> meaning ofSecti<strong>on</strong> 1201(b)(2)(B). The court c<strong>on</strong>cluded that, because Streambox VCR was primarilydesigned to bypass <strong>the</strong> Secret Handshake and circumvent <strong>the</strong> Copy Switch (and had <strong>on</strong>ly limitedcommercially significant purposes bey<strong>on</strong>d <strong>the</strong> same), Streambox VCR violated Secti<strong>on</strong>s1201(a)(2) and 1201(b) of <strong>the</strong> DMCA. 672The court rejected Streambox’s defense that Streambox VCR allowed c<strong>on</strong>sumers to make“fair use” copies of RealMedia files under <strong>the</strong> Supreme Court’s decisi<strong>on</strong> in S<strong>on</strong>y Corp. v.Universal City Studios, Inc. 673 The court distinguished <strong>the</strong> S<strong>on</strong>y case <strong>on</strong> <strong>the</strong> ground that, inS<strong>on</strong>y, <strong>the</strong> Supreme Court based its holding <strong>on</strong> <strong>the</strong> fact that video cassette recorders were mostlyused by c<strong>on</strong>sumers for “time shift” viewing of programs, ra<strong>the</strong>r than <strong>the</strong> redistributi<strong>on</strong> of perfectdigital copies of audio and video files, and that substantial numbers of copyright holders whobroadcast <strong>the</strong>ir works ei<strong>the</strong>r had authorized or would not object to having <strong>the</strong>ir works timeshiftedby private viewers. In <strong>the</strong> instant case, <strong>the</strong> court noted, copyright owners had specificallychosen to prevent <strong>the</strong> copying enabled by <strong>the</strong> Streambox VCR by putting <strong>the</strong>ir c<strong>on</strong>tent <strong>on</strong>RealServers and leaving <strong>the</strong> Copy Switch off. 674670671672673674RealNetworks, 2000 U.S. Dist. LEXIS 1889 at *17.Id. at *6.Id. at *19-21.464 U.S. 417 (1984).RealNetworks, 2000 U.S. Dist. LEXIS at *21-22.- 162 -


In additi<strong>on</strong>, <strong>the</strong> court, citing Nimmer’s copyright treatise, ruled that, by passage of <strong>the</strong>DMCA, C<strong>on</strong>gress had decided that “those who manufacture equipment and products generallycan no l<strong>on</strong>ger gauge <strong>the</strong>ir c<strong>on</strong>duct as permitted or forbidden by reference to <strong>the</strong> S<strong>on</strong>y doctrine.For a given piece of machinery might qualify as a stable item of commerce, with a substantialn<strong>on</strong>infringing use, and hence be immune from attack under S<strong>on</strong>y’s c<strong>on</strong>structi<strong>on</strong> of <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>Act – but n<strong>on</strong>e<strong>the</strong>less still be subject to suppressi<strong>on</strong> under Secti<strong>on</strong> 1201.” 675 The court alsorejected Streambox’s asserted defense under Secti<strong>on</strong> 1201(c)(3) of <strong>the</strong> DMCA, which it cited for<strong>the</strong> propositi<strong>on</strong> that <strong>the</strong> Streambox VCR was not required to resp<strong>on</strong>d to <strong>the</strong> Copy Switch. Thecourt noted that this argument failed to address Streambox VCR’s circumventi<strong>on</strong> of <strong>the</strong> SecretHandshake, which was enough by itself to create liability under Secti<strong>on</strong> 1201(a)(2). 676Turning to <strong>the</strong> Streambox Ripper product, <strong>the</strong> court ruled that <strong>the</strong> plaintiff had notestablished a reas<strong>on</strong>able likelihood of success <strong>on</strong> its DMCA claim. RealNetworks maintainedthat <strong>the</strong> primary purpose and <strong>on</strong>ly commercially significant use for <strong>the</strong> Ripper was to enablec<strong>on</strong>sumers to prepare unauthorized derivative works of copyrighted audio or video c<strong>on</strong>tent. Thecourt rejected this argument, noting that <strong>the</strong> Ripper has legitimate and commercially significantuses to enable c<strong>on</strong>tent owners, including copyright holders and those acquiring c<strong>on</strong>tent with <strong>the</strong>c<strong>on</strong>tent owner’s permissi<strong>on</strong>, to c<strong>on</strong>vert <strong>the</strong>ir c<strong>on</strong>tent from <strong>the</strong> RealMedia format to o<strong>the</strong>r formats.Moreover, <strong>the</strong>re was little evidence that c<strong>on</strong>tent owners use <strong>the</strong> RealMedia format as a“technological measure” to prevent end users from making derivative works. In any case, <strong>the</strong>court found that RealNetworks had not introduced evidence that a substantial number of c<strong>on</strong>tentowners would object to having end users c<strong>on</strong>vert RealMedia files that <strong>the</strong>y legitimately obtainedinto o<strong>the</strong>r formats, or that Ripper would cause injury to RealNetworks. 677Finally, <strong>the</strong> court ruled that <strong>the</strong> plaintiff was entitled to a preliminary injuncti<strong>on</strong> withrespect to Streambox Ferret. RealNetworks claimed that Streambox committed c<strong>on</strong>tributory orvicarious copyright infringement by distributing <strong>the</strong> Ferret to <strong>the</strong> public, because c<strong>on</strong>sumers whoused <strong>the</strong> Ferret as a plug-in were making an unauthorized derivative work of <strong>the</strong> RealPlayer bychanging <strong>the</strong> RealPlayer user interface to add a clickable butt<strong>on</strong> that permitted <strong>the</strong> user to access<strong>the</strong> Streambox search engine, ra<strong>the</strong>r than <strong>the</strong> Snap search engine. Although <strong>the</strong> court stated thatit was not persuaded that RealNetworks had dem<strong>on</strong>strated that it was likely to succeed <strong>on</strong> itsc<strong>on</strong>tributory/vicarious infringement claims <strong>on</strong> this basis, <strong>the</strong> court c<strong>on</strong>cluded that RealNetworkshad raised serious questi<strong>on</strong>s going to <strong>the</strong> merits of its claims, and <strong>the</strong> balance of hardshipsclearly favored RealNetworks, because <strong>the</strong> additi<strong>on</strong> of <strong>the</strong> alternative search engine afforded by<strong>the</strong> Ferret jeopardized RealNetworks’ exclusive relati<strong>on</strong>ship with Snap. 678In September of 2000, <strong>the</strong> parties settled <strong>the</strong> lawsuit pursuant to an agreement in whichStreambox agreed to modify Streambox Ripper so that it no l<strong>on</strong>ger transformed RealMediastreams into o<strong>the</strong>r formats, to modify Streambox VCR so that it respected RealNetworks’ copyprotecti<strong>on</strong> features, to license RealNetworks’ software development kit (which would allow675676677678Id. at *23 (quoting 1 M. Nimmer & D. Nimmer, Nimmer <strong>on</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> (1999 Supp.) § 12A.18[B]).RealNetworks, 2000 U.S. Dist. LEXIS at *23.Id. at *27-28.Id. at *30-33.- 163 -


Streambox to create versi<strong>on</strong>s of its products that worked with RealNetworks’ copy protecti<strong>on</strong>technology), to stop distributing Streambox Ferret, and to pay an undisclosed sum of m<strong>on</strong>ey. 679(iii) Universal City Studios, Inc. v. ReimerdesIn this case, <strong>the</strong> plaintiffs were copyright holders who distributed moti<strong>on</strong> picturesencoded in a proprietary system for <strong>the</strong> encrypti<strong>on</strong> and decrypti<strong>on</strong> of data c<strong>on</strong>tained <strong>on</strong> digitalversatile disks (DVDs) known as <strong>the</strong> C<strong>on</strong>tent Scramble System (CSS). The CSS technology waslicensed to manufacturers of DVDs, who used it to encrypt <strong>the</strong> c<strong>on</strong>tent of copyrighted moti<strong>on</strong>pictures distributed in <strong>the</strong> DVD format. The plaintiffs filed suit under <strong>the</strong> DMCA againstvarious defendants whom <strong>the</strong> plaintiffs alleged violated <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>s of <strong>the</strong>DMCA by posting <strong>on</strong> <strong>the</strong>ir websites <strong>the</strong> source code of a program named “DeCSS,” which wasable to defeat DVD encrypti<strong>on</strong> using <strong>the</strong> CSS technology and enable viewing of DVD movies <strong>on</strong>unlicensed players and <strong>the</strong> making of digital copies of DVD movies. 680 The plaintiffs sought apreliminary and permanent injuncti<strong>on</strong> to prevent <strong>the</strong> defendants from posting DeCSS <strong>on</strong> <strong>the</strong>irWeb site and from linking <strong>the</strong>ir site to o<strong>the</strong>rs that posted DeCSS. 681On Jan. 20, 2000, <strong>the</strong> court entered a preliminary injuncti<strong>on</strong> against <strong>the</strong> defendants,restraining <strong>the</strong>m from posting <strong>on</strong> any website or o<strong>the</strong>rwise making available DeCSS or any o<strong>the</strong>rtechnology, product or service primary designed or produced for <strong>the</strong> purpose of, or having <strong>on</strong>lylimited commercially significant purposes or use o<strong>the</strong>r than, circumventing CSS, or marketed bydefendants or o<strong>the</strong>rs acting in c<strong>on</strong>cert with <strong>the</strong>m for use in circumventing CSS. 682 In an opini<strong>on</strong>issued Feb. 2, 2000, <strong>the</strong> court set forth its findings of fact and c<strong>on</strong>clusi<strong>on</strong>s of law supporting <strong>the</strong>preliminary injuncti<strong>on</strong>. 683On Aug. 17, 2000, after a bench trial, <strong>the</strong> court issued a permanent injuncti<strong>on</strong> against <strong>the</strong>defendants. 684 The court ruled that DeCSS was clearly a means of circumventing CSS, atechnological access c<strong>on</strong>trol measure, that it was undisputed that DeCSS was designed primarilyto circumvent CSS, and <strong>the</strong>refore that DeCSS c<strong>on</strong>stituted a prima facie violati<strong>on</strong> of Secti<strong>on</strong>1201(a)(2). 685 The court rejected <strong>the</strong> defendants’ argument that CSS did not “effectivelyc<strong>on</strong>trol” access to <strong>the</strong> plaintiffs’ copyrighted works because it was based <strong>on</strong> a 40-bit encrypti<strong>on</strong>key, which <strong>the</strong> defendants argued was a weak cipher. The court noted that Secti<strong>on</strong>679680681682683684685“Early DMCA Lawsuit Settled, Streambox Will Modify Products to Prevent Digital Copying,” BNA’sElectr<strong>on</strong>ic Commerce & Law Report (Oct. 11, 2000) at 1019.Universal City Studios Inc. v. Reimerdes, 111 F. Supp. 2d 294 (S.D.N.Y. 2000).Id. at 303.Preliminary Injuncti<strong>on</strong>, Universal City Studios, Inc. v. Reimerdes, No. 00 Civ. 0277 (LAK) (S.D.N.Y. Jan. 20,2000) 2.Universal City Studios, Inc. v. Reimerdes, 82 F. Supp. 2d 211 (S.D.N.Y. 2000).Universal City Studios Inc. v. Reimerdes, 111 F. Supp. 2d 294 (S.D.N.Y. 2000). An amended final judgmentwas entered by <strong>the</strong> court <strong>on</strong> Aug. 23, 2001, enjoining <strong>the</strong> defendants from posting DeCSS <strong>on</strong> <strong>the</strong>ir web site andfrom knowingly linking <strong>the</strong>ir web site to any o<strong>the</strong>r web site <strong>on</strong> which DeCSS was posted. Universal CityStudios Inc. v. Reimerdes, 111 F. Supp. 2d 346 (S.D.N.Y. 2000).111 F. Supp. 2d at 317-19.- 164 -


1201(a)(3)(B) provides that a technological measure “effectively c<strong>on</strong>trols access to a work” if itrequires <strong>the</strong> applicati<strong>on</strong> of informati<strong>on</strong> or a process with <strong>the</strong> authority of <strong>the</strong> copyright owner togain access to a work. Because <strong>on</strong>e cannot gain access to a CSS-protected work <strong>on</strong> a DVDwithout <strong>the</strong> applicati<strong>on</strong> of three keys that are required by <strong>the</strong> player software and are madeavailable <strong>on</strong>ly under license, CSS satisfied this definiti<strong>on</strong>. The court refused to import into <strong>the</strong>statute any requirement for a technologically “str<strong>on</strong>g means” of protecti<strong>on</strong>. 686The court also rejected <strong>the</strong> defendants’ argument that DeCSS was written to fur<strong>the</strong>r <strong>the</strong>development of a DVD player that would run under <strong>the</strong> Linux operating system, as <strong>the</strong>reallegedly were no Linux-compatible players <strong>on</strong> <strong>the</strong> market at <strong>the</strong> time. The court ruled that, evenif <strong>the</strong>re were so, it would be immaterial to whe<strong>the</strong>r <strong>the</strong> defendants had violated Secti<strong>on</strong>1201(a)(2) by trafficking in DeCSS. 687 “The offering or provisi<strong>on</strong> of <strong>the</strong> program is <strong>the</strong>prohibited c<strong>on</strong>duct – and it is prohibited irrespective of why <strong>the</strong> program was written, except towhatever extent motive may be germane to determining whe<strong>the</strong>r [<strong>the</strong> defendants’] c<strong>on</strong>duct fallswithin <strong>on</strong>e of <strong>the</strong> statutory excepti<strong>on</strong>s.” 688The court rejected a number of o<strong>the</strong>r defenses under <strong>the</strong> DMCA asserted by <strong>the</strong>defendants. First, for <strong>the</strong> reas<strong>on</strong>s set forth in Secti<strong>on</strong> II.G.1(g) above in <strong>the</strong> discussi<strong>on</strong> of Secti<strong>on</strong>1201(f), <strong>the</strong> court rejected <strong>the</strong> defendants’ argument that <strong>the</strong> reverse engineering excepti<strong>on</strong> ofSecti<strong>on</strong> 1201(f) was applicable.Sec<strong>on</strong>d, <strong>the</strong> defendants asserted <strong>the</strong> encrypti<strong>on</strong> research defense under Secti<strong>on</strong> 1201(g),which requires a showing that <strong>the</strong> pers<strong>on</strong> asserting <strong>the</strong> defense lawfully obtained <strong>the</strong> encryptedcopy of <strong>the</strong> work being studied, <strong>the</strong> circumventi<strong>on</strong> act at issue is necessary to c<strong>on</strong>duct encrypti<strong>on</strong>research, <strong>the</strong> pers<strong>on</strong> made a good faith effort to obtain authorizati<strong>on</strong> before <strong>the</strong> circumventi<strong>on</strong>,and <strong>the</strong> act does not c<strong>on</strong>stitute copyright infringement. The court held that <strong>the</strong> defendants hadfailed to prove that any of <strong>the</strong>m were engaged in good faith encrypti<strong>on</strong> research, nor was <strong>the</strong>reany evidence that <strong>the</strong> defendants made any effort to provide <strong>the</strong> results of <strong>the</strong> DeCSS effort to<strong>the</strong> copyright owners (which Secti<strong>on</strong> 1201(g)(3) instructs <strong>the</strong> court to take into account inassessing whe<strong>the</strong>r <strong>on</strong>e is engaged in good faith encrypti<strong>on</strong> research), nor any evidence that anyof <strong>the</strong>m made a good faith effort to obtain authorizati<strong>on</strong> from <strong>the</strong> copyright owners. 689Third, <strong>the</strong> defendants asserted <strong>the</strong> security testing defense under Secti<strong>on</strong> 1201(j). Thecourt rejected this defense, which is limited to “assessing a computer, computer system, orcomputer network, solely for <strong>the</strong> purpose of good faith testing, investigating, or correcting [of a]security flaw or vulnerability, with <strong>the</strong> authorizati<strong>on</strong> of <strong>the</strong> owner or operator,” because <strong>the</strong>record did not establish that DeCSS has anything to do with testing computers, computer686687688689Id. at 318. The court cited legislative history to <strong>the</strong> effect that a technological measure “effectively c<strong>on</strong>trolsaccess” to a copyrighted work merely if its functi<strong>on</strong> is to c<strong>on</strong>trol access. Id. at 317-18.Id. at 319.Id.Id. at 320-21.- 165 -


systems, or computer networks, and <strong>the</strong> defendants had not sought authorizati<strong>on</strong> for <strong>the</strong>iractivities. 690Fourth, <strong>the</strong> defendants claimed that <strong>the</strong>y were engaged in a fair use under Secti<strong>on</strong> 107 of<strong>the</strong> copyright statute. The court categorically rejected this defense, noting that <strong>the</strong> defendantswere not being sued for copyright infringement, but ra<strong>the</strong>r for offering to <strong>the</strong> public technologyprimarily designed to circumvent technological measures that c<strong>on</strong>trol access to copyrightedworks. 691 The court held that fair use is not a defense to Secti<strong>on</strong> 1201(a)(2) of <strong>the</strong> DMCA: “IfC<strong>on</strong>gress had meant <strong>the</strong> fair use defense to apply to such acti<strong>on</strong>s, it would have said so. Indeed,as <strong>the</strong> legislative history dem<strong>on</strong>strates, <strong>the</strong> decisi<strong>on</strong> not to make fair use a defense to a claimunder Secti<strong>on</strong> 1201(a) was quite deliberate.” 692 The court noted that C<strong>on</strong>gress had provided avehicle, in <strong>the</strong> form of rulemaking by <strong>the</strong> Register of <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>s, by which particular classes ofcopyrighted works could be exempted from <strong>the</strong> prohibiti<strong>on</strong>s if n<strong>on</strong>infringing uses of thoseclasses of works would be affected adversely by Secti<strong>on</strong> 1201(a)(1). 693 The court also rejected<strong>the</strong> defendants’ asserti<strong>on</strong> that, because DeCSS could be used for n<strong>on</strong>infringing purposes, itsdistributi<strong>on</strong> should be permitted under S<strong>on</strong>y Corp. v. Universal City Studios, Inc. 694 The courtelected to follow <strong>the</strong> holding in <strong>the</strong> RealNetworks case that a piece of technology might have asubstantial n<strong>on</strong>infringing use, and <strong>the</strong>refore be immune from attack under S<strong>on</strong>y, yet n<strong>on</strong>e<strong>the</strong>lessbe subject to suppressi<strong>on</strong> under Secti<strong>on</strong> 1201. 695Finally, in <strong>on</strong>e of <strong>the</strong> most novel aspects of <strong>the</strong> opini<strong>on</strong>, <strong>the</strong> court addressed <strong>the</strong> issuewhe<strong>the</strong>r <strong>the</strong> mere linking by <strong>the</strong> defendants to o<strong>the</strong>r Web sites <strong>on</strong> which DeCSS could beobtained should be deemed to be offering to <strong>the</strong> public or providing or o<strong>the</strong>rwise trafficking inDeCSS within <strong>the</strong> prohibiti<strong>on</strong>s of Secti<strong>on</strong> 1201(a)(2). The court, noting that <strong>the</strong> dicti<strong>on</strong>arydefiniti<strong>on</strong>s of <strong>the</strong> words “offer,” “provide,” and “traffic” are broad, ruled that “<strong>the</strong> antitraffickingprovisi<strong>on</strong> of <strong>the</strong> DMCA is implicated where <strong>on</strong>e presents, holds out or makes acircumventi<strong>on</strong> technology or device available, knowing its nature, for <strong>the</strong> purpose of allowingo<strong>the</strong>rs to acquire it.” 696 Accordingly, <strong>the</strong> court enjoined <strong>the</strong> defendants from providing threetypes of links:690691692693694695696Id. at 321.Id. at 322.Id.Id. at 323 The court, in a very lengthy analysis, also rejected various First Amendment challenges to <strong>the</strong>c<strong>on</strong>stituti<strong>on</strong>ality of <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>s of <strong>the</strong> DMCA. See id. at 325-341.464 U.S. 417 (1984).Reimerdes, 111 F. Supp. 2d at 323. In <strong>the</strong> preliminary injuncti<strong>on</strong> proceeding, <strong>on</strong>e of <strong>the</strong> defendants asserted adefense under Secti<strong>on</strong> 512(c) of <strong>the</strong> DMCA, discussed below, which limits liability of “service providers” forcertain acts of infringement committed through systems or networks operated by <strong>the</strong>m. The court rejected thisdefense <strong>on</strong> <strong>the</strong> ground that Secti<strong>on</strong> 512(c) provides protecti<strong>on</strong> <strong>on</strong>ly from liability for copyright infringement,and not for violati<strong>on</strong>s of <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>s of Secti<strong>on</strong> 1201(a)(2). The court also ruled that <strong>the</strong>defendant had offered no proof that he was a “service provider” within <strong>the</strong> meaning of Secti<strong>on</strong> 512(c). 82 F.Supp. 2d at 217.Reimerdes, 111 F. Supp. 2d at 325.- 166 -


Links “to sites that automatically commence <strong>the</strong> process of downloading DeCSS up<strong>on</strong> auser being transferred by defendants’ hyperlinks.” The court ruled that this was <strong>the</strong>functi<strong>on</strong>al equivalent of <strong>the</strong> defendants transferring <strong>the</strong> DeCSS code <strong>the</strong>mselves. 697Links “to web pages that display nothing more than <strong>the</strong> DeCSS code or present <strong>the</strong> user<strong>on</strong>ly with <strong>the</strong> choice of commencing a download of DeCSS and no o<strong>the</strong>r c<strong>on</strong>tent. The<strong>on</strong>ly distincti<strong>on</strong> is that <strong>the</strong> entity extending to <strong>the</strong> user <strong>the</strong> opti<strong>on</strong> of downloading <strong>the</strong>program is <strong>the</strong> transferee site ra<strong>the</strong>r than defendants, a distincti<strong>on</strong> without adifference.” 698Links “to pages that offer a good deal of c<strong>on</strong>tent o<strong>the</strong>r than DeCSS but that offer ahyperlink for downloading, or transferring to a page for downloading, DeCSS,” based <strong>on</strong><strong>the</strong> given facts, in which <strong>the</strong> defendants had intenti<strong>on</strong>ally used and touted <strong>the</strong> links to“mirror” sites to help o<strong>the</strong>rs find copies of DeCSS, after encouraging sites to post DeCSSand checking to ensure that <strong>the</strong> mirror sites in fact were posting DeCSS or something thatlooked like it, and proclaimed <strong>on</strong> <strong>the</strong>ir own site that DeCSS could be had by clicking <strong>on</strong><strong>the</strong> links. 699On appeal, <strong>the</strong> defendants renewed <strong>the</strong>ir attack <strong>on</strong> <strong>the</strong> c<strong>on</strong>stituti<strong>on</strong>ality of <strong>the</strong> DMCA. InUniversal City Studios Inc. v. Corley, 700 <strong>the</strong> Sec<strong>on</strong>d Circuit rejected such challenges and upheld<strong>the</strong> c<strong>on</strong>stituti<strong>on</strong>ality of <strong>the</strong> DMCA anti-circumventi<strong>on</strong> provisi<strong>on</strong>s. The court first rejected <strong>the</strong>defendants’ argument that Secti<strong>on</strong> 1201(c)(1) should be read narrowly to avoid ambiguity thatcould give rise to c<strong>on</strong>stituti<strong>on</strong>al infirmities. The defendants c<strong>on</strong>tended that Secti<strong>on</strong> 1201(c)(1)could and should be read to allow <strong>the</strong> circumventi<strong>on</strong> of encrypti<strong>on</strong> technology when <strong>the</strong>protected material would be put to fair uses. The court disagreed that Secti<strong>on</strong> 1201(c)(1)permitted such a reading. “Instead, it clearly and simply clarifies that <strong>the</strong> DMCA targets <strong>the</strong>circumventi<strong>on</strong> of digital walls guarding copyrighted material (and trafficking in circumventi<strong>on</strong>tools), but does not c<strong>on</strong>cern itself with <strong>the</strong> use of those materials after circumventi<strong>on</strong> hasoccurred.” 701 The court held that, in any event, <strong>the</strong> defendants did not claim to be making fairuse of any copyrighted materials, and nothing in <strong>the</strong> injuncti<strong>on</strong> prohibited <strong>the</strong>m from makingsuch fair use. 702 “Fair use has never been held to be a guarantee of access to copyrightedmaterial in order to copy it by <strong>the</strong> fair user’s preferred technique of in <strong>the</strong> format of <strong>the</strong>original.” 703The court ruled that computer programs are not exempted from <strong>the</strong> category of FirstAmendment speech merely because <strong>the</strong>ir instructi<strong>on</strong>s require use of a computer. Ra<strong>the</strong>r, <strong>the</strong>697698699700701702703Id.Id.Id.273 F.3d 429 (2d Cir. 2001).Id. at 443 (emphasis in original).Id. at 459.Id.- 167 -


ability to c<strong>on</strong>vey informati<strong>on</strong> renders <strong>the</strong> instructi<strong>on</strong>s of a computer program in source code form“speech” for purposes of <strong>the</strong> First Amendment. 704 However, <strong>the</strong> court held that <strong>the</strong> “realities ofwhat code is and what its normal functi<strong>on</strong>s are require a First Amendment analysis that treatscode as combining n<strong>on</strong>speech and speech elements, i.e., functi<strong>on</strong>al and expressive elements.” 705Accordingly, <strong>the</strong> scope of First Amendment protecti<strong>on</strong> for <strong>the</strong> DeCSS code at issue waslimited. 706With this background, <strong>the</strong> court turned to a First Amendment analysis of <strong>the</strong> specificprohibiti<strong>on</strong>s of <strong>the</strong> injuncti<strong>on</strong>. With respect to <strong>the</strong> prohibiti<strong>on</strong> against posting of <strong>the</strong> DeCSScode, <strong>the</strong> court held that <strong>the</strong> prohibiti<strong>on</strong> was c<strong>on</strong>tent neutral and was directed <strong>on</strong>ly toward <strong>the</strong>n<strong>on</strong>speech comp<strong>on</strong>ent of DeCSS – “[t]he DMCA and <strong>the</strong> posting prohibiti<strong>on</strong> are applied toDeCSS solely because of its capacity to instruct a computer to decrypt CSS. That functi<strong>on</strong>alcapability is not speech within <strong>the</strong> meaning of <strong>the</strong> First Amendment.” 707 Therefore, <strong>the</strong> c<strong>on</strong>tentneutralposting prohibiti<strong>on</strong>, which had <strong>on</strong>ly an incidental effect <strong>on</strong> a speech comp<strong>on</strong>ent, wouldpass muster if it served a substantial governmental interest unrelated to <strong>the</strong> suppressi<strong>on</strong> of freeexpressi<strong>on</strong>, which <strong>the</strong> court found that it did. 708With respect to <strong>the</strong> prohibiti<strong>on</strong> against linking to o<strong>the</strong>r web sites posting DeCSS, <strong>the</strong>court again noted that a link has both a speech and a n<strong>on</strong>speech comp<strong>on</strong>ent. “It c<strong>on</strong>veysinformati<strong>on</strong>, <strong>the</strong> <strong>Internet</strong> address of <strong>the</strong> linked web page, and has <strong>the</strong> functi<strong>on</strong>al capacity to bring<strong>the</strong> c<strong>on</strong>tent of <strong>the</strong> linked web page to <strong>the</strong> user’s computer screen.” 709 And again, <strong>the</strong> court ruledthat <strong>the</strong> prohibiti<strong>on</strong> <strong>on</strong> linking was c<strong>on</strong>tent neutral. “The linking prohibiti<strong>on</strong> applies whe<strong>the</strong>r ornot <strong>the</strong> hyperlink c<strong>on</strong>tains any informati<strong>on</strong>, comprehensible to a human being, as to <strong>the</strong> <strong>Internet</strong>address of <strong>the</strong> web page being accessed. The linking prohibiti<strong>on</strong> is justified solely by <strong>the</strong>functi<strong>on</strong>al capability of <strong>the</strong> hyperlink.” 710 The court rejected <strong>the</strong> defendants’ argument that <strong>the</strong>prohibiti<strong>on</strong> burdened substantially more speech than necessary to fur<strong>the</strong>r <strong>the</strong> government’slegitimate interest because it did not require an intent to cause harm by <strong>the</strong> linking, and thatlinking could be enjoined <strong>on</strong>ly under circumstances applicable to a print medium. The courtfound that <strong>the</strong> defendants’ arguments ignored <strong>the</strong> reality of <strong>the</strong> functi<strong>on</strong>al capacity of decrypti<strong>on</strong>computer code and hyperlinks to facilitate instantaneous unauthorized access to copyrightedmaterials by any<strong>on</strong>e anywhere in <strong>the</strong> world. Accordingly, “<strong>the</strong> fundamental choice betweenimpairing some communicati<strong>on</strong> and tolerating decrypti<strong>on</strong> cannot be entirely avoided.” 711704705706707708709710711Id. at 447.Id. at 451.Id. at 453.Id. at 454.Id. at 454-55. The court noted that it had c<strong>on</strong>sidered <strong>the</strong> opini<strong>on</strong> of <strong>the</strong> California Court of Appeal in <strong>the</strong>Bunner case, discussed in subsecti<strong>on</strong> e. below and that to “<strong>the</strong> extent that DVD Copy C<strong>on</strong>trol disagrees with ourFirst Amendment analysis, we decline to follow it.” Id. at 455 n.29. As noted in subsecti<strong>on</strong> e. below, <strong>the</strong>Supreme Court of California subsequently reversed <strong>the</strong> California Court of Appeal decisi<strong>on</strong>.Id. at 456.Id.Id. at 458.- 168 -


Having rejected all c<strong>on</strong>stituti<strong>on</strong>al challenges to <strong>the</strong> district court’s injuncti<strong>on</strong>, <strong>the</strong> Sec<strong>on</strong>dCircuit affirmed <strong>the</strong> district court’s final judgment. 712 The defendants decided not to appeal <strong>the</strong>case fur<strong>the</strong>r to <strong>the</strong> Supreme Court. 713(iv) A Related DVD Case Involving Trade Secret Claims– DVD Copy C<strong>on</strong>trol Associati<strong>on</strong>, Inc. v. McLaughlin (<strong>the</strong> Bunner case)This case, 714 although initially filed in state court alleging <strong>on</strong>ly misappropriati<strong>on</strong> of tradesecrets, presented ano<strong>the</strong>r fact pattern amenable to a claim under <strong>the</strong> anti-circumventi<strong>on</strong>provisi<strong>on</strong>s of <strong>the</strong> DMCA. The plaintiff in that case, DVD Copy C<strong>on</strong>trol Associati<strong>on</strong>, Inc. (DVDCCA), was <strong>the</strong> sole licensor of CSS. 715 The plaintiff alleged that various defendants hadmisappropriated trade secrets in CSS by posting <strong>on</strong> <strong>the</strong>ir websites proprietary informati<strong>on</strong>relating to how <strong>the</strong> CSS technology functi<strong>on</strong>s, <strong>the</strong> source code of DeCSS, and/or providing linksto o<strong>the</strong>r websites c<strong>on</strong>taining CSS proprietary informati<strong>on</strong> and/or <strong>the</strong> DeCSS program. 716On Dec. 29, 1999, <strong>the</strong> court denied an applicati<strong>on</strong> by <strong>the</strong> plaintiff for a temporaryrestraining order that would have required <strong>the</strong> defendants to remove <strong>the</strong> DeCSS program andproprietary informati<strong>on</strong> from <strong>the</strong>ir websites, as well as links to o<strong>the</strong>r sites c<strong>on</strong>taining <strong>the</strong> same. 717However, <strong>on</strong> Jan. 21, 2000 (<strong>the</strong> day after <strong>the</strong> court in Reimerdes issued its preliminary injuncti<strong>on</strong>under <strong>the</strong> DMCA), <strong>the</strong> judge reversed course and issued a preliminary injuncti<strong>on</strong> prohibiting <strong>the</strong>defendants from “[p]osting or o<strong>the</strong>rwise disclosing or distributing, <strong>on</strong> <strong>the</strong>ir websites orelsewhere, <strong>the</strong> DeCSS program, <strong>the</strong> master keys or algorithms of <strong>the</strong> C<strong>on</strong>tent Scrambling System(‘CSS’), or any o<strong>the</strong>r informati<strong>on</strong> derived from this proprietary informati<strong>on</strong>.” 718In its order, <strong>the</strong> court stated that <strong>the</strong> evidence was fairly clear that <strong>the</strong> trade secret wasobtained through reverse engineering, and acknowledged that reverse engineering is notc<strong>on</strong>sidered “improper means” of obtaining a trade secret under <strong>the</strong> Uniform Trade Secrets Act.“The <strong>on</strong>ly way in which <strong>the</strong> reverse engineering could be c<strong>on</strong>sidered ‘improper means’ hereinwould be if whoever did <strong>the</strong> reverse engineering was subject to <strong>the</strong> click license agreementwhich prec<strong>on</strong>diti<strong>on</strong>ed installati<strong>on</strong> of DVD software or hardware, and prohibited reverseengineering. Plaintiff’s case is problematic at this pre-discovery state. Clearly <strong>the</strong>y have nodirect evidence at this point that [defendant] J<strong>on</strong> Johansen did <strong>the</strong> reverse engineering, and tha<strong>the</strong> did so after clicking <strong>on</strong> any licence [sic] agreement.” 719 Never<strong>the</strong>less, without elaborati<strong>on</strong>,712713714715716717718719Id.Lisa Bowman, “<str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Fight Comes to an End” (July 3, 2002), available as of July 8, 2002 athttp://news.com.com/2102-1023-941685.html.No. CV786804 (Santa Clara Superior Court, Dec. 27, 1999).Id. 4.Id. 1, 27-29, 45-50, 60-61.Deborah K<strong>on</strong>g, “DVD Movie Fight Loses,” San Jose Mercury News (Dec. 30, 1999) at 1C.Order Granting Preliminary Injuncti<strong>on</strong>, DVD Copy C<strong>on</strong>trol Assoc. v. McLaughlin (Sup. Ct., County of SantaClara, Jan. 21, 2000), available as of Jan. 19, 2002 atwww.eff.org/pub/Intellectual_property/Video/DVDCCA_case/20000120-pi-order.html.Id. at 2.- 169 -


<strong>the</strong> court found that <strong>the</strong> “circumstantial evidence, mostly due to <strong>the</strong> various defendants’inclinati<strong>on</strong> to boast about <strong>the</strong>ir disrespect for <strong>the</strong> law, is quite compelling <strong>on</strong> both <strong>the</strong> issue ofMr. Johansen’s improper means [and] th[e] Defendants’ knowledge of impropriety.” 720 Thecourt found that <strong>the</strong> harm to <strong>the</strong> defendants of <strong>the</strong> injuncti<strong>on</strong> would be minimal, while without<strong>the</strong> injuncti<strong>on</strong>, “<strong>the</strong> Plaintiff’s right to protect this informati<strong>on</strong> as secret will surely be lost, given<strong>the</strong> current power of <strong>the</strong> <strong>Internet</strong> to disseminate informati<strong>on</strong> and <strong>the</strong> Defendants’ stateddeterminati<strong>on</strong> to do so.” 721The court rejected <strong>the</strong> defendants’ argument “that trade secret status should be deemeddestroyed at this stage merely by <strong>the</strong> posting of <strong>the</strong> trade secret to <strong>the</strong> <strong>Internet</strong>. To holdo<strong>the</strong>rwise would do nothing less than encourage misappropriators of trade secrets to post <strong>the</strong>fruits of <strong>the</strong>ir wr<strong>on</strong>gdoing <strong>on</strong> <strong>the</strong> <strong>Internet</strong> as quickly as possible and as widely as possible,<strong>the</strong>reby destroying a trade secret forever. Such a holding would not be prudent in this age of <strong>the</strong><strong>Internet</strong>.” 722 The court refused, however, to extend <strong>the</strong> injuncti<strong>on</strong> to links to o<strong>the</strong>r websiteswhere DeCSS was posted. The court warned that a ban <strong>on</strong> <strong>Internet</strong> links would be “overbroadand burdensome,” calling links “<strong>the</strong> mainstay of <strong>the</strong> <strong>Internet</strong> and indispensable to its c<strong>on</strong>venientaccess to <strong>the</strong> vast world of informati<strong>on</strong>. A website owner cannot be held resp<strong>on</strong>sible for all of<strong>the</strong> c<strong>on</strong>tent of <strong>the</strong> sites to which it provides links.” 723In November 2001, a California Court of Appeal reversed <strong>the</strong> injuncti<strong>on</strong> <strong>on</strong> FirstAmendment grounds. In DVD Copy C<strong>on</strong>trol Assoc. v. Bunner, 724 <strong>the</strong> court acknowledged that,if <strong>the</strong> trial court correctly c<strong>on</strong>cluded that <strong>the</strong> plaintiffs had established a reas<strong>on</strong>able probability ofsuccess, a preliminary injuncti<strong>on</strong> would be justified in <strong>the</strong> absence of any free speech c<strong>on</strong>cerns.Never<strong>the</strong>less, <strong>the</strong> court found that <strong>the</strong> preliminary injuncti<strong>on</strong> could not withstand FirstAmendment scrutiny. The court ruled that DeCSS was “speech” within <strong>the</strong> scope of <strong>the</strong> FirstAmendment because “[r]egardless of who authored <strong>the</strong> program, DeCSS is a written expressi<strong>on</strong>of <strong>the</strong> author’s ideas and informati<strong>on</strong> about decrypti<strong>on</strong> of DVDs without CSS.” 725 The court<strong>the</strong>n held that republicati<strong>on</strong> of DeCSS by defendant Bunner 726 was “pure speech within <strong>the</strong> ambitof <strong>the</strong> First Amendment” and that <strong>the</strong> preliminary injuncti<strong>on</strong> <strong>the</strong>refore c<strong>on</strong>stituted an unlawfulprior restraint. 727 “[A] pers<strong>on</strong> who exposes <strong>the</strong> trade secret may be liable for damages if he orshe was bound by a c<strong>on</strong>tractual obligati<strong>on</strong> to safeguard <strong>the</strong> secret. And any<strong>on</strong>e who infringes acopyright held by [<strong>the</strong> plaintiff] of by an DVD c<strong>on</strong>tent provider may be subject to an acti<strong>on</strong>720721722723724725726727Id. at 2-3.Id. at 3.Id.Id. at 4.60 U.S.P.Q.2d 1803 (Cal. Ct. App. 2001).Id. at 1809.According to Bunner, defendant J<strong>on</strong> Johansen actually reverse engineered <strong>the</strong> CSS software and Bunner merelyrepublished it. He argued that he had no reas<strong>on</strong> to know that DeCSS had been created by improper use of anyproprietary informati<strong>on</strong> since <strong>the</strong> reverse engineering of CSS performed by Johansen was not illegal underNorwegian law. Id. at 1805-06.Id. at 1811.- 170 -


under <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act. We hold <strong>on</strong>ly that a preliminary injuncti<strong>on</strong> cannot be used to restrictBunner from disclosing DeCSS.” 728On appeal, <strong>the</strong> California Supreme Court reversed <strong>the</strong> California Court of Appeal’sdecisi<strong>on</strong>, ruling that <strong>the</strong> trial court’s preliminary injuncti<strong>on</strong> did not violate <strong>the</strong> FirstAmendment. 729 Although <strong>the</strong> Court held that restricti<strong>on</strong>s <strong>on</strong> <strong>the</strong> disseminati<strong>on</strong> of computer codewere subject to scrutiny under <strong>the</strong> First Amendment because <strong>the</strong> code was a means of expressingideas, 730 it found that <strong>the</strong> preliminary injuncti<strong>on</strong> passed scrutiny, assuming <strong>the</strong> trial courtproperly issued <strong>the</strong> injuncti<strong>on</strong> under California’s trade secret law, because it was c<strong>on</strong>tent neutral(and <strong>the</strong>refore not subject to strict scrutiny) and achieved <strong>the</strong> requisite balance of interests byburdening no more speech than necessary to serve <strong>the</strong> government interests at stake. 731 TheCourt emphasized that its holding was “quite limited,” and that its ruling that <strong>the</strong> preliminaryinjuncti<strong>on</strong> did not violate <strong>the</strong> free speech clauses of <strong>the</strong> United States and CaliforniaC<strong>on</strong>stituti<strong>on</strong>s was based <strong>on</strong> <strong>the</strong> assumpti<strong>on</strong> that <strong>the</strong> trial court properly issued <strong>the</strong> injuncti<strong>on</strong>under California’s trade secret law. “On remand, <strong>the</strong> Court of Appeal should determine <strong>the</strong>validity of this assumpti<strong>on</strong>.” 732On remand, <strong>the</strong> California Court of Appeal held that <strong>the</strong> preliminary injuncti<strong>on</strong> was notwarranted under California trade secret law because DeCSS had been so widely distributed <strong>on</strong><strong>the</strong> <strong>Internet</strong> that it was no l<strong>on</strong>ger a trade secret. 733 At <strong>the</strong> time of <strong>the</strong> hearing in <strong>the</strong> trial court fora preliminary injuncti<strong>on</strong>, <strong>the</strong> evidence showed that DeCSS had been displayed <strong>on</strong> or linked to atleast 118 Web pages in 11 states and 11 countries throughout <strong>the</strong> world and that approximately93 Web pages c<strong>on</strong>tinued to publish informati<strong>on</strong> about DeCSS. Subsequent to <strong>the</strong> filing of <strong>the</strong>law suit, a campaign of civil disobedience began am<strong>on</strong>g <strong>the</strong> programming community to spread<strong>the</strong> DeCSS code as widely as possible. Pers<strong>on</strong>s distributed <strong>the</strong> code at <strong>the</strong> courthouse, porti<strong>on</strong>sof it appeared <strong>on</strong> tee shirts, and c<strong>on</strong>tests were held encouraging people to submit ideas abouthow to disseminate <strong>the</strong> informati<strong>on</strong> as widely as possible. 734The court stated, “Publicati<strong>on</strong> <strong>on</strong> <strong>the</strong> <strong>Internet</strong> does not necessarily destroy <strong>the</strong> secret if <strong>the</strong>publicati<strong>on</strong> is sufficiently obscure or transient or o<strong>the</strong>rwise limited so that it does not becomegenerally known to <strong>the</strong> relevant people, i.e., potential competitors or o<strong>the</strong>r pers<strong>on</strong>s to whom <strong>the</strong>informati<strong>on</strong> would have some ec<strong>on</strong>omic value.” 735 However, in <strong>the</strong> instant case, <strong>the</strong> court heldthat <strong>the</strong> evidence in <strong>the</strong> case dem<strong>on</strong>strated that DeCSS had been published to “a worldwideaudience of milli<strong>on</strong>s” and “<strong>the</strong> initial publicati<strong>on</strong> was quickly and widely republished to an eageraudience so that DeCSS and <strong>the</strong> trade secrets it c<strong>on</strong>tained rapidly became available to any<strong>on</strong>e728729730731732733734735Id. at 1812.DVD Copy C<strong>on</strong>trol Ass’n v. Bunner, 31 Cal.4th 864 (2003).Id. at 876.Id. at 877-85.Id. at 889.DVD Copy C<strong>on</strong>trol Ass’n Inc. v. Bunner, 116 Cal. App. 4th 241 (6th Dist. 2004).Id. at 248-49.Id. at 251.- 171 -


interested in obtaining <strong>the</strong>m.” 736 Accordingly, <strong>the</strong> plaintiff had not established a likelihood ofsuccess <strong>on</strong> its trade secret claim because DeCSS had been so widely published that <strong>the</strong> CSStechnology “may have lost its trade secret status.” 737In a related DeCSS case involving jurisdicti<strong>on</strong>al issues, defendant Mat<strong>the</strong>w Pavlovich, aTexas resident who posted DeCSS <strong>on</strong> <strong>the</strong> web, was sued by <strong>the</strong> movie industry in California. Astate judge granted an injuncti<strong>on</strong> against his posting of DeCSS <strong>on</strong> trade secret grounds. TheCalifornia Supreme Court ruled that Pavlovich could not be sued in California because he didnot have substantial ties to <strong>the</strong> state. In January of 2004, <strong>the</strong> U.S. Supreme Court reversed anemergency stay of <strong>the</strong> California Supreme Court’s decisi<strong>on</strong> and lifted <strong>the</strong> injuncti<strong>on</strong>. JusticeO’C<strong>on</strong>nor noted in <strong>the</strong> order that <strong>the</strong>re was no need to keep DeCSS a secret. 738J<strong>on</strong> Johansen(v)A Related DVD Case – Norwegian Prosecuti<strong>on</strong> ofIn January 2002, Norwegian prosecutors brought criminal charges against J<strong>on</strong> Johansen,<strong>on</strong>e of <strong>the</strong> original three authors of <strong>the</strong> DeCSS program, for violating Norwegian hackinglaws. 739 On Jan. 11, 2002, <strong>the</strong> civil rights organizati<strong>on</strong> Electr<strong>on</strong>ic Fr<strong>on</strong>tier Norway (EFN) issueda press release calling for Johansen’s acquittal and full redress. 740 After a trial, a three-judgecourt in Oslo acquitted Johansen, ruling that c<strong>on</strong>sumers have rights to view legally obtainedDVD films “even if <strong>the</strong> films are played in a different way than <strong>the</strong> makers had foreseen.” Onappeal, Johansen was again acquitted. 741(vi) Ano<strong>the</strong>r Challenge to <strong>the</strong> DMCA – The Felten Case.During 2000, <strong>the</strong> Secure Digital Music Initiative (SDMI) offered a cash prize to any<strong>on</strong>ewho could break its watermark encrypti<strong>on</strong> scheme for <strong>the</strong> protecti<strong>on</strong> of digital c<strong>on</strong>tent. A teamof scientists, led by Prof. Edward Felten of Princet<strong>on</strong> University, was able to crack <strong>the</strong> schemeand desired to publish a paper <strong>on</strong> how <strong>the</strong>y were able to do it. The RIAA threatened Prof.Felten, c<strong>on</strong>tending that publicati<strong>on</strong> of <strong>the</strong> paper would violate <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>sof <strong>the</strong> DMCA. As a result of <strong>the</strong> threats, Prof. Felten withdrew publicati<strong>on</strong> of his paper from anApril 2001 c<strong>on</strong>ference. In June 2001, he and seven o<strong>the</strong>r researchers, toge<strong>the</strong>r with <strong>the</strong> UsenixAssociati<strong>on</strong> (a professi<strong>on</strong>al organizati<strong>on</strong> that had accepted Felten’s paper for a securitysymposium to be held during August 2001), filed a lawsuit against <strong>the</strong> RIAA, seeking adeclarati<strong>on</strong> that publicati<strong>on</strong> of <strong>the</strong>ir work would not violate <strong>the</strong> DMCA, and against <strong>the</strong> Justice736737738739740741Id. at 252-53.Id. at 255.Samantha Chang, “Supreme Court Unscrambles DVD Decisi<strong>on</strong>” (Jan. 17, 2004), available as of Jan. 19, 2004at www.reuters.com/newsArticle.jhtml?type=musicNews&storyID=4152687.Declan McCullagh, “Norway Cracks Down <strong>on</strong> DVD Hacker” (Jan. 10, 2002), available as of Jan. 19, 2002 atwww.wired.com/news/politics/0,1283,49638,00.html.The press release was available as of Jan. 19, 2002 at www.efn.no/freej<strong>on</strong>01-2002.html.“Court Surprised DVD-J<strong>on</strong>’s Lawyer” (Dec. 22, 2003), available as of Dec. 22, 2003 atwww.aftenposten.no/english/local/article.jhtml?articleID=696470.- 172 -


Department to block it from prosecuting <strong>the</strong> symposium organizers for allowing <strong>the</strong> paper to bepresented. 742 On Nov. 28, 2001, a district judge in New Jersey dismissed <strong>the</strong> lawsuit, apparentlyc<strong>on</strong>cluding that nei<strong>the</strong>r <strong>the</strong> RIAA nor <strong>the</strong> Justice Department had imminent plans to seek to stopProf. Felten from publishing his findings. 743 Citing assurances from <strong>the</strong> government, <strong>the</strong> RIAA,and <strong>the</strong> findings of <strong>the</strong> district judge, in Feb. of 2002, Prof. Felten and his research team decidednot to appeal <strong>the</strong> dismissal of <strong>the</strong>ir case. 744(vii) Pearl Investments, LLC v. Standard I/O, Inc.In this case, Pearl hired Standard to perform software programming services to developan automated stock-trading system (ATS). After completi<strong>on</strong> of ATS, an employee of Standardnamed Chunn who had helped develop ATS, working <strong>on</strong> his own time, created software for hisown experimental automated trading system, which he maintained <strong>on</strong> a server separate from <strong>the</strong>server that Pearl’s ATS system was operating <strong>on</strong>, although Chunn’s server was hosted by <strong>the</strong>same service provider as Pearl’s ATS system. 745 Pearl’s ATS system operated <strong>on</strong> a virtualprivate network (VPN) that c<strong>on</strong>tained access restricti<strong>on</strong>s implemented through a special router to<strong>the</strong> VPN. 746 At <strong>on</strong>e point, Pearl requested <strong>the</strong> service provider to install Linux <strong>on</strong> its ATS server.The service provider mistakenly installed Linux <strong>on</strong> Chunn’s server, which was plugged intoPearl’s router. Pearl alleged that a “tunnel” (a secure c<strong>on</strong>necti<strong>on</strong>) was c<strong>on</strong>figured in <strong>the</strong> routerthat provided a c<strong>on</strong>necti<strong>on</strong> between Chunn’s server and Pearl’s server, <strong>the</strong>reby allowing Chunnto circumvent Pearl’s password-protected VPN and gain unauthorized access to its ATS systemrunning <strong>on</strong> <strong>the</strong> VPN, which included Pearl’s copyrighted software. 747Pearl brought claims against Standard and Chunn for, am<strong>on</strong>g o<strong>the</strong>r things, violati<strong>on</strong> ofSecti<strong>on</strong> 1201(a)(1)(A) of <strong>the</strong> DMCA based <strong>on</strong> <strong>the</strong> alleged creati<strong>on</strong> of <strong>the</strong> tunnel. Both <strong>the</strong>plaintiff and <strong>the</strong> defendants sought summary judgment <strong>on</strong> <strong>the</strong> claim. The court ruled thatStandard was entitled to summary judgment because <strong>the</strong> evidence was undisputed that Chunn, indeveloping and operating his automated trading system, was acting solely <strong>on</strong> his own and not asan employee of Standard. Standard could <strong>the</strong>refore not be held liable for his acti<strong>on</strong>s. 748The court, however, denied summary judgment to Chunn. First, <strong>the</strong> court ruled thatPearl’s VPN was <strong>the</strong> “electr<strong>on</strong>ic equivalent” of a locked door that fit <strong>the</strong> definiti<strong>on</strong> of a742743744745746747748Declan McCullagh, “Code-Breakers Go to Court” (June 6, 2001), available as of Jan. 19, 2002 atwww.wired.com/news/mp3/0,1285,44344,00.html.Robert Lemos, “Court Dismisses Free-Speech Lawsuit” (Nov. 28, 2001), available as of Jan. 19, 2002 athttp://news.cnet.com/news/0-1005-200-8010671.html.Electr<strong>on</strong>ic Fr<strong>on</strong>tier Foundati<strong>on</strong> press release, “Security Researchers Drop Scientific Censorship Case” (Feb. 6,2002), available as of Feb. 10, 2002 at www.eff.org/IP/DMCA/Felten_v_RIAA/20020206_eff_felten_pr.html.The government stated in documents filed with <strong>the</strong> court in Nov. 2001 that “scientists attempting to studyaccess c<strong>on</strong>trol technologies” are not subject to <strong>the</strong> DMCA. Id.Pearl Investments, LLC v. Standard I/O, Inc., 257 F. Supp. 2d 326, 339-40 (D. Me. 2003).Id. at 342, 349.Id. at 341-42 & n.36, 349.Id. at 346-47, 349-50.- 173 -


technological protecti<strong>on</strong> measure put in place by <strong>the</strong> copyright owner to c<strong>on</strong>trol access to Pearl’scopyrighted ATS software. 749 The court rejected <strong>the</strong> argument that <strong>the</strong> VPN did not effectivelyc<strong>on</strong>trol Chunn’s access to <strong>the</strong> ATS system in view of <strong>the</strong> fact that he had written <strong>the</strong> ATS systemhimself and maintained a backup file of it for Pearl. “The questi<strong>on</strong> of whe<strong>the</strong>r a technologicalmeasure ‘effectively c<strong>on</strong>trols access’ is analyzed solely with reference to how that measureworks ‘in <strong>the</strong> ordinary course of its operati<strong>on</strong>.’ 17 U.S.C. § 1201(a)(3)(B). The fact that Chunnhad alternative means of access to <strong>the</strong> works is irrelevant to whe<strong>the</strong>r <strong>the</strong> VPN effectivelyc<strong>on</strong>trolled access to <strong>the</strong>m.” 750 Finally, <strong>the</strong> court ruled that because <strong>the</strong>re was a factual disputeabout whe<strong>the</strong>r <strong>on</strong>ly employees of <strong>the</strong> service provider, ra<strong>the</strong>r than Chunn, had c<strong>on</strong>figured <strong>the</strong>tunnel from Chunn’s server to <strong>the</strong> Pearl VPN, or whe<strong>the</strong>r Chunn had c<strong>on</strong>figured his server androuter to tunnel into Pearl’s network, Chunn was not entitled to summary judgment <strong>on</strong> <strong>the</strong>DMCA claim. 751In a subsequent jury trial, <strong>the</strong> jury found for Chunn <strong>on</strong> Pearl’s DMCA claim. 752(viii) 321 Studios v. Metro Goldwyn Mayer Studios, Inc.In this case, 321 Studios marketed and sold software called DVD Copy Plus, which wascapable of copying <strong>the</strong> video c<strong>on</strong>tents of a DVD, both encrypted and unencrypted with <strong>the</strong>DeCSS encrypti<strong>on</strong> scheme, <strong>on</strong>to a recordable CD. 321 Studios sought a ruling that its softwaredid not violate <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>s of <strong>the</strong> DMCA. 753 The court ruled that <strong>the</strong>software’s capability to decrypt DVDs encoded with CSS did violate <strong>the</strong> anti-circumventi<strong>on</strong>provisi<strong>on</strong>s. The court first rejected 321 Studios’ argument that CSS was not an effectivetechnological measure because <strong>the</strong> CSS access keys were widely available <strong>on</strong> <strong>the</strong> <strong>Internet</strong>. Thecourt held that “this is equivalent to a claim that, since it is easy to find skelet<strong>on</strong> keys <strong>on</strong> <strong>the</strong>black market, a deadbolt is not an effective lock to a door.” 754With respect to <strong>the</strong> specific prohibiti<strong>on</strong> of Secti<strong>on</strong> 1201(a)(2), 321 Studios argued that ithad <strong>the</strong> authority of <strong>the</strong> copyright holder to decrypt DVDs protected by CSS because its productworked <strong>on</strong>ly <strong>on</strong> original DVDs, and <strong>the</strong> purchaser of a DVD has <strong>the</strong> authority of <strong>the</strong> copyrightholder to bypass CSS to play <strong>the</strong> DVD. The court rejected this argument, citing Universal CityStudios, Inc. v. Corley 755 for <strong>the</strong> propositi<strong>on</strong> that purchase of a DVD does not authorize <strong>the</strong>purchaser to decrypt CSS, but ra<strong>the</strong>r <strong>on</strong>ly to view <strong>the</strong> c<strong>on</strong>tent <strong>on</strong> <strong>the</strong> DVD. Only a licensed749750751752753754755Id. at 350.Id.Id.See Pearl Investments v. Standard I/O, Inc., 324 F. Supp. 2d 43 (2004) (rejecting Pearl’s claim that <strong>the</strong> jury’sverdict in favor of Chunn <strong>on</strong> <strong>the</strong> DMCA claim was inc<strong>on</strong>sistent with its c<strong>on</strong>clusi<strong>on</strong> that Chunn’s physicalhookup to <strong>the</strong> Pearl system caused damage to Pearl).321 Studios v. Metro Goldwyn Mayer Studios, Inc., 307 F. Supp. 2d 1085, 1089-90 (N.D. Cal. 2004).Id. at 1095.273 F.3d 429 (2d Cir. 2001).- 174 -


DVD player has <strong>the</strong> authority of <strong>the</strong> copyright holder to decrypt CSS and 321 Studios did nothold a CSS license. 756With respect to <strong>the</strong> specific prohibiti<strong>on</strong> of Secti<strong>on</strong> 1201(b)(1), 321 Studios argued thatCSS was not a copy c<strong>on</strong>trol measure because it c<strong>on</strong>trolled <strong>on</strong>ly access to c<strong>on</strong>tent and did notc<strong>on</strong>trol or prevent copying of DVDs. The court rejected this argument, noting that while it wastechnically correct that CSS c<strong>on</strong>trolled access to DVDs, “<strong>the</strong> purpose of this access c<strong>on</strong>trol is toc<strong>on</strong>trol copying of those DVDs, since encrypted DVDs cannot be copied unless <strong>the</strong>y areaccessed.” 757 The court also rejected 321 Studios’ argument that <strong>the</strong> primary purpose of DVDCopy Plus was not to violate rights of a copyright holder since <strong>the</strong> software could be used formany purposes that did not involve accessing CSS or that involved making copies of material in<strong>the</strong> public domain or under fair use principles. In a potentially very broad holding, <strong>the</strong> court heldthat <strong>the</strong> downstream uses of DVD Copy Plus, whe<strong>the</strong>r legal or illegal, were irrelevant todetermining whe<strong>the</strong>r 321 Studios itself was violating <strong>the</strong> DMCA. 758 “It is <strong>the</strong> technology itselfat issue, not <strong>the</strong> uses to which <strong>the</strong> copyrighted material may be put. This Court finds, as did both<strong>the</strong> Corley and Elcom courts, that legal downstream use of <strong>the</strong> copyrighted material bycustomers is not a defense to <strong>the</strong> software manufacturer’s violati<strong>on</strong> of <strong>the</strong> provisi<strong>on</strong>s of §1201(b)(1).” 759321 Studios also argued that its software did not violate Secti<strong>on</strong> 1201(b)(2) because itused authorized keys to decrypt CSS. The court ruled that, “while 321’s software does use <strong>the</strong>authorized key to access <strong>the</strong> DVD, it does not have authority to use this key, as licensed DVDplayers do, and it <strong>the</strong>refore avoids and bypasses CSS.” 760Finally, 321 Studios argued that, under <strong>the</strong> comm<strong>on</strong> requirement of both Secti<strong>on</strong>s1201(a)(2) and 1201(b)(1), its DVD Copy Plus software was not primarily designed andproduced to circumvent CSS, but ra<strong>the</strong>r was designed and produced to allow users to makecopies of all or part of a DVD, and that <strong>the</strong> ability to unlock CSS was just <strong>on</strong>e of <strong>the</strong> features ofits software. The court rejected this argument, noting that Secti<strong>on</strong>s 1201(a)(2) and 1201(b)(1)both prohibit any technology or product “or part <strong>the</strong>reof” that is primarily designed or producedfor circumventi<strong>on</strong>. Because it was undisputed that a porti<strong>on</strong> of 321 Studios’ software was solelyfor <strong>the</strong> purpose of circumventing CSS, that porti<strong>on</strong> of <strong>the</strong> software violated <strong>the</strong> DMCA. 761756757758759760761321 Studios, 307 F. Supp. 2d at 1096.Id. at 1097.Id.Id. at 1097-98.Id. at 1098. This holding is c<strong>on</strong>trary to that reached by <strong>the</strong> court in I.M.S. Inquiry Management Systems, Ltd.v. Berkshire Informati<strong>on</strong> Systems, Inc., 307 F. Supp. 2d 521 (S.D.N.Y. 2004), discussed in <strong>the</strong> next subsecti<strong>on</strong>.321 Studios, 307 F. Supp. 2d at 1098. The court ruled that it could not determine <strong>on</strong> summary judgmentwhe<strong>the</strong>r <strong>the</strong> software had <strong>on</strong>ly limited commercially significant purposes o<strong>the</strong>r than circumventi<strong>on</strong>, and thatwould be an issue a jury would have to decide. Id. The court also rejected 321 Studios’ challenge to <strong>the</strong>c<strong>on</strong>stituti<strong>on</strong>ality of <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>s <strong>on</strong> <strong>the</strong> ground that is unc<strong>on</strong>stituti<strong>on</strong>ally restricted 321Studios’ right to tell o<strong>the</strong>rs how to make fair use of a copyrighted work, impermissibly burdened <strong>the</strong> fair userights of o<strong>the</strong>rs, and exceeded <strong>the</strong> scope of C<strong>on</strong>gressi<strong>on</strong>al powers. Id. at 1098-1105.- 175 -


Accordingly, <strong>the</strong> court enjoined 321 Studios from manufacturing, distributing, or o<strong>the</strong>rwisetrafficking in any type of DVD circumventi<strong>on</strong> software. 762(ix) I.M.S. Inquiry Management Systems, Ltd. v.Berkshire Informati<strong>on</strong> Systems, Inc.This case reached <strong>the</strong> opposite result from <strong>the</strong> 321 Studios v. Metro Goldwyn Mayercase, and held that <strong>the</strong> unauthorized use of an o<strong>the</strong>rwise legitimate, owner-issued password doesnot c<strong>on</strong>stitute a “circumventi<strong>on</strong>” of a technological measure under <strong>the</strong> DMCA. 763 The plaintiffowned a web-based service that provided informati<strong>on</strong> <strong>on</strong> tracking magazine advertisingexclusively to its clients through proprietary passwords. The defendant obtained a useridentificati<strong>on</strong> and password issued to a third party and made unauthorized use of <strong>the</strong> same togain access to <strong>the</strong> plaintiff’s web site, from which <strong>the</strong> defendant downloaded approximately 85%of <strong>the</strong> report formats and copied those formats into its competing service. 764 The court ruled<strong>the</strong>re was no DMCA violati<strong>on</strong> because “what defendant avoided and bypassed was permissi<strong>on</strong> toengage and move through <strong>the</strong> technological measure from <strong>the</strong> measure’s author. … Defendantdid not surmount or puncture or evade any technological measure to do so; instead, it used apassword intenti<strong>on</strong>ally issued by plaintiff to ano<strong>the</strong>r entity.” 765(x)Paramount Pictures Corp. v. 321 Studios.The court in this case, in a very short opini<strong>on</strong> citing <strong>the</strong> Corley and Reimerdes cases andfor <strong>the</strong> reas<strong>on</strong>s stated <strong>the</strong>rein, held that 321 Studios violated <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>s of<strong>the</strong> DMCA by manufacturing and selling its software product that permitted <strong>the</strong> possessor of aDVD encoded with CSS to decode CSS and <strong>the</strong>reby make identical copies of <strong>the</strong> DVD. Thecourt enjoined 321 Studios from manufacturing, distributing, linking to, or o<strong>the</strong>rwise traffickingin any of its software products that were capable of decrypting CSS. 766(xi) Macrovisi<strong>on</strong> Corp. v. 321 StudiosIn this case, <strong>the</strong> same judge as in <strong>the</strong> Paramount Pictures case, in a <strong>on</strong>e paragraph opini<strong>on</strong>that simply cited his earlier decisi<strong>on</strong> in <strong>the</strong> Paramount Pictures case, issued a preliminaryinjuncti<strong>on</strong> against 321 Studios barring it from selling <strong>the</strong> various versi<strong>on</strong>s of its DVD copyingsoftware. 767 In August of 2004, 321 Studios reached a settlement with <strong>the</strong> moti<strong>on</strong> picture762763764765766767Id. at 1105.I.M.S. Inquiry Management Systems, Ltd. v. Berkshire Informati<strong>on</strong> Systems, Inc., 307 F. Supp. 2d 521(S.D.N.Y. 2004).Id. at 523.Id. at 532-33.Paramount Pictures Corp. v. 321 Studios, 69 U.S.P.Q.2d 2023, 2023-24 (S.D.N.Y. 2004).Macrovisi<strong>on</strong> Corp. v. 321 Studios, 2004 U.S. Dist. LEXIS 8345 (S.D.N.Y. May 12, 2004).- 176 -


industry, which included a financial payment and an agreement to stop distributing its DVDcopying software worldwide, and ceased operati<strong>on</strong>s. 768(xii) Comcast of Illinois X v. Hightech Electr<strong>on</strong>ics, Inc.In this case, <strong>the</strong> defendant Hightech set up a website named 1-satellite-dish.com thatc<strong>on</strong>tained links to over thirty o<strong>the</strong>r websites selling illegal cable pirating devices. Comcastbrought claims under Secti<strong>on</strong>s 1201(a)(2) and (b)(1) against <strong>the</strong> website as well as against NetResults, <strong>the</strong> named domain server for <strong>the</strong> 1-satellite-dish.com website. 769 The defendants arguedthat <strong>on</strong>ly copyright holders can bring suit under <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>s and thatComcast, in regard to <strong>the</strong> cable signals at issue, was not <strong>the</strong> copyright owner. The court rejectedthis argument, citing CSC Holdings, Inc. v. Greenleaf Electr<strong>on</strong>ics, Inc., 2000 U.S. Dist. LEXIS7675 (N.D. Ill. 2000), which held that <strong>the</strong> plaintiff cable provider had standing to bring suitunder Secti<strong>on</strong> 1203(a) against <strong>the</strong> defendants for selling and distributing pirate cabledescrambling equipment, as it was a pers<strong>on</strong> injured by a violati<strong>on</strong> of <strong>the</strong> DMCA Accordingly,<strong>the</strong> Comcast court c<strong>on</strong>cluded that Comcast could bring its claim under <strong>the</strong> DMCA. 770With respect to <strong>the</strong> merits of <strong>the</strong> DMCA claims, <strong>the</strong> court ruled that Comcast c<strong>on</strong>trolledthrough technological measures access to copyrighted programs it provided to its subscribers byscrambling those programs, and that such measures also protected <strong>the</strong> rights of <strong>the</strong> copyrightowners in those programs, as required by Secti<strong>on</strong>s 1201(a)(2) and (b)(1). Citing <strong>the</strong> Reimerdescase, <strong>the</strong> court noted that <strong>the</strong>re can be a violati<strong>on</strong> of <strong>the</strong> DMCA for maintaining links to o<strong>the</strong>rwebsites that c<strong>on</strong>tain access to or informati<strong>on</strong> regarding circumventi<strong>on</strong> technology. The courtnoted that <strong>the</strong> Intellectual Reserve case had refused to find c<strong>on</strong>tributory liability for posting linksto infringing websites because <strong>the</strong>re was no direct relati<strong>on</strong>ship between <strong>the</strong> defendant and <strong>the</strong>people who operated <strong>the</strong> websites c<strong>on</strong>taining <strong>the</strong> infringing material, and <strong>the</strong> defendants did notreceive any kind of compensati<strong>on</strong> from <strong>the</strong> linked websites. 771By c<strong>on</strong>trast, in <strong>the</strong> instant case, <strong>the</strong> court noted that Comcast had alleged that Hightechreceived compensati<strong>on</strong> from <strong>the</strong> website operators that linked to 1-satellite-dish.com. Inadditi<strong>on</strong>, <strong>the</strong> court found that Net Results, as <strong>the</strong> domain server of websites selling illegal cableequipment, could possibly be engaging in trafficking under <strong>the</strong> DMCA because it was allegedlyassisting sellers of illegal cable equipment in distributing such equipment. The court <strong>the</strong>reforec<strong>on</strong>cluded that Comcast had sufficiently stated a claim against <strong>the</strong> defendants under <strong>the</strong> DMCAin trafficking or acting in c<strong>on</strong>cert with a pers<strong>on</strong> who had manufactured or distributed illicitcircumventi<strong>on</strong> equipment, and denied <strong>the</strong> defendants’ moti<strong>on</strong> to dismiss <strong>the</strong> DMCA claims. 772768769770771772“Maker of DVD-Copying Products Reaches Settlement Over Suits” (Aug. 10, 2004), available as of Aug. 11,2004 at www.silic<strong>on</strong>valley.com/mld/silic<strong>on</strong>valley/news/editorial/9364923.htm.Comcast of Illinois X v. Hightech Electr<strong>on</strong>ics, Inc., 2004 Copyr. L. Dec. 28,840 at pp. 37,299 & 37,232-33(N.D. Ill. 2004).Id. at 37,233.Id.Id. at 37,233-34.- 177 -


(xiii) Davids<strong>on</strong> & Assocs. v. <strong>Internet</strong> GatewayFor a discussi<strong>on</strong> of this case, which found violati<strong>on</strong>s of both <strong>the</strong> anti-circumventi<strong>on</strong> andtrafficking prohibiti<strong>on</strong>s of Secti<strong>on</strong> 1201, see Secti<strong>on</strong> II.G.1(g)(5) above.(xiv) Agfa M<strong>on</strong>otype Corp. v. Adobe Sys.This case addressed <strong>the</strong> issue of whe<strong>the</strong>r a passive bit or flag indicating <strong>the</strong> copyrightowner’s preference with respect to copying or distributi<strong>on</strong> c<strong>on</strong>stitutes an effective technologicalaccess c<strong>on</strong>trol measure or measure protecting copyright rights, and held that it does not. Theplaintiffs were <strong>the</strong> copyright owners in about 3,300 copyrighted TrueType f<strong>on</strong>ts. The plaintiffsalleged that Versi<strong>on</strong> 5 of Adobe’s Acrobat product violated <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>s of<strong>the</strong> DMCA because it ignored <strong>the</strong> “embedding bits” in certain of <strong>the</strong> plaintiffs’ f<strong>on</strong>ts thatindicated whe<strong>the</strong>r <strong>the</strong> f<strong>on</strong>ts were licensed for editing. 773Adobe Acrobat 5.0 was capable of embedding f<strong>on</strong>ts into portable electr<strong>on</strong>ic documentsstored in Adobe’s Portable Document Format (PDF). The court described <strong>the</strong> technology of f<strong>on</strong>tembedding as follows:A f<strong>on</strong>t is copied when it is embedded. F<strong>on</strong>ts are embedded through embeddingbits. Embedding bits indicate to o<strong>the</strong>r programs capable of reading <strong>the</strong>m, such asAdobe Acrobat, <strong>the</strong> f<strong>on</strong>t embedding licensing rights that <strong>the</strong> f<strong>on</strong>t vendor grantedwith respect to <strong>the</strong> particular f<strong>on</strong>t. The software applicati<strong>on</strong> decides whe<strong>the</strong>r ornot to embed <strong>the</strong> f<strong>on</strong>t based up<strong>on</strong> <strong>the</strong> embedding bit. An embedding bit cannot beread by a computer program until that program has already accessed <strong>the</strong> f<strong>on</strong>t datafile. TrueType F<strong>on</strong>ts are not encrypted, scrambled, or au<strong>the</strong>nticated. A TrueTypeF<strong>on</strong>t data file can be accessed regardless of <strong>the</strong> f<strong>on</strong>t’s embedding permissi<strong>on</strong>s. Aprogram seeking to access a TrueType f<strong>on</strong>t need not submit a password orcomplete an authorizati<strong>on</strong> sequence to access, use or copy TrueType F<strong>on</strong>ts. 774The Microsoft TrueType F<strong>on</strong>t specificati<strong>on</strong> defined four levels of embedding bitrestricti<strong>on</strong>s: Restricted (f<strong>on</strong>t cannot be embedded); Print & Preview (f<strong>on</strong>t can be embedded but<strong>the</strong> document must be opened as read-<strong>on</strong>ly and no edits may be applied to <strong>the</strong> document),Editable (f<strong>on</strong>t can be embedded and <strong>the</strong> document may be opened for reading and editing), andInstallable. 775 Acrobat 5.0 made it possible for <strong>the</strong> first time to embed in <strong>the</strong> “form field” or“free text annotati<strong>on</strong>” of a PDF document 776 any TrueType F<strong>on</strong>t whose embedding bit was not773774775776Agfa M<strong>on</strong>otype Corp. v. Adobe Sys., 404 F. Supp. 2d 1030, 1031-32 (N.D. Ill. 2005).Id. at 1031.Id. at 1031-32.A PDF form field was designed to allow a recipient to complete an electr<strong>on</strong>ic form and electr<strong>on</strong>ically return <strong>the</strong>informati<strong>on</strong> inputted <strong>on</strong> <strong>the</strong> form to <strong>the</strong> creator. A PDF free text annotati<strong>on</strong> was designed to allow recipient toinsert comments into <strong>the</strong> PDF document that could be viewed by <strong>the</strong> creator when electr<strong>on</strong>ically returned. Id.at 1033.- 178 -


set to “Restricted,” including f<strong>on</strong>ts whose embedding bit was set to “Print and Preview.” Thiscapability of Acrobat 5.0 was referred to as <strong>the</strong> “Any F<strong>on</strong>t Feature.” 777The plaintiffs c<strong>on</strong>tended that <strong>the</strong> Any F<strong>on</strong>t Feature resulted in “editable embedding,”because a recipient of a PDF file with embedded f<strong>on</strong>ts could use <strong>the</strong> f<strong>on</strong>ts to change <strong>the</strong> c<strong>on</strong>tentsof a form field or free text annotati<strong>on</strong>. The plaintiffs fur<strong>the</strong>r c<strong>on</strong>tended that such editableembedding was possible <strong>on</strong>ly because Acrobat 5.0 allowed <strong>the</strong> embedding bits set by <strong>the</strong>plaintiffs to be “circumvented” in violati<strong>on</strong> of <strong>the</strong> DMCA. 778The court rejected <strong>the</strong> plaintiffs’ claims under both Secti<strong>on</strong>s 1201(a)(2) and 1201(b)(1) of<strong>the</strong> DMCA. With respect to Secti<strong>on</strong> 1201(a)(2), <strong>the</strong> court ruled that <strong>the</strong> plaintiffs’ embeddingbits did not effectively c<strong>on</strong>trol access to <strong>the</strong> TrueType f<strong>on</strong>ts. The court found that an embeddingbit was a passive entity that did nothing by itself. Embedding bits were not encrypted, scrambledor au<strong>the</strong>nticated, and software applicati<strong>on</strong>s such as Acrobat 5.0 did not need to enter a passwordor authorizati<strong>on</strong> sequence to obtain access to <strong>the</strong> embedding bits or <strong>the</strong> specificati<strong>on</strong> for <strong>the</strong>TrueType f<strong>on</strong>t (which was publicly available for free download from <strong>the</strong> <strong>Internet</strong>). Theembedding bits <strong>the</strong>refore did not, in <strong>the</strong>ir ordinary course of operati<strong>on</strong>, require <strong>the</strong> applicati<strong>on</strong> ofinformati<strong>on</strong>, or a process or a treatment, with <strong>the</strong> authority of <strong>the</strong> copyright owner, to gain accessto <strong>the</strong> plaintiffs’ TrueType f<strong>on</strong>ts, as required by Secti<strong>on</strong> 1201(a)(3)(B) in order for atechnological measure to effectively protect access to a copyrighted work. 779In additi<strong>on</strong>, <strong>the</strong> court ruled that Acrobat 5.0 did not c<strong>on</strong>tain technology, comp<strong>on</strong>ents orparts that were primarily designed to circumvent TrueType embedding bits. The court foundthat Acrobat 5.0 had many commercially significant purposes o<strong>the</strong>r than to circumventembedding bits, even if it did circumvent <strong>the</strong>m. The purpose of <strong>the</strong> embedded f<strong>on</strong>t capability inAcrobat 5.0 was so that electr<strong>on</strong>ic documents could look exactly <strong>the</strong> same when printed andviewed by a recipient as sent by <strong>the</strong> creator. The primary purpose of <strong>the</strong> forms feature was toallow recipients to complete electr<strong>on</strong>ic forms <strong>the</strong>y receive and electr<strong>on</strong>ically return <strong>the</strong>informati<strong>on</strong> inputted <strong>on</strong> <strong>the</strong> form to <strong>the</strong> creator. Similarly, <strong>the</strong> commercial purpose of <strong>the</strong> freetext annotati<strong>on</strong> feature was to allow recipients to insert comments into <strong>the</strong> PDF that could beviewed by <strong>the</strong> creator when electr<strong>on</strong>ically returned. Nor was Acrobat 5.0 marketed for <strong>the</strong>primary purpose of circumventing <strong>the</strong> embedding bits – Adobe had made no menti<strong>on</strong> ofembedding bits, circumventi<strong>on</strong> of embedding bits, or <strong>the</strong> Any F<strong>on</strong>t Feature in any of itsmarketing materials for Acrobat 5.0. 780With respect to <strong>the</strong> plaintiffs’ Secti<strong>on</strong> 1201(b)(1) claim, Adobe argued, and <strong>the</strong> courtagreed, that <strong>the</strong> embedding bits did not c<strong>on</strong>stitute a technological measure that prevented,restricted, or o<strong>the</strong>rwise limited <strong>the</strong> exercise of a right of copyright. The plaintiffs had alreadyauthorized <strong>the</strong> copy and distributi<strong>on</strong> of <strong>the</strong>ir TrueType f<strong>on</strong>ts for embedding in PDF documentsfor “Print and Preview” purposes. Acrobat 5.0 did not make an additi<strong>on</strong>al copy or distributi<strong>on</strong> of777778779780Id. at 1032.Id. at 1034.Id. at 1036-37.Id. at 1032-33.- 179 -


a f<strong>on</strong>t to embed <strong>the</strong> f<strong>on</strong>t in free text annotati<strong>on</strong>s or form fields, and <strong>the</strong> plaintiffs’ copyright didnot give <strong>the</strong>m <strong>the</strong> right to c<strong>on</strong>trol subsequent use of lawfully made copies of <strong>the</strong> f<strong>on</strong>ts. 781In additi<strong>on</strong>, for <strong>the</strong> same reas<strong>on</strong>s noted in c<strong>on</strong>necti<strong>on</strong> with <strong>the</strong> plaintiffs’ Secti<strong>on</strong>1201(a)(2) claim, <strong>the</strong> court ruled that Acrobat 5.0 as a whole and <strong>the</strong> parts <strong>the</strong>reof were notprimarily designed or promoted for f<strong>on</strong>t embedding purposes and had many o<strong>the</strong>r commerciallysignificant purposes o<strong>the</strong>r than circumventing <strong>the</strong> embedding bits associates with <strong>the</strong> plaintiffs’TrueType f<strong>on</strong>ts. Accordingly, <strong>the</strong> court granted Adobe’s moti<strong>on</strong> for summary judgment withrespect to <strong>the</strong> plaintiffs’ anti-circumventi<strong>on</strong> claims. 782(xv) Egilman v. Keller & HeckmanThis case agreed with <strong>the</strong> I.M.S. case and held that access to a computer through <strong>the</strong>unauthorized use of a valid password does not c<strong>on</strong>stitute an unlawful circumventi<strong>on</strong>. 783 Theplaintiff Egilman was a medical doctor and testifying expert witness in a case in which <strong>the</strong> courthad issued an order prohibiting any<strong>on</strong>e involved in <strong>the</strong> litigati<strong>on</strong> from publishing any statements<strong>on</strong> <strong>Internet</strong> websites over which <strong>the</strong>y had c<strong>on</strong>trol c<strong>on</strong>cerning <strong>the</strong> litigati<strong>on</strong>. Egilman wassancti<strong>on</strong>ed for violating <strong>the</strong> order by publishing certain inflammatory statements <strong>on</strong> his website.Egilman claimed that <strong>on</strong>e of <strong>the</strong> defendant’s law firms had obtained <strong>the</strong> user name and passwordto his website without authorizati<strong>on</strong> and disclosed that informati<strong>on</strong> to ano<strong>the</strong>r defendant’s lawfirm, which <strong>the</strong>n used <strong>the</strong> user name and password to gain access to his website, from which <strong>the</strong>firm obtained informati<strong>on</strong> showing that Egilman had violated <strong>the</strong> court order. Egilman asserteda claim under <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>s against <strong>the</strong> law firm. 784The court rejected <strong>the</strong> claim. It reviewed <strong>the</strong> facts and holding of <strong>the</strong> I.M.S. casediscussed in subsecti<strong>on</strong> j. above, and found that <strong>the</strong> case was correctly decided. 785 The court<strong>the</strong>refore ruled that “using a username/password combinati<strong>on</strong> as intended – by entering a validusername and password, albeit without authorizati<strong>on</strong> – does not c<strong>on</strong>stitute circumventi<strong>on</strong> under<strong>the</strong> DMCA.” The “technological measure” employed by Egilman had not been “circumvented,”but ra<strong>the</strong>r merely utilized. 786(xvi) Macrovisi<strong>on</strong> v. Sima Products Corp.In Macrovisi<strong>on</strong> v. Sima Products Corp., 787 <strong>the</strong> court held that <strong>the</strong> defendant’s products,which eliminated Macrovisi<strong>on</strong>’s Analog Copy Protecti<strong>on</strong> (ACP) signals imprinted <strong>on</strong> DVDsc<strong>on</strong>taining copyrighted works to prevent <strong>the</strong> copying of <strong>the</strong> DVDs, violated <strong>the</strong> anticircumventi<strong>on</strong>provisi<strong>on</strong>s. The ACP system inserted additi<strong>on</strong>al informati<strong>on</strong> in <strong>the</strong> n<strong>on</strong>-visible781782783784785786787Id. at 1038-40.Id. at 1040.Egilman v. Keller & Heckman, <strong>LLP</strong>, 401 F. Supp. 2d 105 (D.D.C. 2005).Id. at 107-09.Id. at 112-14.Id. at 114.2006 U.S. Dist. LEXIS 22106 (S.D.N.Y. Apr. 20, 2006).- 180 -


porti<strong>on</strong> of <strong>the</strong> analog signal, <strong>the</strong> practical effect of which was to render videotaped copies of <strong>the</strong>analog signal so visually degraded as to be unwatchable. The defendant’s devices eliminatedMacrovisi<strong>on</strong>’s ACP from an analog signal. The removal functi<strong>on</strong> was effectuated by a singlechip, usually <strong>the</strong> SA7114 chip from Philips. Macrovisi<strong>on</strong> c<strong>on</strong>tended, and Sima did not dispute,that Sima’s devices could be fitted with an alternate chip manufactured by Philips that, underlicense from Macrovisi<strong>on</strong>, would recognize <strong>the</strong> ACP and not allow for its circumventi<strong>on</strong>. 788Sima c<strong>on</strong>tended that its devices were intended primarily to allow <strong>the</strong> c<strong>on</strong>sumer to make“fair use” backup copies of a DVD collecti<strong>on</strong>. The court noted, however, that although <strong>the</strong>DMCA provides for a limited “fair use” excepti<strong>on</strong> for certain users of copyrighted works underSecti<strong>on</strong> 1201 (a)(2)(B), <strong>the</strong> excepti<strong>on</strong> does not apply to manufacturers or traffickers of <strong>the</strong>devices prohibited by Secti<strong>on</strong> 1201(a)(2). 789Sima argued that <strong>the</strong> “primary purpose” of its devices was not circumventi<strong>on</strong>. The courtrejected this argument, noting that, although some of <strong>the</strong> devices had some auxiliary functi<strong>on</strong>s,Sima did not argue that it was necessary for <strong>the</strong> device to be able to circumvent ACP in order toperform those functi<strong>on</strong>s. Nor did Sima argue that using <strong>the</strong> Macrovisi<strong>on</strong>-licensed Phlips chipswould prevent <strong>the</strong> devices from performing <strong>the</strong> auxiliary functi<strong>on</strong>s or facilitating <strong>the</strong> copying ofn<strong>on</strong>-protected works, such as home videos. Accordingly, <strong>the</strong> devices had <strong>on</strong>ly limitedcommercially significant purposes or uses o<strong>the</strong>r than circumventi<strong>on</strong>. 790 The court also noted thatSima had touted <strong>on</strong> its web site <strong>the</strong> devices’ capability of circumventing copy protecti<strong>on</strong> <strong>on</strong>copyrighted works. And <strong>the</strong> DMCA does not provide an excepti<strong>on</strong> to <strong>the</strong> anti-circumventi<strong>on</strong>provisi<strong>on</strong>s for manufacturers of devices designed to enable <strong>the</strong> exercise of fair use rights.Finally, <strong>the</strong> court noted that in any event Sima had cited no authority, and <strong>the</strong> court was aware ofn<strong>on</strong>e, for <strong>the</strong> propositi<strong>on</strong> that fair use includes <strong>the</strong> making of a backup copy. 791 Accordingly, <strong>the</strong>court preliminarily enjoined Sima from selling its devices and any o<strong>the</strong>r products thatcircumvented Macrovisi<strong>on</strong>’s copyright protecti<strong>on</strong> technologies in violati<strong>on</strong> of <strong>the</strong> DMCA. 792Inc.(xvii) Nordstrom C<strong>on</strong>sulting, Inc. v. M&S Technologies,In Nordstrom C<strong>on</strong>sulting, Inc. v. M&S Technologies, Inc., 793 Nordstrom, acting as ac<strong>on</strong>sultant, developed software for a visual eye chart to be distributed as part of M&S’s visualacuity systems. Nordstrom retained ownership of <strong>the</strong> copyrights in <strong>the</strong> software and, after afalling out with M&S, assigned <strong>the</strong> copyrights to a separate corporati<strong>on</strong>. After leaving M&S, <strong>the</strong>plaintiffs alleged that M&S violated <strong>the</strong> DMCA by circumventing <strong>the</strong> password protecti<strong>on</strong> <strong>on</strong> acomputer used by Nordstrom in order to gain access to <strong>the</strong> software. 794 The court rejected this788789790791792793794Id. at *2-3.Id. at *2-3, 6.Id. at *6-7.Id. at *7-8.Id. at *11-12.2008 U.S. Dist. LEXIS 17259 (N.D. Ill. Mar. 4, 2008).Id. at *3-8.- 181 -


claim. Citing <strong>the</strong> Chamberlin v. Skylink case, <strong>the</strong> court noted that <strong>the</strong>re must be a showing that<strong>the</strong> access resulting from <strong>the</strong> circumventi<strong>on</strong> led to infringement, or <strong>the</strong> facilitati<strong>on</strong> ofinfringement, of a copyrighted work, and <strong>the</strong> plaintiffs had failed to make such a showing. Thecourt noted it was undisputed that <strong>the</strong> defendant had accessed <strong>the</strong> software in order to repair orreplace <strong>the</strong> software of a client of M&S and a valid licensee of <strong>the</strong> software, so <strong>the</strong>circumventi<strong>on</strong> of <strong>the</strong> password did not result in an infringement or <strong>the</strong> facilitati<strong>on</strong> ofinfringement. 795M&S, in turn, alleged that Nordstrom had violated <strong>the</strong> DMCA by circumventing <strong>the</strong>digital security of M&S’s computer network. M&S’s network was divided into two parts, <strong>on</strong>edealing with visual acuity systems and <strong>on</strong>e with hotel/hospitality businesses. M&S asserted that,while Nordstrom had a password to access <strong>the</strong> acuity side of <strong>the</strong> system, he did not have apassword to access <strong>the</strong> hotel side, yet Nordstrom claimed to have accessed <strong>the</strong> hotel side. Thecourt denied summary judgment <strong>on</strong> M&S’s claim because of factual disputes. Nordstromasserted that he did not access <strong>the</strong> hotel side of <strong>the</strong> system and that any materials <strong>on</strong> <strong>the</strong> hotelside were not registered copyrights. By c<strong>on</strong>trast, M&S had offered evidence that Nordstromaccessed <strong>the</strong> hotel side of <strong>the</strong> system, and alleged that <strong>the</strong> hotel side c<strong>on</strong>tained copyrightedworks. 796(xviii) R.C. Olmstead v. CU InterfaceThis case agreed with <strong>the</strong> I.M.S. case and held that access to a computer through <strong>the</strong>unauthorized use of a valid username and password does not c<strong>on</strong>stitute an unlawfulcircumventi<strong>on</strong>. 797 The plaintiff was <strong>the</strong> owner of data processing software for credit uni<strong>on</strong>scalled RCO-1 that it licensed to <strong>the</strong> defendant. The defendant CUI hired some developers todevelop a replacement program for RCO-1 and, to aid development, allowed <strong>the</strong> developers togain access to RCO-1 using valid usernames and passwords issued to CUI. The plaintiff claimedthat such unauthorized access violated <strong>the</strong> DMCA. The court rejected this claim, finding <strong>the</strong>case indistinguishable from I.M.S. and <strong>the</strong> reas<strong>on</strong>ing of I.M.S. persuasive. The court also notedthat <strong>the</strong> license agreement between <strong>the</strong> plaintiff and CUI did not set any restricti<strong>on</strong>s regardingissuance of usernames and passwords, so that <strong>the</strong> plaintiff could not even show that CUI’s use ofits usernames and passwords was unauthorized. 798 “Simply put, CUI did not circumvent orbypass any technological measures of <strong>the</strong> RCO software – it merely used a username andpassword – <strong>the</strong> approved methodology – to access <strong>the</strong> software.” 799(xix) Avaya v. Telecom LabsIn this case, <strong>the</strong> court refused to decide <strong>on</strong> a moti<strong>on</strong> for summary judgment <strong>the</strong> issueaddressed in <strong>the</strong> I.M.S. case of whe<strong>the</strong>r unauthorized use of a valid password to gain access to795796797798799Id. at *23-24/Id. at *30-31.R.C. Olmstead, Inc. v. CU Interface, LLC, 2009 U.S. Dist. LEXIS 87705 (N.D. Ohio Mar. 27, 2009).Id. at *21-24.Id. at *24.- 182 -


software c<strong>on</strong>stitutes a violati<strong>on</strong> of <strong>the</strong> DMCA. 800 The plaintiff Avaya sold PBX systems withmaintenance software embedded in <strong>the</strong>m. When selling a new system, Avaya supplied <strong>the</strong>customer with a set of default passwords that <strong>the</strong> customer used to first log in to <strong>the</strong> system.Avaya alleged that <strong>the</strong> passwords were used without authorizati<strong>on</strong> by <strong>the</strong> defendants to log inand gain access to Avaya’s maintenance software. Defendants moved for summary judgmentthat use of valid logins to gain access to software does not violate <strong>the</strong> DMCA. The court ruledthat summary judgment was not appropriate because granting <strong>the</strong> moti<strong>on</strong> would not result indismissal of any porti<strong>on</strong> of Avaya’s DMCA claims from <strong>the</strong> case. All that would be resolvedwould be <strong>the</strong> abstract issue of whe<strong>the</strong>r use of valid logins does not violate <strong>the</strong> DMCA. BecauseAvaya had not identified a single, specific PBX to which <strong>the</strong> alleged illegal c<strong>on</strong>duct was applied,ruling <strong>on</strong> <strong>the</strong> moti<strong>on</strong> would have no effect until such time as <strong>the</strong> defendants could prove which of<strong>the</strong> PBXs at issue were accessed with <strong>the</strong> known, valid logins that <strong>the</strong>y alleged were immunefrom DMCA liability. 801 “Avaya’s DMCA claims may or may not have merit, but a summaryjudgment rendered <strong>on</strong> a discrete set of facts that have yet to be proven is not <strong>the</strong> proper vehiclefor that determinati<strong>on</strong>.” 802(xx) Actuate v. IBMIn Actuate Corp. v. Internati<strong>on</strong>al Business Machines Corp., 803 Actuate alleged that IBM’sunauthorized posting <strong>on</strong> an IBM web site of Actuate’s copyrighted software for downloading,toge<strong>the</strong>r with <strong>the</strong> license keys that allowed for unlimited use of such software by downloaders,whe<strong>the</strong>r <strong>the</strong>y were authorized to use <strong>the</strong> software or not, c<strong>on</strong>stituted circumventi<strong>on</strong> oftechnological measures <strong>on</strong> <strong>the</strong> software that restricted access to it and trafficking incircumventi<strong>on</strong> devices. IBM filed a moti<strong>on</strong> to dismiss <strong>the</strong> claim, relying <strong>on</strong> <strong>the</strong> I.M.S., Egilman,and R.C. Olmstead cases for <strong>the</strong> propositi<strong>on</strong> that improper use of a legitimate password issued by<strong>the</strong> copyright holder does not c<strong>on</strong>stitute circumventi<strong>on</strong>. 804The court denied <strong>the</strong> moti<strong>on</strong>. It found <strong>the</strong> I.M.S., Egilman, and R.C. Olmstead cases inc<strong>on</strong>flict with <strong>the</strong> 321 Studios and <strong>the</strong> Microsoft v. EEE Business cases from <strong>the</strong> Nor<strong>the</strong>rn Districtof California with respect to <strong>the</strong> issue of whe<strong>the</strong>r <strong>the</strong> unauthorized use of an o<strong>the</strong>rwise legitimatepassword can c<strong>on</strong>stitute circumventi<strong>on</strong>. The court rejected IBM’s argument that <strong>the</strong> two lines ofcases were not inc<strong>on</strong>sistent <strong>on</strong> <strong>the</strong> ground that, in <strong>the</strong> 321 Studios and Microsoft v. EEE Businesscases, <strong>the</strong>re was no allegati<strong>on</strong> that <strong>the</strong> parties whose passwords were being used had issued thosepasswords to a third party. The court found no basis in 321 Studios for such a distincti<strong>on</strong>, andnoted that Egilman expressly rejected <strong>the</strong> distincti<strong>on</strong>. Accordingly, <strong>the</strong> court c<strong>on</strong>cluded that <strong>the</strong>two lines of cases simply reached c<strong>on</strong>tradictory results, and declined to follow <strong>the</strong> reas<strong>on</strong>ing of<strong>the</strong> I.M.S. line of cases. It instead followed <strong>the</strong> 321 Studios and <strong>the</strong> Microsoft v. EEE Business800801802803804Avaya, Inc. v. Telecom Labs, Inc., 2009 U.S. Dist. LEXIS 82609 (D.N.J. Sept. 9, 2009).Id. at *2 & *10-13.Id. at *13.2010 U.S. Dist. LEXIS 33095 (N.D. Cal. Apr. 5, 2010).Id. at *9-10.- 183 -


cases, and held that unauthorized distributi<strong>on</strong> of passwords and user-names avoids and bypassesa technological measure in violati<strong>on</strong> of Secti<strong>on</strong>s 1201(a)(2) and 1201(b)(1). 805The reas<strong>on</strong>ing of <strong>the</strong> I.M.S. court – that a password somehow does not fall within[<strong>the</strong> analogy to <strong>the</strong> combinati<strong>on</strong> of a locked door used in <strong>the</strong> DeCSS cases], is notwell-founded. Ra<strong>the</strong>r, a combinati<strong>on</strong> to a lock appears to be essentially <strong>the</strong> sameas a password. Nor does <strong>the</strong> Court find support in <strong>the</strong> statute itself for drawing adistincti<strong>on</strong> between passwords and o<strong>the</strong>r types of code that might be used fordecrypti<strong>on</strong>. Therefore, <strong>the</strong> Court rejects Defendants’ positi<strong>on</strong>. Unauthorized useof a password may c<strong>on</strong>stitute circumventi<strong>on</strong> under <strong>the</strong> DMCA. 806(14) Criminal Prosecuti<strong>on</strong>s Under <strong>the</strong> DMCA(i)The Sklyarov/Elcomsoft CaseDmitry Sklyarov, a 27-year-old Russian programmer who worked for a Russian companycalled Elcomsoft, helped create <strong>the</strong> <str<strong>on</strong>g>Advanced</str<strong>on</strong>g> eBook Processor (AEBPR) software, whichenabled eBook owners to translate from Adobe’s secure eBook format into <strong>the</strong> more comm<strong>on</strong>Portable Document Format (PDF). The software worked <strong>on</strong>ly <strong>on</strong> legitimately purchasedeBooks. Sklyarov was arrested at <strong>the</strong> behest of Adobe Systems, Inc. <strong>on</strong> July 17, 2001 in LasVegas after he delivered a lecture at a technical c<strong>on</strong>venti<strong>on</strong>, and charged by <strong>the</strong> Dept. of Justicewith criminal violati<strong>on</strong>s of <strong>the</strong> DMCA for distributing a product designed to circumventcopyright protecti<strong>on</strong> measures. He was subsequently released <strong>on</strong> $50,000 bail and restricted toCalifornia. 807On Dec. 13, 2001, <strong>the</strong> U.S. government permitted Sklyarov to return home to Russia withhis family, essentially dropping prosecuti<strong>on</strong> of him in return for his agreement to testify againsthis employer Elcomsoft in criminal proceedings <strong>the</strong> government brought against Elcomsoft. Inearly Feb. 2002, <strong>the</strong> Electr<strong>on</strong>ic Fr<strong>on</strong>tier Foundati<strong>on</strong>, joined by The Computing Law andTechnology and U.S. Public Policy Committees of <strong>the</strong> Associati<strong>on</strong> for Computing Machinery,<strong>the</strong> American Associati<strong>on</strong> of Law Libraries, <strong>the</strong> Electr<strong>on</strong>ic Privacy Informati<strong>on</strong> Center, <strong>the</strong>C<strong>on</strong>sumer Project <strong>on</strong> Technology, Computer Professi<strong>on</strong>als for Social Resp<strong>on</strong>sibility, and <strong>the</strong>Music Library Associati<strong>on</strong>, filed an amicus brief, al<strong>on</strong>g with a brief from 35 law professors,supporting a moti<strong>on</strong> by Elcomsoft to dismiss <strong>the</strong> case. Elcomsoft’s moti<strong>on</strong> and <strong>the</strong> Electr<strong>on</strong>icFr<strong>on</strong>tier Foundati<strong>on</strong>’s brief argued that <strong>the</strong> DMCA should be found unc<strong>on</strong>stituti<strong>on</strong>al because itimpinges <strong>on</strong> protected speech and stifles technological innovati<strong>on</strong>.Elcomsoft’s moti<strong>on</strong> to dismiss and its challenge <strong>on</strong> c<strong>on</strong>stituti<strong>on</strong>al grounds were rejectedby <strong>the</strong> court in an opini<strong>on</strong> issued <strong>on</strong> May 8, 2002. 808 The court c<strong>on</strong>cluded that C<strong>on</strong>gressintended to ban all circumventi<strong>on</strong> tools and rejected Elcomsoft’s argument that C<strong>on</strong>gress805806807808Id. at *24-25.Id. at *26.This informati<strong>on</strong> is taken from <strong>the</strong> Free Dmitry Sklyarov! web site at www.freesklyarov.org.United States v. Elcom Ltd., 62 U.S.P.Q.2d 1736 (N.D. Cal. 2002).- 184 -


intended to ban <strong>on</strong>ly those circumventi<strong>on</strong> devices that would facilitate copyright infringement. 809The court also specifically c<strong>on</strong>cluded that “[n]othing within <strong>the</strong> express language [of <strong>the</strong> anticircumventi<strong>on</strong>provisi<strong>on</strong>s] would permit trafficking in devices designed to bypass userestricti<strong>on</strong>s in order to enable a fair use, as opposed to an infringing use. Instead, all tools thatenable circumventi<strong>on</strong> of use restricti<strong>on</strong>s are banned, not merely those use restricti<strong>on</strong>s thatprohibit infringement.” 810 The court rejected <strong>the</strong> c<strong>on</strong>stituti<strong>on</strong>al challenges <strong>on</strong> a rati<strong>on</strong>ale verysimilar to that of <strong>the</strong> Sec<strong>on</strong>d Circuit’s opini<strong>on</strong> in <strong>the</strong> Corley case, 811 discussed in Secti<strong>on</strong>II.G.1(m)(4) above. On Dec. 17, 2002, after a two week trial, a jury acquitted Elcomsoft ofcriminal charges under <strong>the</strong> DMCA. The jury foreman told <strong>the</strong> press that some jurors werec<strong>on</strong>cerned about <strong>the</strong> scope of <strong>the</strong> DMCA and whe<strong>the</strong>r it curtailed <strong>the</strong> fair use of material simplybecause it was in electr<strong>on</strong>ic format. “Under <strong>the</strong> eBook formats, you have no rights at all, and <strong>the</strong>jury had trouble with that c<strong>on</strong>cept,” <strong>the</strong> foreman reported. 812(ii)O<strong>the</strong>r Criminal Prosecuti<strong>on</strong>s Under <strong>the</strong> DMCAIn Feb. of 2003, <strong>the</strong> operator of a web site, iSoNews.com, pleaded guilty to criminalDMCA violati<strong>on</strong>s for sale of “mod” chips that allowed Microsoft Xbox and S<strong>on</strong>y Playstati<strong>on</strong>owners to modify <strong>the</strong>ir devices so <strong>the</strong>y could use <strong>the</strong>m to play illegally copied games. As part ofa plea bargain, <strong>the</strong> defendant turned over <strong>the</strong> site’s domain name to <strong>the</strong> c<strong>on</strong>trol of <strong>the</strong> U.S.Department of Justice, which <strong>the</strong>n put a notice <strong>on</strong> <strong>the</strong> site stating that it had been surrendered toU.S. law enforcement. 813 In Sept. of 2003, a federal jury found a Florida hacker known as“JungleMike” guilty under <strong>the</strong> DMCA of selling hardware used to illegally receive DirecTVsatellite broadcasts. This case marked <strong>the</strong> first-ever jury c<strong>on</strong>victi<strong>on</strong> under <strong>the</strong> DMCA. Severalo<strong>the</strong>r defendants pleaded guilty to DMCA charges in <strong>the</strong> same operati<strong>on</strong>. 814In July of 2005, a Maryland man, <strong>on</strong>e of a group of employees and managers from <strong>the</strong>three-store Pandora’s Cube chain in Maryland, pled guilty and was sentenced to four m<strong>on</strong>ths inpris<strong>on</strong> for c<strong>on</strong>spiracy to commit fel<strong>on</strong>y copyright infringement and for violating <strong>the</strong> DMCAbased <strong>on</strong> sales by Pandora’s Cube of modified Xboxes that let players use pirated c<strong>on</strong>sole games.Pandora’s Cube was also selling modified Xboxes preloaded with pirated games. 815809810811812813814815Id. at 1743.Id.Id. at 1744-57.Howard Mintz, “Russian Company is Acquitte by S.J. Jury” (Dec. 17, 2002), available as of Dec. 18, 2002 atwww.bayarea.com/mld/mercurynews/4763575.htm.Declan McCullagh, “Feds C<strong>on</strong>fiscate ‘Illegal’ Domain Names” (Feb. 26, 2003), available as of Feb. 27, 2003 atwww.news.com.com/2102-1023-986225.html.“DirecTV Hacker C<strong>on</strong>victed Under DMCA,” BNA’s Patent, Trademark & <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Journal (Sept. 26, 2003)at 595.Daniel Terdiman, “Video Game Pirate Headed to Slammer” (July 27, 2005), available as of July 28, 2005 athttp://news.com.com/2100-1043_3-5807547.html.- 185 -


In United States v. Whitehead, 816 <strong>the</strong> Ninth Circuit affirmed <strong>the</strong> sentence for a man whowas c<strong>on</strong>victed of selling over $1 milli<strong>on</strong> worth of counterfeit access cards that allowed hiscustomers to access DirecTV’s digital satellite feed without paying for it. The court found noabuse of discreti<strong>on</strong> in <strong>the</strong> district court’s c<strong>on</strong>clusi<strong>on</strong> that a substantial amount of communityservice (1000 hours), a hefty restituti<strong>on</strong> order ($50,000) and five years of supervised releasewere more appropriate than pris<strong>on</strong>, even though <strong>the</strong> punishment was below that of <strong>the</strong> federalsentencing guidelines, which called for a range of 41 to 51 m<strong>on</strong>ths in pris<strong>on</strong>. 817Sword(15) O<strong>the</strong>r Uses of <strong>the</strong> Anti-Circumventi<strong>on</strong> Provisi<strong>on</strong>s as aThe RealNetworks and Reimerdes cases suggest how <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>sof <strong>the</strong> DMCA might be used as a “sword” in o<strong>the</strong>r ways. For example, <strong>the</strong> manufacturer of adatabase product that enables users to password protect data files might bring an acti<strong>on</strong> under <strong>the</strong>DMCA against <strong>the</strong> manufacturer of “cracking” software that enables third parties to bypass ordeactivate <strong>the</strong> password protecti<strong>on</strong> <strong>on</strong> such data files. The manufacturer of <strong>the</strong> database productmight, for example, allege “injury” from <strong>the</strong> “cracking” software in <strong>the</strong> form of damage to itsreputati<strong>on</strong> as <strong>the</strong> manufacturer of a “secure” product. Alternatively, if a claim were made against<strong>the</strong> database product manufacturer by a user alleging injury resulting from <strong>the</strong> user’s data filebeing “cracked” by a third party, such claim would provide ano<strong>the</strong>r basis for <strong>the</strong> databaseproduct manufacturer to allege its own injury from <strong>the</strong> “cracking” software.O<strong>the</strong>r recent examples of attempts at creative use of <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>s asa sword are <strong>the</strong> following:Comp<strong>on</strong>ents, Inc.(i)Lexmark Internati<strong>on</strong>al, Inc. v. Static C<strong>on</strong>trolLexmark sold t<strong>on</strong>er cartridges for use with its laser printers. The cartridges were of twotypes: “regular” cartridges that could be refilled and remanufactured freely by third parties, and“prebate” cartridges that could be used <strong>on</strong>ly <strong>on</strong>ce, and for which <strong>the</strong> c<strong>on</strong>sumer agreed, in <strong>the</strong>form of a shrinkwrap agreement placed across <strong>the</strong> top of every prebate cartridge box, to return<strong>the</strong> used cartridge to Lexmark for remanufacturing and recycling. Lexmark’s printers c<strong>on</strong>tainedtwo computer programs – a Printer Engine Program that c<strong>on</strong>trolled various printer operati<strong>on</strong>ssuch as paper feed, paper movement, and motor c<strong>on</strong>trol, and a T<strong>on</strong>er Loading Program of 37 to55 bytes, which resided within microchips attached to <strong>the</strong> t<strong>on</strong>er cartridges and enabled Lexmarkprinters to approximate <strong>the</strong> amount of t<strong>on</strong>er remaining in <strong>the</strong> cartridge. 818To protect <strong>the</strong> Printer Engine Programs and T<strong>on</strong>er Loading Programs, and to preventunauthorized t<strong>on</strong>er cartridges from being used with Lexmark’s printers, Lexmark’s printers usedan au<strong>the</strong>nticati<strong>on</strong> sequence that ran each time a t<strong>on</strong>er cartridge was inserted into a Lexmarkprinter, <strong>the</strong> printer was powered <strong>on</strong>, or whenever <strong>the</strong> printer was opened and closed. The816817818532 F.3d 991 (9 th Cir. 2008).Id. at 992.Lexmark Internati<strong>on</strong>al, Inc. v. Static C<strong>on</strong>trol Comp<strong>on</strong>ents, Inc., 253 F. Supp. 2d 943, 948-49 (E.D. Ky. 2003).- 186 -


au<strong>the</strong>nticati<strong>on</strong> sequence required <strong>the</strong> printer and <strong>the</strong> microchip <strong>on</strong> <strong>the</strong> cartridge to calculate aMessage Au<strong>the</strong>nticati<strong>on</strong> Code (MAC) using a hashing algorithm, to communicate <strong>the</strong> MAC from<strong>the</strong> microchip to <strong>the</strong> printer, and <strong>the</strong> printer to compare <strong>the</strong> MAC it calculated with <strong>the</strong> MAC itreceived from <strong>the</strong> microchip. If <strong>the</strong> MAC calculated by <strong>the</strong> microchip matched that calculatedby <strong>the</strong> printer, <strong>the</strong> cartridge was au<strong>the</strong>nticated and authorized for use by <strong>the</strong> printer, which inturn enabled <strong>the</strong> Printer Engine Program to allow <strong>the</strong> printer to print and <strong>the</strong> T<strong>on</strong>er LoadingProgram to m<strong>on</strong>itor <strong>the</strong> t<strong>on</strong>er status of <strong>the</strong> au<strong>the</strong>nticated cartridge. 819The defendant Static C<strong>on</strong>trol Comp<strong>on</strong>ents (SCC) manufactured and sold a “SMARTEK”microchip that was used to replace <strong>the</strong> microchip found in Lexmark’s t<strong>on</strong>er cartridges. SCCadmitted that it copied verbatim Lexmark’s T<strong>on</strong>er Loading Program into its SMARTEKmicrochips and that its SMARTEK microchips were designed to circumvent Lexmark’sau<strong>the</strong>nticati<strong>on</strong> sequence by mimicking <strong>the</strong> sequence performed by an original microchip <strong>on</strong>Lexmark’s cartridges and <strong>the</strong> printer. 820 Lexmark sued SCC for violati<strong>on</strong> of <strong>the</strong> anticircumventi<strong>on</strong>provisi<strong>on</strong>s of <strong>the</strong> DMCA as well as copyright infringement.The District Court’s Ruling. On a moti<strong>on</strong> for a preliminary injuncti<strong>on</strong>, <strong>the</strong> district courtruled that SCC had violated <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>s of <strong>the</strong> DMCA and committedcopyright infringement. With respect to <strong>the</strong> issue of infringement, although SCC admittedcopying <strong>the</strong> T<strong>on</strong>er Loading Program, SCC argued that <strong>the</strong> program was not copyrightablebecause it was a functi<strong>on</strong>al “lock-out code” whose exact c<strong>on</strong>tent was required as part of <strong>the</strong>au<strong>the</strong>nticati<strong>on</strong> sequence. The court rejected this argument, because <strong>the</strong> binary c<strong>on</strong>tent of <strong>the</strong>T<strong>on</strong>er Loading Program was not used as an input to <strong>the</strong> hashing algorithm of <strong>the</strong> au<strong>the</strong>nticati<strong>on</strong>sequence, and copying of <strong>the</strong> T<strong>on</strong>er Loading Program was <strong>the</strong>refore not necessary for a validau<strong>the</strong>nticati<strong>on</strong> sequence to occur. 821 The court also rejected SCC’s arguments that its copyingwas a fair use, noting that “[w]here <strong>the</strong> accused infringer’s copying is part of <strong>the</strong> ordinaryoperati<strong>on</strong> of <strong>the</strong> accused product, fair use does not apply,” 822 and that <strong>the</strong> T<strong>on</strong>er LoadingProgram was an uncopyrightable formula or c<strong>on</strong>stant, noting that <strong>the</strong>re were a number of ways<strong>the</strong> T<strong>on</strong>er Loading Program could have been written to approximate t<strong>on</strong>er level. 823 Because SCChad engaged in verbatim copying of <strong>the</strong> T<strong>on</strong>er Loading Program, it had committed copyrightinfringement. The court also rejected a copyright misuse defense, ruling that “Lexmark’s effortsto enforce <strong>the</strong> rights c<strong>on</strong>ferred to it under <strong>the</strong> DMCA cannot be c<strong>on</strong>sidered an unlawful actundertaken to stifle competiti<strong>on</strong>.” 824Turning to <strong>the</strong> DMCA claim, <strong>the</strong> court found that <strong>the</strong> SMARTEK microchips violated <strong>the</strong>anti-circumventi<strong>on</strong> provisi<strong>on</strong> of Secti<strong>on</strong> 1201(a)(2) in that its primary purpose was to circumvent819820821822823824Id. at 952-53.Id. at 955-56.Id. at 950, 958-59.Id. at 960.Id. at 962.Id. at 966. The court fur<strong>the</strong>r noted that an “antitrust claim cannot succeed under an after-market antitrust <strong>the</strong>orywhen <strong>the</strong> accused party has not changed its policy and has been o<strong>the</strong>rwise forthcoming about its policies.” Id.at 966 n.3.- 187 -


a technological measure that effectively c<strong>on</strong>trolled access to a copyrighted work. The courtadopted a plain dicti<strong>on</strong>ary meaning of “access” as <strong>the</strong> “ability to enter, to obtain, or to make useof.” 825 The court held that <strong>the</strong> au<strong>the</strong>nticati<strong>on</strong> sequence was an effective technological measurerestricting access under this definiti<strong>on</strong>, because it required applicati<strong>on</strong> of informati<strong>on</strong> and <strong>the</strong>applicati<strong>on</strong> of a process to gain access to Lexmark’s copyrighted T<strong>on</strong>er Loading Programs andPrinter Engine Programs for use. 826 Accordingly, SCC’s manufacture, distributi<strong>on</strong> and sale of itsSMARTEK microchips violated <strong>the</strong> DMCA. 827 The court held that <strong>the</strong> exempti<strong>on</strong> under Secti<strong>on</strong>1201(f) for circumventi<strong>on</strong> for reverse engineering “solely for <strong>the</strong> purpose of enablinginteroperability of an independently created computer program with o<strong>the</strong>r programs” wasinapplicable. The court ruled that SCC’s SMARTEK microchips could not be c<strong>on</strong>sidered toc<strong>on</strong>tain independently created computer programs, since <strong>the</strong>y were exact copies of Lexmark’sT<strong>on</strong>er Loading Programs and <strong>the</strong> “SMARTEK microchips serve no legitimate purpose o<strong>the</strong>r thanto circumvent Lexmark’s au<strong>the</strong>nticati<strong>on</strong> sequence.” 828Finally, <strong>the</strong> court ruled, c<strong>on</strong>sistent with <strong>the</strong> Reimerdes case, that a plaintiff thatdem<strong>on</strong>strates a likelihood of success <strong>on</strong> <strong>the</strong> merits of a claim for violati<strong>on</strong> of <strong>the</strong> anticircumventi<strong>on</strong>provisi<strong>on</strong>s of <strong>the</strong> DMCA is entitled to a presumpti<strong>on</strong> of irreparable injury forpurposes of a preliminary injuncti<strong>on</strong>. Accordingly, <strong>the</strong> court entered a preliminary injuncti<strong>on</strong>against <strong>the</strong> distributi<strong>on</strong> of <strong>the</strong> SMARTEK microchips. 829The Sixth Circuit’s Ruling. On appeal, <strong>the</strong> Sixth Circuit reversed and remanded. 830Turning first to <strong>the</strong> issue of copyright infringement, <strong>the</strong> Sixth Circuit found <strong>the</strong> district court’sruling err<strong>on</strong>eous with respect to whe<strong>the</strong>r <strong>the</strong> T<strong>on</strong>er Loading Program c<strong>on</strong>stituted a “lock-outcode.” The court noted generally that “[t]o <strong>the</strong> extent compatibility requires that a particularcode sequence be included in [a] comp<strong>on</strong>ent device to permit its use, <strong>the</strong> merger and scenes afaire doctrines generally preclude <strong>the</strong> code sequence from obtaining copyright protecti<strong>on</strong>.” 831The court noted that <strong>the</strong> T<strong>on</strong>er Loading Program served as input to a checksum operati<strong>on</strong>performed each time <strong>the</strong> printer was powered <strong>on</strong> or <strong>the</strong> printer door was opened and closed fort<strong>on</strong>er cartridge replacement. Specifically, after downloading a copy of <strong>the</strong> T<strong>on</strong>er LoadingProgram to calculate t<strong>on</strong>er levels, <strong>the</strong> Printer Engine Program ran <strong>the</strong> checksum calculati<strong>on</strong> usingevery data byte of <strong>the</strong> T<strong>on</strong>er Loading Program as input. The program <strong>the</strong>n compared <strong>the</strong> resultof <strong>the</strong> calculati<strong>on</strong> with a checksum value located elsewhere <strong>on</strong> Lexmark’s t<strong>on</strong>er cartridge chip.825826827828829830831Id. at 967.Id. at 967-68.Id. at 969-70.Id. at 971Id. at 971, 974.Lexmark Int’l v. Static C<strong>on</strong>trol Comp<strong>on</strong>ents, Inc., 387 F.3d 522 (6 th Cir. 2004), reh’g denied, 2004 U.S. App.LEXIS 27,422 (Dec. 29, 2004), reh’g en banc denied, 2005 U.S. App. LEXIS 3330 (6 th Cir. Feb. 15, 2005).Id. at 536.- 188 -


If any single byte of <strong>the</strong> T<strong>on</strong>er Loading Program was altered, <strong>the</strong> checksum value would notmatch <strong>the</strong> checksum calculati<strong>on</strong> result. 832In additi<strong>on</strong>, <strong>the</strong> Sixth Circuit noted that, at least for purposes of a preliminary injuncti<strong>on</strong>,<strong>the</strong> expert testim<strong>on</strong>y established that it would be “computati<strong>on</strong>ally impossible” to modify <strong>the</strong>checksum value without c<strong>on</strong>textual informati<strong>on</strong> that <strong>the</strong> defendant did not have access to.Accordingly, <strong>the</strong> checksum operati<strong>on</strong> imposed a compatibility c<strong>on</strong>straint that “justified SCC’scopying of <strong>the</strong> T<strong>on</strong>er Loading Program.” 833 Accordingly, <strong>the</strong> court c<strong>on</strong>cluded that, <strong>on</strong> <strong>the</strong>preliminary injuncti<strong>on</strong> record, <strong>the</strong> T<strong>on</strong>er Loading Program was not copyrightable. 834With respect to <strong>the</strong> DMCA claims, <strong>the</strong> Sixth Circuit began its analysis by agreeing with<strong>the</strong> district court and <strong>the</strong> Reimerdes case that <strong>the</strong>re should be a presumpti<strong>on</strong> of irreparable harmarising from dem<strong>on</strong>strati<strong>on</strong> of a likelihood of success <strong>on</strong> a DMCA claim. 835 The court <strong>the</strong>nturned to separate analyses of Lexmark’s anti-circumventi<strong>on</strong> claims with respect to <strong>the</strong> PrinterEngine Program and <strong>the</strong> T<strong>on</strong>er Loading Program.C<strong>on</strong>cerning <strong>the</strong> Printer Engine Program, <strong>the</strong> court held that Lexmark’s au<strong>the</strong>nticati<strong>on</strong>sequences did not “c<strong>on</strong>trol access” to <strong>the</strong> Printer Engine program sufficiently to trigger <strong>the</strong>applicability of <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>s because any<strong>on</strong>e could read <strong>the</strong> literal code of<strong>the</strong> Printer Engine Program directly from <strong>the</strong> printer memory, with or without <strong>the</strong> benefit of <strong>the</strong>au<strong>the</strong>nticati<strong>on</strong> sequence. 836 “The au<strong>the</strong>nticati<strong>on</strong> sequence, it is true, may well block <strong>on</strong>e form of‘access’ – <strong>the</strong> ability to … make use of’ <strong>the</strong> Printer Engine Program by preventing <strong>the</strong> printerfrom functi<strong>on</strong>ing. But it does not block ano<strong>the</strong>r relevant form of ‘access’ – <strong>the</strong> ‘ability to []obtain’ a copy of <strong>the</strong> work or to ‘make use of’ <strong>the</strong> literal elements of <strong>the</strong> program (its code).” 837The court rejected Lexmark’s argument that several cases had embraced a “to make useof” definiti<strong>on</strong> of “access” in applying <strong>the</strong> DMCA. The court noted that “[i]n <strong>the</strong> essential settingwhere <strong>the</strong> DMCA applies, <strong>the</strong> copyright protecti<strong>on</strong> operates <strong>on</strong> two planes: in <strong>the</strong> literal codegoverning <strong>the</strong> work and in <strong>the</strong> visual or audio manifestati<strong>on</strong> generated by <strong>the</strong> code’s832833834835836837Id. at 541.Id. at 542.Id. at 544. Because <strong>the</strong> court found <strong>the</strong> T<strong>on</strong>er Loading Program not to be copyrightable, it noted that it neednot decide whe<strong>the</strong>r copying of <strong>the</strong> same was a fair use. Never<strong>the</strong>less, <strong>the</strong> court noted its disagreement with <strong>the</strong>district court’s fair use analysis, am<strong>on</strong>g o<strong>the</strong>r reas<strong>on</strong>s because <strong>the</strong> copying was d<strong>on</strong>e for functi<strong>on</strong>al reas<strong>on</strong>s. “Incopying <strong>the</strong> T<strong>on</strong>er Loading Program into each of its SMARTEK chips, SCC was not seeking to exploit orunjustly benefit from any creative energy that Lexmark devoted to writing <strong>the</strong> program code. As in Kelly,SCC’s chip uses <strong>the</strong> T<strong>on</strong>er Loading Program for a different purpose, <strong>on</strong>e unrelated to copyright protecti<strong>on</strong>.Ra<strong>the</strong>r than using <strong>the</strong> T<strong>on</strong>er Loading Program to calculate t<strong>on</strong>er levels, <strong>the</strong> SMARTEK chip uses <strong>the</strong> c<strong>on</strong>tent of<strong>the</strong> T<strong>on</strong>er Loading Program’s data bytes as input to <strong>the</strong> checksum operati<strong>on</strong> and to permit printer functi<strong>on</strong>ality.Under <strong>the</strong>se circumstances, it is far from clear that SCC copied <strong>the</strong> T<strong>on</strong>er Loading Program for its commercialvalue as a copyrighted work – at least <strong>on</strong> <strong>the</strong> preliminary-injuncti<strong>on</strong> record we have before us.” Id.Id. at 533.Id. at 546.Id. at 547 (quoting from Merriam-Webster’s Collegiate Dicti<strong>on</strong>ary’s definiti<strong>on</strong>s of “access”).- 189 -


executi<strong>on</strong>.” 838 Those cases finding liability based <strong>on</strong> a technological measure that restricted“use” of <strong>the</strong> work were <strong>on</strong>es in which c<strong>on</strong>sumers were restricted from making use ofcopyrightable expressi<strong>on</strong> in <strong>the</strong> work, such as a video game. 839“The copyrightable expressi<strong>on</strong> in <strong>the</strong> Printer Engine Program, by c<strong>on</strong>trast,operates <strong>on</strong> <strong>on</strong>ly <strong>on</strong>e plane: in <strong>the</strong> literal elements of <strong>the</strong> program, its source andobject code. Unlike <strong>the</strong> code underlying video games or DVDs, ‘using’ orexecuting <strong>the</strong> Printer Engine Program does not in turn create any protectedexpressi<strong>on</strong>. Instead, <strong>the</strong> program’s output is purely functi<strong>on</strong>al. … Presumably, itis precisely because <strong>the</strong> Printer Engine Program is not a c<strong>on</strong>duit to protectableexpressi<strong>on</strong> that explains why Lexmark (or any o<strong>the</strong>r printer company) would notblock access to <strong>the</strong> computer software that makes <strong>the</strong> printer work. BecauseLexmark’s au<strong>the</strong>nticati<strong>on</strong> sequence does not restrict access to this literal code, <strong>the</strong>DMCA does not apply.” 840The Sixth Circuit’s holding that, to qualify for DMCA anti-circumventi<strong>on</strong> protecti<strong>on</strong>, atechnological measure for a computer program must block ei<strong>the</strong>r <strong>the</strong> ability to copy <strong>the</strong> code orto read <strong>the</strong> literal code, at least where that code does not create any separately protectableexpressi<strong>on</strong> such as a video game, is potentially very significant. Many computer programsperform <strong>on</strong>ly “invisible” functi<strong>on</strong>s and do not generate copyrightable expressi<strong>on</strong> as output to <strong>the</strong>user. The Sixth Circuit’s ruling that technological measures which merely restrict use of suchprograms, and do not prohibit copying or reading of <strong>the</strong> code (such as passwords andhandshaking or o<strong>the</strong>r au<strong>the</strong>nticati<strong>on</strong> sequences), do not qualify for anti-circumventi<strong>on</strong> protecti<strong>on</strong>under <strong>the</strong> DMCA, if adopted by o<strong>the</strong>r courts and applied widely, may significantly narrow <strong>the</strong>scope of protecti<strong>on</strong> <strong>the</strong> DMCA affords to computer programs. Under <strong>the</strong> Sixth Circuit’sdefiniti<strong>on</strong> of “access c<strong>on</strong>trol,” it may be that <strong>on</strong>ly those measures that encrypt or o<strong>the</strong>rwiseprotect a program against copying or <strong>the</strong> ability to read it will be sufficient to qualify purely“functi<strong>on</strong>al” programs for anti-circumventi<strong>on</strong> protecti<strong>on</strong> under <strong>the</strong> DMCA.C<strong>on</strong>cerning <strong>the</strong> T<strong>on</strong>er Loading Program, <strong>the</strong> court ruled that <strong>the</strong> defendant’s chip did notprovide “access” to <strong>the</strong> T<strong>on</strong>er Loading Program, but ra<strong>the</strong>r replaced <strong>the</strong> program, and <strong>the</strong>reforedid not circumvent any access c<strong>on</strong>trol. In additi<strong>on</strong>, to <strong>the</strong> extent <strong>the</strong> T<strong>on</strong>er Loading Program wasnot copyrightable, it would not c<strong>on</strong>stitute a “work protected under [<strong>the</strong> copyright statute]” towhich <strong>the</strong> DMCA protecti<strong>on</strong>s would apply. 841Finally, <strong>the</strong> court turned to <strong>the</strong> interoperability defenses asserted by <strong>the</strong> defendant. TheSixth Circuit rejected <strong>the</strong> district court’s ruling against <strong>the</strong> defendant’s argument that itsmicrochip c<strong>on</strong>stituted a “technological means” that it could make available to o<strong>the</strong>rs under §1201(f)(3) solely for <strong>the</strong> purpose of enabling interoperability of an independently createdcomputer program with o<strong>the</strong>r programs. The district court rejected <strong>the</strong> defense <strong>on</strong> <strong>the</strong> ground838839840841Id. at 548.Id.Id.Id. at 549-50.- 190 -


that <strong>the</strong> defendant had copied <strong>the</strong> T<strong>on</strong>er Loading Program and thus had not created anindependently created computer program. 842The Sixth Circuit noted that, even if <strong>the</strong> T<strong>on</strong>er Loading Program had been copied, <strong>the</strong>defendant’s microchips c<strong>on</strong>tained o<strong>the</strong>r independently developed computer programs thatinteroperated with <strong>the</strong> Printer Engine Program, and those o<strong>the</strong>r programs were sufficient to allow<strong>the</strong> defendant to benefit from <strong>the</strong> interoperability defense. 843 The implicati<strong>on</strong> of this ruling isthat every computer program <strong>on</strong> a device need not qualify for <strong>the</strong> interoperability defense inorder for <strong>the</strong> device itself to be able to benefit from <strong>the</strong> defense.The court also rejected Lexmark’s argument that <strong>the</strong> independently created program musthave existed prior to <strong>the</strong> reverse engineering – holding that <strong>the</strong>y can be created simultaneously –and its argument that <strong>the</strong> circumventi<strong>on</strong> means must be necessary or absolutely needed forinteroperability – ruling that <strong>the</strong> statute is silent as to whe<strong>the</strong>r <strong>the</strong>re is any necessity requirementat all, but <strong>the</strong>re was necessity in this case because <strong>the</strong> T<strong>on</strong>er Loading Program was used in achecksum calculati<strong>on</strong>. Finally, <strong>the</strong> defendant’s copying of <strong>the</strong> T<strong>on</strong>er Loading Program did notdestroy <strong>the</strong> interoperability defense (§ 1201(f)(3) c<strong>on</strong>diti<strong>on</strong>s its defense <strong>on</strong> a requirement that <strong>the</strong>circumventi<strong>on</strong> not violate o<strong>the</strong>r “applicable law”) because <strong>the</strong> Sixth Circuit had c<strong>on</strong>cluded that<strong>the</strong> T<strong>on</strong>er Loading Program was not copyrightable <strong>on</strong> <strong>the</strong> preliminary injuncti<strong>on</strong> record. 844Accordingly, <strong>the</strong> Sixth Circuit vacated <strong>the</strong> district court’s grant of a preliminary injuncti<strong>on</strong> andremanded <strong>the</strong> case. 845The depth of <strong>the</strong> court’s c<strong>on</strong>cern about <strong>the</strong> policy implicati<strong>on</strong>s of Lexmark’s proposedbroad reading for <strong>the</strong> scope of <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>s is fur<strong>the</strong>r illustrated bycomments made by two members of <strong>the</strong> panel in separate opini<strong>on</strong>s. One judge, in a c<strong>on</strong>curringopini<strong>on</strong>, noted that <strong>the</strong> main point of <strong>the</strong> DMCA is “to prohibit <strong>the</strong> pirating of copyrightprotectedworks such as movies, music and computer programs. If we were to adopt Lexmark’sreading of <strong>the</strong> statute, manufacturers could potentially create m<strong>on</strong>opolies for replacement partssimply by using similar, but more creative, lock-out codes.” 846 He fur<strong>the</strong>r stated that “C<strong>on</strong>gressdid not intend to allow <strong>the</strong> DMCA to be used offensively in this manner, but ra<strong>the</strong>r <strong>on</strong>ly soughtto reach those who circumvented protective measures ‘for <strong>the</strong> purpose’ of pirating worksprotected by <strong>the</strong> copyright statute.” 847Ano<strong>the</strong>r judge, in an opini<strong>on</strong> c<strong>on</strong>curring in part and dissenting in part, stated, “We agreethat <strong>the</strong> DMCA was not intended by C<strong>on</strong>gress to be used to create a m<strong>on</strong>opoly in <strong>the</strong> sec<strong>on</strong>darymarkets for parts or comp<strong>on</strong>ents of products that c<strong>on</strong>sumers have already purchased.” 848 This842843844845846847848Id. at 550.Id.Id. at 550-51.Id. at 551.Id. at 552.Id.Id. at 553. The judge also noted a link in <strong>the</strong> legislative history between <strong>the</strong> anti-circumventi<strong>on</strong> prohibiti<strong>on</strong>sand <strong>the</strong> facilitati<strong>on</strong> of copyright infringement. He quoted a House Report to <strong>the</strong> DMCA stating that Secti<strong>on</strong>- 191 -


judge also argued that fair use should be a defense to an anti-circumventi<strong>on</strong> violati<strong>on</strong>, becausewhere fair use applies <strong>the</strong>re would be no “right of a copyright owner” to be infringed by <strong>the</strong>circumventi<strong>on</strong>. 849By order entered Feb. 23, 2006, <strong>the</strong> parties stipulated to entry of summary judgment <strong>on</strong>all DMCA claims and counterclaims in favor of Static C<strong>on</strong>trol Comp<strong>on</strong>ents. The orderpreserved Lexmark’s right to appeal <strong>the</strong> order, as well as <strong>the</strong> Sixth Circuit’s interpretati<strong>on</strong> of <strong>the</strong>DMCA, after entry of final judgment <strong>on</strong> all issues in <strong>the</strong> cases. 850On remand from <strong>the</strong> Sixth Circuit, <strong>the</strong> district court found that nei<strong>the</strong>r party hadsubmitted new evidence that would undermine <strong>the</strong> Sixth Circuit’s applicability of facts to <strong>the</strong> lawwith respect to <strong>the</strong> issue of <strong>the</strong> copyrightability of <strong>the</strong> T<strong>on</strong>er Loader Program. Accordingly, <strong>the</strong>Sixth Circuit’s decisi<strong>on</strong> c<strong>on</strong>trolled, and <strong>the</strong> court ruled that <strong>the</strong> T<strong>on</strong>er Loader Program wasinsufficiently original to be copyrightable. 851 The court also held that, even if <strong>the</strong> T<strong>on</strong>er LoaderProgram were copyrightable, <strong>the</strong> defendant’s use of it <strong>on</strong> its chip was a fair use, principally <strong>on</strong><strong>the</strong> ground that <strong>the</strong> first fair use factor heavily weighed in <strong>the</strong> defendant’s favor “becauseLexmark does not even rebut that [<strong>the</strong> defendant’s] purpose for copying <strong>the</strong> [T<strong>on</strong>er LoaderProgram] was solely for <strong>the</strong> purpose of enabling interoperability between remanufacturedLexmark cartridges and Lexmark printers, not for <strong>the</strong> allegedly-expressive, hypo<strong>the</strong>ticallycopyrightablec<strong>on</strong>tent c<strong>on</strong>tained <strong>the</strong>rein.” 852Inc.(ii)Chamberlain Group, Inc. v. Skylink Technologies,In this case, <strong>the</strong> plaintiff Chamberlain was <strong>the</strong> manufacturer of a garage door opener(GDO) system which c<strong>on</strong>tained a feature known as “rolling code” designed to protect againstburglars equipped with “code grabber” devices. A code grabber allows a burglar to capture andrecord <strong>the</strong> coded radio frequency (RF) signal sent by <strong>the</strong> transmitter device to <strong>the</strong> GDO, whichcan <strong>the</strong>n be used to open <strong>the</strong> GDO at a later time to enter <strong>the</strong> house. 853 Chamberlain’s rollingcode feature was designed to defeat code grabbers by changing <strong>the</strong> expected transmitted RF codeeach time <strong>the</strong> GDO was activated. The feature was implemented by two copyrighted computerprograms owned by Chamberlain – <strong>on</strong>e in <strong>the</strong> transmitter of <strong>the</strong> GDO and <strong>the</strong> o<strong>the</strong>r in <strong>the</strong>receiver of <strong>the</strong> GDO that activated <strong>the</strong> motor to open <strong>the</strong> door. Each time <strong>the</strong> transmitter wasactivated to open <strong>the</strong> door, <strong>the</strong> computer program in <strong>the</strong> transmitter would cause <strong>the</strong> next rolling8498508518528531201(b)(1) sought to prohibit “making or selling <strong>the</strong> technological means to overcome <strong>the</strong>se protecti<strong>on</strong>s and<strong>the</strong>reby facilitate copyright infringement.” Id. at 564 (emphasis by <strong>the</strong> court) (quoting H.R. Rep. 105-796 (Oct.8, 1998)).387 F.3d at 562.See “Lexmark Stipulates to Judgment <strong>on</strong> DMCA Claims,” BNA’s Patent, Trademark & <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Journal(Mar. 10, 2006) at 506.Static C<strong>on</strong>trol Comp<strong>on</strong>ents, Inc. v. Lexmark Int’l, Inc., 2007 U.S. Dist. LEXIS 36017, at *36 (E.D. Ky. Apr.18, 2007).Id. at *38.Chamberlain Group Inc. v. Skylink Technologies Inc., 292 F. Supp. 2d 1023, 1026-27 (N.D. Ill. 2003).- 192 -


code in sequence to be sent to <strong>the</strong> receiver where it was stored, which code <strong>the</strong> receiver wouldrequire <strong>the</strong> next time <strong>the</strong> transmitter was activated, or <strong>the</strong> door would not open. 854The defendant sold a universal transmitter device that was capable of openingChamberlain’s GDO, although <strong>the</strong> opener code transmitted by <strong>the</strong> defendant’s door opener wasnot a rolling code. The defendant’s door opener was able to bypass Chamberlain’s rolling codefeature by mimicking a certain “resynchr<strong>on</strong>izati<strong>on</strong>” process of Chamberlain’s rolling codesoftware. 855 Chamberlain characterized that porti<strong>on</strong> of <strong>the</strong> computer program in <strong>the</strong> receiver thatverified <strong>the</strong> rolling code as a protective measure that c<strong>on</strong>trolled access to Chamberlain’scopyrighted computer program in <strong>the</strong> receiver, and argued that by circumventing <strong>the</strong> rolling codefeature and gaining access to <strong>the</strong> receiver computer program to open <strong>the</strong> garage door, <strong>the</strong>defendant was in violati<strong>on</strong> of <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>s of Secti<strong>on</strong> 1201(a)(2). 856Rulings by <strong>the</strong> District Court. The district court denied a moti<strong>on</strong> by Chamberlain forsummary judgment <strong>on</strong> <strong>the</strong> anti-circumventi<strong>on</strong> claim, analyzing a number of defenses raised by<strong>the</strong> defendant. The first defense was that because <strong>the</strong> defendant’s universal transmitter wascapable of operating a number of different GDOs, it was not “primarily” designed to circumvent<strong>the</strong> access c<strong>on</strong>trol measure of Chamberlain’s GDO. The court rejected this argument, noting that<strong>the</strong> defendant’s transmitter had <strong>on</strong>e particular setting that served <strong>on</strong>ly <strong>on</strong>e functi<strong>on</strong> – to operate<strong>the</strong> Chamberlain rolling code GDO. The fact that <strong>the</strong> transmitter was able to serve more than<strong>on</strong>e purpose was insufficient to deny summary judgment to Chamberlain. 857Next, <strong>the</strong> defendant argued that Chamberlain’s computer programs were not in factsubject to copyright protecti<strong>on</strong>. The court ruled that this argument raised a disputed issue ofmaterial fact sufficient to deny summary judgment, particularly since Chamberlain had notsupplied to <strong>the</strong> defendant <strong>the</strong> most recent versi<strong>on</strong> of <strong>the</strong> rolling code software until filing its replybrief (which differed from <strong>the</strong> versi<strong>on</strong> of <strong>the</strong> software that Chamberlain had registered), and <strong>the</strong>defendant had <strong>the</strong>refore not had a sufficient opportunity to review it. 858Finally, <strong>the</strong> defendant argued that <strong>the</strong> c<strong>on</strong>sumers’ use of <strong>the</strong> defendant’s transmitter withChamberlain’s rolling code GDOs was authorized. In particular, Chamberlain argued that ac<strong>on</strong>sumer who purchases a Chamberlain GDO owns it and has a right to use it to access his orher own garage. Before <strong>the</strong> defendant’s transmitter was capable of operating <strong>the</strong> rolling codeGDO, <strong>the</strong> c<strong>on</strong>sumer was required to program <strong>the</strong> transmitter into <strong>the</strong> GDO. The defendantargued that this fact dem<strong>on</strong>strated that <strong>the</strong> c<strong>on</strong>sumer had <strong>the</strong>reby authorized <strong>the</strong> use of <strong>the</strong>defendant’s transmitter with <strong>the</strong> GDO software. The defendant fur<strong>the</strong>r noted that <strong>the</strong> packagingfor Chamberlain’s GDO did not include any restricti<strong>on</strong>s <strong>on</strong> <strong>the</strong> c<strong>on</strong>sumer’s ability to buy areplacement transmitter or additi<strong>on</strong>al transmitter. 859 Thus, according to <strong>the</strong> defendant, “those854855856857858859Id. at 1027-28.Id. at 1029-32.Id. at 1028, 1033.Id. at 1037-38.Id. at 1038.Id. at 1039.- 193 -


Chamberlain GDO c<strong>on</strong>sumers who purchase a Skylink transmitter are not accessing <strong>the</strong> GDOwithout <strong>the</strong> authority of Chamberlain, but instead, have <strong>the</strong> tacit permissi<strong>on</strong> of Chamberlain topurchase any brand of transmitter that will open <strong>the</strong>ir GDO.” 860 The court ruled that <strong>the</strong>se facts,toge<strong>the</strong>r with <strong>the</strong> fact that <strong>the</strong>re was a history in <strong>the</strong> GDO industry of universal transmitters beingmarketed and sold to allow homeowners an alternative means to access any brand of GDO,raised sufficient disputes of material fact about whe<strong>the</strong>r <strong>the</strong> owner of a Chamberlain rolling codeGDO was authorized to use <strong>the</strong> defendant’s universal transmitter to deny summary judgment toChamberlain. 861Following this opini<strong>on</strong>, and at <strong>the</strong> invitati<strong>on</strong> of <strong>the</strong> court, <strong>the</strong> defendant moved forsummary judgment <strong>on</strong> Chamberlain’s DMCA claim, which <strong>the</strong> court granted. 862 Although bothparties had agreed for purposes of Chamberlain’s original moti<strong>on</strong> for summary judgment thatChamberlain did not place any restricti<strong>on</strong>s <strong>on</strong> c<strong>on</strong>sumers regarding <strong>the</strong> type of transmitter <strong>the</strong>yhad to buy to operate a Chamberlain rolling code GDO, in opposing <strong>the</strong> defendant’s moti<strong>on</strong> forsummary judgment, Chamberlain submitted an affidavit of its Vice President asserting thatChamberlain did not authorize <strong>the</strong> circumventi<strong>on</strong> of its rolling code GDOs, and argued that ithad not warned c<strong>on</strong>sumers against using unauthorized transmitters because it had no idea thato<strong>the</strong>r transmitters could be made to operate its rolling code GDOs. 863 The court rejected <strong>the</strong>searguments, finding that <strong>the</strong> affidavit was c<strong>on</strong>clusory and entitled to little weight, and thatChamberlain’s failure to anticipate <strong>the</strong> defendant’s technology did not “refute <strong>the</strong> fact thathomeowners have a reas<strong>on</strong>able expectati<strong>on</strong> of using <strong>the</strong> technology now that it is available.” 864Finally, Chamberlain argued that even if its customers were authorized to circumvent itssecurity measures, that had no bearing <strong>on</strong> whe<strong>the</strong>r sellers had similar authorizati<strong>on</strong>. The courtfound this argument ignored <strong>the</strong> fact that (1) <strong>the</strong>re was a history in <strong>the</strong> GDO industry ofmarketing and selling universal transmitters; (2) Chamberlain had not placed any restricti<strong>on</strong>s <strong>on</strong><strong>the</strong> use of competing transmitters to access its rolling code GDOs; and (3) in order for <strong>the</strong>defendant’s transmitter to activate <strong>the</strong> Chamberlain garage door, <strong>the</strong> homeowner herself had tochoose to store <strong>the</strong> defendant’s transmitter signal into <strong>the</strong> Chamberlain GDO’s memory, <strong>the</strong>reby860861862863864Id.Id. at 1040. An amicus brief submitted by <strong>the</strong> Computer and Communicati<strong>on</strong>s Industry Associati<strong>on</strong> (CCIA)argued that <strong>the</strong> court should deny summary judgment because <strong>the</strong> defendant’s activities fell within Secti<strong>on</strong>1201(f) of <strong>the</strong> DMCA, which CCIA argued permits circumventi<strong>on</strong> of a protective measure for <strong>the</strong> purpose ofachieving interoperability. The court noted that, although it was not reaching this issue, <strong>the</strong> defendant mightperhaps be entitled to summary judgment <strong>on</strong> that basis. Id.Chamberlain Group, Inc. v. Skylink Technologies, Inc., 292 F. Supp. 2d 1040 (N.D. Ill. 2003). As apreliminary matter, Chamberlain asserted that <strong>the</strong> defendant bore <strong>the</strong> burden of proof to show that it wasauthorized to circumvent – not access – Chamberlain’s software as an affirmative defense. The courtdisagreed, ruling that it was clearly Chamberlain’s burden to dem<strong>on</strong>strate that <strong>the</strong> defendant circumvented atechnological measure without <strong>the</strong> authority of <strong>the</strong> copyright owner. Id. at 1044.Id.Id.- 194 -


dem<strong>on</strong>strating <strong>the</strong> homeowner’s willingness to bypass Chamberlain’s system and itsprotecti<strong>on</strong>s. 865Accordingly, <strong>the</strong> court granted <strong>the</strong> defendant’s moti<strong>on</strong> for partial summary judgmentwith respect to Chamberlain’s DMCA claim. 866 Since so much of <strong>the</strong> district court’s opini<strong>on</strong>emphasized <strong>the</strong> fact that Chamberlain had not placed restricti<strong>on</strong>s <strong>on</strong> <strong>the</strong> type of transmitterscustomers could use to operate Chamberlain’s GDOs, <strong>on</strong>e must w<strong>on</strong>der whe<strong>the</strong>r <strong>the</strong> court wouldhave ruled differently had Chamberlain made clear to customers of its GDO products at <strong>the</strong> timeof purchase that <strong>the</strong>y were not authorized to use any transmitters to access <strong>the</strong> software in <strong>the</strong>irGDOs o<strong>the</strong>r than Chamberlain’s transmitters. If so, <strong>the</strong>n under <strong>the</strong> district court’s rati<strong>on</strong>ale, itseems that DMCA claims of <strong>the</strong> type Chamberlain made in this case could easily be streng<strong>the</strong>nedby copyright holders in <strong>the</strong> future by making express statements of authorizati<strong>on</strong> with respect touse of <strong>the</strong>ir products. The Federal Circuit, in its decisi<strong>on</strong> <strong>on</strong> appeal, expressly declined to reachthis issue. 867The Federal Circuit’s Decisi<strong>on</strong>. On appeal, <strong>the</strong> Federal Circuit affirmed in a detailedopini<strong>on</strong> that examined <strong>the</strong> legislative history and purpose of <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>s of<strong>the</strong> DMCA, and placed some significant boundaries around <strong>the</strong> scope of those provisi<strong>on</strong>s. 868 TheFederal Circuit began its analysis by ruling that <strong>the</strong> plaintiff has <strong>the</strong> burden under an anticircumventi<strong>on</strong>claim to prove that <strong>the</strong> defendant’s access to its copyrighted work was notauthorized. The court derived this holding from <strong>the</strong> distincti<strong>on</strong> between a copyright – which is aproperty right – and <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>s – which do not establish a new propertyright, but ra<strong>the</strong>r <strong>on</strong>ly a new cause of acti<strong>on</strong> for liability. Under a copyright (a property right), <strong>the</strong>plaintiff need <strong>on</strong>ly establish copying, and <strong>the</strong> burden <strong>the</strong>n shifts to <strong>the</strong> defendant to prove adefense. By c<strong>on</strong>trast, under <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>s, <strong>the</strong> language of <strong>the</strong> statutedefines <strong>the</strong> cause of acti<strong>on</strong> in terms of a circumventi<strong>on</strong> or trafficking without authority of <strong>the</strong>copyright owner. The plaintiff <strong>the</strong>refore has <strong>the</strong> burden to prove that <strong>the</strong> defendant’s access wasunauthorized. 869In a very significant ruling, <strong>the</strong> Federal Circuit held that <strong>the</strong> anti-circumventi<strong>on</strong>provisi<strong>on</strong>s of Secti<strong>on</strong> 1201 do not apply to all forms of circumventi<strong>on</strong> to gain access to a work,but ra<strong>the</strong>r <strong>on</strong>ly to circumventi<strong>on</strong>s that accomplish “forms of access that bear a reas<strong>on</strong>ablerelati<strong>on</strong>ship to <strong>the</strong> protecti<strong>on</strong>s that <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act o<strong>the</strong>rwise affords copyright owners” 870 – ino<strong>the</strong>r words, circumventi<strong>on</strong>s that facilitate some form of copyright infringement. 871 C<strong>on</strong>versely,865866867868869870871Id. at 1946.Id.The Federal Circuit did, however, make some statements suggesting that such restricti<strong>on</strong>s might c<strong>on</strong>stitutecopyright misuse, as discussed below.The Chamberlain Group, Inc. v. Skylink Technologies, Inc., 381 F.3d 1178 (Fed. Cir. 2004) ), cert. denied, 161L. Ed. 2d 481 (2005).Id. at 1193.Id. at 1202.Id. at 1195, 1203.- 195 -


“defendants whose circumventi<strong>on</strong> devices do not facilitate infringement are not subject to § 1201liability.” 872The court reached this c<strong>on</strong>clusi<strong>on</strong> based <strong>on</strong> three rati<strong>on</strong>ales. First, <strong>the</strong> court noted that in<strong>the</strong> statutory language itself, “virtually every clause of § 1201 that menti<strong>on</strong>s ‘access’ links‘access’ to ‘protecti<strong>on</strong>.’” 873 Sec<strong>on</strong>d, <strong>the</strong> court found that every decisi<strong>on</strong> cited by <strong>the</strong> plaintifffinding anti-circumventi<strong>on</strong> liability involved a circumventi<strong>on</strong> that facilitated or was coupled withcopyright infringement. In <strong>the</strong> Reimerdes case, <strong>the</strong> DeCSS program allowed <strong>the</strong> user tocircumvent <strong>the</strong> CSS protective system and to view or to copy a moti<strong>on</strong> picture from a DVD,whe<strong>the</strong>r or not <strong>the</strong> user had a DVD player with <strong>the</strong> licensed technology. In <strong>the</strong> Lexmark case,<strong>the</strong> court ruled that <strong>the</strong> defendant’s c<strong>on</strong>duct in copying <strong>the</strong> T<strong>on</strong>er Loading Program c<strong>on</strong>stitutedcopyright infringement. In <strong>the</strong> Gamemasters case, <strong>the</strong> defendant c<strong>on</strong>ceded that its product madetemporary modificati<strong>on</strong>s to <strong>the</strong> plaintiff’s copyrighted computer program. In <strong>the</strong> Real Networkscase, <strong>the</strong> defendant’s product allegedly disabled Real Networks’ copy switch, which defeated <strong>the</strong>copyright owner’s ability to c<strong>on</strong>trol copying up<strong>on</strong> streaming of <strong>the</strong> work. 874 “In short, <strong>the</strong> accessalleged in all [<strong>the</strong>se] cases was intertwined with a protected right.” 875Third, <strong>the</strong> court believed that a broad reading of <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>s toprohibit all forms of unauthorized access, whe<strong>the</strong>r or not protected copyright rights were <strong>the</strong>rebyimplicated, as urged by Chamberlain, would risk too much potential harm to competiti<strong>on</strong>.“Chamberlain’s proposed c<strong>on</strong>structi<strong>on</strong> would allow any manufacturer of any product to add asingle copyrighted sentence or software fragment to its product, wrap <strong>the</strong> copyrighted material ina trivial ‘encrypti<strong>on</strong>’ scheme, and <strong>the</strong>reby gain <strong>the</strong> right to restrict c<strong>on</strong>sumers’ rights to use itsproducts in c<strong>on</strong>juncti<strong>on</strong> with competing products. In o<strong>the</strong>r words, Chamberlain’s c<strong>on</strong>structi<strong>on</strong> of<strong>the</strong> DMCA would allow virtually any company to attempt to leverage its sales into aftermarketm<strong>on</strong>opolies – a practice that both <strong>the</strong> antitrust laws and <strong>the</strong> doctrine of copyright misusenormally prohibit.” 876The court noted that such a broad reading would also c<strong>on</strong>tradict o<strong>the</strong>r statutoryprovisi<strong>on</strong>s of <strong>the</strong> DMCA. In particular, Secti<strong>on</strong> 1201(c)(1) provides that nothing in Secti<strong>on</strong> 1201shall affect rights, remedies, limitati<strong>on</strong>s, or defenses to copyright infringement, including fairuse. The court noted that a reading of Secti<strong>on</strong> 1201 that prohibited access without regard to <strong>the</strong>rest of <strong>the</strong> copyright statute would clearly affect rights and limitati<strong>on</strong>s, if not remedies anddefenses, 877 and might also be tantamount to “ignoring <strong>the</strong> explicit immunizati<strong>on</strong> ofinteroperability from anticircumventi<strong>on</strong> liability under § 1201(f).” 878872873874875876877878Id. at 1195.Id. at 1197.Id. at 1198-99 (citati<strong>on</strong>s omitted).Id. at 1199.Id. at 1201 (citati<strong>on</strong>s omitted).Id. at 1200.Id. Although amicus Computer and Communicati<strong>on</strong>s Industry Associati<strong>on</strong> urged <strong>the</strong> court to c<strong>on</strong>sider <strong>the</strong>import of Secti<strong>on</strong> 1201(f) <strong>on</strong> <strong>the</strong> case, <strong>the</strong> court did not reach <strong>the</strong> issue since it held <strong>the</strong>re had been no anti-- 196 -


The court’s statements might imply that circumventi<strong>on</strong> for fair uses is privileged. Indeed,<strong>the</strong> court stated, “Chamberlain’s proposed c<strong>on</strong>structi<strong>on</strong> would allow copyright owners to prohibitexclusively fair uses even in <strong>the</strong> absence of any feared foul use. It would <strong>the</strong>refore allow anycopyright owner, through a combinati<strong>on</strong> of c<strong>on</strong>tractual terms and technological measures, torepeal <strong>the</strong> fair use doctrine with respect to an individual copyrighted work – or even selectedcopies of that copyrighted work. Again, this implicati<strong>on</strong> c<strong>on</strong>tradicts § 1201(c)(1) directly.” 879Despite <strong>the</strong>se pregnant statements, however, <strong>the</strong> court stated in a footnote, “We leave open <strong>the</strong>questi<strong>on</strong> as to when § 107 might serve as an affirmative defense to a prima facie violati<strong>on</strong> of §1201. For <strong>the</strong> moment we note <strong>on</strong>ly that though <strong>the</strong> traditi<strong>on</strong>al fair use doctrine of § 107 remainsunchanged as a defense to copyright infringement under § 1201(c)(1), circumventi<strong>on</strong> is notinfringement.” 880Turning to Chamberlain’s specific claims under Secti<strong>on</strong> 1201(a)(2), <strong>the</strong> courtsummarized <strong>the</strong> requirements for liability as follows:A plaintiff alleging a violati<strong>on</strong> of § 1201(a)(2) must prove: (1) ownership of avalid copyright <strong>on</strong> a work, (2) effectively c<strong>on</strong>trolled by a technological measure,which has been circumvented, (3) that third parties can now access (4) withoutauthorizati<strong>on</strong>, in a manner that (5) infringes or facilitates infringing a rightprotected by <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act, because of a product that (6) <strong>the</strong> defendant ei<strong>the</strong>r(i) designed or produced primarily for circumventi<strong>on</strong>; (ii) made available despite<strong>on</strong>ly limited commercial significance o<strong>the</strong>r than circumventi<strong>on</strong>; or (iii) marketedfor use in circumventi<strong>on</strong> of <strong>the</strong> c<strong>on</strong>trolling technological measure. 881The court ruled that Chamberlain had failed to satisfy both <strong>the</strong> fourth and fifth elementsof <strong>the</strong> test. With respect to <strong>the</strong> fifth element, Chamberlain had nei<strong>the</strong>r alleged copyrightinfringement nor explained how <strong>the</strong> access provided by <strong>the</strong> defendant’s transmitter facilitatedthird party infringement of any of its copyright rights. Instead, <strong>the</strong> defendant’s transmittermerely enabled <strong>the</strong> end user to make legitimate use of <strong>the</strong> computer program in <strong>the</strong> GDO. 882Nor had Chamberlain established <strong>the</strong> fourth element. The record established thatChamberlain had placed no explicit restricti<strong>on</strong>s <strong>on</strong> <strong>the</strong> types of transmitter that <strong>the</strong> homeownercould use with its system at <strong>the</strong> time of purchase. 883 “<str<strong>on</strong>g>Copyright</str<strong>on</strong>g> law itself authorizes <strong>the</strong> publicto make certain uses of copyrighted materials. C<strong>on</strong>sumers who purchase a product c<strong>on</strong>taining acopy of embedded software have <strong>the</strong> inherent legal right to use that copy of <strong>the</strong> software. What<strong>the</strong> law authorizes, Chamberlain cannot revoke.” 884 Although this statement suggests that a879880881882883884circumventi<strong>on</strong> violati<strong>on</strong> by <strong>the</strong> defendant in <strong>the</strong> first place under its reading of <strong>the</strong> scope of <strong>the</strong> DMCA. Id. at1191 n.8.Id. at 1202.Id. at 1200 n.14.Id. at 1203.Id. at 1198, 1204.Id. at 1183.Id. at 1202.- 197 -


plaintiff could not even use c<strong>on</strong>tractual prohibiti<strong>on</strong>s to eliminate authorizati<strong>on</strong> to circumventc<strong>on</strong>trols to gain access to <strong>the</strong> software in a way that did not facilitate infringement, <strong>the</strong> courtbacked away from any such absolute principle in a footnote: “It is not clear whe<strong>the</strong>r a c<strong>on</strong>sumerwho circumvents a technological measure c<strong>on</strong>trolling access to a technological measurec<strong>on</strong>trolling access to a copyrighted work in a manner that enables uses permitted under <strong>the</strong><str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act but prohibited by c<strong>on</strong>tract can be subject to liability under <strong>the</strong> DMCA. BecauseChamberlain did not attempt to limit its customers’ use of its product by c<strong>on</strong>tract, however, wedo not reach that issue.” 885In c<strong>on</strong>clusi<strong>on</strong>, <strong>the</strong>n, <strong>the</strong> court held, “The <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act authorized Chamberlain’scustomers to use <strong>the</strong> copy of Chamberlain’s copyrighted software embedded in <strong>the</strong> GDOs that<strong>the</strong>y purchased. Chamberlain’s customers are <strong>the</strong>refore immune from § 1201(a)(1)circumventi<strong>on</strong> liability. In <strong>the</strong> absence of allegati<strong>on</strong>s of ei<strong>the</strong>r copyright infringement or §1201(a)(1) circumventi<strong>on</strong>, Skylink cannot be liable for § 1201(a)(2) trafficking.” 886 The court<strong>the</strong>refore affirmed <strong>the</strong> district court’s grant of summary judgment in favor of Skylink. 887Door Openers(iii) In re Certain Universal Transmitters for GarageIn additi<strong>on</strong> to its lawsuit against Skylink, Chamberlain also filed an acti<strong>on</strong> in <strong>the</strong>Internati<strong>on</strong>al Trade Commissi<strong>on</strong> to bar <strong>the</strong> importati<strong>on</strong> of Skylink’s GDOs. That investigati<strong>on</strong>established a sec<strong>on</strong>d ground bey<strong>on</strong>d that of <strong>the</strong> district court’s ruling as to why Skylink had notcommitted a violati<strong>on</strong> of <strong>the</strong> DMCA. Specifically, in an Initial Determinati<strong>on</strong> c<strong>on</strong>cerningtemporary relief in <strong>the</strong> investigati<strong>on</strong> that preceded <strong>the</strong> district court’s ruling, an administrativelaw judge denied temporary relief <strong>on</strong> <strong>the</strong> ground that Skylink’s transmitters did not violate <strong>the</strong>DMCA because <strong>the</strong>y “do not circumvent Chamberlain’s copyrighted rolling code softwareprogram, but instead send fixed identificati<strong>on</strong> code signals to Chamberlain’s GDOs that falloutside of <strong>the</strong> copyrighted software. … The fact that [Skylink’s] transmitters send a fixedidentificati<strong>on</strong> code that does not circumvent Chamberlain’s copyrighted software programremoves those products entirely from <strong>the</strong> purview of <strong>the</strong> DMCA, regardless of whe<strong>the</strong>rChamberlain warns its customers and Skylink that n<strong>on</strong>-rolling code transmitters areunauthorized.” 888After <strong>the</strong> district court’s ruling, Skylink moved to dismiss <strong>the</strong> ITC investigati<strong>on</strong> <strong>on</strong> <strong>the</strong>ground that Chamberlain’s claim was barred under res judicata by that ruling. Chamberlainopposed <strong>the</strong> dismissal <strong>on</strong> <strong>the</strong> ground that <strong>the</strong>re were new facts not before <strong>the</strong> district court –namely, that Chamberlain had since changed its GDO users’ manuals to expressly warncustomers that use of n<strong>on</strong>-rolling code transmitters would circumvent Chamberlain’s rollingcode security measure, and to make clear that customers were not authorized to access885886887888Id. at 1202 n.17.Id. at 1204.Id.In re Certain Universal Transmitters for Garage Door Openers, 70 U.S.P.Q.2d 1906, 1909 (I.T.C. 2004).- 198 -


Chamberlain’s operating software using n<strong>on</strong>-rolling code transmitters. 889 The administrative lawjudge ruled that this fact was insufficient to avoid res judicata, because <strong>the</strong> fact could have beenasserted before <strong>the</strong> district court, since <strong>the</strong> administrative ruling <strong>on</strong> <strong>the</strong> request for temporaryrelief issued before <strong>the</strong> district court acted. 890 In additi<strong>on</strong>, <strong>the</strong> administrative law judge ruled thatChamberlain’s new owners’ manuals “impose no enforceable restricti<strong>on</strong>s <strong>on</strong> c<strong>on</strong>sumers even if<strong>the</strong>y do ‘warn’ <strong>the</strong>m that n<strong>on</strong>-rolling code transmitters are ‘unauthorized.’ There are no negativec<strong>on</strong>sequences for a c<strong>on</strong>sumer who ignores <strong>the</strong> statement in Chamberlain’s new manuals.” 891Accordingly, <strong>the</strong> administrative law judge determined that <strong>the</strong> investigati<strong>on</strong> should be terminatedin its entirety and certified that determinati<strong>on</strong> to <strong>the</strong> Commissi<strong>on</strong>. 892(iv) Storage Technology Corporati<strong>on</strong> v. CustomHardware Engineering & C<strong>on</strong>sultingIn this case, <strong>the</strong> plaintiff Storage Technology Corporati<strong>on</strong> (“StorageTek”) sold systemsfor storing and retrieving very large amounts of computer data. StorageTek also serviced itscustomers’ installati<strong>on</strong>s by means of diagnostic software, called <strong>the</strong> “Maintenance Code,” that itused to identify malfuncti<strong>on</strong>s and problems in its customers’ storage systems. In order to protectits service market, StorageTek restricted access to <strong>the</strong> Maintenance Code with a proprietaryalgorithm called GetKey. 893When activated, <strong>the</strong> Maintenance Code ran a series of diagnostic tests and providedinformati<strong>on</strong> c<strong>on</strong>cerning <strong>the</strong> nature of existing or potential problems. It was programmed to beset at different levels between 0 and 9. At <strong>the</strong> 0 level (<strong>the</strong> usual setting), <strong>the</strong> Maintenance Codewas disabled. Above 0 <strong>the</strong> Maintenance Code activated specific diagnostic functi<strong>on</strong>s at differentlevels. To enable <strong>the</strong> Maintenance Code for a particular system, a technician was required toc<strong>on</strong>tact StorageTek’s technical support staff, provide <strong>the</strong> serial number of <strong>the</strong> equipment beingserviced and identify <strong>the</strong> desired level of <strong>the</strong> Maintenance Code. The technician would <strong>the</strong>n begiven a GetKey password specific to <strong>the</strong> request that <strong>the</strong> technician was required to enter in orderto reset <strong>the</strong> maintenance level. During <strong>the</strong> process of accessing <strong>the</strong> Maintenance Code andchanging <strong>the</strong> level, a complete copy of <strong>the</strong> code was made in <strong>the</strong> RAM memory of <strong>the</strong> system. 894The defendants competed with StorageTek for servicing StorageTek systems. Theyfigured out how to circumvent <strong>the</strong> GetKey algorithm to gain access to <strong>the</strong> Maintenance Code andto reset its maintenance level in order to run diagnostics that would generate informati<strong>on</strong> needed889890891892893894Id. at 1907-08.Id. at 1909-10.Id. at 1910.Id.Storage Technology Corp. v. Custom Hardware Engineering & C<strong>on</strong>sulting, 2004 U.S. Dist. LEXIS 12391 (D.Mass. July 2, 2004) at *3-4.Id. at *7-8.- 199 -


to service a particular system. StorageTek sued for both copyright infringement and violati<strong>on</strong> of<strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>s. 895The district court held that <strong>the</strong> defendants had infringed StorageTek’s copyright in <strong>the</strong>Maintenance Code by virtue of <strong>the</strong> copy <strong>the</strong>reof made in RAM each time <strong>the</strong> GetKey processwas circumvented and <strong>the</strong> maintenance level reset. 896 The court held that such copying was notpermitted under Secti<strong>on</strong> 117(c) of <strong>the</strong> copyright statute, which provides that it is not aninfringement for <strong>the</strong> owner or lessee of a machine to authorize <strong>the</strong> making of a copy of acomputer program if <strong>the</strong> program is copied solely by turning <strong>on</strong> <strong>the</strong> machine for <strong>the</strong> purpose <strong>on</strong>lyof maintenance and repair and <strong>the</strong> copy is used in no o<strong>the</strong>r manner and is destroyed immediatelyafter <strong>the</strong> maintenance and repair is completed. The court ruled that Secti<strong>on</strong> 117(c) was notavailable because, although <strong>the</strong> defendants copied <strong>the</strong> Maintenance Code by turning <strong>on</strong> <strong>the</strong>machine, <strong>the</strong>y did not do so just for repair, but also for <strong>the</strong> express purpose of circumventingStorageTek’s security measures, modifying <strong>the</strong> maintenance level, and intercepting <strong>the</strong>diagnostic messages, and <strong>the</strong>y did not destroy <strong>the</strong> copies <strong>the</strong>y made immediately aftercompleti<strong>on</strong> of repairs. 897The court also found a violati<strong>on</strong> of <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>s of <strong>the</strong> DMCA,ruling that GetKey was unquesti<strong>on</strong>ably a qualifying access c<strong>on</strong>trol measure and <strong>the</strong>re was noquesti<strong>on</strong> that <strong>the</strong> defendants bypassed GetKey. The court also rejected <strong>the</strong> defendants’ reliance<strong>on</strong> Secti<strong>on</strong> 1201(f), because that defense exempts circumventi<strong>on</strong> <strong>on</strong>ly if it does not c<strong>on</strong>stituteinfringement, and <strong>the</strong> defendants’ bypassing of GetKey resulted in an infringing copy of <strong>the</strong>program being made in RAM. 898 Accordingly, <strong>the</strong> court issued a preliminary injuncti<strong>on</strong> against<strong>the</strong> defendants.On appeal, <strong>the</strong> Federal Circuit reversed, principally <strong>on</strong> <strong>the</strong> ground that <strong>the</strong> district court’sanalysis of Secti<strong>on</strong> 117(c) was incorrect. The court found that <strong>the</strong> district court had erred byfocusing <strong>on</strong> <strong>the</strong> term “repair” in Secti<strong>on</strong> 117(c), while ignoring <strong>the</strong> term “maintenance,” which<strong>the</strong> court noted from <strong>the</strong> legislative history was meant to encompass m<strong>on</strong>itoring systems forproblems, not simply fixing a single, isolated malfuncti<strong>on</strong>. 899 The defendant had createdsoftware, known as <strong>the</strong> Library Event Manager (LEM) and <strong>the</strong> Enhanced Library Event Manager(ELEM) to intercept and interpret fault symptom codes produced by <strong>the</strong> plaintiff’s MaintenanceCode. 900 The plaintiff’s expert testified that a copy of <strong>the</strong> Maintenance Code remained in RAM<strong>on</strong> an <strong>on</strong>going basis as <strong>the</strong> system operated with <strong>the</strong> LEM and ELEM attached. Because thatdescripti<strong>on</strong> did not comport with <strong>the</strong> noti<strong>on</strong> of “repair,” <strong>the</strong> district court had ruled Secti<strong>on</strong>117(c) inapplicable. However, in describing <strong>the</strong> defendants’ process, <strong>the</strong> expert noted that <strong>the</strong>LEM and ELEM stayed in place so that when problems occurred, <strong>the</strong> defendants could detect895896897898899900Id. at *9-11.Id. at *11-12.Id. at *12-13.Id. at 14-15.Storage Technology Corp. v. Custom Hardware Eng’g & C<strong>on</strong>sulting, Inc., 421 F.3d 1307, 1312 (Fed. Cir.2005), reh’g denied, 431 F.3d 1374 (Fed. Cir. 2005).Id. at 1310.- 200 -


and fix <strong>the</strong> malfuncti<strong>on</strong>. The Federal Circuit ruled that this <strong>on</strong>going presence to detect and repairmalfuncti<strong>on</strong>s fell within <strong>the</strong> definiti<strong>on</strong> of “maintenance” in Secti<strong>on</strong> 117(c). Moreover, when <strong>the</strong>defendants’ maintenance c<strong>on</strong>tract was over, <strong>the</strong> storage library was rebooted, which destroyed<strong>the</strong> Maintenance Code. The court noted that <strong>the</strong> protecti<strong>on</strong> of Secti<strong>on</strong> 117 does not cease simplyby virtue of <strong>the</strong> passage of time, but ra<strong>the</strong>r ceases <strong>on</strong>ly when maintenance ends. 901With respect to whe<strong>the</strong>r <strong>the</strong> Maintenance Code was necessary for <strong>the</strong> machine to beactivated, <strong>the</strong> Federal Circuit relied heavily <strong>on</strong> <strong>the</strong> fact that both parties agreed <strong>the</strong> MaintenanceCode was “so entangled with <strong>the</strong> functi<strong>on</strong>al code that <strong>the</strong> entire code must be loaded into RAMfor <strong>the</strong> machine to functi<strong>on</strong> at all.” 902 The fact that <strong>the</strong> Maintenance Code had o<strong>the</strong>r functi<strong>on</strong>s,such as diagnosing malfuncti<strong>on</strong>s in <strong>the</strong> equipment, was irrelevant. Accordingly, <strong>the</strong> defendantswere likely to prevail <strong>on</strong> <strong>the</strong>ir argument that Secti<strong>on</strong> 117(c) protected <strong>the</strong>ir act of copying of <strong>the</strong>plaintiff’s Maintenance Code into RAM. 903Turning to <strong>the</strong> anti-circumventi<strong>on</strong> claim based <strong>on</strong> <strong>the</strong> defendants’ circumventi<strong>on</strong> of <strong>the</strong>GetKey protocol, <strong>the</strong> court cited its earlier opini<strong>on</strong> in <strong>the</strong> Chamberlain case for <strong>the</strong> propositi<strong>on</strong>that a “copyright owner alleging a violati<strong>on</strong> of secti<strong>on</strong> 1201(a) … must prove that <strong>the</strong>circumventi<strong>on</strong> of <strong>the</strong> technological measure ei<strong>the</strong>r ‘infringes or facilitates infringing a rightprotected by <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act.’” 904 Thus, to <strong>the</strong> extent that <strong>the</strong> defendants’ activities did notc<strong>on</strong>stitute copyright infringement or facilitate copyright infringement, <strong>the</strong> plaintiff wasforeclosed from maintaining an acti<strong>on</strong> under <strong>the</strong> DMCA. 905 Citing <strong>the</strong> Lexmark andRealNetworks v. Streambox cases, <strong>the</strong> court observed that “courts generally have found aviolati<strong>on</strong> of <strong>the</strong> DMCA <strong>on</strong>ly when <strong>the</strong> alleged access was intertwined with a right protected by<strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act. … To <strong>the</strong> extent that StorageTek’s rights under copyright law are not at risk,<strong>the</strong> DMCA does not create a new source of liability.” 906Even if <strong>the</strong> plaintiff were able to prove that <strong>the</strong> automatic copying of <strong>the</strong> MaintenanceCode into RAM c<strong>on</strong>stituted copyright infringement, it would still have to show that <strong>the</strong> LEM orELEM (which bypassed GetKey) facilitated that infringement. With respect to that issue, <strong>the</strong>court noted <strong>the</strong> problem that <strong>the</strong> copying of <strong>the</strong> Maintenance Code into RAM took placeregardless of whe<strong>the</strong>r <strong>the</strong> LEM or ELEM was used. Thus, <strong>the</strong>re was no nexus between anypossible infringement and <strong>the</strong> use of <strong>the</strong> LEM and ELEM circumventi<strong>on</strong> devices. Ra<strong>the</strong>r, <strong>the</strong>901902903904905906Id. at 1313.Id. at 1314.Id. In <strong>the</strong> alternative, <strong>the</strong> court ruled that <strong>the</strong> defendants’ copying of <strong>the</strong> software into RAM was within <strong>the</strong>software license rights of <strong>the</strong>ir customers because <strong>the</strong> defendants were acting as <strong>the</strong>ir customers’ agents inturning <strong>on</strong> <strong>the</strong> machines. Id. at 1315. “Because <strong>the</strong> whole purpose of <strong>the</strong> license is to allow <strong>the</strong> tape libraryowners to activate <strong>the</strong>ir machines without being liable for copyright infringement, such activity by <strong>the</strong> licenseeand its agents is implicitly authorized by <strong>the</strong> license agreement unless <strong>the</strong> agreement explicitly prohibits thirdparties from powering up <strong>the</strong> machines.” Id. at 1317.Id. at 1318 (quoting Chamberlain Group, Inc. v. Skylink Technologies, Inc., 381 F.3d 1178, 1203 (Fed. Cir.2004)).Storage Technology, 421 F.3d at 1318.Id.- 201 -


circumventi<strong>on</strong> of GetKey <strong>on</strong>ly allowed <strong>the</strong> defendants to use porti<strong>on</strong>s of <strong>the</strong> copyrightedsoftware that <strong>the</strong> plaintiff wished to restrict technologically, but that had already been loadedinto RAM. “The activati<strong>on</strong> of <strong>the</strong> maintenance code may violate StorageTek’s c<strong>on</strong>tractual rightsvis-à-vis its customers, but those rights are not <strong>the</strong> rights protected by copyright law. There issimply not a sufficient nexus between <strong>the</strong> rights protected by copyright law and <strong>the</strong>circumventi<strong>on</strong> of <strong>the</strong> GetKey system.” 907 Accordingly, it was unlikely that <strong>the</strong> plaintiff wouldprevail <strong>on</strong> its anti-circumventi<strong>on</strong> claim. 908 The court <strong>the</strong>refore vacated <strong>the</strong> preliminaryinjuncti<strong>on</strong> and remanded for fur<strong>the</strong>r proceedings. 909Two significant aspects of <strong>the</strong> Storage Tech case are worth noting:– First, <strong>the</strong> court read <strong>the</strong> Secti<strong>on</strong> 117(c) rights very broadly. Secti<strong>on</strong> 117(c) was clearlydesigned to absolve maintenance providers from copyright liability based merely <strong>on</strong> <strong>the</strong> makingof a copy of a computer program by virtue of its getting loaded into RAM up<strong>on</strong> starting acomputer for maintenance. However, <strong>the</strong> Federal Circuit went fur<strong>the</strong>r, and ruled that <strong>the</strong>defendants were entitled to use, in aid of rendering maintenance, any software that got loadedinto RAM up<strong>on</strong> activati<strong>on</strong> of <strong>the</strong> machine. Such a result seems in tensi<strong>on</strong> with Secti<strong>on</strong>117(c)(2), which provides that, “with respect to any computer program or part <strong>the</strong>reof that is notnecessary for <strong>the</strong> machine to be activated, such program or part <strong>the</strong>reof is not accessed or usedo<strong>the</strong>r than to make such new copy by virtue of <strong>the</strong> activati<strong>on</strong> of <strong>the</strong> machine.” The reference to“part <strong>the</strong>reof” seems to c<strong>on</strong>template that some code might get loaded up<strong>on</strong> machine activati<strong>on</strong>,but yet not be necessary for <strong>the</strong> machine to be activated (in <strong>the</strong> way, for example, that operatingsystem software is necessary for a machine to be activated). In that event, Secti<strong>on</strong> 117(c)(1)absolves <strong>the</strong> maintenance provider from liability for <strong>the</strong> making of <strong>the</strong> copy of such code up<strong>on</strong>machine activati<strong>on</strong>, but Secti<strong>on</strong> 117(c)(2) would seem to prevent <strong>the</strong> maintenance provider fromaccessing or using such code “o<strong>the</strong>r than to make such new copy by virtue of <strong>the</strong> activati<strong>on</strong> of<strong>the</strong> machine.”Notwithstanding this, <strong>the</strong> Federal Circuit’s decisi<strong>on</strong> gave <strong>the</strong> maintenance provider <strong>the</strong>right to access and use <strong>the</strong> Maintenance Code, just because it was loaded up<strong>on</strong> activati<strong>on</strong>. Thecourt did so <strong>on</strong> <strong>the</strong> articulated basis that <strong>the</strong> Maintenance Code was “so entangled with <strong>the</strong>functi<strong>on</strong>al code that <strong>the</strong> entire code must be loaded into RAM for <strong>the</strong> machine to functi<strong>on</strong> atall.” 910 However, this factual asserti<strong>on</strong> seems belied by <strong>the</strong> fact that, as noted by <strong>the</strong> districtcourt, <strong>the</strong> default setting for <strong>the</strong> Maintenance Code was level 0 (disabled), and it was designed torequire interventi<strong>on</strong> by Storage Tech engineers through <strong>the</strong> GetKey process to activate it tohigher levels. Thus, although <strong>the</strong> Maintenance Code was loaded up<strong>on</strong> machine activati<strong>on</strong>, itwould not seem necessary for <strong>the</strong> machine to activate (functi<strong>on</strong>), because it was by default set tobe disabled.907908909910Id. at 1319.Id.Id. at 1321.Id. at 1314.- 202 -


– Sec<strong>on</strong>d, <strong>the</strong> court’s interpretati<strong>on</strong> of <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>s gives <strong>the</strong>m anarrower scope than <strong>the</strong> literal language of <strong>the</strong> copyright statute seems to read. Specifically, <strong>the</strong>court ruled that those provisi<strong>on</strong>s do not create a new source of liability bey<strong>on</strong>d copyrightinfringement. If a circumventi<strong>on</strong> does not lead to a copyright infringement, <strong>the</strong> circumventi<strong>on</strong> isnot illegal. In o<strong>the</strong>r words, <strong>the</strong> act of circumventi<strong>on</strong> is not a malum in se. 911 This holding,whatever merit it might be argued to have as a policy matter, seems c<strong>on</strong>trary to <strong>the</strong> literallanguage of Secti<strong>on</strong> 1201(a)(1)(A), which states “No pers<strong>on</strong> shall circumvent a technologicalmeasure that effectively c<strong>on</strong>trols access to a work protected under this title.” The FederalCircuit’s decisi<strong>on</strong> seems to add a clause at <strong>the</strong> end of this provisi<strong>on</strong> reading “and whichcircumventi<strong>on</strong> results in copyright infringement.” As discussed in Secti<strong>on</strong> II.G.1(n)(1) above,<strong>the</strong> separate opini<strong>on</strong>s of two of <strong>the</strong> judges in <strong>the</strong> Lexmark case expressed similar views aboutwhat <strong>the</strong> proper scope of <strong>the</strong> anti-circumventi<strong>on</strong> prohibiti<strong>on</strong>s should be interpreted to be.On remand, StorageTek asserted an additi<strong>on</strong>al anti-circumventi<strong>on</strong> claim against <strong>the</strong>defendants, based <strong>on</strong> <strong>the</strong> defendants alleged circumventi<strong>on</strong> of GetKey in order to access andcopy StorageTek’s Run Time Diagnostics (RTD) code, which diagnosed troubles in <strong>the</strong>hardware. Unlike <strong>the</strong> rest of <strong>the</strong> Maintenance Code, <strong>the</strong> RTD code was not automatically loadedup<strong>on</strong> power-up, but instead was loaded <strong>on</strong>ly when utilized. 912 The court rejected this claim <strong>on</strong><strong>the</strong> ground that GetKey did not effectively protect or c<strong>on</strong>trol access to <strong>the</strong> RTD code. The RTDcode was c<strong>on</strong>tained <strong>on</strong> ei<strong>the</strong>r <strong>the</strong> hard drive of <strong>the</strong> LMU or <strong>on</strong> floppy disks that StorageTeksometimes shipped with its products. Accordingly, any customer who owned a StorageTeksystem could access and copy <strong>the</strong> RTD code, regardless of <strong>the</strong> existence of GetKey protecti<strong>on</strong>s.The court <strong>the</strong>refore c<strong>on</strong>cluded that GetKey did not effectively c<strong>on</strong>trol access to <strong>the</strong> RTD code,and <strong>the</strong> court granted <strong>the</strong> defendants summary judgment <strong>on</strong> <strong>the</strong> anti-circumventi<strong>on</strong> claim relatedto <strong>the</strong> RTD code. 913(b) Integrity of <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Management Informati<strong>on</strong>(1) Definiti<strong>on</strong> of CMIThe DMCA c<strong>on</strong>tains provisi<strong>on</strong>s directed to maintaining <strong>the</strong> integrity of “copyrightmanagement informati<strong>on</strong>” (CMI), which Secti<strong>on</strong> 1202(c) of <strong>the</strong> DCMA defines to include <strong>the</strong>following items of informati<strong>on</strong> “c<strong>on</strong>veyed” in c<strong>on</strong>necti<strong>on</strong> with copies of a work or <strong>the</strong>performance or display of a work, including in digital form (but specifically excluding anypers<strong>on</strong>ally identifying informati<strong>on</strong> about a user of a work):– <strong>the</strong> title and o<strong>the</strong>r informati<strong>on</strong> identifying <strong>the</strong> work, including <strong>the</strong> informati<strong>on</strong> set forth<strong>on</strong> a copyright notice;– <strong>the</strong> name and o<strong>the</strong>r identifying informati<strong>on</strong> about <strong>the</strong> author or <strong>the</strong> copyright owner of<strong>the</strong> work;911912913Latin for “wr<strong>on</strong>g in itself.”Storage Technology Corp. v. Custom Hardware Eng’g & C<strong>on</strong>sulting, Ltd., 2006 U.S. Dist. LEXIS 43690 at*15, 22 (D. Mass. June 28, 2006).Id. at *25-26.- 203 -


– <strong>the</strong> name and o<strong>the</strong>r identifying informati<strong>on</strong> about a performer, writer, or directorassociated with a work, o<strong>the</strong>r than a work performed publicly by radio and televisi<strong>on</strong> broadcaststati<strong>on</strong>s;– terms and c<strong>on</strong>diti<strong>on</strong>s for use of <strong>the</strong> work;– identifying numbers or symbols referring to such informati<strong>on</strong> or links to suchinformati<strong>on</strong>; and– any o<strong>the</strong>r informati<strong>on</strong> that <strong>the</strong> Register of <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>s may prescribe by regulati<strong>on</strong>.The statement of Rep. Coble accompanying <strong>the</strong> original introducti<strong>on</strong> of <strong>the</strong> provisi<strong>on</strong> inS. 2037 corresp<strong>on</strong>ding to Secti<strong>on</strong> 1202 noted that <strong>the</strong> term “c<strong>on</strong>veyed” was “used in its broadestsense and is not meant to require any type of transfer, physical or o<strong>the</strong>rwise, of <strong>the</strong> informati<strong>on</strong>.It merely requires that <strong>the</strong> informati<strong>on</strong> be accessible in c<strong>on</strong>juncti<strong>on</strong> with, or appear with, <strong>the</strong>work being accessed.” Under this definiti<strong>on</strong>, CMI could include informati<strong>on</strong> that is c<strong>on</strong>tained ina link whose address is c<strong>on</strong>veyed with <strong>the</strong> copyrighted work. Such informati<strong>on</strong> could well be ashrinkwrap license, as such license would c<strong>on</strong>vey <strong>the</strong> “terms and c<strong>on</strong>diti<strong>on</strong>s for use of <strong>the</strong> work,”which is <strong>on</strong>e of <strong>the</strong> express comp<strong>on</strong>ents of <strong>the</strong> definiti<strong>on</strong> of CMI.(i)The IQ Group, Ltd. v. Wiesner Publishing, LLC.The case of The IQ Group, Ltd. v. Wiesner Publishing, LLC 914 is <strong>on</strong>e of <strong>the</strong> mostthorough opini<strong>on</strong>s to c<strong>on</strong>sider <strong>the</strong> scope of <strong>the</strong> definiti<strong>on</strong> of CMI, although it c<strong>on</strong>strues whatqualifies as protectable CMI under <strong>the</strong> DMCA quite a bit more narrowly than many of <strong>the</strong> casesdiscussed in Secti<strong>on</strong> II.G.1(d) below. The plaintiff IQ Group and <strong>the</strong> defendant WiesnerPublishing were business competitors who distributed ads by email to insurance agents <strong>on</strong> behalfof insurance companies. IQ distributed ads for two insurance companies that c<strong>on</strong>tained IQ’sgraphic logo. The logo functi<strong>on</strong>ed as a hyperlink in <strong>the</strong> ads such that, when clicked, it directed<strong>the</strong> user to a page of IQ’s website which IQ claimed c<strong>on</strong>tained copyright notices. After IQ haddistributed <strong>the</strong> ads for <strong>the</strong> two insurance companies, <strong>the</strong> companies hired Wiesner to distribute<strong>the</strong> same ads via email. Wiesner removed IQ’s logo and hyperlink, added new informati<strong>on</strong> sothat resp<strong>on</strong>ses to <strong>the</strong> ads would go to <strong>the</strong> insurance companies, and <strong>the</strong>n copied and distributed<strong>the</strong> ads by email. IQ sued <strong>the</strong> two insurance companies and Wiesner for, am<strong>on</strong>g o<strong>the</strong>r things,violati<strong>on</strong> of <strong>the</strong> CMI provisi<strong>on</strong>s of <strong>the</strong> DMCA based <strong>on</strong> <strong>the</strong> removal of <strong>the</strong> logo from <strong>the</strong> ads.The parties cross moved for summary judgment. 915The court ruled that <strong>the</strong> IQ’s claim that <strong>the</strong> logo and hyperlink were within <strong>the</strong> scope ofSecti<strong>on</strong> 1202 failed for two reas<strong>on</strong>s. First, as to <strong>the</strong> logo, IQ’s positi<strong>on</strong> impermissibly blurred<strong>the</strong> distincti<strong>on</strong> between trademark law and copyright law. Sec<strong>on</strong>d, properly interpreted, Secti<strong>on</strong>1202 did not apply to ei<strong>the</strong>r <strong>the</strong> logo or <strong>the</strong> hyperlink. 916914915916409 F. Supp. 2d 587 (D.N.J. 2006).Id. at 589-90.Id. at 591-92.- 204 -


With respect to <strong>the</strong> first reas<strong>on</strong>, <strong>the</strong> court ruled that protecting a logo, functi<strong>on</strong>ing as aservice mark, under <strong>the</strong> CMI provisi<strong>on</strong>s would turn <strong>the</strong> DMCA “into a species of mutanttrademark/copyright law, blurring <strong>the</strong> boundaries between <strong>the</strong> law of trademarks and that ofcopyright.” 917 Specifically, <strong>the</strong> court was c<strong>on</strong>cerned that if every removal or alterati<strong>on</strong> of a logoattached to a copy of a work gave rise to a cause of acti<strong>on</strong> under <strong>the</strong> DMCA, <strong>the</strong> DMCA wouldbecome an extensi<strong>on</strong> of, and overlap with, trademark law. There was no evidence that C<strong>on</strong>gressintended such an extreme outcome in enacting <strong>the</strong> DMCA. 918The court <strong>the</strong>n turned to <strong>the</strong> proper interpretati<strong>on</strong> of <strong>the</strong> definiti<strong>on</strong> of CMI, noting that <strong>the</strong>interpretati<strong>on</strong> of that definiti<strong>on</strong> was a matter of first impressi<strong>on</strong>. Although <strong>the</strong> court noted that<strong>the</strong> definiti<strong>on</strong>, read literally, seemed to apply wherever any author had affixed anything thatmight refer to his or her name, examinati<strong>on</strong> of <strong>the</strong> legislative history and o<strong>the</strong>r extrinsic sourcesc<strong>on</strong>vinced <strong>the</strong> court that <strong>the</strong> statute should be subject to a narrowing interpretati<strong>on</strong>. 919 Citing anarticle by law professor Julie Cohen 920 and <strong>the</strong> legislative history of <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treatythat led to enactment of <strong>the</strong> DMCA to implement it, <strong>the</strong> court c<strong>on</strong>cluded that protected CMIshould be limited to comp<strong>on</strong>ents of automated copyright protecti<strong>on</strong> or management systems.Specifically, WIPO was intended to protect CMI as part of a double protecti<strong>on</strong> schemefor technical measures – to allow <strong>the</strong> protecti<strong>on</strong> of copyrighted works by <strong>the</strong> applicati<strong>on</strong> oftechnical measures restricting access <strong>the</strong>reto and protecting copyright rights <strong>the</strong>rein, and toprotect <strong>the</strong> technical measures <strong>the</strong>mselves against those who would crack <strong>the</strong>m by o<strong>the</strong>rtechnologies or machines. Thus, <strong>the</strong> court found that in <strong>the</strong> framework of <strong>the</strong> WIPO treaties,technical measures such as CMI were viewed as comp<strong>on</strong>ents of automated copyright protecti<strong>on</strong>systems. 921 This same understanding of CMI was embodied in <strong>the</strong> White Paper of <strong>the</strong>Informati<strong>on</strong> Infrastructure Task Force released in September of 1995, which presented a draft ofSecti<strong>on</strong>s 1201 and 1202, and noted that systems for managing rights in works were beingc<strong>on</strong>templated in <strong>the</strong> development of <strong>the</strong> nati<strong>on</strong>al informati<strong>on</strong> infrastructure to serve <strong>the</strong> functi<strong>on</strong>sof tracking and m<strong>on</strong>itoring uses of copyrighted works as well as licensing of rights andindicating attributi<strong>on</strong>, creati<strong>on</strong> and ownership interests. To implement <strong>the</strong>se rights managementfuncti<strong>on</strong>s, <strong>the</strong> White Paper noted that informati<strong>on</strong> would likely be included in an “electr<strong>on</strong>icenvelope” c<strong>on</strong>taining a digital versi<strong>on</strong> of a work to provide informati<strong>on</strong> regarding authorship,copyright ownership, date of creati<strong>on</strong> or last modificati<strong>on</strong>, and terms and c<strong>on</strong>diti<strong>on</strong>s ofauthorized uses. 922From this <strong>the</strong> court c<strong>on</strong>cluded <strong>the</strong> White Paper dem<strong>on</strong>strated that <strong>the</strong> Working Group <strong>on</strong>Intellectual Property Rights, in drafting Secti<strong>on</strong> 1202, “understood this secti<strong>on</strong> to protect <strong>the</strong>integrity of automated copyright management systems functi<strong>on</strong>ing within a computer network917918919920921922Id. at 592.Id.Id. at 593.Julie E. Cohen, “<str<strong>on</strong>g>Copyright</str<strong>on</strong>g> and The Jurisprudence of Self-Help,” 13 Berkeley Tech. L.J. 1089 (1998).409 F. Supp. 2d at 593-95.Id. at 594-95.- 205 -


envir<strong>on</strong>ment,” and that this interpretati<strong>on</strong> was c<strong>on</strong>firmed by c<strong>on</strong>temporaneous commentary <strong>on</strong><strong>the</strong> draft provisi<strong>on</strong>. 923 Secti<strong>on</strong>s 1201 and 1202 underwent no significant revisi<strong>on</strong> betweendrafting in 1995 and enactment in 1998. 924The court noted that this interpretati<strong>on</strong> of Secti<strong>on</strong> 1202 made sense because it fit Secti<strong>on</strong>1201 with Secti<strong>on</strong> 1202, and with chapter 12 of <strong>the</strong> DMCA as a whole. “Chapter 12, as a whole,appears to protect automated systems which protect and manage copyrights. The systems<strong>the</strong>mselves are protected by § 1201 and <strong>the</strong> copyright informati<strong>on</strong> used in <strong>the</strong> functi<strong>on</strong>ing of <strong>the</strong>systems is protect in § 1202. … Secti<strong>on</strong> 1202 operates to protect copyright by protecting a keycomp<strong>on</strong>ent of some of <strong>the</strong>se technological measures. It should not be c<strong>on</strong>strued to covercopyright management performed by people, which is covered by <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act, as itpreceded <strong>the</strong> DMCA; it should be c<strong>on</strong>strued to protect copyright management performed by <strong>the</strong>technological measures of automated systems.” 925In sum, <strong>the</strong> court ruled that “[t]o come within § 1202, <strong>the</strong> informati<strong>on</strong> removed mustfuncti<strong>on</strong> as a comp<strong>on</strong>ent of an automated copyright protecti<strong>on</strong> or management system.” 926 Thecourt found no evidence that IQ intended that an automated system would use its logo orhyperlink to manage copyrights, nor that <strong>the</strong> logo or hyperlink performed such a functi<strong>on</strong>.Accordingly, <strong>the</strong> logo and hyperlink did not fall within <strong>the</strong> definiti<strong>on</strong> of CMI, and <strong>the</strong> courtgranted summary judgment for Wiesner <strong>on</strong> IQ’s CMI claim. 927(ii)McClatchey v. The Associated PressThe court in McClatchey v. The Associated Press 928 rejected <strong>the</strong> ruling of <strong>the</strong> IQ Groupcourt that CMI must functi<strong>on</strong> as a comp<strong>on</strong>ent of an automated copyright protecti<strong>on</strong> managementsystem in order to be protected by Secti<strong>on</strong> 1202 of <strong>the</strong> DMCA. In <strong>the</strong> McClatchey case, <strong>the</strong>plaintiff was <strong>the</strong> owner of a photograph she took <strong>on</strong> <strong>the</strong> morning of Sept. 11, 2001 as sheobserved United flight 93 crash into a field near her house. The photograph, which <strong>the</strong> plaintifftitled “End of Serenity,” depicted a mushroom cloud caused by <strong>the</strong> crash, with a red barn and <strong>the</strong>rolling hills of Pennsylvania in <strong>the</strong> foreground. The plaintiff alleged that, in <strong>the</strong> course of aninterview with her, a reporter from The Associated Press took a photograph of “End of Serenity”from a binder of materials she showed <strong>the</strong> reporter, <strong>the</strong>n without authorizati<strong>on</strong> distributed <strong>the</strong>photo <strong>on</strong> <strong>the</strong> AP newswire toge<strong>the</strong>r with an accompanying article written by <strong>the</strong> reporter. 929923924925926927928929Id. at 595.Id. Although <strong>the</strong> Senate Report stated that CMI need not be in digital form, <strong>the</strong> court noted that <strong>the</strong> SenateReport gave <strong>on</strong>ly a vague idea as to what CMI was intended to be, and <strong>the</strong>re was nothing in it to suggest that<strong>the</strong> Senate Committee understood Secti<strong>on</strong> 1202 differently from <strong>the</strong> Working Group. Id. at 596.Id. at 597.Id.Id. at 597-98.2007 U.S. Dist. LEXIS 17768 (W.D. Pa. Mar. 9, 2007).Id. at *3-4.- 206 -


The plaintiff brought a claim for violati<strong>on</strong> of Secti<strong>on</strong> 1202 of <strong>the</strong> DMCA <strong>on</strong> <strong>the</strong> groundthat she had included title and copyright informati<strong>on</strong> <strong>on</strong> “End of Serenity,” which appeared in<strong>the</strong> photograph of it that <strong>the</strong> reporter took, but which was cropped out of <strong>the</strong> versi<strong>on</strong> of <strong>the</strong>photograph distributed by AP. Citing <strong>the</strong> IQ Group case, AP c<strong>on</strong>tended that Secti<strong>on</strong> 1202 wasnot applicable because <strong>the</strong> plaintiff’s copyright notice <strong>on</strong> her photograph was not “digital.” Theplaintiff testified in her depositi<strong>on</strong> that she used a computer program called “<str<strong>on</strong>g>Advanced</str<strong>on</strong>g>Brochures” in a two-step process to print <strong>the</strong> title, her name, and <strong>the</strong> copyright notice <strong>on</strong> allprintouts of her photograph. The court ruled that this technological process was sufficient tocome within a digital “copyright management system” as defined in <strong>the</strong> statute. Moreover, <strong>the</strong>court noted that Secti<strong>on</strong> 1202(c) defines CMI to include “any” of <strong>the</strong> informati<strong>on</strong> set forth in <strong>the</strong>eight categories enumerated, “including in digital form.” To avoid rendering those termsuperfluous, <strong>the</strong> court held <strong>the</strong> statute must also protect n<strong>on</strong>-digital informati<strong>on</strong>. Accordingly,<strong>the</strong> court c<strong>on</strong>cluded that <strong>the</strong> statute was applicable to <strong>the</strong> facts of <strong>the</strong> case. 930AP sought summary judgment <strong>on</strong> <strong>the</strong> CMI claim <strong>on</strong> <strong>the</strong> ground that <strong>the</strong> metadataaccompanying <strong>the</strong> photograph distributed by AP stated that <strong>the</strong> photograph was taken by <strong>the</strong>plaintiff. However, <strong>the</strong> court noted that <strong>the</strong> metadata also identified <strong>the</strong> plaintiff as a “stringer,”from which recipients could have inferred that AP owned <strong>the</strong> copyright, and that <strong>the</strong> was noclear statement notifying recipients that <strong>the</strong> plaintiff owned <strong>the</strong> copyright to “End of Serenity.”In additi<strong>on</strong>, <strong>the</strong> court noted a factual dispute c<strong>on</strong>cerning whe<strong>the</strong>r <strong>the</strong> reporter had intenti<strong>on</strong>allycropped <strong>the</strong> copyright notice out of <strong>the</strong> photograph, as <strong>the</strong> plaintiff alleged. Accordingly, <strong>the</strong>court denied AP’s moti<strong>on</strong> for summary judgment. 931(iii) Textile Secrets Int’l, Inc. v. Ya-Ya Brand Inc.In this case, <strong>the</strong> plaintiff alleged that fabrics sold by <strong>the</strong> defendants infringed <strong>the</strong>plaintiff’s copyright in its “FEATHERS” fabric design. The plaintiff also alleged that <strong>the</strong>defendants had violated <strong>the</strong> CMI provisi<strong>on</strong>s of <strong>the</strong> DMCA by removing <strong>the</strong> plaintiff’s name and<strong>the</strong> copyright symbol from <strong>the</strong> selvage (<strong>the</strong> edge or border of fabric that is intended to be cut offand discarded) of its fabrics, as well as an attached tag stating that <strong>the</strong> design was a registeredwork of <strong>the</strong> plaintiff, and <strong>the</strong>n making copies of <strong>the</strong> fabrics. The central issue in <strong>the</strong> case waswhe<strong>the</strong>r <strong>the</strong> informati<strong>on</strong> <strong>on</strong> <strong>the</strong> selvage and <strong>the</strong> tag c<strong>on</strong>stituted CMI. 932The defendants urged that, in view of <strong>the</strong> legislative history of <strong>the</strong> DMCA, <strong>the</strong> CMIprovisi<strong>on</strong>s should be c<strong>on</strong>strued to apply <strong>on</strong>ly to transacti<strong>on</strong>s <strong>on</strong> <strong>the</strong> <strong>Internet</strong> or in <strong>the</strong> electr<strong>on</strong>icmarketplace. The plaintiff argued that a plain reading of <strong>the</strong> CMI provisi<strong>on</strong>s should lead to ac<strong>on</strong>clusi<strong>on</strong> that CMI can be protected <strong>on</strong> all types of works, in both digital and n<strong>on</strong>-digitalform. 933 After an extensive survey of <strong>the</strong> history of <strong>the</strong> CMI provisi<strong>on</strong>s of <strong>the</strong> DMCA, including<strong>the</strong> White Paper of <strong>the</strong> Nati<strong>on</strong>al Informati<strong>on</strong> Infrastructure Task Force, c<strong>on</strong>gressi<strong>on</strong>al reports,and <strong>the</strong> WIPO treaties, <strong>the</strong> court ruled that <strong>the</strong> informati<strong>on</strong> <strong>on</strong> <strong>the</strong> selvage and <strong>the</strong> tag did not930931932933Id. at *4-5, 15.Id. at *15-17.Textile Secrets Int’l, Inc. v. Ya-Ya Brand Inc., 524 F. Supp. 2d 1184, 1192-93 (C.D. Cal. 2007).Id. at 1193-94.- 207 -


c<strong>on</strong>stitute CMI within <strong>the</strong> purview of <strong>the</strong> DMCA. 934 The court found <strong>the</strong> IQ Group decisi<strong>on</strong>,discussed above, influential to its decisi<strong>on</strong>, although it chose not to define <strong>the</strong> scope of CMI asdefinitively as that case did. 935 Never<strong>the</strong>less, <strong>the</strong> court was persuaded by that case that Secti<strong>on</strong>1202 should be “subject to a narrowing interpretati<strong>on</strong>” as follows:While <strong>the</strong> Court does not attempt in this decisi<strong>on</strong> to define <strong>the</strong> precise c<strong>on</strong>tours of<strong>the</strong> applicability of § 1202, <strong>the</strong> Court never<strong>the</strong>less cannot find that <strong>the</strong> provisi<strong>on</strong>was intended to apply to circumstances that have no relati<strong>on</strong> to <strong>the</strong> <strong>Internet</strong>,electr<strong>on</strong>ic commerce, automated copyright protecti<strong>on</strong>s or management systems,public registers, or o<strong>the</strong>r technological measures or processes as c<strong>on</strong>templated in<strong>the</strong> DMCA as a whole. In o<strong>the</strong>r words, although <strong>the</strong> parties do not dispute that<strong>the</strong> FEATHERS fabric c<strong>on</strong>tained [<strong>the</strong> plaintiff’s] copyright informati<strong>on</strong>, <strong>the</strong>re areno facts showing that any technological process as c<strong>on</strong>templated in <strong>the</strong> DMCAwas utilized by plaintiff in placing <strong>the</strong> copyright informati<strong>on</strong> <strong>on</strong>to <strong>the</strong>FEATHERS fabric, or that defendants employed any technological process inei<strong>the</strong>r <strong>the</strong>ir removal of <strong>the</strong> copyright informati<strong>on</strong> from <strong>the</strong> design or in <strong>the</strong>iralleged distributi<strong>on</strong> of <strong>the</strong> design. In short, <strong>the</strong> Court finds that, in light of <strong>the</strong>legislative intent behind <strong>the</strong> DMCA to facilitate electr<strong>on</strong>ic and <strong>Internet</strong>commerce, <strong>the</strong> facts of this case do not trigger § 1202. 936(iv) Jacobsen v. KatzerIn this case, <strong>the</strong> plaintiff was a leading member of <strong>the</strong> Java Model Railroad Interface(JMRI) Project, an <strong>on</strong>line, open source community that developed model train software anddistributed it under <strong>the</strong> open source Artistic License. The defendants also developed softwarefor model railroad enthusiasts. The plaintiff brought a claim under Secti<strong>on</strong> 1201(b), alleging that<strong>the</strong> JMRI Project Decoder Definiti<strong>on</strong> Files distributed by <strong>the</strong> JMRI and used by <strong>the</strong> defendantsc<strong>on</strong>stituted CMI and that by removing some of <strong>the</strong> informati<strong>on</strong> in <strong>the</strong> files and making copies of<strong>the</strong> files, <strong>the</strong> defendants had violated Secti<strong>on</strong> 1201(b). The defendants brought a moti<strong>on</strong> todismiss <strong>the</strong> claim. 937The informati<strong>on</strong> in <strong>the</strong> files that <strong>the</strong> plaintiff claimed c<strong>on</strong>stituted CMI were <strong>the</strong> author’sname, a title, a reference to <strong>the</strong> license and where to find <strong>the</strong> license, a copyright notice, and <strong>the</strong>934935936937Id. at 1194-99.Id. at 1202 n.17 (“The Court is not attempting to define or specify what types of n<strong>on</strong>-digital works are covered.Ra<strong>the</strong>r, under <strong>the</strong> particular facts of this case – that is, in <strong>the</strong> absence of any facts dem<strong>on</strong>strating that atechnological process was utilized in c<strong>on</strong>necti<strong>on</strong> with ei<strong>the</strong>r applying <strong>the</strong> copyright informati<strong>on</strong> to <strong>the</strong> fabric orin removing such informati<strong>on</strong> or in subsequently distributing <strong>the</strong> design – <strong>the</strong> Court is not persuaded that <strong>the</strong>copyright informati<strong>on</strong> <strong>on</strong> <strong>the</strong> FEATHERS fabric warrants coverage by <strong>the</strong> DMCA.”) (emphasis in original) &1203 n.18 (“Although <strong>the</strong> Court is persuaded to some extent by <strong>the</strong> reas<strong>on</strong>ing set forth in <strong>the</strong> IQ Groupdecisi<strong>on</strong>, <strong>the</strong> Court does not find it necessary to define <strong>the</strong> scope of § 1202 as definitively as <strong>the</strong> IQ Group courtdid (i.e., that <strong>the</strong> provisi<strong>on</strong> applies <strong>on</strong>ly to copyright management informati<strong>on</strong> that functi<strong>on</strong>s ‘as a comp<strong>on</strong>ent ofan automated copyright protecti<strong>on</strong> or management system’).”) (quoting IQ Group, 409 F. Supp. 2d at 598).Id. at 1201-02.Jacobsen v. Katzer, 609 F. Supp. 2d 925, 928 & 934 (N.D. Cal. Jan. 5, 2009).- 208 -


copyright owner. The plaintiff alleged that he used a software script to automate addingcopyright notices and informati<strong>on</strong> regarding <strong>the</strong> license and uploaded <strong>the</strong> files <strong>on</strong> <strong>the</strong> <strong>Internet</strong>through Source-Forge.net, and that <strong>the</strong> defendants downloaded <strong>the</strong> files and removed <strong>the</strong> namesof <strong>the</strong> authors and copyright holder, title, reference to <strong>the</strong> license, where to find <strong>the</strong> license and<strong>the</strong> copyright notices, and instead, renamed <strong>the</strong> files and referred to <strong>the</strong>ir own copyright noticeand named <strong>the</strong>mselves as author and copyright owner. The court denied <strong>the</strong> moti<strong>on</strong> to dismiss.It cited <strong>the</strong> IQ Group case’s holding that <strong>the</strong> statute should be c<strong>on</strong>strued to protect CMIperformed by <strong>the</strong> technology measures of automated systems, but found that <strong>the</strong> complaintalleged <strong>the</strong>re had been some technological process engaged to protect <strong>the</strong> informati<strong>on</strong> insertedinto <strong>the</strong> files. Thus, absent fur<strong>the</strong>r discovery, <strong>the</strong> court found it inappropriate to dismiss <strong>the</strong> CMIclaim. 938 (v) Associated Press v. All Headline News Corp.In this case, <strong>the</strong> defendant ga<strong>the</strong>red news stories <strong>on</strong> <strong>the</strong> <strong>Internet</strong>, including those of <strong>the</strong>Associated Press, and prepared <strong>the</strong>m for republicati<strong>on</strong> by its customer sites under its own banner,ei<strong>the</strong>r rewriting <strong>the</strong> text or copying <strong>the</strong> stories in full. It instructed its reporters to remove or alter<strong>the</strong> identificati<strong>on</strong> of <strong>the</strong> AP as author or copyright holder of <strong>the</strong> articles. AP brought a claim forcomm<strong>on</strong> law “hot news” misappropriati<strong>on</strong> and for violati<strong>on</strong> of Secti<strong>on</strong> 1202. The defendantbrought a moti<strong>on</strong> to dismiss <strong>the</strong> claims, which <strong>the</strong> court denied. With respect to <strong>the</strong> CMI claim,<strong>the</strong> court rejected <strong>the</strong> IQ Group court’s definiti<strong>on</strong> of CMI as limited to copyright managementperformed by <strong>the</strong> technological measures of automated systems. The court found that definiti<strong>on</strong>to be inc<strong>on</strong>sistent with <strong>the</strong> text of <strong>the</strong> statutory definiti<strong>on</strong>, which makes no reference to “<strong>the</strong>technological measures of automated systems.” Accordingly, <strong>the</strong> court denied <strong>the</strong> moti<strong>on</strong> todismiss <strong>the</strong> CMI claim. 939(vi) Silver v. LavadeiraThe plaintiff published certain news reports <strong>on</strong> her web site and placed her name within<strong>the</strong> reports. The plaintiff alleged that <strong>the</strong> defendant copied certain informati<strong>on</strong> from her reportsand violated Secti<strong>on</strong> 1202 by omitting her name from <strong>the</strong> copied material. The court ruled,based <strong>on</strong> IQ Group, that CMI is limited to comp<strong>on</strong>ents of technological measures functi<strong>on</strong>ing asautomated systems, and that <strong>the</strong> plaintiff’s name did not c<strong>on</strong>stitute CMI because she had notalleged that an automated technological system was resp<strong>on</strong>sible for <strong>the</strong> inclusi<strong>on</strong> of her name in<strong>the</strong> news reports. 940(vii) Fox v. HildebrandIn this case, <strong>the</strong> court rejected <strong>the</strong> Ya Ya Brand and IQ Group cases, ruling that CMI isnot limited to notices that are digitally placed <strong>on</strong> a copyrighted work. The court found that <strong>the</strong>938939940Id. at 934.Associated Press v. All Headline News Corp., 608 F. Supp. 2d 454, 457 & 461-62 (S.D.N.Y. 2009).Report and Recommendati<strong>on</strong>, Silver v. Lavandeira, No. 08 Civ. 6522 (JSR) (DF) at pp. 2-3 (S.D.N.Y. Jan. 7,2009) (recommendati<strong>on</strong> of magistrate judge), adopted in its entirety by <strong>the</strong> district court in Silver v. Lavandeira,2009 U.S. Dist. LEXIS 15491 at *3 (S.D.N.Y. Feb. 26, 2009).- 209 -


eference to “including in digital form” in <strong>the</strong> statutory definiti<strong>on</strong> of CMI in Secti<strong>on</strong> 1202(c)indicated that <strong>the</strong> definiti<strong>on</strong> was not limited to notices in digital form. Accordingly, <strong>the</strong>plaintiff’s allegati<strong>on</strong> that <strong>the</strong> defendant had copied <strong>the</strong> plaintiff’s architectural drawings, <strong>on</strong>which <strong>the</strong> plaintiff had handwritten a copyright notice, and err<strong>on</strong>eously designated itself as <strong>the</strong>copyright owner <strong>on</strong> <strong>the</strong> copied drawings, stated a claim under Secti<strong>on</strong> 1202(b) of <strong>the</strong> DMCAsufficient to survive <strong>the</strong> defendant’s moti<strong>on</strong> to dismiss. 941(viii) Jacobsen v. KatzerIn this case, <strong>the</strong> plaintiff was <strong>the</strong> owner of copyright in certain “Decoder Definiti<strong>on</strong> TextFiles” used in c<strong>on</strong>necti<strong>on</strong> with open source model train software developed under <strong>the</strong> JavaModel Railroad Interface (JMRI) Project. The Decoder Definiti<strong>on</strong> Text Files included certainattributi<strong>on</strong> informati<strong>on</strong> that <strong>the</strong> plaintiff alleged c<strong>on</strong>stituted CMI: <strong>the</strong> author’s name, a title, areference to <strong>the</strong> applicable open source license and where to find <strong>the</strong> license, a copyright notice,and <strong>the</strong> copyright owner. The plaintiff alleged that <strong>the</strong> defendant’s copying of <strong>the</strong> DecoderDefiniti<strong>on</strong> Text Files from <strong>the</strong> JMRI web site and removal of such informati<strong>on</strong> violated <strong>the</strong>DMCA’s CMI provisi<strong>on</strong>s. 942Citing <strong>the</strong> IQ Group and McClatchey decisi<strong>on</strong>s, <strong>the</strong> court noted that <strong>the</strong> DMCA protects<strong>on</strong>ly “CMI performed by <strong>the</strong> technological measures of automated systems.” 943 The plaintiffalleged that he used a software script to automate adding copyright notices and informati<strong>on</strong>regarding <strong>the</strong> license and uploaded <strong>the</strong> files <strong>on</strong> <strong>the</strong> <strong>Internet</strong> through SourceForge.net, and that <strong>the</strong>defendants had downloaded <strong>the</strong> files and removed <strong>the</strong> names of <strong>the</strong> authors and copyright holder,title, reference to license, where to find <strong>the</strong> license and <strong>the</strong> copyright notice, and had renamed <strong>the</strong>files and referred to <strong>the</strong>ir own copyright notice and named <strong>the</strong>mselves as author and copyrightowner. 944 The court found, based <strong>on</strong> <strong>the</strong> allegati<strong>on</strong>s in <strong>the</strong> complaint, that <strong>the</strong>re had been sometechnological process employed to protect <strong>the</strong> attributi<strong>on</strong> informati<strong>on</strong> in <strong>the</strong> Decoder Definiti<strong>on</strong>Text Files. Fur<strong>the</strong>r, <strong>the</strong>re was no dispute that <strong>the</strong> defendants had employed a tool to translate <strong>the</strong>JMRI files to a format for <strong>the</strong>ir own use without copying this attributi<strong>on</strong> informati<strong>on</strong>.Accordingly, <strong>the</strong> court granted summary judgment to <strong>the</strong> plaintiff that <strong>the</strong> attributi<strong>on</strong> informati<strong>on</strong>c<strong>on</strong>stituted CMI protected by <strong>the</strong> DMCA. However because <strong>the</strong>re remained disputed issues offact regarding <strong>the</strong> defendants’ knowledge and intent, <strong>the</strong> court denied <strong>the</strong> plaintiff’s moti<strong>on</strong> forsummary judgment <strong>on</strong> liability under <strong>the</strong> CMI provisi<strong>on</strong>s of <strong>the</strong> DMCA. 945(ix) Murphy v. Millennium Radio Group LLCIn this case, <strong>the</strong> court held that photo credits appearing in <strong>the</strong> gutter of a magazine photo,did not c<strong>on</strong>stitute CMI. The defendant scanned a print copy of <strong>the</strong> plaintiff’s copyrighted photoand <strong>the</strong>n posted <strong>the</strong> image <strong>on</strong> a radio stati<strong>on</strong> web site. No copyright notice appeared <strong>on</strong> <strong>the</strong> print941942943944945Fox v. Hildebrand, 2009 U.S. Dist. LEXIS 60886 at *2, 5-8 (C.D. Cal. July 1, 2009).Id. at *2 & *19-20.Id. at *20.Id. at *20-21.Id. at *21.- 210 -


copy and <strong>the</strong> scanned copy did not reproduce <strong>the</strong> photo credits in <strong>the</strong> gutter. The court agreedwith <strong>the</strong> reas<strong>on</strong>ing of <strong>the</strong> IQ Group case and held that <strong>the</strong> photo credits were in no way acomp<strong>on</strong>ent of an automated copyright protecti<strong>on</strong> or management systems and <strong>the</strong>refore did notqualify as CMI protected under <strong>the</strong> DMCA. 946(2) Prohibiti<strong>on</strong>s <strong>on</strong> False CMI or Altering CMISecti<strong>on</strong> 1202(a) prohibits any pers<strong>on</strong> from knowingly providing CMI that is false ordistributing or importing for public distributi<strong>on</strong> CMI that is false, with <strong>the</strong> intent to induce,enable, facilitate, or c<strong>on</strong>ceal infringement. Secti<strong>on</strong> 1202(b) prohibits any pers<strong>on</strong> fromintenti<strong>on</strong>ally removing or altering any CMI, distributing or importing for distributi<strong>on</strong> CMIknowing that it has been altered or removed, or distributing, importing for distributi<strong>on</strong>, orpublicly performing works in which CMI has been removed or altered, in all cases knowing, or,with respect to civil remedies under Secti<strong>on</strong> 1203, having reas<strong>on</strong>able grounds to know, that itwill induce, enable, facilitate, or c<strong>on</strong>ceal infringement.(i)Thomas M Gilbert Architects v. Accent BuildersIn Thomas M. Gilbert Architects, P.C. v. Accent Builders & Developers, LLC, 947 <strong>the</strong>court granted summary judgment in favor of <strong>the</strong> defendant <strong>on</strong> a claim under Secti<strong>on</strong> 1202(b) forremoval of a copyright notice from <strong>the</strong> plaintiff’s architectural plans. The court found noevidence to show that <strong>the</strong> defendant intenti<strong>on</strong>ally removed <strong>the</strong> notice, or that he had reas<strong>on</strong> toknow that its removal would induce, enable, facilitate, or c<strong>on</strong>ceal infringement. The defendanttestified that he was unfamiliar with copyright law and did not recall seeing <strong>the</strong> copyright noticewhen he modified <strong>the</strong> plaintiff’s plans. Accordingly, because <strong>the</strong> plaintiff had made no showingof <strong>the</strong> required intent, <strong>the</strong> court granted summary judgment in <strong>the</strong> defendant’s favor. 948(3) Excepti<strong>on</strong>s and Limitati<strong>on</strong>sSecti<strong>on</strong>s 1202(d) provides an excepti<strong>on</strong> for law enforcement, intelligence, andinformati<strong>on</strong> security activities. Secti<strong>on</strong> 1202(e) limits <strong>the</strong> liability of pers<strong>on</strong>s for violati<strong>on</strong>s in<strong>the</strong> course of analog transmissi<strong>on</strong>s by broadcast stati<strong>on</strong>s or cable systems if avoiding <strong>the</strong> activitythat c<strong>on</strong>stitutes a violati<strong>on</strong> of <strong>the</strong> CMI integrity provisi<strong>on</strong>s is not technically feasible or wouldcreate an undue financial hardship.946947948Murphy v. Millennium Radio Group LLC, 2010 U.S. Dist. LEXIS 32631 (D.N.J. Mar. 31, 2010) at *2-3 & 8-9.629 F. Supp. 2d 526 (E.D. Va. 2008).Id. at 537.- 211 -


(4) Cases Filed Under <strong>the</strong> CMI Provisi<strong>on</strong>s(i)Kelly v. Arriba Soft Corp.The first case under <strong>the</strong> CMI provisi<strong>on</strong>s was Kelly v. Arriba Soft Corp. 949 In that case,<strong>the</strong> defendant was <strong>the</strong> operator of a “visual search engine” <strong>on</strong> <strong>the</strong> <strong>Internet</strong> that allowed users tosearch for and retrieve images. In resp<strong>on</strong>se to a search query, <strong>the</strong> search engine produced a listof reduced, “thumbnail” pictures. By clicking <strong>on</strong> <strong>the</strong> desired thumbnail, a user could view an“image attributes” window displaying <strong>the</strong> full-size versi<strong>on</strong> of <strong>the</strong> image, a descripti<strong>on</strong> of itsdimensi<strong>on</strong>s, and an address for <strong>the</strong> website where it originated. By clicking <strong>on</strong> <strong>the</strong> address, <strong>the</strong>user could link to <strong>the</strong> originating website for <strong>the</strong> image. 950The search engine maintained an indexed database of approximately two milli<strong>on</strong>thumbnail images obtained through <strong>the</strong> operati<strong>on</strong> of a web crawler that traveled <strong>the</strong> Web insearch of images to be c<strong>on</strong>verted into thumbnails and added to <strong>the</strong> index. The defendant’semployees c<strong>on</strong>ducted a final screening to rank <strong>the</strong> most relevant thumbnails and eliminateinappropriate images. The plaintiff was <strong>the</strong> owner of <strong>the</strong> copyright in about 35 photographs thatwere indexed by <strong>the</strong> crawler and put in <strong>the</strong> defendant’s database. The plaintiff sued <strong>the</strong>defendant for copyright infringement, alleging that storage of <strong>the</strong> images in <strong>the</strong> databasec<strong>on</strong>stituted a direct infringement, as well as a violati<strong>on</strong> of <strong>the</strong> CMI provisi<strong>on</strong>s of <strong>the</strong> DMCA. 951The court ruled that <strong>the</strong> defendant’s use of <strong>the</strong> images in thumbnail form c<strong>on</strong>stituted a fair use,and that <strong>the</strong>re was no violati<strong>on</strong> of <strong>the</strong> CMI provisi<strong>on</strong>s of <strong>the</strong> DMCA. 952The plaintiff argued that <strong>the</strong> defendant violated <strong>the</strong> CMI provisi<strong>on</strong>s of <strong>the</strong> DMCA bydisplaying thumbnails of <strong>the</strong> plaintiff’s images without displaying <strong>the</strong> corresp<strong>on</strong>ding CMIc<strong>on</strong>sisting of standard copyright notices in <strong>the</strong> surrounding text accompanying <strong>the</strong> photographs<strong>on</strong> <strong>the</strong> plaintiff’s website from which <strong>the</strong> crawler obtained <strong>the</strong> photographs. Because <strong>the</strong>senotices did not appear in <strong>the</strong> images <strong>the</strong>mselves, <strong>the</strong> crawler did not include <strong>the</strong>m when itindexed <strong>the</strong> images. As a result, <strong>the</strong> images appeared in <strong>the</strong> defendant’s index without <strong>the</strong> CMI,and any users retrieving <strong>the</strong> images through <strong>the</strong> search engine would not see <strong>the</strong> CMI. 953The court rejected this claim, holding that Secti<strong>on</strong> 1202(b)(1) (which prohibitsintenti<strong>on</strong>ally removing or altering CMI) “applies <strong>on</strong>ly to <strong>the</strong> removal of copyright managementinformati<strong>on</strong> <strong>on</strong> a plaintiff’s product or original work.” 954 The court also ruled that even ifSecti<strong>on</strong> 1202(b)(1) did apply, <strong>the</strong> plaintiff had not offered any evidence showing that <strong>the</strong>defendant’s acti<strong>on</strong>s were intenti<strong>on</strong>al, ra<strong>the</strong>r than merely an unintended side effect of <strong>the</strong>94995095195295395453 U.S.P.Q.2d 1361 (C.D. Cal. 1999), aff’d in part and rev’d in part <strong>on</strong> o<strong>the</strong>r grounds, 336 F.3d 811 (9th Cir.2003).Id. at 1362.Id.Id. at 1363-67.Id. at 1366.Id.- 212 -


crawler’s operati<strong>on</strong>. 955 The court found that <strong>the</strong> more applicable provisi<strong>on</strong> was that of Secti<strong>on</strong>1202(b)(3), which prohibits distributi<strong>on</strong> of copies of works knowing that CMI has been removedor altered without authority of <strong>the</strong> copyright owner or <strong>the</strong> law, knowing or having reas<strong>on</strong> toknow that it will induce, enable, facilitate, or c<strong>on</strong>ceal an infringement. The court also found noviolati<strong>on</strong> of this secti<strong>on</strong>, however, because users who clicked <strong>on</strong> <strong>the</strong> thumbnail versi<strong>on</strong> of <strong>the</strong>images were given a full-sized versi<strong>on</strong>, toge<strong>the</strong>r with <strong>the</strong> name of <strong>the</strong> website from which <strong>the</strong>image was obtained (and an opportunity to link <strong>the</strong>re), where any associated CMI would beavailable. 956 “Users were also informed <strong>on</strong> Defendant’s Web site that use restricti<strong>on</strong>s andcopyright limitati<strong>on</strong>s may apply to images retrieved by Defendant’s search engine.” 957 Based <strong>on</strong><strong>the</strong>se facts, <strong>the</strong> court c<strong>on</strong>cluded that <strong>the</strong> defendant did not have “reas<strong>on</strong>able grounds to know”under Secti<strong>on</strong> 1202(b)(3) that it would cause its users to infringe <strong>the</strong> plaintiff’s copyrights:Plaintiff’s images are vulnerable to copyright infringement because <strong>the</strong>y aredisplayed <strong>on</strong> Web sites. Plaintiff has not shown users of Defendant’s site wereany more likely to infringe his copyrights, any of <strong>the</strong>se users did infringe, orDefendant should reas<strong>on</strong>ably have expected infringement. 958Accordingly, <strong>the</strong> court c<strong>on</strong>cluded that <strong>the</strong>re had been no violati<strong>on</strong> of <strong>the</strong> DMCA.(ii)Thr<strong>on</strong> v. Harper Collins PublishersIn Thr<strong>on</strong> v. Harper Collins Publishers, 959 <strong>the</strong> plaintiff alleged that <strong>the</strong> defendantmisappropriated two of his allegedly copyrighted photographs for use in a book published by <strong>the</strong>defendant. The plaintiff fur<strong>the</strong>r c<strong>on</strong>tended that <strong>the</strong> defendant’s subsequent efforts to publicize<strong>the</strong> book through <strong>the</strong> <strong>Internet</strong> violated <strong>the</strong> CMI provisi<strong>on</strong>s of <strong>the</strong> DMCA because <strong>the</strong> plaintiffhad provided Amaz<strong>on</strong>.com with a digital image of <strong>on</strong>e of <strong>the</strong> photographs that was allegedlyimpermissibly altered to remove certain unspecified informati<strong>on</strong> related to <strong>the</strong> plaintiff’scopyright registrati<strong>on</strong>. The court rejected this claim because <strong>the</strong> plaintiff’s copyright registrati<strong>on</strong>was itself invalid and because <strong>the</strong> plaintiff had submitted no competent, admissible evidence tosupport any finding that <strong>the</strong> defendant removed or altered <strong>the</strong> informati<strong>on</strong> intenti<strong>on</strong>ally, asrequired by <strong>the</strong> statute.(iii) Gord<strong>on</strong> v. Nextel Communicati<strong>on</strong>sIn Gord<strong>on</strong> v. Nextel Communicati<strong>on</strong>s, 960 <strong>the</strong> plaintiff brought suit against Nextel and itsadvertising agency for copyright infringement for <strong>the</strong> unauthorized use of several of his dentalillustrati<strong>on</strong>s in a televisi<strong>on</strong> commercial for Nextel’s two-way text message. The plaintiff alsoclaimed a violati<strong>on</strong> of <strong>the</strong> CMI provisi<strong>on</strong>s of <strong>the</strong> DMCA based <strong>on</strong> alleged removal of <strong>the</strong>955956957958959960Id.Id.Id.Id. at 1367.64 U.S.P.Q.2d 1221 (S.D.N.Y. 2002).68 U.S.P.Q.2d 1369 (6th Cir. 2003).- 213 -


copyright notice from <strong>the</strong> illustrati<strong>on</strong>s. The district court granted summary judgment <strong>on</strong> <strong>the</strong> CMIclaims <strong>on</strong> <strong>the</strong> ground that <strong>the</strong> plaintiff failed to present any evidence that <strong>the</strong> defendantsintenti<strong>on</strong>ally removed or altered <strong>the</strong> copyright informati<strong>on</strong> or that <strong>the</strong> defendants knew that <strong>the</strong>copyright informati<strong>on</strong> had been removed. 961On appeal, <strong>the</strong> Sixth Circuit affirmed. The decisi<strong>on</strong> is important because <strong>the</strong> SixthCircuit ruled for <strong>the</strong> first time that vicarious liability may apply with respect to violati<strong>on</strong>s of <strong>the</strong>CMI provisi<strong>on</strong>s (<strong>the</strong> rati<strong>on</strong>ale of <strong>the</strong> holding would presumably also apply to <strong>the</strong> anticircumventi<strong>on</strong>provisi<strong>on</strong>s of <strong>the</strong> DMCA). In particular, <strong>the</strong> court held that, regardless of <strong>the</strong>defendants’ actual knowledge of <strong>the</strong> removal or alterati<strong>on</strong> of <strong>the</strong> copyright informati<strong>on</strong>, <strong>the</strong>ycould be held vicariously liable if, just as in <strong>the</strong> case of ordinary infringement, <strong>the</strong>y had <strong>the</strong> rightand ability to supervise <strong>the</strong> c<strong>on</strong>duct c<strong>on</strong>stituting <strong>the</strong> violati<strong>on</strong> and <strong>the</strong>y had an obvious and directfinancial interest in <strong>the</strong> c<strong>on</strong>duct. 962The court noted that, although <strong>the</strong> record was not clear in this regard, it was reas<strong>on</strong>able toinfer that <strong>the</strong> advertising agency retained <strong>the</strong> ability to supervise <strong>the</strong> development of <strong>the</strong>commercial. And both defendants had direct financial interests in <strong>the</strong> exploitati<strong>on</strong> of <strong>the</strong>copyrighted materials. As a result, <strong>the</strong> court ruled that, even though <strong>the</strong> CMI provisi<strong>on</strong>s require<strong>the</strong> intenti<strong>on</strong>al removal of CMI or <strong>the</strong> distributi<strong>on</strong> of copies of works “knowing” that CMI hasbeen removed or altered, “it is inappropriate to permit summary judgment to be granted based <strong>on</strong><strong>the</strong> defendants’ lack of actual knowledge of <strong>the</strong> removal of <strong>the</strong> copyright managementinformati<strong>on</strong> when <strong>the</strong>y may be vicariously liable for its removal.” 963 Thus, although <strong>the</strong> plaintiffhad to prove that <strong>the</strong> direct violators of <strong>the</strong> CMI provisi<strong>on</strong>s possessed actual knowledge of <strong>the</strong>unauthorized change to <strong>the</strong> CMI, <strong>the</strong> plaintiff need not prove that Nextel and its advertisingagency, as vicarious infringers, had such knowledge.Ultimately, however, <strong>the</strong> Sixth Circuit affirmed <strong>the</strong> district court’s grant of summaryjudgment to <strong>the</strong> defendants <strong>on</strong> <strong>the</strong> ground that, even if <strong>the</strong> pers<strong>on</strong>s from whom <strong>the</strong> advertisingagency had obtained <strong>the</strong> material c<strong>on</strong>taining <strong>the</strong> illustrati<strong>on</strong>s up<strong>on</strong> which <strong>the</strong> commercial wasbased had removed <strong>the</strong> copyright informati<strong>on</strong> from <strong>the</strong> illustrati<strong>on</strong>s, those pers<strong>on</strong>s testifiedwithout c<strong>on</strong>tradicti<strong>on</strong> that <strong>the</strong>y believed <strong>the</strong> materials had been authorized for use in televisi<strong>on</strong>commercials. Accordingly, such removal was not d<strong>on</strong>e with reas<strong>on</strong>able grounds to know that itwould “induce, enable, facilitate, or c<strong>on</strong>ceal an infringement,” as required by Secti<strong>on</strong> 1202(b). 964(iv) Schiffer Publishing, Ltd. v. Chr<strong>on</strong>icle Books, LLCIn Schiffer Publishing, Ltd. v. Chr<strong>on</strong>icle Books, LLC, 965 <strong>the</strong> plaintiffs owned copyrightsin various photographs of fabrics, which <strong>the</strong> defendants allegedly infringed by scanning intodigital form for inclusi<strong>on</strong> into a book published by <strong>the</strong> defendants titled 1000 Fabrics. The961962963964965Id. at 1370.Id. at 1371.Id. at 1372.Id. at 1373.73 U.S.P.Q.2d 1090 (E.D. Pa. 2004).- 214 -


plaintiffs also alleged that <strong>the</strong> defendants had violated Secti<strong>on</strong>s 1202(a) and (b) by falselynaming <strong>the</strong>mselves as <strong>the</strong> copyright holders of <strong>the</strong> pictures published in 1000 Patterns and by“removing” <strong>the</strong> plaintiffs’ copyright notices from those pictures. 966The court found no violati<strong>on</strong> of <strong>the</strong> CMI provisi<strong>on</strong>s of <strong>the</strong> DMCA. The court noted thatto recover for a violati<strong>on</strong> of Secti<strong>on</strong> 1202(a), a plaintiff must prove that <strong>the</strong> defendant knew <strong>the</strong>CMI <strong>on</strong> a distributed work was false and distributed <strong>the</strong> false CMI with <strong>the</strong> intent to aidinfringement. The court ruled that <strong>the</strong> plaintiffs had not shown that <strong>the</strong> defendants possessed <strong>the</strong>requisite knowledge or intent to violate <strong>the</strong> relevant copyrights. Although <strong>the</strong>re was evidence attrial that <strong>the</strong> defendants instructed its employees to avoid using too many series of page imagesfrom any single book c<strong>on</strong>taining <strong>the</strong> plaintiffs’ photographs, <strong>the</strong> court found <strong>the</strong> evidenceindicated <strong>on</strong>ly that <strong>the</strong> defendants knew <strong>the</strong> plaintiffs had copyrights in <strong>the</strong>ir books ascompilati<strong>on</strong>s, not that <strong>the</strong>y knew <strong>the</strong> individual photographs c<strong>on</strong>tained <strong>the</strong>rein were copyrightprotected. O<strong>the</strong>r evidence at trial suggested that <strong>the</strong> defendants err<strong>on</strong>eously believed <strong>the</strong>plaintiffs had no copyright in <strong>the</strong>ir individual photographs because <strong>the</strong>y c<strong>on</strong>tained insufficientcreativity. Accordingly, <strong>the</strong> intent requirement of Secti<strong>on</strong> 1202(a) was not met. 967The court also found no violati<strong>on</strong> of Secti<strong>on</strong> 1201(b) because <strong>the</strong> <strong>on</strong>ly CMI <strong>the</strong> plaintiffsincluded with <strong>the</strong>ir work were notices of copyright that appeared <strong>on</strong> <strong>the</strong> inside covers of <strong>the</strong>irbooks. The individual photographs that were <strong>the</strong> subject of <strong>the</strong> acti<strong>on</strong> did not c<strong>on</strong>tain any CMIwhatsoever, ei<strong>the</strong>r <strong>on</strong> or near <strong>the</strong> images <strong>the</strong>mselves. The court ruled that to establish a violati<strong>on</strong>of Secti<strong>on</strong> 1202(b), <strong>the</strong> defendants must remove CMI from <strong>the</strong> body of, or area around, <strong>the</strong>plaintiffs’ work. Because <strong>the</strong> plaintiffs had failed to dem<strong>on</strong>strate <strong>the</strong> defendants had d<strong>on</strong>e so, <strong>the</strong>claim for violati<strong>on</strong> of Secti<strong>on</strong> 1202(b) failed. 968(v)M<strong>on</strong>otype Imaging, Inc. v. Bitstream Inc.In M<strong>on</strong>otype Imaging, Inc. v. Bitstream Inc., 969 <strong>the</strong> court adopted a ra<strong>the</strong>r broad readingof <strong>the</strong> scope of <strong>the</strong> CMI provisi<strong>on</strong>s. The plaintiff M<strong>on</strong>otype developed and distributed f<strong>on</strong>ts andf<strong>on</strong>t software. The defendant Bitstream competed with M<strong>on</strong>otype, and developed a productcalled TrueDoc, a computer program that facilitated <strong>the</strong> display of typeface designs <strong>on</strong> computerscreens and o<strong>the</strong>r output devices. Bitstream openly promoted <strong>the</strong> fact that TrueDoc replicated<strong>the</strong> original typefaces of o<strong>the</strong>r vendors. TrueDoc included a Character Shape Recorder (CSR)comp<strong>on</strong>ent that created a compact file format called a Portable F<strong>on</strong>t Resource (PFR) based <strong>on</strong> anunderlying f<strong>on</strong>t software program. The CSR obtained data that described <strong>the</strong> shape of <strong>the</strong>typeface characters of <strong>the</strong> underlying f<strong>on</strong>t program from <strong>the</strong> computer’s operating system. Whenaccessing informati<strong>on</strong> from <strong>the</strong> operating system about <strong>the</strong> f<strong>on</strong>t software, TrueDoc did notrequest <strong>the</strong> copyright notice from <strong>the</strong> Windows operating system. 970 M<strong>on</strong>otype brought a claimfor copyright infringement, apparently based <strong>on</strong> alleged copying of M<strong>on</strong>otype’s f<strong>on</strong>t software in966967968969970Id. at 1101.Id. at 1102.Id.2005 U.S. Dist. LEXIS 7410 (N.D. Ill. Apr. 21, 2005).Id. at *2-3.- 215 -


<strong>the</strong> course of creating PFR’s that would work with TrueDoc, as well as a claim for violati<strong>on</strong> of<strong>the</strong> CMI provisi<strong>on</strong>s. Bitstream moved for summary judgment.M<strong>on</strong>otype claimed that TrueDoc’s failure to copy <strong>the</strong> copyright notice from its f<strong>on</strong>tsoftware programs violated <strong>the</strong> CMI provisi<strong>on</strong>s of <strong>the</strong> DMCA because it was virtually identicalto removing <strong>the</strong> copyright notice. The court agreed with M<strong>on</strong>otype that <strong>the</strong> plain language of <strong>the</strong>DMCA does not require that TrueDoc, itself, physically remove <strong>the</strong> copyright notices from <strong>the</strong>M<strong>on</strong>otype f<strong>on</strong>t software in creating <strong>the</strong> PFR files. Thus, <strong>the</strong> court ruled that <strong>the</strong> mere fact thatTrueDoc did not “remove” <strong>the</strong> copyright notices, but instead made copies of <strong>the</strong> f<strong>on</strong>t softwarewithout including <strong>the</strong> copyright notice, did not preclude liability under <strong>the</strong> DMCA. 971Bitstream argued that <strong>the</strong>re should be no finding of a CMI violati<strong>on</strong> because whenTrueDoc retrieved informati<strong>on</strong> from <strong>the</strong> operating system about a f<strong>on</strong>t software program, <strong>the</strong>operating system did not provide <strong>the</strong> copyright strings. M<strong>on</strong>otype countered by pointing to <strong>the</strong>fact that <strong>the</strong> copyright informati<strong>on</strong> is accessible through <strong>the</strong> operating system, and Bitstreamsimply chose not to include <strong>the</strong> copyright notice. M<strong>on</strong>otype’s expert had examined Bitstream’sTrueDoc source code and opined that Bitstream was capable of engineering TrueDoc to retrieve<strong>the</strong> copyright notice al<strong>on</strong>g with <strong>the</strong> f<strong>on</strong>t software informati<strong>on</strong>. The court ruled that, viewing thisevidence in <strong>the</strong> light most favorable to M<strong>on</strong>otype, <strong>the</strong> expert testim<strong>on</strong>y created a triable issue offact whe<strong>the</strong>r Bitstream copied M<strong>on</strong>otype’s f<strong>on</strong>ts without <strong>the</strong> copyright notices in violati<strong>on</strong> of <strong>the</strong>DMCA. Accordingly, <strong>the</strong> court denied Bitstream’s moti<strong>on</strong> for summary judgment <strong>on</strong> <strong>the</strong> CMIclaim. 972 Three m<strong>on</strong>ths later, after a bench trial, <strong>the</strong> court issued a sec<strong>on</strong>d opini<strong>on</strong> ruling thatBitstream was not liable for ei<strong>the</strong>r copyright infringement or CMI violati<strong>on</strong>s. 973 With respect toCMI, because <strong>the</strong> court found <strong>the</strong> plaintiffs had failed to prove that Bitstream’s licensees hadused <strong>the</strong> CSR with any of <strong>the</strong> plaintiff’s f<strong>on</strong>ts, <strong>the</strong>y had <strong>the</strong>refore failed to show that Bitstreamintenti<strong>on</strong>ally removed CMI, or distributed copies of works knowing that CMI had been removed,with knowledge or having reas<strong>on</strong>able grounds to know that it would induce, enable, facilitate orc<strong>on</strong>ceal infringement, as required by Secti<strong>on</strong>s 1202(b)(1) and 1201(b)(3) of <strong>the</strong> DMCA. 974The court also found no liability for c<strong>on</strong>tributory infringement, again because <strong>the</strong>plaintiffs failed to prove any direct infringement by Bitstream’s licensees – in particular, that aBitstream licensee had ever used <strong>the</strong> CSR to copy <strong>the</strong> plaintiffs’ f<strong>on</strong>ts. 975 The court also found<strong>the</strong> plaintiffs did not present any evidence that Bitstream ever knew that its licensees were usingTrueDoc’s CSR with <strong>the</strong> plaintiffs’ f<strong>on</strong>ts. 976 Citing <strong>the</strong> Supreme Court’s Grokster case,however, <strong>the</strong> court noted that “a court may impute culpable intent as a matter of law from <strong>the</strong>971972973974975976Id. at *26-27.Id. at *27-28.M<strong>on</strong>otype Imaging, Inc. v. Bitstream Inc., 376 F. Supp. 2d 877 (N.D. Ill. 2005).Id. at 893.Id. at 884.Id. at 887.- 216 -


characteristics or uses of an accused product.” 977 In determining whe<strong>the</strong>r <strong>the</strong> allegedc<strong>on</strong>tributory infringer acted with such culpable intent, <strong>the</strong> court, apparently not believing that <strong>the</strong>Grokster case repudiated any of <strong>the</strong> Aimster case’s holding or rati<strong>on</strong>ale, noted that <strong>the</strong> SeventhCircuit c<strong>on</strong>siders <strong>the</strong> following factors under <strong>the</strong> Aimster case: “(1) <strong>the</strong> respective magnitudes ofinfringing and n<strong>on</strong>infringing uses; (2) whe<strong>the</strong>r <strong>the</strong> defendant encouraged <strong>the</strong> infringing uses; and(3) efforts made by <strong>the</strong> defendant to eliminate or reduce infringing uses.” 978The court found that <strong>the</strong> plaintiffs had not satisfied any of <strong>the</strong> factors. The plaintiffs hadnot submitted any evidence to tie <strong>the</strong> ratio of Bitstream f<strong>on</strong>ts to n<strong>on</strong>-Bitstream f<strong>on</strong>ts available in<strong>the</strong> marketplace to <strong>the</strong> proporti<strong>on</strong> of such f<strong>on</strong>ts that Bitstream’s customers actually used with <strong>the</strong>CSR. Nor had <strong>the</strong>y presented any evidence that Bitstream knew of or encouraged <strong>the</strong> allegedlyinfringing uses of TrueDoc. With respect to <strong>the</strong> third factor, <strong>the</strong> court noted that Bitstream hadmade at least some efforts to reduce <strong>the</strong> risk of infringement of third parties’ intellectual propertythrough <strong>the</strong> use of TrueDoc, in <strong>the</strong> form of a “doc-lock” feature with <strong>the</strong> capability of preventinga third party from using a PFR that it had received for any purpose o<strong>the</strong>r than viewing <strong>the</strong>document with which <strong>the</strong> PFR came. Bitstream also engineered TrueDoc to h<strong>on</strong>or <strong>the</strong>embedding flags that f<strong>on</strong>t foundries include in <strong>the</strong>ir f<strong>on</strong>t data, which prohibit a third party fromembedding that f<strong>on</strong>t into ano<strong>the</strong>r technology. 979 Finally, <strong>the</strong> court found no liability under <strong>the</strong>inducement doctrine of <strong>the</strong> Grokster case, because <strong>the</strong>re was no evidence that Bitstream hadknowledge of its customers’ alleged infringements, much less that it acted with <strong>the</strong> “purposeful,culpable expressi<strong>on</strong> and c<strong>on</strong>duct” required under <strong>the</strong> Grokster decisi<strong>on</strong>. 980(vi) Keogh v. Big Lots Corp.In Keogh v. Big Lots Corp., 981 <strong>the</strong> court ruled that <strong>the</strong> prohibiti<strong>on</strong> of Secti<strong>on</strong> 1202(b)(3)of <strong>the</strong> DMCA against distributing works knowing that CMI has been removed or altered withoutauthority of <strong>the</strong> copyright owner requires actual knowledge that CMI has been removed.C<strong>on</strong>structive knowledge of removal of CMI is not sufficient. Once CMI is removed from awork, however, <strong>the</strong> defendant is required to have <strong>on</strong>ly “reas<strong>on</strong>able grounds to know” (ac<strong>on</strong>structive knowledge standard) that its acti<strong>on</strong>s would induce, enable, facilitate, or c<strong>on</strong>ceal aninfringement of any right under <strong>the</strong> DMCA. Because <strong>the</strong> plaintiff had not alleged that <strong>the</strong>defendant had actual knowledge that CMI had been removed from imported birdhouses havingdesigns that allegedly infringed <strong>the</strong> plaintiff’s birdhouses, <strong>the</strong> court granted <strong>the</strong> defendant’smoti<strong>on</strong> to dismiss <strong>the</strong> CMI claim under Rule 12(b)(6). 982977978979980981982Id.Id.Id. at 887-88.Id. at 888-89.2006 WL 1129375 (M. D. Tenn. Apr. 27, 2006).Id. at *2.- 217 -


(vii) Goldman v. Healthcare Management SystemsIn Goldman v. Healthcare Management Systems, 983 <strong>the</strong> plaintiff alleged that <strong>the</strong>defendant had been infringing up<strong>on</strong> <strong>the</strong> its copyright in a computer program since <strong>the</strong> plaintiffdownloaded <strong>the</strong> program <strong>on</strong>to <strong>the</strong> defendant’s computer, and that <strong>the</strong> defendant had violated <strong>the</strong>CMI provisi<strong>on</strong>s of <strong>the</strong> DMCA by knowingly removing <strong>the</strong> plaintiff’s CMI (apparently in <strong>the</strong>form of a copyright notice). The court denied <strong>the</strong> plaintiff’s moti<strong>on</strong> for summary judgment,finding numerous disputed facts, including whe<strong>the</strong>r <strong>the</strong> appropriate copyright notices were <strong>on</strong><strong>the</strong> original materials given to <strong>the</strong> defendant. 984(c) Remedies for Violati<strong>on</strong>s of Secti<strong>on</strong>s 1201 and 1202Civil Remedies. Secti<strong>on</strong> 1203 provides civil remedies for any pers<strong>on</strong> injured by aviolati<strong>on</strong> of Secti<strong>on</strong> 1201 or 1202, including temporary and permanent injuncti<strong>on</strong>s (althoughSecti<strong>on</strong> 1203(b)(1) c<strong>on</strong>tains a provisi<strong>on</strong> prohibiting injuncti<strong>on</strong>s that c<strong>on</strong>stitute prior restraints <strong>on</strong>free speech or <strong>the</strong> press protected under <strong>the</strong> First Amendment), impounding, actual damages andany additi<strong>on</strong>al profits of <strong>the</strong> violator, statutory damages (in <strong>the</strong> amount of not less than $200 ormore than $2,500 for each violati<strong>on</strong> of Secti<strong>on</strong> 1201, and not less than $2,500 or more than$25,000 for each violati<strong>on</strong> of Secti<strong>on</strong> 1202), costs and attorneys fees, and an order for <strong>the</strong>remedial modificati<strong>on</strong> or <strong>the</strong> destructi<strong>on</strong> of any device or product involved in <strong>the</strong> violati<strong>on</strong>.Damages may be trebled by <strong>the</strong> court for repeated violati<strong>on</strong>s within a three year period.C<strong>on</strong>versely, damages may be reduced or remitted entirely if <strong>the</strong> violator proves that it was notaware and had no reas<strong>on</strong> to believe that its acts c<strong>on</strong>stituted a violati<strong>on</strong>.Criminal Penalties. Secti<strong>on</strong> 1204 provides for criminal penalties for <strong>the</strong> willful violati<strong>on</strong>of Secti<strong>on</strong>s 1201 or 1202 for purposes of commercial advantage or private financial gain.Penalties include fines up to $1,000,000 and impris<strong>on</strong>ment for up to 10 years for repeatedoffenses. 985(1) Statutory Damages(i)S<strong>on</strong>y Computer Entertainment America v. FilipiakIn S<strong>on</strong>y Computer Entertainment America, Inc. v. Filipiak, 986 <strong>the</strong> court addressed <strong>the</strong>standard for computing statutory damages for a violati<strong>on</strong> of <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>s of<strong>the</strong> DMCA. The defendant Filipiak sold modificati<strong>on</strong> chips for <strong>the</strong> S<strong>on</strong>y PlayStati<strong>on</strong> 2 c<strong>on</strong>solethat circumvented <strong>the</strong> technological copyright protecti<strong>on</strong> measures in PlayStati<strong>on</strong> c<strong>on</strong>soles andallowed users to play unauthorized and illegal copies of PlayStati<strong>on</strong> video games. The court9839849859862006 U.S. Dist. LEXIS 89009 (W.D. Mich. Dec. 8, 2006).Id. at *3-4.The Digital Future Coaliti<strong>on</strong> has criticized Secti<strong>on</strong> 1202 as too drac<strong>on</strong>ian, in that it would impose civil penaltieseven in cases where no specific intent to infringe or promote infringement can be shown. “In o<strong>the</strong>r words, evensome<strong>on</strong>e who alters digital identifiers casually could be liable for a minimum of $2,500 in damages plus costsand attorney’s fees.” See positi<strong>on</strong> paper of <strong>the</strong> DFC at www.ari.net/dfc/docs/stwip.htm, p. 3.406 F. Supp. 2d 1068 (N.D. Cal. 2005).- 218 -


found that Filipiak knew at <strong>the</strong> time he was selling <strong>the</strong>m that <strong>the</strong> sale of <strong>the</strong> mod chips wasillegal under <strong>the</strong> DMCA. Filipiak signed an agreement with SCEA that he would stop selling <strong>the</strong>mod chips, but never<strong>the</strong>less willfully violated <strong>the</strong> agreement and c<strong>on</strong>tinued to sell <strong>the</strong>m.Thereafter, he signed a stipulated c<strong>on</strong>sent judgment and injuncti<strong>on</strong> that prohibited him frommarketing or selling <strong>the</strong> mod chips and agreed to pay $50,000 in damages, but still c<strong>on</strong>tinued tosell <strong>the</strong> mod chips surreptitiously. When he was caught by SCEA doing so, he admitted that heshouldn’t have been doing so and entered into a sec<strong>on</strong>d c<strong>on</strong>sent judgment. 987Based <strong>on</strong> various evidence, <strong>the</strong> court found that Filipiak had sold a minimum of 7,039circumventi<strong>on</strong> devices and proceeded to adjudicate <strong>the</strong> amount of statutory damages that Filipiakshould pay. The court first ruled, by analogy to a statutory damages case under <strong>the</strong> FederalCommunicati<strong>on</strong>s Act, that Secti<strong>on</strong> 1203(c)(3)(A) authorizes a separate award of statutorydamages for each device sold. 988 Because <strong>the</strong>re were no cases c<strong>on</strong>struing what “just” meansunder Secti<strong>on</strong> 1203(c)(3)(A), <strong>the</strong> court looked to cases c<strong>on</strong>struing <strong>the</strong> term under <strong>the</strong> generalstatutory damages provisi<strong>on</strong> of Secti<strong>on</strong> 504(c) of <strong>the</strong> copyright statute. Under <strong>the</strong> Secti<strong>on</strong> 504(c)case law, courts c<strong>on</strong>sider <strong>the</strong> following factors in determining <strong>the</strong> amount of a damages award:<strong>the</strong> expense saved by <strong>the</strong> defendant in avoiding a licensing agreement; profits reaped by <strong>the</strong>defendant in c<strong>on</strong>necti<strong>on</strong> with <strong>the</strong> infringement; revenues lost to <strong>the</strong> plaintiff; <strong>the</strong> willfulness of<strong>the</strong> infringement; and <strong>the</strong> goal of discouraging wr<strong>on</strong>gful c<strong>on</strong>duct. 989 Applying <strong>the</strong> factors, andparticularly c<strong>on</strong>sidering <strong>the</strong> willful nature of Filipiak’s violati<strong>on</strong>s, <strong>the</strong> court awarded statutorydamages of $800 per device sold before Filipiak entered into <strong>the</strong> first agreement with SCEA, and<strong>the</strong> maximum of $2500 per device sold or shipped <strong>the</strong>reafter, for a total award of $5,631,200. 990(ii)S<strong>on</strong>y Computer Entertainment v. DivineoThe facts and rulings of <strong>the</strong> court in S<strong>on</strong>y Computer Entertainment America, Inc. v.Divineo 991 are reported in Secti<strong>on</strong> II.G.1(m)(19) above. As a remedy for <strong>the</strong> DMCA violati<strong>on</strong>sfound by <strong>the</strong> court, <strong>the</strong> plaintiff elected statutory damages. The court determined that <strong>the</strong>defendant had sold a total of 10,012 circumventi<strong>on</strong> devices, and that sales of <strong>the</strong> devicesc<strong>on</strong>stituted willful infringement, at least with respect to those sales after <strong>the</strong> filing of <strong>the</strong> lawsuitin 2004. Although <strong>the</strong> defendant had decided to stop selling <strong>the</strong> HDLoader software in early2005, <strong>the</strong> defendant offered no credible explanati<strong>on</strong> for its decisi<strong>on</strong> to c<strong>on</strong>tinue selling its o<strong>the</strong>rcircumventi<strong>on</strong> devices after that point. Accordingly, <strong>the</strong> court awarded enhanced damages of$800 per device for sales after <strong>the</strong> first quarter of 2005 (an estimated 2,913 devices) and <strong>the</strong>minimum damages of $200 per device sold before that time, for a total statutory damages awardof $3,750,200. 992987988989990991992Id. at 1070-74.Id. at 1074.Id. at 1074-75.Id. at 1075-76.457 F. Supp. 2d 957 (N.D. Cal. 2006).Id. at 966-67.- 219 -


(iii) McClatchey v. The Associated PressThe facts of this case are set forth in Secti<strong>on</strong> II.G.1(b)(1)(ii) above. The Associated Press(AP) brought a moti<strong>on</strong> in limine seeking to limit <strong>the</strong> number of statutory damage awards that <strong>the</strong>plaintiff could recover for <strong>the</strong> distributi<strong>on</strong>s of her photograph with CMI removed. The plaintiffclaimed entitlement to a separate statutory award for each downstream distributi<strong>on</strong> of <strong>the</strong>photograph to each of AP’s 1,147 subscribers who had received <strong>the</strong> photograph. AP argued that<strong>the</strong> distributi<strong>on</strong> of false CMI to all AP subscribers should be treated as <strong>on</strong>ly a single violati<strong>on</strong> of<strong>the</strong> DMCA, entitling <strong>the</strong> plaintiff to but a single award of statutory damages. 993 The court agreedwith AP based <strong>on</strong> C<strong>on</strong>gress’ intent in providing statutory damages as an alternative type ofdamage award:Presumably, plaintiffs will elect statutory damages <strong>on</strong>ly when that calculati<strong>on</strong>exceeds <strong>the</strong>ir actual damages. In o<strong>the</strong>r words, C<strong>on</strong>gress has determined that inorder to deter violati<strong>on</strong>s of <strong>the</strong> DMCA, plaintiffs electing statutory damages mayreceive a windfall. The Court’s definiti<strong>on</strong> of <strong>the</strong> term “violati<strong>on</strong>” will determine<strong>the</strong> extent of that windfall. This Court c<strong>on</strong>cludes that C<strong>on</strong>gress would not haveintended to make <strong>the</strong> statutory damages windfall totally independent of <strong>the</strong>defendant’s c<strong>on</strong>duct. Where <strong>on</strong>e act by Defendant results in mass infringement, itis more likely that actual damages will yield <strong>the</strong> more favorable recovery. TheDMCA damages provisi<strong>on</strong>s are clearly focused <strong>on</strong> <strong>the</strong> defendant’s c<strong>on</strong>duct.Compare secti<strong>on</strong> 1203(c)(3)(A) (calculating statutory damages “per act”). Inessence, <strong>the</strong> term “each violati<strong>on</strong>” is best understood to mean “each violative actperformed by Defendant.” Thus, AP would violate <strong>the</strong> DMCA each time itwr<strong>on</strong>gfully distributed a photograph to its subscribers. In this case, <strong>the</strong> Courtc<strong>on</strong>cludes that AP committed <strong>on</strong>ly <strong>on</strong>e alleged violative act by distributing <strong>the</strong>End of Serenity photograph to its PhotoStream subscribers, even though <strong>the</strong>rewere 1,147 recipients. 994Up<strong>on</strong> a moti<strong>on</strong> for rec<strong>on</strong>siderati<strong>on</strong> of this ruling, <strong>the</strong> district court adhered to its originalanalysis, but certified <strong>the</strong> issue for interlocutory appeal and stayed all fur<strong>the</strong>r proceedingspending resoluti<strong>on</strong> of that appeal. 995993994995McClatchey v. The Associated Press, 2007 U.S. Dist. LEXIS 40416 (W.D. Pa. June 4, 2007), at *13.Id. at *17-18. The plaintiff also sought statutory damages under Secti<strong>on</strong> 504 of <strong>the</strong> copyright statute. CitingProfessor Nimmer’s treatise, she argued that she was entitled to recover multiple statutory damages awards if aparty is found to be jointly and severally liable with multiple parties who are not jointly and severally liablewith each o<strong>the</strong>r. Id. at *8. The court rejected this argument, based <strong>on</strong> <strong>the</strong> language in Secti<strong>on</strong> 504(c)(1) that anaward of statutory damages may be recovered for all infringements involved in <strong>the</strong> acti<strong>on</strong> “for which any twoor more infringers are liable jointly and severally” (emphasis added). Id. at *9-10. Based <strong>on</strong> <strong>the</strong> presence of<strong>the</strong> word “any” ra<strong>the</strong>r than “all” in <strong>the</strong> statute, <strong>the</strong> court c<strong>on</strong>cluded that “<strong>the</strong> most plausible interpretati<strong>on</strong> of <strong>the</strong>statute authorizes a single award when <strong>the</strong>re is any joint and several liability, even if <strong>the</strong>re is not complete jointand several liability am<strong>on</strong>gst all potential infringers.” Id. at *10. Moreover, <strong>the</strong> court noted that it need notreject Professor Nimmer’s positi<strong>on</strong> in all circumstances, because in <strong>the</strong> instant case <strong>the</strong> <strong>on</strong>ly defendant, AP, wasjointly and severally liable with all downstream infringers, so <strong>the</strong> plaintiff was entitled to <strong>on</strong>ly a single statutorydamages award. Id. at *12.McClatchey v. The Associated Press, 2007 U.S. Dist. LEXIS 41969 (W.D. Pa. June 8, 2007).- 220 -


(iv) MDY Industries, LLC v. Blizzard Entertainment, Inc.The facts of this case and <strong>the</strong> court’s various rulings <strong>on</strong> liability are set forth in Secti<strong>on</strong>II.G.1(a)(2) above. Blizzard requested that it should be entitled to a minimum statutory damagesaward of $24 milli<strong>on</strong> based up<strong>on</strong> MDY’s sales of at least 120,000 Glider licenses (120,000 x$200). The court, however, awarded statutory damages of $6.5 milli<strong>on</strong>, <strong>the</strong> amount of <strong>the</strong>damage award in <strong>the</strong> stipulated judgment between <strong>the</strong> parties. The court refused to make areducti<strong>on</strong> of damages <strong>on</strong> <strong>the</strong> basis of innocent infringement because MDY had designed itsGlider software specifically to bypass <strong>the</strong> plaintiff’s Warden software. 996(2) Jurisdicti<strong>on</strong>al <str<strong>on</strong>g>Issues</str<strong>on</strong>g> – Blueport Co. v. United StatesIn Blueport Co. v. United States, 997 <strong>the</strong> Court of Claims ruled that <strong>the</strong> United Statescannot be sued under <strong>the</strong> DMCA’s anti-circumventi<strong>on</strong> provisi<strong>on</strong>s because <strong>the</strong> DMCA c<strong>on</strong>tainsno clear waiver of sovereign immunity, and waiver under <strong>the</strong> DMCA could not be inferred fromwaiver under <strong>the</strong> copyright laws because <strong>the</strong> DMCA is not a copyright statute. The FederalCircuit affirmed this ruling <strong>on</strong> appeal for <strong>the</strong> same reas<strong>on</strong>s invoked by <strong>the</strong> Court of Claims, andalso noted <strong>the</strong> rule that <strong>the</strong> Court of Claims lacks jurisdicti<strong>on</strong> to adjudicate claims created bystatutes, like <strong>the</strong> DMCA, which specifically authorized jurisdicti<strong>on</strong> in <strong>the</strong> district courts. 998(d) Alternative Approaches to <strong>the</strong> DMCA That Did Not PassTwo of <strong>the</strong> alternatives bills that were introduced to implement <strong>the</strong> WIPO treaties whichdid not pass, S. 1146 and H.R. 3048, would have prohibited <strong>on</strong>ly certain defined circumventi<strong>on</strong>c<strong>on</strong>duct, ra<strong>the</strong>r than devices. Specifically, Secti<strong>on</strong> 1201 of S. 1146 and H.R. 3048 provided thatno pers<strong>on</strong>, “for <strong>the</strong> purpose of facilitating or engaging in an act of infringement, shall engage inc<strong>on</strong>duct so as knowingly to remove, deactivate or o<strong>the</strong>rwise circumvent <strong>the</strong> applicati<strong>on</strong> oroperati<strong>on</strong> of any effective technological measure used by a copyright owner to preclude or limitreproducti<strong>on</strong> of a work or a porti<strong>on</strong> <strong>the</strong>reof.” Thus, <strong>the</strong>se bills would not have bannedcircumventi<strong>on</strong> undertaken for reas<strong>on</strong>s o<strong>the</strong>r than facilitating or engaging in infringement, such asfair uses. In additi<strong>on</strong>, Secti<strong>on</strong> 1201 of <strong>the</strong>se bills expressly defined “c<strong>on</strong>duct” not to includemanufacturing, importing or distributing a device or a computer program.Although Secti<strong>on</strong> 1201(a) of <strong>the</strong>se bills referred <strong>on</strong>ly to technological measures used topreclude or limit reproducti<strong>on</strong> of a copyrighted work, and did not refer to access to a copyrightedwork (as is included in <strong>the</strong> DMCA), <strong>the</strong> definiti<strong>on</strong> of “effective technological measure” inSecti<strong>on</strong> 1201(c) of <strong>the</strong>se bills included two references to access. Specifically, “effectivetechnological measure” was defined as informati<strong>on</strong> included with or an attribute applied to atransmissi<strong>on</strong> or a copy of a work in a digital format which “encrypts or scrambles <strong>the</strong> work or aporti<strong>on</strong> <strong>the</strong>reof in <strong>the</strong> absence of access informati<strong>on</strong> supplied by <strong>the</strong> copyright owner; or includesattributes regarding access to or recording of <strong>the</strong> work that cannot be removed without degrading996997998MDY Industries, LLC v. Blizzard Entertainment, Inc., 2009 U.S. Dist. LEXIS 38260 at *4-6 (D. Ariz. Apr. 1,2009).80 U.S.P.Q.2d 1585 (Ct. Fed. Claims 2006).Blueport Co. v. United States, 533 F.3d 1374, 1382-84 (Fed. Cir. 2008).- 221 -


<strong>the</strong> work or a porti<strong>on</strong> <strong>the</strong>reof.” This was a much more specific and narrower definiti<strong>on</strong> ofeffective technological measure than that c<strong>on</strong>tained in <strong>the</strong> DMCA.Unlike Secti<strong>on</strong> 1201, Secti<strong>on</strong> 1202 of S. 1146 and H.R. 3048 was largely identical toSecti<strong>on</strong> 1202 of <strong>the</strong> DMCA with respect to removal, alterati<strong>on</strong> or falsificati<strong>on</strong> of CMI. The mostimportant difference was that Secti<strong>on</strong> 1202 of S. 1146 and H.R. 3048 c<strong>on</strong>tained language makingclear that <strong>the</strong> c<strong>on</strong>duct governed by that Secti<strong>on</strong> did not include <strong>the</strong> manufacturing, importing ordistributing of a device (curiously, <strong>the</strong>re was no reference to a computer program, as <strong>the</strong>re was in<strong>the</strong> exclusi<strong>on</strong> from Secti<strong>on</strong> 1201 of those bills).(e) The Battle Between C<strong>on</strong>tent Owners and Technology CompaniesOver Built-In Technological MeasuresA growing battle has been developing in recent years between holders of copyright <strong>on</strong>c<strong>on</strong>tent, most notably <strong>the</strong> Recording Industry Associati<strong>on</strong> of America (RIAA) and <strong>the</strong> Moti<strong>on</strong>Picture Associati<strong>on</strong> of America (MPAA), and technology companies over whe<strong>the</strong>rmanufacturers of devices that can be used to play, copy or distribute copyrighted c<strong>on</strong>tent shouldbe required to build in to such devices technological protecti<strong>on</strong> measures that restrict access to or<strong>the</strong> use of such copyrighted c<strong>on</strong>tent. In effect, c<strong>on</strong>tent owners have sought through variousproposed federal legislati<strong>on</strong> to mandate <strong>the</strong> inclusi<strong>on</strong> of technological measures in devices thatwould be covered by <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>s of <strong>the</strong> DMCA. Computer, c<strong>on</strong>sumerelectr<strong>on</strong>ic, and o<strong>the</strong>r technology companies have resisted such legislati<strong>on</strong> mightily, arguing that<strong>the</strong>y must be free to design <strong>the</strong>ir own products without legislative strictures.On Jan. 14, 2003, <strong>the</strong> RIAA, <strong>the</strong> Business Software Alliance (BSA), 999 and <strong>the</strong> ComputerSystems Policy Project (CSPP) 1000 announced that <strong>the</strong>y had reached agreement <strong>on</strong> a core set ofseven principles to guide <strong>the</strong>ir public policy activities in <strong>the</strong> 108th C<strong>on</strong>gress (2003) regarding <strong>the</strong>distributi<strong>on</strong> of digital c<strong>on</strong>tent. 1001 Pursuant to <strong>the</strong> agreement, <strong>the</strong> recording companies agreedthat <strong>the</strong>y would not seek government interventi<strong>on</strong> to mandate technical soluti<strong>on</strong>s to preventdigital piracy and would in most instances oppose legislati<strong>on</strong> that would require computers andc<strong>on</strong>sumer electr<strong>on</strong>ics devices to be designed to restrict unauthorized copying of audio and videomaterial. In turn, <strong>the</strong> BSA and CSPP would not support legislati<strong>on</strong> that seeks to clarify andbolster <strong>the</strong> rights of pers<strong>on</strong>s to use copyrighted material in digital format. Notably absent from<strong>the</strong> agreement were c<strong>on</strong>sumer electr<strong>on</strong>ics companies, who felt that legislati<strong>on</strong> was needed toensure that c<strong>on</strong>sumers can make fair use of digital copyrighted material even when secured withtechnology to prevent illegal copying, and <strong>the</strong> MPAA, whose members c<strong>on</strong>tinued to be999Members of <strong>the</strong> BSA include Adobe, Apple, Autodesk, Avid, Bentley Systems, Borland, Cisco Systems,CNC/Mastercam, Dell, Entrust, HP, IBM, Intel, <strong>Internet</strong> Security Systems, Intuit, Macromedia, Microsoft,Network Associates, Novell, PeopleSoft, SeeBey<strong>on</strong>d, Sybase, and Symantec. “Recording, TechnologyIndustries Reach Groundbreaking Agreement <strong>on</strong> Approach to Digital C<strong>on</strong>tent <str<strong>on</strong>g>Issues</str<strong>on</strong>g>,” available <strong>on</strong> <strong>the</strong> BSAweb site as of Jan. 15, 2003 at www.bsa.org/usa/press/newsreleases//2003-01-14.1418.phtml.1000 Members of <strong>the</strong> CSPP include Dell, Intel, HP, Motorola, NCR, IBM, EMC, and Unisys. Id.1001 The seven policy principles may be found <strong>on</strong> <strong>the</strong> BSA web site at www.bsa.org/usa/policyres/7_principles.pdf.- 222 -


c<strong>on</strong>cerned that digital televisi<strong>on</strong> broadcasts and movies copied from DVDs would so<strong>on</strong> be tradedover <strong>the</strong> <strong>Internet</strong> in high volumes. 10022. Anticircumventi<strong>on</strong> Provisi<strong>on</strong>s Under <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> DirectiveThe European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive adopts <strong>the</strong> approach of <strong>the</strong> DMCA, in that it wouldoutlaw both c<strong>on</strong>duct and <strong>the</strong> manufacture or distributi<strong>on</strong> of devices that could be used to defeattechnological copyright protecti<strong>on</strong>s. With respect to c<strong>on</strong>duct, Article 6(1) provides that memberstates “shall provide adequate legal protecti<strong>on</strong> against <strong>the</strong> circumventi<strong>on</strong> of any effectivetechnological measures, which <strong>the</strong> pers<strong>on</strong> c<strong>on</strong>cerned carries out in <strong>the</strong> knowledge, or withreas<strong>on</strong>able grounds to know, that he or she is pursuing that objective.” 1003 The language ofArticle 6(1) includes a knowledge requirement that is not expressly present in <strong>the</strong> prohibiti<strong>on</strong> ofSecti<strong>on</strong> 1201(a)(1)(A) of <strong>the</strong> DMCA. But unlike <strong>the</strong> DMCA, <strong>the</strong>re are no enumeratedexcepti<strong>on</strong>s to <strong>the</strong> ban <strong>on</strong> circumventi<strong>on</strong> in <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive. 1004Like <strong>the</strong> DMCA, <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive does not require that <strong>the</strong>circumventi<strong>on</strong> of <strong>the</strong> technical measures be d<strong>on</strong>e for <strong>the</strong> purpose of facilitating or engaging in anact of infringement. However, <strong>the</strong> commentary to Article 6 elaborates <strong>on</strong> <strong>the</strong> requirement ofknowledge by <strong>the</strong> party liable for <strong>the</strong> circumventi<strong>on</strong> in a way that suggests a standard of liabilitythat may be somewhat akin to that of <strong>the</strong> S<strong>on</strong>y case in <strong>the</strong> United States: “This [requirement ofknowledge] would allow for <strong>the</strong> necessary flexibility – a fundamental element for <strong>the</strong> industry –not to cover activities which are related to devices which may serve a legal or illegal use and arecarried out without <strong>the</strong> actual knowledge that <strong>the</strong>y will enable circumventi<strong>on</strong> of technologicalprotecti<strong>on</strong> devices.” 1005 It remains to be seen how broadly this provisi<strong>on</strong> will be implemented bymember states.1002 Amy Harm<strong>on</strong>, “Music Industry W<strong>on</strong>’t Seek Government Aid <strong>on</strong> Piracy” (Jan. 15, 2003), available as of Jan.15, 2003 at www.nytimes.com/2003/01/15/business/15PIRA.html.1003 Notwithstanding <strong>the</strong> general prohibiti<strong>on</strong> <strong>on</strong> circumventi<strong>on</strong> of effective technological measures, Article 6(4)provides that, “in <strong>the</strong> absence of voluntary measures taken by rightholders, including agreements betweenrightholders and o<strong>the</strong>r parties c<strong>on</strong>cerned, Member States shall take appropriate measures to ensure thatrightholders make available to <strong>the</strong> beneficiary of an excepti<strong>on</strong> or limitati<strong>on</strong> provided for in nati<strong>on</strong>al law inaccordance with Article 5(2)(a), (2)(c), (2)(d), (2)(e), (3)(a), (3)(b) or (3)(e) <strong>the</strong> means of benefiting from thatexcepti<strong>on</strong> or limitati<strong>on</strong>, to <strong>the</strong> extent necessary to benefit from that excepti<strong>on</strong> or limitati<strong>on</strong> and where thatbeneficiary has legal access to <strong>the</strong> protected work or subject-matter c<strong>on</strong>cerned.”1004 Schollenberger, supra note 180, at 12. The European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive attempts to deal with this issue viaArticle 6(4), which states that “Member States should promote voluntary measures taken by right holders,including <strong>the</strong> c<strong>on</strong>clusi<strong>on</strong> and implementati<strong>on</strong> of agreements between rights holders and o<strong>the</strong>r parties c<strong>on</strong>cerned,to accommodate achieving <strong>the</strong> objectives of certain excepti<strong>on</strong>s or limitati<strong>on</strong>s provided for in nati<strong>on</strong>al law.” Itfur<strong>the</strong>r states that in <strong>the</strong> absence of such voluntary measures or agreements, within a reas<strong>on</strong>able period of timeMember States are obliged to take appropriate measures to ensure that right holders provide beneficiaries ofsuch excepti<strong>on</strong>s or limitati<strong>on</strong>s with “appropriate means” of benefiting from <strong>the</strong>m, by modifying an implementedtechnological protecti<strong>on</strong> measure or by o<strong>the</strong>r means. What such “appropriate measures” would be remainsunclear. Id.1005 Commentary to Art. 6, 2.- 223 -


With respect to <strong>the</strong> manufacture or distributi<strong>on</strong> of devices that could be used to defeattechnological copyright protecti<strong>on</strong>s, Article 6(2) provides that member states “shall provideadequate legal protecti<strong>on</strong> against <strong>the</strong> manufacture, import, distributi<strong>on</strong>, sale, rental,advertisement for sale or rental, or possessi<strong>on</strong> for commercial purposes of devices, products orcomp<strong>on</strong>ents or <strong>the</strong> provisi<strong>on</strong> of services which:(a) are promoted, advertised or marketed for <strong>the</strong> purpose of circumventi<strong>on</strong> of, or(b) have <strong>on</strong>ly a limited commercially significant purpose or use o<strong>the</strong>r than tocircumvent, or(c) are primarily designed, produced, adapted or performed for <strong>the</strong> purpose ofenabling or facilitating <strong>the</strong> circumventi<strong>on</strong> of, any effective technologicalmeasures.”The foregoing three criteria are very similar to <strong>the</strong> criteria enumerated in <strong>the</strong> prohibiti<strong>on</strong> oftechnology, devices and services c<strong>on</strong>tained in Secti<strong>on</strong>s 1201(a)(2) and 1201(b) of <strong>the</strong> DMCA.However, by prohibiting preparatory activities to circumventi<strong>on</strong>, Article 6(2) goes fur<strong>the</strong>r than<strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty requires. 1006One possible difference between <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive and <strong>the</strong> DMCA maylie in <strong>the</strong> scope of what types of technological measures are prohibited from circumventi<strong>on</strong>.Specifically, <strong>the</strong> prohibiti<strong>on</strong>s of <strong>the</strong> DMCA are expressly directed toward technology, devicesand services that circumvent technological measures that effectively c<strong>on</strong>trol access to acopyrighted work and protect rights of a copyright holder. By c<strong>on</strong>trast, <strong>the</strong> definiti<strong>on</strong> of“technological measures” in <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive, at first glance, seems directed<strong>on</strong>ly toward protecting rights of a copyright holder, and not restricting access. Article 6(3)defines <strong>the</strong> expressi<strong>on</strong> “technological measures” to mean “any technology, device or comp<strong>on</strong>entthat, in <strong>the</strong> normal course of its operati<strong>on</strong>, is designed to prevent or restrict acts, in respect ofworks or o<strong>the</strong>r subject-matter, which are not authorized by <strong>the</strong> rightholder of any copyright orany right related to copyright as provided for by law or <strong>the</strong> sui generis right provided for inChapter III of Directive 96/9/EC.”However, <strong>the</strong> c<strong>on</strong>cept of access c<strong>on</strong>trol seems to come into <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>Directive indirectly, through <strong>the</strong> definiti<strong>on</strong> of “effective.” Specifically, Article 6(3) provides thattechnological measures shall be deemed “effective” where “<strong>the</strong> use of a protected work or o<strong>the</strong>rsubject-matter is c<strong>on</strong>trolled by <strong>the</strong> rightholders through applicati<strong>on</strong> of an access c<strong>on</strong>trol orprotecti<strong>on</strong> process, such as encrypti<strong>on</strong>, scrambling or o<strong>the</strong>r transformati<strong>on</strong> of <strong>the</strong> work or o<strong>the</strong>rsubject-matter or a copy c<strong>on</strong>trol mechanism, which achieves <strong>the</strong> protecti<strong>on</strong> objective” (emphasisadded). Thus, through <strong>the</strong> interacti<strong>on</strong> of <strong>the</strong>se definiti<strong>on</strong>s of “technological measures” and“effective,” it appears that <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive effectively prohibits <strong>the</strong>circumventi<strong>on</strong> of technological measures that both c<strong>on</strong>trol access and that protect <strong>the</strong> rights of acopyright holder, just as does <strong>the</strong> DMCA.1006 Harringt<strong>on</strong> & Berking, supra note 179, at 6.- 224 -


An important thing to note is that <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>s of Article 6 of <strong>the</strong>European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive do not apply to computer programs. Instead, a different, and morelimited, set of anti-circumventi<strong>on</strong> provisi<strong>on</strong>s apply to computer programs under Directive91/250/EEC <strong>on</strong> <strong>the</strong> Legal Protecti<strong>on</strong> of Computer Programs (<strong>the</strong> “European SoftwareDirective”), discussed in <strong>the</strong> next paragraph. Article 2(a) of <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directivestates that <strong>the</strong> “Directive shall leave intact and shall in no way affect existing Communityprovisi<strong>on</strong>s relating to <strong>the</strong> legal protecti<strong>on</strong> of computer programs.” And Recital 50 of <strong>the</strong>European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive states that its harm<strong>on</strong>ized legal protecti<strong>on</strong> “does not affect <strong>the</strong>specific provisi<strong>on</strong>s <strong>on</strong> protecti<strong>on</strong> provided for by Directive 91/250/EEC [<strong>the</strong> European SoftwareDirective]. In particular, it should not apply to <strong>the</strong> protecti<strong>on</strong> of technological measures used inc<strong>on</strong>necti<strong>on</strong> with computer programs, which is exclusively addressed in that Directive.”The narrower anti-circumventi<strong>on</strong> provisi<strong>on</strong>s applicable to computer programs are setforth in Article 7(1)(c) of <strong>the</strong> European Software Directive, which requires member states toprovide appropriate remedies against “any act of putting into circulati<strong>on</strong>, or <strong>the</strong> possessi<strong>on</strong> forcommercial purposes of, any means <strong>the</strong> sole intended purpose of which is to facilitate <strong>the</strong>unauthorized removal or circumventi<strong>on</strong> of any technical device which may have been applied toprotect a computer program.” There are a couple of important distincti<strong>on</strong>s between <strong>the</strong> anticircumventi<strong>on</strong>provisi<strong>on</strong>s of <strong>the</strong> European Software Directive and those of <strong>the</strong> European<str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive:-- The anti-circumventi<strong>on</strong> provisi<strong>on</strong>s of <strong>the</strong> European Software Directive are aimed atpreventing <strong>the</strong> manufacture and distributi<strong>on</strong> of circumventi<strong>on</strong> devices. Unlike <strong>the</strong> relevantprovisi<strong>on</strong>s of <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive, <strong>the</strong>y do not prohibit <strong>the</strong> actual c<strong>on</strong>duct ofcircumventi<strong>on</strong> itself.-- The anti-circumventi<strong>on</strong> provisi<strong>on</strong>s of <strong>the</strong> European Software Directive apply <strong>on</strong>ly todevices that have circumventi<strong>on</strong> as <strong>the</strong>ir sole intended purpose, which is narrower than <strong>the</strong> anticircumventi<strong>on</strong>provisi<strong>on</strong>s of <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive that apply to devices that havecircumventi<strong>on</strong> as <strong>the</strong>ir primary purpose, or are promoted, advertised or marketed for <strong>the</strong> purposeof circumventi<strong>on</strong>, or have <strong>on</strong>ly a limited commercially significant purpose or use o<strong>the</strong>r than tocircumvent.Article 7(1) of <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive deals with CMI, which <strong>the</strong> European<str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive denominates “electr<strong>on</strong>ic rights management informati<strong>on</strong>.” Specifically,Article 7(1) requires member states to prohibit any pers<strong>on</strong> knowingly performing withoutauthority any of <strong>the</strong> following acts:“(a) <strong>the</strong> removal or alterati<strong>on</strong> of any electr<strong>on</strong>ic rights-management informati<strong>on</strong>;(b) <strong>the</strong> distributi<strong>on</strong>, importati<strong>on</strong> for distributi<strong>on</strong>, broadcasting, communicati<strong>on</strong> or makingavailable to <strong>the</strong> public of works or o<strong>the</strong>r subject-matter protected under this Directive orunder Chapter III of Directive 96/9/EC from which electr<strong>on</strong>ic right-managementinformati<strong>on</strong> has been removed or altered without authority,if such pers<strong>on</strong> knows, or has reas<strong>on</strong>able grounds to know, that by so doing he is inducing,enabling, facilitating or c<strong>on</strong>cealing an infringement of any copyright or any rights related- 225 -


to copyright as provided by law, or of <strong>the</strong> sui generis right provided in Chapter III ofDirective 96/9/EC.”Article 7(2) defines “rights management informati<strong>on</strong>” broadly to mean “any informati<strong>on</strong>provided by rightholders which identifies <strong>the</strong> work or o<strong>the</strong>r subject-matter referred to in thisDirective or covered by <strong>the</strong> sui generis right provided for in Chapter III of Directive 96/9/EC,<strong>the</strong> author or any o<strong>the</strong>r rightholder, or informati<strong>on</strong> about <strong>the</strong> terms and c<strong>on</strong>diti<strong>on</strong>s of use of <strong>the</strong>work or o<strong>the</strong>r subject-matter, and any numbers or codes that represent such informati<strong>on</strong>. Thefirst subparagraph shall apply when any of <strong>the</strong>se items of informati<strong>on</strong> is associated with a copyof, or appears in c<strong>on</strong>necti<strong>on</strong> with <strong>the</strong> communicati<strong>on</strong> to <strong>the</strong> public of, a work or o<strong>the</strong>r subjectmatter referred to in this Directive or covered by <strong>the</strong> sui generis right provided for in Chapter IIIof Directive 96/9/EC.”The scope of Article 7 is potentially narrower than that of <strong>the</strong> United States implementinglegislati<strong>on</strong>. The prohibiti<strong>on</strong>s of Article 7(1) are all expressly directed to “electr<strong>on</strong>ic” rightsmanagementinformati<strong>on</strong>. In additi<strong>on</strong>, <strong>the</strong> commentary states that Article 7 “aims <strong>on</strong>ly at <strong>the</strong>protecti<strong>on</strong> of electr<strong>on</strong>ic rights management informati<strong>on</strong>, and does not cover all kinds ofinformati<strong>on</strong> that could be attached to <strong>the</strong> protected material.” 1007 By c<strong>on</strong>trast, <strong>the</strong> definiti<strong>on</strong> ofCMI under <strong>the</strong> DMCA is broad enough to cover more than just electr<strong>on</strong>ic informati<strong>on</strong>.3. Anti-Circumventi<strong>on</strong> Provisi<strong>on</strong>s in O<strong>the</strong>r Foreign CountriesSome countries outside <strong>the</strong> European Uni<strong>on</strong> have adopted anti-circumventi<strong>on</strong> provisi<strong>on</strong>sin <strong>the</strong>ir copyright laws. For example, effective March 2001 Australia added a new Secti<strong>on</strong> 116Ato its copyright law, which prohibits circumventi<strong>on</strong> of a “technological protecti<strong>on</strong> measure,”defined as “a device or product, or a comp<strong>on</strong>ent incorporated into a process, that is designed, in<strong>the</strong> ordinary course of its operati<strong>on</strong>, to prevent or inhibit <strong>the</strong> infringement of copyright in a workor o<strong>the</strong>r subject-matter.” 1008 In October of 2005, <strong>the</strong> High Court of Australia unanimously ruledthat distributing mod chips to overcome regi<strong>on</strong> coding <strong>on</strong> <strong>the</strong> PlayStati<strong>on</strong> video games was not aviolati<strong>on</strong> of Secti<strong>on</strong> 116A. The court reas<strong>on</strong>ed that <strong>the</strong> regi<strong>on</strong> coding scheme did not c<strong>on</strong>stitute atechnological protecti<strong>on</strong> measure. 1009In July of 2003, <strong>the</strong> Federal Court of Australia held that regi<strong>on</strong> access codes in CD-ROMs of PlayStati<strong>on</strong> games, as well as a compani<strong>on</strong> chip in <strong>the</strong> PlayStati<strong>on</strong> c<strong>on</strong>sole, c<strong>on</strong>stituteda valid “technological protecti<strong>on</strong> measure,” and that <strong>the</strong> defendant had violated Secti<strong>on</strong> 116A bydistributing modificati<strong>on</strong> chips that overcame <strong>the</strong> regi<strong>on</strong>al restricti<strong>on</strong>s <strong>on</strong> play of <strong>the</strong> games. 10101007 Commentary to Art. 7, 1.1008 “Australian Federal Court Upholds Regi<strong>on</strong> Coding Restricti<strong>on</strong>s <strong>on</strong> Video Game System,” BNA’s Electr<strong>on</strong>icCommerce & Law Report (Aug. 20, 2003) at 802.1009 Murray Griffin, “Fair Use Ruling <strong>on</strong> TPMs Raises C<strong>on</strong>cern That Australian Law May C<strong>on</strong>flict with FTA,”BNA’s Electr<strong>on</strong>ic Commerce & Law Report (Oct. 12, 2005) at 982.1010 Id.- 226 -


In March of 2005, a German court, <strong>on</strong> <strong>the</strong> basis of <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong> ofGerman copyright law, prohibited <strong>the</strong> German news site Heise from linking in an <strong>on</strong>line articleto a site where circumventi<strong>on</strong> software was made available. 10114. Fair Use(a) United States Legislati<strong>on</strong> That Did Not PassBoth S. 1146 and H.R. 3048 – nei<strong>the</strong>r of which were ultimately adopted by C<strong>on</strong>gress –c<strong>on</strong>tained identical provisi<strong>on</strong>s with respect to applicati<strong>on</strong> of <strong>the</strong> fair use doctrine in a digitalenvir<strong>on</strong>ment. These bills would have amended Secti<strong>on</strong> 107 of <strong>the</strong> copyright statute (<strong>the</strong> fair useexempti<strong>on</strong>) in two ways. First, <strong>the</strong>y would have added an amendment providing that <strong>the</strong> fair usedoctrine applies to uses of a copyrighted work “by analog or digital transmissi<strong>on</strong>.” Sec<strong>on</strong>d, <strong>the</strong>ywould have added a new sentence to Secti<strong>on</strong> 107 providing that, in making a determinati<strong>on</strong>c<strong>on</strong>cerning fair use, a court should give no independent weight to <strong>the</strong> means by which <strong>the</strong> workhas been performed, displayed or distributed under <strong>the</strong> authority of <strong>the</strong> copyright owner, or <strong>the</strong>applicati<strong>on</strong> of an effective technological measure to protect <strong>the</strong> work. The import of thisprovisi<strong>on</strong> appears to have been (i) to clarify that digital uses of a copyrighted work may be a fairuse notwithstanding that <strong>the</strong> copyright owner has authorized use of <strong>the</strong> work <strong>on</strong>ly in o<strong>the</strong>r mediaor modes and (ii) that <strong>the</strong> fair use exempti<strong>on</strong> may apply even if an effective technologicalmeasure must be circumvented to use <strong>the</strong> work (as in <strong>the</strong> case of reverse engineering). However,as discussed above, both <strong>the</strong> RealNetworks and <strong>the</strong> Reimerdes cases held that fair use is not adefense to a claim for violati<strong>on</strong> of <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>s of Secti<strong>on</strong> 1201(a); thus, <strong>the</strong>fact that a defendant circumvented a technological protecti<strong>on</strong> measure in order to gain access toa copyrighted work to make fair uses of it does not provide a defense.(b) The European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> DirectiveArticle 5(3) of <strong>the</strong> European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive permits member states to adoptlimitati<strong>on</strong>s to <strong>the</strong> rights of reproducti<strong>on</strong> and of communicati<strong>on</strong> or making available to <strong>the</strong> publicfor <strong>the</strong> following fair use purposes:– for illustrati<strong>on</strong> for teaching or scientific research for n<strong>on</strong>commercial purposes, as l<strong>on</strong>gas <strong>the</strong> source, including <strong>the</strong> author’s name, is indicated;– for <strong>the</strong> benefit of people with a disability, which are directly related to <strong>the</strong> disabilityand of a n<strong>on</strong>commercial nature, to <strong>the</strong> extent required by <strong>the</strong> specific disability;– use of short excerpts in c<strong>on</strong>necti<strong>on</strong> with <strong>the</strong> reporting of current events, so l<strong>on</strong>g as <strong>the</strong>source, including <strong>the</strong> author’s name, is indicated;– quotati<strong>on</strong>s for purposes such as criticism or review of a work that has been lawfullymade available to <strong>the</strong> public, so l<strong>on</strong>g as <strong>the</strong> source, including <strong>the</strong> author’s name, is indicated and<strong>the</strong> use is in accordance with fair practice;1011 “Court Prohibits Linking to Circumventi<strong>on</strong> Software” (Mar. 7, 2005), available as of Mar. 8, 2005 athttp://c<strong>on</strong>stituti<strong>on</strong>alcode.blogspot.com/2005/03/court-prohibits-linking-to.html.- 227 -


– for public security or proper performance of an administrative or judicial procedure;– use of political speeches or public lectures to <strong>the</strong> extent justified by <strong>the</strong> informatorypurpose and provided that <strong>the</strong> source, including <strong>the</strong> author’s name, is indicated;– use during public religious or official celebrati<strong>on</strong>s;– use of works of architecture or sculpture made to be located permanently in publicplaces;– incidental inclusi<strong>on</strong> of a work in o<strong>the</strong>r material;– use for advertising <strong>the</strong> public exhibiti<strong>on</strong> or sale of artistic works to <strong>the</strong> extentnecessary to promote <strong>the</strong> event;– use for caricature, parody or pastiche;– use in c<strong>on</strong>necti<strong>on</strong> with <strong>the</strong> dem<strong>on</strong>strati<strong>on</strong> or repair of equipment;– use of an artistic work in <strong>the</strong> form of a building or a drawing or plan of a building forrec<strong>on</strong>structing <strong>the</strong> same;– use by communicati<strong>on</strong> or making available to individual members of <strong>the</strong> public bydedicated terminals in publicly accessible libraries, educati<strong>on</strong>s establishments, museums orarchives for n<strong>on</strong>commercial purposes; and– use in certain o<strong>the</strong>r cases of minor importance where excepti<strong>on</strong>s or limitati<strong>on</strong>s alreadyexist under nati<strong>on</strong>al law, provided that c<strong>on</strong>cern <strong>on</strong>ly analog uses and do not affect <strong>the</strong> freecirculati<strong>on</strong> of goods and services within <strong>the</strong> EC.Article 5(5) provides that in all cases, <strong>the</strong> limitati<strong>on</strong>s “shall <strong>on</strong>ly be applied in certainspecial cases which do not c<strong>on</strong>flict with a normal exploitati<strong>on</strong> of <strong>the</strong> work or o<strong>the</strong>r subjectmatterand do not unreas<strong>on</strong>ably prejudice <strong>the</strong> legitimate interests of <strong>the</strong> rightholder.”5. Expansi<strong>on</strong> of Library/Archives Exempti<strong>on</strong>sSecti<strong>on</strong> 404 of <strong>the</strong> DMCA expands <strong>the</strong> scope of <strong>the</strong> exempti<strong>on</strong> in Secti<strong>on</strong> 108 of <strong>the</strong>copyright statute for libraries and archives. Specifically, Secti<strong>on</strong> 108 authorizes libraries andarchives to make three copies of works for preservati<strong>on</strong> purposes, ra<strong>the</strong>r than <strong>on</strong>e. Secti<strong>on</strong> 108also deletes <strong>the</strong> requirement that <strong>the</strong> copies be made “in facsimile form.” According to Rep.Boucher, this phrase in <strong>the</strong> pre-amended versi<strong>on</strong> of Secti<strong>on</strong> 108 had been read to preclude <strong>the</strong>use of digital technologies to preserve works. 1012 Under <strong>the</strong> amended Secti<strong>on</strong> 108, a work maybe copied for preservati<strong>on</strong> purposes if it is currently in <strong>the</strong> collecti<strong>on</strong>s of <strong>the</strong> library or archives1012 “Latest <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty Implementati<strong>on</strong> Bill Limits Scope of Shrink-Wrap Agreements,” BNA’s Electr<strong>on</strong>icInformati<strong>on</strong> Policy & Law Report (Nov. 26, 1997) at 1232.- 228 -


and, if reproduced in digital format, it is not o<strong>the</strong>rwise distributed in that format and is not madeavailable to <strong>the</strong> public in that format outside <strong>the</strong> premises of <strong>the</strong> library or archives.6. Distance Educati<strong>on</strong>Secti<strong>on</strong> 403 of <strong>the</strong> DMCA requires that, within six m<strong>on</strong>ths after enactment, <strong>the</strong> Registerof <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>s submit to C<strong>on</strong>gress recommendati<strong>on</strong>s <strong>on</strong> how to promote distance educati<strong>on</strong>through digital technologies, including interactive digital networks, while maintaining anappropriate balance between <strong>the</strong> rights of copyright owners and <strong>the</strong> needs of users of copyrightedworks. The DMCA lists a number of factors that should be c<strong>on</strong>sidered in making suchrecommendati<strong>on</strong>s. 10137. Copying in <strong>the</strong> Course of Computer Maintenance or RepairTitle III of <strong>the</strong> DMCA added a new subsecti<strong>on</strong> to Secti<strong>on</strong> 117 of <strong>the</strong> copyright statute,providing that it is not an infringement for an owner or lessee of a machine to make or authorize<strong>the</strong> making of a copy of a computer program if such copy is made solely by virtue of <strong>the</strong>activati<strong>on</strong> of a machine that lawfully c<strong>on</strong>tains an authorized copy of <strong>the</strong> program, for purposes<strong>on</strong>ly of maintenance or repair of that machine, provided <strong>the</strong> copy is used in no o<strong>the</strong>r manner andis destroyed immediately after <strong>the</strong> maintenance or repair is completed, and, with respect to anycomputer program or porti<strong>on</strong> <strong>the</strong>reof that is not necessary for that machine to be activated, suchis not accessed or used o<strong>the</strong>r than to make <strong>the</strong> new copy by virtue of <strong>the</strong> activati<strong>on</strong> of <strong>the</strong>machine.This amendment to <strong>the</strong> copyright statute was deemed necessary by its sp<strong>on</strong>sors in view ofjudicial decisi<strong>on</strong>s such as MAI Systems Corp. v. Peak Computer, 1014 discussed above, and TriadSys. v. Sou<strong>the</strong>astern Express Co., 1015 which held that copying porti<strong>on</strong>s of a computer program tomemory in <strong>the</strong> course of turning <strong>on</strong> and running <strong>the</strong> machine c<strong>on</strong>stitutes a “reproducti<strong>on</strong>” under1013 The factors include: The need for an exempti<strong>on</strong> from exclusive rights of copyright owners for distanceeducati<strong>on</strong> through digital networks; <strong>the</strong> categories of works to be included under <strong>the</strong> exempti<strong>on</strong>; <strong>the</strong> extent ofappropriate quantitative limitati<strong>on</strong>s <strong>on</strong> <strong>the</strong> porti<strong>on</strong>s of works that may be used under <strong>the</strong> exempti<strong>on</strong>; <strong>the</strong> partieswho should be entitled to <strong>the</strong> benefits of <strong>the</strong> exempti<strong>on</strong>; <strong>the</strong> parties who should be designated as eligiblerecipients of distance educati<strong>on</strong> materials under <strong>the</strong> exempti<strong>on</strong>; whe<strong>the</strong>r and what types of technologicalmeasures can or should be employed as a safeguard against unauthorized access to and use or retenti<strong>on</strong> ofcopyrighted materials as a c<strong>on</strong>diti<strong>on</strong> of eligibility for any exempti<strong>on</strong>; and <strong>the</strong> extent to which <strong>the</strong> availability oflicenses for <strong>the</strong> use of copyrighted works in distance educati<strong>on</strong> through interactive digital networks should bec<strong>on</strong>sidered in assessing eligibility for <strong>the</strong> exempti<strong>on</strong>.Both S. 1146 and H.R. 3048 would have afforded a broader expansi<strong>on</strong> of <strong>the</strong> exempti<strong>on</strong>s in Secti<strong>on</strong> 110(2) of<strong>the</strong> copyright statute for certain performances or displays of copyrighted works for instructi<strong>on</strong>al activitiesperformed by government or n<strong>on</strong>profit educati<strong>on</strong>al instituti<strong>on</strong>s. The bills would have extended this exempti<strong>on</strong>to distributi<strong>on</strong>s of a work, in additi<strong>on</strong> to performances and displays, to cover <strong>the</strong> distributi<strong>on</strong> of a work over acomputer network. The bills would also have expanded <strong>the</strong> exempti<strong>on</strong> from n<strong>on</strong>dramatic literary or musicalworks to all works, and extended <strong>the</strong> exempti<strong>on</strong> to apply to students officially enrolled in <strong>the</strong> course, not <strong>on</strong>lycourses held in a classroom.1014 991 F.2d 511 (9th Cir. 1993), cert. dismissed, 114 S. Ct. 672 (1994).1015 64 F.3d 1330 (9th Cir. 1995), cert. denied, 116 S. Ct. 1015 (1996).- 229 -


Secti<strong>on</strong> 106 of <strong>the</strong> copyright statute. Under <strong>the</strong>se decisi<strong>on</strong>s, a service technician who is not <strong>the</strong>owner or licensee of <strong>the</strong> system software commits copyright infringement by even booting up <strong>the</strong>machine for maintenance or repair. The revisi<strong>on</strong>s to Secti<strong>on</strong> 117 made by <strong>the</strong> DMCA changethis result. In Telecomm Technical Services Inc. v. Siemens Rolm Communicati<strong>on</strong>s, 1016 <strong>the</strong>court ruled that this provisi<strong>on</strong> is to be applied retroactively.The scope of <strong>the</strong> computer maintenance and repair right was c<strong>on</strong>strued very broadly in<strong>the</strong> case of Storage Technology Corporati<strong>on</strong> v. Custom Hardware Engineering & C<strong>on</strong>sulting,discussed in Secti<strong>on</strong> II.G.1(a)(14)(iv) above.8. O<strong>the</strong>r Provisi<strong>on</strong>s of <strong>the</strong> DMCAThe DMCA c<strong>on</strong>tains <strong>the</strong> following o<strong>the</strong>r miscellaneous provisi<strong>on</strong>s:(a) Evaluati<strong>on</strong> of Impact of <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Law <strong>on</strong> Electr<strong>on</strong>ic CommerceSecti<strong>on</strong> 104 of <strong>the</strong> DMCA requires <strong>the</strong> Register of <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>s and <strong>the</strong> AssistantSecretary for Communicati<strong>on</strong>s and Informati<strong>on</strong> of <strong>the</strong> Commerce Department to study and reportto C<strong>on</strong>gress within two years of enactment of <strong>the</strong> DMCA with respect to <strong>the</strong> DMCA’s impact <strong>on</strong>“<strong>the</strong> development of electr<strong>on</strong>ic commerce and associated technology,” and “<strong>the</strong> relati<strong>on</strong>shipbetween existing and emergent technology” and Secti<strong>on</strong>s 109 and 117 of <strong>the</strong> copyright statute.The report required under Secti<strong>on</strong> 104 was issued in August of 2001 and is available <strong>on</strong>line atwww.loc.gov/copyright/reports/studies/dmca/dmca_study.html.In a nutshell, <strong>the</strong> executive summary of <strong>the</strong> report c<strong>on</strong>cludes, “We are not persuaded thattitle I of <strong>the</strong> DMCA has had a significant effect <strong>on</strong> <strong>the</strong> operati<strong>on</strong> of secti<strong>on</strong>s 109 and 117 of title17. The adverse effects that secti<strong>on</strong> 1201, for example, is alleged to have had <strong>on</strong> <strong>the</strong>se secti<strong>on</strong>scannot accurately be ascribed to secti<strong>on</strong> 1201. The causal relati<strong>on</strong>ship between <strong>the</strong> problemsidentified and secti<strong>on</strong> 1201 are currently ei<strong>the</strong>r minimal or easily attributable to o<strong>the</strong>r factorssuch as <strong>the</strong> increasing use of license terms. Accordingly, n<strong>on</strong>e of our legislativerecommendati<strong>on</strong>s are based <strong>on</strong> <strong>the</strong> effects of secti<strong>on</strong> 1201 <strong>on</strong> <strong>the</strong> operati<strong>on</strong> of secti<strong>on</strong>s 109 and117.” 1017 The report does, however, recommend two legislative changes: (i) that <strong>the</strong> copyrightstatute be amended “to preclude any liability arising from <strong>the</strong> asserti<strong>on</strong> of a copyright owner’sreproducti<strong>on</strong> right with respect to temporary buffer copies that are incidental to a licensed digitaltransmissi<strong>on</strong> of a public performance of a sound recording and any underlying musical work” 1018and (ii) that C<strong>on</strong>gress “ei<strong>the</strong>r (1) amend secti<strong>on</strong> 109 to ensure that fair use copies are not subjectto <strong>the</strong> first sale doctrine or (2) create a new archival exempti<strong>on</strong> that provides expressly that1016 No. 1:95-CV-649-WBH (N.D. Ga. July 6, 1999).1017 The quoted language is from <strong>the</strong> opening paragraph of Secti<strong>on</strong> III of <strong>the</strong> Executive Summary of <strong>the</strong> report. TheExecutive Summary may be found at www.loc.gov/copyright/reports/studies/dmca/dmca_executive.html.1018 Id. secti<strong>on</strong> III.b.2.c.- 230 -


ackup copies may not be distributed.” 1019 The recommendati<strong>on</strong> with respect to temporarybuffer copies is discussed fur<strong>the</strong>r in Secti<strong>on</strong> III.E.4(b) below.(b) Clarificati<strong>on</strong> of <strong>the</strong> Authority of <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> OfficeSecti<strong>on</strong> 401 of <strong>the</strong> DMCA clarifies <strong>the</strong> authority of <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office. Specifically, itprovides that, in additi<strong>on</strong> to <strong>the</strong> functi<strong>on</strong>s and duties of <strong>the</strong> Register of <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>s alreadyenumerated in <strong>the</strong> copyright statute, <strong>the</strong> Register shall perform <strong>the</strong> following functi<strong>on</strong>s: (1)Advise C<strong>on</strong>gress <strong>on</strong> nati<strong>on</strong>al and internati<strong>on</strong>al issues relating to copyright; (2) Provideinformati<strong>on</strong> and assistance to federal departments and agencies and <strong>the</strong> judiciary <strong>on</strong> nati<strong>on</strong>al andinternati<strong>on</strong>al issues relating to copyright; (3) Participate in meetings of internati<strong>on</strong>alintergovernmental organizati<strong>on</strong>s and meetings with foreign government officials relating tocopyright; and (4) C<strong>on</strong>duct studies and programs regarding copyright, including educati<strong>on</strong>alprograms c<strong>on</strong>ducted cooperatively with foreign intellectual property offices and internati<strong>on</strong>alintergovernmental governments. 1020(c) Ephemeral RecordingsSecti<strong>on</strong> 402 of <strong>the</strong> DMCA expands <strong>the</strong> rights under Secti<strong>on</strong> 112 of <strong>the</strong> copyright statuteof broadcast radio or televisi<strong>on</strong> stati<strong>on</strong>s licensed by <strong>the</strong> FCC to make ephemeral recordings ofmaterial transmitted via analog broadcasts to include recordings of a performance of a soundrecording in digital format <strong>on</strong> a n<strong>on</strong>-subscripti<strong>on</strong> basis. This expansi<strong>on</strong> of <strong>the</strong> ephemeralrecording right was made necessary by <strong>the</strong> Digital Performance Right in Sound Recordings Actof 1995, which granted sound recording copyright owners <strong>the</strong> exclusive right to publicly perform<strong>the</strong>ir works by means of digital audio transmissi<strong>on</strong>s.1019 Id. secti<strong>on</strong> III.b.3.b.1020 This provisi<strong>on</strong> is <strong>the</strong> outcome of a skirmish that developed between Bruce Lehman, <strong>the</strong> former Commissi<strong>on</strong>erof Patents & Trademarks and Mary Beth Peters, <strong>the</strong> Register of <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>s. Commissi<strong>on</strong>er Lehman waspushing for creati<strong>on</strong> of a new positi<strong>on</strong> of Under Secretary of Commerce for Intellectual Property Policy, orwhat some referred to as an “intellectual property czar.” Under a proposed provisi<strong>on</strong> that did not passC<strong>on</strong>gress, <strong>the</strong> duties of <strong>the</strong> new positi<strong>on</strong> would have been to: (1) Promote exports of goods and services of <strong>the</strong>United States industries that rely <strong>on</strong> intellectual property; (2) Advise <strong>the</strong> President, through <strong>the</strong> Secretary ofCommerce, <strong>on</strong> nati<strong>on</strong>al and certain internati<strong>on</strong>al issues relating to intellectual property policy, including issuesin <strong>the</strong> areas of patents, trademarks, and copyrights; (3) Advise Federal departments and agencies <strong>on</strong> matters ofintellectual property protecti<strong>on</strong> in o<strong>the</strong>r countries; (4) Provide guidance, as appropriate, with respect toproposals by agencies to assist foreign governments and internati<strong>on</strong>al intergovernmental organizati<strong>on</strong>s <strong>on</strong>matters of intellectual property protecti<strong>on</strong>; (5) C<strong>on</strong>duct programs and studies related to <strong>the</strong> effectiveness ofintellectual property protecti<strong>on</strong> throughout <strong>the</strong> world; (6) Advise <strong>the</strong> Secretary of Commerce <strong>on</strong> programs andstudies relating to intellectual property policy that are c<strong>on</strong>ducted, or authorized to be c<strong>on</strong>ducted, cooperativelywith foreign patent and trademark offices and internati<strong>on</strong>al intergovernmental organizati<strong>on</strong>s; and (7) Incoordinati<strong>on</strong> with <strong>the</strong> Department of State, c<strong>on</strong>duct programs and studies cooperatively with foreign intellectualproperty offices and internati<strong>on</strong>al intergovernmental organizati<strong>on</strong>s.The effect of this provisi<strong>on</strong> would have been to vest resp<strong>on</strong>sibility for public policy issues relating to copyright(as well as trademarks and patents) in <strong>the</strong> new positi<strong>on</strong>, relegating <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office to a largelyadministrative role primarily related to registrati<strong>on</strong> of copyrights. The <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office was obviously opposedto this, and appears to have been <strong>the</strong> victor of <strong>the</strong> skirmish, for Secti<strong>on</strong> 401 makes clear that resp<strong>on</strong>sibility forpublic policy issues relating to copyright lies with <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office, led by <strong>the</strong> Register of <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>s.- 231 -


Secti<strong>on</strong> 402 resp<strong>on</strong>ds to C<strong>on</strong>gress’ c<strong>on</strong>cern, expressed in <strong>the</strong> C<strong>on</strong>ference Report, that ifuse of copy protecti<strong>on</strong> technologies becomes widespread, a transmitting organizati<strong>on</strong> might beprevented from engaging in its traditi<strong>on</strong>al activities of assembling transmissi<strong>on</strong> programs andmaking ephemeral recordings permitted by Secti<strong>on</strong> 112 of <strong>the</strong> copyright statute. Accordingly,Secti<strong>on</strong> 402 provides that where a transmitting organizati<strong>on</strong> entitled to make an ephemeralrecording is prevented from making such recording by <strong>the</strong> applicati<strong>on</strong> by <strong>the</strong> copyright owner ofa technical measure that prevents reproducti<strong>on</strong> of <strong>the</strong> work, <strong>the</strong> copyright owner must makeavailable to <strong>the</strong> transmitting organizati<strong>on</strong> <strong>the</strong> necessary means for making <strong>the</strong> recording, if ittechnologically feasible and ec<strong>on</strong>omically reas<strong>on</strong>able to do so. If <strong>the</strong> copyright owner fails to doso in a timely manner, <strong>the</strong>n <strong>the</strong> transmitting organizati<strong>on</strong> is granted an exempti<strong>on</strong> from liabilityunder <strong>the</strong> provisi<strong>on</strong>s of <strong>the</strong> DMCA that would o<strong>the</strong>rwise prohibit <strong>the</strong> transmitting organizati<strong>on</strong>from circumventing <strong>the</strong> technical measure.Recordings(d) Statutory Licenses With Respect to Performances of SoundSecti<strong>on</strong> 405 of <strong>the</strong> DMCA c<strong>on</strong>tains provisi<strong>on</strong>s relating to statutory compulsory licenseswith respect to performances of sound recordings, including digital audio transmissi<strong>on</strong>s, and setsup procedures for voluntary negotiati<strong>on</strong> proceedings to determine reas<strong>on</strong>able terms and rates ofroyalty payments for public performances of sound recordings. According to <strong>the</strong> C<strong>on</strong>ferenceReport, Secti<strong>on</strong> 405 was intended to achieve two purposes: first, to fur<strong>the</strong>r a stated objective ofC<strong>on</strong>gress when it passed <strong>the</strong> Digital Performance Right in Sound Recordings Act of 1995 toensure that recording artists and record companies will be protected as new technologies affect<strong>the</strong> ways in which <strong>the</strong>ir creative works are used; and sec<strong>on</strong>d, to create fair and efficient licensingmechanisms that address <strong>the</strong> complex issues facing copyright owners and copyrights users as aresult of <strong>the</strong> rapid growth of digital audio services. 1021 The details of <strong>the</strong>se provisi<strong>on</strong>s, which arelengthy and quite complex, are bey<strong>on</strong>d <strong>the</strong> scope of this paper.(e) Assumpti<strong>on</strong> of C<strong>on</strong>tractual Obligati<strong>on</strong>s Related to Transfers ofRights in Moti<strong>on</strong> PicturesSecti<strong>on</strong> 406 of <strong>the</strong> DMCA adds a new Secti<strong>on</strong> 4001 to Title 28 of <strong>the</strong> United States Codeto address <strong>the</strong> problem caused by <strong>the</strong> failure of moti<strong>on</strong> picture producers to obtain, as part of acollective bargaining agreement, assumpti<strong>on</strong> agreements from distributors to make residualpayments. New Secti<strong>on</strong> 4001 provides generally that transfers of copyright ownership notlimited to public performance rights by exhibitors in moti<strong>on</strong> pictures produced subject to acollective bargaining agreement will be subject to <strong>the</strong> assumpti<strong>on</strong> agreements applicable to <strong>the</strong>copyright ownership being transferred that are required by <strong>the</strong> applicable collective bargainingagreement, provided that <strong>the</strong> transferee knows or has reas<strong>on</strong> to know at <strong>the</strong> time of <strong>the</strong> transferof <strong>the</strong> collective bargaining agreement, or, in <strong>the</strong> event of a court order c<strong>on</strong>firming an arbitrati<strong>on</strong>award against <strong>the</strong> transferor under <strong>the</strong> collective bargaining agreement, <strong>the</strong> transferor does nothave <strong>the</strong> financial ability to satisfy <strong>the</strong> award within 90 days after <strong>the</strong> order is issued. Securityinterests and transfers related to exercise of security interests in such moti<strong>on</strong> pictures areexempted from <strong>the</strong> provisi<strong>on</strong>s of Secti<strong>on</strong> 4001.1021 Id. at 79-80.- 232 -


(f)Protecti<strong>on</strong> of Certain Industrial DesignsTitle V of <strong>the</strong> DMCA adds a new Chapter 13 to <strong>the</strong> copyright statute entitled “Protecti<strong>on</strong>of Original Designs.” Although as currently enacted, Chapter 13 protects <strong>on</strong>ly vessel hulldesigns 1022 with a copyright-like design right, its provisi<strong>on</strong>s are drafted in <strong>the</strong> form of a generalindustrial design protecti<strong>on</strong> statute. Merely by changing a definiti<strong>on</strong> in <strong>the</strong> statute, C<strong>on</strong>gress canin <strong>the</strong> future easily extend <strong>the</strong> scope of industrial designs that are protected. To obtainprotecti<strong>on</strong>, <strong>the</strong> statute requires that <strong>the</strong> owner of <strong>the</strong> design register <strong>the</strong> design with <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>Office within two years of making <strong>the</strong> design public as embodied in a useful article. Title V of<strong>the</strong> DMCA originally provided that <strong>the</strong> design protecti<strong>on</strong> statute would be effective for an initialtrial period of two years. However, Secti<strong>on</strong> 5005(a)(2) of <strong>the</strong> Intellectual Property andCommunicati<strong>on</strong>s Omnibus Reform Act of 1999 1023 deleted this two-year sunset provisi<strong>on</strong>.(1) Protecti<strong>on</strong> of Designs Embodied in Useful ArticlesSecti<strong>on</strong> 1301(a) of <strong>the</strong> statute provides generally that <strong>the</strong> “designer or o<strong>the</strong>r owner of anoriginal design of a useful article which makes <strong>the</strong> article attractive or distinctive in appearanceto <strong>the</strong> purchasing or using public may secure <strong>the</strong> protecti<strong>on</strong> provided by this chapter up<strong>on</strong>complying with and subject to this chapter.” Secti<strong>on</strong> 1301(b)(2) defines a “useful article” as a“vessel hull or deck, 1024 including a plug or mold, which in normal use has an intrinsic utilitarianfuncti<strong>on</strong> that is not merely to portray <strong>the</strong> appearance of <strong>the</strong> article or to c<strong>on</strong>vey informati<strong>on</strong>. Anarticle which normally is part of a useful article shall be deemed to be a useful article.” It isapparent that, although this definiti<strong>on</strong> is currently limited to vessel hulls and decks, <strong>the</strong> phrase“vessel hull or deck” in <strong>the</strong> definiti<strong>on</strong> could easily be replaced with a generic phrase such as“article,” <strong>the</strong>reby extending protecti<strong>on</strong> to general industrial designs. Alternatively, enumeratedcategories of designs in additi<strong>on</strong> to vessel hulls or decks could easily be added to <strong>the</strong> definiti<strong>on</strong>.(2) OriginalityThe statute establishes a low threshold of originality for protecti<strong>on</strong>. Specifically, Secti<strong>on</strong>1301(b)(1) provides that a design is original “if it is <strong>the</strong> result of <strong>the</strong> designer’s creative endeavorthat provides a distinguishable variati<strong>on</strong> over prior work pertaining to similar articles which ismore than merely trivial and has not been copied from ano<strong>the</strong>r source.” Although this is a low1022 Title V overrules B<strong>on</strong>ita Boats, Inc. v. Thunder Craft Boats, Inc., 489 U.S. 141 (1989), in which <strong>the</strong> SupremeCourt barred states from protecting unpatented boat hulls because such protecti<strong>on</strong> c<strong>on</strong>flicts with <strong>the</strong> federalpolicy favoring free competiti<strong>on</strong> in inventi<strong>on</strong>s not qualifying for patent protecti<strong>on</strong>.1023 P.L. 106-113 (1999).1024 Secti<strong>on</strong> 1301(b)(3), as amended by Secti<strong>on</strong> 5005(a)(2) of <strong>the</strong> Intellectual Property and Communicati<strong>on</strong>sOmnibus Reform Act of 1999, P.L. 106-113, defines a “vessel” as “a craft--(A) that is designed and capable ofindependently steering a course <strong>on</strong> or through water through its own means of propulsi<strong>on</strong>; and (B) that isdesigned and capable of carrying and transporting <strong>on</strong>e or more passengers.” Under Secti<strong>on</strong> 1301(b)(4), asamended by <strong>the</strong> Vessel Hull Design Protecti<strong>on</strong> Amendments of 2008, P.L. 110-434, a “hull” is “<strong>the</strong> exteriorframe or body of a vessel, exclusive of <strong>the</strong> deck, superstructure, masts, sails, yards, rigging, hardware, fixtures,and o<strong>the</strong>r attachments” and a “deck” is “<strong>the</strong> horiz<strong>on</strong>tal surface of a vessel that covers <strong>the</strong> hull, includingexterior cabin and cockpit surfaces, and exclusive of masts, sails, yards, rigging, hardware, fixtures, and o<strong>the</strong>rattachments.”- 233 -


threshold, it is interesting to note that it is a higher threshold than under copyright law.Specifically, under copyright law a work of authorship is deemed original if it is simply notcopied from ano<strong>the</strong>r work, whe<strong>the</strong>r or not it embodies a distinguishable variati<strong>on</strong> from priorworks. Thus, two photographers could take identical photos from <strong>the</strong> edge of <strong>the</strong> Grand Cany<strong>on</strong>by standing in <strong>the</strong> same places, and each would produce an “original,” and <strong>the</strong>reforecopyrightable, photo. By c<strong>on</strong>trast, under <strong>the</strong> design statute, a sec<strong>on</strong>d designer who, as a result ofindependent development, happens to produce a design <strong>the</strong> same as a preexisting design, has notcreated an “original” design.(3) Exclusi<strong>on</strong>s from Protecti<strong>on</strong>Secti<strong>on</strong> 1302 excludes protecti<strong>on</strong> for a design that is:(1) not original;(2) staple or comm<strong>on</strong>place, such as a standard geometric figure, a familiarsymbol, an emblem, or a motif, or ano<strong>the</strong>r shape, pattern, or c<strong>on</strong>figurati<strong>on</strong> whichhas become standard, comm<strong>on</strong>, prevalent, or ordinary;(3) different from a design excluded by clause (2) <strong>on</strong>ly in insignificant details orin elements which are variants comm<strong>on</strong>ly used in <strong>the</strong> relevant trades;(4) dictated solely by a utilitarian functi<strong>on</strong> of <strong>the</strong> article that embodies it; 1025 or(5) embodied in a useful article that was made public by <strong>the</strong> designer or owneranywhere in <strong>the</strong> world more than two years 1026 before registering <strong>the</strong> design with<strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office. 1027 (Under Secti<strong>on</strong> 1310(b), a design is “made public”when an existing useful article embodying <strong>the</strong> design “is anywhere publiclyexhibited, publicly distributed, or offered for sale or sold to <strong>the</strong> public by <strong>the</strong>owner of <strong>the</strong> design or with <strong>the</strong> owner’s c<strong>on</strong>sent.”)1025 Secti<strong>on</strong> 1301(a)(2), as amended by <strong>the</strong> Vessel Hull Design Protecti<strong>on</strong> Amendments of 2008, P.L. 110-434,provides, “The design of a vessel hull, deck, or combinati<strong>on</strong> of a hull and deck, including a plug or mold, issubject to protecti<strong>on</strong> under this chapter, notwithstanding secti<strong>on</strong> 1302(4).”1026 Secti<strong>on</strong> 1302(5) as originally published at 112 Stat. 2906 reads “1 year” at this point in clause (5). However,this is apparently an error, for Secti<strong>on</strong> 1310(a) states that protecti<strong>on</strong> shall be lost “if applicati<strong>on</strong> for registrati<strong>on</strong>of <strong>the</strong> design in not made within 2 years after <strong>the</strong> date <strong>on</strong> which <strong>the</strong> design is first made public” (emphasisadded).1027 Under <strong>the</strong> provisi<strong>on</strong>s of Secti<strong>on</strong> 1310, <strong>the</strong> registrati<strong>on</strong> of a design requires, am<strong>on</strong>g o<strong>the</strong>r things, <strong>the</strong> specificname of <strong>the</strong> useful article embodying <strong>the</strong> design, and two copies of a drawing or o<strong>the</strong>r pictorial representati<strong>on</strong>of <strong>the</strong> useful article having <strong>on</strong>e or more views adequate to show <strong>the</strong> design in a form and style suitable forreproducti<strong>on</strong>. Secti<strong>on</strong> 1310(i) provides that when a design is embodied in more than <strong>on</strong>e useful article, <strong>the</strong>design is protected as to all useful articles when protected as to <strong>on</strong>e of <strong>the</strong>m, but <strong>on</strong>ly <strong>on</strong>e registrati<strong>on</strong> isrequired for <strong>the</strong> design. Secti<strong>on</strong> 1313(c) sets up certain procedures by which a registered design may bechallenged and canceled. Under Secti<strong>on</strong> 1314, a registrati<strong>on</strong> c<strong>on</strong>stitutes prima facie evidence of <strong>the</strong> facts statedin <strong>the</strong> registrati<strong>on</strong> certificate.- 234 -


(4) Adaptati<strong>on</strong>s of Unprotectable ElementsSecti<strong>on</strong> 1303 provides that a design employing elements not protectable under Secti<strong>on</strong>1302 may never<strong>the</strong>less be protected if such design is a substantial revisi<strong>on</strong>, adaptati<strong>on</strong>, orrearrangement of such unprotectable elements.(5) Durati<strong>on</strong> of Protecti<strong>on</strong> and Design NoticeProtecti<strong>on</strong> commences <strong>on</strong> <strong>the</strong> earlier of <strong>the</strong> date of publicati<strong>on</strong> of <strong>the</strong> design’s registrati<strong>on</strong>or its first being made public, and lasts for a term of ten years (including through <strong>the</strong> end of <strong>the</strong>calendar year of <strong>the</strong> tenth year). Secti<strong>on</strong> 1306 requires designs that have been made public tobear a design notice comprised of <strong>the</strong> words “Protected Design,” <strong>the</strong> abbreviati<strong>on</strong> “Prot’d Des.,”or <strong>the</strong> letter “D” with a circle or <strong>the</strong> symbol “*D*”; <strong>the</strong> year of <strong>the</strong> date <strong>on</strong> which protecti<strong>on</strong>commenced; and <strong>the</strong> name of <strong>the</strong> owner or a recognized abbreviati<strong>on</strong> or alternative name. Afterregistrati<strong>on</strong>, <strong>the</strong> registrati<strong>on</strong> number may be used in <strong>the</strong> design notice in lieu of <strong>the</strong> sec<strong>on</strong>d andthird notice elements enumerated above. Under Secti<strong>on</strong> 1307, omissi<strong>on</strong> of <strong>the</strong> notice does notinvalidate protecti<strong>on</strong>, but prevents any recovery of damages against an infringer until <strong>the</strong>infringer has notice of <strong>the</strong> design rights, and no injuncti<strong>on</strong> may issue against such infringerunless <strong>the</strong> owner reimburses <strong>the</strong> infringer for any reas<strong>on</strong>able expenditure or c<strong>on</strong>tractualobligati<strong>on</strong> incurred before receiving notice.(6) Rights of a Design Owner and Limitati<strong>on</strong>sUnder Secti<strong>on</strong> 1308, <strong>the</strong> owner of a protected design has <strong>the</strong> exclusive right to make,have made, or import, for sale or for use in trade, any useful article embodying <strong>the</strong> design, and tosell or distribute for sale or for use in trade any useful article embodying <strong>the</strong> design. Secti<strong>on</strong>1309 places a number of limitati<strong>on</strong>s <strong>on</strong> who may be deemed infringers, however:-- First, under Secti<strong>on</strong> 1309(b), a seller or distributor who did not make or importan infringing article is itself deemed an infringer <strong>on</strong>ly if (i) <strong>the</strong> seller or distributorinduced or acted in collusi<strong>on</strong> with a manufacturer or importer (o<strong>the</strong>r than bymerely placing an order for <strong>the</strong> infringing articles) or (ii) failed to make a promptand full disclosure of its source of <strong>the</strong> infringing article up<strong>on</strong> request of <strong>the</strong> designowner, and <strong>the</strong> seller or distributor orders or reorders <strong>the</strong> infringing articles afterreceiving notice by registered or certified mail that <strong>the</strong> design is protected.-- Sec<strong>on</strong>d, a pers<strong>on</strong> who makes, has made, imports, sells or distributes an articleembodying an infringing design which was created without such pers<strong>on</strong>’sknowledge that <strong>the</strong> design was protected and was copied from <strong>the</strong> protecteddesign.-- Third, a pers<strong>on</strong> who incorporates into that pers<strong>on</strong>’s product of manufacture aninfringing article acquired from ano<strong>the</strong>r in <strong>the</strong> ordinary course of business or who,without knowledge of <strong>the</strong> protected design embodied in an infringing article,makes or processes <strong>the</strong> infringing article for <strong>the</strong> account of ano<strong>the</strong>r in <strong>the</strong> ordinarycourse of business, is not an infringer, except to <strong>the</strong> extent such pers<strong>on</strong> would bedeemed an infringer under <strong>the</strong> seller/distributor provisi<strong>on</strong>s above.- 235 -


(7) Standard of InfringementUnder Secti<strong>on</strong> 1309(a), to establish infringement, a design owner must prove that an“infringing article” has been made, imported, sold or distributed without <strong>the</strong> design owner’sc<strong>on</strong>sent. Secti<strong>on</strong> 1309(e) defines an “infringing article” as <strong>on</strong>e embodying a design that was“copied” from a protected design, and provides that an infringing article “is not an illustrati<strong>on</strong> orpicture of a protected design in an advertisement, book, periodical, newspaper, photograph,broadcast, moti<strong>on</strong> picture, or similar medium.” The statute does not directly define what itmeans to “copy” a design. However, Secti<strong>on</strong> 1309(e) provides, “A design shall not be deemed tohave been copied from a protected design if it is original and not substantially similar inappearance to a protected design.” 1028 Strictly speaking, this provisi<strong>on</strong> enumerates <strong>on</strong>ly <strong>on</strong>e wayin which an alleged infringer can rebut an allegati<strong>on</strong> of copying, and it does not state that this is<strong>the</strong> <strong>on</strong>ly way. However, it is unclear what happens when an accused design is, by coincidence,substantially similar to a protected design but can be shown to have been independentlydeveloped. Such a showing of independent development would be sufficient to avoid liabilityunder copyright law, and it seems logical that it should be sufficient to prove that <strong>the</strong> design wasnot “copied” under <strong>the</strong> design statute as well.(8) Benefit of Foreign Filing DateUnder Secti<strong>on</strong> 1311, an applicant for registrati<strong>on</strong> of a design in <strong>the</strong> United States canclaim <strong>the</strong> benefit of an earlier filing date in a foreign country for registrati<strong>on</strong> of <strong>the</strong> same designif (i) <strong>the</strong> foreign country extends similar design protecti<strong>on</strong> to citizens of <strong>the</strong> United States, and(ii) <strong>the</strong> applicati<strong>on</strong> is filed in <strong>the</strong> United States within six m<strong>on</strong>ths after <strong>the</strong> earliest date <strong>on</strong> whichany such foreign applicati<strong>on</strong> was filed.(9) Vesting and Transfer of OwnershipUnder Secti<strong>on</strong> 1320, design rights vest in <strong>the</strong> creator of <strong>the</strong> design, or, in <strong>the</strong> case of adesign made within <strong>the</strong> regular scope of <strong>the</strong> designer’s employment, in <strong>the</strong> employer. Propertyrights in a design may be assigned or mortgaged by an instrument in writing, and any suchc<strong>on</strong>veyance is void as against a subsequent purchaser or mortgagee for valuable c<strong>on</strong>siderati<strong>on</strong>unless it is recorded in <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office within three m<strong>on</strong>ths after its executi<strong>on</strong> or before <strong>the</strong>date of such subsequent purchase or mortgage.and Destructi<strong>on</strong>(10) Remedies of Injunctive Relief, Damages, Attorneys’ FeesSecti<strong>on</strong> 1322 permits a court to award preliminary and permanent injunctive reliefagainst infringement of protected designs. Under Secti<strong>on</strong> 1323(a), <strong>the</strong> owner of a protecteddesign may recover “damages adequate to compensate for <strong>the</strong> infringement,” but <strong>the</strong> damages1028 It is unclear what <strong>the</strong> relati<strong>on</strong>ship is between <strong>the</strong> standard of “substantially similar” for infringement purposesand <strong>the</strong> standard of “distinguishable variati<strong>on</strong>” (in <strong>the</strong> definiti<strong>on</strong> of “original”) for purposes of protectability.However, Secti<strong>on</strong> 1309(f) provides that if an accused infringer introduces an earlier work which is identical toan allegedly protected design or so similar as to make a prima facie showing that such design was copied, <strong>the</strong>n<strong>the</strong> burden shifts to <strong>the</strong> owner of <strong>the</strong> allegedly protected design to prove its originality.- 236 -


awarded “shall c<strong>on</strong>stitute compensati<strong>on</strong> and not a penalty.” Secti<strong>on</strong> 1323(a) permits <strong>the</strong> court toincrease <strong>the</strong> damages to such amount, not exceeding $50,000 or $1 per copy, whichever isgreater, as <strong>the</strong> court deems just. As an alternative, under Secti<strong>on</strong> 1323(b), <strong>the</strong> court may award<strong>the</strong> owner of <strong>the</strong> protected design <strong>the</strong> infringer’s profits resulting from <strong>the</strong> sale of <strong>the</strong> infringingcopies “if <strong>the</strong> court finds that <strong>the</strong> infringer’s sales are reas<strong>on</strong>ably related to <strong>the</strong> use” of <strong>the</strong>protected design. The owner is required to prove <strong>on</strong>ly <strong>the</strong> amount of <strong>the</strong> infringer’s sales, and<strong>the</strong> infringer must <strong>the</strong>n prove its expenses against such sales. Secti<strong>on</strong> 1323(d) allows <strong>the</strong> court toaward attorneys’ fees to <strong>the</strong> prevailing party and Secti<strong>on</strong> 1323(e) allows <strong>the</strong> court to order <strong>the</strong>destructi<strong>on</strong> of plates, molds, and <strong>the</strong> like used to make infringing articles. Secti<strong>on</strong> 1323(c) setsup a three year statute of limitati<strong>on</strong>s.(11) Private Rights of Acti<strong>on</strong> Against Pirated DesignsSecti<strong>on</strong> 1326 affords a powerful remedy for victims of pirated designs. Specifically, thatSecti<strong>on</strong> allows a private right of acti<strong>on</strong> to recover civil fines of not more than $500 per offensefor false marking with a design notice knowing that <strong>the</strong> design is not protected. The civil finesare split equally between <strong>the</strong> private plaintiff and <strong>the</strong> United States.(12) Relati<strong>on</strong> to Design Patents and Retroactive EffectFinally, Secti<strong>on</strong> 1329 provides that <strong>the</strong> issuance of a design patent terminates anyprotecti<strong>on</strong> for <strong>the</strong> original design under <strong>the</strong> design statute, and Secti<strong>on</strong> 1332 provides that <strong>the</strong>design statute has no retroactive effect.(g) Limitati<strong>on</strong> of Liability of Online Service ProvidersThe DMCA c<strong>on</strong>tains elaborate provisi<strong>on</strong>s and safe harbors that limit <strong>the</strong> liability of<strong>on</strong>line service providers for copyright infringement occurring through <strong>the</strong>ir services. Theseprovisi<strong>on</strong>s are discussed in Secti<strong>on</strong> III.C.5 below.(h) Subpoenas to Service ProvidersSecti<strong>on</strong> 512(h) of <strong>the</strong> DMCA sets up a procedure through which a copyright owner mayobtain a subpoena through a United States district court directing <strong>the</strong> service provider to release<strong>the</strong> identity of an alleged direct infringer acting through <strong>the</strong> service provider’s system ornetwork. The subpoena is issued by <strong>the</strong> clerk of any United States district court up<strong>on</strong> a requestby <strong>the</strong> copyright owner (or <strong>on</strong>e authorized to act <strong>on</strong> <strong>the</strong> owner’s behalf) c<strong>on</strong>taining <strong>the</strong> proposedsubpoena, “a copy of a notificati<strong>on</strong> described in subsecti<strong>on</strong> (c)(3)(A),” and a sworn declarati<strong>on</strong>ensuring that <strong>the</strong> subpoena is solely to obtain <strong>the</strong> identity of <strong>the</strong> alleged infringer, whichinformati<strong>on</strong> will be used <strong>on</strong>ly to protect rights to <strong>the</strong> copyright. 1029 The subpoena, in turn,authorizes and orders <strong>the</strong> recipient service provider “to expeditiously disclose” informati<strong>on</strong>sufficient to identify <strong>the</strong> alleged infringer. 1030 The clerk “shall expeditiously issue” <strong>the</strong> subpoenaif it is in proper form, <strong>the</strong> declarati<strong>on</strong> is properly executed, and “<strong>the</strong> notificati<strong>on</strong> filed satisfies <strong>the</strong>1029 17 U.S.C. § 512(h)(2).1030 Id. § 512(h)(3).- 237 -


provisi<strong>on</strong>s of subsecti<strong>on</strong> (c)(3)(A). 1031 The service provider, up<strong>on</strong> receipt of <strong>the</strong> subpoena, “shallexpeditiously disclose” <strong>the</strong> informati<strong>on</strong> required by <strong>the</strong> subpoena to <strong>the</strong> copyright owner (orauthorized pers<strong>on</strong>). 1032 The issuance, delivery and enforcement of subpoenas is to be governed(to <strong>the</strong> extent practicable) by <strong>the</strong> provisi<strong>on</strong>s of <strong>the</strong> Federal Rules of Civil Procedure dealing withsubpoenas duces tecum. 1033(1) Jurisdicti<strong>on</strong>al <str<strong>on</strong>g>Issues</str<strong>on</strong>g>The issue of where subpoenas under Secti<strong>on</strong> 512(h) must be sought and where <strong>the</strong>y canbe served was tested in two lawsuits brought by Massachusetts universities against <strong>the</strong> RIAA,Massachusetts Institute of Technology v. RIAA 1034 and Bost<strong>on</strong> College v. RIAA. 1035 In thosecases, <strong>the</strong> universities challenged <strong>the</strong> service in Massachusetts of Secti<strong>on</strong> 512(h) subpoenasissued by a federal district court in Washingt<strong>on</strong>, D.C. The court ruled that Fed. R. Civ. P.45(a)(2) and (b)(2), which require a subpoena to issue from <strong>the</strong> district in which <strong>the</strong> producti<strong>on</strong>is to be made, do not permit a Secti<strong>on</strong> 512(h) subpoena for producti<strong>on</strong> issued in Washingt<strong>on</strong>,D.C. to be validly served in Massachusetts. 1036The RIAA c<strong>on</strong>tended that service of <strong>the</strong> subpoenas was proper because of languagewithin <strong>the</strong> DMCA that <strong>the</strong> RIAA c<strong>on</strong>tended trumps Fed. R. Civ. P. 45. Specifically, <strong>the</strong> RIAApointed to Secti<strong>on</strong> 512(h)(1), which authorizes a copyright owner to request <strong>the</strong> clerk of “any”U.S. district court to issue a subpoena. Sec<strong>on</strong>d, Secti<strong>on</strong> 512(h)(5) requires <strong>the</strong> service providerto disclose <strong>the</strong> requested informati<strong>on</strong> “notwithstanding any o<strong>the</strong>r provisi<strong>on</strong> of law.” Third, whileSecti<strong>on</strong> 512(h)(6) provides that <strong>the</strong> rules regarding service of subpoenas will govern to <strong>the</strong>“greatest extent practicable,” that provisi<strong>on</strong> also c<strong>on</strong>tains an important carve out: “unlesso<strong>the</strong>rwise provided by this secti<strong>on</strong>.” The court rejected <strong>the</strong> RIAA’s arguments, ruling thatSecti<strong>on</strong> 512(h) does not trump <strong>the</strong> ordinary rules regarding service of subpoenas under <strong>the</strong>Federal Rules of Civil Procedure. 1037(2) RIAA v. Veriz<strong>on</strong> <strong>Internet</strong> ServicesThe scope of Secti<strong>on</strong> 512(h) was first tested in <strong>the</strong> case of In re Veriz<strong>on</strong> <strong>Internet</strong>Services, Inc. 1038 In that case, <strong>the</strong> Recording Industry Associati<strong>on</strong> of America (RIAA) served asubpoena under Secti<strong>on</strong> 512(h) <strong>on</strong> Veriz<strong>on</strong> <strong>Internet</strong> Services seeking identifying informati<strong>on</strong>about an an<strong>on</strong>ymous copyright infringer allegedly using Veriz<strong>on</strong>’s network to download1031 Id. § 512(h)(4).1032 Id. § 512(h)(5).1033 Id. § 512(h)(6).1034 1:03-MC-10209-JLT (D. Mass. Au.g 7, 2003).1035 1:03-MC-10210-JLT (D. Mass. Aug. 7, 2003).1036 “District of Columbia Court Lacks Authority to Issue DMCA Subpoenas to Bost<strong>on</strong> Schools,” BNA’s Patent,Trademark & <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Journal (Aug. 15, 2003) at 458.1037 Id.1038 240 F. Supp. 2d 24 (D.D.C. 2003).- 238 -


copyrighted s<strong>on</strong>gs through peer-to-peer software provided by Kazaa. Al<strong>on</strong>g with <strong>the</strong> subpoena,RIAA provided Veriz<strong>on</strong> with a list of more than 600 files allegedly downloaded by <strong>the</strong> user <strong>on</strong><strong>on</strong>e day. The subpoena included <strong>the</strong> user’s IP address and <strong>the</strong> time and date when <strong>the</strong> s<strong>on</strong>gswere downloaded, and a declarati<strong>on</strong>, under penalty of perjury, that <strong>the</strong> informati<strong>on</strong> was sought ingood faith and would <strong>on</strong>ly be used in c<strong>on</strong>necti<strong>on</strong> with protecting <strong>the</strong> rights of RIAAmembers. 1039Veriz<strong>on</strong> refused to comply with <strong>the</strong> subpoena, arguing that, because Secti<strong>on</strong> 512(h)requires a notice under Secti<strong>on</strong> 512(c)(3)(A) to accompany <strong>the</strong> subpoena applicati<strong>on</strong>, <strong>the</strong>subpoena power applies <strong>on</strong>ly if <strong>the</strong> infringing material is stored or c<strong>on</strong>trolled <strong>on</strong> <strong>the</strong> ServiceProvider’s system or network under subsecti<strong>on</strong> (c). Veriz<strong>on</strong> fur<strong>the</strong>r argued that, because it <strong>on</strong>lyprovided <strong>the</strong> alleged infringer with an <strong>Internet</strong> c<strong>on</strong>necti<strong>on</strong>, it fell under subsecti<strong>on</strong> (a) of Secti<strong>on</strong>512 and was thus outside <strong>the</strong> subpoena authority of Secti<strong>on</strong> 512(h). 1040 The RIAA sought toenforce <strong>the</strong> subpoena against Veriz<strong>on</strong> in court.The district court rejected Veriz<strong>on</strong>’s arguments and ruled that <strong>the</strong> subpoena power ofSecti<strong>on</strong> 512(h) applies to all service providers within <strong>the</strong> scope of <strong>the</strong> DMCA, not just to thoseservice providers storing informati<strong>on</strong> <strong>on</strong> a system or network at <strong>the</strong> directi<strong>on</strong> of a user. Thecourt held that <strong>the</strong> plain language of Secti<strong>on</strong> 512(h) compelled this result, because it employs <strong>the</strong>term “service provider” repeatedly, and Secti<strong>on</strong> 512(k) provides two definiti<strong>on</strong>s of <strong>the</strong> term“service provider” – <strong>on</strong>e directed to service providers falling under Secti<strong>on</strong> 512(a) and ano<strong>the</strong>rdirected to service providers falling under Secti<strong>on</strong>s 512(b) – (d). 1041 The court rejectedVeriz<strong>on</strong>’s c<strong>on</strong>tenti<strong>on</strong> that it should infer that <strong>the</strong> subpoena authority applies <strong>on</strong>ly to subsecti<strong>on</strong>(c) in view of <strong>the</strong> reference in subsecti<strong>on</strong> (h)(2)(A) to <strong>the</strong> notificati<strong>on</strong> requirement of subsecti<strong>on</strong>(c)(3)(A). The court noted that “<strong>the</strong> notificati<strong>on</strong> provisi<strong>on</strong> in subsecti<strong>on</strong> (c) is also referencedelsewhere in <strong>the</strong> DMCA, including in subsecti<strong>on</strong>s (b)(2)(E) and (d)(3). The latter referencesc<strong>on</strong>firm <strong>the</strong> expectati<strong>on</strong> that notificati<strong>on</strong>s like that described in subsecti<strong>on</strong> (c)(3) will at times beneeded in settings under subsecti<strong>on</strong>s (b) and (d), and hence are not c<strong>on</strong>fined to subsecti<strong>on</strong> (c)settings.” 1042 The court also rejected a number of c<strong>on</strong>stituti<strong>on</strong>al challenges to <strong>the</strong> Secti<strong>on</strong> 512(h)1039 Id. at 28.1040 Id. at 29.1041 Id. at 31.1042 Id. at 32-33. Veriz<strong>on</strong> also relied <strong>on</strong> <strong>the</strong> fact that under subsecti<strong>on</strong> (c)(3)(A)(iii) a copyright owner must identify<strong>the</strong> infringing material “that is to be removed or access to which is to be disabled.” Veriz<strong>on</strong> argued that inorder to remove or disable access to <strong>the</strong> material, <strong>the</strong> material must be stored <strong>on</strong> its system, <strong>the</strong>reby indicatingthat C<strong>on</strong>gress intended Secti<strong>on</strong> 512(h) to apply <strong>on</strong>ly to those service providers who store infringing material <strong>on</strong><strong>the</strong>ir systems. The court rejected this argument. “[A] subpoena issued pursuant to subsecti<strong>on</strong> (h) is used toidentify <strong>the</strong> infringer, not to force <strong>the</strong> service provider to remove material or disable access to it. Therequirement for <strong>the</strong> notificati<strong>on</strong> is simply that it identify <strong>the</strong> infringing material to be removed, not that removalbe effectuated. In additi<strong>on</strong>, a copyright owner can meet <strong>the</strong> requirement under subsecti<strong>on</strong> (c)(3)(A)(iii) if it candisable access to material. Here, Veriz<strong>on</strong> certainly can disable access to <strong>the</strong> material by terminating <strong>the</strong> accountaltoge<strong>the</strong>r.” Id. at 33 n.5. Since Veriz<strong>on</strong> was a Secti<strong>on</strong> 512(a) service provider, and <strong>the</strong> requirement insubsecti<strong>on</strong> (c) to remove or disable access to infringing material stored <strong>on</strong> <strong>the</strong> service provider’s system is notapplicable to subsecti<strong>on</strong> (a), it is unclear what <strong>the</strong> court’s reference to Veriz<strong>on</strong>’s ability to disable access tomaterial by terminating accounts was intended to mean. Perhaps that service providers who are subject to <strong>the</strong>Secti<strong>on</strong> 512(a) safe harbor must never<strong>the</strong>less terminate <strong>the</strong> accounts of repeat infringers in order to qualify for- 239 -


subpoena power identified by amici curiae, noting that Veriz<strong>on</strong> itself had not directly assertedthat <strong>the</strong> subpoena power in Secti<strong>on</strong> 512(h) was unc<strong>on</strong>stituti<strong>on</strong>al and that <strong>the</strong> issues raised by <strong>the</strong>amici curiae had not been fully briefed by <strong>the</strong> RIAA. 1043 In a subsequent ruling, <strong>the</strong> districtcourt issued a more elaborated opini<strong>on</strong> <strong>on</strong> a number of c<strong>on</strong>stituti<strong>on</strong>al challenges to <strong>the</strong> subpoenapower in Secti<strong>on</strong> 512(h) raised by Veriz<strong>on</strong> and amici curiae and again rejected thosechallenges. 1044On appeal, <strong>the</strong> D.C. Circuit reversed. 1045 The appellate court held, based <strong>on</strong> both <strong>the</strong>terms of Secti<strong>on</strong> 512(h) and its overall structure that a subpoena may be issued <strong>on</strong>ly to an ISPengaged in storing <strong>on</strong> its servers, or linking to, material that is infringing or <strong>the</strong> subject ofinfringing activity, and not to an ISP acting <strong>on</strong>ly as a c<strong>on</strong>duit for data transferred between two<strong>Internet</strong> users. With respect to <strong>the</strong> language of Secti<strong>on</strong> 512(h) itself, <strong>the</strong> court noted that Secti<strong>on</strong>512(h)(4) makes satisfacti<strong>on</strong> of <strong>the</strong> notificati<strong>on</strong> requirement of Secti<strong>on</strong> 512(c)(3)(A) a c<strong>on</strong>diti<strong>on</strong>precedent to issuance of a subpoena, which notificati<strong>on</strong> requirement must identify and provideinformati<strong>on</strong> sufficient to locate infringing material that is to be removed or access to which is tobe disabled. The court held that an ISP that is not storing <strong>the</strong> allegedly infringing material <strong>on</strong> itsservers cannot “remove” or “disable access to” <strong>the</strong> infringing material no matter whatinformati<strong>on</strong> <strong>the</strong> copyright owner may provide. 1046The RIAA c<strong>on</strong>tended that an ISP can “disable access” to infringing material, even whenit is providing <strong>on</strong>ly c<strong>on</strong>duit functi<strong>on</strong>s, by terminating <strong>the</strong> offending subscriber’s <strong>Internet</strong> account.The court rejected this argument, noting that <strong>the</strong> DMCA, in Secti<strong>on</strong>s 512(j)(1)(A)(i) and512(j)(1)(A)(ii), sets up distinct statutory remedies in <strong>the</strong> form of injuncti<strong>on</strong>s against providingaccess to infringing material and injuncti<strong>on</strong>s against providing access to a subscriber who isengaged in infringing activity. 1047 “These distinct statutory remedies establish that terminating asubscriber’s account is not <strong>the</strong> same as removing or disabling access by o<strong>the</strong>rs to <strong>the</strong> infringingmaterial resident <strong>on</strong> <strong>the</strong> subscriber’s computer.” 1048 The court fur<strong>the</strong>r noted that <strong>the</strong> RIAA’snotificati<strong>on</strong> had identified absolutely no material Veriz<strong>on</strong> could remove or access to which itcould disable, which suggested that Secti<strong>on</strong> 512(c)(3)(A) “c<strong>on</strong>cerns means of infringement o<strong>the</strong>rthan P2P file sharing.” 1049<strong>the</strong> safe harbor, per <strong>the</strong> provisi<strong>on</strong>s of Secti<strong>on</strong> 512(i). This is <strong>on</strong>ly a possible implicati<strong>on</strong>, however, and <strong>the</strong> pointof <strong>the</strong> court’s passage is that Secti<strong>on</strong> 512(h) is focused <strong>on</strong> identificati<strong>on</strong> of <strong>the</strong> infringer, not removal ordisabling of access to infringing material.1043 Id. at 41-44.1044 In re Veriz<strong>on</strong> <strong>Internet</strong> Services, Inc., 257 F. Supp. 2d 244, 257-68 (D.D.C. 2003). The court also rejectedVeriz<strong>on</strong>’s argument that Secti<strong>on</strong> 512(h) violates Art. III of <strong>the</strong> C<strong>on</strong>stituti<strong>on</strong> because it authorizes federal courtsto issue binding process in <strong>the</strong> absence of a pending case or c<strong>on</strong>troversy. Id. at 248-57.1045 Recording Industry Ass’n of Am. v. Veriz<strong>on</strong> <strong>Internet</strong> Services, Inc., 351 F.3d 1229 (D.C. Cir. 2003), cert.denied, 2004 U.S. LEXIS 6700 (2004).1046 Id. at 1235.1047 Id.1048 Id.1049 Id. at 1236.- 240 -


Finally, <strong>the</strong> court rejected <strong>the</strong> RIAA’s argument that <strong>the</strong> definiti<strong>on</strong> of “Service Provider”in Secti<strong>on</strong> 512(k)(1)(B) made Secti<strong>on</strong> 512(h) applicable to an ISP regardless what functi<strong>on</strong> itperformed with respect to <strong>the</strong> infringing material – transmissi<strong>on</strong> per Secti<strong>on</strong> 512(a), caching perSecti<strong>on</strong> 512(b), hosting per Secti<strong>on</strong> 512(c), or locating it per Secti<strong>on</strong> 512(d). 1050 The court statedthat this argument “borders up<strong>on</strong> <strong>the</strong> silly. … Define all <strong>the</strong> world as an ISP if you like, <strong>the</strong>validity of a § 512(h) subpoena still depends up<strong>on</strong> <strong>the</strong> copyright holder having given <strong>the</strong> ISP,however defined, a notificati<strong>on</strong> effective under § 512(c)(3)(A). And as we have seen, any noticeto an ISP c<strong>on</strong>cerning its activity as a mere c<strong>on</strong>duit does not satisfy <strong>the</strong> c<strong>on</strong>diti<strong>on</strong> of §512(c)(3)(A)(iii) and is <strong>the</strong>refore ineffective.” 1051The court bolstered its c<strong>on</strong>clusi<strong>on</strong> by pointing to <strong>the</strong> overall structure of Secti<strong>on</strong> 512(h),noting that <strong>the</strong> presence in Secti<strong>on</strong> 512(h) of three separate references to Secti<strong>on</strong> 512(c) and <strong>the</strong>absence of any reference to Secti<strong>on</strong> 512(a) suggested <strong>the</strong> subpoena power of Secti<strong>on</strong> 512(h)applies <strong>on</strong>ly to ISPs engaged in storing copyrighted material and not to those engaged solely intransmitting it <strong>on</strong> behalf of o<strong>the</strong>rs. 1052 The court rejected, however, Veriz<strong>on</strong>’s suggesti<strong>on</strong> that <strong>the</strong>subpoena power could not apply to ISPs engaged in caching or linking functi<strong>on</strong>s under Secti<strong>on</strong>s512(b) and (d). Noting that caching and linking were “storage functi<strong>on</strong>s,” <strong>the</strong> court ruled that“<strong>the</strong> cross-references to § 512(c)(3) in §§ 512(b)-(d) dem<strong>on</strong>strate that § 512(h) applies to an ISPstoring infringing material <strong>on</strong> its servers in any capacity – whe<strong>the</strong>r as a temporary cache of aweb page created by <strong>the</strong> ISP per § 512(b), as a web site stored <strong>on</strong> <strong>the</strong> ISP’s server per § 512(c),or as an informati<strong>on</strong> locating tool hosted by <strong>the</strong> ISP per § 512(d) – and does not apply to an ISProuting infringing material to or from a pers<strong>on</strong>al computer owned and used by a subscriber.” 1053Accordingly, <strong>the</strong> court remanded <strong>the</strong> case to <strong>the</strong> district court with instructi<strong>on</strong>s to vacateits order enforcing <strong>the</strong> RIAA’s subpoena and to grant Veriz<strong>on</strong>’s moti<strong>on</strong> to quash <strong>the</strong>subpoena. 1054(3) The Charter Communicati<strong>on</strong>s Litigati<strong>on</strong>In Oct. of 2003, Charter Communicati<strong>on</strong>s filed a moti<strong>on</strong> to quash nearly 150 subpoenasfiled by <strong>the</strong> RIAA as part of its aggressive campaign against peer-to-peer file sharing of musicfiles. Charter challenged <strong>the</strong> subpoenas <strong>on</strong> a number of grounds. First, Charter argued that <strong>the</strong>subpoenas, which demanded compliance within seven days, did not afford a reas<strong>on</strong>able orfeasible time period for Charter to comply with its duties under <strong>the</strong> federal CableCommunicati<strong>on</strong>s Act (CCA) to notify subscribers in advance of its compliance. Charter alsoargued that <strong>the</strong> CCA allows <strong>the</strong> turning over of subscribers’ informati<strong>on</strong> <strong>on</strong>ly where a courtorder offered evidence that <strong>the</strong> subscribers were reas<strong>on</strong>ably suspected of engaging in criminal1050 Id.1051 Id.1052 Id. at 1236-37.1053 Id. at 1237.1054 Id. at 1239.- 241 -


activity, and where <strong>the</strong> subject of <strong>the</strong> informati<strong>on</strong> had a chance to appear and c<strong>on</strong>test <strong>the</strong> validityof <strong>the</strong> claim. 1055Charter fur<strong>the</strong>r challenged <strong>the</strong> subpoenas <strong>on</strong> <strong>the</strong> ground that <strong>the</strong>y violated <strong>the</strong> DMCA byfailing to identify <strong>the</strong> alleged acts of infringement (<strong>the</strong> subpoenas provided in each case <strong>on</strong>ly ane-mail address, date, and time of day, without any identificati<strong>on</strong> of copyrighted works that wereallegedly infringed), seeking private informati<strong>on</strong> bey<strong>on</strong>d <strong>the</strong> scope of <strong>the</strong> DMCA, andimproperly combining requests for informati<strong>on</strong> about 93 different IP addresses into a singlesubpoena. 1056The district court issued <strong>the</strong> subpoenas and denied Charter’s moti<strong>on</strong> to quash. On appeal,<strong>the</strong> Eighth Circuit reversed. 1057 The court reviewed in detail <strong>the</strong> logic of <strong>the</strong> D.C. Circuit’sopini<strong>on</strong> in <strong>the</strong> RIAA v. Veriz<strong>on</strong> case and adopted both its reas<strong>on</strong>ing and holding that Secti<strong>on</strong>512(h) does not allow a copyright owner to request a subpoena for an OSP that acts merely as ac<strong>on</strong>duit for data transferred between two <strong>Internet</strong> users. 1058 The Eighth Circuit did, however, indicta express certain doubts about <strong>the</strong> validity of Secti<strong>on</strong> 512(h) in general:For purposes of this appeal, we do not address <strong>the</strong> c<strong>on</strong>stituti<strong>on</strong>al argumentspresented by Charter, but do note this court has some c<strong>on</strong>cern with <strong>the</strong> subpoenamechanism of § 512(h). We comment without deciding that this provisi<strong>on</strong> mayunc<strong>on</strong>stituti<strong>on</strong>ally invade <strong>the</strong> power of <strong>the</strong> judiciary by creating a statutoryframework pursuant to which C<strong>on</strong>gress, via statute, compels a clerk of a court toissue a subpoena, <strong>the</strong>reby invoking <strong>the</strong> court’s power. Fur<strong>the</strong>r, we believeCharter has at least a colorable argument that a judicial subpoena is a court orderthat must be supported by a case or c<strong>on</strong>troversy at <strong>the</strong> time of its issuance. Weemphasize, however, for purposes of this appeal we do not reach <strong>the</strong>se issues andhave decided this case <strong>on</strong> <strong>the</strong> more narrow statutory grounds. 1059(4) Fatwallet v. Best BuyIn this case, Fatwallet, Inc. filed a complaint against Best Buy Enterprises, Kohl’sDepartment Stores and Target Corp. seeking declaratory relief related to <strong>the</strong> allegedunc<strong>on</strong>stituti<strong>on</strong>ality of <strong>the</strong> subpoena provisi<strong>on</strong>s and <strong>the</strong> notice and takedown provisi<strong>on</strong>s of Secti<strong>on</strong>512(c) of <strong>the</strong> DMCA. The court dismissed <strong>the</strong> plaintiff’s claims in <strong>the</strong>ir entirety <strong>on</strong> grounds ofstanding. Apparently <strong>on</strong>ly Best Buy had issued a subpoena to Fatwallet under <strong>the</strong> DMCA. Thecourt ruled that Fatwallet did not have standing related to <strong>the</strong> subpoena because it wasundisputed that Best Buy had never attempted to enforce <strong>the</strong> subpoena. Even if Best Buy hadsought to enforce <strong>the</strong> subpoena, <strong>the</strong> court noted that it was difficult to see <strong>the</strong> harm that would1055 “Charter Communicati<strong>on</strong>s Files Suit, Seeks to Quash RIAA File-Sharing Subpoenas,” BNA’s Patent,Trademark & <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Journal (Oct. 15, 2003) at 963.1056 Id.1057 In re Charter Communicati<strong>on</strong>s, Inc. Subpoena Enforcement Matter, 393 F.3d 771 (8 th Cir. 2005).1058 Id. at 776-77.1059 Id. at 777-78.- 242 -


efall Fatwallet as opposed to its subscribers, and <strong>the</strong> subscribers’ interest in maintaining <strong>the</strong>iran<strong>on</strong>ymity was insufficient to invoke standing to a third party such as an ISP to challenge <strong>the</strong>subpoena when <strong>the</strong> ISP had not suffered an injury of its own. The court distinguished <strong>the</strong>Veriz<strong>on</strong> decisi<strong>on</strong> <strong>on</strong> <strong>the</strong> ground that in that case, Veriz<strong>on</strong> had refused to comply with <strong>the</strong>subpoena and <strong>the</strong>re was a moti<strong>on</strong> to compel, and in any event, <strong>the</strong> court disagreed with <strong>the</strong>Veriz<strong>on</strong> decisi<strong>on</strong>. The court also ruled that Fatwallet had no standing to assert challenges to <strong>the</strong>notice and takedown provisi<strong>on</strong>s of Secti<strong>on</strong> 512(c), because Fatwallet was suffering no injury as aresult of those provisi<strong>on</strong>s. Because <strong>the</strong> provisi<strong>on</strong>s afford <strong>on</strong>ly a positive benefit (a safe harborfrom liability), Fatwallet was free to ignore <strong>the</strong>m and no harm would befall it that did not alreadyexist irrespective of <strong>the</strong> DMCA. 1060Chapel Hill(5) In re Subpoena to University of North Carolina atThe case of In re Subpoena to University of North Carolina at Chapel Hill 1061 followed<strong>the</strong> logic of <strong>the</strong> RIAA v. Veriz<strong>on</strong> and Charter Communicati<strong>on</strong>s cases and ruled that Secti<strong>on</strong>512(h) does not allow a copyright owner to obtain a subpoena for an OSP that acts merely as ac<strong>on</strong>duit for data transfer. 1062 In additi<strong>on</strong>, <strong>the</strong> court rejected <strong>the</strong> RIAA’s argument, as did <strong>the</strong>courts in <strong>the</strong> Massachusetts Institute of Technology v. RIAA and Bost<strong>on</strong> College v. RIAA casesdiscussed in Secti<strong>on</strong> II.G.6(h)(1) above, that Secti<strong>on</strong> 512(h) allows a party to seek a subpoena inany court in <strong>the</strong> nati<strong>on</strong> for service in any o<strong>the</strong>r district. The court noted authority that <strong>the</strong>subpoena power of a court cannot be more extensive than its jurisdicti<strong>on</strong>, and that Fed. R. Civ.Pro. 45(b)(2) applies <strong>on</strong>ly when a court acti<strong>on</strong> or o<strong>the</strong>r proceeding is preexisting, which istypically not <strong>the</strong> case when <strong>the</strong> subpoena power of Secti<strong>on</strong> 512(h) is invoked. Accordingly, <strong>the</strong>Secti<strong>on</strong> 512(h) subpoena must be issued by a court in <strong>the</strong> district in which <strong>the</strong> subpoena will beserved. 1063(6) Subpoenas in John Doe Acti<strong>on</strong>sIn <strong>the</strong> wake of <strong>the</strong> rulings in <strong>the</strong> RIAA v. Veriz<strong>on</strong> and Charter Communicati<strong>on</strong>slitigati<strong>on</strong>s, copyright owners have turned to filing “John Doe” acti<strong>on</strong>s in order to seek subpoenasagainst OSPs who are mere c<strong>on</strong>duits, and have had success in obtaining subpoenas requiringdisclosure of informati<strong>on</strong> about subscribers allegedly engaged in copyright infringement through<strong>the</strong> OSP’s service.For example, in Electra Entertainment Group, Inc. v. Does 1-6, <strong>the</strong> court allowed <strong>the</strong>plaintiffs to take immediate discovery <strong>on</strong> <strong>the</strong> University of Pennsylvania to obtain <strong>the</strong> identity ofeach Doe defendant by serving a Rule 45 subpoena seeking <strong>the</strong> name, address, teleph<strong>on</strong>enumber, email address, and Media Access C<strong>on</strong>trol (MAC) address for each defendant. The courtrequired, however, that <strong>the</strong> Rule 45 subpoena instruct <strong>the</strong> University of Pennsylvania to1060 Fatwallet, Inc. v. Best Buy, No. 03 C 50508 (April 12, 2004) (memorandum opini<strong>on</strong>).1061 367 F. Supp. 2d 945 (M.D.N.C. 2005).1062 Id. at 952-56.1063 Id. at 956-58.- 243 -


distribute a copy of a notice specified by <strong>the</strong> court to each Doe defendant within seven days ofservice of <strong>the</strong> subpoena. The notice informed each defendant that a subpoena disclosing <strong>the</strong>defendant’s identity had been sought and that his or her name had not yet been disclosed, butwould be within 21 days if he or she did not challenge <strong>the</strong> subpoena. The notice c<strong>on</strong>tained a listof legal resources who might be able to help <strong>the</strong> defendant fight <strong>the</strong> subpoena. The noticefur<strong>the</strong>r informed <strong>the</strong> defendant that if he or she did not live or work in Pennsylvania, or visit <strong>the</strong>state regularly, he or she might be able to challenge <strong>the</strong> Pennsylvania court’s jurisdicti<strong>on</strong> overhim or her. Finally, <strong>the</strong> notice informed <strong>the</strong> defendant that <strong>the</strong> record companies were willing todiscuss <strong>the</strong> possible settlement of <strong>the</strong>ir claims with <strong>the</strong> defendant, that <strong>the</strong> parties might be ableto reach a settlement agreement without <strong>the</strong> defendant’s name appearing <strong>on</strong> <strong>the</strong> public record,that <strong>the</strong> defendant might be asked to disclose his or her identity to <strong>the</strong> record companies if he orsought to pursue settlement, and that defendants who sought to settle at <strong>the</strong> beginning of a casemight be offered more favorable terms by <strong>the</strong> record companies. 1064(7) Interscope Records v. Does 1-7In Interscope Records v. Does 1-7, 1065 <strong>the</strong> court followed <strong>the</strong> Charter Communicati<strong>on</strong>sand Veriz<strong>on</strong> cases in holding that Secti<strong>on</strong> 512(h) does not authorize <strong>the</strong> issuance of subpoenasagainst Secti<strong>on</strong> 512(a) OSPs who act merely as c<strong>on</strong>duits. 1066 The plaintiffs had sought such asubpoena against <strong>the</strong> College of William and Mary, which provided <strong>Internet</strong> services that <strong>the</strong>Doe defendants allegedly used to access a peer-to-peer <strong>on</strong>line media distributi<strong>on</strong> system for <strong>the</strong>purpose of downloading and distributing plaintiffs’ copyrighted works. 10679. Proposed Limitati<strong>on</strong> of Scope of Shrinkwrap and Clickwrap LicensesThat Did Not PassH.R. 3048 c<strong>on</strong>tained an interesting and potentially c<strong>on</strong>troversial provisi<strong>on</strong> that wouldhave extended <strong>the</strong> scope of <strong>the</strong> preempti<strong>on</strong> provisi<strong>on</strong>s of <strong>the</strong> copyright statute to limit certainprovisi<strong>on</strong>s comm<strong>on</strong> to shrinkwrap and clickwrap license agreements. Specifically, H.R. 3048would have added <strong>the</strong> following provisi<strong>on</strong> at <strong>the</strong> end of Secti<strong>on</strong> 301(a) of <strong>the</strong> copyright statute:When a work is distributed to <strong>the</strong> public subject to n<strong>on</strong>-negotiable license terms,such terms shall not be enforceable under <strong>the</strong> comm<strong>on</strong> law or statutes of any stateto <strong>the</strong> extent that <strong>the</strong>y –(1) limit <strong>the</strong> reproducti<strong>on</strong>, adaptati<strong>on</strong>, distributi<strong>on</strong>, performance, ordisplay, by means of transmissi<strong>on</strong> or o<strong>the</strong>rwise, of material that isuncopyrightable under secti<strong>on</strong> 102(b) or o<strong>the</strong>rwise; or1064 Order, Elektra Entertainment Group, Inc. v. Does 1-6, Civ. Acti<strong>on</strong> No. 04-1241 (Oct. 13, 2004). The languageof <strong>the</strong> court’s order, without <strong>the</strong> notice attached, may be found at 2004 U.S. Dist. LEXIS 22673.1065 494 F. Supp. 2d 388 (E.D. Va. 2007).1066 Id. at 388.1067 Id.- 244 -


(2) abrogate or restrict <strong>the</strong> limitati<strong>on</strong>s <strong>on</strong> exclusive rights specified insecti<strong>on</strong>s 107 through 114 and secti<strong>on</strong>s 117 and 118 of this title.Clause (1) was apparently intended to establish an affirmative principle that subjectmatter which is not protected by copyright under Secti<strong>on</strong> 102(b) of <strong>the</strong> copyright statute (whichincludes “any idea, procedure, process, system, method of operati<strong>on</strong>, c<strong>on</strong>cept, principle, ordiscovery”) cannot be <strong>the</strong> subject of c<strong>on</strong>tractual prohibiti<strong>on</strong>s <strong>on</strong> reproducti<strong>on</strong>, adaptati<strong>on</strong>,distributi<strong>on</strong>, performance or display in a license having n<strong>on</strong>-negotiable terms (such as ashrinkwrap or clickwrap agreement). Although this provisi<strong>on</strong> is founded <strong>on</strong> a philosophicalnoti<strong>on</strong> that subject matter which <strong>the</strong> copyright law deems free for <strong>the</strong> public to use should not bewithdrawn from use, at least by virtue of a n<strong>on</strong>-negotiable license, it might have had unintendedc<strong>on</strong>sequences with respect to c<strong>on</strong>fidentiality clauses that protect trade secret material.Specifically, many shrinkwrap or clickwrap agreements c<strong>on</strong>tain c<strong>on</strong>fidentiality clausesthat prohibit <strong>the</strong> disclosure, use and reproducti<strong>on</strong> of trade secret subject matter embodied insoftware that will typically fall within <strong>the</strong> enumerated subject matter of Secti<strong>on</strong> 102(b) of <strong>the</strong>copyright statute. Clause (1) could have been read to preempt <strong>the</strong>se c<strong>on</strong>fidentiality clauses. Thisseems like a somewhat strange result in view of <strong>the</strong> Supreme Court’s ruling that copyright lawdoes not preempt state trade secret law. 1068 The authors of H.R. 3048 apparently saw a morepernicious effect from such clauses simply because <strong>the</strong>y are c<strong>on</strong>tained in a n<strong>on</strong>-negotiablelicense, although it is not clear why.Clause (2) would have preempted clauses in a shrinkwrap or clickwrap agreement thathave <strong>the</strong> effect of restricting <strong>the</strong> limitati<strong>on</strong>s <strong>on</strong> copyright rights enumerated in Secti<strong>on</strong>s 107through 114, 117, and 118 of <strong>the</strong> copyright statute. This provisi<strong>on</strong> would have affected manyshrinkwrap and clickwrap agreements in at least two ways. First, because many courts haveruled that disassembly of computer programs to extract ideas from <strong>the</strong>m is a fair use undercertain circumstances, 1069 <strong>the</strong> clauses which flatly prohibit disassembly or reverse engineering ofsoftware that are comm<strong>on</strong> in shrinkwrap and clickwrap agreements might have been preempted.Sec<strong>on</strong>d, clauses which prohibit transfer of a copy of a computer program by <strong>the</strong> licensee to athird party (a right that would o<strong>the</strong>rwise be available if <strong>the</strong> first sale doctrine of Secti<strong>on</strong> 109 of<strong>the</strong> copyright statute is deemed applicable by treating a shrinkwrap license transacti<strong>on</strong> as a sale)might have been preempted.It is unknown whe<strong>the</strong>r <strong>the</strong>re will be efforts to reintroduce this provisi<strong>on</strong> in ano<strong>the</strong>rsessi<strong>on</strong> of C<strong>on</strong>gress.1068 Kewanee Oil Co. v. Bicr<strong>on</strong> Corp., 416 U.S. 470 (1974).1069 See Sega Enterprises Ltd. v. Accolade, Inc., 977 F.2d 1510 (9th Cir. 1993); Atari Games Corp. v. Nintendo ofAmerica, Inc., 975 F.2d 832 (Fed. Cir. 1992); DSC Communicati<strong>on</strong>s Corp. v. DGI Technologies Inc., 898 F.Supp. 1183 (N.D. Tex. 1995).- 245 -


III. APPLICATION OF COPYRIGHT RIGHTS TOSPECIFIC ACTS ON THE INTERNETAs is apparent from Part II, copyright owners hold a potentially very broad panoply ofrights that may be applicable to acts <strong>on</strong> <strong>the</strong> <strong>Internet</strong>. These rights may well be expanded by <strong>the</strong>recently adopted WIPO treaties. Part III of this paper analyzes <strong>the</strong> potential applicati<strong>on</strong> of suchrights to various acti<strong>on</strong>s <strong>on</strong> <strong>the</strong> <strong>Internet</strong>, such as browsing, caching, linking, operati<strong>on</strong> of an<strong>Internet</strong> service or bulletin board, creati<strong>on</strong> of derivative works, and resale or subsequent transferof works downloaded from <strong>the</strong> <strong>Internet</strong>, as well as how various traditi<strong>on</strong>al defenses – such as fairuse and <strong>the</strong> implied license doctrine – may be interpreted with respect to <strong>Internet</strong> activities.A. BrowsingBrowsing is probably <strong>the</strong> single most comm<strong>on</strong> activity of users <strong>on</strong> <strong>the</strong> <strong>Internet</strong> today. Itprovides a graphic illustrati<strong>on</strong> of <strong>the</strong> difficulty and uncertainty of applying traditi<strong>on</strong>al copyrightrights, in which tangible objects are <strong>the</strong> paradigm for transfer of informati<strong>on</strong>, to <strong>the</strong> <strong>Internet</strong>medium, in which electr<strong>on</strong>ic transmissi<strong>on</strong>s are <strong>the</strong> paradigm for transfer of informati<strong>on</strong>. Thedifficulty arises principally from <strong>the</strong> fact that, unlike in <strong>the</strong> case of traditi<strong>on</strong>al media, reading oruse of a copyrighted work <strong>on</strong> <strong>the</strong> <strong>Internet</strong> generally requires making a “copy” of <strong>the</strong> work (atleast under <strong>the</strong> logic of <strong>the</strong> MAI case and its progeny and under <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty),and may require a distributi<strong>on</strong>, transmissi<strong>on</strong>, and access of <strong>the</strong> work as well. Thus, although“reading” and “using” are not within a copyright holder’s exclusive rights, copying, distributi<strong>on</strong>,and (under <strong>the</strong> WIPO treaties) transmissi<strong>on</strong> and access, are. To <strong>the</strong> extent <strong>the</strong> latter acts arenecessarily incidental to browsing a work <strong>on</strong> <strong>the</strong> <strong>Internet</strong>, such browsing may technicallyinfringe multiple rights of <strong>the</strong> copyright holder.Indeed, <strong>on</strong>e recent decisi<strong>on</strong> held that <strong>the</strong> act of browsing an unauthorized copy of acopyrighted work c<strong>on</strong>stituted copyright infringement, because <strong>the</strong> browsing caused an additi<strong>on</strong>alcopy of <strong>the</strong> work to be made in RAM. Specifically, in Intellectual Reserve, Inc. v. UtahLighthouse Ministry, Inc., 1070 <strong>the</strong> court, citing <strong>the</strong> MAI decisi<strong>on</strong>, stated, “When a pers<strong>on</strong> browsesa website, and by so doing displays <strong>the</strong> [copyrighted material], a copy of <strong>the</strong> [copyrightedmaterial] is made in <strong>the</strong> computer’s random access memory (RAM), to permit viewing of <strong>the</strong>material. And in making a copy, even a temporary <strong>on</strong>e, <strong>the</strong> pers<strong>on</strong> who browsed infringes <strong>the</strong>copyright.” 1071In additi<strong>on</strong>, browsing may implicate <strong>the</strong> right of public display and/or publicperformance. For example, <strong>the</strong> NII White Paper takes <strong>the</strong> positi<strong>on</strong> that browsing through copiesof works <strong>on</strong> <strong>the</strong> <strong>Internet</strong> is a public display of at least a porti<strong>on</strong> of <strong>the</strong> browsed work. 1072 Inadditi<strong>on</strong>, at least isochr<strong>on</strong>ous downloading of performances of copyrighted works in <strong>the</strong> courseof browsing by members of <strong>the</strong> public, such as from a commercial <strong>on</strong>line service like America1070 53 U.S.P.Q.2d 1425 (D. Utah 1999).1071 Id. at 1428.1072 NII White Paper at 45.- 246 -


On Line (AOL), may c<strong>on</strong>stitute infringements of <strong>the</strong> public performance right. 1073 As noted inPart II above, <strong>the</strong> fact that potential recipients of transmitted displays and performances aregeographically and/or temporally dispersed does not prevent a transmissi<strong>on</strong> to a single recipientin any given instance from creating a “public” display or performance.In a great many instances, a copyright holder will have placed material <strong>on</strong> <strong>the</strong> <strong>Internet</strong>with <strong>the</strong> intent and desire that it be browsed. Browsing of such material will no doubt bedeemed to be ei<strong>the</strong>r within <strong>the</strong> scope of an implied license from <strong>the</strong> copyright holder or a fairuse. For example, <strong>the</strong> court in Religious Technology Center v. Netcom On-Line Communicati<strong>on</strong>Services 1074 noted in dicta that much of digital browsing is probably a fair use or an innocentinfringement:Absent a commercial or profit-depriving use, digital browsing is probably a fairuse; <strong>the</strong>re could hardly be a market for licensing <strong>the</strong> temporary copying of digitalworks <strong>on</strong>to computer screens to allow browsing. Unless such a use iscommercial, such as where some<strong>on</strong>e reads a copyrighted work <strong>on</strong>line and<strong>the</strong>refore decides not to purchase a copy from <strong>the</strong> copyright owner, fair use islikely. Until reading a work <strong>on</strong>line becomes as easy and c<strong>on</strong>venient as reading apaperback, copyright owners do not have much to fear from digital browsing and<strong>the</strong>re will not likely be much market effect.Additi<strong>on</strong>ally, unless a user has reas<strong>on</strong> to know, such as from <strong>the</strong> title of amessage, that <strong>the</strong> message c<strong>on</strong>tains copyrighted materials, <strong>the</strong> browser will beprotected by <strong>the</strong> innocent infringer doctrine, which allows <strong>the</strong> court to award nodamages in appropriate circumstances. In any event, users should hardly worryabout a finding of direct infringement: it seems highly unlikely from a practicalmatter that a copyright owner could prove such infringement or would want to suesuch an individual. 1075Although <strong>the</strong> Netcom court is no doubt correct in its observati<strong>on</strong>s under U.S. copyrightlaw, never<strong>the</strong>less browsing raises important copyright problems that cannot be dismissed simply<strong>on</strong> <strong>the</strong> noti<strong>on</strong> that doctrines such as fair use, implied license, or innocent infringement willremove <strong>the</strong> problems entirely. First, <strong>Internet</strong> activities are inherently global, and countriesoutside <strong>the</strong> U.S. may not apply defensive doctrines such as fair use and implied license asbroadly as U.S. courts. At best, <strong>the</strong> rules may differ from country to country, which will breeduncertainty and <strong>the</strong> possibility of inc<strong>on</strong>sistent results in different countries.Sec<strong>on</strong>d, as elaborated below in <strong>the</strong> discussi<strong>on</strong> <strong>on</strong> caching, copyright owners may beginplacing notices <strong>on</strong> <strong>the</strong>ir works governing <strong>the</strong> uses to which <strong>the</strong>y may be put. Such notices mayrestrict use of <strong>the</strong> work in ways that are unclear or undesirable, and <strong>the</strong> applicability of <strong>the</strong> fairuse or implied license doctrines may become more uncertain in <strong>the</strong> face of such notices.1073 The public digital performance right in a sound recording may also be implicated.1074 907 F. Supp. 1361 (N.D. Cal. 1995).1075 Id. at 1378 n.25.- 247 -


Third, <strong>the</strong> fact that browsing, an activity akin to reading in traditi<strong>on</strong>al media, potentiallyc<strong>on</strong>stitutes literal infringement of so many copyright rights represents a significant shift in <strong>the</strong>balance between <strong>the</strong> rights of purchasers and users <strong>on</strong> <strong>the</strong> <strong>on</strong>e hand, and <strong>the</strong> interests ofcopyright owners <strong>on</strong> <strong>the</strong> o<strong>the</strong>r. As <strong>on</strong>e commentator recently stated:The c<strong>on</strong>flict here of perspective, policy, and technology may be a defining issuein cyberspace. ... [T]he idea that reading a digital text entails a potential copyrightviolati<strong>on</strong> shifts policy. That shift, even if desirable, should occur because of anexpress policy choice ra<strong>the</strong>r than because new technology technically triggersc<strong>on</strong>cepts originally designed for a world of photocopy machines, recorders, and<strong>the</strong> like. 1076Such policy shift, and <strong>the</strong> details of it, may not be expressly defined in U.S. copyright law (andperhaps in <strong>the</strong> copyright laws of o<strong>the</strong>r countries as well) until legislati<strong>on</strong> implementing <strong>the</strong>WIPO treaties is c<strong>on</strong>sidered.B. CachingCaching is ano<strong>the</strong>r activity that is, under current technology, virtually ubiquitous <strong>on</strong> <strong>the</strong><strong>Internet</strong>. Caching (sometimes known as “mirroring,” usually when it involves storage of anentire site or o<strong>the</strong>r complete set of material from a source) means storing copies of material froman original source site (such as a Web page) for later use when <strong>the</strong> same material is requestedagain, <strong>the</strong>reby obviating <strong>the</strong> need to go back to <strong>the</strong> original source for <strong>the</strong> material. The purposeof caching is to speed up repeated access to data and to reduce network c<strong>on</strong>gesti<strong>on</strong> resultingfrom repeated downloads of data. The cached material is generally stored at a site that isgeographically closer to <strong>the</strong> user, or <strong>on</strong> a more powerful computer or <strong>on</strong>e that has a lessc<strong>on</strong>gested data path to <strong>the</strong> ultimate user. The cached informati<strong>on</strong> is usually stored <strong>on</strong>lytemporarily, although <strong>the</strong> times may vary from a few sec<strong>on</strong>ds to a few days, weeks, or more.1. Types of CachingCaching may be of <strong>the</strong> following types:Local Caching: Caching generally occurs locally at <strong>the</strong> end user’s computer, ei<strong>the</strong>r inRAM, <strong>on</strong> <strong>the</strong> hard disk, or some combinati<strong>on</strong> of both. Most browsers, for example,store recently visited Web pages in RAM or <strong>on</strong> <strong>the</strong> hard disk. When <strong>the</strong> user hits <strong>the</strong>“Back” key, for example, <strong>the</strong> browser will usually retrieve <strong>the</strong> previous page from <strong>the</strong>cache, ra<strong>the</strong>r than downloading <strong>the</strong> page again from <strong>the</strong> original site. This retrievalfrom cache is much faster and avoids burdening <strong>the</strong> network with an additi<strong>on</strong>aldownload.Proxy Caching: Proxy caching occurs at <strong>the</strong> server level, ra<strong>the</strong>r than at <strong>the</strong> end user’scomputer level. Specifically, a copy of material from an original source is stored <strong>on</strong> a1076 R. Nimmer, Informati<strong>on</strong> Law 4.08[1], at 4-30 (2001).- 248 -


server o<strong>the</strong>r than <strong>the</strong> original server. For example, an OSP such as AOL may store <strong>on</strong>its own server for a certain period of time Web pages that have been previouslyrequested by AOL users. When ano<strong>the</strong>r user subsequently requests a page previouslystored, AOL may download <strong>the</strong> page from its own server, ra<strong>the</strong>r than fetching <strong>the</strong>page from <strong>the</strong> original source server.The use of caching <strong>on</strong> <strong>the</strong> <strong>Internet</strong> stems from at least three reas<strong>on</strong>s: to overcometransmissi<strong>on</strong> bandwidth limitati<strong>on</strong>s, to load balance serving up web pages (such as throughsearch engines) or distributing o<strong>the</strong>r c<strong>on</strong>tent in high demand through multiple sources, and topreserve archival versi<strong>on</strong>s of web pages for use in <strong>the</strong> event that web sites are removed or godown temporarily.Caching presents difficult copyright issues <strong>on</strong> a number of fr<strong>on</strong>ts. Because cachinginvolves <strong>the</strong> making of copies, it presents an obvious problem of potential infringement of <strong>the</strong>right of reproducti<strong>on</strong>. In additi<strong>on</strong>, proxy caching may give rise to infringement of <strong>the</strong> rights ofpublic distributi<strong>on</strong>, public display, public performance, and digital performance, since copies ofcopyrighted works may be fur<strong>the</strong>r distributed and displayed or performed from <strong>the</strong> cache serverto members of <strong>the</strong> public. Under <strong>the</strong> WIPO treaties, caching may also infringe <strong>the</strong> new rights oftransmissi<strong>on</strong> and access. Because <strong>the</strong> situs of infringements of <strong>the</strong>se rights under <strong>the</strong> WIPOtreaties is most likely <strong>the</strong> server, caching may give rise to infringements at every proxy server.Large OSPs may have proxy servers at many sites around <strong>the</strong> globe.2. The Detriments of CachingFrom a legal perspective, because caching has obvious technical benefits in gettinginformati<strong>on</strong> from <strong>the</strong> <strong>Internet</strong> to a user faster, <strong>on</strong>e might assume that a copyright owner who hasplaced informati<strong>on</strong> <strong>on</strong> <strong>the</strong> <strong>Internet</strong> and desires such informati<strong>on</strong> to reach end users asexpeditiously as possible would have no incentive to assert its copyright rights againstcaching. 1077 In legal terms, <strong>on</strong>e might be tempted to c<strong>on</strong>clude that caching will fall within <strong>the</strong>fair use or implied license doctrines. However, <strong>the</strong> legal analysis is complex, because cachingcarries with it a number of potential detriments to <strong>the</strong> owner of <strong>the</strong> copyrighted material: 1078Loss of Versi<strong>on</strong> C<strong>on</strong>trol: Caching interferes with <strong>the</strong> ability of a website operator toc<strong>on</strong>trol what versi<strong>on</strong> of informati<strong>on</strong> is delivered to <strong>the</strong> end user. 1079 For example, awebsite may have been substantially improved, yet an old versi<strong>on</strong> of material from<strong>the</strong> site may reside <strong>on</strong> <strong>the</strong> proxy server of <strong>the</strong> end user’s OSP. Many end users may<strong>the</strong>refore not see <strong>the</strong> improved versi<strong>on</strong> <strong>the</strong> website owner desired to present to <strong>the</strong>public. In a more serious vein, suppose a website owner is notified that its site1077 Indeed, in a poll taken during 1997 by Interactive PR & Marketing News, 82% of resp<strong>on</strong>dents answered “no” to<strong>the</strong> questi<strong>on</strong>, “Do you feel that caching of c<strong>on</strong>tent of Web sites or <strong>on</strong>line service providers c<strong>on</strong>stitutesinfringement?” Interactive PR & Marketing News, Vol. 4, No. 28 (Aug. 8, 1997), at 1.1078 In additi<strong>on</strong> to <strong>the</strong> detriments noted to <strong>the</strong> copyright owner, caching can give rise to potential liability <strong>on</strong> <strong>the</strong> partof <strong>the</strong> caching entity. For example, if an original site c<strong>on</strong>tains defamatory material, <strong>the</strong> caching entity may bedeemed to have “republished” that defamatory informati<strong>on</strong> through <strong>the</strong> caching mechanism.1079 Eric Schlachter, “Caching <strong>on</strong> <strong>the</strong> <strong>Internet</strong>,” Cyberspace Lawyer, Oct. 1996, at 2, 3.- 249 -


c<strong>on</strong>tains infringing or defamatory material. To avoid liability, <strong>the</strong> website owner mayremove such material promptly, yet it may c<strong>on</strong>tinue to be distributed through oldcached versi<strong>on</strong>s, giving rise to potential <strong>on</strong>going liability.Out of Date Informati<strong>on</strong>: Many websites may c<strong>on</strong>tain time sensitive informati<strong>on</strong>,such as stock quotes or sports scores. If informati<strong>on</strong> is obtained from a cache ra<strong>the</strong>rthan <strong>the</strong> original site, and <strong>the</strong> cache has not been refreshed recently, <strong>the</strong> user mayobtain out of date informati<strong>on</strong> or informati<strong>on</strong> that is no l<strong>on</strong>ger accurate. The problemis heightened by <strong>the</strong> fact that most caching is “invisible” to <strong>the</strong> user. In manyinstances <strong>the</strong> user will simply not know whe<strong>the</strong>r <strong>the</strong> informati<strong>on</strong> being presented iscached informati<strong>on</strong>, how recently <strong>the</strong> cache was refreshed, or whe<strong>the</strong>r <strong>the</strong> informati<strong>on</strong>c<strong>on</strong>tained in <strong>the</strong> cached versi<strong>on</strong> is now out of date as compared to informati<strong>on</strong> at <strong>the</strong>original site. A user may <strong>the</strong>refore unknowingly rely <strong>on</strong> inaccurate informati<strong>on</strong> to hisor her detriment.Interference with Timed Informati<strong>on</strong>: Closely related to <strong>the</strong> problem of out of dateinformati<strong>on</strong> is <strong>the</strong> problem of interference with timed informati<strong>on</strong>. For example, awebsite owner may have c<strong>on</strong>tracted with an advertiser to display an advertisingbanner during a certain window of time, say 7:00 to 8:00 p.m. If a page from <strong>the</strong> siteis downloaded into a cache at 7:30 p.m. and is not refreshed for several hours, userswill see <strong>the</strong> ad for far more than <strong>the</strong> <strong>on</strong>e hour <strong>the</strong> advertiser paid for, and may not seeat all <strong>the</strong> ad that <strong>the</strong> next advertiser paid to have displayed from 8:00 p.m. to 9:00p.m. 1080Inaccurate Page Impressi<strong>on</strong> and O<strong>the</strong>r Informati<strong>on</strong>: Many websites keep track of <strong>the</strong>number of “page impressi<strong>on</strong>s” at <strong>the</strong> site – i.e., <strong>the</strong> number of times a page isdisplayed from <strong>the</strong> site to users. Page impressi<strong>on</strong>s are often used as a measure foradvertising charges – <strong>the</strong> more page impressi<strong>on</strong>s a site generates am<strong>on</strong>g users, <strong>the</strong>more <strong>the</strong> site can charge for advertisements placed <strong>on</strong> <strong>the</strong> site. Accesses to cachedversi<strong>on</strong>s of a Web page may not be counted as page impressi<strong>on</strong>s at <strong>the</strong> originalsite, 1081 and <strong>the</strong> original website owner may not know how often a given page wasviewed from <strong>the</strong> cache. 1082 Reduced page impressi<strong>on</strong> counts cost <strong>the</strong> website owneradvertising revenues. In additi<strong>on</strong>, many sites maintain “server logs” which recordactivities of users of <strong>the</strong> site, from which valuable informati<strong>on</strong> may be gleaned.Accesses to cached informati<strong>on</strong> will generate entries into <strong>the</strong> logs of <strong>the</strong> proxy server,not <strong>the</strong> original site.Loss of Limits <strong>on</strong> Access: Caching may also result in <strong>the</strong> loss of c<strong>on</strong>trol over accessto informati<strong>on</strong> at a site. For example, suppose a website owner desires to limit access1080 See id. at 3.1081 David G. Post, “Bargaining in <strong>the</strong> Shadow of <strong>the</strong> Code: File Caching, <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>, and C<strong>on</strong>tracts Evolving inCyberspace,” at 7 (paper presented at <strong>the</strong> University of Dayt<strong>on</strong> School of Law Symposium <strong>on</strong> “<str<strong>on</strong>g>Copyright</str<strong>on</strong>g>Owners’ Rights and Users’ Privileges <strong>on</strong> <strong>the</strong> <strong>Internet</strong>,” Nov. 1-2, 1996; copy <strong>on</strong> file with <strong>the</strong> author).1082 At least <strong>on</strong>e <strong>on</strong>line service markets to website owners data about <strong>the</strong> number of page impressi<strong>on</strong>s deliveredfrom its cache. Schlachter, supra note 1079, at 3.- 250 -


to material <strong>on</strong> a site to a single user at a particular instituti<strong>on</strong> through use of apassword. Such user could enter <strong>the</strong> password, download <strong>the</strong> informati<strong>on</strong> to a proxyserver, and <strong>the</strong>n o<strong>the</strong>r, unauthorized users might be able to gain access to it. 1083As discussed in detail in Secti<strong>on</strong> III.C below, <strong>the</strong> DMCA creates a safe harbor forcaching by OSPs under defined circumstances, which in part anticipate, and c<strong>on</strong>diti<strong>on</strong> <strong>the</strong> safeharbor up<strong>on</strong>, compliance with technical soluti<strong>on</strong>s that may develop and become industrystandards. The safe harbor implicitly recognizes, and seems designed to minimize, <strong>the</strong> potentialdetriments of caching discussed above.3. The Netcom Case and Applicati<strong>on</strong> of <strong>the</strong> Fair Use DoctrineAs discussed in detail in Secti<strong>on</strong> III.C.5(b)(1)(ii) below, <strong>the</strong> DMCA creates a safe harborfor caching by OSPs under defined circumstances. Even if <strong>the</strong> c<strong>on</strong>diti<strong>on</strong>s required under <strong>the</strong>DMCA are not met to take advantage of <strong>the</strong> safe harbor, a pers<strong>on</strong> performing caching ofcopyrighted material might never<strong>the</strong>less seek to justify it under ei<strong>the</strong>r <strong>the</strong> fair use or impliedlicense doctrines. Because of <strong>the</strong> potential detriments of caching, applicati<strong>on</strong> of <strong>the</strong> fair use andimplied license doctrines to caching is uncertain.This subsecti<strong>on</strong> gives a general analysis of <strong>the</strong> legal issues that arise in applying <strong>the</strong> fairuse doctrine to caching, from <strong>the</strong> perspective of an OSP performing proxy caching, since OSPsor similar entities seem <strong>the</strong> most likely targets for claims of infringement by copyright ownersbased <strong>on</strong> caching. 1084 The analysis uses as a springboard <strong>the</strong> first case to address <strong>the</strong>applicability of <strong>the</strong> fair use doctrine to an OSP in a factual setting akin to caching, ReligiousTechnology Center v. Netcom On-Line Communicati<strong>on</strong> Services. 1085 Subsecti<strong>on</strong> 4 belowdiscusses o<strong>the</strong>r cases since Netcom that have expressly adjudicated <strong>the</strong> applicati<strong>on</strong> of <strong>the</strong> fair useand implied license doctrines to caching. In <strong>the</strong> Netcom case, <strong>the</strong> plaintiff sought to holdNetcom, an OSP, liable for allegedly infringing material that was “mirrored” <strong>on</strong> its server as partof providing Usenet news group services to its subscribers. The holding of that case with respectto <strong>the</strong> various fair use factors is analyzed below.(a) Purpose and Character of <strong>the</strong> UseThe first statutory fair use factor looks to <strong>the</strong> purpose and character of <strong>the</strong> use, includingwhe<strong>the</strong>r such use is of a commercial nature or is for n<strong>on</strong>profit educati<strong>on</strong>al purposes. Proxycaching is generally d<strong>on</strong>e in <strong>the</strong> c<strong>on</strong>text of providing commercial services to end users, and is<strong>the</strong>refore likely to be for a commercial purpose. However, <strong>the</strong> Netcom court noted thatNetcom’s use of copyrighted material as part of its Usenet services, “though commercial, alsobenefits <strong>the</strong> public in allowing for <strong>the</strong> functi<strong>on</strong>ing of <strong>the</strong> <strong>Internet</strong> and <strong>the</strong> disseminati<strong>on</strong> of o<strong>the</strong>r1083 Post, supra note 1081, at 8.1084 One commentator argues that even local caching might give rise to suit by a copyright owner: “For example,such a suit might arise in <strong>the</strong> case of a large company where <strong>the</strong> cumulative effects of local caching by manyWeb browsers (perhaps combined with statutory damages and attorneys fees) are significant.” Schlachter,supra note 1079, at 4.1085 907 F. Supp. 1361.- 251 -


creative works, a goal of <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act.” 1086 The court noted that <strong>the</strong> commercial nature ofNetcom’s activity should <strong>the</strong>refore not be dispositive, c<strong>on</strong>cluding that “[b]ecause Netcom’s useof copyrighted materials served a completely different functi<strong>on</strong> than that of <strong>the</strong> plaintiffs, thisfactor weighs in Netcom’s favor.” 1087In many instances, however, it may be unclear whe<strong>the</strong>r an OSP’s particular form ofcaching serves a “completely different functi<strong>on</strong>” than that of <strong>the</strong> copyright owner’s use of itsmaterial. For example, material may be cached from a source website and accessed by usersfrom <strong>the</strong> proxy server in exactly <strong>the</strong> same way that it would have been accessed from <strong>the</strong> originalserver. The copyright holder might use this fact to distinguish <strong>the</strong> Netcom court’s holding withrespect to <strong>the</strong> first statutory fair use factor.(b) Nature of <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>ed WorkThe sec<strong>on</strong>d statutory fair use factor looks to <strong>the</strong> nature of <strong>the</strong> copyrighted work. Fair userights are generally c<strong>on</strong>strued more broadly with respect to factual or published works than withrespect to ficti<strong>on</strong>al or unpublished works. Although all material available <strong>on</strong> <strong>the</strong> <strong>Internet</strong> ispublished, such material varies tremendously as to its substantive nature. Thus, whe<strong>the</strong>r aparticular cached work is factual, ficti<strong>on</strong>al, or in between, will vary from case to case, and <strong>the</strong>applicati<strong>on</strong> of <strong>the</strong> sec<strong>on</strong>d statutory factor to any particular instance of caching cannot necessarilybe predicted in advance.In <strong>the</strong> Netcom case, <strong>the</strong> court held that <strong>the</strong> precise nature of <strong>the</strong> works at issue was notimportant to <strong>the</strong> fair use determinati<strong>on</strong> “because Netcom’s use of <strong>the</strong> works was merely tofacilitate <strong>the</strong>ir posting to <strong>the</strong> Usenet, which is an entirely different purpose than plaintiffs’use.” 1088 As noted with respect to <strong>the</strong> first statutory fair use factor, however, <strong>the</strong> same may oftennot be true in particular instances of caching. Accordingly, it is difficult to say how <strong>the</strong> sec<strong>on</strong>dstatutory factor may be applied to caching in particular instances.(c) Amount and Substantiality of <strong>the</strong> Porti<strong>on</strong> UsedThe third statutory fair use factor looks to <strong>the</strong> amount and substantiality of <strong>the</strong> porti<strong>on</strong>used in relati<strong>on</strong> to <strong>the</strong> copyrighted work as a whole. Caching routinely involves <strong>the</strong> making ofcopies of entire Web pages, which may in turn c<strong>on</strong>tain entire copyrighted works, 1089 so in manyinstances all or a substantial porti<strong>on</strong> of a copyrighted work will be copied in <strong>the</strong> course ofcaching. Generally, no more of a work may be copied than is necessary for <strong>the</strong> particular use. 1090Although copying an entire work will ordinarily militate against a finding of fair use, 1091 <strong>on</strong>e1086 Id. at 1379.1087 Id.1088 Id.1089 Schlachter, supra note 1079, at 4.1090 See, e.g., Supermarket of Homes v. San Fernando Valley Board of Realtors, 786 F.2d 1400, 1409 (9th Cir.1986).1091 S<strong>on</strong>y Corp. v. Universal Studios, Inc., 464 U.S. 417, 449-50 (1984).- 252 -


could argue that caching inherently requires copying all or a substantial porti<strong>on</strong> of <strong>the</strong> cachedmaterial in order to derive <strong>the</strong> benefits of <strong>the</strong> caching, and this factor should <strong>the</strong>refore not bedispositive of fair use.For example, <strong>the</strong> Netcom court noted that “<strong>the</strong> mere fact that all of a work is copied is notdeterminative of <strong>the</strong> fair use questi<strong>on</strong>, where such total copying is essential given <strong>the</strong> purpose of<strong>the</strong> copying.” 1092 Because Netcom had copied no more of <strong>the</strong> plaintiff’s works than necessary tofuncti<strong>on</strong> as a Usenet server, <strong>the</strong> court c<strong>on</strong>cluded that <strong>the</strong> third statutory factor should not defeatan o<strong>the</strong>rwise valid defense. 1093OSPs that engage in copying of whole works may be able to rely <strong>on</strong> this logic by arguingthat such copying is essential given <strong>the</strong> nature and purpose of caching. Such an argument may,however, be vulnerable to attack, depending up<strong>on</strong> <strong>the</strong> way in which <strong>the</strong> caching is performed.Caching by an OSP of <strong>on</strong>ly that material that has been requested by users in some previouslydefined time period may be said to be “essential” because such material has at least adem<strong>on</strong>strated basis for expecting that it will be accessed again. But what about extensive“mirroring,” where an OSP copies, for example, entire websites from geographically remote sitesto more local servers? Such caching is not based <strong>on</strong> actual demand usage. Should this matter?Could <strong>the</strong> OSP argue that such caching is “essential” to avoid potential network bottlenecks from<strong>the</strong> remote site to its users’ computers? The case of Field v. Google, discussed in Secti<strong>on</strong>III.B.4(a) below, found extensive caching by Google using automated robots to be a fair use.(d) Effect of Use <strong>on</strong> <strong>the</strong> Potential MarketThe fourth statutory fair use factor looks to <strong>the</strong> effect of <strong>the</strong> use up<strong>on</strong> <strong>the</strong> potential marketfor or value of <strong>the</strong> copyrighted work. This factor is generally c<strong>on</strong>sidered <strong>the</strong> most important of<strong>the</strong> four factors. 1094 In analyzing this factor, a court may look to “‘whe<strong>the</strong>r unrestricted andwidespread c<strong>on</strong>duct of <strong>the</strong> sort engaged in by <strong>the</strong> defendant … would result in a substantiallyadverse impact <strong>on</strong> <strong>the</strong> potential market’ for <strong>the</strong> original.” 1095 Because caching is inherentlywidespread <strong>on</strong> <strong>the</strong> <strong>Internet</strong>, a court may well look bey<strong>on</strong>d <strong>the</strong> individual acti<strong>on</strong>s of a particularcaching entity and assess <strong>the</strong> potential aggregate impact of caching <strong>on</strong> a copyright owner.The applicati<strong>on</strong> of this factor is very difficult to predict in advance, without knowing <strong>the</strong>particular factual circumstances of <strong>the</strong> caching that is being challenged. There are no doubtmany instances of caching that do not harm <strong>the</strong> potential market for a copyright owner’s work,especially with respect to caching of material from n<strong>on</strong>-commercial websites that make materialavailable for free. However, even in <strong>the</strong> case of n<strong>on</strong>-commercial sites, <strong>on</strong>e or more of <strong>the</strong>detriments of caching noted in subsecti<strong>on</strong> 2 above may be applicable, and <strong>the</strong> copyright owner1092 Netcom, 907 F. Supp. at 1380 (citing <strong>the</strong> Supreme Court’s decisi<strong>on</strong> in S<strong>on</strong>y, in which <strong>the</strong> Court held that totalcopying of copyrighted broadcast programs for <strong>the</strong> purpose of time-shifted viewing was a fair use).1093 Netcom, 907 F. Supp. at 1380.1094 See 4 M. Nimmer & D. Nimmer, Nimmer <strong>on</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> § 13.05[A][4], at 13-180 to –181 (1999) (citing, interalia, Harper & Row, Publishers, Inc. v. Nati<strong>on</strong> Enterprises, 471 U.S. 539, 566 (1985)).1095 Campbell v. Acuff-Rose Music, Inc., 114 S. Ct. 1164, 1177 (1994) (quoting 3 M. Nimmer & D. Nimmer,Nimmer <strong>on</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> § 13.05[A][4]).- 253 -


might use such detriments as <strong>the</strong> basis for an argument of harm to <strong>the</strong> potential market for <strong>the</strong>copyrighted material. For example, a website owner might put promoti<strong>on</strong>al material up <strong>on</strong> itssite that is updated frequently. If caching caused <strong>the</strong> latest updated material not to be available,<strong>the</strong> owner might argue that <strong>the</strong> “market” for its website material had been harmed.With respect to commercial sites, <strong>on</strong>e can more readily imagine instances in whichcaching could cause harm to <strong>the</strong> market for copyrighted works. For example, if caching reduces<strong>the</strong> number of page impressi<strong>on</strong>s generated by a home page c<strong>on</strong>taining copyrighted material <strong>on</strong>which advertising is sold, <strong>the</strong> owner could argue that its advertising revenues for ads placed inc<strong>on</strong>juncti<strong>on</strong> with such copyrighted material (which, in this instance, is arguably <strong>the</strong> very“market” for such material) will be harmed.In <strong>the</strong> Netcom case, <strong>the</strong> court held that potential harm under <strong>the</strong> fourth fair use factorprecluded a ruling that <strong>the</strong> OSP’s posting of <strong>the</strong> plaintiffs’ copyrighted material in its Usenetservice was a fair use. The plaintiffs had argued that <strong>the</strong> <strong>Internet</strong>’s extremely widespreaddistributi<strong>on</strong> of its copyrighted religious materials multiplied <strong>the</strong> potential effects of marketsubstituti<strong>on</strong> for its materials by groups using such materials to charge for Scientology-likereligious training. 1096In sum, it seems that <strong>the</strong> applicati<strong>on</strong> of <strong>the</strong> fourth fair use factor will be highly factspecific, and <strong>the</strong>re may be instances in which a copyright holder could establish sufficient harmto its potential markets from caching as to preclude a finding of fair use. It <strong>the</strong>refore seemsunwise to make a blanket assumpti<strong>on</strong> that <strong>the</strong> fair use doctrine will automatically protect allforms of caching.The potential harm to copyright owners from caching also introduces uncertainty withrespect to whe<strong>the</strong>r <strong>the</strong> implied license doctrine may apply to caching in various instances.Courts often tend to c<strong>on</strong>strue implied licenses narrowly. 1097 A court might <strong>the</strong>refore be hesitantto c<strong>on</strong>strue any implied license from a copyright owner based <strong>on</strong> its posting of material forbrowsing <strong>on</strong> <strong>the</strong> Web to cover uses (such as caching) that cause palpable harm to <strong>the</strong> owner.1096 Netcom, 907 F. Supp. at 1380.1097 See, e.g., MacLean Assocs. Inc. v. Wm. M. Mercer-Meidinger-Hansen Inc., 952 F.2d 769 (3d Cir. 1991)(defendant obtained an implied license to use a computer program prepared by an independent c<strong>on</strong>tractor, but<strong>on</strong>ly in <strong>the</strong> fur<strong>the</strong>rance of its business relati<strong>on</strong>ship with <strong>on</strong>e particular client for which <strong>the</strong> c<strong>on</strong>tractor had beenengaged to support); Oddo v. Reis, 743 F.2d 630 (9th Cir. 1984) (scope of implied license included <strong>the</strong> right tomarket an unmodified computer program to third parties, subject to an obligati<strong>on</strong> to account for profits to <strong>the</strong>developer, but did not include a right to modify); see also Microstar v. Formgen, Inc., 942 F. Supp. 1312, 1318(S.D. Cal. 1996); Meadows, “Practical Aspects of ‘Implied License,’” Computer Law Strategist (May 1993) at1. See generally Barry & Kothari, “O<strong>the</strong>r People’s Property: There May Be Implied Licenses for C<strong>on</strong>tent <strong>on</strong>Web Pages,” San Francisco Daily Journal (Aug. 28, 1997) at 5.- 254 -


4. Cases Adjudicating Caching Under <strong>the</strong> Fair Use and Implied LicenseDoctrines(a) Field v. GoogleIn Field v. Google 1098 <strong>the</strong> plaintiff, Field, alleged that by allowing <strong>Internet</strong> users to accesscopies of his copyrighted works stored by Google in its <strong>on</strong>line cache, Google was violating hisexclusive rights to reproduce and distribute copies of those works. The court ruled that Google’sacts were covered by <strong>the</strong> fair use and implied license doctrines.The challenged acts arose in <strong>the</strong> c<strong>on</strong>text of Google’s search engine and its accompanyingWeb crawler, <strong>the</strong> Googlebot. The Googlebot automatically and c<strong>on</strong>tinuously crawled <strong>the</strong><strong>Internet</strong> to locate and analyze Web pages and to catalog those pages into Google’s searchableWeb index. As part of <strong>the</strong> process, Google made and analyzed a copy of each Web page <strong>the</strong>Googlebot found and stored <strong>the</strong> HTML code from those pages in a cache so as to enable thosepages to be included in <strong>the</strong> search results displayed to users in resp<strong>on</strong>se to search queries. WhenGoogle displayed Web pages in its search results, <strong>the</strong> first item appearing was <strong>the</strong> title of a Webpage which, if clicked, would take <strong>the</strong> user to <strong>the</strong> <strong>on</strong>line locati<strong>on</strong> of that page. The title wasfollowed by a short snippet of text from <strong>the</strong> Web page in a smaller f<strong>on</strong>t. Following <strong>the</strong> snippet,Google typically provided <strong>the</strong> full URL for <strong>the</strong> page. Then, in <strong>the</strong> same smaller f<strong>on</strong>t, Googleoften displayed ano<strong>the</strong>r link labeled “Cached.” When clicked, <strong>the</strong> “Cached” link directed a userto <strong>the</strong> archival copy of a Web page stored in Google’s system cache, ra<strong>the</strong>r than to <strong>the</strong> originalWeb site for that page. By clicking <strong>on</strong> <strong>the</strong> “Cached” link for a page, a user could view <strong>the</strong>snapshot of that page as it appeared <strong>the</strong> last time <strong>the</strong> site was visited and analyzed by <strong>the</strong>Googlebot. 1099The court noted that Google provided “Cached” links for three principal reas<strong>on</strong>s – toallow viewing of archival copies of pages that had become inaccessible because of transmissi<strong>on</strong>problems, censorship, or because too many users were trying to access <strong>the</strong> c<strong>on</strong>tent at a particulartime; to enable users to make Web page comparis<strong>on</strong>s to determine how a particular page hadbeen altered over time; and to enable users to determine <strong>the</strong> relevance of a page by highlightingwhere <strong>the</strong> user’s search terms appeared <strong>on</strong> <strong>the</strong> cached copy of <strong>the</strong> page. 1100Of particular relevance to <strong>the</strong> court’s rulings were certain widely recognized and wellpublicized standard protocols that <strong>the</strong> <strong>Internet</strong> industry had developed by which Web site ownerscould automatically communicate <strong>the</strong>ir preferences to search engines such as Google. The firstmechanism was <strong>the</strong> placement of meta-tags within <strong>the</strong> HTML code comprising a given page toinstruct automated crawlers and robots whe<strong>the</strong>r or not <strong>the</strong> page should be indexed or cached.For example, a “NOINDEX” tag would indicate an instructi<strong>on</strong> that <strong>the</strong> Web page in which it wasembedded should not be indexed into a search engine, and a “NOARCHIVE” tag would indicate1098 412 F. Supp. 2d 1106 (D. Nev. 2006).1099 Id. at 1110-11.1100 Id. at 1111-12.- 255 -


that <strong>the</strong> page should not be cached or archived. When <strong>the</strong> Googlebot visited a page, it wouldsearch for meta-tags in <strong>the</strong> HTML of <strong>the</strong> page and obey <strong>the</strong>m. 1101The sec<strong>on</strong>d mechanism by which Web site owners could communicate with searchengines’ robots was by placing a “robots.txt” file <strong>on</strong> <strong>the</strong> Web site c<strong>on</strong>taining textual instructi<strong>on</strong>sc<strong>on</strong>cerning whe<strong>the</strong>r crawling of <strong>the</strong> site was allowed. If <strong>the</strong> Googlebot encountered a robots.txtfile with a command disallowing crawling, it would not crawl <strong>the</strong> Web site, and <strong>the</strong>re would<strong>the</strong>refore be no entries for that Web site in Google’s search results and no “Cached” links. Thecourt noted that <strong>the</strong> <strong>Internet</strong> industry had widely recognized <strong>the</strong> robots.txt file as a standard forc<strong>on</strong>trolling automated access to Web pages since 1994. 1102In <strong>the</strong> court’s words, Field decided to “manufacture a claim for copyright infringementagainst Google in <strong>the</strong> hopes of making m<strong>on</strong>ey from Google’s standard practice” 1103 of cachingby placing his copyrighted works <strong>on</strong> a Web site available to <strong>the</strong> public for free and creating arobots.txt file <strong>on</strong> <strong>the</strong> site with <strong>the</strong> permissi<strong>on</strong>s set within <strong>the</strong> file to allow all robots to visit andindex all of <strong>the</strong> pages <strong>on</strong> <strong>the</strong> site, knowing that this would cause <strong>the</strong> Googlebot to cache hiscopyrighted works. Field testified in his depositi<strong>on</strong> that he had c<strong>on</strong>sciously chosen not to use <strong>the</strong>NOARCHIVE meta-tag <strong>on</strong> his Web site. When Google learned that Field had filed (but notserved) a complaint for copyright infringement, Google promptly removed <strong>the</strong> “Cached” links toall of <strong>the</strong> pages <strong>on</strong> his site. 1104Field alleged <strong>on</strong>ly claims of direct copyright infringement against Google (and made noclaims for c<strong>on</strong>tributory or vicarious liability), asserting that Google directly infringed hiscopyrights when a Google user clicked <strong>on</strong> a “Cached” link to <strong>the</strong> Web pages c<strong>on</strong>taining hiscopyrighted materials and downloaded a cached copy of those pages from Google’s systemcache. 1105 As discussed in Secti<strong>on</strong> II.A.4(l) above, <strong>the</strong> court ruled that Google was not a directinfringer because it lacked <strong>the</strong> necessary voliti<strong>on</strong>al act in resp<strong>on</strong>ding with a purely automateddownload process to users who clicked <strong>on</strong> <strong>the</strong> “Cached” links.In additi<strong>on</strong>, <strong>the</strong> court granted summary judgment to Google <strong>on</strong> its three defenses ofimplied license, estoppel, and fair use. With respect to <strong>the</strong> implied license defense, <strong>the</strong> courtfound that Field was aware of <strong>the</strong> industry standard mechanisms by which he could haveindicated a desire not to have his Web site crawled or cached, and that, with knowledge of howGoogle would use <strong>the</strong> copyrighted works he placed <strong>on</strong> his site, by choosing not to include metatags<strong>on</strong> <strong>the</strong> site that he knew would have caused <strong>the</strong> Googlebot not to archive his site, hisc<strong>on</strong>duct should reas<strong>on</strong>ably be interpreted as a license to Google for crawling and archiving <strong>the</strong>site. 11061101 Id. at 1112-13.1102 Id. at *1113.1103 Id.1104 Id. at *1113-14.1105 Id. at *1115.1106 Id. at *1115-16.- 256 -


The court also found that Field should be estopped from asserting a copyright claimbased <strong>on</strong> <strong>the</strong> challenged behavior by Google. Field knew of Google’s allegedly infringingc<strong>on</strong>duct well before any supposed infringement of his works took place and knew “that Googlewould automatically allow access to his works through ‘Cached’ links when he posted <strong>the</strong>m <strong>on</strong><strong>the</strong> <strong>Internet</strong> unless he instructed o<strong>the</strong>rwise.” 1107 Yet, he remained silent regarding his unstateddesire not to have “Cached” links provided to his Web site and intended Google to rely <strong>on</strong> thissilence knowing that it would. Google was not aware that Field did not wish to have Googleprovide “Cached” links to his works, and Google detrimentally relied <strong>on</strong> Field’s silence.Accordingly, <strong>the</strong> court found <strong>the</strong> four factors for estoppel present, and granted Google’ssummary judgment <strong>on</strong> <strong>the</strong> defense of estoppel. 1108The court <strong>the</strong>n turned to applicati<strong>on</strong> of each of <strong>the</strong> four factors of <strong>the</strong> fair use defense.C<strong>on</strong>cerning <strong>the</strong> first factor, purpose and character of <strong>the</strong> use, <strong>the</strong> court, relying <strong>on</strong> Kelly v. ArribaSoft, 1109 found Google’s search engine was a transformative use of Field’s works in thatGoogle’s presentati<strong>on</strong> of “Cached” links did not serve <strong>the</strong> same functi<strong>on</strong>s to enrich and entertaino<strong>the</strong>rs that Field’s original posting of <strong>the</strong> works did. Ra<strong>the</strong>r, <strong>the</strong> “Cached” links allowed users tolocate and access informati<strong>on</strong> that was o<strong>the</strong>rwise inaccessible, and allowed users to understandwhy a page was resp<strong>on</strong>sive to <strong>the</strong>ir original query. The object of enabling users to more quicklyfind and access <strong>the</strong> informati<strong>on</strong> <strong>the</strong>y were searching for was not served by <strong>the</strong> original page. 1110Nor did Google’s use of “Cached” links substitute for a visit to <strong>the</strong> original page. The courtnoted that Google had included at <strong>the</strong> top of each listing a prominent link to <strong>the</strong> original Webpage. The “Cached” links were displayed in smaller f<strong>on</strong>t and in a less c<strong>on</strong>spicuous locati<strong>on</strong>, and<strong>the</strong>re was no evidence that <strong>Internet</strong> users accessed <strong>the</strong> pages c<strong>on</strong>taining Field’s works viaGoogle’s “Cached” links in lieu of visiting those pages directly. Google’s status as acommercial enterprise also did not negate <strong>the</strong> first factor weighing in Google’s favor, because<strong>the</strong>re was no evidence that Google profited in any way by <strong>the</strong> use of any of Field’s works.Field’s works were merely am<strong>on</strong>g billi<strong>on</strong>s of works in Google’s database, and when a useraccessed a page via Google’s “Cached” links, Google did not display advertising to <strong>the</strong> user oro<strong>the</strong>rwise offer a commercial transacti<strong>on</strong>. 1111The court found that <strong>the</strong> sec<strong>on</strong>d factor, <strong>the</strong> nature of <strong>the</strong> copyrighted works, weighed <strong>on</strong>lyslightly in Field’s favor. Even assuming that Field’s copyrighted works were creative, <strong>the</strong> courtnoted that he had published <strong>the</strong>m <strong>on</strong> <strong>the</strong> <strong>Internet</strong>, <strong>the</strong>reby making <strong>the</strong>m available to <strong>the</strong> world athis Web site, thus indicating a desire to make his works available to <strong>the</strong> widest possible audiencefor free. 1112 The court found <strong>the</strong> third factor, <strong>the</strong> amount and substantiality of <strong>the</strong> use, to be1107 Id. at 1116-17.1108 Id. at 1117.1109 336 F.3d 811 (9 th Cir. 2003).1110 Field v. Google, 412 F. Supp. 2d at 1118-19.1111 Id. at 1119.1112 Id. at 1120.- 257 -


neutral. The transformative and socially valuable purposes served by Google’s caching couldnot be effectively accomplished by using <strong>on</strong>ly porti<strong>on</strong>s of <strong>the</strong> Web pages. 1113The court ruled that <strong>the</strong> fourth factor, <strong>the</strong> effect of <strong>the</strong> use up<strong>on</strong> <strong>the</strong> potential market foror value of <strong>the</strong> copyrighted work, weighed str<strong>on</strong>gly in favor of a fair use determinati<strong>on</strong>. Thecourt noted that here <strong>the</strong>re was no evidence of any market for Field’s works, and Field had made<strong>the</strong> works available to <strong>the</strong> public for free in <strong>the</strong>ir entirety and admitted he had never received anycompensati<strong>on</strong> from selling or licensing <strong>the</strong>m. 1114 In a significant holding, <strong>the</strong> court rejectedField’s argument that Google’s caching harmed <strong>the</strong> market for his works by depriving him ofrevenue he could have obtained by licensing Google <strong>the</strong> right to present “Cached” links for <strong>the</strong>pages c<strong>on</strong>taining his works. The court recognized <strong>the</strong> bootstrapping nature of <strong>the</strong> argument:“Under this view, <strong>the</strong> market for a copyrighted work is always harmed by <strong>the</strong> fair use of <strong>the</strong>work because it deprives <strong>the</strong> copyright holder of <strong>the</strong> revenue it could have obtained by licensingthat very use. The Supreme Court has explained that <strong>the</strong> fourth fair use factor is not c<strong>on</strong>cernedwith such syllogisms [citing Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569, 592 (1994)]. …Where <strong>the</strong>re is no likely market for <strong>the</strong> challenged use of <strong>the</strong> plaintiff’s works, <strong>the</strong> fourth fair usefactor favors <strong>the</strong> defendant.” 1115Finally, <strong>the</strong> court noted that in adjudicating fair use, courts may c<strong>on</strong>sider o<strong>the</strong>r factorsbey<strong>on</strong>d <strong>the</strong> four enumerated <strong>on</strong>es in <strong>the</strong> copyright statute. In this case, <strong>the</strong> court found itsignificant that Google had acted in good faith, as evidenced by <strong>the</strong> fact that Google h<strong>on</strong>ored <strong>the</strong>industry standard protocols that site owners could use to instruct search engines not to provide“Cached” links for <strong>the</strong> pages of <strong>the</strong>ir sites. Google also provided an automated mechanism forpromptly removing “Cached” links from Google’s search results if undesired links everappeared. And Google had, without being asked, promptly removed <strong>the</strong> “Cached” links to <strong>the</strong>pages of Field’s site up<strong>on</strong> learning that he objected to <strong>the</strong>m. 1116 Accordingly, balancing all <strong>the</strong>factors, <strong>the</strong> court granted summary judgment for Google <strong>on</strong> its fair use defense. 1117 As discussedfur<strong>the</strong>r in Secti<strong>on</strong> II.C.5(b)(1)(ii).a below, <strong>the</strong> court also c<strong>on</strong>cluded that Google was entitled to<strong>the</strong> safe harbor of Secti<strong>on</strong> 512(b)(1) of <strong>the</strong> DMCA. 1118(b) Perfect 10 v. Google (aka Perfect 10 v. Amaz<strong>on</strong>)In Perfect 10 v. Google, 1119 discussed in detail in Secti<strong>on</strong> II.C.4 above, <strong>the</strong> district courtruled, c<strong>on</strong>trary to <strong>the</strong> Intellectual Reserve case discussed in Secti<strong>on</strong> III.D.6 above, that <strong>the</strong>caching that occurs in an <strong>Internet</strong> user’s web browser c<strong>on</strong>stitutes a fair use:1113 Id. at 1120-21.1114 Id. at 1121.1115 Id. at 1121 n.9.1116 Id. at 1122-23..1117 Id. at 1125.1118 Id. at 1123-24.1119 416 F. Supp. 2d 828 (C.D. Cal. 2006), aff’d sub nom. Perfect 10 v. Amaz<strong>on</strong>.com, Inc., 508 F.3d 1146, 1169(9 th Cir. 2007).- 258 -


[Plaintiff] argues that merely by viewing such websites [c<strong>on</strong>taining infringingphotographs], individual users of Google search make local “cache” copies of itsphotos and <strong>the</strong>reby directly infringe through reproducti<strong>on</strong>. The Court rejects thisargument. Local browser caching basically c<strong>on</strong>sists of a viewer’s computerstoring automatically <strong>the</strong> most recently viewed c<strong>on</strong>tent of <strong>the</strong> websites <strong>the</strong> viewerhas visited. It is an automatic process of which most users are unaware, and itsuse likely is “fair” under 17 U.S.C. § 107. But cf. Intellectual Reserve, Inc. v.Utah Lighthouse Ministry, Inc., 75 F. Supp. 2d 1290 (D. Utah 1999). Localcaching by <strong>the</strong> browsers of individual users is n<strong>on</strong>commercial, transformative,and no more than necessary to achieve <strong>the</strong> objectives of decreasing networklatency and minimizing unnecessary bandwidth usage (essential to <strong>the</strong> internet).It has a minimal impact <strong>on</strong> <strong>the</strong> potential market for <strong>the</strong> original work, especiallygiven that most users would not be able to find <strong>the</strong>ir own local browser cache, letal<strong>on</strong>e locate a specific cached copy of a particular image. That local browsercaching is fair use is supported by a recent decisi<strong>on</strong> holding that Google’s owncache c<strong>on</strong>stitutes fair use. Field v. Google, Inc., [412 F. Supp. 2d 1106 (D. Nev.2006).] If anything, <strong>the</strong> argument that local browser caching is fair use is evenstr<strong>on</strong>ger. Whereas Google is a commercial entity, individual users are typicallyn<strong>on</strong>commercial. Whereas Google arranges to maintain is own cache, individualusers typically are not aware that <strong>the</strong>ir browsers automatically cache viewedc<strong>on</strong>tent. Whereas Google’s cache is open to <strong>the</strong> world, an individual’s localbrowser cache is accessible <strong>on</strong> that computer al<strong>on</strong>e. 1120On appeal, <strong>the</strong> Ninth Circuit affirmed this ruling, holding that, “even assuming suchautomatic copying could c<strong>on</strong>stitute direct infringement, it is a fair use in this c<strong>on</strong>text. Thecopyright functi<strong>on</strong> performed automatically by a user’s computer to assist in accessing <strong>the</strong><strong>Internet</strong> is a transformative use. Moreover, as noted by <strong>the</strong> district court, a cache copies no morethan is necessary to assist <strong>the</strong> user in <strong>Internet</strong> use. It is designed to enhance an individual’scomputer use, not to supersede <strong>the</strong> copyright holders’ exploitati<strong>on</strong> of <strong>the</strong>ir works. Suchautomatic background copying has no more than a minimal effect <strong>on</strong> Perfect 10’s rights, but ac<strong>on</strong>siderable public benefit.” 1121(c) Ticketmaster L.L.C. v. RMG Technologies, Inc.In Ticketmaster L.L.C. v. RMG Technologies, Inc. 1122 <strong>the</strong> plaintiff Ticketmaster soughtto hold <strong>the</strong> defendant liable for direct and indirect copyright liability based up<strong>on</strong> <strong>the</strong> defendant’sdevelopment and marketing of an automated tool that enabled users (such as ticket brokers) toaccess and navigate rapidly through <strong>the</strong> Ticketmaster site and purchase large quantities oftickets. The court granted a preliminary injuncti<strong>on</strong> against <strong>the</strong> defendant, finding that <strong>the</strong>defendant was highly likely to be found liable for direct copyright infringement because it had,during <strong>the</strong> course of development of <strong>the</strong> tool, accessed <strong>the</strong> defendant’s site and made copies of1120 Id. at 852 n.17.1121 Perfect 10 v. Amaz<strong>on</strong>.com, Inc., 508 F.3d 1146, 1169 (9 th Cir. 2007).1122 507 F. Supp. 2d 1096 (C.D. Cal. 2007).- 259 -


web pages from <strong>the</strong> site in <strong>the</strong> RAM of its computers, which copies <strong>the</strong> court held, citing MAI v.Peak, fell within <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act’s definiti<strong>on</strong> of “copy.” The court found such copyingunauthorized because it violated <strong>the</strong> Terms of Use posted <strong>on</strong> Ticketmaster’s site, whichprohibited use of any areas of <strong>the</strong> site for commercial purposes and use of any automated devicesto search <strong>the</strong> site. 1123The court rejected <strong>the</strong> defendant’s argument, based <strong>on</strong> Perfect 10 v. Google, that suchRAM copying should be deemed a fair use. The court distinguished that case <strong>on</strong> <strong>the</strong> ground that<strong>the</strong> Ninth Circuit had ruled <strong>on</strong>ly that automatic cache copies made by users who link toinfringing web sites should be deemed a fair use because, in that particular c<strong>on</strong>text, <strong>the</strong> cachingwas n<strong>on</strong>commercial, transformative and had a minimal impact <strong>on</strong> <strong>the</strong> potential market for <strong>the</strong>original work. By c<strong>on</strong>trast, in <strong>the</strong> instant case, <strong>the</strong> court ruled that <strong>the</strong> defendant was not an“innocent” third party visitor to ano<strong>the</strong>r pers<strong>on</strong>’s infringing site. Instead, <strong>the</strong> purpose of <strong>the</strong>defendant’s viewing <strong>the</strong> Ticketmaster web site and <strong>the</strong> copying that entailed was to engage inc<strong>on</strong>duct that violated <strong>the</strong> site’s Terms of Use in fur<strong>the</strong>rance of <strong>the</strong> defendant’s own commercialobjectives. 1124 “Fur<strong>the</strong>rmore, in this case, such copying has a significant, as opposed to minimal,effect <strong>on</strong> Plaintiff’s rights because Defendant’s c<strong>on</strong>duct empowers its clients to also violate <strong>the</strong>Terms of Use, infringe <strong>on</strong> Plaintiff’s rights, and collectively cause Plaintiff” harm. 1125The court also found <strong>the</strong> defendant highly likely to be liable for c<strong>on</strong>tributoryinfringement because it had supplied a tool that enabled its users to gain unauthorized access anduse of <strong>the</strong> Ticketmaster site, <strong>the</strong>reby making infringing copies of web pages from <strong>the</strong> site, andhad also induced <strong>the</strong> infringing behavior by advertising its tool as “stealth technology [that] letsyou hide your IP address, so you never get blocked by Ticketmaster.” 1126(d) Parker v. Yahoo!, Inc.In Parker v. Yahoo!, Inc., 1127 <strong>the</strong> plaintiff, author of several works that he made freelyavailable <strong>on</strong> his web site, sued Yahoo and Microsoft for copyright infringement, alleging that<strong>the</strong>ir search engines created and republished unauthorized cached copies of his works based <strong>on</strong><strong>the</strong> fact that when an <strong>Internet</strong> user used ei<strong>the</strong>r of <strong>the</strong> defendants’ search engines, <strong>the</strong> searchresults included hyperlinks to cached copies of <strong>the</strong> web pages resp<strong>on</strong>sive to <strong>the</strong> user’s inquiry.The user could view those search results ei<strong>the</strong>r by following a hyperlink to <strong>the</strong> original web siteor by viewing <strong>the</strong> cached copy hosted <strong>on</strong> <strong>the</strong> defendants’ computers. The plaintiff c<strong>on</strong>ceded inhis complaint that <strong>the</strong> defendants each provided opt-out mechanisms, through <strong>the</strong> robots.txtprotocol, that would prevent his web sites from being cached, but that he had not made use of<strong>the</strong>m. 11281123 Id. at 1105-09.1124 Id. at 1109-10.1125 Id. at 1110.1126 Id. at 1110-11 (emphasis in original).1127 2008 U.S. Dist. LEXIS 74512 (E.D. Pa. Sept. 26, 2008).1128 Id. at *1-2.- 260 -


The court ruled that, as a result of <strong>the</strong> plaintiff’s failure to employ <strong>the</strong> robots.txt protocol<strong>on</strong> his web site or to send <strong>the</strong> defendants a take down notice, <strong>the</strong> defendants had an affirmativedefense of implied license for acts of caching prior to <strong>the</strong> lawsuit. From <strong>the</strong> plaintiff’s silenceand lack of earlier objecti<strong>on</strong>, <strong>the</strong> defendants could properly infer that <strong>the</strong> plaintiff knew of andencouraged <strong>the</strong> search engines’ activity. However, <strong>the</strong> court refused to dismiss entirely <strong>the</strong>plaintiff’s count for direct copyright infringement because <strong>the</strong> defendants had allegedlyc<strong>on</strong>tinued to display <strong>the</strong> plaintiff’s works even after <strong>the</strong> filing of <strong>the</strong> lawsuit. The court notedseveral decisi<strong>on</strong>s holding that a n<strong>on</strong>exclusive implied license can be revoked where noc<strong>on</strong>siderati<strong>on</strong> has been given for it, and initiati<strong>on</strong> of a lawsuit itself may c<strong>on</strong>stitute revocati<strong>on</strong> ofan implied license if <strong>the</strong>re was no c<strong>on</strong>siderati<strong>on</strong> for <strong>the</strong> license. 1129However, <strong>the</strong> court dismissed <strong>the</strong> plaintiff’s counts for c<strong>on</strong>tributory and vicariouscopyright infringement <strong>on</strong> <strong>the</strong> part of <strong>the</strong> defendants based <strong>on</strong> allegedly infringing copies of <strong>the</strong>plaintiff’s c<strong>on</strong>tent made when an <strong>Internet</strong> user’s browser stored a temporary copy of a file thatwas necessary for <strong>the</strong> user to view <strong>the</strong> web site. The court ruled that, by publishing his works<strong>on</strong>line with no registrati<strong>on</strong> requirement or any o<strong>the</strong>r access measure taken, <strong>the</strong> plaintiff hadimpliedly authorized <strong>Internet</strong> users at large to view his c<strong>on</strong>tent and, c<strong>on</strong>sequently, to makeincidental copies necessary to view that c<strong>on</strong>tent over <strong>the</strong> <strong>Internet</strong>. And even if search engineusers did directly infringe <strong>the</strong> plaintiff’s copyright, <strong>the</strong> court held that <strong>the</strong> plaintiff had not setforth any plausible allegati<strong>on</strong> that ei<strong>the</strong>r defendant financially benefitted from such infringement.Nor had <strong>the</strong> plaintiff alleged that ei<strong>the</strong>r defendant had knowledge of any third party’sinfringement. 11305. O<strong>the</strong>r Caching Cases(a) Facebook v. Power VenturesIn Facebook, Inc. v. Power Ventures, Inc., 1131 <strong>the</strong> defendants operated an <strong>Internet</strong> servicecalled Power.com that collected user informati<strong>on</strong> from Facebook’s web site outside of <strong>the</strong>“Facebook C<strong>on</strong>nect” applicati<strong>on</strong> programmer’s interface (API). After a user provided his or heruser names and passwords, <strong>the</strong> Power.com service used <strong>the</strong> access informati<strong>on</strong> to scrape userdata from those accounts. Facebook alleged that <strong>the</strong> defendants committed direct and indirectcopyright infringement when <strong>the</strong>y made cached copies of Facebook’s web site during <strong>the</strong> processof extracting user informati<strong>on</strong>. The defendants brought a moti<strong>on</strong> to dismiss <strong>the</strong> copyright claims.The court denied <strong>the</strong> moti<strong>on</strong>, ruling that Facebook’s allegati<strong>on</strong> that <strong>the</strong> defendants made anunauthorized cache copy of <strong>the</strong> web site <strong>on</strong> each occasi<strong>on</strong> of access to scrape data was sufficientto survive a moti<strong>on</strong> to dismiss. 11321129 Id. at *14-16.1130 Id. at *18-20.1131 2009 U.S. Dist. LEXIS 42367 (N.D. Cal. May 11, 2009).1132 Id. at *1-11.- 261 -


C. Liability of Online Service ProvidersMuch of <strong>the</strong> <strong>Internet</strong> copyright debate in recent years has centered around <strong>the</strong> issue ofcopyright liability of OSPs, BBS operators, system operators, and o<strong>the</strong>r service providers forinfringing activities taking place through <strong>the</strong>ir facilities. Indeed, to date, almost all of <strong>the</strong>reported <strong>Internet</strong> copyright decisi<strong>on</strong>s have centered around <strong>the</strong> issue of liability of OSPs andBBS operators. <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> owners have sought to hold OSPs and BBS operators liable <strong>on</strong><strong>the</strong>ories of direct liability, c<strong>on</strong>tributory liability, and vicarious liability. This Secti<strong>on</strong> discusseseach of <strong>the</strong>se three <strong>the</strong>ories in turn and <strong>the</strong> cases raising those <strong>the</strong>ories that have been decided todate involving <strong>the</strong> <strong>Internet</strong>. This Secti<strong>on</strong> also discusses <strong>the</strong> relevant provisi<strong>on</strong>s of <strong>the</strong> DMCAthat limit <strong>the</strong> liability of OSPs for <strong>the</strong> infringing acts of third parties committed through <strong>the</strong>ir<strong>on</strong>line services.1. Direct LiabilityAs discussed in detail in Secti<strong>on</strong> II.A.4 above, a majority of <strong>the</strong> cases decided to dateseem to require that <strong>the</strong>re be some kind of a direct voliti<strong>on</strong>al act in order to establish directinfringement liability <strong>on</strong> <strong>the</strong> part of an OSP or BBS for infringing postings and unauthorizeduses by users. For example, <strong>the</strong> Netcom court refused to hold an OSP directly liable forautomatic pass through of allegedly infringing messages posted to Usenet by a subscriber. 1133The subsequent MAPHIA case 1134 and <strong>the</strong> Sabella case 1135 extended <strong>the</strong> logic of Netcom,refusing to hold liable as a direct infringer <strong>the</strong> operator of a BBS for <strong>the</strong> uploading anddownloading by subscribers of unauthorized copies of Sega’s videogames through <strong>the</strong> BBS, eventhough <strong>the</strong> operator encouraged <strong>the</strong> initial uploading, because <strong>the</strong> operator had not participatedin <strong>the</strong> very acts of uploading or downloading <strong>the</strong>mselves. And <strong>the</strong> CoStar, 1136 Ellis<strong>on</strong>, 1137 andPerfect 10 v. Cybernet Ventures 1138 cases suggest that an OSP will not have direct liability forinfringing material posted <strong>on</strong> its service by users or available through its service <strong>on</strong> third partysites where <strong>the</strong> OSP has not encouraged such posting or had advance knowledge of it.The logic of <strong>the</strong> Ninth Circuit’s decisi<strong>on</strong> in Subafilms, Ltd. v. MGM-Pa<strong>the</strong>Communicati<strong>on</strong>s Co. 1139 also suggests <strong>the</strong>re should not be direct liability for pers<strong>on</strong>s who merelyplace material <strong>on</strong> a network for subsequent unauthorized copying, display, performance or <strong>the</strong>like. Subafilms held that no independent “right of authorizati<strong>on</strong>” was created by <strong>the</strong> copyrightstatute’s reference in Secti<strong>on</strong> 106 of <strong>the</strong> exclusive right “to do or to authorize” <strong>the</strong> actsenumerated <strong>the</strong>rein. Ra<strong>the</strong>r, <strong>the</strong> reference to “authorize” was meant <strong>on</strong>ly to establish potential1133 Religious Technology Center v. Netcom On-Line Communicati<strong>on</strong>s Servs., 907 F. Supp. 1361 (N.D. Cal. 1995).1134 Sega Enterprises Ltd. v. MAPHIA, 948 F. Supp. 923 (N.D. Cal. 1996).1135 Sega Enterprises Ltd. v. Sabella, 1997 Copyr. Law. Dec. 27,648 (N.D. Cal. Dec. 18, 1996).1136 CoStar v. Loopnet, 164 F. Supp. 2d 688 (D. Md. 2001), aff’d, 373 F.3d 544 (4 th Cir. 2004).1137 Ellis<strong>on</strong> v. Roberts<strong>on</strong>, 189 F. Supp. 2d 1051 (C.D. Cal. 2002), aff’d in part and rev’d in part, 357 F.3d 1072 (9thCir. 2004).1138 Perfect 10, Inc. v. Cybernet Ventures, Inc., 213 F. Supp. 2d 1146 (C.D. Cal. 2002).1139 24 F.3d 1088 (9th Cir. 1994).- 262 -


liability for c<strong>on</strong>tributory infringement <strong>on</strong> <strong>the</strong> part of a pers<strong>on</strong> who causes an infringement byauthorizing it. Under <strong>the</strong> reas<strong>on</strong>ing of <strong>the</strong> Subafilms decisi<strong>on</strong>, even if loading material <strong>on</strong>to aserver encourages (or authorizes) copying through downloading, that authorizati<strong>on</strong> does notsuffice for direct liability. 1140However, as discussed in greater detail in Secti<strong>on</strong>s II.A.4, II.C, and II.D above, <strong>the</strong>Frena, Webbworld, Sanfilippo and Hardenburgh cases seem to go fur<strong>the</strong>r in <strong>the</strong>ir willingness toimpose direct liability <strong>on</strong> a BBS operator, at least where an actor such as a BBS operator orwebsite operator has some form of direct involvement in <strong>the</strong> anticipated acts that lead toinfringement or in <strong>the</strong> infringing acts <strong>the</strong>mselves (such as resale of <strong>the</strong> infringing material).Such acts of direct involvement in <strong>the</strong> infringement process may be sufficient for a finding ofenough voliti<strong>on</strong>al activity to impose direct liability. As noted below, however, legislati<strong>on</strong>limiting <strong>the</strong> liability of OSPs might negate or limit <strong>the</strong> holdings of <strong>the</strong>se cases.(a) Louis Vuitt<strong>on</strong> v. Akanoc Soluti<strong>on</strong>sIn Louis Vuitt<strong>on</strong> Malletier, S.A. v. Akanoc Soluti<strong>on</strong>s, Inc., 1141 <strong>the</strong> defendants operatedhosting services for a number of web sites overseas from which counterfeit Louis Vuitt<strong>on</strong>merchandise could be purchased. The plaintiff brought claims for direct and c<strong>on</strong>tributoryinfringement of its copyrights. A jury found <strong>the</strong> defendants liable for willful c<strong>on</strong>tributoryinfringement and awarded statutory damages, and found that <strong>the</strong> defendants were not entitled to<strong>the</strong> safe harbors of <strong>the</strong> DMCA. After <strong>the</strong> verdict, <strong>the</strong> defendants filed a moti<strong>on</strong> for JMOL withrespect to <strong>the</strong> claims. 1142 The defendants argued that <strong>the</strong>y could not be liable for c<strong>on</strong>tributorycopyright infringement because, am<strong>on</strong>g o<strong>the</strong>r things, <strong>the</strong> acts of direct infringement – <strong>the</strong>reproducti<strong>on</strong> of counterfeit merchandise and <strong>the</strong> storage of digital images of that merchandise <strong>on</strong><strong>the</strong> servers of <strong>the</strong>ir web site – occurred extraterritorially in China and <strong>the</strong> digital images couldnot be “copies” of <strong>the</strong> copyrighted merchandise. 1143The court rejected <strong>the</strong>se arguments. With respect to territoriality, <strong>the</strong> court noted thatunauthorized copying and public display of a copyrighted work within <strong>the</strong> United States triggersapplicati<strong>on</strong> of U.S. copyright law, and under Secti<strong>on</strong> 602, unauthorized importati<strong>on</strong> into <strong>the</strong>United States of copies acquired extraterritorially is prohibited, acts which <strong>the</strong> defendants clearlyhad d<strong>on</strong>e. 1144 C<strong>on</strong>cerning <strong>the</strong> public display right, <strong>the</strong> court noted that <strong>the</strong> Ninth Circuit hadadopted in Perfect 10 v. Amaz<strong>on</strong>.com 1145 <strong>the</strong> “server test,” under which a computer ownerstoring an electr<strong>on</strong>ic image as electr<strong>on</strong>ic informati<strong>on</strong> and serving that informati<strong>on</strong> directly to <strong>the</strong>user is displaying <strong>the</strong> informati<strong>on</strong> in violati<strong>on</strong> of <strong>the</strong> copyright holder’s exclusive display right.Here, <strong>the</strong> evidence established that <strong>the</strong> defendants’ servers in China stored and served data,including pictures of <strong>the</strong> plaintiff’s copyrighted merchandise, for sale to U.S. customers, which1140 R. Nimmer, Informati<strong>on</strong> Law 4.10, at 4-39 (2001).1141 2010 U.S. Dist. LEXIS 85266 (N.D. Cal. Mar. 19, 2010).1142 Id. at *1-2.1143 Id. at *5-6.1144 Id. at *7-9.1145 508 F.3d 1146 (9 th Cir. 2007).- 263 -


was sufficient for direct infringement of <strong>the</strong> display right. The court also rejected <strong>the</strong>defendants’ argument that <strong>the</strong> images could not be “copies” of <strong>the</strong> physical copyrightedmerchandise. Accordingly, <strong>the</strong> court denied <strong>the</strong> defendants’ moti<strong>on</strong> for JMOL as to directinfringement. 11462. C<strong>on</strong>tributory LiabilityA party may be liable for c<strong>on</strong>tributory infringement where “with knowledge of <strong>the</strong>infringing activity, [it] induces, causes or materially c<strong>on</strong>tributes to <strong>the</strong> infringing activity ofano<strong>the</strong>r.” 1147 The standard of knowledge is objective: to know or have reas<strong>on</strong> to know that <strong>the</strong>subject matter is copyrighted and that <strong>the</strong> particular uses were violating copyright law. 1148 Forliability for c<strong>on</strong>tributory infringement, <strong>the</strong>re must be a direct infringement 1149 to which <strong>the</strong>c<strong>on</strong>tributory infringer has knowledge and encourages or facilitates.The requirement of knowledge may eliminate c<strong>on</strong>tributory liability <strong>on</strong> <strong>the</strong> part of an OSPor BBS operator with respect to many instances of infringement for which <strong>the</strong> OSP or BBS ismerely a passive informati<strong>on</strong> c<strong>on</strong>duit and has no knowledge of <strong>the</strong> infringement. However,given knowledge (or reas<strong>on</strong> to know), a number of cases suggest that a system provider cannotsimply c<strong>on</strong>tinue to provide <strong>the</strong> facility that enables infringement.(a) The Netcom CaseIn Religious Technology Center v. Netcom On-Line Communicati<strong>on</strong> Services, 1150 <strong>the</strong>court held that <strong>the</strong> OSP Netcom could be c<strong>on</strong>tributorily liable for infringing postings by anindividual named Erlich of copyrighted religious materials to Usenet through <strong>the</strong> provider after<strong>the</strong> service was given notice of <strong>the</strong> infringing material. “If plaintiffs can prove <strong>the</strong> knowledgeelement, Netcom will be liable for c<strong>on</strong>tributory infringement since its failure to simply cancelErlich’s infringing message and <strong>the</strong>reby stop an infringing copy from being distributedworldwide c<strong>on</strong>stitutes substantial participati<strong>on</strong> in Erlich’s public distributi<strong>on</strong> of <strong>the</strong> message.” 1151The court held that <strong>the</strong> copyright notices in <strong>the</strong> posted works were sufficient to give Netcomnotice that <strong>the</strong> works were copyrighted. 11521146 Akanoc, 2010 U.S. Dist. LEXIS 85266 at *11-15.1147 E.g., Gershwin Publishing Corp. v. Columbia Artists Management, Inc., 443 F.2d 1159, 1162 (2d Cir. 1971);Cable/Home Communicati<strong>on</strong>s Corp. v. Network Prods., Inc., 902 F.2d 829, 845 (11th Cir. 1990).1148 R. Nimmer, Informati<strong>on</strong> Law 4.11, at 4-40 (2001); see also Sega Enterprises Ltd. v. MAPHIA, 948 F. Supp.923, 933 (N.D. Cal. 1996) (“The standard for <strong>the</strong> knowledge requirement is objective, and is satisfied where <strong>the</strong>defendant knows or has reas<strong>on</strong> to know of <strong>the</strong> infringing activity.”) (citing Casella v. Morris, 820 F.2d 362, 365(11th Cir. 1987)).1149 Given <strong>the</strong> ubiquitous nature of copies <strong>on</strong> <strong>the</strong> <strong>Internet</strong> and <strong>the</strong> strength of <strong>the</strong> copyright holder’s o<strong>the</strong>r rightsdiscussed in this paper, establishing a direct infringement in a network transmissi<strong>on</strong> should not be difficult.1150 907 F. Supp. 1361 (N.D. Cal. 1995).1151 Id. at 1374.1152 Id.- 264 -


However, <strong>the</strong> court was careful to note that where an operator is unable to verify a claimof infringement, <strong>the</strong>re may be no c<strong>on</strong>tributory liability:Where a BBS operator cannot reas<strong>on</strong>ably verify a claim of infringement, ei<strong>the</strong>rbecause of a possible fair use defense, <strong>the</strong> lack of copyright notices <strong>on</strong> <strong>the</strong> copies,or <strong>the</strong> copyright holder’s failure to provide <strong>the</strong> necessary documentati<strong>on</strong> to showthat <strong>the</strong>re is a likely infringement, <strong>the</strong> operator’s lack of knowledge will be foundreas<strong>on</strong>able and <strong>the</strong>re will be no liability for c<strong>on</strong>tributory infringement forallowing <strong>the</strong> c<strong>on</strong>tinued distributi<strong>on</strong> of <strong>the</strong> works <strong>on</strong> its system. 1153Never<strong>the</strong>less, <strong>the</strong> court clearly imposed a duty <strong>on</strong> <strong>the</strong> operator to actively attempt toverify a claim of infringement and to take appropriate acti<strong>on</strong> in resp<strong>on</strong>se:Thus, it is fair, assuming Netcom is able to take simple measures to preventfur<strong>the</strong>r damage to plaintiffs’ copyrighted works, to hold Netcom liable forc<strong>on</strong>tributory infringement where Netcom has knowledge of Erlich’s infringingpostings yet c<strong>on</strong>tinues to aid in <strong>the</strong> accomplishment of Erlich’s purpose ofpublicly distributing <strong>the</strong> postings. 1154(b) The MAPHIA CaseIn additi<strong>on</strong> to <strong>the</strong> Netcom case, <strong>the</strong> court in <strong>the</strong> subsequent MAPHIA case 1155 (also out of<strong>the</strong> Nor<strong>the</strong>rn District of California) held a BBS and its system operator liable for c<strong>on</strong>tributoryinfringement for both <strong>the</strong> uploading and <strong>the</strong> subsequent downloading of copies of Sega’s videogames by users where <strong>the</strong> system operator had knowledge that <strong>the</strong> infringing activity was going<strong>on</strong> through <strong>the</strong> bulletin board, and had specifically solicited <strong>the</strong> uploading of <strong>the</strong> games fordownloading by users of <strong>the</strong> bulletin board. The court cited <strong>the</strong> Ninth Circuit’s decisi<strong>on</strong> inF<strong>on</strong>ovisa, Inc. v. Cherry Aucti<strong>on</strong>, Inc. 1156 for <strong>the</strong> propositi<strong>on</strong> that providing <strong>the</strong> site and facilitiesfor known infringing activity is sufficient to establish c<strong>on</strong>tributory liability. “In this case,Sherman provided <strong>the</strong> BBS as a central depository site for <strong>the</strong> unauthorized copies of games, andallowed subsequent distributi<strong>on</strong> of <strong>the</strong> games by user downloads. He provided <strong>the</strong> facilities forcopying <strong>the</strong> games by providing, m<strong>on</strong>itoring, and operating <strong>the</strong> BBS software, hardware, andph<strong>on</strong>e lines necessary for <strong>the</strong> users to upload and download games.” 1157 This suggests that mereoperati<strong>on</strong> of a BBS, at least if <strong>the</strong> operator knows that infringing activity is taking place, may besufficient for c<strong>on</strong>tributory liability.However, <strong>the</strong> court went <strong>on</strong> to hold that Sherman would have been liable as ac<strong>on</strong>tributory infringer even under a higher standard requiring more direct participati<strong>on</strong> in <strong>the</strong>infringement that <strong>the</strong> court believed <strong>the</strong> Netcom decisi<strong>on</strong> established:1153 Id.1154 Id. at 1375.1155 Sega Enterprises Ltd. v. MAPHIA, 948 F. Supp. 923 (N.D. Cal. 1996).1156 76 F.3d 259 (9th Cir. 1996).1157 MAPHIA, 948 F. Supp. at 933.- 265 -


However, even under an alternative and higher standard of “substantialparticipati<strong>on</strong>,” Sherman is liable. Under this standard, Sherman is <strong>on</strong>ly liable ifhe knew of <strong>the</strong> users’ infringing acti<strong>on</strong>s, and yet substantially participated byinducing, causing or materially c<strong>on</strong>tributing to <strong>the</strong> users’ infringing c<strong>on</strong>duct.Netcom, 907 F. Supp. at 1382. In this case, Sherman did more than provide <strong>the</strong>site and facilities for <strong>the</strong> known infringing c<strong>on</strong>duct. He actively solicited users toupload unauthorized games, and provided a road map <strong>on</strong> his BBS for easyidentificati<strong>on</strong> of Sega games available for downloading. Additi<strong>on</strong>ally, through<strong>the</strong> same MAPHIA BBS medium, he offered copiers for sale to facilitate playing<strong>the</strong> downloaded games. 1158(c) The Peer-to-Peer Filing Sharing Cases(1) The Napster CasesIn December of 1999, <strong>the</strong> Recording Industry Associati<strong>on</strong> of America, Inc. (RIAA), <strong>on</strong>behalf of 18 of its members, filed a complaint in federal court in <strong>the</strong> Nor<strong>the</strong>rn District ofCalifornia for c<strong>on</strong>tributory and vicarious copyright infringement against Napster, Inc., <strong>the</strong>operator of a Web site (www.napster.com) designed to enable its members to locate music filesin <strong>the</strong> MP3 format 1159 stored <strong>on</strong> <strong>the</strong> hard disks of o<strong>the</strong>r members, and to initiate downloads ofsuch files through a “peer-to-peer” architecture – i.e., transfers directly from <strong>the</strong> computer of <strong>on</strong>euser to <strong>the</strong> computer of ano<strong>the</strong>r user without passing through <strong>the</strong> Napster servers.1. Factual Background. Napster offered to its members a piece of proprietary softwarecalled “MusicShare” for download from its website free of charge. When a Napster user logged<strong>on</strong>, <strong>the</strong> MusicShare software would interact with <strong>the</strong> Napster server software to c<strong>on</strong>nect <strong>the</strong> userto <strong>on</strong>e of many servers operated by Napster, would read a list of names of MP3 files that <strong>the</strong> userhad elected to make available <strong>on</strong> his or her pers<strong>on</strong>al computer for sharing with o<strong>the</strong>r users (byplacing <strong>the</strong>m in certain designated directories <strong>on</strong> his or her hard disk known as <strong>the</strong> “userlibrary”), and would <strong>the</strong>n store <strong>the</strong> names of those files in an index maintained <strong>on</strong> <strong>the</strong> Napsterserver. Once <strong>the</strong> file names were successfully uploaded to <strong>the</strong> index, each user library, identifiedby a user name, would become a “locati<strong>on</strong>” <strong>on</strong> <strong>the</strong> Napster servers. Napster locati<strong>on</strong>s wereshort-lived – <strong>the</strong>y were respectively added or purged every time a user signed <strong>on</strong> or off of <strong>the</strong>network. Thus, a particular user’s MP3 files designated for sharing would be accessible to o<strong>the</strong>rusers <strong>on</strong>ly while that user was <strong>on</strong>line. 1160An account holder could use <strong>the</strong> search tools included in <strong>the</strong> MusicShare software to findMP3 files being shared by o<strong>the</strong>r users by searching <strong>the</strong> index c<strong>on</strong>taining <strong>the</strong> names of MP3 files1158 Id. The court fur<strong>the</strong>r held that because Sega had established c<strong>on</strong>tributory liability <strong>on</strong> <strong>the</strong> part of Sherman, <strong>the</strong>court need not address whe<strong>the</strong>r Sherman was also liable under <strong>the</strong> <strong>the</strong>ory of vicarious liability. Id.1159 MP3 stands for Moti<strong>on</strong> Picture Expert Group 1, Audio Layer 3. MP3 is an algorithm that compresses a digitalmusic file by a ratio of approximately 12:1, <strong>the</strong>reby reducing <strong>the</strong> size of <strong>the</strong> file so that it more easily andquickly can be downloaded over <strong>the</strong> <strong>Internet</strong>. A&M Records Inc. v. Napster Inc., 54 U.S.P.Q.2d 1746, 1747n.1 (N.D. Cal. 2000).1160 A&M Records Inc. v. Napster Inc., 114 F. Supp. 2d 896, 905 (N.D. Cal. 2000).- 266 -


that <strong>on</strong>line users saved in <strong>the</strong>ir designated user library directories. Users wishing to search for as<strong>on</strong>g or artist could do so by entering <strong>the</strong> name of <strong>the</strong> s<strong>on</strong>g or artist in <strong>the</strong> search fields of <strong>the</strong>MusicShare software and <strong>the</strong>n clicking a “Find It” butt<strong>on</strong>. The Napster servers would perform atext search of <strong>the</strong> file names in <strong>the</strong> index and resp<strong>on</strong>d by sending <strong>the</strong> requesting user a list offiles that included <strong>the</strong> same term(s) <strong>the</strong> requesting user entered <strong>on</strong> <strong>the</strong> search form.Alternatively, users could access MP3 files via a “hotlist” functi<strong>on</strong>. This functi<strong>on</strong> enabled aNapster user to archive o<strong>the</strong>r user names and learn whe<strong>the</strong>r account holders who accessed <strong>the</strong>network under those names were <strong>on</strong>line. A requesting user could access or browse all files listedin <strong>the</strong> user libraries of hotlisted users. 1161In ei<strong>the</strong>r case, <strong>on</strong>ce a requesting user located and selected a desired file from a list ofsearch results or a list of files made available by a hotlisted user, <strong>the</strong> Napster server softwarewould <strong>the</strong>n engage in a dialog with <strong>the</strong> MusicShare software of <strong>the</strong> requesting user and that of<strong>the</strong> “host user” (i.e., <strong>the</strong> user who made <strong>the</strong> desired MP3 file available for downloading). TheNapster server would obtain <strong>the</strong> necessary <strong>Internet</strong> Protocol (IP) address informati<strong>on</strong> from <strong>the</strong>host user, communicate <strong>the</strong> host user’s address or routing informati<strong>on</strong> to <strong>the</strong> requesting user, and<strong>the</strong> requesting user’s computer would <strong>the</strong>n employ this informati<strong>on</strong> to establish a “peer-to-peer”c<strong>on</strong>necti<strong>on</strong> directly with <strong>the</strong> host user’s MusicShare software and download <strong>the</strong> MP3 file from<strong>the</strong> host user’s library. The c<strong>on</strong>tent of <strong>the</strong> actual MP3 file would be transferred over <strong>the</strong> <strong>Internet</strong>between <strong>the</strong> users, not through <strong>the</strong> Napster servers. No MP3 music files were stored <strong>on</strong> <strong>the</strong>Napster servers <strong>the</strong>mselves. 1162The plaintiffs, owners of <strong>the</strong> copyrights in many of <strong>the</strong> sound recordings beingdownloaded by users through <strong>the</strong> Napster system, brought claims for c<strong>on</strong>tributory and vicariouscopyright infringement and sought a preliminary injuncti<strong>on</strong> against Napster. A sec<strong>on</strong>d, verysimilar case, was filed against Napster in federal district court in <strong>the</strong> Nor<strong>the</strong>rn District ofCalifornia <strong>on</strong> Jan. 7, 2000. 1163 That case was a class acti<strong>on</strong> filed by named plaintiffs JerryLeiber, Mike Stoller, and Frank Music Corp. <strong>on</strong> behalf of <strong>the</strong>mselves and “those musicpublisher-principals of The Harry Fox Agency, Inc.” 1164 The complaint alleged that Napster’sWeb site c<strong>on</strong>stituted inducement and c<strong>on</strong>tributory infringement of <strong>the</strong> copyrights in variousmusical compositi<strong>on</strong>s held by <strong>the</strong> members of <strong>the</strong> class. 1165 The complaint fur<strong>the</strong>r alleged thatNapster was c<strong>on</strong>tributing to <strong>the</strong> unauthorized reproducti<strong>on</strong> and distributi<strong>on</strong> of “ph<strong>on</strong>orecords”embodying <strong>the</strong> copyrighted musical compositi<strong>on</strong>s of members of <strong>the</strong> class without obtaining <strong>the</strong>necessary authority from The Harry Fox Agency. 1166 Those two cases were c<strong>on</strong>solidated beforeJudge Marilyn Hall Patel.1161 Id. at 906.1162 Id. at 907.1163 Leiber et al. v. Napster Inc., No. C 00 0074 ENE (N.D. Cal. Jan. 7, 2000).1164 Id. 10.1165 Id. 1, 29.1166 Id. 30.- 267 -


Several o<strong>the</strong>r copyright holders, including <strong>the</strong> artists Metallica and Dr. Dre and severalindependent recording artists and labels, as well as <strong>the</strong> Academy of Moti<strong>on</strong> Picture Arts andSciences (AMPAS), ultimately also filed lawsuits against Napster for copyright infringement, allof which were eventually c<strong>on</strong>solidated before Judge Patel in <strong>the</strong> Nor<strong>the</strong>rn District of Californiaunder <strong>the</strong> Multi-District Litigati<strong>on</strong> (MDL) rules of <strong>the</strong> federal courts. In July of 2000, <strong>the</strong>district court entered a broad preliminary injuncti<strong>on</strong> against Napster. Before it took effect,however, <strong>the</strong> Ninth Circuit stayed <strong>the</strong> injuncti<strong>on</strong> pending an expedited appeal by Napster.After appeal, <strong>the</strong> Ninth Circuit issued an opini<strong>on</strong> affirming in part and reversing in part,with a remand to <strong>the</strong> district court to enter a modified preliminary injuncti<strong>on</strong> of narrower scope,which <strong>the</strong> district court did <strong>on</strong> Mar. 5, 2001. Both sides filed a sec<strong>on</strong>d appeal to <strong>the</strong> NinthCircuit based <strong>on</strong> <strong>the</strong> Mar. 5 preliminary injuncti<strong>on</strong>. The Mar. 5 order was clarified by <strong>the</strong> districtcourt in a memorandum dated Apr. 26, 2001, <strong>the</strong>n orally modified by <strong>the</strong> court from <strong>the</strong> bench<strong>on</strong> July 11, 2001. Ten days before <strong>the</strong> oral modificati<strong>on</strong> of <strong>the</strong> injuncti<strong>on</strong>, <strong>on</strong> July 1, 2001,Napster voluntarily suspended file sharing through its service. On July 18, 2001, <strong>the</strong> NinthCircuit stayed <strong>the</strong> district court’s July 11 oral modificati<strong>on</strong> of <strong>the</strong> preliminary injuncti<strong>on</strong>. BothNapster and <strong>the</strong> plaintiffs pursued fur<strong>the</strong>r appeals to <strong>the</strong> Ninth Circuit in view of <strong>the</strong> July 11 oralorder. The Ninth Circuit c<strong>on</strong>solidated those appeals with <strong>the</strong> earlier appeals of <strong>the</strong> Mar. 5modified injuncti<strong>on</strong>.The Napster cases raised a number of issues of significant importance to <strong>on</strong>line copyrightlaw, and <strong>the</strong> district court and <strong>the</strong> Ninth Circuit took somewhat different approaches with respectto various of <strong>the</strong> issues. With respect to each issue, <strong>the</strong> district court’s analysis will first bedescribed, followed by <strong>the</strong> Ninth Circuit’s analysis of <strong>the</strong> issue. Because <strong>the</strong>re were multipleappeals to <strong>the</strong> Ninth Circuit, <strong>the</strong> first opini<strong>on</strong> issued by <strong>the</strong> Ninth Circuit will be referred to as“Napster I,” to distinguish it from <strong>the</strong> later opini<strong>on</strong> issued by <strong>the</strong> Ninth Circuit as a result of <strong>the</strong>subsequent c<strong>on</strong>solidated appeals, which will be referred to as “Napster II.”2. Whe<strong>the</strong>r Any O<strong>the</strong>rwise Direct Infringement by Napster’s Users Was Immunized by<strong>the</strong> AHRA. The district court ruled that Napster was both c<strong>on</strong>tributorily and vicariously liablefor infringing downloads of copyrighted material by its users via <strong>the</strong> Napster system. The courtruled that <strong>the</strong> plaintiffs had established a prima facie case of direct copyright infringement byNapster users because “virtually all Napster users engage in <strong>the</strong> unauthorized downloading oruploading of copyrighted music; as much as eighty-seven percent of <strong>the</strong> files available <strong>on</strong>Napster may be copyrighted, and more than seventy percent may be owned or administered byplaintiffs.” 1167 The Ninth Circuit in Napster I agreed, c<strong>on</strong>cluding that (i) <strong>the</strong> mere uploading offile names to <strong>the</strong> search index by Napster users, <strong>the</strong>reby making <strong>the</strong> files corresp<strong>on</strong>ding to thosefile names available for downloading (whe<strong>the</strong>r or not <strong>the</strong>y were in fact downloaded by o<strong>the</strong>rusers) c<strong>on</strong>stituted an infringement of <strong>the</strong> plaintiffs’ exclusive distributi<strong>on</strong> rights and (ii) <strong>the</strong>unauthorized downloading of files c<strong>on</strong>taining copyrighted music by Napster users violated <strong>the</strong>plaintiffs’ exclusive reproducti<strong>on</strong> rights. 11681167 Napster, 114 F. Supp. 2d at 911.1168 A&M Records, Inc. v. Napster, Inc., 239 F.3d 1004, 1014 (9 th Cir. 2001) (“Napster I”).- 268 -


Napster argued that its users’ downloads of music for <strong>the</strong>ir own pers<strong>on</strong>al use wereimmunized by <strong>the</strong> Audio Home Recording Act of 1992 (AHRA). 1169 The AHRA made twomajor substantive changes to copyright law. First, Subchapter D of <strong>the</strong> AHRA (Secti<strong>on</strong> 1008)immunizes certain n<strong>on</strong>commercial recording and use of musical recordings in digital or analogform. 1170 Secti<strong>on</strong> 1008 provides:No acti<strong>on</strong> may be brought under this title alleging infringement of copyright 1171based <strong>on</strong> <strong>the</strong> manufacture, importati<strong>on</strong>, or distributi<strong>on</strong> of a digital audio recordingdevice, a digital audio recording medium, an analog recording device, or ananalog recording medium, or based <strong>on</strong> <strong>the</strong> n<strong>on</strong>commercial use by a c<strong>on</strong>sumer ofsuch a device or medium for making digital musical recordings or analog musicalrecordings.Sec<strong>on</strong>d, Subchapters B and C (Secti<strong>on</strong>s 1002-1007) of <strong>the</strong> AHRA require (i) that any“digital audio recording device” c<strong>on</strong>form to <strong>the</strong> “Serial <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Management System”(SCMS), which allows unlimited first generati<strong>on</strong> copies of an original source, but prohibitssec<strong>on</strong>d generati<strong>on</strong> copies (i.e., copies of a copy), and (ii) that manufacturers and distributors ofdigital audio recording devices and digital audio recording media (such as DAT tape andrecordable CDs) pay royalties and file various notices and statements to indicate payment ofthose royalties. 1172Napster argued that under <strong>the</strong> direct language of Secti<strong>on</strong> 1008, no acti<strong>on</strong> for infringementof copyright could be brought against Napster’s users, who were c<strong>on</strong>sumers and who wereengaged in <strong>the</strong> n<strong>on</strong>commercial making and sharing (distributi<strong>on</strong>) of digital musical recordings.Because <strong>the</strong> acti<strong>on</strong>s of Napster’s users were immune, Napster argued that it could not bec<strong>on</strong>tributorily or vicariously liable for those acti<strong>on</strong>s. 1173 Napster cited <strong>the</strong> following legislativehistory of <strong>the</strong> AHRA as support for its argument that C<strong>on</strong>gress intended to afford a very broadimmunity for n<strong>on</strong>-commercial copying of audio recordings:S. Rep. 102-294 (1992) at 51 (“A central purpose of <strong>the</strong> Audio Home Recording Act of1991 is c<strong>on</strong>clusively to resolve [<strong>the</strong>] debate” over <strong>the</strong> “copyright implicati<strong>on</strong>s of privateaudio recording for n<strong>on</strong>commercial use.”).H. Rep. 102-873(I) (1992) at 24 (“In <strong>the</strong> case of home taping, <strong>the</strong> exempti<strong>on</strong> protects alln<strong>on</strong>commercial copying by c<strong>on</strong>sumers of digital and analog musical recordings.”).1169 Pub. L. No. 102-563, 106 Stat. 4244 (1992), codified at 17 U.S.C. §§ 1001-1010.1170 Nimmer § 8B.01 (2000).1171 The immunity applies with respect to copyrights in both <strong>the</strong> sound recordings and any musical compositi<strong>on</strong>sembodied <strong>the</strong>rein. Id. § 8B.07[C][2], at 8B-90.1172 Id. §§ 8B.02 & 8B.03 (2000).1173 Oppositi<strong>on</strong> of Defendant Napster, Inc. to Plaintiffs’ Moti<strong>on</strong> for Preliminary Injuncti<strong>on</strong>, A&M Records, Inc. v.Napster, Inc., Civ. Nos. C99-5183 MHP (ADR) & C00-0074 MHP (ADR) (July 5, 2000), at 5-6 (hereinafter,“Napster’s PI Opp. Br.”), <strong>on</strong> file with <strong>the</strong> author.- 269 -


C<strong>on</strong>temporaneous comments by Jas<strong>on</strong> Berman, former head of <strong>the</strong> RIAA, acknowledgingthat <strong>the</strong> immunity provisi<strong>on</strong>s of <strong>the</strong> AHRA were intended to have a broad scope, stating:“The [AHRA] will eliminate <strong>the</strong> legal uncertainty about home audio taping that hasclouded <strong>the</strong> marketplace. The bill will bar copyright infringement lawsuits for bothanalog and digital home audio recording by c<strong>on</strong>sumers ….” H.R. 4567, Serial No. 102-139 (March 1992).Comments by Senator DeC<strong>on</strong>cini, who was influential in passing <strong>the</strong> AHRA: “[TheAHRA] makes clear <strong>the</strong> private, n<strong>on</strong>-commercial taping, of both analog and digitalmaterial, is permissible under <strong>the</strong> copyright law. As new and improved technologiesbecome available, such clarificati<strong>on</strong> in <strong>the</strong> law becomes more important.” 137 C<strong>on</strong>g.Rec. S11845 (1992). 1174Napster also cited a report by <strong>the</strong> Office of Technology Assessment (OTA) <strong>on</strong> hometaping as evidence that C<strong>on</strong>gress, in enacting <strong>the</strong> AHRA, fully understood that c<strong>on</strong>sumers wouldshare music with family, friends and o<strong>the</strong>rs. In particular, <strong>the</strong> OTA report deemed taping CDs orrecords borrowed from friends, and giving copies of <strong>on</strong>e’s own CDs or records to friends, to besyn<strong>on</strong>ymous with “pers<strong>on</strong>al use,” “private copying,” “home use,” and “private use.” 1175 TheOTA report noted that, even by 1989, copying for pers<strong>on</strong>al use was widespread: 37% of <strong>the</strong>home tapers surveyed copied music <strong>the</strong>y borrowed from a friend or o<strong>the</strong>r family members; 26%gave away <strong>the</strong> last copy <strong>the</strong>y made to o<strong>the</strong>rs outside <strong>the</strong>ir household or to family members; and41% had within <strong>the</strong> last year borrowed a friend’s music to copy so <strong>the</strong>y would not have to buy it<strong>the</strong>mselves. 1176 Napster argued that C<strong>on</strong>gress had knowingly legislated a very broad form ofimmunity for all of this c<strong>on</strong>duct. 1177Finally, Napster argued that <strong>the</strong> Ninth Circuit’s decisi<strong>on</strong> in Recording Indus. Ass’n ofAm. v. Diam<strong>on</strong>d Multimedia Sys. 1178 supported its argument that <strong>the</strong> AHRA immunized <strong>the</strong>sharing of musical recordings by Napster’s users. At issue in that case was whe<strong>the</strong>r <strong>the</strong> “Rio”device, a small device with headph<strong>on</strong>es that allowed a user to download MP3 files from acomputer hard drive and listen to <strong>the</strong>m elsewhere, was a “digital audio recording device” subjectto <strong>the</strong> SCMS requirements of <strong>the</strong> AHRA. The Ninth Circuit held that it was not, <strong>on</strong> <strong>the</strong>following rati<strong>on</strong>ale. A “digital audio recording device” is defined as a device having a digitalrecording functi<strong>on</strong> whose primary purpose is to make a “digital audio copied recording,” whichis defined as a reproducti<strong>on</strong> of a “digital musical recording.” 17 U.S.C. § 1001(1), (3).However, a “digital musical recording” is defined to exclude a material object “in which <strong>on</strong>e ormore computer programs are fixed.” Id. § 1001(5)(B)(ii). The Ninth Circuit ruled that acomputer hard drive falls within this exempti<strong>on</strong>, and <strong>the</strong>refore that MP3 files stored <strong>on</strong> a hard1174 Id. at 6.1175 U.S. C<strong>on</strong>gress, OTA, <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> and Home Copying: Technology Challenges <strong>the</strong> Law, OTA-CIT-422, at 5, 156(U.S. GPO, Oct. 1989).1176 Id. at Tables 6-10, 6-12 at 270 & Table 7-4 at 274.1177 Napster’s PI Opp. Br., supra note 1173, at 6-7.1178 180 F.3d 1072 (9th Cir. 1999).- 270 -


drive do not c<strong>on</strong>stitute a “digital musical recording.” 1179 Because <strong>the</strong> Rio did not make copiesfrom “digital musical recordings,” it was not a “digital audio recording device” and was<strong>the</strong>refore not subject to <strong>the</strong> SCMS requirements of <strong>the</strong> AHRA. 1180As support for its decisi<strong>on</strong>, <strong>the</strong> Ninth Circuit stated <strong>the</strong> following about <strong>the</strong> immunityprovisi<strong>on</strong>s of <strong>the</strong> AHRA:In fact, <strong>the</strong> Rio’s operati<strong>on</strong> is entirely c<strong>on</strong>sistent with <strong>the</strong> [AHRA’s] main purpose– <strong>the</strong> facilitati<strong>on</strong> of pers<strong>on</strong>al use. As <strong>the</strong> Senate Report explains, “[t]he purposeof [<strong>the</strong>] Act is to ensure <strong>the</strong> right of c<strong>on</strong>sumers to make analog or digitalrecordings of copyrighted music for <strong>the</strong>ir private, n<strong>on</strong>commercial use.” The Actdoes so through its home taping exempti<strong>on</strong>, see 17 U.S.C. § 1008, which“protects all n<strong>on</strong>commercial copying by c<strong>on</strong>sumers of digital and analog musicalrecordings.” The Rio merely makes copies in order to render portable, or “spaceshift,”those files that already reside <strong>on</strong> a user’s hard drive.” 1181Napster argued that in <strong>the</strong> preceding passage from <strong>the</strong> Diam<strong>on</strong>d decisi<strong>on</strong>, <strong>the</strong> NinthCircuit had ruled that Secti<strong>on</strong> 1008 of <strong>the</strong> AHRA gives a c<strong>on</strong>sumer <strong>the</strong> right to create pers<strong>on</strong>alMP3 files, and that copying a music file from <strong>on</strong>e’s hard drive to a portable device was alsoappropriate. Napster c<strong>on</strong>cluded that, if a c<strong>on</strong>sumer can copy an MP3 file from his or her harddrive without violating <strong>the</strong> copyright laws, Napster’s directory service did not violate <strong>the</strong>copyright laws ei<strong>the</strong>r. 1182In resp<strong>on</strong>se, <strong>the</strong> plaintiffs argued that, because Secti<strong>on</strong> 1008 states that no acti<strong>on</strong> forinfringement may be brought based <strong>on</strong> “<strong>the</strong> n<strong>on</strong>commercial use by a c<strong>on</strong>sumer of such a device[i.e., a digital audio recording device] … for making digital musical recordings” (emphasisadded), and because <strong>the</strong> Ninth Circuit held in Diam<strong>on</strong>d that a computer hard drive is not a“digital audio recording device,” <strong>the</strong> immunity of Secti<strong>on</strong> 1008 does not extend to MP3 filesstored <strong>on</strong> a computer hard drive. The Napster case, <strong>the</strong>n, presented an issue of first impressi<strong>on</strong>of whe<strong>the</strong>r <strong>the</strong> definiti<strong>on</strong>s of Secti<strong>on</strong> 1001 should be read to limit both <strong>the</strong> scope of <strong>the</strong>SCMS/royalty requirements and <strong>the</strong> scope of <strong>the</strong> immunity of <strong>the</strong> AHRA. 11831179 Id. at 1078.1180 Id. at 1078-79.1181 Id. at 1079 (citati<strong>on</strong>s omitted).1182 Napster’s PI Opp. Br., supra note 1173, at 5-6.1183 Prof. Nimmer notes that <strong>the</strong> Ninth Circuit’s Diam<strong>on</strong>d decisi<strong>on</strong> could be read to mean that <strong>the</strong> immunityprovisi<strong>on</strong>s of <strong>the</strong> AHRA are not limited by that Court’s own c<strong>on</strong>structi<strong>on</strong> of <strong>the</strong> definiti<strong>on</strong>s of <strong>the</strong> technicalterms that it held to limit <strong>the</strong> scope of <strong>the</strong> SMCS/royalty requirements: “Based <strong>on</strong> <strong>the</strong> legislative history’scharacterizati<strong>on</strong> of ‘all n<strong>on</strong>commercial copying by c<strong>on</strong>sumers of digital and analog musical recordings’ asfalling under <strong>the</strong> protecti<strong>on</strong> of <strong>the</strong> home taping exempti<strong>on</strong>, <strong>the</strong> court appears ready to apply that provisi<strong>on</strong>bey<strong>on</strong>d its precise wording.” Nimmer § 8B.07[C][4], at 8B-94.Napster also argued that a narrow applicati<strong>on</strong> of § 1008 would lead to <strong>the</strong> absurd c<strong>on</strong>structi<strong>on</strong> that amanufacturer of a device capable of copying a CD (which is clearly a digital musical recording) <strong>on</strong>to a harddrive would be immune, yet when a c<strong>on</strong>sumer used that very same device to copy her musical recording from- 271 -


The district court, in a terse analysis of <strong>the</strong> AHRA in a footnote, rejected <strong>the</strong> argumentthat Secti<strong>on</strong> 1008 of <strong>the</strong> AHRA immunized <strong>the</strong> acti<strong>on</strong>s of Napster’s users for two reas<strong>on</strong>s. First,<strong>the</strong> court ruled that <strong>the</strong> “AHRA is irrelevant to <strong>the</strong> instant acti<strong>on</strong>” because “[n]ei<strong>the</strong>r <strong>the</strong> recordcompany nor music publisher plaintiffs have brought claims under <strong>the</strong> AHRA.” 1184 Sec<strong>on</strong>d, <strong>the</strong>court labeled <strong>the</strong> passage from Diam<strong>on</strong>d quoted above and cited by Napster as “dicta” and foundit to be “of limited relevance”:The Diam<strong>on</strong>d Multimedia court did opine that making copies with <strong>the</strong> Rio tospace-shift, or make portable, files already <strong>on</strong> a user’s hard drive c<strong>on</strong>stitutes“paradigmatic n<strong>on</strong>commercial pers<strong>on</strong>al use entirely c<strong>on</strong>sistent with <strong>the</strong> purposesof <strong>the</strong> Act [i.e. <strong>the</strong> facilitati<strong>on</strong> of pers<strong>on</strong>al use].” However, this dicta is of limitedrelevance. Because plaintiffs have not made AHRA claims, <strong>the</strong> purposes andlegislative history of <strong>the</strong> AHRA do not govern <strong>the</strong> appropriateness of apreliminary injuncti<strong>on</strong> against Napster, Inc. Fur<strong>the</strong>rmore, as explained below, <strong>the</strong>court is not persuaded that space-shifting c<strong>on</strong>stitutes a substantial, n<strong>on</strong>infringinguse of <strong>the</strong> Napster service. The Ninth Circuit did not discuss <strong>the</strong> fair use doctrinein Diam<strong>on</strong>d Multimedia. 1185On appeal in Napster I, <strong>the</strong> Ninth Circuit affirmed <strong>the</strong> c<strong>on</strong>clusi<strong>on</strong> that <strong>the</strong> AHRA did notimmunize <strong>the</strong> activities of Napster users in sharing audio files, although <strong>on</strong> a different rati<strong>on</strong>alefrom <strong>the</strong> district court. The Ninth Circuit did not endorse <strong>the</strong> district court’s rati<strong>on</strong>ale that <strong>the</strong>AHRA was inapplicable merely because <strong>the</strong> plaintiffs had not brought claims under <strong>the</strong> AHRA.Instead, <strong>the</strong> Ninth Circuit cited its rulings in Diam<strong>on</strong>d that computers and <strong>the</strong>ir hard drives arenot “digital audio recording devices” and that computers do not make “digital musicalrecordings,” as those terms are defined in <strong>the</strong> AHRA. Accordingly, <strong>the</strong> AHRA does not cover<strong>the</strong> downloading of MP3 files to computer hard drives. 11863. The Fair Use Doctrine Generally. Napster also c<strong>on</strong>tended that its users did notdirectly infringe plaintiffs’ copyrights because <strong>the</strong> users were engaged in a n<strong>on</strong>commercial, fairuse of <strong>the</strong> materials. The district court rejected this argument, ruling that <strong>the</strong> downloading ofmusical recordings through Napster did not qualify generally under <strong>the</strong> four fair use factors.With respect to <strong>the</strong> first factor – <strong>the</strong> purpose and character of <strong>the</strong> use – <strong>the</strong> district court held thatdownloading MP3 files was not transformative and, although Napster did not charge for itsservice, was commercial in nature:Although downloading and uploading MP3 music files is not paradigmaticcommercial activity, it is also not pers<strong>on</strong>al use in <strong>the</strong> traditi<strong>on</strong>al sense. Plaintiffs<strong>the</strong> hard drive back <strong>on</strong>to a CD or <strong>on</strong>to a Rio for her own or a friend’s pers<strong>on</strong>al use, she would not haveimmunity. Napster argued that c<strong>on</strong>structi<strong>on</strong>s of statutory language that lead to absurd results clearly c<strong>on</strong>trary tolegislative intent must be rejected, citing United Steel Workers v. Weber, 443 U.S. 193, 204 (1979); Train v.Colorado Public Interest Research Group, 426 U.S. 1, 7 (1975); Ozawa v. United States, 260 U.S. 178, 194(1922). Napster’s PI Opp. Br., supra note 1173, at 8 n.8.1184 Napster, 114 F. Supp. 2d at 915 n.19.1185 Id. (citati<strong>on</strong>s omitted; emphasis in original).1186 Napster I, 239 F.3d at 1024-25.- 272 -


have not shown that <strong>the</strong> majority of Napster users download music to sell – thatis, for profit. However, given <strong>the</strong> vast scale of Napster use am<strong>on</strong>g an<strong>on</strong>ymousindividuals, <strong>the</strong> court finds that download and uploading MP3 music files with <strong>the</strong>assistance of Napster are not private uses. At <strong>the</strong> very least, a host user sending afile cannot be said to engage in a pers<strong>on</strong>al use when distributing that file to anan<strong>on</strong>ymous requester. Moreover, <strong>the</strong> fact that Napster users get for freesomething <strong>the</strong>y would ordinarily have to buy suggests that <strong>the</strong>y reap ec<strong>on</strong>omicadvantages from Napster use. 1187The Ninth Circuit affirmed this ruling in Napster I, agreeing with <strong>the</strong> district court that<strong>the</strong> downloading was not transformative, and that Napster users were engaging in commercialuse of <strong>the</strong> copyrighted materials because (i) users could not be said to be engaged in a “pers<strong>on</strong>aluse” when distributing a file to an an<strong>on</strong>ymous requester and (ii) Napster users get something forfree <strong>the</strong>y would ordinarily have to buy. 1188 “Direct ec<strong>on</strong>omic benefit is not required todem<strong>on</strong>strate a commercial use. Ra<strong>the</strong>r, repeated and exploitative copying of copyrighted works,even if <strong>the</strong> copies are not offered for sale, may c<strong>on</strong>stitute a commercial use.” 1189 Because <strong>the</strong>record dem<strong>on</strong>strated that Napster users’ repeated copying was made to save <strong>the</strong> expense ofpurchasing authorized copies, such uses were commercial, causing <strong>the</strong> first factor to weigh infavor of plaintiffs. 1190The district court held that <strong>the</strong> sec<strong>on</strong>d factor – nature of <strong>the</strong> copyrighted work – weighedagainst fair use because <strong>the</strong> copyrighted sound recordings and compositi<strong>on</strong>s at issue werecreative in nature. The third factor – amount and substantiality of <strong>the</strong> porti<strong>on</strong> used in relati<strong>on</strong> to<strong>the</strong> whole – also weighed against fair use because copies of entire works were beingdownloaded. 1191 Finally, <strong>the</strong> district court found that <strong>the</strong> fourth factor – <strong>the</strong> effect <strong>on</strong> <strong>the</strong>potential market for <strong>the</strong> copyrighted work – weighed against fair use because <strong>the</strong> plaintiffs hadproduced evidence that Napster use harmed <strong>the</strong> markets for <strong>the</strong>ir copyrighted works by (i)reducing CD sales am<strong>on</strong>g college students and (ii) raising barriers to plaintiffs’ own entry into<strong>the</strong> market for digital downloading of music because of competiti<strong>on</strong> from a service from whichrecordings could be obtained free. 1192 The Ninth Circuit affirmed all of <strong>the</strong>se rulings inNapster I. 11934. The S<strong>on</strong>y Doctrine of Substantial N<strong>on</strong>infringing Uses. Napster argued that it couldnot be c<strong>on</strong>tributorily or vicariously liable for operating <strong>the</strong> Napster service under <strong>the</strong> doctrine of1187 Napster, 114 F. Supp. 2d at 912.1188 Napster I, 239 F.3d at 1015.1189 Id.1190 Id.1191 Napster, 114 F. Supp. 2d at 913.1192 Id. Napster submitted survey evidence which it argued showed that Napster use actually stimulated more salesof CDs c<strong>on</strong>taining <strong>the</strong> plaintiffs’ works than it displaced. The court did not find this evidence credible, andinstead credited evidence submitted by <strong>the</strong> plaintiffs’ experts which <strong>the</strong> plaintiffs claimed showed that Napsteruse was likely to reduce CD purchases by college students. Id. at 909-10.1193 Napster I, 239 F.3d at 1016-17.- 273 -


S<strong>on</strong>y Corp. of Am. v. Universal City Studios, Inc., 1194 which held that a manufacturer is notliable for c<strong>on</strong>tributory infringement for selling a staple article of commerce that is “capable ofcommercially significant n<strong>on</strong>infringing uses,” 1195 even if that article is used to commit copyrightinfringement. Napster raised a number of uses of <strong>the</strong> Napster system that it argued were bothactual and potential commercially significant n<strong>on</strong>infringing uses. The district court found that<strong>the</strong> specific uses raised by Napster were in fact infringing:5. Sampling. Napster argued that many users use Napster to sample unfamiliar musicand <strong>the</strong>n, if <strong>the</strong>y like it, go purchase <strong>the</strong> music <strong>on</strong> CD. Napster argued that downloads initiatedfor sampling purposes and followed up by a purchase of <strong>the</strong> music, c<strong>on</strong>stituted fair use. Thedistrict court rejected this argument, ruling that sampling <strong>on</strong> Napster was not a “pers<strong>on</strong>al use in<strong>the</strong> traditi<strong>on</strong>al sense that courts have recognized – copying which occurs within <strong>the</strong> householdand does not c<strong>on</strong>fer any financial benefit <strong>on</strong> <strong>the</strong> user,” and that instead sampling <strong>on</strong> Napsteramounted to “obtaining permanent copies of s<strong>on</strong>gs that users would o<strong>the</strong>rwise have to purchase;it also carries <strong>the</strong> potential for viral distributi<strong>on</strong> to milli<strong>on</strong>s of people.” 1196 The courtdistinguished this kind of sampling activity from <strong>the</strong> time-shifting of viewing that <strong>the</strong> SupremeCourt found a fair use in S<strong>on</strong>y, where time-shifting enabled a viewer to witness a broadcast that<strong>the</strong> viewer had been invited to view in its entirety free of charge; by c<strong>on</strong>trast, <strong>the</strong> court noted that<strong>the</strong> plaintiffs almost always charged for <strong>the</strong>ir music. In additi<strong>on</strong>, <strong>the</strong> court noted that <strong>the</strong>majority of VCR purchasers in S<strong>on</strong>y did not distribute taped televisi<strong>on</strong> broadcasts, whereas aNapster user who downloads a copy of a s<strong>on</strong>g could make that s<strong>on</strong>g available to milli<strong>on</strong>s of o<strong>the</strong>rindividuals. 1197 “The global scale of Napster usage and <strong>the</strong> fact that users avoid paying for s<strong>on</strong>gsthat o<strong>the</strong>rwise would not be free militates against a determinati<strong>on</strong> that sampling by Napster usersc<strong>on</strong>stitute pers<strong>on</strong>al or home use in <strong>the</strong> traditi<strong>on</strong>al sense.” 1198On appeal, Napster argued that <strong>the</strong> district court erred in c<strong>on</strong>cluding that sampling is acommercial use because it c<strong>on</strong>flated a n<strong>on</strong>commercial use with a “pers<strong>on</strong>al use”; erred indetermining that sampling adversely affects <strong>the</strong> market for plaintiffs’ copyrighted music; and1194 464 U.S. 417 (1984).1195 Id. at 442.1196 Napster, 114 F. Supp. 2d at 913. This language suggests that <strong>the</strong> court may have misunderstood Napster’sargument about sampling, for <strong>the</strong> court included under <strong>the</strong> “sampling” rubric instances in which usersdownloaded and retained a permanent copy of s<strong>on</strong>gs which <strong>the</strong>y “would o<strong>the</strong>rwise have to purchase.” Napsterdefined “sampling” to be those instances in which a user downloaded a s<strong>on</strong>g, <strong>the</strong>n followed up with a purchaseof <strong>the</strong> CD c<strong>on</strong>taining <strong>the</strong> s<strong>on</strong>g. In such instances, users would not be obtaining music that <strong>the</strong>y “wouldo<strong>the</strong>rwise have to purchase,” and Napster argued that such instances of true sampling should be deemed a fairuse. In any event, <strong>the</strong> district court found not credible a survey submitted by Napster’s expert showing that60% of <strong>on</strong>line users who download free digital music do so to preview music before buying <strong>the</strong> CD, becauseNapster’s expert did not c<strong>on</strong>duct <strong>the</strong> survey. The court fur<strong>the</strong>r found a survey that <strong>the</strong> expert did c<strong>on</strong>duct not tobe credible because <strong>the</strong> court found it inadequately supervised by <strong>the</strong> expert. Id. at 914. Finally, <strong>the</strong> court ruledthat even if sampling did enhance sales of plaintiffs’ CDs, that would not tip <strong>the</strong> balance in favor of fair use,because “courts have rejected <strong>the</strong> suggesti<strong>on</strong> that a positive impact <strong>on</strong> sales negates <strong>the</strong> copyright holder’sentitlement to licensing fees or access to derivative markets.” Id.1197 Id. at 913.1198 Id. at 914.- 274 -


err<strong>on</strong>eously c<strong>on</strong>cluded that sampling is not a fair use because it determined that samplers mayalso engage in o<strong>the</strong>r infringing activity. 1199 The Ninth Circuit in Napster I rejected <strong>the</strong>sechallenges, ruling that <strong>the</strong> plaintiffs had “established that <strong>the</strong>y are likely to succeed in provingthat even authorized temporary downloading of individual s<strong>on</strong>gs for sampling purposes iscommercial in nature,” based <strong>on</strong> evidence in <strong>the</strong> record that <strong>the</strong> record company plaintiffs collectroyalties for s<strong>on</strong>g samples available <strong>on</strong> <strong>Internet</strong> retail sites and that such samples, unlike in <strong>the</strong>case of Napster, are <strong>on</strong>ly partial samples of <strong>the</strong> whole work and often time out afterdownload. 1200 In additi<strong>on</strong>, <strong>the</strong> Ninth Circuit c<strong>on</strong>cluded that <strong>the</strong> record supported <strong>the</strong> districtcourt’s preliminary determinati<strong>on</strong>s that <strong>the</strong> more music that sampling users download, <strong>the</strong> lesslikely <strong>the</strong>y are to eventually purchase <strong>the</strong> recordings <strong>on</strong> CD, and even if <strong>the</strong> audio market is notharmed, Napster had adverse effects <strong>on</strong> <strong>the</strong> developing digital download market. 1201 “[P]ositiveimpact in <strong>on</strong>e market, here <strong>the</strong> audio CD market, [should not] deprive <strong>the</strong> copyright holder of <strong>the</strong>right to develop identified alternative markets, here <strong>the</strong> digital download market.” 12026. Space-Shifting. As an additi<strong>on</strong>al n<strong>on</strong>infringing use, Napster argued that manyNapster users use <strong>the</strong> service to “space-shift,” i.e., “c<strong>on</strong>verting a CD <strong>the</strong> c<strong>on</strong>sumer already ownsinto MP3 format and using Napster to transfer <strong>the</strong> music to a different computer – from home tooffice, for example.” 1203 The district court found that such use was a de minimis porti<strong>on</strong> ofNapster use and not a significant aspect of Napster’s business, and could <strong>the</strong>refore not qualify asa substantial n<strong>on</strong>infringing use under S<strong>on</strong>y:According to <strong>the</strong> court’s understanding of <strong>the</strong> Napster technology, a user whowanted to space-shift files from her home to her office would have to log-<strong>on</strong> to<strong>the</strong> system from her home computer, leave that computer <strong>on</strong>line, commute towork, and log-<strong>on</strong> to Napster from her office computer to access <strong>the</strong> desired file.Comm<strong>on</strong> sense dictates that this use does not draw users to <strong>the</strong> system. 1204As support for its argument that space-shifting c<strong>on</strong>stitutes a fair use, Napster invoked <strong>the</strong>passage, quoted in subsecti<strong>on</strong> 2 above, discussing <strong>the</strong> AHRA from <strong>the</strong> Ninth Circuit’s decisi<strong>on</strong>in Recording Indus. Ass’n of Am. v. Diam<strong>on</strong>d Multimedia Sys. 1205 In particular, Napsterfocused <strong>on</strong> <strong>the</strong> last sentence of that passage, in which <strong>the</strong> Ninth Circuit stated, “The Rio merelymakes copies in order to render portable, or ‘space-shift,’ those files that already reside <strong>on</strong> auser’s hard drive.” 1206 Napster argued that by virtue of this passage, <strong>the</strong> Ninth Circuit had heldthat space-shifting of works already owned c<strong>on</strong>stitutes a fair use.1199 Napster I, 239 F.3d at 1018.1200 Id.1201 Id.1202 Id.1203 Napster, 114 F. Supp. 2d at 904.1204 Id. at 904-05.1205 180 F.3d 1072 (9th Cir. 1999).1206 Id. 1079 (citati<strong>on</strong>s omitted).- 275 -


The district court rejected this argument, ruling that Napster’s reliance <strong>on</strong> <strong>the</strong> Diam<strong>on</strong>ddecisi<strong>on</strong> was err<strong>on</strong>eous because that was “a case involving an inapplicable statute [<strong>the</strong>AHRA].” 1207 The court also rejected any implicati<strong>on</strong> that space-shifting was sufficientlyanalogous to <strong>the</strong> time-shifting of televisi<strong>on</strong> broadcasts that <strong>the</strong> Supreme Court found to be asubstantial n<strong>on</strong>infringing use in S<strong>on</strong>y. In particular, <strong>the</strong> court ruled that in S<strong>on</strong>y, <strong>the</strong> SupremeCourt had determined that time-shifting represented <strong>the</strong> principal, ra<strong>the</strong>r than an occasi<strong>on</strong>al useof VCRs, whereas Napster had failed to show that space-shifting c<strong>on</strong>stituted a “commerciallysignificant” use of Napster. “Thus, even if space-shifting is a fair use, it is not substantialenough to preclude liability under <strong>the</strong> staple article of commerce doctrine.” 1208On appeal in Napster I, <strong>the</strong> Ninth Circuit agreed with <strong>the</strong> district court that <strong>the</strong> “shifting”analyses of both S<strong>on</strong>y and Diam<strong>on</strong>d were inapposite because “<strong>the</strong> methods of shifting in <strong>the</strong>secases did not also simultaneously involve distributi<strong>on</strong> of <strong>the</strong> copyrighted material to <strong>the</strong> generalpublic; <strong>the</strong> time or space-shifting of copyrighted material exposed <strong>the</strong> material <strong>on</strong>ly to <strong>the</strong>original user.” 12097. Authorized Distributi<strong>on</strong>s. Napster argued that many artists had authorizeddistributi<strong>on</strong>s of <strong>the</strong>ir works through <strong>the</strong> Napster system, and that such authorized uses c<strong>on</strong>stitutedsubstantial n<strong>on</strong>infringing uses under S<strong>on</strong>y. Napster set up a “New Artist Program,” pursuant towhich new or unsigned artists could promote <strong>the</strong>ir works and distribute <strong>the</strong>m in MP3 format via<strong>the</strong> Napster service. Napster accepted enrollment of new artists in its program <strong>on</strong>ly if <strong>the</strong> artistexplicitly authorized Napster users to share <strong>the</strong> artist’s music. 1210 The district court, however,held that “<strong>the</strong> New Artist Program may not represent a substantial or commercially significantaspect of Napster,” 1211 essentially ruling that it had been an afterthought: “[T]he court finds that<strong>the</strong> New Artist Program accounts for a small porti<strong>on</strong> of Napster use and did not become centralto defendant’s business strategy until this acti<strong>on</strong> made it c<strong>on</strong>venient to give <strong>the</strong> program topbilling. An early versi<strong>on</strong> of <strong>the</strong> Napster website advertised <strong>the</strong> ease with which users could find<strong>the</strong>ir favorite popular music without ‘wading through page after page of unknown artists.’Defendant did not even create <strong>the</strong> New Artist Program that runs <strong>on</strong> its <strong>Internet</strong> website untilApril 2000 – well after plaintiffs filed this acti<strong>on</strong>.” 1212In any event, <strong>the</strong> court c<strong>on</strong>cluded that, because it believed <strong>the</strong> activity under <strong>the</strong> NewArtist Program to be separable from <strong>the</strong> infringing activity of <strong>the</strong> unauthorized distributi<strong>on</strong> of <strong>the</strong>plaintiffs’ works, <strong>the</strong> New Artist Program was insufficient to save Napster under <strong>the</strong> S<strong>on</strong>ydoctrine: “Napster’s primary role of facilitating <strong>the</strong> unauthorized copying and distributi<strong>on</strong> of1207 Napster, 114 F. Supp. 2d at 915.1208 Id. at 916.1209 Napster I, 239 F.3d at 1019.1210 Napster, 114 F. Supp. 2d at 907.1211 Id. at 917. It is unclear why <strong>the</strong> court used <strong>the</strong> term “may,” since that leaves open <strong>the</strong> possibility that <strong>the</strong> NewArtist Program might c<strong>on</strong>stitute a substantial or commercially significant aspect of Napster, which in turnwould affect <strong>the</strong> analysis under <strong>the</strong> S<strong>on</strong>y doctrine.1212 Id. at 904 (citati<strong>on</strong>s omitted). One of plaintiffs’ experts submitted results of a sample of 1150 files <strong>on</strong> <strong>the</strong>Napster service, in which were c<strong>on</strong>tained <strong>on</strong>ly 11 new artists and 14 of <strong>the</strong>ir music files. Id.- 276 -


established artists’ s<strong>on</strong>gs renders S<strong>on</strong>y inapplicable. … Because plaintiffs do not ask <strong>the</strong> court toshut down such satellite activities, <strong>the</strong> fact that <strong>the</strong>se activities may be n<strong>on</strong>infringing does notlessen plaintiffs’ likelihood of success.” 1213In c<strong>on</strong>clusi<strong>on</strong>, <strong>the</strong> district court rejected applicability of <strong>the</strong> S<strong>on</strong>y doctrine <strong>on</strong> <strong>the</strong> groundthat “any potential n<strong>on</strong>infringing use of <strong>the</strong> Napster service is minimal or c<strong>on</strong>nected to <strong>the</strong>infringing activity, or both. The substantial or commercially significant use of <strong>the</strong> services was,and c<strong>on</strong>tinues to be, <strong>the</strong> unauthorized downloading and uploading of popular music, most ofwhich is copyrighted.” 1214On appeal in Napster I, <strong>the</strong> Ninth Circuit disagreed with <strong>the</strong> district court’s overallc<strong>on</strong>clusi<strong>on</strong> that <strong>the</strong> Napster system was incapable of substantial n<strong>on</strong>infringing uses: “Thedistrict court improperly c<strong>on</strong>fined <strong>the</strong> use analysis to current uses, ignoring <strong>the</strong> system’scapabilities. … C<strong>on</strong>sequently, <strong>the</strong> district court placed undue weight <strong>on</strong> <strong>the</strong> proporti<strong>on</strong> of currentinfringing uses as compared to current and future n<strong>on</strong>infringing use.” 1215 The Ninth Circuit<strong>the</strong>refore c<strong>on</strong>cluded that <strong>the</strong> Napster system was in fact capable of substantial n<strong>on</strong>infringinguses. 1216 Never<strong>the</strong>less, for <strong>the</strong> reas<strong>on</strong>s set forth in <strong>the</strong> next subsecti<strong>on</strong>, that c<strong>on</strong>clusi<strong>on</strong> was notsufficient to save Napster from liability under <strong>the</strong> S<strong>on</strong>y doctrine.8. Ongoing C<strong>on</strong>trol by Napster Over Its Service. In additi<strong>on</strong> to rejecting all of Napster’sarguments of n<strong>on</strong>infringing uses of its system, <strong>the</strong> district court ruled that <strong>the</strong> S<strong>on</strong>y doctrine wasinapplicable to Napster for <strong>on</strong>e final reas<strong>on</strong> – because Napster exercised <strong>on</strong>going c<strong>on</strong>trol over itsservice (which was <strong>the</strong> same c<strong>on</strong>trol that <strong>the</strong> court c<strong>on</strong>cluded provided a basis in part for itsfinding of both c<strong>on</strong>tributory and vicarious liability, as analyzed below). The plaintiffs hadargued that <strong>the</strong> S<strong>on</strong>y doctrine was applicable <strong>on</strong>ly to <strong>the</strong> manufacture and sale of an article ofcommerce, and not to a service. Although <strong>the</strong> district court appears not to have accepted thisdevice/service distincti<strong>on</strong> per se, <strong>the</strong> district court did note that in S<strong>on</strong>y, <strong>the</strong> defendant’sparticipati<strong>on</strong> did not extend past <strong>the</strong> manufacturing and selling of <strong>the</strong> VCRs, and <strong>the</strong> defendanthad no <strong>on</strong>going participati<strong>on</strong> in <strong>the</strong> use of <strong>the</strong> devices to commit infringing acts: 1217Courts have distinguished <strong>the</strong> protecti<strong>on</strong> S<strong>on</strong>y offers to <strong>the</strong> manufacture and saleof a device from scenarios in which <strong>the</strong> defendant c<strong>on</strong>tinues to exercise c<strong>on</strong>trolover <strong>the</strong> device’s use. … Given defendant’s c<strong>on</strong>trol over <strong>the</strong> service, as opposedto mere manufacturing or selling, <strong>the</strong> existence of a potentially unobjecti<strong>on</strong>ableuse like space-shifting does not defeat plaintiffs’ claims. 12181213 Id. at 917. On appeal, <strong>the</strong> Ninth Circuit, with no fur<strong>the</strong>r analysis, simply noted that <strong>the</strong> plaintiffs had notrequested that Napster’s New Artist Program be enjoined. Napster I, 239 F.3d at 1019.1214 Napster, 114 F. Supp. 2d at 912.1215 Napster I, 239 F.3d at 1021.1216 Id.1217 Napster, 114 F. Supp. 2d at 916-17.1218 Id. at 917 (citati<strong>on</strong>s omitted).- 277 -


On appeal, <strong>the</strong> Ninth Circuit in Napster I also did not draw a distincti<strong>on</strong> between a deviceand a service for purposes of applying <strong>the</strong> S<strong>on</strong>y doctrine, but ra<strong>the</strong>r, like <strong>the</strong> district court,distinguished between <strong>the</strong> Napster service itself and Napster’s relati<strong>on</strong> to <strong>the</strong> operati<strong>on</strong>al use of<strong>the</strong> system: “We are compelled to make a clear distincti<strong>on</strong> between <strong>the</strong> architecture of <strong>the</strong>Napster system and Napster’s c<strong>on</strong>duct in relati<strong>on</strong> to <strong>the</strong> operati<strong>on</strong>al capacity of <strong>the</strong> system.” 1219Thus, Napster could not be c<strong>on</strong>tributorily liable merely for offering a service that could be usedfor infringing uses, but could be liable if it had sufficient specific knowledge of use of <strong>the</strong>service for infringing purposes in particular instances. 1220 This knowledge requirement isdiscussed fur<strong>the</strong>r in <strong>the</strong> next subsecti<strong>on</strong>.9. The Elements of C<strong>on</strong>tributory Liability. In order to establish c<strong>on</strong>tributory liability for<strong>the</strong> acts of direct infringement by Napster’s users, <strong>the</strong> district court noted that <strong>the</strong> plaintiffs wererequired to show that Napster had knowledge of <strong>the</strong> infringing activity and that it induced,caused or materially c<strong>on</strong>tributed to <strong>the</strong> infringing c<strong>on</strong>duct. 1221(i) The Knowledge Pr<strong>on</strong>g. With respect to <strong>the</strong> knowledge pr<strong>on</strong>g, <strong>the</strong> districtcourt found <strong>the</strong> plaintiffs had presented c<strong>on</strong>vincing evidence that Napster had both actual andc<strong>on</strong>structive knowledge of its users’ infringements. The district court found actual knowledgebecause: (1) a document authored by a co-founder of Napster, Sean Parker, menti<strong>on</strong>ed <strong>the</strong> needto remain ignorant of users’ real names and IP addresses “since <strong>the</strong>y are exchanging piratedmusic”; 1222 and (2) <strong>the</strong> RIAA had informed Napster of more than 12,000 infringing music filesbeing shared through <strong>the</strong> Napster system. 1223 Although Napster had terminated <strong>the</strong> accounts of<strong>the</strong> users offering those files, <strong>the</strong> district court noted that <strong>the</strong> s<strong>on</strong>gs were still available using <strong>the</strong>Napster service, as were o<strong>the</strong>r copyrighted works identified in <strong>the</strong> Schedules to <strong>the</strong> plaintiffs’complaint. 1224 The district court found c<strong>on</strong>structive knowledge <strong>on</strong> Napster’s part because: (1)Napster executives had recording industry experience; (2) Napster possessed enoughsophisticati<strong>on</strong> about intellectual property laws to make claims against a rock band that copied itslogo; (3) Napster executives had downloaded copyrighted s<strong>on</strong>gs from <strong>the</strong> system; and (4) <strong>the</strong>yhad promoted <strong>the</strong> site with screen shots listing infringing files. 1225Napster had argued that <strong>the</strong> law of c<strong>on</strong>tributory infringement requires actual knowledgeof specific acts of infringement (which Napster argued that it did not have), 1226 that mere1219 Napster I, 239 F.3d at 1020.1220 Id. at 1020-21.1221 Napster, 114 F. Supp. 2d at 918 (citing Gershwin Publ’g Corp. v. Columbia Artists Management, Inc., 443 F.2d1159, 1162 (2d Cir. 1971)).1222 114 F. Supp. 2d at 918 (emphasis in original).1223 Id.1224 Id.1225 Id. at 919.1226 Napster argued that it had no specific knowledge that any particular use of a file through its system wasunauthorized. In particular, Napster argued that it could not know, any more than a photocopier or videorecorder manufacturer, which uses of its system were fair or not. Napster fur<strong>the</strong>r argued that it could not know<strong>the</strong> copyright status of its users’ files. Nei<strong>the</strong>r CD audio files nor <strong>the</strong> resultant MP3 files carried any copyright- 278 -


generalized knowledge that <strong>the</strong> Napster system might be used for infringing transmissi<strong>on</strong>s wasnot sufficient for c<strong>on</strong>tributory liability, and that in every instance in which Napster receivedactual knowledge from <strong>the</strong> plaintiffs of infringing acts by a specific user, Napster had acted toterminate such infringing activity. The district court rejected this argument, ruling that actualknowledge of specific acts of infringement is not required for c<strong>on</strong>tributory liability, citingGershwin Publ’g Corp. v. Columbia Artists Management, Inc., 1227 which <strong>the</strong> court characterizedas holding that general knowledge that third parties performed copyrighted works satisfied <strong>the</strong>knowledge element of c<strong>on</strong>tributory infringement. Accordingly, “<strong>the</strong> court rejects defendant’sargument that titles in <strong>the</strong> Napster directory cannot be used to distinguish infringing fromn<strong>on</strong>infringing files and thus that defendant cannot know about infringement by any particularuser of any particular musical recording or compositi<strong>on</strong>.” 1228The district court also rejected Napster’s reliance <strong>on</strong> <strong>the</strong> following passage from <strong>the</strong>Netcom decisi<strong>on</strong> c<strong>on</strong>cerning c<strong>on</strong>tributory liability of service providers:Where a BBS [bulletin board service] operator cannot reas<strong>on</strong>ably verify a claimof infringement, ei<strong>the</strong>r because of a possible fair use defense, <strong>the</strong> lack ofcopyright notices <strong>on</strong> <strong>the</strong> copies, or <strong>the</strong> copyright holder’s failure to provide <strong>the</strong>necessary documentati<strong>on</strong> to show that <strong>the</strong>re is likely infringement, <strong>the</strong> operator’slack of knowledge will be found reas<strong>on</strong>able and <strong>the</strong>re will be no liability forc<strong>on</strong>tributory infringement for allowing <strong>the</strong> c<strong>on</strong>tinued distributi<strong>on</strong> of <strong>the</strong> works <strong>on</strong>its system. 1229The district court held that this language was dicta because <strong>the</strong> plaintiffs in that caseraised a genuine issue of material fact regarding knowledge. But more importantly, <strong>the</strong> courtruled that Napster “is not an <strong>Internet</strong> service provider that acts as a mere c<strong>on</strong>duit for <strong>the</strong> transferof files.” 1230One of <strong>the</strong> important issues <strong>on</strong> appeal was whe<strong>the</strong>r c<strong>on</strong>structive knowledge is sufficientfor c<strong>on</strong>tributory liability, or whe<strong>the</strong>r actual knowledge of infringing uses is required for liability.The Ninth Circuit in Napster I began its analysis of <strong>the</strong> knowledge pr<strong>on</strong>g by stating thatc<strong>on</strong>tributory liability “requires that <strong>the</strong> sec<strong>on</strong>dary infringer ‘know or have reas<strong>on</strong> to know’ ofdirect infringement.” 1231 The Ninth Circuit also stated, “It is apparent from <strong>the</strong> record thatnotice or watermark. MP3 file names are created by users, c<strong>on</strong>tain errors, and are variable and undependable.Finally, Napster argued that s<strong>on</strong>g titles could not be used to distinguish authorized files from o<strong>the</strong>rs becausemany s<strong>on</strong>g titles are used by multiple artists or <strong>the</strong>re may be multiple recordings of <strong>the</strong> same work – some ofwhich are authorized to be shared and o<strong>the</strong>rs not. Napster’s PI Opp. Br., supra note 1173, at 18-19.1227 443 F.2d 1159, 1163 (2d Cir. 1971).1228 Napster, 114 F. Supp. 2d at 918.1229 Religious Technology Center v. Netcom Online Communicati<strong>on</strong> Services, Inc., 907 F. Supp. 1361, 1374 (N.D.Cal. 1995).1230 Napster, 114 F. Supp. 2d at 919.1231 Napster I, 239 F.3d at 1020 (citing Cable/Home Communicati<strong>on</strong> Corp. v. Network Prods., Inc., 902 F.2d 829,845 & 846 n.29 (11th Cir. 1990).- 279 -


Napster has knowledge, both actual and c<strong>on</strong>structive, of direct infringement.” 1232 Both of <strong>the</strong>sestatements suggest that c<strong>on</strong>structive knowledge is sufficient to impose c<strong>on</strong>tributory liability <strong>on</strong> aservice provider.However, fur<strong>the</strong>r analysis by <strong>the</strong> Ninth Circuit in its Napster I opini<strong>on</strong> suggests thatc<strong>on</strong>structive knowledge in <strong>the</strong> general sense that a service provider may know that its systemcould potentially be used for infringing purposes, is insufficient. Specifically, <strong>the</strong> Ninth Circuitstated, “We are bound to follow S<strong>on</strong>y, and will not impute <strong>the</strong> requisite level of knowledge toNapster merely because peer-to-peer file sharing technology may be used to infringe plaintiffs’copyrights.” 1233 Never<strong>the</strong>less, <strong>the</strong> Ninth Circuit found that “<strong>the</strong> evidentiary record heresupported <strong>the</strong> district court’s finding that plaintiffs would likely prevail in establishing thatNapster knew or had reas<strong>on</strong> to know of its users’ infringement of plaintiffs’ copyrights.” 1234The Ninth Circuit endorsed <strong>the</strong> analysis of <strong>the</strong> Netcom decisi<strong>on</strong>, “which suggests that inan <strong>on</strong>line c<strong>on</strong>text, evidence of actual knowledge of specific acts of infringement is required tohold a computer system operator liable for c<strong>on</strong>tributory copyright infringement.” 1235 Thereference to “actual knowledge” raises <strong>the</strong> questi<strong>on</strong> whe<strong>the</strong>r <strong>the</strong> Ninth Circuit meant to excludec<strong>on</strong>structive knowledge as being sufficient. However, <strong>the</strong> Ninth Circuit went <strong>on</strong> to state that <strong>the</strong>“court [in Netcom] determined that for <strong>the</strong> operator to have sufficient knowledge, <strong>the</strong> copyrightholder must ‘provide <strong>the</strong> necessary documentati<strong>on</strong> to show <strong>the</strong>re is likely infringement.’” 1236From this statement, it appears that specific notice from <strong>the</strong> copyright holder of activity <strong>on</strong> <strong>the</strong>service sufficient to show that <strong>the</strong>re is “likely” infringement can c<strong>on</strong>stitute “reas<strong>on</strong> to know.”Thus, <strong>the</strong> form of c<strong>on</strong>structive knowledge <strong>the</strong> Ninth Circuit in Napster I appears to c<strong>on</strong>templateas giving rise to potential liability is <strong>on</strong>ly <strong>on</strong>e that flows from very specific notice by a copyrightholder of particular potentially infringing activity <strong>on</strong> <strong>the</strong> service. What is unclear, however, asfur<strong>the</strong>r analyzed below, is <strong>the</strong> extent to which, <strong>on</strong>ce a service provider has been notified of aparticular infringing instance of a work <strong>on</strong> <strong>the</strong> service, <strong>the</strong> service provider <strong>the</strong>n has“c<strong>on</strong>structive knowledge” of <strong>the</strong> presence of that work <strong>on</strong> its service that gives rise to a duty topolice for o<strong>the</strong>r infringing occurrences of that work <strong>on</strong> <strong>the</strong> system.Summarizing its endorsement of <strong>the</strong> Netcom approach, <strong>the</strong> Ninth Circuit ruled in NapsterI that “if a computer system operator learns of specific infringing material <strong>on</strong> his system and failsto purge such material from <strong>the</strong> system, <strong>the</strong> operator knows of and c<strong>on</strong>tributes to directinfringement. C<strong>on</strong>versely, absent any specific informati<strong>on</strong> which identifies infringing activity, acomputer system operator cannot be liable for c<strong>on</strong>tributory infringement merely because <strong>the</strong>structure of <strong>the</strong> system allows for <strong>the</strong> exchange of copyrighted material.” 1237 The Ninth Circuitc<strong>on</strong>cluded that <strong>the</strong> record established sufficient knowledge to impose c<strong>on</strong>tributory liability <strong>on</strong>1232 Napster I, 239 F.3d at 1020.1233 Id. at 1020-21.1234 Id. at 1021.1235 Id. (citing Religious Technology Center v. Netcom On-Line Communicati<strong>on</strong>s Servs., 907 F. Supp. 1361, 1371(N.D. Cal. 1995)).1236 Napster I, 239 F.3d at 1021 (quoting Netcom, 907 F. Supp. at 1374).1237 Napster I, 239 F.3d at 1021 (citati<strong>on</strong>s omitted).- 280 -


Napster “when linked to dem<strong>on</strong>strated infringing use of <strong>the</strong> Napster system. The record supports<strong>the</strong> district court’s finding that Napster has actual knowledge that specific infringing material isavailable using its system, that it could block access to <strong>the</strong> system by suppliers of <strong>the</strong> infringingmaterial, and that it failed to remove <strong>the</strong> material.” 1238 Again, <strong>the</strong> Ninth Circuit’s reference to“actual” knowledge raises c<strong>on</strong>fusi<strong>on</strong> about <strong>the</strong> extent to which c<strong>on</strong>structive knowledge can giverise to c<strong>on</strong>tributory liability.(ii) The Material C<strong>on</strong>tributi<strong>on</strong> Pr<strong>on</strong>g. With respect to <strong>the</strong> material c<strong>on</strong>tributi<strong>on</strong>pr<strong>on</strong>g of <strong>the</strong> c<strong>on</strong>tributory liability test, <strong>the</strong> district court ruled that Napster had materiallyc<strong>on</strong>tributed to <strong>the</strong> infringing acts of its users. For support, <strong>the</strong> court cited F<strong>on</strong>ovisa, Inc. v.Cherry Aucti<strong>on</strong>, Inc., 1239 in which <strong>the</strong> owners of copyrights for musical recordings stated ac<strong>on</strong>tributory infringement claim against <strong>the</strong> operators of a swap meet at which independentvendors sold counterfeit recordings, because it would have been difficult for <strong>the</strong> infringingactivity to take place in <strong>the</strong> massive quantities alleged without <strong>the</strong> support services provided by<strong>the</strong> swap meet. The district court found that Napster was essentially an <strong>Internet</strong> swap meet andthat Napster was materially c<strong>on</strong>tributing to <strong>the</strong> infringing activity of its users by supplying <strong>the</strong>MusicShare software, search engine, servers, and means of establishing a c<strong>on</strong>necti<strong>on</strong> betweenusers’ computers. 1240 “Without <strong>the</strong> support services defendant provides, Napster users could notfind and download <strong>the</strong> music <strong>the</strong>y want with <strong>the</strong> ease of which defendant boasts.” 1241On appeal in Napster I, <strong>the</strong> Ninth Circuit found that <strong>the</strong> district court had correctlyapplied <strong>the</strong> reas<strong>on</strong>ing of F<strong>on</strong>ovisa. “We agree that Napster provides ‘<strong>the</strong> site and facilities’ fordirect infringement.” 1242 The Ninth Circuit’s view of <strong>the</strong> material c<strong>on</strong>tributi<strong>on</strong> pr<strong>on</strong>g appears tobe very broad sweeping, for it would seem that all service providers provide “<strong>the</strong> site andfacilities” for any direct infringement that may occur <strong>on</strong> <strong>the</strong> service. If this is <strong>the</strong> <strong>on</strong>ly test formaterial c<strong>on</strong>tributi<strong>on</strong>, it may be difficult for a service provider to use <strong>the</strong> material c<strong>on</strong>tributi<strong>on</strong>pr<strong>on</strong>g as a defense to comm<strong>on</strong> law c<strong>on</strong>tributory liability.10. The Elements of Vicarious Liability and <strong>the</strong> Duty to Police. 1243 In order to establishvicarious liability for <strong>the</strong> acts of direct infringement by Napster’s users, <strong>the</strong> district court notedthat <strong>the</strong> plaintiffs were required to show that Napster had <strong>the</strong> right and ability to supervise <strong>the</strong>infringing activity of its users and had a direct financial interest in such activity. 1244 Napster1238 Id. at 1022 (citati<strong>on</strong>s omitted; emphasis in original). The sec<strong>on</strong>d element in <strong>the</strong> sec<strong>on</strong>d sentence – that Napstercould block access to <strong>the</strong> system by suppliers of infringing material – hints of a requirement of “c<strong>on</strong>trol” over<strong>the</strong> infringing activity in <strong>the</strong> c<strong>on</strong>tributory liability analysis. As analyzed below with respect to <strong>the</strong> impositi<strong>on</strong> ofvicarious liability <strong>on</strong> Napster, a “c<strong>on</strong>trol” test has generally been relevant <strong>on</strong>ly to vicarious liability. It isunclear whe<strong>the</strong>r <strong>the</strong> Ninth Circuit really meant to introduce a new “c<strong>on</strong>trol” test into c<strong>on</strong>tributory liability.1239 76 F.3d 259 (9th Cir. 1996).1240 Napster, 114 F. Supp. 2d at 919-20.1241 Id. at 920.1242 Napster I, 239 F.3d at 1022.1243 Although <strong>the</strong> issue of <strong>on</strong>line vicarious liability is treated generally in Secti<strong>on</strong> III.C.3 below, <strong>the</strong> vicariousliability issues in <strong>the</strong> Napster case will be treated here in order, for clarity, to present <strong>the</strong> entire analysis ofsec<strong>on</strong>dary liability issues involved in <strong>the</strong> case in a single place.1244 Napster, 114 F. Supp. 2d at 920.- 281 -


argued that it did not have <strong>the</strong> ability to supervise <strong>the</strong> allegedly infringing activity because it wasimpossible to police <strong>the</strong> activity of each of its individual users. Napster argued that it couldnever know <strong>the</strong> use to which a particular file was put <strong>on</strong> its system, and thus could not c<strong>on</strong>trolwhe<strong>the</strong>r a use was fair or not. Napster also pointed to Secti<strong>on</strong> 512(m) of <strong>the</strong> DMCA, 1245 whichprovides that a service provider has no affirmative duty to police its users, and cannot beexpected to m<strong>on</strong>itor individual users until put <strong>on</strong> notice by <strong>the</strong> copyright holder of particularalleged infringing materials. Napster argued that, were service providers required affirmativelyto identify and exclude all copyrighted materials, <strong>the</strong>re could be no file sharing or, indeed, even aWorld Wide Web. 1246 Napster also argued that it received no direct financial benefit from <strong>the</strong>infringing activity, but at most <strong>on</strong>ly a generalized financial benefit, since <strong>the</strong> many n<strong>on</strong>infringinguses of <strong>the</strong> Napster system drew many users to its system. 1247The district court rejected <strong>the</strong>se arguments and ruled that Napster was vicariously liable.The court found that Napster’s ability to block users about whom rights holders complain was“tantamount to an admissi<strong>on</strong> that defendant can, and sometimes does, police its service.” 1248 Thecourt ruled that a defendant need not exercise its supervisory powers to be deemed capable ofdoing so. The district court also held that <strong>the</strong> plaintiffs had shown a reas<strong>on</strong>able likelihood thatNapster had a direct financial interest in <strong>the</strong> infringing activity, citing documents stating thatNapster would derive revenues directly from increases in its user base and depositi<strong>on</strong> testim<strong>on</strong>yby Napster’s former President that <strong>the</strong> Napster service attracted more and more users by offeringan increasing amount of quality music for free. The court found this to be similar to <strong>the</strong> type ofdirect financial interest that <strong>the</strong> Ninth Circuit found sufficient for vicarious liability in <strong>the</strong>F<strong>on</strong>ovisa case. Accordingly, <strong>the</strong> district court ruled that <strong>the</strong> plaintiffs had shown a reas<strong>on</strong>ablelikelihood of success <strong>on</strong> <strong>the</strong>ir vicarious infringement claims. 1249The Ninth Circuit’s rulings <strong>on</strong> appeal in Napster I with respect to <strong>the</strong> vicarious liabilityissue are some of <strong>the</strong> most significant holdings in <strong>the</strong> case. In a very important initial ruling, <strong>the</strong>Ninth Circuit held that <strong>the</strong> “staple article of commerce” doctrine of S<strong>on</strong>y has no applicability tovicarious liability. This ruling seems a bit odd, since <strong>the</strong> S<strong>on</strong>y opini<strong>on</strong> uses <strong>the</strong> phrase“vicarious liability” several times. The Ninth Circuit acknowledged as much, but c<strong>on</strong>cluded that“when <strong>the</strong> S<strong>on</strong>y Court used <strong>the</strong> term ‘vicarious liability,’ it did so broadly and outside of atechnical analysis of <strong>the</strong> doctrine of vicarious copyright infringement.” Under this holding, itappears that <strong>the</strong> S<strong>on</strong>y doctrine will not afford any immunity to service providers from vicariousliability.1245 That secti<strong>on</strong> provides as follows: “Nothing in this secti<strong>on</strong> shall be c<strong>on</strong>strued to c<strong>on</strong>diti<strong>on</strong> <strong>the</strong> applicability ofsubsecti<strong>on</strong>s (a) through (d) [<strong>the</strong> safe harbors] <strong>on</strong> – (1) a service provider m<strong>on</strong>itoring its service or affirmativelyseeking facts indicating infringing activity, except to <strong>the</strong> extent c<strong>on</strong>sistent with a standard technical measurecomplying with <strong>the</strong> provisi<strong>on</strong>s of subsecti<strong>on</strong> (i).” 17 U.S.C. § 512(m)(1).1246 Napster’s PI Opp. Brief, supra note 1173, at 20-21.1247 Id. at 21.1248 Napster, 114 F. Supp. 2d at 921.1249 Id. at 921-22.- 282 -


The Ninth Circuit’s view of <strong>the</strong> vicarious liability doctrine was broad <strong>on</strong> both <strong>the</strong>financial benefit and supervisi<strong>on</strong> pr<strong>on</strong>gs. With respect to <strong>the</strong> financial benefit pr<strong>on</strong>g, <strong>the</strong> NinthCircuit, citing F<strong>on</strong>ovisa, agreed with <strong>the</strong> district court that “financial benefit exists where <strong>the</strong>availability of infringing material ‘acts as a “draw” for customers.’” 1250 The Ninth Circuit relied<strong>on</strong> <strong>the</strong> district court’s finding that more users register with <strong>the</strong> Napster system as <strong>the</strong> quality andquantity of available music increases. 1251With respect to <strong>the</strong> supervisi<strong>on</strong> pr<strong>on</strong>g, <strong>the</strong> Ninth Circuit noted that “Napster has anexpress reservati<strong>on</strong> of rights policy, stating <strong>on</strong> its website that it expressly reserves <strong>the</strong> ‘right torefuse service and terminate accounts in [its] discreti<strong>on</strong>, including, but not limited to, if Napsterbelieves that user c<strong>on</strong>duct violates applicable law … or for any reas<strong>on</strong> in Napster’s solediscreti<strong>on</strong>, with or without case.’” 1252 The Ninth Circuit ruled that this reservati<strong>on</strong> of rightspolicy was, of itself, sufficient evidence of Napster’s right and ability to supervise its users’c<strong>on</strong>duct, and (in <strong>on</strong>e of <strong>the</strong> most important aspects of <strong>the</strong> entire opini<strong>on</strong>), gave rise to a duty topolice <strong>the</strong> Napster system: “To escape impositi<strong>on</strong> of vicarious liability, <strong>the</strong> reserved right topolice must be exercised to its fullest extent. Turning a blind eye to detectable acts ofinfringement for <strong>the</strong> sake of profit gives rise to liability.” 1253This holding raises a number of significant issues. First, <strong>the</strong> ruling that a reservati<strong>on</strong> ofrights policy by itself satisfies <strong>the</strong> supervisi<strong>on</strong> pr<strong>on</strong>g of <strong>the</strong> vicarious liability test puts serviceproviders in a potential Catch 22 situati<strong>on</strong> with <strong>the</strong> DMCA. As discussed fur<strong>the</strong>r below, underSecti<strong>on</strong> 512(i) of <strong>the</strong> DMCA, in order to be eligible for <strong>the</strong> safe harbors of <strong>the</strong> DMCA, a serviceprovider must adopt and reas<strong>on</strong>ably implement a “policy that provides for <strong>the</strong> terminati<strong>on</strong> inappropriate circumstances of subscribers and account holders of <strong>the</strong> service provider’s system ornetwork who are repeat infringers.” Under <strong>the</strong> Ninth Circuit’s ruling in Napster I, however, <strong>the</strong>adopti<strong>on</strong> of such a policy would seem to expose <strong>the</strong> service provider to vicarious liability under<strong>the</strong> supervisi<strong>on</strong> pr<strong>on</strong>g. The service provider is <strong>the</strong>refore put in a Catch 22 – whe<strong>the</strong>r it shouldavoid adopti<strong>on</strong> of a reservati<strong>on</strong> of rights policy in order to avoid comm<strong>on</strong> law liability, <strong>the</strong>rebypotentially giving up its DMCA safe harbors, or preserve its DMCA safe harbors by adoptingsuch a policy, <strong>the</strong>reby potentially increasing its exposure to vicarious liability.Sec<strong>on</strong>d, <strong>the</strong> duty to police seems c<strong>on</strong>trary to Secti<strong>on</strong> 512(m) of <strong>the</strong> DMCA, which statesthat a service provider need not “m<strong>on</strong>itor[] its service or affirmatively seek[] facts indicatinginfringing activity, except to <strong>the</strong> extent c<strong>on</strong>sistent with a standard technical measure” in order tobe eligible for <strong>the</strong> DMCA safe harbors. Thus, <strong>the</strong> Ninth Circuit’s opini<strong>on</strong> in Napster I seems torequire that a service provider do more than is required by <strong>the</strong> DMCA in order to avoid comm<strong>on</strong>law sec<strong>on</strong>dary liability.1250 Napster I, 239 F.3d at 1023 (quoting F<strong>on</strong>ovisa, Inc. v. Cherry Aucti<strong>on</strong>, Inc., 76 F.3d 259, 263-64 (9th Cir.1996)).1251 Napster I, 239 F.3d at 1023.1252 Id.1253 Id.- 283 -


Third, <strong>the</strong> Ninth Circuit did not specifically define what c<strong>on</strong>stitutes a “detectable” act ofinfringement, and <strong>the</strong> scope of <strong>the</strong> duty to police for such acts is <strong>the</strong>refore unclear under itsopini<strong>on</strong>. The Ninth Circuit noted, however, that <strong>the</strong> district court’s original injuncti<strong>on</strong>(discussed in detail in subsecti<strong>on</strong> 13 below) had g<strong>on</strong>e too far in what it required Napster to do.The district court’s original injuncti<strong>on</strong> ruled that “Napster bears <strong>the</strong> burden of developing ameans to comply with <strong>the</strong> injuncti<strong>on</strong>,” which would have required Napster to develop newblocking technology that did not exist in its system. The preliminary injuncti<strong>on</strong> fur<strong>the</strong>r requiredthat Napster “must insure that no work owned by plaintiffs which nei<strong>the</strong>r defendant nor Napsterusers have permissi<strong>on</strong> to use or distribute is uploaded or downloaded <strong>on</strong> Napster.”The Ninth Circuit ruled in Napster I that this preliminary injuncti<strong>on</strong> went too far in <strong>the</strong>burden it placed <strong>on</strong> Napster to police. Analogizing to <strong>the</strong> F<strong>on</strong>ovisa case, which imposedsec<strong>on</strong>dary liability <strong>on</strong> <strong>the</strong> operator of <strong>the</strong> swap meet because <strong>the</strong> operator had <strong>the</strong> right andability to police <strong>the</strong> premises of <strong>the</strong> swap meet, <strong>the</strong> Ninth Circuit ruled that <strong>the</strong> district court“failed to recognize that <strong>the</strong> boundaries of <strong>the</strong> premises that Napster ‘c<strong>on</strong>trols and patrols’ arelimited. … Put differently, Napster’s reserved ‘right and ability’ to police is cabined by <strong>the</strong>system’s current architecture. As shown by <strong>the</strong> record, <strong>the</strong> Napster system does not ‘read’ <strong>the</strong>c<strong>on</strong>tent of indexed files, o<strong>the</strong>r than to check that <strong>the</strong>y are in <strong>the</strong> proper MP3 format.” 1254 TheNinth Circuit went <strong>on</strong> to rule that Napster’s duty to police must be limited by <strong>the</strong> existingarchitecture of its system:Napster, however, has <strong>the</strong> ability to locate infringing material listed <strong>on</strong> its searchindices, and <strong>the</strong> right to terminate users’ access to <strong>the</strong> system. The file nameindices, <strong>the</strong>refore, are within <strong>the</strong> “premises” that Napster has <strong>the</strong> ability to police.We recognize that <strong>the</strong> files are user-named and may not match copyrightedmaterial exactly (for example, <strong>the</strong> artist or s<strong>on</strong>g could be spelled wr<strong>on</strong>g). ForNapster to functi<strong>on</strong> effectively, however, file names must reas<strong>on</strong>ably or roughlycorresp<strong>on</strong>d to <strong>the</strong> material c<strong>on</strong>tained in <strong>the</strong> files, o<strong>the</strong>rwise no user could everlocate any desired music. As a practical matter, Napster, its users and <strong>the</strong> recordcompany plaintiffs have equal access to infringing material by employingNapster’s “search functi<strong>on</strong>.” 1255This passage suggests that Napster’s obligati<strong>on</strong>s to police its system for infringing fileswas to be limited to m<strong>on</strong>itoring <strong>the</strong> names of files made available for sharing by Napster usersusing <strong>the</strong> existing search functi<strong>on</strong> of <strong>the</strong> Napster system, which <strong>the</strong> Ninth Circuit noted wasequally available to both <strong>the</strong> plaintiffs and Napster for policing for infringing files. Unlike <strong>the</strong>district court’s original preliminary injuncti<strong>on</strong>, <strong>the</strong>n, <strong>the</strong> Ninth Circuit in Napster I did notc<strong>on</strong>template that Napster would be required to develop new technology for policing not based <strong>on</strong>file name searches (such as digital “fingerprinting” of <strong>the</strong> c<strong>on</strong>tent of files or o<strong>the</strong>r techniques).11. Summary of Sec<strong>on</strong>dary Liability Under <strong>the</strong> Ninth Circuit’s Decisi<strong>on</strong>. At <strong>the</strong> end ofits opini<strong>on</strong> in Napster I, <strong>the</strong> Ninth Circuit offered <strong>the</strong> following summary of its standard forc<strong>on</strong>tributory liability and vicarious liability:1254 Id. at 1023-24.1255 Id. at 1024.- 284 -


[C]<strong>on</strong>tributory liability may potentially be imposed <strong>on</strong>ly to <strong>the</strong> extent thatNapster: (1) receives reas<strong>on</strong>able knowledge of specific infringing files withcopyrighted musical compositi<strong>on</strong>s and sound recordings; (2) knows or shouldknow that such files are available <strong>on</strong> <strong>the</strong> Napster system; and (3) fails to act toprevent viral distributi<strong>on</strong> of <strong>the</strong> works. The mere existence of <strong>the</strong> Napster system,absent actual notice and Napster’s dem<strong>on</strong>strated failure to remove <strong>the</strong> offendingmaterial, is insufficient to impose c<strong>on</strong>tributory liability.C<strong>on</strong>versely, Napster may be vicariously liable when it fails toaffirmatively use its ability to patrol its system and preclude access to potentiallyinfringing files listed in its search index. Napster has both <strong>the</strong> ability to use itssearch functi<strong>on</strong> to identify infringing musical recordings and <strong>the</strong> right to barparticipati<strong>on</strong> of users who engage in <strong>the</strong> transmissi<strong>on</strong> of infringing files. 1256This summary replicates many of <strong>the</strong> ambiguities noted earlier with respect to (i) whe<strong>the</strong>rc<strong>on</strong>structive knowledge is sufficient for liability (<strong>the</strong> summary first speaks of “knowledge ofspecific infringing files” but <strong>the</strong>n speaks of whe<strong>the</strong>r Napster “should know” that such files areavailable <strong>on</strong> its system) and (ii) <strong>the</strong> scope of <strong>the</strong> duty to police (<strong>the</strong> summary speaks of blockingaccess to “potentially” infringing files without defining when a file is “potentially” infringing,and of preventing “viral distributi<strong>on</strong>” of “works,” without saying whe<strong>the</strong>r, by use of <strong>the</strong> term“works,” it meant to reference <strong>on</strong>ly particular files of which Napster has notice, or any files thatmay c<strong>on</strong>tain <strong>the</strong> copyrighted “work”).12. O<strong>the</strong>r Defenses Raised by Napster Rejected by <strong>the</strong> District Court and <strong>the</strong> NinthCircuit. 1257 The court also rejected a number of o<strong>the</strong>r miscellaneous defenses to liability thatNapster had raised, which may be summarized briefly as follows:(i) First Amendment. Napster argued that <strong>the</strong> requested injuncti<strong>on</strong> would imposean overbroad prior restraint <strong>on</strong> its free speech rights to publish a directory of where files werelocated <strong>on</strong> its users’ computers, as well as that of its users and <strong>the</strong> unsigned artists who depend<strong>on</strong> <strong>the</strong> Napster service to gain exposure by distributing <strong>the</strong>ir music through Napster. The districtcourt rejected this argument, finding that free speech c<strong>on</strong>cerns “are protected by and coextensivewith <strong>the</strong> fair use doctrine.” 1258 The parties sharply disputed <strong>the</strong> extent to which infringing andn<strong>on</strong>infringing aspects of <strong>the</strong> Napster service were separable, and whe<strong>the</strong>r it was <strong>the</strong>reforepractical for <strong>the</strong> court to enjoin <strong>on</strong>ly <strong>the</strong> infringing aspects. The district court ruled, however,that even if it were “technologically impossible for Napster, Inc. to offer such functi<strong>on</strong>s as itsdirectory without facilitating infringement, <strong>the</strong> court still must take acti<strong>on</strong> to protect plaintiffs’copyrights.” 1259 On appeal in Napster I, <strong>the</strong> Ninth Circuit, in a very terse analysis of <strong>the</strong> First1256 Id. at 1027 (citati<strong>on</strong>s omitted).1257 Napster also raised defenses under <strong>the</strong> safe harbors of <strong>the</strong> DMCA, which are discussed in Secti<strong>on</strong> III.C.5(b)below.1258 Napster, 114 F. Supp. 2d at 922 (citing Nih<strong>on</strong> Keizai Shimbun, Inc. v. Comline Bus. Data, Inc., 166 F.3d 65, 74(2d Cir. 1999)).1259 Napster, 114 F. Supp. 2d at 923.- 285 -


Amendment issue, simply ruled that “First Amendment c<strong>on</strong>cerns in copyright are allayed by <strong>the</strong>presence of <strong>the</strong> fair use doctrine. … Uses of copyrighted material that are not fair uses arerightfully enjoined.” 1260(ii) <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Misuse. Napster argued that <strong>the</strong> plaintiff record labels wereengaged in copyright misuse by attempting to aggrandize <strong>the</strong>ir m<strong>on</strong>opoly bey<strong>on</strong>d <strong>the</strong> scope of<strong>the</strong>ir copyrights by restricting <strong>the</strong> flow of unsigned artists’ music, which competed with <strong>the</strong>irown, and by c<strong>on</strong>trolling <strong>the</strong> distributi<strong>on</strong> of music over <strong>the</strong> <strong>Internet</strong>. The district court rejectedthis argument, c<strong>on</strong>cluding that most of <strong>the</strong> copyright misuse cases involved <strong>the</strong> attempt toenlarge a copyright m<strong>on</strong>opoly through restricted or exclusive licensing, and <strong>the</strong> plaintiffs in <strong>the</strong>instant case had granted no licenses to Napster, let al<strong>on</strong>e impermissibly restrictive <strong>on</strong>es. 1261 Onappeal in Napster I, <strong>the</strong> Ninth Circuit affirmed <strong>the</strong> ruling of <strong>the</strong> district court, finding noevidence that <strong>the</strong> plaintiffs sought to c<strong>on</strong>trol areas outside <strong>the</strong>ir grant of m<strong>on</strong>opoly. “Ra<strong>the</strong>r,plaintiffs seek to c<strong>on</strong>trol reproducti<strong>on</strong> and distributi<strong>on</strong> of <strong>the</strong>ir copyrighted works, exclusiverights of copyright holders.” 1262 In a footnote, however, <strong>the</strong> Ninth Circuit did note that <strong>the</strong>copyright misuse doctrine is not limited entirely to situati<strong>on</strong>s of restrictive licensing – “aunilateral refusal to license a copyright may c<strong>on</strong>stitute wr<strong>on</strong>gful exclusi<strong>on</strong>ary c<strong>on</strong>duct giving riseto a claim of misuse, but [we] assume that <strong>the</strong> ‘desire to exclude o<strong>the</strong>rs … is a presumptivelyvalid business justificati<strong>on</strong> for any immediate harm to c<strong>on</strong>sumers.” 1263(iii) Waiver. Napster asserted that <strong>the</strong> plaintiffs had waived <strong>the</strong>ir right to enforce<strong>the</strong>ir copyrights against Napster. Napster introduced evidence that <strong>the</strong> plaintiffs had known of<strong>the</strong> existence of “ripping” software for creating MP3 files for years, and had known that makingMP3 files from CDs was <strong>the</strong> most prevalent means by which sound recordings became availablefor transfer over <strong>the</strong> <strong>Internet</strong> in <strong>the</strong> first place, yet had failed to take any acti<strong>on</strong>s to stop or evenslow its widespread proliferati<strong>on</strong>, and indeed had actively formed partnerships with and investedin companies that directed c<strong>on</strong>sumers to MP3 encoding software that would enable <strong>the</strong>m totransfer music files over <strong>the</strong> <strong>Internet</strong>. 1264 The district court resp<strong>on</strong>ded as follows:This limited evidence fails to c<strong>on</strong>vince <strong>the</strong> court that <strong>the</strong> record companies created <strong>the</strong>m<strong>on</strong>ster that is now devouring <strong>the</strong>ir intellectual property rights. Although plaintiffs havenot sued <strong>the</strong>ir business partners for c<strong>on</strong>tributory infringement, <strong>the</strong>y typically have asked<strong>the</strong>m to discourage unauthorized ripping and have made security part of <strong>the</strong>ir agreements.Defendant fails to show that, in hastening <strong>the</strong> proliferati<strong>on</strong> of MP3 files, plaintiffs didmore than seek partners for <strong>the</strong>ir commercial downloading ventures and develop musicplayers for files <strong>the</strong>y planned to sell over <strong>the</strong> <strong>Internet</strong>. 12651260 Napster I, 239 F.3d at 1028.1261 Napster, 114 F. Supp. 2d at 923.1262 Napster I, 239 F.3d at 1027.1263 Id. at 1027 n.8 (citing Image Tech. Servs. V. Eastman Kodak Co., 125 F.3d 1195, 1218 (9 th Cir. 1997)).1264 Napster’s PI Opp. Brief, supra note 1173, at 22.1265 Napster, 114 F. Supp. 2d at 924.- 286 -


On appeal in Napster I, <strong>the</strong> Ninth Circuit affirmed this ruling, citing <strong>the</strong> district court’sfinding that “in hastening <strong>the</strong> proliferati<strong>on</strong> of MP3 files, plaintiffs did [nothing] more than seekpartners for <strong>the</strong>ir commercial downloading ventures and develop music players for files <strong>the</strong>yplanned to sell over <strong>the</strong> <strong>Internet</strong>.” 1266(iv) Failure to Present Evidence of <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Registrati<strong>on</strong>. Finally, Napsterargued that, under secti<strong>on</strong> 411(a) of <strong>the</strong> copyright statute, 1267 in order to claim infringement ofmultiple works, <strong>the</strong> plaintiffs were required to specify <strong>the</strong> works with particularity and provideproof of copyright registrati<strong>on</strong> for those works. Napster noted that <strong>the</strong> plaintiffs had identified<strong>on</strong>ly a discrete number of works allegedly infringed, toge<strong>the</strong>r with <strong>the</strong>ir registrati<strong>on</strong> numbers, ina Schedule to <strong>the</strong>ir complaint, and argued that <strong>the</strong> plaintiffs had no jurisdicti<strong>on</strong> to assert <strong>the</strong>copyrights in o<strong>the</strong>r unidentified works. The court rejected this argument, citing a 1990 casefrom <strong>the</strong> D.C. Circuit as authority for <strong>the</strong> propositi<strong>on</strong> that a court may enter an injuncti<strong>on</strong> in acopyright case covering works owned by <strong>the</strong> plaintiff but not in suit, particularly where <strong>the</strong>re hasbeen a history of c<strong>on</strong>tinuing infringement and <strong>the</strong>ir exists a significant threat of futureinfringement. 1268On appeal in Napster I, <strong>the</strong> Ninth Circuit failed to address this argument directly.Instead, it simply ruled that <strong>the</strong> plaintiffs had sufficiently dem<strong>on</strong>strated “ownership” forpurposes of a prima facie case of direct infringement, quoting <strong>the</strong> district court’s statement that“as much as eighty-seven percent of <strong>the</strong> files available <strong>on</strong> Napster may be copyrighted and morethan seventy percent may be owned or administered by plaintiffs.” 126913. The Mar. 5, 2001 Preliminary Injuncti<strong>on</strong>. The district court ruled that, because <strong>the</strong>plaintiffs had shown a reas<strong>on</strong>able likelihood of success <strong>on</strong> <strong>the</strong> merits of <strong>the</strong>ir c<strong>on</strong>tributory andvicarious 1270 copyright infringement claims, <strong>the</strong>y were entitled to a presumpti<strong>on</strong> of irreparableharm, and a preliminary injuncti<strong>on</strong> should issue. The district court <strong>the</strong>refore enjoined Napster“from engaging in, or facilitating o<strong>the</strong>rs in copying, downloading, uploading, transmitting, ordistributing plaintiffs’ copyrighted musical compositi<strong>on</strong>s and sound recordings, protected byei<strong>the</strong>r federal or state law, without express permissi<strong>on</strong> of <strong>the</strong> rights owner.” 1271 The court fur<strong>the</strong>rnoted that “[b]ecause defendant has c<strong>on</strong>tributed to illegal copying <strong>on</strong> a scale that is withoutprecedent, it bears <strong>the</strong> burden of developing a means to comply with <strong>the</strong> injuncti<strong>on</strong>. Defendantmust insure that no work owned by plaintiffs which nei<strong>the</strong>r defendant nor Napster users havepermissi<strong>on</strong> to use or distribute is uploaded or downloaded <strong>on</strong> Napster. The court ORDERS1266 Napster I, 239 F.3d at 1026.1267 That secti<strong>on</strong> provides that “no acti<strong>on</strong> for infringement of <strong>the</strong> copyright in any work shall be instituted untilregistrati<strong>on</strong> of <strong>the</strong> copyright claim has been made in accordance with this title.” 17 U.S.C. §411(a).1268 Napster, 114 F. Supp. 2d at 925 (citing Walt Disney Co. v. Powell, 897 F.2d 565, 568 (D.C. Cir. 1990)).1269 Napster I, 239 F.3d at 1013 (quoting Napster, 114 F. Supp. 2d at 911) (emphasis added). It is puzzling why ashowing that a certain percentage of <strong>the</strong> works <strong>on</strong> Napster “may” be copyrighted and “may” be owned byplaintiffs is sufficient to meet <strong>the</strong> very specific jurisdicti<strong>on</strong>al requirements of 17 U.S.C. § 411(a).1270 The court’s rati<strong>on</strong>ale for its rejecti<strong>on</strong> of Napster’s defense under <strong>the</strong> safe harbors of <strong>the</strong> DMCA is discussed inSecti<strong>on</strong> III.C.5 below.1271 Napster, 114 F. Supp. 2d at 927.- 287 -


plaintiffs to cooperate with defendant in identifying <strong>the</strong> works to which <strong>the</strong>y owncopyrights.” 1272On July 28, 2000 (<strong>the</strong> day <strong>the</strong> district court had set for <strong>the</strong> preliminary injuncti<strong>on</strong> to gointo effect), <strong>the</strong> Ninth Circuit issued a stay of <strong>the</strong> injuncti<strong>on</strong>, noting that <strong>the</strong> case “raisedsubstantial questi<strong>on</strong>s of first impressi<strong>on</strong> going to both <strong>the</strong> merits and <strong>the</strong> form of <strong>the</strong>injuncti<strong>on</strong>.” 1273 As discussed above, <strong>the</strong> Ninth Circuit ultimately ruled in Napster I that <strong>the</strong>district court’s original preliminary injuncti<strong>on</strong> was overbroad, and remanded <strong>the</strong> case for entry ofa narrower preliminary injuncti<strong>on</strong> c<strong>on</strong>sistent with <strong>the</strong> Ninth Circuit’s opini<strong>on</strong>. Napstersubsequently filed a petiti<strong>on</strong> with <strong>the</strong> Ninth Circuit for rehearing en banc, which was denied byorder dated June 22, 2001.On remand, both <strong>the</strong> plaintiffs and Napster each submitted proposed preliminaryinjuncti<strong>on</strong>s. On March 5, 2001, <strong>the</strong> district court entered a revised, narrower preliminaryinjuncti<strong>on</strong> requiring <strong>the</strong> plaintiffs to give notice to Napster of specific infringing file names <strong>on</strong><strong>the</strong> Napster system and requiring Napster to block access to those file names through its searchindex, as well as reas<strong>on</strong>able variants of such file names that <strong>the</strong> parties might generate. Themodified preliminary injuncti<strong>on</strong> required use of Napster’s file name search functi<strong>on</strong> as <strong>the</strong>centerpiece of Napster’s duty to police. The district court also permitted <strong>the</strong> record companyplaintiffs to submit notices to Napster of new sound recordings in advance of <strong>the</strong>ir release, andrequired Napster to make efforts to do prophylactic blocking of such new recordings.Specifically, <strong>the</strong> revised preliminary injuncti<strong>on</strong> provided as follows in pertinent part: 1274“Plaintiffs shall provide notice to Napster of <strong>the</strong>ir copyrighted sound recordingsby providing for each work:(A) <strong>the</strong> title of <strong>the</strong> work;(B) <strong>the</strong> name of <strong>the</strong> featured recording artist performing <strong>the</strong> work (“artistname”);(C) <strong>the</strong> name(s) of <strong>on</strong>e or more files available <strong>on</strong> <strong>the</strong> Napster systemc<strong>on</strong>taining such work; and(D) a certificati<strong>on</strong> that plaintiffs own or c<strong>on</strong>trol <strong>the</strong> rights allegedlyinfringed.Plaintiffs shall make a substantial effort to identify <strong>the</strong> infringing files as well as<strong>the</strong> names of <strong>the</strong> artist and title of <strong>the</strong> copyrighted recording.” 12751272 Id. The court ordered <strong>the</strong> plaintiffs to post a b<strong>on</strong>d in <strong>the</strong> amount of $5 milli<strong>on</strong> – far below what Napster hadrequested – to compensate Napster for losses in <strong>the</strong> event that <strong>the</strong> injuncti<strong>on</strong> was reversed or vacated. Id.1273 Order, A&M Records, Inc. v. Napster, Inc., No. 00-16401, 2000 U.S. App. LEXIS 18688 (9th Cir. July 28,2000).1274 The text of <strong>the</strong> complete preliminary injuncti<strong>on</strong> may be found at 2001 U.S. Dist. LEXIS 2186 (N.D. Cal. Mar.5, 2001).1275 Id. 2.- 288 -


“All parties shall use reas<strong>on</strong>able measures in identifying variati<strong>on</strong>s of <strong>the</strong>filename(s), or of <strong>the</strong> spelling of <strong>the</strong> titles or artists’ names, of <strong>the</strong> worksidentified by plaintiffs. If it is reas<strong>on</strong>able to believe that a file available <strong>on</strong> <strong>the</strong>Napster system is a variati<strong>on</strong> of a particular work or file identified by plaintiffs,all parties have an obligati<strong>on</strong> to ascertain <strong>the</strong> actual identity (title and artist name)of <strong>the</strong> work and to take appropriate acti<strong>on</strong> within <strong>the</strong> c<strong>on</strong>text of this Order.” 1276“The Ninth Circuit held that <strong>the</strong> burden of ensuring that no copying,downloading, uploading, transmitting or distributing of plaintiffs’ copyrightedworks occurs <strong>on</strong> <strong>the</strong> system is shared between <strong>the</strong> parties. The court ‘place[d] <strong>the</strong>burden <strong>on</strong> plaintiffs to provide notice to Napster’ and imposed <strong>on</strong> Napster <strong>the</strong>burden ‘of policing <strong>the</strong> system within <strong>the</strong> limits of <strong>the</strong> system.’ It appears to <strong>the</strong>court <strong>on</strong> <strong>the</strong> basis of <strong>the</strong> factual representati<strong>on</strong>s by <strong>the</strong> parties at <strong>the</strong> March 2,2001 hearing that it would be difficult for plaintiffs to identify all infringing files<strong>on</strong> <strong>the</strong> Napster system given <strong>the</strong> transitory nature of its operati<strong>on</strong>. This difficulty,however, does not relieve Napster of its duty. The court anticipates that it may beeasier for Napster to search <strong>the</strong> files available <strong>on</strong> its system at any particular timeagainst lists of copyrighted recordings provided by plaintiffs. The court deemsthat <strong>the</strong> results of such a search provide Napster with ‘reas<strong>on</strong>able knowledge ofspecific infringing files’ as required by <strong>the</strong> Ninth Circuit.” 1277“Once Napster ‘receives reas<strong>on</strong>able knowledge’ from any sources identified inpreceding Paragraphs … of specific infringing files c<strong>on</strong>taining copyrighted soundrecordings, Napster shall, within three (3) business days, prevent such files frombeing included in <strong>the</strong> Napster index (<strong>the</strong>reby preventing access to <strong>the</strong> filescorresp<strong>on</strong>ding to such names through <strong>the</strong> Napster system).” 1278“Within three (3) business days of receipt of reas<strong>on</strong>able notice of infringing files,Napster shall affirmatively search <strong>the</strong> names of all files being made available byall users at <strong>the</strong> time those users log <strong>on</strong> (i.e., prior to <strong>the</strong> names of files beingincluded in <strong>the</strong> Napster index) and prevent <strong>the</strong> downloading, uploading,transmitting or distributing of <strong>the</strong> noticed copyrighted sound recordings.” 1279“Plaintiffs may provide to Napster in advance of release <strong>the</strong> artist name, title of<strong>the</strong> recording, and release date of sound recordings for which, based <strong>on</strong> a reviewof that artist’s previous work, including but not limited to popularity andfrequency of appearance <strong>on</strong> <strong>the</strong> Napster system, <strong>the</strong>re is a substantial likelihoodof infringement <strong>on</strong> <strong>the</strong> Napster system. Napster shall beginning with <strong>the</strong> first1276 Id. 3.1277 Id. 4 (citati<strong>on</strong>s omitted).1278 Id. 5.1279 Id. 6. It is unclear what <strong>the</strong> difference is between <strong>the</strong> requirements of this paragraph and that of <strong>the</strong> previousparagraph. The district court may not have fully understood that <strong>the</strong> steps recited in this paragraph would be<strong>the</strong> same steps that Napster would take to comply with <strong>the</strong> previous paragraph.- 289 -


infringing file block access to or through its system to <strong>the</strong> identified recording.As Napster presently has <strong>the</strong> capability (even without enhancing its technology)to store informati<strong>on</strong> about and subsequently screen for a particular recording, <strong>the</strong>burden is far less and <strong>the</strong> equities are more fair to require Napster to block <strong>the</strong>transmissi<strong>on</strong> of <strong>the</strong>se works in advance of <strong>the</strong>ir release. To order o<strong>the</strong>rwisewould allow Napster users a free ride for <strong>the</strong> length of time it would takeplaintiffs to identify a specific infringing file and Napster to screen <strong>the</strong> work.” 1280Napster appealed, and <strong>the</strong> plaintiffs cross-appealed, <strong>the</strong> Mar. 5 modified preliminaryinjuncti<strong>on</strong> of <strong>the</strong> district court.14. The Apr. 26, 2001 Clarificati<strong>on</strong> of <strong>the</strong> Preliminary Injuncti<strong>on</strong>. Many disputesbetween <strong>the</strong> plaintiffs and Napster quickly arose over <strong>the</strong> meaning and obligati<strong>on</strong>s imposed <strong>on</strong><strong>the</strong> parties by <strong>the</strong> Mar. 5 modified injuncti<strong>on</strong>. First, <strong>the</strong> parties disputed whe<strong>the</strong>r <strong>the</strong> plaintiffswere required to provide notice to Napster of <strong>the</strong> names of specific files available <strong>on</strong> <strong>the</strong> Napstersystem c<strong>on</strong>taining <strong>the</strong> plaintiffs’ copyrighted sound recordings. 1281 The plaintiffs argued that <strong>the</strong>Ninth Circuit’s decisi<strong>on</strong> in Napster I required <strong>the</strong>m to provide specific filenames <strong>on</strong>ly in supportof <strong>the</strong>ir claims for c<strong>on</strong>tributory infringement, and not in support of <strong>the</strong>ir claims for vicariousliability, based <strong>on</strong> <strong>the</strong> following passage from Napster I:The preliminary injuncti<strong>on</strong> we stayed is overbroad because it places <strong>on</strong> Napster<strong>the</strong> entire burden of ensuring that no “copying, downloading, uploading,transmitting, or distributing” of plaintiffs’ works occur <strong>on</strong> <strong>the</strong> system. As stated,we placed <strong>the</strong> burden <strong>on</strong> plaintiffs to provide notice to Napster of copyrightedworks and files c<strong>on</strong>taining such works available <strong>on</strong> <strong>the</strong> Napster system beforeNapster has <strong>the</strong> duty to disable access to <strong>the</strong> offending c<strong>on</strong>tent. Napster,however, also bears <strong>the</strong> burden of policing <strong>the</strong> system within <strong>the</strong> limits of <strong>the</strong>system. Here, we recognize that this is not an exact science in that <strong>the</strong> files areuser named. In crafting <strong>the</strong> injuncti<strong>on</strong> <strong>on</strong> remand, <strong>the</strong> district court shouldrecognize that Napster’s system does not currently appear to allow Napster accessto users’ MP3 files. 1282The plaintiffs read this passage in two parts: First, <strong>the</strong>y read that porti<strong>on</strong> placing <strong>the</strong>“burden <strong>on</strong> plaintiffs to provide notice to Napster … before Napster has <strong>the</strong> duty to disableaccess to <strong>the</strong> offending c<strong>on</strong>tent,” as relating <strong>on</strong>ly to claims for c<strong>on</strong>tributory infringement; andsec<strong>on</strong>d, that porti<strong>on</strong> imposing <strong>on</strong> Napster <strong>the</strong> “burden of policing <strong>the</strong> system within <strong>the</strong> limits of<strong>the</strong> system,” as relating <strong>on</strong>ly to claims of vicarious infringement. Plaintiffs <strong>the</strong>refore maintainedthat <strong>the</strong>y were required to provide specific file names <strong>on</strong>ly to obtain preliminary relief <strong>on</strong> <strong>the</strong>irclaims of c<strong>on</strong>tributory infringement, but did not need to provide filenames to obtain preliminaryrelief <strong>on</strong> <strong>the</strong>ir claims of vicarious infringement. 1283 The district court, although noting that <strong>the</strong>1280 Id. 7.1281 Memorandum, In re Napster, Inc. <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Litigati<strong>on</strong>, MDL No. C 00-1369 MHP (N.D. Cal. Apr. 26, 2001),at 1.1282 Id. at 1-2 (quoting Napster I, 239 F.3d at 1027).1283 Memorandum at 2.- 290 -


plaintiffs’ reading of <strong>the</strong> paragraph might be “a prescient reading,” never<strong>the</strong>less rejected itbecause <strong>the</strong> plain language of <strong>the</strong> paragraph did not allow for two separate standards, but ra<strong>the</strong>r“<strong>on</strong>ly <strong>on</strong>e with several elements.” 1284The parties also disputed whe<strong>the</strong>r <strong>the</strong> provisi<strong>on</strong> of <strong>the</strong> Mar. 5 modified injuncti<strong>on</strong>regarding <strong>the</strong> availability of <strong>the</strong> plaintiffs’ copyrighted works prior to <strong>the</strong> official release of thoseworks adequately resolved <strong>the</strong> plaintiffs’ c<strong>on</strong>cerns. To aid its resoluti<strong>on</strong> of this issue, <strong>the</strong> courtrequested <strong>the</strong> parties to submit declarati<strong>on</strong>s of pers<strong>on</strong>s who could assist <strong>the</strong> court inunderstanding how far in advance of release <strong>the</strong> record companies generally knew that aparticular recording would be released <strong>on</strong> a specific date. 1285 Finally, <strong>the</strong> parties disagreed as to<strong>the</strong> present and future capabilities of <strong>the</strong> Napster system to screen <strong>the</strong> plaintiffs’ copyrightedworks. The court appointed a neutral expert, Dr. A. J. Nichols, to serve as a technology advisorin <strong>the</strong> matter, and requested that he work with <strong>the</strong> parties’ technology experts and prepare areport to <strong>the</strong> court <strong>on</strong> <strong>the</strong> present and future capabilities of <strong>the</strong> Napster system to screen <strong>the</strong>plaintiffs’ copyrighted works. 128615. The July 11, 2001 Oral Modificati<strong>on</strong> of <strong>the</strong> Preliminary Injuncti<strong>on</strong>. Even after <strong>the</strong>Apr. 26 clarificati<strong>on</strong>, <strong>the</strong> parties c<strong>on</strong>tinued to dispute bitterly <strong>the</strong> scope of <strong>the</strong> obligati<strong>on</strong> <strong>on</strong> <strong>the</strong>part of <strong>the</strong> plaintiffs to supply filenames to Napster, as well as Napster’s compliance with <strong>the</strong>modified preliminary injuncti<strong>on</strong>. The plaintiffs alleged that infringing files were still rampant <strong>on</strong><strong>the</strong> Napster system, while Napster insisted that it was adequately blocking all filenames of whichit had been made aware by <strong>the</strong> plaintiffs, as well as many variants of those filenames, includingall files c<strong>on</strong>taining <strong>the</strong> names of many particular artists that had been noticed as illegallyappearing <strong>on</strong> <strong>the</strong> system, and all files having titles or variants of those titles alleged to beinfringing, regardless of <strong>the</strong> artist performing a work by that title – <strong>the</strong>reby resulting insubstantial “overblocking” of files <strong>on</strong> <strong>the</strong> system.During <strong>the</strong> m<strong>on</strong>ths ensuing after <strong>the</strong> Apr. 26 clarificati<strong>on</strong>, Dr. Nichols issued a series ofreports to <strong>the</strong> district court c<strong>on</strong>cerning Napster’s ability to remove infringing files from itssystem. Also during this time, Napster voluntarily developed and switched to a new technologyknown as “fileID” for blocking allegedly infringing files from <strong>the</strong> Napster system. The newtechnology, unlike <strong>the</strong> old, was not based primarily <strong>on</strong> filenames, but ra<strong>the</strong>r <strong>on</strong> a technicalanalysis of <strong>the</strong> digital musical c<strong>on</strong>tent c<strong>on</strong>tained in a file, including acoustic waveformrecogniti<strong>on</strong>, to generate a “fingerprint.” The parties disputed <strong>the</strong> effectiveness of <strong>the</strong> newtechnology and whe<strong>the</strong>r Napster’s use of this technology was sufficient to comply with <strong>the</strong>modified preliminary injuncti<strong>on</strong>. The plaintiffs insisted that <strong>the</strong> preliminary injuncti<strong>on</strong> requiredNapster’s system to be 100% free of infringing files, and that <strong>the</strong>re was still infringing materialbeing shared through <strong>the</strong> system. Napster insisted, however, that no technology could ever be100% accurate in screening out allegedly infringing materials from its system, and that nei<strong>the</strong>r<strong>the</strong> preliminary injuncti<strong>on</strong>, nor <strong>the</strong> Ninth Circuit’s decisi<strong>on</strong> in Napster I, required its system to be100% infringement free. Instead, Napster insisted that it was required to exert <strong>on</strong>ly reas<strong>on</strong>able1284 Id.1285 Id.1286 Id.- 291 -


efforts to block infringing material from its system, and <strong>on</strong>ly within <strong>the</strong> limits of <strong>the</strong> architectureof its system.On July 1, 2001, Napster voluntarily shut down <strong>the</strong> file sharing operati<strong>on</strong> of its system,after discovering flaws in its fileID fingerprinting technology, and c<strong>on</strong>ducted testing <strong>on</strong> itstechnology between July 2 and 9. The parties’ disputes over Napster’s compliance with <strong>the</strong> Mar.5 modified injuncti<strong>on</strong> came to a head at a status c<strong>on</strong>ference before <strong>the</strong> district court <strong>on</strong> July 11,2001. At that hearing, Napster told <strong>the</strong> court that, based <strong>on</strong> its testing, its newly implementedfileID technology was more than 99% effective and that it was prepared to resume allowing filesharing through its system. 1287The district court rejected Napster’s proposal to resume file sharing, stating from <strong>the</strong>bench, “I think we’re at a point where it has to stay that way [i.e., file sharing shut down] untilyou satisfy Dr. Nichols and me that when <strong>the</strong> system goes back up it will be able to block out orscreen out copyrighted works that have been noticed.” 1288 Napster pressed <strong>the</strong> district court toclarify whe<strong>the</strong>r <strong>the</strong> Mar. 5 modified injuncti<strong>on</strong> was meant to require its system to be 100%accurate in screening of allegedly infringing materials. The court ruled orally as follows: “It’snot good enough until every effort has been made to, in fact, get zero tolerance. Now that has tobe <strong>the</strong> objective. If <strong>the</strong>re’s a little – it gets a little messy around edges, if <strong>the</strong>re are some glitchesand so forth, I can understand that. But this system is not going to go back up in such a manneras to permit copying and downloading o<strong>the</strong>r than to test that for <strong>the</strong> purposes of determining <strong>the</strong>error rate until you’ve satisfied Dr. Nichols. And <strong>the</strong>n, he can notify me.” 1289The district court denied Napster’s request to stay her oral modified order and Napsterimmediately requested <strong>the</strong> Ninth Circuit to issue a stay. On July 18, 2001, <strong>the</strong> Ninth Circuitordered “that <strong>the</strong> order issued by <strong>the</strong> district court <strong>on</strong> July 11, 2001, in open court, modifying <strong>the</strong>Preliminary Injuncti<strong>on</strong> issued March 5, 2001, is hereby stayed pending a fur<strong>the</strong>r order of thiscourt.” 1290 Despite <strong>the</strong> stay of <strong>the</strong> district court’s oral modified order, Napster chose not toresume file sharing through its system.Both Napster and <strong>the</strong> plaintiffs pursued fur<strong>the</strong>r appeals to <strong>the</strong> Ninth Circuit in view of <strong>the</strong>July 11 oral order. The Ninth Circuit c<strong>on</strong>solidated those appeals with <strong>the</strong> earlier appeals of <strong>the</strong>Mar. 5 modified injuncti<strong>on</strong>. Its opini<strong>on</strong> in <strong>the</strong> c<strong>on</strong>solidated appeals is discussed in subsecti<strong>on</strong> 17below.16. Napster’s Moti<strong>on</strong>s to Dismiss <strong>the</strong> Complaints of <strong>the</strong> Independent Artists andAMPAS. While <strong>the</strong> c<strong>on</strong>solidated appeals were pending, Napster filed a moti<strong>on</strong> to dismiss <strong>the</strong>complaints of various independent artists and labels and of AMPAS for failure to state a claim.Napster based its moti<strong>on</strong> <strong>on</strong> <strong>the</strong> Ninth Circuit’s opini<strong>on</strong> in Napster I, which Napster argued1287 “Napster Asks 9 th Circuit to Modify 1 Order, Vacate Ano<strong>the</strong>r,” Mealey’s Cyber Tech & E-Commerce Litigati<strong>on</strong>Reporter (Aug. 2001) 4-5.1288 Id. at 5.1289 Id.1290 Order, A&M Records, Inc. v. Napster, Inc., No. 01-16308 (9 th Cir. July 18, 2001).- 292 -


fundamentally altered copyright liability in <strong>the</strong> <strong>on</strong>line c<strong>on</strong>text. 1291 Napster framed <strong>the</strong> basis forits moti<strong>on</strong> as a pure questi<strong>on</strong> of law – whe<strong>the</strong>r notice is an element of c<strong>on</strong>tributory and vicariouscopyright infringement – and rested <strong>the</strong> moti<strong>on</strong> <strong>on</strong> <strong>the</strong> following two arguments:First, Napster c<strong>on</strong>tends that [Napster I] held that <strong>the</strong> traditi<strong>on</strong>al formulati<strong>on</strong> ofc<strong>on</strong>structive knowledge for c<strong>on</strong>tributory infringement does not apply in <strong>the</strong> digitalrealm. Instead, copyright liability may <strong>on</strong>ly be imposed when a computer serviceprovider has actual knowledge of specific infringing files. Sec<strong>on</strong>d, Napsterbelieves that <strong>the</strong> Ninth Circuit held that notice is a required element for bothc<strong>on</strong>tributory and vicarious infringement. This notice, Napster c<strong>on</strong>tends, must beprovided (1) by plaintiffs (2) prior to suit and (3) must list specific infringingfiles. Additi<strong>on</strong>ally, Napster reads [Napster I] to limit liability for c<strong>on</strong>tributory andvicarious infringement to cases in which after receiving notice, Napster fails todisable <strong>the</strong> infringing material. Simply put, Napster believes that <strong>the</strong> NinthCircuit carved out a special niche in copyright law for computer serviceproviders. 1292In resp<strong>on</strong>se, <strong>the</strong> district court ruled that “<strong>the</strong>re is a simple answer to Napster’s ‘purequesti<strong>on</strong> of law.’ There is no requirement that plaintiffs allege that <strong>the</strong>y provided notice ofspecific infringing works prior to filing suit. The court agrees that computer system operatorscannot be held liable for sec<strong>on</strong>dary copyright liability based solely <strong>on</strong> <strong>the</strong> transmissi<strong>on</strong> ofunidentified (and unidentifiable) material through a computer system. To do o<strong>the</strong>rwise wouldviolate <strong>the</strong> basic tenet of S<strong>on</strong>y. However, according to plaintiffs’ complaints, Napster has g<strong>on</strong>efar bey<strong>on</strong>d simply providing a peer-to-peer file sharing system; it has engaged in music piracy ofmagnificent proporti<strong>on</strong>s.” 1293 Accordingly, <strong>the</strong> court c<strong>on</strong>cluded that <strong>the</strong> plaintiffs hadsufficiently pleaded <strong>the</strong> elements of c<strong>on</strong>tributory and vicarious infringement, and deniedNapster’s moti<strong>on</strong>. 1294The court based its c<strong>on</strong>clusi<strong>on</strong>s <strong>on</strong> various significant interpretati<strong>on</strong>s of <strong>the</strong> Napster Iopini<strong>on</strong> with respect to c<strong>on</strong>tributory and vicarious liability. With respect to c<strong>on</strong>tributoryliability, <strong>the</strong> court noted that under Napster I, <strong>the</strong> sec<strong>on</strong>dary infringer must “know or have reas<strong>on</strong>to know” of <strong>the</strong> direct infringement; “[a]ctual knowledge is not required; a defendant maypossess c<strong>on</strong>structive knowledge if he has reas<strong>on</strong> to know a third party’s direct infringement.” 1295The district court rejected Napster’s argument that Napster I created a stricter standard ofknowledge for service providers in an <strong>on</strong>line c<strong>on</strong>text – namely, actual knowledge in <strong>the</strong> form ofnotice of specific copyrighted works from <strong>the</strong> plaintiffs prior to suit. Napster argued that it couldnot be held liable until such notice was given because its duty under Napster I to disable <strong>the</strong>offending material arose <strong>on</strong>ly after <strong>the</strong> plaintiffs provided notice. 1296 The court ruled that1291 F<strong>on</strong>ovisa v. Napster, Inc., 2002 U.S. Dist. LEXIS 4270 (N.D. Cal. Jan. 28, 2002), at *11.1292 Id. at *11-12.1293 Id. at *38-39 (emphasis in original).1294 Id. at *39.1295 Id. at *14-15.1296 Id. at *15-16.- 293 -


“[c]<strong>on</strong>trary to Napster’s c<strong>on</strong>tenti<strong>on</strong>, Napster I did not create a new knowledge standard forc<strong>on</strong>tributory infringement. Instead, <strong>the</strong> court relied <strong>on</strong> <strong>the</strong> traditi<strong>on</strong>al formulati<strong>on</strong> that ei<strong>the</strong>rc<strong>on</strong>structive or actual knowledge is sufficient to impose liability <strong>on</strong> Napster for c<strong>on</strong>tributoryinfringement.” 1297The district court acknowledged some lack of clarity in <strong>the</strong> Ninth Circuit’s Napster Iopini<strong>on</strong> <strong>on</strong> <strong>the</strong> issue of knowledge, as discussed earlier in this paper: “The court is aware that<strong>the</strong> Ninth Circuit’s reference to actual knowledge and failure to remove access might lead tosome c<strong>on</strong>fusi<strong>on</strong>. Lacking a more definitive statement from <strong>the</strong> Court of Appeals, <strong>the</strong> courtunderstands <strong>the</strong> Ninth Circuit to hold that a range of c<strong>on</strong>duct, when linked to Napster’s system,may give rise to c<strong>on</strong>structive or actual knowledge. C<strong>on</strong>duct sufficient for liability may takeforms o<strong>the</strong>r than as a combinati<strong>on</strong> of actual knowledge and failure to block access. … Plaintiffsallege that Napster knew of music piracy <strong>on</strong> its system, that it had <strong>the</strong> ability to patrol itsdatabase, that Napster had knowledge of some specific infringing files, and did nothing toprevent c<strong>on</strong>tinued infringement. If <strong>the</strong>se allegati<strong>on</strong>s are true, plaintiffs are entitled to at leastpreliminary injunctive relief under <strong>the</strong> reas<strong>on</strong>ing of [Napster I].” 1298With respect to vicarious liability, <strong>the</strong> court noted that Napster had not challenged <strong>the</strong>plaintiffs’ allegati<strong>on</strong>s of c<strong>on</strong>trol and financial interest, but instead had argued that notice is anadditi<strong>on</strong>al required element for both vicarious and c<strong>on</strong>tributory copyright infringement <strong>on</strong> <strong>the</strong>part of <strong>on</strong>line service providers. 1299 The court <strong>the</strong>refore turned to <strong>the</strong> issue of notice as aseparate element of sec<strong>on</strong>dary infringement. Napster based its notice argument <strong>on</strong> <strong>the</strong> NinthCircuit’s modificati<strong>on</strong> in Napster I of <strong>the</strong> district court’s original July 2000 preliminaryinjuncti<strong>on</strong> as being overbroad and its statement that “<strong>the</strong> burden [is] <strong>on</strong> plaintiffs to providenotice to Napster of copyrighted works and files c<strong>on</strong>taining such works available <strong>on</strong> <strong>the</strong> Napstersystem before Napster has <strong>the</strong> duty to disable access to <strong>the</strong> offending c<strong>on</strong>tent.” 1300 Napsterargued that this statement mandated notice as a necessary element of sec<strong>on</strong>dary infringement,and that any complaint failing to allege both notice prior to suit and Napster’s subsequent failureto disable infringing material was deficient. 1301The district court found Napster’s interpretati<strong>on</strong> of <strong>the</strong> Ninth Circuit’s opini<strong>on</strong> to beproblematic:First, Napster reads <strong>the</strong> statement out of c<strong>on</strong>text. The burden-shifting statementup<strong>on</strong> which Napster relies addressed <strong>on</strong>ly <strong>the</strong> scope of injunctive relief. TheNinth Circuit was clearly c<strong>on</strong>cerned with <strong>the</strong> overbreadth of <strong>the</strong> injuncti<strong>on</strong> andbelieved that any liability based solely <strong>on</strong> <strong>the</strong> architecture of Napster’s systemimplicated S<strong>on</strong>y. In tailoring injunctive relief to avoid violating S<strong>on</strong>y, <strong>the</strong> NinthCircuit shifted <strong>the</strong> burden to plaintiffs to provide notice of specific infringing1297 Id. at *16.1298 Id. at *23-24.1299 Id. at *26.1300 Id. at *28-29 (quoting Napster I, 239 F.3d at 1027).1301 F<strong>on</strong>ovisa v. Napster, 2002 U.S. Dist. LEXIS 4270, at *29.- 294 -


works and files. This burden-shifting alleviated c<strong>on</strong>cerns that Napster was beingpenalized simply because of its peer-to-peer file sharing system. Morefundamentally, <strong>the</strong> Ninth Circuit’s modificati<strong>on</strong> balanced <strong>the</strong> broad equitablediscreti<strong>on</strong> of this court with <strong>the</strong> doctrine that injunctive relief should avoidprohibiting legitimate c<strong>on</strong>duct. … Simply put, <strong>the</strong> Ninth Circuit’s burden-shiftingis case-specific, designed to alleviate S<strong>on</strong>y c<strong>on</strong>cerns. 1302Moreover, <strong>the</strong> district court was troubled that Napster’s argument might imply that evenif it had actual knowledge of specific infringement, Napster could simply wait until <strong>the</strong> plaintiffsdiscovered <strong>the</strong> infringement and <strong>the</strong>n remove <strong>the</strong> offending files. The court believed such anargument would turn copyright law <strong>on</strong> its head and encourage willful blindness. 1303 Finally, <strong>the</strong>court expressed <strong>the</strong> belief that, had <strong>the</strong> Ninth Circuit intended to overhaul copyright liability andcarve out special protecti<strong>on</strong>s for computer service providers, “it would have explicitly statedsuch a change.” 1304 Accordingly, <strong>the</strong> court c<strong>on</strong>cluded that <strong>the</strong> plaintiffs had adequately pleadedclaims for c<strong>on</strong>tributory and vicarious liability. 130517. The Sec<strong>on</strong>d, C<strong>on</strong>solidated Appeal to <strong>the</strong> Ninth Circuit. In <strong>the</strong> sec<strong>on</strong>d appeal to <strong>the</strong>Ninth Circuit, Napster argued that <strong>the</strong> notificati<strong>on</strong> requirements imposed <strong>on</strong> <strong>the</strong> plaintiffs by <strong>the</strong>Mar. 5 modified injuncti<strong>on</strong> were mandated by <strong>the</strong> Ninth Circuit’s opini<strong>on</strong> in Napster I, and thateven if <strong>the</strong>y were not, <strong>the</strong>ir impositi<strong>on</strong> was not an abuse of discreti<strong>on</strong> by <strong>the</strong> district court.However, Napster argued that <strong>the</strong> policing obligati<strong>on</strong>s of <strong>the</strong> Mar. 5 modified injuncti<strong>on</strong> weretoo indeterminate to meet <strong>the</strong> requirements of Rule 65 of <strong>the</strong> Federal Rules of Civil Procedure,because <strong>the</strong> Mar. 5 order did not specify <strong>the</strong> extent, and at what cost, Napster was required todischarge its policing obligati<strong>on</strong>s. Unless clarified, Napster argued that <strong>the</strong> policing obligati<strong>on</strong>swould potentially authorize massive blocking of n<strong>on</strong>infringing works. Napster also argued that<strong>the</strong> Mar. 5 order impermissibly delegated judicial functi<strong>on</strong>s to Dr. Nichols. 1306With respect to <strong>the</strong> July 11 oral order, Napster argued that <strong>the</strong> district court lackedjurisdicti<strong>on</strong> to issue <strong>the</strong> order because it c<strong>on</strong>stituted a modificati<strong>on</strong> of <strong>the</strong> Mar. 5 order, whichwas <strong>on</strong> appeal. Napster noted that <strong>the</strong> Ninth Circuit, in its stay order, had itself characterized <strong>the</strong>1302 Id. at *30.1303 Id. at *31.1304 Id. at *33. The court also rejected Napster’s interpretati<strong>on</strong> of <strong>the</strong> Netcom decisi<strong>on</strong>, discussed in Secti<strong>on</strong>II.A.4(a) above, as requiring notice of specific infringing files prior to filing suit. “Notice was an issue inNetcom <strong>on</strong>ly because notice was <strong>the</strong> means by which Netcom acquired knowledge of infringement. It wasundisputed that prior to notice Netcom did not have <strong>the</strong> requisite knowledge for c<strong>on</strong>tributory infringement. …[T]he issue in <strong>the</strong> present acti<strong>on</strong>s is not how Napster came by knowledge of infringement, but whe<strong>the</strong>r suchknowledge exists.” Id. at *35-36. The district court found <strong>the</strong> Ninth Circuit’s reading of Netcom in Napster Ito be in accord. “The Ninth Circuit noted that <strong>the</strong> situati<strong>on</strong> in Netcom, where a computer service provider hasactual knowledge of specific infringing files, is sufficient to give rise to liability. The court never stated thatactual knowledge (or notice for that matter) was necessary for liability.” Id. at *36-37 (emphasis in original).1305 Id. at *39.1306 “Napster Asks 9 th Circuit to Modify 1 Order, Vacate Ano<strong>the</strong>r,” Mealey’s Cyber Tech & E-Commerce Litigati<strong>on</strong>Reporter (Aug. 2001) 5-6.- 295 -


July 11 order as “modifying” <strong>the</strong> Mar. 5 order. 1307 Napster also argued that, in any event, <strong>the</strong>July 11 order’s “zero tolerance” standard was fundamentally at odds with <strong>the</strong> Ninth Circuitruling in Napster I. 1308 The plaintiffs, in turn, challenged <strong>the</strong> requirements of <strong>the</strong> preliminaryinjuncti<strong>on</strong>s that <strong>the</strong>y provide to Napster file names found <strong>on</strong> <strong>the</strong> Napster index that corresp<strong>on</strong>dedto <strong>the</strong>ir copyrighted works before Napster had a duty to act <strong>on</strong> those files.On appeal, <strong>the</strong> Ninth Circuit rejected most of <strong>the</strong> arguments of both Napster and <strong>the</strong>plaintiffs in a very sparse opini<strong>on</strong> that will be referred to as “Napster II.” 1309 With respect to <strong>the</strong>plaintiffs’ argument that it should not have to supply file names to Napster and that Napstershould instead be required to search for and block all files c<strong>on</strong>taining any protected copyrightedworks, not just works with which plaintiffs had been able to provide a corresp<strong>on</strong>ding file name,<strong>the</strong> Ninth Circuit ruled that <strong>the</strong> notice requirements of <strong>the</strong> preliminary injuncti<strong>on</strong>s complied withits holding in Napster I that <strong>the</strong> plaintiffs bore <strong>the</strong> burden to provide notice to Napster ofcopyrighted works and files c<strong>on</strong>taining such works before Napster had a duty to disable access to<strong>the</strong> offending c<strong>on</strong>tent. 1310 The court fur<strong>the</strong>r held that “Napster’s duty to search under <strong>the</strong>modified preliminary injuncti<strong>on</strong> is c<strong>on</strong>sistent with our holding that Napster must ‘affirmativelyuse its ability to patrol its system and preclude access to potentially infringing files listed <strong>on</strong> itssearch index.’ The modified preliminary injuncti<strong>on</strong> correctly reflects <strong>the</strong> legal principles ofc<strong>on</strong>tributory and vicarious copyright infringement that we previously articulated.” 1311 Thus, <strong>the</strong>Ninth Circuit’s Napster II opini<strong>on</strong> appears to establish a legal rule under which <strong>the</strong>re is a noticerequirement both for <strong>the</strong> impositi<strong>on</strong> of comm<strong>on</strong> law c<strong>on</strong>tributory liability and vicarious liability<strong>on</strong> an OSP, c<strong>on</strong>trary to <strong>the</strong> district court’s c<strong>on</strong>clusi<strong>on</strong> o<strong>the</strong>rwise in its opini<strong>on</strong> <strong>on</strong> Napster’smoti<strong>on</strong> to dismiss, discussed in subsecti<strong>on</strong> 17 above. 1312The Ninth Circuit rejected Napster’s challenge to <strong>the</strong> preliminary injuncti<strong>on</strong> asimpermissibly vague. The court’s very terse resp<strong>on</strong>se was as follows: “Napster has a duty topolice its system in order to avoid vicarious infringement. Napster can police <strong>the</strong> system bysearching its index for files c<strong>on</strong>taining a noticed copyrighted work. The modified preliminaryinjuncti<strong>on</strong> directs Napster, in no vague terms, to do exactly that.” 1313 The court also rejectedNapster’s argument that <strong>the</strong> district court had improperly delegated its judicial authority to Dr.Nichols: “At no time did <strong>the</strong> technical advisor displace <strong>the</strong> district court’s judicial role. Thetechnical advisor never unilaterally issued findings of fact or c<strong>on</strong>clusi<strong>on</strong>s of law regardingNapster’s compliance.” 13141307 Id. at 6.1308 Id.1309 A&M Records, Inc. v. Napster, Inc., 284 F.3d 1091 (9 th Cir. 2002).1310 Id. at 1096.1311 Id. at 1096-97 (quoting Napster I, 239 F.3d at 1027).1312 This rule would not, however, appear to survive <strong>the</strong> Supreme Court’s decisi<strong>on</strong> in Metro-Goldwyn-MayerStudios Inc. v. Grokster, Ltd., 125 S. Ct. 2764, 2770 (2005), discussed in Secti<strong>on</strong> III.C.4(a) below.1313 Napster II, 284 F.3d at 1097.1314 Id.- 296 -


Next, <strong>the</strong> court turned to Napster’s challenge that <strong>the</strong> shut down order improperlyamended <strong>the</strong> modified preliminary injuncti<strong>on</strong> by requiring a n<strong>on</strong>-text-based filtering mechanismand a “zero tolerance” standard for compliance. The Ninth Circuit rejected each of <strong>the</strong>sechallenges. The court apparently found that <strong>the</strong> requirement of a n<strong>on</strong>-text-based filteringmechanism did not violate <strong>the</strong> court’s ruling in Napster I that Napster’s duty to policy was“cabined by <strong>the</strong> system’s current architecture,” 1315 because <strong>the</strong> new filtering mechanism “stillrequires Napster to search files located <strong>on</strong> <strong>the</strong> index to locate infringing material.” 1316 Thus, <strong>the</strong>court appears to have viewed <strong>the</strong> “architecture” of <strong>the</strong> Napster system as index based, ra<strong>the</strong>r thantext based. 1317 Moreover, <strong>the</strong> Ninth Circuit noted that a district court has inherent authority tomodify a preliminary injuncti<strong>on</strong> in c<strong>on</strong>siderati<strong>on</strong> of new facts. “The text-based filter proved tobe vulnerable to user-defined variati<strong>on</strong>s in file names. The new filtering mechanism, <strong>on</strong> <strong>the</strong>o<strong>the</strong>r hand, does not depend <strong>on</strong> file names and thus is not similarly susceptible to bypass. It wasa proper exercise of <strong>the</strong> district court’s supervisory authority to require use of <strong>the</strong> new filteringmechanism, which may counter Napster’s inability to fully comply with <strong>the</strong> modifiedpreliminary injuncti<strong>on</strong>.” 1318 This is a substantial ruling, as it appears to allow a district court torequire an OSP to adopt new technologies that may become available in order to keep infringingmaterials off its system.With respect to <strong>the</strong> “zero tolerance” challenge, <strong>the</strong> Ninth Circuit ruled that <strong>the</strong> districtcourt’s impositi<strong>on</strong> of a “zero tolerance” standard was permissible because that standard did notapply to all potentially infringing works <strong>on</strong> Napster’s system, but <strong>on</strong>ly to those works that hadbeen noticed by <strong>the</strong> plaintiff:The district court did not, as Napster argues, premise <strong>the</strong> shut down order <strong>on</strong> arequirement that Napster must prevent infringement of all of plaintiffs’copyrighted works, without regard to plaintiffs’ duty to provide notice. Thetolerance standard announced applies <strong>on</strong>ly to copyrighted works which plaintiffshave properly noticed as required by <strong>the</strong> modified preliminary injuncti<strong>on</strong>. That is,Napster must do everything feasible to block files from its system which c<strong>on</strong>tainnoticed copyrighted works. … The district court determined that more could bed<strong>on</strong>e to maximize <strong>the</strong> effectiveness of <strong>the</strong> new filtering mechanism. Ordering1315 Napster I, 239 F.3d at 1024.1316 Napster II, 284 F.3d at 1098.1317 It appears that <strong>the</strong> Ninth Circuit did not fully understand <strong>the</strong> n<strong>on</strong>-text-based filtering mechanism that <strong>the</strong> districtcourt required Napster to use. As discussed in subsecti<strong>on</strong> 15, that alternative filtering technology known as“fileID,” unlike <strong>the</strong> old technology, was not based primarily <strong>on</strong> textual filenames, but ra<strong>the</strong>r <strong>on</strong> a technicalanalysis of <strong>the</strong> digital musical c<strong>on</strong>tent c<strong>on</strong>tained in a file, including acoustic waveform recogniti<strong>on</strong>, to generatea “fingerprint.” Napster combined <strong>the</strong> fileID technology with its textual filename search technology using <strong>the</strong>index, but <strong>the</strong> fileID technology required a fundamentally different approach to identifying potentiallyinfringing works. However, <strong>the</strong> fact that Napster c<strong>on</strong>tinued to maintain an index appears to have led <strong>the</strong> NinthCircuit to c<strong>on</strong>clude ra<strong>the</strong>r facilely that requiring <strong>the</strong> use of fileID technology did not c<strong>on</strong>stitute a departure from<strong>the</strong> original Napster system “architecture,” when in fact it required a radically different approach.1318 Id. at 1098.- 297 -


Napster to keep its file transferring service disabled in <strong>the</strong>se circumstances wasnot an abuse of discreti<strong>on</strong>. 1319Even with this clarificati<strong>on</strong> of <strong>the</strong> “zero tolerance” standard, <strong>the</strong> Ninth Circuit’sallowance of that standard may pose a formidable challenge for many OSPs seeking to avoidliability for copyright infringement. It seems unlikely that any technology for identifying andblocking infringing works <strong>on</strong> a system will be completely foolproof. And how far must an OSPgo to do “everything feasible” to block noticed copyrighted works – must it c<strong>on</strong>stantly upgradeits technology to <strong>the</strong> most leading, perhaps unproven, technology? Where is <strong>the</strong> line <strong>on</strong> what is“feasible”?Finally, <strong>the</strong> Ninth Circuit rejected Napster’s challenge that <strong>the</strong> district court lackedauthority to modify <strong>the</strong> preliminary injuncti<strong>on</strong> pending appeal. The court noted that, although adistrict court cannot, while a preliminary injuncti<strong>on</strong> is <strong>on</strong> appeal, modify <strong>the</strong> injuncti<strong>on</strong> in suchmanner as to finally adjudicate substantial rights directly involved in <strong>the</strong> appeal, it can, underFederal Rule of Civil Procedure 62(c), c<strong>on</strong>tinue supervisi<strong>on</strong> of compliance with <strong>the</strong> injuncti<strong>on</strong>.The Ninth Circuit ruled that <strong>the</strong> district court had properly exercised its power under thisRule. 1320 Accordingly, <strong>the</strong> court affirmed both <strong>the</strong> modified preliminary injuncti<strong>on</strong> and <strong>the</strong> shutdown order, noting that <strong>the</strong> “shut down order was a proper exercise of <strong>the</strong> district court’s powerto enforce compliance with <strong>the</strong> modified preliminary injuncti<strong>on</strong>.” 132118. Moti<strong>on</strong>s for Summary Judgment and for Discovery <strong>on</strong> Misuse Theory andOwnership Questi<strong>on</strong>s. While <strong>the</strong> sec<strong>on</strong>d c<strong>on</strong>solidated appeal was pending, <strong>the</strong> plaintiffs filedmoti<strong>on</strong>s in <strong>the</strong> district court for summary judgment of willful c<strong>on</strong>tributory and vicariouscopyright infringement. Napster requested, pursuant to Rule 56(f) of <strong>the</strong> Federal Rules of CivilProcedure, that <strong>the</strong> court stay any decisi<strong>on</strong> <strong>on</strong> <strong>the</strong> merits to allow for additi<strong>on</strong>al discovery <strong>on</strong> <strong>the</strong>questi<strong>on</strong>s of (i) whe<strong>the</strong>r <strong>the</strong> plaintiffs actually owned <strong>the</strong> rights to <strong>the</strong> musical works for which<strong>the</strong>y alleged infringement and (ii) whe<strong>the</strong>r <strong>the</strong> plaintiffs had misused <strong>the</strong>ir copyrights byattempting to c<strong>on</strong>trol <strong>the</strong> market for <strong>the</strong> digital distributi<strong>on</strong> of music. 1322With respect to <strong>the</strong> ownership issues, <strong>the</strong> plaintiffs rested <strong>on</strong> <strong>the</strong> legal rule that acopyright certificate establishes prima facie evidence of <strong>the</strong> validity of a copyright and <strong>the</strong> factsin <strong>the</strong> certificate. 1323 Napster challenged <strong>the</strong> presumpti<strong>on</strong> of ownership set up by <strong>the</strong> certificates,arguing that in 133 of <strong>the</strong> 144 copyright certificates submitted with <strong>the</strong> complaint, <strong>the</strong> registeredworks were incorrectly designated as “works for hire.” The plaintiffs, in turn, challenged1319 Id.1320 Id. at 1099.1321 Id.1322 In re Napster Inc. <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Litigati<strong>on</strong>, 191 F. Supp. 2d 1087, 1093 (N.D. Cal. 2002). Napster also alleged that<strong>the</strong>re were disputed issues of fact with respect to “plaintiffs’ ownership of <strong>the</strong> copyrighted works at issue,copying of <strong>the</strong> works, fair use, <strong>the</strong> applicati<strong>on</strong> of S<strong>on</strong>y, <strong>the</strong> extent of Napster’s c<strong>on</strong>trol over its system and itspolicing obligati<strong>on</strong>, <strong>the</strong> extent of <strong>the</strong> Napster system’s architecture, <strong>the</strong> sufficiency of plaintiffs’ notices andNapster’s removal of those works, applicati<strong>on</strong> of <strong>the</strong> Digital Millennium <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act, copyright misuse, andwillfulness.” Id. at 1095 n.1.1323 17 U.S.C. § 410(c).- 298 -


Napster’s standing to challenge <strong>the</strong> presumpti<strong>on</strong> of ownership. The court noted a line of casesholding that a third party does not have standing to challenge <strong>the</strong> presumpti<strong>on</strong> of ownershipwhen a plaintiff claims ownership by assignment, but ruled that <strong>the</strong> third-party standing doctrinedoes not apply in instances of ownership by authorship. Accordingly, Napster had standing tochallenge whe<strong>the</strong>r <strong>the</strong> works in suit were works for hire. 1324The court held that <strong>the</strong>re were substantial questi<strong>on</strong>s raised by Napster <strong>on</strong> which it wasentitled to take discovery with respect to whe<strong>the</strong>r <strong>the</strong> plaintiffs could satisfy ei<strong>the</strong>r of <strong>the</strong> twopr<strong>on</strong>gs of <strong>the</strong> definiti<strong>on</strong> of “work made for hire.” 1325 With respect to <strong>the</strong> “speciallycommissi<strong>on</strong>ed” pr<strong>on</strong>g of <strong>the</strong> definiti<strong>on</strong>, <strong>the</strong> court noted that sound recordings are not <strong>on</strong>e of <strong>the</strong>nine types of specially commissi<strong>on</strong>ed works listed in <strong>the</strong> definiti<strong>on</strong> that can qualify as worksmade for hire. With respect to <strong>the</strong> “employment” pr<strong>on</strong>g of <strong>the</strong> definiti<strong>on</strong>, <strong>the</strong> court noted that <strong>the</strong>plaintiffs had produced no c<strong>on</strong>tracts with artists to dem<strong>on</strong>strate an employment relati<strong>on</strong>ship. 1326The court ordered <strong>the</strong> plaintiffs to produce all documentati<strong>on</strong> relevant to <strong>the</strong>ir ownership of <strong>the</strong>works listed as works for hire to a Special Master appointed by <strong>the</strong> court to review <strong>the</strong>m. Thecourt specifically withheld any rulings <strong>on</strong> <strong>the</strong> work for hire issue, <strong>the</strong> scope of <strong>the</strong> plaintiffs’rights, and <strong>the</strong> extent to which <strong>the</strong> plaintiffs were protected by <strong>the</strong> presumpti<strong>on</strong> of ownershipuntil fur<strong>the</strong>r discovery was completed. 1327The court <strong>the</strong>n turned to Napster’s need for discovery <strong>on</strong> its allegati<strong>on</strong>s of copyrightmisuse by <strong>the</strong> plaintiffs. The court first noted that, although both itself and <strong>the</strong> Ninth Circuit haddismissed Napster’s misuse defense at <strong>the</strong> preliminary injuncti<strong>on</strong> stage, “[s]ince those rulings,<strong>the</strong> factual and procedural landscape has changed significantly. … The evidence now shows thatplaintiffs have licensed <strong>the</strong>ir catalogs of works for digital distributi<strong>on</strong> in what could be anoverreaching manner. The evidence also suggests that plaintiffs’ entry into <strong>the</strong> digitaldistributi<strong>on</strong> market may run afoul of <strong>the</strong> antitrust laws.” 13281324 In re Napster <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Litigati<strong>on</strong>, 191 F. Supp. 2d at 1097-98.1325 17 U.S.C. § 101 defines a “work made for hire” as “(1) a work prepared by an employee within <strong>the</strong> scope of hisor her employment; or (2) a work specially ordered or commissi<strong>on</strong>ed for use as a c<strong>on</strong>tributi<strong>on</strong> to a collectivework, as a part of a moti<strong>on</strong> picture or o<strong>the</strong>r audiovisual work, as a translati<strong>on</strong>, as a supplementary work, as acompilati<strong>on</strong>, as an instructi<strong>on</strong>al text, as a test, as answer material for a test, or as an atlas, if <strong>the</strong> parties expresslyagree in a written instrument signed by <strong>the</strong>m that <strong>the</strong> work shall be c<strong>on</strong>sidered a work made for hire. For <strong>the</strong>purpose of <strong>the</strong> foregoing sentence, a ‘supplementary work’ is a work prepared for publicati<strong>on</strong> as a sec<strong>on</strong>daryadjunct to a work by ano<strong>the</strong>r author for <strong>the</strong> purpose of introducing, c<strong>on</strong>cluding, illustrating, explaining,revising, commenting up<strong>on</strong>, or assisting in <strong>the</strong> use of <strong>the</strong> o<strong>the</strong>r work, such as forewords, afterwords, pictorialillustrati<strong>on</strong>s, maps, charts, tables, editorial notes, musical arrangements, answer material for tests,bibliographies, appendixes, and indexes, and an ‘instructi<strong>on</strong>al text’ is a literary, pictorial, or graphic workprepared for publicati<strong>on</strong> and with <strong>the</strong> purpose of use in systematic instructi<strong>on</strong>al activities.”1326 In re Napster <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Litigati<strong>on</strong>, 191 F. Supp. 2d. at 1098.1327 Id. at 1100. The court fur<strong>the</strong>r ruled that, with respect to works listing an author o<strong>the</strong>r than <strong>the</strong> plaintiffs <strong>on</strong> <strong>the</strong>registrati<strong>on</strong> certificate and works protected under state law, <strong>the</strong> plaintiffs would be obliged to produce a chainof title from <strong>the</strong> listed author to <strong>the</strong>mselves. Id. at 1101. Works with pending registrati<strong>on</strong>s would be given <strong>the</strong>benefit of <strong>the</strong> presumpti<strong>on</strong> of ownership. Id. Finally, for those works for which <strong>the</strong> plaintiffs had not yet filedan applicati<strong>on</strong> for registrati<strong>on</strong>, <strong>the</strong> court ruled that it lacked subject matter jurisdicti<strong>on</strong>. Id.1328 Id. at 1102 (citati<strong>on</strong>s omitted).- 299 -


Napster based its allegati<strong>on</strong>s of misuse <strong>on</strong> unduly restrictive licensing requirements of <strong>the</strong>plaintiffs’ <strong>on</strong>line music venture, MusicNet, with which Napster had entered into a licenseagreement. That agreement prevented Napster from entering into any licensing agreement withany individual plaintiffs until March 1, 2002 and provided that even after March 2002, if Napsterentered into any individual license with any of <strong>the</strong> plaintiffs, MusicNet could terminate <strong>the</strong>agreement up<strong>on</strong> 90 days notice. Additi<strong>on</strong>ally, <strong>the</strong> license set up a pricing structure under whichNapster would be charged higher fees if it failed to use MusicNet as its exclusive licensor forc<strong>on</strong>tent. 1329 The court held that <strong>the</strong>se provisi<strong>on</strong>s effectively granted MusicNet c<strong>on</strong>trol overwhich c<strong>on</strong>tent Napster licensed. “The result is an expansi<strong>on</strong> of <strong>the</strong> powers of <strong>the</strong> three MusicNetplaintiffs’ copyrights to cover <strong>the</strong> catalogs of <strong>the</strong> two n<strong>on</strong>-MusicNet plaintiffs.” 1330 The courtnoted that fur<strong>the</strong>r inquiry into <strong>the</strong> acti<strong>on</strong>s of MusicNet, and whe<strong>the</strong>r those acti<strong>on</strong>s should beimputed to <strong>the</strong> plaintiffs, was warranted. 1331The court also found that Napster had raised substantial issues of whe<strong>the</strong>r <strong>the</strong> plaintiffs’entry into <strong>the</strong> digital distributi<strong>on</strong> market c<strong>on</strong>stituted antitrust violati<strong>on</strong>s. “[E]ven a naïf mustrealize that in forming and operating a joint venture, plaintiffs’ representatives must necessarilymeet and discuss pricing and licensing, raising <strong>the</strong> specter of possible antitrust violati<strong>on</strong>s. Thesejoint ventures bear <strong>the</strong> indicia of entities designed to allow plaintiffs to use <strong>the</strong>ir copyrights andextensive market power to dominate <strong>the</strong> market for digital music distributi<strong>on</strong>. Even <strong>on</strong> <strong>the</strong>undeveloped record before <strong>the</strong> court, <strong>the</strong>se joint ventures look bad, sound bad and smell bad.” 1332Accordingly, <strong>the</strong> court granted Napster’s Rule 56(f) moti<strong>on</strong> for fur<strong>the</strong>r discovery into <strong>the</strong>antitrust and misuse issues raised by Napster. 1333 Such discovery was subsequently stayed as <strong>the</strong>result of filing of bankruptcy by Napster in June of 2002. On August 9, 2002, Napster’s assetswere placed up for aucti<strong>on</strong> in <strong>the</strong> bankruptcy proceeding. 13341329 Id. at 1105-06.1330 Id. at 1106.1331 Id. at 1107. The court fur<strong>the</strong>r noted that, if <strong>the</strong> plaintiffs were engaged in misuse, <strong>the</strong>y could not bring suitbased <strong>on</strong> <strong>the</strong>ir rights until <strong>the</strong> misuse ended, although <strong>the</strong> misuse would not ultimately preclude recovery forinfringement: “The doctrine [of misuse] does not prevent plaintiffs from ultimately recovering for acts ofinfringement that occur during <strong>the</strong> period of misuse. The issue focuses <strong>on</strong> when plaintiffs can bring or pursuean acti<strong>on</strong> for infringement, not for which acts of infringement <strong>the</strong>y can recover.” Id. at 1108.The court also rejected <strong>the</strong> plaintiffs’ argument that Napster should not be allowed to assert a misuse defensebecause of its own unclean hands. Because <strong>the</strong> plaintiffs had <strong>the</strong>mselves sought equitable relief from <strong>the</strong> court,Napster should not be barred from bringing an equitable defense. Id. at 1110-11. In any event, up<strong>on</strong> abalancing of equities, <strong>the</strong> court c<strong>on</strong>cluded that “<strong>the</strong> potential for public injury and <strong>the</strong> fact that Napster has shutits doors to infringement justifies allowing Napster to assert a misuse defense to obtain additi<strong>on</strong>al discovery.”Id. at 1113.1332 Id. at 1109 (citati<strong>on</strong>s omitted).1333 Id. at 1113.1334 Scarlett Pruitt, “Napster Assets Go Up for Aucti<strong>on</strong>” (Aug. 12, 2002), available as of Aug. 12, 2002 atwww.infoworld.com/articles/hn/xml/02/08/12/020812hnnapster.xml.- 300 -


(2) The Scour.com LawsuitAno<strong>the</strong>r case challenged <strong>the</strong> legality of peer-to-peer file sharing through a service similarto <strong>the</strong> Napster service. On July 20, 2000, several leading moti<strong>on</strong> picture studios, recordcompanies, and music publishers filed a copyright infringement acti<strong>on</strong> in federal district court inNew York against Scour, Inc., operator of an <strong>on</strong>line file sharing service known as <strong>the</strong> ScourExchange. Unlike <strong>the</strong> Napster service, which was limited to <strong>the</strong> exchange of music files in MP3format, <strong>the</strong> Scour Exchange enabled <strong>the</strong> peer-to-peer exchange of both music and moti<strong>on</strong> picturefiles am<strong>on</strong>g <strong>the</strong> hard drives of Scour users. The Scour website featured a banner c<strong>on</strong>taining a“Top Five” search list, identifying current hit moti<strong>on</strong> picture titles and music recordings that hadbeen requested most frequently by Scour users. 1335Like <strong>the</strong> Napster service, Scour’s website provided users with free copies of itsproprietary file sharing software, which users could use to c<strong>on</strong>nect to Scour’s servers and choosewhich c<strong>on</strong>tent files stored <strong>on</strong> <strong>the</strong>ir computer hard drives <strong>the</strong>y wished to make available for o<strong>the</strong>rScour users to download. Scour <strong>the</strong>n inventoried <strong>the</strong> files each user had so designated andcombined <strong>the</strong>m in a database and directory that was made available <strong>on</strong> Scour’s servers to allScour users currently logged <strong>on</strong>. Users could search <strong>the</strong> directory and initiate downloads ofdesired material from o<strong>the</strong>r users’ computers. 1336 Unlike Napster, however, Scour also madeavailable through a partnership with a third party a service that provided secure storage space forfiles <strong>on</strong> a remote server. The service provided what Scour promoted as “free, secure, <strong>on</strong>linestorage space for all <strong>the</strong> multimedia files that you find <strong>on</strong> Scour.” Through this service, Scourusers were able to upload <strong>the</strong>ir files <strong>on</strong>to this remote server for o<strong>the</strong>r Scour users to download,regardless of whe<strong>the</strong>r <strong>the</strong> originating user was logged <strong>on</strong> to Scour’s servers. 1337 The plaintiffsalleged that Scour was c<strong>on</strong>tributorily and vicariously liable for <strong>the</strong> infringing downloads ofcopyrighted material by Scour’s users. 1338The defense of <strong>the</strong> lawsuit proved too costly for Scour, and <strong>on</strong> October 13, 2000, Scourfiled for Chapter 11 bankruptcy protecti<strong>on</strong>. 1339 On Nov. 14, 2000, Scour announced that itwould shut down its exchange service in order facilitate a resoluti<strong>on</strong> of <strong>the</strong> copyrightinfringement litigati<strong>on</strong> and <strong>the</strong> sale of its assets, which Listen.com had offered to purchase for $5milli<strong>on</strong> in cash and more than 500,000 shares of stock. 13401335 Complaint, Twentieth Century Fox Film Corp. v. Scour, Inc., No. 00 Civ. 5385 (GBD) (S.D.N.Y., filed July 20,2000) 1-2, available as of Dec. 16, 2000 at www.mpaa.org/press/scourcomplaint.htm.1336 Id. 58.1337 Id. 60.1338 Id. 71.1339 Jim Hu, “Scour Files for Bankruptcy Protecti<strong>on</strong>” (Oct. 13, 2000), available as of Dec. 16, 2000 athttp://news.cnet.com/news/0-1005-200-3178822.html.1340 Steven Musil, “Scour to End File-Swapping Service” (Nov. 14, 2000), available as of Dec. 16, 2000 athttp://news.cnet.com/news/0-1005-200-3689821.html.- 301 -


(3) The Aimster/Madster LawsuitsOn April 30, 2001 a company called Aimster, which was operating a file swappingservice very similar to <strong>the</strong> Scour service, filed suit in federal court in Albany, New York againstvarious members of <strong>the</strong> RIAA for a declaratory judgment that it was not sec<strong>on</strong>darily liable forcopyright infringement by users of its service to swap allegedly infringing material. TheAimster service was based <strong>on</strong> a peer-to-peer technology, but was different from Napster andScour in that files were traded in an encrypted format which Aimster claimed prevented it fromhaving knowledge of when its users were exchanging files, <strong>the</strong> identity of pers<strong>on</strong>s exchangingfiles, or what files were being exchanged through its service. 1341The Aimster service was based <strong>on</strong> instant messaging (IM) technology from AOL.Specifically, Aimster made use of AOL IM’s “get file” functi<strong>on</strong>ality, which gave AOL IM users<strong>the</strong> ability to designate certain files or directories <strong>on</strong> <strong>the</strong> user’s hard drive that would be madeavailable for o<strong>the</strong>r IM users to copy. The native “get file” functi<strong>on</strong>ality in AOL was limited intwo ways. First, a user could retrieve files <strong>on</strong>ly from a list of his or her known “buddies” whowere logged <strong>on</strong> at <strong>the</strong> same time. Sec<strong>on</strong>d, <strong>the</strong>re was no capability to search <strong>the</strong> files that wereavailable from a buddy; <strong>the</strong> user was required to know <strong>the</strong> particular file that was being sought<strong>on</strong> <strong>the</strong> buddy’s hard drive before that file could be fetched. 1342The Aimster service c<strong>on</strong>siderably expanded up<strong>on</strong> <strong>the</strong> basic file transferring capability of<strong>the</strong> AOL IM system by designating every Aimster user as <strong>the</strong> buddy of every o<strong>the</strong>r Aimster user,<strong>the</strong>reby allowing all Aimster users to communicate and share files with any o<strong>the</strong>r Aimster usercurrently <strong>on</strong>line. The Aimster service also afforded its users <strong>the</strong> capability to search all <strong>the</strong> filesc<strong>on</strong>tained <strong>on</strong> <strong>the</strong> hard drives of o<strong>the</strong>r users that had been designated for sharing. 1343 Once <strong>the</strong>search for a suitable file was complete, an Aimster user needed <strong>on</strong>ly to click <strong>on</strong> <strong>the</strong> file nametitle and <strong>the</strong>n click <strong>on</strong> a “Download” butt<strong>on</strong> to obtain a copy of <strong>the</strong> s<strong>on</strong>g. The Aimster system<strong>the</strong>n facilitated <strong>the</strong> c<strong>on</strong>necti<strong>on</strong> of its two users though a private, encrypted network so <strong>the</strong> filecould be transferred. During <strong>the</strong> copying of a file, <strong>the</strong> Aimster system provided a c<strong>on</strong>stantupdate about <strong>the</strong> status of each download or upload. 1344The Aimster service c<strong>on</strong>tained several additi<strong>on</strong>al features that ultimately proved relevantto <strong>the</strong> analysis of copyright infringement. First, located for a time <strong>on</strong> Aimster’s web site was autility called “Aimster’s Guardian Tutorial,” which dem<strong>on</strong>strated how to transfer and copycopyrighted works over <strong>the</strong> Aimster system using as illustrative <strong>on</strong>-screen examples some of <strong>the</strong>copyrighted works of RIAA members. Sec<strong>on</strong>d, Aimster’s service offered message boards <strong>on</strong>which Aimster users wishing to download particular copyrighted recordings could seek <strong>the</strong>assistance of o<strong>the</strong>rs. In additi<strong>on</strong>, users often posted messages <strong>on</strong> <strong>the</strong>se boards openly discussing1341 In re Aimster <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Litigati<strong>on</strong>, 252 F. Supp. 2d 634, 641 (N.D. Ill. 2002).1342 Id. at 640.1343 Id. at 642. The parties hotly disputed whe<strong>the</strong>r Aimster catalogued all available files for download in a single,centralized database, akin to <strong>the</strong> Napster system. In issuing its preliminary injuncti<strong>on</strong>, <strong>the</strong> court noted that itslegal analysis of <strong>the</strong> copyright issues would hold regardless of whe<strong>the</strong>r or not Aimster maintained a centraldatabase of files available for transfer. Id. at 641 n.6.1344 Id. at 642-43- 302 -


trafficking in copyrighted material and “screwing” <strong>the</strong> RIAA. 1345 Finally, in November 2001,Aimster launched a service called “Club Aimster,” which required a $4.95 m<strong>on</strong>thly service fee,for which users were given access to a list of “The Aimster Top-40,” a list of <strong>the</strong> 40 “hot newreleases” most frequently downloaded by Aimster users, virtually all of which were owned byRIAA members. Each Aimster Top 40 selecti<strong>on</strong> included a Play butt<strong>on</strong> that a user could click toautomatically begin <strong>the</strong> copying and transfer of that particular s<strong>on</strong>g to <strong>the</strong> user’s computerwithout <strong>the</strong> inc<strong>on</strong>venience of having to type in an Aimster search request. At <strong>on</strong>e point, Aimsterchanged it procedures to require all prospective users to join Club Aimster in order to be able todownload <strong>the</strong> Aimster client software. 1346On May 24, 2001, various members of <strong>the</strong> RIAA resp<strong>on</strong>ded to Aimster’s declaratoryjudgment lawsuit by filing copyright infringement lawsuits against BuddyUSA and AbovePeer,corporate entities that owned <strong>the</strong> Aimster software and file swapping service, and Johnny Deep,CEO of Aimster, in federal court in Manhattan. 1347 On May 29, 2001, <strong>the</strong>se lawsuits were stayedby <strong>the</strong> court in Albany, 1348 although <strong>the</strong> stay was lifted <strong>on</strong> June 22. 1349 On June 27, seven majormoti<strong>on</strong> picture studios also filed suit against Deep, BuddyUSA and AbovePeer allegingcopyright infringement based <strong>on</strong> <strong>the</strong> ability of <strong>the</strong> Aimster service to share copyrighted moti<strong>on</strong>pictures. 1350 In July 2001 various music publishers and s<strong>on</strong>gwriters joined <strong>the</strong> fray with <strong>the</strong>irown copyright infringement lawsuit filed in Manhattan. 1351 On Nov. 19, 2001, a multijurisdicti<strong>on</strong>alpanel of judges in San Diego ruled that <strong>the</strong> bevy of lawsuits against Aimster shouldbe tried in federal district court in Chicago as a c<strong>on</strong>venient, central forum am<strong>on</strong>g all <strong>the</strong> variousparties. 1352On Mar. 19, 2002, <strong>the</strong> lawsuits against <strong>the</strong> Aimster service, which was subsequentlyrenamed “Madster” after a trademark dispute with AOL, were placed <strong>on</strong> hold after BuddyUSAand AbovePeer filed for bankruptcy. On June 20, 2002, <strong>the</strong> bankruptcy judge lifted <strong>the</strong>automatic stay of <strong>the</strong> lawsuits to <strong>the</strong> extent necessary to allow <strong>the</strong> record companies to pursue apreliminary injuncti<strong>on</strong> against <strong>the</strong> service in <strong>the</strong> federal district court in Chicago. 1353 About three1345 Id. at 643-44, 650.1346 Id. at 644-45.1347 Id. at 646.1348 Steven B<strong>on</strong>isteel, “Aimster in Court Today to Fend Off Music-Industry Suits” (May 30, 2001), available as ofJan. 6, 2002 at www.newsbytes.com/news/01/166250.html.1349 Michael Bartlett, “Movie Studios Attack File-Swapping Service Aimster” (July 3, 2001), available as of Jan. 6,2002 at www.newsbytes.com/news/01/167549.html.1350 Id.1351 “Aimster: Ano<strong>the</strong>r Day, Ano<strong>the</strong>r Lawsuit” (July 5, 2001), available as of Jan. 6, 2002 atwww.usatoday.com/life/cyber/tech/2001-07-05-aimster.htm.1352 Kevin Fea<strong>the</strong>rly, “Judges C<strong>on</strong>solidate Aimster Suits – Correcti<strong>on</strong>” (Nov. 19, 2001), available as of Jan. 6, 2002at www.newsbytes.com/news/01/172294.html.1353 “Judge: Record Companies Can Pursue Injuncti<strong>on</strong> Against Madster” (June 21, 2002), available as of June 21,2002 at www.silic<strong>on</strong>valley.com/mld/silic<strong>on</strong>valley/news/editorial/3511564.htm.- 303 -


m<strong>on</strong>ths later, <strong>the</strong> district court ruled that <strong>the</strong> plaintiffs were entitled to a preliminary injuncti<strong>on</strong><strong>on</strong> grounds of c<strong>on</strong>tributory and vicarious liability. 1354 Aimster appealed.The Seventh Circuit, per Judge Posner, affirmed <strong>the</strong> issuance of <strong>the</strong> preliminaryinjuncti<strong>on</strong>, finding that Aimster was likely liable as a c<strong>on</strong>tributory infringer. 1355 The bulk of <strong>the</strong>court’s opini<strong>on</strong> was devoted to an analysis of <strong>the</strong> scope of <strong>the</strong> Supreme Court’s “substantialn<strong>on</strong>infringing use” doctrine in <strong>the</strong> S<strong>on</strong>y case, <strong>on</strong> which Aimster relied heavily for its defense.Judge Posner seems to have significantly reinterpreted that doctrine using a classic “Chicagoschool” law and ec<strong>on</strong>omics analysis. (The viability of Judge Posner’s interpretive approach toS<strong>on</strong>y’s “substantial n<strong>on</strong>infringing use” doctrine, whe<strong>the</strong>r or not it led to <strong>the</strong> correct substantiveoutcome, is at best dubious after <strong>the</strong> Supreme Court’s Grokster decisi<strong>on</strong> discussed in Secti<strong>on</strong>III.C.2(c)(5) below. 1356 )He began <strong>the</strong> analysis by noting that S<strong>on</strong>y’s Betamax video recorder was used for threeprincipal purposes – time shifting (recording a televisi<strong>on</strong> program for later viewing), librarybuilding (making copies of programs to retain permanently), and commercial skipping (taping aprogram before watching it and <strong>the</strong>n, while watching <strong>the</strong> tape, using <strong>the</strong> fast-forward butt<strong>on</strong> <strong>on</strong><strong>the</strong> recorder to skip over <strong>the</strong> commercials). 1357 He noted that <strong>the</strong> Supreme Court held <strong>the</strong> firstuse to be a fair use because it enlarged <strong>the</strong> audience for <strong>the</strong> program, but went <strong>on</strong> to note, indicta, that <strong>the</strong> sec<strong>on</strong>d and third uses were “unquesti<strong>on</strong>ably infringing” – <strong>the</strong> sec<strong>on</strong>d because “itwas <strong>the</strong> equivalent of borrowing a copyrighted book from a public library, making a copy of itfor <strong>on</strong>e’s pers<strong>on</strong>al library, <strong>the</strong>n returning <strong>the</strong> original to <strong>the</strong> public library,” and <strong>the</strong> third becauseit “amounted to creating an unauthorized derivative work … namely a commercial-free copy thatwould reduce <strong>the</strong> copyright owner’s income from his original program, since ‘free’ televisi<strong>on</strong>programs are financed by <strong>the</strong> purchase of commercials by advertisers.” 1358 Thus, according to1354 In re Aimster <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Litigati<strong>on</strong>, 252 F. Supp. 2d 634, 665 (N.D. Ill. 2002). The district court also rejectedAimster’s argument of a defense under <strong>the</strong> AHRA. The court first ruled that Aimster’s users were plainlyengaged in direct copyright infringement and that <strong>the</strong> AHRA did not provide an affirmative defense to <strong>the</strong>users’ acts of direct copying. Invoking <strong>the</strong> Ninth Circuit’s Diam<strong>on</strong>d Multimedia decisi<strong>on</strong>, discussedextensively in Secti<strong>on</strong> III.C.2(c)(1).2 above, Aimster argued that <strong>the</strong> AHRA immunized all n<strong>on</strong>commercialcopying by c<strong>on</strong>sumers of digital and analog musical recordings. The district court rejected this argument,distinguishing Diam<strong>on</strong>d Multimedia <strong>on</strong> <strong>the</strong> grounds that in that case users were merely space shifting files from<strong>the</strong>ir hard drives to a portable digital device for <strong>the</strong>ir own pers<strong>on</strong>al use. By c<strong>on</strong>trast, <strong>the</strong> Aimster serviceinvolved <strong>the</strong> copying of MP3 files from <strong>on</strong>e user’s hard drive <strong>on</strong>to <strong>the</strong> hard drive of ano<strong>the</strong>r user, and suchmassive, unauthorized distributi<strong>on</strong> and copying of <strong>the</strong> plaintiffs’ works was not within <strong>the</strong> scope of <strong>the</strong> AHRA.Id. at 648-49.1355 In re Aimster <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Litigati<strong>on</strong>, 334 F.3d 643 (7th Cir. 2003), cert. denied, 124 S. Ct. 1069 (2004).1356 See Mitchell Zimmerman, “Grokster Seems Unlikely to Prevent File Sharing by Itself,” The Daily Journal(Aug 15, 2005); earlier versi<strong>on</strong> available <strong>on</strong>line in <strong>Fenwick</strong> & <strong>West</strong>’s IP Bulletin (Fall 2005), p. 3, athttp://www.fenwick.com/docstore/Publicati<strong>on</strong>s/IP/IP_bulletins/IP_Bulletin_Fall_2005.pdf#xml=http://www.fenwick.com/publicati<strong>on</strong>s/indices.asp?cmd=pdfhits&DocId=115&Index=C%3a%5cdtindex%5cwebsite%5cIP&HitCount=4&hits=632+10de+1109+11a3+&hc=143&req=Zimmerman.1357 Id. at 647.1358 Id. at 647-48. The ruling that recording for commercial skipping c<strong>on</strong>stitutes <strong>the</strong> making of an unauthorizedderivative work is curious. First, it seems novel to judge <strong>the</strong> legality of a reproduced work <strong>on</strong> <strong>the</strong> subsequentpotential use that a user may put <strong>the</strong> work to. Sec<strong>on</strong>d, <strong>the</strong> work that was actually fixed in <strong>the</strong> tangible mediumby <strong>the</strong> video recorder was <strong>the</strong> entire televisi<strong>on</strong> program, including <strong>the</strong> commercials without modificati<strong>on</strong>. It is- 304 -


Judge Posner, <strong>the</strong> Supreme Court in S<strong>on</strong>y was c<strong>on</strong>fr<strong>on</strong>ted with a situati<strong>on</strong> in which <strong>the</strong> videorecorder “was being used for a mixture of infringing and n<strong>on</strong>infringing uses and <strong>the</strong> Courtthought that S<strong>on</strong>y could not demix <strong>the</strong>m because <strong>on</strong>ce S<strong>on</strong>y sold <strong>the</strong> recorder it lost all c<strong>on</strong>trolover its use.” 1359Having characterized <strong>the</strong> S<strong>on</strong>y case thusly, Judge Posner turned to an applicati<strong>on</strong> of itsprinciples to <strong>the</strong> Aimster service. He first rejected some extreme interpretati<strong>on</strong>s of thoseprinciples put forward by <strong>the</strong> parties. Specifically, he rejected <strong>the</strong> RIAA’s argument that S<strong>on</strong>y isinapplicable to services and that, where services are c<strong>on</strong>cerned, “<strong>the</strong> test is merely whe<strong>the</strong>r <strong>the</strong>provider knows it’s being used to infringe copyright.” 1360 He noted that although knowledge thata service is being used for infringing purposes is a factor to be c<strong>on</strong>sidered in c<strong>on</strong>tributoryinfringement, it cannot be dispositive, else services like AOL’s instant messaging service wouldbe illegal just because some use it for infringing purposes. 1361 Moreover, he noted that in <strong>the</strong>S<strong>on</strong>y case, <strong>the</strong> Supreme Court acknowledged that 25% of Betamax users were fast forwardingthrough commercials, which, as noted, Judge Posner believed to c<strong>on</strong>stitute an infringing use, yetnever<strong>the</strong>less <strong>the</strong>re was no c<strong>on</strong>tributory infringement. 1362 Judge Posner thus c<strong>on</strong>cluded, “We<strong>the</strong>refore agree with Professor Goldstein that <strong>the</strong> Ninth Circuit erred in A&M Records, Inc. v.Napster, Inc., 239 F.3d 1004, 1020 (9th Cir. 2001), in suggesting that actual knowledge ofspecific infringing uses is a sufficient c<strong>on</strong>diti<strong>on</strong> for deeming a facilitator a c<strong>on</strong>tributorinfringer.” 1363C<strong>on</strong>versely, Judge Posner rejected Aimster’s argument that any showing that its servicecould be used in n<strong>on</strong>infringing ways is sufficient to avoid c<strong>on</strong>tributory liability. “Were that <strong>the</strong>law, <strong>the</strong> seller of a product or service used solely to facilitate copyright infringement, though itwas capable in principle of n<strong>on</strong>infringing uses, would be immune from liability for c<strong>on</strong>tributoryinfringement.” 1364 In additi<strong>on</strong>, <strong>the</strong> Supreme Court would not have thought it important to statethat <strong>the</strong> Betamax was used “principally” for time shifting. 1365Judge Posner <strong>the</strong>refore interpreted <strong>the</strong> S<strong>on</strong>y doctrine ultimately to require an ec<strong>on</strong>omiccost/benefit analysis of <strong>the</strong> infringing and n<strong>on</strong>infringing uses of a system in determiningc<strong>on</strong>tributory liability. “What is true is that when a supplier is offering a product or service thathas n<strong>on</strong>infringing as well as infringing uses, some estimate of <strong>the</strong> respective magnitudes of <strong>the</strong>se<strong>on</strong>ly up<strong>on</strong> playback that <strong>the</strong> commercials were skipped by fast forwarding through <strong>the</strong>m, and <strong>on</strong>e would have toargue that <strong>the</strong> transient display produced <strong>on</strong> <strong>the</strong> televisi<strong>on</strong> screen as <strong>the</strong> commercials run by at faster speed isitself a derivative work. And even if a derivative work, it is unclear why such work might not be a fair use, atleast when d<strong>on</strong>e by a private viewer to enhance enjoyment of <strong>the</strong> program.1359 Id. at 648.1360 Id.1361 Id.1362 Id. at 649.1363 Id. (citing 2 Paul Goldstein, <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> § 6.1.2, p. 6:12-1 (2d ed. 2003)).1364 334 F.3d at 651.1365 Id. (emphasis in original).- 305 -


uses is necessary for a finding of c<strong>on</strong>tributory infringement. … But <strong>the</strong> balancing of costs andbenefits is necessary <strong>on</strong>ly in a case in which substantial n<strong>on</strong>infringing uses, present orprospective, are dem<strong>on</strong>strated.” 1366In <strong>the</strong> instant case, <strong>the</strong> court c<strong>on</strong>cluded <strong>the</strong> evidence showed that <strong>the</strong> Aimster system wasprincipally for use for infringement. The court pointed to <strong>the</strong> fact that in explaining how to use<strong>the</strong> Aimster software, <strong>the</strong> tutorial gave as its <strong>on</strong>ly examples of file sharing <strong>the</strong> sharing ofcopyrighted music. In additi<strong>on</strong>, membership in Club Aimster enabled <strong>the</strong> member for a fee of$4.95 a m<strong>on</strong>th to download with a single click <strong>the</strong> 40 s<strong>on</strong>gs most often shared by Aimster users,and those were invariably copyrighted by <strong>the</strong> plaintiffs. 1367 “The evidence that we havesummarized does not exclude <strong>the</strong> possibility of substantial n<strong>on</strong>infringing uses of <strong>the</strong> Aimstersystem, but <strong>the</strong> evidence is sufficient, especially in a preliminary-injuncti<strong>on</strong> proceeding, which issummary in character, to shift <strong>the</strong> burden of producti<strong>on</strong> to Aimster to dem<strong>on</strong>strate that its servicehas substantial n<strong>on</strong>infringing uses.” 1368The court held that Aimster had failed to show that its service had ever been used for an<strong>on</strong>infringing use, let al<strong>on</strong>e evidence c<strong>on</strong>cerning <strong>the</strong> frequency of such uses. 1369 “Even when<strong>the</strong>re are n<strong>on</strong>infringing uses of an <strong>Internet</strong> file-sharing service, moreover, if <strong>the</strong> infringing usesare substantial <strong>the</strong>n to avoid liability as a c<strong>on</strong>tributory infringer <strong>the</strong> provider of <strong>the</strong> service mustshow that it would have been disproporti<strong>on</strong>ately costly for him to eliminate or at least reducesubstantially <strong>the</strong> infringing uses.” 1370 Not <strong>on</strong>ly had Aimster failed to engage in this calculati<strong>on</strong>,<strong>the</strong> court ruled that it had willfully blinded itself from evidence of how its service was beingused by providing encrypti<strong>on</strong> for all transacti<strong>on</strong>s <strong>on</strong> <strong>the</strong> service. 1371 “This is not to say that <strong>the</strong>provider of an encrypted instant-messaging service or encrypti<strong>on</strong> software is ipso facto[] ac<strong>on</strong>tributory infringer should his buyers use <strong>the</strong> service to infringe copyright …. Our point is<strong>on</strong>ly that a service provider that would o<strong>the</strong>rwise be a c<strong>on</strong>tributory infringer does not obtainimmunity by using encrypti<strong>on</strong> to shield itself from actual knowledge of <strong>the</strong> unlawful purposesfor which <strong>the</strong> service is being used.” 1372The court <strong>the</strong>refore c<strong>on</strong>cluded that it was likely Aimster would be found a c<strong>on</strong>tributoryinfringer and affirmed <strong>the</strong> granting of <strong>the</strong> preliminary injuncti<strong>on</strong>. 13731366 Id. at 649-50.1367 Id. at 651-52.1368 Id. at 652 (emphasis in original).1369 Id. at 653.1370 Id.1371 Id.1372 Id. at 650-51.1373 Id. at 656. For a case post-dating <strong>the</strong> Supreme Court’s Grokster decisi<strong>on</strong> that interprets and applies JudgePosner’s tests for c<strong>on</strong>tributory infringement in a n<strong>on</strong>-service provider c<strong>on</strong>text, see M<strong>on</strong>otype Imaging, Inc. v.Bitstream Inc., 2005 U.S. Dist. LEXIS 7410 (N.D. Ill. Apr. 21, 2005) (opini<strong>on</strong> <strong>on</strong> moti<strong>on</strong> for summaryjudgment) and 2005 U.S. Dist. LEXIS 14278 (N.D. Ill. (July 12, 2005) (opini<strong>on</strong> after bench trial). The court inM<strong>on</strong>otype applied <strong>the</strong> Aimster approach to c<strong>on</strong>tributory liability without c<strong>on</strong>sidering at all <strong>the</strong> issue of whe<strong>the</strong>r- 306 -


The court also rejected a challenge to <strong>the</strong> injuncti<strong>on</strong>’s breadth. The preliminaryinjuncti<strong>on</strong>, which was very broad in sweep, required Aimster to “immediately disable andprevent any and all access” to <strong>the</strong> plaintiffs’ copyrighted works <strong>on</strong> or through any web site,server, or system owned or c<strong>on</strong>trolled by Aimster, “including, if necessary, preventing any andall access to <strong>the</strong> Aimster System and Service in its entirety, until such time that Aimsterimplements measures that prevent” unauthorized copying and downloading of <strong>the</strong> plaintiffs’copyrighted works. 1374 After implementing “measures to ensure that <strong>the</strong> Aimster System andService prevents any and all copying, downloading, distributing, uploading, linking to, ortransmitting” of <strong>the</strong> plaintiffs’ copyrighted works, Aimster was permitted to provide publicaccess to its system, except that it c<strong>on</strong>tinued to be enjoined from copying, downloading ordistributing <strong>the</strong> plaintiffs’ copyrighted works or facilitating <strong>the</strong> same. 1375Aimster was also required to “affirmatively m<strong>on</strong>itor and patrol for, and preclude accessto” <strong>the</strong> plaintiffs’ copyrighted works “by employing such technological tools and measures thatare reas<strong>on</strong>ably available to carry out such obligati<strong>on</strong>s” without specifying what those might be orwhat technical effectiveness criteria <strong>the</strong>y would have to satisfy. 1376 Finally, in <strong>on</strong>e of <strong>the</strong> most<strong>on</strong>erous parts of <strong>the</strong> order, Aimster was required to “maintain a complete list of any and allsound recordings and musical compositi<strong>on</strong>s made available <strong>on</strong>, over, through, or via its system,and up<strong>on</strong> five (5) business days’ notice [to] make such lists available to Plaintiffs for inspecti<strong>on</strong>and copying. Such lists shall include, without limitati<strong>on</strong>, computer, website, and computerserver logs delineating User search requests, download requests and upload attempts for any andall sound records and musical compositi<strong>on</strong>s.” 1377 The Seventh Circuit rejected Aimster’schallenge to <strong>the</strong> breadth of <strong>the</strong> injuncti<strong>on</strong> <strong>on</strong> <strong>the</strong> ground that Aimster had failed to suggestalternative language ei<strong>the</strong>r to <strong>the</strong> district court or to <strong>the</strong> Seventh Circuit, and had <strong>the</strong>reforewaived <strong>the</strong> objecti<strong>on</strong>. 1378(4) The StreamCast/Kazaa/Grokster LawsuitsOne of <strong>the</strong> most significant peer-to-peer lawsuits to be filed after <strong>the</strong> Napster caseinvolved <strong>the</strong> file sharing services originally known as Music City (later renamed to StreamCast),Kazaa, and Grokster. On Oct. 2, 2001, various recording companies and movie studios sued <strong>the</strong>operators of <strong>the</strong>se services for copyright infringement in <strong>the</strong> Central District of California.Shortly <strong>the</strong>reafter, <strong>on</strong> Nov. 19, 2001, Jerry Leiber and Mike Stoller filed a class acti<strong>on</strong> forcopyright infringement <strong>on</strong> behalf of <strong>the</strong>mselves and all music publishers represented by TheHarry Fox Agency against <strong>the</strong> same defendants, again in <strong>the</strong> Central District of California. Thetwo lawsuits were eventually c<strong>on</strong>solidated.any of <strong>the</strong> rati<strong>on</strong>ale or holdings of <strong>the</strong> Aimster cases were called into questi<strong>on</strong> by <strong>the</strong> Supreme Court’s Groksterdecisi<strong>on</strong>.1374 Preliminary Injuncti<strong>on</strong> Order, In re Aimster <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Litigati<strong>on</strong>, No. 01 c 8933 (N.D. Ill. Oct. 30, 2002) at 2.1375 Id. 3.1376 Id. 4.1377 Id. 6.1378 In re Aimster <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Litigati<strong>on</strong>, 334 F.3d 643, 656 (7th Cir. 2003), cert. denied, 124 S. Ct. 1069 (2004).- 307 -


These suits presented a potential extensi<strong>on</strong> of <strong>the</strong> legal <strong>the</strong>ories <strong>on</strong> which <strong>the</strong> Napstercase relied in view of technical differences in <strong>the</strong> peer-to-peer architecture used by <strong>the</strong>StreamCast, Kazaa, and Grokster services, as opposed to <strong>the</strong> Napster service. As discussed inSecti<strong>on</strong> III.C.2(c)(1) above, <strong>the</strong> Napster service relied <strong>on</strong> a central index of files available forsharing stored <strong>on</strong> servers maintained and c<strong>on</strong>trolled by Napster. This index enabled Napster toblock allegedly infringing files by searching <strong>the</strong> filenames available through <strong>the</strong> index. Byc<strong>on</strong>trast, <strong>the</strong> StreamCast, Kazaa, and Grokster services did not operate based <strong>on</strong> such a centralindex. Ra<strong>the</strong>r, <strong>the</strong> indexes of files available for sharing were distributed across users’computers.Specifically, according to <strong>the</strong> complaint filed in <strong>the</strong> class acti<strong>on</strong> case, each of <strong>the</strong>StreamCast, Kazaa, and Grokster services initially relied <strong>on</strong> software called FastTrack, originallydeveloped by a group of Scandinavian programmers known as C<strong>on</strong>sumer Empowerment BV,later renamed Kazaa BV. 1379 Kazaa BV launched <strong>the</strong> first of <strong>the</strong> three services (<strong>the</strong> Kazaaservice) <strong>on</strong> July 28, 2000 by publicly releasing its FastTrack software <strong>on</strong> its web site. 1380 TheFastTrack software interacted with Kazaa BV’s server side software to enable Kazaa users toc<strong>on</strong>nect <strong>the</strong>ir computers to <strong>on</strong>e or more central computer servers c<strong>on</strong>trolled and maintained byKazaa BV. 1381 After <strong>the</strong> central server registered, identified, and logged in <strong>the</strong> user, <strong>the</strong> Kazaaservice c<strong>on</strong>nected <strong>the</strong> user to a “SuperNode.” A SuperNode is a computer with a highbandwidthc<strong>on</strong>necti<strong>on</strong> that is operated by ano<strong>the</strong>r user already c<strong>on</strong>nected to <strong>the</strong> service. After auser c<strong>on</strong>nected to a SuperNode, <strong>the</strong>se “local search hubs” compiled an index of digital filesbeing offered by <strong>the</strong> user for downloading by o<strong>the</strong>r service users. The FastTrack software alsoenabled users to search for and import preexisting libraries of music files (such as libraries thatusers built using Napster) to make <strong>the</strong>m available through <strong>the</strong> service. In resp<strong>on</strong>se to a searchrequest, <strong>the</strong> SuperNode reviewed its own index of files and, if necessary, <strong>the</strong> indices maintainedby o<strong>the</strong>r SuperNodes. It <strong>the</strong>n displayed <strong>the</strong> search results to <strong>the</strong> user to permit <strong>the</strong> user todownload any files displayed by <strong>the</strong> search. 1382 Hence <strong>the</strong> index of files available at any point intime were distributed throughout various SuperNode computers maintained by <strong>the</strong> users of <strong>the</strong>network, not Kazaa BV.Any Kazaa service user could become a SuperNode by choosing that opti<strong>on</strong> in <strong>the</strong>FastTrack software, and users were encouraged to do so. Kazaa BV’s central servers maintainedcommunicati<strong>on</strong>s with all SuperNodes and assisted in administering <strong>the</strong> Kazaa service. 1383 Therole of Kazaa BV’s central servers in <strong>the</strong> operati<strong>on</strong> of <strong>the</strong> service was a key basis up<strong>on</strong> which <strong>the</strong>plaintiffs asserted c<strong>on</strong>tributory and vicarious copyright liability. The Kazaa service c<strong>on</strong>tinuouslym<strong>on</strong>itored its thousands of users to keep track of when <strong>the</strong>y logged <strong>on</strong> and off. As so<strong>on</strong> as a userlogged <strong>on</strong>, that user’s music files were inventoried and added to <strong>the</strong> distributed database, and1379 Class Acti<strong>on</strong> Complaint for <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Infringement, Leiber v. C<strong>on</strong>sumer Empowerment, Civ. No. 01-09923(C.D. Cal. Nov. 19, 2001) 25-26.1380 Id. 27.1381 Id. 31.1382 Id. 32.1383 Id. 33.- 308 -


when <strong>the</strong> user logged off, that user’s files were eliminated from <strong>the</strong> database. 1384Communicati<strong>on</strong>s <strong>on</strong> <strong>the</strong> service between its users’ computers and its central servers, between <strong>the</strong>user and a SuperNode, between SuperNodes and <strong>the</strong> central servers, and between and am<strong>on</strong>gSuperNodes were all encrypted using a scheme c<strong>on</strong>trolled by Kazaa BV. 1385 According to <strong>the</strong>complaint, Kazaa BV created <strong>the</strong> c<strong>on</strong>necti<strong>on</strong> between <strong>the</strong> user who had selected a music file forcopying and <strong>the</strong> user who was offering <strong>the</strong> selected file. “Thus, all users need to do is select <strong>the</strong>file <strong>the</strong>y want and it automatically downloads – i.e., copies and saves – to <strong>the</strong>ir individualcomputer hard drive. [Kazaa BV] makes <strong>the</strong> entire transacti<strong>on</strong> possible.” 1386The StreamCast and Grokster services operated in a very similar fashi<strong>on</strong>. Initially, bothStreamCast and Grokster used <strong>the</strong> FastTrack software. After <strong>the</strong> lawsuits were filed, StreamCastswitched to use of <strong>the</strong> open standard Gnutella technology and developed its own software knownas “Morpheus” based <strong>on</strong> that technology. Also after initiati<strong>on</strong> of <strong>the</strong> lawsuits, <strong>the</strong> operati<strong>on</strong> of<strong>the</strong> Kazaa system passed from Kazaa BV to Sharman Networks. 1387 A news article reported <strong>on</strong>May 23, 2002 that Kazaa BV was no l<strong>on</strong>ger able to afford defending <strong>the</strong> lawsuit and that itwould accept a default judgment, and that <strong>the</strong> attorney for StreamCast Networks waswithdrawing from <strong>the</strong> case because StreamCast also could not afford <strong>the</strong> cost of <strong>the</strong> litigati<strong>on</strong>. 1388In July of 2002, <strong>the</strong> federal district court ruled that <strong>the</strong> plaintiffs could expand <strong>the</strong>ir U.S.lawsuit to include Sharman Networks, which had assumed distributi<strong>on</strong> of <strong>the</strong> Kazaa fileswappingsoftware. 1389 In January of 2003, <strong>the</strong> court rejected a jurisdicti<strong>on</strong>al challenge broughtby Sharman Networks, ruling that Sharman Networks could be sued in California since <strong>the</strong>Kazaa software had been downloaded and used by milli<strong>on</strong>s of Californians. 1390 Approximately<strong>on</strong>e week later, Sharman Networks filed antitrust and copyright misuse counterclaims against <strong>the</strong>plaintiffs. 1391The plaintiffs and defendants StreamCast and Grokster filed cross moti<strong>on</strong>s for summaryjudgment with regard to c<strong>on</strong>tributory and vicarious copyright infringement. On April 25, 2003,<strong>the</strong> court granted summary judgment in favor of StreamCast and Grokster <strong>on</strong> both <strong>the</strong>ories. The1384 Id. 34.1385 Id. 38.1386 Id. 37. An internal RIAA memorandum, which both outlines <strong>the</strong> RIAA’s legal <strong>the</strong>ories against <strong>the</strong> Kazaaservice and gives fur<strong>the</strong>r technical detail <strong>on</strong> how it functi<strong>on</strong>s, may be found atwww.dotcomscoop.com/article.php?sid=39 (available as of Jan. 6, 2002).1387 Metro-Goldwyn-Mayer Studios, Inc. v. Grokster, Ltd., 259 F. Supp. 2d 1029, 1032 & n. 2 (C.D. Cal. 2003).1388 John Borland, “Kazaa, Morpheus Legal Case Collapsing” (May 22, 2002), available as of May 23, 2002 athttp://news.com.com/2102-1023-920557.html. The article fur<strong>the</strong>r reported that “squabbling betweenStreamcast and Kazaa BV has badly weakened <strong>the</strong> defendants’ case.”1389 John Borland, “Judge OKs Suit Against Kazaa Parent” (July 9, 2002), available as of July 10, 2002 athttp://news.com.com/2102-1023-942533.html.1390 Declan McCullagh, “Judge: Kazaa Can Be Sued in U.S.” (Jan. 10, 2003), available as of Jan. 13, 2003 athttp://news.com.com/2102-1023-980274.html.1391 John Borland, “Kazaa Strikes Back at Hollywood, Labels” (Jan. 27, 2003), available as of Jan. 28, 2003 athttp://news.com.com/2102-1023-982344.html.- 309 -


court noted that its order applied <strong>on</strong>ly to <strong>the</strong> <strong>the</strong>n current versi<strong>on</strong>s of Grokster’s andStreamCast’s products and services, and did not reach <strong>the</strong> questi<strong>on</strong> of whe<strong>the</strong>r ei<strong>the</strong>r defendantwas liable for damages from prior versi<strong>on</strong>s of <strong>the</strong>ir software or from o<strong>the</strong>r past activities. 1392With respect to <strong>the</strong> issue of c<strong>on</strong>tributory liability, <strong>the</strong> court first noted that it wasundisputed that at least some of <strong>the</strong> individuals using <strong>the</strong> defendants’ software were engaged indirect copyright infringement. 1393 The court <strong>the</strong>n turned to an analysis of <strong>the</strong> two pr<strong>on</strong>gs ofc<strong>on</strong>tributory liability for such direct infringements, knowledge of <strong>the</strong> infringing activity andmaterial c<strong>on</strong>tributi<strong>on</strong> <strong>the</strong>reto.In <strong>on</strong>e of <strong>the</strong> most significant aspects of <strong>the</strong> ruling, <strong>the</strong> court held that mere c<strong>on</strong>structiveknowledge is not sufficient for c<strong>on</strong>tributory liability, but ra<strong>the</strong>r <strong>the</strong> defendant must have actualknowledge of specific infringing acts at <strong>the</strong> time <strong>the</strong> infringement occurs. Citing <strong>the</strong> NinthCircuit’s decisi<strong>on</strong> in <strong>the</strong> Napster case, <strong>the</strong> court ruled that “defendants are liable for c<strong>on</strong>tributoryinfringement <strong>on</strong>ly if <strong>the</strong>y (1) have specific knowledge of infringement at a time at which <strong>the</strong>yc<strong>on</strong>tribute to <strong>the</strong> infringement, and (2) fail to act up<strong>on</strong> that informati<strong>on</strong>.” 1394 This requirement ofspecific, actual knowledge seems c<strong>on</strong>trary to <strong>the</strong> courts’ rulings in <strong>the</strong> Aimster case, discussed inSecti<strong>on</strong> III.C.2(c)(3) above, and in <strong>the</strong> Ellis<strong>on</strong> and Perfect 10 v. Cybernet Ventures cases,discussed in Secti<strong>on</strong>s III.C.2(e) and (f) below, that c<strong>on</strong>structive knowledge is sufficient forc<strong>on</strong>tributory infringement <strong>on</strong> <strong>the</strong> part of a service provider. In additi<strong>on</strong>, <strong>the</strong> Ninth Circuit’sruling in Napster requiring actual knowledge of specific infringing files, invoked by <strong>the</strong> NinthCircuit in its ruling <strong>on</strong> appeal of <strong>the</strong> district court’s decisi<strong>on</strong> in this case, was repudiated by <strong>the</strong>Supreme Court in its Grokster decisi<strong>on</strong>, analyzed in detail below in Secti<strong>on</strong> III.C.2(c)(5) below.The plaintiffs argued that <strong>the</strong> StreamCast and Grokster defendants had knowledge of <strong>the</strong>infringing acts because <strong>the</strong> plaintiffs had sent <strong>the</strong> defendants thousands of notices regardingalleged infringement. The court held, however, that “notices of infringing c<strong>on</strong>duct are irrelevantif <strong>the</strong>y arrive when Defendants do nothing to facilitate, and cannot do anything to stop, <strong>the</strong>alleged infringement,” as was <strong>the</strong> case here since <strong>the</strong> infringing activity took place <strong>on</strong>ly after <strong>the</strong>defendants had distributed <strong>the</strong>ir software and, as elaborated under <strong>the</strong> material c<strong>on</strong>tributi<strong>on</strong>pr<strong>on</strong>g, <strong>the</strong>y were not in a positi<strong>on</strong> to stop <strong>the</strong> infringing activity. 1395Citing to <strong>the</strong> Supreme Court’s S<strong>on</strong>y case, <strong>the</strong> court fur<strong>the</strong>r ruled that mere distributi<strong>on</strong> ofa device that <strong>the</strong> defendants had general knowledge could be used to commit infringement wasinsufficient to impose c<strong>on</strong>tributory liability, so l<strong>on</strong>g as <strong>the</strong> device was capable of substantialn<strong>on</strong>infringing uses. The court noted several substantial n<strong>on</strong>infringing uses for <strong>the</strong> defendants’software, including distributing movie trailers, free s<strong>on</strong>gs or o<strong>the</strong>r n<strong>on</strong>-copyrighted work, sharing<strong>the</strong> works of Shakespeare, and sharing o<strong>the</strong>r c<strong>on</strong>tent for which distributi<strong>on</strong> is authorized. 13961392 Grokster, 259 F. Supp. 2d at 1033. The defendant Sharman Networks was not a party to <strong>the</strong> moti<strong>on</strong>s.1393 Id. at 1034.1394 Id. at 1036 (citing A&M Records, Inc. v. Napster, Inc., 239 F.3d 1004, 1021 (9th Cir. 2001)).1395 Grokster, 259 F. Supp. 2d at 1037.1396 Id. at 1035.- 310 -


Turning to <strong>the</strong> material c<strong>on</strong>tributi<strong>on</strong> pr<strong>on</strong>g, <strong>the</strong> court ruled that nei<strong>the</strong>r StreamCast norGrokster had materially c<strong>on</strong>tributed to <strong>the</strong> infringing acts of users of <strong>the</strong>ir software. The courtfirst noted that <strong>the</strong> Ninth Circuit found liability in <strong>the</strong> Napster case because Napster did morethan distribute client software – it also hosted a central list of files available <strong>on</strong> each user’scomputer and “thus served as <strong>the</strong> axis of <strong>the</strong> file-sharing network’s wheel.” 1397 Here, “<strong>the</strong>critical questi<strong>on</strong> is whe<strong>the</strong>r Grokster and StreamCast do anything, aside from distributingsoftware, to actively facilitate – or whe<strong>the</strong>r <strong>the</strong>y could do anything to stop – <strong>the</strong>ir users’infringing activity.” 1398With respect to Grokster, <strong>the</strong> court noted that Grokster did not have access to <strong>the</strong> sourcecode of <strong>the</strong> FastTrack client software applicati<strong>on</strong>, and its primary ability to affect its users’experience was <strong>the</strong> ability to c<strong>on</strong>figure a “start page” in <strong>the</strong> software and to provide advertisingautomatically retrieved by <strong>the</strong> software. An individual node using <strong>the</strong> FastTrack softwareautomatically self-selected its own supernode status, and utilized a preset list of “rootsupernodes,” each of which functi<strong>on</strong>ed principally to c<strong>on</strong>nect users to <strong>the</strong> network by directing<strong>the</strong>m to active supernodes. 1399 “While Grokster may briefly have had some c<strong>on</strong>trol over a rootsupernode, Plaintiffs do not dispute that Grokster no l<strong>on</strong>ger operates such a supernode. Thus, <strong>the</strong>technical process of locating and c<strong>on</strong>necting to a supernode – and <strong>the</strong> FastTrack network –currently occurs essentially independently of Defendant Grokster.” 1400 The transfer of filesam<strong>on</strong>g users was accomplished without any informati<strong>on</strong> being transmitted to or through anycomputers owned or c<strong>on</strong>trolled by Grokster. 1401With respect to StreamCast, <strong>the</strong> court noted that <strong>the</strong> Gnutella technology <strong>on</strong> whichStreamCast was based was a “true” peer-to-peer network that was even more decentralized thanFastTrack. Users c<strong>on</strong>nected to <strong>the</strong> Gnutella network by c<strong>on</strong>tacting ano<strong>the</strong>r user who was alreadyc<strong>on</strong>nected. The initial c<strong>on</strong>necti<strong>on</strong> was usually performed automatically after <strong>the</strong> user’s computerc<strong>on</strong>tacted <strong>on</strong>e of many publicly available directories of those currently c<strong>on</strong>nected to <strong>the</strong> Gnutellanetwork. Instead of using supernodes, search requests <strong>on</strong> <strong>the</strong> Gnutella network were passedfrom user to user until a match was found or <strong>the</strong> search request expired. 1402Accordingly, <strong>the</strong> court c<strong>on</strong>cluded that, unlike Napster, nei<strong>the</strong>r StreamCast nor Groksterprovided <strong>the</strong> “site and facilities” for direct infringement. Users c<strong>on</strong>nected to <strong>the</strong>ir respectivenetworks, selected files to share, sent searches, and downloaded files, all without materialinvolvement of <strong>the</strong> defendants. 1403 “If ei<strong>the</strong>r Defendant closed <strong>the</strong>ir doors and deactivated allcomputers within <strong>the</strong>ir c<strong>on</strong>trol, users of <strong>the</strong>ir products could c<strong>on</strong>tinue sharing files with little or1397 Id. at 1039.1398 Id.1399 Id. at 1040.1400 Id.. Primary root supernodes <strong>on</strong> <strong>the</strong> FastTrack network were operated by Kazaa BV and Sharman Networks.Id. at 1040 n.6.1401 Id. at 1040.1402 Id. at 1041.1403 Id.- 311 -


no interrupti<strong>on</strong>.” 1404 The defendants <strong>the</strong>refore did not provide sufficient material c<strong>on</strong>tributi<strong>on</strong> to<strong>the</strong> infringing acts of users to be liable as c<strong>on</strong>tributory infringers. 1405An analysis of <strong>the</strong> court’s rulings with respect to vicarious liability may be found inSecti<strong>on</strong> III.C.3(f) below. 1406On appeal, <strong>the</strong> Ninth Circuit affirmed. 1407 Turning first to <strong>the</strong> knowledge pr<strong>on</strong>g ofc<strong>on</strong>tributory infringement, <strong>the</strong> Ninth Circuit noted that any examinati<strong>on</strong> of c<strong>on</strong>tributorycopyright infringement must be guided by <strong>the</strong> seminal S<strong>on</strong>y case, under which it is sufficient todefeat a claim of c<strong>on</strong>tributory infringement if <strong>the</strong> defendant shows that its product is capable ofsubstantial or commercially significant n<strong>on</strong>infringing uses. 1408 The court noted that, based <strong>on</strong>S<strong>on</strong>y, it had held in <strong>the</strong> first appeal in <strong>the</strong> Napster case that if substantial n<strong>on</strong>infringing use wasshown, <strong>the</strong> copyright owner would be required to show that <strong>the</strong> defendant had reas<strong>on</strong>ableknowledge of specific infringing files:Thus, in order to analyze <strong>the</strong> required element of knowledge of infringement, wemust first determine what level of knowledge to require. If <strong>the</strong> product at issue isnot capable of substantial or commercially significant n<strong>on</strong>infringing uses, <strong>the</strong>n <strong>the</strong>copyright owner need <strong>on</strong>ly show that <strong>the</strong> defendant had c<strong>on</strong>structive knowledgeof <strong>the</strong> infringement. On <strong>the</strong> o<strong>the</strong>r hand, if <strong>the</strong> product at issue is capable ofsubstantial or commercially significant n<strong>on</strong>infringing uses, <strong>the</strong>n <strong>the</strong> copyrightowner must dem<strong>on</strong>strate that <strong>the</strong> defendant had reas<strong>on</strong>able knowledge of specificinfringing files and failed to act <strong>on</strong> that knowledge to prevent infringement. 1409Thus, <strong>the</strong> Ninth Circuit in effect read <strong>the</strong> S<strong>on</strong>y case as essentially nothing more than agloss <strong>on</strong> <strong>the</strong> knowledge pr<strong>on</strong>g of c<strong>on</strong>tributory liability (and <strong>the</strong>refore inapplicable to vicariousliability), ra<strong>the</strong>r than an independent defense to any sec<strong>on</strong>dary copyright liability based up<strong>on</strong> <strong>the</strong>sale and distributi<strong>on</strong> of technology that is capable of substantial n<strong>on</strong>infringing uses. The NinthCircuit fur<strong>the</strong>r noted that Judge Posner had, in <strong>the</strong> Aimster case discussed in Secti<strong>on</strong>III.C.2(c)(3) above, read S<strong>on</strong>y’s substantial n<strong>on</strong>infringing use standard differently by looking at1404 Id.1405 Id. at 1043. Nor did <strong>the</strong> provisi<strong>on</strong> of technical assistance to <strong>the</strong>ir users c<strong>on</strong>stitute a material c<strong>on</strong>tributi<strong>on</strong> toinfringement, because <strong>the</strong> technical assistance was rendered <strong>on</strong>ly after <strong>the</strong> alleged infringements too place, wasroutine and n<strong>on</strong>-specific in nature. Id. at 1042.1406 In January of 2004, <strong>the</strong> district court ruled that Sharman Networks could pursue claims against <strong>the</strong> record labelsand Hollywood studios for copyright infringement and breach of c<strong>on</strong>tract based <strong>on</strong> allegati<strong>on</strong>s that, in <strong>the</strong>ireffort to find people sharing files illegally, <strong>the</strong> labels and studios used unauthorized and unlicensed versi<strong>on</strong>s of<strong>the</strong> Kazaa software to m<strong>on</strong>itor users of <strong>the</strong> network. Sharman Networks also claimed that <strong>the</strong> labels breached<strong>the</strong> software license agreement by sending instant message warnings and bogus files through <strong>the</strong> network. J<strong>on</strong>Healy, “Kazaa Owner Cleared to Sue Record Labels, Movie Studios” (Jan. 23, 2004), available as of Jan. 23,2004 at www.latimes.com/technology/la-fi-kazaa23jan23,1,2476555.story.1407 Metro-Goldwyn-Mayer Studios, Inc. v. Grokster, Ltd., 380 F.3d 1154 (9 th Cir. 2004).1408 Id. at 1160-61.1409 Id. at 1161.- 312 -


how “probable” <strong>the</strong> n<strong>on</strong>infringing uses of a product are. The Ninth Circuit stated that it simplydid not read S<strong>on</strong>y as narrowly as Judge Posner did. 1410Because <strong>the</strong>re was no genuine issue of material fact that <strong>the</strong>re were substantialn<strong>on</strong>infringing uses of <strong>the</strong> defendants’ software, <strong>the</strong> court c<strong>on</strong>cluded that <strong>the</strong> “reas<strong>on</strong>ableknowledge of specific infringement” requirement was to be applied, and turned to an analysis ofwhe<strong>the</strong>r <strong>the</strong> copyright owners had raised sufficient genuine issues of material fact to satisfy thathigher standard. The Ninth Circuit agreed with <strong>the</strong> district court that <strong>the</strong> plaintiffs’ notices ofinfringement were irrelevant to <strong>the</strong> knowledge pr<strong>on</strong>g because <strong>the</strong>y arrived when <strong>the</strong> defendantsdid nothing to facilitate, and could not do anything to stop, <strong>the</strong> alleged infringement of <strong>the</strong>specific copyrighted c<strong>on</strong>tent. 1411 The court emphasized <strong>the</strong> great import of <strong>the</strong> software designto its holding. Unlike <strong>the</strong> Napster case, in which Napster maintained a centralized set of serverswith an index of available files, no central index was maintained by <strong>the</strong> defendants’ software.Accordingly, even if <strong>the</strong> defendants were to close <strong>the</strong>ir doors and deactivate all <strong>the</strong>ir computers,users of <strong>the</strong>ir products could c<strong>on</strong>tinue sharing files with little interrupti<strong>on</strong>. 1412Turning to <strong>the</strong> material c<strong>on</strong>tributi<strong>on</strong> pr<strong>on</strong>g, <strong>the</strong> Ninth Circuit agreed with <strong>the</strong> districtcourt’s c<strong>on</strong>clusi<strong>on</strong> that <strong>the</strong> defendants did not provide <strong>the</strong> “site and facilities” for infringementbecause <strong>the</strong> defendants did not provide file storage or index maintenance <strong>on</strong> <strong>the</strong>ir computers, nordid <strong>the</strong> defendants have <strong>the</strong> ability to suspend user accounts. 1413 “Ra<strong>the</strong>r, it is <strong>the</strong> users of <strong>the</strong>software who, by c<strong>on</strong>necting to each o<strong>the</strong>r over <strong>the</strong> internet, create <strong>the</strong> network and provide <strong>the</strong>access. ‘Failure’ to alter software located <strong>on</strong> ano<strong>the</strong>r’s computer is simply not akin to <strong>the</strong> failureto delete a filename from <strong>on</strong>e’s own computer, to <strong>the</strong> failure to cancel <strong>the</strong> registrati<strong>on</strong> name andpassword of a particular user from <strong>on</strong>e’s user list, or to <strong>the</strong> failure to make modificati<strong>on</strong>s tosoftware <strong>on</strong> <strong>on</strong>e’s own computer.” 1414The court also found that <strong>the</strong> defendants had not materially c<strong>on</strong>tributed to <strong>the</strong>infringement in any o<strong>the</strong>r manner. StreamCast maintained an XML file from which usersoftware periodically retrieves parameters, including <strong>the</strong> addresses of web sites where lists ofactive users were maintained. The owner of <strong>the</strong> FastTrack software, Sharman, maintained rootnodes c<strong>on</strong>taining lists of currently active supernodes to which users could c<strong>on</strong>nect. Bothdefendants also communicated with users incidentally, but not to facilitate infringement. Thecourt found all of <strong>the</strong>se activities too incidental to any direct copyright infringement to c<strong>on</strong>stitutematerial c<strong>on</strong>tributi<strong>on</strong>. Accordingly, <strong>the</strong> defendants were not liable for c<strong>on</strong>tributoryinfringement. 14151410 Id. at 1162 n.9.1411 Id. at 1162.1412 Id. at 1163.1413 Id.1414 Id. at 1163-64.1415 Id. at 1164. The court noted that <strong>the</strong> copyright owners had also sought relief based <strong>on</strong> previous versi<strong>on</strong>s of <strong>the</strong>defendants’ software, which c<strong>on</strong>tained significant, and perhaps crucial, differences from <strong>the</strong> software at issue<strong>on</strong> appeal. The Ninth Circuit noted that it was expressing no opini<strong>on</strong> as to those issues. Id. at 1166.- 313 -


On appeal, <strong>the</strong> Supreme Court vacated <strong>the</strong> Ninth Circuit’s decisi<strong>on</strong>, rejecting much of itsanalysis, and remanded <strong>the</strong> case for fur<strong>the</strong>r proceedings. The Supreme Court’s decisi<strong>on</strong> isanalyzed in detail in <strong>the</strong> next subsecti<strong>on</strong> below. In November of 2005, in view of <strong>the</strong> SupremeCourt’s decisi<strong>on</strong>, Grokster agreed to shut down its operati<strong>on</strong>s entirely to settle <strong>the</strong> lawsuitsagainst it. The settlement bans Grokster from participating directly or indirectly in <strong>the</strong> <strong>the</strong>ft ofcopyrighted files and requires <strong>the</strong> company to stop giving away its software. Grokster’s web sitewas changed to display a message that said, “There are legal services for downloading music andmovies. This service is not <strong>on</strong>e of <strong>the</strong>m.” 1416Subsequent to <strong>the</strong> Supreme Court’s decisi<strong>on</strong>, Grokster settled with <strong>the</strong> plaintiffs for $50milli<strong>on</strong> and a permanent injuncti<strong>on</strong>, 1417 and Sharman Networks settled with <strong>the</strong> plaintiffs for$115 milli<strong>on</strong> and agreed to launch a “legitimate” service. 1418Internati<strong>on</strong>al Lawsuits Against <strong>the</strong> Kazaa Service. Lawsuits were also filed in <strong>the</strong>Ne<strong>the</strong>rlands against <strong>the</strong> operator of <strong>the</strong> Kazaa service. On Nov. 29, 2001, an Amsterdam courtordered <strong>the</strong> service to block customers from trading illegal files by Dec. 13, 2001 or face fines of$45,000 per day. 1419 On Jan. 17, 2002, Kazaa suspended downloads of <strong>the</strong> FastTrack softwarepending a fur<strong>the</strong>r decisi<strong>on</strong> from <strong>the</strong> Dutch court. 1420 In late Jan. 2002, Kazaa BV sold itsKazaa.com web site to an Australian firm, Sharman Networks Limited, which <strong>the</strong>n resumedoperati<strong>on</strong> of <strong>the</strong> file-swapping service. 1421 In December of 2003, <strong>the</strong> Dutch Supreme Courtaffirmed a ruling of <strong>the</strong> Court of Appeals in Amsterdam that reversed <strong>the</strong> ruling of <strong>the</strong> lowercourt, finding that Kazaa could not be liable for <strong>the</strong> copyright infringements committed by usersof its software because <strong>the</strong> Kazaa service did not require centralized servers, as did <strong>the</strong> Napsterservice, and <strong>the</strong> software was capable of sharing many types of files o<strong>the</strong>r than audio files andwas in fact being used for n<strong>on</strong>infringing uses. 1422 In December of 2005, Sharman Networks cutoff Australians’ access to <strong>the</strong> web site from which <strong>the</strong> Kazaa file swapping software could bedownloaded in order to comply with orders from Australia’s Federal Court. Sharman Networks1416 Ted Bridis, “Grokster Downloading Service Shuts Down” (Nov. 7, 2005), available as of Nov. 7, 2005 athttp://news.tmcnet.com/news/2005/nov/1201939.htm.1417 “Grokster Settles, Streamcast Fights” (Nov. 8, 2005), available as of July 27, 2006 atwww.marketingvox.com/archives/2005/11/08/grokster_settles_streamcast_fights/.1418 “Kazaa to Settle File-Share Lawsuits” (July 28, 2006), available as of July 28, 2006 athttp://www.mercurynews.com/mld/mercurynews/business/technology/15143252.htm. Kazaa also subsequentlysettled with <strong>the</strong> music publishers. “Music Publishers Say Kazaa Deal Reached” (Oct. 31, 2006), available as ofNov. 1, 2006 at www.washingt<strong>on</strong>post.com/wp-dyn/c<strong>on</strong>tent/article/2006/10/31/AR2006103100953.htm.1419 Jasper K<strong>on</strong>ing, “Kazaa Plays On Despite Threat of Fines” (Dec. 20, 2001), available as of Jan. 6, 2002 athttp://news.cnet.com/news/0-1005-200-8245314.html.1420 Brad King, “Kazaa Halts Download Distributi<strong>on</strong>” (Jan. 18, 2002), available as of Jan. 18, 2002 atwww.wired.com/news/mp3/0,1285,49831,00.html.1421 Associated Press, “Kazaa Still Up Despite Orders” (Jan. 31, 2002), available as of Feb. 10, 2002 atwww.wired.com/news/mp3/0,1285,50165,00.html.1422 “Kazaa Software Does Not Violate Dutch <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Law, High Court Rules,” BNA’s Electr<strong>on</strong>ic Commerce &Law Report (Jan. 7, 2004) at 11.- 314 -


also warned existing Australian users that use of <strong>the</strong> software was not permitted in Australia,pending an appeal. 1423 (5) The Supreme Court’s Grokster Decisi<strong>on</strong>In <strong>on</strong>e of <strong>the</strong> most significant copyright decisi<strong>on</strong>s since <strong>the</strong> S<strong>on</strong>y case, <strong>the</strong> Supreme Courtvacated <strong>the</strong> Ninth Circuit’s ruling in <strong>the</strong> Grokster case and remanded it for fur<strong>the</strong>r proceedings.In its decisi<strong>on</strong>, taking inspirati<strong>on</strong> again from <strong>the</strong> patent law, as it had in <strong>the</strong> S<strong>on</strong>y case, <strong>the</strong>Supreme Court introduced inducement liability for <strong>the</strong> first time into U.S. copyright law. TheCourt largely sidestepped, however, <strong>the</strong> opportunity to clarify a number of open questi<strong>on</strong>s about<strong>the</strong> scope of c<strong>on</strong>tributory liability and <strong>the</strong> S<strong>on</strong>y defense, with respect to many of which <strong>the</strong> NinthCircuit and <strong>the</strong> Seventh Circuit had issued c<strong>on</strong>flicting rulings in <strong>the</strong> Grokster and Aimster cases,respectively.Open <str<strong>on</strong>g>Issues</str<strong>on</strong>g> Going Into <strong>the</strong> Appeal. In order to best understand <strong>the</strong> scope of <strong>the</strong> SupremeCourt’s decisi<strong>on</strong> – both what it decided and <strong>the</strong> issues it left open – it is useful to begin by noting<strong>the</strong> issues of sec<strong>on</strong>dary liability with respect to which <strong>the</strong> Ninth Circuit (in its Napster andGrokster decisi<strong>on</strong>s) and <strong>the</strong> Seventh Circuit (in its Aimster decisi<strong>on</strong>) had issued c<strong>on</strong>trary rulingsbefore <strong>the</strong> appeal to <strong>the</strong> Supreme Court. From <strong>the</strong> analyses of <strong>the</strong>se cases in earlier secti<strong>on</strong>s 1424 itis apparent that <strong>the</strong> two Circuits differed in <strong>the</strong>ir interpretati<strong>on</strong> of S<strong>on</strong>y <strong>on</strong> at least <strong>the</strong> followingdimensi<strong>on</strong>s:What types of sec<strong>on</strong>dary liability <strong>the</strong> S<strong>on</strong>y defense applies to: c<strong>on</strong>tributory liability <strong>on</strong>ly(Ninth Circuit) versus both c<strong>on</strong>tributory and vicarious liability (Seventh Circuit).How <strong>the</strong> S<strong>on</strong>y defense should be interpreted: as merely a gloss <strong>on</strong> <strong>the</strong> type of knowledgerequired for c<strong>on</strong>tributory liability (Ninth Circuit) versus a cost/benefit analysis of <strong>the</strong>infringing and n<strong>on</strong>infringing uses of a system to determine whe<strong>the</strong>r c<strong>on</strong>tributory liabilityshould be imposed (Seventh Circuit).What triggers <strong>the</strong> S<strong>on</strong>y defense: mere capability of substantial n<strong>on</strong>infringing uses of <strong>the</strong>technology at issue (Ninth Circuit) versus “principal,” actual uses (Seventh Circuit).Whe<strong>the</strong>r S<strong>on</strong>y imposes a duty to redesign technology to avoid or reduce infringing uses:no (Ninth Circuit) versus yes if not disproporti<strong>on</strong>ately costly to do so (Seventh Circuit).These c<strong>on</strong>trary rulings from <strong>the</strong> Circuits, toge<strong>the</strong>r with <strong>the</strong> petiti<strong>on</strong>ers’ and resp<strong>on</strong>dents’briefs and a host of amicus briefs, presented a number of questi<strong>on</strong>s that <strong>the</strong> Supreme Court couldhave resolved through this case:Does S<strong>on</strong>y afford an independent, stand-al<strong>on</strong>e immunity to sec<strong>on</strong>dary copyright liabilitybased up<strong>on</strong> <strong>the</strong> sale and distributi<strong>on</strong> of technology that is capable of substantial1423 Ian Fergus<strong>on</strong>, “Sharman Cuts Off Kazaa Downloads in Australia” (Dec. 5, 2005), available as of Dec. 6, 2005at www.news.com.com/2100-1027_3-5983455.html.1424 See Secti<strong>on</strong>s III.C.2(c)(1) & (4) (Napster and Grokster, respectively) and III.C.2(c)(4) (Aimster).- 315 -


n<strong>on</strong>infringing uses, or is it merely a gloss <strong>on</strong> <strong>the</strong> knowledge pr<strong>on</strong>g of c<strong>on</strong>tributoryliability?More generally, does <strong>the</strong> S<strong>on</strong>y defense apply to both c<strong>on</strong>tributory and vicarious liability,or <strong>on</strong>ly to c<strong>on</strong>tributory liability?If <strong>the</strong> S<strong>on</strong>y defense is an independent immunity, what is its relati<strong>on</strong>ship to <strong>the</strong> traditi<strong>on</strong>aldoctrines of sec<strong>on</strong>dary liability?With respect to n<strong>on</strong>infringing uses of a technology, do merely potential uses count, or<strong>on</strong>ly actual uses?Is a cost/benefit analysis required to determine whe<strong>the</strong>r <strong>the</strong> S<strong>on</strong>y immunity should apply?Is <strong>the</strong>re any difference between “substantial” and “commercially significant”n<strong>on</strong>infringing uses and which is <strong>the</strong> operative test for triggering <strong>the</strong> S<strong>on</strong>y immunity (<strong>the</strong>Supreme Court used both phrases in its S<strong>on</strong>y opini<strong>on</strong> in immediately c<strong>on</strong>tiguoussentences without elucidating whe<strong>the</strong>r it meant any difference between <strong>the</strong> two phrases,and if so, which standard should govern)?Must <strong>the</strong> distributor of a technology that can be used for infringing uses redesign itsproduct to reduce or eliminate infringing uses in order to avoid sec<strong>on</strong>dary liability for<strong>the</strong>m?In <strong>the</strong>ir briefs <strong>on</strong> appeal, <strong>the</strong> petiti<strong>on</strong>ers urged <strong>the</strong> following principal positi<strong>on</strong>s withrespect to <strong>the</strong>se questi<strong>on</strong>s:That a court should examine <strong>the</strong> “primary” actual uses of a technology, not merely <strong>the</strong>potential or <strong>the</strong>oretical uses, to determine whe<strong>the</strong>r its distributi<strong>on</strong> should qualify forimmunity from liability under <strong>the</strong> S<strong>on</strong>y doctrine;That, by analogy to <strong>the</strong> inducement doctrine of patent law, <strong>the</strong> defendant’s subjectiveintent with respect to how <strong>the</strong> technology would or should be used should be examined todetermine liability;That a cost/benefit analysis as explicated in <strong>the</strong> Aimster case should always be requiredto determine whe<strong>the</strong>r <strong>the</strong> S<strong>on</strong>y immunity is available for a technology;That S<strong>on</strong>y affords a defense <strong>on</strong>ly to c<strong>on</strong>tributory liability, and not to vicarious liability;That <strong>on</strong>e should examine, under <strong>the</strong> financial benefit pr<strong>on</strong>g of <strong>the</strong> vicarious liability test,whe<strong>the</strong>r <strong>the</strong> defendant’s business model is substantially predicated <strong>on</strong> infringement; andThat <strong>the</strong> c<strong>on</strong>trol pr<strong>on</strong>g of vicarious liability should be deemed satisfied where <strong>the</strong>defendant has failed to exercise c<strong>on</strong>trol or refused to implement readily availablemechanisms to reduce or prevent infringement.- 316 -


As explicated below, <strong>the</strong> Supreme Court did not resolve most of <strong>the</strong> questi<strong>on</strong>s identifiedabove, nor did it directly accept any of <strong>the</strong> positi<strong>on</strong>s advocated by <strong>the</strong> petiti<strong>on</strong>ers, at least in <strong>the</strong>str<strong>on</strong>g form in which <strong>the</strong>y were urged <strong>on</strong> <strong>the</strong> Court. Instead, <strong>the</strong> Court adjudicated <strong>the</strong> case <strong>on</strong>its newly introduced doctrine of copyright inducement liability. The Court articulated a standardfor inducement liability, noted <strong>the</strong> kinds of behavior that might give rise to such liability, andremanded <strong>the</strong> case for fur<strong>the</strong>r proceedings under <strong>the</strong> new standard. In <strong>the</strong> process, <strong>the</strong> Court’sopini<strong>on</strong> not <strong>on</strong>ly left open most of <strong>the</strong> questi<strong>on</strong>s noted above, but gave rise to a number of newquesti<strong>on</strong>s about <strong>the</strong> scope of inducement liability that will have to be resolved by <strong>the</strong> lowercourts in future decisi<strong>on</strong>s in which inducement liability is invoked by <strong>the</strong> plaintiff.The New Doctrine of Inducement Liability. Justice Souter, writing a 9-0 opini<strong>on</strong> for aunanimous Court, stated <strong>the</strong> principal questi<strong>on</strong> to be decided as “under what circumstances <strong>the</strong>distributor of a product capable of both lawful and unlawful use is liable for acts of copyrightinfringement by third parties using <strong>the</strong> product.” 1425 The Court answered this questi<strong>on</strong> byformally introducing inducement liability for <strong>the</strong> first time into U.S. copyright law. To do so, <strong>the</strong>Court analogized to patent law, as it had in <strong>the</strong> S<strong>on</strong>y case:For <strong>the</strong> same reas<strong>on</strong>s that S<strong>on</strong>y took <strong>the</strong> staple-article doctrine of patent law as amodel for its copyright safe-harbor rule, <strong>the</strong> inducement rule, too, is a sensible<strong>on</strong>e for copyright. We adopt it here, holding that <strong>on</strong>e who distributes a devicewith <strong>the</strong> object of promoting its use to infringe copyright, as shown by clearexpressi<strong>on</strong> or o<strong>the</strong>r affirmative steps taken to foster infringement, is liable for <strong>the</strong>resulting acts of infringement by third parties. 1426This test of inducement liability examines <strong>the</strong> intent or objective of <strong>the</strong> distributor of aproduct or technology that can be used to infringe. Where <strong>the</strong> distributor has shown “by clearexpressi<strong>on</strong> or o<strong>the</strong>r affirmative steps” that it has an intent or object to foster infringement, <strong>the</strong>recan be liability for inducement. The Court’s rule grew out of its exegesis of S<strong>on</strong>y as a case about“imputed intent.” 1427 Specifically, Justice Souter noted that “S<strong>on</strong>y barred sec<strong>on</strong>dary liabilitybased <strong>on</strong> presuming or imputing intent to cause infringement solely from <strong>the</strong> design ordistributi<strong>on</strong> of a product capable of substantial lawful use, which <strong>the</strong> distributor knows is in factused for infringement.” 1428 Note that Justice Souter used a new phrase (“capable of substantiallawful use”) that is different from each of <strong>the</strong> alternative two phrases used in S<strong>on</strong>y – “capable ofsubstantial n<strong>on</strong>infringing uses” and “capable of commercially significant n<strong>on</strong>infringing uses” –against which a technology or product must be measured for <strong>the</strong> S<strong>on</strong>y immunity to apply. Hedid not state, however, whe<strong>the</strong>r <strong>the</strong> new phrase was intended to have a different meaning fromei<strong>the</strong>r of <strong>the</strong> phrases used in S<strong>on</strong>y, or to subsume those two phrases into a single m<strong>on</strong>iker.1425 Metro-Goldwyn-Mayer Studios Inc. v. Grokster, Ltd., 125 S. Ct. 2764, 2770 (2005).1426 Id. at 2780.1427 Id. at 2778.1428 Id. Justice Souter noted that inferred intent, based solely <strong>on</strong> <strong>the</strong> distributi<strong>on</strong> of a product with knowledge that itwould be used for some infringing purposes, was <strong>the</strong> <strong>on</strong>ly intent at issue in S<strong>on</strong>y because <strong>the</strong> record c<strong>on</strong>tained“no evidence of stated or indicated intent to promote infringing uses” <strong>on</strong> <strong>the</strong> part of S<strong>on</strong>y. Id. at 2777.- 317 -


It is unclear from <strong>the</strong> majority opini<strong>on</strong> whe<strong>the</strong>r <strong>the</strong> inducement doctrine is meant to forma third basis for sec<strong>on</strong>dary liability, in additi<strong>on</strong> to <strong>the</strong> traditi<strong>on</strong>al c<strong>on</strong>tributory and vicariousliability doctrines, or whe<strong>the</strong>r <strong>the</strong> Court intended it to be merely <strong>on</strong>e species of c<strong>on</strong>tributoryliability. At <strong>on</strong>e point in <strong>the</strong> opini<strong>on</strong>, Justice Souter stated, “One infringes c<strong>on</strong>tributorily byintenti<strong>on</strong>ally inducing or encouraging direct infringement … and infringes vicariously byprofiting from direct infringement while declining to exercise a right to stop or limit it.” 1429 Thissentence suggests that intenti<strong>on</strong>al inducement is but <strong>on</strong>e species of c<strong>on</strong>tributory infringement, asdistinct from vicarious liability. And Justice Souter’s interpretati<strong>on</strong> of S<strong>on</strong>y as a case “about …imputed intent” 1430 reinforces this noti<strong>on</strong>, since intent is <strong>the</strong> primary issue for copyrightinducement liability as set forth by <strong>the</strong> Court. Yet Justice Breyer’s c<strong>on</strong>curring opini<strong>on</strong> impliesthat <strong>the</strong> inducement doctrine is a new basis for liability distinct from c<strong>on</strong>tributory and vicariousliability, for he notes that <strong>the</strong> Court’s opini<strong>on</strong> should fur<strong>the</strong>r deter infringement “by adding aweap<strong>on</strong> to <strong>the</strong> copyright holder’s legal arsenal.” 1431 Justice Ginsburg’s c<strong>on</strong>curring opini<strong>on</strong>c<strong>on</strong>tains a similar inference in her statement that <strong>on</strong> <strong>the</strong> record before <strong>the</strong> Court, Grokster andStreamCast could be liable “not <strong>on</strong>ly for actively inducing copyright infringement,” but“alternatively” for c<strong>on</strong>tributory infringement. 1432Despite <strong>the</strong> ambiguity in <strong>the</strong> opini<strong>on</strong>, it seems to be <strong>the</strong> better view that <strong>the</strong> inducementdoctrine should be seen as a separate basis for sec<strong>on</strong>dary liability distinct from that of <strong>the</strong>traditi<strong>on</strong>al c<strong>on</strong>tributory and vicarious liability doctrines. In additi<strong>on</strong> to <strong>the</strong> fact that JusticeBreyer reads it that way in his c<strong>on</strong>currence, Justice Souter notes that S<strong>on</strong>y, although it forbadeimputing culpable intent as a matter of law from <strong>the</strong> characteristics or uses of a distributedproduct, was never meant to foreclose rules of “fault-based liability derived from <strong>the</strong> comm<strong>on</strong>law.” 1433 The traditi<strong>on</strong>al doctrine of c<strong>on</strong>tributory infringement, as articulated by <strong>the</strong> courtsbefore <strong>the</strong> Grokster opini<strong>on</strong>, was not grounded <strong>on</strong> a c<strong>on</strong>cept of “fault,” <strong>the</strong>reby suggesting that<strong>the</strong> inducement doctrine and its associated noti<strong>on</strong> of “fault” is something new. That noti<strong>on</strong> of“fault” is to be found under <strong>the</strong> inducement doctrine in proof of intent to promote unlawfulbehavior, coupled with c<strong>on</strong>crete steps taken to act out that intent. 1434 In additi<strong>on</strong>, <strong>the</strong> kinds ofevidence <strong>the</strong> Court notes as relevant to intent and inducement liability is different from <strong>the</strong> kindsof evidence courts had usually c<strong>on</strong>sidered for c<strong>on</strong>tributory liability before <strong>the</strong> Groksterdecisi<strong>on</strong>. 14351429 Id. at 2776.1430 Id. at 2778.1431 Id. at 2791.1432 Id. at 2783.1433 Id. at 2779.1434 The Court noted that <strong>the</strong> staple article of commerce doctrine in general, and <strong>the</strong> S<strong>on</strong>y case in particular,“absolves <strong>the</strong> equivocal c<strong>on</strong>duct of selling an item with substantial lawful as well as unlawful uses, and limitsliability to instances of more acute fault than <strong>the</strong> mere understanding that some of <strong>on</strong>e’s products will bemisused.” Id. at 2778.1435 The doctrines of c<strong>on</strong>tributory and inducement liability are clearly separate doctrines in <strong>the</strong> patent law, for <strong>the</strong>yare embodied in separate statutory secti<strong>on</strong>s. 35 U.S.C. § 271(b) sets forth inducement liability: “Whoeveractively induces infringement of a patent shall be liable as an infringer.” 35 U.S.C. § 271(c) sets forth- 318 -


The Required Threshold of Showing of Unlawful Intent. From <strong>the</strong> majority opini<strong>on</strong>, itappears that <strong>the</strong> threshold of showing required to prove an unlawful intent to induceinfringement will be ra<strong>the</strong>r high, so as to “leave[] breathing room for innovati<strong>on</strong> and a vigorouscommerce” founded <strong>on</strong> new technological products: 1436[M]ere knowledge of infringing potential or of actual infringing uses would notbe enough here to subject a distributor to liability. Nor would ordinary actsincident to product distributi<strong>on</strong>, such as offering customers technical support orproduct updates, support liability in <strong>the</strong>mselves. The inducement rule, instead,premises liability <strong>on</strong> purposeful, culpable expressi<strong>on</strong> and c<strong>on</strong>duct, and thus doesnothing to compromise legitimate commerce or discourage innovati<strong>on</strong> having alawful promise. 1437On <strong>the</strong> o<strong>the</strong>r hand, inducement liability is not necessarily limited to encouragement ofspecific c<strong>on</strong>sumers to engage in infringing acts. “It is not <strong>on</strong>ly that encouraging a particularc<strong>on</strong>sumer to infringe a copyright can give rise to sec<strong>on</strong>dary liability for <strong>the</strong> infringement thatresults. Inducement liability goes bey<strong>on</strong>d that, and <strong>the</strong> distributi<strong>on</strong> of a product can itself giverise to liability where evidence shows that <strong>the</strong> distributor intended and encouraged <strong>the</strong> product tobe used to infringe. In such a case, <strong>the</strong> culpable act is not merely <strong>the</strong> encouragement ofinfringement but also <strong>the</strong> distributi<strong>on</strong> of <strong>the</strong> tool intended for infringing use.” 1438The Ninth Circuit’s Error. Based <strong>on</strong> its exegesis of S<strong>on</strong>y and <strong>the</strong> rule of inducementliability, <strong>the</strong> Court noted that <strong>the</strong> Ninth Circuit had erred in its understanding of sec<strong>on</strong>daryliability and <strong>the</strong> boundaries placed <strong>on</strong> it by S<strong>on</strong>y. Specifically, <strong>the</strong> Ninth Circuit in its Groksteropini<strong>on</strong> had read S<strong>on</strong>y’s limitati<strong>on</strong> to mean “that whenever a product is capable of substantiallawful use, <strong>the</strong> producer can never be held c<strong>on</strong>tributorily liable for third parties’ infringing use ofit; it read <strong>the</strong> rule as being this broad, even when an actual purpose to cause infringing use isshown by evidence independent of design and distributi<strong>on</strong> of <strong>the</strong> product, unless <strong>the</strong> distributorshad ‘specific knowledge of infringement at a time at which <strong>the</strong>y c<strong>on</strong>tributed to <strong>the</strong> infringement,and failed to act up<strong>on</strong> that informati<strong>on</strong>.’” 1439 The Court found that <strong>the</strong> Ninth Circuit had, by thiserror, c<strong>on</strong>verted <strong>the</strong> case “from <strong>on</strong>e about liability resting <strong>on</strong> imputed intent to <strong>on</strong>e about liabilityc<strong>on</strong>tributory liability: “Whoever offers to sell or sells within <strong>the</strong> United States or imports into <strong>the</strong> United Statesa comp<strong>on</strong>ent of a patented machine, manufacture, combinati<strong>on</strong> or compositi<strong>on</strong>, or a material or apparatus foruse in practicing a patented process, c<strong>on</strong>stituting a material part of <strong>the</strong> inventi<strong>on</strong>, knowing <strong>the</strong> same to beespecially made or especially adapted for use in an infringement of such patent, and not a staple article orcommodity of commerce suitable for substantial n<strong>on</strong>infringing use, shall be liable as a c<strong>on</strong>tributory infringer.”Treating inducement and c<strong>on</strong>tributory liability as separate doctrines in <strong>the</strong> copyright law would <strong>the</strong>refore afforda natural parallel to <strong>the</strong> patent law, to which <strong>the</strong> Court analogized in both S<strong>on</strong>y and Grokster.1436 Grokster, 125 S. Ct. at 2778.1437 Id. at 2780 (emphasis added).1438 Id. at 2782 n.13. Although <strong>the</strong> Court does not address <strong>the</strong> issue, this language may suggest that, where adefendant has established a clear purpose to promote infringement through use of a product it distributes,injunctive relief can extend bey<strong>on</strong>d <strong>the</strong> affirmative inducing acts and encompass distributi<strong>on</strong> of <strong>the</strong> productitself.1439 Id. at 2778 (quoting Grokster, 380 F.3d at 1162 (9 th Cir. 2004)).- 319 -


<strong>on</strong> any <strong>the</strong>ory.” 1440 The Ninth Circuit’s failure to c<strong>on</strong>sider an inducement basis for liability, andits affirmance of summary judgment for <strong>the</strong> defendants, was <strong>the</strong>refore sufficient grounds forreversal. 1441 Accordingly, <strong>the</strong> Court found it unnecessary “to add a more quantified descripti<strong>on</strong>of <strong>the</strong> point of balance between protecti<strong>on</strong> and commerce when liability rests solely <strong>on</strong>distributi<strong>on</strong> with knowledge that unlawful use will occur” 1442 – in o<strong>the</strong>r words, to fur<strong>the</strong>rexplicate what “substantial” or “commercially significant” means as applied to <strong>the</strong> quantum ofn<strong>on</strong>infringing uses required for S<strong>on</strong>y’s immunity against imputed intent to apply.Types of Evidence Relevant to Unlawful Intent. What kinds of evidence will besufficient to prove an unlawful intent or object to induce or foster infringement? The Courtnoted <strong>the</strong> classic examples of “advertising an infringing use or instructing how to engage in aninfringing use.” 1443 With respect to <strong>the</strong> case at bar, <strong>the</strong> Court noted much in <strong>the</strong> record that couldbe used to establish an intent to encourage infringement <strong>on</strong> <strong>the</strong> part of <strong>the</strong> defendants. The Courtfound three features of this evidence particularly notable:Targeting Known Demand for Infringing Activity. First, both Grokster and StreamCastshowed <strong>the</strong>mselves to be aiming to satisfy a known source of demand for copyright infringement– <strong>the</strong> market comprising former Napster users. 1444 StreamCast’s internal companycommunicati<strong>on</strong>s and advertising designs were aimed at Napster users. One ad mockup, forexample, stated, “When <strong>the</strong> lights went off at Napster … where did <strong>the</strong> users go?” 1445 Aninternal email from a company executive stated, “We have put this network in place so that whenNapster pulls <strong>the</strong> plug <strong>on</strong> <strong>the</strong>ir free service … or if <strong>the</strong> Court orders <strong>the</strong>m shut down prior to that… we will be positi<strong>on</strong>ed to capture <strong>the</strong> flood of <strong>the</strong>ir 32 milli<strong>on</strong> users that will be activelylooking for an alternative.” 1446 Significantly, <strong>the</strong> Court noted that whe<strong>the</strong>r <strong>the</strong>se internalmessages or ads were ever communicated to <strong>the</strong> public did not disqualify <strong>the</strong>m as valid evidenceof inducement, because <strong>the</strong>y tended to establish <strong>the</strong> subjective purpose in <strong>the</strong> minds of <strong>the</strong>defendants, particularly when coupled with o<strong>the</strong>r evidence of c<strong>on</strong>crete acti<strong>on</strong>s taken by <strong>the</strong>defendants. 1447 StreamCast and Grokster both distributed an “OpenNap” program, which was aNapster-compatible program for file sharing. Grokster distributed an electr<strong>on</strong>ic newsletterc<strong>on</strong>taining links to articles promoting its software’s ability to access popular copyrighted music.1440 Id.1441 Id.1442 Id.1443 Grokster, 125 S. Ct. at 2779.1444 Id. at 2781.1445 Id. Ano<strong>the</strong>r read, “Napster Inc. has announced that it will so<strong>on</strong> begin charging you a fee. That’s if <strong>the</strong> courtsd<strong>on</strong>’t order it shut down first. What will you do to get around it?” Id. at 2773.1446 Id. StreamCast delivered a press kit c<strong>on</strong>taining press articles about its potential to capture former Napsterusers, and it introduced itself to some potential advertisers as a company “which is similar to what Napsterwas.” Id. StreamCast also planned to flaunt <strong>the</strong> illegal uses of its software; its chief technology officer averredthat “<strong>the</strong> goal is to get in trouble with <strong>the</strong> law and get sued. It’s <strong>the</strong> best way to get in <strong>the</strong> news.” Id.1447 Id. at 2781. “Even if <strong>the</strong>se advertisements were not released to <strong>the</strong> public and do not show encouragement toinfringe, <strong>the</strong>y illuminate StreamCast’s purposes.” Id. at 2773 n.7.- 320 -


The Court also noted that even Grokster’s name was an apparent derivative of Napster. 1448Finally, both companies resp<strong>on</strong>ded affirmatively to requests for help in locating and playingcopyrighted materials. 1449Absence of Effort to Reduce Infringing Activity. Sec<strong>on</strong>d, <strong>the</strong> evidence of unlawfulobjective was given added significance by <strong>the</strong> fact that nei<strong>the</strong>r company attempted to developfiltering tools or o<strong>the</strong>r mechanisms to diminish <strong>the</strong> infringing activity using <strong>the</strong>ir software. 1450 In<strong>on</strong>e of <strong>the</strong> most significant footnotes in <strong>the</strong> opini<strong>on</strong>, <strong>the</strong> Court stated that, absent o<strong>the</strong>r evidenceof intent, <strong>the</strong>re is no general duty to redesign a product to reduce or avoid infringement: “Ofcourse, in <strong>the</strong> absence of o<strong>the</strong>r evidence of intent, a court would be unable to find c<strong>on</strong>tributoryinfringement liability merely based <strong>on</strong> a failure to take affirmative steps to prevent infringement,if <strong>the</strong> device o<strong>the</strong>rwise was capable of substantial n<strong>on</strong>infringing uses. Such a holding wouldtread too close to <strong>the</strong> S<strong>on</strong>y safe harbor.” 1451 However, in this case, <strong>the</strong> Court believed that, given<strong>the</strong> very str<strong>on</strong>g o<strong>the</strong>r evidence of intent to induce infringement, <strong>the</strong> failure to develop filteringtools underscored <strong>the</strong> defendants’ intenti<strong>on</strong>al facilitati<strong>on</strong> of <strong>the</strong>ir users’ infringement. 1452Moreover, <strong>the</strong> record established that <strong>the</strong> defendants had resp<strong>on</strong>ded to questi<strong>on</strong>s from <strong>the</strong>ir usersabout how to play infringing movies <strong>the</strong>y had downloaded. 1453Gains Proporti<strong>on</strong>al to Infringing Activity. Third, StreamCast’s and Grokster’s m<strong>on</strong>etarygains were proporti<strong>on</strong>al to <strong>the</strong> volume of infringement by <strong>the</strong>ir users. Because both companiesmade m<strong>on</strong>ey by selling advertising space directed to <strong>the</strong> screens of users, <strong>the</strong> more <strong>the</strong>ir softwarewas used, <strong>the</strong> more ads that would be sent out and <strong>the</strong> greater <strong>the</strong>ir advertising revenues. Thecompanies <strong>the</strong>refore had incentive to encourage high volume use, which <strong>the</strong> record showed wasinfringing. 1454 Again, <strong>the</strong> Court noted that “[t]his evidence al<strong>on</strong>e would not justify an inferenceof unlawful intent, but viewed in <strong>the</strong> c<strong>on</strong>text of <strong>the</strong> entire record its import is clear.” 1455Summary of Significant Aspects of <strong>the</strong> Court’s Ruling. Based <strong>on</strong> <strong>the</strong> preceding analysis,<strong>the</strong> following key aspects of <strong>the</strong> majority opini<strong>on</strong> can be summarized:A defendant can be liable for inducing copyright infringement where <strong>the</strong> defendant takesacts or o<strong>the</strong>r affirmative steps with <strong>the</strong> subjective intent to promote infringement. TheCourt has, however, established a high standard of proof for dem<strong>on</strong>strating <strong>the</strong> requiredsubjective intent to induce infringement, for its opini<strong>on</strong> uses language requiring “clear1448 Id. at 2773, 2780.1449 Id. at 2781.1450 Id.1451 Id. at 2781 n.12.1452 Id. at 2781.1453 Id. at 2772.1454 Id. at 2781-82.1455 Id. at 2782. Thus, “<strong>the</strong> business models employed by Grokster and StreamCast c<strong>on</strong>firm that <strong>the</strong>ir principalobject was use of <strong>the</strong>ir software to download copyrighted works.” Id. at 2774.- 321 -


expressi<strong>on</strong> or o<strong>the</strong>r affirmative steps taken to foster infringement,” 1456 “purposeful,culpable expressi<strong>on</strong> and c<strong>on</strong>duct,” 1457 and “a patently illegal objective.” 1458 The purposeof this high standard is so as not to “compromise legitimate commerce or discourageinnovati<strong>on</strong> having a lawful purpose.” 1459Inducement liability cannot be based <strong>on</strong> <strong>the</strong> mere “characteristics” of a product, includingits functi<strong>on</strong>al capability for use for infringing purposes, or <strong>on</strong> <strong>the</strong> mere “knowledge that itmay be put to infringing uses.” 1460 Instead, for inducement liability, “statements oracti<strong>on</strong>s directed to promoting infringement” through use of <strong>the</strong> technology arerequired. 1461 Thus, <strong>the</strong> Court’s rule for inducement liability focuses <strong>on</strong> subjectivepurpose of <strong>the</strong> defendant ra<strong>the</strong>r than <strong>the</strong> technology itself. Two vendors of <strong>the</strong> sametechnology could <strong>the</strong>refore have different liability depending up<strong>on</strong> <strong>the</strong>ir acti<strong>on</strong>s and <strong>the</strong>intent behind <strong>the</strong>m.Even where a distributed technology is used by some to commit infringement, <strong>the</strong> vendorof that technology can engage in ordinary acts incident to product distributi<strong>on</strong>, such asoffering customers technical support or product updates, and those acts, in <strong>the</strong>mselves,will not establish inducement liability. 1462The basic immunity of <strong>the</strong> S<strong>on</strong>y case remains intact. S<strong>on</strong>y c<strong>on</strong>tinues to “bar[] sec<strong>on</strong>daryliability based <strong>on</strong> presuming or imputing intent to cause infringement solely from <strong>the</strong>design or distributi<strong>on</strong> of a product capable of substantial lawful use, which <strong>the</strong> distributorknows is in fact used for infringement.” 1463In judging <strong>the</strong> subjective intent of a defendant accused of inducing infringement, a courtmay look at evidence of internal communicati<strong>on</strong>s (whe<strong>the</strong>r or not released to <strong>the</strong> publicor potential users), <strong>the</strong> business model of <strong>the</strong> defendant and whe<strong>the</strong>r it is predicated <strong>on</strong>infringement, product naming, advertising and press kits, customer support activities inresp<strong>on</strong>se to specific questi<strong>on</strong>s about how to use <strong>the</strong> technology for infringing acts,targeting of users who are known to be committing or likely to commit infringing actsusing <strong>the</strong> technology in questi<strong>on</strong>, whe<strong>the</strong>r <strong>the</strong> defendant has taken steps to reduce oreliminate use of its technology for infringement, and whe<strong>the</strong>r <strong>the</strong> defendant’s gain isproporti<strong>on</strong>al to infringing volume.1456 Id. at 2780.1457 Id.1458 Id. at 2782.1459 Id. at 2780.1460 Id. at 2779.1461 Id.1462 Id. at 2780.1463 Id. at 2778.- 322 -


In <strong>the</strong> absence of o<strong>the</strong>r evidence of intent, mere failure to design or redesign a technologyto avoid or reduce infringing uses, by itself, cannot form <strong>the</strong> basis of liability, if <strong>the</strong>technology is o<strong>the</strong>rwise capable of substantial n<strong>on</strong>infringing uses. 1464 Where <strong>the</strong>re iso<strong>the</strong>r evidence of purpose, however, failure to take steps to prevent infringing uses of atechnology can reinforce an inference of subjective intent to induce infringement.The traditi<strong>on</strong>al tests for sec<strong>on</strong>dary liability – <strong>the</strong> c<strong>on</strong>tributory and vicarious liabilitydoctrines – as articulated by <strong>the</strong> courts before <strong>the</strong> Grokster case remain intact.The Court left open a host of questi<strong>on</strong>s with respect to <strong>the</strong> issue of product design andinfringement avoidance, which <strong>the</strong> lower courts will be left to work out:What threshold showing of intent must be made before <strong>the</strong> failure to design a product toreduce or avoid infringement becomes relevant to show culpable purpose to encourageinfringement? The Court’s opini<strong>on</strong> generally requires “clear expressi<strong>on</strong> or o<strong>the</strong>raffirmative steps” to promote infringement. Must <strong>the</strong> plaintiff <strong>the</strong>refore show a “clearexpressi<strong>on</strong>” of purpose or “affirmative steps” taken through o<strong>the</strong>r evidence before <strong>the</strong>evidence of failure to design becomes even relevant? Or is a lesser quantum of o<strong>the</strong>revidence sufficient to trigger <strong>the</strong> relevancy of failure to design evidence, which can <strong>the</strong>nbe aggregated with such o<strong>the</strong>r evidence to make a showing of “clear expressi<strong>on</strong>”? If alesser quantum of o<strong>the</strong>r evidence is sufficient, what is that quantum? 1465 And must sucho<strong>the</strong>r evidence be direct evidence, or may it be circumstantial evidence?Once evidence of failure to design to avoid infringement becomes relevant, whatsubstantive standard governs <strong>the</strong> extent to which <strong>the</strong> product must be designed to avoidor reduce infringement? Presumably some kind of reas<strong>on</strong>ableness standard will governthat looks to both <strong>the</strong> state of <strong>the</strong> art of technology that could be deployed in <strong>the</strong> design toreduce infringement, as well as <strong>the</strong> costs and benefits of that technology.Does <strong>the</strong> copyright holder itself have a duty to reduce or prevent infringement of itscopyrighted material by deploying technology (such as DRM technology) to protect it at<strong>the</strong> time of distributi<strong>on</strong>? If so, how is <strong>the</strong> burden to deploy technological means toreduce infringement to be allocated between <strong>the</strong> copyright holder and <strong>the</strong> distributor of<strong>the</strong> products or services that are ultimately used to commit infringement?1464 Id. at 2781 n.12.1465 The inducement rule set up by <strong>the</strong> Court in Grokster appears to differ a bit from <strong>the</strong> active inducement rule inpatent law. Some patent cases, most notably Oak Industries, Inc. v. Zenith Electr<strong>on</strong>ics Corp., 726 F. Supp.1525 (N.D. Ill. 1989), distinguish between an affirmative act directed toward encouraging or promotinginfringement, and <strong>the</strong> distinct element of intent to induce, which can be proved by evidence not <strong>on</strong>ly ofaffirmative acts but also design omissi<strong>on</strong>s. By c<strong>on</strong>trast, <strong>the</strong> Grokster opini<strong>on</strong> requires that intent be shown by“clear expressi<strong>on</strong> or o<strong>the</strong>r affirmative steps taken to foster to infringement.” Unlike <strong>the</strong> patent law, <strong>the</strong>n, intentcannot be established through acts of design omissi<strong>on</strong> al<strong>on</strong>e. See Mat<strong>the</strong>w Brown et al., “Sec<strong>on</strong>dary Liabilityfor Inducing <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Infringement After MGM v. Grokster: Infringement-Preventi<strong>on</strong> and Product Design,”Journal of <strong>Internet</strong> Law, Dec. 2005, at 21, 25.- 323 -


Can a defendant use evidence of affirmative steps it took to prevent infringement as adefense to inducement liability?M<strong>on</strong>etary gain from infringing activity does not by itself justify an inference of unlawfulintent. But where <strong>the</strong>re is o<strong>the</strong>r str<strong>on</strong>g evidence of unlawful intent, gain that isproporti<strong>on</strong>al to infringing activity can be reinforcing evidence of intent. 1466 Similarquesti<strong>on</strong>s as those discussed in <strong>the</strong> preceding bullets arise with respect to <strong>the</strong> thresholdshowing of intent through o<strong>the</strong>r evidence that must be made before evidence of m<strong>on</strong>etarygain from infringing activity is relevant. Also unknown is <strong>the</strong> substantive standardgoverning what kinds of m<strong>on</strong>etary gain will be cognizable as evidence of intent topromote infringement, and how directly tied to <strong>the</strong> infringing activity such m<strong>on</strong>etary gainmust be.One can expect that <strong>the</strong> doctrine of inducement will take <strong>on</strong> a jurisprudential life of itsown, with attendant uncertainty as to standards and outcomes as fur<strong>the</strong>r judicial developmenttakes place. The focus <strong>on</strong> subjective intent and <strong>the</strong> business model of <strong>the</strong> defendant will likelymake summary judgment more difficult to obtain in inducement cases than in o<strong>the</strong>r sec<strong>on</strong>daryliability cases. Finally, <strong>on</strong>e can expect that <strong>the</strong> written record relating to development andpromoti<strong>on</strong> of a technology, including purely internal communicati<strong>on</strong>s, will be crucial to <strong>the</strong> issueof intent and <strong>the</strong>refore <strong>the</strong> focus of discovery and litigati<strong>on</strong> in inducement cases.The C<strong>on</strong>curring Opini<strong>on</strong>s – Disagreement About <strong>the</strong> Scope of <strong>the</strong> S<strong>on</strong>y Safe Harbor.Despite <strong>the</strong> urging of <strong>the</strong> petiti<strong>on</strong>ers, <strong>the</strong> majority opini<strong>on</strong> found it unnecessary to provide “amore quantified descripti<strong>on</strong>” of what level of n<strong>on</strong>infringing uses are required to qualify as“substantial” or “commercially significant” within <strong>the</strong> meaning of S<strong>on</strong>y. Six of <strong>the</strong> justices,however, in two c<strong>on</strong>curring opini<strong>on</strong>s, joined this issue and advocated significantly differentpositi<strong>on</strong>s.The first c<strong>on</strong>curring opini<strong>on</strong> was authored by Justice Ginsburg and joined by ChiefJustice Rehnquist and Justice Kennedy. Justice Ginsburg noted that, in additi<strong>on</strong> to liabilityunder <strong>the</strong> inducement doctrine articulated by <strong>the</strong> majority, <strong>on</strong>e could be liable under traditi<strong>on</strong>alc<strong>on</strong>tributory infringement principles for distributing a product that users use to infringecopyrights, if <strong>the</strong> product is not capable of “substantial” or “commercially significant” uses. 1467Without choosing between, or articulating any difference between, <strong>the</strong> two phrases “substantial”and “commercially significant,” she elaborated <strong>on</strong> her understanding of what those phrases inS<strong>on</strong>y mean collectively.Although not stating so explicitly, Justice Ginsburg’s opini<strong>on</strong> seems based <strong>on</strong> two keyinterpretati<strong>on</strong>s of <strong>the</strong> S<strong>on</strong>y safe harbor: (i) that it requires a court to focus more <strong>on</strong> actual uses ofa product, or those that are c<strong>on</strong>cretely likely to develop over time, ra<strong>the</strong>r than merely potentialuses, and (ii) that <strong>on</strong>e should balance <strong>the</strong> relative numbers of infringing and n<strong>on</strong>infringing uses,and not merely <strong>the</strong> absolute number of n<strong>on</strong>infringing uses.1466 Grokster, 125 S. Ct. at 2782.1467 Id. at 2783 (Ginsburg, J., c<strong>on</strong>curring).- 324 -


With respect to <strong>the</strong> first principle, Justice Ginsburg expressed <strong>the</strong> belief that, unlike inS<strong>on</strong>y, <strong>the</strong>re had been no finding of fair use and “little bey<strong>on</strong>d anecdotal evidence ofn<strong>on</strong>infringing uses.” 1468 She noted that <strong>the</strong> district court’s c<strong>on</strong>clusi<strong>on</strong> of substantialn<strong>on</strong>infringing uses rested almost entirely <strong>on</strong> a collecti<strong>on</strong> of declarati<strong>on</strong>s submitted by Groksterand StreamCast, and that review of those declarati<strong>on</strong>s showed a collecti<strong>on</strong> of mostly anecdotalevidence, sometimes obtained sec<strong>on</strong>d-hand, of authorized copyrighted works or public domainworks available <strong>on</strong>line and shared through peer-to-peer networks, and general statements about<strong>the</strong> benefits of peer-to-peer technology. 1469 She c<strong>on</strong>cluded that <strong>the</strong> declarati<strong>on</strong>s did not supportsummary judgment in <strong>the</strong> face of evidence proffered by <strong>the</strong> plaintiffs of “overwhelming use ofGrokster’s and StreamCast’s software for infringement” 1470 – clearly focusing <strong>on</strong> <strong>the</strong> current,actual uses of <strong>the</strong> software. Nor did she see a realistic possibility that c<strong>on</strong>crete n<strong>on</strong>infringinguses were likely to develop over time. “Fairly appraised, <strong>the</strong> evidence was insufficient todem<strong>on</strong>strate, bey<strong>on</strong>d genuine debate, a reas<strong>on</strong>able prospect that substantial or commerciallysignificant n<strong>on</strong>infringing uses were likely to develop over time.” 1471C<strong>on</strong>cerning <strong>the</strong> sec<strong>on</strong>d principle, Justice Ginsburg stated, “Even if <strong>the</strong> absolute numberof n<strong>on</strong>infringing files copied using <strong>the</strong> Grokster and StreamCast software is large, it does notfollow that <strong>the</strong> products are <strong>the</strong>refore put to substantial n<strong>on</strong>infringing uses and are thus immunefrom liability. The number of n<strong>on</strong>infringing copies may be reflective of, and dwarfed by, <strong>the</strong>huge total volume of files shared.” 1472The sec<strong>on</strong>d c<strong>on</strong>curring opini<strong>on</strong>, authored by Justice Breyer and joined by JusticesStevens and O’C<strong>on</strong>nor, expressly disagreed with Justice Ginsburg’s opini<strong>on</strong> and articulated avery different understanding of <strong>the</strong> S<strong>on</strong>y safe harbor. Justice Breyer began his analysis bynoting how low a number of actual authorized uses were required in S<strong>on</strong>y to qualify as“substantial.” Specifically, <strong>the</strong> record showed that of all <strong>the</strong> taping actually d<strong>on</strong>e by S<strong>on</strong>y’scustomers, <strong>on</strong>ly around 9% was of <strong>the</strong> sort <strong>the</strong> Court referred to as authorized, yet <strong>the</strong> Courtfound <strong>the</strong> magnitude of authorized programming was “significant.” 1473 Justice Breyer noted that<strong>the</strong> S<strong>on</strong>y Court had c<strong>on</strong>cluded from this evidence that rights owners had authorized duplicati<strong>on</strong>of <strong>the</strong>ir copyrighted programs “in significant enough numbers to create a substantial market for an<strong>on</strong>infringing use” of <strong>the</strong> VCR. 1474 By using <strong>the</strong> key word “substantial,” <strong>the</strong> S<strong>on</strong>y Court hadc<strong>on</strong>cluded that 9% authorized uses al<strong>on</strong>e c<strong>on</strong>stituted a sufficient basis for rejecting <strong>the</strong>impositi<strong>on</strong> of sec<strong>on</strong>dary liability. Justice Breyer <strong>the</strong>n c<strong>on</strong>cluded that, when measured against <strong>the</strong>evidence of authorized use present in S<strong>on</strong>y, <strong>the</strong> evidence before <strong>the</strong> Court in <strong>the</strong> Grokster caseshould be sufficient to pass <strong>the</strong> test of S<strong>on</strong>y. Specifically, <strong>the</strong> plaintiffs’ evidence showed 75%of current files available <strong>on</strong> Grokster as infringing and 15% likely infrining. That left1468 Id. at 2785.1469 Id.1470 Id. at 2786.1471 Id.1472 Id.1473 Id.1474 Id. (quoting S<strong>on</strong>y, 464 U.S. at 447 n.28) (emphasis added by Justice Breyer).- 325 -


approximately 10% of files that were apparently n<strong>on</strong>infringing, a figure very similar to <strong>the</strong> 9% ofauthorized uses of <strong>the</strong> VCR <strong>the</strong> Court faced in S<strong>on</strong>y. 1475In additi<strong>on</strong>, Justice Breyer noted that S<strong>on</strong>y’s standard also incorporates <strong>the</strong> word“capable” with respect to n<strong>on</strong>infringing uses, and c<strong>on</strong>cluded “that a figure like 10%, if fixed forall time, might well prove insufficient, but that such a figure serves as an adequate foundati<strong>on</strong>where <strong>the</strong>re is a reas<strong>on</strong>able prospect of expanded legitimate uses over time.” 1476 He found that<strong>the</strong> record revealed a significant future market for n<strong>on</strong>infringing uses of peer-to-peer softwarelike Grokster’s, and <strong>the</strong> combinati<strong>on</strong> of such foreseeable development, toge<strong>the</strong>r with anestimated 10% of existing n<strong>on</strong>infringing material, is sufficient to meet S<strong>on</strong>y’s standard. 1477Justice Breyer <strong>the</strong>n reviewed <strong>the</strong> appellate decisi<strong>on</strong>s c<strong>on</strong>struing S<strong>on</strong>y and noted that <strong>on</strong>ly<strong>on</strong>e – <strong>the</strong> Seventh Circuit’s Aimster decisi<strong>on</strong> – had interpreted S<strong>on</strong>y more strictly that he woulddo. 1478 Based <strong>on</strong> a review of those appellate decisi<strong>on</strong>s, he c<strong>on</strong>cluded that S<strong>on</strong>y establishes “that<strong>the</strong> law will not impose copyright liability up<strong>on</strong> <strong>the</strong> distributors of dual-use technologies (who d<strong>on</strong>ot <strong>the</strong>mselves engage in unauthorized copying) unless <strong>the</strong> product in questi<strong>on</strong> will be usedalmost exclusively to infringe copyrights (or unless <strong>the</strong>y actively induced infringements as wetoday describe).” 1479Justice Breyer lauded this interpretati<strong>on</strong> of S<strong>on</strong>y as encouraging technical innovati<strong>on</strong> byproviding “entrepreneurs with needed assurance that <strong>the</strong>y will be shielded from copyrightliability as <strong>the</strong>y bring valuable new technologies to market.” 1480 It does so in <strong>the</strong> followingways: 1481The S<strong>on</strong>y rule, as so interpreted, is clear, and allows those who develop new productsthat are capable of substantial n<strong>on</strong>infringing uses to know, ex ante, that distributi<strong>on</strong> of<strong>the</strong>ir product will not yield massive m<strong>on</strong>etary liability.It is str<strong>on</strong>gly technology protecting, sheltering a product unless it will be used almostexclusively to infringe.It is forward looking, and does not c<strong>on</strong>fine <strong>the</strong> safe harbor to a static snapshot of aproduct’s current uses, but ra<strong>the</strong>r looks to uses of which <strong>the</strong> product is capable. 14821475 Grokster, 125 S. Ct. at 2788-89.1476 Id. at 2789.1477 Id. at 2789-90.1478 Id. at 2790-91.1479 Id. 2791.1480 Id.1481 See id. at 2791-92.1482 Justice Breyer interpreted <strong>the</strong> word “capable” as used in S<strong>on</strong>y to refer “to a plausible, not simply a <strong>the</strong>oretical,likelihood that such uses will come to pass, and that fact anchors S<strong>on</strong>y in practical reality.” Id. at 2792.- 326 -


It is mindful of <strong>the</strong> limitati<strong>on</strong>s facing judges where matters of technology are c<strong>on</strong>cerned,since judges have no specialized technical ability to answer questi<strong>on</strong>s about present orfuture technological feasibility or commercial viability where technology professi<strong>on</strong>als,engineers, and venture capitalists may radically disagree and where answers may differdepending up<strong>on</strong> whe<strong>the</strong>r <strong>on</strong>e focuses up<strong>on</strong> <strong>the</strong> time of product development or <strong>the</strong> timeof distributi<strong>on</strong>.Justice Breyer c<strong>on</strong>cluded that a modified S<strong>on</strong>y rule as urged by <strong>the</strong> petiti<strong>on</strong>ers or asinterpreted by Justice Ginsburg would significantly chill technological development, asinnovators would have no way to predict how courts would weigh <strong>the</strong> respective values ofinfringing and n<strong>on</strong>infringing uses, determine <strong>the</strong> efficiency and advisability of technologicalchanges or assess a product’s potential future markets. 1483Justice Breyer c<strong>on</strong>cluded his opini<strong>on</strong> with <strong>the</strong> questi<strong>on</strong> of whe<strong>the</strong>r a modified S<strong>on</strong>y rulewould yield a positive copyright impact that would outweigh any technology-related loss.Although he acknowledged that a more intrusive S<strong>on</strong>y test would generally provide greaterrevenue security for copyright holders, he found it harder to c<strong>on</strong>clude that <strong>the</strong> gains to copyrightholders would exceed <strong>the</strong> losses to innovati<strong>on</strong>. “For <strong>on</strong>e thing, <strong>the</strong> law disfavors equating <strong>the</strong>two different kinds of gain and loss; ra<strong>the</strong>r, it leans in favor of protecting technology.” 1484 Inadditi<strong>on</strong>, since S<strong>on</strong>y has been <strong>the</strong> law for quite some time, <strong>the</strong>re should be a serious burden <strong>on</strong>copyright holders to show a need for a more strict interpretati<strong>on</strong> of <strong>the</strong> current rules. JusticeBreyer c<strong>on</strong>cluded that a str<strong>on</strong>g dem<strong>on</strong>strated need for interpreting <strong>the</strong> S<strong>on</strong>y standard morestrictly had not been shown and that <strong>the</strong> Court should maintain S<strong>on</strong>y, reading it as he hadinterpreted it. 1485<str<strong>on</strong>g>Issues</str<strong>on</strong>g> Left Open by <strong>the</strong> Supreme Court. The Supreme Court’s opini<strong>on</strong> left open a host ofunanswered questi<strong>on</strong>s c<strong>on</strong>cerning sec<strong>on</strong>dary liability and <strong>the</strong> scope of <strong>the</strong> S<strong>on</strong>y immunity.Am<strong>on</strong>g <strong>the</strong>m are <strong>the</strong> following:Whe<strong>the</strong>r <strong>the</strong>re is any substantive difference between <strong>the</strong> phrases “capable of substantialn<strong>on</strong>infringing uses” and “capable of commercially significant n<strong>on</strong>infringing uses” asused in S<strong>on</strong>y. N<strong>on</strong>e of <strong>the</strong> majority opini<strong>on</strong> or <strong>the</strong> two c<strong>on</strong>currences expressly analyzes adifference, and all seem to treat <strong>the</strong> phrases as interchangeable. However, given that alljustices agreed that <strong>the</strong> S<strong>on</strong>y standard need not be revisited as part of <strong>the</strong> Court’sdispositi<strong>on</strong> of <strong>the</strong> case, and given that Justice Souter introduced yet a third phrase in <strong>the</strong>majority opini<strong>on</strong> – “capable of substantial lawful use” – <strong>the</strong> issue was not definitivelyresolved by <strong>the</strong> case.Whe<strong>the</strong>r S<strong>on</strong>y requires c<strong>on</strong>siderati<strong>on</strong> of <strong>the</strong> relative balance of <strong>the</strong> infringing uses against<strong>the</strong> n<strong>on</strong>infringing uses of a technology. Justice Ginsburg’s c<strong>on</strong>currence seems to require1483 Id. at 2792-93.1484 Id. at 2793.1485 Id. at 2793-96.- 327 -


such a balance, whereas Justice Breyer’s c<strong>on</strong>currence does not. The majority opini<strong>on</strong>does not reach <strong>the</strong> issue.Whe<strong>the</strong>r S<strong>on</strong>y requires some minimal threshold of n<strong>on</strong>infringing uses, and if so, whatthat threshold is. The wide split in c<strong>on</strong>clusi<strong>on</strong>s from <strong>the</strong> record in <strong>the</strong> Grokster caseexpressed in <strong>the</strong> c<strong>on</strong>curring opini<strong>on</strong>s illustrate how unsettled this questi<strong>on</strong> was am<strong>on</strong>g <strong>the</strong>members of <strong>the</strong> Court that decided Grokster. Moreover, three justices did not express anopini<strong>on</strong> of any kind <strong>on</strong> <strong>the</strong> issue.What “capable of” means in <strong>the</strong> S<strong>on</strong>y test. Both c<strong>on</strong>currences seem to reject a meaningof purely <strong>the</strong>oretical uses. However, Justice Ginsburg’s c<strong>on</strong>currence focuses much more<strong>on</strong> <strong>the</strong> actual uses of a product, whereas Justice Breyer’s c<strong>on</strong>currence evidences more ofa willingness to look to future legitimate uses that might be precluded by a strictinterpretati<strong>on</strong> of <strong>the</strong> S<strong>on</strong>y safe harbor. Stated differently, Justice Ginsburg’s c<strong>on</strong>currenceappears predisposed to favor <strong>the</strong> copyright holders rights, whereas Justice Breyer’sc<strong>on</strong>currence is predisposed to favor technological innovati<strong>on</strong>.Whe<strong>the</strong>r <strong>the</strong> S<strong>on</strong>y immunity applies to both c<strong>on</strong>tributory and vicarious liability, or <strong>on</strong>lyto c<strong>on</strong>tributory liability. Justice Souter’s majority opini<strong>on</strong> does not address vicariousliability at all: “Because we resolve <strong>the</strong> case based <strong>on</strong> an inducement <strong>the</strong>ory, <strong>the</strong>re is n<strong>on</strong>eed to analyze separately MGM’s vicarious liability <strong>the</strong>ory.” 1486What level of active encouragement will be sufficient to find inducement in lessegregious cases. Related questi<strong>on</strong>s include (i) <strong>the</strong> meaning of “clear expressi<strong>on</strong>” of intentand “purposeful, culpable expressi<strong>on</strong> and c<strong>on</strong>duct,” and (ii) if <strong>the</strong>re is little “expressive”evidence of purpose, what kinds of acts or omissi<strong>on</strong>s will qualify as “o<strong>the</strong>r affirmativesteps taken to foster infringement.”At what point in time <strong>the</strong> defendant’s “intent” is to be measured – at <strong>the</strong> time of originaldesign of <strong>the</strong> technology, at <strong>the</strong> time of distributi<strong>on</strong>, at some o<strong>the</strong>r time?Whe<strong>the</strong>r <strong>the</strong> defendant must merely intend to induce <strong>the</strong> acts that give rise toinfringement, or intend to cause infringement itself. For example, what happens if <strong>the</strong>defendant had a good faith belief at <strong>the</strong> time of product design or promoti<strong>on</strong> that <strong>the</strong>intended acts were fair use, but <strong>the</strong>y are later judged infringing? Must <strong>the</strong> belief beobjectively reas<strong>on</strong>able?Under what circumstances failure to design or redesign a product to avoid or reduceinfringement can be used as proof of intent to induce infringement, and when a vendor oftechnology has an obligati<strong>on</strong> to redesign in order to avoid inducement liability. Asanalyzed above, <strong>the</strong>re are a host of questi<strong>on</strong>s left unanswered by <strong>the</strong> Court’s opini<strong>on</strong> withrespect to <strong>the</strong> issue of design to avoid infringement.1486 Id. at 2776 n.9 (Souter, J.).- 328 -


Whe<strong>the</strong>r <strong>the</strong> Seventh Circuit’s approach to <strong>the</strong> S<strong>on</strong>y safe harbor in <strong>the</strong> Aimster case iscorrect or not. N<strong>on</strong>e of <strong>the</strong> three opini<strong>on</strong>s in Grokster expressly address whe<strong>the</strong>r <strong>the</strong>Aimster approach erred in various aspects. The majority opini<strong>on</strong> cites <strong>the</strong> Aimster case<strong>on</strong>ly for <strong>the</strong> factual propositi<strong>on</strong> that it may be impossible to enforce rights in a protectedwork effectively against all direct infringers, making <strong>the</strong> <strong>on</strong>ly practical alternative goingagainst <strong>the</strong> distributor of <strong>the</strong> copying device for sec<strong>on</strong>dary liability. 1487 JusticeGinsburg’s c<strong>on</strong>curring opini<strong>on</strong> merely notes <strong>the</strong> c<strong>on</strong>flict between <strong>the</strong> Aimster andNapster decisi<strong>on</strong>s and states <strong>on</strong>ly that all members of <strong>the</strong> Court agree that <strong>the</strong> NinthCircuit misapplied S<strong>on</strong>y, at least to <strong>the</strong> extent it read that decisi<strong>on</strong> to limit sec<strong>on</strong>daryliability to a “hardly-ever category.” 1488 Justice Breyer’s c<strong>on</strong>curring opini<strong>on</strong> citesAimster <strong>on</strong>ly for <strong>the</strong> propositi<strong>on</strong> that <strong>the</strong>re is but a single appellate decisi<strong>on</strong> to dateinterpreting S<strong>on</strong>y more strictly than Justice Breyer would. 1489 Never<strong>the</strong>less, it seemsthat, to <strong>the</strong> extent <strong>the</strong> Aimster decisi<strong>on</strong> suggests that failure to affirmatively preventinfringing uses could by itself, without o<strong>the</strong>r evidence of unlawful intent, subject adefendant to liability, it is plainly inc<strong>on</strong>sistent with <strong>the</strong> Grokster majority opini<strong>on</strong>. 1490 Inadditi<strong>on</strong>, Aimster’s general cost/benefit balancing approach to <strong>the</strong> S<strong>on</strong>y safe harbor maynot survive <strong>the</strong> majority opini<strong>on</strong> ei<strong>the</strong>r. 1491Although <strong>the</strong> Grokster case is <strong>on</strong>e of <strong>the</strong> most important copyright decisi<strong>on</strong>s to come outof <strong>the</strong> Supreme Court, it clearly left much work to be d<strong>on</strong>e by <strong>the</strong> lower courts, and perhaps <strong>the</strong>Supreme Court itself in future copyright decisi<strong>on</strong>s, to work out <strong>the</strong> boundaries of <strong>the</strong> copyrightinducement doctrine and <strong>the</strong> S<strong>on</strong>y safe harbor.(6) The Grokster Decisi<strong>on</strong> <strong>on</strong> Remand(i)The Ruling <strong>on</strong> LiabilityDefendant Grokster settled with <strong>the</strong> plaintiffs shortly after <strong>the</strong> Supreme Court’s decisi<strong>on</strong>.On remand from <strong>the</strong> Supreme Court, <strong>the</strong> district court granted <strong>the</strong> plaintiffs’ moti<strong>on</strong> for summaryjudgment as to liability of defendants StreamCast and Sharman for inducing copyrightinfringement. 1492 Not surprisingly, <strong>the</strong> district court’s ruling essentially tracked <strong>the</strong> Supreme1487 Id. at 2776.1488 Id. at 2784 n.1 (Ginsburg, J., c<strong>on</strong>curring).1489 Id. at 2790 (Breyer, J., c<strong>on</strong>curring).1490 “Of course, in <strong>the</strong> absence of o<strong>the</strong>r evidence of intent, a court would be unable to find c<strong>on</strong>tributoryinfringement liability merely based <strong>on</strong> a failure to take affirmative steps to prevent infringement, if <strong>the</strong> deviceo<strong>the</strong>rwise was capable of substantial n<strong>on</strong>infringing uses. Such a holding would tread too close to <strong>the</strong> S<strong>on</strong>y safeharbor.” Id. at 2781 n.12 (Souter, J.).1491 See Mitchell Zimmerman, “Does Aimster Survive Grokster,” Cyberspace Lawyer, Dec. 2005, at 1 (noting thatAimster insisted that “balancing of costs and benefits is necessary,” even in cases “in which substantialn<strong>on</strong>infringing uses, present or prospective, are dem<strong>on</strong>strated, whereas Grokster says instead that “<strong>the</strong> [S<strong>on</strong>y]doctrine absolves <strong>the</strong> equivocal c<strong>on</strong>duct of selling an item with substantial lawful as well as unlawful uses …”).Mr. Zimmerman’s article notes several o<strong>the</strong>r ways in which <strong>the</strong> Grokster majority opini<strong>on</strong> may sub silentiodisapprove of Aimster.1492 Metro-Goldwyn-Mayer Studios, Inc. v. Grokster, 454 F. Supp. 2d 966 (C.D. Cal. 2006).- 329 -


Court’s analysis, which had str<strong>on</strong>gly presaged <strong>the</strong> ultimate outcome of <strong>the</strong> case. 1493 By andlarge, <strong>the</strong> district court’s opini<strong>on</strong> did little more than elaborate factually <strong>on</strong> <strong>the</strong> various bases <strong>the</strong>Supreme Court had identified in its opini<strong>on</strong> up<strong>on</strong> which <strong>the</strong> defendants could be held liableunder <strong>the</strong> inducement doctrine.The district court may, however, have put <strong>on</strong>e important gloss <strong>on</strong> <strong>the</strong> Supreme Court’slegal rulings that may represent an extensi<strong>on</strong> of <strong>the</strong> scope of inducement liability. Specifically,StreamCast argued that a defendant could be found liable under <strong>the</strong> inducement doctrine <strong>on</strong>ly ifit: (1) for <strong>the</strong> purpose of inducing infringement, (2) took acti<strong>on</strong>s bey<strong>on</strong>d distributinginfringement enabling technology, and (3) which actually resulted in specific instances ofinfringement. In StreamCast’s view, even if it distributed peer-to-peer software with <strong>the</strong> intentfor it to be used for infringement, liability would not attach unless it took fur<strong>the</strong>r acti<strong>on</strong>s, such asoffering instructi<strong>on</strong>s <strong>on</strong> infringing use, that actually caused specific acts of infringement.StreamCast devoted much energy to arguing that <strong>the</strong> plaintiffs had failed to prove <strong>the</strong> sec<strong>on</strong>d andthird elements of its proposed test. 1494The district court rejected StreamCast’s argument, finding it c<strong>on</strong>trary to <strong>the</strong> followinglanguage from <strong>the</strong> Supreme Court’s decisi<strong>on</strong>:It is not <strong>on</strong>ly that encouraging a particular c<strong>on</strong>sumer to infringe a copyright cangive rise to sec<strong>on</strong>dary liability for <strong>the</strong> infringement that results. Inducementliability goes bey<strong>on</strong>d that, and <strong>the</strong> distributi<strong>on</strong> of a product can itself give rise toliability where evidence shows that <strong>the</strong> distributor intended and encouraged <strong>the</strong>product to be used to infringe. In such a case, <strong>the</strong> culpable c<strong>on</strong>duct is not merely<strong>the</strong> encouragement of infringement but also <strong>the</strong> distributi<strong>on</strong> of <strong>the</strong> tool intendedfor infringing use. 1495From this passage, <strong>the</strong> district court went <strong>on</strong> to c<strong>on</strong>clude, “Thus, Plaintiffs need not provethat StreamCast undertook specific acti<strong>on</strong>s, bey<strong>on</strong>d product distributi<strong>on</strong>, that caused specific actsof infringement. Instead, Plaintiffs need prove <strong>on</strong>ly that StreamCast distributed <strong>the</strong> product with<strong>the</strong> intent to encourage infringement.” 1496 Although not entirely clear, it appears that in <strong>the</strong>district court’s view, as l<strong>on</strong>g as a defendant has a subjective intent to encourage infringement,<strong>the</strong> mere distributi<strong>on</strong> of a product that is used by o<strong>the</strong>rs to commit infringement is sufficient tomake <strong>the</strong> distributor of <strong>the</strong> product sec<strong>on</strong>darily liable. Such a rule, however, appears to beinc<strong>on</strong>sistent with <strong>the</strong> Supreme Court’s ruling. In <strong>the</strong> passage quoted by <strong>the</strong> district court, <strong>the</strong>Supreme Court stated that “distributi<strong>on</strong> of a product can itself give rise to liability whereevidence shows that <strong>the</strong> distributor intended and encouraged <strong>the</strong> product to be used toinfringe.” 1497 The use of <strong>the</strong> c<strong>on</strong>junctive “and” followed by a requirement of encouraging a1493 Indeed, <strong>the</strong> district court noted in its opini<strong>on</strong> after reviewing all <strong>the</strong> evidence that “in Grokster <strong>the</strong> SupremeCourt had hinted that summary judgment should be granted for Plaintiffs after reviewing much of <strong>the</strong> sameevidence.” Id. at 992.1494 Id. at 984.1495 Id. at 984-85 (quoting Grokster, 125 S. Ct. at 2782 n.13).1496 454 F. Supp. 2d at 985.1497 Grokster, 125 S. Ct. at 2782 n.13 (emphasis added).- 330 -


product to be used to infringe suggests that <strong>the</strong> Supreme Court did not view distributi<strong>on</strong> of aproduct al<strong>on</strong>e, coupled with a subjective intent <strong>on</strong> <strong>the</strong> part of <strong>the</strong> distributor to encourageinfringement, would be sufficient for inducement liability. Ra<strong>the</strong>r, <strong>the</strong> distributor must inadditi<strong>on</strong> take acti<strong>on</strong>s that encourage <strong>the</strong> product to be used to infringe. Although <strong>the</strong> facts of <strong>the</strong>case, as elaborated below, seem sufficient to establish StreamCast’s liability under ei<strong>the</strong>r rule,<strong>the</strong> district court’s articulati<strong>on</strong> of <strong>the</strong> rule seems broader than, and <strong>the</strong>refore c<strong>on</strong>trary to, <strong>the</strong>Supreme Court’s Grokster ruling.In any event, following <strong>the</strong> outline of <strong>the</strong> Supreme Court’s analysis, <strong>the</strong> district courtfound a sufficient basis for inducement liability <strong>on</strong> <strong>the</strong> part of StreamCast based up<strong>on</strong> <strong>the</strong>following facts:-- StreamCast’s software was used overwhelmingly for infringement: A study by <strong>the</strong>plaintiffs’ experts showed that 87.33% of <strong>the</strong> files offered for distributi<strong>on</strong> <strong>on</strong> <strong>the</strong> Morpheusnetwork, and that almost 97% of <strong>the</strong> files actually requested for downloading, were infringing orhighly likely to be infringing. The district court noted that, while infringing use by third partieswas not by itself evidence of StreamCast’s intent, <strong>the</strong> staggering scale of infringement made itmore likely that StreamCast c<strong>on</strong>d<strong>on</strong>ed illegal use and provided a backdrop against which all ofStreamCast’s acti<strong>on</strong>s had to be assessed. 1498-- StreamCast targeted Napster users: The district court found unc<strong>on</strong>troverted evidence,including internal communicati<strong>on</strong>s, promoti<strong>on</strong>al efforts, advertising designs, and actualadvertisements, establishing that StreamCast purposefully targeted Napster users, not merely tomarket to <strong>the</strong>m, but to c<strong>on</strong>vert <strong>the</strong>m into StreamCast users by offering <strong>the</strong>m <strong>the</strong> same file-sharingservice that Napster had itself offered. 1499-- StreamCast assisted infringing uses: StreamCast provided users with technicalassistance for playback of copyrighted c<strong>on</strong>tent, in <strong>on</strong>e instance suggesting to a user whocomplained about <strong>the</strong> paucity of music from Elvis and Muddy Waters that he upload copyrightedc<strong>on</strong>tent for sharing. 1500-- StreamCast ensured its technology had infringing capabilities: Am<strong>on</strong>g o<strong>the</strong>r things,<strong>the</strong> district court cited to evidence that, before deciding to license FastTrack technology forMorpheus, StreamCast’s chairman evaluated FastTrack by searching for Garth Brooks s<strong>on</strong>gs <strong>on</strong><strong>the</strong> FastTrack network. While Morpheus was in beta testing, StreamCast employees identified<strong>the</strong> insufficient quantity of popular copyrighted c<strong>on</strong>tent <strong>on</strong> <strong>the</strong> network as an important problem,and many StreamCast employees tested <strong>the</strong> software’s infringing capabilities by downloadingcopyrighted tracks. The Morpheus interface c<strong>on</strong>tained a search category for “Top 40” s<strong>on</strong>gs thatwere almost invariably copyrighted. And <strong>the</strong> court noted that StreamCast took active steps toprotect illegal file trading from <strong>the</strong> enforcement efforts of copyright holders and deployed1498 454 F. Supp. 2d at 985.1499 Id. at 985-86.1500 Id. at 986-87.- 331 -


encrypti<strong>on</strong> technology so that <strong>the</strong> plaintiffs could not see what files were being transferredthrough Morpheus. 1501-- StreamCast’s business model depended <strong>on</strong> massive infringing use: The recordestablished that StreamCast knew its business model depended <strong>on</strong> massive infringing use, andacted to grow its business accordingly. StreamCast’s CTO testified that StreamCast’s objectivein advertising to Napster users was to increase <strong>the</strong> number of users by increasing <strong>the</strong> amount offile sharing, since <strong>the</strong> more files that were physically available, <strong>the</strong> more users would come. Thecompany tracked its progress after launch by tracking <strong>the</strong> number of files that were available forsharing, particularly as against those available for sharing through Napster. 1502-- StreamCast took no meaningful affirmative steps to prevent infringement: Althoughnoting that sec<strong>on</strong>dary liability could not be premised <strong>on</strong> failure to prevent infringing use al<strong>on</strong>e,<strong>the</strong> district court noted <strong>the</strong> Supreme Court’s holding that a defendant’s failure to do so canindicate an intent to facilitate infringement. 1503 Based <strong>on</strong> this, <strong>the</strong> district court ruled, “Byimplicati<strong>on</strong>, although StreamCast is not required to prevent all <strong>the</strong> harm that is facilitated by <strong>the</strong>technology, it must at least make a good faith attempt to mitigate <strong>the</strong> massive infringementfacilitated by its technology.” 1504 The district court noted at least two technologies thatStreamCast could have used to implement a system to filter out copyrighted c<strong>on</strong>tent from <strong>the</strong>Morpheus network – acoustic fingerprinting using unique digital signatures for each music filefor identificati<strong>on</strong> and metadata that describes <strong>the</strong> properties of a file, such as s<strong>on</strong>g title and artistname. With respect to <strong>the</strong> latter, <strong>the</strong> court noted that Morpheus executed file searches <strong>on</strong> <strong>the</strong>basis of metadata such as s<strong>on</strong>g names, and c<strong>on</strong>tained a feature that, if activated by <strong>the</strong> user,would filter out pornographic c<strong>on</strong>tent <strong>on</strong> <strong>the</strong> basis of file name. The plaintiffs argued that <strong>the</strong>technology behind <strong>the</strong> pornographic filter could easily have been rec<strong>on</strong>figured to filter outcopyrighted c<strong>on</strong>tent. 1505StreamCast countered that metadata filtering would be burdensome and overbroad, as itwould block all files that shared comm<strong>on</strong> words in metadata, even if <strong>the</strong> file was notcopyrighted. StreamCast also argued that, with regard to FastTrack-based versi<strong>on</strong>s of Morpheus,it did not have <strong>the</strong> ability to directly modify <strong>the</strong> FastTrack source code, which <strong>the</strong> licensorc<strong>on</strong>trolled, to implement filtering. 1506 The court noted that, based <strong>on</strong> <strong>the</strong> foregoing, a jury couldreas<strong>on</strong>ably agree with StreamCast that copyright filtering would not work perfectly andimplementing it would negatively impact usability. 1507 However, <strong>the</strong> court ruled that “<strong>the</strong>ultimate questi<strong>on</strong> … is to examine StreamCast’s intent. Even if filtering technology does notwork perfectly and c<strong>on</strong>tains negative side effects <strong>on</strong> usability, <strong>the</strong> fact that a defendant fails to1501 Id. at 987-88.1502 Id. at 988-89.1503 Id. at 989.1504 Id.1505 Id. at 989-90.1506 Id. at 990.1507 Id.- 332 -


make some effort to mitigate abusive use of its technology may still support an inference ofintent to encourage infringement.” 1508The court fur<strong>the</strong>r noted that StreamCast saw its resistance to filtering as a competitiveadvantage, citing testim<strong>on</strong>y of StreamCast’s chairman that if Napster were forced to filter,StreamCast would take all of Napster’s users. StreamCast was unreceptive when it wasapproached by GraceNote, a company that had worked with Napster <strong>on</strong> a way to use acousticfingerprinting technology to identify copyrighted music and pay copyright holders. 1509Finally, <strong>the</strong> court ruled, although not in <strong>the</strong> c<strong>on</strong>text of a DMCA safe harbor defenseasserted by StreamCast, that StreamCast’s blocking of users from its network in resp<strong>on</strong>se torequests from copyright holders was insufficient to absolve it from liability:This Court recognizes that StreamCast blocked certain users from its networkwhen asked to do so by copyright holders. However, its effort was half-hearted atbest. As described above, StreamCast used encrypti<strong>on</strong> technology to defeatPlaintiffs’ m<strong>on</strong>itoring efforts. Moreover, blocking users was not very effectivebecause a user could simply create a new username to re-enter <strong>the</strong> network undera different identity. StreamCast had <strong>the</strong> capability of automatically blocking<strong>the</strong>se users <strong>on</strong> a rolling basis, but expressly decided not to do so. 1510Based <strong>on</strong> <strong>the</strong>se factual findings, <strong>the</strong> court c<strong>on</strong>cluded that “evidence of StreamCast’sobjective of promoting infringement is overwhelming” and granted summary judgment ofliability for inducement <strong>on</strong> <strong>the</strong> part of StreamCast. 1511(ii)The Permanent Injuncti<strong>on</strong>In a subsequent opini<strong>on</strong>, <strong>the</strong> district court c<strong>on</strong>sidered <strong>the</strong> plaintiffs’ proposal for a verybroad permanent injuncti<strong>on</strong> against StreamCast. 1512 The court noted that, under <strong>the</strong> SupremeCourt’s decisi<strong>on</strong> in <strong>the</strong> eBay case, 1513 to be entitled to a permanent injuncti<strong>on</strong> <strong>on</strong> <strong>the</strong>ircopyrights, <strong>the</strong> plaintiffs were required to satisfy <strong>the</strong> traditi<strong>on</strong>al four part test for injunctive reliefof irreparable harm, inadequate remedies at law, a balance of hardships in <strong>the</strong>ir favor, and that<strong>the</strong> public interest would not be disserved by an injuncti<strong>on</strong>. 1514 The court first turned to whe<strong>the</strong>r,having established infringement, <strong>the</strong> plaintiffs were entitled to a presumpti<strong>on</strong> of irreparableharm, and c<strong>on</strong>cluded that a presumpti<strong>on</strong> of irreparable harm no l<strong>on</strong>ger inures to a plaintiff after1508 Id.1509 Id. at 991.1510 Id. at 992. The court did not elaborate <strong>on</strong> how StreamCast could have automatically blocked users <strong>on</strong> a “rollingbasis.”1511 Id. at 992, 999.1512 Metro-Goldwyn-Mayer Studios, Inc. v. Grokster, Ltd., 2007 U.S. Dist. LEXIS 79726 (C.D. Cal. Oct. 16, 2007).1513 eBay, Inc. v. MercExchange, L.L.C., 126 S. Ct. 1837 (2006).1514 Grokster, 2007 U.S. Dist. LEXIS at *30.- 333 -


eBay in a permanent injuncti<strong>on</strong> case. 1515 Never<strong>the</strong>less, <strong>the</strong> court found that irreparable harm hadbeen established for two reas<strong>on</strong>s. First, Streamcast had and would c<strong>on</strong>tinue to induce far moreinfringement than it could ever possibly redress with damages. Sec<strong>on</strong>d, absent an injuncti<strong>on</strong>, asubstantial number of <strong>the</strong> plaintiffs’ copyrighted works would c<strong>on</strong>tinue to be made available forunending infringement outside of <strong>the</strong> Morpheus system and software, effectively eviscerating <strong>the</strong>plaintiffs’ ability to protect <strong>the</strong>ir property rights. 1516The court found that <strong>the</strong> plaintiffs had no adequate remedy at law because a statutoryrecovery for those infringements induced through <strong>the</strong> Morpheus system would not compensate<strong>the</strong> plaintiffs when those same files were subsequently shared outside <strong>the</strong> Morpheus system. Thebalance of hardships tipped in <strong>the</strong> plaintiffs’ favor because StreamCast would likely engage infur<strong>the</strong>r inducement in <strong>the</strong> absence of a permanent injuncti<strong>on</strong>. Finally, an injuncti<strong>on</strong> would serve<strong>the</strong> public interest since it would protect <strong>the</strong> plaintiffs’ copyrights against increasedinfringement. 1517Turning to <strong>the</strong> scope of <strong>the</strong> injuncti<strong>on</strong>, <strong>the</strong> court first ruled that <strong>the</strong> scope should notextend bey<strong>on</strong>d inducement activities, because inducement was <strong>the</strong> <strong>on</strong>ly form of infringement thatStreamCast had been found liable for. Accordingly, <strong>the</strong> court rejected <strong>the</strong> plaintiffs’ proposedbroad wording for <strong>the</strong> injuncti<strong>on</strong> to <strong>the</strong> extent it would reach activities giving rise to liabilitysolely under c<strong>on</strong>tributory or vicarious liability doctrines, although <strong>the</strong> court noted that <strong>the</strong>injuncti<strong>on</strong> could properly extend to copyrighted works of <strong>the</strong> plaintiffs whe<strong>the</strong>r <strong>the</strong>n in existenceor later created. 1518The court <strong>the</strong>n turned to <strong>the</strong> most interesting and significant issue relating to <strong>the</strong>injuncti<strong>on</strong> – whe<strong>the</strong>r it should require StreamCast to implement filtering of <strong>the</strong> plaintiffs’copyrighted works <strong>on</strong> its system, and if so, to what extent. StreamCast argued that, under S<strong>on</strong>y,its c<strong>on</strong>tinued distributi<strong>on</strong> of <strong>the</strong> Morpheus system and software was legal, even without filteringtechnology, so l<strong>on</strong>g as StreamCast did not engage in any additi<strong>on</strong>al acti<strong>on</strong>s or statementspromoting infringement, because <strong>the</strong> system and software were capable of substantial n<strong>on</strong>infringinguses. 1519 The court rejected this argument, reas<strong>on</strong>ing that under <strong>the</strong> Supreme Court’sGrokster opini<strong>on</strong>, <strong>on</strong>ce acts of encouragement or promoti<strong>on</strong> of infringement through a product orsystem have taken place, <strong>the</strong> fur<strong>the</strong>r distributi<strong>on</strong> of that product or system can be restricted asfur<strong>the</strong>r acts of inducement:1515 Id. at *38-40. The court noted significant divisi<strong>on</strong> am<strong>on</strong>g <strong>the</strong> existing post eBay decisi<strong>on</strong>s c<strong>on</strong>cerning whe<strong>the</strong>r<strong>the</strong> traditi<strong>on</strong>al presumpti<strong>on</strong> of irreparable harm in a preliminary injuncti<strong>on</strong> c<strong>on</strong>text flowing from a showing oflikelihood of success <strong>on</strong> <strong>the</strong> merits also failed to survive eBay. The court noted that, although <strong>the</strong> law wasmuddled and <strong>the</strong> Ninth Circuit had not yet spoken <strong>on</strong> <strong>the</strong> point post eBay, <strong>the</strong> better view is that <strong>the</strong>presumpti<strong>on</strong> probably did not survive eBay in a preliminary injuncti<strong>on</strong> c<strong>on</strong>text. Id. at *43-49.1516 Id. at *57-62. The court ruled it would make no difference to <strong>the</strong> irreparable harm analysis if Streamcast’sinducement was dem<strong>on</strong>strated to increase <strong>the</strong> plaintiffs’ sales because, as copyright owners, plaintiffs “have <strong>the</strong>exclusive right to decide when and how <strong>the</strong>ir material should be reproduced and/or distributed, regardless ofwhe<strong>the</strong>r <strong>the</strong>ir decisi<strong>on</strong>s make good business sense.” Id. at *63.1517 Id. at *66-73.1518 Id. at *88,-94.1519 Id. at *100.- 334 -


It is important to recognize that <strong>the</strong> Supreme Court did not impose any stricttiming relati<strong>on</strong>ship between specific acts promoting infringements, distributi<strong>on</strong>,and <strong>the</strong> direct infringements <strong>the</strong>mselves. For a party to be liable for inducement,distributi<strong>on</strong> may begin prior to any promoti<strong>on</strong> of infringement, distributi<strong>on</strong> andpromoti<strong>on</strong> can occur at <strong>the</strong> same time, and most critically, distributi<strong>on</strong> can followpast promoti<strong>on</strong>. … As a matter of comm<strong>on</strong> sense, a successful inducer willsometimes have no need to repeat <strong>the</strong> infringing message ad infinitum. This isespecially likely to be <strong>the</strong> case where <strong>the</strong> product in questi<strong>on</strong> is overwhelminglyused for infringing purposes, and requires little or no specialized training tooperate. At a certain point, <strong>the</strong> inducer can simply c<strong>on</strong>tinue to distribute <strong>the</strong>product without any additi<strong>on</strong>al active encouragement, recognizing that <strong>the</strong>marketplace will resp<strong>on</strong>d in turn.Thus, <strong>on</strong>ce <strong>the</strong> market has internalized <strong>the</strong> inducer’s promoti<strong>on</strong> of infringement,<strong>the</strong> resulting infringements should be attributable to that defendant even thoughhe/she no l<strong>on</strong>ger chooses to actively promote that message. … Thus, distributi<strong>on</strong>of a product capable of substantial n<strong>on</strong>infringing uses, even after <strong>the</strong>promoti<strong>on</strong>/encouragement of infringement ceases, can by itself c<strong>on</strong>stituteinducement. 1520In view of <strong>the</strong>se principles, <strong>the</strong> court c<strong>on</strong>cluded that <strong>the</strong> injuncti<strong>on</strong> must impose afiltering obligati<strong>on</strong> <strong>on</strong> StreamCast because an unfiltered Morpheus system and software wouldnecessarily capitalize <strong>on</strong> and remain inexorably linked to StreamCast’s historical efforts topromote infringement. 1521 The court rejected, however, <strong>the</strong> plaintiffs proposal that StreamCastbe enjoined from distributing Morpheus or ano<strong>the</strong>r peer-to-peer network unless and until it haddem<strong>on</strong>strated to <strong>the</strong> court’s satisfacti<strong>on</strong> that it c<strong>on</strong>tained “robust and secure means exhaustivelyto prevent users from using” <strong>the</strong> system to infringe. 1522 The court noted that <strong>the</strong>re is no filteringsystem that could “exhaustively” stop every single potential infringement <strong>on</strong> a peer-to-peernetwork, and plaintiffs should not, through a standard that stringent, be effectively given <strong>the</strong>right to prohibit entirely <strong>the</strong> distributi<strong>on</strong> of a product having substantial n<strong>on</strong>infringing uses. 1523Instead, <strong>the</strong> court c<strong>on</strong>cluded that it would issue a permanent injuncti<strong>on</strong> requiringStreamCast to reduce Morpheus’ infringing capabilities, while preserving its core n<strong>on</strong>infringingfuncti<strong>on</strong>ality, as effectively as possible. 1524 “Streamcast’s duties will include, but not necessarilybe limited to: (1) a filter as part of future Morpheus software distributed to <strong>the</strong> public; and (2)steps to encourage end-user upgrades from n<strong>on</strong>-filtered software.” 1525 The court noted that costof such filtering, while a relevant criteri<strong>on</strong> if all else were equal, “is not likely a c<strong>on</strong>trolling1520 Id. at *106-08.1521 Id. at *110-11.1522 Id. at *112.1523 Id. at *113-14.1524 Id. at *115.1525 Id. at *115-16.- 335 -


factor, as <strong>the</strong> injuncti<strong>on</strong> will be designed primarily to protect Plaintiffs’ copyrights. The merefact that an adjudicated infringer may have to expend substantial resources to prevent <strong>the</strong>c<strong>on</strong>summati<strong>on</strong> of fur<strong>the</strong>r induced infringements is not a central c<strong>on</strong>cern.” 1526Lastly, <strong>the</strong> court turned to <strong>the</strong> issue of whe<strong>the</strong>r, and to what extent, <strong>the</strong> injuncti<strong>on</strong> shouldrequire notice from <strong>the</strong> plaintiffs of <strong>the</strong>ir copyrighted works in order to trigger StreamCast’s dutyto filter those works. The court noted that in <strong>the</strong> Napster case <strong>the</strong> Ninth Circuit had imposednotice obligati<strong>on</strong>s <strong>on</strong> <strong>the</strong> plaintiffs before Napster had a duty to disable access to <strong>the</strong> offendingc<strong>on</strong>tent <strong>on</strong> its system. 1527 The court reflected that, although S<strong>on</strong>y’s knowledge pr<strong>on</strong>g iscompletely irrelevant to whe<strong>the</strong>r <strong>on</strong>e can be held liable as a vicarious infringer, <strong>the</strong> Ninth Circuithad never<strong>the</strong>less, by imposing a notice requirement <strong>on</strong> <strong>the</strong> plaintiffs, essentially allowed S<strong>on</strong>ynotice c<strong>on</strong>cerns “to creep back into <strong>the</strong> vicarious infringement analysis for purposes of aninjuncti<strong>on</strong>.” 1528 Accordingly, although actual notice of specific infringing files and <strong>the</strong> failure toremove <strong>the</strong>m is not a prerequisite to inducement liability in <strong>the</strong> first instance, <strong>the</strong> Ninth Circuit’sNapster ruling informed <strong>the</strong> court that, like vicarious infringement, notice should be relevant to<strong>the</strong> injuncti<strong>on</strong> against StreamCast. 1529 The court ruled that StreamCast’s duty to filter anyparticular copyrighted work would commence up<strong>on</strong> <strong>the</strong> plaintiffs’ provisi<strong>on</strong> of notice in <strong>the</strong> formof artist-title pair, a certificati<strong>on</strong> of ownership, and some evidence that <strong>on</strong>e or more filesc<strong>on</strong>taining each work was available <strong>on</strong> <strong>the</strong> Morpheus system. 1530By order dated Nov. 29, 2007, <strong>the</strong> court appointed a special master, Andy Johns<strong>on</strong>-Laird,to assist <strong>the</strong> court. The court ordered <strong>the</strong> special master to report <strong>on</strong> <strong>the</strong> type of filtering systemthat should be used (e.g., artist and title matching, hash value digital fingerprinting, and/oracoustical fingerprinting) for <strong>the</strong> most effectiveness at eliminating <strong>the</strong> greatest number ofinfringing works while allowing <strong>the</strong> core n<strong>on</strong>infringing uses to c<strong>on</strong>tinue, and <strong>on</strong> <strong>the</strong> mosteffective way by which StreamCast could encourage current users of legacy software versi<strong>on</strong>s toupgrade to a versi<strong>on</strong> that possessed <strong>the</strong> requisite filtering technology. 1531 “The final Report shallinclude a comprehensive regimen of <strong>the</strong> acti<strong>on</strong>s StreamCast needs to undertake, <strong>the</strong> forms offiltering necessary, and <strong>the</strong> methods for implementati<strong>on</strong> of <strong>the</strong>se tools. Such a Report is to1526 Id. at *117.1527 Id. at *118-19.1528 Id. at *120.1529 Id. at *121. The court amplified as follows: “One might argue that Napster’s notice requirement should not befollowed in light of <strong>the</strong> Supreme Court’s Grokster opini<strong>on</strong>. At <strong>on</strong>e point, <strong>the</strong> Supreme Court stated that ‘S<strong>on</strong>ydid not displace o<strong>the</strong>r <strong>the</strong>ories of sec<strong>on</strong>dary liability,’ and is c<strong>on</strong>fined to cases involving ‘imputed intent.’ Itcould reas<strong>on</strong>ably be argued, as a result, that S<strong>on</strong>y occupies a much less central positi<strong>on</strong> in <strong>the</strong> copyright fieldthan was previously understood. Since S<strong>on</strong>y cannot preclude vicarious and inducement liability, <strong>the</strong> doctrinecould now be viewed as irrelevant to injuncti<strong>on</strong>s aimed at preventing such violati<strong>on</strong>s. However, this Court willnot read this implicati<strong>on</strong> into <strong>the</strong> Supreme Court’s ruling, nor hold that Napster has been overruled sub silentio<strong>on</strong> this questi<strong>on</strong>.” Id. at *121-22 (citati<strong>on</strong>s omitted).1530 Id. at *123.1531 Order re Appointment of Special Master, Metro-Goldwyn-Mayer Studios, Inc. v. Grokster, Ltd., CV 01-8541SVW (C.D. Cal. Nov. 29, 2007) at pp. 5-7.- 336 -


include any details of <strong>the</strong> filtering, such as how StreamCast can adopt keyword filters, comm<strong>on</strong>misspellings, and file extensi<strong>on</strong>s into filtering technology.” 1532(7) The Audiogalaxy CaseOn May 24, 2002, various record companies, music publishers and s<strong>on</strong>gwriters filed aclass acti<strong>on</strong> lawsuit against <strong>the</strong> peer-to-peer filing sharing service Audiogalaxy, alleging liabilityfor c<strong>on</strong>tributory and vicarious copyright infringement for facilitating <strong>the</strong> copying of digital musicfiles over <strong>the</strong> <strong>Internet</strong>. The plaintiffs alleged that <strong>the</strong> Audiogalaxy service was even worse than<strong>the</strong> Napster system in facilitating infringement, because <strong>the</strong> Audiogalaxy service allowed usersto download entire record albums, cover art, and software. 1533 Less than <strong>on</strong>e m<strong>on</strong>th later, <strong>on</strong>June 17, 2002, <strong>the</strong> plaintiffs announced a settlement with Audiogalaxy that required <strong>the</strong> filesharing service to halt <strong>the</strong> infringement of copyrighted works <strong>on</strong> its network and allowed, but didnot require, <strong>the</strong> service to employ a “filter-in” system that would not make music availablewithout <strong>the</strong> c<strong>on</strong>sent of <strong>the</strong> copyright holder. Audiogalaxy also agreed to pay <strong>the</strong> plaintiffs asubstantial sum in settlement. 1534(8) The Hummer Winblad/Bertelsmann Litigati<strong>on</strong>After Napster filed for bankruptcy, several of <strong>the</strong> plaintiffs in <strong>the</strong> Napster litigati<strong>on</strong>brought suit against <strong>the</strong> venture capital firm Hummer Winblad and <strong>the</strong> media companyBertelsmann AG, each of which had funded Napster, seeking to hold those defendantssec<strong>on</strong>darily liable for <strong>the</strong> infringement of <strong>the</strong> plaintiffs’ works committed through <strong>the</strong> Napstersystem. The plaintiffs alleged that by investing in Napster and assuming c<strong>on</strong>trol of <strong>the</strong> operati<strong>on</strong>of Napster, 1535 <strong>the</strong> defendants c<strong>on</strong>tributorily and vicariously infringed <strong>the</strong> plaintiffs’ rights. InJuly of 2004, Judge Patel denied summary judgment moti<strong>on</strong>s filed by <strong>the</strong> defendants, ruling that<strong>the</strong> plaintiffs’ allegati<strong>on</strong>s that Bertelsmann and Hummer Winblad “exercised essentially fulloperati<strong>on</strong>al c<strong>on</strong>trol over Napster during periods in which Napster remained a c<strong>on</strong>duit forinfringing activity” would, if proved, give rise to liability for c<strong>on</strong>tributory and vicariousinfringement. 1536The defendants subsequently filed moti<strong>on</strong>s for summary judgment seeking to limit <strong>the</strong>irliability for copyright infringement to those works that were <strong>the</strong> subject of notice to Napster, andmore narrowly, those works of which Bertelsmann had actual notice, in view of <strong>the</strong> NinthCircuit’s rulings in Napster I and Napster II, discussed extensively in Secti<strong>on</strong> III.C.2(c)(1)above. Judge Patel’s opini<strong>on</strong> of May 2006 denying such moti<strong>on</strong>s 1537 afforded her an interesting1532 Id. at p. 7.1533 “Record Labels, Music Publishers, S<strong>on</strong>gwriters Sue Audiogalaxy; Allege It Is Same as Napster,” BNA’sElectr<strong>on</strong>ic Commerce & Law Report (June 5, 2002) at 561-62.1534 “RIAA, NMPA Reach Settlement With Audiogalaxy,” BNA’s Electr<strong>on</strong>ic Commerce & Law Report (June 26,2002) at 655.1535 Hank Berry, a partner at <strong>the</strong> Hummer Winblad firm, was installed by Hummer Winblad as Napster’s CEOshortly after Hummer Winblad made a substantial venture capital investment in Napster.1536 UMG Recordings, Inc. v. Bertelsmann AG, 222 F.R.D. 408 (N.D. Cal. 2004).1537 In re Napster, Inc. <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Litigati<strong>on</strong>, 2006 U.S. Dist. LEXIS 30338 (N.D. Cal. May 17, 2006).- 337 -


and detailed opportunity to c<strong>on</strong>strue some of <strong>the</strong> more c<strong>on</strong>fusing aspects of <strong>the</strong> Napster I andNapster II cases, as well as to explicate <strong>the</strong> effect of <strong>the</strong> Supreme Court’s Grokster decisi<strong>on</strong> <strong>on</strong><strong>the</strong> Ninth Circuit’s rulings and <strong>the</strong>ir applicability to Hummer Winblad’s and Bertelsmann’ssec<strong>on</strong>dary liability.In moving for summary judgment, <strong>the</strong> defendants argued that <strong>the</strong> Ninth Circuit’s rulingsin Napster I and Napster II limited Napster’s liability to those works of which Napster had actualnotice and which Napster failed to remove from its system. The Plaintiffs disputed <strong>the</strong>defendants’ reading of Napster I, and also argued that Judge Patel’s holding in F<strong>on</strong>ovisa, Inc. v.Napster, Inc. 1538 and <strong>the</strong> Supreme Court’s Grokster decisi<strong>on</strong> firmly established that actual noticeis not required. The defendants argued that <strong>the</strong> ultimate holding of Napster I, however it mighthave been called into questi<strong>on</strong> by <strong>the</strong> Grokster case, with respect to <strong>the</strong> degree of Napster’sliability was binding in <strong>the</strong> instant litigati<strong>on</strong>. 1539 To adjudicate <strong>the</strong> c<strong>on</strong>tenti<strong>on</strong>s of <strong>the</strong> plaintiffsand <strong>the</strong> defendants, Judge Patel revisited <strong>the</strong> Napster I, F<strong>on</strong>ovisa v. Napster, and Groksterdecisi<strong>on</strong>s in detail.Turning first to <strong>the</strong> Napster I decisi<strong>on</strong>, <strong>the</strong> court noted that <strong>the</strong> Ninth Circuit’s rulingswith respect to <strong>the</strong> standard of knowledge required – actual versus c<strong>on</strong>structive – werec<strong>on</strong>fusing. The Ninth Circuit began its opini<strong>on</strong> by noting that Napster had both actual andc<strong>on</strong>structive knowledge of direct infringements committed through <strong>the</strong> Napster system. But <strong>the</strong>n<strong>the</strong> Ninth Circuit’s opini<strong>on</strong> abruptly shifted when it quoted language from <strong>the</strong> court’s opini<strong>on</strong> in<strong>the</strong> Netcom case to <strong>the</strong> effect that evidence of actual knowledge of specific acts of infringementis required to hold a computer system operator liable for c<strong>on</strong>tributory copyright infringement. 1540Judge Patel noted that <strong>the</strong> Ninth Circuit’s discussi<strong>on</strong> of <strong>the</strong> Netcom case was c<strong>on</strong>fusing inseveral respects. First, <strong>the</strong> Ninth Circuit’s opini<strong>on</strong> stated at least two formulati<strong>on</strong>s of <strong>the</strong> level ofknowledge required for infringement, suggesting alternately that actual knowledge was requiredand that it was sufficient. Sec<strong>on</strong>d, <strong>the</strong> Ninth Circuit’s opini<strong>on</strong> did not explicitly discussc<strong>on</strong>structive knowledge as an alternate basis for liability. Judge Patel noted, however, thatfocusing <strong>on</strong> <strong>the</strong> Ninth Circuit’s own formulati<strong>on</strong>s of <strong>the</strong> legal standard, and not <strong>on</strong> <strong>the</strong> quotefrom <strong>the</strong> Netcom decisi<strong>on</strong>, it would be possible to read <strong>the</strong> first half of Napster I as upholdingJudge Patel’s findings <strong>on</strong> both actual and c<strong>on</strong>structive knowledge and affirming liability <strong>on</strong> bothbases. 1541However, Judge Patel noted that <strong>the</strong> porti<strong>on</strong> of <strong>the</strong> Ninth Circuit’s opini<strong>on</strong> modifying <strong>the</strong>scope of her preliminary injuncti<strong>on</strong> presented a sec<strong>on</strong>d disc<strong>on</strong>tinuity in reas<strong>on</strong>ing. The NinthCircuit set forth a three factor test defining <strong>the</strong> boundary of Napster’s c<strong>on</strong>tributory liability:Napster could be liable to <strong>the</strong> extent it (1) received reas<strong>on</strong>able knowledge of specific infringingfiles with copyrighted works, (2) knew or should have known that such files were available <strong>on</strong><strong>the</strong> Napster system, and (3) failed to act to prevent viral distributi<strong>on</strong> of <strong>the</strong> works. The1538 2002 U.S. Dist. LEXIS 4270 (N.D. Cal. Jan. 28, 2002).1539 In re Napster, Inc. <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Litigati<strong>on</strong>, 2002 U.S. Dist. LEXIS 4270 at *13.1540 Id. at *14-16.1541 Id. at *19.- 338 -


eferences to “reas<strong>on</strong>able” knowledge and “should have known” of <strong>the</strong> availability of infringingfiles again suggested a c<strong>on</strong>structive knowledge standard. 1542Never<strong>the</strong>less, <strong>the</strong> Ninth Circuit went <strong>on</strong> to formulate guidelines for <strong>the</strong> narrowing of <strong>the</strong>injuncti<strong>on</strong>. First, <strong>the</strong> Ninth Circuit placed <strong>the</strong> burden <strong>on</strong> <strong>the</strong> plaintiffs to provide notice toNapster of copyrighted works and files c<strong>on</strong>taining such works available <strong>on</strong> <strong>the</strong> Napster system.Sec<strong>on</strong>d, after plaintiffs provided notice, Napster had <strong>the</strong> duty to disable access to <strong>the</strong> offendingc<strong>on</strong>tent, as well as <strong>the</strong> additi<strong>on</strong>al burden of policing <strong>the</strong> system within <strong>the</strong> limits of <strong>the</strong> system(i.e., searching <strong>the</strong> system for similarly named files). Judge Patel found this secti<strong>on</strong> of <strong>the</strong> NinthCircuit’s opini<strong>on</strong> to dem<strong>on</strong>strate <strong>the</strong> inc<strong>on</strong>sistency in its reas<strong>on</strong>ing. Despite finding that Napsterhad c<strong>on</strong>structive knowledge based <strong>on</strong> facts unrelated to specific infringing files, <strong>the</strong> NinthCircuit n<strong>on</strong>e<strong>the</strong>less in effect limited Napster’s liability to those files of which Napster had actualknowledge. 1543Judge Patel <strong>the</strong>n summarized her c<strong>on</strong>clusi<strong>on</strong>s from <strong>the</strong> Napster I case as follows:Whe<strong>the</strong>r or not it is supported by clear reas<strong>on</strong>ing, <strong>the</strong> Ninth Circuit explicitlystated that Napster must have “reas<strong>on</strong>able knowledge” of specific infringingworks before it could be found liable. Plaintiffs attempt to avoid <strong>the</strong>c<strong>on</strong>sequences of <strong>the</strong> Ninth Circuit’s holding by arguing that <strong>the</strong> rules used incrafting an injuncti<strong>on</strong> are distinct from those used in determining damages. TheNinth Circuit, however, expressly limited Napster’s “liability,” (i.e., <strong>the</strong> extent ofits infringing c<strong>on</strong>duct), according to <strong>the</strong> “reas<strong>on</strong>able knowledge” standard beforeembarking <strong>on</strong> a discussi<strong>on</strong> of how <strong>the</strong> injuncti<strong>on</strong> should be modified. Although<strong>the</strong> actual proposed mechanics of <strong>the</strong> injuncti<strong>on</strong> – notice followed by a duty toremove <strong>the</strong> files – may be narrower than <strong>the</strong> outer limits of Napster’s liability,<strong>the</strong>re is no doubt that Napster I significantly reduced <strong>the</strong> scope of Napster’sexposure. 1544Judge Patel <strong>the</strong>n turned to a discussi<strong>on</strong> of her ruling in <strong>the</strong> F<strong>on</strong>ovisa decisi<strong>on</strong>, in whichNapster, moving to dismiss F<strong>on</strong>ovisa’s complaint, had argued that Napster I added a “notice”requirement for claims of sec<strong>on</strong>dary copyright infringement by <strong>on</strong>-line systems. Judge Patelrejected Napster’s arguments in her 2004 decisi<strong>on</strong> in F<strong>on</strong>ovisa, finding that although Napster Iset fairly narrow limits <strong>on</strong> Napster’s liability, it studiously avoided any clear reshaping of <strong>the</strong>doctrine of c<strong>on</strong>tributory infringement. 1545Judge Patel <strong>the</strong>n observed that her F<strong>on</strong>ovisa opini<strong>on</strong> had set forth four points relevant toHummer Winblad’s and Bertelsmann’s instant moti<strong>on</strong>s for summary judgment. First, liability isnot necessarily coextensive with injunctive relief or damages, and <strong>the</strong> required mental state forNapster’s liability remained “reas<strong>on</strong>able knowledge.” Sec<strong>on</strong>d, <strong>the</strong> c<strong>on</strong>duct identified by <strong>the</strong>1542 Id. at *19-20.1543 Id. at *20-22.1544 Id. at *22-23.1545 Id. at *24.- 339 -


Napster I court as infringing use – actual notice followed by a failure to correct – was exemplaryand not intended to be an exhaustive list. Under <strong>the</strong> “reas<strong>on</strong>able knowledge” standard, o<strong>the</strong>rmethods of proving actual and c<strong>on</strong>structive knowledge were possible, although Napster Iadmittedly set <strong>the</strong> bar for reas<strong>on</strong>able knowledge quite high. Third, it was significant thatF<strong>on</strong>ovisa c<strong>on</strong>sidered <strong>on</strong>ly a moti<strong>on</strong> to dismiss and not <strong>the</strong> precise scope of liability. To survive amoti<strong>on</strong> to dismiss, a plaintiff need identify <strong>on</strong>ly a specific instance of infringement, whereas <strong>the</strong>same facts would be inadequate in proving <strong>the</strong> precise amount of damages. And fourth, JudgePatel had acknowledged in F<strong>on</strong>ovisa that broader readings of Napster I were possible, but absenta compelling reas<strong>on</strong> to do so, she was unwilling to read more into it than it stated. 1546Judge Patel <strong>the</strong>n turned to an analysis of <strong>the</strong> Grokster decisi<strong>on</strong>. She noted that <strong>the</strong> NinthCircuit’s opini<strong>on</strong> in Grokster had read Napster I more expansively than she had anticipated inF<strong>on</strong>ovisa, reading Napster I to mean that if a defendant could show that its product was capableof substantial or commercially significant n<strong>on</strong>infringing uses, <strong>the</strong>n c<strong>on</strong>structive knowledge of <strong>the</strong>infringement could not be imputed. Judge Patel noted that <strong>the</strong> Supreme Court rejected <strong>the</strong> NinthCircuit’s ruling, and that taken as a whole, <strong>the</strong> Supreme Court’s decisi<strong>on</strong> provided for liabilityunder broader circumstances than those permitted under Napster I. She noted that <strong>the</strong> evidencestressed by <strong>the</strong> Supreme Court, particularly <strong>the</strong> defendants’ advertising and marketing strategies– was strikingly similar to <strong>the</strong> evidence supporting her finding of c<strong>on</strong>structive knowledge inshaping her original, more sweeping injuncti<strong>on</strong> in <strong>the</strong> Napster case. 1547The defendants argued that <strong>the</strong> Grokster ruling could not be applied retroactively to <strong>the</strong>current case to render acti<strong>on</strong>able c<strong>on</strong>duct that c<strong>on</strong>formed to <strong>the</strong> modified preliminary injuncti<strong>on</strong>entered following Napster I, a closed case that was no l<strong>on</strong>ger <strong>on</strong> direct review. Judge Patelrejected this argument, noting that Bertelsmann was a different party than Napster, and <strong>the</strong>instant acti<strong>on</strong> was not <strong>the</strong> same as <strong>the</strong> now-closed original Napster lawsuit. Bertelsmann wasalleged to be separately liable based <strong>on</strong> its own c<strong>on</strong>trol over <strong>the</strong> operati<strong>on</strong> of <strong>the</strong> Napster system,even if its liability were factually derivative of <strong>the</strong> same alleged acts of illegal copying byNapster. Accordingly, <strong>the</strong> court ruled that <strong>the</strong> plaintiffs were entitled to pursue recovery under<strong>the</strong> Grokster <strong>the</strong>ory of liability, which did not require actual or even reas<strong>on</strong>able knowledge ofspecific infringing files, as well as under <strong>the</strong> “reas<strong>on</strong>able knowledge” standard articulated inNapster I. 1548 Accordingly, she denied <strong>the</strong> defendants’ moti<strong>on</strong> for summary judgment. 1549(d) The CoStar CaseIn CoStar v. Loopnet, 1550 discussed in detail in Secti<strong>on</strong> III.C.5(b)(1)(iii) below, <strong>the</strong> courtaddressed in some detail <strong>the</strong> knowledge an OSP must have of infringing activity in order to beliable for c<strong>on</strong>tributory infringement. In brief summary, <strong>the</strong> plaintiff argued that <strong>on</strong>ce it gave <strong>the</strong>OSP notice of specific infringements <strong>on</strong> its system, <strong>the</strong> OSP was <strong>on</strong> notice that <strong>on</strong>going1546 Id. at *24-27.1547 Id. at *27-30.1548 Id. at *31-32.1549 Id. at *33.1550 164 F. Supp. 2d 688 (D. Md. 2001), aff’d, 373 F.3d 544 (4 th Cir. 2004).- 340 -


infringements were occurring and had a duty to prevent repeat infringements in <strong>the</strong> future. Thecourt ruled that <strong>the</strong> amount of policing for future infringements <strong>the</strong> OSP would be required to dowould depend up<strong>on</strong> <strong>the</strong> level of knowledge it possessed and <strong>the</strong> specificity of that knowledge.The court fur<strong>the</strong>r held that, to prove its claim for c<strong>on</strong>tributory infringement, <strong>the</strong> plaintiff wouldhave to establish that <strong>the</strong> notice it gave to <strong>the</strong> OSP comprised at least c<strong>on</strong>structive knowledge ofspecific infringing activity which <strong>the</strong> OSP materially c<strong>on</strong>tributed to or induced by its allegedfailure to halt <strong>the</strong> activity. There remained too many material factual disputes for <strong>the</strong> court todecide <strong>on</strong> summary judgment ei<strong>the</strong>r that such a level of knowledge did or did not exist or that <strong>the</strong>OSP’s acti<strong>on</strong>s in trying to stop <strong>the</strong> infringement were or were not insufficient to <strong>the</strong> point ofcomprising inducement as a matter of law.(e) Ellis<strong>on</strong> v. Roberts<strong>on</strong>In Ellis<strong>on</strong> v. Roberts<strong>on</strong>, 1551 discussed in detail in Secti<strong>on</strong> III.C.5(b)(1)(i)b. below,<strong>the</strong> district court addressed <strong>the</strong> “reas<strong>on</strong> to know” pr<strong>on</strong>g of <strong>the</strong> knowledge requirement ofc<strong>on</strong>tributory liability. In that case an individual named Roberts<strong>on</strong> scanned several ficti<strong>on</strong>alworks written by <strong>the</strong> plaintiff and posted <strong>the</strong>m <strong>on</strong>to <strong>the</strong> Usenet group “alt.binaries.e-book,” agroup that was used primarily to exchange pirated and unauthorized digital copies of textmaterial, principally works of ficti<strong>on</strong> by famous authors. AOL, acting as a Usenet peer, hosted<strong>the</strong> infringing materials <strong>on</strong> its Usenet server for a period of fourteen days. The plaintiff sought tohold AOL liable for direct, vicarious and c<strong>on</strong>tributory copyright infringement. 1552With respect to c<strong>on</strong>tributory infringement, <strong>the</strong> court found that AOL did not have actualknowledge of <strong>the</strong> infringement until <strong>the</strong> lawsuit was filed. Although <strong>the</strong> plaintiff had attemptedto notify AOL of <strong>the</strong> presence of <strong>the</strong> infringing works via email to AOL’s designated copyrightagent as listed in <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office’s records, AOL never received <strong>the</strong> email because AOLhad changed its c<strong>on</strong>tact email address from “copyright@aol.com” to “aolcopyright@aol.com” inFall 1999, but waited until April 2000 to notify <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office of this change. The districtcourt held that, in view of AOL’s failure to explain why it delayed in notifying <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>Office of its email address change, as well as why it did not make provisi<strong>on</strong> for forwarding to <strong>the</strong>new address emails sent to <strong>the</strong> old address, a reas<strong>on</strong>able trier of fact could find that AOL hadreas<strong>on</strong> to know that infringing copies of <strong>the</strong> plaintiff’s works were stored <strong>on</strong> its Usenetservers. 1553 The Ninth Circuit affirmed this ruling <strong>on</strong> appeal. 15541551 189 F. Supp. 2d 1051 (C.D. Cal. 2002).1552 Id. at 1053-54.1553 Id. at 1057-58. The court also noted that a trier of fact might c<strong>on</strong>clude that AOL had reas<strong>on</strong> to know ofinfringement <strong>on</strong> its system from <strong>the</strong> fact that ano<strong>the</strong>r AOL user had called AOL to report a number ofinfringing books posted <strong>on</strong> Usenet. The user spoke <strong>on</strong>ly to a low-level customer service representative, whoadvised him to send an email setting forth <strong>the</strong> details of his complaint. The court stated, “a reas<strong>on</strong>able trier offact might c<strong>on</strong>clude that AOL should have transferred Miller to speak with an employee with knowledge ofAOL’s copyright infringement policies instead of directing him to an email address.” Id. at 1058.1554 Ellis<strong>on</strong> v. Roberts<strong>on</strong>, 357 F.3d 1072, 1077 (9th Cir. 2004) (“Because <strong>the</strong>re is evidence indicating that AOLchanged its e-mail address in an unreas<strong>on</strong>able manner and that AOL should have been <strong>on</strong> notice of infringingactivity we c<strong>on</strong>clude that a reas<strong>on</strong>able trier of fact could find that AOL had reas<strong>on</strong> to know of potentiallyinfringing activity occurring within its USENET network.”).- 341 -


With respect to <strong>the</strong> material c<strong>on</strong>tributi<strong>on</strong> pr<strong>on</strong>g of c<strong>on</strong>tributory infringement, AOLargued that as a matter of law, <strong>the</strong> mere provisi<strong>on</strong> of Usenet access was too attenuated from <strong>the</strong>infringing activity to c<strong>on</strong>stitute a material c<strong>on</strong>tributi<strong>on</strong>, citing for support by analogy <strong>the</strong>provisi<strong>on</strong>s of Secti<strong>on</strong> 512(m) of <strong>the</strong> DMCA that an OSP need not m<strong>on</strong>itor its system forinfringing activity to qualify for <strong>the</strong> DMCA safe harbors. The district court rejected thisargument, citing <strong>the</strong> Netcom court’s holding that providing a service that allows for <strong>the</strong>automatic distributi<strong>on</strong> of all Usenet postings can c<strong>on</strong>stitute a material c<strong>on</strong>tributi<strong>on</strong> when <strong>the</strong> OSPknows or should know of infringing activity <strong>on</strong> its system and yet c<strong>on</strong>tinues to aid in <strong>the</strong>distributi<strong>on</strong> of <strong>the</strong> infringing material. Accordingly, <strong>the</strong> district court ruled that <strong>the</strong> plaintiff haddem<strong>on</strong>strated triable issues of fact <strong>on</strong> c<strong>on</strong>tributory infringement by AOL. 1555 The Ninth Circuitalso affirmed this ruling <strong>on</strong> appeal. 1556(f)Perfect 10 v. Cybernet VenturesIn Perfect 10, Inc. v. Cybernet Ventures, Inc., 1557 <strong>the</strong> defendant Cybernet was <strong>the</strong>operator of an “age verificati<strong>on</strong> service” that enrolled subscribers, after verifying <strong>the</strong>ir age as anadult, to a service that would enable <strong>the</strong>m to gain access for a single m<strong>on</strong>thly fee to a largenumber of member sites displaying pornographic pictures. All fees paid by subscribers wentdirectly to Cybernet, which <strong>on</strong> a semi-m<strong>on</strong>thly basis <strong>the</strong>n paid each individual member site acommissi<strong>on</strong> based <strong>on</strong> <strong>the</strong> site where <strong>the</strong> subscriber originally signed up for his or hermembership in Cybernet’s service. 1558 Cybernet exercised some c<strong>on</strong>trol over <strong>the</strong> c<strong>on</strong>tent of eachof its member sites, requiring that each site c<strong>on</strong>tain unique and adequate c<strong>on</strong>tent, whichgenerally meant at least 30 pictures of sufficient quality to provide value to Cybernet’scustomers. Cybernet also imposed a zero tolerance child pornography policy <strong>on</strong> its membersites. 1559 The court found that Cybernet actively reviewed and directed its affiliated webmasters<strong>on</strong> <strong>the</strong> appearance and c<strong>on</strong>tent of <strong>the</strong>ir sites. 1560The plaintiff, Perfect 10, was <strong>the</strong> holder of copyright in various photographs of nudewomen. Perfect 10 claimed to have found more than 10,000 copies of its photographs <strong>on</strong>approximately 900 websites affiliated with Cybernet. 1561 Perfect 10 sought to hold Cybernetliable for <strong>the</strong> unauthorized presence of its photographs <strong>on</strong> Cybernet’s member sites.On a moti<strong>on</strong> for a preliminary injuncti<strong>on</strong>, <strong>the</strong> court ruled that Perfect 10 had established astr<strong>on</strong>g likelihood of success <strong>on</strong> its claim of c<strong>on</strong>tributory copyright infringement. The courtfound that Cybernet had knowledge of <strong>the</strong> infringements because a member for <strong>the</strong> Associati<strong>on</strong>for <strong>the</strong> Protecti<strong>on</strong> of <strong>Internet</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> had c<strong>on</strong>tacted Cybernet with approximately 2,000 emails1555 Ellis<strong>on</strong> v. Roberts<strong>on</strong>, 189 F. Supp. 2d 1051, 1058-60 (C.D. Cal. 2002).1556 Ellis<strong>on</strong> v. Roberts<strong>on</strong>, 357 F.3d 1072, 1078 (9th Cir. 2004).1557 213 F. Supp. 2d 1146 (C.D. Cal. 2002).1558 Id. at 1159.1559 Id. at 1160-61.1560 Id. at 1164.1561 Id. at 1162.- 342 -


over <strong>the</strong> course of three or four years, notifying Cybernet of alleged copyright infringement <strong>on</strong>its system. In additi<strong>on</strong>, Cybernet’s site reviewers reviewed every site before allowing <strong>the</strong> sites tobecome members of Cybernet’s service, and <strong>the</strong> court found that <strong>the</strong>re was evidence that manysites c<strong>on</strong>tained disclaimers to <strong>the</strong> effect that <strong>the</strong> site did not hold copyrights for <strong>the</strong> works <strong>on</strong> <strong>the</strong>site. 1562 Accordingly, <strong>the</strong> court ruled that <strong>the</strong>re was “a str<strong>on</strong>g likelihood of success in provinggeneral knowledge of copyright infringement prior to Perfect 10’s filing of <strong>the</strong> complaint” aswell as “serious questi<strong>on</strong>s as to Cybernet’s c<strong>on</strong>structive knowledge of infringement of Perfect10’s copyrights prior to <strong>the</strong> complaint raised by this general knowledge, Cybernet’s review ofsites c<strong>on</strong>taining Perfect 10 images and <strong>the</strong> likelihood of those sites c<strong>on</strong>taining copyrightdisclaimers. Fur<strong>the</strong>r, <strong>the</strong>re appears to be little questi<strong>on</strong> that Cybernet has been provided withactual notice of a large number of alleged infringements since June 2001.” 1563Citing <strong>the</strong> F<strong>on</strong>ovisa case, 1564 <strong>the</strong> court also c<strong>on</strong>cluded that Cybernet had materiallyc<strong>on</strong>tributed to <strong>the</strong> infringements by providing technical and c<strong>on</strong>tent advice to its member sites,reviewing those sites, and attempting to c<strong>on</strong>trol <strong>the</strong> quality of <strong>the</strong> product it presented tosubscribers as a unified brand. 1565(g) Perfect 10 v. Visa Internati<strong>on</strong>alIn Perfect 10, Inc. v. Visa Internati<strong>on</strong>al Service Ass’n, 1566 Perfect 10, owner of <strong>the</strong>copyrights in pornographic materials, sought to hold various credit card and banking instituti<strong>on</strong>sliable for c<strong>on</strong>tributory and vicarious infringement for providing financial services to various websites that Perfect 10 alleged c<strong>on</strong>tained infringing copies of its copyrighted materials. The districtcourt granted <strong>the</strong> defendants’ moti<strong>on</strong> to dismiss.With respect to c<strong>on</strong>tributory liability, <strong>the</strong> defendants did not c<strong>on</strong>test <strong>the</strong> issue of <strong>the</strong>irknowledge of infringement, but denied that <strong>the</strong>y materially c<strong>on</strong>tributed to <strong>the</strong> infringement. Thedistrict court agreed. Unlike <strong>the</strong> defendant age verificati<strong>on</strong> service in Perfect 10, Inc. v.Cybernet Ventures, Inc., 1567 which advertised <strong>the</strong> infringing web sites and paid a commissi<strong>on</strong> toa web site whenever some<strong>on</strong>e registered for its services through that particular web site, <strong>the</strong>court noted that <strong>the</strong> defendants in <strong>the</strong> instant case did not promote <strong>the</strong> web sites that used <strong>the</strong>irservices, nor have any c<strong>on</strong>tent-specific regulati<strong>on</strong>s with which merchants must comply beforeusing <strong>the</strong>ir services. 1568The court rejected Perfect 10’s argument that because <strong>the</strong> defendants provided essentialfinancial services to alleged infringers, <strong>the</strong>y were materially c<strong>on</strong>tributing to <strong>the</strong> infringement.1562 Id. at 1169.1563 Id. at 1170 (emphasis in original).1564 F<strong>on</strong>ovisa, Inc. v. Cherry Aucti<strong>on</strong>, Inc., 76 F.3d 259 (9 th Cir. 1996).1565 Perfect 10, 213 F. Supp. 2d at 1170.1566 71 U.S.P.Q.2d 1914 (N.D. Cal. 2004), aff’d, 494 F.3d 788 (9 th Cir. 2007), cert. denied, 2008 U.S. LEXIS 4523(June 2, 2008).1567 213 F. Supp. 2d 1146 (C.D. Cal. 2002).1568 Perfect 10, Inc. v. Visa Internati<strong>on</strong>al, 71 U.S.P.Q.2d at 1917.- 343 -


The court noted that <strong>the</strong> financial services were not essential to <strong>the</strong> functi<strong>on</strong>ing of <strong>the</strong> allegedlyinfringing web sites because <strong>the</strong>y could employ intermediate payment services if <strong>the</strong> defendantsterminated <strong>the</strong>ir merchant accounts. Fur<strong>the</strong>rmore, even if <strong>the</strong> defendants provided services thatmaterially c<strong>on</strong>tributed to <strong>the</strong> functi<strong>on</strong>ing of <strong>the</strong> web site businesses, <strong>the</strong>re was no factual basisfor <strong>the</strong> allegati<strong>on</strong> that <strong>the</strong>y materially c<strong>on</strong>tributed to <strong>the</strong> alleged infringing activities of <strong>the</strong> websites. The defendants’ ability to process credit cards did not directly assist <strong>the</strong> allegedlyinfringing web sites in copying <strong>the</strong> plaintiffs’ works. Accordingly, <strong>the</strong> court ruled that Perfect10 had not adequately pled a claim for c<strong>on</strong>tributory infringement, although <strong>the</strong> court grantedPerfect 10 leave to amend its complaint to establish a relati<strong>on</strong>ship between <strong>the</strong> financial servicesprovided by <strong>the</strong> defendants and <strong>the</strong> alleged infringing activity. 1569On appeal, <strong>the</strong> Ninth Circuit affirmed. 1570 With respect to c<strong>on</strong>tributory infringement, <strong>the</strong>court noted that it need not address <strong>the</strong> knowledge pr<strong>on</strong>g because it found that Perfect 10 had notpled facts sufficient to establish that <strong>the</strong> defendants induced or materially c<strong>on</strong>tributed to <strong>the</strong>infringing activity. 1571 With respect to material c<strong>on</strong>tributi<strong>on</strong>, <strong>the</strong> court held that merelyc<strong>on</strong>tinuing to process credit card payments to <strong>the</strong> infringing web sites despite knowledge of<strong>on</strong>going infringement was insufficient c<strong>on</strong>tributi<strong>on</strong> for c<strong>on</strong>tributory liability because suchpayment services had no direct c<strong>on</strong>necti<strong>on</strong> to <strong>the</strong> actual infringing activities of reproducti<strong>on</strong> ordistributi<strong>on</strong> of <strong>the</strong> plaintiff’s copyrighted material. The defendants’ services did not assist usersin searching for infringing images, nor provide links to <strong>the</strong>m, nor did infringing materials passthrough <strong>the</strong> defendants’ payment systems. Although <strong>the</strong> payment services made it easier for websites to profit from <strong>the</strong> infringing activities, this fact was insufficient for c<strong>on</strong>tributory liabilitybecause <strong>the</strong> services did not directly assist in <strong>the</strong> distributi<strong>on</strong> of infringing c<strong>on</strong>tent to <strong>Internet</strong>users. The court noted that even if users couldn’t pay for images with credit cards, infringementcould still c<strong>on</strong>tinue <strong>on</strong> a large scale because o<strong>the</strong>r viable funding mechanisms were available. 1572The court rejected Perfect 10’ argument that <strong>the</strong> defendants’ payment services were akinto provisi<strong>on</strong> of <strong>the</strong> site and facilities for infringement analogous to <strong>the</strong> F<strong>on</strong>ovisa case. The courtnoted that <strong>the</strong> web sites <strong>on</strong> which <strong>the</strong> infringing photographs resided were <strong>the</strong> “site” of <strong>the</strong>infringement, not <strong>the</strong> defendants’ payment networks. If mere provisi<strong>on</strong> of a method of paymentcould be c<strong>on</strong>sidered a “facility” of infringement, so too could <strong>the</strong> provisi<strong>on</strong> of computers, ofsoftware, and of electricity to <strong>the</strong> infringing web sites, and such a rule would simply reach toofar. 1573 With respect to inducement, Perfect 10 argued that <strong>the</strong> Grokster decisi<strong>on</strong> was analogousbecause <strong>the</strong> defendants induced customers to use <strong>the</strong>ir cards to purchase goods and services, andshould <strong>the</strong>refore be held guilty of specifically inducing infringement if <strong>the</strong> cards were used topurchase images from sites that had stolen c<strong>on</strong>tent from Perfect 10. The court rejected this1569 Id.1570 Perfect 10, Inc. v. Visa Internati<strong>on</strong>al, 2007 U.S. App. LEXIS 15824 (9 th Cir. July 3, 2007), cert. denied, 2008U.S. LEXIS 4523 (June 2, 2008).1571 Id. at *10-11.1572 Id. at *13-16.1573 Id. at *21-24.- 344 -


argument as insufficient, noting that Perfect 10 had pled no facts suggesting that <strong>the</strong> defendantshad promoted <strong>the</strong>ir payment system as a means to infringe, nor had <strong>the</strong>y promoted <strong>the</strong> purchaseof specific infringing goods. Accordingly, <strong>the</strong> facts as pled evidenced no clear expressi<strong>on</strong> of aspecific intent to foster infringement, and thus <strong>the</strong>re could be no liability for inducement. 1574The court’s rulings with respect to vicarious liability are set forth in Secti<strong>on</strong> III.C.3.(g)below.(h) Parker v. GoogleIn Parker v. Google, 1575 pro se plaintiff Gord<strong>on</strong> Parker was <strong>the</strong> owner of copyright in ane-book titled “29 Reas<strong>on</strong>s Not To Be A Nice Guy.” He posted Reas<strong>on</strong> # 6 <strong>on</strong> USENET. Parkerasserted that Google’s automatic archiving of this USENET c<strong>on</strong>tent made Google c<strong>on</strong>tributorilyliable for copyright infringement because it facilitated users to make unauthorized distributi<strong>on</strong>sand copies of his copyrighted material through <strong>the</strong> “author search” feature <strong>on</strong> Google’s web site.The district court rejected this argument for two reas<strong>on</strong>s. First, Parker failed to allegeinfringement of a specific copyrighted work in his claim for c<strong>on</strong>tributory infringement. Andsec<strong>on</strong>d, he had failed to allege that Google had requisite knowledge of a third party’s infringingactivity. 1576 On appeal, <strong>the</strong> Third Circuit affirmed in an unpublished opini<strong>on</strong> <strong>on</strong> <strong>the</strong> ground thatParker had failed to allege that Google had <strong>the</strong> requisite knowledge of a third party’s infringingactivity. 1577 (i) MDY Industries v. Blizzard EntertainmentIn MDY Industries v. Blizzard Entertainment, 1578 <strong>the</strong> defendant distributed bot softwarecalled “Glider” that was able to play Blizzard Entertainment’s multiplayer <strong>on</strong>line role-playinggame known as World of Warcraft (WoW) for its owner while <strong>the</strong> owner was away from his orher computer, <strong>the</strong>reby enabling <strong>the</strong> owner to advance more quickly within WoW than wouldo<strong>the</strong>rwise be possible. Glider also enabled its user to acquire an inordinate number of gameassets, with some users even selling those assets for m<strong>on</strong>ey in <strong>on</strong>line aucti<strong>on</strong> sites. Both <strong>the</strong> useof bot software to play WoW and <strong>the</strong> resale of game assets were prohibited by <strong>the</strong> Terms of Use(TOU) that governed <strong>the</strong> play of WoW, toge<strong>the</strong>r with an End User License Agreement (EULA).The EULA and TOU were displayed <strong>on</strong> a player’s computer screen when <strong>the</strong> game clientsoftware was loaded and <strong>the</strong> player sought <strong>on</strong>line access to Blizzard’s game servers. Playerswere required to agree to <strong>the</strong> terms of <strong>the</strong> EULA and TOU before proceeding to play <strong>the</strong> game.Blizzard alleged that users of WoW were licensees who were permitted to copy <strong>the</strong> copyrightedgame client software <strong>on</strong>ly in c<strong>on</strong>formance with <strong>the</strong> EULA and TOU, and that when userslaunched WoW using Glider, <strong>the</strong>y exceeded <strong>the</strong> license in <strong>the</strong> EULA and TOU and created1574 Id. at *26-31.1575 422 F. Supp. 2d 492 (E.D. Pa. 2006), aff’d, 2007 U.S. App. LEXIS 16370 (9 th Cir. July 10, 2007).1576 Id. at 498-99.1577 Parker v. Google, 2007 U.S. App. LEXIS 16370 at *9 (3d Cir. July 10, 2007).1578 2008 U.S. Dist. LEXIS 53988 (D. Ariz. July 14, 2008).- 345 -


infringing copies of <strong>the</strong> game client software. Blizzard sought to hold <strong>the</strong> defendantc<strong>on</strong>tributorily liable for those infringing copies. 1579The court agreed and granted Blizzard summary judgment against <strong>the</strong> defendant. Citing<strong>the</strong> Ninth Circuit’s decisi<strong>on</strong> in MAI Sys. v. Peak Computer, Inc., 1580 <strong>the</strong> court ruled that copyingof software to RAM c<strong>on</strong>stitutes “copying” for purposes of Secti<strong>on</strong> 106 of <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act, andthus if a pers<strong>on</strong> is not authorized by <strong>the</strong> copyright holder through a license or by law (e.g.Secti<strong>on</strong> 117) to copy <strong>the</strong> software to RAM, <strong>the</strong> pers<strong>on</strong> commits copyright infringement by using<strong>the</strong> software in an unauthorized way. 1581 The court ruled that <strong>the</strong> provisi<strong>on</strong>s in <strong>the</strong> EULA and<strong>the</strong> TOU prohibiting <strong>the</strong> use of bots and resale of game assets were limitati<strong>on</strong>s <strong>on</strong> <strong>the</strong> scope of<strong>the</strong> license, not merely separate c<strong>on</strong>tractual covenants. The EULA stated <strong>the</strong> game clientsoftware was distributed solely for use by authorized end users according to <strong>the</strong> terms of <strong>the</strong>EULA, and <strong>the</strong> grant clause in <strong>the</strong> license was expressly c<strong>on</strong>diti<strong>on</strong>ed as being subject to <strong>the</strong> enduser’s c<strong>on</strong>tinuing compliance with <strong>the</strong> EULA. The license also made clear that, although userswere licensed to play WoW and to use <strong>the</strong> game client software while playing, <strong>the</strong>y were notlicensed to exercise o<strong>the</strong>r rights of <strong>the</strong> copyright holder, such as distributing or modifying <strong>the</strong>software, thus establishing that <strong>the</strong> provisi<strong>on</strong>s of <strong>the</strong> license were designed to protect Blizzard’scopyright interests. Thus, when end users used bot software such as Glider to operate <strong>the</strong> WoWgame client software in violati<strong>on</strong> of <strong>the</strong> EULA and TOU, <strong>the</strong>y were making unauthorized copiesof <strong>the</strong> game client software, which infringed Blizzard’s copyright, and for which <strong>the</strong> defendantwas liable as a copyright infringer. 1582The court rejected <strong>the</strong> defendant’s argument that <strong>the</strong> copies of <strong>the</strong> game client softwaremade by end users while operating <strong>the</strong> Glider software were authorized by Secti<strong>on</strong> 117 of <strong>the</strong>copyright statute. The court noted that MAI and at least two o<strong>the</strong>r rulings by <strong>the</strong> Ninth Circuithad held that licensees of a computer program do not “own” <strong>the</strong>ir copy and are <strong>the</strong>refore notentitled to a Secti<strong>on</strong> 117 defense. 1583 In October of 2008, <strong>the</strong> court awarded Blizzard over $6milli<strong>on</strong> in damages for copyright infringement. 1584(j)Louis Vuitt<strong>on</strong> v. Akanoc Soluti<strong>on</strong>s, Inc.In Louis Vuitt<strong>on</strong> Malletier, S.A. v. Akanoc Soluti<strong>on</strong>s, Inc., 1585 <strong>the</strong> defendants providedOSP services that hosted websites through which <strong>the</strong> plaintiff alleged goods were being sold thatinfringed its trademarks and copyrights. The plaintiff sought to hold <strong>the</strong> defendantsc<strong>on</strong>tributorily and vicariously liable for hosting such websites and <strong>the</strong> defendants moved for1579 Id. at *1-11.1580 991 F.2d 511, 518-19 (9 th Cir. 1993).1581 MDY Industries, 2008 U.S. Dist. LEXIS at *10-11.1582 Id. at *12-181583 Id. at *24-28.1584 Liz McKenzie, “Warcraft Creator Wins $6M Over Software ‘Bot’” (Oct. 1, 2008), available as of Oct. 2, 2008at http://ip.law360.com/articles/71118.1585 591 F. Supp. 2d 1098 (N.D. Cal. 2008).- 346 -


summary judgment. The court denied <strong>the</strong> moti<strong>on</strong> as to c<strong>on</strong>tributory infringement, but granted itas to vicarious infringement. 1586 With respect to c<strong>on</strong>tributory infringement, <strong>the</strong> court foundissues of material fact c<strong>on</strong>cerning whe<strong>the</strong>r direct infringements were taking place <strong>on</strong> websiteshosted by <strong>the</strong> defendants, citing internal emails in which defendants discussed attempts to takedown websites selling counterfeit Louis Vuitt<strong>on</strong> products. 1587 The court also found issues ofmaterial fact with respect to <strong>the</strong> defendants’ knowledge of infringing activity, rejecting <strong>the</strong>defendants’ argument that <strong>the</strong>y did not have such knowledge because <strong>the</strong>y did not log <strong>on</strong> to sitesto investigate complaints of infringing activity, but ra<strong>the</strong>r simply took such sites down. Thecourt found this testim<strong>on</strong>y merely served to highlight that <strong>the</strong>re were issues of material factc<strong>on</strong>cerning actual knowledge <strong>on</strong> <strong>the</strong> part of defendants, and in any event, <strong>the</strong> defendants had notsubmitted any testim<strong>on</strong>y with respect to whe<strong>the</strong>r <strong>the</strong>y should have known of infringing activityin view of numerous letters from <strong>the</strong> plaintiff alleging such activity. 1588Finally, citing <strong>the</strong> Ninth Circuit’s decisi<strong>on</strong> in Perfect 10 v. Amaz<strong>on</strong> allowing a finding ofmaterial c<strong>on</strong>tributi<strong>on</strong> where an OSP fails to take “simple measures” to limit infringement <strong>on</strong> itssite, <strong>the</strong> court found material issues of fact with respect to whe<strong>the</strong>r <strong>the</strong> defendants could havetaken such simple measures based <strong>on</strong> evidence submitted by <strong>the</strong> plaintiff that <strong>the</strong> defendants had<strong>the</strong> ability to remove single websites by disabling IP addresses without taking down an entireserver. The court noted that <strong>the</strong> defendants had not submitted any evidence indicating thatremoving a web site in this fashi<strong>on</strong> would not be a “simple measure” by which <strong>the</strong>y could purgeinfringing activity using <strong>the</strong>ir services. 1589A jury found <strong>the</strong> defendants liable for willful c<strong>on</strong>tributory infringement and awardedstatutory damages, and found that <strong>the</strong> defendants were not entitled to <strong>the</strong> safe harbors of <strong>the</strong>DMCA. After <strong>the</strong> verdict, <strong>the</strong> defendants filed a moti<strong>on</strong> for JMOL with respect to <strong>the</strong> claims and<strong>the</strong> DMCA defense. 1590 The court denied <strong>the</strong> defendants’ moti<strong>on</strong> as to <strong>the</strong> c<strong>on</strong>tributorycopyright claim. With respect to <strong>the</strong> knowledge requirement, <strong>the</strong> evidence established that <strong>the</strong>defendants had ample actual notice of directly infringing activity <strong>on</strong> dozens of web sites hosted<strong>on</strong> <strong>the</strong> defendants’ servers in <strong>the</strong> form of many notice letters from <strong>the</strong> plaintiff identifyingspecific web sites that were selling counterfeit goods infringing <strong>the</strong> plaintiff’s copyrights. 1591With respect to <strong>the</strong> material c<strong>on</strong>tributi<strong>on</strong> requirement, <strong>the</strong> defendants provided and operated <strong>the</strong>servers through which <strong>the</strong> web sites offering <strong>the</strong> counterfeit goods were hosted, and c<strong>on</strong>tinued todo so despite receiving notices from <strong>the</strong> plaintiff of particular web sites engaged in infringingc<strong>on</strong>duct. One of <strong>the</strong> defendants testified that he rarely used several of <strong>the</strong> tools at his disposal to1586 Id. at 1113. The court’s rulings with respect to vicarious infringement are set forth in Secti<strong>on</strong> III.C.3(i) below.1587 Id. at 1106.1588 Id. at 1107-08.1589 Id. at 1108-09.1590 Louis Vuitt<strong>on</strong> Malletier, S.A. v. Akanoc Soluti<strong>on</strong>s, Inc., 2010 U.S. Dist. LEXIS 85266 (N.D. Cal. Mar. 19,2010) at *1-2.1591 Id. at 17.- 347 -


punish or deter <strong>the</strong> operati<strong>on</strong> of <strong>the</strong> counterfeiting web sites. Thus, <strong>the</strong>re was sufficient evidenceto support a finding by <strong>the</strong> jury of material c<strong>on</strong>tributi<strong>on</strong>. 1592Accordingly, <strong>the</strong> court issued a permanent injuncti<strong>on</strong> against ‘knowingly” hostinginfringing web sites in <strong>the</strong> United States. The order specifically spelled out that <strong>the</strong> defendantswould be deemed to be acting “knowingly” up<strong>on</strong> proof that (i) <strong>the</strong>y had been served be email orregular mail by <strong>the</strong> plaintiff with a notice of infringement of specific copyrights <strong>on</strong> an <strong>Internet</strong>hosting or routing service operated by <strong>the</strong> defendants, and (ii) <strong>the</strong> notice c<strong>on</strong>tained screen shot(s)depicting <strong>the</strong> infringing activity, and (iii) 72 hours after service of <strong>the</strong> notice <strong>the</strong> infringingactivity was still taking place. The order fur<strong>the</strong>r stated that <strong>the</strong> defendants would not be deemedto be acting “knowingly” up<strong>on</strong> proof that (i) <strong>the</strong> defendants c<strong>on</strong>diti<strong>on</strong> <strong>the</strong>ir use of <strong>the</strong>ir <strong>Internet</strong>hosting or routing services, and notify each subscriber and customer accordingly, that <strong>the</strong>ir useof such services is subject to immediate terminati<strong>on</strong> up<strong>on</strong> receipt of a notice of infringement that<strong>the</strong> subscriber or customer is infringing <strong>the</strong> copyright of Louis Vuitt<strong>on</strong>, and (ii) <strong>the</strong> defendantspublish <strong>on</strong> <strong>the</strong>ir web site complete and accurate c<strong>on</strong>tact informati<strong>on</strong> for receiving notices ofinfringement, and (iii) up<strong>on</strong> receipt of a notice <strong>the</strong> defendants mailed to <strong>the</strong> plaintiff anacknowledgment of receipt, and (iv) <strong>the</strong> defendants assigned a tracking number to <strong>the</strong> notice, and(v) within 24 hours of receipt of <strong>the</strong> notice <strong>the</strong> defendants sent to <strong>the</strong> subscribe or customer anotice to immediately cease and desist from <strong>the</strong> activity that is <strong>the</strong> subject of <strong>the</strong> notice andfailure to do so would result in immediate terminate of services, and (vi) <strong>the</strong> defendantsinvestigated whe<strong>the</strong>r activity did or did not cease within <strong>the</strong> time period required by <strong>the</strong> noticeand up<strong>on</strong> verifying that it did not cease, <strong>the</strong> defendants immediately terminated services to <strong>the</strong>infringing subscriber or customer. 1593(k) Arista Records v. Usenet.comIn Arista Records LLC. V. Usenet.com, Inc., 1594 <strong>the</strong> defendants operated a Napster-likeUsenet service that advertised to and targeted users who wanted to download music files. Unlikepeer-to-peer filing sharing networks, <strong>the</strong> files were stored <strong>on</strong> “spool” news servers operated by<strong>the</strong> defendants. 1595 The court granted <strong>the</strong> plaintiff record companies’ moti<strong>on</strong> for summaryjudgment <strong>on</strong> <strong>the</strong>ir claim for c<strong>on</strong>tributory infringement. With respect to <strong>the</strong> knowledge pr<strong>on</strong>g ofc<strong>on</strong>tributory liability, unlike <strong>the</strong> Ninth Circuit in <strong>the</strong> Napster cases, <strong>the</strong> court ruled thatknowledge of specific infringements <strong>on</strong> <strong>the</strong> defendants’ service was not required to support afinding of c<strong>on</strong>tributory infringement. Ra<strong>the</strong>r, it was sufficient that <strong>the</strong> record established <strong>the</strong>defendants’ employees were clearly aware that <strong>the</strong>ir service was used primarily to obtaincopyrighted material, users of <strong>the</strong> service told defendants’ technical support employees that <strong>the</strong>y1592 Id. at *20.1593 Louis Vuitt<strong>on</strong> Malletier, S.A. v. Akanoc Soluti<strong>on</strong>s, Inc., 2010 U.S. Dist. LEXIS 34021 (N.D. Cal. Mar. 19,2010) at *4-6.1594 633 F. Supp. 2d 124 (S.D.N.Y. 2009).1595 Id. at 130-31.- 348 -


were engaged in copyrighted infringement, and <strong>the</strong> defendants had targeted <strong>the</strong> service to formerusers of Napster and Kazaa. 1596The material c<strong>on</strong>tributi<strong>on</strong> pr<strong>on</strong>g was satisfied because <strong>the</strong> defendants’ servers were <strong>the</strong>sole instrumentality of <strong>the</strong>ir subscribers’ infringement. The servers physically stored <strong>the</strong> c<strong>on</strong>tentthat subscribers requested for download, and <strong>the</strong> defendants had created designated servers fornewsgroups c<strong>on</strong>taining MP3 or music binary files so as to maximize <strong>the</strong> average retenti<strong>on</strong> timeof those files as compared to o<strong>the</strong>r Usenet groups with n<strong>on</strong>-music c<strong>on</strong>tent. The court rejected<strong>the</strong> defendants’ asserti<strong>on</strong> that <strong>the</strong>y could not be c<strong>on</strong>tributorily liable under <strong>the</strong> Supreme Court’sS<strong>on</strong>y doctrine because <strong>the</strong>ir product had substantial n<strong>on</strong>infringing uses. The court distinguishedS<strong>on</strong>y <strong>on</strong> <strong>the</strong> ground that S<strong>on</strong>y’s last meaningful c<strong>on</strong>tact with <strong>the</strong> product or <strong>the</strong> purchaser was at<strong>the</strong> point of purchase, after which it had no <strong>on</strong>going relati<strong>on</strong>ship with <strong>the</strong> product or its end user.By c<strong>on</strong>trast, <strong>the</strong> defendants maintained an <strong>on</strong>going relati<strong>on</strong>ship with <strong>the</strong>ir infringing users in <strong>the</strong>course of offering <strong>the</strong>ir service, <strong>the</strong>reby rendering <strong>the</strong> n<strong>on</strong>infringing uses immaterial to insulate<strong>the</strong> defendants from liability. Accordingly, <strong>the</strong> court granted <strong>the</strong> plaintiffs’ moti<strong>on</strong> for summaryjudgment <strong>on</strong> <strong>the</strong>ir c<strong>on</strong>tributory copyright infringement claim. 1597(l)SummaryAn OSP, BBS operator or o<strong>the</strong>r operator of an <strong>on</strong>line service can be liable forc<strong>on</strong>tributory infringement where <strong>the</strong> operator has sufficient knowledge of infringing activity.The level of knowledge required is not c<strong>on</strong>sistent am<strong>on</strong>g <strong>the</strong> cases and is c<strong>on</strong>fusingly explicatedin some of <strong>the</strong>m, particularly <strong>the</strong> Ninth Circuit’s rulings in <strong>the</strong> Napster cases. The Ellis<strong>on</strong> andPerfect 10 v. Cybernet Ventures cases seem to hold that c<strong>on</strong>structive knowledge, or reas<strong>on</strong> toknow of infringement, may be sufficient for c<strong>on</strong>tributory liability. However, <strong>the</strong> Ninth Circuit’sNapster cases seem to adopt a standard of “reas<strong>on</strong>able knowledge,” as Judge Patel’s extensiveanalysis of those cases c<strong>on</strong>cludes in her opini<strong>on</strong> in <strong>the</strong> Hummer Winblad case, discussed inSecti<strong>on</strong> III.C.2(c)(7) above. As Judge Patel c<strong>on</strong>cluded, <strong>the</strong> precise scope of this standard of“reas<strong>on</strong>able knowledge” is not clear, but it seems to be narrower than <strong>the</strong> “reas<strong>on</strong> to know”standard of c<strong>on</strong>structive knowledge used in <strong>the</strong> Ellis<strong>on</strong> and Perfect 10 v. Cybernet Venturescases.To add to <strong>the</strong> c<strong>on</strong>fusi<strong>on</strong>, under <strong>the</strong> Ninth Circuit’s Grokster decisi<strong>on</strong>, where c<strong>on</strong>tributoryliability is alleged based <strong>on</strong> <strong>the</strong> distributi<strong>on</strong> of a product or service used to infringe, <strong>the</strong> level ofknowledge required for c<strong>on</strong>tributory liability varies with whe<strong>the</strong>r <strong>the</strong> product or service of <strong>the</strong>defendant has substantial n<strong>on</strong>infringing uses. If <strong>the</strong> product at issue is not capable of substantialor commercially significant n<strong>on</strong>infringing uses, <strong>the</strong>n <strong>the</strong> copyright owner need <strong>on</strong>ly show that<strong>the</strong> defendant had c<strong>on</strong>structive knowledge of <strong>the</strong> infringement. On <strong>the</strong> o<strong>the</strong>r hand, if <strong>the</strong> productat issue is capable of substantial or commercially significant n<strong>on</strong>infringing uses, <strong>the</strong>n <strong>the</strong>copyright owner must dem<strong>on</strong>strate that <strong>the</strong> defendant had reas<strong>on</strong>able knowledge of specificinfringing files and failed to act <strong>on</strong> that knowledge to prevent infringement. The Ninth Circuit’sGrokster decisi<strong>on</strong> interpreted <strong>the</strong> Napster I decisi<strong>on</strong> as requiring actual knowledge of specific1596 Id. at 154-55.1597 Id. at 155-56.- 349 -


infringing acts at a time during which <strong>the</strong> OSP materially c<strong>on</strong>tributes to <strong>the</strong> infringement in orderfor <strong>the</strong>re to be c<strong>on</strong>tributory liability for such acts. However, <strong>the</strong> Supreme Court’s Groksterdecisi<strong>on</strong> found that <strong>the</strong> Ninth Circuit erred in <strong>the</strong> latter ruling, so it is unclear how much of <strong>the</strong>Ninth Circuit’s adjudicati<strong>on</strong> of <strong>the</strong> knowledge requirement for c<strong>on</strong>tributory liability survives <strong>the</strong>Supreme Court’s Grokster ruling. In her analysis of this issue in her opini<strong>on</strong> in <strong>the</strong> HummerWinblad case, Judge Patel was able to c<strong>on</strong>clude <strong>on</strong>ly that <strong>the</strong> Supreme Court’s rejecti<strong>on</strong> of <strong>the</strong>Ninth Circuit’s ruling suggests that, taken as a whole, <strong>the</strong> Supreme Court’s decisi<strong>on</strong> provided forliability under broader circumstances than those permitted under Napster I, but <strong>the</strong> precise scopeof that liability remains unclear.Bey<strong>on</strong>d knowledge, how much <strong>the</strong> operator must c<strong>on</strong>tribute to <strong>the</strong> infringing activityafter gaining such knowledge bey<strong>on</strong>d <strong>the</strong> mere provisi<strong>on</strong> of <strong>the</strong> facilities used to accomplish <strong>the</strong>infringement is also unclear. The Ninth Circuit’s interpretati<strong>on</strong> in <strong>the</strong> Napster I case of itsF<strong>on</strong>ovisa decisi<strong>on</strong> seems to require little more than c<strong>on</strong>tinuing to provide such facilities afterknowledge that infringing activity is taking place. The MAPHIA, CoStar and Ellis<strong>on</strong> courtsinterpreted <strong>the</strong> Netcom decisi<strong>on</strong> to require more (note that, although <strong>the</strong> Netcom case wasdecided before both F<strong>on</strong>ovisa and Napster I, <strong>the</strong> CoStar and Ellis<strong>on</strong> cases were decided afterF<strong>on</strong>ovisa and Napster I).As discussed in detail above, <strong>the</strong> Ninth Circuit’s Napster I decisi<strong>on</strong> c<strong>on</strong>tains a number ofambiguities with respect to <strong>the</strong> scope of <strong>the</strong> duty to police for occurrences of infringing materialup<strong>on</strong> receipt of such knowledge. However, <strong>the</strong> cases seem to require at least that a serviceprovider actively attempt to verify a claim of infringement after receiving notice of <strong>the</strong> same andto take appropriate acti<strong>on</strong> in resp<strong>on</strong>se. In additi<strong>on</strong>, several decisi<strong>on</strong>s have imposed c<strong>on</strong>tributoryliability <strong>on</strong> <strong>the</strong> part of a BBS where <strong>the</strong> BBS operator actively encouraged <strong>the</strong> acts leading to <strong>the</strong>infringements. See <strong>the</strong> discussi<strong>on</strong>s of <strong>the</strong> Sabella case 1598 and <strong>the</strong> Hardenburgh case 1599 above.As discussed in Secti<strong>on</strong> III.C.5(b) below, <strong>the</strong> DMCA defines certain safe harbors againstliability for OSPs who act as merely passive c<strong>on</strong>duits for infringing informati<strong>on</strong> and withoutknowledge of <strong>the</strong> infringement. These safe harbors may provide a defense against liability incertain instances to claims of c<strong>on</strong>tributory liability.3. Vicarious LiabilityA party may be vicariously liable for <strong>the</strong> infringing acts of ano<strong>the</strong>r if it (1) has <strong>the</strong> rightand ability to c<strong>on</strong>trol <strong>the</strong> infringer’s acts and (2) receives a direct financial benefit from <strong>the</strong>infringement. 1600 Unlike c<strong>on</strong>tributory infringement, knowledge is not an element of vicariousliability. 16011598 Sega Enterprises Ltd. v. Sabella, 1997 Copyr. Law. Dec. 27,648 (N.D. Cal. Dec. 18, 1996).1599 Playboy Enterprises, Inc. v. Hardenburgh, Inc., 982 F. Supp. 503 (N.D. Ohio 1997).1600 E.g., Shapiro, Bernstein & Co. v. H.L. Green Co., 316 F.2d 304, 306 (2d Cir. 1963).1601 Religious Technology Center v. Netcom On-Line Communicati<strong>on</strong> Servs., 907 F. Supp. 1361, 1375 (N.D. Cal.1995); R. Nimmer, Informati<strong>on</strong> Law 4.11, at 4-40 (2001).- 350 -


(a) The Netcom Case and its ProgenyIn <strong>the</strong> Netcom case, <strong>the</strong> court refused to impose liability <strong>on</strong> Netcom under a <strong>the</strong>ory ofvicarious liability. The court found that <strong>the</strong>re was a genuine issue of material fact as to whe<strong>the</strong>rNetcom had <strong>the</strong> right and ability to c<strong>on</strong>trol <strong>the</strong> activities of its subscribers, in view of <strong>the</strong> factthat Netcom’s expert testified that with an easy software modificati<strong>on</strong> Netcom could identifypostings c<strong>on</strong>taining particular words or from particular individuals, and Netcom had acted tosuspend subscribers’ accounts <strong>on</strong> over <strong>on</strong>e thousand occasi<strong>on</strong>s. 1602However, <strong>the</strong> court held that <strong>the</strong> sec<strong>on</strong>d pr<strong>on</strong>g of <strong>the</strong> test was not satisfied, because <strong>the</strong>rewas no evidence that Netcom received a direct financial benefit from <strong>the</strong> infringing postings, orthat such postings enhanced <strong>the</strong> value of Netcom’s services to subscribers or attracted newsubscribers. 1603In refusing to impose vicarious liability because it found Netcom received no directfinancial benefit from <strong>the</strong> infringing postings, <strong>the</strong> court in Netcom relied <strong>on</strong> <strong>the</strong> district court’sdecisi<strong>on</strong> in F<strong>on</strong>ovisa, Inc. v. Cherry Aucti<strong>on</strong>, Inc., 1604 which found no direct financial benefitdespite an argument that lessees at a swap meet included many vendors selling counterfeit goodsand that clientele sought “bargain basement prices.” 1605 It should be noted that <strong>the</strong> Ninth Circuitsubsequently reversed F<strong>on</strong>ovisa, and appears to have adopted a less demanding standard forfinancial benefit for purposes of vicarious liability, which may undermine <strong>the</strong> strength of <strong>the</strong>Netcom decisi<strong>on</strong> as precedent <strong>on</strong> this point. The Ninth Circuit held that adequate financialbenefit was alleged by virtue of <strong>the</strong> fact that <strong>the</strong> operator of <strong>the</strong> swap meet received financialbenefits through admissi<strong>on</strong> fees, parking fees, and sales at c<strong>on</strong>cessi<strong>on</strong> stands. 1606 A copyrightholder seeking to hold an OSP or BBS operator vicariously liable might argue under F<strong>on</strong>ovisathat <strong>the</strong> subscripti<strong>on</strong> fees paid by <strong>the</strong> infringers should be sufficient financial benefit, just as were<strong>the</strong> admissi<strong>on</strong> fees, parking fees, and c<strong>on</strong>cessi<strong>on</strong> stand sales in F<strong>on</strong>ovisa. In additi<strong>on</strong>, asdiscussed above, in <strong>the</strong> Napster case, <strong>the</strong> Ninth Circuit ruled that Napster had received afinancial benefit because <strong>the</strong> presence of infringing material <strong>on</strong> <strong>the</strong> Napster system acted as adraw for users.1602 Religious Technology Center v. Netcom On-Line Communicati<strong>on</strong> Servs., 907 F. Supp. 1361, 1376 (N.D. Cal.1995).1603 Id. at 1377. The plaintiffs argued that <strong>the</strong> financial benefit pr<strong>on</strong>g was satisfied based <strong>on</strong> “Netcom’sadvertisements that, compared to competitors like CompuServe and America Online, Netcom provides easy,regulati<strong>on</strong>-free <strong>Internet</strong> access. Plaintiffs assert that Netcom’s policy attracts copyright infringers to its system,resulting in a direct financial benefit. The court is not c<strong>on</strong>vinced that such an argument, if true, wouldc<strong>on</strong>stitute a direct financial benefit to Netcom from Erlich’s infringing activities.” Id. (emphasis in original).1604 847 F. Supp. 1492 (E.D. Cal. 1994).1605 Id. at 1496.1606 F<strong>on</strong>ovisa, Inc. v. Cherry Aucti<strong>on</strong>, Inc., 76 F.3d 259 (9th Cir. 1996).- 351 -


The Ninth Circuit’s holdings in both F<strong>on</strong>ovisa and Napster suggest a standard that doesnot require direct financial benefit from <strong>the</strong> infringing activity itself, but ra<strong>the</strong>r that <strong>the</strong> infringingactivity c<strong>on</strong>tributes to an overall commercial design and benefit for <strong>the</strong> operator. 1607In <strong>on</strong>e decisi<strong>on</strong> handed down after both <strong>the</strong> Netcom and F<strong>on</strong>ovisa decisi<strong>on</strong>s, Marobie-FL,Inc. v. Nati<strong>on</strong>al Associati<strong>on</strong> of Fire Equipment Distributors, 1608 <strong>the</strong> court, citing <strong>the</strong> Netcomcase, refused to hold vicariously liable an OSP supplying <strong>Internet</strong> service to a website thatc<strong>on</strong>tained infringing material because <strong>the</strong> infringements that occurred through <strong>the</strong> website didnot directly financially benefit <strong>the</strong> OSP. The website owner paid <strong>the</strong> OSP a flat quarterlysubscripti<strong>on</strong> fee that did not change based up<strong>on</strong> how many people visited <strong>the</strong> website or whatwas accessed <strong>on</strong> such site. 1609(b) The Napster Cases(For a discussi<strong>on</strong> of vicarious liability in <strong>the</strong> Napster cases, see Secti<strong>on</strong> III.C.2.(c)(1)above.)(c) Ellis<strong>on</strong> v. Roberts<strong>on</strong>(For a discussi<strong>on</strong> of vicarious liability in <strong>the</strong> case of Ellis<strong>on</strong> v. Roberts<strong>on</strong>, see Secti<strong>on</strong>III.C.5(b)(1)(i) below.)(d) Perfect 10 v. Cybernet VenturesThe facts of <strong>the</strong> case of Perfect 10, Inc. v. Cybernet Ventures, Inc. 1610 are set forth inSecti<strong>on</strong> III.C.2(f) above. In that case, <strong>the</strong> court found, <strong>on</strong> a moti<strong>on</strong> for a preliminary injuncti<strong>on</strong>,that <strong>the</strong> plaintiff had established a str<strong>on</strong>g likelihood of success <strong>on</strong> its claim of vicarious liability.The court ruled that <strong>the</strong> defendant Cybernet had a direct financial interest in <strong>the</strong> infringingactivities of its member sites because Cybernet benefited from such sites to <strong>the</strong> extent <strong>the</strong>y actedas a draw for new subscribers to Cybernet’s service. The court fur<strong>the</strong>r noted that <strong>the</strong> relati<strong>on</strong>shipbetween Cybernet and its member sites was so close that it appeared to Cybernet’s subscribers asif <strong>the</strong> Cybernet service c<strong>on</strong>stituted a single brand. In additi<strong>on</strong>, subscribers paid all <strong>the</strong> m<strong>on</strong>ey for<strong>the</strong>ir subscripti<strong>on</strong> fees directly to Cybernet, which <strong>the</strong>n apporti<strong>on</strong>ed it to <strong>the</strong> member sites ascommissi<strong>on</strong>s. 1611With respect to <strong>the</strong> c<strong>on</strong>trol pr<strong>on</strong>g, <strong>the</strong> court found that Cybernet had <strong>the</strong> ability to c<strong>on</strong>trolits member sites. Cybernet had a m<strong>on</strong>itoring program in place under which its member sitesreceived detailed instructi<strong>on</strong>s regarding issues of layout, appearance and c<strong>on</strong>tent. Cybernetm<strong>on</strong>itored images <strong>on</strong> <strong>the</strong> sites to make sure that celebrity images did not over-saturate <strong>the</strong>1607 R. Nimmer, Informati<strong>on</strong> Law 4.13[2], at 4-49 (2001).1608 45 U.S.P.Q.2d 1236 (N.D. Ill. 1997).1609 Id. at 1245.1610 213 F. Supp. 2d 1146 (C.D. Cal. 2002).1611 Id. at 1171-72.- 352 -


c<strong>on</strong>tent found within <strong>the</strong> sites making up Cybernet’s service. Cybernet also forbade its memberssites to display certain types of images. Accordingly, <strong>the</strong> court c<strong>on</strong>cluded that Cybernet hadsufficient c<strong>on</strong>trol over <strong>the</strong> infringing activity to be vicariously liable. 1612(e) The Aimster/Madster LawsuitsThe facts of <strong>the</strong> case of Aimster/Madster lawsuits are set forth in Secti<strong>on</strong> III.C.2(c)(3)above. In that case, <strong>the</strong> district court found, <strong>on</strong> a moti<strong>on</strong> for a preliminary injuncti<strong>on</strong>, that <strong>the</strong>plaintiffs had established a reas<strong>on</strong>able likelihood of success <strong>on</strong> <strong>the</strong>ir claim of vicarious liability.The court ruled that Aimster had <strong>the</strong> right and ability to supervise its users merely because itretained <strong>the</strong> right under its Terms of Service to terminate service to individual users who wererepeat violators of copyright law – as required by <strong>the</strong> DMCA safe harbors, <strong>the</strong>reby raising <strong>the</strong>Catch 22 discussed in Secti<strong>on</strong> III.C.2(c)(1).10 above in c<strong>on</strong>necti<strong>on</strong> with <strong>the</strong> Napster case, whichCatch 22 led <strong>the</strong> courts in <strong>the</strong> Hendricks<strong>on</strong> v. eBay, CoStar, and Perfect 10 v. Cybernet Venturescases to reject this interpretati<strong>on</strong> (see Secti<strong>on</strong>s III.C.5(b)(1)(iii).b, c & d below). In additi<strong>on</strong>,Aimster c<strong>on</strong>trolled access of its users by requiring <strong>the</strong>m to log <strong>on</strong> after paying <strong>the</strong>ir m<strong>on</strong>thly feeto join Club Aimster. The court rejected <strong>the</strong> argument that <strong>the</strong> encrypti<strong>on</strong> <strong>on</strong> <strong>the</strong> Aimster systemeffectively prevented Aimster from c<strong>on</strong>trolling <strong>the</strong> activity of its users, ruling that Aimster neednot, as a matter of law, have <strong>the</strong> physical <strong>Internet</strong> address of its users in order to be deemed tohave sufficient right and ability to c<strong>on</strong>trol <strong>the</strong>m. 1613 “The fact that users must log in to <strong>the</strong>system in order to use it dem<strong>on</strong>strates that Defendants know full well who <strong>the</strong>ir users are.” 1614The district court also c<strong>on</strong>cluded that <strong>the</strong> defendants had a direct financial interest in <strong>the</strong>infringing activities of Aimster users, because each Club Aimster user was required to pay $4.95per m<strong>on</strong>th to use <strong>the</strong> service, and <strong>the</strong>re was evidence that every Aimster was now required to pay<strong>the</strong> fee. In additi<strong>on</strong>, citing Napster II, <strong>the</strong> court ruled that <strong>the</strong> financial benefit element wassatisfied because <strong>the</strong> existence of infringing activities acted as a draw for potential customers to<strong>the</strong> system. 1615On appeal, <strong>the</strong> Seventh Circuit stated that it was “less c<strong>on</strong>fident” than <strong>the</strong> district judgewas that <strong>the</strong> plaintiffs were likely to prevail <strong>on</strong> <strong>the</strong> vicarious infringement <strong>the</strong>ory. 1616 JudgePosner noted that vicarious liability could c<strong>on</strong>ceivably have been applied in <strong>the</strong> S<strong>on</strong>y case giventhat <strong>the</strong> Court treated vicarious and c<strong>on</strong>tributory infringement interchangeably, and S<strong>on</strong>y couldhave made a design change in its product that would have c<strong>on</strong>trolled its users’ ability to fastforward through commercials, which Judge Posner found to be <strong>the</strong> creati<strong>on</strong> of infringingderivative works. 1617 However, he c<strong>on</strong>cluded that <strong>the</strong> court need not reach <strong>the</strong> issue becauseAimster’s “ostrich-like refusal” to eliminate <strong>the</strong> encrypti<strong>on</strong> feature in its system and “discover<strong>the</strong> extent to which its system was being used to infringe copyright” made it a c<strong>on</strong>tributory1612 Id. at 1173.1613 In re Aimster <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Litigati<strong>on</strong>, 252 F. Supp. 2d 634, 654-55 (N.D. Ill. 2002).1614 Id. at 655.1615 Id.1616 In re Aimster <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Litigati<strong>on</strong>, 334 F.3d 643, 654 (7th Cir. 2003), cert. denied, 124 S. Ct. 1069 (2004).1617 Id. at 647, 654.- 353 -


infringer, and that was a sufficient basis to affirm <strong>the</strong> grant of <strong>the</strong> preliminary injuncti<strong>on</strong> withoutreaching <strong>the</strong> vicarious liability issue. 1618(f)The StreamCast/Kazaa/Grokster LawsuitsThe facts of <strong>the</strong> case of StreamCast/Kazaa/Grokster lawsuits are set forth in Secti<strong>on</strong>III.C.2(c)(4) above. In that case, <strong>the</strong> court granted summary judgment to <strong>the</strong> defendantsStreamCast and Grokster <strong>on</strong> <strong>the</strong> plaintiff’s claim for vicarious liability. With respect to <strong>the</strong>financial benefit pr<strong>on</strong>g, <strong>the</strong> court ruled that both defendants derived a financial benefit from <strong>the</strong>infringing c<strong>on</strong>duct of <strong>the</strong> users of <strong>the</strong>ir software, since <strong>the</strong> ability to trade copyrighted s<strong>on</strong>gs ando<strong>the</strong>r copyrighted works acted as a “draw” for many users of <strong>the</strong> software. The defendants alsoderived substantial revenue from advertising displayed through <strong>the</strong> software. 1619With respect to <strong>the</strong> c<strong>on</strong>trol pr<strong>on</strong>g, <strong>the</strong> court distinguished <strong>the</strong> Napster system, in whichcentralized search indices and mandatory registrati<strong>on</strong> system gave Napster both knowledge ofwhat was being exchanged and <strong>the</strong> ability to police those exchanges. By c<strong>on</strong>trast, <strong>the</strong> courtfound no evidence before it that <strong>the</strong> defendants had <strong>the</strong> ability to supervise and c<strong>on</strong>trol <strong>the</strong>infringing c<strong>on</strong>duct, all of which occurred after <strong>the</strong> product had passed to end-users. 1620The plaintiffs argued that <strong>the</strong> defendants’ software could have been altered to preventusers from sharing copyrighted files and <strong>the</strong> court should require such alterati<strong>on</strong>s, as <strong>the</strong> NinthCircuit required Napster to do. The plaintiffs noted that <strong>the</strong> defendants’ software alreadyincluded opti<strong>on</strong>al screens for pornographic/obscene file names and that it could just as easilyscreen out copyrighted s<strong>on</strong>g titles. The plaintiffs also argued that an effective “meta data” screencould be implemented, as well as emerging “digital fingerprinting” technology. 1621 In asignificant holding, <strong>the</strong> court rejected <strong>the</strong>se arguments, stating that “whe<strong>the</strong>r <strong>the</strong>se safeguards arepracticable is immaterial to this analysis, as <strong>the</strong> obligati<strong>on</strong> to ‘police’ arises <strong>on</strong>ly where adefendant has <strong>the</strong> ‘right and ability’ to supervise <strong>the</strong> infringing c<strong>on</strong>duct.” 1622 Unlike Napster,whose client software was an essential comp<strong>on</strong>ent of <strong>the</strong> integrated Napster system, <strong>the</strong>defendants provided software that communicated across networks entirely outside defendants’c<strong>on</strong>trol. 1623 “The doctrine of vicarious infringement does not c<strong>on</strong>template liability based up<strong>on</strong><strong>the</strong> fact that a product could be made such that it is less susceptible to unlawful use, where noc<strong>on</strong>trol over <strong>the</strong> user of <strong>the</strong> product exists.” 1624 Accordingly, <strong>the</strong> court granted <strong>the</strong> defendantssummary judgment <strong>on</strong> <strong>the</strong> issue of vicarious liability.1618 Id. at 654-55.1619 Metro-Goldwyn-Mayer Studios, Inc. v. Grokster, Ltd., 259 F. Supp. 2d 1029, 1043-44 (C.D. Cal. 2003).1620 Id. at 1044-45.1621 Id. at 1045.1622 Id. (emphasis in original).1623 Id.1624 Id. at 1045-46.- 354 -


On appeal, <strong>the</strong> Ninth Circuit affirmed. 1625 The Ninth Circuit began by observing that ithad held in <strong>the</strong> first appeal of <strong>the</strong> Napster case that <strong>the</strong> S<strong>on</strong>y doctrine has no applicati<strong>on</strong> tovicarious infringement because vicarious liability was not before <strong>the</strong> Supreme Court in that case.Noting fur<strong>the</strong>r that <strong>the</strong> issue of direct financial benefit, via advertising revenue, was undisputed,<strong>the</strong> court turned its analysis to <strong>the</strong> pr<strong>on</strong>g of right and ability to supervise <strong>the</strong> infringers. 1626Noting that <strong>the</strong> Napster case had found especially important <strong>the</strong> fact that Napster had anexpress policy reserving <strong>the</strong> right to block infringers’ access to its system, <strong>the</strong> court c<strong>on</strong>trasted<strong>the</strong> instant case in which <strong>the</strong>re was no evidence in <strong>the</strong> record to establish that ei<strong>the</strong>r of <strong>the</strong>defendants had <strong>the</strong> ability to block access to individual users. Although Grokster nominallyreserved <strong>the</strong> right to terminate access, StreamCast did not maintain a licensing agreement withpers<strong>on</strong>s who downloaded Morpheus. Given <strong>the</strong> lack of a registrati<strong>on</strong> and log-in process,however, even Grokster had no ability to actually terminate access to filesharing functi<strong>on</strong>s,absent a mandatory software upgrade to all users that <strong>the</strong> particular user refused, or IP addressblockingattempts (which would not be effective against most users who were utilizing dynamicIP addresses). The court also noted that n<strong>on</strong>e of <strong>the</strong> communicati<strong>on</strong> between <strong>the</strong> defendants andusers provided a point of access for filtering or searching for infringing files, since infringingmaterial and index informati<strong>on</strong> did not pass through <strong>the</strong> defendants’ computers. 1627In <strong>the</strong> case of StreamCast, shutting down its XML file altoge<strong>the</strong>r would not preventany<strong>on</strong>e from using <strong>the</strong> Gnutella network. In <strong>the</strong> case of Grokster, its licensing agreement withKazaa/Sharman did not give it <strong>the</strong> ability to mandate that root nodes be shut down. In any event,<strong>the</strong> court noted that any alleged ability to shut down operati<strong>on</strong>s altoge<strong>the</strong>r would be more akin to<strong>the</strong> ability to close down an entire swap meet than <strong>the</strong> ability to exclude individual participantsor to police aisles. The Ninth Circuit noted that <strong>the</strong> district court had correctly characterized <strong>the</strong>copyright owners’ evidence of <strong>the</strong> right and ability to supervise as little more than a c<strong>on</strong>tenti<strong>on</strong>that <strong>the</strong> software itself could be altered to prevent users from sharing copyrighted files. 1628In arguing that this ability c<strong>on</strong>stitutes evidence of <strong>the</strong> right and ability tosupervise, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Owners c<strong>on</strong>fuse <strong>the</strong> right and ability to supervise with<strong>the</strong> str<strong>on</strong>g duty imposed <strong>on</strong> entities that have already been determined to be liablefor vicarious copyright infringement; such entities have an obligati<strong>on</strong> to exercise<strong>the</strong>ir policing powers to <strong>the</strong> fullest extent, which in Napster’s case includedimplementati<strong>on</strong> of new filtering mechanisms. … But <strong>the</strong> potential duty a districtcourt may place <strong>on</strong> a vicariously liable defendant is not <strong>the</strong> same as <strong>the</strong> “ability”c<strong>on</strong>templated by <strong>the</strong> “right and ability to supervise” test. … We agree with <strong>the</strong>1625 Metro-Goldwyn-Mayer v. Grokster, 380 F.3d 1154 (9 th 2004).1626 Id. at 1164.1627 Id. at 1165.1628 Id. at 1165-66.- 355 -


district court that possibilities for upgrading software located <strong>on</strong> ano<strong>the</strong>r pers<strong>on</strong>’scomputer are irrelevant to determining whe<strong>the</strong>r vicarious liability exists. 1629Accordingly, <strong>the</strong> court affirmed summary judgment for <strong>the</strong> defendants <strong>on</strong> <strong>the</strong> vicarious liabilityclaim. 1630(g) Perfect 10 v. Visa Internati<strong>on</strong>alIn Perfect 10, Inc. v. Visa Internati<strong>on</strong>al Service Ass’n, 1631 Perfect 10, owner of <strong>the</strong>copyrights in pornographic materials, sought to hold various credit card and banking instituti<strong>on</strong>sliable for c<strong>on</strong>tributory and vicarious infringement for providing financial services to various websites that Perfect 10 alleged c<strong>on</strong>tained infringing copies of its copyrighted materials. The districtcourt granted <strong>the</strong> defendants’ moti<strong>on</strong> to dismiss.Perfect 10 argued that <strong>the</strong> defendants had <strong>the</strong> right and ability to c<strong>on</strong>trol <strong>the</strong> infringingactivities because (i) provisi<strong>on</strong> of financial services was essential to <strong>the</strong> survival of <strong>the</strong> allegedlyinfringing web sites, and <strong>the</strong> defendants could <strong>the</strong>refore dictate c<strong>on</strong>tent by threatening to revoke<strong>the</strong>ir services if <strong>the</strong> web sites did not comply with <strong>the</strong>ir standards, and (ii) <strong>the</strong> defendants had inplace internal regulati<strong>on</strong>s governing <strong>the</strong> provisi<strong>on</strong> of service to high-risk merchants, includingadult entertainment web sites. The district court rejected both arguments. As to <strong>the</strong> first, <strong>the</strong>court noted that <strong>the</strong> record established <strong>the</strong> allegedly infringing web sites would be able toc<strong>on</strong>tinue <strong>the</strong>ir alleged infringing c<strong>on</strong>duct regardless of whe<strong>the</strong>r <strong>the</strong> defendants blacklisted <strong>the</strong>m.As to <strong>the</strong> sec<strong>on</strong>d, even if <strong>the</strong> defendants had internal regulati<strong>on</strong>s requiring m<strong>on</strong>itoring of websites, <strong>the</strong> web sites were not bound by such regulati<strong>on</strong>s and <strong>the</strong> defendants had no c<strong>on</strong>tractualright to dictate <strong>the</strong> web sites’ c<strong>on</strong>tent or to take acti<strong>on</strong> against <strong>the</strong>m in <strong>the</strong> event of infringingactivity. And unlike <strong>the</strong> F<strong>on</strong>ovisa swap meet case, <strong>the</strong> defendants could not “eject” <strong>the</strong> web sitesfrom <strong>the</strong> <strong>Internet</strong>. Accordingly, <strong>the</strong> district court ruled that <strong>the</strong> defendants had no way to c<strong>on</strong>trol<strong>the</strong> infringing c<strong>on</strong>duct of <strong>the</strong> web sites. 1632The court noted that <strong>the</strong> complaint included facts that might indicate a financial benefit to<strong>the</strong> defendants as a result of <strong>the</strong> draw from <strong>the</strong> alleged infringing images, but because of <strong>the</strong>absence of a right or ability to exercise c<strong>on</strong>trol over <strong>the</strong> alleged infringing activity, <strong>the</strong> existenceof a financial benefit would not be sufficient to establish vicarious liability. Accordingly, <strong>the</strong>1629 Id. at 1166. The plaintiffs also argued that Grokster and StreamCast should not be able to escape vicariousliability by turning a “blind eye” to <strong>the</strong> detectable infringement of <strong>the</strong>ir users. The Ninth Circuit rejected thisargument, stating that <strong>the</strong>re is no separate “blind eye” <strong>the</strong>ory or element of vicarious liability that existsindependently of <strong>the</strong> traditi<strong>on</strong>al elements of liability. Id.1630 Id. at 1167. On appeal, <strong>the</strong> Supreme Court did not reach <strong>the</strong> issue of vicarious liability in view of its resoluti<strong>on</strong>of <strong>the</strong> case under <strong>the</strong> doctrine of inducement.1631 71 U.S.P.Q.2d 1914 (N.D. Cal. 2004), aff’d, 2007 U.S. App. LEXIS 15824 (9 th Cir. July 3, 2007), cert. denied,2008 U.S. LEXIS 4523 (June 2, 2008).1632 Id. at 1918.- 356 -


district court granted <strong>the</strong> defendants’ moti<strong>on</strong> to dismiss <strong>the</strong> claim with leave to Perfect 10 toamend. 1633On appeal, <strong>the</strong> Ninth Circuit affirmed. 1634 The Ninth Circuit agreed with <strong>the</strong> districtcourt that <strong>the</strong> rules and regulati<strong>on</strong>s of <strong>the</strong> defendants prohibiting member banks from providingservices to merchants engaging in certain illegal activities and requiring member banks toinvestigate merchants suspected of engaging in such illegal activities were insufficient toestablish <strong>the</strong> right and ability to c<strong>on</strong>trol infringing activity for purposes of vicarious liability.The court noted that <strong>the</strong> defendants did not have any ability to directly c<strong>on</strong>trol <strong>the</strong> infringingactivity occurring <strong>on</strong> <strong>the</strong> web sites at issue, and <strong>the</strong> court held that <strong>the</strong> mere ability to withdraw afinancial carrot did not c<strong>on</strong>stitute <strong>the</strong> right and ability to c<strong>on</strong>trol infringing activity that vicariousinfringement requires. 1635The court rejected Perfect 10’s analogy to <strong>the</strong> Napster case <strong>on</strong> <strong>the</strong> ground that <strong>the</strong>defendants, like Napster, had <strong>the</strong> ability to policy <strong>the</strong>ir systems and failed to exercise that right toprevent <strong>the</strong> exchange of copyrighted material. The court noted that Napster’s policing powerwas much more intimate and directly intertwined with <strong>the</strong> infringing activity than <strong>the</strong>defendants’ payment systems. Napster could block users’ access to its system and <strong>the</strong>rebydeprive particular users of use of its locati<strong>on</strong> and distributi<strong>on</strong> tools. By c<strong>on</strong>trast, although <strong>the</strong>defendants could block access to <strong>the</strong>ir payment system, <strong>the</strong>y could not <strong>the</strong>mselves block accessto <strong>the</strong> <strong>Internet</strong>, to any particular web sites, or to search engines enabling <strong>the</strong> locati<strong>on</strong> of such websites. Nor could <strong>the</strong> defendants take away <strong>the</strong> tools <strong>the</strong> offending web sites used to reproduce,alter, and distribute <strong>the</strong> infringing images over <strong>the</strong> <strong>Internet</strong>. 1636Finally, <strong>the</strong> court rejected Perfect 10’s argument that <strong>the</strong> defendants’ rules andregulati<strong>on</strong>s imposed <strong>on</strong> merchant banks gave <strong>the</strong>m c<strong>on</strong>tractual c<strong>on</strong>trol over <strong>the</strong> c<strong>on</strong>tent of <strong>the</strong>irmerchants’ web sites sufficient for vicarious liability. The court held that <strong>the</strong> ability to exertfinancial pressure did not give <strong>the</strong> defendants <strong>the</strong> right or ability to c<strong>on</strong>trol <strong>the</strong> actual infringingactivity taking place <strong>on</strong> <strong>the</strong> web sites. The court found <strong>the</strong> defendants analogous to Google,which was held not liable in <strong>the</strong> Perfect 10 v. Amaz<strong>on</strong> case for vicarious infringement eventhough search engines could effectively cause a web site to disappear by removing it from <strong>the</strong>irsearch results, and reserved <strong>the</strong> right to do so. 1637 In sum, although <strong>the</strong> infringing activities atissue might not be profitable without access to <strong>the</strong> defendants’ credit card payment systems, <strong>the</strong>court held that <strong>the</strong> “alleged infringement does not turn <strong>on</strong> <strong>the</strong> payment; it turns <strong>on</strong> <strong>the</strong>reproducti<strong>on</strong>, alterati<strong>on</strong> and distributi<strong>on</strong> of <strong>the</strong> images, which Defendants do not do, and whichoccurs over networks Defendants do not c<strong>on</strong>trol.” 1638 Accordingly, because Perfect 10 had1633 Id.1634 Perfect 10, Inc. v. Visa Internati<strong>on</strong>al, 2007 U.S. App. LEXIS 15824 (9 th Cir. July 3, 2007), cert. denied, 2008U.S. LEXIS 4523 (June 2, 2008).1635 Id. at *33-35.1636 Id. at *35-37.1637 Id. at *38-39.1638 Id. at *43.- 357 -


failed to establish <strong>the</strong> c<strong>on</strong>trol pr<strong>on</strong>g, it had not pled a viable claim of vicarious liability, and <strong>the</strong>court ruled that it need not reach <strong>the</strong> issue of direct financial interest. 1639The Ninth Circuit’s rulings were clearly heavily influenced by policy c<strong>on</strong>siderati<strong>on</strong>s anda belief that to hold tertiary financial service providers sec<strong>on</strong>darily liable for infringing activities<strong>on</strong> web sites for which <strong>the</strong>y processed payments would simply go too far. Indeed, <strong>the</strong> courtbegan its analysis of <strong>the</strong> sec<strong>on</strong>dary liability issues with <strong>the</strong> following:We evaluate Perfect 10’s claims with an awareness that credit cards serve as <strong>the</strong>primary engine of electr<strong>on</strong>ic commerce and that C<strong>on</strong>gress has determined it to be<strong>the</strong> “policy of <strong>the</strong> United States – (1) to promote <strong>the</strong> c<strong>on</strong>tinued development of<strong>the</strong> <strong>Internet</strong> and o<strong>the</strong>r interactive computer services and o<strong>the</strong>r interactive media[and] (2) to preserve <strong>the</strong> vibrant and competitive free market that presently existsfor <strong>the</strong> <strong>Internet</strong> and o<strong>the</strong>r interactive computer services, unfettered by Federal orState regulati<strong>on</strong>.” 1640(h) Parker v. GoogleIn Parker v. Google, 1641 pro se plaintiff Gord<strong>on</strong> Parker was <strong>the</strong> owner of copyright in ane-book titled “29 Reas<strong>on</strong>s Not To Be A Nice Guy.” He posted Reas<strong>on</strong> # 6 <strong>on</strong> USENET. Parkerasserted that Google’s automatic archiving of this USENET c<strong>on</strong>tent made Google vicariouslyliable for copyright infringement because it facilitated users to make unauthorized distributi<strong>on</strong>sand copies of his copyrighted material through Google’s web site, and Google had <strong>the</strong> right andability to supervise or c<strong>on</strong>trol such user activity and received a substantial financial benefit fromit in <strong>the</strong> form of advertising revenue and goodwill. The district court rejected this argument fortwo reas<strong>on</strong>s. First, Parker had failed to allege infringement of any specific registered works thatwere infringed, nor had he alleged specific c<strong>on</strong>duct by a third party that Google may have had<strong>the</strong> right and ability to supervise. Sec<strong>on</strong>d, his broad allegati<strong>on</strong>s that Google’s advertisingrevenue was directly related to <strong>the</strong> number of Google users was insufficient to maintain a claimof vicarious liability, as it did not allege any actual relati<strong>on</strong>ship between infringing activity and<strong>the</strong> number of users that would dem<strong>on</strong>strate an obvious and direct financial interest in infringingactivity. 1642 On appeal, <strong>the</strong> Third Circuit affirmed in an unpublished decisi<strong>on</strong> for <strong>the</strong> reas<strong>on</strong>sarticulated by <strong>the</strong> district court. 1643(i)Louis Vuitt<strong>on</strong> v. Akanoc Soluti<strong>on</strong>sIn Louis Vuitt<strong>on</strong> Malletier, S.A. v. Akanoc Soluti<strong>on</strong>s, Inc., 1644 <strong>the</strong> defendants providedOSP services that hosted websites through which <strong>the</strong> plaintiff alleged goods were being sold that1639 Id. at *45.1640 Id. at *7 (quoting 47 U.S.C §§ 230(b)(1), (2)).1641 422 F. Supp. 2d 492 (E.D. Pa. 2006), aff’d, 2007 U.S. App. LEXIS 16370 (3d Cir. July 10, 2007).1642 Id. at 499-500.1643 Parker v. Google, 2007 U.S. App. LEXIS 16370 (3d Cir. July 10, 2007).1644 591 F. Supp. 2d 109 (N.D. Cal. 2008).- 358 -


infringed its trademarks and copyrights. The plaintiff sought to hold <strong>the</strong> defendantsc<strong>on</strong>tributorily and vicariously liable for hosting such websites and <strong>the</strong> defendants moved forsummary judgment. The court denied <strong>the</strong> moti<strong>on</strong> as to c<strong>on</strong>tributory infringement, but granted itas to vicarious infringement. 1645 With respect to vicarious liability, <strong>the</strong> plaintiff argued that <strong>the</strong>ability to infringe without strict policing by <strong>the</strong> defendants acted as a draw to <strong>the</strong> site, inc<strong>on</strong>juncti<strong>on</strong> with <strong>the</strong> defendants’ Chinese language skills and competitive technology. The courtrejected this argument, noting that <strong>the</strong> plaintiff had provided no evidence that any of <strong>the</strong>defendants’ customers used <strong>the</strong>ir services because of <strong>the</strong> ability to infringe. 1646 The court alsofound that <strong>the</strong> plaintiff had not established a showing of direct financial benefit from infringingactivity. “Plaintiff does not offer any evidence showing that Defendants made more m<strong>on</strong>eywhen <strong>the</strong>y allowed infringement to c<strong>on</strong>tinue or less m<strong>on</strong>ey when <strong>the</strong>y did not. Nor does Plaintiffoffer any evidence showing that customers sought or aband<strong>on</strong>ed Defendants’ services based <strong>on</strong><strong>the</strong>ir ability to infringe. Fur<strong>the</strong>rmore, Plaintiff c<strong>on</strong>cedes that Defendants have ‘unplugged’infringers in <strong>the</strong> past. By doing so, Plaintiff undermines its own c<strong>on</strong>tenti<strong>on</strong> that Defendants turna blind eye to <strong>the</strong> infringing activity occurring <strong>on</strong> <strong>the</strong>ir servers.” 1647(j)Live Face <strong>on</strong> Web v. Howard Stern Producti<strong>on</strong>sIn Live Face <strong>on</strong> Web, LLC v. Howard Stern Producti<strong>on</strong>s, Inc., 1648 <strong>the</strong> plaintiff allegedthat <strong>the</strong> defendant had infringed its copyright in proprietary software that allowed a company todisplay a “live” salespers<strong>on</strong> or spokespers<strong>on</strong> superimposed <strong>on</strong> <strong>the</strong> company’s web site. Theplaintiff’s allegati<strong>on</strong>s that <strong>the</strong> unauthorized presentati<strong>on</strong>s <strong>on</strong> <strong>the</strong> defendant’s web site weredesigned to and did draw and prol<strong>on</strong>g visitors’ attenti<strong>on</strong> to <strong>the</strong> web site and to o<strong>the</strong>r HowardStern media promoted <strong>on</strong> <strong>the</strong> web site, that <strong>the</strong> presentati<strong>on</strong>s increased <strong>the</strong> amount of time userswould spend <strong>on</strong> <strong>the</strong> web site, and that <strong>the</strong> presentati<strong>on</strong>s enhanced visitors’ <strong>on</strong>line experience,thus reinforcing and advancing <strong>the</strong> brand and image of <strong>the</strong> Howard Stern Show and <strong>the</strong>defendant’s products and services, were sufficient allegati<strong>on</strong>s of direct financial interest to avoida moti<strong>on</strong> to dismiss <strong>the</strong> plaintiff’s claim for vicarious liability. 1649(k) Arista Records v. Usenet.comIn Arista Records LLC. V. Usenet.com, Inc., 1650 <strong>the</strong> court applied both pr<strong>on</strong>gs of <strong>the</strong>vicarious liability doctrine in a ra<strong>the</strong>r broad fashi<strong>on</strong>, in a factual c<strong>on</strong>text that was admittedly ripefor imposing liability.. In that case, <strong>the</strong> defendants operated a Napster-like Usenet service thatadvertised to and targeted users who wanted to download music files. Unlike peer-to-peer filingsharing networks, <strong>the</strong> files were stored <strong>on</strong> “spool” news servers operated by <strong>the</strong> defendants. Thedefendants created designated servers for newsgroups c<strong>on</strong>taining music binary files to increase1645 Id. at 1113. The court’s rulings with respect to c<strong>on</strong>tributory infringement are set forth in Secti<strong>on</strong> III.C.2(j)above.1646 Id. at 1109-10.1647 Id. at 1110-11 (citati<strong>on</strong>s omitted).1648 2009 U.S. Dist. LEXIS 21373 (E.D. Pa. 2009).1649 Id. at *11-12.1650 633 F. Supp. 2d 124 (S.D.N.Y. 2009).- 359 -


<strong>the</strong>ir retenti<strong>on</strong> time over o<strong>the</strong>r types of Usenet files. 1651 The court granted <strong>the</strong> plaintiffs’ moti<strong>on</strong>for summary judgment <strong>on</strong> <strong>the</strong>ir claim for vicarious liability. Citing <strong>the</strong> Supreme Court’sGrokster decisi<strong>on</strong>, <strong>the</strong> court noted that <strong>on</strong>e may be vicariously liable if he has <strong>the</strong> right andability to supervise <strong>the</strong> infringing activity and also has a direct financial interest in suchactivities. The court found that <strong>the</strong> defendants earned a direct financial benefit from <strong>the</strong>infringement because <strong>the</strong>ir revenues increased depending <strong>on</strong> <strong>the</strong>ir users’ volume of downloads,<strong>the</strong> majority of which had been shown to be infringing. The court noted also that <strong>the</strong> infringingc<strong>on</strong>tent <strong>on</strong> <strong>the</strong> service acted as a draw for users to subscribe to <strong>the</strong> service. The court rejected<strong>the</strong> defendants’ argument that <strong>the</strong>y lacked direct financial benefit from infringement because<strong>the</strong>y were paid <strong>on</strong> a per-volume, not per-download, basis and because infringing musicaccounted for less than 1% of <strong>the</strong> newsgroups available <strong>on</strong> <strong>the</strong>ir service. The court noted thatunder <strong>the</strong> law, <strong>the</strong> draw of infringement need not be <strong>the</strong> primary, or even a significant, draw –ra<strong>the</strong>r it need <strong>on</strong>ly be “a” draw. 1652The court ruled that <strong>the</strong> defendants had also failed to exercise <strong>the</strong>ir right and ability tostop or limit infringement <strong>on</strong> <strong>the</strong>ir service. The defendants had in <strong>the</strong> past exercised <strong>the</strong>ir rightand ability to c<strong>on</strong>trol <strong>the</strong>ir subscribers’ acti<strong>on</strong>s by terminating or limiting access of subscriberswho posted spam, restricted download speeds for subscribers who downloaded adisproporti<strong>on</strong>ate volume of c<strong>on</strong>tent, and taken measures to restrict users from posting ordownloading files c<strong>on</strong>taining pornography. 1653 “Defendants likewise have <strong>the</strong> right and abilityto block access to articles stored <strong>on</strong> <strong>the</strong>ir own servers that c<strong>on</strong>tain infringing c<strong>on</strong>tent, but <strong>the</strong>record does not show any instance of Defendants exercising that right and ability to limitinfringement by its users. More generally, Defendants have <strong>the</strong> right and ability to c<strong>on</strong>trol whichnewsgroups to accept and maintain <strong>on</strong> <strong>the</strong>ir servers and which to reject, an ability <strong>the</strong>y chose toexercise when <strong>the</strong>y disabled access to approximately 900 music-related newsgroups in 2008.” 1654Accordingly, <strong>the</strong> court found <strong>the</strong> defendants vicariously liable. 1655(l)Corbis v. StarrIn Corbis Corp. v. Starr, 1656 <strong>the</strong> defendant Master, a janitorial maintenance company,hired defendant <strong>West</strong> Central, an <strong>Internet</strong> services company, to redesign and host its web site.The redesigned site c<strong>on</strong>tained four unauthorized images owned by <strong>the</strong> plaintiff Corbis. Corbissent a letter to Master notifying it of <strong>the</strong> infringing images, and Master resp<strong>on</strong>ded by directing<strong>West</strong> Central to remove <strong>the</strong> images, which <strong>West</strong> Central did. Corbis <strong>the</strong>n filed suit against <strong>the</strong>defendants for copyright infringement and moved for summary judgment. The court found <strong>West</strong>Central directly liable as a matter of law for copying <strong>the</strong> images <strong>on</strong>to Master’s web site. It alsofound Master vicariously liable as a matter of law. The c<strong>on</strong>trol pr<strong>on</strong>g of vicarious liability was1651 Id. at 130-31.1652 Id. at 156-57.1653 Id. at 157.1654 Id.1655 Id.1656 2009 U.S. Dist. LEXIS 79626 (N.D. Ohio Sept. 2, 2009).- 360 -


satisfied because Master had <strong>the</strong> power to approve changes that <strong>West</strong> Central made to itscorporate web site, including whe<strong>the</strong>r photos were used, and also had <strong>the</strong> ability to stop or limitinfringing uses. <strong>West</strong> Central received a financial benefit from <strong>the</strong> infringement because <strong>the</strong> useof <strong>the</strong> copyrighted images (three of which depicted janitorial and cleaning services) helped drawcustomers. 16574. Inducement Liability(a) The Supreme Court’s Grokster Decisi<strong>on</strong>For a detailed discussi<strong>on</strong> of <strong>the</strong> Supreme Court’s Grokster decisi<strong>on</strong>, which formallyintroduced inducement liability into <strong>the</strong> copyright law for <strong>the</strong> first time, see Secti<strong>on</strong> III.C.2(c)(5)above.(b) Arista Records v. Usenet.comIn Arista Records LLC. V. Usenet.com, Inc., 1658 <strong>the</strong> defendants operated a Napster-likeUsenet service that advertised to and targeted users who wanted to download music files. Unlikepeer-to-peer filing sharing networks, <strong>the</strong> files were stored <strong>on</strong> “spool” news servers operated by<strong>the</strong> defendants. The defendants created designated servers for newsgroups c<strong>on</strong>taining musicbinary files to increase <strong>the</strong>ir retenti<strong>on</strong> time over o<strong>the</strong>r types of Usenet files. 1659 The court,although noting several courts that had expressed doubt as to whe<strong>the</strong>r inducement ofinfringement states a separate claim for relief, or whe<strong>the</strong>r it is a species of c<strong>on</strong>tributoryinfringement, granted <strong>the</strong> plaintiffs’ moti<strong>on</strong> for summary judgment <strong>on</strong> <strong>the</strong>ir claim for inducementof infringement as a separate <strong>the</strong>ory. 1660The court found <strong>the</strong> facts in <strong>the</strong> instant case very similar, and equally compelling, tothose that led <strong>the</strong> Supreme Court to find inducement liability in Grokster. Specifically, astatistical survey based <strong>on</strong> random sampling c<strong>on</strong>cluded that over 94% of all c<strong>on</strong>tent files offeredin <strong>the</strong> defendants’ music-related binary newsgroups were infringing or highly likely to beinfringing. 1661 The defendants openly and affirmatively sought to attract former users of o<strong>the</strong>rnotorious file-sharing services such as Napster and Kazaa, and boasted that as those file sharingservices were scrutinized and shut down for copyright infringement, it would make <strong>the</strong> way forUsenet to “get back in <strong>the</strong> game.” 1662 The defendants also used meta-tags such as “warez” and“Kazaa” in <strong>the</strong> source code of <strong>the</strong>ir website to ensure that a search <strong>on</strong> a search engine for illegalc<strong>on</strong>tent would return <strong>the</strong>ir website as a result. The record was replete with evidence of <strong>the</strong>defendants’ own employees overtly acknowledging <strong>the</strong> infringing purpose for which <strong>the</strong>ir1657 Id. at *2 & *7-9.1658 633 F. Supp. 2d 124 (S.D.N.Y. 2009).1659 Id. at 130-31.1660 Id. at 150 n.17 & 154.1661 Id. at 151-52.1662 Id. at 152.- 361 -


service was used and advertising such uses <strong>on</strong> <strong>the</strong>ir web site. 1663 The defendants’ employeesspecifically provided technical assistance to users in obtaining copyrighted c<strong>on</strong>tent and providedweb site tutorials <strong>on</strong> how to download c<strong>on</strong>tent, using infringing works as examples. O<strong>the</strong>revidence showed that, although <strong>the</strong> defendants had in place various tools and mechanisms thatcould be used to block access to infringing articles or newsgroups, <strong>the</strong>y never used <strong>the</strong>m to limitcopyright infringement <strong>on</strong> <strong>the</strong>ir servers. Finally, <strong>the</strong> defendants’ graded subscripti<strong>on</strong> paymentplan caused users to pay more <strong>the</strong> more <strong>the</strong>y downloaded. Accordingly, <strong>the</strong> court c<strong>on</strong>cluded that<strong>the</strong> defendants’ intent to induce or foster infringement by its users <strong>on</strong> <strong>the</strong>ir services wasunmistakable. 1664(c) Columbia Pictures v. FungIn Columbia Pictures v. Fung, 1665 <strong>the</strong> defendants were operators of various sites thatfacilitated file sharing using <strong>the</strong> BitTorrent protocol. In a BitTorrent network, ra<strong>the</strong>r thandownloading c<strong>on</strong>tent files from an individual host, users of <strong>the</strong> network selected <strong>the</strong> c<strong>on</strong>tent file<strong>the</strong>y wished to download and <strong>the</strong>n downloaded it in pieces through an automated process from anumber of host computers (called a “swarm”) possessing <strong>the</strong> c<strong>on</strong>tent (or porti<strong>on</strong>s of it)simultaneously. Servers called “trackers” managed <strong>the</strong> download process from <strong>the</strong> multiplehosts. The defendants’ sites (known as “torrent sites”) maintained indexes of files called “dottorrentfiles” that c<strong>on</strong>tained informati<strong>on</strong> identifying <strong>the</strong> various hosts where pieces of <strong>the</strong> desiredc<strong>on</strong>tent were stored. Users could also upload dot-torrent files for use by o<strong>the</strong>rs to locate desiredc<strong>on</strong>tent. The dot-torrent files did not c<strong>on</strong>tain <strong>the</strong> actual c<strong>on</strong>tent users were searching for (such asa move), but ra<strong>the</strong>r c<strong>on</strong>tained <strong>the</strong> data used by <strong>the</strong> BitTorrent client software <strong>on</strong> <strong>the</strong> user’scomputer to retrieve <strong>the</strong> c<strong>on</strong>tent through a simultaneous peer-to-peer transfer from <strong>the</strong> multiplehosts of <strong>the</strong> c<strong>on</strong>tent. 1666The plaintiffs were <strong>the</strong> owners of copyrighted movies that could be searched for through<strong>the</strong> index of dot-torrent files <strong>on</strong> <strong>the</strong> defendants’ sites, <strong>the</strong>n downloaded by users using <strong>the</strong>BitTorrent client software <strong>on</strong> <strong>the</strong>ir computers. They sought to hold <strong>the</strong> defendants sec<strong>on</strong>darilyliable for <strong>the</strong> downloading of infringing copies of <strong>the</strong>ir copyrighted c<strong>on</strong>tent by users of <strong>the</strong>defendants’ sites. The court granted <strong>the</strong> plaintiffs summary judgment <strong>on</strong> <strong>the</strong> issue of liabilitybased <strong>on</strong> a <strong>the</strong>ory of inducement. 1667Because BitTorrent users could be scattered throughout <strong>the</strong> world, to establish liabilityfor inducement, <strong>the</strong> plaintiffs needed to establish that instances of direct infringement by1663 Id. For example, an employee commented that <strong>the</strong> tag line for <strong>the</strong> service should be “piracy, porno and pictures– Usenet,” and ano<strong>the</strong>r commented that “Usenet is full of Music and Movies so get your pirate <strong>on</strong>!” Id.1664 Id. at 153-54.1665 222009 U.S. Dist. LEXIS 122661 (C.D. Cal. Dec. 21, 2009).1666 Id. at *8-11. “The dot-torrent file c<strong>on</strong>tains ‘hash’ values that are used to identify <strong>the</strong> various pieces of <strong>the</strong>c<strong>on</strong>tent file and <strong>the</strong> locati<strong>on</strong> of those pieces in <strong>the</strong> network. The BitTorrent client applicati<strong>on</strong> <strong>the</strong>nsimultaneously downloads <strong>the</strong> pieces of <strong>the</strong> c<strong>on</strong>tent file from as many users as are available at <strong>the</strong> time of <strong>the</strong>request, and <strong>the</strong>n reassembles <strong>the</strong> c<strong>on</strong>tent file <strong>on</strong> <strong>the</strong> requesting computer when <strong>the</strong> download is complete.” Id.at *11-12.1667 Id. at *3.- 362 -


BitTorrent users had taken place in <strong>the</strong> United States. The court rejected <strong>the</strong> defendants’argument <strong>the</strong> plaintiffs were required to provide evidence that both <strong>the</strong> transferor and <strong>the</strong>transferee of infringing c<strong>on</strong>tent were located in <strong>the</strong> United States. 1668 “[T]he acts of uploadingand downloading are each independent grounds of copyright infringement liability. Uploading acopyrighted c<strong>on</strong>tent file to o<strong>the</strong>r users (regardless of where those users are located) violates <strong>the</strong>copyright holder’s § 106(3) distributi<strong>on</strong> right. Downloading a copyrighted c<strong>on</strong>tent file fromo<strong>the</strong>r users (regardless of where those users are located) violates <strong>the</strong> copyright holder’s § 106(1)reproducti<strong>on</strong> right. Plaintiffs need <strong>on</strong>ly show that United States users ei<strong>the</strong>r uploaded ordownloaded copyrighted works; Plaintiffs need not show that a particular file was both uploadedand downloaded entirely within <strong>the</strong> United States.” 1669 Plaintiffs had adequately providedsufficient evidence to establish acts of direct infringement in <strong>the</strong> United States through IPaddress data that located defendants’ users and showed that particular infringing downloads tookplace in <strong>the</strong> United States. 1670Turning to <strong>the</strong> facts of <strong>the</strong> case, <strong>the</strong> court granted <strong>the</strong> plaintiffs’ moti<strong>on</strong> for summaryjudgment <strong>on</strong> <strong>the</strong> issue of inducement liability based <strong>on</strong> <strong>the</strong> following acts by <strong>the</strong> defendants:– Defendants’ messages to users had stimulated o<strong>the</strong>rs to commit infringement: Thedefendants web site had a “Box Office Movies” feature that periodically posted a list of <strong>the</strong> top20 highest-grossing films <strong>the</strong>n playing in <strong>the</strong> United States, which linked to detailed web pagesc<strong>on</strong>cerning each film. Each of <strong>the</strong>se pages c<strong>on</strong>tained “upload torrent” links allowing users toupload dot-torrent files for <strong>the</strong> films. The defendants’ web sites presented available torrent files,<strong>the</strong> vast majority of which pointed to infringing c<strong>on</strong>tent, in browseable categories and providedfur<strong>the</strong>r informati<strong>on</strong> about <strong>the</strong> c<strong>on</strong>tent. The defendants also generated lists of <strong>the</strong> most popularfiles in categories like “Top 20 Movies.” The sites’ operator, Fung, made statements <strong>on</strong> <strong>the</strong> siteencourageing or assisting infringmenet, such as posting a message telling <strong>the</strong> site’s users that<strong>the</strong>y should try a particular software applicati<strong>on</strong> could be used to frustrate copyright enforcementagainst file sharers. He also provided a link to a torrent file for <strong>the</strong> recent film Lord of <strong>the</strong> Rings:Return of <strong>the</strong> King and stated, “if you are curious, download this.” Fung also created apromoti<strong>on</strong>al page inviting users to upload torrent files for Matrix Reloaded, ano<strong>the</strong>r recent film.Also “warez” metatags were embedded in <strong>the</strong> sites for reference by search engines. 1671– Defendants and <strong>the</strong>ir moderators gave assistance to users engaged in infringement:Fung had pers<strong>on</strong>ally posted messages in his site’s discussi<strong>on</strong> forum in which he providedtechnical assistance to users seeking copyrighted works. The sites were also full of statementsby moderators who assisted users seeking to download files or provided links to o<strong>the</strong>r sitesc<strong>on</strong>taining <strong>the</strong> requested infringing items. The court ruled that <strong>the</strong>se moderators, who wereunder <strong>the</strong> c<strong>on</strong>trol of <strong>the</strong> defendants and had been given authority to moderate <strong>the</strong> forums and1668 Id. at *28-29.1669 Id. at *29-30.1670 Id. at *32.1671 Id. at *39-43.- 363 -


user discussi<strong>on</strong>s, were agents of <strong>the</strong> defendants, and <strong>the</strong> defendants were <strong>the</strong>refore resp<strong>on</strong>siblefor <strong>the</strong>ir acts. 1672– Defendants implemented technical features promoting copyright infringement:Defendants’ sites allowed users to locate dot-torrent files for desired c<strong>on</strong>tent, <strong>the</strong> vast majority ofwhich was infringing. Fung implemented a spider program that located and obtained copies ofdot-torrent files from o<strong>the</strong>r sites, including well known infringing sites such as “The PirateBay.” 1673– Defendants’ business model depended <strong>on</strong> massive infringing use: The court found<strong>the</strong>re no factual dispute that <strong>the</strong> availability of copyrighted material was a major draw for usersof Fung’s web sites, and <strong>the</strong>re was no dispute that defendants derived revenue from <strong>the</strong> web siteand that this revenue increased al<strong>on</strong>g with <strong>the</strong> number of users. 1674The court rejected <strong>the</strong> defendants’ asserti<strong>on</strong>s of <strong>the</strong> safe harbors under Secti<strong>on</strong>s 512(a)and 512(d). The court ruled that, as a general propositi<strong>on</strong>, “inducement liability and <strong>the</strong> DigitalMillennium <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act safe harbors are inherently c<strong>on</strong>tradictory. Inducement liability isbased <strong>on</strong> active bad faith c<strong>on</strong>duct aimed at promoting infringement; <strong>the</strong> statutory safe harbors arebased <strong>on</strong> passive good faith c<strong>on</strong>duct aimed at operating a legitimate internet business. Here …Defendants are liable for inducement. There is no safe harbor for such c<strong>on</strong>duct.” 1675Five m<strong>on</strong>ths later, <strong>the</strong> court entered a permanent injuncti<strong>on</strong> against <strong>the</strong> defendants,enjoining <strong>the</strong>m from, am<strong>on</strong>g o<strong>the</strong>r things, knowingly hosting, indexing, linking to, or o<strong>the</strong>rwiseproviding access to any Dot-torrent or similar files that corresp<strong>on</strong>d, point to or lead to anycopyrighted works owned by <strong>the</strong> plaintiffs and for which <strong>the</strong> plaintiffs had provided <strong>the</strong> title to<strong>the</strong> defendants, <strong>on</strong> or through any web site, system or software using BitTorrent or any peer-topeeror o<strong>the</strong>r file-sharing or c<strong>on</strong>tent delivery technology. The defendants were also enjoinedfrom providing technical assistance or support services to users engaged in infringement;maintaining lists of “top” downloads that include <strong>the</strong> plaintiff’s copyrighted works; including inmetadata for any web pages, or maintaining browseable web site categories of Dot-torrent orsimilar files using, titles of <strong>the</strong> plaintiffs’ copyrighted works or terms widely known to beassociated with copyright infringement (such as “warez,” “Axxo,” “Jaybo,” “DVD Rips,” and<strong>the</strong> like); or soliciting or targeting a user base generally understood, in substantial part, to beengaging in infringement of or seeking to infringe <strong>the</strong> plaintiffs’ copyrighted works. 1676 Theinjuncti<strong>on</strong> also provided that, “In <strong>the</strong> event a commercial vendor or o<strong>the</strong>r third party becomesable to provide Defendants with a reliable list of Plaintiffs’ <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>ed Works, Plaintiffs mayapply to <strong>the</strong> Court for an order modifying this Permanent Injuncti<strong>on</strong> to relieve <strong>the</strong>m of <strong>the</strong>1672 Id. at *44-47.1673 Id. at *51.1674 Id. at *55.1675 Id. at *67-68.1676 Columbia Pictures Industries, Inc. v. Fung, CV 06-5578 SVW (JCx) (C.D. Cal. May 20, 2010), slip op. at pp.12-14.- 364 -


obligati<strong>on</strong> of providing Defendants with lists of titles, even if <strong>the</strong>re is a cost to Defendants ofsecuring <strong>the</strong> lists of titles from <strong>the</strong> commercial vendor or third party.” 16775. Limitati<strong>on</strong>s of Liability of Online Service Providers in <strong>the</strong> DMCAFrom late 1995 through May 1996, OSPs, telecommunicati<strong>on</strong>s carriers and o<strong>the</strong>rdistributors of <strong>on</strong>line informati<strong>on</strong>, c<strong>on</strong>tent providers and software companies negotiatedintensively to reach a c<strong>on</strong>sensus <strong>on</strong> proposed legislati<strong>on</strong> that would provide various statutorysafe harbors with respect to <strong>the</strong> liability of <strong>on</strong>line providers. 1678 The parties were unable to reachagreement for legislati<strong>on</strong> in <strong>the</strong> 103rd C<strong>on</strong>gress. The debate am<strong>on</strong>g <strong>the</strong> various industrysegments was ignited again in c<strong>on</strong>necti<strong>on</strong> with <strong>the</strong> WIPO copyright treaties in Geneva inDecember of 1996.(a) History of <strong>the</strong> Various Legislative EffortsA number of bills were <strong>the</strong>n introduced in C<strong>on</strong>gress that would limit <strong>the</strong> liability ofOSPs. The first to be introduced was by Rep. Coble <strong>on</strong> July 17, 1997 (H.R. 2180). This billwould have exempted OSPs from direct or vicarious copyright liability solely based <strong>on</strong> <strong>the</strong>transmissi<strong>on</strong> or providing of access to <strong>on</strong>line material, and eliminate any damage remedy forc<strong>on</strong>tributory liability, limiting plaintiffs to injunctive relief. The criteria for exempti<strong>on</strong> were that<strong>the</strong> OSP: (a) not initially place <strong>the</strong> material <strong>on</strong>line; (b) not generate, select, or alter <strong>the</strong> c<strong>on</strong>tentof <strong>the</strong> material; (c) not determine <strong>the</strong> recipients of <strong>the</strong> material; (d) not receive a financial benefitdirectly attributable to a particular act of infringement; (e) not sp<strong>on</strong>sor, endorse, or advertise <strong>the</strong>material; and (f) ei<strong>the</strong>r not know or be aware by notice or o<strong>the</strong>r informati<strong>on</strong> indicating that <strong>the</strong>material is infringing, or be prohibited by law from accessing <strong>the</strong> material.The sec<strong>on</strong>d bill to be introduced was S. 1146, which, in additi<strong>on</strong> to <strong>the</strong> WIPO treatyimplementati<strong>on</strong> provisi<strong>on</strong>s discussed above, also c<strong>on</strong>tained provisi<strong>on</strong>s limiting liability of OSPs.S. 1146 adopted a different approach to OSP liability than H.R. 2180. It c<strong>on</strong>tained three majorprovisi<strong>on</strong>s. First, it provided blanket exempti<strong>on</strong>s from direct, vicarious or c<strong>on</strong>tributory liabilityfor OSPs based <strong>on</strong> <strong>the</strong> mere provisi<strong>on</strong> of defined electr<strong>on</strong>ic communicati<strong>on</strong>s network services orfacilities, or <strong>on</strong> <strong>the</strong> transmissi<strong>on</strong> of private electr<strong>on</strong>ic communicati<strong>on</strong>s, including voicemessaging or electr<strong>on</strong>ic mail services or real-time communicati<strong>on</strong> formats, including chat rooms,streamed data, or o<strong>the</strong>r virtually simultaneous transmissi<strong>on</strong>s. Sec<strong>on</strong>d, it provided exempti<strong>on</strong>sfrom direct, vicarious or c<strong>on</strong>tributory liability for <strong>the</strong> provisi<strong>on</strong> of <strong>the</strong> following informati<strong>on</strong>locati<strong>on</strong> tools: a site-linking aid or directly, including a hyperlink or index; a navigati<strong>on</strong>al aid,including a search engine or browser; and <strong>the</strong> tools for <strong>the</strong> creati<strong>on</strong> of a site-linking aid. Third, itprovided immunity from direct, vicarious or c<strong>on</strong>tributory liability to OSPs for stored third partyc<strong>on</strong>tent, unless up<strong>on</strong> receiving notice of infringing material that complied with certain definedstandards, <strong>the</strong> OSP failed expeditiously to remove, disable, or block access to <strong>the</strong> material to <strong>the</strong>extent technologically feasible and ec<strong>on</strong>omically reas<strong>on</strong>able for <strong>the</strong> lesser of a period of ten daysor receipt of a court order c<strong>on</strong>cerning <strong>the</strong> material.1677 Id. at p. 16.1678 A summary of <strong>the</strong> issues and proposed legislative provisi<strong>on</strong>s may be found in K. Stuckey, <strong>Internet</strong> and OnlineLaw § 6.10[5], at 6-96 to 6-98 (2008).- 365 -


Hearings were held in Sept. of 1997 <strong>on</strong> both H.R. 2180 and S. 1146. These hearingsrevealed lingering c<strong>on</strong>flict between service providers and copyright owners <strong>on</strong> liability issues.Rep. Goodlatte led c<strong>on</strong>tinuing negotiati<strong>on</strong>s between <strong>the</strong> c<strong>on</strong>tent providers and OSPs, and tofur<strong>the</strong>r a comprise, he and Rep. Coble introduced <strong>on</strong> Feb. 12, 1998 a substitute for H.R. 2180,entitled <strong>the</strong> “On-Line <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Infringement Liability Limitati<strong>on</strong> Act” (H.R. 3209).On April 1, 1998, <strong>the</strong> House Judiciary Committee approved <strong>the</strong> substance of H.R. 3209,but folded it into <strong>the</strong> pending WIPO implementati<strong>on</strong> legislati<strong>on</strong>, H.R. 2281. Subsequently, based<strong>on</strong> c<strong>on</strong>tinuing negotiati<strong>on</strong>s, an agreement was finally reached between service providers andcopyright owners with respect to <strong>the</strong> proper scope of liability for <strong>on</strong>line infringements ofcopyright. H.R. 2281 was <strong>the</strong>n amended to include this compromise agreement.Meanwhile, similar acti<strong>on</strong>s were taking place in <strong>the</strong> Senate. The provisi<strong>on</strong>s of S. 1121,implementing <strong>the</strong> WIPO treaty, were combined with a new title embodying <strong>the</strong> compromiseagreement between service providers and copyright owners with respect to liability. 1679 Thecombined Senate bill was denominated S. 2037, and was unanimously approved by <strong>the</strong> SenateJudiciary Committee in April of 1998 and adopted by <strong>the</strong> full Senate in May of 1998.Both H.R. 2281 and S. 2037 c<strong>on</strong>tained <strong>the</strong> same substantive provisi<strong>on</strong>s with respect toOSP liability, which were ultimately adopted in <strong>the</strong> DMCA.(b) The OSP Liability Provisi<strong>on</strong>s of <strong>the</strong> DMCAThe liability provisi<strong>on</strong>s are c<strong>on</strong>tained in Title II of <strong>the</strong> DMCA. Title II seeks to clearlydefine <strong>the</strong> c<strong>on</strong>diti<strong>on</strong>s under which an OSP’s liability for infringements that occur <strong>on</strong> <strong>the</strong> OSP’ssystems or networks will be limited. Specifically, Title II defines four safe harbors that arecodified in a new Secti<strong>on</strong> 512 of Title 17. If <strong>the</strong> OSP falls within <strong>the</strong>se safe harbors, <strong>the</strong> OSP isexempt from m<strong>on</strong>etary damages and is subject <strong>on</strong>ly to carefully prescribed injunctive remedies.As <strong>the</strong> legislative history states, “New Secti<strong>on</strong> 512’s limitati<strong>on</strong>s <strong>on</strong> liability are based <strong>on</strong>functi<strong>on</strong>s, and each limitati<strong>on</strong> is intended to describe a separate and distinct functi<strong>on</strong>. … [T]hedeterminati<strong>on</strong> of whe<strong>the</strong>r a service provider qualifies for <strong>on</strong>e liability limitati<strong>on</strong> has no effect <strong>on</strong><strong>the</strong> determinati<strong>on</strong> of whe<strong>the</strong>r it qualifies for a separate and distinct liability limitati<strong>on</strong> underano<strong>the</strong>r new subsecti<strong>on</strong> of new Secti<strong>on</strong> 512.” 1680 This principle was codified in Secti<strong>on</strong> 512(n)of <strong>the</strong> DMCA, which provides: “Subsecti<strong>on</strong>s (a), (b), (c), and (d) describe separate and distinctfuncti<strong>on</strong>s for purposes of applying this secti<strong>on</strong>. Whe<strong>the</strong>r a service provider qualifies for <strong>the</strong>limitati<strong>on</strong> <strong>on</strong> liability in any <strong>on</strong>e of those subsecti<strong>on</strong>s shall be based solely <strong>on</strong> <strong>the</strong> criteria in thatsubsecti<strong>on</strong>, and shall not affect a determinati<strong>on</strong> of whe<strong>the</strong>r that service provider qualifies for <strong>the</strong>limitati<strong>on</strong>s <strong>on</strong> liability under any o<strong>the</strong>r such subsecti<strong>on</strong>.” 16811679 Sen. Patrick Leahy and Sen. John Ashcroft drafted <strong>the</strong> compromise agreement for incorporati<strong>on</strong> into pendinglegislati<strong>on</strong>.1680 H.R. Rep. No. 105-551 Part 2, at 65 (1998).1681 17 U.S.C. § 512(n).- 366 -


(1) Safe Harbors – Definiti<strong>on</strong> of a “Service Provider”The four safe harbors are described below and are applicable to a “Service Provider.”Under Secti<strong>on</strong> 512(k), for purposes of <strong>the</strong> first safe harbor, a “Service Provider” is defined as “anentity offering <strong>the</strong> transmissi<strong>on</strong>, routing or providing of c<strong>on</strong>necti<strong>on</strong>s for digital <strong>on</strong>linecommunicati<strong>on</strong>s, between or am<strong>on</strong>g points specified by a user, of material of <strong>the</strong> user’schoosing, without modificati<strong>on</strong> to <strong>the</strong> c<strong>on</strong>tent of <strong>the</strong> material as sent or received.” For purposesof <strong>the</strong> o<strong>the</strong>r three safe harbors, a “Service Provider” is defined more broadly to be “a provider of<strong>on</strong>line services or network access, or <strong>the</strong> operator of facilities <strong>the</strong>refor.” The latter definiti<strong>on</strong>would seem to cover a broad array of OSPs, BBS operators, system operators, search engines,portals, and <strong>the</strong> like. It is also probably broad enough to cover <strong>the</strong> owners and operators ofcorporate intranets, university networks and interactive websites. 1682In Marvel Enterprises, Inc. v. NCSoft Corp., 1683 <strong>the</strong> court dismissed <strong>the</strong> plaintiffs’ claimin <strong>the</strong>ir complaint for declaratory judgment that <strong>the</strong> defendants did not qualify as a “serviceprovider” under <strong>the</strong> DMCA safe harbors and thus would not be protected from liability<strong>the</strong>reunder. The court noted <strong>the</strong> rule that a plaintiff may not seek declaratory relief as anadvance ruling <strong>on</strong> a potential affirmative defense. From <strong>the</strong>ir allegati<strong>on</strong>s, it was clear that <strong>the</strong>plaintiffs were seeking a determinati<strong>on</strong> of <strong>the</strong> defendants’ ability to use <strong>the</strong> DMCA as a defense.Because <strong>the</strong> issues <strong>on</strong> which <strong>the</strong> plaintiffs sought declaratory judgment related <strong>on</strong>ly to <strong>the</strong>defendants’ liability for <strong>the</strong> remainder of <strong>the</strong> plaintiffs’ claims, <strong>the</strong> declaratory judgment wouldnot independently resolve <strong>the</strong> c<strong>on</strong>troversy between <strong>the</strong> parties, but ra<strong>the</strong>r would merelydetermine a collateral legal issue governing certain aspects of <strong>the</strong> dispute. The court c<strong>on</strong>cludedthat <strong>the</strong> plaintiffs were <strong>the</strong>refore inappropriately seeking an advance ruling <strong>on</strong> a potentialaffirmative defense. 1684 (i) Acting as a Mere C<strong>on</strong>duit for Infringing Informati<strong>on</strong>– Secti<strong>on</strong> 512(a)The first safe harbor is essentially a codificati<strong>on</strong> of <strong>the</strong> Netcom case and a rejecti<strong>on</strong> of <strong>the</strong>Frena case, at least to <strong>the</strong> extent that <strong>the</strong> Frena case suggested that passive, automatic actsengaged in through a technological process initiated by ano<strong>the</strong>r through <strong>the</strong> facilities of an OSPcould c<strong>on</strong>stitute direct infringement <strong>on</strong> <strong>the</strong> part of <strong>the</strong> OSP. 16851682 Ian C. Ball<strong>on</strong> & Keith M. Kupferschmid, “Third Party Liability under <strong>the</strong> Digital Millennium <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act:New Liability Limitati<strong>on</strong>s and More Litigati<strong>on</strong>s for ISPs,” Cyberspace Lawyer, Oct. 1998, at 3, 4. Thelegislative history states that <strong>the</strong> definiti<strong>on</strong> “includes universities and schools to <strong>the</strong> extent <strong>the</strong>y perform <strong>the</strong>functi<strong>on</strong>s identified in” <strong>the</strong> definiti<strong>on</strong>. H.R. Rep. No. 105-551 Part 2, at 64 (1998).1683 2005 U.S. Dist. LEXIS 8448 (C.D. Cal. Mar. 9, 2005).1684 Id. at *18-19.1685 H.R. Rep. No. 105-551 Part 1, at 11 (1998); ALS Scan, Inc. v. RemarQ Communities, Inc., 239 F.3d 619, 622(4 th Cir. 2001). “Subsecti<strong>on</strong>s (a)(1) through (5) limit <strong>the</strong> range of activities that qualify under this subsecti<strong>on</strong> to<strong>on</strong>es in which a service provider plays <strong>the</strong> role of a ‘c<strong>on</strong>duit’ for <strong>the</strong> communicati<strong>on</strong>s of o<strong>the</strong>rs.” H.R. Rep. No.105-551 Part 2, at 51 (1998).- 367 -


Specifically, under Secti<strong>on</strong> 512(a), a Service Provider is not liable for m<strong>on</strong>etary relief,and is subject <strong>on</strong>ly to limited injunctive relief, for “transmitting, routing, or providingc<strong>on</strong>necti<strong>on</strong>s for, material through a system or network c<strong>on</strong>trolled or operated by or for <strong>the</strong>service provider, or by reas<strong>on</strong> of <strong>the</strong> intermediate and transient storage of that material in <strong>the</strong>course of such transmitting, routing, or providing c<strong>on</strong>necti<strong>on</strong>s, if:(1) <strong>the</strong> transmissi<strong>on</strong> of <strong>the</strong> material was initiated by or at <strong>the</strong> directi<strong>on</strong> of a pers<strong>on</strong> o<strong>the</strong>rthan <strong>the</strong> service provider;(2) <strong>the</strong> transmissi<strong>on</strong>, routing, provisi<strong>on</strong> of c<strong>on</strong>necti<strong>on</strong>s, or storage is carried out throughan automatic technical process without selecti<strong>on</strong> of <strong>the</strong> material by <strong>the</strong> service provider;(3) <strong>the</strong> service provider does not select <strong>the</strong> recipients of <strong>the</strong> material except as anautomatic resp<strong>on</strong>se to <strong>the</strong> request of ano<strong>the</strong>r pers<strong>on</strong>;(4) no copy of <strong>the</strong> material made by <strong>the</strong> service provider in <strong>the</strong> course of suchintermediate or transient storage is maintained <strong>on</strong> <strong>the</strong> system or network in a manner ordinarilyaccessible to any<strong>on</strong>e o<strong>the</strong>r than anticipated recipients, and no such copy is maintained <strong>on</strong> <strong>the</strong>system or network in a manner ordinarily accessible to such anticipated recipients for a l<strong>on</strong>gerperiod than is reas<strong>on</strong>ably necessary for <strong>the</strong> transmissi<strong>on</strong>, routing, or provisi<strong>on</strong> of c<strong>on</strong>necti<strong>on</strong>s;and(5) <strong>the</strong> material is transmitted through <strong>the</strong> system or network without modificati<strong>on</strong> of itsc<strong>on</strong>tent.”This safe harbor will not be available to a Service Provider that initiates, selects, ormodifies <strong>the</strong> c<strong>on</strong>tent of a transmissi<strong>on</strong>, or stores it <strong>on</strong> a system in a way that its c<strong>on</strong>tent becomesgenerally accessible to third parties.The safe harbor of Secti<strong>on</strong> 512(a) has been tested in <strong>the</strong> following cases to date:a. The Napster Case. In <strong>the</strong> Napster case, discussedextensively in Secti<strong>on</strong> III.C.2.(c)(1) above, Napster moved for summary judgment that it wasimmune from <strong>the</strong> plaintiffs’ claims by virtue of <strong>the</strong> Secti<strong>on</strong> 512(a) safe harbor. Napster arguedthat it fell within <strong>the</strong> subject matter of <strong>the</strong> safe harbor because its “core functi<strong>on</strong>” was to offer <strong>the</strong>“transmissi<strong>on</strong>, routing, or providing of c<strong>on</strong>necti<strong>on</strong>s for digital <strong>on</strong>line communicati<strong>on</strong>s” byenabling <strong>the</strong> c<strong>on</strong>necti<strong>on</strong> of users’ hard-drives and <strong>the</strong> transmissi<strong>on</strong> of MP3 files “directly from<strong>the</strong> Host hard drive and Napster browser through <strong>the</strong> <strong>Internet</strong> to <strong>the</strong> user’s Napster browser andhard drive.” 1686 Napster argued that it satisfied <strong>the</strong> preceding five specific c<strong>on</strong>diti<strong>on</strong>s for <strong>the</strong> safeharbor because “(1) a Napster user, and never Napster itself, initiates <strong>the</strong> transmissi<strong>on</strong> of MP3files; (2) <strong>the</strong> transmissi<strong>on</strong> occurs through an automatic, technical process without any editorialinput from Napster; (3) Napster does not choose <strong>the</strong> recipients of <strong>the</strong> MP3 files; (4) Napster does1686 A&M Records Inc. v. Napster, Inc., 54 U.S.P.Q.2d 1746, 1749 (N.D. Cal. 2000).- 368 -


not make a copy of <strong>the</strong> material during transmissi<strong>on</strong>; and (5) <strong>the</strong> c<strong>on</strong>tent of <strong>the</strong> material is notmodified during transmissi<strong>on</strong>.” 1687The court rejected <strong>the</strong> applicability of <strong>the</strong> Secti<strong>on</strong> 512(a) safe harbor to Napster forseveral reas<strong>on</strong>s. First, <strong>the</strong> court held that <strong>the</strong> safe harbor could not provide a complete defense toNapster’s entire system because <strong>the</strong> system performed more than just <strong>the</strong> functi<strong>on</strong>s oftransmissi<strong>on</strong>, routing, and providing of c<strong>on</strong>necti<strong>on</strong>s. Specifically, <strong>the</strong> court noted that Secti<strong>on</strong>512(n) of <strong>the</strong> DMCA provides that <strong>the</strong> four safe harbors “describe separate and distinct functi<strong>on</strong>sfor purposes of applying this secti<strong>on</strong>. Whe<strong>the</strong>r a service provider qualifies for <strong>the</strong> limitati<strong>on</strong> <strong>on</strong>liability in any <strong>on</strong>e of those subsecti<strong>on</strong>s shall be based solely <strong>on</strong> <strong>the</strong> criteria in that subsecti<strong>on</strong>and shall not affect a determinati<strong>on</strong> of whe<strong>the</strong>r that service provider qualifies for <strong>the</strong> limitati<strong>on</strong>s<strong>on</strong> liability under any o<strong>the</strong>r such subsecti<strong>on</strong>s.” 1688 The court ruled that <strong>the</strong> Napster system,through its index of user files and its “hot list” feature that each functi<strong>on</strong>ed as an “informati<strong>on</strong>locati<strong>on</strong> tool,” undisputedly performed some informati<strong>on</strong> locati<strong>on</strong> functi<strong>on</strong>s which, if thosefuncti<strong>on</strong>s were to be immunized, must satisfy <strong>the</strong> separate provisi<strong>on</strong>s of <strong>the</strong> safe harbor set forthin Secti<strong>on</strong> 512(d) (discussed in subsecti<strong>on</strong> (iv) below). 1689Napster argued that, even if its system functi<strong>on</strong>ed in part as an informati<strong>on</strong> locati<strong>on</strong> tool,that functi<strong>on</strong> should be c<strong>on</strong>sidered incidental to <strong>the</strong> system’s core functi<strong>on</strong> of transmitting MP3music files, and <strong>the</strong> safe harbor of Secti<strong>on</strong> 512(a) should <strong>the</strong>refore provide a complete defense toits system. The court rejected this argument, holding that because <strong>the</strong> parties disputed materialissues regarding <strong>the</strong> operati<strong>on</strong> of Napster’s index, directory and search engine, <strong>the</strong> court couldnot hold for purposes of summary judgment that <strong>the</strong> informati<strong>on</strong> locati<strong>on</strong> tool aspects of <strong>the</strong>Napster system were peripheral to <strong>the</strong> alleged infringement, or that <strong>the</strong>y should not be analyzedseparately under Secti<strong>on</strong> 512(d). 1690The court <strong>the</strong>n rejected <strong>the</strong> applicability of Secti<strong>on</strong> 512(a) to Napster for two principalreas<strong>on</strong>s. First, <strong>the</strong> court noted that <strong>the</strong> preamble of Secti<strong>on</strong> 512(a) makes <strong>the</strong> safe harborapplicable <strong>on</strong>ly to service providers “transmitting, routing or providing c<strong>on</strong>necti<strong>on</strong>s for, materialthrough a system or network c<strong>on</strong>trolled or operated by or for <strong>the</strong> service provider” (emphasisadded). The court found it undisputed that MP3 files do not pass “through” Napster’s servers,but ra<strong>the</strong>r “through” <strong>the</strong> <strong>Internet</strong>, and ruled that <strong>the</strong> <strong>Internet</strong> could not be c<strong>on</strong>sidered “a system ornetwork c<strong>on</strong>trolled or operated by or for <strong>the</strong> service provider.” 1691 The court rejected Napster’sargument that its system should be deemed to include <strong>the</strong> Napster browser <strong>on</strong> its users’computers and that <strong>the</strong> MP3 files were transmitted “through” that browser: “[E]ven if eachuser’s Napster browser is part of <strong>the</strong> system, <strong>the</strong> transmissi<strong>on</strong> goes from <strong>on</strong>e part of <strong>the</strong> system to1687 Id.1688 17 U.S.C. § 512(n).1689 Napster, 54 U.S.P.Q.2d at 1750.1690 Id. at 1750.1691 Id. at 1751.- 369 -


ano<strong>the</strong>r, or between parts of <strong>the</strong> system, but not ‘through’ <strong>the</strong> system. The court finds thatsubsecti<strong>on</strong> 512(a) does not protect <strong>the</strong> transmissi<strong>on</strong> of MP3 files.” 1692Sec<strong>on</strong>d, <strong>the</strong> court called into questi<strong>on</strong> whe<strong>the</strong>r Napster had complied with <strong>the</strong> prefatoryc<strong>on</strong>diti<strong>on</strong>s of Secti<strong>on</strong> 512(i) of <strong>the</strong> DMCA (discussed fur<strong>the</strong>r in subsecti<strong>on</strong> (2) below), whichimposes additi<strong>on</strong>al requirements <strong>on</strong> eligibility for any DMCA safe harbor. Secti<strong>on</strong> 512(i)requires that <strong>the</strong> Service Provider adopt and reas<strong>on</strong>ably implement, and inform subscribers andaccount holders of <strong>the</strong> Service Provider’s system or network of, a policy that provides for <strong>the</strong>terminati<strong>on</strong> in appropriate circumstances of subscribers and account holders of <strong>the</strong> ServiceProvider’s system or network who are repeat infringers.The court found questi<strong>on</strong>s about Napster’s compliance with Secti<strong>on</strong> 512(i) <strong>on</strong> twogrounds. The first ground was that, although Napster claimed to have had an oral policy from<strong>the</strong> earliest days of its existence, Napster had not adopted a written policy for terminati<strong>on</strong> ofrepeat infringers until after <strong>the</strong> litigati<strong>on</strong> was filed. The court noted that, even were <strong>the</strong> writtenpolicy ultimately adopted an adequate <strong>on</strong>e, <strong>the</strong> late adopti<strong>on</strong> of a formal written policy would notnecessarily moot <strong>the</strong> plaintiffs’ claims to m<strong>on</strong>etary relief for past harms. 1693 The sec<strong>on</strong>d groundwas that <strong>the</strong> court believed Napster had not established that it reas<strong>on</strong>ably implemented a policyfor terminating repeat infringers. Specifically, <strong>the</strong> court noted that Napster blocked users aboutwhom it received notices of infringement by blocking that user’s password, but not <strong>the</strong> <strong>Internet</strong>Protocol (IP) address of <strong>the</strong> user. (The parties sharply disputed whe<strong>the</strong>r it would be feasible oreffective to block IP addresses.) The court fur<strong>the</strong>r noted <strong>the</strong> plaintiffs’ argument that, becauseNapster did not maintain <strong>the</strong> actual identity of its users (<strong>the</strong>ir real names and physical addresses),blocked users could readily reapply for a new account <strong>on</strong> <strong>the</strong> Napster system and c<strong>on</strong>tinue <strong>the</strong>irinfringing activity. The court <strong>the</strong>refore c<strong>on</strong>cluded that <strong>the</strong> plaintiffs had raised genuine issues ofmaterial fact about whe<strong>the</strong>r Napster had reas<strong>on</strong>ably implemented a policy of terminating repeatinfringers, and <strong>the</strong>refore denied Napster’s moti<strong>on</strong> for summary judgment based <strong>on</strong> a Secti<strong>on</strong>512(a) defense. 1694 b. Ellis<strong>on</strong> v. Roberts<strong>on</strong>. In Ellis<strong>on</strong> v. Roberts<strong>on</strong>, 1695 anindividual named Roberts<strong>on</strong> scanned several ficti<strong>on</strong>al works written by <strong>the</strong> plaintiff and posted<strong>the</strong>m <strong>on</strong>to <strong>the</strong> Usenet group “alt.binaries.e-book,” a group that was used primarily to exchangepirated and unauthorized digital copies of text material, principally works of ficti<strong>on</strong> by famousauthors. AOL, acting as a Usenet peer, hosted <strong>the</strong> infringing materials <strong>on</strong> its Usenet server for aperiod of fourteen days. The plaintiff sought to hold AOL liable for direct, vicarious and1692 Id. (emphasis in original). The court similarly found that <strong>the</strong> Napster system did not provide c<strong>on</strong>necti<strong>on</strong>s“through” its system. “Although <strong>the</strong> Napster server c<strong>on</strong>veys address informati<strong>on</strong> to establish a c<strong>on</strong>necti<strong>on</strong>between <strong>the</strong> requesting and host users, <strong>the</strong> c<strong>on</strong>necti<strong>on</strong> itself occurs through <strong>the</strong> <strong>Internet</strong>. … Drawing inferencesin <strong>the</strong> light most favorable to <strong>the</strong> n<strong>on</strong>-moving party, this court cannot say that Napster serves as a c<strong>on</strong>duit for<strong>the</strong> c<strong>on</strong>necti<strong>on</strong> itself, as opposed to <strong>the</strong> address informati<strong>on</strong> that makes <strong>the</strong> c<strong>on</strong>necti<strong>on</strong> possible. Napsterenables or facilitates <strong>the</strong> initiati<strong>on</strong> of c<strong>on</strong>necti<strong>on</strong>s, but <strong>the</strong>se c<strong>on</strong>necti<strong>on</strong>s do not pass through <strong>the</strong> system within<strong>the</strong> meaning of subsecti<strong>on</strong> 512(a).” Id. at 1752.1693 Id. at 1753.1694 Id.1695 189 F. Supp. 2d 1059 (C.D. Cal. 2002).- 370 -


c<strong>on</strong>tributory copyright infringement. 1696 AOL asserted that <strong>the</strong> plaintiff could not establish <strong>the</strong>elements for comm<strong>on</strong> law liability and that it was immune under <strong>the</strong> Secti<strong>on</strong> 512(a) and Secti<strong>on</strong>512(c) safe harbors of <strong>the</strong> DMCA. The district court, relying <strong>on</strong> <strong>the</strong> Netcom case, ruled thatAOL could not be liable for direct copyright infringement merely based <strong>on</strong> its passive role as aprovider of Usenet services. 1697 The court’s rulings with respect to c<strong>on</strong>tributory infringement arediscussed in Secti<strong>on</strong> III.C.2(e) above.With respect to vicarious liability, <strong>the</strong> plaintiff argued that, under <strong>the</strong> Ninth Circuit’sNapster I decisi<strong>on</strong>, AOL’s ability to block infringers’ access to its Usenet servers was sufficientto establish <strong>the</strong> right and ability to c<strong>on</strong>trol infringing activity. The court rejected this argument,noting <strong>the</strong> same Catch 22 under <strong>the</strong> Secti<strong>on</strong> 512(c) safe harbor this would set up that <strong>the</strong> courtnoted in <strong>the</strong> Hendricks<strong>on</strong> v. eBay case: Because an OSP is required under Secti<strong>on</strong> 512(c)(1)(C)to delete or block access to infringing material, if this ability to delete or block were sufficient toestablish <strong>the</strong> “right and ability to c<strong>on</strong>trol” infringing activity, <strong>the</strong> OSP would <strong>the</strong>reby bedisqualified from <strong>the</strong> safe harbor under Secti<strong>on</strong> 512(c)(1)(B), at least if it received a financialbenefit directly attributable to <strong>the</strong> infringing activity. 1698 “The Court does not accept thatC<strong>on</strong>gress would express [an intenti<strong>on</strong> that ISPs which receive a financial benefit directlyattributable to <strong>the</strong> infringing activity could not qualify for <strong>the</strong> Secti<strong>on</strong> 512(c) safe harbor underany circumstance] by creating a c<strong>on</strong>fusing, self-c<strong>on</strong>tradictory catch-22 situati<strong>on</strong> that pits512(c)(1)(B) and 512(c)(1)(C) directly at odds with <strong>on</strong>e ano<strong>the</strong>r, particularly when <strong>the</strong>re is amuch simpler explanati<strong>on</strong>: <strong>the</strong> DMCA requires more than <strong>the</strong> mere ability to delete and blockaccess to infringing material after that material has been posted in order for <strong>the</strong> ISP to be said tohave ‘<strong>the</strong> right and ability to c<strong>on</strong>trol such activity.’” 1699The court fur<strong>the</strong>r found that AOL’s right and ability to c<strong>on</strong>trol <strong>the</strong> infringing behaviorwas substantially less than that enjoyed by <strong>the</strong> OSP in <strong>the</strong> Netcom case, where <strong>the</strong> OSP was <strong>on</strong>eof two entities resp<strong>on</strong>sible for providing <strong>the</strong> direct infringer with access to <strong>the</strong> <strong>Internet</strong>. As aresult, by taking affirmative steps against <strong>the</strong> o<strong>the</strong>r entity, <strong>the</strong> OSP had <strong>the</strong> ability to target <strong>the</strong>infringer himself and deny him access to <strong>the</strong> <strong>Internet</strong>. By c<strong>on</strong>trast, AOL had no such ability togo after <strong>the</strong> individual who had posted <strong>the</strong> infringing copies of <strong>the</strong> plaintiff’s works <strong>on</strong>to Usenet.The court <strong>the</strong>refore c<strong>on</strong>cluded that AOL’s ability to delete or block access to <strong>the</strong> infringingpostings after <strong>the</strong>y had found <strong>the</strong>ir way <strong>on</strong>to AOL’s Usenet servers was insufficient to c<strong>on</strong>stitute<strong>the</strong> right and ability to c<strong>on</strong>trol <strong>the</strong> infringing activity for purposes of comm<strong>on</strong> law vicariousliability. 1700With respect to <strong>the</strong> financial benefit pr<strong>on</strong>g of vicarious liability, <strong>the</strong> district court heldthat AOL received no direct financial benefit from <strong>the</strong> infringing activity. The court ruled that<strong>the</strong> direct financial benefit pr<strong>on</strong>g requires a showing that a “substantial” proporti<strong>on</strong> of a1696 Id. at 1053-54.1697 Id. at 1056.1698 Id. at 1060-61.1699 Id. at 1061.1700 Id. at 1061-62.- 371 -


defendant’s income be directly linked to infringing activity. 1701 AOL did not receive anyfinancial compensati<strong>on</strong> from its peering agreements and participati<strong>on</strong> in Usenet, and <strong>the</strong>availability of Usenet did not act as a “draw” for customers under <strong>the</strong> Napster I case. Inparticular, <strong>the</strong> court noted that any “draw” to a particular newsgroup, such as alt.binaries.e-book,was miniscule, as <strong>the</strong> pro rata “draw” of a single newsgroup was <strong>on</strong>ly about 0.00000596% ofAOL’s total usage (<strong>the</strong>re were 43,000 total newsgroups available through AOL). Usenet usagec<strong>on</strong>stituted a very small percentage of total AOL usage, and <strong>the</strong> plaintiff had not produced anyevidence that a significant porti<strong>on</strong> of even that minimal usage entailed <strong>the</strong> illegal exchange ofcopyrighted material. 1702 Accordingly, <strong>the</strong> court granted summary judgment to AOL <strong>on</strong> <strong>the</strong>plaintiff’s claim for vicarious liability. 1703On appeal, <strong>the</strong> Ninth Circuit affirmed <strong>the</strong> finding of no vicarious liability, although <strong>the</strong>Ninth Circuit disagreed with <strong>the</strong> district court’s ruling that to establish a direct financial benefit,<strong>the</strong> plaintiff must show that a “substantial” proporti<strong>on</strong> of a defendant’s income be directly linkedto infringing activity. The Ninth Circuit stated that it is sufficient if infringing activity is a“draw” for customers, and <strong>the</strong>re is no requirement that such draw be “substantial.” 1704 “Theessential aspect of <strong>the</strong> ‘direct financial benefit’ inquiry is whe<strong>the</strong>r <strong>the</strong>re is a causal relati<strong>on</strong>shipbetween <strong>the</strong> infringing activity and any financial benefit a defendant reaps, regardless of howsubstantial <strong>the</strong> benefit is in proporti<strong>on</strong> to a defendant’s overall profits.” 1705The Ninth Circuit ruled that <strong>the</strong> plaintiff had not submitted sufficient evidence to raise atriable issue of fact under <strong>the</strong> direct financial benefit pr<strong>on</strong>g, and in <strong>the</strong> course of its discussi<strong>on</strong>,fleshed out what sort of evidence would be required to show that infringing activity <strong>on</strong> aparticular site c<strong>on</strong>stitutes a “draw” to that site:We recognize, of course, that <strong>the</strong>re is usually substantial overlap between aspectsof goods or services that customers value and aspects of goods or services thatultimately draw <strong>the</strong> customers. There are, however, cases in which customersvalue a service that does not “act as a draw.” Accordingly, C<strong>on</strong>gress cauti<strong>on</strong>scourts that “receiving a <strong>on</strong>e-time set-up fee and flat periodic payments for service… [ordinarily] would not c<strong>on</strong>stitute receiving a ‘financial benefit directlyattributable to <strong>the</strong> infringing activity.’” S. Rep. 105-190, at 44. But “where <strong>the</strong>value of <strong>the</strong> service lies in providing access to infringing material,” courts mightfind such “<strong>on</strong>e-time set-up and flat periodic” fees to c<strong>on</strong>stitute a direct financialbenefit. Id. at 44-45. Thus, <strong>the</strong> central questi<strong>on</strong> of <strong>the</strong> “direct financial benefit”inquiry in this case is whe<strong>the</strong>r <strong>the</strong> infringing activity c<strong>on</strong>stitutes a draw forsubscribers, not just an added benefit. 17061701 Id. at 1062-64.1702 Id. at 1062-63.1703 Id. at 1064.1704 Ellis<strong>on</strong> v. Roberts<strong>on</strong>, 357 F.3d 1072, 1078-79 (9th Cir. 2004).1705 Id. at 1079 (emphasis in original).1706 Id.- 372 -


The Ninth Circuit found that <strong>the</strong>re was no evidence that AOL customers ei<strong>the</strong>rsubscribed because of <strong>the</strong> available infringing material or canceled subscripti<strong>on</strong>s because it wasno l<strong>on</strong>ger available. Accordingly, no jury could reas<strong>on</strong>ably c<strong>on</strong>clude that AOL received a directfinancial benefit from providing access to <strong>the</strong> infringing material, and <strong>the</strong> claim for vicariousliability failed. 1707The district court also ruled <strong>on</strong> an asserti<strong>on</strong> by AOL of two of <strong>the</strong> DMCA safe harbors –<strong>the</strong> Secti<strong>on</strong> 512(a) and <strong>the</strong> Secti<strong>on</strong> 512(c) safe harbors. The district court noted that as apredicate for any of <strong>the</strong> safe harbors, AOL had to satisfy <strong>the</strong> requirement of Secti<strong>on</strong> 512(i) that ithave adopted and reas<strong>on</strong>ably implemented, and informed its subscribers, of a policy for <strong>the</strong>terminati<strong>on</strong> in appropriate circumstances of subscribers who are repeat infringers. 1708 Citing <strong>the</strong>legislative history, <strong>the</strong> court ruled that Secti<strong>on</strong> 512(i) does not require OSPs to take affirmativesteps to investigate potential infringement and set up notificati<strong>on</strong> procedures in an attempt toidentify <strong>the</strong> resp<strong>on</strong>sible individuals committing infringement through <strong>the</strong> system. Ra<strong>the</strong>r, it wassufficient to satisfy Secti<strong>on</strong> 512(i) that AOL’s terms of service, to which every AOL memberhad to agree, included a notice that AOL members could not make unauthorized copies ofc<strong>on</strong>tent protected by intellectual property rights and <strong>the</strong>ir accounts could be terminated formaking such unauthorized copies. 1709The plaintiff challenged whe<strong>the</strong>r AOL had reas<strong>on</strong>ably implemented its terminati<strong>on</strong> policyby noting that no subscriber had ever been terminated from AOL as a repeat infringer and AOLhad not at <strong>the</strong> time of <strong>the</strong> infringement defined how many times a user had to be guilty ofinfringement before being classified as a repeat infringer. The court rejected this challenge,noting that Secti<strong>on</strong> 512(i) does not require AOL to actually terminate repeat infringers or even toinvestigate infringement in order to determine if AOL users are behind it. “That is <strong>the</strong> provinceof subsecti<strong>on</strong> (c), which provides detailed requirements related to notificati<strong>on</strong> of infringementand <strong>the</strong> ISPS’ resp<strong>on</strong>sibility to investigate and, in some instances, delete or block access toinfringing material <strong>on</strong> <strong>the</strong>ir systems. Subsecti<strong>on</strong> (i) <strong>on</strong>ly requires AOL to put its users <strong>on</strong> noticethat <strong>the</strong>y face a realistic threat of having <strong>the</strong>ir <strong>Internet</strong> access terminated if <strong>the</strong>y repeatedlyviolate intellectual property rights.” 1710 The court <strong>the</strong>refore held that AOL had satisfied <strong>the</strong>predicate requirements of Secti<strong>on</strong> 512(i). 17111707 Id.1708 The court noted that such a policy must have been adopted, reas<strong>on</strong>ably implemented and noticed to subscribersat <strong>the</strong> time <strong>the</strong> allegedly infringing activity occurred. “Doing so after <strong>the</strong> infringing activity has alreadyoccurred is insufficient if <strong>the</strong> ISP seeks a limitati<strong>on</strong> of liability in c<strong>on</strong>necti<strong>on</strong> with that infringing activity.”Ellis<strong>on</strong> v. Roberts<strong>on</strong>, 189 F. Supp. 2d 1059, 1064 (C.D. Cal. 2002).1709 Id. at 1064-65.1710 Id. at 1066. An important implicati<strong>on</strong> of this ruling appears to be that an OSP can qualify for <strong>the</strong> Secti<strong>on</strong>512(a) safe harbor regardless of whe<strong>the</strong>r it promptly deletes infringing material or terminates repeat infringers,so l<strong>on</strong>g as it has a policy to do so and o<strong>the</strong>rwise complies with <strong>the</strong> requirements of <strong>the</strong> Secti<strong>on</strong> 512(a) safeharbor. The court fur<strong>the</strong>r stated: “[T]he ‘realistic threat of losing [<strong>Internet</strong>] access’ that C<strong>on</strong>gress wishes ISPsto impress up<strong>on</strong> would-be infringers remains just that – a mere threat – unless <strong>the</strong> ISP decides to implementprocedures aimed at identifying, investigating, and remedying infringement in hopes of meeting <strong>the</strong>requirements of subsecti<strong>on</strong> (c)’s safe harbor. Such an arrangement makes a certain amount of sense. Ifsubsecti<strong>on</strong> (i) obligated ISPs to affirmatively seek out informati<strong>on</strong> regarding infringement and <strong>the</strong>n investigate,- 373 -


The district court <strong>the</strong>n turned to applicati<strong>on</strong> of <strong>the</strong> Secti<strong>on</strong> 512(a) safe harbor. The courtfirst noted that Secti<strong>on</strong> 512(a) “does not require ISPs to remove or block access to infringingmaterials up<strong>on</strong> receiving notificati<strong>on</strong> of infringement, as is <strong>the</strong> case with subsecti<strong>on</strong>s (c) and(d).” 1712 The plaintiff argued that AOL was not engaged in “intermediate and transientstorage” 1713 required under Secti<strong>on</strong> 512(a) because it maintained Usenet materials <strong>on</strong> its serverfor fourteen days. The court posed <strong>the</strong> issue under Secti<strong>on</strong> 512(a) as follows: “Certain functi<strong>on</strong>ssuch as <strong>the</strong> provisi<strong>on</strong> of e-mail service or <strong>Internet</strong> c<strong>on</strong>nectivity clearly fall under <strong>the</strong> purview ofsubsecti<strong>on</strong> (a); o<strong>the</strong>r functi<strong>on</strong>s such as hosting a web site or chatroom fall under <strong>the</strong> scope ofsubsecti<strong>on</strong> (c). The questi<strong>on</strong> presented by this case is which subsecti<strong>on</strong> applies to <strong>the</strong> functi<strong>on</strong>performed by AOL when it stores USENET messages in order to provide USENET access tousers.” 1714 The court answered that Secti<strong>on</strong> 512(a) applies, based primarily <strong>on</strong> <strong>the</strong> fact that <strong>the</strong>legislative history of <strong>the</strong> Secti<strong>on</strong> 512(a) safe harbor expressly noted that <strong>the</strong> exempted storageand transmissi<strong>on</strong>s under that secti<strong>on</strong> “would ordinarily include forwarding of customers’ Usenetpostings to o<strong>the</strong>r <strong>Internet</strong> sites in accordance with c<strong>on</strong>figurati<strong>on</strong> settings that apply to all suchpostings.” 1715 The court fur<strong>the</strong>r ruled that storage of <strong>the</strong> Usenet postings for fourteen days wasnot too l<strong>on</strong>g to disqualify <strong>the</strong> storage as intermediate and transient. The court noted that Usenetmessages had been stored for eleven days in <strong>the</strong> Netcom case, and that three days was aninsufficient difference to distinguish <strong>the</strong> present case from Netcom. Accordingly, <strong>the</strong> court ruledthat AOL’s Usenet storage was “intermediate and transient.” 1716The court fur<strong>the</strong>r ruled that AOL had satisfied <strong>the</strong> remaining requirements of Secti<strong>on</strong>512(a). The transmissi<strong>on</strong> of <strong>the</strong> plaintiff’s newsgroup message was not initiated by AOL, AOLdid not select <strong>the</strong> individual postings <strong>on</strong> <strong>the</strong> alt.binaries.e-book newsgroup (and <strong>the</strong> fact thatAOL decided not to carry every newsgroup did not c<strong>on</strong>stitute selecti<strong>on</strong> of <strong>the</strong> specific materialgiving rise to <strong>the</strong> claim of infringement 1717 ), AOL did not select <strong>the</strong> recipients of <strong>the</strong> material, 1718eradicate, and punish infringement <strong>on</strong> <strong>the</strong>ir networks, <strong>the</strong>n most if not all of <strong>the</strong> notice and takedownrequirements of <strong>the</strong> subsecti<strong>on</strong> (c) safe harbor would be indirectly imported and applied to subsecti<strong>on</strong>s (a) and(b) as well. This would upset <strong>the</strong> carefully balanced, “separate functi<strong>on</strong>-separate safe harbor-separaterequirements” architecture of <strong>the</strong> DMCA.” Id. at 1066 n.15.1711 Id. at 1066.1712 Id. at 1068.1713 Clause (4) of Secti<strong>on</strong> 512(a) requires that “no copy of <strong>the</strong> material made by <strong>the</strong> service provider in <strong>the</strong> course ofsuch intermediate or transient storage is maintained <strong>on</strong> <strong>the</strong> system or network in a manner ordinarily accessibleto any<strong>on</strong>e o<strong>the</strong>r than anticipated recipients, and no such copy is maintained <strong>on</strong> <strong>the</strong> system or network in amanner ordinarily accessible to such anticipated recipients for a l<strong>on</strong>ger period than is reas<strong>on</strong>ably necessary for<strong>the</strong> transmissi<strong>on</strong>, routing, or provisi<strong>on</strong> of c<strong>on</strong>necti<strong>on</strong>s.”1714 Id. at 1068.1715 Id. at 1069-70 (quoting H.R. Rep. 105-551(I) at p. 24).1716 189 F. Supp. 2d at 1070.1717 To impute selecti<strong>on</strong> of <strong>the</strong> infringing material to <strong>the</strong> ISP, “<strong>the</strong> better interpretati<strong>on</strong> of [512](a)(2) is that <strong>the</strong> ISPwould have to choose specific postings, or perhaps block messages sent by users expressing opini<strong>on</strong>s withwhich <strong>the</strong> ISP disagrees.” Id. at 1071.1718 To impute selecti<strong>on</strong> of <strong>the</strong> recipients of <strong>the</strong> material to AOL, “<strong>the</strong> better interpretati<strong>on</strong> is that AOL would haveto direct material to certain recipients (e.g. all AOL members whose names start with ‘G’) but not o<strong>the</strong>rs.” Id.- 374 -


and <strong>the</strong> material was transmitted through AOL’s system without modificati<strong>on</strong> of its c<strong>on</strong>tent. 1719Accordingly, <strong>the</strong> court c<strong>on</strong>cluded that AOL qualified for <strong>the</strong> Secti<strong>on</strong> 512(a) safe harbor, and thatit <strong>the</strong>refore needed not reach <strong>the</strong> issue of whe<strong>the</strong>r <strong>the</strong> Secti<strong>on</strong> 512(c) safe harbor also applied. 1720On appeal, <strong>the</strong> Ninth Circuit reversed <strong>the</strong> ruling that AOL was entitled to <strong>the</strong> Secti<strong>on</strong>512(a) safe harbor <strong>on</strong> <strong>the</strong> ground that <strong>the</strong>re were triable issues of material fact c<strong>on</strong>cerningwhe<strong>the</strong>r AOL had met <strong>the</strong> threshold requirements of Secti<strong>on</strong> 512(i). The Ninth Circuit ruled,however, that if after remand a jury found AOL to be eligible under Secti<strong>on</strong> 512(i) to assert <strong>the</strong>DMCA safe harbors, <strong>the</strong>n “<strong>the</strong> parties need not relitigate whe<strong>the</strong>r AOL qualifies for <strong>the</strong>limitati<strong>on</strong> of liability provided by § 512(a); <strong>the</strong> district court’s resoluti<strong>on</strong> of that issue at <strong>the</strong>summary judgment stage is sound.” 1721With respect to Secti<strong>on</strong> 512(i), <strong>the</strong> Ninth Circuit found it difficult to c<strong>on</strong>clude that AOLhad reas<strong>on</strong>ably implemented a policy against repeat infringers, because <strong>the</strong>re was ampleevidence in <strong>the</strong> record suggesting that AOL did not have an effective notificati<strong>on</strong> procedure inplace at <strong>the</strong> time <strong>the</strong> alleged infringing activities were taking place. Although AOL had notified<strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office of its correct email address before Ellis<strong>on</strong>’s attorney attempted to c<strong>on</strong>tactAOL and did post its correct email address <strong>on</strong> <strong>the</strong> AOL website with a brief summary of itspolicy as to repeat infringers, AOL also changed <strong>the</strong> email address to which infringementnotificati<strong>on</strong>s were supposed to have been sent and failed to provide for forwarding of messagesent to <strong>the</strong> old address or notificati<strong>on</strong> that <strong>the</strong> email address was inactive. 1722 The Ninth Circuitfound that AOL should have closed <strong>the</strong> old email account or forwarded <strong>the</strong> emails sent to <strong>the</strong> oldaccount to <strong>the</strong> new <strong>on</strong>e. The fact that AOL had allowed notices of potential copyrightinfringement to go unheeded for a period of time was sufficient for a reas<strong>on</strong>able jury to c<strong>on</strong>cludethat AOL had not reas<strong>on</strong>ably implemented its policy against repeat infringers. 1723c. The Aimster/Madster Lawsuits. The facts of <strong>the</strong>Aimster/Madster lawsuits are set forth in Secti<strong>on</strong> III.C.2(c)(3) above. In that case, Aimsterasserted <strong>the</strong> Secti<strong>on</strong> 512(a) safe harbor (as well as <strong>the</strong> Secti<strong>on</strong> 512(c) safe harbor, discussed inSecti<strong>on</strong> III.C.5(b)(1)(iii).e below). In ruling <strong>on</strong> Aimster’s asserti<strong>on</strong>s of <strong>the</strong> safe harbors, <strong>the</strong>district court first noted that <strong>the</strong> DMCA safe harbors could potentially apply to liability fordirect, vicarious and c<strong>on</strong>tributory copyright infringement. 1724 Note that this holding is c<strong>on</strong>sistentwith <strong>the</strong> Ninth Circuit’s holding in Napster I, in which <strong>the</strong> court ruled that <strong>the</strong> safe harbors couldpotentially shield against vicarious liability, 1725 but inc<strong>on</strong>sistent with <strong>the</strong> CoStar case, which1719 Id. at 1070-72.1720 Id. at 1072 & n.22.1721 Ellis<strong>on</strong> v. Roberts<strong>on</strong>, 357 F.3d 1072, 1074 (9th Cir. 2004).1722 Id. at 1080.1723 Id.1724 In re Aimster <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Litigati<strong>on</strong>, 252 F. Supp. 2d 634, 657 (N.D. Ill. 2002).1725 The district court’s 2002 decisi<strong>on</strong> <strong>on</strong> <strong>the</strong> plaintiffs’ moti<strong>on</strong> for summary judgment in <strong>the</strong> MP3Board case,discussed in Secti<strong>on</strong> III.D.8 below, also at least implicitly recognized that <strong>the</strong> Secti<strong>on</strong> 512(d) safe harbor couldapply to a claim of vicarious liability.- 375 -


c<strong>on</strong>cluded that <strong>the</strong> safe harbors cannot shield against vicarious liability (see <strong>the</strong> discussi<strong>on</strong> inSecti<strong>on</strong> III.C.5(b)(1)(iii).c below).The district court <strong>the</strong>n turned to whe<strong>the</strong>r Aimster had satisfied <strong>the</strong> predicate c<strong>on</strong>diti<strong>on</strong>s ofmeeting <strong>the</strong> definiti<strong>on</strong>s of “service provider” in Secti<strong>on</strong>s 512(k)(1)(A) & (B) and adopting anadequate policy of terminati<strong>on</strong> of repeat infringers under Secti<strong>on</strong> 512(i)(1)(A). The court foundthat Aimster qualified as a “service provider” because a “plain reading of both definiti<strong>on</strong>s revealsthat ‘service provider’ is defined so broadly that we have trouble imagining <strong>the</strong> existence of an<strong>on</strong>line service that would not fall under <strong>the</strong> definiti<strong>on</strong>s.” 1726The district court found, however, that Aimster had not adopted an adequate policy toterminate repeat infringers. Although Aimster’s copyright notice <strong>on</strong> its site informed users of aprocedures for notifying Aimster when infringing activity was taking place <strong>on</strong> <strong>the</strong> system andstated that users who were found to repeatedly violate copyright rights of o<strong>the</strong>r may have <strong>the</strong>iraccess to all services terminated, <strong>the</strong> court held that <strong>the</strong> policy was not reas<strong>on</strong>ably implementedbecause it is fact could not be implemented. In particular, <strong>the</strong> encrypti<strong>on</strong> <strong>on</strong> Aimster rendered itimpossible to ascertain which users were transferring which files, nor did Secti<strong>on</strong> 512(i) obligate<strong>the</strong> plaintiffs to provide <strong>the</strong> <strong>Internet</strong> protocol address of a particular copyright infringer <strong>on</strong> <strong>the</strong>Aimster system to assist Aimster in implementing its terminati<strong>on</strong> policy. 1727 “Adopting a repeatinfringer policy and <strong>the</strong>n purposely eviscerating any hope that such a policy could ever becarried out is not an ‘implementati<strong>on</strong>’ as required by § 512(i).” 1728 Accordingly, Aimster’sfailure to comply with Secti<strong>on</strong> 512(i) rendered it ineligible for any of <strong>the</strong> safe harbors. 1729In additi<strong>on</strong>, <strong>the</strong> court ruled that Aimster had not satisfied <strong>the</strong> particular c<strong>on</strong>diti<strong>on</strong>s for <strong>the</strong>Secti<strong>on</strong> 512(a) safe harbor because, relying <strong>on</strong> <strong>on</strong>e of <strong>the</strong> district court’s decisi<strong>on</strong>s in <strong>the</strong> Napstercase, <strong>the</strong> informati<strong>on</strong> transferred between individual Aimster users did not pass “through”Aimster’s system at all by virtue of its peer-to-peer architecture (Secti<strong>on</strong> 512(a) immunizesliability by virtue of a service provider’s transmitting, routing or providing c<strong>on</strong>necti<strong>on</strong>s for,“materials through a system or network c<strong>on</strong>trolled or operated by or for <strong>the</strong> serviceprovider”). 1730 The holdings of <strong>the</strong> Napster and Aimster courts <strong>on</strong> this point, if adopted by o<strong>the</strong>rcourts, will make it difficult for <strong>the</strong> Secti<strong>on</strong> 512(a) safe harbor ever to apply to a peer-to-peerarchitecture. The court rejected Aimster’s argument that “through” should be interpreted tomean “by means of” or “by <strong>the</strong> help or agency of.” 1731 Finally, <strong>the</strong> court noted that Aimster wasineligible for <strong>the</strong> Secti<strong>on</strong> 512(a) safe harbor because its encrypti<strong>on</strong> of <strong>the</strong> informati<strong>on</strong> transferredbetween users c<strong>on</strong>stituted a modificati<strong>on</strong> of that informati<strong>on</strong>, which Secti<strong>on</strong> 512(a) does notpermit. 17321726 Id. at 658 (emphasis in original).1727 Id. at 659.1728 Id.1729 Id.1730 Id. at 659-60.1731 Id. at 660.1732 Id. at 660 n.19.- 376 -


On appeal, <strong>the</strong> Seventh Circuit affirmed that Aimster was not entitled to any of <strong>the</strong> safeharbors of <strong>the</strong> DMCA, but based its c<strong>on</strong>clusi<strong>on</strong> solely <strong>on</strong> <strong>the</strong> ground that Aimster had notcomplied with <strong>the</strong> predicate c<strong>on</strong>diti<strong>on</strong>s of Secti<strong>on</strong> 512(i). “Far from doing anything todiscourage repeat infringers of <strong>the</strong> plaintiffs’ copyrights, Aimster invited <strong>the</strong>m to do so, showed<strong>the</strong>m how <strong>the</strong>y could do so with ease using its system, and by teaching its users how to encrypt<strong>the</strong>ir unlawful distributi<strong>on</strong> of copyrighted materials disabled itself from doing anything toprevent infringement.” 1733 d. Perfect 10 v. CCBill. The plaintiff, Perfect10, ownerof <strong>the</strong> copyrights in an extensive collecti<strong>on</strong> of pornographic photos, brought a copyrightinfringement lawsuit against CWIE, an OSP hosting various sites that allegedly c<strong>on</strong>tainedinfringing copies of Perfect10’s photos, as well as several related third parties providingancillary services to such sites: IBill, a company that processed payments for <strong>on</strong>line merchants,<strong>Internet</strong> Key, an age verificati<strong>on</strong> service for adult c<strong>on</strong>tent websites, and CCBill, a provider of afully automated <strong>Internet</strong> service that enabled c<strong>on</strong>sumers to use credit cards or checks to pay forsubscripti<strong>on</strong>s or memberships to e-commerce venues created and offered by CCBill’s clients. 1734Each of <strong>the</strong> defendants raised various of <strong>the</strong> DMCA safe harbors as defenses, of which <strong>the</strong>Secti<strong>on</strong> 512(a) defenses will be discussed here (<strong>the</strong> remaining defenses are discussed in <strong>the</strong>subsecti<strong>on</strong>s below).Perfect 10 challenged <strong>the</strong> various defendants’ ability to rely <strong>on</strong> <strong>the</strong> safe harbors forfailure to comply with <strong>the</strong> predicate requirements of Secti<strong>on</strong> 512(i) as well as failure to meet <strong>the</strong>substantive criteria of <strong>the</strong> individual safe harbors. The court c<strong>on</strong>sidered <strong>the</strong> factual posture ofeach of <strong>the</strong> defendants in turn, and <strong>the</strong> case is particularly interesting because it is <strong>the</strong> first tocomprehensively adjudicate <strong>the</strong> adequacy of specific language comprising a policy to terminaterepeat infringers. The court began its analysis with some general observati<strong>on</strong>s about <strong>the</strong> DMCA,and quoted from <strong>the</strong> Fourth Circuit’s decisi<strong>on</strong> in <strong>the</strong> ALS Scan case that <strong>the</strong> safe harborimmunity is afforded “<strong>on</strong>ly to ‘innocent’ service providers who can prove <strong>the</strong>y do not haveactual or c<strong>on</strong>structive knowledge of <strong>the</strong> infringement, as defined under any of <strong>the</strong> three pr<strong>on</strong>gs of17 U.S.C. § 512(c)(1). The DMCA’s protecti<strong>on</strong> of an innocent service provider disappears at <strong>the</strong>moment <strong>the</strong> service provider loses its innocence, i.e., at <strong>the</strong> moment it becomes aware that a thirdparty is using its system to infringe. At that point, <strong>the</strong> Act shifts resp<strong>on</strong>sibility to <strong>the</strong> serviceprovider to disable <strong>the</strong> infringing matter …” 1735The court <strong>the</strong>n turned to <strong>the</strong> applicability of <strong>the</strong> safe harbors to each of <strong>the</strong> individualdefendants as follows:IBill. The court first c<strong>on</strong>sidered <strong>the</strong> adequacy of IBill’s policy to terminate repeatinfringers under Secti<strong>on</strong> 512(i). Under IBill’s policy, when it received a notice of infringementthat substantially complied with <strong>the</strong> DMCA requirements, it suspended payment processingservices to that client. If IBill determined that it had received previous complaints about that1733 In re Aimster <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Litigati<strong>on</strong>, 334 F.3d 643 (7th Cir. 2003), cert. denied, 124 S. Ct. 1069 (2004).1734 Perfect 10, Inc. v. CCBill, 340 F. Supp. 1077, 1082-84 (C.D. Cal. 2004).1735 Id. at 1086 (citati<strong>on</strong>s omitted).- 377 -


client or <strong>the</strong> website, IBill terminated <strong>the</strong> account permanently. Perfect 10 argued that thispolicy was inadequate because it suspended services for particular websites without terminating<strong>the</strong> webmaster resp<strong>on</strong>sible for that material. The court rejected this argument, noting that <strong>the</strong>focus of Secti<strong>on</strong> 512(i) is <strong>on</strong> infringing users ra<strong>the</strong>r than <strong>on</strong> c<strong>on</strong>tent. The policy of disabling ofIBill clients accused of infringing third party copyrights was <strong>the</strong>refore adequate. 1736Perfect 10 argued that IBill had not reas<strong>on</strong>ably implemented its terminati<strong>on</strong> policybecause it had not kept a log of its notificati<strong>on</strong>s of infringement. The court held that <strong>the</strong> DMCAdoes not require an OSP to keep a log of its notificati<strong>on</strong>s. Because IBill had kept <strong>the</strong> actualDMCA notificati<strong>on</strong>s it had received, this was sufficient to dem<strong>on</strong>strate that it adequately trackedits notificati<strong>on</strong>s. 1737 The court fur<strong>the</strong>r held that many of <strong>the</strong> notificati<strong>on</strong>s Perfect 10 had sent toIBill were inadequate to trigger a duty to act <strong>on</strong> <strong>the</strong>m. Several such notices were emails fromPerfect 10’s counsel that identified several websites run by IBill’s clients that c<strong>on</strong>tainedallegedly infringing material, but did not identify <strong>the</strong> URLs of <strong>the</strong> infringing images nor identifywhich of Perfect 10’s copyrighted images were being infringed. The court held that <strong>the</strong> failureto identify <strong>the</strong> URLs or <strong>the</strong> copyrighted images made <strong>the</strong> notices inadequate. Ano<strong>the</strong>r noticeidentified <strong>the</strong> URL of an infringing image, although not <strong>the</strong> copyrighted work that it allegedlyinfringed. The court ruled that, although <strong>the</strong> notice did not comply with all of <strong>the</strong> requirementsof Secti<strong>on</strong> 512(c)(3)(a), <strong>the</strong> supply of a URL was sufficiently substantial compliance to give riseto a duty to act. 1738 Because IBill had acted <strong>on</strong> <strong>the</strong> single sufficient notice by suspending <strong>the</strong>account of <strong>the</strong> website, <strong>the</strong> court c<strong>on</strong>cluded that IBill had reas<strong>on</strong>ably implemented its repeatinfringer policy. 1739With respect to <strong>the</strong> Secti<strong>on</strong> 512(a) safe harbor, Perfect 10 argued that IBill did not qualifybecause it did not transmit <strong>the</strong> infringing material at issue, but ra<strong>the</strong>r <strong>on</strong>ly credit cardinformati<strong>on</strong>. In an important holding, <strong>the</strong> court read <strong>the</strong> scope of Secti<strong>on</strong> 512(a) veryexpansively to cover IBill based <strong>on</strong> <strong>the</strong> language of Secti<strong>on</strong> 512(a) that affords immunity for“providing c<strong>on</strong>necti<strong>on</strong>s for material through a system or network c<strong>on</strong>trolled or operated by or for<strong>the</strong> service provider.” 1740 The court c<strong>on</strong>cluded that IBill was within this language: “IBillprovides a c<strong>on</strong>necti<strong>on</strong> to <strong>the</strong> material <strong>on</strong> its clients’ websites through a system which it operatesin order to provide its clients with billing services.” 1741 Accordingly, <strong>the</strong> court granted summaryjudgment to IBill under <strong>the</strong> Secti<strong>on</strong> 512(a) safe harbor. 1742<strong>Internet</strong> Key. Perfect 10 challenged <strong>Internet</strong> Key’s compliance with <strong>the</strong> thresholdrequirements of Secti<strong>on</strong> 512(i) based <strong>on</strong> its terminati<strong>on</strong> policy, which read as follows:1736 Id. at 1088-89.1737 Id. at 1089.1738 Id. at 1089-90.1739 Id. at 1090.1740 Id. at 1091.1741 Id. The court rejected Perfect 10’s reliance <strong>on</strong> <strong>the</strong> Aimster case, noting that <strong>the</strong> Aimster case dealt with <strong>the</strong>transmissi<strong>on</strong> of material, not <strong>the</strong> provisi<strong>on</strong> of a c<strong>on</strong>necti<strong>on</strong> to <strong>the</strong> material. Id. at 1091-92.1742 Id. at 1092.- 378 -


Banned WebmasterIf a webmaster, identified by ei<strong>the</strong>r <strong>the</strong> webmaster’s name, vendorID or comm<strong>on</strong>ownership entity, has had three (3) websites which have been denied participati<strong>on</strong>in <strong>the</strong> SexKey program in accordance with this policy, that webmaster will bedenied participati<strong>on</strong> in its program of any webmaster or website in its discreti<strong>on</strong>.. . .Repeat OffendersThe participati<strong>on</strong> of any website deemed to be a repeat offender will beterminated.Banned WebsitesPending receipt of a Counter Notificati<strong>on</strong>, participati<strong>on</strong> of <strong>the</strong> website subject to aNotificati<strong>on</strong> will be suspended. A website will be permanently prohibited fromparticipating in <strong>the</strong> SexKey program up<strong>on</strong> receipt by <strong>the</strong> Company of a sec<strong>on</strong>dNotificati<strong>on</strong>. 1743The court ruled that this policy, which provided that <strong>Internet</strong> Key would disable access toan affiliate website after it received a single notificati<strong>on</strong> of an infringement, and wouldpermanently ban a webmaster from <strong>Internet</strong> Key after it had received three notificati<strong>on</strong>sregarding websites of any particular webmaster, was legally adequate. 1744 “In order for aninfringer to be a ‘repeat’ infringer, he or she must infringe at least twice. Therefore, <strong>the</strong> Courtfinds that <strong>Internet</strong> Key’s policy of terminating a webmaster after 3 notificati<strong>on</strong>s isreas<strong>on</strong>able.” 1745Perfect 10 next challenged <strong>Internet</strong> Key’s implementati<strong>on</strong> of its terminati<strong>on</strong> policy,arguing that it had provided <strong>Internet</strong> Key with 22,000 pages of printouts from SexKey affiliatedweb sites which infringed its rights, toge<strong>the</strong>r with many full-sized printouts of <strong>the</strong> images thatc<strong>on</strong>stituted infringement, and <strong>Internet</strong> Key did not disable access to <strong>the</strong> infringing web sites.The court found Perfect 10’s notices of infringement inadequate under <strong>the</strong> DMCA. A letter fromPerfect 10’s counsel accompanying <strong>the</strong> document producti<strong>on</strong> failed to identify which documentswere found <strong>on</strong> <strong>Internet</strong> Key’s affiliate web sites, did not c<strong>on</strong>tain a statement that <strong>the</strong> informati<strong>on</strong>in <strong>the</strong> notificati<strong>on</strong> was accurate, and did not state that <strong>the</strong> author had a good faith belief that <strong>the</strong>informati<strong>on</strong> in <strong>the</strong> letter was accurate nor was <strong>the</strong>re a declarati<strong>on</strong> under penalty of perjury.Although <strong>the</strong> letter identified which images were infringing, it did not identify which copyrightsof Perfect 10 <strong>the</strong> images infringed. Perfect 10’s notice was <strong>the</strong>refore not compliant with <strong>the</strong>DMCA, and absent a DMCA-compliant notice, <strong>the</strong> court ruled that Perfect 10 had failed to raise1743 Id. at 1093-94..1744 Id. at 1094.1745 Id. at 1094 n.12. The court also rejected Perfect 10’s challenge to <strong>the</strong> reas<strong>on</strong>ableness of <strong>Internet</strong> Key’sterminati<strong>on</strong> policy <strong>on</strong> <strong>the</strong> ground that <strong>Internet</strong> Key’s web site identified <strong>on</strong>e pers<strong>on</strong> as its designated copyrightagent, whereas <strong>Internet</strong> Key’s owner testified that its agent was a company. The court rejected this challenge,noting that <strong>Internet</strong> Key had never failed to resp<strong>on</strong>d to notices, and in any event it appeared that <strong>Internet</strong> Keylikely had more than <strong>on</strong>e individual who resp<strong>on</strong>ded to notificati<strong>on</strong>s of copyright infringement. Id. at 1094.- 379 -


a genuine issue of material fact c<strong>on</strong>cerning whe<strong>the</strong>r <strong>Internet</strong> Key met <strong>the</strong> threshold requirementsof Secti<strong>on</strong> 512(i). 1746With respect to <strong>the</strong> Secti<strong>on</strong> 512(a) safe harbor, <strong>the</strong> court ruled that <strong>Internet</strong> Key’s ageverificati<strong>on</strong> service functi<strong>on</strong> fell within <strong>the</strong> functi<strong>on</strong>s described in Secti<strong>on</strong> 512(a) – specifically,<strong>Internet</strong> Key was “providing c<strong>on</strong>necti<strong>on</strong>s for material” <strong>on</strong> its client web sites through a system itoperated to provide its clients with adult verificati<strong>on</strong> services. The court <strong>the</strong>refore grantedsummary judgment to <strong>Internet</strong> Key <strong>on</strong> <strong>the</strong> Secti<strong>on</strong> 512(a) safe harbor for infringement claimsarising after <strong>the</strong> date it adopted its DMCA policy (but denying summary judgment forinfringement claims prior to <strong>the</strong> date <strong>Internet</strong> Key put a DMCA policy into place). 1747CWIE and CCBill. Perfect 10 challenged <strong>the</strong> repeat infringer policies of CWIE andCCBill under Secti<strong>on</strong> 512(i) <strong>on</strong> a number of grounds. First, it argued that <strong>the</strong>ir DMCA noticespreadsheet was missing several webmaster names of its affiliate sites. The court rejected thischallenge, noting that <strong>on</strong>ly a few webmaster names were missing from <strong>the</strong> spreadsheet ininstances where <strong>the</strong> notice was deficient or <strong>the</strong> issues were resolved, and such was insufficient toraise a genuine issue of material fact that CWIE and CCBill did not reas<strong>on</strong>ably implement <strong>the</strong>irrepeat infringer policies. 1748Sec<strong>on</strong>d, Perfect 10 argued that CWIE and CCBill had failed to act in resp<strong>on</strong>se to anumber of infringement notices Perfect 10 had sent. The court found, however, that such noticeswere deficient under <strong>the</strong> DMCA because <strong>the</strong>y identified <strong>on</strong>ly <strong>the</strong> web sites c<strong>on</strong>taining allegedlyinfringing material, but did not identify <strong>the</strong> URLs of <strong>the</strong> infringing images or which of Perfect10’s copyrights were being infringed. 1749Finally, Perfect 10 argued that it submitted several emails to CWIE regarding passwordhacking web sites that provided passwords to Perfect 10’s web sites and CWIE failed todisc<strong>on</strong>tinue hosting those web sites. The court ruled, however, that Perfect 10 had not submittedany evidence that <strong>the</strong> use of <strong>the</strong> passwords actually resulted in <strong>the</strong> infringement of Perfect 10’scopyrights. Accordingly, Perfect 10 had failed to raise any genuine issues of material fact thatCWIE and CCBill did not reas<strong>on</strong>ably implement <strong>the</strong>ir repeat infringer policies. 1750With respect to <strong>the</strong> applicability of <strong>the</strong> Secti<strong>on</strong> 512(a) safe harbor to CCBill, Perfect 10argued that CCBill did not fall within that safe harbor because it did not transmit <strong>the</strong> infringingmaterial at issue. Perfect 10 argued that Secti<strong>on</strong> 512(a) provides protecti<strong>on</strong> <strong>on</strong>ly for OSPs whotransmit <strong>the</strong> allegedly infringing material and not o<strong>the</strong>r material, such as credit card informati<strong>on</strong>.Once again, however, <strong>the</strong> court found CCBill entitled to Secti<strong>on</strong> 512(a)’s safe harbor becauseCCBill provided a “c<strong>on</strong>necti<strong>on</strong>” to <strong>the</strong> material <strong>on</strong> its clients’ web sites through a system which1746 Id. at 1095-97.1747 Id. at 1098-99.1748 Id. at 1099-1100.1749 Id. at 1100-01.1750 Id. at 1101.- 380 -


it operated in order to provide its clients with billing services. Accordingly, <strong>the</strong> court grantedsummary judgment to CCBill under <strong>the</strong> Secti<strong>on</strong> 512(a) safe harbor. 1751The Ninth Circuit’s Decisi<strong>on</strong>. Perfect 10 appealed <strong>the</strong> rulings that CCBill and CWIEqualified for immunity under <strong>the</strong> Secti<strong>on</strong> 512 safe harbors. Turning first to <strong>the</strong> thresholdquesti<strong>on</strong> of whe<strong>the</strong>r CCBill and CWIE had reas<strong>on</strong>ably implemented a policy for terminati<strong>on</strong> ofrepeat infringers, <strong>the</strong> Ninth Circuit ruled that a service provider “implements” a policy “if it hasa working notificati<strong>on</strong> system, a procedure for dealing with DMCA-compliant notificati<strong>on</strong>s, andif it does not actively prevent copyright owners from collecting informati<strong>on</strong> needed to issue suchnotificati<strong>on</strong>s.” 1752 The court noted that <strong>the</strong> statute permits service providers to implement avariety of procedures, “but an implementati<strong>on</strong> is reas<strong>on</strong>able if, under ‘appropriatecircumstances,’ <strong>the</strong> service provider terminates users who repeatedly or blatantly infringecopyright.” 1753The Ninth Circuit agreed with <strong>the</strong> district court’s rejecti<strong>on</strong> of Perfect 10’s argument thatCCBill and CWIE had prevented <strong>the</strong> implementati<strong>on</strong> of <strong>the</strong>ir policies by failing to keep track ofrepeatedly infringing webmasters. Citing <strong>the</strong> Ellis<strong>on</strong> and Aimster cases, <strong>the</strong> court ruled that,although substantial failure to record webmasters associated with allegedly infringing websitescould raise a genuine issue of material fact as to <strong>the</strong> implementati<strong>on</strong> of <strong>the</strong> service provider’srepeat infringer policy for purposes of summary judgment, in this case <strong>the</strong> record did not reflectsuch a failure. Perfect 10 had submitted a single page from CCBill’s and CWIE’s “DMCA Log”showing some empty fields in <strong>the</strong> spreadsheet column labeled “Webmasters Name,” and arguedthat this page showed no effort to track notices of infringements received by webmaster identity.The court noted, however, that <strong>the</strong> remainder of <strong>the</strong> DMCA Log indicated that <strong>the</strong> email addressand/or name of <strong>the</strong> webmaster was routinely recorded in CCBill’s and CWIE’s DMCA Log, andCCBill’s interrogatory resp<strong>on</strong>ses also c<strong>on</strong>tained a chart indicating that CCBill and CWIE largelykept track of <strong>the</strong> webmaster for each website. Accordingly, <strong>the</strong> district court had properlyc<strong>on</strong>cluded that <strong>the</strong> DMCA Log did not raise a triable issue of fact that CCBill andd CWIE didnot implement a repeat infringer policy. 1754With respect to whe<strong>the</strong>r CCBill and CWIE had reas<strong>on</strong>ably implemented <strong>the</strong>ir repeatinfringer policies, <strong>the</strong> Ninth Circuit first noted that to identify and terminate repeat infringers, aservice provider need not affirmatively police its users for evidence of repeat infringement. 1755Perfect 10 argued that CCBill’s and CWIE’s implementati<strong>on</strong> of <strong>the</strong>ir repeat infringer policieswas unreas<strong>on</strong>able because that had received notices of infringement from Perfect 10, yet <strong>the</strong>infringement identified in <strong>the</strong> notices c<strong>on</strong>tinued. The Ninth Circuit, however, agreed with <strong>the</strong>district court’s rulings that such notices did not substantially comply with <strong>the</strong> requirements of1751 Id. at 1102-03.1752 Perfect 10, Inc. v. CCBill LLC, 481 F.3d 751, 758 (9 th Cir.), cert. denied, 2007 U.S. LEXIS 12812 (2007).1753 Id. at 758-59.1754 Id. at 759-60.1755 Id. at 760.- 381 -


Secti<strong>on</strong> 512(c)(3). To be substantially compliant, a notice from a copyright holder mustsubstantially comply with all of Secti<strong>on</strong> 512(c)(3)’s clauses, not just some of <strong>the</strong>m. 1756Specifically, <strong>the</strong> court noted that a 22,185 page set of notices including pictures withURLs of Perfect 10 models allegedly posted <strong>on</strong> CCBill or CWIE client websites did not c<strong>on</strong>taina statement under penalty of perjury that <strong>the</strong> complaining party was authorized to act, as requiredby Secti<strong>on</strong> 512(c)(3)(A)(vi). O<strong>the</strong>r notices sent by Perfect 10 similarly had <strong>on</strong>e or more of <strong>the</strong>required elements missing. The court noted that a copyright holder should not be permitted tocobble toge<strong>the</strong>r adequate notice from separately defective notices. 1757 “The DMCA notificati<strong>on</strong>procedures place <strong>the</strong> burden of policing copyright infringement – identifying <strong>the</strong> potentiallyinfringing material and adequately documenting infringement – squarely <strong>on</strong> <strong>the</strong> owners of <strong>the</strong>copyright. We decline to shift a substantial burden from <strong>the</strong> copyright owner to <strong>the</strong> provider;Perfect 10’s separate communicati<strong>on</strong>s are inadequate.” 1758The Ninth Circuit disagreed, however, with <strong>the</strong> district court’s refusal to c<strong>on</strong>siderevidence of notices provided by any party o<strong>the</strong>r than Perfect 10 <strong>on</strong> <strong>the</strong> basis that such noticeswould be irrelevant to Perfect 10’s claims. The court held that CCBill’s and CWIE’s acti<strong>on</strong>stoward copyright holders who were not a party to <strong>the</strong> litigati<strong>on</strong> would be relevant in determiningwhe<strong>the</strong>r CCBill and CWIE reas<strong>on</strong>ably implemented <strong>the</strong>ir repeat infringer policies. Accordingly,<strong>the</strong> court remanded for determinati<strong>on</strong> of whe<strong>the</strong>r CCBill and/or CWIE implemented its repeatinfringer policy in an unreas<strong>on</strong>able manner with respect to any copyright holder o<strong>the</strong>r thanPerfect 10. 1759The court next noted that, in importing <strong>the</strong> knowledge standards of Secti<strong>on</strong> 512(c) to <strong>the</strong>analysis of whe<strong>the</strong>r a service provider reas<strong>on</strong>ably implemented its Secti<strong>on</strong> 512(i) repeat infringerpolicy, C<strong>on</strong>gress had also imported <strong>the</strong> “red flag” test of Secti<strong>on</strong> 512(c)(1)(A)(ii). Perfect 10argued that CCBill and CWIE had failed to reas<strong>on</strong>ably implement <strong>the</strong>ir repeat infringer policybecause <strong>the</strong>y were aware of a number of red flags that signaled apparent infringement and hadfailed to act. Specifically, Perfect 10 argued that, because CCBill and CWIE had providedservices to “illegal.net” and “stolencelebritypics.com,” <strong>the</strong>y must have been aware of apparentinfringing activity. 1760 The Ninth Circuit disagreed. “When a website traffics in pictures that aretitillating by nature, describing photographs as ‘illegal’ or ‘stolen’ may be an attempt to increase<strong>the</strong>ir salacious appeal, ra<strong>the</strong>r than an admissi<strong>on</strong> that <strong>the</strong> photographs are actually illegal orstolen. We do not place <strong>the</strong> burden of determining whe<strong>the</strong>r photographs are actually illegal <strong>on</strong> aservice provider.” 1761The court also rejected Perfect 10’s argument that password-hacking sites hosted byCWIE obviously infringed. The court noted that, in order for a website to qualify as a red flag of1756 Id. at 760-61.1757 Id. at 761-62.1758 Id. at 762.1759 Id. at 762-63.1760 Id. at 763.1761 Id.- 382 -


infringement, it would need to be apparent that <strong>the</strong> website instructed or enabled users to infringeano<strong>the</strong>r’s copyright. 1762 “We find that <strong>the</strong> burden of determining whe<strong>the</strong>r passwords <strong>on</strong> awebsite enabled infringement is not <strong>on</strong> <strong>the</strong> service provider. The website could be a hoax, or outof date. … There is simply no way for a service provider to c<strong>on</strong>clude that <strong>the</strong> passwords enabledinfringement without trying <strong>the</strong> passwords, and verifying that <strong>the</strong>y enabled illegal access tocopyrighted material. We impose no such investigative duties <strong>on</strong> services providers. Passwordhacking websites are thus not per se ‘red flags’ of infringement.” 1763Perfect 10 argued that CCBill and CWIE had also failed <strong>the</strong> predicate c<strong>on</strong>diti<strong>on</strong> ofSecti<strong>on</strong> 512(i)(1)(B) of not interfering with standard technical measure used to identify orprotect copyrighted works, by blocking Perfect 10’s access to CCBill affiliated websites in orderto prevent Perfect 10 from discovering whe<strong>the</strong>r those websites infringed Perfect 10’s copyrights.The Ninth Circuit found two disputed facts at issue for purposes of summary judgment. First,<strong>the</strong> court was unable to determine <strong>on</strong> <strong>the</strong> record whe<strong>the</strong>r accessing websites is a standardtechnical measure that was developed pursuant to a broad c<strong>on</strong>sensus of copyright owners andservice providers in an open, fair, voluntary, multi-industry standards process, as required bySecti<strong>on</strong> 512(i)(2)(A). Sec<strong>on</strong>d, even if it were a standard technical measure, CCBill claimed itblocked Perfect 10’s credit card <strong>on</strong>ly because Perfect 10 had previously reversed charges forsubscripti<strong>on</strong>s. Perfect 10 insisted it did so in order to prevent Perfect 10 from identifyinginfringing c<strong>on</strong>tent. If CCBill were correct, Perfect 10’s method of identifying infringement –forcing CCBill to pay <strong>the</strong> fines and fees associated with chargebacks – might well impose asubstantial cost <strong>on</strong> CCBill. If not, CCBill might well have interfered with Perfect 10’s efforts topolice <strong>the</strong> websites in questi<strong>on</strong> for possible infringements. Accordingly, <strong>the</strong> court remanded to<strong>the</strong> district court for determinati<strong>on</strong>s <strong>on</strong> whe<strong>the</strong>r access to a website is a standard technicalmeasure, and if so, whe<strong>the</strong>r CCBill’s refusal to process Perfect 10’s transacti<strong>on</strong>s interfered withthat measure for identifying infringement. 1764Finally, <strong>the</strong> court turned to issues of whe<strong>the</strong>r CCBill and CWIE were entitled to <strong>the</strong>Secti<strong>on</strong> 512(a) safe harbor. Agreeing with <strong>the</strong> district court, <strong>the</strong> Ninth Circuit rejected Perfect10’s argument that CCBill was not eligible for immunity under Secti<strong>on</strong> 512(a) because it did notitself transmit <strong>the</strong> infringing material. The court noted that Secti<strong>on</strong> 512(a) provides a broad grantof immunity to service providers whose c<strong>on</strong>necti<strong>on</strong> with <strong>the</strong> infringing material is transient. In<strong>the</strong> course of an <strong>Internet</strong> transmissi<strong>on</strong> of informati<strong>on</strong> through multiple computers, all interveningcomputers provide transient c<strong>on</strong>necti<strong>on</strong>s am<strong>on</strong>g users. The court read Secti<strong>on</strong> 512(a) to grantimmunity to all service providers for transmitting all <strong>on</strong>line communicati<strong>on</strong>s, not just those thatdirectly infringe. 1765The court noted that CCBill transmitted credit card informati<strong>on</strong> and proof of payment,both of which were digital <strong>on</strong>line communicati<strong>on</strong>s. However, <strong>the</strong>re was little informati<strong>on</strong> in <strong>the</strong>record as to how CCBill sent <strong>the</strong> payment it received to its account holders, and it was unclear1762 Id.1763 Id. at 763-64.1764 Id. at 764.1765 Id. at 765.- 383 -


whe<strong>the</strong>r such payment was a digital communicati<strong>on</strong>, transmitted without modificati<strong>on</strong> to <strong>the</strong>c<strong>on</strong>tent of <strong>the</strong> material, or was transmitted often enough such that CCBill was <strong>on</strong>ly a transientholder. Accordingly, <strong>on</strong> <strong>the</strong> record before it, <strong>the</strong> court ruled that it could not c<strong>on</strong>clude thatCCBill was a service provider under Secti<strong>on</strong> 512(a), and remanded to <strong>the</strong> district court forfur<strong>the</strong>r c<strong>on</strong>siderati<strong>on</strong> of <strong>the</strong> issue. 1766 e. Columbia Pictures v. Fung. In Columbia PicturesIndustries, Inc. v. Fung, 1767 <strong>the</strong> defendants operated BitTorrent sites through which users couldsearch indexes for dot-torrent files pointing to infringing movies and o<strong>the</strong>r c<strong>on</strong>tent. The courtfound <strong>the</strong> defendants liable for inducement of infringement and rejected asserti<strong>on</strong> of a safeharbor under Secti<strong>on</strong> 512(a) – because of <strong>the</strong> way <strong>the</strong> BitTorrent protocol worked, infringingmaterials did not pass through <strong>the</strong> defendants’ system, which <strong>the</strong> court ruled was a prerequisitefor <strong>the</strong> Secti<strong>on</strong> 512(a) safe harbor. 1768(ii)Caching – Secti<strong>on</strong> 512(b)Secti<strong>on</strong> 512(b) provides that a Service Provider is not liable for m<strong>on</strong>etary relief, and issubject <strong>on</strong>ly to limited injunctive relief, for caching (i.e., what Secti<strong>on</strong> 512(b) calls <strong>the</strong>“intermediate and temporary storage”) of material <strong>on</strong> a system or network operated by <strong>the</strong>Service Provider which was made available <strong>on</strong>line by a pers<strong>on</strong> o<strong>the</strong>r than <strong>the</strong> ServiceProvider. 1769 Such caching must occur through an automatic technical process up<strong>on</strong> <strong>the</strong> original1766 Id.1767 2009 U.S. Dist. LEXIS (C.D. Cal. Dec. 21, 2009).1768 Id. at *60 n.26.1769 Secti<strong>on</strong> 512(b) provides: “(1) Limitati<strong>on</strong> <strong>on</strong> liability – A service provider shall not be liable for m<strong>on</strong>etaryrelief, or, except as provided in subsecti<strong>on</strong> (j), for injunctive or o<strong>the</strong>r equitable relief, for infringement ofcopyright by reas<strong>on</strong> of <strong>the</strong> intermediate and temporary storage of material <strong>on</strong> a system or network c<strong>on</strong>trolled oroperated by or for <strong>the</strong> service provider in a case in which –(A) <strong>the</strong> material is made available <strong>on</strong>line by a pers<strong>on</strong> o<strong>the</strong>r than <strong>the</strong> service provider;(B) <strong>the</strong> material is transmitted from <strong>the</strong> pers<strong>on</strong> described in subparagraph (A) through <strong>the</strong> system or network toa pers<strong>on</strong> o<strong>the</strong>r than <strong>the</strong> pers<strong>on</strong> described in subparagraph (A) at <strong>the</strong> directi<strong>on</strong> of <strong>the</strong> o<strong>the</strong>r pers<strong>on</strong>; and(C) <strong>the</strong> storage is carried out through an automatic technical process for <strong>the</strong> purpose of making <strong>the</strong> materialavailable to users of <strong>the</strong> system or network who, after <strong>the</strong> material is transmitted as described in subparagraph(B), request access to <strong>the</strong> material from <strong>the</strong> pers<strong>on</strong> described in subparagraph (A),if <strong>the</strong> c<strong>on</strong>diti<strong>on</strong>s set forth in paragraph (2) are met.(2) C<strong>on</strong>diti<strong>on</strong>s – The c<strong>on</strong>diti<strong>on</strong>s referred to in paragraph (1) are that –(A) <strong>the</strong> material described in paragraph (1) is transmitted to <strong>the</strong> subsequent users described in paragraph (1)(C)without modificati<strong>on</strong> to its c<strong>on</strong>tent from <strong>the</strong> manner in which <strong>the</strong> material was transmitted from <strong>the</strong> persodescribed in paragraph (1)(A);(B) <strong>the</strong> service provider described in paragraph (1) complies with rules c<strong>on</strong>cerning <strong>the</strong> refreshing, reloading, oro<strong>the</strong>r updating of <strong>the</strong> material when specified by <strong>the</strong> pers<strong>on</strong> making <strong>the</strong> material available <strong>on</strong>line in accordancewith a generally accepted industry standard data communicati<strong>on</strong>s protocol for <strong>the</strong> system or network throughwhich that pers<strong>on</strong> makes <strong>the</strong> material available, except that this subparagraph applies <strong>on</strong>ly if those rules are notused by <strong>the</strong> pers<strong>on</strong> described in paragraph (1)(A) to prevent or unreas<strong>on</strong>ably impair <strong>the</strong> intermediate storage towhich this subsecti<strong>on</strong> applies;- 384 -


transmissi<strong>on</strong> of such material to a requester, in order to make <strong>the</strong> material available tosubsequent pers<strong>on</strong>s requesting it from <strong>the</strong> pers<strong>on</strong> who first made it available <strong>on</strong>line. Thus, <strong>the</strong>literal language of Secti<strong>on</strong> 512(b) appears not to cover “advance” caching, in which material iscopied into a cache for anticipated requests for it, ra<strong>the</strong>r than up<strong>on</strong> <strong>the</strong> first actual request forit, 1770 although <strong>the</strong> case of Field v. Google, discussed in <strong>the</strong> next subsecti<strong>on</strong>, reached a c<strong>on</strong>traryresult.In additi<strong>on</strong>, <strong>the</strong> safe harbor requires that <strong>the</strong> Service Provider must (i) not modify <strong>the</strong>cached material; (ii) comply with all rules of <strong>the</strong> originator of <strong>the</strong> material for refreshing,reloading or o<strong>the</strong>r updating of <strong>the</strong> cached material in accordance with a generally acceptedindustry standard data communicati<strong>on</strong>s protocol (provided such rules are not used by <strong>the</strong>originator to unreas<strong>on</strong>ably impair intermediate storage); (iii) not interfere with any technologyassociated with <strong>the</strong> cached material that returns informati<strong>on</strong> to <strong>the</strong> originator (such as cookies)that would have been obtained in <strong>the</strong> absence of transmissi<strong>on</strong> through caching (provided suchtechnology does not interfere with <strong>the</strong> performance of <strong>the</strong> system or network, is c<strong>on</strong>sistent withaccepted industry standard communicati<strong>on</strong>s protocols, and does not extract o<strong>the</strong>r informati<strong>on</strong>from <strong>the</strong> system or network); (iv) if <strong>the</strong> originator has c<strong>on</strong>diti<strong>on</strong>ed access to <strong>the</strong> informati<strong>on</strong>,(C) <strong>the</strong> service provider does not interfere with <strong>the</strong> ability of technology associated with <strong>the</strong> material to returnto <strong>the</strong> pers<strong>on</strong> described in paragraph (1)(A) <strong>the</strong> informati<strong>on</strong> that would have been available to that pers<strong>on</strong> if <strong>the</strong>material had been obtained by <strong>the</strong> subsequent users described in paragraph (1)(C) directly from that pers<strong>on</strong>,except that this subparagraph applies <strong>on</strong>ly if that technology –(i) does not significantly interfere with <strong>the</strong> performance of <strong>the</strong> provider’s system or network or with <strong>the</strong>intermediate storage of <strong>the</strong> material;(ii) is c<strong>on</strong>sistent with generally accepted industry standard communicati<strong>on</strong>s protocols; and(iii) does not extract informati<strong>on</strong> from <strong>the</strong> provider’s system or network o<strong>the</strong>r than <strong>the</strong> informati<strong>on</strong> thatwould have been available to <strong>the</strong> pers<strong>on</strong> described in paragraph (1)(A) if <strong>the</strong> subsequent users had gainedaccess to <strong>the</strong> material directly from that pers<strong>on</strong>;(D) if <strong>the</strong> pers<strong>on</strong> described in paragraph (1)(A) has in effect a c<strong>on</strong>diti<strong>on</strong> that a pers<strong>on</strong> must meet prior to havingaccess to <strong>the</strong> material, such as a c<strong>on</strong>diti<strong>on</strong> based <strong>on</strong> payment of a fee or provisi<strong>on</strong> of a password or o<strong>the</strong>rinformati<strong>on</strong>, <strong>the</strong> service provider permits access to <strong>the</strong> stored material in significant part <strong>on</strong>ly to users of itssystem or network that have met those c<strong>on</strong>diti<strong>on</strong>s and <strong>on</strong>ly in accordance with those c<strong>on</strong>diti<strong>on</strong>s; and(E) if <strong>the</strong> pers<strong>on</strong> described in paragraph (1)(A) makes that material available <strong>on</strong>line without <strong>the</strong> authorizati<strong>on</strong>of <strong>the</strong> copyright owner of <strong>the</strong> material, <strong>the</strong> service provider resp<strong>on</strong>ds expeditiously to remove, or disable accessto, <strong>the</strong> material that is claimed to be infringing up<strong>on</strong> notificati<strong>on</strong> of claimed infringement as described insubsecti<strong>on</strong> (c)(3), except that this subparagraph applies <strong>on</strong>ly if –(i) <strong>the</strong> material has previously been removed from <strong>the</strong> originating site or access to it has been disabled, or acourt has ordered that <strong>the</strong> material be removed from <strong>the</strong> originating site or that access to <strong>the</strong> material <strong>on</strong> <strong>the</strong>originating site be disabled; and(ii) <strong>the</strong> party giving <strong>the</strong> notificati<strong>on</strong> includes in <strong>the</strong> notificati<strong>on</strong> a statement c<strong>on</strong>firming that <strong>the</strong> material hasbeen removed from <strong>the</strong> originating site or access to it has been disabled or that a court has ordered that <strong>the</strong>material be removed from <strong>the</strong> originating site or that access to <strong>the</strong> material <strong>on</strong> <strong>the</strong> originating site be disabled.”1770 See also H.R. Rep. No. 105-551 Part 2, at 52 (1998): “For subsecti<strong>on</strong> (b) to apply, <strong>the</strong> material must be madeavailable <strong>on</strong> an originating site, transmitted at <strong>the</strong> directi<strong>on</strong> of ano<strong>the</strong>r pers<strong>on</strong> through <strong>the</strong> system or networkoperated by or for <strong>the</strong> service provider to a different pers<strong>on</strong>, and stored through an automatic technical processso that users of <strong>the</strong> system or network who subsequently request access to <strong>the</strong> material from <strong>the</strong> originating sitemay obtain access to <strong>the</strong> material from <strong>the</strong> system or network.”- 385 -


such as up<strong>on</strong> payment of a fee or provisi<strong>on</strong>s of a password, permit access to <strong>the</strong> cachedinformati<strong>on</strong> “in significant part” 1771 <strong>on</strong>ly up<strong>on</strong> <strong>the</strong> same c<strong>on</strong>diti<strong>on</strong>s; and (v) resp<strong>on</strong>dexpeditiously to remove or disable access to any cached informati<strong>on</strong> up<strong>on</strong> receipt of notice thatsuch informati<strong>on</strong> has been removed or disabled from <strong>the</strong> originating site (or ordered by a court tobe removed) from which <strong>the</strong> informati<strong>on</strong> was cached.a. Field v. Google. The facts of <strong>the</strong> case of Field v.Google 1772 are set forth in Secti<strong>on</strong> III.B.4(a) above. In that case, <strong>the</strong> court ruled that Google wasentitled to <strong>the</strong> Secti<strong>on</strong> 512(b) safe harbor for its activities of caching web sites through its Webcrawler known as <strong>the</strong> “Googlebot” and making <strong>the</strong> cached copies of particular pages availablefor download directly from Google’s computers by end users clicking <strong>on</strong> <strong>the</strong> “Cached” link to aweb page c<strong>on</strong>tained in search results returned by Google’s search engine.The court rejected a number of arguments by <strong>the</strong> plaintiff, Field, c<strong>on</strong>cerning why Googleshould not be entitled to <strong>the</strong> Secti<strong>on</strong> 512(b) safe harbor. First, Field c<strong>on</strong>tended that, in operatingits cache, Google did not make “intermediate and temporary storage” of <strong>the</strong> cached material, asrequired by Secti<strong>on</strong> 412(b)(1). The court cited <strong>the</strong> Ellis<strong>on</strong> v. Roberts<strong>on</strong> case, 1773 involving <strong>the</strong>Secti<strong>on</strong> 512(a) safe harbor, which ruled that AOL’s storage of Usenet postings for about 14 dayswas both “intermediate” and “transient” as required by Secti<strong>on</strong> 512(a). Analogizing to that case,<strong>the</strong> court noted that <strong>the</strong> copy of Web pages Google stored in its cache were present forapproximately 14 to 20 days. The court found that this period was sufficiently short to bedeemed “temporary” under Secti<strong>on</strong> 512(b). 1774In a significant aspect of its ruling, <strong>the</strong> court also implicitly held that, to qualify for <strong>the</strong>Secti<strong>on</strong> 512(b) safe harbor, <strong>the</strong> caching need not be d<strong>on</strong>e <strong>on</strong>ly after a user has made an initialrequest for <strong>the</strong> materials being cached, but could be d<strong>on</strong>e in anticipati<strong>on</strong> of user requests for <strong>the</strong>materials: “Like AOL’s repository of Usenet postings in Ellis<strong>on</strong> which operated between <strong>the</strong>individuals posting informati<strong>on</strong> and <strong>the</strong> users requesting it, Google’s cache is a repository ofmaterial that operates between <strong>the</strong> individual posting <strong>the</strong> informati<strong>on</strong>, and <strong>the</strong> end-userrequesting it.” 1775Field also c<strong>on</strong>tended that Google’s cache did not satisfy <strong>the</strong> requirements of Secti<strong>on</strong>512(b)(1)(B) that <strong>the</strong> material in questi<strong>on</strong> be transmitted from <strong>the</strong> pers<strong>on</strong> who makes it available<strong>on</strong>line, here <strong>the</strong> plaintiff, to a pers<strong>on</strong> o<strong>the</strong>r than himself, at <strong>the</strong> directi<strong>on</strong> of <strong>the</strong> o<strong>the</strong>r pers<strong>on</strong>. 1776The court rejected this argument: “Field transmitted <strong>the</strong> material in questi<strong>on</strong>, <strong>the</strong> pages of hisWeb site, to Google’s Googlebot at Google’s request. Google is a pers<strong>on</strong> o<strong>the</strong>r than Field.1771 This language appears to have been inserted in recogniti<strong>on</strong> of <strong>the</strong> fact that hackers or o<strong>the</strong>rs may be able tocircumvent such restricti<strong>on</strong>s <strong>on</strong> access without knowledge of <strong>the</strong> Service Provider. Id. at 7.1772 412 F. Supp. 2d 1106 (D. Nev. 2006).1773 357 F.3d 1072, 1081 (9 th Cir. 2004).1774 Field v. Google, 412 F. Supp. 2d at 1124.1775 Id.1776 Id.- 386 -


Thus, Google’s cached meets <strong>the</strong> requirement of Secti<strong>on</strong> 512(b)(1)(B).” 1777 Here <strong>the</strong> courtappears to have misidentified <strong>the</strong> parties that Secti<strong>on</strong> 512(b)(1)(B) is directed to, although <strong>the</strong>misidentificati<strong>on</strong> would not seem to change <strong>the</strong> c<strong>on</strong>clusi<strong>on</strong> that Secti<strong>on</strong> 512(b)(1)(B) is satisfied.Specifically, <strong>the</strong> court’s quoted language treats Google as <strong>the</strong> “o<strong>the</strong>r pers<strong>on</strong>.” However, becauseGoogle is acting as <strong>the</strong> service provider, it should not be treated as <strong>the</strong> “o<strong>the</strong>r pers<strong>on</strong>.” Ra<strong>the</strong>r,Google’s users are <strong>the</strong> “o<strong>the</strong>r pers<strong>on</strong>s” to whom Secti<strong>on</strong> 512(b)(1)(B) appears to be directed.Finally, Field c<strong>on</strong>tended that Google’s cache did not fully satisfy <strong>the</strong> requirements ofSecti<strong>on</strong> 512(b)(1)(C) requiring that Google’s storage of Web pages be carried out through “anautomated technical process” and be “for <strong>the</strong> purpose of making <strong>the</strong> material available to users… who … request access to <strong>the</strong> material from [<strong>the</strong> originating site].” 1778 The court rejected thisargument, noting that Field’s complaint stated that third party web page c<strong>on</strong>tent was added to <strong>the</strong>Google cache by an automated software process. Nor was <strong>the</strong>re any dispute that <strong>on</strong>e of Google’sprincipal purposes in including Web pages in its cache was to enable subsequent users to accessthose pages if <strong>the</strong>y were unsuccessful in requesting <strong>the</strong> materials from <strong>the</strong> originating site forwhatever reas<strong>on</strong>, which was sufficient to meet <strong>the</strong> requirements of Secti<strong>on</strong> 512(b)(1)(C).Accordingly, <strong>the</strong> court granted Google’s moti<strong>on</strong> for partial summary judgment that it qualifiedfor <strong>the</strong> Secti<strong>on</strong> 512(b) safe harbor. 1779 b. Parker v. Google. In Parker v. Google, 1780 <strong>the</strong> courtruled, citing Field v. Google, that Google had immunity under Secti<strong>on</strong> 512(b) for claims of directinfringement based <strong>on</strong> Google’s automatic caching of USENET messages, including an excerptof <strong>the</strong> plaintiff’s copyrighted work that he had posted to USENET, as a means of indexing websites and producing results to search queries. 1781 Similar to Field v. Google, <strong>the</strong> court did notimpose any requirement that, to qualify for <strong>the</strong> Secti<strong>on</strong> 512(b) safe harbor, <strong>the</strong> caching must bed<strong>on</strong>e <strong>on</strong>ly after a user has made an initial request for <strong>the</strong> materials being cached, but ra<strong>the</strong>r couldbe d<strong>on</strong>e in anticipati<strong>on</strong> of user requests for <strong>the</strong> materials.Secti<strong>on</strong> 512(c)(iii) Innocent Storage of Infringing Informati<strong>on</strong> –Secti<strong>on</strong> 512(c) provides that a service provider is not liable for m<strong>on</strong>etary relief, and issubject <strong>on</strong>ly to limited injunctive relief, for storage at <strong>the</strong> directi<strong>on</strong> of a user of infringingmaterial <strong>on</strong> its system or network where <strong>the</strong> service provider does not have actual knowledgethat <strong>the</strong> material is infringing; is not aware of facts or circumstances from which infringingactivity is apparent; does not receive a financial benefit directly attributable to any infringingactivity for which it has <strong>the</strong> right and ability to c<strong>on</strong>trol; and, if properly noticed of <strong>the</strong> infringingactivity by <strong>the</strong> copyright holder or its authorized agent, or o<strong>the</strong>rwise obtaining knowledge or1777 Id.1778 Id.1779 Id. at 1124-25.1780 422 F. Supp. 2d 492 (E.D. Pa. 2006), aff’d, 2007 U.S. App. LEXIS (3d Cir. July 10, 2007).1781 Id. at 497-98. The issue of immunity under Secti<strong>on</strong> 512(b) was not addressed by <strong>the</strong> Third Circuit <strong>on</strong> appeal.- 387 -


awareness of <strong>the</strong> infringement, resp<strong>on</strong>ds expeditiously to remove or disable access to <strong>the</strong>infringing material. 1782The service provider can become aware of infringing activity ei<strong>the</strong>r by notice from <strong>the</strong>copyright holder (or its authorized agent) or by virtue of o<strong>the</strong>r facts or circumstances of which itbecomes aware. Absent direct notice from <strong>the</strong> copyright holder or its agent, <strong>the</strong> standard ofawareness of infringing activity appears by its terms to require more knowledge <strong>on</strong> <strong>the</strong> part of<strong>the</strong> service provider than a “should have known” (or reas<strong>on</strong> to know) standard. Specifically, itrequires that <strong>the</strong> service provider have actual awareness of facts from which infringing activity isapparent. The legislative history describes <strong>the</strong> standard of awareness as a “red flag” test. “[I]f<strong>the</strong> service provider becomes aware of a ‘red flag’ from which infringing activity is apparent, itwill lose <strong>the</strong> limitati<strong>on</strong> of liability if it takes no acti<strong>on</strong>. The ‘red flag’ test has both a subjectiveand an objective element. In determining whe<strong>the</strong>r <strong>the</strong> service provider was aware of a ‘red flag,’<strong>the</strong> subjective awareness of <strong>the</strong> service provider of <strong>the</strong> facts or circumstances in questi<strong>on</strong> must bedetermined. However, in deciding whe<strong>the</strong>r those facts or circumstances c<strong>on</strong>stitute a ‘red flag’ –in o<strong>the</strong>r words, whe<strong>the</strong>r infringing activity would have been apparent to a reas<strong>on</strong>able pers<strong>on</strong>operating under <strong>the</strong> same or similar circumstances – an objective standard should be used.” 1783Secti<strong>on</strong> 512(c)(3) specifies <strong>the</strong> requirements for proper notice of infringement by <strong>the</strong>copyright holder to <strong>the</strong> Service Provider, which c<strong>on</strong>stitutes a written communicati<strong>on</strong> provided to<strong>the</strong> designated agent of <strong>the</strong> Service Provider that includes “substantially” <strong>the</strong> following: 17841782 Secti<strong>on</strong> 512(c) provides: “A service provider shall not be liable for m<strong>on</strong>etary relief, or, except as provided insubsecti<strong>on</strong> (j), for injunctive or o<strong>the</strong>r equitable relief, for infringement of copyright by reas<strong>on</strong> of <strong>the</strong> storage at<strong>the</strong> directi<strong>on</strong> of a user of material that resides <strong>on</strong> a system or network c<strong>on</strong>trolled or operated by or for <strong>the</strong>service provider, if <strong>the</strong> service provider –(A)(i) does not have actual knowledge that <strong>the</strong> material or an activity using <strong>the</strong> material <strong>on</strong> <strong>the</strong> system ornetwork is infringing;(ii) in <strong>the</strong> absence of such actual knowledge, is not aware of facts or circumstances from which infringingactivity is apparent; or(iii) up<strong>on</strong> obtaining such knowledge or awareness, acts expeditiously to remove, or disable access to, <strong>the</strong>material;(B) does not receive a financial benefit directly attributable to <strong>the</strong> infringing activity, in a case in which <strong>the</strong>service provider has <strong>the</strong> right and ability to c<strong>on</strong>trol such activity; and(C) up<strong>on</strong> notificati<strong>on</strong> of claimed infringement as described in paragraph (3), resp<strong>on</strong>ds expeditiously to remove,or disable access to, <strong>the</strong> material that is claimed to be infringing or to be <strong>the</strong> subject of infringing activity.”1783 H.R. Rep. No. 105-551 Part 2, at 53 (1998).1784 Secti<strong>on</strong> 512(c)(3) provides: “Elements of notificati<strong>on</strong> –(A) To be effective under this subsecti<strong>on</strong>, a notificati<strong>on</strong> of claimed infringement must be a writtencommunicati<strong>on</strong> provided to <strong>the</strong> designated agent of a service provider that includes substantially <strong>the</strong> following:(i) A physical or electr<strong>on</strong>ic signature of a pers<strong>on</strong> authorized to act <strong>on</strong> behalf of <strong>the</strong> owner of an exclusiveright that is allegedly infringed.(ii) Identificati<strong>on</strong> of <strong>the</strong> copyrighted work claimed to have been infringed, or, if multiple copyrightedworks at a single <strong>on</strong>line site are covered by a single notificati<strong>on</strong>, a representative list of such works at that site.- 388 -


identificati<strong>on</strong> of <strong>the</strong> copyrighted work or a representative list of works at <strong>the</strong> site (ifmultiple copyrighted works at a single <strong>on</strong>line site are covered by a singlenotificati<strong>on</strong>); 1785identificati<strong>on</strong> of <strong>the</strong> infringing material in sufficient detail to permit <strong>the</strong> Service Providerto locate <strong>the</strong> material;informati<strong>on</strong> (including an e-mail address) where <strong>the</strong> complaining party can be c<strong>on</strong>tacted;anda statement signed by physical signature or electr<strong>on</strong>ic signature under penalty of perjurythat <strong>the</strong> complaining party has <strong>the</strong> authority to enforce <strong>the</strong> rights that are claimed to beinfringed and a good faith belief that use of <strong>the</strong> material in <strong>the</strong> manner complained of isnot authorized by <strong>the</strong> copyright owner, its agent, or <strong>the</strong> law.Secti<strong>on</strong> 512(c)(3)(B)(ii) provides that, if a notice complies with at least <strong>the</strong> first three of <strong>the</strong>preceding requirements, <strong>the</strong>n in order to take advantage of <strong>the</strong> safe harbor, <strong>the</strong> Service Providermust promptly attempt to c<strong>on</strong>tact <strong>the</strong> complaining party or take o<strong>the</strong>r reas<strong>on</strong>able steps to assist in<strong>the</strong> receipt of notificati<strong>on</strong> that substantially complies with all <strong>the</strong> preceding requirements fornotice.(iii) Identificati<strong>on</strong> of <strong>the</strong> material that is claimed to be infringing or to be <strong>the</strong> subject of infringing activityand that is to be removed or access to which is to be disabled, and informati<strong>on</strong> reas<strong>on</strong>ably sufficient to permit<strong>the</strong> service provider to locate <strong>the</strong> material.(iv) Informati<strong>on</strong> reas<strong>on</strong>ably sufficient to permit <strong>the</strong> service provider to c<strong>on</strong>tact <strong>the</strong> complaining party, suchas an address, teleph<strong>on</strong>e number, and, if available, an electr<strong>on</strong>ic mail address at which <strong>the</strong> complaining partymay be c<strong>on</strong>tacted.(v) A statement that <strong>the</strong> complaining party has a good faith belief that use of <strong>the</strong> material in <strong>the</strong> mannercomplained of is not authorized by <strong>the</strong> copyright owner, its agent, or <strong>the</strong> law.(vi) A statement that <strong>the</strong> informati<strong>on</strong> in <strong>the</strong> notificati<strong>on</strong> is accurate, and under penalty of perjury, that <strong>the</strong>complaining party is authorized to act <strong>on</strong> behalf of <strong>the</strong> owner of an exclusive right that is allegedly infringed.(B)(i) Subject to clause (ii), a notificati<strong>on</strong> from a copyright owner or from a pers<strong>on</strong> authorized to act <strong>on</strong> behalfof <strong>the</strong> copyright owner that fails to comply substantially with <strong>the</strong> provisi<strong>on</strong>s of subparagraph (A) shall not bec<strong>on</strong>sidered under paragraph (1)(A) in determining whe<strong>the</strong>r a service provider has actual knowledge or is awareof facts or circumstances from which infringing activity is apparent.(ii) In a case in which <strong>the</strong> notificati<strong>on</strong> that is provided to <strong>the</strong> service provider’s designated agent fails tocomply substantially with all <strong>the</strong> provisi<strong>on</strong>s of subparagraph (A) but substantially complies with clauses (ii),(iii), and (iv) of subparagraph (A), clause (i) of this subparagraph applies <strong>on</strong>ly if <strong>the</strong> service provider promptlyattempts to c<strong>on</strong>tact <strong>the</strong> pers<strong>on</strong> making <strong>the</strong> notificati<strong>on</strong> or takes o<strong>the</strong>r reas<strong>on</strong>able steps to assist in <strong>the</strong> receipt ofnotificati<strong>on</strong> that substantially complies with all <strong>the</strong> provisi<strong>on</strong>s of subparagraph (A).”1785 A notice may cover multiple works: “Where multiple works at a single <strong>on</strong>-line site are covered by a singlenotificati<strong>on</strong>, a representative list of such works at that site is sufficient.” H.R. Rep. No. 105-551 Part 2, at 55(1998); see 17 U.S.C. § 512(c)(3)(A)(ii). What c<strong>on</strong>stitutes an adequate “representative list” of works wasadjudicated in <strong>the</strong> case of ALS Scan, Inc. v. RemarQ Communities, Inc., 239 F.3d 619 (4th Cir. 2001),discussed below.- 389 -


The DMCA does not define what c<strong>on</strong>stitutes a “direct financial benefit” from <strong>the</strong>infringing activity, but presumably <strong>the</strong> mere receipt of m<strong>on</strong>thly subscripti<strong>on</strong> fees from <strong>the</strong>infringing user would not be a “direct” financial benefit from <strong>the</strong> infringing activity. 1786 It is alsounclear what c<strong>on</strong>stitutes sufficient “right and ability to c<strong>on</strong>trol” <strong>the</strong> infringing activity. MostService Providers impose certain rules <strong>on</strong> <strong>the</strong> users of <strong>the</strong>ir system, but, as a practical matter, d<strong>on</strong>ot and are not able to c<strong>on</strong>trol <strong>the</strong> myriad individual acti<strong>on</strong>s of users of <strong>the</strong> system. The samephrase – “right and ability to c<strong>on</strong>trol” – appears in <strong>the</strong> safe harbor of Secti<strong>on</strong> 512(d) as well,which was asserted in <strong>the</strong> Napster case, as discussed in subsecti<strong>on</strong> (iv) below.Finally, to take advantage of this safe harbor, <strong>the</strong> OSP must designate an agent to receivenotificati<strong>on</strong>s of claimed infringements and make available <strong>the</strong> c<strong>on</strong>tact informati<strong>on</strong> for such agentthrough its service and through <strong>the</strong> U.S. <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office. The specifics for designati<strong>on</strong> of suchagent are set forth in subsecti<strong>on</strong> (6) below.Several cases have interpreted and adjudicated <strong>the</strong> scope of <strong>the</strong> Secti<strong>on</strong> 512(c) safeharbor:a. The ALS Scan Case – What C<strong>on</strong>stitutes a“Substantially” Compliant Notice. The issue of what c<strong>on</strong>stitutes a “substantially” compliantnotice under Secti<strong>on</strong> 512(c)(3) was addressed in <strong>the</strong> case of ALS Scan, Inc. v. RemarQCommunities, Inc. 1787 In that case, <strong>the</strong> defendant RemarQ was an OSP that provided access toits members to over 30,000 newsgroups. RemarQ did not m<strong>on</strong>itor, regulate, or censor <strong>the</strong>c<strong>on</strong>tent of articles posted in <strong>the</strong> newsgroups, but did have <strong>the</strong> ability to filter informati<strong>on</strong>c<strong>on</strong>tained in <strong>the</strong> newsgroups and to screen its members from logging <strong>on</strong>to certain newsgroups,such as those c<strong>on</strong>taining pornographic material. 1788 The plaintiff ALS Scan, Inc. (ALS Scan)was in <strong>the</strong> business of creating and marketing “adult” photographs. The plaintiff discovered thattwo newsgroups <strong>on</strong> <strong>the</strong> RemarQ service – both of which had “als” in <strong>the</strong>ir titles (alt.als andalt.binaries.pictures.erotica.als) – c<strong>on</strong>tained virtually nothing o<strong>the</strong>r than unauthorizedphotographs owned by ALS Scan. ALS Scan sent a cease and desist letter to RemarQ,demanding that RemarQ block access to both of <strong>the</strong> newsgroups at issue. 1789RemarQ resp<strong>on</strong>ded by refusing to comply with ALS Scan’s demand but advising ALSScan that RemarQ would eliminate individual infringing items from <strong>the</strong> newsgroups if ALS Scan1786 “In general, a service provider c<strong>on</strong>ducting a legitimate business would not be c<strong>on</strong>sidered to receive a ‘financialbenefit directly attributable to <strong>the</strong> infringing activity’ where <strong>the</strong> infringer makes <strong>the</strong> same kind of payment asn<strong>on</strong>infringing users of <strong>the</strong> provider’s service. Thus, receiving a <strong>on</strong>e-time set-up fee and flat, periodic paymentsfor service from a pers<strong>on</strong> engaging in infringing activities would not c<strong>on</strong>stitute receiving a ‘financial benefitdirectly attributable to <strong>the</strong> infringing activity.’ Nor is subsecti<strong>on</strong> (c)(1)(B) intended to cover fees based <strong>on</strong> <strong>the</strong>length of <strong>the</strong> message (e.g., per number of bytes) or by c<strong>on</strong>nect time. It would however, include any such feeswhere <strong>the</strong> value of <strong>the</strong> service lies in providing access to infringing material.” H.R. Rep. No. 105-551 Part 2, at54 (1998).1787 239 F.3d 619 (4 th Cir. 2001).1788 Id. at 620.1789 Id.- 390 -


identified <strong>the</strong>m “with sufficient specificity.” 1790 ALS Scan filed suit, alleging copyrightinfringement and violati<strong>on</strong>s of Title II of <strong>the</strong> DMCA. In resp<strong>on</strong>se, RemarQ filed a moti<strong>on</strong> todismiss <strong>the</strong> complaint or, in <strong>the</strong> alternative, for summary judgment, and attached affidavitsstating that it was prepared to remove articles posted in its newsgroups if <strong>the</strong> allegedly infringingarticles were specifically identified as required by <strong>the</strong> DMCA. The district court dismissed <strong>the</strong>complaint, ruling that RemarQ could not be liable for c<strong>on</strong>tributory infringement because ALSScan failed to comply with <strong>the</strong> notice requirements of Secti<strong>on</strong> 512(c)(3)(A) of <strong>the</strong> DMCA. 1791On appeal, ALS Scan c<strong>on</strong>tended that it “substantially” complied with <strong>the</strong> noticerequirements of <strong>the</strong> DMCA and that it <strong>the</strong>refore put RemarQ sufficiently <strong>on</strong> notice ofinfringement activities that RemarQ lost its immunity under <strong>the</strong> DMCA by failing to remove <strong>the</strong>infringing material. RemarQ argued in resp<strong>on</strong>se that it did not have knowledge of <strong>the</strong> infringingactivity as a matter of law because ALS Scan failed to identify <strong>the</strong> infringing works as requiredby <strong>the</strong> DMCA, and RemarQ was entitled to <strong>the</strong> safe harbor provisi<strong>on</strong>s of <strong>the</strong> DMCA. 1792The Fourth Circuit reversed <strong>on</strong> two grounds. First, <strong>the</strong> court noted that, in order to beentitled to <strong>the</strong> safe harbor of Secti<strong>on</strong> 512(c), an OSP must satisfy all three of <strong>the</strong> safe harborrequirements of Secti<strong>on</strong> 512(c)(1), specifically, that: (i) it has nei<strong>the</strong>r actual knowledge that itssystem c<strong>on</strong>tains infringing materials nor awareness of facts or circumstances from whichinfringement is apparent, or it has expeditiously removed or disabled access to infringingmaterial up<strong>on</strong> obtaining actual knowledge of infringement; (ii) it receives no financial benefitdirectly attributable to infringing activity; and (iii) it resp<strong>on</strong>ded expeditiously to remove ordisable access to material claimed to be infringing after receiving notice from <strong>the</strong> copyrightholder c<strong>on</strong>forming to <strong>the</strong> requirements of Secti<strong>on</strong> 512(c)(3). The Fourth Circuit held that “ashowing under <strong>the</strong> first pr<strong>on</strong>g – <strong>the</strong> lack of actual or c<strong>on</strong>structive knowledge – is prior to andseparate from <strong>the</strong> showings that must be made under <strong>the</strong> sec<strong>on</strong>d and third pr<strong>on</strong>gs.” 1793 TheFourth Circuit noted that, although it had treated RemarQ’s moti<strong>on</strong> as a moti<strong>on</strong> to dismiss, ra<strong>the</strong>rthan as a moti<strong>on</strong> for summary judgment, it had failed to take into account <strong>the</strong> allegati<strong>on</strong> in <strong>the</strong>complaint that RemarQ had actual knowledge of <strong>the</strong> infringing nature of <strong>the</strong> two newsgroupseven before being c<strong>on</strong>tacted by ALS Scan. Although this allegati<strong>on</strong> was denied by RemarQ, <strong>the</strong>Fourth Circuit noted that <strong>the</strong> district court was required to accept <strong>the</strong> allegati<strong>on</strong> as true forpurposes of testing <strong>the</strong> adequacy of <strong>the</strong> complaint under F.R.C.P. 12(b)(6). 1794Sec<strong>on</strong>d, whe<strong>the</strong>r or not RemarQ’s moti<strong>on</strong> was treated as <strong>on</strong>e to dismiss or for summaryjudgment, <strong>the</strong> Fourth Circuit held that ALS Scan had substantially complied with <strong>the</strong> noticerequirement of <strong>the</strong> third pr<strong>on</strong>g. The district court had found that ALS Scan’s notice failed tocomply with two of <strong>the</strong> six requirements of notificati<strong>on</strong> – namely, that <strong>the</strong> notice include a list ofinfringing works <strong>on</strong> <strong>the</strong> RemarQ site and that <strong>the</strong> notice identify <strong>the</strong> infringing works in1790 Id. at 621.1791 Id.1792 Id. at 622.1793 Id. at 623.1794 Id.- 391 -


sufficient detail to enable RemarQ to locate and disable <strong>the</strong>m (per Secti<strong>on</strong> 512(c)(3)(A)(ii) &(iii)). 1795 The Fourth Circuit disagreed, noting that under Secti<strong>on</strong> 512(c)(3)(A), a notice needcomply with <strong>the</strong> prescribed format <strong>on</strong>ly “substantially,” and under Secti<strong>on</strong> 512(c)(3)(A)(ii), acopyright holder need <strong>on</strong>ly provide a “representative” list of infringed works <strong>on</strong> <strong>the</strong> site. 1796 Thecourt stated: “This subsecti<strong>on</strong> specifying <strong>the</strong> requirements of a notificati<strong>on</strong> does not seek toburden copyright holders with <strong>the</strong> resp<strong>on</strong>sibility of identifying every infringing work – or evenmost of <strong>the</strong>m – when multiple copyrights are involved. Instead, <strong>the</strong> requirements are written soas to reduce <strong>the</strong> burden of holders of multiple copyrights who face extensive infringement of<strong>the</strong>ir works. Thus, when a letter provides notice equivalent to a list of representative works thatcan be easily identified by <strong>the</strong> service provider, <strong>the</strong> notice substantially complies with <strong>the</strong>notificati<strong>on</strong> requirements.” 1797The Fourth Circuit found that <strong>on</strong> <strong>the</strong> particular facts of <strong>the</strong> case, ALS Scan’s noticec<strong>on</strong>stituted an adequate representative list of infringed works and substantially complied with <strong>the</strong>DMCA notice requirements:In this case, ALS Scan provided RemarQ with informati<strong>on</strong> that (1) identified twosites created for <strong>the</strong> sole purpose of publishing ALS Scan’s copyrighted works,(2) asserted that virtually all <strong>the</strong> images at <strong>the</strong> two sites were its copyrightedmaterial, and (3) referred RemarQ to two web addresses where RemarQ couldfind pictures of ALS Scan’s models 1798 and obtain ALS Scan’s copyrightinformati<strong>on</strong>. In additi<strong>on</strong>, it noted that material at <strong>the</strong> site could be identified asALS Scan’s material because <strong>the</strong> material included ALS Scan’s ‘name and/orcopyright symbol next to it.’ We believe that with this informati<strong>on</strong>, ALS Scansubstantially complied with <strong>the</strong> notificati<strong>on</strong> requirement of providing arepresentative list of infringing material as well as informati<strong>on</strong> reas<strong>on</strong>ablysufficient to enable RemarQ to locate <strong>the</strong> infringing material. 17991795 Id. at 621.1796 Id. at 625.1797 Id.1798 It is curious that <strong>the</strong> Fourth Circuit found <strong>the</strong> supplied Web address where RemarQ could find pictures of ALSScan’s models to aid ALS Scan’s argument that RemarQ had adequate notice of what particular infringingphotographs were c<strong>on</strong>tained <strong>on</strong> RemarQ’s site. The referenced Web address c<strong>on</strong>tained adult “teaser” photos of<strong>the</strong> ALS Scan models. There is nothing in <strong>the</strong> opini<strong>on</strong> of <strong>the</strong> court indicating that <strong>the</strong> “teaser” photos were <strong>the</strong>actual <strong>on</strong>es allegedly <strong>on</strong> <strong>the</strong> RemarQ site. Ra<strong>the</strong>r, <strong>the</strong> argument seems to be that <strong>the</strong> “teaser” photos wouldidentify what <strong>the</strong> ALS Scan models looked like. Is <strong>the</strong> Fourth Circuit implying that RemarQ <strong>the</strong>n bore <strong>the</strong>burden to go look at <strong>the</strong> photos <strong>on</strong> <strong>the</strong> newsgroups at issue to see if <strong>the</strong>y c<strong>on</strong>tained pictures of <strong>the</strong> same humansas those in <strong>the</strong> “teaser” photos? Perhaps <strong>the</strong> truly key facts were that <strong>the</strong> infringing photos in <strong>the</strong> newsgroupswere identified with ALS Scan’s name and/or copyright notice and <strong>the</strong>y were all c<strong>on</strong>tained in <strong>on</strong>e “place” –namely, a couple of particular newsgroups almost entirely devoted to ALS Scan photos.1799 Id.- 392 -


Because RemarQ had received adequate notice of infringement and had failed to act toremove <strong>the</strong> infringing material, it was not entitled to <strong>the</strong> safe harbor of <strong>the</strong> DMCA. 1800 TheFourth Circuit observed that <strong>the</strong> immunity of <strong>the</strong> DMCA “is not presumptive, but granted <strong>on</strong>ly to‘innocent’ service providers who can prove <strong>the</strong>y do not have actual or c<strong>on</strong>structive knowledge of<strong>the</strong> infringement, as defined under any of <strong>the</strong> three pr<strong>on</strong>gs of 17 U.S.C. § 512(c)(1). TheDMCA’s protecti<strong>on</strong> of an innocent service provider disappears at <strong>the</strong> moment <strong>the</strong> serviceprovider loses its innocence; i.e., at <strong>the</strong> moment it becomes aware that a third party is using itssystem to infringe. At that point, <strong>the</strong> Act shifts resp<strong>on</strong>sibility to <strong>the</strong> service provider to disable<strong>the</strong> infringing material ….” 1801 The Fourth Circuit remanded <strong>the</strong> case for fur<strong>the</strong>r proceedings <strong>on</strong>ALS Scan’s copyright infringement claims and any o<strong>the</strong>r affirmative defenses that RemarQmight have. 1802There are a few less<strong>on</strong>s to be learned from <strong>the</strong> ALS Scan case. First, where multiplecopyrighted works are allegedly infringed, a copyright holder need not specifically identify allparticular instances of infringing material at <strong>the</strong> site in order to give adequate notice to <strong>the</strong>Service Provider sufficient to give rise to a duty <strong>on</strong> its part to act in order to preserve <strong>the</strong> DMCAsafe harbors. Sec<strong>on</strong>d, at least in <strong>the</strong> specific factual scenario where all <strong>the</strong> allegedly infringingmaterial is c<strong>on</strong>tained in a single area such as a newsgroup, and <strong>the</strong> area comprises almost allinfringing material, <strong>the</strong> Service Provider may need to remove or block access to <strong>the</strong> entire areaas a precauti<strong>on</strong> to preserve <strong>the</strong> safe harbor. It might have been sufficient for RemarQ to haveremoved or blocked access <strong>on</strong>ly to those photos within <strong>the</strong> newsgroups that bore ALS Scan’sname or copyright notice (<strong>the</strong> opini<strong>on</strong> does not address this questi<strong>on</strong>) – but even if so, it appearsthat <strong>the</strong> Fourth Circuit may have c<strong>on</strong>templated that RemarQ, and not ALS Scan, would bear <strong>the</strong>burden of identifying <strong>the</strong> individual photos for removal or blocking access to. Third, <strong>the</strong>decisi<strong>on</strong> suggests that a Service Provider may not be wise to rely <strong>on</strong> certain failures <strong>on</strong> <strong>the</strong> partof a copyright holder to comply with all <strong>the</strong> technical notice requirements of Secti<strong>on</strong> 512(c)(3) asa basis for not having to act to remove or block allegedly infringing material. If a court laterdetermines that <strong>the</strong> notice was “substantially” compliant, <strong>the</strong> Service Provider may have lost itsDMCA safe harbor by failing to act.In sum, <strong>the</strong> ALS Scan case reflected a ra<strong>the</strong>r low threshold of knowledge of infringingactivity, at least under <strong>the</strong> specific facts of <strong>the</strong> case, and a ra<strong>the</strong>r lax applicati<strong>on</strong> of <strong>the</strong> technicalnotice requirements of Secti<strong>on</strong> 512(c). The net effect of <strong>the</strong>se rulings was to make <strong>the</strong> Secti<strong>on</strong>512(c) safe harbor ra<strong>the</strong>r fragile for <strong>the</strong> OSP. Subsequent cases have given <strong>the</strong> Secti<strong>on</strong> 512(c)safe harbor a str<strong>on</strong>ger reading in favor of <strong>the</strong> OSP and have insisted <strong>on</strong> a stricter compliancewith <strong>the</strong> technical notice requirements <strong>on</strong> <strong>the</strong> part of <strong>the</strong> copyright holder:b. Hendricks<strong>on</strong> v. eBay. In Hendricks<strong>on</strong> v. eBayInc., 1803 <strong>the</strong> plaintiff Hendricks<strong>on</strong>, a pro se plaintiff, sought to hold defendant eBay Inc.sec<strong>on</strong>darily liable for <strong>the</strong> sale through <strong>the</strong> eBay aucti<strong>on</strong> site of allegedly infringing copies of <strong>the</strong>1800 Id. at 625-26.1801 Id. at 625.1802 Id. at 626.1803 165 F. Supp. 2d 1082 (C.D. Cal. 2001).- 393 -


documentary film “Mans<strong>on</strong>” in DVD format. The plaintiff sent a cease and desist letter to eBay,which stated generally that pirated copies of “Mans<strong>on</strong>” were being offered for sale <strong>on</strong> eBay, butdid not explain which copies of “Mans<strong>on</strong>” were infringing, nor did it identify <strong>the</strong> plaintiff’scopyright interest. eBay resp<strong>on</strong>ded by requesting that <strong>the</strong> plaintiff comply with <strong>the</strong> noticerequirements of Secti<strong>on</strong> 512(c), and suggesting that <strong>the</strong> plaintiff submit a copy of eBay’s “Noticeof Infringement” form, which would comply with <strong>the</strong> notice requirements of <strong>the</strong> DMCA andwould specify which particular item numbers (each listing <strong>on</strong> eBay’s site had its own itemnumber) were infringing so eBay could remove <strong>the</strong>m. The plaintiff refused to submit <strong>the</strong> Noticeof Infringement form or o<strong>the</strong>rwise specify which particular items <strong>on</strong> eBay were allegedlyinfringing, and instead filed a copyright infringement lawsuit. 1804eBay asserted <strong>the</strong> safe harbor of Secti<strong>on</strong> 512(c) as a defense. The court began its analysisby noting that <strong>the</strong>re was no dispute over whe<strong>the</strong>r eBay qualified as a “service provider” within<strong>the</strong> meaning of Secti<strong>on</strong> 512(k)(1)(B). 1805 The court noted that Secti<strong>on</strong> 512(c) was <strong>the</strong>appropriate safe harbor potentially applicable to eBay because that safe harbor applies toinfringing “activity using <strong>the</strong> material <strong>on</strong>” an OSP’s system. 1806The court <strong>the</strong>n turned to an analysis of <strong>the</strong> issue of proper notice of infringement. UnderSecti<strong>on</strong> 512(c)(1)(C), a service provider’s duty to act to remove material that is <strong>the</strong> subject ofinfringing activity is “triggered <strong>on</strong>ly up<strong>on</strong> receipt of proper notice” substantially compliant with<strong>the</strong> required elements of notificati<strong>on</strong> set forth in Secti<strong>on</strong> 512(c)(3). 1807 As a preliminary matter,<strong>the</strong> court rejected <strong>the</strong> plaintiff’s argument that he need not submit written notificati<strong>on</strong> incompliance with <strong>the</strong> notice requirements of Secti<strong>on</strong> 512(c)(3) “as l<strong>on</strong>g as o<strong>the</strong>r facts show <strong>the</strong>service provider received actual or c<strong>on</strong>structive knowledge of infringing activity.” 1808 The courtreplied that, under Secti<strong>on</strong> 512(c)(3)(B)(i), if <strong>the</strong> copyright holder’s attempted notificati<strong>on</strong> failsto comply substantially with <strong>the</strong> elements of Secti<strong>on</strong> 512(c)(3), <strong>the</strong>n <strong>the</strong> notificati<strong>on</strong> cannot bec<strong>on</strong>sidered when evaluating whe<strong>the</strong>r <strong>the</strong> service provider had actual or c<strong>on</strong>structive knowledgeof <strong>the</strong> infringing activity. 1809Because <strong>the</strong> plaintiff admitted that he had not strictly complied with <strong>the</strong> noticerequirements of Secti<strong>on</strong> 512(c)(3), <strong>the</strong> court turned to an analysis of whe<strong>the</strong>r his imperfectattempt to give notice c<strong>on</strong>stituted “substantial” compliance, and ruled that it did not because hisnotice did not include several key elements for proper notificati<strong>on</strong>:– There was no written statement attesting under penalty of perjury that <strong>the</strong> informati<strong>on</strong>in <strong>the</strong> notificati<strong>on</strong> was accurate and that <strong>the</strong> plaintiff was authorized to act <strong>on</strong> behalf of <strong>the</strong>copyright owner, or that <strong>the</strong> plaintiff had a good faith belief that use of <strong>the</strong> material in <strong>the</strong>manner complained of was not authorized. The court held that <strong>the</strong> plaintiff’s complete failure to1804 Id. at 1084-85.1805 Id. at 1088.1806 Id. (quoting 17 U.S.C. § 512(c)(1)(A)(i)).1807 165 F. Supp. 2d at 1089.1808 Id.1809 Id.- 394 -


supply <strong>the</strong> preceding two elements, even after eBay specifically asked for <strong>the</strong>m, rendered <strong>the</strong>plaintiff’s notificati<strong>on</strong> of claimed infringement deficient under Secti<strong>on</strong> 512(c)(3). 1810– There was not sufficient informati<strong>on</strong> to identify <strong>the</strong> various listings <strong>on</strong> eBay thatpurportedly offered pirated copies of “Mans<strong>on</strong>,” and <strong>the</strong> plaintiff had refused to supply suchinformati<strong>on</strong> when specifically asked by eBay. 1811 The plaintiff c<strong>on</strong>tended that it was “not his jobto do so <strong>on</strong>ce he has notified eBay of <strong>the</strong> existence of infringing activity by eBay sellers.” 1812The court rejected this argument, stating: “The Court recognizes that <strong>the</strong>re may be instanceswhere a copyright holder need not provide eBay with specific item numbers to satisfy <strong>the</strong>identificati<strong>on</strong> requirement. For example, if a movie studio advised eBay that all listings offeringto sell a new movie (e.g., ‘Planet X,’) that has not yet been released in VHS or DVD format areunlawful, eBay could easily search its website using <strong>the</strong> title ‘Planet X’ and identify <strong>the</strong>offensive listings. However, <strong>the</strong> record in this case indicates that specific item numbers werenecessary to enable eBay to identify problematic listings.” 1813– There was no written statement to eBay that all DVD copies of “Mans<strong>on</strong>” wereunauthorized copies. Although <strong>the</strong> plaintiff stated at oral argument that he had orally notifiedeBay that all copies of “Mans<strong>on</strong>” in DVD format were unauthorized, this was insufficientbecause it was not in writing. “The writing requirement is not <strong>on</strong>e of <strong>the</strong> elements listed under<strong>the</strong> substantial compliance category [of Secti<strong>on</strong> 512(c)(3)(A).] Therefore, <strong>the</strong> Court disregardsall evidence that purports to show Plaintiff gave notice that all DVDs violate his copyright in‘Mans<strong>on</strong>.’” 1814The court rejected two o<strong>the</strong>r arguments offered by <strong>the</strong> plaintiff c<strong>on</strong>cerning why he shouldnot be required to supply eBay with specific item numbers of allegedly infringing copies. First,he argued that he had supplied eBay with user IDs of four alleged infringers, and <strong>the</strong> user IDsshould be sufficient notice to locate <strong>the</strong> listings offering pirated copies of “Mans<strong>on</strong>.” The courtruled <strong>the</strong> notice of user IDs insufficient because <strong>the</strong> email c<strong>on</strong>taining <strong>the</strong> user IDs did notidentify ei<strong>the</strong>r <strong>the</strong> listings claimed to be <strong>the</strong> subject of infringing activity or describe <strong>the</strong>infringing activity, nor did it c<strong>on</strong>tain a statement attesting to <strong>the</strong> good faith and accuracy of <strong>the</strong>allegati<strong>on</strong>s. 1815 Sec<strong>on</strong>d, <strong>the</strong> plaintiff argued that eBay could identify listings offering infringingcopies without item numbers because eBay had previously removed two listings even though <strong>the</strong>plaintiff did not provide <strong>the</strong> item numbers. The court rejected this argument also, noting that <strong>the</strong>plaintiff had identified <strong>on</strong>e of <strong>the</strong> sellers that eBay removed, who because it had <strong>on</strong>ly a single1810 Id. at 1089-90.1811 Id. at 1090.1812 Id.1813 Id.1814 Id. at 1091. Similarly, noting Plaintiff’s admissi<strong>on</strong> that authorized copies of “Mans<strong>on</strong>” had been released inVHS format, <strong>the</strong> Court ruled that <strong>the</strong> plaintiff had offered not explanati<strong>on</strong> to eBay how it could determinewhich “Mans<strong>on</strong>” VHS topes being offered for sale were unauthorized copies. Id.1815 Id.- 395 -


listing at <strong>the</strong> time of removal, eBay had removed out of an abundance of cauti<strong>on</strong>, and <strong>the</strong> recorddid not reflect why eBay removed <strong>the</strong> sec<strong>on</strong>d listing. 1816In sum, <strong>the</strong> court ruled that proper identificati<strong>on</strong> under Secti<strong>on</strong> 512(c)(3)(A)(iii) shouldinclude <strong>the</strong> item numbers of <strong>the</strong> listings that were allegedly offering pirated copies of“Mans<strong>on</strong>.” 1817 Because <strong>the</strong> plaintiff had failed to submit a written notice substantiallycomplying with <strong>the</strong> notice requirements of Secti<strong>on</strong> 512(c), eBay did not have a duty to act underSecti<strong>on</strong> 512(c)(1)(C) to remove <strong>the</strong> allegedly infringing listings, and would <strong>the</strong>refore be entitledto <strong>the</strong> Secti<strong>on</strong> 512(c) safe harbor if it met <strong>the</strong> remaining pr<strong>on</strong>gs of <strong>the</strong> safe harbor test: 1818– Absence of Actual or C<strong>on</strong>structive Notice: Because <strong>the</strong> plaintiff’s notices did notsubstantially comply with <strong>the</strong> notice requirements of Secti<strong>on</strong> 512(c), <strong>the</strong> court ruled that <strong>the</strong>ycould not, as a matter of law, establish actual or c<strong>on</strong>structive knowledge that particular listingswere involved in infringing activity. Since <strong>the</strong> record showed that eBay o<strong>the</strong>rwise did not haveactual or c<strong>on</strong>structive knowledge before <strong>the</strong> lawsuit was filed, <strong>the</strong> court ruled that eBay hadsatisfied <strong>the</strong> first pr<strong>on</strong>g of <strong>the</strong> safe harbor test under Secti<strong>on</strong> 512(c)(1)(A). 1819– Right and Ability to C<strong>on</strong>trol <strong>the</strong> Infringing Activity: Under Secti<strong>on</strong> 512(c)(1)(B),eBay was required to show that it did not receive a financial benefit directly attributable to <strong>the</strong>infringing activity in a case in which it had <strong>the</strong> right and ability to c<strong>on</strong>trol such activity. Thecourt ruled that, because <strong>the</strong> undisputed facts established that eBay did not have <strong>the</strong> right andability to c<strong>on</strong>trol <strong>the</strong> infringing activity, <strong>the</strong> court need not evaluate <strong>the</strong> financial benefitelement. 1820 Plaintiff argued that eBay had <strong>the</strong> ability to c<strong>on</strong>trol infringing activity based <strong>on</strong> itsability to remove infringing listings after receiving proper notificati<strong>on</strong>, and its program ofprophylactic searching for apparent infringements based <strong>on</strong> searching its website daily forgeneric key words such as “bootleg,” “pirated,” “counterfeit” and “taped off TV” that mightindicate potentially infringing activity. 1821 The court rejected <strong>the</strong>se arguments, first noting <strong>the</strong>Catch 22 that would arise if <strong>the</strong> mere ability to remove infringing materials were sufficient tosatisfy <strong>the</strong> c<strong>on</strong>trol pr<strong>on</strong>g, since <strong>the</strong> DMCA requires an OSP to remove infringing materials:[T]he ‘right and ability to c<strong>on</strong>trol’ <strong>the</strong> infringing activity, as <strong>the</strong> c<strong>on</strong>cept is used in<strong>the</strong> DMCA, cannot simply mean <strong>the</strong> ability of a service provider to remove orblock access to materials posted <strong>on</strong> its website or stored in its system. To holdo<strong>the</strong>rwise would defeat <strong>the</strong> purpose of <strong>the</strong> DMCA and render <strong>the</strong> statute internallyinc<strong>on</strong>sistent. The DMCA specifically requires a service provider to remove orblock access to materials posted <strong>on</strong> its system when it receives notice of claimedinfringement. The DMCA also provides that <strong>the</strong> limitati<strong>on</strong>s <strong>on</strong> liability <strong>on</strong>lyapply to a service provider that has ‘adopted and reas<strong>on</strong>ably implemented … a1816 Id. at 1091-92.1817 Id. at 1092.1818 Id.1819 Id. at 1093.1820 Id.1821 Id. at 1093 & n. 14.- 396 -


policy that provides for <strong>the</strong> terminati<strong>on</strong> in appropriate circumstances of [users] of<strong>the</strong> service provider’s system or network who are repeat infringers.’ C<strong>on</strong>gresscould not have intended for courts to hold that a service provider loses immunityunder <strong>the</strong> safe harbor provisi<strong>on</strong> of <strong>the</strong> DMCA because it engages in acts that arespecifically required by <strong>the</strong> DMCA.” 1822Nor could eBay’s voluntary practice of engaging in limited m<strong>on</strong>itoring of its website forapparent infringements satisfy <strong>the</strong> c<strong>on</strong>trol pr<strong>on</strong>g. The court cited a passage of <strong>the</strong> legislativehistory of <strong>the</strong> DMCA stating that courts “should not c<strong>on</strong>clude that <strong>the</strong> service provider loseseligibility for limitati<strong>on</strong>s <strong>on</strong> liability under secti<strong>on</strong> 512 solely because it engaged in a m<strong>on</strong>itoringprogram.” 1823 Finally, <strong>the</strong> court noted that <strong>the</strong> infringing activity actually took place offline in<strong>the</strong> form of <strong>the</strong> sales and distributi<strong>on</strong> of pirated copies of “Mans<strong>on</strong>,” and that eBay could notc<strong>on</strong>trol such offline activity. 1824The court c<strong>on</strong>cluded that eBay had established that it met <strong>the</strong> test for <strong>the</strong> safe harborunder Secti<strong>on</strong> 512(c), and accordingly granted eBay summary judgment <strong>on</strong> <strong>the</strong> plaintiff’scopyright claims. 1825Important Principles. The Hendricks<strong>on</strong> v. eBay case establishes a number of significantpoints about <strong>the</strong> Secti<strong>on</strong> 512(c) safe harbor. First, insofar as <strong>the</strong> OSP receives notice of allegedinfringement <strong>on</strong> its system from <strong>the</strong> copyright holder, such notice must be in writing and mustsubstantially comply with <strong>the</strong> technical notice requirements of Secti<strong>on</strong> 512(c). The OSP can, ofcourse, receive actual or c<strong>on</strong>structive notice through channels o<strong>the</strong>r than <strong>the</strong> copyright holder,but notice from <strong>the</strong> copyright holder must come in written form in order to trigger <strong>the</strong> OSP’sduty to act <strong>on</strong> that informati<strong>on</strong>. The ALS Scan case is c<strong>on</strong>sistent <strong>on</strong> this point, since in <strong>the</strong> ALSScan case, notice from <strong>the</strong> copyright holder was in writing. Sec<strong>on</strong>d, <strong>the</strong> copyright holder bears<strong>the</strong> burden to identify specific instances of infringing activity <strong>on</strong> <strong>the</strong> system. It is insufficient toidentify <strong>on</strong>ly <strong>the</strong> users who are committing allegedly infringing acts without fur<strong>the</strong>ridentificati<strong>on</strong> of <strong>the</strong> infringing materials that are <strong>the</strong> subject of those acts. Third, nei<strong>the</strong>r <strong>the</strong>OSP’s mere ability to terminate infringing users or activity, or <strong>the</strong> OSP’s voluntary policing ofits system or website, will of <strong>the</strong>mselves be sufficient to establish “c<strong>on</strong>trol” of <strong>the</strong> infringingactivity for purposes of adjudicating <strong>the</strong> availability of <strong>the</strong> Secti<strong>on</strong> 512(c) defense.1822 Id. at 1093 (citati<strong>on</strong>s omitted).1823 Id. at 1094 (quoting House Report 105-796 at 73 (Oct. 8, 1998)).1824 165 F. Supp. 2d at 1094. This is an interesting holding, since removing <strong>the</strong> listing from eBay’s service wouldhave had <strong>the</strong> derivative effect of c<strong>on</strong>trolling <strong>the</strong> ability of users to make offline purchases and distributi<strong>on</strong>s in<strong>the</strong> first place. The same rati<strong>on</strong>ale would seem to apply to <strong>the</strong> Napster service, in which Napster could notc<strong>on</strong>trol whe<strong>the</strong>r its users elected to make downloads of allegedly infringing materials posted <strong>on</strong> <strong>the</strong> Napsterindex, which downloads did not pass through <strong>the</strong> Napster servers. Notwithstanding this fact, <strong>the</strong> district courtin <strong>the</strong> Napster case, as discussed above, found that Napster did in fact have sufficient “c<strong>on</strong>trol” over <strong>the</strong>infringing activity by virtue of its c<strong>on</strong>trol over <strong>the</strong> listings in <strong>the</strong> Napster index.1825 Id. The court also held that eBay’s immunity under <strong>the</strong> safe harbor extended to <strong>the</strong> plaintiff’s claims againsteBay employees. Id. at 1094-95.- 397 -


c. CoStar v. LoopNet. In CoStar Group Inc. v. LoopNet,Inc., 1826 <strong>the</strong> plaintiff CoStar maintained a copyrighted commercial real estate database thatincluded photographs. The defendant LoopNet offered a service through which a user, usually areal estate broker, could post a listing of commercial real estate available for lease. The userwould access, fill out, and submit a form for <strong>the</strong> property available. To include a photograph of<strong>the</strong> property, <strong>the</strong> user was required to fill out ano<strong>the</strong>r form. The photograph would initially beuploaded into a separate folder <strong>on</strong> LoopNet’s system, where it would first be reviewed by aLoopNet employee to determine that it was in fact a photograph of commercial property and that<strong>the</strong>re was no obvious indicati<strong>on</strong> <strong>the</strong> photograph was submitted in violati<strong>on</strong> of LoopNet’s termsand c<strong>on</strong>diti<strong>on</strong>s. If <strong>the</strong> photograph met LoopNet’s criteria, <strong>the</strong> employee would accept it and postit al<strong>on</strong>g with <strong>the</strong> property listing. CoStar claimed that over 300 of its copyrighted photographshad been posted <strong>on</strong> LoopNet’s site, and sued LoopNet for both direct and c<strong>on</strong>tributory copyrightliability. 1827 The court entered a preliminary injuncti<strong>on</strong> against LoopNet. CoStar <strong>the</strong>n moved forsummary judgment <strong>on</strong> LoopNet’s liability, and LoopNet moved for summary judgment <strong>on</strong>n<strong>on</strong>infringement and its entitlement to <strong>the</strong> safe harbor of Secti<strong>on</strong> 512(c).CoStar argued that LoopNet should be directly liable for copyright infringement because,acting through its employees’ review and subsequent posting of <strong>the</strong> photographs, LoopNet wasdirectly copying and distributing <strong>the</strong> photographs, citing <strong>the</strong> Frena case discussed above inSecti<strong>on</strong> II.A.4(d). The court rejected this argument, noting that <strong>the</strong> Fourth Circuit in <strong>the</strong> ALSScan case had c<strong>on</strong>cluded that <strong>the</strong> legislative history of <strong>the</strong> DMCA indicated C<strong>on</strong>gress’ intent tooverrule <strong>the</strong> Frena case and to follow <strong>the</strong> Netcom case, under which an OSP’s liability forpostings by its users must be judged under <strong>the</strong> c<strong>on</strong>tributory infringement doctrine. 1828The court <strong>the</strong>n turned to an analysis of c<strong>on</strong>tributory infringement and <strong>the</strong> safe harbor ofSecti<strong>on</strong> 512(c) of <strong>the</strong> DMCA asserted by LoopNet. CoStar argued, citing <strong>the</strong> F<strong>on</strong>ovisa “swapmeet” case 1829 that was relied <strong>on</strong> by <strong>the</strong> Ninth Circuit in <strong>the</strong> Napster I case, 1830 that <strong>on</strong>ce it hadgiven LoopNet notice of specific alleged infringements, LoopNet had sufficient knowledge of<strong>on</strong>going infringements by its users to be liable for c<strong>on</strong>tributory infringement based <strong>on</strong> its failureto take more “drastic measures” to prevent infringement. 1831 LoopNet argued that it could not beliable for c<strong>on</strong>tributory infringement because it had no knowledge of <strong>the</strong> infringements prior t<strong>on</strong>otice from CoStar, and it disc<strong>on</strong>tinued access to <strong>the</strong> infringing material immediately up<strong>on</strong>discovery. LoopNet also argued that its DMCA policy for removal of infringing material and ofdenying access to repeat infringers was sufficient both to give it <strong>the</strong> benefit of <strong>the</strong> Secti<strong>on</strong> 512(c)safe harbor and to avoid comm<strong>on</strong> law c<strong>on</strong>tributory liability. 18321826 164 F. Supp. 2d 688 (D. Md. 2001), aff’d, 373 F.3d 544 (4 th Cir. 2004).1827 Id. at 691-92.1828 Id. at 695-96.1829 F<strong>on</strong>ovisa v. Cherry Aucti<strong>on</strong>, 76 F.3d 259 (9 th Cir. 1996).1830 A&M Records v. Napster, Inc., 239 F.3d 1004 (9 th Cir. 2001).1831 CoStar, 164 F. Supp. 2d at 696-97.1832 Id. at 697-98.- 398 -


Turning first to <strong>the</strong> issue of knowledge, <strong>the</strong> court held that LoopNet did not haveknowledge of <strong>the</strong> alleged infringements prior to receiving notice from CoStar, based <strong>on</strong> <strong>the</strong> factsthat CoStar did not attach copyright notices to its photographs and LoopNet did not know whatrights CoStar may have granted in license agreements to users of its commercial real estatedatabase c<strong>on</strong>taining <strong>the</strong> photographs. 1833 Citing <strong>the</strong> Netcom case, <strong>the</strong> court ruled, “In <strong>the</strong> case ofa service provider, knowledge giving rise to liability <strong>on</strong>ly exists when <strong>the</strong>re is no colorable claimof users’ n<strong>on</strong>infringement.” 1834 LoopNet could <strong>the</strong>refore not be charged with any form ofknowledge before receiving claims of infringement from CoStar. The central issue, <strong>the</strong>n, waswhe<strong>the</strong>r LoopNet’s policies to deter infringement, remove infringing works, and prevent repeatinfringement were adequate both under <strong>the</strong> comm<strong>on</strong> law and for purposes of <strong>the</strong> DMCA safeharbor. 1835 In an important ruling, <strong>the</strong> court held that <strong>the</strong> parameters of <strong>the</strong> liability protecti<strong>on</strong>provided by <strong>the</strong> Secti<strong>on</strong> 512(c) safe harbor were “not c<strong>on</strong>tiguous with <strong>the</strong> bounds of liability forc<strong>on</strong>tributory infringement.” 1836 This is c<strong>on</strong>trary to <strong>the</strong> opposite c<strong>on</strong>clusi<strong>on</strong> reached by <strong>the</strong>district court in an early decisi<strong>on</strong> in <strong>the</strong> Napster case, 1837 later reversed by <strong>the</strong> Ninth Circuit, 1838that <strong>the</strong> parameters for safe harbor liability protecti<strong>on</strong> and comm<strong>on</strong> law c<strong>on</strong>tributory liabilitywere c<strong>on</strong>tiguous, and <strong>the</strong> safe harbor could <strong>the</strong>refore not protect c<strong>on</strong>tributory infringers.The court <strong>the</strong>n turned to a detailed analysis of whe<strong>the</strong>r CoStar was entitled to <strong>the</strong> benefitof <strong>the</strong> Secti<strong>on</strong> 512(c) safe harbor. As a threshold matter, <strong>the</strong> court held that <strong>the</strong> definiti<strong>on</strong> of“service provider” under Secti<strong>on</strong> 512(k)(1)(B) was broad and easily encompassed <strong>the</strong> type ofservice provided by LoopNet. 1839 The court also ruled that <strong>the</strong> safe harbor could not protectLoopNet for any alleged infringements taking place before December 8, 1999, <strong>the</strong> date thatLoopNet designated an agent to receive notificati<strong>on</strong>s of claimed infringement under <strong>the</strong> DMCA,as required by Secti<strong>on</strong> 512(c)(2) of <strong>the</strong> DMCA. 1840 The court <strong>the</strong>n turned to an analysis ofseveral specific issues under <strong>the</strong> safe harbor.Storage at <strong>the</strong> Instance of <strong>the</strong> User. CoStar argued that <strong>the</strong> Secti<strong>on</strong> 512(c) safe harborshould not apply at all because <strong>the</strong> allegedly infringing photographs were uploaded to <strong>the</strong> site<strong>on</strong>ly after review and selecti<strong>on</strong> by LoopNet and so were not stored at <strong>the</strong> instance of LoopNet’susers. The court rejected this argument, reas<strong>on</strong>ing that <strong>the</strong> photographs were uploaded at <strong>the</strong>voliti<strong>on</strong> of <strong>the</strong> LoopNet users and that LoopNet subjected <strong>the</strong>m <strong>on</strong>ly to a gateway screening1833 Id. at 698. The court fur<strong>the</strong>r noted that <strong>the</strong> fact that CoStar’s employees were involved in manually examiningphotographs before <strong>the</strong>y were posted <strong>on</strong> <strong>the</strong> site did not change <strong>the</strong> knowledge analysis. “LoopNet has peoplechecking photographs for purposes o<strong>the</strong>r than copyright infringement and CoStar’s own experts could notdistinguish between a CoStar and n<strong>on</strong>-CoStar photograph up<strong>on</strong> inspecti<strong>on</strong>.” Id. at 700 n. 6.1834 Id. at 698. This is a ra<strong>the</strong>r high standard for knowledge for c<strong>on</strong>tributory infringement – it seems that in <strong>the</strong>many circumstances in which an OSP does not have any direct involvement with its users’ postings of materials<strong>on</strong> its site, <strong>the</strong> OSP will be unable to be certain that <strong>the</strong>re is “no colorable claim” of its users’ n<strong>on</strong>infringement.1835 Id. at 698-99.1836 Id. at 699.1837 A&M Records, Inc. v. Napster, Inc., 114 F. Supp. 2d 896, 919 n. 24 (N.D. Cal. 2000).1838 A&M Records, Inc. v. Napster, Inc., 239 F.3d 1004, 1025 (9th Cir. 2001).1839 CoStar, 164 F. Supp. 2d at 701.1840 Id. at 697 & n.4.- 399 -


process, not a selecti<strong>on</strong> process. The court also held that <strong>the</strong> mere ability to remove or blockaccess to materials could not mean that those materials were not stored at <strong>the</strong> user’s discreti<strong>on</strong>.Noting that Secti<strong>on</strong> 512 mandates a “take down” procedure to qualify for <strong>the</strong> Secti<strong>on</strong> 512(c) safeharbor, <strong>the</strong> court held that it would be internally illogical if <strong>the</strong> statute were c<strong>on</strong>strued to meanthat in order to get into <strong>the</strong> safe harbor, an OSP needed to lack c<strong>on</strong>trol to remove or blockaccess. 1841Knowledge for Purposes of <strong>the</strong> Safe Harbor. Turning to <strong>the</strong> issue of knowledge, <strong>the</strong>court noted that three types of knowledge could take a service provider outside <strong>the</strong> safe harbor:(i) actual knowledge; (2) awareness of facts raising a “red flag” that its users are infringing; and(iii) notificati<strong>on</strong> from <strong>the</strong> copyright holder in compliance with <strong>the</strong> technical notice requirementsof Secti<strong>on</strong> 512(c)(3). The court noted that a service provider does not automatically lose <strong>the</strong> safeharbor up<strong>on</strong> receiving notice, but <strong>the</strong> DMCA shifts resp<strong>on</strong>sibility to <strong>the</strong> service provider todisable <strong>the</strong> infringing material. 1842 Specifically, “[i]f <strong>the</strong> service provider has actual knowledgeunder § 512(c)(1)(A)(i) or ‘red flag’ knowledge under § 512(c)(1)(A)(ii), <strong>the</strong> ‘take down’provisi<strong>on</strong>s of § 512(c)(1)(A)(iii) must be met to stay in <strong>the</strong> safe harbor. Alternatively, if itreceives notificati<strong>on</strong> of claimed infringement in accordance with § 512(c)(3), <strong>the</strong> ‘take down’provisi<strong>on</strong>s of § 512(c)(1)(C) must be met.” 1843Because LoopNet had not challenged <strong>the</strong> adequacy of notificati<strong>on</strong> it had received fromCoStar, <strong>the</strong> court turned to <strong>the</strong> adequacy of LoopNet’s removal policy. The court noted thatLoopNet had two resp<strong>on</strong>sibilities after receipt of notice from <strong>the</strong> copyright holder: 1844 First,under Secti<strong>on</strong> 512(c)(1)(C), it must resp<strong>on</strong>d “expeditiously to remove, or disable access to, <strong>the</strong>material that is claimed to be infringing or to be <strong>the</strong> subject of infringing activity.” Sec<strong>on</strong>d,under Secti<strong>on</strong> 512(i)(1)(A), it must adopt and reas<strong>on</strong>ably implement, and inform subscribers of,a policy “that provides for <strong>the</strong> terminati<strong>on</strong> in appropriate circumstances of subscribers andaccount holders of <strong>the</strong> service provider’s system or network who are repeat infringers.”The court ruled that factual issues <strong>on</strong> each of <strong>the</strong>se two issues precluded summaryjudgment: CoStar claimed that LoopNet had failed to remove several photographs after beingnotified that <strong>the</strong>y were infringing and that several photographs had been posted more than <strong>on</strong>ceafter notificati<strong>on</strong>. CoStar also alleged that <strong>the</strong>re was no evidence LoopNet had ever terminatedany user’s access despite <strong>the</strong> fact that some of <strong>the</strong>m had an extensive history as repeatinfringers. 1845 LoopNet countered that its “Terms and C<strong>on</strong>diti<strong>on</strong>s” for its site included <strong>the</strong>removal of listings alleged to be infringing and <strong>the</strong> possibility of terminati<strong>on</strong>. LoopNet alsoclaimed that it promptly removed photographs <strong>on</strong>ce it received notice of alleged infringement,sent an email to brokers explaining <strong>the</strong> potential c<strong>on</strong>sequences of repeat infringement andinvestigated brokers it suspected to be repeat infringers. It also claimed to have implementedadditi<strong>on</strong>al precauti<strong>on</strong>s to avoid reposting of infringing photographs in <strong>the</strong> future. In additi<strong>on</strong>, <strong>the</strong>1841 Id. at 701-02.1842 Id. at 702.1843 Id. at 702 n. 8.1844 Id. at 703.1845 Id.- 400 -


court noted that because LoopNet’s take down and terminati<strong>on</strong> policies had changed over time,to resolve <strong>the</strong> issue of <strong>the</strong> adequacy of those procedures, a factfinder would have to focus <strong>on</strong>each photograph alleged to be infringing and <strong>the</strong> policy in effect before <strong>the</strong> posting of eachphotograph. 1846Financial Benefit. To begin its analysis of <strong>the</strong> financial benefit pr<strong>on</strong>g of <strong>the</strong> Secti<strong>on</strong>512(c) safe harbor, <strong>the</strong> court, in a significant ruling, noted that, “[r]egardless of whe<strong>the</strong>r LoopNetcomplied with <strong>the</strong> ‘take down’ requirements, a finding that it received a direct financial benefitfrom <strong>the</strong> infringement automatically would remove it from <strong>the</strong> safe harbor. … Basically, <strong>the</strong>DMCA provides no safe harbor for vicarious infringement because it codifies both elements ofvicarious liability.” 1847 The ruling that <strong>the</strong> DMCA provides no safe harbor for vicariousinfringement seems to c<strong>on</strong>tradict <strong>the</strong> Ninth Circuit’s ruling in <strong>the</strong> Napster I case, discussed in <strong>the</strong>next subsecti<strong>on</strong>, in which <strong>the</strong> Ninth Circuit noted that “[w]e do not agree [with <strong>the</strong> districtcourt’s ruling] that Napster’s potential liability for c<strong>on</strong>tributory and vicarious infringementrenders <strong>the</strong> Digital Millennium <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act inapplicable per se.” 1848The court held that LoopNet did not meet ei<strong>the</strong>r element of <strong>the</strong> test for vicarious liability.CoStar had not asserted that LoopNet had any right to c<strong>on</strong>trol its users bey<strong>on</strong>d its mere ability toc<strong>on</strong>trol or block access to its site. The court, citing <strong>the</strong> Hendricks<strong>on</strong> v. eBay case, held that suchability to block access could not c<strong>on</strong>stitute sufficient “right and ability” to c<strong>on</strong>trol for vicariousliability. The court noted that o<strong>the</strong>rwise <strong>on</strong>e would have <strong>the</strong> illogical result that <strong>the</strong> very policyof blocking access and terminating infringers mandated by <strong>the</strong> DMCA in Secti<strong>on</strong> 512(c)(1)(C)would force service providers to lose <strong>the</strong>ir immunity by violating § 512(c)(1)(B). 1849 The courtalso ruled that LoopNet did not receive a direct financial benefit from <strong>the</strong> infringing activitybecause LoopNet did not charge a fee for posting any real estate listing, with or without aphotograph. 1850C<strong>on</strong>tributory Liability Before <strong>the</strong> Safe Harbor Applicability Date. The court next turnedto an analysis of LoopNet’s c<strong>on</strong>tributory liability for activity before December 8, 1999, <strong>the</strong> datethat LoopNet designated an agent to receive notificati<strong>on</strong>s of claimed infringement under <strong>the</strong>DMCA and <strong>the</strong>refore first became eligible for <strong>the</strong> Secti<strong>on</strong> 512(c) safe harbor. The court’sdiscussi<strong>on</strong> of comm<strong>on</strong> law liability provides a nice analysis of <strong>the</strong> interplay and differencesbetween <strong>the</strong> standards of knowledge and policing for infringing activity required under <strong>the</strong>comm<strong>on</strong> law versus <strong>the</strong> DMCA safe harbors.Knowledge for Purposes of Comm<strong>on</strong> Law Liability. CoStar argued that <strong>on</strong>ce it gaveLoopNet notice of specific infringements, LoopNet was <strong>on</strong> notice that <strong>on</strong>going infringementswere occurring and had a duty to prevent repeat infringements. LoopNet argued that it could notbe charged with imputed knowledge of future infringements. The court held that <strong>the</strong> amount of1846 Id. at 703-04.1847 Id. at 704 (citing 3 M. Nimmer & D. Nimmer, Nimmer <strong>on</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>, § 12B.04[A][2], at 12B-38 (2001)).1848 A&M Records, Inc. v. Napster, Inc., 239 F.3d 1004, 1025 (9th Cir. 2001).1849 CoStar, 164 F. Supp. 2d at 704 & n.9.1850 Id. at 704.- 401 -


policing for future infringements LoopNet would be required to do would depend up<strong>on</strong> <strong>the</strong> levelof knowledge it possessed:There is a critical interplay between <strong>the</strong> level of knowledge possessed byLoopNet as a result of CoStar’s notices and <strong>the</strong> amount of policing, deterrenceand removal demanded of LoopNet to avoid being liable for c<strong>on</strong>tributoryinfringement. If CoStar’s notice to LoopNet gave LoopNet a broad scope ofknowledge that infringements were occurring, <strong>the</strong>n it creates a high level ofpolicing necessary by LoopNet to avoid inducing infringement.The issue of <strong>the</strong> adequacy of LoopNet’s removal policy is different at this stagethan it was when assessing its adequacy for <strong>the</strong> purposes of <strong>the</strong> DMCA safeharbor. In <strong>the</strong> safe harbor c<strong>on</strong>text, <strong>the</strong> removal policy had adequately to removeinfringing or allegedly infringing material. If LoopNet met <strong>the</strong> standardfollowing notice it was shielded from damages liability by <strong>the</strong> safe harbor. In <strong>the</strong>c<strong>on</strong>text of assessing liability for c<strong>on</strong>tributory infringement, <strong>the</strong> questi<strong>on</strong> is notwhe<strong>the</strong>r LoopNet adequately removed <strong>the</strong> infringing material, but whe<strong>the</strong>r, atsome point, it created an inducement to put infringing material up <strong>on</strong> <strong>the</strong> site. 1851The court noted that, while LoopNet’s c<strong>on</strong>tinued c<strong>on</strong>trol over access to its site made itmore similar to <strong>the</strong> swap meet owner in <strong>the</strong> F<strong>on</strong>ovisa case or <strong>the</strong> BBS operator in <strong>the</strong> Maphiacase than to <strong>the</strong> mere seller of goods in <strong>the</strong> S<strong>on</strong>y case, <strong>the</strong>re were elements of knowledge in <strong>the</strong>F<strong>on</strong>ovisa and Maphia cases that <strong>the</strong> court found not present in <strong>the</strong> instant case. Instead, <strong>the</strong> courtanalogized to <strong>the</strong> Netcom case, finding that LoopNet’s circumstances resided “in that graymiddle range of cases in which <strong>the</strong> service provider has informati<strong>on</strong> suggesting, but notc<strong>on</strong>clusively dem<strong>on</strong>strating, that subscribers committed infringement. … Netcom stands for <strong>the</strong>propositi<strong>on</strong> that <strong>the</strong> bare claim of infringement by a copyright holder does not necessarily giverise to knowledge of an infringement.” 1852The court c<strong>on</strong>trasted LoopNet’s situati<strong>on</strong> from <strong>the</strong> Napster and F<strong>on</strong>ovisa cases, where <strong>the</strong>defendant had actual, specific knowledge of infringements and c<strong>on</strong>tinued to provide support andfacilities to infringers. “Thus, in order to prove its claim, CoStar needs to establish that <strong>the</strong>notice it gave to LoopNet comprised at least c<strong>on</strong>structive knowledge of specific infringingactivity which LoopNet materially c<strong>on</strong>tributed to or induced by its alleged failure to halt <strong>the</strong>activity. There remain too many material factual disputes for <strong>the</strong> court to decide <strong>on</strong> summaryjudgment ei<strong>the</strong>r that such a level of knowledge did or did not exist or that LoopNet’s acti<strong>on</strong>s intrying to stop <strong>the</strong> infringement were or were not insufficient to <strong>the</strong> point of comprising1851 Id. at 706.1852 Id. at 707. The court fur<strong>the</strong>r observed: “In <strong>the</strong> analysis of LoopNet’s safe harbor defense to liability, merenotificati<strong>on</strong> of claimed infringement by CoStar was enough to trigger <strong>on</strong>e of two scenarios. Ei<strong>the</strong>r LoopNetcould comply with <strong>the</strong> ‘take-down’ provisi<strong>on</strong>s of <strong>the</strong> DMCA and remain in <strong>the</strong> safe harbor or refuse to remove<strong>the</strong> allegedly infringing material and expose itself to <strong>the</strong> choppier waters of c<strong>on</strong>tributory infringement liability.”Id.- 402 -


inducement as a matter of law.” 1853 Accordingly, <strong>the</strong> court denied summary judgment <strong>on</strong> <strong>the</strong>issue of comm<strong>on</strong> law c<strong>on</strong>tributory liability. 1854Statutory Damage Award. CoStar elected to take a statutory damages award underSecti<strong>on</strong> 504(c)(1) of <strong>the</strong> copyright statute, which provides that <strong>the</strong> copyright owner may elect totake statutory damages in lieu of actual damages and profits for “all infringements involved in<strong>the</strong> acti<strong>on</strong>, with respect to any <strong>on</strong>e work …” The court turned to <strong>the</strong> issue of what c<strong>on</strong>stitutes a“work” for purposes of statutory damages. LoopNet argued that CoStar was limited to no morethan 13 statutory damages awards because it had <strong>on</strong>ly 13 copyright registrati<strong>on</strong>s (<strong>the</strong>photographs had been registered in groups as compilati<strong>on</strong>s). CoStar argued that each of its 348photographs c<strong>on</strong>stituted a separate work and, <strong>the</strong>refore, it was entitled to 348 separate statutorydamages awards. 1855The court noted a divisi<strong>on</strong> of authority over whe<strong>the</strong>r <strong>the</strong> copyright registrati<strong>on</strong> isdeterminative of <strong>the</strong> number of works or whe<strong>the</strong>r <strong>the</strong> determinative factor is whe<strong>the</strong>r each workis independently copyrightable. After reviewing <strong>the</strong> facts of various cases, <strong>the</strong> court c<strong>on</strong>cludedthat <strong>the</strong> critical fact was “not that CoStar registered multiple photographs <strong>on</strong> <strong>the</strong> sameregistrati<strong>on</strong> form, but whe<strong>the</strong>r it registered <strong>the</strong>m as compilati<strong>on</strong>s or as individual copyrights.” 1856The court noted that <strong>the</strong> language <strong>on</strong> <strong>the</strong> registrati<strong>on</strong> applicati<strong>on</strong> under “Nature of Authorship”<strong>on</strong> all but <strong>the</strong> first registrati<strong>on</strong> read “revised compilati<strong>on</strong> of database informati<strong>on</strong>; some originaltext and photographs.” 1857 The first registrati<strong>on</strong> read “compilati<strong>on</strong>, text, and photographs,” butunder <strong>the</strong> descripti<strong>on</strong> of <strong>the</strong> work to be registered, <strong>the</strong> form read “compilati<strong>on</strong> of public domainmaterial, substantial original text, and original photographs.” 1858 The court c<strong>on</strong>cluded that <strong>the</strong>preceding language indicated that all of <strong>the</strong> registrati<strong>on</strong>s were compilati<strong>on</strong> registrati<strong>on</strong>s, because<strong>the</strong> reference to “photographs” could <strong>on</strong>ly have efficacy as a descripti<strong>on</strong> of <strong>the</strong> work to beregistered if it was made with reference to <strong>the</strong> o<strong>the</strong>r elements being copyrighted – <strong>the</strong>compilati<strong>on</strong> of work. 1859 Accordingly, CoStar was eligible for <strong>on</strong>ly 13 statutory damage awards,corresp<strong>on</strong>ding to <strong>the</strong> number of registered compilati<strong>on</strong>s. 1860The Scope of <strong>the</strong> Preliminary Injuncti<strong>on</strong>. An interesting aspect of <strong>the</strong> case c<strong>on</strong>cerned <strong>the</strong>scope of preliminary injuncti<strong>on</strong> <strong>the</strong> court entered against LoopNet and <strong>the</strong> obligati<strong>on</strong>s <strong>the</strong> court1853 Id. at 707-08.1854 LoopNet raised a misuse defense, arguing that CoStar had misused its copyrights in <strong>the</strong> photographs byextending <strong>the</strong>m bey<strong>on</strong>d <strong>the</strong>ir intended reach to limit its licensees from distributing <strong>the</strong> entire database, includingdata and photographs in which it had no copyright. Id. at 708. The court rejected this defense with relativelylittle analysis, distinguishing o<strong>the</strong>r copyright misuse cases factually and c<strong>on</strong>cluding “<strong>the</strong>re is no allegati<strong>on</strong> ortying or abuse of copyright serious enough to offend <strong>the</strong> public policy behind copyright and rise to <strong>the</strong> level ofmisuse.” Id. at 709.1855 Id.1856 Id. at 711.1857 Id.1858 Id.1859 Id. at 711-12.1860 Id. at 712.- 403 -


imposed <strong>on</strong> LoopNet <strong>on</strong>ce it was notified that <strong>on</strong>e of its users had posted an infringingphotograph <strong>on</strong> <strong>the</strong> LoopNet system. In an earlier proceeding, <strong>the</strong> court had entered a preliminaryinjuncti<strong>on</strong> directing LoopNet to “(1) remove from its web site all photographs for which itreceived notificati<strong>on</strong> of claimed infringement from CoStar; (2) notify <strong>the</strong> user who uploaded <strong>the</strong>photograph of CoStar’s claim of <strong>the</strong> removal and that repeat acts of infringement might result inrestricti<strong>on</strong>s <strong>on</strong> <strong>the</strong> user’s (or <strong>the</strong> brokerage firm’s) access to <strong>the</strong> web site; and (3) with regard toidentified brokers, require prima facie evidence of copyright ownership prior to posting aphotograph.” 1861 Dissatisfied with LoopNet’s performance, CoStar sought a number ofsubstantial modificati<strong>on</strong>s to <strong>the</strong> requirements imposed <strong>on</strong> LoopNet, including a requirement toobtain a hand-signed written declarati<strong>on</strong> of copyright ownership prior to any posting and arequirement that any repeat infringer <strong>the</strong>reafter be prohibited from submitting any fur<strong>the</strong>rphotographs. 1862The court refused to make <strong>the</strong> modificati<strong>on</strong>s requested by CoStar. In view of its rulingswith respect to <strong>the</strong> c<strong>on</strong>tributory infringement and safe harbor issues, <strong>the</strong> court c<strong>on</strong>cluded thatCoStar had not shown a sufficient likelihood of success to justify <strong>the</strong> enhancements to <strong>the</strong> orderit sought. 1863 The court did, however, rule that a probati<strong>on</strong>/terminati<strong>on</strong> policy LoopNet had setup, in which brokers who posted infringing photographs could have <strong>the</strong>ir probati<strong>on</strong>ary statusremoved in three, six, or twelve m<strong>on</strong>th intervals, was inadequate in two respects: “First, allbrokers in an office in which any broker posted an allegedly infringing photograph after notice toany broker in that same office should be subject to <strong>the</strong> prima facie evidence requirement.” 1864Sec<strong>on</strong>d, <strong>the</strong> court required that <strong>the</strong> status of “repeat infringer,” <strong>on</strong>ce achieved, remain during <strong>the</strong>pendency of <strong>the</strong> proceedings, with no possibility of disc<strong>on</strong>tinuing such status after a timeinterval. 1865Subsequent to <strong>the</strong> district court’s rulings, <strong>the</strong> parties stipulated to <strong>the</strong> dismissal of allclaims except <strong>the</strong> district court’s summary judgment in favor of LoopNet <strong>on</strong> direct infringement,and CoStar appealed. 1866 The Fourth Circuit’s rulings with respect to <strong>the</strong> issue of directinfringement are discussed in Secti<strong>on</strong> II.A.4(i) above. With respect to <strong>the</strong> safe harbors, CoStarargued <strong>on</strong> appeal that C<strong>on</strong>gress intended <strong>the</strong> DMCA safe harbors to supplant <strong>the</strong> comm<strong>on</strong> lawimmunity of <strong>the</strong> Netcom case, and LoopNet could <strong>the</strong>refore rely solely <strong>on</strong> <strong>the</strong> safe harbors forimmunity. The Fourth Circuit rejected this argument, noting that <strong>the</strong> statute expressly states inSecti<strong>on</strong> 512(l) that <strong>the</strong> failure to qualify for limitati<strong>on</strong> of liability under <strong>the</strong> safe harbors does notbear adversely up<strong>on</strong> <strong>the</strong> c<strong>on</strong>siderati<strong>on</strong> of o<strong>the</strong>r defenses, including a defense that c<strong>on</strong>duct simplydoes not c<strong>on</strong>stitute a prima facie case of infringement. 1867 The court also rejected CoStar’sargument that, because C<strong>on</strong>gress codified Netcom in <strong>the</strong> DMCA, it can be <strong>on</strong>ly to <strong>the</strong> DMCA1861 Id. at 715.1862 Id. at 715-16.1863 Id. at 716.1864 Id.1865 Id. at 717.1866 CoStar Groups, Inc. v. LoopNet, Inc., 373 F.3d 544 (4 th Cir. 2004).1867 Id. at 552.- 404 -


that a defendant can look for enforcement of <strong>the</strong> principles Netcom embodied. “When C<strong>on</strong>gresscodifies a comm<strong>on</strong>-law principle, <strong>the</strong> comm<strong>on</strong> law remains not <strong>on</strong>ly good law, but a valuabletouchst<strong>on</strong>e for interpreting <strong>the</strong> statute, unless C<strong>on</strong>gress explicitly states that it intends to supplant<strong>the</strong> comm<strong>on</strong> law.” 1868 The court found it clear that C<strong>on</strong>gress intended <strong>the</strong> safe harbors to be afloor, not a ceiling, of protecti<strong>on</strong>, and <strong>the</strong> comm<strong>on</strong> law principles of Netcom are <strong>the</strong>refore stillgood law. 1869Important Principles. The decisi<strong>on</strong>s by <strong>the</strong> district court and by <strong>the</strong> Fourth Circuit in <strong>the</strong>CoStar case c<strong>on</strong>tain a number of important principles. First, some gateway screening of postedmaterial by an OSP will not necessarily establish sufficient knowledge or c<strong>on</strong>trol over allegedlyinfringing works to destroy <strong>the</strong> potential availability of <strong>the</strong> Secti<strong>on</strong> 512(c) safe harbor. Sec<strong>on</strong>d,c<strong>on</strong>sistent with <strong>the</strong> Ninth Circuit’s ruling in <strong>the</strong> Napster I case discussed in subsecti<strong>on</strong> (iv)below, <strong>the</strong> boundaries of <strong>the</strong> c<strong>on</strong>tributory liability doctrine and <strong>the</strong> Secti<strong>on</strong> 512(c) safe harbor arenot c<strong>on</strong>tiguous – Secti<strong>on</strong> 512(c) can provide a safe harbor to activity that would o<strong>the</strong>rwise beinfringing under <strong>the</strong> c<strong>on</strong>tributory liability doctrine. The CoStar case, however, reached anopposite c<strong>on</strong>clusi<strong>on</strong> from <strong>the</strong> Ninth Circuit in <strong>the</strong> Napster I case, as well as <strong>the</strong> Aimster/Madsterand <strong>the</strong> Hendricks<strong>on</strong> v. Amaz<strong>on</strong>.com cases discussed in Secti<strong>on</strong> III.C.5(b)(1)(i).c and Secti<strong>on</strong>III.C.5(b)(1)(iii).g respectively, <strong>on</strong> <strong>the</strong> issue of whe<strong>the</strong>r <strong>the</strong> Secti<strong>on</strong> 512(c) safe harbor can shieldagainst vicarious liability (<strong>the</strong> CoStar case c<strong>on</strong>cluding no, <strong>the</strong> Napster I, Aimster/Madster, andHendricks<strong>on</strong> v. Amaz<strong>on</strong>.com cases c<strong>on</strong>cluding potentially yes).Third, c<strong>on</strong>sistent with <strong>the</strong> Hendricks<strong>on</strong> v. eBay case, <strong>the</strong> OSP’s mere ability to terminateinfringing users or activity will not of itself be sufficient to establish “c<strong>on</strong>trol” of <strong>the</strong> infringingactivity for purposes of adjudicating <strong>the</strong> availability of <strong>the</strong> Secti<strong>on</strong> 512(c) defense. Fourth, <strong>the</strong>amount of policing for future infringements an OSP may be required to do may depend up<strong>on</strong> <strong>the</strong>level of knowledge it possesses c<strong>on</strong>cerning <strong>the</strong> scope of infringing activity <strong>on</strong> its system.Although not stated as such in <strong>the</strong> Napster cases, those cases bear evidence of <strong>the</strong> principle, for<strong>the</strong> Ninth Circuit in that case imposed a heavy duty of policing in a case in which it seemed tohave c<strong>on</strong>cluded that Napster had a substantial level of knowledge of infringing activity using itssystem.d. Perfect 10 v. Cybernet Ventures. The Secti<strong>on</strong> 512(c)safe harbor was fur<strong>the</strong>r adjudicated in <strong>the</strong> case of Perfect 10, Inc. v. Cybernet Ventures, Inc., 1870<strong>the</strong> facts of which are set forth in Secti<strong>on</strong> III.C.2(f) above. Assuming that Cybernet qualified asa “provider of <strong>on</strong>line services” within <strong>the</strong> definiti<strong>on</strong> of Secti<strong>on</strong> 512(k), 1871 <strong>the</strong> court turned towhe<strong>the</strong>r Cybernet had satisfied <strong>the</strong> predicate requirements of Secti<strong>on</strong> 512(i) that it adopt andreas<strong>on</strong>ably implement a policy providing for terminati<strong>on</strong> in appropriate circumstances of repeat1868 Id. at 553 (emphasis in original).1869 Id. at 555.1870 213 F. Supp. 2d 1146 (C.D. Cal. 2002).1871 The court noted that, although <strong>the</strong> definiti<strong>on</strong> is quite broad, its applicability to Cybernet was made a bitcomplicated by <strong>the</strong> fact that Cybernet insisted that it did not host any infringing images and that no image filespassed through any of its computers, but ra<strong>the</strong>r that it was purely a provider of age verificati<strong>on</strong> services. Id. at1175.- 405 -


copyright infringers. Disagreeing with <strong>the</strong> ruling of <strong>the</strong> Ellis<strong>on</strong> case discussed in Secti<strong>on</strong>III.C.5(b)(1)(i) above, which held that Secti<strong>on</strong> 512(i) does not require a service provider toactually terminate repeat infringers or even to investigate infringement, but ra<strong>the</strong>r merely toestablish a threat of terminati<strong>on</strong> for repeat infringement, <strong>the</strong> court in Perfect 10 v. CybernetVentures held that Secti<strong>on</strong> 512(i) does in fact imply some substantive resp<strong>on</strong>sibilities for serviceproviders. Although it does not require active investigati<strong>on</strong> of possible infringement, or takingacti<strong>on</strong> for isolated infringing acts by single users, or addressing “difficult infringement issues,”or even actively m<strong>on</strong>itoring for copyright infringement, <strong>the</strong> court c<strong>on</strong>cluded that whenc<strong>on</strong>fr<strong>on</strong>ted with “appropriate circumstances,” Secti<strong>on</strong> 512(i) requires a service provider toreas<strong>on</strong>ably implement terminati<strong>on</strong>. 1872These circumstances would appear to cover, at a minimum, instances where aservice provider is given sufficient evidence to create actual knowledge of blatant,repeat infringement by particular users, particularly infringement of a willful andcommercial nature. … Under this reading, secti<strong>on</strong> 512(i) is focused <strong>on</strong> infringingusers, whereas 512(c) is focused primarily <strong>on</strong> <strong>the</strong> infringing material itself. 1873Analyzing <strong>the</strong> interplay between <strong>the</strong> requirements of Secti<strong>on</strong>s 512(i) and 512(c), <strong>the</strong>court viewed “512(i) as creating room for enforcement policies less stringent or formal than <strong>the</strong>‘notice and take-down’ provisi<strong>on</strong>s of secti<strong>on</strong> 512(c), but still subject to 512(i)’s ‘reas<strong>on</strong>ablyimplemented’ requirement.” The court ruled that Cybernet had not satisfied <strong>the</strong> requirements ofSecti<strong>on</strong> 512(i). Cybernet had not submitted any documentary evidence that it had ever takenacti<strong>on</strong> against individual webmasters who repeatedly put up infringing sites so that suchwebmasters could not simply move infringing materials from site to site. Instead, Cybernet had<strong>on</strong>ly removed from its search engine and links page any site about which it had received a noticeof infringement, without ever refusing to provide fur<strong>the</strong>r services to <strong>the</strong> operators of those sites.Accordingly, <strong>the</strong> court c<strong>on</strong>cluded that Cybernet had not reas<strong>on</strong>ably implemented a policy toterminate repeat infringers from its service and had <strong>the</strong>refore not satisfied <strong>the</strong> predicaterequirements of Secti<strong>on</strong> 512(i) for <strong>the</strong> safe harbors. 1874The court fur<strong>the</strong>r ruled that, even if Cybernet could be found to have satisfied <strong>the</strong>predicate requirements of Secti<strong>on</strong> 512(i), it still would not be eligible for <strong>the</strong> safe harbor ofSecti<strong>on</strong> 512(c) for two reas<strong>on</strong>s: defective implementati<strong>on</strong> of notice procedures required bySecti<strong>on</strong> 512(c) and receipt of a direct financial benefit from infringing activity that it had a rightand ability to c<strong>on</strong>trol.With respect to <strong>the</strong> defective implementati<strong>on</strong> of notice procedures, <strong>the</strong> court noted thatCybernet’s take down policy required a complaint to comply strictly with all its stated noticerequirements before Cybernet would take acti<strong>on</strong>, and <strong>the</strong>re was no indicati<strong>on</strong> that Cybernet triedto work with parties whose notice was deficient but satisfied <strong>the</strong> minimal requirements of1872 Id. at 1176.1873 Id. at 1177.1874 Id. at 1178-79.- 406 -


Secti<strong>on</strong> 512(c)(3)(B)(ii). 1875 In additi<strong>on</strong>, Cybernet’s notice requirements did not allow forsubmissi<strong>on</strong> of a representative list of copyrighted works being infringed – <strong>the</strong>y required <strong>the</strong>specific web page at which a given infringing work was located, “ra<strong>the</strong>r than <strong>the</strong> site.” 1876Cybernet’s counter-notificati<strong>on</strong> procedures were also ruled defective. The court held that<strong>the</strong> counter-notificati<strong>on</strong> procedures of <strong>the</strong> DMCA implicate <strong>the</strong> requirement of a reas<strong>on</strong>ablyimplemented Secti<strong>on</strong> 512(i) policy “because <strong>the</strong>re is an implicati<strong>on</strong> that a party who cannot sign<strong>the</strong> required statement is a knowing infringer. Thus, <strong>the</strong> counter-notificati<strong>on</strong> procedures appearto serve <strong>the</strong> generally self-policing policy that secti<strong>on</strong> 512 reflects.” 1877 Cybernet’s counternotificati<strong>on</strong>procedures provided that, if an alleged infringer stated under penalty of perjury thatit had removed <strong>the</strong> named infringing material, <strong>the</strong> alleged infringer’s access to <strong>the</strong> service wouldbe restored. The court held that this policy “allows Cybernet to reinstate an infringer without <strong>the</strong>C<strong>on</strong>gressi<strong>on</strong>ally-required statement and provides cover for Cybernet to water down itsterminati<strong>on</strong> policy by treating <strong>the</strong>se minimalist take-down statements as nei<strong>the</strong>r an admissi<strong>on</strong> nora denial of <strong>the</strong> copyright infringement allegati<strong>on</strong>s, regardless of how blatant <strong>the</strong> infringementmight be.” 1878The court also c<strong>on</strong>cluded that <strong>the</strong> Secti<strong>on</strong> 512(c) safe harbor was not available for <strong>the</strong>fur<strong>the</strong>r reas<strong>on</strong> that Cybernet received a financial benefit “directly attributable” to infringingactivity with respect to which it had <strong>the</strong> right and ability to c<strong>on</strong>trol. The court noted that <strong>the</strong>direct financial benefit requirement was satisfied for <strong>the</strong> same reas<strong>on</strong>s noted in its analysis ofCybernet’s vicarious liability (see Secti<strong>on</strong> II.C.3(d) above), 1879 although it agreed with <strong>the</strong>Hendricks<strong>on</strong> v. eBay and CoStar courts that <strong>the</strong> mere ability to exclude users from its system isnot of itself sufficient right and ability to c<strong>on</strong>trol infringing activity to deny <strong>the</strong> safe harbors to aservice provider. 1880 The court expressed no opini<strong>on</strong> <strong>on</strong> <strong>the</strong> questi<strong>on</strong> whe<strong>the</strong>r <strong>the</strong> “directlyattributable” language in <strong>the</strong> safe harbor is narrower or equivalent to <strong>the</strong> general vicariousinfringement requirement of a direct financial benefit, but ruled that in any event <strong>the</strong> direct flowof income to Cybernet based <strong>on</strong> <strong>the</strong> number of new subscribers signed up by its member sites atwhich infringing activity was taking place was sufficient to establish a financial benefit “directlyattributable” to infringing activity. 1881Finally, <strong>the</strong> court held that <strong>the</strong>re was no evidence presented that Cybernet ever“expeditiously” removed infringing material from its system, disabled links, or altered its searchengine under its DMCA policy. Accordingly, <strong>the</strong> court c<strong>on</strong>cluded that <strong>the</strong>re was little likelihood1875 Id. at 1179-80.1876 Id. at 1180.1877 Id.1878 Id.1879 Id. at 1181.1880 Id.1881 Id.- 407 -


that Cybernet would qualify for <strong>the</strong> safe harbors. 1882 (An additi<strong>on</strong>al aspect of <strong>the</strong> court’s rulingwith respect to <strong>the</strong> Secti<strong>on</strong> 512(d) safe harbor is set forth in Secti<strong>on</strong> III.C.5(b)(1)(iv) below.)Important Principles. The court’s interpretati<strong>on</strong> of <strong>the</strong> obligati<strong>on</strong>s imposed <strong>on</strong> a serviceprovider by Secti<strong>on</strong> 512(i) are interesting. Specifically, Secti<strong>on</strong> 512(i) is directed towardeliminati<strong>on</strong> of repeatedly infringing users, whereas Secti<strong>on</strong> 512(c) is directed to eliminati<strong>on</strong> ofinfringing materials. Thus, under “appropriate circumstances,” a service provider must deny allfur<strong>the</strong>r service to a user who is repeatedly using <strong>the</strong> service to infringe, even if <strong>the</strong> serviceprovider has in every instance removed <strong>the</strong> particular infringing material that has been identified.In <strong>the</strong> Perfect 10 v. Cybernet Ventures case, webmasters who had <strong>the</strong>ir sites taken down up<strong>on</strong>notice of infringing material would often simply set up a new site and c<strong>on</strong>tinue offeringinfringing materials. The Perfect 10 v. Cybernet Ventures court ruled that in suchcircumstances, <strong>the</strong> defendant should have ceased allowing those webmasters to be a part of itsservice entirely, regardless of <strong>the</strong> site from which <strong>the</strong>y were operating.What c<strong>on</strong>stitutes an “appropriate circumstance” for denial of fur<strong>the</strong>r services to a repeatinfringer is unclear from <strong>the</strong> case. The court speaks of “blatant, repeat infringement byparticular users, particularly infringement of a willful and commercial nature.” 1883 This suggestsa fairly high standard for an “appropriate circumstance.” However, <strong>the</strong> court also stated that<strong>the</strong>se were circumstances in which a service provider should “at a minimum” terminate servicesto an infringer, so <strong>on</strong>e cannot assume that blatant or willful infringements of a commercial natureare <strong>the</strong> <strong>on</strong>ly circumstances under which it would be “appropriate” to terminate a user.The court’s rulings with respect to <strong>the</strong> notice requirements of Secti<strong>on</strong> 512(c) are alsointeresting. First, under those rulings, a service provider’s notificati<strong>on</strong> procedures must allowfor notificati<strong>on</strong> of a representative list of copyright works being infringed, ra<strong>the</strong>r than alwaysrequiring an exact itemizati<strong>on</strong> of <strong>the</strong> allegedly infringed works. It is unclear from <strong>the</strong> opini<strong>on</strong>whe<strong>the</strong>r <strong>the</strong> representative list possibility must be an explicitly stated part of <strong>the</strong> serviceprovider’s formal notificati<strong>on</strong> procedures, or whe<strong>the</strong>r it would be sufficient for <strong>the</strong> serviceprovider to in fact accept such representative list and act <strong>on</strong> it. Sec<strong>on</strong>d, <strong>the</strong> court interpreted <strong>the</strong>counter-notificati<strong>on</strong> procedures of <strong>the</strong> safe harbors in effect to require a statement by <strong>the</strong> allegedinfringer that <strong>the</strong> allegedly infringing materials were in fact not infringing – i.e., that <strong>the</strong>y wereremoved “as a result of mistake or misidentificati<strong>on</strong> of <strong>the</strong> material.” 1884 It is not sufficient for<strong>the</strong> alleged infringer to inform <strong>the</strong> service provider that allegedly infringing materials have beenremoved. If <strong>the</strong> alleged infringer does not state that <strong>the</strong> materials were removed by mistake ormisidentificati<strong>on</strong>, or at least somehow o<strong>the</strong>rwise indicate that <strong>the</strong> materials were not infringing,<strong>the</strong> Perfect 10 v. Cybernet Ventures opini<strong>on</strong> suggests that <strong>the</strong> service provider is to treat <strong>the</strong> useras a knowing infringer with respect to that material and count a “strike” against <strong>the</strong> user forpurposes of measuring whe<strong>the</strong>r <strong>the</strong> user is a “repeat infringer.”1882 Id. at 1182.1883 Id. at 1177.1884 17 U.S.C. § 512(g)(3)(C).- 408 -


e. The Aimster/Madster Lawsuits. The facts of <strong>the</strong>Aimster/Madster lawsuits are set forth in Secti<strong>on</strong> III.C.2(c)(3) above. In that case, Aimsterasserted <strong>the</strong> Secti<strong>on</strong> 512(c) safe harbor. As discussed in Secti<strong>on</strong> III.C.5(b)(1)(i).c above, <strong>the</strong>district court c<strong>on</strong>cluded that Aimster was not entitled to any of <strong>the</strong> DMCA safe harbors becauseof its failure to satisfy <strong>the</strong> Secti<strong>on</strong> 512(i) predicate with respect to implementati<strong>on</strong> of a policy toterminate repeat infringers <strong>on</strong> its system. In additi<strong>on</strong>, <strong>the</strong> court held that Aimster had notsatisfied <strong>the</strong> specific c<strong>on</strong>diti<strong>on</strong>s of Secti<strong>on</strong> 512(c) because <strong>the</strong> plaintiffs were not assertingliability based <strong>on</strong> <strong>the</strong> caching of infringing material anywhere within Aimster’s system, and <strong>the</strong>infringing materials were not transmitted “through” <strong>the</strong> Aimster system. 1885 As discussed inSecti<strong>on</strong> III.C.5(b)(1)(i).c, <strong>on</strong> appeal <strong>the</strong> Seventh Circuit affirmed <strong>the</strong> ruling that <strong>the</strong> safe harborswere not available to Aimster because of failure to comply with Secti<strong>on</strong> 512(i). 1886f. Hendricks<strong>on</strong> v. Amaz<strong>on</strong>.com. The case ofHendricks<strong>on</strong> v. Amaz<strong>on</strong>.com, Inc. 1887 adjudicated <strong>the</strong> interesting issue of <strong>the</strong> extent of an ISP’sobligati<strong>on</strong> to police its system for infringing material <strong>on</strong>ce it receives notice from a copyrightholder that all copies of a particular work are unauthorized. This case involved facts similar to<strong>the</strong> Hendricks<strong>on</strong> v. eBay case discussed above. On Jan. 28, 2002, Hendricks<strong>on</strong> sent a letter toAmaz<strong>on</strong>.com notifying it that all copies of <strong>the</strong> movie Mans<strong>on</strong> <strong>on</strong> DVD infringed his copyright.On Oct. 21, 2002, Hendricks<strong>on</strong> noticed that a Mans<strong>on</strong> DVD was posted for sale <strong>on</strong> Amaz<strong>on</strong>’swebsite. Hendricks<strong>on</strong> purchased a copy of <strong>the</strong> DVD, <strong>the</strong>n filed an acti<strong>on</strong> against both Amaz<strong>on</strong>and <strong>the</strong> poster of <strong>the</strong> DVD, asserting claims of direct infringement against Amaz<strong>on</strong> and <strong>the</strong>poster, and a claim of vicarious liability against Amaz<strong>on</strong>. Amaz<strong>on</strong> moved for summaryjudgment <strong>on</strong> <strong>the</strong> ground that it was not liable for direct infringement, since <strong>the</strong> movie had notbeen sold by Amaz<strong>on</strong>, and that it was entitled to <strong>the</strong> safe harbor of Secti<strong>on</strong> 512(c) for <strong>the</strong> claimof vicarious liability. 1888The court first ruled that Amaz<strong>on</strong> was not liable for direct infringement, even though ithad offered <strong>the</strong> website pages that <strong>the</strong> seller and buyer used to complete <strong>the</strong> purchase, becauseAmaz<strong>on</strong> was not <strong>the</strong> actual seller of <strong>the</strong> item. 1889 With respect to <strong>the</strong> DMCA safe harbor, <strong>the</strong>court first held, c<strong>on</strong>sistent with <strong>the</strong> Aimster/Madster case and <strong>the</strong> Ninth Circuit’s decisi<strong>on</strong> inNapster I, that <strong>the</strong> DMCA safe harbors can shield against vicarious liability. 1890 The court <strong>the</strong>nnoted that, although <strong>the</strong> DMCA places <strong>the</strong> burden <strong>on</strong> <strong>the</strong> copyright owner in <strong>the</strong> first instance to1885 In re Aimster <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Litigati<strong>on</strong>, 252 F. Supp. 2d 634, 660-61 (N.D. Ill. 2002) & n.21.1886 In re Aimster <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Litigati<strong>on</strong>, 334 F.3d 643 (7th Cir. 2003), cert. denied, 124 S. Ct. 1069 (2004).1887 69 U.S.P.Q.2d 1471 (C.D. Cal. 2003).1888 Id. at 1471-72.1889 Id. at 1472.1890 Id.- 409 -


m<strong>on</strong>itor <strong>the</strong> <strong>Internet</strong> for potentially infringing sales, 1891 “because <strong>the</strong> DMCA is relatively new,<strong>the</strong> questi<strong>on</strong> as to how l<strong>on</strong>g an adequate notice should remain viable is still unanswered.” 1892Turning to an analysis of this questi<strong>on</strong>, <strong>the</strong> court noted that it was not <strong>the</strong> intenti<strong>on</strong> ofC<strong>on</strong>gress that a copyright owner could write <strong>on</strong>e blanket notice to all service providers alerting<strong>the</strong>m of infringing material, <strong>the</strong>reby relieving himself of any fur<strong>the</strong>r resp<strong>on</strong>sibility and placing<strong>the</strong> <strong>on</strong>us forever <strong>on</strong> <strong>the</strong> service provider. However, <strong>the</strong> court also noted that it would be against<strong>the</strong> spirit of <strong>the</strong> DMCA if <strong>the</strong> entire resp<strong>on</strong>sibility were to lie with <strong>the</strong> copyright owner to foreverpolice websites in search of possible infringers. 1893To resolve a balance between <strong>the</strong>se competing c<strong>on</strong>cerns, <strong>the</strong> court looked to <strong>the</strong> languageof <strong>the</strong> safe harbor, noting that to qualify for <strong>the</strong> safe harbor, Secti<strong>on</strong> 512(c) requires that <strong>the</strong>service provider not have actual knowledge that material <strong>on</strong> its system “is infringing” or thatinfringing activity “is apparent.” 1894 The court c<strong>on</strong>cluded that, by use of <strong>the</strong> present tense,C<strong>on</strong>gress intended for <strong>the</strong> notice to make <strong>the</strong> service provider aware of <strong>the</strong> infringing activitythat is occurring at <strong>the</strong> time it receives <strong>the</strong> notice. 1895 “If <strong>the</strong> infringing material is <strong>on</strong> <strong>the</strong> websiteat <strong>the</strong> time <strong>the</strong> ISP receives <strong>the</strong> notice, <strong>the</strong>n <strong>the</strong> informati<strong>on</strong>, that all Mans<strong>on</strong> DVD’s areinfringing, can be adequate to find <strong>the</strong> infringing material expeditiously. However, if at <strong>the</strong> time<strong>the</strong> notice is received, <strong>the</strong> infringing material is not posted, <strong>the</strong> notice does not enable <strong>the</strong> serviceprovider to locate infringing material that is not <strong>the</strong>re, let al<strong>on</strong>e do it expeditiously.” 1896Drawing <strong>on</strong> <strong>the</strong>se principles, <strong>the</strong> court ruled that <strong>the</strong> DMCA places a limit <strong>on</strong> <strong>the</strong> viabilityof an o<strong>the</strong>rwise adequate notice, and with respect to <strong>the</strong> instant case, “Hendricks<strong>on</strong>’s January,2002, letter, claiming all Mans<strong>on</strong> DVDs violate his copyright, although adequate for <strong>the</strong> listings<strong>the</strong>n <strong>on</strong> Amaz<strong>on</strong>, cannot be deemed adequate notice for subsequent listings and sales, especially,as here, when <strong>the</strong> infringing item was posted for sale nine m<strong>on</strong>ths after <strong>the</strong> date of <strong>the</strong>notice.” 1897 Accordingly, Amaz<strong>on</strong>’s lack of knowledge of <strong>the</strong> infringing activity satisfied <strong>the</strong>first pr<strong>on</strong>g of <strong>the</strong> safe harbor under Secti<strong>on</strong> 512(c)(1)(A). 1898 Amaz<strong>on</strong> satisfied <strong>the</strong> sec<strong>on</strong>d pr<strong>on</strong>gof <strong>the</strong> safe harbor under Secti<strong>on</strong> 512(c)(1)(B) because, although it received a financial benefitfrom its third party sellers, <strong>the</strong> court held that <strong>the</strong>re was no evidence to suggest that Amaz<strong>on</strong> had“<strong>the</strong> ability to know that an infringing sale by a third party seller would occur,” and hence it1891 Id. at 1473. In an earlier opini<strong>on</strong>, <strong>the</strong> court had ruled that Hendricks<strong>on</strong>’s Jan. 2002 letter substantially compliedwith <strong>the</strong> DMCA notice requirements. Hendricks<strong>on</strong> v. Amaz<strong>on</strong>.com, Inc., CV 02-07394 TJH (C.D. Cal. 2003).1892 69 U.S.P.Q.2d at 1473.1893 Id.1894 Id.1895 Id.1896 Id. at 1473-74 (emphasis in original).1897 Id. at 1474.1898 Id.- 410 -


could not c<strong>on</strong>trol such sales. 1899 Accordingly, <strong>the</strong> court granted Amaz<strong>on</strong> summary judgmentunder <strong>the</strong> safe harbor of Secti<strong>on</strong> 512(c). 1900g. Rossi v. MPAA. A peripheral issue relating to <strong>the</strong>notice provisi<strong>on</strong>s of <strong>the</strong> Secti<strong>on</strong> 512(c) safe harbor was raised in <strong>the</strong> case of Rossi v. Moti<strong>on</strong>Picture Associati<strong>on</strong> of America, Inc., 1901 in which <strong>the</strong> plaintiff was <strong>the</strong> operator of a web sitecalled internetmovies.com, an <strong>on</strong>line directory of artists’ works and an <strong>Internet</strong> news magazineproviding informati<strong>on</strong> and resources about movies <strong>on</strong> <strong>the</strong> <strong>Internet</strong>. The MPAA found statements<strong>on</strong> <strong>the</strong> web site such as “Join to download full length movies <strong>on</strong>line now! New movies everym<strong>on</strong>th”; “Full Length Downloadable Movies”; and “NOW DOWNLOADABLE” followed bygraphics from a number of <strong>the</strong> MPAA’s copyrighted movies. The MPAA sent a Secti<strong>on</strong> 512(c)written notice to <strong>the</strong> plaintiff’s <strong>Internet</strong> service provider asking that it remove <strong>the</strong> plaintiff’s website from its server because of <strong>the</strong> site’s allegedly infringing c<strong>on</strong>tent. 1902The plaintiff sued <strong>the</strong> MPAA for, am<strong>on</strong>g o<strong>the</strong>r things, tortious interference withc<strong>on</strong>tractual relati<strong>on</strong>s and tortious interference with prospective business advantage, and <strong>the</strong>MPAA moved for summary judgment. Under Hawaiian law, <strong>the</strong> plaintiff was required to showthat <strong>the</strong> MPAA acted without justificati<strong>on</strong>. The MPAA argued that its acti<strong>on</strong>s were justifiedbecause <strong>the</strong> DMCA authorized it to send <strong>the</strong> plaintiff’s <strong>Internet</strong> service provider a noticerequesting that it shut down <strong>the</strong> plaintiff’s web site. 1903The plaintiff argued that <strong>the</strong> MPAA was not justified in sending <strong>the</strong> DMCA noticebecause, in order to have “a good faith belief” of infringement, <strong>the</strong> copyright owner is requiredto c<strong>on</strong>duct a reas<strong>on</strong>able investigati<strong>on</strong> into <strong>the</strong> allegedly offending website. The plaintiff arguedthat <strong>the</strong> reas<strong>on</strong>ableness of <strong>the</strong> investigati<strong>on</strong> should be judged under an objective standard ofreview, and that <strong>the</strong> MPAA had failed to meet that standard because, if it had reas<strong>on</strong>ablyinvestigated <strong>the</strong> site by attempting to download movies, it would have discovered that no moviescould actually be downloaded from <strong>the</strong> site or related links. 1904The MPAA countered that <strong>the</strong> “good faith belief” requirement should be a subjective<strong>on</strong>e, and <strong>the</strong> Ninth Circuit agreed. Although no court had yet interpreted <strong>the</strong> standard underSecti<strong>on</strong> 512(c), <strong>the</strong> court noted that several decisi<strong>on</strong>s interpreting o<strong>the</strong>r federal statutes hadtraditi<strong>on</strong>ally interpreted “good faith” to encompass a subjective standard. The court also foundthat <strong>the</strong> overall structure of Secti<strong>on</strong> 512 supported <strong>the</strong> c<strong>on</strong>clusi<strong>on</strong> that Secti<strong>on</strong> 512(c)(2)(A)(v)imposes a subjective good faith requirement <strong>on</strong> copyright owners. C<strong>on</strong>gress included in Secti<strong>on</strong>512(f) a limited cause of acti<strong>on</strong> for improper infringement notificati<strong>on</strong>s, imposing liability <strong>on</strong>lyif <strong>the</strong> copyright owner’s notificati<strong>on</strong> is a knowing misrepresentati<strong>on</strong>. Juxtaposing <strong>the</strong> “goodfaith” proviso of <strong>the</strong> DMCA with <strong>the</strong> “knowing misrepresentati<strong>on</strong>” provisi<strong>on</strong> revealed a statutory1899 Id.1900 Id.1901 Rossi v. Moti<strong>on</strong> Picture Ass’n of America, Inc., 391 F.3d 1000 (9 th Cir. 2004).1902 Id. at 1002.1903 Id.1904 Id. at 1003-04.- 411 -


structure intended to protect potential violators <strong>on</strong>ly from subjectively improper acti<strong>on</strong>s bycopyright owners. 1905The Ninth Circuit found that <strong>the</strong> plaintiff had failed to raise a genuine issue of materialfact under <strong>the</strong> subjective standard regarding <strong>the</strong> MPAA’s good faith. The statements <strong>on</strong> <strong>the</strong>plaintiff’s web site str<strong>on</strong>gly suggested that movies were available for downloading, and <strong>the</strong> courtnoted that <strong>the</strong> plaintiff had admitted that his own customers often believed that movies wereavailable for downloading. Accordingly, <strong>the</strong> Ninth Circuit affirmed <strong>the</strong> district court’s ruling <strong>on</strong>summary judgment that <strong>the</strong>re was no issue of material fact as to <strong>the</strong> MPAA’s “good faith belief”that <strong>the</strong> plaintiff’s web site was infringing its copyrights. 1906 The Ninth Circuit also affirmed <strong>the</strong>district court’s holding that <strong>the</strong> MPAA’s good faith compliance with <strong>the</strong> notice and takedownprocedures of <strong>the</strong> DMCA c<strong>on</strong>stituted sufficient “justificati<strong>on</strong>” under Hawaiian law to avoid <strong>the</strong>plaintiff’s claim for tortuous interference with c<strong>on</strong>tractual relati<strong>on</strong>s. 1907h. Perfect 10 v. CCBill. The facts of this case are setforth in Secti<strong>on</strong> III.C.5(b)(1)(i)d. above. In that case, <strong>the</strong> defendant CWIE, an OSP hostingvarious sites that allegedly c<strong>on</strong>tained infringing copies of Perfect10’s photos, moved forsummary judgment under <strong>the</strong> Secti<strong>on</strong> 512(c) safe harbor. Perfect 10 argued that CWIE was notentitled to <strong>the</strong> safe harbor because it had actual knowledge of Perfect 10’s infringements <strong>on</strong> itsclients’ web sites, it was aware of facts or circumstances from which infringing activity wasapparent, it failed to expeditiously remove or disable access to infringing material of which ithad knowledge, and it received a financial benefit directly attributable to <strong>the</strong> infringing activityand had <strong>the</strong> right and ability to c<strong>on</strong>trol such activity. 1908With respect to <strong>the</strong> issue of knowledge, <strong>the</strong> district court found Perfect 10’s notificati<strong>on</strong>sto CWIE of infringement to be deficient under Secti<strong>on</strong> 512(c) because <strong>the</strong>y identified <strong>on</strong>ly <strong>the</strong>web sites c<strong>on</strong>taining allegedly infringing material, but did not identify <strong>the</strong> URLs of <strong>the</strong>infringing images or which of Perfect 10’s copyrights were being infringed. 1909 With respect towhe<strong>the</strong>r CWIE had c<strong>on</strong>structive notice of infringement, <strong>the</strong> court noted that <strong>the</strong> kind ofc<strong>on</strong>structive notice C<strong>on</strong>gress c<strong>on</strong>templated under Secti<strong>on</strong> 512(c) was that of “red flag” web sitesfrom which infringements would be apparent based <strong>on</strong> a cursory review of <strong>the</strong> web site. Underthis test, although some of CWIE’s affiliate web sites advertised images of celebrities, <strong>the</strong>y didnot c<strong>on</strong>tain obvious infringements because <strong>the</strong> web sites did not advertise <strong>the</strong>mselves as pirateweb sites. Accordingly, <strong>the</strong> court c<strong>on</strong>cluded that Perfect 10 had not raised a genuine issue ofmaterial fact that CWIE had actual or c<strong>on</strong>structive knowledge of infringements <strong>on</strong> its clients’web sites. 19101905 Id. at 1004-05.1906 Id. at 1005-06.1907 Id. at 1006.1908 Perfect 10, Inc. v. CCBill, 340 F. Supp. 2d 1077, 1103 (C.D. Cal. 2004).1909 Id. at 1100-01.1910 Id. at 1103-04.- 412 -


With respect to <strong>the</strong> issue of c<strong>on</strong>trol, <strong>the</strong> court noted that CWIE’s right and ability toc<strong>on</strong>trol infringing activity was limited to disc<strong>on</strong>necting its webmasters’ access to CWIE’sservice. Citing <strong>the</strong> case of Perfect 10 v. Cybernet Ventures, Inc., 1911 <strong>the</strong> court ruled that <strong>the</strong> mereability to terminate services to a web site was not sufficient c<strong>on</strong>trol for purposes of <strong>the</strong> Secti<strong>on</strong>512(C) safe harbor. Nor was <strong>the</strong> fact that CWIE reviewed its sites to look for blatantly illegaland criminal c<strong>on</strong>duct sufficient to close <strong>the</strong> safe harbor, for <strong>the</strong> DMCA was intended toencourage OSPs to work with copyright owners to locate and stop infringing c<strong>on</strong>duct.Accordingly, <strong>the</strong> court ruled that CWIE was entitled to summary judgment <strong>on</strong> <strong>the</strong> Secti<strong>on</strong> 512(c)safe harbor. 1912On appeal, <strong>the</strong> Ninth Circuit, for <strong>the</strong> reas<strong>on</strong>s discussed above in Secti<strong>on</strong> III.C.5(b)(1)(i).dabove, agreed with <strong>the</strong> district court’s rulings that Perfect 10’s notices of infringement wereinsufficient to comply with <strong>the</strong> requirements of Secti<strong>on</strong> 512(c)(3) or to provide CWIE withknowledge or awareness within <strong>the</strong> standard of Secti<strong>on</strong> 512(c)(1)(A). 1913 The remainingquesti<strong>on</strong> was <strong>the</strong>refore whe<strong>the</strong>r Perfect 10 had raised a genuine issue of material fact c<strong>on</strong>cerningwhe<strong>the</strong>r CWIE received a direct financial benefit from <strong>the</strong> infringing activity. 1914 The NinthCircuit held that “’direct financial benefit’ should be interpreted c<strong>on</strong>sistent with <strong>the</strong> similarlywordedcomm<strong>on</strong> law standard for vicarious liability. … Thus, <strong>the</strong> relevant inquiry is ‘whe<strong>the</strong>r<strong>the</strong> infringing activity c<strong>on</strong>stitutes a draw for subscribers, not just an added benefit.’” 1915 Thecourt noted that Perfect 10 had alleged <strong>on</strong>ly that CWIE hosted websites for a fee, and suchallegati<strong>on</strong> was insufficient to show that <strong>the</strong> infringing activity was a draw. The court also notedthat legislative history of Secti<strong>on</strong> 512 stated that receiving a <strong>on</strong>e-time set-up fee and flat,periodic payments for service from a pers<strong>on</strong> engaging in infringing activities would notc<strong>on</strong>stitute receiving a direct financial benefit. Accordingly, <strong>the</strong> court ruled that <strong>the</strong>re was nogenuine issue that CWIE had received a direct financial benefit from infringing activity, and<strong>the</strong>refore if <strong>on</strong> remand <strong>the</strong> district court were to find that CWIE had met <strong>the</strong> thresholdrequirements of Secti<strong>on</strong> 512(i), CWIE would be entitled to <strong>the</strong> Secti<strong>on</strong> 512(c) safe harbor. 1916i. Corbis Corp. v. Amaz<strong>on</strong>.com, Inc. The opini<strong>on</strong> in thiscase c<strong>on</strong>tains a lengthy adjudicati<strong>on</strong> of <strong>the</strong> requirements of Secti<strong>on</strong> 512(i) as a predicate for <strong>the</strong>Secti<strong>on</strong> 512 safe harbors. Amaz<strong>on</strong> hosted through its website a platform called “zShops,” whichallowed individuals and retailer vendors to showcase <strong>the</strong>ir products and sell <strong>the</strong>m directly to<strong>on</strong>line c<strong>on</strong>sumers. A zShop vendor could include a product image in its sales listing in <strong>on</strong>e oftwo ways – ei<strong>the</strong>r by creating a link to an image stored <strong>on</strong> <strong>the</strong> vendor’s computer or server, or byuploading an image to <strong>on</strong>e of Amaz<strong>on</strong>’s servers for display in <strong>the</strong> listing. Amaz<strong>on</strong> did not1911 213 F. Supp. 1146, 1181 (C.D. Cal. 2002).1912 Perfect 10, Inc. v. CCBill, 340 F. Supp. 2d at 1104-05.1913 Perfect 10, Inc. v. CCBill, 481 F.3d 751, 766 (9 th Cir.), cert. denied, 2007 U.S. LEXIS 12812 (2007).1914 Id.1915 Id. at 767 (quoting Ellis<strong>on</strong> v. Roberts<strong>on</strong>, 357 F.3d 1072, 1078-79 (9 th Cir. 2004)).1916 481 F.3d at 767.- 413 -


actively participate or supervise <strong>the</strong> uploading or linking of images, nor did it preview <strong>the</strong>images before <strong>the</strong> link was created or <strong>the</strong> upload completed. 1917Corbis, <strong>the</strong> owner of <strong>the</strong> copyrights in a large collecti<strong>on</strong> of images, brought copyrightclaims against Amaz<strong>on</strong> because 230 of its images were displayed and sold without authorizati<strong>on</strong>by zShop vendors through <strong>the</strong> Amaz<strong>on</strong> website. In additi<strong>on</strong>, two o<strong>the</strong>r images were displayed byAmaz<strong>on</strong> in banner ads that appeared <strong>on</strong> <strong>the</strong> <strong>Internet</strong> Movie Database (IMDb), a website ownedby Amaz<strong>on</strong> and operated separately from Amaz<strong>on</strong>.com. Amaz<strong>on</strong> asserted <strong>the</strong> safe harbor ofSecti<strong>on</strong> 512(c). 1918The court turned first to a very detailed analysis of whe<strong>the</strong>r Amaz<strong>on</strong> satisfied all <strong>the</strong>predicate c<strong>on</strong>diti<strong>on</strong>s of Secti<strong>on</strong> 512(i):– Whe<strong>the</strong>r Amaz<strong>on</strong> was a “Service Provider”. The court ruled that Amaz<strong>on</strong> clearlyqualified under <strong>the</strong> definiti<strong>on</strong> of “Service Provider” of Secti<strong>on</strong> 512(k)(1)(B), and rejectedCorbis’ argument that a Service Provider must “serve to route or c<strong>on</strong>nect <strong>on</strong>line digitalcommunicati<strong>on</strong>s.” Amaz<strong>on</strong>’s operati<strong>on</strong> of web sites was sufficient to make it a ServiceProvider. 1919– Whe<strong>the</strong>r Amaz<strong>on</strong> Had Adopted an Adequate User Policy. Amaz<strong>on</strong> required all zShopvendors to execute a Participati<strong>on</strong> Agreement, which prohibited vendors from listing or linkingto any item that infringed any third party intellectual property right or was counterfeited, illegal,stolen, or fraudulent. The agreement also gave Amaz<strong>on</strong> <strong>the</strong> right, but not <strong>the</strong> obligati<strong>on</strong>, tom<strong>on</strong>itor any activity and c<strong>on</strong>tent associated with <strong>the</strong> site, and <strong>the</strong> right and <strong>the</strong> absolutediscreti<strong>on</strong> to remove, screen, or edit any c<strong>on</strong>tent that violated <strong>the</strong> agreement or was o<strong>the</strong>rwiseobjecti<strong>on</strong>able. 1920 In additi<strong>on</strong>, it was Amaz<strong>on</strong>’s policy that when it received informati<strong>on</strong> that avendor might be infringing ano<strong>the</strong>r’s copyrights, it would cancel <strong>the</strong> allegedly infringing listingand send an email to <strong>the</strong> vendor, notifying it of <strong>the</strong> cancellati<strong>on</strong>, identifying a c<strong>on</strong>tact emailaddress for <strong>the</strong> complaining party, and reminding <strong>the</strong> vendor that “repeated violati<strong>on</strong>s of ourCommunity Rules could result in permanent suspensi<strong>on</strong> from our Aucti<strong>on</strong>, zShops, and Amaz<strong>on</strong>Marketplace sites.” 1921Corbis complained that <strong>the</strong> Participati<strong>on</strong> Agreement and Amaz<strong>on</strong>’s related policies weretoo vague with respect to copyright infringement, in that <strong>the</strong>y did not include <strong>the</strong> term “repeatinfringer” and did not describe <strong>the</strong> methodology employed in determining which users would beterminated for repeated copyright violati<strong>on</strong>s. The court rejected this argument, noting that <strong>the</strong>language of Secti<strong>on</strong> 512(i) and <strong>the</strong> overall structure of <strong>the</strong> DMCA indicate that <strong>the</strong> user policyneed not be as specific as Corbis suggested. The fact that C<strong>on</strong>gress left <strong>the</strong> phrase “repeatinfringer” undefined, and chose not to elaborate <strong>on</strong> what circumstances merit terminating a1917 Corbis Corp. v. Amaz<strong>on</strong>.com, Inc., 351 F. Supp. 2d 1090, 1094 (W.D. Wa. 2004).1918 Id. at 1096-98.1919 Id. at 1100 & n. 6.1920 Id. at 1095.1921 Id.- 414 -


epeat infringer’s access, suggested C<strong>on</strong>gress’ intent to leave <strong>the</strong> policy requirements and <strong>the</strong>obligati<strong>on</strong>s of service providers loosely defined. 1922 “Given <strong>the</strong> complexities inherent inidentifying and defining <strong>on</strong>line copyright infringement, § 512(i) does not require a serviceprovider to decide, ex ante, <strong>the</strong> specific types of c<strong>on</strong>duct that will merit restricting access to itsservices. As C<strong>on</strong>gress made clear, <strong>the</strong> DMCA was drafted with <strong>the</strong> understanding that serviceproviders need not ‘make difficult judgments as to whe<strong>the</strong>r c<strong>on</strong>duct is or is not infringing.’” 1923The court found that <strong>the</strong> Participati<strong>on</strong> Agreement adequately prohibited <strong>the</strong> listing,linking, or posting of any material that violates copyright laws and made clear that those whoviolated Amaz<strong>on</strong>’s policies could face a variety of penalties. In additi<strong>on</strong>, <strong>the</strong> court pointed totestim<strong>on</strong>y that those accused of copyright infringement were informed that repeated violati<strong>on</strong>scould result in “permanent suspensi<strong>on</strong>” from Amaz<strong>on</strong> sites. Accordingly, <strong>the</strong> court ruled thatAmaz<strong>on</strong> had an adequate user policy. 1924– Whe<strong>the</strong>r Amaz<strong>on</strong> Had Adequately Communicated Its Terminati<strong>on</strong> Policy to Its Users.Corbis argued that Amaz<strong>on</strong> had not adequately communicated its terminati<strong>on</strong> policy to its usersbecause it did not inform <strong>the</strong>m of <strong>the</strong> internal criteria it used to determine whe<strong>the</strong>r to terminate auser’s access to <strong>the</strong> site. The court held, however, that Secti<strong>on</strong> 512(i) is not so exacting, and thatAmaz<strong>on</strong> needed <strong>on</strong>ly inform users that, in appropriate circumstances, it may terminate <strong>the</strong> user’saccounts for repeated copyright infringement. The statute does not suggest what criteria shouldbe c<strong>on</strong>sidered by a service provider, much less require <strong>the</strong> service provider to reveal its decisi<strong>on</strong>making criteria to <strong>the</strong> user. Amaz<strong>on</strong> was required <strong>on</strong>ly to put users <strong>on</strong> notice that <strong>the</strong>y facedexclusi<strong>on</strong> from <strong>the</strong> service if <strong>the</strong>y repeatedly violate copyright law, and Amaz<strong>on</strong> had d<strong>on</strong>e so. 1925– Whe<strong>the</strong>r Amaz<strong>on</strong> Had Reas<strong>on</strong>ably Implemented Its Infringement Policy. To judge <strong>the</strong>adequacy of implementati<strong>on</strong> of an infringement policy, <strong>the</strong> court noted that <strong>on</strong>e must look at twoquesti<strong>on</strong>s – whe<strong>the</strong>r a service provider has adopted a procedure for receiving complaints andc<strong>on</strong>veying those complaints to users, and whe<strong>the</strong>r <strong>the</strong> service provider n<strong>on</strong>e<strong>the</strong>less still toleratesflagrant or blatant copyright infringement by its users. 1926Turning to <strong>the</strong> first questi<strong>on</strong>, <strong>the</strong> court found that Amaz<strong>on</strong> had a sufficient procedure forimplementing its infringement policy. Amaz<strong>on</strong> had a practice to promptly cancel a listing <strong>on</strong>ceit received adequate notice that <strong>the</strong> listing violated ano<strong>the</strong>r’s copyrights, to inform <strong>the</strong> vendorthat its listing may have violated intellectual property rights, to give <strong>the</strong> vendor <strong>the</strong> c<strong>on</strong>tactinformati<strong>on</strong> of <strong>the</strong> complaining party, and to warn <strong>the</strong> vendor that repeated violati<strong>on</strong>s couldresult in permanent suspensi<strong>on</strong> from <strong>the</strong> Amaz<strong>on</strong> site. The fact that certain vendors had beenable to reappear <strong>on</strong> <strong>the</strong> zShops platform under pseud<strong>on</strong>yms did not amount to a failure ofimplementati<strong>on</strong>. The court ruled that an infringement policy need not be perfect; it need <strong>on</strong>ly be1922 Id. at 1100-01.1923 Id. at 1101.1924 Id.1925 Id. at 1101-02.1926 Id. at 1102.- 415 -


eas<strong>on</strong>ably implemented. Corbis had not shown any more effective and reas<strong>on</strong>able method thatAmaz<strong>on</strong> could have used to prevent vendors from re-accessing zShops. 1927With respect to <strong>the</strong> sec<strong>on</strong>d questi<strong>on</strong> – tolerance of flagrant abusers – <strong>the</strong> court noted thatSecti<strong>on</strong> 512(i) requires <strong>on</strong>ly that repeated copyright infringers be terminated in “appropriatecircumstances” and that a service provider need not c<strong>on</strong>duct active investigati<strong>on</strong> of possibleinfringement or make a decisi<strong>on</strong> regarding difficult infringement issues. 1928 The court seems tohave set a ra<strong>the</strong>r high threshold for what might c<strong>on</strong>stitute “appropriate circumstances”:“Because it does not have an affirmative duty to police its users, failure to properly implementan infringement policy requires a showing of instances where a service provider fails toterminate a user even though it has sufficient evidence to create actual knowledge of that user’sblatant, repeated infringement of a willful and commercial nature.” 1929Corbis alleged that Amaz<strong>on</strong> tolerated repeated infringers because it had received threeemails (although not from Corbis) in which <strong>the</strong> sender claimed that zShop listings posted by <strong>on</strong>evendor were infringing, and had received seven emails (again not from Corbis) in which <strong>the</strong>sender claimed that zShop listings of ano<strong>the</strong>r vendor were infringing, and had not terminatedei<strong>the</strong>r vendor’s access to zShops until after Corbis’ suit was filed. The court found that thisevidence did not amount to a showing that Amaz<strong>on</strong> had knowledge of blatant, repeatinfringement that would have required Amaz<strong>on</strong> to terminate access to <strong>the</strong> vendors’ zShopssites. 1930 In a very significant ruling, <strong>the</strong> court held <strong>the</strong> following: “Although efforts to pindown exactly what amounts to knowledge of blatant copyright infringement may be difficult, itrequires, at a minimum, that a service provider who receives notice of a copyright violati<strong>on</strong> beable to tell merely from looking at <strong>the</strong> user’s activities, statements, or c<strong>on</strong>duct that copyrightinfringement is occurring.” 1931 Citing various previously decided cases, <strong>the</strong> court noted thatexamples of such blatant infringement may include statements from <strong>the</strong> vendor that a product isbootlegged or pirated, chat rooms hosted by <strong>the</strong> service provider in which users discuss how <strong>the</strong>service can be used to circumvent copyright laws, or <strong>the</strong> offering of hundreds of audio files in asingle day for peer to peer copying. Corbis had presented no such examples of blatant infringingactivity <strong>on</strong> <strong>the</strong> vendor defendants’ zShops sites. 1932In ano<strong>the</strong>r significant ruling, <strong>the</strong> court held that notices from copyright owners underSecti<strong>on</strong> 512(c)(3) do not, of <strong>the</strong>mselves, necessarily establish evidence of blatant or repeatinfringement. “A copyright owner may have a good faith belief that her work is being infringed,but may still be wr<strong>on</strong>g. The notificati<strong>on</strong> requirement does not take into account that a vendormay have ‘a legitimate fair use defense, or can o<strong>the</strong>rwise invoke any of <strong>the</strong> myriad o<strong>the</strong>r factorsthat go into evaluating a copyright infringement claim.’ Although <strong>the</strong> notices have brought <strong>the</strong>1927 Id. at 1103-04.1928 Id. at 1104.1929 Id.1930 Id. at 1104.1931 Id. at 1104-05.1932 Id. at 1005.- 416 -


listings to Amaz<strong>on</strong>’s attenti<strong>on</strong>, <strong>the</strong>y did not, in <strong>the</strong>mselves, provide evidence of blatant copyrightinfringement.” 1933 The court ruled that knowledge of blatant, repeat infringement cannot beimputed merely from <strong>the</strong> receipt of notices of infringement. Instead, <strong>the</strong>re must be additi<strong>on</strong>alevidence available to <strong>the</strong> service provider to buttress <strong>the</strong> claim of infringement supplied by <strong>the</strong>notices. 1934 The court went <strong>on</strong> to state, “In this regard, this Court respectfully disagrees withCCBill, in which <strong>the</strong> district court for <strong>the</strong> Central District of California held that receipt by <strong>the</strong>service provider of two or more DMCA compliant notices about <strong>on</strong>e of its users requiredterminati<strong>on</strong> under § 512(i). Although <strong>the</strong>re may be instances in which two or more DMCAcompliant notices make a service provider aware of a user’s blatant, repeat infringement, <strong>the</strong>notices al<strong>on</strong>e do not make <strong>the</strong> user’s activity blatant, or even c<strong>on</strong>clusively determine that <strong>the</strong> useris an infringer.” 1935The court noted that, o<strong>the</strong>r than <strong>the</strong> Secti<strong>on</strong> 512(c)(3) email notices of infringement, <strong>the</strong>rewas no evidence suggesting that Amaz<strong>on</strong> would have been able to tell, merely by looking at <strong>the</strong>listings of <strong>the</strong> two vendors, that <strong>the</strong> posters and photos being sold infringed ano<strong>the</strong>r’s copyrights.Without some evidence from <strong>the</strong> site raising a red flag, Amaz<strong>on</strong> would not know enough about<strong>the</strong> photograph, <strong>the</strong> copyright owner, or <strong>the</strong> user to make a determinati<strong>on</strong> that <strong>the</strong> vendor wasengaging in blatant copyright infringement. In additi<strong>on</strong>, <strong>on</strong>e of <strong>the</strong> vendors had unequivocallystated to Amaz<strong>on</strong> that it had <strong>the</strong> right to sell all of <strong>the</strong> posters in its inventory. The o<strong>the</strong>r vendorhad told Amaz<strong>on</strong> that all of its products were officially licensed. The court c<strong>on</strong>cluded that forAmaz<strong>on</strong> to determine that <strong>the</strong> two vendors were infringers, it would have had to c<strong>on</strong>duct <strong>the</strong> typeof investigati<strong>on</strong> that <strong>the</strong> courts and C<strong>on</strong>gress had found unnecessary. 1936– Whe<strong>the</strong>r Amaz<strong>on</strong> Had Knowledge of Infringement. Having c<strong>on</strong>cluded that Amaz<strong>on</strong>satisfied all predicate c<strong>on</strong>diti<strong>on</strong>s of Secti<strong>on</strong> 512(i), <strong>the</strong> court <strong>the</strong>n turned to <strong>the</strong> c<strong>on</strong>diti<strong>on</strong>s of <strong>the</strong>Secti<strong>on</strong> 512(c) safe harbor that Amaz<strong>on</strong> had to establish – that it did not have knowledge ofinfringing activity or acted expeditiously to remove infringing materials up<strong>on</strong> gainingknowledge, and that it did not receive a financial benefit directly attributable to any infringingactivity that it maintained <strong>the</strong> right and ability to c<strong>on</strong>trol. Because Corbis did not challengeAmaz<strong>on</strong>’s claim that it acted expeditiously to remove or disable access to allegedly infringingmaterial, <strong>the</strong> court turned to <strong>the</strong> knowledge and c<strong>on</strong>trol pr<strong>on</strong>gs. 1937In view of <strong>the</strong> fact that Corbis did not challenge that Amaz<strong>on</strong> expeditiously removedaccess to allegedly infringing material, it is somewhat curious that <strong>the</strong> court engaged in such anextensive analysis of <strong>the</strong> knowledge pr<strong>on</strong>g of <strong>the</strong> Secti<strong>on</strong> 512(c) safe harbor. Never<strong>the</strong>less, <strong>the</strong>court issued some important rulings about <strong>the</strong> knowledge pr<strong>on</strong>g that were c<strong>on</strong>sistent with itso<strong>the</strong>r rulings to afford a broad scope to <strong>the</strong> Secti<strong>on</strong> 512(c) safe harbor.1933 Id. (citati<strong>on</strong> omitted).1934 Id. at 1105-06.1935 Id. at 1105 n.9 (citati<strong>on</strong> omitted).1936 Id. at 1106.1937 Id. at 1106-07.- 417 -


Because Corbis had chosen not to send notices of infringement to Amaz<strong>on</strong> before filingits lawsuit, Amaz<strong>on</strong> had no actual knowledge of <strong>the</strong> alleged infringements of Corbis’copyrighted images, and <strong>the</strong> court turned its analysis to whe<strong>the</strong>r Corbis was aware of facts orcircumstances from which infringing activity was apparent. Corbis submitted evidence ofnotices provided by o<strong>the</strong>r copyright holders addressing n<strong>on</strong>-Corbis photos and evidencesuggesting that Amaz<strong>on</strong> was aware that Corbis licensed celebrity photos, from which Corbisargued that Amaz<strong>on</strong> should have known that zShops vendors sold infringing Corbis images.The court rejected this evidence as insufficient to establish a material issue of factregarding Amaz<strong>on</strong>’s actual or apparent knowledge of infringing material <strong>on</strong> <strong>the</strong> zShops platform.A mere general awareness that a particular type of item may be easily infringed is insufficient toestablish actual knowledge. With respect to apparent knowledge, <strong>the</strong> court cited <strong>the</strong> Nimmercopyright treatise for <strong>the</strong> propositi<strong>on</strong> that <strong>the</strong> standard is not “what a reas<strong>on</strong>able pers<strong>on</strong> wouldhave deduced given all <strong>the</strong> circumstances,” but ra<strong>the</strong>r “whe<strong>the</strong>r <strong>the</strong> service provider deliberatelyproceeded in <strong>the</strong> face of blatant factors of which it was aware.” 1938 The court also quoted from<strong>the</strong> legislative history of <strong>the</strong> DMCA that apparent knowledge requires evidence that a serviceprovider “turned a blind eye to ‘red flags’ of obvious infringement.” 1939To establish apparent knowledge, Corbis submitted evidence that Amaz<strong>on</strong> receivednotices that zShops vendors were infringing <strong>the</strong> copyrights of unrelated parties by sellingcelebrity photographs. The court found this evidence insufficient, because it was not clearwhe<strong>the</strong>r any of <strong>the</strong> vendors receiving such notices were vendors in <strong>the</strong> instant litigati<strong>on</strong> andwhe<strong>the</strong>r <strong>the</strong> notices complied with <strong>the</strong> requirements of Secti<strong>on</strong> 512(c)(3). If <strong>the</strong> notices werecompliant, Amaz<strong>on</strong> asserted that it promptly canceled a listing after receiving a notice ofinfringement, an asserti<strong>on</strong> that Corbis did not challenge. 1940In any event, in a more significant ruling, <strong>the</strong> court held that third party notices do not, in<strong>the</strong>mselves, c<strong>on</strong>stitute red flags. As noted in <strong>the</strong> legislative history, evidence of blatantcopyright infringement will often derive from informati<strong>on</strong> <strong>on</strong> <strong>the</strong> offending site itself. The courtnoted that even if <strong>the</strong> notices had caused Amaz<strong>on</strong> to examine <strong>the</strong> c<strong>on</strong>tent of <strong>the</strong> zShops sites,Corbis had not shown that those sites c<strong>on</strong>tained <strong>the</strong> type of blatant infringing activity that wouldhave raised a red flag for Amaz<strong>on</strong>. Accordingly, Corbis had failed to establish apparentknowledge of infringement <strong>on</strong> <strong>the</strong> part of Amaz<strong>on</strong>. 1941– Whe<strong>the</strong>r Amaz<strong>on</strong> Had <strong>the</strong> Right and Ability to C<strong>on</strong>trol <strong>the</strong> Infringing Activity. Corbisargued a right and ability to c<strong>on</strong>trol <strong>on</strong> Amaz<strong>on</strong>’s part from <strong>the</strong> fact that it had terminated <strong>the</strong>zShops defendants <strong>on</strong> <strong>the</strong> same day Corbis filed and served its complaint. The court cited <strong>the</strong>CCBill and Costar cases for <strong>the</strong> propositi<strong>on</strong> that <strong>the</strong> right and ability to c<strong>on</strong>trol pr<strong>on</strong>g cannot besatisfied merely by <strong>the</strong> ability of a service provider to remove or block access to materials posted<strong>on</strong> its website or stored <strong>on</strong> its systems. Nor did <strong>the</strong> fact that Amaz<strong>on</strong> advertised <strong>the</strong> zShops1938 Id. at 1108 (quoting 3 M. Nimmer & D. Nimmer, Nimmer <strong>on</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> § 12B.04[A][1], at 12B-49 (2004)).1939 Corbis, 351 F. Supp. 2d at 1108 (citing H.R. Rep. No. 105-551 Part 2, at 42 (1998)).1940 Corbis, 351 F. Supp. 2d at 1108.1941 Id. at 1108-09.- 418 -


platform amount to a right and ability to c<strong>on</strong>trol <strong>the</strong> items sold <strong>the</strong>re absent some showing thatAmaz<strong>on</strong> intended to pick infringing material for its site. The court noted that Amaz<strong>on</strong> did notpreview <strong>the</strong> products prior to <strong>the</strong>ir listing, did not edit <strong>the</strong> product descripti<strong>on</strong>s, and did notsuggest prices or o<strong>the</strong>rwise involve itself in <strong>the</strong> sale. Accordingly, <strong>the</strong> court ruled that Amaz<strong>on</strong>did not have <strong>the</strong> right and ability to c<strong>on</strong>trol <strong>the</strong> infringing material, and <strong>the</strong> court <strong>the</strong>refore didnot need to look into whe<strong>the</strong>r Amaz<strong>on</strong> received a direct financial benefit from <strong>the</strong> allegedlyinfringing c<strong>on</strong>duct. 1942Based <strong>on</strong> its various rulings, <strong>the</strong> court c<strong>on</strong>cluded that Amaz<strong>on</strong> was entitled to <strong>the</strong> Secti<strong>on</strong>512(c) safe harbor and was <strong>the</strong>refore immune from all m<strong>on</strong>etary relief. The <strong>on</strong>ly relief Corbiscould be entitled to was <strong>the</strong> limited injunctive relief set forth in Secti<strong>on</strong> 512(j). Because Corbishad not sought injunctive relief, and because Amaz<strong>on</strong> had asserted that it had terminated <strong>the</strong>accounts of <strong>the</strong> defendant vendors, it was unclear how <strong>the</strong> limited injunctive relief would applyin <strong>the</strong> particular case at bar. The court <strong>the</strong>refore granted Amaz<strong>on</strong>’s moti<strong>on</strong> for summaryjudgment with respect to <strong>the</strong> DMCA claims. 1943j. Tur v. YouTube, Inc. In Tur v. YouTube, Inc., 1944Robert Tur, owner of <strong>the</strong> copyright in video footage of <strong>the</strong> Reginald Denny beatings during <strong>the</strong>1992 Los Angeles riots, sued YouTube for copyright infringement based <strong>on</strong> <strong>the</strong> unauthorizedpresence of his copyrighted video footage <strong>on</strong> <strong>the</strong> web site. YouTube moved for summaryjudgment under <strong>the</strong> Secti<strong>on</strong> 512(c) safe harbor. The court denied summary judgment, findingthat <strong>the</strong>re were factual issues with respect to whe<strong>the</strong>r YouTube had <strong>the</strong> right and ability toc<strong>on</strong>trol infringing activity <strong>on</strong> its site. The court agreed with existing precedents that <strong>the</strong> rightand ability to c<strong>on</strong>trol requires more than just <strong>the</strong> ability of a service provider to remove or blockaccess to materials posted <strong>on</strong> its web site or stored <strong>on</strong> its system. 1945 “Ra<strong>the</strong>r, <strong>the</strong> requirementpresupposes some antecedent ability to limit or filter copyrighted material.” 1946 The court found,however, that <strong>the</strong>re was insufficient evidence in <strong>the</strong> record regarding <strong>the</strong> process undertaken byYouTube from <strong>the</strong> time a user submitted a video clip to <strong>the</strong> point of display <strong>on</strong> <strong>the</strong> YouTube site,and <strong>the</strong> extent of YouTube’s technical capabilities to detect and pre-screen allegedly infringingvideos. 1947 On Oct. 19, 2007, <strong>the</strong> court granted Tur’s moti<strong>on</strong> to voluntarily dismiss hiscomplaint so that he could join as a plaintiff in class acti<strong>on</strong> litigati<strong>on</strong> filed by The FootballAssociati<strong>on</strong> Premier League Limited against YouTube <strong>on</strong> May 4, 2007 in <strong>the</strong> Sou<strong>the</strong>rn Districtof New York. 19481942 Id. at 1109-10.1943 Id. at 1110-11 & 1118-19.1944 2007 U.S. Dist. LEXIS 50254 (C.D. Cal. June 20, 2007).1945 Id. at *9.1946 Id.1947 Id. at *10.1948 Order Granting Plaintiff’s Moti<strong>on</strong> to Voluntarily Dismiss Complaint, Tur v. YouTube, Inc., CV 06-4436 FMC(C.D. Cal. Oct. 19, 2007).- 419 -


k. Io Group v. Veoh Networks. In Io Group, Inc. v.Veoh Networks, Inc., 1949 a decisi<strong>on</strong> by a magistrate judge, Veoh operated a user-generatedc<strong>on</strong>tent web site through which users could also access videos from Veoh’s c<strong>on</strong>tent partners.Once video files were uploaded to Veoh’s system, Veoh’s employees selected videos to befeatured <strong>on</strong> <strong>the</strong> “Featured Videos” porti<strong>on</strong> of <strong>the</strong> web site. A number of clips submitted by usersc<strong>on</strong>tained c<strong>on</strong>tent from <strong>the</strong> Io Group’s copyrighted sexually explicit videos, and Io Group suedVeoh for copyright infringement for hosting <strong>the</strong> clips without giving prior notice to Veoh ordemanding that Veoh take down <strong>the</strong> allegedly infringing material. Veoh asserted <strong>the</strong> safe harborunder Secti<strong>on</strong> 512(c). 1950Before users could upload videos to Veoh’s site, <strong>the</strong>y were required to register and agreeto abide by <strong>the</strong> Terms of Use and Acceptable Use policies posted <strong>on</strong> <strong>the</strong> site. The Terms of Usestated that Veoh reserved <strong>the</strong> right to m<strong>on</strong>itor user-submitted material and to remove it from <strong>the</strong>site, that <strong>the</strong> user was not permitted to publish or make available any material that infringed thirdparty intellectual property rights, and that <strong>the</strong> user represented and warranted that it had all rightsnecessary to publish and distribute any material submitted to <strong>the</strong> site. Up<strong>on</strong> each upload ofparticular material, <strong>the</strong> user was presented with an explicit reminder that it must not uploadcopyrighted, pornographic, obscene, violent, or o<strong>the</strong>r videos that violate Veoh’s applicablepolicies. Up<strong>on</strong> receiving a notice that a user had uploaded infringing c<strong>on</strong>tent after a firstwarning, <strong>the</strong> user’s account would be terminated, all c<strong>on</strong>tent provided by that user disabled(unless <strong>the</strong> c<strong>on</strong>tent was also published by ano<strong>the</strong>r n<strong>on</strong>-terminated user and was not <strong>the</strong> subject ofa DMCA notice), and <strong>the</strong> user’s email address would be blocked so that a new account could notbe opened with that same address. Veoh also had <strong>the</strong> ability to disable access to such material<strong>on</strong> its users’ hard drives if <strong>the</strong>ir computers were still c<strong>on</strong>nected to <strong>the</strong> <strong>Internet</strong>, and it had adoptedmeans for generating a digital fingerprint for each video file that enabled Veoh to terminateaccess to any o<strong>the</strong>r identical files and prevent additi<strong>on</strong>al identical files from ever being uploadedby any user. 1951When users uploaded a video to Veoh’s system, <strong>the</strong>y would provide certain metadataabout <strong>the</strong> video, including title, descripti<strong>on</strong>, tags, selecti<strong>on</strong> of up to four categories bestdescribing <strong>the</strong> video, and a c<strong>on</strong>tent rating. Up<strong>on</strong> receiving a video submissi<strong>on</strong>, Veoh’scomputers would first c<strong>on</strong>firm that <strong>the</strong> submitted file was, in fact, a video file with a compatiblecodec, and if so, <strong>the</strong> system would extract <strong>the</strong> file format and length, assign a unique video IDnumber to it, index <strong>the</strong> user-entered metadata and store <strong>the</strong> informati<strong>on</strong> in a database <strong>on</strong> Veoh’sservers. The database also automatically indexed video files into a series of lists, such as “MostRecent,” “Top Rated,” “Most Popular,” “Most Discussed,” and “Top Favorite.” In additi<strong>on</strong> tosaving <strong>the</strong> file in its original format, which users could download using Veoh’s client software,<strong>the</strong> system also automatically c<strong>on</strong>verted <strong>the</strong> file into Flash format. The system also extractedduring <strong>the</strong> upload process 16 full resoluti<strong>on</strong> screen captures (screencaps) and 16 lower resoluti<strong>on</strong>screencaps. One of <strong>the</strong> lower resoluti<strong>on</strong> screencaps was used to represent <strong>the</strong> video in a searchresult which, when clicked <strong>on</strong>, took <strong>the</strong> user to a video details page c<strong>on</strong>taining <strong>the</strong> video and a1949 586 F. Supp. 1132 (N.D. Cal. 2008).1950 Id. at 1135-36.1951 Id. at 1137-38.- 420 -


link to view all 16 lower resoluti<strong>on</strong> screencaps. Veoh employees occasi<strong>on</strong>ally spot checkedvideos after publicati<strong>on</strong> for compliance with Veoh’s policies and to ensure accuracy in <strong>the</strong>descripti<strong>on</strong> and characterizati<strong>on</strong> of <strong>the</strong> c<strong>on</strong>tent, and <strong>on</strong> occasi<strong>on</strong> edited <strong>the</strong> video descripti<strong>on</strong>field. If a spot check revealed an instance of blatant copyright infringement (e.g., a movieknown to have been released <strong>on</strong>ly in <strong>the</strong>atres), Veoh disabled access to <strong>the</strong> material. 1952The court rejected Io Group’s argument that Veoh had not implemented its repeatinfringer policy in a reas<strong>on</strong>able manner. The court found that Veoh’s evidence established that ithad a working notificati<strong>on</strong> system and a procedure for dealing with copyright infringementnotices. Veoh’s policies identified its designated copyright agent and it often resp<strong>on</strong>ded toinfringement notices <strong>the</strong> same day received, or at most within a few days. When Veoh receivednotice that user had uploaded infringing c<strong>on</strong>tent after a first warning, <strong>the</strong> user’s account wasterminati<strong>on</strong> and all c<strong>on</strong>tent provided by that user was disabled. Veoh’s fingerprint technologyenabled it terminate access to any o<strong>the</strong>r identical files anjd prevent additi<strong>on</strong>al identical files fromever being uploaded by any user. Since <strong>the</strong> web site was launched, Veoh had terminated 1,096users for repeat copyright violati<strong>on</strong>s. 1953Io Group argued that Veoh’s policy failed because it did not prevent repeat infringersfrom reappearing <strong>on</strong> <strong>the</strong> site under a pseud<strong>on</strong>ym and a different email address. The courtrejected this argument, ruling that <strong>the</strong> hypo<strong>the</strong>tical possibility that a rogue user might reappearunder a different user name and identity did not raise a genuine fact issue as to <strong>the</strong>implementati<strong>on</strong> of Veoh’s policy. Io Group had presented no evidence that a repeat infringerhad, in fact, established a new account under false pretenses, much less that Veoh hadintenti<strong>on</strong>ally allowed that to happen. The court rejected Io Group’s reliance <strong>on</strong> <strong>the</strong> Napster caseas establishing a requirement under Secti<strong>on</strong> 512(i) that a site operator track users by <strong>the</strong>ir actualnames or IP addresses. Io Group had presented no evidence suggesting that tracking or verifyingusers’ actual identity or that blocking <strong>the</strong>ir IP addresses would be a more effective reas<strong>on</strong>ablemeans of implementati<strong>on</strong>, particularly given that IP addresses identify <strong>on</strong>ly a particular computerc<strong>on</strong>nected to <strong>the</strong> <strong>Internet</strong> and not particular users. The court ruled that Secti<strong>on</strong> 512(i) does notrequire service providers to track users in a particular way or to affirmatively police users forevidence of repeat infringement. Veoh’s tracking of c<strong>on</strong>tent that had been identified asinfringing and permanently blocking that c<strong>on</strong>tent from ever being uploaded by any user wasadequate to satisfy Secti<strong>on</strong> 512(i) requirements. 1954The court <strong>the</strong>n turned to whe<strong>the</strong>r <strong>the</strong> requirements of <strong>the</strong> Secti<strong>on</strong> 512(c) safe harbor hadbeen satisfied. Io Group argued that <strong>the</strong> Flash files and screencaps created during <strong>the</strong> publicati<strong>on</strong>process were not stored <strong>on</strong> Veoh’s system “at <strong>the</strong> directi<strong>on</strong> of a user,” but by Veoh’s own actsand decisi<strong>on</strong>s, and that Secti<strong>on</strong> 512(c) was not intended to protect <strong>the</strong> creati<strong>on</strong> of those filesbecause Veoh used <strong>the</strong>m as a means of distributi<strong>on</strong> (e.g., by indexing c<strong>on</strong>tent and organizing<strong>the</strong>m into lists), and not just storage. The court rejected this argument, noting that <strong>the</strong> broaderdefiniti<strong>on</strong> of “service provider” under Secti<strong>on</strong> 512(k)(1)(B) does not c<strong>on</strong>tain an express1952 Id. at 1138-40.1953 Id. at 1143.1954 Id. at 1143-45.- 421 -


limitati<strong>on</strong> that <strong>the</strong> c<strong>on</strong>tent of material stored <strong>on</strong> <strong>the</strong> system not be modified. And existing caselaw such as <strong>the</strong> CoStar v. LoopNet decisi<strong>on</strong> supported <strong>the</strong> c<strong>on</strong>clusi<strong>on</strong> that Veoh was notprecluded from <strong>the</strong> Secti<strong>on</strong> 512(c) safe harbor by virtue of its automated processing of usersubmittedc<strong>on</strong>tent. The court noted that Veoh did not itself actively participate or supervise <strong>the</strong>uploading of files, nor did it preview or select <strong>the</strong> files before <strong>the</strong> upload was completed.Instead, video files were uploaded through an automated process that was initiated entirely at <strong>the</strong>voliti<strong>on</strong> of Veoh’s users. Inasmuch as <strong>the</strong> c<strong>on</strong>versi<strong>on</strong> to Flash format was a means of facilitatinguser access to material <strong>on</strong> its web site, <strong>the</strong> court held that Veoh did not lose <strong>the</strong> safe harborthrough <strong>the</strong> automated creati<strong>on</strong> of those files. 1955Turning to <strong>the</strong> issue of knowledge of <strong>the</strong> infringing activity, <strong>the</strong> court found that, becauseIo Group had provided Veoh no notice of any claimed copyright infringement before filing itslawsuit, Veoh had not actual knowledge of <strong>the</strong> infringing activity at issue. With respect toknowledge through signs of apparent infringing activity, <strong>the</strong> court noted <strong>the</strong> applicable “red flag”test, which requires <strong>the</strong> service provider to be aware of blatant factors indicating infringement.The court found no such factors present in <strong>the</strong> instant case. N<strong>on</strong>e of <strong>the</strong> allegedly infringingvideo files uploaded by Veoh’s users c<strong>on</strong>tain Io Group’s copyright notices. Although <strong>on</strong>e of <strong>the</strong>works did c<strong>on</strong>tain <strong>the</strong> plaintiff’s trademark several minutes into <strong>the</strong> clip, <strong>the</strong>re was no evidencefrom which it could be inferred that Veoh was aware of, but chose to ignore, it. Nor would <strong>the</strong>professi<strong>on</strong>ally created nature of submitted c<strong>on</strong>tent c<strong>on</strong>stitute a red flag per se, particularly giventhat <strong>the</strong> video equipment available to <strong>the</strong> general public was of such quality that <strong>the</strong>re might belittle distincti<strong>on</strong> left between professi<strong>on</strong>al and amateur producti<strong>on</strong>s. Finally, <strong>the</strong> court rejected IoGroup’s argument that Veoh should have known that no legitimate producer of sexually explicitmaterial would have omitted <strong>the</strong> labels required by federal law for sexually explicit materialidentifying where records as to <strong>the</strong> performers depicted are kept. The court ruled that <strong>the</strong>absence of such labels did not give rise to a genuine issue of material fact as to whe<strong>the</strong>r Veohhad <strong>the</strong> requisite level of knowledge or awareness that <strong>the</strong> plaintiff’s copyrights were beingviolated. 1956With respect to <strong>the</strong> requirement to act expeditiously to remove or disable access tomaterial, undisputed evidence established that when Veoh received DMCA-compliant notices, itresp<strong>on</strong>ded and removed noticed c<strong>on</strong>tent <strong>on</strong> <strong>the</strong> same day <strong>the</strong> notice was received or within a fewdays <strong>the</strong>reafter. In additi<strong>on</strong>, Veoh also promptly investigated o<strong>the</strong>r complaints about c<strong>on</strong>tent <strong>on</strong>its web site through a “Flag It!” feature that enabled users to bring certain c<strong>on</strong>tent to Veoh’sattenti<strong>on</strong> by flagging it from a set list of reas<strong>on</strong>s such as mis-rated c<strong>on</strong>tent, sexually explicitc<strong>on</strong>tent, and obscene c<strong>on</strong>tent. Io Group argued that Veoh had willfully blinded itself to factssuggesting infringement because <strong>the</strong> list of reas<strong>on</strong>s <strong>on</strong> <strong>the</strong> “Flag It!” feature no l<strong>on</strong>ger c<strong>on</strong>taineda choice for “appears to c<strong>on</strong>tain copyrighted material.” The court rejected this argument, notingthat <strong>the</strong> “Flag It!” feature itself c<strong>on</strong>tained a notice, prominently displayed at <strong>the</strong> top of <strong>the</strong> “FlagIt!” dialog box, directing copyright owners to a link with instructi<strong>on</strong>s for submitting a copyrightinfringement notice to Veoh. 19571955 Id. at 1146-48.1956 Id. at 1148-49.1957 Id. at 1149-50.- 422 -


Finally, with respect to <strong>the</strong> issue of right and ability to c<strong>on</strong>trol <strong>the</strong> infringing activity, <strong>the</strong>court rejected Io Group’s argument that <strong>the</strong> requisite “right and ability to c<strong>on</strong>trol” was presentbecause Veoh had established and enforced policies prohibiting users from engaging in a host ofillegal and o<strong>the</strong>r c<strong>on</strong>duct <strong>on</strong> its web site and exercised <strong>the</strong> right to police its system byc<strong>on</strong>ducting occasi<strong>on</strong>al spot checks of video files for compliance. The court noted that <strong>the</strong>plaintiff was focused <strong>on</strong> <strong>the</strong> wr<strong>on</strong>g inquiry. Under Secti<strong>on</strong> 512(c), <strong>the</strong> pertinent inquiry was notwhe<strong>the</strong>r Veoh had <strong>the</strong> right and ability to c<strong>on</strong>trol its system, but ra<strong>the</strong>r whe<strong>the</strong>r it had <strong>the</strong> rightand ability to c<strong>on</strong>trol <strong>the</strong> infringing activity. The latter cannot simply mean <strong>the</strong> ability of aservice provider to block or remove access to materials posted <strong>on</strong> its web site. The courtdistinguished <strong>the</strong> Napster system, which existed solely to provide <strong>the</strong> site and facilities forcopyright infringement, and Napster’s c<strong>on</strong>trol over its system was directly intertwined with itsability to c<strong>on</strong>trol infringing activity. In <strong>the</strong> instant case, by c<strong>on</strong>trast, Veoh’s right and ability toc<strong>on</strong>trol its system did not equate to <strong>the</strong> right and ability to c<strong>on</strong>trol infringing activity. UnlikeNapster, <strong>the</strong>re was no suggesti<strong>on</strong> that Veoh aimed to encourage copyright infringement <strong>on</strong> itssystem or that it could c<strong>on</strong>trol what c<strong>on</strong>tent users chose to upload before it was uploaded. Giventhat Veoh received hundreds of thousands of video files from its users, <strong>the</strong> court ruled that noreas<strong>on</strong>able juror could c<strong>on</strong>clude that a comprehensive review of every file would be feasible.And even if it were, <strong>the</strong>re could be no assurance that Veoh could have accurately identified <strong>the</strong>infringing c<strong>on</strong>tent at issue. Accordingly, Veoh’s ability to c<strong>on</strong>trol its index did not equate to anability to identify and terminate infringing videos. For <strong>the</strong> most part, <strong>the</strong> files in questi<strong>on</strong> did notbear titles resembling <strong>the</strong> plaintiff’s works and <strong>the</strong> plaintiff had not provided Veoh with its titlesto search. 1958The court fur<strong>the</strong>r observed that, perhaps most importantly, <strong>the</strong>re was no indicati<strong>on</strong> thatVeoh had failed to police its system to <strong>the</strong> fullest extent permitted by its architecture. Oncec<strong>on</strong>tent had been identified as infringing, Veoh’s digital fingerprint technology prevented <strong>the</strong>same infringing c<strong>on</strong>tent from ever being uploaded again, indicating that Veoh had taken steps toreduce, not foster, <strong>the</strong> incidence of copyright infringement <strong>on</strong> its web site. The court rejected IoGroup’s argument that Veoh should have verified <strong>the</strong> source of all incoming videos by obtainingand c<strong>on</strong>firming <strong>the</strong> names and addresses of <strong>the</strong> submitting user, <strong>the</strong> producer, and <strong>the</strong> submittinguser’s authority to upload a given file, as required by California Penal Code § 653w and 18U.S.C. § 2257. The court noted that <strong>the</strong> issue was not Veoh’s compliance with those statutoryrequirements, nor whe<strong>the</strong>r it should have been aware that certain c<strong>on</strong>tent was infringing. Ra<strong>the</strong>r,<strong>the</strong> questi<strong>on</strong> was whe<strong>the</strong>r Veoh declined to exercise a right to stop it. 1959 “Declining to changebusiness operati<strong>on</strong>s is not <strong>the</strong> same as declining to exercise a right and ability to c<strong>on</strong>trolinfringing activity.” 1960 The plaintiff’s suggesti<strong>on</strong> that Veoh must be required to reduce or limitits business operati<strong>on</strong>s was c<strong>on</strong>trary to <strong>on</strong>e of <strong>the</strong> stated goals of <strong>the</strong> DMCA to facilitate <strong>the</strong>growth of electr<strong>on</strong>ic commerce. 19611958 Id. at 1150-53.1959 Id. at 1153-54.1960 Id. at 1154.1961 Id.- 423 -


Accordingly, <strong>the</strong> court granted Veoh’s moti<strong>on</strong> for summary judgment under <strong>the</strong> Secti<strong>on</strong>512(c) safe harbor. It cauti<strong>on</strong>ed however, that<strong>the</strong> decisi<strong>on</strong> rendered here is c<strong>on</strong>fined to <strong>the</strong> particular combinati<strong>on</strong> of facts inthis case and is not intended to push <strong>the</strong> bounds of <strong>the</strong> safe harbor so wide thatless than scrupulous service providers may claim its protecti<strong>on</strong>. Never<strong>the</strong>less, <strong>the</strong>court does not find that <strong>the</strong> DMCA was intended to have Veoh shoulder <strong>the</strong> entireburden of policing third-party copyrights <strong>on</strong> its website (at <strong>the</strong> cost of losing itsbusiness if it cannot). Ra<strong>the</strong>r, <strong>the</strong> issue is whe<strong>the</strong>r Veoh takes appropriate steps todeal with copyright infringement that takes place. The record presenteddem<strong>on</strong>strates that, far from encouraging copyright infringement, Veoh has astr<strong>on</strong>g DMCA policy, takes active steps to limit incidents of infringement <strong>on</strong> itswebsite and works diligently to keep unauthorized works off its website. 1962l. UMG Recordings v. Veoh Networks. The case ofUMG Recordings, Inc. v. Veoh Networks, Inc. 1963 involved <strong>the</strong> same user-generated c<strong>on</strong>tent site,Veoh Networks, as <strong>the</strong> case described in <strong>the</strong> previous subsecti<strong>on</strong>. The plaintiffs, who ownedrights to copyrighted sound recordings and musical compositi<strong>on</strong>s allegedly used withoutauthorizati<strong>on</strong> in user-submitted videos to <strong>the</strong> site, sought summary judgment that Veoh was notentitled to <strong>the</strong> Secti<strong>on</strong> 512(c) safe harbor because of four functi<strong>on</strong>s performed by Veoh’ssoftware that <strong>the</strong> plaintiffs claimed were not “storage” and were not undertaken “at <strong>the</strong> directi<strong>on</strong>of <strong>the</strong> user”: automatically creating Flash formatted copies of video files uploaded by users,automatically creating copies of uploaded video files that are comprised of smaller chunks of <strong>the</strong>original file, allowing users to access uploaded videos via streaming, and allowing users toaccess uploaded videos by downloading whole video files. The court denied <strong>the</strong> plaintiff’smoti<strong>on</strong>. 1964The court noted that <strong>the</strong> IoGroup case had held that Secti<strong>on</strong> 512(c) was applicable to <strong>the</strong>creati<strong>on</strong> of Flash formatted files, but <strong>the</strong> applicability of Secti<strong>on</strong> 512(c) to <strong>the</strong> o<strong>the</strong>r threechallenged software functi<strong>on</strong>s was a questi<strong>on</strong> of first impressi<strong>on</strong>. 1965 Although <strong>the</strong> plaintiffsc<strong>on</strong>ceded that all four challenged software functi<strong>on</strong>s were directed toward facilitating access tomaterials stored at <strong>the</strong> directi<strong>on</strong> of users, <strong>the</strong>y argued that Secti<strong>on</strong> 512(c) requires that <strong>the</strong> serviceprovider’s c<strong>on</strong>duct be storage, and that <strong>the</strong> storage be at <strong>the</strong> directi<strong>on</strong> of a user. The courtrejected this argument, finding that <strong>the</strong> safe harbor extends to functi<strong>on</strong>s o<strong>the</strong>r than mere storage,since <strong>the</strong> statutory language applies to “infringement of copyright by reas<strong>on</strong> of <strong>the</strong> storage at <strong>the</strong>directi<strong>on</strong> of a user.” 1966 When copyrighted c<strong>on</strong>tent was displayed or distributed <strong>on</strong> Veoh’ssystem it was by reas<strong>on</strong> of or attributable to <strong>the</strong> fact that users uploaded <strong>the</strong> c<strong>on</strong>tent to Veoh’s1962 Id. at 1155.1963 620 F. Supp. 2d 1081 (C.D. Cal. 2008).1964 Id. at 1083.1965 Id.1966 Id. at 1088 (emphasis added).- 424 -


servers to be accessed by o<strong>the</strong>r means. 1967summary judgment, c<strong>on</strong>cluding:The court <strong>the</strong>refore denied <strong>the</strong> plaintiffs’ moti<strong>on</strong> forThe four software functi<strong>on</strong>s that UMG challenges fall within <strong>the</strong> scope of §512(c), because all of <strong>the</strong>m are narrowly directed toward providing access tomaterial stored at <strong>the</strong> directi<strong>on</strong> of users. Both <strong>the</strong> c<strong>on</strong>versi<strong>on</strong> of uploaded filesinto Flash format and <strong>the</strong> “chunking” of uploaded files are undertaken to make iteasier for users to view and download movies, and affect <strong>on</strong>ly <strong>the</strong> form and not<strong>the</strong> c<strong>on</strong>tent of <strong>the</strong> movies; “streaming” and downloading merely are twotechnically different means of accessing uploaded videos. 1968Following this ruling, Veoh moved for summary judgment that it had satisfied <strong>the</strong>remaining requirements of Secti<strong>on</strong> 512(c) and was <strong>the</strong>refore not liable for m<strong>on</strong>etary or injunctiverelief. The court granted Veoh’s moti<strong>on</strong> for summary judgment. 1969 Because <strong>the</strong> basic facts of<strong>the</strong> case were not disputed, <strong>the</strong> court’s opini<strong>on</strong> addressed <strong>the</strong> significant questi<strong>on</strong> of <strong>the</strong> extent towhich <strong>the</strong> DMCA obligates <strong>Internet</strong>-based services like Veoh, which rely <strong>on</strong> c<strong>on</strong>tent c<strong>on</strong>tributedby users, to police <strong>the</strong>ir systems to prevent copyright infringement.The court began its analysis with a review of certain key facts about <strong>the</strong> way <strong>the</strong> Veohsystem operated, and <strong>the</strong>se facts seemed to provide important c<strong>on</strong>text for <strong>the</strong> court’s c<strong>on</strong>clusi<strong>on</strong>sc<strong>on</strong>cerning whe<strong>the</strong>r Veoh should have DMCA immunity. Each time users began to upload avideo to <strong>the</strong> veoh.com web site <strong>the</strong>y were shown a message stating, “Do not upload videos thatinfringe copyright, are pornographic, obscene, violent, or any o<strong>the</strong>r videos that violate Veoh’sTerms of Use.” 1970 Veoh’s employees did not review user-submitted c<strong>on</strong>tent before it becameavailable to o<strong>the</strong>r users, although Veoh’s system did allow it to disable access to inappropriatevideos. Veoh used a number of technologies to automatically prevent copyright infringement <strong>on</strong>its system. Beginning in 2006, when Veoh disabled access to a video that infringed a copyright,it used hash filtering software to <strong>the</strong>reafter automatically disable access to any identical videoand block any subsequently submitted duplicates. In additi<strong>on</strong>, in 2007, Veoh began using <strong>the</strong>Audible Magic commercial software to filter out potentially infringing video files from beinguploaded in <strong>the</strong> first instance by taking an audio fingerprint from <strong>the</strong> video files and comparing itto a database of copyright c<strong>on</strong>tent that was protected by copyright holders like UMG.Approximately nine m<strong>on</strong>ths later, Veoh applied <strong>the</strong> Audible Magic filter to its backlog of videos,resulting in <strong>the</strong> removal of more than 60,000 videos. Although <strong>the</strong> vast majority of allegedlyinfringing files had been removed in resp<strong>on</strong>se to notices from <strong>the</strong> RIAA (acting as UMGRecording’s agent) and <strong>the</strong> Audible Magic software, several hundred o<strong>the</strong>r allegedly infringingfiles that <strong>the</strong> Audible Magic filter had failed to identify as infringing remained <strong>on</strong> <strong>the</strong> system. 19711967 Id. at 1088-89.1968 Id. at 1092.1969 UMG Recordings, Inc. v. Veoh Networks Inc., 2009 U.S. Dist. LEXIS 86932 (Sept. 11, 2009).1970 Id. at *6.1971 Id. at *6-12.- 425 -


The court <strong>the</strong>n turned to analysis of each of <strong>the</strong> requirements of <strong>the</strong> Secti<strong>on</strong> 512(c) safeharbor. Addressing first <strong>the</strong> requirement that Veoh act expeditiously to remove infringingc<strong>on</strong>tent up<strong>on</strong> obtaining ei<strong>the</strong>r actual knowledge or awareness of facts and circumstances fromwhich infringing activity is apparent, <strong>the</strong> court ruled that UMG had failed to rebut Veoh’sshowing that when it acquired knowledge of allegedly infringing material – whe<strong>the</strong>r fromDMCA notices, informal notices, or o<strong>the</strong>r means – it expeditiously removed such material.Citing <strong>the</strong> Ninth Circuit’s CCBill decisi<strong>on</strong>, <strong>the</strong> court noted that <strong>the</strong> DMCA notificati<strong>on</strong>procedures place <strong>the</strong> burden of policing copyright infringement by identifying potentiallyinfringing material and adequately documenting infringement squarely <strong>on</strong> <strong>the</strong> copyright owner.The court noted that CCBill fur<strong>the</strong>r taught that if investigati<strong>on</strong> of facts and circumstances isrequired to identify material as infringing, <strong>the</strong>n those facts and circumstances are not “red flags”of infringement. 1972 The court c<strong>on</strong>cluded: “In light of <strong>the</strong> principles articulated in CCBill that<strong>the</strong> burden is <strong>on</strong> <strong>the</strong> copyright holder to provide notice of allegedly infringing material, and thatit takes willful ignorance of readily apparent infringement to find a ‘red flag,’ Veoh has providedsubstantial evidence that it fulfilled <strong>the</strong> requirements of secti<strong>on</strong> 512(c)(1)(A).” 1973Specifically, with respect to actual knowledge, <strong>the</strong> court rejected UMG’s argument thatVeoh had actual knowledge of infringement merely because it knew that it was hosting an entirecategory of c<strong>on</strong>tent – music – that was subject to copyright protecti<strong>on</strong>. The court found that ifthis were <strong>the</strong> standard for actual knowledge, <strong>the</strong> Secti<strong>on</strong> 512(c) safe harbor would be a deadletter because vast porti<strong>on</strong>s of c<strong>on</strong>tent <strong>on</strong> <strong>the</strong> <strong>Internet</strong> are eligible for copyright protecti<strong>on</strong>. Nordid Veoh’s automatic tagging of more than 240,000 videos with <strong>the</strong> label “music video” give itactual knowledge that such videos were infringing. The court also rejected UMG’s argumentthat <strong>the</strong> RIAA’s DMCA notices gave Veoh notice of infringement bey<strong>on</strong>d <strong>the</strong> specific materialsthat <strong>the</strong> RIAA identified because <strong>the</strong> notices listed artists who made <strong>the</strong> materials. UMG arguedthat Veoh should have sought out actual knowledge of o<strong>the</strong>r infringing videos by searching itssystem for all videos by <strong>the</strong> artists identified in <strong>the</strong> RIAA notices, because a list of artist nameswas equivalent to a representative list of allegedly infringing works, which <strong>the</strong> DMCA allows<strong>the</strong> copyright holder to supply. The court ruled that providing names of artists is not <strong>the</strong> same asa representative list of works. An artist’s name is not informati<strong>on</strong> reas<strong>on</strong>ably sufficient to permita service provider to locate allegedly infringing material. Accordingly, <strong>the</strong> court c<strong>on</strong>cluded thatUMG had not provided evidence establishing that Veoh failed to act expeditiously whenever ithad actual notice of infringement, whe<strong>the</strong>r from DMCA notices or o<strong>the</strong>r sources ofinformati<strong>on</strong>. 1974With respect to Veoh’s awareness of facts or circumstances from which infringingactivity was apparent under <strong>the</strong> “red flag” test, <strong>the</strong> court rejected UMG’s argument that Veohwas ineligible for <strong>the</strong> safe harbor because its founders, employees, and investors knew thatwidespread infringement was occurring <strong>on</strong> <strong>the</strong> Veoh system. The court held that, even if thiswere true and undisputed, UMG had cited no case holding that a service provider’s generalawareness of infringement, without more, is enough to preclude applicati<strong>on</strong> of Secti<strong>on</strong> 512(c),1972 Id. at *19-24.1973 Id. at *24-25.1974 Id. at *25-31.- 426 -


and such a holding would be c<strong>on</strong>trary to C<strong>on</strong>gress’ intent that <strong>the</strong> DMCA safe harbors facilitate<strong>the</strong> robust development of world-wide expansi<strong>on</strong> of electr<strong>on</strong>ic commerce, communicati<strong>on</strong>s, andresearch in <strong>the</strong> digital age. 1975The court also rejected UMG’s c<strong>on</strong>tenti<strong>on</strong> that Veoh avoided gaining knowledge ofinfringement by delaying implementati<strong>on</strong> of <strong>the</strong> Audible Magic fingerprinting system for acouple of years after its commercial availability:UMG has not established that <strong>the</strong> DMCA imposes an obligati<strong>on</strong> <strong>on</strong> a serviceprovider to implement filtering technology at all, let al<strong>on</strong>e technology from <strong>the</strong>copyright holder’s preferred vendor or <strong>on</strong> <strong>the</strong> copyright holder’s desired timeline.Moreover, it is undisputed that Veoh did take steps to implement filteringtechnology before it implemented <strong>the</strong> Audible Magic system that UMG prefers,by using “hash” filtering and by attempting to develop its own filtering software.UMG dismisses hash filtering as “highly ineffectual,” but that it proved deficientand that Veoh turned to Audible Magic does not negate Veoh’s showing of goodfaith efforts to avoid or limit storage of infringing c<strong>on</strong>tent. 1976Accordingly, <strong>the</strong> court c<strong>on</strong>cluded that Veoh had shown that it was not aware of “redflags,” notwithstanding its knowledge of <strong>the</strong> general propositi<strong>on</strong> that infringing material wasoften uploaded to web sites, and UMG had failed to present evidence to <strong>the</strong> c<strong>on</strong>trary. 1977The court <strong>the</strong>n turned to Secti<strong>on</strong> 512(c)’s requirement that <strong>the</strong> service provider notreceive a financial benefit directly attributable to infringing activity that <strong>the</strong> service provider has<strong>the</strong> right and ability to c<strong>on</strong>trol. The court first observed that, because <strong>the</strong> capacity to c<strong>on</strong>trol andremove material are features that a service provider that stores c<strong>on</strong>tent <strong>on</strong> its system must have inorder to implicate <strong>the</strong> Secti<strong>on</strong> 512(c) safe harbor at all, those facts al<strong>on</strong>e cannot c<strong>on</strong>stitute <strong>the</strong>type of c<strong>on</strong>trol that is disqualifying. Nor could <strong>the</strong> right and ability to implement filteringsoftware, standing al<strong>on</strong>e or even al<strong>on</strong>g with Veoh’s ability to c<strong>on</strong>trol user’s access, be <strong>the</strong> basisfor ineligibility for <strong>the</strong> safe harbor. 1978 The court noted Secti<strong>on</strong> 512(m)’s provisi<strong>on</strong> that <strong>the</strong> safeharbors are not c<strong>on</strong>diti<strong>on</strong>ed up<strong>on</strong> a service provider m<strong>on</strong>itoring its service or affirmativelyseeking facts indicating infringing activity, and c<strong>on</strong>cluded:If courts were to find that <strong>the</strong> availability of superior filtering systems or <strong>the</strong>ability to search for potentially infringing files establishes – without more – that aservice provider has “<strong>the</strong> right and ability to c<strong>on</strong>trol” infringement, that wouldeffectively require service providers to adopt specific filtering technology andperform regular searches. That, in turn, would impermissibly c<strong>on</strong>diti<strong>on</strong> <strong>the</strong>1975 Id. at *32-33.1976 Id. at *35.1977 Id. at *36.1978 Id. at *37-38.- 427 -


applicati<strong>on</strong> of secti<strong>on</strong> 512(c) <strong>on</strong> “a service provider m<strong>on</strong>itoring its service oraffirmatively seeking facts indicating infringing activity.” 1979UMG urged <strong>the</strong> court to follow two “principles” it claimed were established by <strong>the</strong>Napster cases: (1) that <strong>the</strong> ability to block infringers’ access to a particular envir<strong>on</strong>ment for anyreas<strong>on</strong> whatsoever is evidence of <strong>the</strong> right and ability to supervise, and (2) that to escapevicarious liability, <strong>the</strong> reserved right to police must be exercised to its fullest extent. The courtrefused, noting that if it were to adopt principle (1) from Napster it would render <strong>the</strong> statutoryphrase “right and ability to c<strong>on</strong>trol” redundant, because <strong>the</strong> ability to block infringers’ access forany reas<strong>on</strong> whatsoever is already a prerequisite to satisfying <strong>the</strong> predicate requirements ofSecti<strong>on</strong> 512(i)(1)(A). And if <strong>the</strong> court were to adopt principle (2), it would run afoul of Secti<strong>on</strong>512(m). Accordingly, <strong>the</strong> court ruled that, although <strong>the</strong> “direct financial benefit” standardshould be <strong>the</strong> same as <strong>the</strong> comm<strong>on</strong> law direct financial benefit standard for vicariousinfringement, <strong>the</strong> phrase “right and ability to c<strong>on</strong>trol” should be c<strong>on</strong>strued to impose a higherstandard of c<strong>on</strong>trol than <strong>the</strong> comm<strong>on</strong> law standard for vicarious liability, and UMG had notestablished that Veoh met that higher standard of c<strong>on</strong>trol. 1980Finally, <strong>the</strong> court turned to whe<strong>the</strong>r Veoh had met Secti<strong>on</strong> 512(i)’s requirement withrespect to terminati<strong>on</strong> of repeat infringers. UMG c<strong>on</strong>tended that Veoh’s terminati<strong>on</strong> policy wasinadequate because it did not automatically terminate users who uploaded videos that wereblocked by <strong>the</strong> Audible Magic filter. The court rejected this argument because howeverbeneficial <strong>the</strong> Audible Magic technology was in helping to identify infringing material, it did notmeet <strong>the</strong> standard of reliability and verifiability required by <strong>the</strong> Ninth Circuit to justifyterminating a user’s account. The court reas<strong>on</strong>ed that, in view of <strong>the</strong> Ninth Circuit’s ruling inCCBill that a notice by a copyright holder that specific material was allegedly infringing was nota sufficient basis for terminating a user because it lacked a sworn declarati<strong>on</strong> that <strong>the</strong> notifier hada good faith belief that <strong>the</strong> material was unlicensed, it stood to reas<strong>on</strong> that Audible Magic’sautomated filter also could not be a basis. The court noted that <strong>the</strong>re was no evidence in <strong>the</strong>record of a feasible way for Veoh to verify informati<strong>on</strong> in Audible Magic’s database or evaluateAudible Magic’s process for compiling <strong>the</strong> database. Veoh had requested Audible Magic forc<strong>on</strong>tact informati<strong>on</strong> of copyright claimants for works identified by Audible Magic’s filter, foruse in implementing a counter-notice procedure, and Audible Magic had refused. Accordingly,<strong>the</strong> court c<strong>on</strong>cluded that Veoh had no way of verifying <strong>the</strong> accuracy of Audible Magic’sdatabase, and even if it did, it would be unreas<strong>on</strong>able to place that burden <strong>on</strong> Veoh. 1981 “As apractical matter, when notice of a user’s alleged infringement is not reliable enough to justifyterminating <strong>the</strong> user’s account, a service provider’s removal of <strong>the</strong> allegedly infringing materialis sufficient evidence of compliance with <strong>the</strong> DMCA. In this case, when Veoh received noticesof infringement it promptly removed <strong>the</strong> material identified.” 19821979 Id. at *39. The court also quoted H. C<strong>on</strong>f. Report 105-796 at 73 (Oct. 8, 1998): “Court should not c<strong>on</strong>cludethat <strong>the</strong> service provider loses eligibility for limitati<strong>on</strong>s <strong>on</strong> liability under secti<strong>on</strong> 512 solely because it engagedin a m<strong>on</strong>itoring program.”1980 Id. at *46-50.1981 Id. at *50-55.1982 Id. at *55.- 428 -


The court also rejected UMG’s argument that Veoh failed to adequately terminate repeatinfringers because it did not necessarily terminate users who uploaded multiple videos that wereidentified in a single DMCA notice. If a single DMCA notice from <strong>the</strong> RIAA identified multiplevideos uploaded by <strong>on</strong>e user, Veoh sent <strong>the</strong> user a first warning. It <strong>the</strong>n terminated <strong>the</strong> user’saccount if <strong>the</strong> user subsequently uploaded ano<strong>the</strong>r infringing video. The court held that thispolicy satisfied Secti<strong>on</strong> 512(i)’s requirements, and UMG had pointed to nothing in <strong>the</strong> statute,legislative history, or case law establishing that such a policy was not reas<strong>on</strong>able or appropriate.Accordingly, <strong>the</strong> court granted Veoh’s moti<strong>on</strong> for summary judgment that it was entitled to <strong>the</strong>Secti<strong>on</strong> 512(c) safe harbor. 1983 m. Perfect 10 v. Amaz<strong>on</strong>. In Perfect 10, Inc. v.Amaz<strong>on</strong>.com, Inc., 1984 Perfect 10 sought to hold Amaz<strong>on</strong>’s subsidiary A9, which operated <strong>the</strong>A9 search engine that enabled searching of c<strong>on</strong>tent <strong>on</strong> Amaz<strong>on</strong>.com and o<strong>the</strong>r sources,c<strong>on</strong>tributorily liable for infringing postings of Perfect 10’s copyrighted photos. A9 moved forsummary judgment under <strong>the</strong> Secti<strong>on</strong> 512(c) safe harbor <strong>on</strong> <strong>the</strong> ground that it was undisputedthat Perfect 10 sent its DMCA notices to Amaz<strong>on</strong> ra<strong>the</strong>r than A9. A9 had designated its owncopyright agent in Palo Alto with <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office. The <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office designati<strong>on</strong>included, in lieu of an email address for <strong>the</strong> agent, <strong>the</strong> URL of an <strong>on</strong>line DMCA complaintform. 1985 Meanwhile, <strong>on</strong> Amaz<strong>on</strong>’s web site, Amaz<strong>on</strong>’s “Notice and Procedure for MakingClaims of <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Infringement” instructed users to c<strong>on</strong>tact Amaz<strong>on</strong>’s copyright agent inSeattle for notifying Amaz<strong>on</strong> “and its affiliates” of copyright infringement. The designati<strong>on</strong>Amaz<strong>on</strong> filed with <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office listed a number of Amaz<strong>on</strong>-owned entities as“alternative names of service provider” but A9 was not am<strong>on</strong>g <strong>the</strong> listed entities. 1986Perfect 10’s President, Dr. Zada, sent a letter to Amaz<strong>on</strong>’s copyright agent c<strong>on</strong>cerningalleged infringements in <strong>the</strong> search results of A9’s search engine. Amaz<strong>on</strong>’s corporate counsel,Karen Ressmeyer, called Dr. Zada and informed him that Google, not Amaz<strong>on</strong> or A9, provided<strong>the</strong> search results and <strong>the</strong>re was nothing Amaz<strong>on</strong> could do about <strong>the</strong> complaints. After receivingseveral additi<strong>on</strong>al letters from Zada alleging infringements <strong>on</strong> A9, Ressmeyer c<strong>on</strong>tacted Googleherself and, at Google’s suggesti<strong>on</strong>, forwarded Zada’s letters to Google. She informed Zada ofthis fact in a letter, which she copied to J<strong>on</strong>athan Leblang, <strong>the</strong> individual whom A9 hadidentified as its copyright agent in its filing at <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office. Despite all of hiscorresp<strong>on</strong>dence with Ressmeyer, Amaz<strong>on</strong> never told Zada that he had to send his notices ofinfringement to A9 directly. No <strong>on</strong>e at Amaz<strong>on</strong> told him that <strong>the</strong> notices were not beingforwarded to A9 or that it was not sufficient to send <strong>the</strong>m to Amaz<strong>on</strong>. 1987Perfect 10 argued that A9 was not entitled to <strong>the</strong> safe harbor because it had actualknowledge of infringement by virtue of <strong>the</strong> fact that it did in fact receive Perfect 10’s DMCAnotices. In part, Perfect 10 relied <strong>on</strong> post-litigati<strong>on</strong> notices it sent to A9’s copyright agent. The1983 Id. at *50-51 & *55-56.1984 2009 U.S. Dist. LEXIS 42341 (C.D. Cal. May 12, 2009).1985 Id. at *2 & 4-5.1986 Id. at *5-6.1987 Id. at *6-10.- 429 -


court ruled that <strong>the</strong> post-litigati<strong>on</strong> instances of A9 receiving informati<strong>on</strong> of claimedinfringements did not c<strong>on</strong>stitute notificati<strong>on</strong> under Secti<strong>on</strong> 512(c)(3) with respect to prelitigati<strong>on</strong>infringements claimed in <strong>the</strong> original complaint. Perfect 10 also cited Ressmeyer’sletter to Zada that was copied to A9’s copyright agent Leblang. The court rejected this basisalso, noting that <strong>the</strong> letter did not indicate that Amaz<strong>on</strong> forwarded any DMCA notices to A9 anddid not provide any informati<strong>on</strong> about <strong>the</strong> infringing material, so <strong>the</strong> letter al<strong>on</strong>e did not establishei<strong>the</strong>r that A9 received any of Perfect 10’s notices or that it had actual knowledge of specificinfringing activities available using its system. 1988Perfect 10 argued that Amaz<strong>on</strong> should be equitably estopped from asserting that Perfect10 improperly sent its notices to Amaz<strong>on</strong> because <strong>the</strong> C<strong>on</strong>diti<strong>on</strong>s of Use posted <strong>on</strong> Amaz<strong>on</strong>’ssite allegedly instructed copyright owners to send DMCA notices regarding its affiliates directlyto Amaz<strong>on</strong>. The court rejected this argument, noting that nowhere in <strong>the</strong> C<strong>on</strong>diti<strong>on</strong>s of Use didAmaz<strong>on</strong> purport to include A9 am<strong>on</strong>g its affiliates and Amaz<strong>on</strong>’s filing with <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>Office identifying <strong>the</strong> subsidiary entities for which Amaz<strong>on</strong>’s copyright agent would acceptcomplaints did not include A9. 1989Perfect 10 fur<strong>the</strong>r argued that Amaz<strong>on</strong> was <strong>the</strong> proper recipient of <strong>the</strong> notices because <strong>the</strong>infringing activity took place through <strong>the</strong> A9 search box that was <strong>on</strong> <strong>the</strong> Amaz<strong>on</strong> web site. Thecourt rejected this argument, holding that <strong>the</strong> presence of <strong>the</strong> search box <strong>on</strong> Amaz<strong>on</strong>’s web sitedid not make Amaz<strong>on</strong> <strong>the</strong> proper recipient because A9 had designated its own copyright agentand Zada knew that A9 was a separate corporati<strong>on</strong> entity. Perfect 10 also c<strong>on</strong>tended thatAmaz<strong>on</strong> was obligated to notify A9 of <strong>the</strong> alleged infringements because it owned and hostedA9. The court also rejected this argument, noting Perfect 10 had cited no authority that wouldrequire <strong>on</strong>e OSP, by virtue of its ownership or hosting of ano<strong>the</strong>r OSP, to pass al<strong>on</strong>g a DMCAnotice, where <strong>the</strong> two OSPs were distinct corporate entities and each had properly designated itsown copyright agent. 1990Lastly, Perfect 10 argued that A9 had failed to comply fully with <strong>the</strong> requirements ofSecti<strong>on</strong> 512(c)(2) in designating a copyright agent because A9 had not provided an email addressfor its copyright agent, but ra<strong>the</strong>r a URL for A9’s <strong>on</strong>line complaint form. The court held thatthis departure from <strong>the</strong> specific requirements of Secti<strong>on</strong> 512(c)(2) was inc<strong>on</strong>sequential, and <strong>the</strong>rewas no genuine dispute that <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office designati<strong>on</strong> enabled any<strong>on</strong>e who saw it toc<strong>on</strong>tact A9’s designated agent, through mail, fax, teleph<strong>on</strong>e, or <strong>the</strong> <strong>on</strong>line complaint form.Accordingly, <strong>the</strong> court ruled that A9 was entitled to a safe harbor under Secti<strong>on</strong> 512(c), andgranted A9’s moti<strong>on</strong> for summary judgment as to c<strong>on</strong>tributory copyright infringement based <strong>on</strong>that safe harbor. 19911988 Id. at *13-15.1989 Id. at *15-16.1990 Id. at *17-18.1991 Id. at *20-23.- 430 -


Louis Vuitt<strong>on</strong> v. Akanoc Soluti<strong>on</strong>s. In Louis Vuitt<strong>on</strong> Malletier, S.A. v. AkanocSoluti<strong>on</strong>s, Inc., 1992 <strong>the</strong> defendants operated hosting services for a number of web sites overseasfrom which counterfeit Louis Vuitt<strong>on</strong> merchandise could be purchased. The plaintiff broughtclaims for direct and c<strong>on</strong>tributory infringement of its copyrights. A jury found <strong>the</strong> defendantsliable for willful c<strong>on</strong>tributory infringement and awarded statutory damages, and found that <strong>the</strong>defendants were not entitled to <strong>the</strong> safe harbors of <strong>the</strong> DMCA. After <strong>the</strong> verdict, <strong>the</strong> defendantsfiled a moti<strong>on</strong> for JMOL with respect to <strong>the</strong> claims. 1993 With respect to <strong>the</strong> DMCA safe harbor,<strong>the</strong> court found that <strong>the</strong> jury had adequate evidence for denying <strong>the</strong> applicability of <strong>the</strong> Secti<strong>on</strong>512(c) safe harbor. The defendants did not designate an agent with <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office untilabout four m<strong>on</strong>ths after <strong>the</strong> lawsuit was filed, so at a minimum <strong>the</strong>y would not be able to claimprotecti<strong>on</strong> of <strong>the</strong> safe harbors prior to designating an agent. In additi<strong>on</strong>, <strong>the</strong> evidence that <strong>the</strong>defendants had reas<strong>on</strong>ably implemented a policy to terminate repeat infringers was limited, atbest. For example, <strong>the</strong> designated agent for <strong>the</strong> defendants testified that he did not understand<strong>the</strong> DMCA's requirements as to maintaining or implementing <strong>the</strong> required policy. O<strong>the</strong>revidence indicated that <strong>the</strong> defendants had not terminated certain repeat offenders. Accordingly<strong>the</strong> court c<strong>on</strong>cluded that <strong>the</strong> jury had sufficient evidence to find for <strong>the</strong> plaintiff <strong>on</strong> <strong>the</strong> issue of<strong>the</strong> applicability of <strong>the</strong> safe harbor provisi<strong>on</strong>s of <strong>the</strong> DMCA. 1994(iv) Referral or Linking to Infringing Material(Informati<strong>on</strong> Locati<strong>on</strong> Tools) – Secti<strong>on</strong> 512(d)Secti<strong>on</strong> 512(d) provides that a Service Provider is not liable for m<strong>on</strong>etary relief, and issubject <strong>on</strong>ly to limited injunctive relief, for referring or linking users to an <strong>on</strong>line locati<strong>on</strong>c<strong>on</strong>taining infringing material or activity by using informati<strong>on</strong> locati<strong>on</strong> tools (including adirectory, index, reference, pointer or hypertext link), provided <strong>the</strong> Service Provider does nothave actual knowledge that <strong>the</strong> material is infringing; is not aware of facts or circumstances fromwhich infringing activity is apparent; does not receive a financial benefit directly attributable toany infringing activity for which it has <strong>the</strong> right and ability to c<strong>on</strong>trol; and, if properly noticed of<strong>the</strong> infringing activity by <strong>the</strong> copyright holder or its authorized agent, or o<strong>the</strong>rwise obtainingknowledge or awareness of <strong>the</strong> infringement, resp<strong>on</strong>ds expeditiously to remove or disable accessto <strong>the</strong> infringing material. 1995 Secti<strong>on</strong> 512(d) does not menti<strong>on</strong> framing as an example of an1992 2010 U.S. Dist. LEXIS 85266 (N.D. Cal. Mar. 19, 2010).1993 Id. at *1-2.1994 Id. at *24.1995 Secti<strong>on</strong> 512(d) provides: “A service provider shall not be liable for m<strong>on</strong>etary relief, or, except as provided insubsecti<strong>on</strong> (j), for injunctive or o<strong>the</strong>r equitable relief, for infringement of copyright by reas<strong>on</strong> of <strong>the</strong> providerreferring or linking users to an <strong>on</strong>line locati<strong>on</strong> c<strong>on</strong>taining infringing material or infringing activity, by usinginformati<strong>on</strong> locati<strong>on</strong> tools, including a directory, index, reference, pointer, or hypertext link, if <strong>the</strong> serviceprovider –(1)(A) does not have actual knowledge that <strong>the</strong> material or activity is infringing;(B) in <strong>the</strong> absence of such actual knowledge, is not aware of facts or circumstances from which infringingactivity is apparent; or(C) up<strong>on</strong> obtaining such knowledge or awareness, acts expeditiously to remove, or disable access to, <strong>the</strong>material;- 431 -


informati<strong>on</strong> locati<strong>on</strong> tool to which <strong>the</strong> safe harbor applies. Thus, although framing isaccomplished by linking, it is unclear whe<strong>the</strong>r framing would fall within <strong>the</strong> safe harbor. 1996The Service Provider can become aware of infringing activity ei<strong>the</strong>r by notice from <strong>the</strong>copyright holder (or its authorized agent) or by virtue of o<strong>the</strong>r facts or circumstances of which itbecomes aware. The same issues of knowledge that were discussed above with respect to <strong>the</strong>safe harbor of Secti<strong>on</strong> 512(c) apply also to <strong>the</strong> safe harbor of Secti<strong>on</strong> 512(d). Specifically,absent direct notice from <strong>the</strong> copyright holder or its agent, <strong>the</strong> standard of awareness ofinfringing activity appears by its terms to require more knowledge <strong>on</strong> <strong>the</strong> part of <strong>the</strong> ServiceProvider than a “should have known” (or reas<strong>on</strong> to know) standard – it requires that <strong>the</strong> ServiceProvider have actual awareness of facts from which infringing activity is apparent. As noted in<strong>the</strong> discussi<strong>on</strong> of Secti<strong>on</strong> 512(c) above, <strong>the</strong> legislative history describes <strong>the</strong> standard ofawareness as a “red flag” test.a. The Napster Case. The first case to adjudicate <strong>the</strong>safe harbor under Secti<strong>on</strong> 512(d) was <strong>the</strong> Napster case, discussed extensively in Secti<strong>on</strong>III.C.2(c)(1) above. In that case, Napster asserted that <strong>the</strong> index it maintained <strong>on</strong> its servers ofMP3 files available <strong>on</strong> <strong>the</strong> hard drives of its users c<strong>on</strong>stituted an informati<strong>on</strong> locati<strong>on</strong> tool, andthat to <strong>the</strong> extent <strong>the</strong> plaintiffs’ infringement claims were based <strong>on</strong> <strong>the</strong> operati<strong>on</strong> of that index,Napster was entitled to <strong>the</strong> safe harbor of Secti<strong>on</strong> 512(d). The district court, with <strong>on</strong>ly a veryterse analysis c<strong>on</strong>tained entirely in a footnote, ruled that Napster was not entitled to <strong>the</strong> safeharbor because (I) it had c<strong>on</strong>structive knowledge of infringing activity <strong>on</strong> its system (<strong>the</strong>reby(2) does not receive a financial benefit directly attributable to <strong>the</strong> infringing activity, in a case in which <strong>the</strong>service provider has <strong>the</strong> right and ability to c<strong>on</strong>trol such activity; and(3) up<strong>on</strong> notificati<strong>on</strong> of claimed infringement as described in subsecti<strong>on</strong> (c)(3), resp<strong>on</strong>ds expeditiously toremove, or disable access to, <strong>the</strong> material that is claimed to be infringing or to be <strong>the</strong> subject of infringingactivity, except that, for purposes of this paragraph, <strong>the</strong> informati<strong>on</strong> described in subsecti<strong>on</strong> (c)(3)(A)(iii) shallbe identificati<strong>on</strong> of <strong>the</strong> reference or link, to material or activity claimed to be infringing, that is to be removedor access to which is to be disabled, and informati<strong>on</strong> reas<strong>on</strong>ably sufficient to permit <strong>the</strong> service provider tolocate that reference or link.”1996 Ball<strong>on</strong> & Kupferschmid, supra note 1682, at 8.- 432 -


failing to satisfy <strong>the</strong> requirement of Secti<strong>on</strong> 512(d)(1)(B)) 1997 and (ii) “Defendant has failed topersuade this court that subsecti<strong>on</strong> 512(d) shelters c<strong>on</strong>tributory infringers.” 1998On appeal, <strong>the</strong> Ninth Circuit reversed this ruling of <strong>the</strong> district court. The Ninth Circuitnoted that <strong>the</strong> district court’s ruling that <strong>the</strong> safe harbor would never apply to a Service Providerthat might o<strong>the</strong>rwise be liable as a c<strong>on</strong>tributory infringer was c<strong>on</strong>trary to <strong>the</strong> legislative historyof <strong>the</strong> DMCA. 1999 The Ninth Circuit fur<strong>the</strong>r stated, “We do not agree that Napster’s potentialliability for c<strong>on</strong>tributory and vicarious infringement renders <strong>the</strong> Digital Millennium <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>Act inapplicable per se. We instead recognize that this issue will be more fully developed attrial. At this stage of <strong>the</strong> litigati<strong>on</strong>, plaintiffs raise serious questi<strong>on</strong>s regarding Napster’s abilityto obtain shelter under § 512, and plaintiffs also dem<strong>on</strong>strate that <strong>the</strong> balance of hardships tips in<strong>the</strong>ir favor.” 2000The Ninth Circuit noted that <strong>the</strong> following questi<strong>on</strong>s would have to be resolved at trialc<strong>on</strong>cerning whe<strong>the</strong>r Napster was entitled to <strong>the</strong> safe harbor of Secti<strong>on</strong> 512(d): “(1) whe<strong>the</strong>rNapster is an <strong>Internet</strong> service provider as defined by 17 U.S.C. § 512(d); (2) whe<strong>the</strong>r copyrightowners must give a service provider ‘official’ notice of infringing activity in order for it to haveknowledge or awareness of infringing activity <strong>on</strong> its system; and (3) whe<strong>the</strong>r Napster complieswith § 512(i), which requires a service provider to timely establish a detailed copyrightcompliance policy.” 20011997 The district court appears to have misapplied Secti<strong>on</strong> 512(d)(1)(B). Because Napster had c<strong>on</strong>structiveknowledge of infringing activity, and because Secti<strong>on</strong> 512(d)(1)(B) requires that <strong>the</strong> Service Provider be “notaware of facts or circumstances from which infringing activity is apparent,” <strong>the</strong> district court reas<strong>on</strong>ed thatNapster could not qualify for <strong>the</strong> safe harbor of Secti<strong>on</strong> 512(d). However, Secti<strong>on</strong> 512(d)(1) c<strong>on</strong>tains threepr<strong>on</strong>gs, which are stated in <strong>the</strong> disjunctive, not <strong>the</strong> c<strong>on</strong>junctive. Specifically, Secti<strong>on</strong> 512(d)(1) requires that <strong>the</strong>Service Provider have no actual knowledge of infringing material or activity (clause (A)), no awareness of factsor circumstances from which infringing activity is apparent (clause (B)), or “up<strong>on</strong> obtaining such knowledge orawareness, acts expeditiously to remove, or disable access to, <strong>the</strong> material” (clause (C)). Thus, even if aService Provider has actual or c<strong>on</strong>structive knowledge of infringing activity, so l<strong>on</strong>g as <strong>the</strong> Service Provideracts expeditiously to remove or disable access to <strong>the</strong> allegedly infringing material up<strong>on</strong> obtaining suchknowledge, <strong>the</strong> safe harbor is still available. Napster asserted that in every instance in which it had obtainedknowledge of infringing activity, it had acted expeditiously to block <strong>the</strong> account of <strong>the</strong> user who was allegedlysharing infringing material. Napster’s PI Opp. Br., supra note 1173, at 33.1998 A&M Records, Inc. v. Napster, Inc., 114 F. Supp. 2d 896, 919 n. 24 (N.D. Cal. 2000).1999 A&M Records, Inc. v. Napster, Inc., 239 F.3d 1004, 1025 (9th Cir. 2001) (quoting S. Rep. 105-90, at 40(1998), which stated: “The limitati<strong>on</strong>s in subsecti<strong>on</strong>s (a) through (d) protect qualifying service providers fromliability for all m<strong>on</strong>etary relief for direct, vicarious, and c<strong>on</strong>tributory infringement.”). This sentence from <strong>the</strong>legislative history was also quoted in a discussi<strong>on</strong> of <strong>the</strong> scope of <strong>the</strong> DMCA safe harbors by <strong>the</strong> court in itsopini<strong>on</strong> in In re Veriz<strong>on</strong> <strong>Internet</strong> Services, Inc., 65 U.S.P.Q.2d 1574 (D.D.C. 2003). The court also stated, in<strong>the</strong> c<strong>on</strong>text of ruling <strong>on</strong> <strong>the</strong> scope of <strong>the</strong> subpoena power under Secti<strong>on</strong> 512(h) of <strong>the</strong> DMCA, that “in exchangefor complying with subpoenas under subsecti<strong>on</strong> (h), service providers receive liability protecti<strong>on</strong> from anycopyright infringement – direct or vicarious – by <strong>the</strong>ir users.” Id. at 1581 n.6.2000 Napster, 239 F.3d at 1025.2001 Id. The bases for <strong>the</strong> district court’s doubts about whe<strong>the</strong>r Napster satisfied Secti<strong>on</strong> 512(i) are discussed inSecti<strong>on</strong> C.5(b)(1)(i)a. above with respect to <strong>the</strong> court’s ruling <strong>on</strong> whe<strong>the</strong>r Napster was entitled to <strong>the</strong> safeharbor of Secti<strong>on</strong> 512(a).- 433 -


. Perfect 10 v. Cybernet Ventures. The sec<strong>on</strong>d case toadjudicate <strong>the</strong> Secti<strong>on</strong> 512(d) safe harbor was <strong>the</strong> case of Perfect 10, Inc. v. Cybernet Ventures,Inc. 2002 As discussed in Secti<strong>on</strong> III.C.5(b)(1)(iii)d. above, <strong>the</strong> court c<strong>on</strong>cluded that <strong>the</strong> defendantCybernet was not entitled to any of <strong>the</strong> Secti<strong>on</strong> 512 safe harbors because it had failed to satisfy<strong>the</strong> predicate requirements of Secti<strong>on</strong> 512(i). Never<strong>the</strong>less, <strong>the</strong> court, in a <strong>on</strong>e sentence rulingalso c<strong>on</strong>cluded that <strong>the</strong>re was “a residual chance that Cybernet will qualify for 17 U.S.C. §512(d)’s safe harbor for search engines, but not links.” 2003 Because <strong>the</strong> court did not elaboratefur<strong>the</strong>r, it is difficult to understand why <strong>the</strong> court reached this c<strong>on</strong>clusi<strong>on</strong>, particularly in view ofits rulings with respect to Secti<strong>on</strong>s 512(i) and 512(c).c. The MP3Board Case. <str<strong>on</strong>g>Issues</str<strong>on</strong>g> relating to <strong>the</strong> Secti<strong>on</strong>512(d) safe harbor, and particularly its attendant notice requirements, arose in <strong>the</strong> case of AristaRecords, Inc. v. MP3Board, Inc., 2004 and are discussed below in Secti<strong>on</strong> III.D.8.d. The Aimster/Madster Lawsuits. The facts of <strong>the</strong>Aimster/Madster lawsuits are set forth in Secti<strong>on</strong> III.C.2(c)(3) above. In that case, Aimsterasserted <strong>the</strong> Secti<strong>on</strong> 512(d) safe harbor. As discussed in Secti<strong>on</strong> III.C.5(b)(1)(i).c above, <strong>the</strong>district court c<strong>on</strong>cluded that Aimster was not entitled to any of <strong>the</strong> DMCA safe harbors becauseof its failure to satisfy <strong>the</strong> Secti<strong>on</strong> 512(i) predicate with respect to implementati<strong>on</strong> of a policy toterminate repeat infringers <strong>on</strong> its system. In additi<strong>on</strong>, <strong>the</strong> court held that Aimster had notsatisfied <strong>the</strong> specific c<strong>on</strong>diti<strong>on</strong>s of Secti<strong>on</strong> 512(d) because it had actual and c<strong>on</strong>structiveknowledge of <strong>the</strong> infringing activity for <strong>the</strong> same reas<strong>on</strong>s that it had such knowledge forpurposes of comm<strong>on</strong> law c<strong>on</strong>tributory liability (see <strong>the</strong> discussi<strong>on</strong> in Secti<strong>on</strong> III.C.2(c)(3)above), and <strong>the</strong>re was no evidence that Aimster had taken steps to remove or disable access toinfringing material. 2005 In additi<strong>on</strong>, Aimster received a financial benefit directly attributable to<strong>the</strong> infringing activity and had <strong>the</strong> right and ability to c<strong>on</strong>trol <strong>the</strong> infringing activity, again for <strong>the</strong>same reas<strong>on</strong>s that it had such financial benefit and right and ability to c<strong>on</strong>trol for purposes ofcomm<strong>on</strong> law vicarious liability (see <strong>the</strong> discussi<strong>on</strong> in Secti<strong>on</strong> III.C.3(e) above). 2006 As discussedin Secti<strong>on</strong> III.C.5(b)(1)(i).c, <strong>on</strong> appeal <strong>the</strong> Seventh Circuit affirmed <strong>the</strong> ruling that <strong>the</strong> safeharbors were not available to Aimster because of failure to comply with Secti<strong>on</strong> 512(i). 2007e. The Diebold Lawsuit. Diebold was <strong>the</strong> manufacturerof electr<strong>on</strong>ic voting systems that c<strong>on</strong>tained a number of flaws. A series of internal Dieboldemails acknowledging <strong>the</strong> flaws were published <strong>on</strong> <strong>the</strong> <strong>Internet</strong>. Diebold sent out dozens ofcease and desist letters under <strong>the</strong> DMCA to websites linking to or publishing <strong>the</strong> Diebold emails,demanding that <strong>the</strong> materials, or links to <strong>the</strong> materials, be removed. The Electr<strong>on</strong>ic Fr<strong>on</strong>tierFoundati<strong>on</strong> filed suit against Diebold <strong>on</strong> behalf of <strong>on</strong>e of <strong>the</strong> ISPs and a news website publisher,2002 213 F. Supp. 2d 1146 (C.D. Cal. 2002).2003 Id. at 1182.2004 2002 U.S. Dist. LEXIS (S.D.N.Y. 2002).2005 In re Aimster <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Litigati<strong>on</strong>, 252 F. Supp. 2d 634, 661 (N.D. Ill. 2002).2006 Id.2007 In re Aimster <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Litigati<strong>on</strong>, 334 F.3d 643 (7th Cir. 2003), cert. denied, 124 S. Ct. 1069 (2004).- 434 -


arguing that linking to or publishing <strong>the</strong> materials was a fair use in order to comment <strong>on</strong> <strong>the</strong>reliability of electr<strong>on</strong>ic voting. 2008 On Nov. 4, 2003, <strong>the</strong> court ordered Diebold to show why apreliminary injuncti<strong>on</strong> should not be issued to prevent Diebold from threatening to sue ISPs. InDec. 2003, <strong>the</strong> court dismissed <strong>the</strong> plaintiffs’ moti<strong>on</strong> for <strong>the</strong> preliminary injuncti<strong>on</strong> as moot, afterDiebold represented that it no l<strong>on</strong>ger demanded that <strong>the</strong> plaintiffs or any o<strong>the</strong>r party cease anddesist using Diebold’s email archive for n<strong>on</strong>commercial critical purposes. Diebold also agreedthat it would retract all outstanding DMCA safe harbor notificati<strong>on</strong>s to ISPs c<strong>on</strong>cerning <strong>the</strong>email archive and would not issue such notificati<strong>on</strong>s to any party in any jurisdicti<strong>on</strong> in <strong>the</strong>future. 2009In a subsequent acti<strong>on</strong>, <strong>on</strong>e of <strong>the</strong> ISPs and two individual Swarthmore students whooriginally posted <strong>the</strong> Diebold emails <strong>on</strong> various websites sued Diebold, am<strong>on</strong>g o<strong>the</strong>r things, torecover damages and attorneys’ fees under Secti<strong>on</strong> 512(f) of <strong>the</strong> DMCA <strong>on</strong> <strong>the</strong> ground thatDiebold’s claims of copyright infringement were based <strong>on</strong> knowing materialmisrepresentati<strong>on</strong>s. 2010 Secti<strong>on</strong> 512(f) of <strong>the</strong> DMCA provides:Any pers<strong>on</strong> who knowingly materially misrepresents under this secti<strong>on</strong> –(1) that material or activity is infringing, or(2) that material or activity was removed or disabled by mistake ormisidentificati<strong>on</strong>,shall be liable for any damages, including costs and attorneys’ fees, incurred by<strong>the</strong> alleged infringer, by any copyright owner or copyright owner’s authorizedlicensee, or by a service provider, who is injured by such misrepresentati<strong>on</strong>, as <strong>the</strong>result of <strong>the</strong> service provider relying up<strong>on</strong> such misrepresentati<strong>on</strong> in removing ordisabling access to <strong>the</strong> material or activity claimed to be infringing, or inreplacing <strong>the</strong> removed material or ceasing to disable access to it.In adjudicating <strong>the</strong> plaintiff’s Secti<strong>on</strong> 512(f) claim, <strong>the</strong> court first had to determine <strong>the</strong>validity of Diebold’s claims that publicati<strong>on</strong> of its email archive c<strong>on</strong>stituted copyrightinfringement. The court c<strong>on</strong>cluded that publicati<strong>on</strong> of at least some of <strong>the</strong> email archivec<strong>on</strong>stituted fair use and was <strong>the</strong>refore not infringing. With respect to <strong>the</strong> purpose of <strong>the</strong> use, <strong>the</strong>court noted that discussi<strong>on</strong> of problems associated with Diebold’s electr<strong>on</strong>ic voting machineswas clearly in <strong>the</strong> public interest. Moreover, Diebold had identified no specific commercialpurpose or interest affected by publicati<strong>on</strong> of <strong>the</strong> archive, and <strong>the</strong>re was no evidence that Diebolditself had intended to or could profit from such c<strong>on</strong>tent. Finally, <strong>the</strong> plaintiffs’ use of <strong>the</strong>material was transformative, in that <strong>the</strong>y used <strong>the</strong> email archive to support criticism that was in2008 “ISP Rejects Diebold <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Claims Against News Website,” available as of Jan. 17, 2004 atwww.eff.org/Legal/ISP_liability/20031016_eff_pr.php. The suit, Online Policy Group v. Deibold, Inc., wasfiled in federal court in San Jose.2009 “Electr<strong>on</strong>ic Voting Firm Drops DMCA, <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Charges Against ISPs,” Mealey’s Litigati<strong>on</strong> Report:Intellectual Property (Dec. 15, 2003) 13-14.2010 Online Policy Group v. Diebold, Inc., 337 F. Supp. 2d 1195, 1198 (N.D. Cal. 2004).- 435 -


<strong>the</strong> public interest, not to develop electr<strong>on</strong>ic voting technology. 2011 Accordingly, <strong>the</strong> court ruledthat “<strong>the</strong>re is no genuine issue of material fact that Diebold, through its use of <strong>the</strong> DMCA,sought to and did in fact suppress publicati<strong>on</strong> of c<strong>on</strong>tent that is not subject to copyrightprotecti<strong>on</strong> [because of <strong>the</strong> fair use doctrine.]” 2012The court <strong>the</strong>n turned to whe<strong>the</strong>r Diebold knowingly materially misrepresented thatpublicati<strong>on</strong> of <strong>the</strong> email archive c<strong>on</strong>stituted copyright infringement. The parties disputed <strong>the</strong>meaning of <strong>the</strong> phrase “knowingly materially misrepresents.” The plaintiffs argued that apreliminary injuncti<strong>on</strong> standard should be applied – that <strong>the</strong> court should c<strong>on</strong>clude that Dieboldviolated Secti<strong>on</strong> 512(f) if it did not have a “likelihood of success” <strong>on</strong> <strong>the</strong> merits of <strong>the</strong> acopyright infringement claim when it sent <strong>the</strong> DMCA letters. Diebold c<strong>on</strong>tended that <strong>the</strong> courtshould apply a type of Federal Rule of Civil Procedure 11 standard and thus c<strong>on</strong>clude thatDiebold did not violati<strong>on</strong> Secti<strong>on</strong> 512(f) unless sending <strong>the</strong> DMCA letters was “frivolous.” 2013Acknowledging that it was facing an issue of first impressi<strong>on</strong>, <strong>the</strong> court c<strong>on</strong>cluded thatnei<strong>the</strong>r proposed standard was appropriate. A requirement that a party have an objectivelymeasured likelihood of success <strong>on</strong> <strong>the</strong> merits in order to assert claims of copyright infringementwould impermissibly chill <strong>the</strong> rights of copyright owners. On <strong>the</strong> o<strong>the</strong>r hand, in requiring ashowing of “knowing material misrepresentati<strong>on</strong>,” C<strong>on</strong>gress explicitly adopted a standard fromRule 11, which c<strong>on</strong>tains a variety of o<strong>the</strong>r requirements that are not necessarily coextensive withthose of Secti<strong>on</strong> 512(f). 2014Instead, <strong>the</strong> court c<strong>on</strong>cluded that <strong>the</strong> statutory language was sufficient clear <strong>on</strong> its factand does not require importati<strong>on</strong> of standards from o<strong>the</strong>r legal c<strong>on</strong>texts. Citing Black’s LawDicti<strong>on</strong>ary, <strong>the</strong> court held that “knowingly” means that a party actually knew, should haveknown if it acted with reas<strong>on</strong>able care or diligence, or would have had no substantial doubt had itbeen acting in good faith, that it was making misrepresentati<strong>on</strong>s. “Material” means that <strong>the</strong>misrepresentati<strong>on</strong> affects <strong>the</strong> ISP’s resp<strong>on</strong>se to a DMCA letter. 2015Under this standard, <strong>the</strong> court c<strong>on</strong>cluded as a matter of law that Diebold knowinglymaterially misrepresented that <strong>the</strong> plaintiffs infringed Diebold’s copyright interest, at least withrespect to <strong>the</strong> porti<strong>on</strong>s of <strong>the</strong> email archive clearly subject to <strong>the</strong> fair use excepti<strong>on</strong>:No reas<strong>on</strong>able copyright holder could have believed that <strong>the</strong> porti<strong>on</strong>s of <strong>the</strong> emailarchive discussing possible technical problems with Diebold’s voting machineswere protected by copyright, and <strong>the</strong>re is no genuine issue of fact that Dieboldknew – and indeed that it specifically intended – that its letters to OPG andSwarthmore would result in preventi<strong>on</strong> of publicati<strong>on</strong> of that c<strong>on</strong>tent. Themisrepresentati<strong>on</strong>s were material in that <strong>the</strong>y resulted in removal of <strong>the</strong> c<strong>on</strong>tent2011 Id. at 1203.2012 Id.2013 Id. at 1204.2014 Id.2015 Id.- 436 -


from websites and <strong>the</strong> initiati<strong>on</strong> of <strong>the</strong> present lawsuit. The fact that Dieboldnever actually brought suit against any alleged infringer suggests str<strong>on</strong>gly thatDiebold sought to use <strong>the</strong> DMCA’s safe harbor provisi<strong>on</strong>s – which were designedto protect ISPs, not copyright holders – as a sword to suppress publicati<strong>on</strong> ofembarrassing c<strong>on</strong>tent ra<strong>the</strong>r than as a shield to protect its intellectual property. 2016Two weeks after <strong>the</strong> court rendered its judgment, Diebold agreed to settle <strong>the</strong> lawsuit bypaying $125,000 in damages and fees to <strong>the</strong> plaintiffs. 2017f. Perfect 10 v. CCBill. The facts of this case are setforth in Secti<strong>on</strong> III.C.5(b)(1)(i)d. above. In that case, <strong>the</strong> defendant <strong>Internet</strong> Key, an ageverificati<strong>on</strong> service for adult c<strong>on</strong>tent websites, filed a moti<strong>on</strong> for summary judgment under <strong>the</strong>Secti<strong>on</strong> 512(d) safe harbor. Perfect 10 argued that <strong>Internet</strong> Key was not entitled to <strong>the</strong> safeharbor because it was not an informati<strong>on</strong> locati<strong>on</strong> tool, it had actual knowledge of infringements,and it was aware of facts or circumstances from which infringing activity was apparent. 2018With respect to <strong>the</strong> issue of whe<strong>the</strong>r <strong>Internet</strong> Key was an informati<strong>on</strong> locati<strong>on</strong> tool, <strong>the</strong>court rejected Perfect 10’s argument that Secti<strong>on</strong> 512(d) is limited to OSPs like Google andYahoo! that provide links to milli<strong>on</strong>s of web sites and that do not have c<strong>on</strong>tractual relati<strong>on</strong>shipswith <strong>the</strong>ir affiliate web sites. Instead, Secti<strong>on</strong> 512(d) refers to OSPs who refer or link users to an<strong>on</strong>line locati<strong>on</strong> c<strong>on</strong>taining infringing material or activity by using a directory, index, reference,point, hypertext link or <strong>the</strong> like. The court c<strong>on</strong>cluded that <strong>Internet</strong> Key’s sexkey.com web siteprovided that functi<strong>on</strong> and was <strong>the</strong>refore covered by Secti<strong>on</strong> 512(d). 2019With respect to <strong>the</strong> knowledge element, Perfect 10 argued that <strong>Internet</strong> Key should haveknown that <strong>the</strong>re were copyright infringements <strong>on</strong> its clients’ web sites because of <strong>the</strong>disclaimers <strong>on</strong> some of those web sites, which generally claimed that <strong>the</strong> copyrighted imageswere in <strong>the</strong> public domain or that <strong>the</strong> webmaster was posting <strong>the</strong> images for newsworthypurposes. The court ruled that <strong>the</strong>se disclaimers were not sufficient to raise a “red flag” ofcopyright infringement, which is <strong>the</strong> standard of c<strong>on</strong>structive knowledge under Secti<strong>on</strong>s 512(c)and 512(d). 20202016 Id. at 1204-05. The court also held that <strong>the</strong> plaintiff’s claim that Diebold, through its inappropriate use of <strong>the</strong>DMCA, had interfered with <strong>the</strong>ir c<strong>on</strong>tractual relati<strong>on</strong>s with <strong>the</strong>ir respective ISPs, was preempted. “Even if acopyright holder does not intend to cause anything o<strong>the</strong>r than <strong>the</strong> removal of allegedly infringing material,compliance with <strong>the</strong> DMCA’s procedures n<strong>on</strong>e<strong>the</strong>less may result in disrupti<strong>on</strong> of a c<strong>on</strong>tractual relati<strong>on</strong>ship: bysending a letter, <strong>the</strong> copyright holder can effectuate <strong>the</strong> disrupti<strong>on</strong> of ISP service to clients. If adherence to <strong>the</strong>DMCA’s provisi<strong>on</strong>s simultaneously subjects <strong>the</strong> copyright holder to state tort liability, <strong>the</strong>re is an irrec<strong>on</strong>cilablec<strong>on</strong>flict between state and federal law. Id. at 1205-06.2017 “Diebold Settles Landmark DMCA Suit in Dispute Over Voting Machines,” IP Law Bulletin (Oct. 15, 2004),available as of Oct. 18, 2004 at www.iplawbulletin.com/cgi-bin/absolutenm/anmviewer.asp?a=2381&z=18.2018 Perfect 10, Inc. v. CCBill, 340 F. Supp. 2d 1077, 1097-98 (C.D. Cal. 2004).2019 Id.2020 Id. at 1098.- 437 -


Turning to <strong>the</strong> issue of c<strong>on</strong>trol, <strong>the</strong> court ruled, citing Costar Group, Inc. v. Loopnet,Inc. 2021 and Perfect 10 v. Cybernet Ventures, Inc., 2022 that <strong>the</strong> mere ability to disc<strong>on</strong>nect <strong>the</strong>webmasters’ access to <strong>Internet</strong> Key’s service was not sufficient under <strong>the</strong> DMCA to dem<strong>on</strong>stratea right and ability to c<strong>on</strong>trol <strong>the</strong> infringing activity. Because no o<strong>the</strong>r c<strong>on</strong>trol had been shown,<strong>Internet</strong> Key was entitled to summary judgment under <strong>the</strong> Secti<strong>on</strong> 512(d) safe harbor. 2023The parties filed an appeal of <strong>the</strong> rulings in this case with respect to CCBill and CWIE,although not with respect to <strong>Internet</strong> Key. On appeal, CCBill argued that it should be entitled to<strong>the</strong> immunity of Secti<strong>on</strong> 512(d) because, after processing a c<strong>on</strong>sumer’s credit card and issuing apassword granting access to a client website, it displayed a hyperlink so that <strong>the</strong> user couldaccess <strong>the</strong> client website. The Ninth Circuit rejected this argument, noting that, even if <strong>the</strong>displayed hyperlink could be viewed as an informati<strong>on</strong> locati<strong>on</strong> tool, Secti<strong>on</strong> 512(d) provides asafe harbor <strong>on</strong>ly for infringement of copyright by reas<strong>on</strong> of <strong>the</strong> provider referring or linkingusers to an <strong>on</strong>line locati<strong>on</strong> c<strong>on</strong>taining infringing material or activity. Perfect 10 had not claimedthat CCBill infringed its copyrights by providing a hyperlink, but ra<strong>the</strong>r through CCBill’sperformance of o<strong>the</strong>r business services for <strong>the</strong> infringing websites. Accordingly, even ifCCBill’s provisi<strong>on</strong> of a hyperlink were immune under Secti<strong>on</strong> 512(d), CCBill could not receiveblanket immunity under Secti<strong>on</strong> 512(d) for its o<strong>the</strong>r services. 2024g. Columbia Pictures v. Fung. In Columbia PicturesIndustries, Inc. v. Fung, 2025 <strong>the</strong> defendants operated BitTorrent sites through which users couldsearch indexes for dot-torrent files pointing to infringing movies and o<strong>the</strong>r c<strong>on</strong>tent. The courtfound <strong>the</strong> defendants liable for inducement of infringement and rejected asserti<strong>on</strong> of a safeharbor under Secti<strong>on</strong> 512(d). The plaintiffs had established that <strong>the</strong> defendants had reas<strong>on</strong> toknow of <strong>the</strong>ir users’ infringing activities (plaintiffs’ expert testified that approximately 95% ofdownloads occurring through <strong>the</strong> defendants’ sites were downloads of infringing c<strong>on</strong>tent) and<strong>the</strong>refore <strong>the</strong> defendants had failed to establish <strong>the</strong> first requirement of <strong>the</strong> Secti<strong>on</strong> 512(d) safeharbor that <strong>the</strong>y were not aware of facts or circumstances from which infringing activity wasapparent. 2026 The court found that <strong>the</strong> defendants also had adequate knowledge of infringingactivity under <strong>the</strong> “red flag” test to have a duty to act to removing links to infringing c<strong>on</strong>tent.The defendants had not introduced any evidence that <strong>the</strong>y acted expeditiously to remove ordisable access to infringing material. In additi<strong>on</strong>, <strong>the</strong> court held <strong>the</strong> defendants had failed toraise a triable issue of fact regarding <strong>the</strong> sec<strong>on</strong>d requirement of <strong>the</strong> Secti<strong>on</strong> 512(d) safe harbor,because <strong>the</strong>y had received a financial benefit directly attributable to <strong>the</strong> infringing activity,which acted as a major draw for users to <strong>the</strong> site and from which <strong>the</strong> defendants derived revenue,and <strong>the</strong>y had <strong>the</strong> right and a ability to c<strong>on</strong>trol such activity. 20272021 164 F. Supp. 2d 688, 704 (D. Md. 2001), aff’d, 373 F.3d 544 (4 th Cir. 2004).2022 213 F. Supp. 2d 1146, 1181 (C.D. Cal. 2002).2023 Perfect 10 v. CCBill, 340 F. Supp. 2d at 1098.2024 Perfect 10, Inc. v. CCBill LLC, 481 F.3d 751, 765-66 (9 th Cir.), cert. denied, 2007 U.S. LEXIS 12812 (2007).2025 2009 U.S. Dist. LEXIS (C.D. Cal. Dec. 21, 2009).2026 Id. at *17 & *61.2027 Id. at *55, *61-66, & *62 n.27..- 438 -


Finally, <strong>the</strong> court ruled that, as a general propositi<strong>on</strong>, “inducement liability and <strong>the</strong>Digital Millennium <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act safe harbors are inherently c<strong>on</strong>tradictory. Inducementliability is based <strong>on</strong> active bad faith c<strong>on</strong>duct aimed at promoting infringement; <strong>the</strong> statutory safeharbors are based <strong>on</strong> passive good faith c<strong>on</strong>duct aimed at operating a legitimate internetbusiness. Here … Defendants are liable for inducement. There is no safe harbor for suchc<strong>on</strong>duct.” 2028(2) General Requirements for Limitati<strong>on</strong>s of LiabilityIn additi<strong>on</strong> to meeting <strong>the</strong> requirements of <strong>on</strong>e of <strong>the</strong> specific safe harbors, to be eligiblefor <strong>the</strong> limitati<strong>on</strong>s of liability, under Secti<strong>on</strong> 512(i) <strong>the</strong> Service Provider must adopt, reas<strong>on</strong>ablyimplement, and inform subscribers of a policy for <strong>the</strong> terminati<strong>on</strong> in appropriate circumstancesof subscribers who are repeat infringers, and must not interfere with standard technical measuresused by copyright owners to identify or protect copyrighted works that have been developed“pursuant to a broad c<strong>on</strong>sensus of copyright owners and service providers in an open, fair,voluntary, multi-industry standards process,” are available to any pers<strong>on</strong> <strong>on</strong> reas<strong>on</strong>able andn<strong>on</strong>discriminatory terms, and do not impose substantial costs or burdens <strong>on</strong> Service Providers or<strong>the</strong>ir systems.Most commercial Service Providers have a policy with respect to use of <strong>the</strong> service bysubscribers. The policy may be posted <strong>on</strong> <strong>the</strong> Service Provider’s website, c<strong>on</strong>tained in <strong>the</strong>subscripti<strong>on</strong> agreement, or both. Operators of corporate intranets will likewise want to post apolicy <strong>on</strong> <strong>the</strong> intranet itself, and may wish to update employee handbooks or policy manuals toincorporate <strong>the</strong> policy statements required to take advantage of <strong>the</strong> safe harbors. All ServiceProviders should reas<strong>on</strong>ably document <strong>the</strong>ir efforts to enforce <strong>the</strong>ir policies.(3) Special Provisi<strong>on</strong>s for N<strong>on</strong>profit Educati<strong>on</strong>al Instituti<strong>on</strong>sSecti<strong>on</strong> 512(e) c<strong>on</strong>tains an additi<strong>on</strong>al liability limitati<strong>on</strong> for n<strong>on</strong>profit educati<strong>on</strong>alinstituti<strong>on</strong>s. According to <strong>the</strong> C<strong>on</strong>ference Report, C<strong>on</strong>gress recognized that universityenvir<strong>on</strong>ments are unique, and a university might o<strong>the</strong>rwise fail to qualify for <strong>the</strong> safe harborssimply because <strong>the</strong> knowledge or acti<strong>on</strong>s of <strong>on</strong>e of its employees might be imputed to <strong>the</strong>university under basic principles of resp<strong>on</strong>deat superior and agency law. Based up<strong>on</strong> principlesof academic freedom and independence, C<strong>on</strong>gress believed that in certain circumstances it wouldbe inappropriate for acti<strong>on</strong>s <strong>on</strong>line of faculty members and graduate students to be imputed to <strong>the</strong>university to prevent it from being eligible for <strong>the</strong> safe harbors.Accordingly, Secti<strong>on</strong> 512(e) provides that <strong>on</strong>line infringing acti<strong>on</strong>s of faculty membersor graduate student employees that occur when <strong>the</strong>y are “performing a teaching or researchfuncti<strong>on</strong>” will not be attributed to <strong>the</strong> university in its capacity as <strong>the</strong>ir employer, and <strong>the</strong>university will <strong>the</strong>refore not be charged with such faculty member’s or graduate student’sknowledge or awareness of his or her infringing activities, if (i) <strong>the</strong> infringing activities do notinvolve <strong>the</strong> provisi<strong>on</strong> of <strong>on</strong>line access to instructi<strong>on</strong>al materials that are or were required orrecommended, within <strong>the</strong> preceding three-year period, for a course taught at <strong>the</strong> university by2028 Id. at *67-68.- 439 -


such faculty member or graduate student; (ii) <strong>the</strong> university has not, within <strong>the</strong> preceding threeyearperiod, received more than two notificati<strong>on</strong>s of claimed infringement by such facultymember or graduate student; and (iii) <strong>the</strong> university provides all users of its system withinformati<strong>on</strong>al materials that accurately describe and promote compliance with U.S. copyrightlaw.(4) Filing of False DMCA Notices – Secti<strong>on</strong> 512(f)Secti<strong>on</strong> 512(f) of <strong>the</strong> DMCA provides:Any pers<strong>on</strong> who knowingly materially misrepresents under this secti<strong>on</strong> –(1) that material or activity is infringing, or(2) that material or activity was removed or disabled by mistake ormisidentificati<strong>on</strong>,shall be liable for any damages, including costs and attorneys’ fees, incurred by<strong>the</strong> alleged infringer, by any copyright owner or copyright owner’s authorizedlicensee, or by a service provider, who is injured by such misrepresentati<strong>on</strong>, as <strong>the</strong>result of <strong>the</strong> service provider relying up<strong>on</strong> such misrepresentati<strong>on</strong> in removing ordisabling access to <strong>the</strong> material or activity claimed to be infringing, or inreplacing <strong>the</strong> removed material or ceasing to disable access to it.In Twelve Inches Around Corp. v. Cisco Sys., 2029 <strong>the</strong> court ruled that Secti<strong>on</strong>512(f) does not apply to misrepresentati<strong>on</strong>s of trademark infringement <strong>on</strong> a website.(i)Rossi v. MPAAThe first case to adjudicate <strong>the</strong> scope of Secti<strong>on</strong> 512(f) was that of Rossi v. MPAA. 2030 Adiscussi<strong>on</strong> of <strong>the</strong> Ninth Circuit’s rulings with respect to Secti<strong>on</strong> 512(f) may be found in Secti<strong>on</strong>III.C.5(b)(1)(iii).g above.(ii)Online Policy Group v. Diebold, Inc.The sec<strong>on</strong>d case to adjudicate <strong>the</strong> scope of Secti<strong>on</strong> 512(f) was that of Online PolicyGroup v. Diebold, Inc. 2031 A discussi<strong>on</strong> of <strong>the</strong> court’s rulings with respect to Secti<strong>on</strong> 512(f) maybe found in Secti<strong>on</strong> III.C.5(b)(1)(iv).e above.(iii) Dudnikov v. MGA EntertainmentIn Dudnikov v. MGA Entertainment, Inc., 2032 <strong>the</strong> court ruled that a request by <strong>the</strong>defendant to eBay to take down <strong>the</strong> aucti<strong>on</strong> of a fleece hat with a Bratz appliqué <strong>on</strong> it did not2029 2009 U.S. Dist. LEXIS 34966 (S.D.N.Y. Mar. 12, 2009).2030 391 F.3d 1000 (9 th Cir. 2004).2031 337 F. Supp. 2d 1195 (N.D. Cal. 2004).- 440 -


give rise to a claim under Secti<strong>on</strong> 512(f) because <strong>the</strong> defendant acted in a good faith belief that<strong>the</strong> sale of <strong>the</strong> hat infringed its copyright and trademark rights and <strong>the</strong> plaintiffs had failed tosatisfy <strong>the</strong>ir burden of dem<strong>on</strong>strating that <strong>the</strong> defendant knowingly and materiallymisrepresented that <strong>the</strong> plaintiffs’ aucti<strong>on</strong> was infringing. The court rejected <strong>the</strong> plaintiffs’argument that a higher standard of good faith should be applied just because <strong>the</strong> defendant’sagent who issued <strong>the</strong> takedown notice was a lawyer trained in intellectual property law. 2033(iv) Novotny v. ChapmanIn Novotny v. Chapman, 2034 <strong>the</strong> defendant made instructi<strong>on</strong>al videos in which hedem<strong>on</strong>strated a particular method of cutting women’s hair. In 2002, he entered into anagreement with <strong>the</strong> plaintiffs in which he would deliver originals of his video to <strong>the</strong> plaintiffs,who would <strong>the</strong>n c<strong>on</strong>vert <strong>the</strong>m into digital format and publish and sell <strong>the</strong>m <strong>on</strong> <strong>the</strong>ir Web site asdownloadable streaming media clips. In October of 2004, as sales of <strong>the</strong> videos began to wane,<strong>the</strong> defendant sent <strong>the</strong> plaintiffs an email requesting that <strong>the</strong>y remove his videos from <strong>the</strong>ir Website. After <strong>the</strong> plaintiffs refused to do so, <strong>the</strong> defendant filed notices of copyright infringementunder <strong>the</strong> DMCA with <strong>the</strong> plaintiffs’ <strong>Internet</strong> service providers, alleging that material <strong>on</strong> <strong>the</strong>plaintiffs’ Web site was infringing <strong>on</strong> <strong>the</strong> defendant’s copyrights in his videos. Both <strong>the</strong> <strong>Internet</strong>service providers and <strong>the</strong> Paypal service, which processed payments for <strong>the</strong> plaintiffs’ Web site,suspended <strong>the</strong> plaintiffs’ access to <strong>the</strong>ir accounts. In resp<strong>on</strong>se, <strong>the</strong> plaintiffs removed <strong>the</strong> videosfrom <strong>the</strong>ir Web site. The defendant <strong>the</strong>reafter filed no fur<strong>the</strong>r DMCA notices. 2035The plaintiffs accused <strong>the</strong> defendant of violating Secti<strong>on</strong> 512(f) by filing bad faithcomplaints of copyright infringement with <strong>the</strong> plaintiffs’ <strong>Internet</strong> service providers and o<strong>the</strong>rs,with <strong>the</strong> intent that such complaints would result in <strong>the</strong> suspensi<strong>on</strong> of <strong>the</strong> plaintiffs’ <strong>Internet</strong>services and accounts, and asked <strong>the</strong> court to enjoin <strong>the</strong> defendant from filing any more suchcomplaints. 2036 The court denied <strong>the</strong> injuncti<strong>on</strong> <strong>on</strong> <strong>the</strong> ground that <strong>the</strong> injury <strong>the</strong> plaintiffs soughtto avoid – <strong>the</strong> damage to reputati<strong>on</strong> and business interests caused by <strong>the</strong> defendant’s filing ofimproper DMCA complaints with <strong>the</strong> plaintiffs’ service providers – was not likely to recur since<strong>the</strong> plaintiffs nei<strong>the</strong>r were posting <strong>the</strong> videos at issue <strong>on</strong> <strong>the</strong>ir Web site, nor had <strong>the</strong>y cited anyinterest in re-posting <strong>the</strong> videos before <strong>the</strong> underlying legal issues were resolved. 2037(v)BioSafe-One, Inc. v. HawksIn BioSafe-One, Inc. v. Hawks, 2038 <strong>the</strong> defendants inadvertently copied some textualmaterials from <strong>the</strong> plaintiffs’ web site into <strong>the</strong> defendants’ web site. Up<strong>on</strong> discovering <strong>the</strong>2032 410 F. Supp. 2d 1010 (D. Colo. 2005).2033 Id. at 1012-13.2034 2006 U.S. Dist. LEXIS 55471 (W.D.N.C. 2006).2035 Id. at *2-5.2036 Id. at *1.2037 Id. at *7-8.2038 2007 U.S. Dist. LEXIS 88032 (S.D.N.Y. Nov. 29, 2007).- 441 -


copying, <strong>the</strong> defendants removed <strong>the</strong> copied materials. After removal of <strong>the</strong> copied materials,but before <strong>the</strong> plaintiffs knew that <strong>the</strong> copied materials had been removed, <strong>the</strong> plaintiffs sent twoDMCA notices to <strong>the</strong> OSPs hosting <strong>the</strong> defendants’ web site. In both instances, <strong>the</strong> OSPs shutdown <strong>the</strong> defendants’ web site in resp<strong>on</strong>se. The defendants claimed that <strong>the</strong> plaintiffs’ noticesunder <strong>the</strong> DMCA violated Secti<strong>on</strong> 512(f) and sought an injuncti<strong>on</strong> preventing <strong>the</strong> plaintiffs fromfur<strong>the</strong>r interfering with <strong>the</strong>ir web site. 2039The court ruled <strong>the</strong> defendants had failed to present sufficient evidence that <strong>the</strong> plaintiffsknowingly materially misrepresented to <strong>the</strong> OSPs that <strong>the</strong> defendants’ web site was infringing.The plaintiffs had submitted ample evidence and testim<strong>on</strong>y that <strong>the</strong>y believed <strong>the</strong> defendants’web site violated <strong>the</strong>ir copyright when <strong>the</strong> DMCA notices were submitted. Accordingly, <strong>the</strong>court denied <strong>the</strong> defendants’ claim under Secti<strong>on</strong> 512(f). However, <strong>the</strong> court granted apreliminary injuncti<strong>on</strong> barring <strong>the</strong> plaintiffs from sending additi<strong>on</strong>al DMCA notices in view of<strong>the</strong> fact that <strong>the</strong> court had ruled that <strong>the</strong> defendants’ web site, after <strong>the</strong> copied materials had beenremoved, was not substantially similar to <strong>the</strong> plaintiffs’ web site. 2040(vi) Lenz v. Universal Music Corp.In Lenz v. Universal Music Corp., 2041 Stephanie Lenz videotaped her toddler s<strong>on</strong> dancingin <strong>the</strong> family’s kitchen to <strong>the</strong> s<strong>on</strong>g titled “Let’s Go Crazy” owned by <strong>the</strong> plaintiff, and posted <strong>the</strong>video <strong>on</strong> YouTube.com. The plaintiffs sent a DMCA takedown notice to YouTube, whichresp<strong>on</strong>ded by removing <strong>the</strong> video from <strong>the</strong> site. Lenz sent YouTube a counter-notificati<strong>on</strong> under<strong>the</strong> DMCA, demanding that her video be re-posted because it did not infringe <strong>the</strong> plaintiff’scopyrights, and <strong>the</strong> video was <strong>the</strong>n re-posted by YouTube. Lenz <strong>the</strong>n filed an acti<strong>on</strong> against <strong>the</strong>plaintiffs under Secti<strong>on</strong> 512(f) seeking redress for <strong>the</strong> plaintiffs’ alleged misuse of <strong>the</strong> DMCAtakedown process, arguing that her posting was a self-evident n<strong>on</strong>-infringing fair use. 2042The court rejected Lenz’s claim. Citing <strong>the</strong> Rossi case discussed in subsecti<strong>on</strong> (i) above,<strong>the</strong> court ruled that Lenz must show a knowing misrepresentati<strong>on</strong> <strong>on</strong> <strong>the</strong> part of <strong>the</strong> copyrightowner in filing <strong>the</strong> takedown notice in order to establish liability under Secti<strong>on</strong> 512(f). The courtnoted that <strong>the</strong> plaintiffs had not c<strong>on</strong>ceded that <strong>the</strong> posting was a fair use, and Lenz had failed toallege facts from which a misrepresentati<strong>on</strong> could be inferred or why her use of <strong>the</strong> s<strong>on</strong>g was aself-evident fair use. Accordingly, Lenz’s claim was dismissed with leave to amend. 2043Lenz <strong>the</strong>n amended her complaint, alleging that <strong>the</strong> plaintiffs had issued <strong>the</strong> DMCAtakedown notice <strong>on</strong>ly to appease <strong>the</strong> musician known as “Prince,” <strong>the</strong> author of <strong>the</strong> s<strong>on</strong>g “Let’sGo Crazy.” 2044 Specifically, Lenz alleged that Universal issued its DMCA notice to YouTube at2039 Id. at *1-3.2040 Id. at *30-31.2041 2008 U.S. Dist. LEXIS 44549 (N.D. Cal. Apr. 8, 2008) (Order Granting Defendants’ Moti<strong>on</strong> to Dismiss withLeave to Amend) (not for citati<strong>on</strong>).2042 Id. at *1-3.2043 Id. at *8-9.2044 Lenz v. Universal Music Corp., 572 F. Supp. 2d 1150, 1152 (N.D. Cal. 2008).- 442 -


Prince’s behest, based not <strong>on</strong> <strong>the</strong> particular characteristics of <strong>the</strong> video or any good faith beliefthat it actually infringed, but ra<strong>the</strong>r to appease him, as evidenced by an October 2007 statementto ABC News, in which Universal made <strong>the</strong> following comment:Prince believes it is wr<strong>on</strong>g for You-Tube, or any o<strong>the</strong>r user-generated site, toappropriate his music without his c<strong>on</strong>sent. That positi<strong>on</strong> has nothing to do withany particular video that uses his s<strong>on</strong>gs. It’s simply a matter of principle. Andlegally, he has <strong>the</strong> right to have his music removed. We support him and thisimportant principle. That’s why, over <strong>the</strong> last few m<strong>on</strong>ths, we have askedYouTube to remove thousands of different videos that use Prince music withouthis permissi<strong>on</strong>. 2045Universal moved to dismiss <strong>the</strong> case for failure to state a claim up<strong>on</strong> which relief couldbe granted. The issue raised by <strong>the</strong> moti<strong>on</strong>, which <strong>the</strong> court found to be an issue of firstimpressi<strong>on</strong>, was whe<strong>the</strong>r <strong>the</strong> requirement of Secti<strong>on</strong> 512(c)(3)(A)(v) that a notice issued underSecti<strong>on</strong> 512(c) c<strong>on</strong>tain a statement that <strong>the</strong> complaining party has a good faith belief that use of<strong>the</strong> material in <strong>the</strong> manner complained of is not authorized by <strong>the</strong> copyright owner, its agent, or<strong>the</strong> law, requires a copyright owner to c<strong>on</strong>sider <strong>the</strong> fair use doctrine in formulating its good faithbelief. Universal c<strong>on</strong>tended that Secti<strong>on</strong> 512(c)(3)(A)(v) does not require copyright owners toevaluate <strong>the</strong> questi<strong>on</strong> of fair use prior to sending a takedown notice because fair use is merely anexcused infringement of copyright ra<strong>the</strong>r than a use authorized by <strong>the</strong> copyright owner or by law.Universal also c<strong>on</strong>tended that even if a copyright owner were required by <strong>the</strong> DMCA to evaluatefair use with respect to allegedly infringing material, any such duty would arise <strong>on</strong>ly after acopyright owner received a counter-notice and c<strong>on</strong>sidered filing suit. 2046The court ruled that a copyright owner does have a duty to c<strong>on</strong>sider <strong>the</strong> applicability of<strong>the</strong> fair use doctrine before issuing a takedown notice:An activity or behavior “authorized by law” is <strong>on</strong>e permitted by law or notc<strong>on</strong>trary to law. Though C<strong>on</strong>gress did not expressly menti<strong>on</strong> <strong>the</strong> fair use doctrinein <strong>the</strong> DMCA, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act provides explicitly that “<strong>the</strong> fair use of acopyrighted work … is not an infringement of copyright.” 17 U.S.C. § 107.Even if Universal is correct that fair use <strong>on</strong>ly excuses infringement, <strong>the</strong> factremains that fair use is a lawful use of a copyright. Accordingly, in order for acopyright owner to proceed under <strong>the</strong> DMCA with “a good faith belief that use of<strong>the</strong> material in <strong>the</strong> manner complained of is not authorized by <strong>the</strong> copyrightowner, its agent, or <strong>the</strong> law,” <strong>the</strong> owner must evaluate whe<strong>the</strong>r <strong>the</strong> material makesfair use of <strong>the</strong> copyright. 17 U.S.C. § 512(c)(3)(A)(v). An allegati<strong>on</strong> that acopyright owner acted in bad faith by issuing a takedown notice without properc<strong>on</strong>siderati<strong>on</strong> of <strong>the</strong> fair use doctrine thus is sufficient to state a misrepresentati<strong>on</strong>claim pursuant to Secti<strong>on</strong> 512(f) of <strong>the</strong> DMCA. 20472045 Id. at 1152-53.2046 Id. at 1153-54.2047 Id. at 1154-55 (footnotes omitted).- 443 -


The court addressed Universal’s c<strong>on</strong>cern that, because <strong>the</strong> questi<strong>on</strong> of whe<strong>the</strong>r aparticular use of copyrighted material is fair is a fact-intensive inquiry, it would be difficult forcopyright owners to predict whe<strong>the</strong>r a court eventually would rule in <strong>the</strong>ir favor. “[W]hile <strong>the</strong>sec<strong>on</strong>cerns are understandable, <strong>the</strong>ir actual impact likely is overstated. Although <strong>the</strong>re may becases in which such c<strong>on</strong>siderati<strong>on</strong>s will arise, <strong>the</strong>re are likely to be few in which a copyrightowner’s determinati<strong>on</strong> that a particular use is not fair use will meet <strong>the</strong> requisite standard ofsubjective bad faith required to prevail in an acti<strong>on</strong> for misrepresentati<strong>on</strong> under 17 U.S.C. §512(f).” 2048The court <strong>the</strong>n turned to whe<strong>the</strong>r <strong>the</strong> amended complaint c<strong>on</strong>tained sufficient allegati<strong>on</strong>sof bad faith and deliberate ignorance of fair use to survive <strong>the</strong> moti<strong>on</strong> to dismiss. The courtfound that it did. The amended complaint alleged that Universal acted solely to satisfy Princeand his pers<strong>on</strong>al agenda and that its acti<strong>on</strong>s had nothing to do with any particular YouTube videothat used his s<strong>on</strong>gs. 2049 The court c<strong>on</strong>cluded, “Although <strong>the</strong> Court has c<strong>on</strong>siderable doubt thatLenz will be able to prove that Universal acted with <strong>the</strong> subjective bad faith required by Rossi,and following discovery her claims well may be appropriate for summary judgment, Lenz’sallegati<strong>on</strong>s are sufficient at <strong>the</strong> pleading stage.” 2050Finally, <strong>the</strong> court c<strong>on</strong>sidered Universal’s allegati<strong>on</strong> that <strong>the</strong> amended complaint failed toallege a compensable loss under <strong>the</strong> DMCA. The amended complaint alleged that Lenz hadincurred injury in <strong>the</strong> form of <strong>the</strong> financial and pers<strong>on</strong>al expenses associated with resp<strong>on</strong>ding to<strong>the</strong> claim of infringement and harm to her free speech rights, and that she had been intimidatedinto not posting a single video <strong>on</strong> YouTube since she received Universal’s takedown notice. Atoral argument, Lenz’s counsel stated that while <strong>the</strong> damages incurred in preparing Lenz’scounter-notice could not be elaborated up<strong>on</strong> for reas<strong>on</strong>s of privilege, Lenz did incur actualdamages in reviewing counter-notice procedures, seeking <strong>the</strong> assistance of an attorney, andresp<strong>on</strong>ding to <strong>the</strong> takedown notice. The court ruled that, though damages might be nominal and<strong>the</strong>ir exact nature yet to be determined, Lenz had adequately alleged cognizable injury under <strong>the</strong>DMCA to survive Universal’s moti<strong>on</strong> to dismiss. 2051In a later opini<strong>on</strong> (designated not for publicati<strong>on</strong>) denying <strong>the</strong> defendants’ moti<strong>on</strong> tocertify <strong>the</strong> court’s order for interlocutory appeal, <strong>the</strong> court elaborated <strong>on</strong> its ruling a bit asfollows: “The Court did not hold that every takedown notice must be preceded by a full fair useinvestigati<strong>on</strong>. Ra<strong>the</strong>r, it recognized, as it has previously, that in a given case fair use may be soobvious that a copyright owner could not reas<strong>on</strong>ably believe that acti<strong>on</strong>able infringement wastaking place. In such a case, which is likely to be extremely rare, <strong>the</strong> policy objectives of <strong>the</strong>2048 Id. at 1155.2049 Id. at 1156.2050 Id.2051 Id. at 1156-57.- 444 -


DMCA are served by requiring copyright owners at least to form a subjective good faith beliefthat <strong>the</strong> ‘particular use is not a fair use’ before sending <strong>the</strong> takedown notice.” 2052Lenz <strong>the</strong>n moved for partial summary judgment with respect to several affirmativedefenses asserted by <strong>the</strong> defendants. 2053 The defendants’ third affirmative defense was that Lenzhad suffered no damages cognizable under Secti<strong>on</strong> 512(f), which provides that a pers<strong>on</strong> whoknowingly makes a material misrepresentati<strong>on</strong> in a takedown notice or in a counternotice shallbe liable for “any damages,” including costs and attorneys’ fees, incurred by <strong>on</strong>e injured by <strong>the</strong>misrepresentati<strong>on</strong> as <strong>the</strong> result of <strong>the</strong> service provider relying <strong>on</strong> <strong>the</strong> misrepresentati<strong>on</strong> inremoving <strong>the</strong> allegedly infringing materials or in replacing removed material. The partiesdisagreed about whe<strong>the</strong>r <strong>the</strong> statute recognizes <strong>on</strong>ly ec<strong>on</strong>omic damages. The court ruled that <strong>the</strong>use of <strong>the</strong> phrase “any damages” suggested str<strong>on</strong>g c<strong>on</strong>gressi<strong>on</strong>al intent that recovery be availablefor damages even if <strong>the</strong>y do not amount to substantial ec<strong>on</strong>omic damages. 2054 All <strong>the</strong> plaintiffneed show is damages that were “proximately caused by <strong>the</strong> misrepresentati<strong>on</strong> to <strong>the</strong> serviceprovider and <strong>the</strong> service provider’s reliance <strong>on</strong> <strong>the</strong> misrepresentati<strong>on</strong>.” 2055 With respect toattorneys’ fees and costs, <strong>the</strong> court ruled that any fees incurred for work in resp<strong>on</strong>ding to <strong>the</strong>takedown notice and prior to <strong>the</strong> instituti<strong>on</strong> of suit under Secti<strong>on</strong> 512(f) are recoverable, butrecovery of any o<strong>the</strong>r costs and fees post instituti<strong>on</strong> of suit is governed by <strong>the</strong> usual standardunder Secti<strong>on</strong> 505. Because <strong>the</strong>re was no genuine issue of material fact as to whe<strong>the</strong>r Lenzincurred at least some damages as defined under <strong>the</strong> statute, <strong>the</strong> court granted Lenz’s moti<strong>on</strong> forsummary judgment as to Universal’s affirmative defense of no damages. 2056(vii) UMG Recordings v. AugustoIn UMG Recordings, Inc. v. Augusto, 2057 UMG brought a claim for copyrightinfringement based <strong>on</strong> Augusto’s sale <strong>on</strong> eBay of copies of promoti<strong>on</strong>al CDs he had receivedfrom UMG in advance of general commercial release. The promoti<strong>on</strong>al CDs had been label withlanguage stating that <strong>the</strong>y were licensed to <strong>the</strong> intended recipient for pers<strong>on</strong>al use <strong>on</strong>ly and thatacceptance of <strong>the</strong> CD c<strong>on</strong>stituted an agreement to comply with <strong>the</strong> terms of <strong>the</strong> license, whichprohibited resale or transfer of possessi<strong>on</strong>. UMG sent notices to eBay under <strong>the</strong> DMCA allegingthat sale of <strong>the</strong> promoti<strong>on</strong>al CDs was infringing, in resp<strong>on</strong>se to which eBay temporarily stoppedAugusto’s aucti<strong>on</strong>s and suspected his eBay account, although eventually his account wasrestored. 2058 The court rejected UMG’s claim for copyright infringement, ruling that <strong>the</strong>distributi<strong>on</strong>s of <strong>the</strong> CDs should be treated as “sales” for purpose of <strong>the</strong> first sale doctrine,notwithstanding <strong>the</strong> “license” agreement because recipients were free to keep <strong>the</strong> copies forever,2052 Lenz v. Universal Music Corp., 2008 U.S. Dist. LEXIS 91890 at *6-7 (N.D. Cal. Oct. 28, 2008) (citati<strong>on</strong>somitted).2053 Lenz v. Universal Music Corp., 2010 U.S. Dist. LEXIS 16899 (N.D. Cal. Feb. 25, 2010).2054 Id. at *20-26.2055 Id. at *26 (emphasis removed).2056 Id. at *29-30.2057 558 F. Supp. 2d 1055 (C.D. Cal. 2008).2058 Id. at 1058.- 445 -


UMG received no recurring benefit from recipients’ c<strong>on</strong>tinued possessi<strong>on</strong>, and <strong>the</strong> transfer wasproperly characterized as a gift, both under comm<strong>on</strong> law and under <strong>the</strong> Postal Reorganizati<strong>on</strong>Act. 2059 Augusto brought a counterclaim against UMG under Secti<strong>on</strong> 512(f), alleging that UMGknowingly misrepresented to eBay that Augusto’s aucti<strong>on</strong> infringed UMG’s copyrights. Thecourt rejected this claim because <strong>the</strong> evidence dem<strong>on</strong>strated that UMG had a subjective goodfaith belief that Augusto was infringing its copyrights. UMG was aware that Augusto hadentered into a c<strong>on</strong>sent judgment in a previous case, in which he had admitted that sellingpromoti<strong>on</strong>al CDs violated <strong>the</strong> owner’s copyright. August also believed that <strong>the</strong> license language<strong>on</strong> <strong>the</strong> CDs enabled it to enforce its copyrights against an unauthorized seller of those CDs.Accordingly, <strong>the</strong> court granted UMG summary judgment <strong>on</strong> Augusto’s Secti<strong>on</strong> 512(f) claim. 2060(viii) Capitol Records v. MP3tunes, LLCIn Capital Records, Inc. v. MP3Tunes, LLC, 2061 a number of record labels broughtclaims for copyright infringement against MP3tunes.com for offering <strong>on</strong>line storage lockerswhere users could store illegally downloaded music and against sideload.com, a search enginethat allowed users to search for free music downloads. The plaintiffs sent MP3tunes a DMCAtake-down notice with a representative list of over 350 s<strong>on</strong>gs that were copied, performed,stored, distributed, and made available for download <strong>on</strong> or by MP3tunes, but also demanded thatMP3tunes take acti<strong>on</strong> with respect to all of <strong>the</strong> plaintiffs’ copyrighted recordings, even if notincluded <strong>on</strong> <strong>the</strong> representative list. MP3tunes removed <strong>the</strong> s<strong>on</strong>gs identified <strong>on</strong> <strong>the</strong> representativelist from its websites, but took no acti<strong>on</strong> c<strong>on</strong>cerning <strong>the</strong> broader demand to take down o<strong>the</strong>rcopyrighted recordings. 2062MP3tunes brought a counterclaim under Secti<strong>on</strong> 512(f) based <strong>on</strong> <strong>the</strong> allegati<strong>on</strong> that fiveor more recordings <strong>on</strong> <strong>the</strong> take-down notice were authorized by <strong>on</strong>e of <strong>the</strong> plaintiff record labels(EMI) for free downloading. The court ruled that MP3tunes was collaterally estopped frombringing <strong>the</strong> counterclaim based <strong>on</strong> an earlier ruling in a separate state litigati<strong>on</strong> between <strong>the</strong>parties. MP3tunes <strong>the</strong>n sought to amend its counterclaim to enumerate additi<strong>on</strong>al allegati<strong>on</strong>s,including that plaintiff EMI paid third parties to distribute free MP3s over <strong>the</strong> <strong>Internet</strong>; at leastsix of <strong>the</strong> plaintiffs’ record label websites distributed s<strong>on</strong>gs for free; and EMI engaged in activemarketing of its music directly and through hundred or thousands of <strong>on</strong>line music partners. Thecourt denied MP3tunes <strong>the</strong> ability to amend its counterclaim <strong>on</strong> three grounds. First, <strong>the</strong> courtnoted, citing <strong>the</strong> Diebold case above, that a material misrepresentati<strong>on</strong> for purposes of Secti<strong>on</strong>512(f) is <strong>on</strong>e that affected <strong>the</strong> infringer or service provider’s resp<strong>on</strong>se to a DMCA letter.Because MP3tunes removed <strong>on</strong>ly <strong>the</strong> s<strong>on</strong>gs <strong>on</strong> <strong>the</strong> representative list and did not resp<strong>on</strong>d to <strong>the</strong>demand that it remove all links to any of <strong>the</strong> plaintiffs’ copyrighted recordings, <strong>the</strong> courtc<strong>on</strong>cluded that <strong>the</strong> plaintiffs’ representati<strong>on</strong> that any link to its copyrighted recording was2059 Id. at 1060-61.2060 Id. at 1065.2061 611 F. Supp. 2d 342 (S.D.N.Y. 2009).2062 Id. at 344.- 446 -


infringing could not be a “material” misrepresentati<strong>on</strong>. Sec<strong>on</strong>d, <strong>the</strong> court noted that MP3tuneshad suffered no injury because it took no acti<strong>on</strong> o<strong>the</strong>r than filing an anticipatory lawsuit. Third,<strong>the</strong> court held that an allegati<strong>on</strong> of a possibility that some of <strong>the</strong> s<strong>on</strong>gs <strong>on</strong> <strong>the</strong> representative listmight be n<strong>on</strong>-infringing was too speculative to meet applicable pleading standards, soamendment of <strong>the</strong> counterclaim would be futile. 2063(ix) Brave New Films v. WeinerIn Brave New Films 501(C)(4) v. Weiner, 2064 Brave New Films uploaded to YouTube avideo c<strong>on</strong>taining footage from The Michael Savage Show in which Savage made disparagingremarks about Muslims. The uploaded video criticized Savage’s remarks. The syndicator ofSavage’s show, Original Talk Radio Network (OTRN), sent a DMCA takedown notice toYouTube, alleging that <strong>the</strong> video posted by Brave New Films was infringing. Brave New Filmssubmitted a counter-notice to YouTube and instituted a lawsuit against Savage and OTRN,seeking a declaratory judgment that <strong>the</strong> video did not infringement copyrights held by OTRN orSavage, and alleging misrepresentati<strong>on</strong> in violati<strong>on</strong> of Secti<strong>on</strong> 512(f). 2065Savage sought to avoid <strong>the</strong> Secti<strong>on</strong> 512(f) claim against him by arguing that <strong>the</strong>takedown notice submitted to YouTube by OTRN was defective, in that it did not allege a goodfaith belief that Brave New Films’ use of <strong>the</strong> video was unauthorized, and that a notice not incompliance with all requirements of Secti<strong>on</strong> 512(c)(3)(A) could not form <strong>the</strong> basis for a Secti<strong>on</strong>512(f) claim. The court rejected Savage’s arguments <strong>on</strong> two grounds. First, OTRN stated in itstakedown notice under penalty of perjury that <strong>the</strong> informati<strong>on</strong> in <strong>the</strong> letter was accurate and thatYouTube had posted <strong>the</strong> video without authorizati<strong>on</strong>, which <strong>the</strong> court held was sufficient tosatisfy <strong>the</strong> “good faith belief” requirement of Secti<strong>on</strong> 512(c)(3)(A). Sec<strong>on</strong>d, <strong>the</strong> court ruled that<strong>the</strong> safe harbor provisi<strong>on</strong> of Secti<strong>on</strong> 512(c)(3)(A) and its attendant requirements are to protectOSPs from liability and cannot be asserted as a defense to Secti<strong>on</strong> 512(f) claims. 2066(5) O<strong>the</strong>r Provisi<strong>on</strong>sSecti<strong>on</strong> 512(g) provides that a Service Provider shall not be liable for <strong>the</strong> good faithdisabling of access to or removal of material or activity claimed to be, or appearing from <strong>the</strong>facts and circumstances to be, infringing (regardless of whe<strong>the</strong>r <strong>the</strong> material or activity isultimately determined to be infringing). However, if such removal is taken pursuant to a noticegiven to <strong>the</strong> Service Provider pursuant to <strong>the</strong> provisi<strong>on</strong>s of <strong>the</strong> third safe harbor (which will bereferred to herein as <strong>the</strong> “safe harbor notice”), <strong>the</strong>n Secti<strong>on</strong> 512(g)’s limit <strong>on</strong> liability isc<strong>on</strong>diti<strong>on</strong>ed up<strong>on</strong> compliance with <strong>the</strong> following. The Service Provider must (i) take reas<strong>on</strong>ablesteps to promptly notify <strong>the</strong> subscriber that it has removed or disabled access to <strong>the</strong> subscriber’sallegedly infringing material; (ii) up<strong>on</strong> receipt of a counter notificati<strong>on</strong> from <strong>the</strong> subscriberstating under penalty of perjury that it has a good faith belief that <strong>the</strong> materials were removed or2063 Id. at 346-47.2064 626 F. Supp. 2d 1013 (N.D. Cal. 2009).2065 Id. at 1014-15.2066 Id. at 1017-18.- 447 -


disabled as a result of mistake or misidentificati<strong>on</strong> of <strong>the</strong> material, provide <strong>the</strong> pers<strong>on</strong> whosubmitted <strong>the</strong> safe harbor notice with a copy of <strong>the</strong> counter notificati<strong>on</strong> and inform that pers<strong>on</strong>that <strong>the</strong> Service Provider will replace <strong>the</strong> removed material or cease disabling access to it in tenbusiness days; and (iii) replace <strong>the</strong> removed material and cease disabling access to it not lessthan ten, nor more than fourteen, business days following receipt of <strong>the</strong> counter notificati<strong>on</strong>,unless <strong>the</strong> Service Provider receives notice from <strong>the</strong> pers<strong>on</strong> submitting <strong>the</strong> safe harbor notice thatsuch pers<strong>on</strong> has filed an acti<strong>on</strong> seeking a court order to restrain <strong>the</strong> subscriber from engaging ininfringing activity relating to <strong>the</strong> material <strong>on</strong> <strong>the</strong> Service Provider’s system.As described in more detail in Secti<strong>on</strong> II.G.6(h) above, Secti<strong>on</strong> 512(h) sets up aprocedure through which a copyright owner may obtain an order through a United States districtcourt directing <strong>the</strong> Service Provider to release <strong>the</strong> identity of an alleged direct infringer actingthrough <strong>the</strong> Service Provider’s system or network.Under Secti<strong>on</strong> 512(l), failure of a Service Provider to fit into <strong>on</strong>e of <strong>the</strong> safe harbors doesnot affect <strong>the</strong> Service Provider’s claim that its c<strong>on</strong>duct is n<strong>on</strong>e<strong>the</strong>less n<strong>on</strong>infringing, or any o<strong>the</strong>rdefense.Finally, Secti<strong>on</strong> 512(m) clarifies that <strong>the</strong> safe harbors are not c<strong>on</strong>diti<strong>on</strong>ed up<strong>on</strong> arequirement that <strong>the</strong> Service Provider m<strong>on</strong>itor its system for infringements, or access, remove ordisable access to material where such c<strong>on</strong>duct is prohibited by law (for example, by <strong>the</strong>Electr<strong>on</strong>ic Communicati<strong>on</strong>s Privacy Act).(6) Injuncti<strong>on</strong>s Against Service ProvidersUnder Secti<strong>on</strong> 512(j), if a Service Provider is subject to injunctive relief o<strong>the</strong>r than under<strong>the</strong> first safe harbor, courts are limited to injuncti<strong>on</strong>s that restrain <strong>the</strong> Service Provider fromproviding access to infringing material at particular <strong>on</strong>line sites <strong>on</strong> its service, that restrain itfrom providing services to a subscriber engaging in infringing activity by terminating <strong>the</strong>subscriber, or that o<strong>the</strong>rwise are “necessary to prevent or restrain infringement of specifiedcopyrighted material at a particular <strong>on</strong>line locati<strong>on</strong>, if such relief is <strong>the</strong> least burdensome to <strong>the</strong>service provider am<strong>on</strong>g <strong>the</strong> forms of relief comparably effective for that purpose.” If <strong>the</strong> ServiceProvider is subject to injunctive relief under <strong>the</strong> first safe harbor, <strong>the</strong>n courts are limited toinjuncti<strong>on</strong>s that restrain <strong>the</strong> Service Provider from providing access to a subscriber engaging ininfringing activity by terminating <strong>the</strong> subscriber or by taking reas<strong>on</strong>able steps specified in <strong>the</strong>order to block access to a specific, identified, <strong>on</strong>line locati<strong>on</strong> outside <strong>the</strong> United States.Infringement(7) Designati<strong>on</strong> of Agent to Receive Notificati<strong>on</strong> of ClaimedTo take advantage of <strong>the</strong> third safe harbor for innocent storage of infringing informati<strong>on</strong>,Secti<strong>on</strong> 512(c)(2) requires a Service Provider to designate an agent to receive notificati<strong>on</strong>s ofclaimed infringement by providing c<strong>on</strong>tact informati<strong>on</strong> for that agent to <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office andthrough <strong>the</strong> Service Provider’s publicly accessible website. Secti<strong>on</strong> 512(c)(2) requires <strong>the</strong><str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office to maintain a current directory of designated agents and to make <strong>the</strong> listingavailable to <strong>the</strong> public.- 448 -


On Nov. 3, 1998, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office published interim regulati<strong>on</strong>s for <strong>the</strong> designati<strong>on</strong>of such agents. 2067 Because <strong>the</strong> DMCA was made effective immediately, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Officedid not have time to c<strong>on</strong>duct rulemaking proceedings. Accordingly, <strong>the</strong> Office adopted interimregulati<strong>on</strong>s, and stated its intent in <strong>the</strong> next several weeks to publish a notice of proposedrulemaking to seek comments <strong>on</strong> more comprehensive final regulati<strong>on</strong>s governing <strong>the</strong>designati<strong>on</strong> of agents to receive notificati<strong>on</strong> of claimed infringement. Up<strong>on</strong> <strong>the</strong> adopti<strong>on</strong> of finalrules, Service Providers will have to file new designati<strong>on</strong>s that satisfy <strong>the</strong> requirements of <strong>the</strong>final regulati<strong>on</strong>s. 2068Under <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office’s interim rules, <strong>the</strong> Office does not provide printed forms forfiling interim designati<strong>on</strong>s of agents. Instead, Service Providers must file a document entitled“Interim Designati<strong>on</strong> of Agent to Receive Notificati<strong>on</strong>s of Claimed Infringement,” identified assuch by a prominent capti<strong>on</strong> or heading. The Interim Designati<strong>on</strong>, which requires a filing fee of$20, must c<strong>on</strong>tain <strong>the</strong> following informati<strong>on</strong>: (i) <strong>the</strong> full legal name and address of <strong>the</strong> ServiceProvider; (ii) all names under which <strong>the</strong> Service Provider is doing business; (iii) <strong>the</strong> name, fulladdress, teleph<strong>on</strong>e number, facsimile number, and electr<strong>on</strong>ic mail address of <strong>the</strong> agent to receivenotificati<strong>on</strong> of claimed infringement; and (iv) <strong>the</strong> signature of <strong>the</strong> appropriate officer orrepresentative of <strong>the</strong> Service Provider designating <strong>the</strong> agent, toge<strong>the</strong>r with <strong>the</strong> printed name andtitle of <strong>the</strong> pers<strong>on</strong> signing <strong>the</strong> designati<strong>on</strong>, and <strong>the</strong> date of signature. 2069 A suggested format forfiling an Interim Designati<strong>on</strong> can be found <strong>on</strong> <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office’s website athttp://lcweb.loc.gov/copyright/<strong>on</strong>linesp/agent.pdf. Each Interim Designati<strong>on</strong> may be filed <strong>on</strong>ly<strong>on</strong> behalf of a single Service Provider. Related companies (e.g., parents and subsidiaries) arec<strong>on</strong>sidered separate Service Providers who would file separate interim designati<strong>on</strong>s. 2070In <strong>the</strong> event of a change in <strong>the</strong> informati<strong>on</strong> reported in an Interim Designati<strong>on</strong>, a ServiceProvider must file an amended Interim Designati<strong>on</strong> c<strong>on</strong>taining <strong>the</strong> current informati<strong>on</strong> requiredfor such designati<strong>on</strong>s, toge<strong>the</strong>r with a filing fee of $20. A suggested format for filing anamended Interim Designati<strong>on</strong> can be found <strong>on</strong> <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office’s website athttp://lcweb.loc.gov/copyright/<strong>on</strong>linesp/agenta.pdf. Designati<strong>on</strong>s and amendments are posted<strong>on</strong>line <strong>on</strong> <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office’s website athttp://www.loc.gov/copyright/<strong>on</strong>linesp/list/index.html. If a Service Provider terminates itsoperati<strong>on</strong>s, it must notify <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office by certified or registered mail. 20716. Limitati<strong>on</strong>s of Liability of Online Service Providers under <strong>the</strong>Communicati<strong>on</strong>s Decency ActThe Communicati<strong>on</strong>s Decency Act (“CDA”), 47 U.S.C. § 230, was passed by C<strong>on</strong>gressto create “a federal immunity to any state law cause of acti<strong>on</strong> that would hold computer service2067 63 Fed. Reg. 59233 (Nov. 3, 1998).2068 Id. at 59234.2069 Id. at 59234-35.2070 Id. at 59234.2071 Id. at 59235.- 449 -


providers liable for informati<strong>on</strong> originating with a third party.” 2072 Specifically, 47 U.S.C. §230(c)(1) provides that “[n]o provider or user of an interactive computer service shall be treatedas <strong>the</strong> publisher or speaker of any informati<strong>on</strong> provided by ano<strong>the</strong>r informati<strong>on</strong> c<strong>on</strong>tentprovider.” Secti<strong>on</strong> 230(e)(3) provides in part that “[n]o cause of acti<strong>on</strong> may be brought and noliability may be imposed under any State or local law that is inc<strong>on</strong>sistent with this secti<strong>on</strong>.” Oneof <strong>the</strong> main purposes of <strong>the</strong> CDA immunity was to prevent service providers from being treatedas <strong>the</strong> publisher of defamatory statements posted <strong>on</strong> or through <strong>the</strong> service by users.(a) St<strong>on</strong>er v. eBaySt<strong>on</strong>er v. eBay Inc. 2073 involved a novel applicati<strong>on</strong> of <strong>the</strong> CDA to shield <strong>the</strong> <strong>on</strong>lineaucti<strong>on</strong> service provider eBay Inc. from liability under state laws for intellectual propertyinfringements committed through its service. In that case, <strong>the</strong> plaintiff sought to hold eBayliable for <strong>the</strong> sale and distributi<strong>on</strong> of illegal copies of sound recordings sold through its aucti<strong>on</strong>service, alleging that eBay’s participati<strong>on</strong> in <strong>the</strong> same c<strong>on</strong>stituted unfair competiti<strong>on</strong> under <strong>the</strong>California Business and Professi<strong>on</strong>s Code § 17200 et seq. The court granted eBay’s moti<strong>on</strong> forsummary judgment, holding that <strong>the</strong> CDA’s immunity provisi<strong>on</strong>s shielded eBay from liabilityunder <strong>the</strong> asserted state laws.To establish immunity under <strong>the</strong> CDA, <strong>the</strong> court ruled that eBay had to establish <strong>the</strong>following three elements: “(1) that eBay is an interactive computer services provider; (2) thateBay is not an informati<strong>on</strong> c<strong>on</strong>tent provider with respect to <strong>the</strong> disputed activity; and (3) thatplaintiff seeks to hold eBay liable for informati<strong>on</strong> originating with a third-party user of itsservice.” 2074 The parties did not dispute <strong>the</strong> first element – that eBay was an interactivecomputer services provider. The court ruled that eBay had established <strong>the</strong> sec<strong>on</strong>d elementbecause it was undisputed that <strong>the</strong> descripti<strong>on</strong>s of <strong>the</strong> goods and services aucti<strong>on</strong>ed over <strong>the</strong>eBay service were created entirely by <strong>the</strong> sellers. 2075With respect to <strong>the</strong> third element, <strong>the</strong> plaintiff argued that <strong>the</strong> suit did not seek to holdeBay resp<strong>on</strong>sible for <strong>the</strong> publicati<strong>on</strong> of informati<strong>on</strong> provided by o<strong>the</strong>rs, but ra<strong>the</strong>r for its ownparticipati<strong>on</strong> in selling c<strong>on</strong>traband musical recordings by virtue of its charging fees andadvertising for its services, providing insurance for all aucti<strong>on</strong>ed items, and providing escrowand payment services. 2076 The court ruled that eBay’s role did not extend bey<strong>on</strong>d <strong>the</strong> scope of<strong>the</strong> federal immunity:A principle objective of <strong>the</strong> immunity provisi<strong>on</strong> is to encourage commerce over<strong>the</strong> <strong>Internet</strong> by ensuring that interactive computer service providers are not heldresp<strong>on</strong>sible for how third parties use <strong>the</strong>ir services. … To accomplish thisobjective, <strong>the</strong> immunity extends bey<strong>on</strong>d <strong>the</strong> publicati<strong>on</strong> of harmful material over2072 Zeran v. America Online, 129 F.3d 327, 330 (4th Cir. 1997) (emphasis added).2073 56 U.S.P.Q.2d 1852 (Cal. Sup. Ct. 2000).2074 Id. at 1853.2075 Id.2076 Id. at 1853-54.- 450 -


<strong>the</strong> <strong>Internet</strong>, and encompasses <strong>the</strong> distributi<strong>on</strong> of such material in transacti<strong>on</strong>seffected over <strong>the</strong> <strong>Internet</strong>. 2077The court noted that, at bottom, <strong>the</strong> plaintiff’s c<strong>on</strong>tenti<strong>on</strong> was that eBay should be heldresp<strong>on</strong>sible for failing to m<strong>on</strong>itor <strong>the</strong> products aucti<strong>on</strong>ed over its service when it must haveknown that illicit recordings were being aucti<strong>on</strong>ed. The plaintiff argued that <strong>the</strong> very descripti<strong>on</strong>of some recordings (e.g., “bootleg” tapes) identified <strong>the</strong>m as c<strong>on</strong>traband, so that by failing tointervene, eBay must be deemed to have knowingly joined in <strong>the</strong> unlawful sale. 2078 The courtrejected this argument:C<strong>on</strong>gress intended to remove any legal obligati<strong>on</strong> of interactive computer serviceproviders to attempt to identify or m<strong>on</strong>itor <strong>the</strong> sale of such products. While sucha service may be aware that a fracti<strong>on</strong> of <strong>the</strong> large volume of data exchanged overits facilities involves unlawful activity, and might be able to detect a certainporti<strong>on</strong> of those, <strong>the</strong> threat of liability for failing to m<strong>on</strong>itor effectively would, in<strong>the</strong> judgment of C<strong>on</strong>gress, deter companies such as eBay from making <strong>the</strong>irservice available as widely and as freely as possible. … In order for liability toarise and <strong>the</strong> immunity to be lost, it would be necessary to show actual, ra<strong>the</strong>rthan c<strong>on</strong>structive, knowledge of illegal sales, and some affirmative acti<strong>on</strong> by <strong>the</strong>computer service, bey<strong>on</strong>d making its facilities available in <strong>the</strong> normal manner,designed to accomplish <strong>the</strong> illegal sales. 2079Accordingly, <strong>the</strong> court granted eBay’s moti<strong>on</strong> for summary judgment. This case presentsan additi<strong>on</strong>al weap<strong>on</strong> of immunity against liability for service providers, at least to <strong>the</strong> extentthat claims are brought against <strong>the</strong> service provider under state law. Because many states havelaws that may be asserted against service providers for infringement committed through <strong>the</strong>irservices – such as unfair competiti<strong>on</strong> laws and laws that protect sound recordings fixed before1972 (when C<strong>on</strong>gress added protecti<strong>on</strong> of sound recordings to <strong>the</strong> copyright statute) – <strong>the</strong>c<strong>on</strong>structi<strong>on</strong> of <strong>the</strong> CDA under St<strong>on</strong>er v. eBay, if followed by o<strong>the</strong>r courts, could provide a veryuseful grounds for immunity.(b) Perfect 10 v. CCBillThe facts of Perfect 10, Inc. v. CCBill LLC 2080 are set forth in Secti<strong>on</strong> III.C.5(b)(1)(i)d.above. In that case, Perfect 10 appealed rulings by <strong>the</strong> district court that CCBill and CWIE wereimmune from liability for state law unfair competiti<strong>on</strong> and false advertising claims based <strong>on</strong> <strong>the</strong>CDA. CCBill and CWIE cross appealed, arguing that <strong>the</strong> district court erred in holding that <strong>the</strong>CDA did not provide immunity against Perfect 10’s right of publicity claims. 20812077 Id. at 1854.2078 Id.2079 Id. at 1855.2080 2007 U.S. App. LEXIS 7238 (9 th Cir. Mar. 29, 2007).2081 Id. at *2.- 451 -


The Ninth Circuit noted that, although <strong>the</strong> CDA does not provide service providers withimmunity from laws pertaining to intellectual property, it does not c<strong>on</strong>tain an express definiti<strong>on</strong>of “intellectual property.” Because state laws protecting intellectual property are not uniform,and because material <strong>on</strong> a website may be viewed across many states at a time, <strong>the</strong> courtreas<strong>on</strong>ed that permitting <strong>the</strong> reach of any particular state’s definiti<strong>on</strong> of intellectual property todictate <strong>the</strong> c<strong>on</strong>tours of federal immunity under <strong>the</strong> CDA would be c<strong>on</strong>trary to C<strong>on</strong>gress’expressed goal of insulating <strong>the</strong> development of <strong>the</strong> <strong>Internet</strong> from <strong>the</strong> various state-law regimes.Thus, in <strong>the</strong> absence of a definiti<strong>on</strong> from C<strong>on</strong>gress, <strong>the</strong> court c<strong>on</strong>strued <strong>the</strong> term “intellectualproperty” in <strong>the</strong> CDA to mean “federal intellectual property.” Accordingly, CCBill and CWIEwere eligible for CDA immunity for all of <strong>the</strong> state claims raised by Perfect 10. 20827. Sec<strong>on</strong>dary Liability of Investors(a) The Hummer Winblad/Bertelsmann Litigati<strong>on</strong>For a discussi<strong>on</strong> of this litigati<strong>on</strong>, see Secti<strong>on</strong> III.C.2(c)(8) above.(b) UMG Recordings v. Veoh NetworksThe plaintiffs, who owned rights to copyrighted sound recordings and musicalcompositi<strong>on</strong>s allegedly used without authorizati<strong>on</strong> by users submitting user-generated c<strong>on</strong>tent toa site operated by Veoh Networks, sought to hold three of Veoh’s investors sec<strong>on</strong>darily liableunder <strong>the</strong>ories of c<strong>on</strong>tributory liability, vicarious liability, and inducement of infringement. InUMG Recordings, Inc. v. Veoh Networks, Inc., 2083 in a decisi<strong>on</strong> designated not for publicati<strong>on</strong>,<strong>the</strong> court dismissed <strong>the</strong> plaintiff’s complaint with leave to amend. With respect to c<strong>on</strong>tributoryliability, <strong>the</strong> court held that merely exercising ownership to select a Board of Directors cannotinvite derivative liability. 2084 “Nor is <strong>the</strong>re a comm<strong>on</strong> law duty for investors (even <strong>on</strong>es whocollectively c<strong>on</strong>trol <strong>the</strong> Board) ‘to remove copyrighted c<strong>on</strong>tent’ in light of <strong>the</strong> DMCA.” 2085 Thecourt distinguished <strong>the</strong> Hummer Winblad/Bertelsmann litigati<strong>on</strong> <strong>on</strong> <strong>the</strong> ground that <strong>the</strong> court<strong>the</strong>re upheld <strong>the</strong> complaints against <strong>the</strong> investors in view of <strong>the</strong> allegati<strong>on</strong> that <strong>the</strong> investors hadspecifically ordered that infringing activity take place <strong>on</strong> <strong>the</strong> Napster site. With respect tovicarious liability, <strong>the</strong> court noted <strong>the</strong>re was no direct financial benefit to Veoh’s investors in <strong>the</strong>form of fees from users or advertisers, and mere potential future increase in financial value of <strong>the</strong>investment was not sufficient. With respect to inducement to infringe, <strong>the</strong>re was no allegati<strong>on</strong>that <strong>the</strong> investors encouraged Veoh to infringe directly, <strong>the</strong>reby distinguishing <strong>the</strong> Grokstercase. 20862082 Id. at *32-34.2083 2009 U.S. Dist. LEXIS 14955 (C.D. Cal. Feb. 2, 2009).2084 Id. at *11.2085 Id.2086 Id. at *13-18.- 452 -


D. Linking and FramingThe practice of “linking” is ano<strong>the</strong>r activity that is ubiquitous <strong>on</strong> <strong>the</strong> World Wide Web.A “link” is an embedded electr<strong>on</strong>ic address that “points” to ano<strong>the</strong>r Web locati<strong>on</strong>. Links may beof at least two different types. The first type, which will be referred to as an “out link,” merelyprovides a vehicle by which a pers<strong>on</strong> browsing a Web page can go to ano<strong>the</strong>r site by clicking <strong>on</strong><strong>the</strong> link. The out link stores <strong>the</strong> electr<strong>on</strong>ic address of <strong>the</strong> destinati<strong>on</strong> site, and clicking <strong>on</strong> <strong>the</strong>link sends that address to <strong>the</strong> browser, which in turn moves <strong>the</strong> user to <strong>the</strong> new destinati<strong>on</strong> site.A sec<strong>on</strong>d type of link, which will be referred to as an “inline link,” is a pointer to adocument, image, audio clip or <strong>the</strong> like somewhere <strong>on</strong> <strong>the</strong> Web c<strong>on</strong>tained in ano<strong>the</strong>r’s Web pagewhich, in effect, pulls in <strong>the</strong> image, text or audio clip from <strong>the</strong> o<strong>the</strong>r Web page into <strong>the</strong> currentdocument for display. In o<strong>the</strong>r words, a user looking at A’s Web page will see <strong>on</strong> that pageimage, text, or an audio clip that actually was “pulled in” from site owner B’s Web page. 2087When material from an inline link is displayed within <strong>the</strong> “frame” or window border of a page of<strong>the</strong> linking website, this type of linking is often referred to as “framing.” 2088 The linking site issometimes referred to as a “para-site,” with obvious pejorative c<strong>on</strong>notati<strong>on</strong>s.Both out links and inline links raise a number of potential copyright issues. An out linkthat points to a site c<strong>on</strong>taining infringing material may, for example, cause fur<strong>the</strong>r infringingreproducti<strong>on</strong>s, public performances, public distributi<strong>on</strong>s, public displays, digital performances ofsound recordings, and/or importati<strong>on</strong>s to occur when <strong>the</strong> user reaches that site and <strong>the</strong> infringingmaterial is downloaded, imported and/or performed or displayed to <strong>the</strong> linking user. Even ifmaterial <strong>on</strong> <strong>the</strong> destinati<strong>on</strong> site is not infringing of its own right, <strong>the</strong> reproducti<strong>on</strong>s, distributi<strong>on</strong>s,and displays that occur as a result of <strong>the</strong> out link may not be authorized, since <strong>the</strong> out link mayhave been established (as is generally <strong>the</strong> case) without <strong>the</strong> explicit permissi<strong>on</strong> of <strong>the</strong> owner ofmaterial <strong>on</strong> <strong>the</strong> destinati<strong>on</strong> site. Under <strong>the</strong> WIPO treaties, <strong>the</strong> result of clicking <strong>on</strong> <strong>the</strong> out linkmay be to generate an unauthorized access and transmissi<strong>on</strong> of <strong>the</strong> destinati<strong>on</strong> material. Or <strong>the</strong>out link itself may be c<strong>on</strong>sidered to be an unauthorized “making available to <strong>the</strong> public” of <strong>the</strong>material <strong>on</strong> <strong>the</strong> destinati<strong>on</strong> site – <strong>the</strong> owner of <strong>the</strong> destinati<strong>on</strong> site may wish to retain completec<strong>on</strong>trol of how and when informati<strong>on</strong> <strong>on</strong> its site is presented to <strong>the</strong> public.It is unclear whe<strong>the</strong>r an out link might also be c<strong>on</strong>sidered <strong>the</strong> creati<strong>on</strong> of an unauthorizedderivative work. Viewed in <strong>on</strong>e way, an out link could be c<strong>on</strong>sidered nothing more than areference to ano<strong>the</strong>r work, much like a citati<strong>on</strong> in a law review article, that should not be2087 I. Trotter Hardy, “Computer RAM ‘Copies:” Hit or Myth? Historical Perspectives <strong>on</strong> Caching As a Microcosmof Current <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> C<strong>on</strong>cerns,” 22 U. Dayt<strong>on</strong> L. Rev. 423, 449 (1997). For example, “[a]n individual at <strong>the</strong>Massachusetts Institute of Technology for a while kept an inline 7ink to <strong>the</strong> ‘Dilbert’ carto<strong>on</strong> of <strong>the</strong> day. Thecarto<strong>on</strong> appears <strong>on</strong> copyright owner United Media’s site, www.unitedmedia.com/comics/dilbert/, but tobrowser’s of <strong>the</strong> individual’s site, <strong>the</strong> carto<strong>on</strong> appeared to be residing ‘<strong>the</strong>re.’ United Media sent <strong>the</strong> individual,Dan Wallach, a ‘cease and desist’ letter, after which Wallach ceased and desisted <strong>the</strong> in-line linking.” Id. at 39n.82.2088 “Frame” technology is a page presentati<strong>on</strong> capability available in both <strong>the</strong> Netscape Navigator and <strong>the</strong>Microsoft <strong>Internet</strong> Explorer browsers that enables <strong>the</strong> display of multiple, independently scrollable panels <strong>on</strong> asingle screen. Frames may c<strong>on</strong>tain many types of elements, including text, hypertext, graphics, scrollableregi<strong>on</strong>s, and o<strong>the</strong>r frames.- 453 -


c<strong>on</strong>sidered a derivative work. One could argue that <strong>the</strong> material <strong>on</strong> <strong>the</strong> linked site is nei<strong>the</strong>raltered by <strong>the</strong> link nor “incorporated” into <strong>the</strong> linking site, but is seen in its original form when<strong>the</strong> user arrives <strong>the</strong>re as a result of <strong>the</strong> link.Viewed a different way, <strong>on</strong>e could treat a site as a virtual collective work comprised ofall material available to be viewed by <strong>the</strong> user in <strong>the</strong> course of browsing through <strong>the</strong> site. Linkscause an “incorporati<strong>on</strong>” – at least in a virtual sense – of <strong>the</strong> linked material into this collectivework, <strong>the</strong>reby in some sense creating a derivative work. If <strong>the</strong> linked site material enhances <strong>the</strong>value of <strong>the</strong> linking site, <strong>the</strong> linked site owner might argue that <strong>the</strong> linking site is “based up<strong>on</strong>”<strong>the</strong> linked site and <strong>the</strong>refore c<strong>on</strong>stitutes a derivative work. 2089The fair use or implied license doctrine may apply to many out links, because it is nodoubt <strong>the</strong> case that many site owners will want <strong>the</strong>ir material disseminated as widely as possible,and references in to <strong>the</strong> site through links from o<strong>the</strong>r sites will be c<strong>on</strong>sidered desirable.However, in some instances <strong>the</strong> linked site owner may argue that out links cause harm, and suchharm should defeat a fair use or implied license defense. For example, n<strong>on</strong>c<strong>on</strong>sensual links mayresult in burdensome amounts of traffic <strong>on</strong> <strong>the</strong> linked site from users <strong>the</strong> linked site is nottargeting. The owner of <strong>the</strong> linked site could argue that such unwanted traffic prevents <strong>the</strong>owner from distributing copyrighted material <strong>on</strong> its site to its desired audience, <strong>the</strong>reby harming<strong>the</strong> potential market for its material. Alternatively, if <strong>the</strong> linking site is undesirable for somereas<strong>on</strong> in <strong>the</strong> eyes of <strong>the</strong> linked site, <strong>the</strong> linked site might allege <strong>the</strong> linking diminishes <strong>the</strong>commercial value of its copyrighted material at <strong>the</strong> linked site. This might be <strong>the</strong> case, forexample, if a site distributing pornographic material were to link to a religious site distributingreligious material. 2090In additi<strong>on</strong> to <strong>the</strong> issues of direct infringement discussed above, if a linked site c<strong>on</strong>tainsinfringing material, <strong>the</strong> link may give rise to c<strong>on</strong>tributory infringement <strong>on</strong> <strong>the</strong> part of <strong>the</strong> linkingsite, particularly if <strong>the</strong> linking site is promoting <strong>the</strong> copying, transmissi<strong>on</strong>, public display orpublic performance of material at <strong>the</strong> linked site. As noted in <strong>the</strong> previous Secti<strong>on</strong>, <strong>the</strong> SPAinstituted a complaint against an OSP for c<strong>on</strong>tributory infringement based in part <strong>on</strong> <strong>the</strong>provisi<strong>on</strong> of links to <strong>Internet</strong> sites where unauthorized copies of <strong>the</strong> plaintiffs’ software could be2089 “A ‘derivative work’ is a work based up<strong>on</strong> <strong>on</strong>e or more preexisting works, such as a translati<strong>on</strong>, musicalarrangement, dramatizati<strong>on</strong>, ficti<strong>on</strong>alizati<strong>on</strong>, moti<strong>on</strong> picture versi<strong>on</strong>, sound recording, art reproducti<strong>on</strong>,abridgment, c<strong>on</strong>densati<strong>on</strong>, or any o<strong>the</strong>r form in which a work may be recast, transformed, or adapted.” 17U.S.C. § 101.2090 Linking also raises a number of trademark issues. If <strong>the</strong> link c<strong>on</strong>sists of <strong>the</strong> linked site’s company name,trademark or logo, <strong>the</strong>re is a danger of c<strong>on</strong>fusing site visitors about <strong>the</strong> source, affiliati<strong>on</strong> or sp<strong>on</strong>sorship ofei<strong>the</strong>r <strong>the</strong> linking or <strong>the</strong> linked company’s goods or services. The language surrounding a link may also implyan endorsement by <strong>the</strong> linked company. For example, a list of links to “our many satisfied customers” states anendorsement by those customers of <strong>the</strong> linking site owner’s activities. From <strong>the</strong> opposite end, a linking siteshould carefully c<strong>on</strong>sider any explicit or implied endorsement it makes of <strong>the</strong> linked site’s goods or servicesover which it has no c<strong>on</strong>trol. Linking to a site that c<strong>on</strong>tains defamatory material might make <strong>the</strong> linking entityitself liable as a “re-publisher” of <strong>the</strong> defamatory material by pointing users to <strong>the</strong> material. See Kopitzke,“Think Links: Web-Page Owners Should C<strong>on</strong>sider Legal C<strong>on</strong>sequences of Hypertext Links to O<strong>the</strong>rs’ Sites,”San Francisco Daily Journal (Dec. 20, 1996), at 5.- 454 -


found. Linking to a site c<strong>on</strong>taining infringing material may also give rise to vicarious liability, if<strong>the</strong> linking site derives financial benefit from <strong>the</strong> link.As discussed in Secti<strong>on</strong> III.C.5(b) above, <strong>the</strong> DMCA provides a safe harbor under certainc<strong>on</strong>diti<strong>on</strong>s to OSPs who set up out links to infringing material without knowledge of <strong>the</strong>infringement.Inline links may provide an even more direct basis for legal liability than out links. Aninline link causes a reproducti<strong>on</strong> of <strong>the</strong> linked material to be “pulled in” to <strong>the</strong> linking site, and<strong>the</strong>refore may cause an infringement of <strong>the</strong> right of reproducti<strong>on</strong>, display, or performance, ormay c<strong>on</strong>stitute <strong>the</strong> creati<strong>on</strong> of an unauthorized derivative work, just as if material had beenclipped from a printed source and placed in <strong>on</strong>e’s own material. An inline link may also causean infringing access or transmissi<strong>on</strong> of copyrighted material under <strong>the</strong> WIPO treaties.Although bey<strong>on</strong>d <strong>the</strong> scope of this paper, both out links and inline links may raise issuesof trademark infringement as well as copyright infringement. The trademarks of <strong>the</strong> linked siteare often used as an ic<strong>on</strong> <strong>on</strong> which <strong>the</strong> user may click to reach <strong>the</strong> linked site, and <strong>the</strong> trademarkowner may argue that such use c<strong>on</strong>stitutes an infringement. In additi<strong>on</strong>, both out links and inlinelinks may give rise to allegati<strong>on</strong>s of false implicati<strong>on</strong>s of sp<strong>on</strong>sorship or endorsement of <strong>the</strong>linking site by <strong>the</strong> company affiliated with <strong>the</strong> linked site or material, or of c<strong>on</strong>fusi<strong>on</strong> as tosource of <strong>the</strong> linked material.There have been a number of cases challenging linking and framing <strong>on</strong> copyrightgrounds: 20911. The Shetland Times CaseA recent case out of Scotland illustrates <strong>on</strong>e type of harm that a linked site ownerperceived to result from links to its site. In The Shetland Times Co., Ltd. v. Wills, 2092 <strong>the</strong>plaintiff, The Shetland Times (“Times”), maintained a website c<strong>on</strong>taining copies of articles thatappeared in <strong>the</strong> printed versi<strong>on</strong> of its newspaper. Users visiting <strong>the</strong> site were initially presentedwith a “fr<strong>on</strong>t page” c<strong>on</strong>taining headlines. Clicking <strong>on</strong> a headline linked <strong>the</strong> user to <strong>the</strong> full textof <strong>the</strong> article. The Times planned to sell advertising space <strong>on</strong> <strong>the</strong> fr<strong>on</strong>t page.The defendant, The Shetland New (“News”), also maintained a website. News tookverbatim <strong>the</strong> headlines from Times’ site and placed <strong>the</strong>m <strong>on</strong> News’ Web page to allow users atNews’ site to link directly to <strong>the</strong> full text of Times’ articles, without having to first view Times’fr<strong>on</strong>t page. This bypassing of Times’ fr<strong>on</strong>t page obviously caused harm to Times’ ability to selladvertising <strong>on</strong> <strong>the</strong> fr<strong>on</strong>t page, since those readers of Times’ articles who arrived at <strong>the</strong> articles2091 In additi<strong>on</strong> to <strong>the</strong> United States cases discussed in text, in Jan. 2001, an <strong>on</strong>line European recruitment company,StepSt<strong>on</strong>e, obtained an injuncti<strong>on</strong> in Germany against OFiR, a Danish media group, preventing OFiR fromdeep linking (bypassing its home pages) to StepSt<strong>on</strong>e’s web site. The injuncti<strong>on</strong> was based <strong>on</strong> new Europeanlaws <strong>on</strong> database and copyright protecti<strong>on</strong>. Jean Eaglesham, “Recruiter Bans Rival’s Links,” available as ofJan. 18, 2001 at http://news.ft.com/ft/gx.cgi/ftc?pagename=View&c=Article&cid=FT3YQ8AC2IC.2092 Scotland Court of Sessi<strong>on</strong>, Oct. 24, 1996.- 455 -


through links from News’ site would never see <strong>the</strong> ads. Times sued News in <strong>the</strong> Scotland Courtof Sessi<strong>on</strong>s, alleging that News’ copying of Times’ headlines c<strong>on</strong>stituted copyright infringement.The court issued an “interim edict” (a temporary order) pending a full hearing, ruling that<strong>the</strong> headlines could be c<strong>on</strong>sidered copyrightable literary works. The court rejected <strong>the</strong>defendant’s argument that <strong>the</strong> headlines were not <strong>the</strong> product of sufficient skill or effort, findingthat because many of <strong>the</strong> headlines c<strong>on</strong>sisted of eight or so words that imparted informati<strong>on</strong>,copying of <strong>the</strong> headlines might at least in some instances c<strong>on</strong>stitute copyright infringement.The parties subsequently settled <strong>the</strong>ir dispute by agreeing that News would be permittedto link to stories <strong>on</strong> Times’ website by means of headlines <strong>on</strong>ly in <strong>the</strong> following manner: eachlink to any individual story would be acknowledged by <strong>the</strong> legend “A Shetland Times Story”appearing underneath each headline and of <strong>the</strong> same or similar size as <strong>the</strong> headline; adjacent toany such headline or headlines <strong>the</strong>re would appear a butt<strong>on</strong> showing legibly <strong>the</strong> Times mas<strong>the</strong>adlogo; and <strong>the</strong> legend and <strong>the</strong> butt<strong>on</strong> would each be hypertext links to <strong>the</strong> Times <strong>on</strong>line headlinepage.Under United States law, in most instances headlines will probably not be individuallycopyrightable under <strong>the</strong> “words and short phrases” doctrine, 2093 which holds that individualwords and short phrases such as titles are not copyrightable, although a collecti<strong>on</strong> of headlinesmight be copyrightable as a compilati<strong>on</strong>. Thus, News’ verbatim copying of a collecti<strong>on</strong> ofTimes’ headlines from a single Times newspaper as a basis for News’ links to <strong>the</strong> Times websitemight also c<strong>on</strong>stitute an infringement under United States copyright law. If Times’ suit had beenbrought in <strong>the</strong> United States, News would no doubt argue that its use of <strong>the</strong> headlines was a fairuse as part of news reporting. 2094 Times would no doubt argue in resp<strong>on</strong>se that <strong>the</strong> commercialharm to its advertising revenues from its headlines <strong>on</strong> its own fr<strong>on</strong>t page should defeat News’fair use argument. Although it is unclear how such a case would be decided under United Statesfair use law, <strong>the</strong> case is a good illustrati<strong>on</strong> of <strong>the</strong> copyright issues that may arise out of <strong>the</strong> act oflinking.2. The Total News CaseIn February of 1997, a number of news service providers (The Washingt<strong>on</strong> Post, CableNews Network, Times Mirror, Dow J<strong>on</strong>es and Reuters New Media) commenced a suit againstTotal News, Inc. (“Total News”) and o<strong>the</strong>r defendants who were ei<strong>the</strong>r providing website design2093 See, e.g.,Hutchins v. Zoll Medical Corp., 492 F.3d 1377 (Fed. Cir. 2007) (copyright does not protect individualwords and “fragmentary” phrases when removed from <strong>the</strong>ir form of presentati<strong>on</strong> and compilati<strong>on</strong>); Dobs<strong>on</strong> v.NBA Properties, Inc., 1999 Copyr. L. Dec. 27,891 (S.D.N.Y. 1999) (phrase “Chicago Bulls RepeatThreepeat” was not protectable under <strong>the</strong> “words and short phrases doctrine” embodied in 37 C.F.R. §202.1(a)); Acuff-Rose Music, Inc. v. Jostens, Inc., 988 F. Supp 289 (S.D.N.Y. 1997) (phrase “You’ve got tostand for something or you’ll fall for anything” was an unprotectable cliché); Apple Computer, Inc. v.Microsoft Corp., 799 F. Supp. 1006 (N.D. Cal. 1992).2094 “Notwithstanding <strong>the</strong> provisi<strong>on</strong>s of secti<strong>on</strong>s 106 and 106A, <strong>the</strong> fair use of a copyrighted work, including suchuse by reproducti<strong>on</strong> in copies or ph<strong>on</strong>orecords or by any o<strong>the</strong>r means specified by that secti<strong>on</strong>, for purposessuch as … news reporting … is not an infringement of copyright.” 17 U.S.C. § 107.- 456 -


and programming services to Total News or were principals of Total News. The case was <strong>the</strong>first to challenge framing as a copyright infringement.The Total News website was a “para-site,” designed to make over 1200 news sourcesfrom all over <strong>the</strong> world available at a single site. The Total News home page frame c<strong>on</strong>sisted of<strong>the</strong> totalnews.com URL at <strong>the</strong> top, a column of rectangular ic<strong>on</strong>s with <strong>the</strong> trademarked names ofseveral of <strong>the</strong> plaintiffs running down <strong>the</strong> left margin, and advertising sold by <strong>the</strong> defendants at<strong>the</strong> bottom. At <strong>the</strong> right center porti<strong>on</strong> of <strong>the</strong> screen was a news window. When <strong>the</strong> user firstlogged <strong>on</strong>to <strong>the</strong> Total News website, this window was occupied by a “compass” style array ofhyperlinks to several of <strong>the</strong> plaintiffs’ websites. Clicking <strong>on</strong> <strong>the</strong> links would cause material from<strong>the</strong> plaintiffs’ websites to be displayed in <strong>the</strong> news window, but still within <strong>the</strong> Total News“frame.” Thus, for example, if a user clicked <strong>on</strong> <strong>the</strong> “Washingt<strong>on</strong> Post” link, <strong>the</strong> news windowwithin <strong>the</strong> Total News frame would fill with an electr<strong>on</strong>ic versi<strong>on</strong> of The Washingt<strong>on</strong> Postnewspaper linked in from The Washingt<strong>on</strong> Post’s own website. However, <strong>the</strong> totalnews.comURL would remain in place at <strong>the</strong> top of <strong>the</strong> frame and advertising sold by Total News wouldremain in place at <strong>the</strong> bottom of <strong>the</strong> frame.Because <strong>the</strong> news window of <strong>the</strong> Total News frame was smaller than full screen insize, 2095 <strong>the</strong> effect of <strong>the</strong> framing by <strong>the</strong> defendants was to display <strong>on</strong>ly a porti<strong>on</strong> of <strong>the</strong> originalscreens of material from <strong>the</strong> linked sites at any given time, and <strong>the</strong> user was forced to scroll <strong>the</strong>news window horiz<strong>on</strong>tally or vertically to see all of <strong>the</strong> original material from <strong>the</strong> linked sites.Thus, advertisements c<strong>on</strong>tained <strong>on</strong> <strong>the</strong> original pages of <strong>the</strong> linked sites were reduced in size,and in some cases were totally obscured by <strong>the</strong> Total News frame. At <strong>the</strong> same time, <strong>the</strong> userwas c<strong>on</strong>tinuously exposed to <strong>the</strong> advertising c<strong>on</strong>tained within <strong>the</strong> Total News frame:Absent <strong>the</strong> “framing” by Defendants described above, some<strong>on</strong>e wishing to view<strong>the</strong> c<strong>on</strong>tent of Plaintiffs’ sites would, up<strong>on</strong> accessing those sites, see <strong>on</strong>lyPlaintiffs’ material as Plaintiffs intend for it to be seen. Use of Defendants’website thus results in c<strong>on</strong>tinuous, prol<strong>on</strong>ged exposure to <strong>the</strong> logo, URL andadvertising of totalnews.com. Defendants have promoted totalnews.com toadvertisers and <strong>the</strong> public based entirely <strong>on</strong> Defendants’ ability to republish <strong>the</strong>c<strong>on</strong>tent of Plaintiffs’ sites within <strong>the</strong> totalnews frames, including framesc<strong>on</strong>taining advertising. 2096The plaintiffs alleged that Total News infringed <strong>the</strong> copyrights in various materials from<strong>the</strong> plaintiffs’ websites by “republishing” such material through <strong>the</strong> Total News site. Thecomplaint did not state which specific rights of <strong>the</strong> copyright holders were infringed, referringinstead merely to <strong>the</strong> plaintiff’s “exclusive rights under 17 U.S.C. § 106.” 2097 The plaintiffs alsoalleged claims for misappropriati<strong>on</strong> of news, federal trademark diluti<strong>on</strong>, federal and state2095 The framed used by Total News to display its directory butt<strong>on</strong>s took up slightly more than 15% of <strong>the</strong> pagewidth. Gahtan, “Inappropriate Use of Frames May C<strong>on</strong>stitute Infringement,” Cyberspace Lawyer, Apr. 1997,at 2, 2.2096 Complaint in The Washingt<strong>on</strong> Post Co. v. Total News, Inc., 97 Civ. 1190 (S.D.N.Y. Feb. 20, 1997) at 35.2097 Id. 72.- 457 -


trademark infringement, unfair competiti<strong>on</strong>, and tortious interference with c<strong>on</strong>tractual relati<strong>on</strong>swith <strong>the</strong>ir advertisers.At least <strong>on</strong>e of <strong>the</strong> plaintiffs, CNN, attempted to counteract <strong>the</strong> deleterious effects of <strong>the</strong>framing by employing special code in its Web page that checked to see if <strong>the</strong> c<strong>on</strong>tent was beingviewed from within a frame, and, if so, caused <strong>the</strong> unauthorized composite page to be replacedwith <strong>the</strong> CNN page <strong>on</strong> <strong>the</strong> entire screen. This technical soluti<strong>on</strong> had several problems, however.It took up to a minute or more to take effect, and a pop-up window inviting users to return to <strong>the</strong>Total News site was still able to appear superimposed <strong>on</strong> <strong>the</strong> CNN website. 2098In June of 1997, <strong>the</strong> parties settled <strong>the</strong> case pursuant to a stipulated order of settlementand dismissal. 2099 Under <strong>the</strong> settlement, Total News agreed to stop framing <strong>the</strong> plaintiffs’websites. However, <strong>the</strong> settlement permitted Total News to maintain out links from <strong>the</strong> TotalNews website to any of <strong>the</strong> plaintiffs’ websites, provided that <strong>the</strong> links were <strong>on</strong>ly via hyperlinksc<strong>on</strong>sisting of <strong>the</strong> names of <strong>the</strong> linked sites in plain text; Total News made no use, as hyperlinksor o<strong>the</strong>rwise, of any of <strong>the</strong> plaintiffs’ proprietary logos or o<strong>the</strong>r distinctive graphics, video oraudio material; and <strong>the</strong> links were not likely to imply affiliati<strong>on</strong>, endorsement or sp<strong>on</strong>sorship byany plaintiff or o<strong>the</strong>rwise cause c<strong>on</strong>fusi<strong>on</strong>, diluti<strong>on</strong> of <strong>the</strong> plaintiff’s marks, or o<strong>the</strong>r violati<strong>on</strong>s ofstate or federal law.3. The Seattle Sidewalk CaseIn April of 1997, Ticketmaster Corporati<strong>on</strong> brought an acti<strong>on</strong> in federal district courtagainst Microsoft Corporati<strong>on</strong> based <strong>on</strong> links from Microsoft’s “Seattle Sidewalk” website toTicketmaster’s website. In February of 1998, Ticketmaster filed a Sec<strong>on</strong>d Amended Complaint,which asserted claims for copyright and trademark infringement, as well as for unfaircompetiti<strong>on</strong> based <strong>on</strong> various comm<strong>on</strong> law and state law <strong>the</strong>ories.Ticketmaster maintained a website (www.ticketmaster.com) through which it sold andmarketed tickets to various entertainment events. The “Seattle Sidewalk” site, <strong>on</strong>e of a numberof city guides maintained by Microsoft <strong>on</strong> The Microsoft Network, offered a guide toentertainment and restaurants available in <strong>the</strong> Seattle area. Microsoft placed links <strong>on</strong> <strong>the</strong> SeattleSidewalk to <strong>the</strong> Ticketmaster site so that users of <strong>the</strong> Seattle Sidewalk could purchase tickets toevents of interest <strong>on</strong>line through Ticketmaster. Negotiati<strong>on</strong>s between Microsoft andTicketmaster for an agreement allowing Microsoft to profit from linkage to and associati<strong>on</strong> withTicketmaster’s website failed, and Microsoft established <strong>the</strong> links – which in several instancesbypassed <strong>the</strong> home page of <strong>the</strong> Ticketmaster site – without permissi<strong>on</strong> from Ticketmaster.Ticketmaster sued Microsoft in federal court. With respect to its trademark claims,Ticketmaster asserted that <strong>the</strong> unauthorized links wr<strong>on</strong>gfully appropriated, misused, and dilutedTicketmaster’s name and trademarks. In particular, Ticketmaster noted in its complaint that ithad a business relati<strong>on</strong>ship with MasterCard by which Ticketmaster had agreed to give2098 Gahtan, supra note 2095, at 4.2099 A copy of <strong>the</strong> Stipulati<strong>on</strong> and Order of Settlement and Dismissal is available atwww.callaw.com/opini<strong>on</strong>s/hotdocs/totalnew.html.- 458 -


MasterCard prominence over any o<strong>the</strong>r credit cards in any advertising. Ticketmaster objected toMicrosoft’s use of Ticketmaster’s name in c<strong>on</strong>necti<strong>on</strong> with MasterCard without givingMasterCard prominence. Ticketmaster also asserted that its name and trademark had beenburied by Microsoft in metatag code at Microsoft’s site in order to attract to Microsoft’sSidewalk websites <strong>Internet</strong> search engines and <strong>Internet</strong> users who were seeking informati<strong>on</strong>about tickets sold by and available through Ticketmaster. Ticketmaster alleged that this use ofits name and trademark in metatags improperly fea<strong>the</strong>red Microsoft’s own nest at Ticketmaster’sexpense.Ticketmaster also asserted claims of copyright infringement, based <strong>on</strong> <strong>the</strong> allegati<strong>on</strong>s that(i) in creating links to <strong>the</strong> Ticketmaster site, Microsoft repeatedly viewed and thus copied <strong>on</strong>toits own computers <strong>the</strong> copyrighted c<strong>on</strong>tents of Ticketmaster’s website, and (ii) in <strong>the</strong> operati<strong>on</strong>of <strong>the</strong> links, Microsoft was reproducing, publicly distributing and displaying without permissi<strong>on</strong>Ticketmaster’s copyrighted website material.In Microsoft’s answer to Ticketmaster’s complaint, Microsoft alleged that Ticketmastercould not complain about Microsoft’s link to Ticketmaster’s home page because Ticketmasterknew when it set up its website that owners of o<strong>the</strong>r Web pages would create such links.Microsoft noted that when an event required tickets, Microsoft routinely provided informati<strong>on</strong>about how to obtain <strong>the</strong>m, including prices, teleph<strong>on</strong>e numbers and, where appropriate, hypertextlinks to relevant Web pages. Microsoft alleged that such informati<strong>on</strong> was freely available to <strong>the</strong>public and was not proprietary to Ticketmaster. Microsoft asserted numerous defenses,including (i) that Ticketmaster, when it chose to set up Web pages, assumed <strong>the</strong> risk that o<strong>the</strong>rswould use its name and URLs; (ii) that Ticketmaster was estopped from complaining aboutMicrosoft’s link because Ticketmaster encouraged users to seek out its website and refer o<strong>the</strong>rsto <strong>the</strong> site; and (iii) that Microsoft’s presentati<strong>on</strong> of informati<strong>on</strong> about Ticketmaster <strong>on</strong> its SeattleSidewalk site was commercial speech protected by <strong>the</strong> First Amendment. 2100Microsoft and Ticketmaster ultimately reached a settlement in <strong>the</strong> lawsuit, pursuant towhich Microsoft was permitted to link to <strong>the</strong> Ticketmaster site, but not through links thatbypassed Ticketmaster’s home page.4. The Futured<strong>on</strong>tics CaseIn Sept. of 1997, Futured<strong>on</strong>tics, Inc., owner of a website relating to its dental referralservice, filed a complaint against a defendant that was framing material from Futured<strong>on</strong>tics’website in <strong>the</strong> defendant’s website. 2101 The frame displaying Futured<strong>on</strong>tics’ website materialincluded <strong>the</strong> defendant’s logo, informati<strong>on</strong> <strong>on</strong> <strong>the</strong> defendant, and links to <strong>the</strong> defendant’s o<strong>the</strong>rweb pages. Futured<strong>on</strong>tics claimed that such framing c<strong>on</strong>stituted <strong>the</strong> creati<strong>on</strong> of an infringingderivative work. The defendant moved to dismiss <strong>the</strong> complaint for failure to state a claim,arguing that its frame should be viewed as merely a “lens” which enabled <strong>Internet</strong> users to view<strong>the</strong> informati<strong>on</strong> that Futured<strong>on</strong>tics itself placed <strong>on</strong> <strong>the</strong> <strong>Internet</strong>. The court denied <strong>the</strong> defendant’s2100 “Microsoft Answers Ticketmaster’s Charges of Electr<strong>on</strong>ic Piracy,” Andrews Computer & Online IndustryLitigati<strong>on</strong> Reporter (July 1, 1997) at 24421.2101 Futured<strong>on</strong>tics, Inc. v. Applied Anagramatics, Inc., 45 U.S.P.Q.2d 2005 (C.D. Cal. 1998).- 459 -


moti<strong>on</strong>, ruling that existing authority did not resolve <strong>the</strong> legal issue, and Futured<strong>on</strong>tics’complaint <strong>the</strong>refore sufficiently alleged a copyright infringement claim. 2102 Interestingly,however, <strong>the</strong> court had previously denied Futured<strong>on</strong>tics’ moti<strong>on</strong> for a preliminary injuncti<strong>on</strong>,ruling that Futured<strong>on</strong>tics had failed to establish a probability of success. 2103On July 23, 1998, in an unpublished opini<strong>on</strong>, <strong>the</strong> Ninth Circuit affirmed <strong>the</strong> districtcourt’s denial of <strong>the</strong> preliminary injuncti<strong>on</strong>. 2104 The Ninth Circuit found that Futured<strong>on</strong>tics hadpresented no evidence whatsoever of tangible, let al<strong>on</strong>e irreparable, harm from <strong>the</strong> defendant’sframed link to its site. In additi<strong>on</strong>, <strong>the</strong> Ninth Circuit ruled that “Futured<strong>on</strong>tics’ claim, that <strong>the</strong>AAI framed link ‘falsely implies that AAI – not Futured<strong>on</strong>tics – is resp<strong>on</strong>sible for <strong>the</strong> success ofFutured<strong>on</strong>tics’s dental referral service’ even if true, is not tied to any tangible loss of business orcustomer goodwill.” 21055. The Bernstein CaseIn Sept. of 1998, a California judge dismissed without comment a copyright infringementlawsuit, Bernstein v. J.C. Penney, Inc., 2106 in which <strong>the</strong> plaintiff, a professi<strong>on</strong>al photographer,sought to hold liable several defendants who maintained links <strong>on</strong> <strong>the</strong>ir websites that eventuallyled to a Swedish university website where two allegedly infringing photographs of actressElizabeth Taylor owned by <strong>the</strong> plaintiff were displayed. Specifically, pers<strong>on</strong>s visiting J.C.Penney’s website could, through a chain of no less than six links, reach <strong>the</strong> photographs <strong>on</strong> <strong>the</strong>Swedish website. 2107 The plaintiff Bernstein insisted that J.C. Penney deliberately designed itswebsite so that visitors would be able to see <strong>the</strong> two photographs of Elizabeth Taylor. Bernsteinalleged that <strong>the</strong> defendants had previously licensed <strong>on</strong>e of <strong>the</strong> photographs, suggesting that <strong>the</strong>defendants were trying to benefit from <strong>the</strong> photographs without paying for <strong>the</strong>m. 2108 Thedefendants labeled <strong>the</strong> suit as based <strong>on</strong> a bizarre and unprecedented <strong>the</strong>ory that, if accepted,would destroy <strong>the</strong> <strong>Internet</strong> as a means of worldwide communicati<strong>on</strong>, and <strong>the</strong> judge apparentlyagreed. 21092102 Id. at 2010.2103 Id. at 2006.2104 Futured<strong>on</strong>tics, Inc. v. Applied Anagramatics, Inc., 1998 U.S. App. LEXIS 17012 (9th Cir. July 23, 1998).2105 Id. at *3.2106 50 U.S.P.Q.2d 1063 (C.D. Cal. 1998).2107 Id. at 1063; “Judge Dismisses <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Claims Based <strong>on</strong> Linking,” Andrews Computer & Online IndustryReporter (Oct. 6, 1998) at 3, 3. Defendant Arden, manufacturer of a perfume called “Passi<strong>on</strong>” that wasendorsed by Taylor, recited <strong>the</strong> chain of links that a user would need to follow from Penny’s site to reach <strong>the</strong>allegedly infringing photographs: from Penney’s main home page to (1) “Elizabeth Taylor’s Passi<strong>on</strong>,” a part of<strong>the</strong> Penney’s site, to (2) “Biography,” a part of <strong>the</strong> “Passi<strong>on</strong>” site c<strong>on</strong>taining informati<strong>on</strong> about Taylor’s life, to(3) “work <strong>on</strong> screen,” which took <strong>the</strong> user to (4) an <strong>Internet</strong> Movie Database Ltd. (IMDB) site, a completelyseparate site with no c<strong>on</strong>necti<strong>on</strong> to Penney’s, to (5) “FTP,” a link <strong>on</strong> <strong>the</strong> IMDB site that took <strong>the</strong> user to <strong>the</strong>Swedish site, from where <strong>the</strong> user could (6) access <strong>the</strong> infringing photographs. Id.2108 Id.2109 The defendants argued that <strong>the</strong> plaintiff’s <strong>the</strong>ory of infringement by multiple linking would have a devastatingimpact <strong>on</strong> <strong>the</strong> <strong>Internet</strong> and argued that <strong>the</strong> claim should be dismissed for three reas<strong>on</strong>s: “(1) a company whose- 460 -


6. The Intellectual Reserve CaseIn Intellectual Reserve, Inc. v. Utah Lighthouse Ministry, Inc., 2110 <strong>the</strong> plaintiff was <strong>the</strong>owner of <strong>the</strong> copyright in a Morm<strong>on</strong> Church work titled <strong>the</strong> “Church Handbook of Instructi<strong>on</strong>s”(<strong>the</strong> “Handbook”). After <strong>the</strong> defendants were ordered to remove copies of <strong>the</strong> Handbook from<strong>the</strong>ir website, <strong>the</strong> defendants posted a notice <strong>on</strong> <strong>the</strong>ir website stating that <strong>the</strong> Handbook was<strong>on</strong>line, and posted three links to o<strong>the</strong>r website addresses where <strong>the</strong> Handbook could be found.The plaintiffs sought to hold <strong>the</strong> defendants liable for inducement of infringement andc<strong>on</strong>tributory infringement.The court ruled that <strong>the</strong> defendants were not liable for inducement of infringement,because <strong>the</strong>re was no evidence that <strong>the</strong> defendants had any direct relati<strong>on</strong>ship with <strong>the</strong> o<strong>the</strong>rwebsites <strong>on</strong> which <strong>the</strong> Handbook was available, nor that <strong>the</strong> defendants had induced <strong>the</strong>operators of those websites to post <strong>the</strong> Handbook. 2111The court c<strong>on</strong>cluded, however, that <strong>the</strong> defendants could be liable for c<strong>on</strong>tributoryinfringement. Turning first to whe<strong>the</strong>r <strong>the</strong>re was any direct infringement to which <strong>the</strong> defendantscould be c<strong>on</strong>tributing, <strong>the</strong> court c<strong>on</strong>cluded that when visitors to <strong>the</strong> sites <strong>on</strong> which <strong>the</strong> Handbookwas posted displayed <strong>the</strong> Handbook, an infringing copy of <strong>the</strong> Handbook was made in <strong>the</strong> users’RAM. 2112 The court <strong>the</strong>n c<strong>on</strong>cluded that <strong>the</strong> defendants were c<strong>on</strong>tributorily liable for suchinfringement because <strong>the</strong>y had actively encouraged it, 2113 based <strong>on</strong> <strong>the</strong> following facts:The defendants posted <strong>on</strong> <strong>the</strong>ir website <strong>the</strong> comment “Church Handbook of Instructi<strong>on</strong>sis back <strong>on</strong>line!” and provided three links to websites c<strong>on</strong>taining <strong>the</strong> Handbook.product is merely displayed <strong>on</strong> ano<strong>the</strong>r entity’s website cannot be held liable for any infringement by <strong>the</strong> authorof that website; (2) linking cannot c<strong>on</strong>stitute direct infringement because <strong>the</strong> computer server of <strong>the</strong> linkingwebsite does not copy or o<strong>the</strong>rwise process <strong>the</strong> c<strong>on</strong>tent of <strong>the</strong> linked-to site; and (3) multiple linking cannotc<strong>on</strong>stitute c<strong>on</strong>tributory infringement because (a) <strong>Internet</strong> users viewing of <strong>the</strong> material at issue is not infringingand thus <strong>the</strong>re was no direct infringement in <strong>the</strong> United States to which Arden could c<strong>on</strong>tribute; (b) linking ‘iscapable of substantial n<strong>on</strong>infringing uses’ and thus cannot support a claim for c<strong>on</strong>tributory infringement; and(c) <strong>the</strong> Court cannot infer from <strong>the</strong> facts alleged that [defendants] knew <strong>the</strong> photos had been posted to [<strong>on</strong>e of<strong>the</strong> websites in <strong>the</strong> chain] and multiple linking does not c<strong>on</strong>stitute substantial participati<strong>on</strong> in any infringementwhere <strong>the</strong> linking website does not menti<strong>on</strong> <strong>the</strong> fact that <strong>Internet</strong> users could, by following <strong>the</strong> links, findinginfringing material <strong>on</strong> ano<strong>the</strong>r website.” Bernstein, 50 U.S.P.Q.2d at 1064 (citati<strong>on</strong>s omitted). The courtdismissed <strong>the</strong> complaint without leave to amend without articulating any specific reas<strong>on</strong>s <strong>the</strong>refor. Id.2110 53 U.S.P.Q.2d 1425 (D. Utah 1999).2111 Id. at 1427.2112 Id. at 1428, citing MAI Systems Corp. v. Peak Computer, Inc., 991 F.2d 511, 518 (9th Cir. 1993) and Marobie-Fl., Inc. v. Nati<strong>on</strong>al Ass’n of Fire Equip. Distrib., 983 F. Supp. 1167, 1179 (N.D. Ill. 1997).2113 The court noted that “[l]iability for c<strong>on</strong>tributory infringement is imposed when ‘<strong>on</strong>e who, with knowledge of<strong>the</strong> infringing activity, induces, causes or materially c<strong>on</strong>tributes to <strong>the</strong> infringing c<strong>on</strong>duct of ano<strong>the</strong>r.’”Intellectual Reserve at 1427 (quoting Gershwin Publ’g Corp. v. Columbia Artists Mgt., Inc., 443 F.2d 1159,1162 (2d Cir. 1971)).- 461 -


The defendants posted e-mail suggesting that <strong>the</strong> lawsuit against <strong>the</strong> defendants would beaffected by people logging into <strong>on</strong>e of <strong>the</strong> linked websites and downloading <strong>the</strong> completeHandbook.In resp<strong>on</strong>se to an e-mail stating that <strong>the</strong> sender had unsuccessfully tried to browse a websitec<strong>on</strong>taining <strong>the</strong> Handbook, <strong>the</strong> defendants gave fur<strong>the</strong>r instructi<strong>on</strong> <strong>on</strong> how to browse <strong>the</strong> material.At least <strong>on</strong>e of <strong>the</strong> three linked websites encouraged <strong>the</strong> copying and posting of copies ofallegedly infringing material <strong>on</strong> o<strong>the</strong>r websites. 2114Accordingly, <strong>the</strong> court entered a preliminary injuncti<strong>on</strong> enjoining <strong>the</strong> defendants from,am<strong>on</strong>g o<strong>the</strong>r things, posting <strong>on</strong> <strong>the</strong>ir website <strong>the</strong> addresses of o<strong>the</strong>r websites that <strong>the</strong> defendantsknew, or had reas<strong>on</strong> to know, c<strong>on</strong>tained <strong>the</strong> material alleged to infringe <strong>the</strong> plaintiff’scopyright. 21157. Ticketmaster v. Tickets.comTicketmaster Corporati<strong>on</strong> operated <strong>the</strong> Ticketmaster web site, through which users couldpurchase tickets to various events such as c<strong>on</strong>certs and ball games. On <strong>the</strong> Ticketmaster homepage <strong>the</strong>re were instructi<strong>on</strong>s and a directory to subsequent pages (<strong>on</strong>e per event) c<strong>on</strong>taining ashort descripti<strong>on</strong> of <strong>the</strong> event, date, time, place, and price, and a descripti<strong>on</strong> of how to ordertickets via <strong>the</strong> <strong>Internet</strong>, teleph<strong>on</strong>e, mail, or in pers<strong>on</strong>. The defendant, Tickets.com, operated asomewhat different ticketing service. Although Tickets.com sold some tickets to certain events<strong>on</strong> its own, it provided informati<strong>on</strong> as to where and how tickets that it did not sell could bepurchased and a link that would take users to <strong>the</strong> appropriate ticket seller <strong>on</strong> line. Where <strong>the</strong>exclusive ticket broker was Ticketmaster, Tickets.com would deep link directly to <strong>the</strong> interiorweb page of Ticketmaster (bypassing <strong>the</strong> home page) for <strong>the</strong> particular event in questi<strong>on</strong>, where<strong>the</strong> customer could buy <strong>the</strong> tickets from Ticketmaster. 2116Ticketmaster alleged that Tickets.com committed copyright infringement by copying itsinterior web pages in order to extract <strong>the</strong> basic informati<strong>on</strong> <strong>on</strong> those pages, such as event, place,time, date, and price. (The extracted informati<strong>on</strong> was <strong>the</strong>n placed in Tickets.com’s format <strong>on</strong> itsown interior web pages.) The court denied a moti<strong>on</strong> by Tickets.com to dismiss <strong>the</strong> copyrightinfringement claim, ruling that, although <strong>the</strong> factual data c<strong>on</strong>tained <strong>on</strong> Ticketmasters’ internalpages could not be protected by copyright, <strong>the</strong> allegati<strong>on</strong> of copying of Ticketmasters’ internalweb pages in order to extract that factual data was sufficient to state a valid claim for copyrightinfringement. 2117 The court went <strong>on</strong> to state, however, that hyperlinking by itself did notc<strong>on</strong>stitute copyright infringement:2114 Intellectual Reserve at 1428.2115 Id. at 1429.2116 Ticketmaster Corp. v. Tickets.com Inc., 54 U.S.P.Q.2d 1344, 1345 (C.D. Cal. 2000).2117 Id. at 1345-46. The court granted, however, <strong>the</strong> defendant’s moti<strong>on</strong> to dismiss <strong>the</strong> plaintiff’s breach of c<strong>on</strong>tractclaim, which was based <strong>on</strong> <strong>the</strong> “terms and c<strong>on</strong>diti<strong>on</strong>s” for use of <strong>the</strong> Ticketmasters website. The courtapparently found that <strong>the</strong> terms and c<strong>on</strong>diti<strong>on</strong>s were not enforceable because <strong>the</strong>y did not require clicking to- 462 -


[H]yperlinking does not itself involve a violati<strong>on</strong> of <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act (whateverit may do for o<strong>the</strong>r claims) since no copying is involved. The customer isautomatically transferred to <strong>the</strong> particular genuine web page of <strong>the</strong> originalauthor. There is no decepti<strong>on</strong> in what is happening. This is analogous to using alibrary’s card index to get reference to particular items, albeit faster and moreefficiently. 2118Five m<strong>on</strong>ths later, <strong>the</strong> court issued ano<strong>the</strong>r opini<strong>on</strong> that denied a moti<strong>on</strong> for a preliminaryinjuncti<strong>on</strong> brought by Ticketmaster. With respect to <strong>the</strong> copyright claim, <strong>the</strong> court noted thatTicketmasters’ internal web pages were copied <strong>on</strong>ly temporarily, for 10-15 sec<strong>on</strong>ds, in <strong>the</strong>course of extracting <strong>the</strong> factual informati<strong>on</strong> from those pages, and <strong>the</strong> factual informati<strong>on</strong> was<strong>the</strong>n presented by Tickets.com to its users in a different format from how that informati<strong>on</strong>appeared <strong>on</strong> Ticketmasters’ site. 2119 The court ruled that <strong>the</strong> plaintiff was not entitled to apreliminary injuncti<strong>on</strong> <strong>on</strong> copyright grounds because <strong>the</strong> temporary copying for purposes ofextracting <strong>the</strong> factual informati<strong>on</strong> from Ticketmasters’ internal web pages was likely to be a fairuse. The court analogized to <strong>the</strong> Ninth Circuit’s decisi<strong>on</strong> in S<strong>on</strong>y Computer Entertainment, Inc.v. C<strong>on</strong>nectix Corp., 2120 which <strong>the</strong> district court characterized as holding that copying for reverseengineering to obtain n<strong>on</strong>-protectable informati<strong>on</strong> is permitted by <strong>the</strong> fair use doctrine in certaincircumstances. 2121 The district court observed:Reverse engineering to get at unprotected functi<strong>on</strong>al elements is not <strong>the</strong> sameprocess as used here but <strong>the</strong> analogy seems to apply. The copy is not usedcompetitively. It is destroyed after its limited functi<strong>on</strong> is d<strong>on</strong>e. It is used <strong>on</strong>ly tofacilitate obtaining n<strong>on</strong>-protectable data – here <strong>the</strong> basic factual data. It may notbe <strong>the</strong> <strong>on</strong>ly way of obtaining that data (i.e., a thousand scriveners with pencil andpaper could do <strong>the</strong> job given time), but it is <strong>the</strong> most efficient way, not held to bean impediment in C<strong>on</strong>nectix. 2122The court also rejected <strong>the</strong> plaintiff’s argument that <strong>the</strong> defendant’s copying of <strong>the</strong> URLsof <strong>the</strong> interior pages of <strong>the</strong> Ticketmasters site c<strong>on</strong>stituted infringement. “The court doubts that<strong>the</strong> material is protectable because <strong>the</strong> URL appears to c<strong>on</strong>tain functi<strong>on</strong>al and factual elements<strong>on</strong>ly and not original material.” 2123 Accordingly, <strong>the</strong> court ruled that, because Ticketmaster“agree” to <strong>the</strong>m and were not immediately visible to users: “[T]he terms and c<strong>on</strong>diti<strong>on</strong>s are set forth so that <strong>the</strong>customer needs to scroll down <strong>the</strong> home page to find and read <strong>the</strong>m. Many customers instead are likely toproceed to <strong>the</strong> event page of interest ra<strong>the</strong>r than reading <strong>the</strong> ‘small print.’ It cannot be said that merely putting<strong>the</strong> terms and c<strong>on</strong>diti<strong>on</strong>s in this fashi<strong>on</strong> necessarily creates a c<strong>on</strong>tract with any <strong>on</strong>e using <strong>the</strong> web site. Themoti<strong>on</strong> is granted with leave to amend in case <strong>the</strong>re are facts showing Tickets’ knowledge of <strong>the</strong>m plus factsshowing implied agreement to <strong>the</strong>m.” Id. at 1346.2118 Id. at 1346.2119 Ticketmaster Corp. v. Tickets.com, Inc., 2000 U.S. Dist. LEXIS 12987 (C.D. Cal. Aug. 10, 2000), at *9-10.2120 203 F.3d 596 (9th Cir. 2000).2121 Tickets.com, 2000 U.S. Dist. LEXIS 12987 at *12.2122 Id. at *12-13.2123 Id. at *13.- 463 -


appeared unlikely to prevail <strong>on</strong> its copyright infringement claim, a preliminary injuncti<strong>on</strong> shouldnot issue. 2124After nearly two additi<strong>on</strong>al years of litigati<strong>on</strong>, Tickets.com brought a moti<strong>on</strong> forsummary judgment <strong>on</strong> Ticketmaster’s copyright claims, which <strong>the</strong> court granted. 2125 In grantingsummary judgment, <strong>the</strong> court ruled that <strong>the</strong> spider’s temporary copying of Ticketmaster’s webpages into RAM in order to extract <strong>the</strong> factual informati<strong>on</strong> about events c<strong>on</strong>tained <strong>on</strong> thosepages c<strong>on</strong>stituted a fair use. “In temporarily downloading [Ticketmaster’s] event pages to itsRAM through <strong>the</strong> use of spiders, [Tickets.com] was not exploiting [Ticketmaster’s] creativelabors in any way: its spiders ga<strong>the</strong>red copyrightable and n<strong>on</strong>-copyrightable informati<strong>on</strong> alikebut <strong>the</strong>n immediately discarded <strong>the</strong> copyrighted material. It is unlikely that <strong>the</strong> spiders couldhave been programmed to take <strong>on</strong>ly <strong>the</strong> factual informati<strong>on</strong> from <strong>the</strong> [Ticketmaster] web pageswithout initially downloading <strong>the</strong> entire page.” 2126The court also reaffirmed its earlier ruling <strong>on</strong> Ticketmaster’s preliminary injuncti<strong>on</strong>moti<strong>on</strong> that <strong>the</strong> URLs copied by Tickets.com to allow <strong>the</strong> deep linking were not copyrightable.Ticketmaster c<strong>on</strong>tended that, although <strong>the</strong> URLs were functi<strong>on</strong>al, <strong>the</strong>y should be entitled tocopyright protecti<strong>on</strong> because <strong>the</strong>re were several ways to write <strong>the</strong> URL and, thus, originalauthorship was present. The court rejected this argument. “A URL is simply an address, open to<strong>the</strong> public, like <strong>the</strong> street address of a building, which, if known, can enable <strong>the</strong> user to reach <strong>the</strong>building. There is nothing sufficiently original to make <strong>the</strong> URL a copyrightable item, especially<strong>the</strong> way it is used.” 2127Finally, <strong>the</strong> court ruled that Tickets.com’s deep linking did not cause an infringing publicdisplay of <strong>the</strong> Ticketmaster event pages. The court distinguished <strong>the</strong> Ninth Circuit’s holding inKelly v. Arriba Soft Corp., discussed in Secti<strong>on</strong> II.C.2 above, by noting that in Kelly <strong>the</strong>plaintiff’s images were framed by <strong>the</strong> defendant’s window and thus were surrounded by <strong>the</strong>2124 Id.2125 Ticketmaster Corp. v. Tickets.com, Inc., 2003 U.S. Dist. LEXIS 6483 (C.D. Cal. Mar. 7, 2003). Tickets.comalso sought summary judgment <strong>on</strong> Ticketmaster’s c<strong>on</strong>tract claim, based <strong>on</strong> a notice placed <strong>on</strong> <strong>the</strong> home page of<strong>the</strong> Ticketmaster site stating that any<strong>on</strong>e going bey<strong>on</strong>d that point into <strong>the</strong> interior pages of <strong>the</strong> web site acceptedcertain c<strong>on</strong>diti<strong>on</strong>s, including that all informati<strong>on</strong> obtained from <strong>the</strong> site was for <strong>the</strong> pers<strong>on</strong>al use of <strong>the</strong> user andcould not be used for commercial purposes. The c<strong>on</strong>tract claim had been rejected as a basis for a preliminaryinjuncti<strong>on</strong> in <strong>the</strong> court’s first opini<strong>on</strong> in 2000, because <strong>the</strong> notice was placed at <strong>the</strong> bottom of <strong>the</strong> home page sothat a user without an especially large screen would have to scroll down to read <strong>the</strong> c<strong>on</strong>diti<strong>on</strong>s of use.Subsequently, Ticketmaster moved <strong>the</strong> notice to a prominent place <strong>on</strong> <strong>the</strong> home page with a warning thatproceeding fur<strong>the</strong>r bound <strong>the</strong> user to <strong>the</strong> c<strong>on</strong>diti<strong>on</strong>s of use. Id. at *6-7. In additi<strong>on</strong>, <strong>the</strong> court noted thatTicketmaster had submitted evidence that Tickets.com was in fact fully familiar with <strong>the</strong> c<strong>on</strong>diti<strong>on</strong>sTicketmaster claimed to impose <strong>on</strong> users, including a letter from Ticketmaster to Tickets.com which quoted <strong>the</strong>c<strong>on</strong>diti<strong>on</strong>s, and a reply by Tickets.com stating that it did not accept <strong>the</strong> c<strong>on</strong>diti<strong>on</strong>s. The court deniedTickets.com’s moti<strong>on</strong> for summary judgment <strong>on</strong> <strong>the</strong> c<strong>on</strong>tract <strong>the</strong>ory, noting that <strong>the</strong>re was sufficient evidence todefeat summary judgment <strong>on</strong> <strong>the</strong> c<strong>on</strong>tract <strong>the</strong>ory if knowledge of <strong>the</strong> asserted c<strong>on</strong>diti<strong>on</strong>s of use was had byTickets.com. Id. at *7-8. The court c<strong>on</strong>cluded that “a c<strong>on</strong>tract can be formed by proceeding into <strong>the</strong> interiorweb pages after knowledge (or, in some cases, presumptive knowledge) of <strong>the</strong> c<strong>on</strong>diti<strong>on</strong>s accepted when doingso.” Id. at *9.2126 Id. at *17-18.2127 Id. at *20.- 464 -


defendant web page’s text and advertising. In <strong>the</strong> instant case, whe<strong>the</strong>r or not framing occurreddepended up<strong>on</strong> <strong>the</strong> settings <strong>on</strong> <strong>the</strong> user’s computer, over which Tickets.com had no c<strong>on</strong>trol, andframing <strong>the</strong>refore occurred <strong>on</strong> some occasi<strong>on</strong>s but not <strong>on</strong> o<strong>the</strong>rs. However, when users werelinked to <strong>the</strong> Ticketmaster web pages, <strong>the</strong> user of <strong>the</strong> Tickets.com site was taken directly to <strong>the</strong>originating Ticketmaster site, c<strong>on</strong>taining all <strong>the</strong> elements of that particular Ticketmaster eventpage, and <strong>the</strong> Ticketmaster event pages were clearly identified as bel<strong>on</strong>ging to Ticketmaster.Moreover, <strong>the</strong> link <strong>on</strong> <strong>the</strong> Tickets.com site c<strong>on</strong>tained a notice stating “Buy this ticket fromano<strong>the</strong>r <strong>on</strong>line ticketing company.” 2128 Accordingly, <strong>the</strong> court granted Tickets.com summaryjudgment <strong>on</strong> Ticketmaster’s copyright claims. 21298. The MP3Board CaseIn this case, several RIAA member companies brought claims for c<strong>on</strong>tributory andvicarious copyright infringement against MP3Board for operating a web site, located atwww.mp3board.com, which provided <strong>Internet</strong> users with resources to enable <strong>the</strong>m to locate MP3files from publicly available Web sites. No music files were located <strong>on</strong> <strong>the</strong> MP3Board web site.Instead, <strong>the</strong> web site featured an automated search engine that searched for, aggregated andorganized links to media files <strong>on</strong> <strong>the</strong> Web, and provided a tutorial offering users instructi<strong>on</strong> <strong>on</strong>how to locate and download such files. The site also featured a message board <strong>on</strong> which userscould post questi<strong>on</strong>s or s<strong>on</strong>g requests. In resp<strong>on</strong>se to users’ posts, MP3Board pers<strong>on</strong>nelpers<strong>on</strong>ally searched for links to s<strong>on</strong>gs and posted <strong>the</strong> links <strong>on</strong> <strong>the</strong> message board, solicited o<strong>the</strong>rusers to provide <strong>the</strong> requested works, and obtained and posted passwords to enable users toaccess certain music files. 2130The RIAA sent a number of infringement demand letters relating to MP3Board’sactivities before filing suit. On Oct. 27, 1999, and again <strong>on</strong> Apr. 18, 2000, <strong>the</strong> RIAA sent lettersto MP3Board’s ISP, identifying artists whose works were being infringed – but no specific s<strong>on</strong>gtitles – and demanding that <strong>the</strong> ISP remove or disable access to <strong>the</strong> MP3Board site orMP3Board’s links to infringing works. In resp<strong>on</strong>se to <strong>the</strong> sec<strong>on</strong>d letter, MP3Board’s ISPdisabled <strong>Internet</strong> access to <strong>the</strong> MP3Board web site, but service was restored after MP3Boardsupplied a counter notificati<strong>on</strong> to <strong>the</strong> ISP asserting that it had removed <strong>the</strong> infringing materialidentified in <strong>the</strong> RIAA’s notice. On May 25, 2000, <strong>the</strong> RIAA wrote directly to MP3Board anddemanded that MP3Board remove all infringing links, this time naming 21 artists and 22 s<strong>on</strong>gtitles which were representative of <strong>the</strong> titles being infringed. The letter also attached printouts of2128 Id. at *21-23.2129 Ticketmaster also brought a trespass to chattels claim against Tickets.com based <strong>on</strong> Tickets.com’s spidersunauthorized entry into <strong>the</strong> Ticketmaster site. The court granted Tickets.com summary judgment <strong>on</strong> this claim,ruling that in order to establish a trespass to chattels claim, <strong>the</strong>re must be some evidence of tangible interferencewith <strong>the</strong> use or operati<strong>on</strong> of <strong>the</strong> computer being invaded by <strong>the</strong> spider. “Since <strong>the</strong> spider does not causephysical injury to <strong>the</strong> chattel, <strong>the</strong>re must be some evidence that <strong>the</strong> use or utility of <strong>the</strong> computer (or computernetwork) being ‘spiderized’ is adversely affected by <strong>the</strong> use of <strong>the</strong> spider. No such evidence is presented here.This court respectfully disagrees with o<strong>the</strong>r district courts’ finding that mere use of a spider to enter a publiclyavailable web site to ga<strong>the</strong>r informati<strong>on</strong>, without more, is sufficient to fulfill <strong>the</strong> harm requirement for trespassto chattels.” Id. at *12.2130 Arista Records, Inc. v. MP3Board, Inc., 2002 U.S. Dist. LEXIS 16165 (S.D.N.Y. 2002) at *5-6.- 465 -


screen shots of MP3Board’s web site <strong>on</strong> which <strong>the</strong> RIAA identified 662 links which <strong>the</strong> RIAAbelieved to lead to infringing material. MP3Board did not dismantle access to any of <strong>the</strong>identified links in resp<strong>on</strong>se. Shortly <strong>the</strong>reafter, <strong>the</strong> RIAA filed suit and sought summaryjudgment <strong>on</strong> its claims of c<strong>on</strong>tributory and vicarious copyright infringement. 2131The court denied <strong>the</strong> RIAA’s moti<strong>on</strong> for summary judgment, finding that numerousissues of material fact remained to be resolved. First, although <strong>the</strong> structure of <strong>the</strong> MP3Boardsite and scale of <strong>the</strong> operati<strong>on</strong> gave rise to a str<strong>on</strong>g inference that users downloaded filesc<strong>on</strong>taining copyrighted music, <strong>the</strong> court found that <strong>the</strong> record companies had not submitted anydirect of evidence of infringement to which MP3Board could c<strong>on</strong>tribute or be vicariously liable,such as user logs or o<strong>the</strong>r technical data showing <strong>the</strong> downloading of copyrighted andunauthorized files. 2132 The court ruled that, to show <strong>the</strong> unlawful distributi<strong>on</strong> of a copyrightedwork, <strong>the</strong> plaintiffs needed to show that an unlawful copy was disseminated to <strong>the</strong> public. 2133This ruling is in c<strong>on</strong>trast to <strong>the</strong> Frena, Chuckleberry, Webbworld, and Marobie-FL cases,discussed in Secti<strong>on</strong> II.D.1 above, which held that <strong>the</strong> mere making available of unauthorizedworks for download by members of <strong>the</strong> public c<strong>on</strong>stituted infringement of <strong>the</strong> distributi<strong>on</strong> right.With respect to c<strong>on</strong>tributory liability, <strong>the</strong> court found material issues of fact bothc<strong>on</strong>cerning <strong>the</strong> knowledge and <strong>the</strong> material c<strong>on</strong>tributi<strong>on</strong> pr<strong>on</strong>gs. With respect to <strong>the</strong> materialc<strong>on</strong>tributi<strong>on</strong> pr<strong>on</strong>g, <strong>the</strong> court noted that MP3Board styled itself as a “passive” tool. The courtc<strong>on</strong>cluded, however, that <strong>the</strong>re was sufficient evidence from which a factfinder could determinethat MP3Board materially c<strong>on</strong>tributed to <strong>the</strong> infringement by virtue of its search engine, <strong>the</strong>site’s solicitati<strong>on</strong> of third parties to post links to sites c<strong>on</strong>taining audio files, <strong>the</strong> posting of a linkto a third party named Freedrive where users could store audio files <strong>on</strong>line, <strong>the</strong> posting of atutorial <strong>on</strong> how to locate and download audio files via MP3Board using <strong>on</strong>e of <strong>the</strong> recordcompanies’ copyrighted recordings as an example, and <strong>the</strong> searching by MP3Board pers<strong>on</strong>nel forlinks to requested s<strong>on</strong>gs in resp<strong>on</strong>se to user requests through <strong>the</strong> MP3Board message boards. 2134C<strong>on</strong>cerning knowledge, <strong>the</strong> court found material issues of fact with respect to whe<strong>the</strong>rMP3Board had c<strong>on</strong>structive knowledge of infringement or whe<strong>the</strong>r MP3Board’s activities werecovered by <strong>the</strong> S<strong>on</strong>y doctrine and whe<strong>the</strong>r <strong>the</strong> site was capable of commercially significantn<strong>on</strong>infringing uses. The record companies pointed to a category of links <strong>on</strong> <strong>the</strong> site titled “LegalMP3s” as evidence that MP3Board recognized that <strong>the</strong> o<strong>the</strong>r categories c<strong>on</strong>tained MP3s whichwere not legal. In resp<strong>on</strong>se, MP3Board noted that a third party MP3 supplier had specificallyrequested <strong>the</strong> title “Legal MP3s” to describe <strong>the</strong> category, which c<strong>on</strong>tained exclusively c<strong>on</strong>tentfrom that third party. MP3Board also c<strong>on</strong>tended that <strong>the</strong>re was no evidence it m<strong>on</strong>itored <strong>the</strong>posting of links, and stated that it did not investigate <strong>the</strong> links. 21352131 Id. at *7-9.2132 Id. at *11-12.2133 Id. at *13-14.2134 Id. at *17-18.2135 Id. at 21-23.- 466 -


The court found str<strong>on</strong>ger evidence of actual knowledge of infringement. The court notedthat <strong>the</strong> RIAA letters of Oct. 27, 1999 and Apr. 18, 2000 to MP3Board’s ISP, which wereforwarded <strong>on</strong> to MP3Board, were insufficient to c<strong>on</strong>stitute notice under DMCA Secti<strong>on</strong>512(d)(3). “By solely listing artists’ names, and neglecting to specify any infringing links oreven particular s<strong>on</strong>gs, <strong>the</strong> letter(s) did not include ‘identificati<strong>on</strong> of <strong>the</strong> reference or link, tomaterial or activity claimed to be infringing.” 2136 Accordingly, MP3Board’s failure to delete anylinks in resp<strong>on</strong>se to those letters could not give rise to any liability. 2137 However, <strong>the</strong> letter ofMay 25, 2000 complied with DMCA notificati<strong>on</strong> requirements because it not <strong>on</strong>ly namedparticular artists al<strong>on</strong>g with specified s<strong>on</strong>gs, but was accompanied by printouts of screen shots ofMP3Board’s web site, <strong>on</strong> which <strong>the</strong> RIASA highlighted and placed an asterisk next to 662 linkswhich <strong>the</strong> RIAA believed to infringe up<strong>on</strong> <strong>the</strong> record companies’ copyrights (although no URLaddresses were provided by <strong>the</strong> RIAA). 2138 Despite <strong>the</strong> adequacy of notice via <strong>the</strong> May 25, 2000letter, <strong>the</strong> court never<strong>the</strong>less held that issues of material fact existed regarding MP3Board’sknowledge of infringing activity. 2139With respect to vicarious liability, <strong>the</strong> court similarly found that issues of material factc<strong>on</strong>cerning MP3Board’s right and ability to c<strong>on</strong>trol infringing activity, and whe<strong>the</strong>r it had adirect financial interest in <strong>the</strong> activity, precluded summary judgment. It also found materialissues of fact c<strong>on</strong>cerning whe<strong>the</strong>r MP3Board qualified as a “service provider” for purposes of<strong>the</strong> Secti<strong>on</strong> 512(d) safe harbor, <strong>the</strong>reby at least implicitly recognizing that <strong>the</strong> Secti<strong>on</strong> 512(d)safe harbor could apply to vicarious liability. With respect to <strong>the</strong> issue of c<strong>on</strong>trol, <strong>the</strong> courtcuriously found issues of material fact, even though it stated, citing <strong>the</strong> Ninth Circuit’s Napster Idecisi<strong>on</strong>, that a defendant’s ability to block infringers’ access to a particular envir<strong>on</strong>ment for anyreas<strong>on</strong> c<strong>on</strong>stitutes proof of its right and ability to supervise and c<strong>on</strong>trol <strong>the</strong> infringing activities.The court fur<strong>the</strong>r noted as evidence of c<strong>on</strong>trol that MP3Board could delete links from itsdatabase and thus prevent <strong>the</strong>m from being displayed in resp<strong>on</strong>se to user queries, and that it hadin fact removed offending links from <strong>the</strong> site and banned repeat offenders of its rules fromposting any additi<strong>on</strong>al links. 2140With respect to <strong>the</strong> issue of financial benefit, <strong>the</strong> court again curiously found issues ofmaterial fact, despite <strong>the</strong> fact that it cited <strong>on</strong>ly evidence from which direct financial benefit couldbe inferred. Specifically, <strong>the</strong> court, against citing Napster I, noted that infringement whichincreases a defendant’s user base or o<strong>the</strong>rwise acts as a draw for customers c<strong>on</strong>stitutes a directfinancial interest. It also cited testim<strong>on</strong>y from MP3Board’s principals that <strong>the</strong> revenueMP3Board received from banner advertisements <strong>on</strong> <strong>the</strong> site was directly tied to <strong>the</strong> number of2136 Id. at *26 (quoting Secti<strong>on</strong> 512(d)(3)).2137 Id. at *27.2138 Id. at *28-29.2139 Id. at *30.2140 Id. at *33-34.- 467 -


users who were exposed to those ads. 2141 In view of <strong>the</strong> material issues of fact cited by <strong>the</strong> court,it denied <strong>the</strong> plaintiffs’ moti<strong>on</strong> for summary judgment. 21429. Kelly v. Arriba SoftOne of <strong>the</strong> most important linking cases is that of Kelly v. Arriba Soft Corp. 2143case and its significance are discussed in detail in Secti<strong>on</strong> II.C.2 above.That10. Batesville Services, Inc. v. Funeral Depot, Inc.In Batesville Services, Inc. v. Funeral Depot, Inc., 2144 <strong>the</strong> plaintiff Batesville sold casketsand was <strong>the</strong> owner of <strong>the</strong> copyrights in a number of advertising photographs used to market itscaskets. The defendant, although not an authorized dealer of Batesville, operated a web site thatsold caskets, including Batesville caskets. The defendant displayed some of Batesville’s casketphotographs <strong>on</strong> its web site. In resp<strong>on</strong>se to a cease and desist letter, <strong>the</strong> defendant removed <strong>the</strong>photographs from its web site, but approached <strong>the</strong> Veterans Society, an authorized Batesvilledealer, and reached an agreement that <strong>the</strong> defendant would pay <strong>the</strong> expenses of modifying <strong>the</strong>Veterans Society web site so that digitized versi<strong>on</strong>s of images of Batesville caskets would bedisplayed <strong>on</strong> <strong>the</strong> site. The defendant <strong>the</strong>n modified its own web site so that small, low resoluti<strong>on</strong>thumbnail images of Batesville caskets were linked to <strong>the</strong> appropriate casket pages <strong>on</strong> <strong>the</strong>Veterans Society website. When a shopper <strong>on</strong> <strong>the</strong> defendant’s site clicked <strong>on</strong> a thumbnail image,<strong>the</strong> shopper was linked to a much larger image <strong>on</strong> a casket page <strong>on</strong> <strong>the</strong> Veterans Society website, which in turn displayed <strong>the</strong> defendant’s ph<strong>on</strong>e number. The casket web pages <strong>on</strong> <strong>the</strong>Veterans Society site also had a link labeled “Back to Main Gallery” that would return <strong>the</strong>viewer to <strong>the</strong> defendant’s web site. 2145The plaintiff c<strong>on</strong>tended that both <strong>the</strong> previous and <strong>the</strong> modified arrangements violated<strong>the</strong>ir copyrights in <strong>the</strong> photographs in questi<strong>on</strong>. The defendant argued, am<strong>on</strong>g o<strong>the</strong>r things, that<strong>the</strong> Veterans Society, as an authorized Batesville dealer, had an implied license to display <strong>the</strong>photographs, and that in any event <strong>the</strong> use of links <strong>on</strong> <strong>the</strong> <strong>Internet</strong> could never amount tocopyright infringement. Both sides moved for summary judgment. 2146With respect to <strong>the</strong> implied license argument, <strong>the</strong> court noted that Batesville had supplied<strong>the</strong> photographs to <strong>the</strong> Veterans Society as an authorized dealer, and that like any o<strong>the</strong>r2141 Id. at *35-36.2142 The court denied a counter-moti<strong>on</strong> for summary judgment filed by MP3Board that its activities of identifyinglinks where informati<strong>on</strong> could be found were protected by <strong>the</strong> First Amendment. The court cited authorityfrom <strong>the</strong> Sec<strong>on</strong>d Circuit that <strong>the</strong> fair use doctrine encompasses all claims under <strong>the</strong> First Amendment in <strong>the</strong>copyright field, and noted that MP3Board had not asserted that its activities c<strong>on</strong>stituted fair use, nor could itsucceed <strong>on</strong> such an asserti<strong>on</strong> under <strong>the</strong> applicable factors of <strong>the</strong> fair use doctrine. Id. at *37-40.2143 No. 00-55521 (9 th Cir. Feb. 6, 2002).2144 2004 Copyr. L. Dec. 28,901 (S.D. Ind. 2004).2145 Id. at pp. 37,694-95.2146 Id. at 37,695.- 468 -


Batesville dealer, <strong>the</strong> Veterans Society was authorized to use those photographs for at least somepurposes. Batesville argued, however, that <strong>the</strong> Veterans Society had exceeded <strong>the</strong> scope of itsimplied license by posting <strong>the</strong> photographs <strong>on</strong> its web site to promote a business o<strong>the</strong>r than itsown. The court rejected this argument, noting that <strong>the</strong>re was no evidence that Batesville hadeven asked <strong>the</strong> Veterans Society to change its arrangements or had ever communicated to <strong>the</strong>Veterans Society its internal policy that its photographs were to be used to promote <strong>on</strong>ly <strong>the</strong>authorized dealer’s business to whom <strong>the</strong> photographs were supplied. Batesville could haverevoked at any time <strong>the</strong> implied license to <strong>the</strong> Veterans Society or insisted that it revise its website in a way that satisfied Batesville, but had not d<strong>on</strong>e so. Accordingly, <strong>the</strong> factual record couldlead a reas<strong>on</strong>able jury to find that <strong>the</strong> Veterans Society’s implied licensed allowed <strong>the</strong> disputeduse of <strong>the</strong> images in questi<strong>on</strong>, and <strong>the</strong> court ruled that nei<strong>the</strong>r Batesville nor <strong>the</strong> defendant wasentitled to summary judgment <strong>on</strong> <strong>the</strong> implied license defense. 2147Turning to <strong>the</strong> defendant’s linking defense, <strong>the</strong> court rejected <strong>the</strong> defendant’s argument,based <strong>on</strong> <strong>the</strong> Ticketmaster Corp. v. Tickets case and <strong>the</strong> Bernstein case, discussed respectively inSecti<strong>on</strong>s III.D.7 and III.D.5 above, that links can never amount to a copyright violati<strong>on</strong>. Thecourt noted that those two cases suggest that <strong>the</strong> host of a web site who establishes a link toano<strong>the</strong>r site that may be interesting to <strong>the</strong> host’s web site visitors does not undertake any generalduty to police whe<strong>the</strong>r <strong>the</strong> linked sites c<strong>on</strong>tain any material infringing <strong>the</strong> copyrights of o<strong>the</strong>rs.Those two cases, however, did not support a sweeping per se rule that links can never give rise toinfringement. 2148The court cited <strong>the</strong> Intellectual Reserve case, discussed in Secti<strong>on</strong> III.D.6 above, for <strong>the</strong>propositi<strong>on</strong> that, in extreme cases, even encouraging browsing of infringing web sites can violate<strong>the</strong> copyright laws. 2149 “From that c<strong>on</strong>clusi<strong>on</strong>, it is easy to allow room for liability fordefendants who deliberately encourage use of infringing web sites by establishing links to thosesites. This is not a case where Funeral Depot merely found some useful material elsewhere <strong>on</strong><strong>the</strong> internet and encouraged its shoppers to link to those sites. Instead, Funeral Depot activelysecured c<strong>on</strong>trol of <strong>the</strong> c<strong>on</strong>tents of <strong>the</strong> Veterans Society website and modified <strong>the</strong> website to use itfor its own purposes.” 2150The court noted that <strong>the</strong> “casket gallery” <strong>on</strong> <strong>the</strong> Veterans Society web site did not existuntil <strong>the</strong> defendant created those web pages, that it had designed and paid for <strong>the</strong>m, it stillc<strong>on</strong>trolled changes to <strong>the</strong>m, and <strong>the</strong>y displayed <strong>the</strong> defendant’s ph<strong>on</strong>e number. The defendant’sc<strong>on</strong>trol of <strong>the</strong> web pages was so complete that <strong>the</strong> owner of <strong>the</strong> Veterans Society was not awareof any changes to <strong>the</strong> casket porti<strong>on</strong> of its web site. 2151 “These facts are unusual enough to takethis case out of <strong>the</strong> general principle that linking does not amount to copying. These factsindicate a sufficient involvement by Funeral Depot that could allow a reas<strong>on</strong>able jury to hold2147 Id. at 37,697-98. The court also rejected <strong>the</strong> defendant’s argument that its use of <strong>the</strong> Batesville photographswas a fair use. Id. at 37,698-701.2148 Id. at 37,701.2149 Id. at 37,701-02.2150 Id. at 37,702.2151 Id.- 469 -


Funeral Depot liable for copyright infringement or c<strong>on</strong>tributory infringement, if infringement itis. The possibility of copyright infringement liability <strong>on</strong> <strong>the</strong>se unusual facts showing suchextensive involvement in <strong>the</strong> allegedly infringing display should not pose any broad threat to <strong>the</strong>use of hyperlinks <strong>on</strong> <strong>the</strong> internet.” 215211. Live Nati<strong>on</strong> Sports v. DavisThe facts of Live Nati<strong>on</strong> Motor Sports, Inc. v. Davis, 2153 are discussed in Secti<strong>on</strong> II.B.3above. The court granted a preliminary injuncti<strong>on</strong> enjoining <strong>the</strong> defendant from providing<strong>Internet</strong> links to <strong>the</strong> plaintiff’s webcasts of its motorcycle racing events or o<strong>the</strong>rwise displayingor performing <strong>the</strong> plaintiff’s webcasts. 2154 With almost no analysis, <strong>the</strong> court ruled that <strong>the</strong>plaintiff had a likelihood of success <strong>on</strong> its copyright claim because “<strong>the</strong> unauthorized ‘link’ to<strong>the</strong> live webcasts that [<strong>the</strong> defendant] provides <strong>on</strong> his website would likely qualify as a copieddisplay or performance of [<strong>the</strong> plaintiff’s] copyrightable material.” 2155 The court found a threatof irreparable harm to <strong>the</strong> plaintiff because <strong>the</strong> defendant’s links would cause <strong>the</strong> plaintiff to loseits ability to sell sp<strong>on</strong>sorships or advertisements <strong>on</strong> <strong>the</strong> basis that its website was <strong>the</strong> exclusivesource of <strong>the</strong> webcasts. 2156 Although <strong>the</strong> unclear facts of this case make its reach uncertain, itcould potentially imply that any unauthorized link that causes material available <strong>on</strong> ano<strong>the</strong>r siteto be streamed through an unauthorized site could c<strong>on</strong>stitute an infringing public display orperformance.12. Perfect 10 v. Google (aka Perfect 10 v. Amaz<strong>on</strong>)The case of Perfect 10 v. Google involved some important rulings in <strong>the</strong> c<strong>on</strong>text offraming of c<strong>on</strong>tent taken from third party sites. That case is discussed extensively in Secti<strong>on</strong>II.C.4 above.E. Streaming and Downloading“Streaming” is <strong>the</strong> digital transmissi<strong>on</strong> of a work, usually a musical work, over a networkthat results in an immediate playing of <strong>the</strong> work at <strong>the</strong> recipient’s end, without storage of apermanent copy at <strong>the</strong> recipient’s end. If a permanent copy of a work is stored at <strong>the</strong> recipient’send as a result of a transmissi<strong>on</strong>, <strong>the</strong> act of transmissi<strong>on</strong> is usually referred to as “downloading”and <strong>the</strong> resultant copy is referred to as a “download.” A “limited download” refers to adownload that can be played <strong>on</strong>ly for a limited period of time or a limited number of plays.Streaming potentially implicates at least two rights of <strong>the</strong> copyright holder in both <strong>the</strong>sound recording being transmitted and <strong>the</strong> musical work embodied in <strong>the</strong> sound recording – <strong>the</strong>2152 Id.2153 2006 U.S. Dist. LEXIS 89552 (N.D. Tex. Dec. 11, 2006).2154 Id. at *18.2155 Id. at *12.2156 Id. at *15.- 470 -


ight of public performance and <strong>the</strong> right of reproducti<strong>on</strong>. The right of public performance ispotentially implicated because Secti<strong>on</strong> 101 of <strong>the</strong> copyright statute defines <strong>the</strong> publicperformance of a work to include <strong>the</strong> following: “to transmit or o<strong>the</strong>rwise communicate aperformance ... of <strong>the</strong> work … to <strong>the</strong> public, by means of any device or process, whe<strong>the</strong>r <strong>the</strong>members of <strong>the</strong> public capable of receiving <strong>the</strong> performance … receive it in <strong>the</strong> same place or inseparate places and at <strong>the</strong> same time or at different times.” 2157 The right of reproducti<strong>on</strong> ispotentially implicated because interim whole or partial copies of <strong>the</strong> work are made in variousRAM memories in <strong>the</strong> course of transmissi<strong>on</strong> of <strong>the</strong> work through <strong>the</strong> <strong>Internet</strong>. 2158 In additi<strong>on</strong>,copies of <strong>the</strong> works available for streaming generally must be stored <strong>on</strong> <strong>on</strong>e or more serversoperated by <strong>the</strong> streaming vendor.Significant legal disputes have arisen over <strong>the</strong> applicati<strong>on</strong> of <strong>the</strong> rights of publicperformance and reproducti<strong>on</strong>, as well as <strong>the</strong> compulsory statutory licenses afforded by <strong>the</strong>copyright statute, to streaming and limited downloads. The nature of <strong>the</strong>se disputes, and <strong>the</strong>cases decided to date with respect to <strong>the</strong>m, are discussed below.1. The Digital Performance Right – The Secti<strong>on</strong> 114(d)(1) Exempti<strong>on</strong> andStreaming by FCC-Licensed BroadcastersSecti<strong>on</strong> 106(4) of <strong>the</strong> copyright statute grants <strong>the</strong> owner of copyright in a work <strong>the</strong>exclusive right to perform <strong>the</strong> work publicly. The right does not apply, however, to soundrecordings, 2159 except with respect to certain public performances by digital transmissi<strong>on</strong>. Inparticular, <strong>the</strong> Digital Performance Right in Sound Recordings Act of 1995 (DPRA) 2160 createdas of February 1, 1996 a limited right to perform a sound recording by means of a “digital audiotransmissi<strong>on</strong>.” 2161Certain digital transmissi<strong>on</strong>s of performances are exempt from this right under Secti<strong>on</strong>114(d)(1). Specifically, <strong>the</strong> performance of a sound recording publicly by means of a digitalaudio transmissi<strong>on</strong> (i) as part of a “n<strong>on</strong>subscripti<strong>on</strong> broadcast transmissi<strong>on</strong>,” 2162 (ii) as part of aretransmissi<strong>on</strong> of a n<strong>on</strong>subscripti<strong>on</strong> broadcast transmissi<strong>on</strong> (subject to certain limitati<strong>on</strong>s in <strong>the</strong>2157 17 U.S.C. § 101.2158 See <strong>the</strong> analysis in Secti<strong>on</strong>s I.A.1 & I.A.2 above.2159 17 U.S.C. § 114(a).2160 Pub. L. No. 104-39, 109 Stat. 336 (codified at 17 U.S.C. §§ 106, 114, 115).2161 See 17 U.S.C. § 106(6). Secti<strong>on</strong> 114(j)(5) of <strong>the</strong> copyright statute defines a “digital audio transmissi<strong>on</strong>” tomean “a digital transmissi<strong>on</strong> as defined in secti<strong>on</strong> 101, that embodies <strong>the</strong> transmissi<strong>on</strong> of a sound recording.This term does not include <strong>the</strong> transmissi<strong>on</strong> of any audiovisual work.” Secti<strong>on</strong> 101 defines “digitaltransmissi<strong>on</strong>” as “a transmissi<strong>on</strong> in whole or in part in a digital or o<strong>the</strong>r n<strong>on</strong>-analog format.”2162 17 U.S.C. § 114(d)(1)(A). A “broadcast” transmissi<strong>on</strong> is “a transmissi<strong>on</strong> made by a terrestrial broadcast stati<strong>on</strong>licensed as such by <strong>the</strong> Federal Communicati<strong>on</strong>s Commissi<strong>on</strong>.” Id. § 114(j)(3). A "n<strong>on</strong>subscripti<strong>on</strong>"transmissi<strong>on</strong> is “any transmissi<strong>on</strong> that is not a subscripti<strong>on</strong> transmissi<strong>on</strong>.” Id. § 114(j)(9). A "subscripti<strong>on</strong>"transmissi<strong>on</strong> is “a transmissi<strong>on</strong> that is c<strong>on</strong>trolled and limited to particular recipients, and for whichc<strong>on</strong>siderati<strong>on</strong> is required to be paid or o<strong>the</strong>rwise given by or <strong>on</strong> behalf of <strong>the</strong> recipient to receive <strong>the</strong>transmissi<strong>on</strong> or a package of transmissi<strong>on</strong>s including <strong>the</strong> transmissi<strong>on</strong>.” Id. § 114(j)(14).- 471 -


case of a retransmissi<strong>on</strong> of a radio stati<strong>on</strong>’s broadcast transmissi<strong>on</strong>), 2163 or (iii) as part of certaino<strong>the</strong>r narrowly defined incidental transmissi<strong>on</strong>s or transmissi<strong>on</strong>s within or to a businessestablishment for use in <strong>the</strong> ordinary course, 2164 is exempt from <strong>the</strong> digital performance right,provided in each case that it is not “part of an interactive service.” The copyright statute definesan “interactive service” as a service “that enables a member of <strong>the</strong> public to receive atransmissi<strong>on</strong> of a program specially created for <strong>the</strong> recipient, or <strong>on</strong> request, a transmissi<strong>on</strong> of aparticular sound recording, whe<strong>the</strong>r or not as part of a program, which is selected by or <strong>on</strong> behalfof <strong>the</strong> recipient.” 2165 N<strong>on</strong>exempt digital audio transmissi<strong>on</strong>s that are not part of an “interactiveservice” are subject to a statutory license as provided in Secti<strong>on</strong> 114(d)(2) of <strong>the</strong> copyrightstatute, as discussed fur<strong>the</strong>r in subsecti<strong>on</strong> 2 below. Those wishing to engage in digital audiotransmissi<strong>on</strong>s as part of an interactive service must negotiate individual licenses with <strong>the</strong>relevant copyright holders.In <strong>the</strong> late 1990’s, a c<strong>on</strong>troversy arose over whe<strong>the</strong>r FCC-licensed broadcasters, whichare exempt from paying royalties to sound recording copyright holders for traditi<strong>on</strong>al radiobroadcasting of those recordings, should remain exempt when streaming <strong>the</strong> same broadcast over<strong>the</strong> <strong>Internet</strong>. The broadcasters argued such streaming should be classified as an exempt“n<strong>on</strong>subscripti<strong>on</strong> broadcast transmissi<strong>on</strong>” under Secti<strong>on</strong> 114(d)(1)(A) of <strong>the</strong> copyright statute.On Dec. 11, 2000, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office issued a final rule determining that AM/FM broadcastsignals transmitted simultaneously over a digital communicati<strong>on</strong>s network such as <strong>the</strong> <strong>Internet</strong>were not exempt under Secti<strong>on</strong> 114(d)(1)(A), and thus were subject to <strong>the</strong> digital performanceright of <strong>the</strong> DPRA. 2166In its ruling, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office determined that <strong>the</strong> exempti<strong>on</strong> for “broadcasttransmissi<strong>on</strong>[s]” was limited to over-<strong>the</strong>-air transmissi<strong>on</strong>s by FCC-licensed broadcasters andthus did not cover streaming. 2167 The <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office also amended its regulatory definiti<strong>on</strong> ofa “Service” for purposes of <strong>the</strong> Secti<strong>on</strong> 114 statutory license to clarify that transmissi<strong>on</strong>s of abroadcast signal over a digital communicati<strong>on</strong>s network such as <strong>the</strong> <strong>Internet</strong> are not exempt fromcopyright liability under Secti<strong>on</strong> 114(d)(1)(A) of <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act. The broadcasterschallenged <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office’s ruling in federal court.In B<strong>on</strong>neville Int’l Corp. v. Peters, 2168 <strong>the</strong> Third Circuit affirmed a district court’s rulingupholding <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office’s ruling. The Third Circuit noted that, for AM/FM webcastingto be exempt under Secti<strong>on</strong> 114(d)(1)(A) from <strong>the</strong> digital audio transmissi<strong>on</strong> performancecopyright, it must be 1) n<strong>on</strong>interactive, 2) n<strong>on</strong>subscripti<strong>on</strong> and 3) broadcast. Because <strong>the</strong> parties2163 Id. § 114(d)(1)(B).2164 Id. § 114 (d)(1)(C).2165 Id. § 114(j)(7).2166 65 Fed. Reg. 77292 (Dec. 11, 2000).2167 Id. at 77301.2168 68 U.S.P.Q.2d 1545 (3d Cir. 2003).- 472 -


agreed that AM/FM webcasting was not part of an interactive service and was a n<strong>on</strong>subscripti<strong>on</strong>transmissi<strong>on</strong>, <strong>the</strong> issue was whe<strong>the</strong>r AM/FM webcasting is a “broadcast transmissi<strong>on</strong>.” 2169The court c<strong>on</strong>cluded form <strong>the</strong> statutory language and <strong>the</strong> legislative history that AM/FMwebcasting is not a broadcast transmissi<strong>on</strong>. With respect to <strong>the</strong> statutory language, Secti<strong>on</strong>114(j)(3) defines a broadcast transmissi<strong>on</strong> as “a transmissi<strong>on</strong> made by a terrestrial broadcaststati<strong>on</strong> licensed as such by <strong>the</strong> Federal Communicati<strong>on</strong>s Commissi<strong>on</strong>.” The court gave“terrestrial” its “natural and logical meaning of earthbound.” 2170 The parties disputed, however,whe<strong>the</strong>r a “broadcast stati<strong>on</strong>” should be read to refer to <strong>the</strong> broadcaster as a business entity thatoperates broadcasting facilities, or to <strong>the</strong> broadcasting facilities <strong>the</strong>mselves (and by extensi<strong>on</strong> <strong>the</strong>mode of transmissi<strong>on</strong>). The court adopted <strong>the</strong> latter interpretati<strong>on</strong>, noting that <strong>the</strong> formerinterpretati<strong>on</strong> would lead to anomalous c<strong>on</strong>sequences. One such c<strong>on</strong>sequence would be that anyentity that operated at least <strong>on</strong>e FCC-licensed radio stati<strong>on</strong> would have carte blanche to digitallyperform recordings via any c<strong>on</strong>ceivable transmissi<strong>on</strong> medium (in a n<strong>on</strong>interactive,n<strong>on</strong>subscripti<strong>on</strong> manner) without limitati<strong>on</strong> or copyright liability. 2171Ano<strong>the</strong>r anomalous c<strong>on</strong>sequence would be that <strong>the</strong> meaning of <strong>the</strong> modifier “terrestrial”would become absurd. Specifically, under <strong>the</strong> interpretati<strong>on</strong> in questi<strong>on</strong>, a terrestrial broadcaststati<strong>on</strong> would mean a business entity that is earthbound, in c<strong>on</strong>trast, presumably, to <strong>on</strong>e that isspace-borne. The court noted that such an interpretati<strong>on</strong> made no sense given that no spacebornebusiness entities exist. On <strong>the</strong> o<strong>the</strong>r hand, an interpretati<strong>on</strong> limited to earthboundbroadcasting facilities, as opposed to broadcasting d<strong>on</strong>e through satellites, would be entirelyplausible. 2172 Accordingly, <strong>the</strong> court c<strong>on</strong>cluded that a“broadcast stati<strong>on</strong> licensed as such by <strong>the</strong> [FCC],” as <strong>the</strong> term is used in Secti<strong>on</strong>114(j)(3), refers to <strong>the</strong> physical radio stati<strong>on</strong> facility that broadcasts radio signalsover <strong>the</strong> air, and not to <strong>the</strong> business entity that operati<strong>on</strong>s <strong>the</strong> radio stati<strong>on</strong>. A“broadcast transmissi<strong>on</strong>” under § 114(d)(1)(A) would <strong>the</strong>refore be a radiotransmissi<strong>on</strong> by a radio stati<strong>on</strong> facility operated subject to an FCC license andwould not include a webcast. AM/FM webcasting does not meet <strong>the</strong> definiti<strong>on</strong> ofa “n<strong>on</strong>subscripti<strong>on</strong> broadcast transmissi<strong>on</strong>” and does not, <strong>the</strong>refore, qualify under§ 114(d)(1)(A) for an exempti<strong>on</strong> from <strong>the</strong> digital audio transmissi<strong>on</strong> performancecopyright of § 106(6). 2173The court noted that <strong>the</strong> legislative history was c<strong>on</strong>sistent with its interpretati<strong>on</strong>. In <strong>the</strong>1995 Senate Report, accompanying <strong>the</strong> legislati<strong>on</strong> that first established a digital performanceright for sound recordings, C<strong>on</strong>gress stated that <strong>the</strong> “classic example of [an exempt transmissi<strong>on</strong>under secti<strong>on</strong> 114(d)(1)(A)] is a transmissi<strong>on</strong> to <strong>the</strong> general public by a free over-<strong>the</strong>-airbroadcast stati<strong>on</strong>, such as a traditi<strong>on</strong>al radio or televisi<strong>on</strong> stati<strong>on</strong>, and <strong>the</strong> Committee intends that2169 Id. at 1549.2170 Id. at 1550.2171 Id.2172 Id.2173 Id. at 1552.- 473 -


such transmissi<strong>on</strong>s be exempt regardless of whe<strong>the</strong>r <strong>the</strong>y are in a digital or n<strong>on</strong>digital format, inwhole or in part.” 2174 Thus, <strong>the</strong> court found it clear that <strong>the</strong> original 1995 exempti<strong>on</strong> forbroadcast transmissi<strong>on</strong>s was limited to over-<strong>the</strong>-air transmissi<strong>on</strong>s, and C<strong>on</strong>gress did notc<strong>on</strong>template protecting AM/FM webcasting, which did not exist at <strong>the</strong> time. Because <strong>the</strong> DMCAamendments in 1998 to <strong>the</strong> broadcast transmissi<strong>on</strong> exempti<strong>on</strong>s were silent <strong>on</strong> AM/FMwebcasting, <strong>the</strong> court found no affirmative grounds to believe that C<strong>on</strong>gress intended to expand<strong>the</strong> protecti<strong>on</strong>s c<strong>on</strong>templated by <strong>the</strong> original 1995 legislati<strong>on</strong>. 2175Accordingly, <strong>the</strong> Third Circuit c<strong>on</strong>cluded that Secti<strong>on</strong> 114(d)(1)(A)’s n<strong>on</strong>subscripti<strong>on</strong>broadcast transmissi<strong>on</strong> exempti<strong>on</strong> implicates <strong>on</strong>ly over-<strong>the</strong>-air radio broadcast transmissi<strong>on</strong>s,and does not cover <strong>the</strong> <strong>Internet</strong> streaming of AM/FM broadcast signals. 2176As discussed in detail in Secti<strong>on</strong> III.E.2(a) below, in May of 2003, <strong>the</strong> Digital MediaAssociati<strong>on</strong>, <strong>the</strong> American Federati<strong>on</strong> of Televisi<strong>on</strong> and Radio Artists, <strong>the</strong> American Federati<strong>on</strong>of Musicians of <strong>the</strong> United States and Canada, and <strong>the</strong> RIAA agreed <strong>on</strong> a proposal for royaltyrates to be paid for <strong>Internet</strong> streaming of AM/FM broadcasts for <strong>the</strong> period from 1998 throughDec. 31, 2004, and submitted <strong>the</strong> proposal to <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office for possible adopti<strong>on</strong> withouta CARP. On May 20, 2003, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office published <strong>the</strong> proposal for comment. 2177With respect to <strong>the</strong> related issue of royalties to owners of <strong>the</strong> copyrights in underlyingmusical works that are streamed <strong>on</strong>line, in Nov. 2001, a federal district court in New Yorkapproved an interim agreement reached between radio stati<strong>on</strong>s and music-licensing agencyBroadcast Music Inc. (BMI). Under that agreement, radio stati<strong>on</strong>s agreed to pay 1.065% ofrevenues generated by <strong>on</strong>line music streaming, <strong>the</strong> same rate that radio stati<strong>on</strong>s pay for rights tobroadcast <strong>the</strong> musical compositi<strong>on</strong>s over <strong>the</strong> airwaves. 2178Similarly, in Oct. 2004, a federal district court in New York approved a licenseagreement negotiated between <strong>the</strong> American Society of Composers, Authors and Publishers(ASCAP) and <strong>the</strong> Radio Music License Committee (RMLC), representing most of <strong>the</strong> nearly12,000 U.S. commercial radio stati<strong>on</strong>s, for rights to perform ASCAP music over <strong>the</strong> air and viasimultaneous streaming. The agreement governs <strong>the</strong> period Jan. 1, 2001 through Dec. 31,2009. 21792174 S. Rep. No. 104-128, at 19 (1995).2175 Id. at 1555.2176 Id.2177 68 Fed. Reg. 27506 (May 20, 2003).2178 Kevin Fea<strong>the</strong>rly, “Judge OKs Interim Online-Radio Music Royalty Rate” (Nov. 28, 2001), available as of Feb.2, 2002 at www.newsbytes.com/news/01/172509.html.2179 “Music Publishers Sign Deal <strong>on</strong> Web Radio” (Oct. 18, 2004), available as of Oct. 19, 2004 atwww.washingt<strong>on</strong>post.com/wp-dyn/articles/A41418-2004Oct.18.html. The court’s order approving <strong>the</strong> licenseagreement was available as of May 1, 2005 at www.ascap.com/licensing/radio/ORDER.pdf. The license setsforth <strong>the</strong> total amount of industry-wide fees that will be collected by ASCAP during each of <strong>the</strong> applicableyears of <strong>the</strong> agreement, and allocates each local radio stati<strong>on</strong>’s share of <strong>the</strong> annual license payment inaccordance with a license fee allocati<strong>on</strong> formula set forth in Exhibit B to <strong>the</strong> license. A copy of <strong>the</strong> license was- 474 -


2. The Digital Performance Right – Statutory Licenses Under Secti<strong>on</strong> 114for Certain N<strong>on</strong>subscripti<strong>on</strong> and Subscripti<strong>on</strong> ServicesSecti<strong>on</strong> 114 of <strong>the</strong> copyright statute provides statutory licenses for <strong>the</strong> performance ofsound recordings publicly by both n<strong>on</strong>subscripti<strong>on</strong> and subscripti<strong>on</strong> digital services, againprovided in each case that such transmissi<strong>on</strong>s are “not part of an interactive service.” 2180 UnderSecti<strong>on</strong> 114(d)(2), <strong>the</strong> statutory licenses cover transmissi<strong>on</strong>s by <strong>the</strong> following means: 2181Subscripti<strong>on</strong> Digital Audio Transmissi<strong>on</strong>s: by means of subscripti<strong>on</strong> digital audio transmissi<strong>on</strong>sthat are not exempt under Secti<strong>on</strong> 114(d)(1). A “subscripti<strong>on</strong>” transmissi<strong>on</strong> is “a transmissi<strong>on</strong>that is c<strong>on</strong>trolled and limited to particular recipients, and for which c<strong>on</strong>siderati<strong>on</strong> is required tobe paid or o<strong>the</strong>rwise given by or <strong>on</strong> behalf of <strong>the</strong> recipient to receive <strong>the</strong> transmissi<strong>on</strong> or apackage of transmissi<strong>on</strong>s including <strong>the</strong> transmissi<strong>on</strong>.” 2182All n<strong>on</strong>exempt digital subscripti<strong>on</strong> transmissi<strong>on</strong> services are eligible for <strong>the</strong> statutory license,provided that <strong>the</strong>y are n<strong>on</strong>-interactive and comply with <strong>the</strong> terms of <strong>the</strong> license. Although <strong>the</strong>statutory provisi<strong>on</strong>s are quite complex, Secti<strong>on</strong> 114 generally requires that <strong>the</strong> service not violate<strong>the</strong> “sound recording performance complement,” 2183 not publish in advance a schedule of <strong>the</strong>programming to be performed, not cause any receiving device to switch from <strong>on</strong>e programchannel to ano<strong>the</strong>r, include in each transmissi<strong>on</strong> certain identifying informati<strong>on</strong> encoded in eachsound recording, pay <strong>the</strong> royalty fees, and comply with <strong>the</strong> associated terms and with anyrecordkeeping requirements promulgated by <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office. 2184available as of May 1, 2005 at www.ascap.com/licensing/radio/RMLC_License.pdf (main body of license) andwww.ascap.com/licensing/radio/FeeMethodology.pdf (allocati<strong>on</strong> formula).2180 17 U.S.C. § 114(d)(2)(A)(i).2181 The statutory license was expanded by <strong>the</strong> Digital Millennium <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act of 1998 (DMCA), Pub. L. No.105-304, to expressly cover n<strong>on</strong>-exempt eligible n<strong>on</strong>-subscripti<strong>on</strong> transmissi<strong>on</strong>s and n<strong>on</strong>-exempt transmissi<strong>on</strong>smade by preexisting satellite digital audio radio services. See 17 U.S.C. § 114(f).2182 17 U.S.C. § 114(j)(14).2183 Secti<strong>on</strong> 114(j)(13) provides: “The ‘sound recording performance complement’ is <strong>the</strong> transmissi<strong>on</strong> during any3-hour period, <strong>on</strong> a particular channel used by a transmitting entity, of no more than-(A) 3 different selecti<strong>on</strong>s of sound recordings from any <strong>on</strong>e ph<strong>on</strong>orecord lawfully distributed for publicperformance or sale in <strong>the</strong> United States, if no more than 2 such selecti<strong>on</strong>s are transmitted c<strong>on</strong>secutively; or(B) 4 different selecti<strong>on</strong>s of sound recordings-(i) by <strong>the</strong> same featured recording artist; or(ii) from any set or compilati<strong>on</strong> of ph<strong>on</strong>orecords lawfully distributed toge<strong>the</strong>r as a unit for publicperformance or sale in <strong>the</strong> United States,if no more than three such selecti<strong>on</strong>s are transmitted c<strong>on</strong>secutively:Provided, That <strong>the</strong> transmissi<strong>on</strong> of selecti<strong>on</strong>s in excess of <strong>the</strong> numerical limits provided for in clauses (A) and(B) from multiple ph<strong>on</strong>orecords shall n<strong>on</strong>e<strong>the</strong>less qualify as a sound recording performance complement if <strong>the</strong>programming of <strong>the</strong> multiple ph<strong>on</strong>orecords was not willfully intended to avoid <strong>the</strong> numerical limitati<strong>on</strong>sprescribed in such clauses.”2184 17 U.S.C. §§ 114(d)(2)(A)-(C) & 114(f)(2)-(4).- 475 -


The statute distinguishes between two types of subscripti<strong>on</strong> digital audio transmissi<strong>on</strong>s: (1) a“preexisting subscripti<strong>on</strong> service,” which is a n<strong>on</strong>-interactive subscripti<strong>on</strong> service performingaudio-<strong>on</strong>ly digital audio transmissi<strong>on</strong>s that was in existence and was making such transmissi<strong>on</strong>sto <strong>the</strong> public for a fee <strong>on</strong> or before July 31, 1998; 2185 and (2) a “new subscripti<strong>on</strong> service,” whichis a n<strong>on</strong>-interactive subscripti<strong>on</strong> service performing digital audio transmissi<strong>on</strong>s and that is not apreexisting subscripti<strong>on</strong> service or a “preexisting satellite digital audio radio service” (defined in<strong>the</strong> third bullet below). 2186Eligible N<strong>on</strong>subscripti<strong>on</strong> Transmissi<strong>on</strong>s (Webcasting): by means of an “eligible n<strong>on</strong>subscripti<strong>on</strong>transmissi<strong>on</strong>,” which is defined as “a n<strong>on</strong>interactive n<strong>on</strong>subscripti<strong>on</strong> digital audio transmissi<strong>on</strong>not exempt under subsecti<strong>on</strong> (d)(1) that is made as part of a service that provides audioprogramming c<strong>on</strong>sisting, in whole or in part, of performances of sound recordings, includingretransmissi<strong>on</strong>s of broadcast transmissi<strong>on</strong>s, if <strong>the</strong> primary purpose of <strong>the</strong> service is to provide to<strong>the</strong> public such audio or o<strong>the</strong>r entertainment programming, and <strong>the</strong> primary purpose of <strong>the</strong>service is not to sell, advertise, or promote particular products or services o<strong>the</strong>r than soundrecordings, live c<strong>on</strong>certs, or o<strong>the</strong>r music-related events.” 2187 The c<strong>on</strong>diti<strong>on</strong>s for <strong>the</strong> statutorylicense for eligible n<strong>on</strong>subscripti<strong>on</strong> transmissi<strong>on</strong>s are very similar to those of n<strong>on</strong>exempt digitalsubscripti<strong>on</strong> transmissi<strong>on</strong>s noted above.Preexisting Satellite Digital Audio Radio Services: by means of a “preexisting satellite digitalaudio radio service” (not exempt under Secti<strong>on</strong> 114(d)(1)), which is defined as “a subscripti<strong>on</strong>satellite digital audio radio service provided pursuant to a satellite digital audio radio servicelicense issued by <strong>the</strong> Federal Communicati<strong>on</strong>s Commissi<strong>on</strong> <strong>on</strong> or before July 31, 1998, and anyrenewal of such license to <strong>the</strong> extent of <strong>the</strong> scope of <strong>the</strong> original license, and may include alimited number of sample channels representative of <strong>the</strong> subscripti<strong>on</strong> service that are madeavailable <strong>on</strong> a n<strong>on</strong>subscripti<strong>on</strong> basis in order to promote <strong>the</strong> subscripti<strong>on</strong> service.” 2188 To beeligible for <strong>the</strong> statutory license, <strong>the</strong> service must not exceed <strong>the</strong> sound recording performancecomplement and must not publish in advance a schedule of <strong>the</strong> programming to beperformed. 2189Pursuant to its statutory authority, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office c<strong>on</strong>ducted a number of <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>Arbitrati<strong>on</strong> Royalty Panel (CARP) proceedings 2190 to establish <strong>the</strong> royalty rates to be paid for <strong>the</strong>statutory license. For example, <strong>on</strong> May 8, 1998, <strong>the</strong> Librarian of C<strong>on</strong>gress issued an initialdeterminati<strong>on</strong> of rates and terms for <strong>the</strong> statutory license to be paid by n<strong>on</strong>exempt subscripti<strong>on</strong>2185 Id. § 114(j)(11).2186 Id. § 114(j)(8).2187 Id. § 114(j)(6).2188 Id. § 114(j)(10).2189 Id. § 114(d)(2)(B).2190 The <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Royalty Tribunal Reform Act of 1993, Pub. L 103-198, 107 Stat. 2304, eliminated <strong>the</strong><str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Royalty Tribunal (CRT) and replaced it with a system of ad hoc <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Arbitrati<strong>on</strong> RoyaltyPanels (CARPs) administered by <strong>the</strong> Librarian of C<strong>on</strong>gress and <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office. The CARPs adjustroyalty rates and distribute royalties collected under <strong>the</strong> various compulsory licenses and statutory obligati<strong>on</strong>sof <strong>the</strong> copyright statute.- 476 -


digital transmissi<strong>on</strong> services, imposing a royalty rate of 6.5% of gross revenues from U.S.residential subscribers. 2191The <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office subsequently initiated separate CARP proceedings to set rates andterms for transmissi<strong>on</strong>s made by “eligible n<strong>on</strong>subscripti<strong>on</strong> services” and those transmissi<strong>on</strong>smade by “pre-existing satellite digital audio radio services.” 2192 The latter proceeding was alsoto establish rates and terms for transmissi<strong>on</strong>s made during <strong>the</strong> period Jan. 1, 2001, to Dec. 31,2002, by “preexisting subscripti<strong>on</strong> services” (i.e., <strong>the</strong> three subscripti<strong>on</strong> services in existenceprior to <strong>the</strong> passage of <strong>the</strong> DMCA, as discussed in <strong>the</strong> next subsecti<strong>on</strong>). Nei<strong>the</strong>r proceedingc<strong>on</strong>sidered rates and terms for transmissi<strong>on</strong>s made by “new subscripti<strong>on</strong> services.” The mannerin which rates have subsequently been set for <strong>the</strong> various categories of services are enumeratedin <strong>the</strong> following subsecti<strong>on</strong>s.(a) Preexisting Subscripti<strong>on</strong> ServicesIn early 2003, three preexisting subscripti<strong>on</strong> services (Music Choice, DMX Music Inc.,and Muzak LLC) reached agreement with <strong>the</strong> RIAA, American Federati<strong>on</strong> of Televisi<strong>on</strong> andRadio Artists, and American Federati<strong>on</strong> of Musicians of <strong>the</strong> United States and Canada <strong>on</strong> what<strong>the</strong> terms and rates should be for <strong>the</strong> use of sound recordings by <strong>the</strong> preexisting subscripti<strong>on</strong>services under <strong>the</strong> Secti<strong>on</strong> 114 statutory license. On Jan. 30, 2003, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Officepublished <strong>the</strong> proposed rates and terms for comment <strong>on</strong> <strong>the</strong>ir possible adopti<strong>on</strong> without <strong>the</strong>c<strong>on</strong>vening of a CARP. The proposal covered rates and terms for <strong>the</strong> period Jan. 1, 2002 throughDec. 31, 2007. SoundExchange would be <strong>the</strong> agent designated to receive <strong>the</strong> royaltypayments. 2193 On July 3, 2003, having received no objecti<strong>on</strong>s, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office adopted <strong>the</strong>proposed rates and terms as final. Licensees were required to pay 7% of m<strong>on</strong>thly gross revenuesfrom residential services in <strong>the</strong> United States for <strong>the</strong> period Jan. 1, 2002 through Dec. 31, 2003,and 7.25 % for Jan. 1, 2004 through Dec. 31, 2007. In additi<strong>on</strong>, an advance payment of$100,000 was required each year, due by Jan. 20 of each year. 2194On Nov. 30, 2004, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Royalty and Distributi<strong>on</strong> Reform Act of 2004(“CRDRA”) 2195 was enacted, with an effective date of May 31, 2005. That Act eliminated <strong>the</strong>CARP system and replaced it with a <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Royalty Board (CRB) comprised of threepermanent <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Royalty Judges (CRJs).2191 63 Fed. Reg. 25394 (May 8, 1998). The determinati<strong>on</strong> was appealed by <strong>the</strong> RIAA. The D.C. Circuit affirmed<strong>the</strong> rates, although it remanded <strong>the</strong> matter of certain payment terms to <strong>the</strong> Librarian for fur<strong>the</strong>r proceedings.Recording Industry Ass'n of Am. v. Librarian of C<strong>on</strong>gress, 176 F.3d 528 (D.C. Cir. 1999).2192 66 Fed. Reg. 1700 (Jan. 9, 2001). A “pre-existing satellite digital audio radio service” is “a subscripti<strong>on</strong>satellite digital audio radio service provided pursuant to a satellite digital audio radio service license issued by<strong>the</strong> Federal Communicati<strong>on</strong>s Commissi<strong>on</strong> <strong>on</strong> or before July 31, 1998, and any renewal of such license to <strong>the</strong>extent of <strong>the</strong> scope of <strong>the</strong> original license, and may include a limited number of sample channels representativeof <strong>the</strong> subscripti<strong>on</strong> service that are made available <strong>on</strong> a n<strong>on</strong>subscripti<strong>on</strong> basis in order to promote <strong>the</strong>subscripti<strong>on</strong> service.” 17 U.S.C. § 114(j)(10).2193 68 Fed. Reg. 4744 (Jan. 31, 2003).2194 68 Fed. Reg. 39837 (July 3, 2003).2195 Pub. L. No. 108-419, 118 Stat. 2341 (2004).- 477 -


On Jan. 9, 2006, <strong>the</strong> CRB announced commencement of a proceeding to determine ratesand terms of royalty payments under Secti<strong>on</strong>s 114 and 112 for preexisting subscripti<strong>on</strong> servicesand preexisting satellite digital audio radio services (“SDARS”). 2196 SoundExchange, MusicChoice, Muzak, XM, Sirius, Royalty Logic Inc. and THP Capstar Acquisiti<strong>on</strong> dba DMX Music,all filed petiti<strong>on</strong>s in resp<strong>on</strong>se. DMX and Sirius asserted that <strong>the</strong>y qualified as preexistingsubscripti<strong>on</strong> services and were thus eligible for <strong>the</strong> earlier, below-market rates established by <strong>the</strong>CARP in May 1998 and revised in July 2003. SoundExchange challenged this asserti<strong>on</strong>, arguingthat <strong>the</strong>y did not qualify under as a preexisting service under Secti<strong>on</strong> 114(j)(11) because nei<strong>the</strong>rhad provided digital audio transmissi<strong>on</strong>s <strong>on</strong> or before July 31, 1998. On Aug. 21, 2006, <strong>the</strong> CRBreferred this questi<strong>on</strong> to <strong>the</strong> Register of <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>s for a ruling. 2197In November of 2006, in resp<strong>on</strong>se to <strong>the</strong> CRB’s request, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office publishedin <strong>the</strong> Federal Register a memorandum opini<strong>on</strong> c<strong>on</strong>cluding that “eligibility for a preexistingsubscripti<strong>on</strong> service license is limited to subscripti<strong>on</strong> services that satisfy <strong>the</strong> definiti<strong>on</strong> of 17U.S.C. § 114(j)(11), which includes being in operati<strong>on</strong> <strong>on</strong> July 31, 1998 and c<strong>on</strong>tinuouslyoperating since that time. In 1998, C<strong>on</strong>gress identified those entities which satisfied <strong>the</strong>definiti<strong>on</strong> and were eligible at that time as being DMX, Music Choice and <strong>the</strong> DiSH Network.Therefore, today, those same services are <strong>the</strong> <strong>on</strong>ly <strong>on</strong>es that may qualify as being preexistingsubscripti<strong>on</strong> services, since <strong>the</strong>y are <strong>the</strong> <strong>on</strong>ly <strong>on</strong>es which can satisfy <strong>the</strong> requirement of being inoperati<strong>on</strong> as of July 31, 1998. Moreover, for purposes of participating in a rate settingproceeding, <strong>the</strong> term ‘preexisting subscripti<strong>on</strong> service’ is best interpreted as meaning <strong>the</strong>business entity which operates under <strong>the</strong> statutory license. A determinati<strong>on</strong> of whe<strong>the</strong>r DMX is<strong>the</strong> same service that was identified by <strong>the</strong> legislative history in 1998 and has operatedc<strong>on</strong>tinuously since that time requires a factual analysis that is bey<strong>on</strong>d <strong>the</strong> scope of <strong>the</strong> Register’sauthority for questi<strong>on</strong>s presented under 17 U.S.C. § 802(f)(1)(B).” 2198Over <strong>the</strong> next year, various parties ei<strong>the</strong>r entered into independent settlementarrangements with SoundExchange, were dismissed by <strong>the</strong> CRB, or withdrew from <strong>the</strong>proceedings, leaving <strong>on</strong>ly Sirius and XM to proceed as SDARS. 2199 On Jan. 10, 2008, <strong>the</strong> CRBissued its decisi<strong>on</strong> setting <strong>the</strong> statutory royalty rate that XM and Sirius must pay to artists andrecord labels through 2012 as follows: 6.0% for 2007 and 2008; 6.5% for 2009; 7.0% for 2010;7.5% for 2011; and 8.0% for 2012. The CRB ruled that <strong>the</strong>se rates were inclusive of <strong>the</strong> Secti<strong>on</strong>112 ephemeral license, but declined to ascribe any particular percentage of <strong>the</strong> Secti<strong>on</strong> 114royalty as representative of <strong>the</strong> value of <strong>the</strong> Secti<strong>on</strong> 112 license. 22002196 71 Fed. Reg. 1455 (Jan. 9, 2006).2197 “<str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Royalty Board Sets New Rates for Satellite Radio Providers XM and Sirius,” BNA’s Patent,Trademark & <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Journal (Dec. 14, 2007) at 160.2198 71 Fed. Reg. 64639, 64640 (Nov. 3, 2006).2199 “<str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Royalty Board Sets New Rates for Satellite Radio Providers XM and Sirius,” BNA’s Patent,Trademark & <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Journal (Dec. 14, 2007) at 160-61.2200 73 Fed. Reg. 4080, 4102 (Jan. 24, 2008).- 478 -


(b) Eligible N<strong>on</strong>subscripti<strong>on</strong> Services (Webcasters)While <strong>the</strong> CARP proceedings for eligible n<strong>on</strong>subscripti<strong>on</strong> services were pending, <strong>the</strong>major record labels and representatives of various FCC-licensed broadcasters reached anagreement in Dec. 2001 <strong>on</strong> royalty rates to be paid by FCC-licensed broadcasters when <strong>the</strong>ysimultaneously stream <strong>the</strong>ir AM/FM broadcasts during <strong>the</strong> period from Oct. 28, 1998 throughDec. 31, 2008. 2201 The settling parties submitted a request to <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office to withdrawfrom <strong>the</strong> CARP, fur<strong>the</strong>r requesting that <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office withdraw <strong>the</strong> issue of AM/FMstreaming from <strong>the</strong> CARP and publish <strong>the</strong> settled rates in <strong>the</strong> Federal Register for publiccomment after <strong>the</strong> CARP had delivered its report <strong>on</strong> <strong>the</strong> remaining issues in <strong>the</strong> proceeding.They requested that, if <strong>the</strong>re were no objecti<strong>on</strong>s to <strong>the</strong> published settled rates, <strong>the</strong> Librarian ofC<strong>on</strong>gress adopt those rates. The settling parties insisted, however, that <strong>the</strong> settled rates not berevealed to <strong>the</strong> CARP before <strong>the</strong> CARP’s determinati<strong>on</strong> of <strong>the</strong> royalty rates that should apply t<strong>on</strong><strong>on</strong>subscripti<strong>on</strong> digital audio transmissi<strong>on</strong>s o<strong>the</strong>r than AM/FM streaming (i.e., webcasting). 2202The <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office rejected <strong>the</strong> settling parties’ requests, noting that nei<strong>the</strong>r <strong>the</strong>copyright statute nor existing regulati<strong>on</strong>s provided for negotiati<strong>on</strong> and settlement of generallyapplicable royalty rates after a CARP has been empaneled. The <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office <strong>the</strong>refore ruledthat <strong>the</strong> AM/FM streaming rate would have to be resolved in <strong>the</strong> CARP proceeding, and fur<strong>the</strong>rnoted that <strong>the</strong> parties were free to make a joint submissi<strong>on</strong> to <strong>the</strong> CARP urging that it adopt <strong>the</strong>rates up<strong>on</strong> which <strong>the</strong>y had agreed. 2203The CARP issued its ruling <strong>on</strong> Feb. 20, 2002, setting <strong>the</strong> recommended performance feesat 0.14 cents per performance for webcasting to <strong>Internet</strong> listeners for free and at 0.07 cents perperformance for simultaneous webcasting of AM/FM broadcasts by traditi<strong>on</strong>al FCC-licensedbroadcasters. 2204 The CARP’s recommendati<strong>on</strong>s were reviewed by <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office, whichrecommended to <strong>the</strong> Librarian of C<strong>on</strong>gress that <strong>the</strong> Librarian reject <strong>the</strong> rates set forth in <strong>the</strong>CARP’s report. On June 20, 2002, <strong>the</strong> Librarian published his final decisi<strong>on</strong> <strong>on</strong> <strong>the</strong> matter, whichaband<strong>on</strong>ed <strong>the</strong> CARP’s two-tiered rate structure of 0.14 cents per performance for <strong>Internet</strong>-<strong>on</strong>lytransmissi<strong>on</strong>s and 0.07 cents for each retransmissi<strong>on</strong> of a performance in an AM/FM radiobroadcast, deciding instead that <strong>the</strong> rate of 0.07 cents should apply to both types of transmissi<strong>on</strong>.The foregoing rates applied for <strong>the</strong> period from Oct. 28, 1998 through Dec. 31, 2002. 2205 TheRegister of <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>’s rati<strong>on</strong>ale for rejecti<strong>on</strong> of <strong>the</strong> CARP rates, toge<strong>the</strong>r with <strong>the</strong> Librarian’sorder adopting <strong>the</strong> Register’s recommendati<strong>on</strong>, were published <strong>on</strong> July 8, 2003 at 67 Fed. Reg.2201 Order, Docket No. 2000-9 CARP DTRA 1&2 (Jan. 7, 2002), at 1.2202 Id.2203 Id. at 1-2.2204 The CARP Report was available <strong>on</strong>line as of Feb. 20, 2002 atwww.loc.gov/copyright/carp/webcasting_rates.html.2205 Librarian of C<strong>on</strong>gress, “Webcasting Determinati<strong>on</strong>,” available as of June 21, 2002 atwww.copyright.gov/carp/webcasting_rates_final.html.- 479 -


45239. The D.C. Circuit rejected various challenges to <strong>the</strong> Librarian’s decisi<strong>on</strong>, allowing it tostand. 2206On Jan. 30, 2002, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office announced <strong>the</strong> initiati<strong>on</strong> of <strong>the</strong> next voluntary sixm<strong>on</strong>thnegotiati<strong>on</strong> period for determining reas<strong>on</strong>able rates and terms for eligible n<strong>on</strong>subscripti<strong>on</strong>services for <strong>the</strong> 2003-2004 period. 2207 No settlements were reached and <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office <strong>on</strong>Nov. 20, 2002 requested interested parties to file notices of intent to participate in, and writtencomments and proposals for <strong>the</strong> scheduling of, a CARP proceeding. 2208On Dec. 4, 2002, President Bush signed into law <strong>the</strong> Small Webcaster Settlement Act of2002 (“SWSA”), Pub. L. 107-321, 116 Stat. 2780, which amended <strong>the</strong> royalty rates to be paidfor <strong>the</strong> secti<strong>on</strong> 112 and secti<strong>on</strong> 114 statutory licenses by an “eligible small webcaster” and byn<strong>on</strong>commercial webcasters. The SWSA is <strong>the</strong> legislative embodiment of an agreementnegotiated between small webcasters and <strong>the</strong> RIAA. 2209 Am<strong>on</strong>g o<strong>the</strong>r things, <strong>the</strong> SWSA allowsSoundExchange, <strong>the</strong> Receiving Agent designated by <strong>the</strong> Librarian of C<strong>on</strong>gress in his June 20,2002 order for collecting royalty payments made by eligible n<strong>on</strong>subscripti<strong>on</strong> transmissi<strong>on</strong>services under <strong>the</strong> secti<strong>on</strong> 112 and secti<strong>on</strong> 114 statutory licenses, 2210 to enter into agreements <strong>on</strong>behalf of all copyright owners and performers to set rates, terms and c<strong>on</strong>diti<strong>on</strong>s for eligible smallwebcasters operating under those statutory licenses.Secti<strong>on</strong> 8(f) of <strong>the</strong> SWSA defines an “eligible small webcaster” as “a pers<strong>on</strong> or entity thathas obtained a compulsory license under 17 U.S.C. 112 or 114 and <strong>the</strong> implementing regulati<strong>on</strong>s<strong>the</strong>refor to make eligible n<strong>on</strong>subscripti<strong>on</strong> transmissi<strong>on</strong>s and ephemeral recordings that--(1) For <strong>the</strong> period beginning <strong>on</strong> October 28, 1998, and ending <strong>on</strong> December 31, 2002, hasgross revenues during <strong>the</strong> period beginning <strong>on</strong> November 1, 1998, and ending <strong>on</strong> June30, 2002, of not more than $1,000,000;(2) For 2003, toge<strong>the</strong>r with its affiliates, has gross revenues during 2003 of not more than$500,000; and(3) For 2004, toge<strong>the</strong>r with its affiliates, has gross revenues plus third party participati<strong>on</strong>revenues and revenues from <strong>the</strong> operati<strong>on</strong> of new subscripti<strong>on</strong> services during 2004 ofnot more than $1,250,000.” 2211The SWSA governed <strong>the</strong> period from Oct. 28, 1998 through Dec. 31, 2004. During thatperiod, eligible small webcasters could elect to pay <strong>the</strong> royalty rates established by <strong>the</strong> SWSAra<strong>the</strong>r than <strong>the</strong> statutory rates determined by any o<strong>the</strong>r applicable method, such as a CARP2206 Beethoven.com LLC v. Librarian of C<strong>on</strong>gress, 394 F.3d 939 (D.C. Cir. 2005).2207 67 Fed. Reg. 4472 (Jan. 30, 2002).2208 67 Fed. Reg. 70093 (Nov. 20, 2002).2209 The agreement is published at 67 Fed. Reg. 78510 (Dec. 24, 2002).2210 See 67 Fed. Reg. 45239 (July 8, 2002).2211 Id. at 78513.- 480 -


proceeding. To be eligible for <strong>the</strong> SWSA rates, an eligible small webcaster was required tosubmit a completed and signed electi<strong>on</strong> form to SoundExchange by no later than <strong>the</strong> first date <strong>on</strong>which <strong>the</strong> webcaster would have to make a royalty payment under <strong>the</strong> SWSA. Subject to certainminimum annual fees, <strong>the</strong> royalty rates under <strong>the</strong> SWSA for Oct. 28, 1998 through Dec. 31, 2002were 8 percent of a webcaster’s gross revenues or 5 percent of its expenses, whichever is greater.For 2003 and 2004, <strong>the</strong> royalty rates were 10 percent of <strong>the</strong> webcaster's first $250,000 in grossrevenues and 12 percent of any gross revenues in excess of $250,000 during <strong>the</strong> applicable year,or 7 percent of <strong>the</strong> webcaster's expenses during <strong>the</strong> applicable year, whichever is greater. 2212Under Secti<strong>on</strong> 5 of <strong>the</strong> SWSA, <strong>the</strong> minimum annual fees ranged from $500 to $5,000, dependingup<strong>on</strong> <strong>the</strong> year and <strong>the</strong> gross revenues of <strong>the</strong> webcaster. 2213In June of 2003, <strong>the</strong> RIAA and educati<strong>on</strong>al and o<strong>the</strong>r tax exempt instituti<strong>on</strong>s reached anagreement under which college radio stati<strong>on</strong>s and o<strong>the</strong>r educati<strong>on</strong>al broadcast stati<strong>on</strong>s staffedsubstantially by students enrolled and <strong>the</strong> educati<strong>on</strong>al instituti<strong>on</strong> could pay even fur<strong>the</strong>rdiscounted license fees for webcasting in <strong>the</strong> amount of a flat fee of $200 annually for <strong>the</strong> years1998 and 1999, $250 annually for <strong>the</strong> years 2000 through 2003, and a fee of $500 for 2004,except that educati<strong>on</strong>al instituti<strong>on</strong>s having fewer than 10,000 students could c<strong>on</strong>tinue to pay <strong>on</strong>ly$250 in 2004. The agreement allowed n<strong>on</strong>commercial webcasters at o<strong>the</strong>r tax exemptinstituti<strong>on</strong>s to pay an annual fee of between $200 and $500, depending up<strong>on</strong> whe<strong>the</strong>r <strong>the</strong>webcasting is d<strong>on</strong>e through a single or multiple channels. The agreement applied retroactivelyto October 28, 1998 and lasted through <strong>the</strong> end of 2004. 2214In May of 2003, <strong>the</strong> Digital Media Associati<strong>on</strong>, <strong>the</strong> American Federati<strong>on</strong> of Televisi<strong>on</strong>and Radio Artists, <strong>the</strong> American Federati<strong>on</strong> of Musicians of <strong>the</strong> United States and Canada, and<strong>the</strong> RIAA, acting under <strong>the</strong> provisi<strong>on</strong>s of <strong>the</strong> SWSA, agreed <strong>on</strong> a proposal for royalty rates to bepaid by eligible n<strong>on</strong>-subscripti<strong>on</strong> services for <strong>the</strong> 2003 and 2004 statutory licensing period andby new subscripti<strong>on</strong> services from 1998 through Dec. 31, 2004 (<strong>the</strong> “SWSA Agreement”), andsubmitted <strong>the</strong> proposal to <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office for possible adopti<strong>on</strong> without a CARP. Theagreement also established proposed rates for <strong>Internet</strong> streaming of AM/FM broadcasts. On May20, 2003, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office published <strong>the</strong> proposal for comment, which would establish <strong>the</strong>royalty rates for each of <strong>the</strong> three categories of services set forth in <strong>the</strong> table below. 2215 On Feb.6, 2004, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office adopted <strong>the</strong> proposal as a final rule. 2216Eligible N<strong>on</strong>-subscripti<strong>on</strong>ServicesOpti<strong>on</strong> of paying royalties as follows:Per Performance Opti<strong>on</strong> – 0.0762 cents per performancefor digital audio transmissi<strong>on</strong>sAggregate Tuning Hour Opti<strong>on</strong> – 1.17 cents per aggregatetuning hour for all channels and stati<strong>on</strong>s except channelsand stati<strong>on</strong>s where <strong>the</strong> programming c<strong>on</strong>sists of n<strong>on</strong>-music2212 Id. at 78511.2213 Id. at 78512.2214 68 Fed. Reg. 35008 (June 11, 2003).2215 68 Fed. Reg. 27506 (May 20, 2003).2216 69 Fed. Reg. 5693 (Feb. 6, 2004).- 481 -


New Subscripti<strong>on</strong> Services<strong>Internet</strong> Streaming ofAM/FM Broadcastsprogramming, such as news, talk, sports or businessprogramming. For such n<strong>on</strong>-music channels and stati<strong>on</strong>s,<strong>the</strong> licensee must pay 0.0762 cents per aggregate tuninghour.Minimum Annual Fee: $2,500Ephemeral Recordings: These rates will be deemed toinclude <strong>the</strong> royalties payable for ephemeral recordingsOpti<strong>on</strong>s of paying royalties as follows:Per Performance Opti<strong>on</strong> – 0.0762 cents per performancefor digital audio transmissi<strong>on</strong>sAggregate Tuning Hour Opti<strong>on</strong> – 1.17 cents per aggregatetuning hour for all channels and stati<strong>on</strong>s except channelsand stati<strong>on</strong>s where <strong>the</strong> programming c<strong>on</strong>sists of n<strong>on</strong>-musicprogramming, such as news, talk, sports or businessprogramming. For such n<strong>on</strong>-music channels and stati<strong>on</strong>s,<strong>the</strong> licensee must pay 0.0762 cents per aggregate tuninghour.Percentage of Subscripti<strong>on</strong> Revenues Opti<strong>on</strong> – 10.9% ofsubscripti<strong>on</strong> service revenue, but in no event less than 27cents per m<strong>on</strong>th for each pers<strong>on</strong> who subscribes.Minimum Annual Fee: $2,500Ephemeral Recordings: These rates will be deemed toinclude <strong>the</strong> royalties payable for ephemeral recordingsStreaming: 0.88 cents per aggregate tuning hourEphemeral Recordings: The rate for ephemeral recordingsby business establishment services is 10% of grossproceeds.Webcasters wishing to take advantage of <strong>the</strong> SWSA Agreement were required to submita completed and signed electi<strong>on</strong> form to SoundExchange no later than 30 days after <strong>the</strong>publicati<strong>on</strong> of <strong>the</strong> rates and terms in <strong>the</strong> Federal Register, or for those webcasters who had notyet made a digital audio transmissi<strong>on</strong> as of such publicati<strong>on</strong>, no later than <strong>the</strong> first date <strong>on</strong> which<strong>the</strong>y would be obligated to make royalty payments.On August 21, 2003, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office published proposed rates and terms forn<strong>on</strong>commercial webcasters who elected not to operate under <strong>the</strong> rates and terms set under <strong>the</strong>SWSA Agreement. 2217 Those proposed rates and terms were <strong>the</strong> same as those that were set for<strong>the</strong> period ending December 31, 2002 in <strong>the</strong> Order of <strong>the</strong> Librarian of C<strong>on</strong>gress published July 8,2002 at 67 Fed. Reg. 45239. On Feb. 6, 2004, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office adopted <strong>the</strong> proposed ratesand terms as a final rule for <strong>the</strong> 2003 and 2004 statutory licensing period. 22182217 68 Fed. Reg. 50493 (Aug. 21, 2003).2218 69 Fed. Reg. 5693 (Feb. 6, 2004).- 482 -


On June 18, 2003, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office issued a final rule governing SoundExchange as<strong>the</strong> authorized agency to collect and distribute <strong>the</strong> statutory royalties for subscripti<strong>on</strong> digitaltransmissi<strong>on</strong> services and webcasting, including small webcasters. 2219 The rules governing <strong>the</strong>collecti<strong>on</strong>, distributi<strong>on</strong>, and audit of royalties by SoundExchange may be found at 37 C.F.R. §§260.3 & 260.6.As noted earlier, <strong>on</strong> Nov. 30, 2004, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Royalty and Distributi<strong>on</strong> Reform Actof 2004 (“CRDRA”) 2220 was enacted, with an effective date of May 31, 2005. That Acteliminated <strong>the</strong> CARP system and replaced it with a <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Royalty Board (CRB) comprisedof three permanent <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Royalty Judges (CRJs). The Act also reformed <strong>the</strong> waywebcasters participate in <strong>the</strong> rate setting process. Webcasters must file a petiti<strong>on</strong> to participate,which costs $150 to file, but parties with similar interests may split <strong>the</strong> cost by filing a jointpetiti<strong>on</strong>. The CRJs provide a list of participants to all parties, who <strong>the</strong>n have three m<strong>on</strong>ths t<strong>on</strong>egotiate <strong>the</strong>ir own royalty rates. If <strong>the</strong> parties are unable to agree, <strong>the</strong> CRJs will accept writtencomments for four to five m<strong>on</strong>ths. These comments may include witness statements, testim<strong>on</strong>yand exhibits to be presented in <strong>the</strong> proceeding, as well as o<strong>the</strong>r informati<strong>on</strong> necessary to establishterms and rates. The comment period is followed by a 60-day discovery period. Finally, <strong>the</strong>parties have <strong>on</strong>e more opportunity to negotiate <strong>the</strong>ir own settlement at a settlement c<strong>on</strong>ferencescheduled by <strong>the</strong> CRJs to take place outside <strong>the</strong> presence of <strong>the</strong> CRJs. Only <strong>the</strong>n will <strong>the</strong> CRJsbegin proceedings to set <strong>the</strong> rates. 2221The Act also terminated <strong>the</strong> voluntary negotiati<strong>on</strong> proceeding initiated by <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>Office in January 2004 to set rates for <strong>the</strong> 2005-2006 period for eligible n<strong>on</strong>subscripti<strong>on</strong>services. 2222 On Feb. 8, 2005, as required by <strong>the</strong> Act, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office published a noticethat <strong>the</strong> rates and terms for <strong>the</strong> statutory licenses in effect <strong>on</strong> Dec. 31, 2004, for new subscripti<strong>on</strong>services, eligible n<strong>on</strong>subscripti<strong>on</strong> services, and services exempt under Secti<strong>on</strong> 114(d)(1)(C)(iv),as well as <strong>the</strong> rates and terms for small webcasters published in <strong>the</strong> Federal Register under <strong>the</strong>authority of <strong>the</strong> SWSA for <strong>the</strong> years 2003-2004, would remain in effect for at least 2005. 2223 OnFeb. 16, 2005, again as required by <strong>the</strong> Act, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office published a notice initiating aproceeding, and requesting petiti<strong>on</strong>s to participate <strong>the</strong>rein, to establish or adjust rates and termsfor <strong>the</strong> statutory licenses for new subscripti<strong>on</strong> services and eligible n<strong>on</strong>subscripti<strong>on</strong> services for<strong>the</strong> period commencing Jan. 1, 2006 through Dec. 31, 2010. 2224After two years of testim<strong>on</strong>y, <strong>on</strong> May 1, 2007, <strong>the</strong> CRB published in <strong>the</strong> Federal Registerits final rule and order setting forth its decisi<strong>on</strong> as to <strong>the</strong> royalties that “Commercial Webcasters”(i.e., n<strong>on</strong>-interactive new subscripti<strong>on</strong> services and eligible n<strong>on</strong>-subscripti<strong>on</strong> services, includingsimultaneous digital audio retransmissi<strong>on</strong>s of over-<strong>the</strong>-air AM or FM radio broadcasts) must pay2219 68 Fed. Reg. 36469 (June 18, 2003).2220 Pub. L. No. 108-419, 118 Stat. 2341 (2004).2221 Allis<strong>on</strong> Kidd, “The Beginning of <strong>the</strong> End of <strong>the</strong> <strong>Internet</strong> Radio Royalty Dispute,” Journal of <strong>Internet</strong> Law, Oct.2005, at 15, 22.2222 69 Fed. Reg. 689 (Jan. 6, 2004).2223 70 Fed. Reg. 6736 (Feb. 8, 2005).2224 70 Fed. Reg. 7970 (Feb. 16, 2005).- 483 -


to stream copyrighted music over <strong>the</strong> <strong>Internet</strong>. The new rates aband<strong>on</strong>ed <strong>the</strong> existingpercentage-of-revenue scheme in favor of an annual flat per-stati<strong>on</strong> rate structure up to aspecified cap, coupled with a per-performance rate for services that exceed <strong>the</strong> cap, where“performance” is defined as <strong>the</strong> streaming of <strong>on</strong>e s<strong>on</strong>g to <strong>on</strong>e listener. The annual per-channeland per-stati<strong>on</strong> rate for n<strong>on</strong>-commercial webcasters not exceeding 159,140 aggregate tuninghours per m<strong>on</strong>th and for Commercial Webcasters was set at $500 per year. The per-performancerates for transmissi<strong>on</strong>s in excess of that limit by n<strong>on</strong>-commercial webcasters, and for anytransmissi<strong>on</strong>s by Commercial Webcasters, retroactive to Jan. 1, 2006, were set at:$0.0008 for 2006$0.0011 for 2007$0.0014 for 2008$0.0018 for 2009$0.0019 for 2010These rates were inclusive of both <strong>the</strong> Secti<strong>on</strong> 114 license fees and <strong>the</strong> royalty payable underSecti<strong>on</strong> 112 for ephemeral recordings used solely to facilitate transmissi<strong>on</strong>s for which it paidroyalties. 2225The CRB’s decisi<strong>on</strong> caused great c<strong>on</strong>troversy and protest, particularly am<strong>on</strong>g smallwebcasters, who claimed <strong>the</strong> rates were so high that <strong>the</strong>y would put <strong>the</strong> webcasters out ofbusiness. Several bills were introduced in C<strong>on</strong>gress and negotiati<strong>on</strong>s with SoundExchange tookplace to reduce <strong>the</strong> rates for small webcasters. On May 22, 2007 SoundExchange announcedthat it would extend for ano<strong>the</strong>r three years (through 2010) <strong>the</strong> previous, lower rates under <strong>the</strong>SWSA for small webcasters (i.e., 10% of gross revenue up to $250,000 and 12% of revenueexceeding that amount). 2226 On Aug. 21, 2007, SoundExchange set out certain c<strong>on</strong>diti<strong>on</strong>s thathad to be met by a small webcaster to qualify for <strong>the</strong> favorable rates – <strong>the</strong> webcaster had to earnless than $1.2 milli<strong>on</strong> in total annual revenue and could not exceed a total of 5 milli<strong>on</strong> aggregatetuning hours each m<strong>on</strong>th. Should <strong>the</strong> threshold be exceeded, <strong>the</strong> webcaster would be required topay <strong>the</strong> CRB’s published rates. SoundExchange announced that <strong>the</strong> agreement would apply <strong>on</strong>lyto performance royalties collected <strong>on</strong> behalf of <strong>the</strong> 20,000 recording artists and 3,500 recordlabels represented by <strong>the</strong> collective – royalties due to o<strong>the</strong>r artists and labels would be payableunder <strong>the</strong> CRB’s rates. Interested webcasters had until Sept. 14, 2007 to accept <strong>the</strong> offer. 22272225 72 Fed. Reg. 24084, 24111 (May 1, 2007). The CRB’s decisi<strong>on</strong> was initially set forth in a report published <strong>on</strong>its web site <strong>on</strong> Mar. 2, 2007. Representatives of <strong>the</strong> Intercollegiate Broadcasting System Inc., DiMA, Nati<strong>on</strong>alPublic Radio, <strong>the</strong> Radio Broadcasters, Royalty Logic Inc., WHRB (FM), SoundExchange, and many smallcommercial webcasters filed a series of moti<strong>on</strong>s seeking a rehearing <strong>on</strong> <strong>the</strong> royalty scheme. On April 16, 2007,<strong>the</strong> CRB rejected <strong>the</strong> moti<strong>on</strong>s. On July 11, 2007, <strong>the</strong> U.S. Court of Appeals for <strong>the</strong> D.C. Circuit denied apetiti<strong>on</strong> filed by webcasters seeking to stay <strong>the</strong> CRB’s determinati<strong>on</strong>. “SoundExchange Offers WebcastersReprieve After D.C. Court Denies Petiti<strong>on</strong> to Stay,” BNA’s Patent, Trademark & <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Journal (July 20,2007) at 345.2226 Id.2227 “SoundExchange Agrees to Separate Royalty Deals Between Large and Small Webcasters,” BNA’s Patent,Trademark & <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Journal (Aug. 31, 2007) at 530.- 484 -


On Aug. 23, 2007, SoundExchange also announced an accord <strong>on</strong> <strong>the</strong> amount of feessome large webcasters would pay – specifically, that a $50,000 cap would replace <strong>the</strong> $500 perstati<strong>on</strong>minimum fee set by <strong>the</strong> CRB. In return for <strong>the</strong> cap, <strong>the</strong> signatory webcasters agreedwithin six m<strong>on</strong>ths to begin collecting and reporting census informati<strong>on</strong> <strong>on</strong> all s<strong>on</strong>gs streamedover <strong>the</strong> <strong>Internet</strong>. SoundExchange and DiMA also agreed to form a committee designed toanalyze <strong>the</strong> issue of audio stream-ripping and technological soluti<strong>on</strong>s that might be available.The agreement did not, however, disturb <strong>the</strong> CRB’s per-performance royalty fees. 2228On Aug. 10, 2007, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office, acting under <strong>the</strong> provisi<strong>on</strong>s of <strong>the</strong> CRDRA,formally terminated all open proceedings under <strong>the</strong> old CARP system. 2229(c) New Subscripti<strong>on</strong> ServicesOn Feb. 12, 2001, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office announced <strong>the</strong> initiati<strong>on</strong> of <strong>the</strong> six-m<strong>on</strong>thstatutory voluntary negotiati<strong>on</strong> period for determining reas<strong>on</strong>able rates and terms for <strong>the</strong>statutory license for new subscripti<strong>on</strong> services. 2230 No agreements were reached. After <strong>the</strong> closeof <strong>the</strong> negotiati<strong>on</strong> period, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office received petiti<strong>on</strong>s requesting that a CARP bec<strong>on</strong>vened to establish terms and rates for <strong>the</strong> statutory license covering new subscripti<strong>on</strong>services. The petiti<strong>on</strong>ers also requested that <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office c<strong>on</strong>solidate <strong>the</strong> proceeding fornew subscripti<strong>on</strong> services with <strong>the</strong> proceeding for pre-existing satellite digital audio radioservices and pre-existing subscripti<strong>on</strong> services. 2231 As discussed in <strong>the</strong> previous subsecti<strong>on</strong>, inMay of 2003, <strong>the</strong> Digital Media Associati<strong>on</strong>, <strong>the</strong> American Federati<strong>on</strong> of Televisi<strong>on</strong> and RadioArtists, <strong>the</strong> American Federati<strong>on</strong> of Musicians of <strong>the</strong> United States and Canada, and <strong>the</strong> RIAAagreed <strong>on</strong> a proposal for royalty rates to be paid by new subscripti<strong>on</strong> services for <strong>the</strong> period from1998 through Dec. 31, 2004, and submitted <strong>the</strong> proposal to <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office for possibleadopti<strong>on</strong> without a CARP. On May 20, 2003, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office published <strong>the</strong> proposal forcomment. 2232 On Feb. 6, 2004, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office adopted <strong>the</strong> proposal as a final rule. 2233As noted in <strong>the</strong> previous subsecti<strong>on</strong>, <strong>on</strong> Nov. 30, 2004, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Royalty andDistributi<strong>on</strong> Reform Act of 2004 2234 was enacted, with an effective date of May 31, 2005. ThatAct eliminated <strong>the</strong> CARP system and replaced it with three permanent <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> RoyaltyJudges. In additi<strong>on</strong>, <strong>the</strong> Act terminated <strong>the</strong> voluntary negotiati<strong>on</strong> proceeding initiated by <strong>the</strong><str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office in February 2004 to set rates for <strong>the</strong> 2005-2006 period for new subscripti<strong>on</strong>services. 2235 On Feb. 8, 2005, as required by <strong>the</strong> Act, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office published a noticethat <strong>the</strong> rates and terms for <strong>the</strong> statutory licenses in effect <strong>on</strong> Dec. 31, 2004, for new subscripti<strong>on</strong>2228 Id. at 529.2229 72 Fed. Reg. 45071 (Aug. 10, 2007).2230 66 Fed. Reg. 9881 (Feb. 12, 2001).2231 66 Fed. Reg. 58180 (Nov. 20, 2001).2232 68 Fed. Reg. 27506 (May 20, 2003).2233 69 Fed. Reg. 5693 (Feb. 6, 2004).2234 Pub. L. No. 108-419, 118 Stat. 2341 (2004).2235 69 Fed. Reg. 5196 (Feb. 3, 2004).- 485 -


services, eligible n<strong>on</strong>subscripti<strong>on</strong> services, and services exempt under Secti<strong>on</strong> 114(d)(1)(C)(iv),as well as <strong>the</strong> rates and terms for small webcasters published in <strong>the</strong> Federal Register under <strong>the</strong>authority of <strong>the</strong> SWSA for <strong>the</strong> years 2003-2004, would remain in effect for at least 2005. 2236 OnFeb. 16, 2005, again as required by <strong>the</strong> Act, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office published a notice initiating aproceeding, and requesting petiti<strong>on</strong>s to participate <strong>the</strong>rein, to establish or adjust rates and termsfor <strong>the</strong> statutory licenses for new subscripti<strong>on</strong> services and eligible n<strong>on</strong>subscripti<strong>on</strong> services for<strong>the</strong> period commencing Jan. 1, 2006. 2237After two years of testim<strong>on</strong>y, <strong>on</strong> May 1, 2007, <strong>the</strong> CRB published in <strong>the</strong> Federal Registerits final rule and order setting forth its decisi<strong>on</strong> as to <strong>the</strong> royalties that n<strong>on</strong>-interactive newsubscripti<strong>on</strong> services must pay to stream copyrighted music over <strong>the</strong> <strong>Internet</strong> for <strong>the</strong> period 2006through 2010. The details of that decisi<strong>on</strong> are set forth in <strong>the</strong> preceding subsecti<strong>on</strong>.3. The Digital Performance Right – What C<strong>on</strong>stitutes an “Interactive”ServiceThe Secti<strong>on</strong> 114 statutory license does not apply to an “interactive service.” Secti<strong>on</strong>114(j)(7) defines an “interactive service” as a service “that enables a member of <strong>the</strong> public toreceive a transmissi<strong>on</strong> of a program specially created for <strong>the</strong> recipient, or <strong>on</strong> request, atransmissi<strong>on</strong> of a particular sound recording, whe<strong>the</strong>r or not as part of a program, which isselected by or <strong>on</strong> behalf of <strong>the</strong> recipient.” Secti<strong>on</strong> 114(j)(7) fur<strong>the</strong>r provides that <strong>the</strong> “ability ofindividuals to request that particular sound recordings be performed for recepti<strong>on</strong> by <strong>the</strong> publicat large, or in <strong>the</strong> case of a subscripti<strong>on</strong> service, by all subscribers of <strong>the</strong> service, does not make aservice interactive, if <strong>the</strong> programming <strong>on</strong> each channel of <strong>the</strong> service does not substantiallyc<strong>on</strong>sist of sound recordings that are performed within 1 hour of <strong>the</strong> request or at a timedesignated by ei<strong>the</strong>r <strong>the</strong> transmitting entity or <strong>the</strong> individual making such request. If an entityoffers both interactive and n<strong>on</strong>interactive services (ei<strong>the</strong>r c<strong>on</strong>currently or at different times), <strong>the</strong>n<strong>on</strong>interactive comp<strong>on</strong>ent shall not be treated as part of an interactive service.”As might be expected, c<strong>on</strong>siderable c<strong>on</strong>troversy has arisen over <strong>the</strong> applicati<strong>on</strong> of <strong>the</strong>definiti<strong>on</strong> of “interactive service.” A number of lawsuits have been filed involving <strong>the</strong> issue:– On May 24, 2001, ten recording companies sued Launch Media, Inc. for copyrightinfringement, alleging that Launch’s LAUNCHcast service created an interactive radio stati<strong>on</strong> byproviding users with <strong>the</strong> ability to select specific artists, to rate artists and recordings, to selectcertain music that <strong>the</strong> user had or had not previously rated, to permanently block particularrecordings, to skip <strong>the</strong> current recording and move <strong>on</strong> to <strong>the</strong> next <strong>on</strong>e, and to pause <strong>the</strong> currentrecording and resume from <strong>the</strong> same point later. 2238 This lawsuit eventually led to a decisi<strong>on</strong> by<strong>the</strong> Sec<strong>on</strong>d Circuit <strong>on</strong> <strong>the</strong> meaning of an “interactive” service, discussed in subsecti<strong>on</strong> (a) below.2236 70 Fed. Reg. 6736 (Feb. 8, 2005).2237 70 Fed. Reg. 7970 (Feb. 16, 2005).2238 Hillel Parness, “<strong>Internet</strong> Radio: As RIAA and DiMA Prepare to Do Battle over ‘Interactivity,’ Questi<strong>on</strong>sResurface About ISP Liability,” Cyberspace Lawyer, July/August 2001, at 2, 4.- 486 -


– On June 1, 2001, Launch and o<strong>the</strong>r <strong>on</strong>line webcasters, acting through <strong>the</strong> DigitalMedia Associati<strong>on</strong> (DiMA), filed a declaratory judgment acti<strong>on</strong> against <strong>the</strong> RIAA, seeking adeclarati<strong>on</strong> that <strong>the</strong>ir webcasting services were eligible for <strong>the</strong> statutory license because <strong>the</strong>s<strong>on</strong>gs played “ultimately are generated by a computer in a manner designed to ensurecompliance with <strong>the</strong> DMCA’s statutory license provisi<strong>on</strong>”; users “do not determine <strong>the</strong> particularsound recordings or <strong>the</strong> particular artists which become <strong>the</strong> basis of <strong>the</strong> transmissi<strong>on</strong>; and [<strong>the</strong>y]have no ability to select or obtain advance knowledge as to <strong>the</strong> particular s<strong>on</strong>gs that are streamed<strong>on</strong> <strong>the</strong> stati<strong>on</strong>s”; “[a]rtist identificati<strong>on</strong> <strong>on</strong> <strong>the</strong> services is representative <strong>on</strong>ly”; <strong>the</strong> “skip”functi<strong>on</strong> <strong>on</strong> <strong>the</strong> services operates <strong>on</strong>ly forward and users “can never know which s<strong>on</strong>g <strong>the</strong>y are‘skipping forward to’”; and “[i]n all cases <strong>the</strong> c<strong>on</strong>sumer-influenced situati<strong>on</strong>s are available toevery member of <strong>the</strong> general public.” 2239 The United States District Court for <strong>the</strong> Sou<strong>the</strong>rnDistrict of New York denied <strong>the</strong> parties’ cross-moti<strong>on</strong>s for dismissal under F.R.C.P. 12(b)(6) andsummary judgment. 2240 Launch was later acquired by Yahoo, and settled with a number of <strong>the</strong>record companies. 2241– On June 8, 2001, <strong>the</strong> record companies resp<strong>on</strong>ded with three lawsuits against XACTRadio, Musicmatch, Inc., and MTVi Group, each of which provided c<strong>on</strong>sumers with access tostreamed music over <strong>the</strong> <strong>Internet</strong>, asserting against each <strong>the</strong> same basic allegati<strong>on</strong>s as c<strong>on</strong>tainedin <strong>the</strong> complaint against Launch. The complaint asserted that <strong>the</strong> use of <strong>the</strong> “skip” butt<strong>on</strong> byusers will cause <strong>the</strong> defendants to exceed <strong>the</strong> performance complement restricti<strong>on</strong>s. 2242Musicmatch subsequently settled its lawsuit with <strong>the</strong> record companies.Previously, <strong>on</strong> April 17, 2000, DiMA had sought to resolve <strong>the</strong> issues in <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>Office, filing a rulemaking petiti<strong>on</strong> that sought adopti<strong>on</strong> of <strong>the</strong> following proposed rulec<strong>on</strong>cerning <strong>the</strong> definiti<strong>on</strong> of a “Service” for purposes of <strong>the</strong> statutory license:A Service making transmissi<strong>on</strong>s that o<strong>the</strong>rwise meet <strong>the</strong> requirements for <strong>the</strong>secti<strong>on</strong> 114(f) statutory license is not rendered “interactive,” and thus ineligiblefor <strong>the</strong> statutory license, simply because <strong>the</strong> c<strong>on</strong>sumer may express preferences tosuch Service as to <strong>the</strong> musical genres, artists and sound recordings that may beincorporated into <strong>the</strong> Service's music programming to <strong>the</strong> public. Such a Serviceis not “interactive” under secti<strong>on</strong> 114(j)(7), as l<strong>on</strong>g as: (i) Its transmissi<strong>on</strong>s aremade available to <strong>the</strong> public generally; (ii) <strong>the</strong> features offered by <strong>the</strong> Service d<strong>on</strong>ot enable <strong>the</strong> c<strong>on</strong>sumer to determine or learn in advance what sound recordingswill be transmitted over <strong>the</strong> Service at any particular time; and (iii) itstransmissi<strong>on</strong>s do not substantially c<strong>on</strong>sist of sound recordings performed within2239 Id.2240 See Arista Records, LLC v. Launch Media, Inc., 578 F,3d 148, 150 (2d Cir. 2009).2241 Brad King, “Yahoo Launches Into Web Music” (June 28, 2001), available as of Feb. 22, 2002 atwww.wired.com/news/mp3/0,1285,44884,00.html.2242 Parness, supra note 2238, at 4.- 487 -


<strong>on</strong>e hour of a request or at a time designated by <strong>the</strong> transmitting entity or <strong>the</strong>individual making <strong>the</strong> request. 2243The <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office denied <strong>the</strong> petiti<strong>on</strong>, ruling, am<strong>on</strong>g o<strong>the</strong>r things, that “[i]n light of<strong>the</strong> rapidly changing business models emerging in today’s digital marketplace, no rule canaccurately draw <strong>the</strong> line demarcating <strong>the</strong> limits between an interactive service and an<strong>on</strong>interactive service. Nor can <strong>on</strong>e readily classify an entity which makes transmissi<strong>on</strong>s asexclusively interactive or n<strong>on</strong>interactive.” 2244 The Office c<strong>on</strong>cluded that <strong>the</strong> determinati<strong>on</strong> ofwhe<strong>the</strong>r a particular activity is “interactive” must be determined <strong>on</strong> a case by case basis up<strong>on</strong> afull evidentiary record. 2245(a) Arista Records v. Launch MediaIn Arista Records, LLC v. Launch Media, Inc., 2246 <strong>the</strong> Sec<strong>on</strong>d Circuit, affirming a jurydeterminati<strong>on</strong>, held that <strong>the</strong> LAUNCHcast webcasting service was not an “interactive” servicewithin <strong>the</strong> meaning of Secti<strong>on</strong> 114(j)(7) as a matter of law, 2247 and Launch Media could <strong>the</strong>reforerely <strong>on</strong> <strong>the</strong> statutory license for public performances via digital audio transmissi<strong>on</strong>s. TheLAUNCHcast service enabled a user to create “stati<strong>on</strong>s” that played s<strong>on</strong>gs within a particulargenre or similar to a particular artist or s<strong>on</strong>g <strong>the</strong> user selected. Specifically, up<strong>on</strong> registeringwith <strong>the</strong> service, <strong>the</strong> user would select artists whose music she preferred. The user would <strong>the</strong>nlist genres <strong>the</strong> user enjoyed and rate <strong>the</strong>m <strong>on</strong> a scale. The user was also asked <strong>the</strong> percentage ofs<strong>on</strong>gs <strong>the</strong> user had not previously rated <strong>the</strong> user would like to incorporate into <strong>the</strong> user’s stati<strong>on</strong>(<strong>the</strong> “unrated quota”). The minimum unrated quota was 20%. Once LAUNCHcast beganplaying music based <strong>on</strong> <strong>the</strong> user’s preferred artists and genres, <strong>the</strong> user would rate <strong>the</strong> s<strong>on</strong>gs,artists, and albums played between zero and 100. Below <strong>the</strong> rating field were hyperlinks termed“history,” “share,” and “buy.” The history hyperlink allowed <strong>the</strong> user to see a list of <strong>the</strong> s<strong>on</strong>gspreviously played, and <strong>the</strong> buy hyperlink facilitated <strong>the</strong> user’s purchase of <strong>the</strong> s<strong>on</strong>gs. The sharehyperlink allowed <strong>the</strong> user to share <strong>the</strong> stati<strong>on</strong> with o<strong>the</strong>r users. That feature facilitated <strong>the</strong>subscripti<strong>on</strong> of <strong>on</strong>e user to ano<strong>the</strong>r user’s stati<strong>on</strong>. While a s<strong>on</strong>g played, <strong>the</strong> user had <strong>the</strong> abilityto pause <strong>the</strong> s<strong>on</strong>g, skip <strong>the</strong> s<strong>on</strong>g, or delete <strong>the</strong> s<strong>on</strong>g from <strong>the</strong> stati<strong>on</strong> by rating it zero. The userwas not able to go back to restart a s<strong>on</strong>g that was playing, or to repeat any of <strong>the</strong> previouslyplayed s<strong>on</strong>gs in <strong>the</strong> playlist. 2248Each time <strong>the</strong> user logged into <strong>the</strong> LAUNCHcast service and selected a stati<strong>on</strong>, <strong>the</strong>service generated a playlist of 50 s<strong>on</strong>gs selected from a hashtable of potential s<strong>on</strong>gs that could beput into <strong>the</strong> playlist. The hashtable was generated using a very complicated algorithm that tookinto account numerous variables, <strong>on</strong>ly some of which included <strong>the</strong> user’s preferred artists and2243 65 Fed. Reg. 77330, 77331 (Dec. 11, 2000).2244 Id. at 77332-33.2245 Id. at 77332.2246 578 F.3d 148 (2d Cir. 2009), cert. denied, 2010 U.S. LEXIS 810 (Jan. 25, 2010).2247 The court ruled that <strong>the</strong> issue of interactivity presents an issue of law. Id. at 151-52.2248 Id. at 157-58.- 488 -


genres and unrated quota. 2249 Although <strong>the</strong> playlist generated each time a user selected a radiostati<strong>on</strong> was unique to that user at that particular time, <strong>the</strong> Sec<strong>on</strong>d Circuit determined that <strong>the</strong>playlist was not “specially created for <strong>the</strong> recipient” via an interactive service within <strong>the</strong>meaning of Secti<strong>on</strong> 114(j)(7). Based <strong>on</strong> an extensive review of <strong>the</strong> legislative history of Secti<strong>on</strong>114(j)(7), <strong>the</strong> court noted that C<strong>on</strong>gress’ primary c<strong>on</strong>cern both in creating a performance right indigital audio transmissi<strong>on</strong>s and in excluding interactive services from <strong>the</strong> statutory performancelicense was to protect sound recording copyright holders from diminuti<strong>on</strong> in record sales.C<strong>on</strong>gress believed that interactive services, by providing predictability based <strong>on</strong> choices by <strong>the</strong>user, could approximate <strong>the</strong> predictability <strong>the</strong> music listener seeks when purchasing music,<strong>the</strong>reby diminishing music sales. The Sec<strong>on</strong>d Circuit <strong>the</strong>refore c<strong>on</strong>cluded that <strong>the</strong> touchst<strong>on</strong>e ofan interactive service is whe<strong>the</strong>r it is generating playlists specially created for <strong>the</strong> recipient thathave sufficient predictability to <strong>the</strong> user that <strong>the</strong> user’s willingness to purchase music will bediminished. 2250The Sec<strong>on</strong>d Circuit decided that <strong>the</strong> methodology used to select <strong>the</strong> playlists did notprovide <strong>the</strong> user sufficient c<strong>on</strong>trol to make <strong>the</strong> playlists so predictable that <strong>the</strong> user would chooseto listen to <strong>the</strong> webcast in lieu of purchasing music:First, <strong>the</strong> rules governing what s<strong>on</strong>gs are pooled in <strong>the</strong> hashtable ensure that <strong>the</strong>user has almost no ability to choose, let al<strong>on</strong>e predict, which specific s<strong>on</strong>gs willbe pooled in anticipati<strong>on</strong> for selecti<strong>on</strong> to <strong>the</strong> playlist. At least 60% of <strong>the</strong> s<strong>on</strong>gs in<strong>the</strong> hashtable are generated by factors almost entirely bey<strong>on</strong>d <strong>the</strong> user's c<strong>on</strong>trol.The playlist – a total of fifty s<strong>on</strong>gs – is created from a pool of approximately10,000 s<strong>on</strong>gs, at least 6,000 of which (1,000 of <strong>the</strong> most highly ratedLAUNCHcast s<strong>on</strong>gs am<strong>on</strong>g all users and 5,000 randomly selected s<strong>on</strong>gs) areselected without any c<strong>on</strong>siderati<strong>on</strong> for <strong>the</strong> user's s<strong>on</strong>g, artist, or albumpreferences. The user has c<strong>on</strong>trol over <strong>the</strong> genre of s<strong>on</strong>gs to be played for 5,000s<strong>on</strong>gs, but this degree of c<strong>on</strong>trol is no different from a traditi<strong>on</strong>al radio listenerexpressing a preference for a country music stati<strong>on</strong> over a classic rock stati<strong>on</strong>.LAUNCHcast generates this list with safeguards to prevent <strong>the</strong> user from limiting<strong>the</strong> number of s<strong>on</strong>gs in <strong>the</strong> list eligible for play by selecting a narrow genre. Also,no more than 20% of <strong>the</strong> s<strong>on</strong>gs <strong>the</strong> user rates – marked by LAUNCHcast asexplicitly rated – can be pooled in <strong>the</strong> hashtable, and no more than three times <strong>the</strong>number of explicitly rated s<strong>on</strong>gs divided by <strong>the</strong> total number of rated s<strong>on</strong>gs canbe in <strong>the</strong> hashtable. This ensures that a limited number of explicitly rated s<strong>on</strong>gswill eventually be selected for <strong>the</strong> playlist. Ir<strong>on</strong>ically, this effectively means that<strong>the</strong> more s<strong>on</strong>gs <strong>the</strong> user explicitly rates, <strong>the</strong> less <strong>the</strong> user can predict whichexplicitly rated s<strong>on</strong>gs will be pooled in <strong>the</strong> hashtable and played <strong>on</strong> <strong>the</strong> playlist.Sec<strong>on</strong>d, <strong>the</strong> selecti<strong>on</strong> of s<strong>on</strong>gs from <strong>the</strong> hashtable to be included in <strong>the</strong> playlist isgoverned by rules preventing <strong>the</strong> user's explicitly rated s<strong>on</strong>gs from beinganywhere near a majority of <strong>the</strong> s<strong>on</strong>gs <strong>on</strong> <strong>the</strong> playlist. At minimum, 20% of <strong>the</strong>2249 Id. at 158-59.2250 Id. at 161.- 489 -


s<strong>on</strong>gs played <strong>on</strong> <strong>the</strong> stati<strong>on</strong> are unrated – meaning <strong>the</strong> user has never expressed apreference for those s<strong>on</strong>gs. If <strong>the</strong> user attempts to increase her chances of hearinga particular s<strong>on</strong>g by rating <strong>on</strong>ly a small number of s<strong>on</strong>gs – making <strong>the</strong> user's listof explicitly and implicitly rated s<strong>on</strong>gs smaller than 100 – 90% of <strong>the</strong> s<strong>on</strong>gsLAUNCHcast selects for <strong>the</strong> playlist will be unrated, flooding <strong>the</strong> playlist withs<strong>on</strong>gs for which <strong>the</strong> user has never expressed a preference. 2251The court fur<strong>the</strong>r noted that even <strong>the</strong> ways in which s<strong>on</strong>gs were rated included variablesbey<strong>on</strong>d <strong>the</strong> user’s c<strong>on</strong>trol. For example, <strong>the</strong> ratings by all of <strong>the</strong> user’s subscribed-to stati<strong>on</strong>swere included in <strong>the</strong> playlist selecti<strong>on</strong> process. When <strong>the</strong> user rated a particular s<strong>on</strong>g,LAUNCHcast <strong>the</strong>n implicitly rated all o<strong>the</strong>r s<strong>on</strong>gs by that artist, subjecting <strong>the</strong> user to manys<strong>on</strong>gs <strong>the</strong> user may have never heard or did not even like. In additi<strong>on</strong>, a user who heard a s<strong>on</strong>gshe liked and wanted to hear again could not do so by logging off and back <strong>on</strong> to reset <strong>the</strong> stati<strong>on</strong>to disable <strong>the</strong> restricti<strong>on</strong> against playing <strong>the</strong> same s<strong>on</strong>g twice <strong>on</strong> a playlist. Even if <strong>the</strong> userlogged off <strong>the</strong>n back <strong>on</strong> and selected <strong>the</strong> same stati<strong>on</strong>, <strong>the</strong> user would still hear <strong>the</strong> remainder of<strong>the</strong> playlist to which she had previously been listening with its restricti<strong>on</strong>s still in operati<strong>on</strong>, atleast until <strong>the</strong> user had listened to at least 42 of <strong>the</strong> playlist’s s<strong>on</strong>gs. LAUNCHcast also did notenable <strong>the</strong> user to view <strong>the</strong> unplayed s<strong>on</strong>gs in <strong>the</strong> playlist, ensuring that a user could not siftthrough a playlist to choose <strong>the</strong> s<strong>on</strong>gs <strong>the</strong> user wished to hear. In short, <strong>the</strong> <strong>on</strong>ly thing a usercould c<strong>on</strong>trol was to ensure not hearing a particular s<strong>on</strong>g <strong>on</strong> a particular stati<strong>on</strong> again by rating itzero. But <strong>the</strong> court noted that <strong>the</strong> ability not to listen to a particular s<strong>on</strong>g was not a violati<strong>on</strong> of acopyright holder’s right to be compensated when <strong>the</strong> sound recording was played. 2252Accordingly, <strong>the</strong> court ruled that, as a matter of law, <strong>the</strong> LAUNCHcast service was not aninteractive service. 22534. The Reproducti<strong>on</strong> Right – Mechanical Licenses andStreaming/DownloadingA great area of c<strong>on</strong>troversy has been whe<strong>the</strong>r streaming implicates <strong>the</strong> reproducti<strong>on</strong> rightof <strong>the</strong> copyright holder at all and, if so, whe<strong>the</strong>r <strong>the</strong> compulsory mechanical license of Secti<strong>on</strong>115 of <strong>the</strong> copyright statute applies to streaming. As discussed in Secti<strong>on</strong>s I.A.1 and I.A.2above, <strong>the</strong> right of reproducti<strong>on</strong> is potentially implicated when a work is streamed over <strong>the</strong><strong>Internet</strong> because interim whole or partial copies of <strong>the</strong> work are made in various RAM memoriesin <strong>the</strong> course of transmissi<strong>on</strong> of <strong>the</strong> work. Entities that c<strong>on</strong>duct streaming have sought to avoidhaving to pay a separate royalty under <strong>the</strong> right of reproducti<strong>on</strong> based <strong>on</strong> such interim copies, inadditi<strong>on</strong> to a public performance royalty. In additi<strong>on</strong>, c<strong>on</strong>troversy has arisen over what royaltyrates should apply to copies made in <strong>the</strong> course of limited downloads, as opposed to fulldownloads.Secti<strong>on</strong> 115(a) of <strong>the</strong> copyright statute provides for a compulsory license (referred to in<strong>the</strong> industry as a “mechanical license”) to make copies of a n<strong>on</strong>dramatic musical work as2251 Id. at 162-63 (footnotes omitted).2252 Id. at 163-64.2253 Id. at 150.- 490 -


embodied in ph<strong>on</strong>orecords or digital ph<strong>on</strong>orecord deliveries (“DPDs”), provided thatph<strong>on</strong>orecords of <strong>the</strong> musical work have been distributed to <strong>the</strong> public in <strong>the</strong> U.S. under authorityof <strong>the</strong> copyright owner. Secti<strong>on</strong> 115(d) defines a “digital ph<strong>on</strong>orecord delivery” to mean “eachindividual delivery of a ph<strong>on</strong>orecord by digital transmissi<strong>on</strong> of a sound recording which resultsin a specifically identifiable reproducti<strong>on</strong> by or for any transmissi<strong>on</strong> recipient of a ph<strong>on</strong>orecordof that sound recording, regardless of whe<strong>the</strong>r <strong>the</strong> digital transmissi<strong>on</strong> is also a publicperformance of <strong>the</strong> sound recording or any n<strong>on</strong>dramatic musical work embodied <strong>the</strong>rein. Adigital ph<strong>on</strong>orecord delivery does not result from a real-time, n<strong>on</strong>-interactive subscripti<strong>on</strong>transmissi<strong>on</strong> of a sound recording where no reproducti<strong>on</strong> of <strong>the</strong> sound recording or <strong>the</strong> musicalwork embodied <strong>the</strong>rein is made from <strong>the</strong> incepti<strong>on</strong> of <strong>the</strong> transmissi<strong>on</strong> through to its receipt by<strong>the</strong> transmissi<strong>on</strong> recipient in order to make <strong>the</strong> sound recording audible.” The last sentence ofthis definiti<strong>on</strong> might be read to exclude streaming from <strong>the</strong> definiti<strong>on</strong> of DPDs, an issue whichhas been <strong>the</strong> subject of c<strong>on</strong>siderable c<strong>on</strong>troversy, as discussed fur<strong>the</strong>r below.Secti<strong>on</strong> 115(c)(3)(A) provides that <strong>the</strong> compulsory license includes <strong>the</strong> right to distribute“a ph<strong>on</strong>orecord of a n<strong>on</strong>dramatic musical work by means of a digital transmissi<strong>on</strong> whichc<strong>on</strong>stitutes a digital ph<strong>on</strong>orecord delivery, regardless of whe<strong>the</strong>r <strong>the</strong> digital transmissi<strong>on</strong> is also apublic performance of <strong>the</strong> sound recording under secti<strong>on</strong> 106(6) … or of any n<strong>on</strong>dramaticmusical work embodied <strong>the</strong>rein under secti<strong>on</strong> 106(4).”As in <strong>the</strong> case of <strong>the</strong> digital performance right with respect to sound recordings, <strong>the</strong>copyright statute provides for royalty rates for <strong>the</strong> compulsory mechanical license to be setthrough voluntary negotiati<strong>on</strong> proceedings noticed by <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office and, if suchproceedings fail to reach agreements, through CARP proceedings. 2254 The copyright statuteprovides that, in setting <strong>the</strong> terms and rates for <strong>the</strong> compulsory license, <strong>the</strong> CARP “shalldistinguish between (i) digital ph<strong>on</strong>orecord deliveries where <strong>the</strong> reproducti<strong>on</strong> or distributi<strong>on</strong> of aph<strong>on</strong>orecord is incidental to <strong>the</strong> transmissi<strong>on</strong> which c<strong>on</strong>stitutes <strong>the</strong> digital ph<strong>on</strong>orecord delivery[usually referred to as “incidental DPDs”], and (ii) digital ph<strong>on</strong>orecord deliveries in general[usually referred to as “general DPDs”].” 2255 Voluntary negotiati<strong>on</strong> and/or CARP proceedingsare generally to be repeated in each fifth calendar year after 1997. 2256 A CARP proceeding,Docket No. 99-4 CARP DPRA, relating to DPDs was initiated and remained open for manyyears, but was terminated by <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office <strong>on</strong> Aug. 6, 2007 pursuant to <strong>the</strong> Royalty andDistributi<strong>on</strong> Reform Act of 2004, which eliminated <strong>the</strong> CARP system and replaced it with <strong>the</strong>CRB. The <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office noted that subsequent proceedings regarding <strong>the</strong> rates for Secti<strong>on</strong>115 must be initiated under <strong>the</strong> new CRB system. 2257Because C<strong>on</strong>gress did not define what c<strong>on</strong>stitutes an incidental DPD, much c<strong>on</strong>troversyhas arisen with respect to <strong>the</strong>m:Whe<strong>the</strong>r streaming c<strong>on</strong>stitutes a DPD at all;2254 17 U.S.C. § 115(c)(3)(C) & (D).2255 Id. § 115(c)(3)(D).2256 Id. § 115(c)(3)(F).2257 72 Fed. Reg. 45071, 45072 (Aug. 10, 2007).- 491 -


If so, whe<strong>the</strong>r streaming involves incidental DPDs or general DPDs;Whe<strong>the</strong>r limited downloads should be classified as incidental DPDs or general DPDs;Whe<strong>the</strong>r <strong>the</strong> interim copies generated in <strong>the</strong> course of streaming or limited downloads c<strong>on</strong>stitutea fair use or instead require a mechanical license;Whe<strong>the</strong>r <strong>the</strong> interim copies produced in <strong>the</strong> course of streaming and limited downloads aresubject to <strong>the</strong> compulsory mechanical license of Secti<strong>on</strong> 115; andWhat royalties should be paid for <strong>the</strong> copies of works generated in <strong>the</strong> course of streaming andlimited downloads.The foregoing issues have come to <strong>the</strong> fore in recent times with <strong>the</strong> rise of <strong>on</strong>line musicdistributi<strong>on</strong> systems, both “free” services such as Napster, Music City, Grokster, and Kazaa, aswell as <strong>the</strong> various nascent subscripti<strong>on</strong> <strong>on</strong>line music services such as Pressplay, MusicNet,Listen.com, and MP3.com. The issues have been fought in a variety of forums, as described in<strong>the</strong> next subsecti<strong>on</strong>s.Streaming(a) Applicability of <strong>the</strong> Secti<strong>on</strong> 115 Compulsory License toOnly <strong>on</strong>e case to date has addressed <strong>the</strong> issue of whe<strong>the</strong>r <strong>the</strong> compulsory mechanicallicense of Secti<strong>on</strong> 115 applies to streaming. In Rodgers & Hammerstein Org’n v. UMGRecordings, Inc., 2258 a number of s<strong>on</strong>gwriters and music publishers brought an acti<strong>on</strong> forcopyright infringement against <strong>the</strong> defendants, UMG Recordings, Inc. and The Farm ClubOnline, Inc., for copyright infringement. The Farm Club was a subsidiary of UMG that streamedrecordings over <strong>the</strong> <strong>Internet</strong>. The plaintiffs alleged that such streaming was being c<strong>on</strong>ductedwithout proper licenses under <strong>the</strong> musical compositi<strong>on</strong> copyrights held by <strong>the</strong> plaintiffs. Thedefendants claimed that, if a mechanical license were required at all for streaming, <strong>the</strong>y wereentitled to <strong>the</strong> compulsory license under Secti<strong>on</strong> 115. 2259The court ruled that <strong>the</strong> Secti<strong>on</strong> 115 compulsory mechanical license did not permit <strong>the</strong>defendants to stream <strong>the</strong> copyrighted works at issue over <strong>the</strong> <strong>Internet</strong>. 2260 The court pointed toSecti<strong>on</strong> 115(a)(1), which provides that a “pers<strong>on</strong> may obtain a compulsory license <strong>on</strong>ly if his orher primary purpose in making ph<strong>on</strong>orecords is to distribute <strong>the</strong>m to <strong>the</strong> public for private use.”The court noted that <strong>the</strong> defendants did not fall within this language because <strong>the</strong>y did not sellcopies of records to <strong>the</strong>ir users, but ra<strong>the</strong>r merely placed copies of recordings <strong>on</strong> <strong>the</strong>ir servers to2258 60 U.S.P.Q.2d 1354 (S.D.N.Y. 2001).2259 Id. at 1355-57.2260 The court also held that an existing license from <strong>the</strong> Harry Fox Agency (HFA) held by <strong>the</strong> defendants did notcover <strong>the</strong> streaming because that license was limited by its terms to a specific ph<strong>on</strong>orecord number, and <strong>the</strong>HFA license did not c<strong>on</strong>stitute a compulsory license under Secti<strong>on</strong> 115. Id. at 1357-59.- 492 -


allow users to listen to s<strong>on</strong>gs <strong>on</strong> those records via streaming. 2261 Nor did <strong>the</strong> copies stored by <strong>the</strong>defendants <strong>on</strong> <strong>the</strong>ir servers trigger applicability of <strong>the</strong> compulsory mechanical license:Thus <strong>the</strong> Defendants’ server copies of <strong>the</strong> copyrighted works are not analogous tomaster recordings made in <strong>the</strong> course of <strong>the</strong> process of making ph<strong>on</strong>orecords to bedistributed to <strong>the</strong> public. Defendants c<strong>on</strong>cede that <strong>the</strong>ir server copies <strong>the</strong>mselvesare not for distributi<strong>on</strong> to <strong>the</strong> public. Since Defendants’ server copies are nei<strong>the</strong>rintended for distributi<strong>on</strong> to <strong>the</strong> public nor part of a process for distributing digitalcopies of <strong>the</strong> existing ph<strong>on</strong>orecords, Secti<strong>on</strong> 115 would not give <strong>the</strong> Defendants aright to a compulsory license for <strong>the</strong> server copies. 2262Accordingly, <strong>the</strong> court denied <strong>the</strong> defendants’ moti<strong>on</strong> for summary judgment that <strong>the</strong>y werelicensed to stream <strong>the</strong> works. 2263The court also granted <strong>the</strong> plaintiffs’ cross moti<strong>on</strong> for partial summary judgment. Thecourt stated:While Defendants have been less than candid with <strong>the</strong> Court, it is clear that whatDefendants are attempting to do is to limit <strong>the</strong> payments due from <strong>the</strong>m for <strong>the</strong>streaming of recordings of copyrighted works to <strong>the</strong>ir customers to <strong>the</strong> licensingfee that would be applicable when a radio stati<strong>on</strong> sends a recording over <strong>the</strong>airwaves. It is obvious that Defendants do not want to pay <strong>the</strong> Plaintiffs <strong>the</strong>license fee for a record every time <strong>on</strong>e of <strong>the</strong>ir customers listens to recording <strong>on</strong><strong>the</strong> <strong>Internet</strong>. However, <strong>the</strong> <strong>on</strong>ly license that Defendants rely <strong>on</strong> here is <strong>on</strong>e that islimited to <strong>the</strong> distributi<strong>on</strong> of records to <strong>the</strong> public for which <strong>the</strong>re is an establishedfee. Defendants choice is to obtain a license for that purpose and pay <strong>the</strong> fee orcease <strong>the</strong>ir infringing activity. 2264It is unclear what precisely <strong>the</strong> “infringing activity” was that <strong>the</strong> court was referring to. It doesnot seem to be <strong>the</strong> distributi<strong>on</strong> of copies, for <strong>the</strong> court found <strong>the</strong> defendants were not distributingdigital copies of ph<strong>on</strong>orecords (and thus Secti<strong>on</strong> 115 did not apply). It <strong>the</strong>refore must have been<strong>the</strong> public performance of <strong>the</strong> compositi<strong>on</strong>s via streaming for which <strong>the</strong> defendants required alicense.(b) The <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office’s Positi<strong>on</strong> – The 2001 DMCA Report andComment ProceedingsAs discussed in Secti<strong>on</strong> II.G.6(a) above, Secti<strong>on</strong> 104 of <strong>the</strong> DMCA requires <strong>the</strong> Registerof <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>s and <strong>the</strong> Assistant Secretary for Communicati<strong>on</strong>s and Informati<strong>on</strong> of <strong>the</strong>Commerce Department to study and report to C<strong>on</strong>gress within two years of enactment of <strong>the</strong>2261 Id. at 1360.2262 Id. (citati<strong>on</strong> omitted).2263 Id. at 1361.2264 Id.- 493 -


DMCA with respect to <strong>the</strong> DMCA’s impact <strong>on</strong>, am<strong>on</strong>g o<strong>the</strong>r things, “<strong>the</strong> relati<strong>on</strong>ship betweenexisting and emergent technology” and Secti<strong>on</strong>s 109 and 117 of <strong>the</strong> copyright statute. The reportrequired under Secti<strong>on</strong> 104 was issued in August of 2001 and is available <strong>on</strong>line atwww.loc.gov/copyright/reports/studies/dmca/dmca_study.html.The report c<strong>on</strong>cluded that <strong>the</strong> making of temporary copies of a work in RAM in <strong>the</strong>course of streaming implicates <strong>the</strong> reproducti<strong>on</strong> right of <strong>the</strong> copyright holder so l<strong>on</strong>g as <strong>the</strong>reproducti<strong>on</strong> persists l<strong>on</strong>g enough to be perceived, copied, or communicated. 2265 The reportnoted c<strong>on</strong>siderable uncertainty in <strong>the</strong> industry c<strong>on</strong>cerning <strong>the</strong> legal status of buffer copies and <strong>the</strong>exposure of webcasters to demands for additi<strong>on</strong>al royalty payments from <strong>the</strong> owners of streamedsound recordings. The report expressed <strong>the</strong> belief “that <strong>the</strong>re is a str<strong>on</strong>g case that <strong>the</strong> making ofa buffer copy in <strong>the</strong> course of streaming is a fair use,” based largely <strong>on</strong> <strong>the</strong> fact that buffer copiesdo not supersede or supplant <strong>the</strong> market for <strong>the</strong> original works and <strong>the</strong> effect <strong>on</strong> <strong>the</strong> actual orpotential market for <strong>the</strong> works appears to minimal or n<strong>on</strong>existent. 2266 Because <strong>the</strong> sole purposefor making <strong>the</strong> buffer copies is to permit an activity that is licensed by <strong>the</strong> copyright owner andfor which <strong>the</strong> copyright owner receives a performance royalty, <strong>the</strong> report c<strong>on</strong>cluded thatcopyright owners appeared “to be seeking to be paid twice for <strong>the</strong> same activity.” 2267Accordingly, <strong>the</strong> report recommended:that C<strong>on</strong>gress enact legislati<strong>on</strong> amending <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act to preclude anyliability arising from <strong>the</strong> asserti<strong>on</strong> of a copyright owner’s reproducti<strong>on</strong> right withrespect to temporary buffer copies that are incidental to a licensed digitaltransmissi<strong>on</strong> of a public performance of a sound recording and any underlyingmusical work.The ec<strong>on</strong>omic value of licensed streaming is in <strong>the</strong> public performances of <strong>the</strong>musical work and <strong>the</strong> sound recording, both of which are paid for. The buffercopies have no independent ec<strong>on</strong>omic significance. They are made solely toenable <strong>the</strong> performance of <strong>the</strong>se works. The uncertainty of <strong>the</strong> present lawpotentially allows those who administer <strong>the</strong> reproducti<strong>on</strong> right in musical worksto prevent webcasting from taking place – to <strong>the</strong> detriment of o<strong>the</strong>r copyrightowners, webcasters and c<strong>on</strong>sumers alike – or to extract an additi<strong>on</strong>al payment thatis not justified by <strong>the</strong> ec<strong>on</strong>omic value of <strong>the</strong> copies at issue. C<strong>on</strong>gressi<strong>on</strong>al acti<strong>on</strong>is desirable to remove <strong>the</strong> uncertainty and to allow <strong>the</strong> activity that C<strong>on</strong>gresssought to encourage through <strong>the</strong> adopti<strong>on</strong> of <strong>the</strong> secti<strong>on</strong> 114 webcastingcompulsory license to take place.Although we believe that <strong>the</strong> fair use defense probably does apply to temporarybuffer copies, this approach is fraught with uncertain applicati<strong>on</strong> in <strong>the</strong> courts.This uncertainty, coupled with <strong>the</strong> apparent willingness of some copyright owners2265 See Secti<strong>on</strong> III.B.2.a of <strong>the</strong> Executive Summary of <strong>the</strong> report, which may be found <strong>on</strong>line atwww.loc.gov/copyright/reports/studies/dmca/dmca_executive.html.2266 Id. Secti<strong>on</strong> III.B.2.b.2267 Id.- 494 -


to assert claims based <strong>on</strong> <strong>the</strong> making of buffer copies, argues for statutorychange. 2268On Mar. 9, 2001, prior to issuance of <strong>the</strong> 2001 DMCA report, and in resp<strong>on</strong>se to apetiti<strong>on</strong> by <strong>the</strong> RIAA for rulemaking or to c<strong>on</strong>vene a CARP, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office initiated arequest for public comments <strong>on</strong> <strong>the</strong> interpretati<strong>on</strong> and applicati<strong>on</strong> of <strong>the</strong> mechanical and digitalph<strong>on</strong>orecord compulsory license to certain digital music services, including webcasting. 2269 TheRIAA petiti<strong>on</strong> focused <strong>on</strong> two types of digital music deliveries:“On-Demand Stream,” defined as an “<strong>on</strong>-demand, real-time transmissi<strong>on</strong> using streamingtechnology such as Real Audio, which permits users to listen to <strong>the</strong> music <strong>the</strong>y want when <strong>the</strong>ywant and as it is transmitted to <strong>the</strong>m”; and“Limited Download,” defined as an “<strong>on</strong>-demand transmissi<strong>on</strong> of a time-limited or o<strong>the</strong>r uselimited(i.e. n<strong>on</strong>-permanent) download to a local storage device (e.g. <strong>the</strong> hard drive of <strong>the</strong> user’scomputer), using technology that causes <strong>the</strong> downloaded file to be available for listening <strong>on</strong>lyei<strong>the</strong>r during a limited time (e.g. a time certain or a time tied to <strong>on</strong>going subscripti<strong>on</strong> payments)or for a limited number of times.” 2270Music publishers had taken <strong>the</strong> positi<strong>on</strong> that both On-Demand Streams and LimitedDownloads implicated <strong>the</strong>ir reproducti<strong>on</strong> (mechanical license) rights. The RIAA requested <strong>the</strong><str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office to determine whe<strong>the</strong>r On-Demand Streams are incidental DPDs and, if so, toc<strong>on</strong>vene a CARP to set rates for those incidental DPDs. With respect to Limited Downloads, <strong>the</strong>RIAA suggested that <strong>the</strong>y may be ei<strong>the</strong>r incidental DPDs or more in <strong>the</strong> nature of record rentals,leases or lendings. 2271 In ei<strong>the</strong>r case, <strong>the</strong> RIAA believed that <strong>the</strong> compulsory license of Secti<strong>on</strong>115 should apply, but asked <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office to c<strong>on</strong>duct a rulemaking proceeding withrespect to <strong>the</strong> issues:2268 Id. Secti<strong>on</strong> III.B.2.c. The report also acknowledged a “symmetrical difficulty” faced in <strong>the</strong> <strong>on</strong>line musicindustry relating to digital performances that are incidental to digital music downloads:“Just as webcasters appear to be facing demands for royalty payments for incidental exercise of <strong>the</strong>reproducti<strong>on</strong> right in <strong>the</strong> course of licensed public performances, it appears that companies that sell licenseddigital downloads of music are facing demands for public performance royalties for a technical ‘performance’of <strong>the</strong> underlying musical work that allegedly occurs in <strong>the</strong> course of transmitting it from <strong>the</strong> vendor’s server to<strong>the</strong> c<strong>on</strong>sumer’s computer.Although we recognize that it is an unsettled point of law that is subject to debate, we do not endorse <strong>the</strong>propositi<strong>on</strong> that a digital download c<strong>on</strong>stitutes a public performance even when no c<strong>on</strong>temporaneousperformance takes place. If a court were to find that such a download can be c<strong>on</strong>sidered a public performancewithin <strong>the</strong> language of <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act, we believe that <strong>the</strong> arguments c<strong>on</strong>cerning fair use and <strong>the</strong> making ofbuffer copies are applicable to this performance issue as well. It is our view that no liability should result froma technical ‘performance’ that takes place in <strong>the</strong> course of a download.” Id.2269 66 Fed. Reg. 14099 (Mar. 9, 2001).2270 Id. at 14100.2271 Id.- 495 -


In sum, RIAA asserts that it is unclear whe<strong>the</strong>r <strong>the</strong> secti<strong>on</strong> 115 license permits allof <strong>the</strong> activities necessary to make On-Demand Streams or Limited Downloads,and if so, at what royalty rates. C<strong>on</strong>sequently, RIAA petiti<strong>on</strong>s <strong>the</strong> Office todetermine (1) whe<strong>the</strong>r On-Demand Streams are incidental DPDs covered by <strong>the</strong>license; (2) whe<strong>the</strong>r <strong>the</strong> license includes <strong>the</strong> right to make server copies or o<strong>the</strong>rcopies necessary to transmit On-Demand Streams and Limited Downloads; and(3) <strong>the</strong> royalty rate applicable to On-Demand Streams (if <strong>the</strong>y are covered by <strong>the</strong>license) and Limited Downloads. 2272The <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office sought public comment <strong>on</strong> <strong>the</strong>se issues and o<strong>the</strong>r related issues,including <strong>the</strong> following:“Is it possible to define ‘incidental DPD’ through a rulemaking proceeding?” 2273“Are some or all <strong>the</strong> copies of a musical work made that are necessary to stream that workincidental DPDs?” 2274“Aren’t incidental DPDs subject to secti<strong>on</strong> 115’s definiti<strong>on</strong> of digital ph<strong>on</strong>orecord deliveries? Ifso, does <strong>the</strong> requirement that a DPD result in a ‘specifically identifiable reproducti<strong>on</strong>’ by or for atransmissi<strong>on</strong> recipient rule out some of <strong>the</strong> copies discussed above from c<strong>on</strong>siderati<strong>on</strong> asincidental or general DPDs?” 2275(c) The NMPA/HFA/RIAA Agreement of 2001While <strong>the</strong> public comment proceedings were <strong>on</strong>going, <strong>the</strong> RIAA and music publishers,acting through <strong>the</strong> Nati<strong>on</strong>al Music Publishers Associati<strong>on</strong> (NMPA) and <strong>the</strong> Harry Fox Agency(HFA), announced <strong>on</strong> Oct. 9, 2001 a breakthrough agreement <strong>on</strong> <strong>the</strong> licensing of musical worksfor new subscripti<strong>on</strong> services over <strong>the</strong> <strong>Internet</strong>. According to a joint statement filed by NMPA,HFA and RIAA with <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office <strong>on</strong> Dec. 6, 2001, <strong>the</strong> agreement applies tosubscripti<strong>on</strong> digital music services that include am<strong>on</strong>g <strong>the</strong>ir offerings “On-Demand Streams”(defined as “an <strong>on</strong>-demand, real-time transmissi<strong>on</strong> of a s<strong>on</strong>g to a c<strong>on</strong>sumer who requests thats<strong>on</strong>g using streaming technology”) and/or “Limited Downloads” (defined as “a download thatcan be played for a limited period of time or a limited number of plays”). 2276Under <strong>the</strong> agreement, <strong>the</strong> parties agreed that a mechanical license under Secti<strong>on</strong> 115 forOn-Demand Streams and Limited Downloads is available (c<strong>on</strong>trary to <strong>the</strong> holding of <strong>the</strong> Rodgersand Hammerstein case discussed in Secti<strong>on</strong> III.E.4(a) above) through HFA to all RIAA member2272 Id. at 14100-101.2273 Id. at 14101.2274 Id.2275 Id. at 14102.2276 Joint Statement of The Recording Industry Associati<strong>on</strong> of America, Inc., Nati<strong>on</strong>al Music Publishers’Associati<strong>on</strong>, Inc. and The Harry Fox Agency, Inc., In re Matter of Mechanical and Digital Ph<strong>on</strong>orecordDelivery Compulsory License, Docket No. RM 2000-7 (Dec. 6, 2001), at 3 (available as of Feb. 9, 2002 atwww.loc.gov/copyright/carp/10-5agreement.pdf).- 496 -


companies and to any digital music service that is majority owned by <strong>on</strong>e or more RIAAmembers. The rights under any such license can be extended to any service authorized by alicensee to make On-Demand Streams and/or Limited Downloads of a licensed musical work. Inadditi<strong>on</strong>, NMPA and HFA publicly announced that it is <strong>the</strong>ir policy to license not <strong>on</strong>ly RIAAmembers but also o<strong>the</strong>r digital music services that wish to negotiate comparable agreements. 2277The agreement provides that a mechanical license obtained under it includes allreproducti<strong>on</strong> and distributi<strong>on</strong> rights for delivery of On-Demand Streams and LimitedDownloads. The agreement c<strong>on</strong>firms that a mechanical license for <strong>the</strong>se services includes <strong>the</strong>right to make server copies, buffer copies and o<strong>the</strong>r related copies used in <strong>the</strong> operati<strong>on</strong> of <strong>the</strong>services. The license does not include performance rights, which are licensable separatelythrough performing rights organizati<strong>on</strong>s such as ASCAP, BMI and SESAC. 2278 The agreementdoes not establish specific royalty rates. The parties to <strong>the</strong> agreement committed to negotiatethose rates pursuant to <strong>the</strong> procedures of Secti<strong>on</strong>s 115(c)(3)(B),(C), and (F) of <strong>the</strong> copyrightstatute (described in <strong>the</strong> opening paragraphs to Secti<strong>on</strong> III.E.4 above). If negotiati<strong>on</strong>s are notsuccessful, <strong>the</strong> applicable rates are to be determined through CARP proceedings. 2279Finally, under <strong>the</strong> agreement <strong>the</strong> parties agreed to <strong>the</strong> following legal points: (1) that <strong>the</strong>process of making On-Demand Streams and Limited Downloads, from <strong>the</strong> making of servercopies to <strong>the</strong> transmissi<strong>on</strong> and local storage of <strong>the</strong> stream or download, viewed in its entirety,involves <strong>the</strong> making and distributi<strong>on</strong> of a DPD; (2) that a compulsory license is available underSecti<strong>on</strong> 115 for On-Demand Streams and Limited Downloads; and (3) radio-style and o<strong>the</strong>r n<strong>on</strong>interactivewebcasting that would qualify for a statutory license under Secti<strong>on</strong> 114(d)(2) does notinvolve <strong>the</strong> making or distributi<strong>on</strong> of a DPD and thus does not require a mechanical license. 2280On Dec. 14, 2001, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office sought public comments <strong>on</strong> <strong>the</strong> effect of <strong>the</strong>RIAA/NMPA/HFA agreement <strong>on</strong> <strong>the</strong> issues identified in its public comment proceedingsinitiated <strong>on</strong> Mar. 9, 2001. 2281 The period for comment <strong>on</strong> <strong>the</strong> RIAA/NMPA/HFA agreement wasextended to Feb. 6, 2002, with reply comments due <strong>on</strong> Feb. 27, 2002. 2282On June 22, 2004, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office amended its regulati<strong>on</strong>s governing <strong>the</strong> c<strong>on</strong>tentand service of notices <strong>on</strong> <strong>the</strong> copyright owner required to take advantage of <strong>the</strong> compulsorylicense of Secti<strong>on</strong> 115. The purpose of <strong>the</strong> amended regulati<strong>on</strong>s was to simplify <strong>the</strong> noticeprocess for digital music services wishing to take advantage of <strong>the</strong> compulsory license for abroad spectrum of musical works embodied in sound recordings. 22832277 Id. at 3-4.2278 Id. at 4.2279 Id. at 5.2280 Id. at 6.2281 66 Fed. Reg. 64783 (Dec. 14, 2001).2282 67 Fed. Reg. 4694 (Jan. 31, 2002).2283 69 Fed. Reg. 34578 (June 22, 2004).- 497 -


Ringt<strong>on</strong>es(d) Applicability of <strong>the</strong> Secti<strong>on</strong> 115 Compulsory License toIn October of 2006, in resp<strong>on</strong>se to a request by <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Royalty Board for a ruling,<strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office issued a memorandum opini<strong>on</strong> c<strong>on</strong>cluding that ringt<strong>on</strong>es qualify as DPDseligible for <strong>the</strong> statutory license of Secti<strong>on</strong> 115. Specifically, <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Office ruled asfollows:We find that ringt<strong>on</strong>es (including m<strong>on</strong>oph<strong>on</strong>ic and polyph<strong>on</strong>ic ringt<strong>on</strong>es, as wellas mastert<strong>on</strong>es) are ph<strong>on</strong>orecords and <strong>the</strong> delivery of such by wire or wirelesstechnology meets <strong>the</strong> definiti<strong>on</strong> of DPD set forth in <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Act. However,<strong>the</strong>re are a variety of different types of ringt<strong>on</strong>es ranging from those that aresimple excerpts taken from a larger musical work to <strong>on</strong>es that include additi<strong>on</strong>almaterial and may be c<strong>on</strong>sidered original musical works in and of <strong>the</strong>mselves.Ringt<strong>on</strong>es that are merely excerpts of a preexisting sound recording fall squarelywithin <strong>the</strong> scope of <strong>the</strong> statutory license, whereas those that c<strong>on</strong>tain additi<strong>on</strong>almaterial may actually be c<strong>on</strong>sidered original derivative works and <strong>the</strong>reforeoutside <strong>the</strong> scope of <strong>the</strong> Secti<strong>on</strong> 115 license. Moreover, we decide that a ringt<strong>on</strong>eis made and distributed for private use even though some c<strong>on</strong>sumers maypurchase <strong>the</strong>m for <strong>the</strong> purpose of identifying <strong>the</strong>mselves in public. We alsoc<strong>on</strong>clude that if a newly created ringt<strong>on</strong>e is c<strong>on</strong>sidered a derivative work, and <strong>the</strong>work has been first distributed with <strong>the</strong> authorizati<strong>on</strong> of <strong>the</strong> copyright owner, <strong>the</strong>nany pers<strong>on</strong> may use <strong>the</strong> statutory license to make and distribute <strong>the</strong> musical workin <strong>the</strong> ringt<strong>on</strong>e. 2284In Recording Industry Ass’n of America, Inc. v. Librarian of C<strong>on</strong>gress, 2285 <strong>the</strong> D.C.Circuit held that <strong>the</strong> <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Royalty Board’s impositi<strong>on</strong> under <strong>the</strong> Secti<strong>on</strong> 115 compulsorylicense of a 1.5% per m<strong>on</strong>th late fee and a 24 cent royalty for every ring t<strong>on</strong>e sold usingcopyrighted work were fair measures to compensate copyright owners when <strong>the</strong>ir work is copiedabsent a negotiated license agreement and were <strong>the</strong>refore not arbitrary and capricious.5. Internati<strong>on</strong>al Licensing EffortsIn November of 2003, <strong>the</strong> Internati<strong>on</strong>al Federati<strong>on</strong> of <strong>the</strong> Ph<strong>on</strong>ographic Industry (IFPI), aglobal trade body representing major and independent music labels, announced a “<strong>on</strong>e-stop”internati<strong>on</strong>al license for webcasters. IFPI expected collecti<strong>on</strong> agencies in 30 to 40 countries tosign up to <strong>the</strong> single license agreement by <strong>the</strong> end of 2003. Webcasters would pay a nati<strong>on</strong>albody a fee for s<strong>on</strong>gs broadcast into each individual country. The agreement would be for radiostylebroadcasts <strong>on</strong>ly. <strong>Internet</strong> companies would still need to secure individual licensingagreements to sell permanent s<strong>on</strong>g downloads. 22862284 71 Fed. Reg. 64303, 64304 (Nov. 1, 2006).2285 608 F.3d 861 (D.C. Cir. 2010).2286 “Music Industry Trumpets Global Webcast License” (Nov. 11, 2003), available as of Nov. 11, 2003 athttp://uk.news.yahoo.com/031111/80/edmp0.html.- 498 -


F. First Sales in Electr<strong>on</strong>ic CommerceThe “first sale doctrine” of copyright law is codified in Secti<strong>on</strong> 109 of <strong>the</strong> copyrightstatute. That secti<strong>on</strong> provides, “Notwithstanding <strong>the</strong> provisi<strong>on</strong>s of secti<strong>on</strong> 106(3) [<strong>the</strong> exclusivedistributi<strong>on</strong> right], <strong>the</strong> owner of a particular copy or ph<strong>on</strong>orecord lawfully made under this title,or any pers<strong>on</strong> authorized by such owner, is entitled, without <strong>the</strong> authority of <strong>the</strong> copyright owner,to sell or o<strong>the</strong>rwise dispose of <strong>the</strong> possessi<strong>on</strong> of that copy or ph<strong>on</strong>orecord.” 2287 The applicabilityof <strong>the</strong> first sale doctrine to “sales” through <strong>on</strong>line commerce is uncertain.Secti<strong>on</strong> 109 pertains to <strong>the</strong> sale or disposal of “<strong>the</strong> possessi<strong>on</strong> of [a] copy orph<strong>on</strong>orecord.” The statute was, of course, originally drafted with tangible copies in mind. Animmediate issue c<strong>on</strong>cerns whe<strong>the</strong>r an initial “sale” accomplished by an <strong>on</strong>line transmissi<strong>on</strong>,ra<strong>the</strong>r than <strong>the</strong> physical distributi<strong>on</strong> of a material object, c<strong>on</strong>stitutes a sale of a “copy” that wouldtrigger <strong>the</strong> applicati<strong>on</strong> of <strong>the</strong> doctrine at all. At least <strong>on</strong>e commentator has argued that it doesnot, 2288 and <strong>the</strong> NII White Paper notes that <strong>the</strong> issue is uncertain. 2289 However, it seemsplausible to analogize a transmissi<strong>on</strong> in which a complete authorized copy of a work ends up inpermanent storage at <strong>the</strong> recipient’s site (i.e., o<strong>the</strong>r than a transitory copy in RAM) as <strong>the</strong>distributi<strong>on</strong> of a “copy” for purposes of <strong>the</strong> first sale doctrine, at least where it was intended that<strong>the</strong> recipient “own” <strong>the</strong> received copy. 2290 Such a transacti<strong>on</strong> seems highly analogous to atraditi<strong>on</strong>al sale of a copy, except for <strong>the</strong> distributi<strong>on</strong> vehicle.One could readily argue that in such instances <strong>the</strong> first sale doctrine should apply byanalogy to permit a purchaser to fur<strong>the</strong>r transmit his or her copy to a third party, so l<strong>on</strong>g as <strong>the</strong>purchaser deletes his or her original copy from storage, because in that instance, as in <strong>the</strong> case oftraditi<strong>on</strong>al distributi<strong>on</strong>s of physical copies, no more total “copies” end up in circulati<strong>on</strong> thanwere originally sold by or under authority of <strong>the</strong> copyright owner. As <strong>on</strong>e commentator hasnoted:[The first sale doctrine’s] balance was gauged over <strong>the</strong> years …. Nei<strong>the</strong>r <strong>the</strong>copyright owner nor <strong>the</strong> copy owner receives all that it might desire. The balancecould be recut today for cyberspace, but no clear reas<strong>on</strong>s exist to do so. Absentthat, this balance governs treatment of digital works, whe<strong>the</strong>r <strong>on</strong> <strong>the</strong> <strong>Internet</strong> or adiskette. Applying it is relatively simple. A purchaser who acquires a digitalproduct that is not subject to a license has a right to retransfer <strong>the</strong> copy, makecopies essential to use <strong>the</strong> work, and o<strong>the</strong>rwise act as owner of <strong>the</strong> copy. If <strong>the</strong>“copy” is transferred, <strong>the</strong> transferor must relinquish all copies it possesses.2287 17 U.S.C. § 109(a).2288 K. Stuckey, <strong>Internet</strong> and Online Law § 6.08[3][b], at 6-54 (2008).2289 NII White Paper at 43-44.2290 In <strong>the</strong> case of computer programs, copyright owners often distribute copies of <strong>the</strong> program subject to a licenseagreement which states that <strong>the</strong> copy is being licensed, not sold, to <strong>the</strong> user as a vehicle to avoid <strong>the</strong>applicability of <strong>the</strong> first sale doctrine to <strong>the</strong> transacti<strong>on</strong>.- 499 -


O<strong>the</strong>rwise, it would in effect be making multiple copies inc<strong>on</strong>sistent with <strong>the</strong>balance between copy and copyright owners. 2291Although this argument makes sense in many instances, such as where a buyer haspurchased a copy of a book that is delivered electr<strong>on</strong>ically, in o<strong>the</strong>r instances <strong>the</strong> policy choiceswith respect to whe<strong>the</strong>r <strong>the</strong> first sale doctrine should be applied by analogy seem less clear. Onesuch example comprises works that are made available for <strong>on</strong>-demand usage, such as movies.The copyright owner clearly intends to make such works available <strong>on</strong>ly for <strong>on</strong>e time use by <strong>the</strong>recipient, and any fur<strong>the</strong>r retransmissi<strong>on</strong> or distributi<strong>on</strong> of <strong>the</strong> work to third parties would cutinto <strong>the</strong> owner’s <strong>on</strong>-demand market for <strong>the</strong> work. Yet depending up<strong>on</strong> <strong>the</strong> transmissi<strong>on</strong>technology used, a “copy” of <strong>the</strong> work may be made in whole or in part at <strong>the</strong> recipient’s end.Indeed, under <strong>the</strong> MAI case, even <strong>the</strong> data stored in RAM at <strong>the</strong> recipient’s computer wouldc<strong>on</strong>stitute a “copy.” It seems less clear that such “copy” should trigger <strong>the</strong> first sale doctrine andpermit <strong>the</strong> recipient to fur<strong>the</strong>r distribute that “copy,” even if <strong>the</strong> recipient does not retain a copy.As currently codified in Secti<strong>on</strong> 109, <strong>the</strong> first sale doctrine is drafted as an excepti<strong>on</strong> to<strong>the</strong> distributi<strong>on</strong> right of <strong>the</strong> copyright holder. However, as discussed earlier, <strong>the</strong> new rights oftransmissi<strong>on</strong> and access under <strong>the</strong> WIPO treaties are seemingly broader than <strong>the</strong> currentdistributi<strong>on</strong> right under United States law. An issue <strong>the</strong>refore arises as to whe<strong>the</strong>r <strong>the</strong> first saledoctrine should prevail over <strong>the</strong>se new rights of transmissi<strong>on</strong> and access, in additi<strong>on</strong> to <strong>the</strong> rightof distributi<strong>on</strong>. Both WIPO treaties c<strong>on</strong>tain provisi<strong>on</strong>s stating that nothing in <strong>the</strong>m shall affect<strong>the</strong> freedom of C<strong>on</strong>tracting Parties to determine <strong>the</strong> c<strong>on</strong>diti<strong>on</strong>s, if any, under which <strong>the</strong>exhausti<strong>on</strong> of rights afforded by <strong>the</strong> treaties will apply after <strong>the</strong> first sale or o<strong>the</strong>r transfer ofownership of <strong>the</strong> original or a copy of a work with <strong>the</strong> authorizati<strong>on</strong> of <strong>the</strong> owner. 2292 The WIPOtreaties thus seem to c<strong>on</strong>template that <strong>the</strong> interplay between <strong>the</strong> doctrine of first sale and <strong>the</strong> newrights of transmissi<strong>on</strong> and access will ultimately be resolved through implementing legislati<strong>on</strong>.Although <strong>the</strong> implementing legislati<strong>on</strong> in <strong>the</strong> United States afforded C<strong>on</strong>gress <strong>the</strong>opportunity to resolve <strong>the</strong> ambiguities in <strong>the</strong> scope of <strong>the</strong> first sale doctrine as applied to <strong>the</strong><strong>Internet</strong>, <strong>the</strong> DMCA does not address <strong>the</strong> issue. One of <strong>the</strong> proposed bills to implement <strong>the</strong>WIPO treaties, H.R. 3048, would have added <strong>the</strong> following new subsecti<strong>on</strong> (f) to Secti<strong>on</strong> 109 of<strong>the</strong> copyright statute with respect to applicability of <strong>the</strong> first sale doctrine to works in digitalformat:(f) The authorizati<strong>on</strong> for use set forth in subsecti<strong>on</strong> (a) applies where <strong>the</strong> ownerof a particular copy or ph<strong>on</strong>orecord in a digital format lawfully made under thistitle, or any pers<strong>on</strong> authorized by such owner, performs, displays or distributes <strong>the</strong>work by means of transmissi<strong>on</strong> to a single recipient, if that pers<strong>on</strong> erases ordestroys his or her copy or ph<strong>on</strong>orecord at substantially <strong>the</strong> same time. Thereproducti<strong>on</strong> of <strong>the</strong> work, to <strong>the</strong> extent necessary for such performance, display,distributi<strong>on</strong>, is not an infringement.2291 R. Nimmer, Informati<strong>on</strong> Law 4.08[2][b], at 4-32 to 4-33 (2001).2292 See Article 6(2) of <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty and Articles 8(2) and 12(2) of <strong>the</strong> WIPO Performances andPh<strong>on</strong>ograms Treaty.- 500 -


This provisi<strong>on</strong> seems to have been drafted to apply to <strong>the</strong> paradigm situati<strong>on</strong>, discussedabove, in which <strong>the</strong> original sale of a work via transmissi<strong>on</strong> in digital format results in acomplete copy of <strong>the</strong> work residing in permanent storage at <strong>the</strong> purchaser’s site. So l<strong>on</strong>g as <strong>the</strong>original purchaser erases his or her copy at substantially <strong>the</strong> same time, new subsecti<strong>on</strong> (f)permits <strong>the</strong> purchaser to transmit that copy to a third party without liability (including anyreproducti<strong>on</strong>s, displays or performances that are attendant <strong>the</strong>reto).The applicability of this provisi<strong>on</strong> to <strong>the</strong> case of <strong>on</strong>-demand transmissi<strong>on</strong>s forsimultaneous viewing or o<strong>the</strong>r usage by <strong>the</strong> original purchaser (such as movies or <strong>on</strong>line games)is not clear. In those instances, as discussed above, it is unclear whe<strong>the</strong>r <strong>the</strong> purchaser should betreated as <strong>the</strong> “owner of a particular copy or ph<strong>on</strong>orecord in a digital format” by virtue of <strong>the</strong>initial <strong>on</strong>-demand download of <strong>the</strong> work in order to trigger applicati<strong>on</strong> of <strong>the</strong> new subsecti<strong>on</strong> (f).In any event, this provisi<strong>on</strong> was not adopted in <strong>the</strong> DMCA.The European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Directive appears to take <strong>the</strong> positi<strong>on</strong> that obtaining a copy of acopyrighted work through an <strong>on</strong>line service does not exhaust <strong>the</strong> copyright owner’s rights in away that would allow resale or retransmissi<strong>on</strong> of such copy. Specifically, paragraph 29 of <strong>the</strong>recitals to <strong>the</strong> Directive states <strong>the</strong> following:“The questi<strong>on</strong> of exhausti<strong>on</strong> does not arise in <strong>the</strong> case of services and <strong>on</strong>-lineservices in particular. This also applies with regard to a material copy of a workor o<strong>the</strong>r subject-matter made by a user of such a service with <strong>the</strong> c<strong>on</strong>sent of <strong>the</strong>rightholder. Therefore, <strong>the</strong> same applies to rental and lending of <strong>the</strong> original andcopies of works or o<strong>the</strong>r subject-matter which are services by nature. Unlike CD-ROM or CD-I, where <strong>the</strong> intellectual property is incorporated in a materialmedium, namely an item of goods, every <strong>on</strong>-line service is in fact an act whichshould be subject to authorizati<strong>on</strong> where <strong>the</strong> copyright or related right soprovides.”G. Pop-Up Advertising1. The Gator Litigati<strong>on</strong>sIn June of 2002, a number of publishing companies and o<strong>the</strong>r entities operating <strong>the</strong>ir ownweb sites sued Gator Corporati<strong>on</strong> for copyright infringement, trademark infringement, unfaircompetiti<strong>on</strong> and o<strong>the</strong>r causes of acti<strong>on</strong> based <strong>on</strong> Gator’s causing unauthorized pop-upadvertising to appear <strong>on</strong> <strong>the</strong> sites of <strong>the</strong> plaintiffs. Gator widely distributed a softwareapplicati<strong>on</strong> called “Gator” that acted as a digital wallet to provide users with a mechanism forstoring pers<strong>on</strong>al informati<strong>on</strong> about <strong>the</strong>mselves, passwords, user identificati<strong>on</strong> numbers andnames and o<strong>the</strong>r data that c<strong>on</strong>sumers routinely need to input <strong>on</strong> electr<strong>on</strong>ic forms when shopping<strong>on</strong> <strong>the</strong> <strong>Internet</strong>. Gator bundled with <strong>the</strong> digital wallet software ano<strong>the</strong>r program called“OfferCompani<strong>on</strong>,” which, <strong>on</strong>ce installed, would automatically launch whenever a user initiateda browser-based <strong>Internet</strong> c<strong>on</strong>necti<strong>on</strong>, observe <strong>the</strong> sites visited by <strong>the</strong> user, and whenever <strong>the</strong> user- 501 -


visited certain websites, display <strong>on</strong>e or more unauthorized pop-up advertisements directly oversuch websites, obscuring a porti<strong>on</strong> of <strong>the</strong> c<strong>on</strong>tent of <strong>the</strong> website. 2293Gator sold its pop-up advertising services to various clients, who in many instanceswould engage <strong>the</strong> Gator service to cause <strong>the</strong> clients’ pop-up ads to appear when users visitedcompetitor’s sites. For example, a Gator pop-up advertisement for hotjobs.com would appear <strong>on</strong><strong>the</strong> home page of <strong>the</strong> plaintiff Dow J<strong>on</strong>es’ CareerJournal.com web site, a classified recruitmentadvertising site that competed with hotjobs.com. 2294 The plaintiffs sought a preliminaryinjuncti<strong>on</strong> against Gator <strong>on</strong> <strong>the</strong> grounds, am<strong>on</strong>g o<strong>the</strong>rs, that <strong>the</strong> unauthorized display of Gatorads <strong>on</strong> <strong>the</strong> plaintiffs’ sites infringed <strong>the</strong> plaintiffs’ exclusive right of distributi<strong>on</strong> under copyrightlaw and c<strong>on</strong>stituted <strong>the</strong> making of unauthorized derivative works.With respect to <strong>the</strong> distributi<strong>on</strong> right, <strong>the</strong> plaintiffs argued that each of <strong>the</strong>ir web siteswere governed by a “terms and c<strong>on</strong>diti<strong>on</strong>s of use” that granted site visitors a license to use anddisplay <strong>the</strong> copyrighted c<strong>on</strong>tent of <strong>the</strong> site but not to alter <strong>the</strong> site or change its appearance.Because Gator’s pop-up advertising altered <strong>the</strong> appearance of <strong>the</strong> plaintiffs’ web sites bycovering a porti<strong>on</strong> of <strong>the</strong> c<strong>on</strong>tent of <strong>the</strong> web page <strong>on</strong> which <strong>the</strong> ads appeared, <strong>the</strong> ads caused <strong>the</strong>site visitors to generate an infringing altered display of <strong>the</strong> web sites, and Gator was sec<strong>on</strong>darilyliable for c<strong>on</strong>tributing to such infringing displays. 2295 The plaintiffs fur<strong>the</strong>r argued that <strong>the</strong>altered displays c<strong>on</strong>stituted <strong>the</strong> creati<strong>on</strong> of unauthorized derivative works for which Gator wasdirectly liable. 2296On July 16, 2002, <strong>the</strong> district court entered a preliminary injuncti<strong>on</strong>, without writtenopini<strong>on</strong>, enjoining Gator from causing its pop-up advertisements to be displayed <strong>on</strong> any web siteowned by or affiliated with <strong>the</strong> plaintiffs without <strong>the</strong>ir express c<strong>on</strong>sent, and from altering ormodifying, or causing any o<strong>the</strong>r entity to alter or modify, any part of such websites or <strong>the</strong> display2293 Memorandum in Support of Plaintiffs’ Moti<strong>on</strong> for Preliminary Injuncti<strong>on</strong>, Washingt<strong>on</strong>post.NewsweekInteractive Co. v. The Gator Corporati<strong>on</strong>, Civil Acti<strong>on</strong> 02-909-A (E.D. Va. June 25, 2002), at 8-10 (copy <strong>on</strong>file with <strong>the</strong> author).2294 Id. at 10.2295 Id. at 23-25.2296 Id. at 25-26. The plaintiffs also argued that Gator’s activities c<strong>on</strong>stituted trademark infringement because <strong>the</strong>plaintiffs’ trademarks were clearly visible beside Gator pop-up advertisements, creating an unauthorizedassociati<strong>on</strong> between <strong>the</strong> two, and because of a likelihood of c<strong>on</strong>fusi<strong>on</strong> as to sp<strong>on</strong>sorship of <strong>the</strong> ads. Theplaintiffs submitted a c<strong>on</strong>sumer survey in which 66% of resp<strong>on</strong>dents stated <strong>the</strong>y believed that pop-upadvertisements are sp<strong>on</strong>sored by or authorized by <strong>the</strong> web site in which <strong>the</strong>y appear, and 45% believed thatpop-up advertisements have been pre-screened and approved by <strong>the</strong> web site <strong>on</strong> which <strong>the</strong>y appear. Id. at 19-21.- 502 -


<strong>the</strong>reof. 2297 In February of 2003, Gator reached a settlement with 16 publishers, <strong>the</strong> terms ofwhich were c<strong>on</strong>fidential. 2298A number of o<strong>the</strong>r lawsuits against Gator were filed. During 2002, Six C<strong>on</strong>tinents HotelsInc. and Inter-C<strong>on</strong>tinental Hotels Corp. sued Gator in Atlanta for copyright and trademarkinfringement, unfair competiti<strong>on</strong>, and computer trespass, and Extended Stay America Inc. (ESA)sued Gator in South Carolina <strong>on</strong> similar grounds. Gator, in turn, sued ESA for declaratory reliefin federal court in San Jose, California. 2299 In May 2003, LendingTree Inc. sued Gator forcopyright and trademark infringement, asking for statutory damages of $150,000 for eachinfringement. 2300 As of <strong>the</strong> writing of this paper, <strong>the</strong>se suits were pending.2. The WhenU Litigati<strong>on</strong>sSeveral lawsuits have been brought against WhenU.com, distributor of a pop-up adprogram called “SaveNow,” alleging copyright and trademark infringement. Although <strong>the</strong> casesreached similar results <strong>on</strong> <strong>the</strong> copyright claims, <strong>the</strong>y reached different results <strong>on</strong> <strong>the</strong> trademarkclaims.(a) U-Haul v. WhenU.comIn U-Haul Int’l Inc. v. WhenU.com, Inc., 2301 U-Haul alleged that WhenU’s SaveNowpop-up ad program c<strong>on</strong>stituted copyright and trademark infringement and unfair competiti<strong>on</strong>.SaveNow was generally bundled for distributi<strong>on</strong> with o<strong>the</strong>r software programs, such asscreensaver programs. It was distributed with a clickwrap license agreement. Utilizing adirectory of comm<strong>on</strong>ly used search phrases, comm<strong>on</strong>ly visited web addresses, and variouskeyword algorithms, <strong>the</strong> SaveNow program scanned <strong>the</strong> user’s <strong>Internet</strong> activity to determinewhe<strong>the</strong>r any of <strong>the</strong> terms, web addresses, or c<strong>on</strong>tent matched <strong>the</strong> informati<strong>on</strong> in its directory.Up<strong>on</strong> detecting a match, <strong>the</strong> program identified an associated product or service category, and<strong>the</strong>n caused a pop-up advertisement to be selected from WhenU’s clients which matched <strong>the</strong>category of <strong>the</strong> user’s activity. The ads appeared in a separate “WhenU window” <strong>on</strong> top of all2297 Order granting preliminary injuncti<strong>on</strong>, Washingt<strong>on</strong>post.Newsweek Interactive Co. v. The Gator Corporati<strong>on</strong>,Civil Acti<strong>on</strong> 02-909-A (E.D. Va. July 16, 2002) (copy <strong>on</strong> file with <strong>the</strong> author). The court also enjoined Gatorfrom infringing <strong>the</strong> plaintiffs’ trademark or service mark rights, and from making any designati<strong>on</strong>s of origin,descripti<strong>on</strong>s, representati<strong>on</strong>s or suggesti<strong>on</strong>s that <strong>the</strong> plaintiffs were <strong>the</strong> source, sp<strong>on</strong>sor or in any way affiliatedwith Gator’s advertisers or <strong>the</strong>ir web sites, services and products.2298 “Settlement Reportedly Reached in Dispute Over Pop-Up Advertisements,” Mealey’s Litigati<strong>on</strong> Report:Intellectual Property (Feb. 17, 2003), at 22.2299 Lisa Shuchman, “Search and Destroy” (Jan. 16, 2003), available as of Jan. 18, 2003 atwww.law.com/jsp/article.jsp?id=1039054570236.2300 Jen Zoghby, “LendingTree Suit Pops Pop-Ups” (May 19, 2003), available as of Oct. 26, 2003 athttp://famulus.msnbc.com/famuluscom/bizjournal05-19-010109.asp.2301 2003 WL 22071556 (E.D. Va. 2003).- 503 -


o<strong>the</strong>r windows visible <strong>on</strong> <strong>the</strong> computer’s screen, including <strong>the</strong> window of <strong>the</strong> user’s selecteddestinati<strong>on</strong> web site. 2302The court rejected U-Haul’s arguments that SaveNow infringed its exclusive rights ofdisplay and derivative works. With respect to <strong>the</strong> display right, U-Haul argued that SaveNowunlawfully caused its web site to be displayed toge<strong>the</strong>r with WhenU’s pop-up ads. The courtrejected this argument, noting that <strong>the</strong> user, not SaveNow, was <strong>the</strong> <strong>on</strong>e who called up <strong>the</strong> U-Haulwebsite. The SaveNow program did not alter U-Haul’s web page in any manner, and <strong>the</strong>SaveNow window in which <strong>the</strong> ad appeared bore no physical relati<strong>on</strong>ship to <strong>the</strong> window inwhich <strong>the</strong> U-Haul web page appeared. 2303With respect to <strong>the</strong> derivative works right, U-Haul argued that <strong>the</strong> SaveNow programcreated an infringing derivative work by retrieving <strong>the</strong> U-Haul web page, placing its ownadvertisement <strong>on</strong> that Web page, <strong>the</strong>n displaying it to <strong>the</strong> user. The court ruled that no derivativework of <strong>the</strong> U-Haul web page was created. First, <strong>the</strong> WhenU window was a “distinctoccurrence” from <strong>the</strong> U-Haul web page, ra<strong>the</strong>r than a single integrated work, and <strong>the</strong> appearanceof a WhenU ad <strong>on</strong> <strong>the</strong> user’s computer screen at <strong>the</strong> same time as a U-Haul web page was “atransitory occurrence that may not be exactly duplicated in that or ano<strong>the</strong>r user’s computer.” 2304Sec<strong>on</strong>d, although <strong>the</strong> pop-up ad altered <strong>the</strong> user’s computer display, <strong>the</strong> alterati<strong>on</strong> was notinfringing. “To c<strong>on</strong>clude o<strong>the</strong>rwise is untenable in light of <strong>the</strong> fact that <strong>the</strong> user is <strong>the</strong> <strong>on</strong>e whoc<strong>on</strong>trols how items are displayed <strong>on</strong> <strong>the</strong> computer, and computer users would infringecopyrighted works any time <strong>the</strong>y opened a window in fr<strong>on</strong>t of a copyrighted Web page that issimultaneously open in a separate window <strong>on</strong> <strong>the</strong>ir computer screens.” 2305Accordingly, WhenU was entitled to summary judgment <strong>on</strong> U-Haul’s claim of copyrightinfringement. 2306 The court also rejected U-Haul’s trademark claim <strong>on</strong> <strong>the</strong> ground, am<strong>on</strong>go<strong>the</strong>rs, that <strong>the</strong> appearance of WhenU’s ads <strong>on</strong> a user’s computer screen at <strong>the</strong> same time as <strong>the</strong>U-Haul web page was a result of how applicati<strong>on</strong>s operate in <strong>the</strong> Windows envir<strong>on</strong>ment and<strong>the</strong>refore did not c<strong>on</strong>stitute a “use” of U-Haul’s trademarks under <strong>the</strong> Lanham Act. Nei<strong>the</strong>r didinclusi<strong>on</strong> of <strong>the</strong> U-Haul URL or <strong>the</strong> word “U-Haul” in <strong>the</strong> SaveNow program c<strong>on</strong>stitute “use”under <strong>the</strong> Lanham Act, particularly since WhenU did not sell <strong>the</strong> U-Haul URL to its customersor cause <strong>the</strong> U-Haul URL or name to be displayed to <strong>the</strong> computer user when <strong>the</strong> ads poppedup. 2307 Finally, <strong>the</strong> court found no unfair competiti<strong>on</strong> because <strong>the</strong> user had c<strong>on</strong>sented, byaccepting <strong>the</strong> clickwrap license and downloading <strong>the</strong> software, to <strong>the</strong> display of <strong>the</strong> ads <strong>on</strong> his orher screen. 23082302 Id. at *2.2303 Id. at *6.2304 Id. at *7.2305 Id.2306 Id.2307 Id. at 4.2308 Id. at *1.- 504 -


(b) Wells Fargo v. WhenU.comSimilar claims of copyright and trademark infringement were brought against WhenU in<strong>the</strong> case of Wells Fargo & Co. v. WhenU.com, Inc. 2309 The court denied a moti<strong>on</strong> for apreliminary injuncti<strong>on</strong>, finding that <strong>the</strong> plaintiffs had not shown a likelihood of success <strong>on</strong> <strong>the</strong>merits of ei<strong>the</strong>r <strong>the</strong> copyright or <strong>the</strong> trademark claims. With respect to <strong>the</strong> copyright claims, <strong>the</strong>plaintiffs argued that <strong>the</strong> SaveNow program caused infringing derivative works of <strong>the</strong>ir websitesto be created. The court ruled that, to support a claim of direct derivative works infringementagainst WhenU, <strong>the</strong> plaintiffs would need to prove that WhenU incorporated <strong>the</strong> plaintiffs’websites into a new work. The court ruled that <strong>the</strong> plaintiffs could not establish such proof,because WhenU merely supplied a software product that did not access <strong>the</strong> plaintiffs’ websitesand <strong>the</strong>refore did not incorporate <strong>the</strong>m into a new work. Accordingly, <strong>the</strong> plaintiffs’ claim forcopyright infringement could, at best, be a claim for c<strong>on</strong>tributory infringement based <strong>on</strong> anallegedly infringing derivative work created by users of <strong>the</strong> WhenU software. 2310The court c<strong>on</strong>cluded that SaveNow users did not create infringing derivative worksei<strong>the</strong>r. Use of <strong>the</strong> SaveNow program to display ads did not alter <strong>the</strong> plaintiffs’ websites, nor did<strong>the</strong> WhenU ad window have any physical relati<strong>on</strong>ship to <strong>the</strong> plaintiffs’ websites or alter <strong>the</strong>c<strong>on</strong>tent displayed in any o<strong>the</strong>r open window. 2311 Even if <strong>the</strong> presence of an overlapping windowcould be said to change <strong>the</strong> appearance of <strong>the</strong> underlying window <strong>on</strong> a computer screen, <strong>the</strong>court held that such alterati<strong>on</strong> was not an infringement by analogy to <strong>the</strong> case of Lewis GaloobToys v. Nintendo of Am. 2312 That case held that <strong>the</strong> “Game Genie” device, which attached to <strong>the</strong>Nintendo game c<strong>on</strong>sole and allowed players to temporarily alter certain attributes of videogames, did not create a fixed derivative work because <strong>on</strong>ce <strong>the</strong> Game Genie was detached or <strong>the</strong>power turned off, <strong>the</strong> changes disappeared and <strong>the</strong> video game revered to its original form. 2313By analogy, <strong>the</strong> court ruled that WhenU’s program <strong>on</strong>ly temporarily changed <strong>the</strong> way <strong>the</strong>plaintiffs’ websites were viewed by users, and as so<strong>on</strong> as <strong>the</strong> ad windows were closed orminimized, <strong>the</strong> plaintiffs’ websites reverted to <strong>the</strong>ir original form. 2314 The court also rejected <strong>the</strong>plaintiffs’ argument that an unauthorized derivative work was formed because <strong>the</strong> WhenU adsmodified <strong>the</strong> pixels <strong>on</strong> <strong>the</strong> user’s screen display. The court c<strong>on</strong>cluded that <strong>the</strong> pixels “are ownedand c<strong>on</strong>trolled by <strong>the</strong> computer user who chooses what to display <strong>on</strong> <strong>the</strong> screen” and <strong>the</strong>plaintiffs’ did not have any property or copyright interest in those pixels. 2315 The court als<strong>on</strong>oted that because <strong>the</strong> pixels <strong>on</strong> a computer screen are updated every 1/70th of a sec<strong>on</strong>d, <strong>the</strong>“alterati<strong>on</strong> of pixels is <strong>the</strong>refore far too transitory an occurrence to form a basis for a copyright2309 293 F. Supp. 2d 734 (E.D. Mich. 2003).2310 Id. at 769.2311 Id.2312 780 F. Supp. 1283 (N.D. Cal. 1991), aff’d, 964 F.2d 965 (9th Cir. 1992).2313 Id. at 1288, 1291.2314 Wells Fargo, 293 F. Supp. 2d at 770.2315 Id. at 770-71.- 505 -


violati<strong>on</strong>.” 2316 The court <strong>the</strong>refore ruled that <strong>the</strong> WhenU advertisements did not create a worksufficiently permanent to be independently copyrightable, and <strong>the</strong>refore did not create aderivative work. 2317With respect to <strong>the</strong> plaintiffs’ trademark claims, <strong>the</strong> court rejected three arguments madeby <strong>the</strong> plaintiffs as to why WhenU should be found to “use” <strong>the</strong> plaintiffs’ trademarks incommerce, as required to establish a violati<strong>on</strong> of <strong>the</strong> Lanham Act. First, <strong>the</strong> plaintiffs arguedthat WhenU hindered <strong>Internet</strong> users from accessing <strong>the</strong>ir websites by potentially diverting <strong>the</strong>mto o<strong>the</strong>r sites when <strong>the</strong> user entered <strong>the</strong> URL of <strong>the</strong>ir websites, and such diversi<strong>on</strong> c<strong>on</strong>stituted a“use” of <strong>the</strong>ir trademarks. The court rejected this argument, noting that WhenU used <strong>the</strong>plaintiffs’ trademarks <strong>on</strong>ly in its software directory, to which <strong>the</strong> typical c<strong>on</strong>sumer did not haveaccess, and entry of <strong>the</strong> plaintiffs’ URLs in fact directed <strong>the</strong>m to <strong>the</strong> plaintiffs’ web sites. 2318Sec<strong>on</strong>d, <strong>the</strong> plaintiffs argued that WhenU positi<strong>on</strong>ed its pop-up ads in such a way thatc<strong>on</strong>sumers would see <strong>on</strong>e display c<strong>on</strong>taining WhenU’s ads and <strong>the</strong> plaintiffs’ websites andtrademarks. This positi<strong>on</strong>ing, <strong>the</strong> plaintiffs argued, created <strong>the</strong> impressi<strong>on</strong> that <strong>the</strong> pop-up wasaffiliated with or approved by <strong>the</strong> plaintiffs. The court rejected this argument, finding that it wasapparent to <strong>the</strong> user that what was appearing <strong>on</strong> his or her screen was two distinct sources ofmaterial. The court noted that <strong>the</strong> plaintiffs’ marks were nei<strong>the</strong>r displayed nor appeared to bedisplayed <strong>on</strong> WhenU’s windows, and <strong>the</strong> fact that WhenU’s ads appeared <strong>on</strong> a computer screenat <strong>the</strong> same time <strong>the</strong> plaintiffs’ web pages were visible in a separate window was not a “use” incommerce of <strong>the</strong> plaintiffs’ marks. 2319 Instead, <strong>the</strong> court c<strong>on</strong>cluded it was a form of legitimatecomparative advertising. 2320Finally, <strong>the</strong> plaintiffs argued that <strong>the</strong> inclusi<strong>on</strong> of <strong>the</strong>ir trademarks in WhenU’s softwaredirectory was a use in commerce. The court rejected this argument as well, finding that <strong>the</strong>directory entries were used <strong>on</strong>ly to identify <strong>the</strong> category of material a user was interested in, andto dispatch a c<strong>on</strong>textually relevant ad to that user. The ad did not display <strong>the</strong> plaintiffs’trademarks, and WhenU did not use <strong>the</strong> plaintiffs’ trademarks to indicate anything about <strong>the</strong>source of <strong>the</strong> products and services it advertised. 23212316 Id. at 771.2317 Id.2318 Id. at 758-59.2319 Id. at 759-61.2320 Id. at 761.2321 Id. at 762. The court also ruled that <strong>the</strong> plaintiffs had not dem<strong>on</strong>strated a likelihood of success <strong>on</strong> <strong>the</strong> issue ofc<strong>on</strong>fusi<strong>on</strong>. The court found a number of flaws in <strong>the</strong> survey c<strong>on</strong>ducted by <strong>the</strong> plaintiffs’ expert, in that it didnot approximate actual market c<strong>on</strong>diti<strong>on</strong>s, did not survey <strong>the</strong> appropriate populati<strong>on</strong>, c<strong>on</strong>tained questi<strong>on</strong>s thatwere unclear and leading, and c<strong>on</strong>tained no c<strong>on</strong>trol questi<strong>on</strong>s. Id. at 765-69. In March of 2003, plaintiffsWells Fargo and Quicken Loans settled <strong>the</strong>ir lawsuit against WhenU.com and filed a stipulated order ofdismissal. See “Wells Fargo Settles WhenU.com Pop-Up Ads Case,” BNA’s Electr<strong>on</strong>ic Commerce & LawReport (Mar. 30, 2005) at 329.- 506 -


(c) 1-800 C<strong>on</strong>tacts v. WhenU.comA third opini<strong>on</strong> in <strong>the</strong> various litigati<strong>on</strong>s against WhenU was issued just <strong>on</strong>e m<strong>on</strong>th after<strong>the</strong> Wells Fargo opini<strong>on</strong>. In <strong>the</strong> case of 1-800 C<strong>on</strong>tacts, Inc. v. WhenU.com, 2322 <strong>the</strong> district courtreached <strong>the</strong> same c<strong>on</strong>clusi<strong>on</strong> as <strong>the</strong> U-Haul and Wells Fargo courts <strong>on</strong> <strong>the</strong> copyright claims, butreached an opposite c<strong>on</strong>clusi<strong>on</strong> <strong>on</strong> <strong>the</strong> trademark claims, although its trademark ruling was laterreversed <strong>on</strong> appeal to <strong>the</strong> Sec<strong>on</strong>d Circuit. In this case, claims were brought against both WhenUand <strong>on</strong>e of its advertising customers, Direct Visi<strong>on</strong>, a competitor of <strong>the</strong> plaintiff 1-800 C<strong>on</strong>tacts.In additi<strong>on</strong> to <strong>the</strong> copyright and trademark claims, <strong>the</strong> plaintiff asserted a violati<strong>on</strong> of <strong>the</strong>Anticybersquatting C<strong>on</strong>sumer Protecti<strong>on</strong> Act, 15 U.S.C. § 1125(d).With respect to its claim of copyright infringement, <strong>the</strong> plaintiff argued that, bydelivering pop-up ads to a SaveNow user’s computer while <strong>the</strong> user was viewing <strong>the</strong> plaintiff’swebsite, <strong>the</strong> defendants created a new screen display that incorporated <strong>the</strong> plaintiff’s copyrightedwork, <strong>the</strong>reby infringing <strong>the</strong> plaintiff’s exclusive right of display. 2323 The court rejected thisargument, finding that it would prove way too much were it accepted:For this court to hold that computer users are limited in <strong>the</strong>ir use of Plaintiff’swebsite to viewing <strong>the</strong> website without any obstructing windows or programswould be to subject countless computer users and software developers to liabilityfor copyright infringement and c<strong>on</strong>tributory copyright infringement, since <strong>the</strong>modern computer envir<strong>on</strong>ment in which Plaintiff’s website exists allows users toobscure, cover, and change <strong>the</strong> appearance of browser windows c<strong>on</strong>tainingPlaintiff’s website. Without authority or evidence for <strong>the</strong> claim that users exceed<strong>the</strong>ir license to view <strong>the</strong> copyrighted 1-800 C<strong>on</strong>tacts website when <strong>the</strong>y obscure<strong>the</strong> website with o<strong>the</strong>r browser windows (including pop-up ads generated by <strong>the</strong>SaveNow program), Plaintiff has little basis for its claim that Defendants haveinfringed its display right. 2324The court also rejected <strong>the</strong> plaintiff’s argument that <strong>the</strong> defendants were creatingunauthorized derivative works by adding to or deleting from its copyrighted website, <strong>the</strong>reby“transforming” or “recasting” <strong>the</strong> website. 2325 Similar to <strong>the</strong> holdings in <strong>the</strong> U-Haul and WellsFargo cases, <strong>the</strong> court found that no derivative work satisfying <strong>the</strong> fixati<strong>on</strong> requirement wascreated by <strong>the</strong> SaveNow program, in view of <strong>the</strong> fact that <strong>the</strong> pop-up ads could be moved,obscured, or closed entirely, thus disappearing from percepti<strong>on</strong>, with <strong>the</strong> single click of amouse. 2326 In additi<strong>on</strong>, to <strong>the</strong> extent <strong>the</strong> pop-up ads c<strong>on</strong>stituted “transmitted images,” <strong>the</strong>y werenot fixed works since <strong>the</strong>re was no evidence that a fixati<strong>on</strong> was made “simultaneously with” <strong>the</strong>pop-up ads’ “transmissi<strong>on</strong>,” as required by <strong>the</strong> definiti<strong>on</strong>s in secti<strong>on</strong> 101 of <strong>the</strong> copyright2322 309 F.Supp.2d 467 (S.D.N.Y. 2003).2323 Id. at 485.2324 Id.2325 Id. at 486.2326 Id. at 487.- 507 -


statute. 2327 Finally, <strong>the</strong> court ruled that <strong>the</strong> defendants had not recast or transformed <strong>the</strong>plaintiff’s website because its website remained intact <strong>on</strong> <strong>the</strong> computer screen. Although <strong>the</strong>defendants’ pop-up ads might obscure or cover a porti<strong>on</strong> of <strong>the</strong> website, <strong>the</strong>y did not changeit. 2328Moreover, if obscuring a browser window c<strong>on</strong>taining a copyrighted website withano<strong>the</strong>r computer window produced a “derivative work,” <strong>the</strong>n any acti<strong>on</strong> by acomputer user that produced a computer window or visual graphic that altered <strong>the</strong>screen appearance of Plaintiff’s website, however slight, would require Plaintiff’spermissi<strong>on</strong>. A definiti<strong>on</strong> of “derivative work” that sweeps within <strong>the</strong> scope of <strong>the</strong>copyright law a multi-tasking <strong>Internet</strong> shopper whose word-processing programobscures <strong>the</strong> screen display of Plaintiff’s website is indeed “jarring,” and notsupported by <strong>the</strong> definiti<strong>on</strong> set forth at 17 U.S.C. § 101. 2329The district court, however, reached an opposite c<strong>on</strong>clusi<strong>on</strong> to <strong>the</strong> U-Haul and WellsFargo courts <strong>on</strong> <strong>the</strong> issue of trademark infringement, expressly noting that it disagreed with thosecourts. 2330 Unlike those courts, <strong>the</strong> 1-800 C<strong>on</strong>tacts court found that <strong>the</strong> defendants were making“use” of <strong>the</strong> plaintiff’s trademarks in commerce for several reas<strong>on</strong>s. First, SaveNow users thattyped in <strong>the</strong> plaintiff’s web site address or its 1-800 CONTACTS trademark in a search wereexhibiting a prior knowledge of <strong>the</strong> plaintiff’s website or goods and services, and <strong>the</strong> court foundthat pop-up ads that capitalized <strong>on</strong> that knowledge were “using” <strong>the</strong> plaintiff’s marks thatappeared <strong>on</strong> its website. 2331 Sec<strong>on</strong>d, <strong>the</strong> court found that by including <strong>the</strong> plaintiff’s URL,www.1800c<strong>on</strong>tacts.com, in its software directory of terms that triggered pop-up ads, WhenU was“using” a versi<strong>on</strong> of <strong>the</strong> plaintiff’s 1-800 CONTACTS mark. 2332 Thus, <strong>the</strong> court c<strong>on</strong>cluded that,by delivering ads to a SaveNow user when <strong>the</strong> user directly accessed <strong>the</strong> plaintiff’s website, <strong>the</strong>SaveNow program allowed <strong>the</strong> defendant Visi<strong>on</strong> Direct, to profit from <strong>the</strong> goodwill andreputati<strong>on</strong> in <strong>the</strong> plaintiff’s website that led <strong>the</strong> user to access <strong>the</strong> plaintiff’s website in <strong>the</strong> firstplace. 2333 With respect to <strong>the</strong> issue of c<strong>on</strong>fusi<strong>on</strong>, although <strong>the</strong> court found <strong>the</strong> survey of <strong>the</strong>plaintiff’s expert, which was <strong>the</strong> same expert as <strong>the</strong> Wells Fargo case, to be flawed for many of<strong>the</strong> same reas<strong>on</strong>s <strong>the</strong> Wells Fargo court noted, <strong>the</strong> court never<strong>the</strong>less held that <strong>the</strong> plaintiff hadestablished a sufficient showing of likelihood of harm from both “initial interest c<strong>on</strong>fusi<strong>on</strong>” and“source c<strong>on</strong>fusi<strong>on</strong>” to support a Lanham Act claim. 2334 The court also ruled that, by registering2327 Id.2328 Id.2329 Id. at 487-88.2330 Id. at 490 n.43.2331 Id. at 489.2332 Id.2333 Id. at 490.2334 Id. at 490-505.- 508 -


<strong>the</strong> domain name www.www1800C<strong>on</strong>tacts.com, <strong>the</strong> defendant Visi<strong>on</strong> Direct had violated <strong>the</strong>Anticybersquatting C<strong>on</strong>sumer Protecti<strong>on</strong> Act. 2335Accordingly, based <strong>on</strong> <strong>the</strong> trademark and anticybersquatting claims, <strong>the</strong> court entered apreliminary injuncti<strong>on</strong> against <strong>the</strong> defendants, enjoining <strong>the</strong>m from (1) including <strong>the</strong> 1-800CONTACTS mark, and c<strong>on</strong>fusingly similar terms, as elements in <strong>the</strong> SaveNow softwaredirectory, and (2) displaying <strong>the</strong> plaintiff’s mark in <strong>the</strong> advertising of Visi<strong>on</strong> Direct’s services,by causing “Visi<strong>on</strong> Direct’s pop-up advertisements to appear when a computer user has made aspecific choice to access or find Plaintiff’s website by typing Plaintiff’s mark into <strong>the</strong> URL barof a web browser or into an <strong>Internet</strong> search engine.” 2336On interlocutory appeal of <strong>the</strong> preliminary injuncti<strong>on</strong>, <strong>the</strong> Sec<strong>on</strong>d Circuit reversed, rulingthat as a matter of law WhenU did not “use” <strong>the</strong> plaintiff’s marks within <strong>the</strong> meaning of <strong>the</strong>Lanham Act when it included <strong>the</strong> plaintiff’s URL in its software directory or when it causedseparate, branded pop-up ads to appear ei<strong>the</strong>r above, below, or al<strong>on</strong>g <strong>the</strong> bottom edge of <strong>the</strong>plaintiff’s website window. 2337 With respect to inclusi<strong>on</strong> of <strong>the</strong> URL in WhenU’s directory, <strong>the</strong>Sec<strong>on</strong>d Circuit ruled that <strong>the</strong> URL transformed <strong>the</strong> plaintiff’s trademark into a word combinati<strong>on</strong>that functi<strong>on</strong>ed more or less like a public key to <strong>the</strong> plaintiff’s website. The <strong>on</strong>ly place WhenUreproduced <strong>the</strong> address was in its directory, which was not accessible to users and could<strong>the</strong>refore not create a possibility of visual c<strong>on</strong>fusi<strong>on</strong> with <strong>the</strong> plaintiff’s mark. In additi<strong>on</strong>, aWhenU pop-up ad could not be triggered by a computer user’s input of <strong>the</strong> 1-800 trademark or<strong>the</strong> appearance of that trademark <strong>on</strong> a web page accessed by <strong>the</strong> user. Accordingly, <strong>the</strong> courtruled that WhenU’s inclusi<strong>on</strong> of <strong>the</strong> 1-800 web address in its directory did not infringe <strong>on</strong> <strong>the</strong>plaintiff’s trademark. 2338With respect to <strong>the</strong> pop-up ads, <strong>the</strong> court noted that <strong>the</strong>y appeared in a separate windowprominently branded with <strong>the</strong> WhenU mark and had no tangible effect <strong>on</strong> <strong>the</strong> appearance orfuncti<strong>on</strong>ality of <strong>the</strong> plaintiff’s website. Nor was <strong>the</strong> appearance of <strong>the</strong> ads c<strong>on</strong>tingent up<strong>on</strong> orrelated to <strong>the</strong> plaintiff’s trademark, <strong>the</strong> trademark’s appearance <strong>on</strong> <strong>the</strong> plaintiff’s website, or <strong>the</strong>mark’s similarity to <strong>the</strong> plaintiff’s web address. Ra<strong>the</strong>r, <strong>the</strong> display of <strong>the</strong> ads was <strong>the</strong> result of<strong>the</strong> happenstance that <strong>the</strong> plaintiff chose to use a mark similar to its trademark as <strong>the</strong> address toits web page. Nor did WhenU’s activities divert or misdirect computer users away from <strong>the</strong>plaintiff’s website. Finally, <strong>the</strong> court noted that WhenU did not sell keyword trademarks to itscustomers or o<strong>the</strong>rwise manipulate which category-related ad would pop up in resp<strong>on</strong>se to anyparticular terms <strong>on</strong> <strong>the</strong> internal directory. Accordingly, <strong>the</strong> ads did not represent a “use” incommerce of <strong>the</strong> plaintiff’s trademarks. 23392335 Id. at 505-07.2336 Id. at 510.2337 1-800 C<strong>on</strong>tacts, Inc. v. Whenu.com, Inc., 414 F.3d 400, 403 (2d Cir.), cert. denied, 126 S. Ct. 749 (2005).2338 Id. at 408-09.2339 Id. at 410-12.- 509 -


3. The MetroGuide Litigati<strong>on</strong>In January 2003, MetroGuide.com sued Hotels.com in Florida for violati<strong>on</strong>s of copyrightand unfair competiti<strong>on</strong> laws for its practice of causing pop-up ads for Hotels.com to appear overMetroGuide’s web sites. The complaint alleges that <strong>the</strong> pop-up ads obscured <strong>the</strong>plaintiff439brand and c<strong>on</strong>tent underneath <strong>the</strong>m, enticing customers to book rooms directly withHotels.com. 23404. The D Squared Litigati<strong>on</strong>In Oct. 2003, <strong>the</strong> Federal Trade Commissi<strong>on</strong> instituted litigati<strong>on</strong> against D SquaredSoluti<strong>on</strong>s in federal district court in Maryland. 2341 D Squared co-opted a network administrati<strong>on</strong>feature of Microsoft Windows known as “Messenger Service,” which was designed to enablecomputer network administrators to provide instant informati<strong>on</strong> to network users such as <strong>the</strong>need to log off, to send a stream of repeated pop-up advertisements that appeared <strong>on</strong> <strong>the</strong> screensof computer users c<strong>on</strong>nected to <strong>the</strong> <strong>Internet</strong> at 10- to 30-minute intervals. The pop-up messagesinstructed c<strong>on</strong>sumers to visit <strong>on</strong>e of <strong>the</strong> defendants’ web sites to purchase software that wouldcause <strong>the</strong> pop-up ads to stop. 2342 The FTC sued D Squared, alleging that its business methodsc<strong>on</strong>stituted unfair competiti<strong>on</strong>, and secured a temporary restraining order against <strong>the</strong>defendants. 2343On Dec. 16, 2003, <strong>the</strong> court, after a hearing <strong>on</strong> an order to show cause why <strong>the</strong> courtshould not enter a preliminary injuncti<strong>on</strong>, denied <strong>the</strong> FTC’s request for a preliminary injuncti<strong>on</strong>,vacated <strong>the</strong> temporary restraining order, and directed counsel to commence discoveryimmediately. A n<strong>on</strong>-jury trial was calendared for Mar. 8-10, 2004. Because <strong>the</strong> court renderedits ruling <strong>on</strong> <strong>the</strong> record, no opini<strong>on</strong> was issued giving <strong>the</strong> court’s reas<strong>on</strong>s. However, <strong>the</strong> courtapparently noted that it was unclear whe<strong>the</strong>r <strong>the</strong> pop-up ads had caused substantial injury toc<strong>on</strong>sumers. 2344 As of <strong>the</strong> writing of this paper, <strong>the</strong> litigati<strong>on</strong> was <strong>on</strong>going.5. Internati<strong>on</strong>al Decisi<strong>on</strong>sIn March of 2004, a <strong>the</strong> Court of First Instance in Cologne, Germany, issued apreliminary injuncti<strong>on</strong> against Claria (formerly known as Gator) that prohibited <strong>the</strong> company’s2340 “MetroGuide.com Sues Hotels.com; Seeks Damages for <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Infringement and Predatory Advertising”(Jan. 27, 2003), available as of Jan. 28, 2003 at www.businesswire.com/cgibin/f_headline.cgi?bw.012703/230272653.2341 Complaint, Federal Trade Commissi<strong>on</strong> v. D Squared Soluti<strong>on</strong>s, LLC, 03 CV 31 08 (D. Md. Oct. 30, 2003),available as of Jan. 17, 2004 at www.ftc.gov/os/2003/11/0323223comp.pdf.2342 Id. 9-10.2343 The temporary restraining order was available as of Jan. 17, 2004 at www.ftc.gov/os/2003/11/0323223tro.pdf.2344 “FTC Denied Injuncti<strong>on</strong> Against Software Firm’s Intrusive Pop-Up Ads” (Dec. 15, 2003), available as of Jan.17, 2004 at http://24hour.startribune.com/24hour/technology/story/1089101p-7607955c.html.- 510 -


pop-up and pop-under ads from appearing over Hertz’s German rental car web site. The courtc<strong>on</strong>cluded that Claria had violated various secti<strong>on</strong>s of a German unfair competiti<strong>on</strong> law. 2345H. Harvesting of Web DataHarvesting of web data using robots and subsequent use or posting of <strong>the</strong> harvested datais a comm<strong>on</strong> occurrence <strong>on</strong> <strong>the</strong> Web and can be expected to generate much litigati<strong>on</strong> in <strong>the</strong>future over claims of copyright infringement and <strong>the</strong> DMCA. A number of cases are beginningto emerge:1. The FatWallet DisputeShortly before Thanksgiving of 2002, FatWallet.com posted <strong>on</strong> its web site a list ofproducts and prices scheduled to appear in advertisements <strong>on</strong> “Black Friday” (<strong>the</strong> day afterThanksgiving, when by urban legend retailers go “in <strong>the</strong> black” and start to make m<strong>on</strong>ey). Theproducts and prices had apparently been harvested from web sites of various retailers. Wal-Mart, <strong>on</strong>e of <strong>the</strong> companies whose data had been harvested, wrote a letter to FatWalletdemanding <strong>the</strong> takedown under <strong>the</strong> DMCA of its product and pricing data <strong>on</strong> <strong>the</strong> ground thatsuch data c<strong>on</strong>stituted a copyrighted compilati<strong>on</strong>. Wal-Mart’s attorneys also issued a subpoenaunder Secti<strong>on</strong> 512(h) of <strong>the</strong> DMCA asking for “informati<strong>on</strong> sufficient to identify <strong>the</strong> individualwho posted <strong>the</strong> infringing material.” Wal-Mart backed down <strong>on</strong> its demands after <strong>the</strong> Samuels<strong>on</strong>Law, Technology & Public Policy Clinic at Boalt Hall School of Law agreed to representFatWallet and fight <strong>the</strong> subpoena. 23462. Nautical Soluti<strong>on</strong>s Marketing v. Boats.comBoats.com operated a web site, Yachtworld.com, <strong>on</strong> which subscribing yacht brokersposted listings of yachts for sale. Nautical Soluti<strong>on</strong>s Marketing (NSM) opened a competing website known as Yachtbroker.com. NSM offered two services that Boats.com alleged wereinfringing of its copyrights. First, NSM used an <strong>Internet</strong> spider called Boat Rover to extractpublic yacht listing data from Yachtworld.com and o<strong>the</strong>r sites, such as manufacturer, model,length, year of manufacture, price, locati<strong>on</strong>, and URL of <strong>the</strong> web page c<strong>on</strong>taining <strong>the</strong> yachtlisting. Boat Rover extracted <strong>the</strong> facts by momentarily copying <strong>the</strong> HTML of <strong>the</strong> web pagec<strong>on</strong>taining <strong>the</strong> yacht listing and <strong>the</strong>n collecting <strong>the</strong> prescribed facts, entering <strong>the</strong> facts into asearchable database, and <strong>the</strong>n discarding <strong>the</strong> HTML. 2347Sec<strong>on</strong>d, NSM offered a “valet service” under which, with <strong>the</strong> permissi<strong>on</strong> of a yachtbroker who owned a yacht listing <strong>on</strong> ano<strong>the</strong>r web site, it would move, delete or modify <strong>the</strong> yacht2345 Dawn Kawamoto, “German Court: Pop-Ups Need Permissi<strong>on</strong>” (Mar. 26, 2004), available as of Mar. 29, 2004at www.news.com.com/2100-1024_3-5180240.html.2346 Declan McCullagh, “Wal-Mart Backs Away from DMCA Claim” (Dec. 5, 2002), available as of Dec. 8, 2002at http://news.com.com/2102-1023-976296.html.2347 Nautical Soluti<strong>on</strong>s Marketing, Inc. v. Boats.com, No. 8:02-cv-760-T-23TGW (M.D. Fla. Apr. 2, 2004), slip op.at 1-2.- 511 -


oker’s listing. Under this service, Yachtbroker.com copied and pasted certain c<strong>on</strong>tent,including pictures and descripti<strong>on</strong>s (but not <strong>the</strong> HTML for <strong>the</strong> entire web page), from yachtlistings <strong>on</strong> Yachtworld.com and posted <strong>the</strong> c<strong>on</strong>tent <strong>on</strong> Yachtbroker.com in a different format.Although <strong>the</strong> copied c<strong>on</strong>tent posted <strong>on</strong> Yachtbroker.com c<strong>on</strong>tained many of <strong>the</strong> same descriptiveheadings as <strong>the</strong> original listings <strong>on</strong> Yachtworld.com, <strong>the</strong> court found that <strong>the</strong> headings were <strong>the</strong>industry standard for yacht listings <strong>on</strong> yacht brokering web sites. 2348NSM filed an acti<strong>on</strong> for a declaratory judgment that its two services did not infringeBoats.com’s copyrights, which <strong>the</strong> court granted. The court ruled that Boats.com’s copyright ofYachtworld.com’s public web pages in order to extract from yacht listings facts unprotected bycopyright law c<strong>on</strong>stituted a fair use. 2349 The court fur<strong>the</strong>r ruled that <strong>the</strong> copyrights in <strong>the</strong> picturesand descripti<strong>on</strong>s of yachts copied by <strong>the</strong> valet service were owned by <strong>the</strong> individual yachtbrokers, not Boats.com, and such copying was <strong>the</strong>refore not infringing. Nor was copying of <strong>the</strong>headings an infringement, because <strong>the</strong> headings, being industry standards, were not protected bycopyright. 2350 Boats.com also claimed a copyright in <strong>the</strong> look and feel of <strong>the</strong> Yachtworld.comweb site that it alleged had been copied by Yachtbroker.com. The court rejected this claim,finding that <strong>the</strong> two web sites were quite dissimilar in appearance. 2351 Finally, <strong>the</strong> court rejecteda claim of infringement in a compilati<strong>on</strong> copyright over <strong>the</strong> yacht listings <strong>on</strong> Yachtworld.com.The court held that, because <strong>the</strong> format used by NSM to display <strong>on</strong> Yachtbroker.com <strong>the</strong> c<strong>on</strong>tentcopied from Yachtworld.com differed from <strong>the</strong> format used by Yachtworld.com to display <strong>the</strong>same informati<strong>on</strong>, <strong>the</strong> compilati<strong>on</strong> of yacht listings <strong>on</strong> Yachtbroker.com was not virtuallyidentical and was <strong>the</strong>refore not infringing. 2352IV. CONCLUSION<str<strong>on</strong>g>Copyright</str<strong>on</strong>g> law provides <strong>on</strong>e of <strong>the</strong> most important forms of intellectual propertyprotecti<strong>on</strong> <strong>on</strong> <strong>the</strong> <strong>Internet</strong>. C<strong>on</strong>siderable challenges are presented, however, in adaptingtraditi<strong>on</strong>al copyright law, which was designed to deal with <strong>the</strong> creati<strong>on</strong>, distributi<strong>on</strong> and sale ofprotected works in tangible copies, to <strong>the</strong> electr<strong>on</strong>ic transmissi<strong>on</strong>s of <strong>the</strong> <strong>on</strong>line world in whichcopies are not tangible in <strong>the</strong> traditi<strong>on</strong>al sense, and it is often difficult to know precisely where acopy resides at any given time within <strong>the</strong> network.The most difficult aspect of adapting copyright law to <strong>the</strong> <strong>on</strong>line world stems from <strong>the</strong>fact that virtually every activity <strong>on</strong> <strong>the</strong> <strong>Internet</strong> – such as browsing, caching, linking,downloading, accessing informati<strong>on</strong>, and operati<strong>on</strong> of an <strong>on</strong>line service – involves <strong>the</strong> making ofcopies, at least to <strong>the</strong> extent <strong>the</strong> law treats electr<strong>on</strong>ic images of data stored in RAM as “copies”for purposes of copyright law. In short, “copying” is both ubiquitous and inherent in <strong>the</strong> verynature of <strong>the</strong> medium. If <strong>the</strong> law were to treat all forms of “copying” as infringements of <strong>the</strong>2348 Id. at 3-4.2349 Id. at 4.2350 Id. at 5.2351 Id. at 6.2352 Id. at 7.- 512 -


copyright holder’s rights, <strong>the</strong>n <strong>the</strong> copyright holder would have very str<strong>on</strong>g c<strong>on</strong>trol over <strong>Internet</strong>use of <strong>the</strong> copyrighted work. Which forms of copying <strong>the</strong> law should deem to be within <strong>the</strong>c<strong>on</strong>trol of <strong>the</strong> copyright owner and which should not presents a very difficult challenge.The cumulative effect of <strong>the</strong> copyright holder’s rights being implicated by every use of awork <strong>on</strong> <strong>the</strong> <strong>Internet</strong> may be to give <strong>the</strong> copyright owner <strong>the</strong> equivalent of exclusive rights of“transmissi<strong>on</strong> and access” of informati<strong>on</strong>. Indeed, <strong>the</strong> WIPO <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> Treaty and <strong>the</strong> WIPOPerformances and Ph<strong>on</strong>ograms Treaty each make such rights express. However, <strong>the</strong> DMCAdoes not set up separate rights of transmissi<strong>on</strong> and access, although <strong>the</strong> draft European <str<strong>on</strong>g>Copyright</str<strong>on</strong>g>Directive would recognize such rights explicitly. Thus, <strong>the</strong> implementing legislative regimesadopted by various signatory countries to <strong>the</strong> WIPO treaties may result in varying scopes and/ordenominati<strong>on</strong>s of rights, which runs c<strong>on</strong>trary to <strong>the</strong> goal of <strong>the</strong> WIPO treaties to harm<strong>on</strong>izecopyright law in <strong>the</strong> digital envir<strong>on</strong>ment throughout <strong>the</strong> world.The ubiquitous nature of “copying” <strong>on</strong> <strong>the</strong> <strong>Internet</strong> raises o<strong>the</strong>r difficult issues. Forexample, <strong>the</strong> practice of dividing copyright rights (such as <strong>the</strong> reproducti<strong>on</strong> right, <strong>the</strong> publicperformance right, and <strong>the</strong> distributi<strong>on</strong> right) am<strong>on</strong>g separate rights holders, as is comm<strong>on</strong> in <strong>the</strong>movie and music industries, will raise difficult issues of overlapping rights when a work isexploited through <strong>the</strong> <strong>Internet</strong>, because <strong>the</strong> exercise of all such rights will involve <strong>the</strong> making of“copies.” Licensees may <strong>the</strong>refore need to seek permissi<strong>on</strong> from multiple rights holders thatmay not have been necessary in traditi<strong>on</strong>al media. 2353Moreover, <strong>the</strong> traditi<strong>on</strong>al divisi<strong>on</strong>s of <strong>the</strong> bundle of copyright rights may no l<strong>on</strong>ger makesense <strong>on</strong> <strong>the</strong> <strong>Internet</strong>. For example, it is comm<strong>on</strong> for different entities to hold <strong>the</strong> right toreproduce copies of a movie, to distribute copies of <strong>the</strong> movie, and to grant licenses for publicperformance of <strong>the</strong> movie. Under that divisi<strong>on</strong> of rights, who has <strong>the</strong> right to make <strong>the</strong> movieavailable <strong>on</strong> <strong>the</strong> <strong>Internet</strong> for <strong>on</strong>-demand viewing by users, since <strong>on</strong>-demand viewings willinvolve <strong>the</strong> making of copies of <strong>the</strong> movie, <strong>the</strong> distributi<strong>on</strong> of copies, and <strong>the</strong> public performanceof <strong>the</strong> movie? Or should it be <strong>the</strong> holder of <strong>the</strong> new right of transmissi<strong>on</strong> and access under <strong>the</strong>WIPO treaties? 2354 Because of <strong>the</strong> overlapping nature of copyright rights when applied to <strong>the</strong><strong>Internet</strong>, new definiti<strong>on</strong>s and divisi<strong>on</strong>s of those rights will probably be necessary for <strong>on</strong>lineusage of copyrighted works. Corresp<strong>on</strong>ding new ec<strong>on</strong>omic and royalty models and industrypractices will also have to evolve. In <strong>the</strong> meantime, many existing licenses will be unclear as towhich entity has rights to c<strong>on</strong>trol <strong>on</strong>line usage of a work, and <strong>on</strong>e can expect to see muchlitigati<strong>on</strong> over <strong>the</strong> interpretati<strong>on</strong> of existing licenses. 23552353 See Lemley, supra note 6, at 568-72.2354 Because <strong>the</strong> new right of transmissi<strong>on</strong> and access in <strong>the</strong> WIPO treaties will be in additi<strong>on</strong> to <strong>the</strong> o<strong>the</strong>r rights thatmay be implicated by <strong>Internet</strong> uses of copyrighted works, <strong>the</strong>se new rights can be expected to increase <strong>the</strong>problem of overlapping rights. For example, existing licenses will be silent <strong>on</strong> <strong>the</strong>se new rights, and <strong>the</strong>re will<strong>the</strong>refore be great uncertainty as to whe<strong>the</strong>r <strong>the</strong> licensor retains such rights, or whe<strong>the</strong>r <strong>the</strong> licensee has a licenseunder such rights and, if so, of what scope.2355 See Lemley, supra note 6, at 572-74. One commentator has c<strong>on</strong>sidered several possible ways of dealing with<strong>the</strong> overlap of exclusive copyright rights that occurs <strong>on</strong> <strong>the</strong> <strong>Internet</strong> (placing <strong>the</strong> burden of overlap <strong>on</strong> <strong>the</strong> user;placing <strong>the</strong> burden of overlap <strong>on</strong> <strong>the</strong> copyright owner; and establishing a new right of transmissi<strong>on</strong> over a- 513 -


The global nature of <strong>the</strong> <strong>Internet</strong> may give rise to multiple territorial liability. If everyintermediate “copy” made during a transmissi<strong>on</strong> is c<strong>on</strong>sidered infringing, <strong>the</strong>re is <strong>the</strong> possibilitythat a single transmissi<strong>on</strong> could give rise to potential liability in several countries, even countriesin which <strong>the</strong> sender did not intend or c<strong>on</strong>template that its acti<strong>on</strong>s would result in <strong>the</strong> creati<strong>on</strong> of acopy. 2356 Moreover, differing standards could apply – <strong>the</strong> same intermediate copy created in <strong>the</strong>course of transmissi<strong>on</strong> through <strong>the</strong> <strong>Internet</strong> could be c<strong>on</strong>sidered infringing when passing through<strong>on</strong>e country, and not when passing through ano<strong>the</strong>r. In additi<strong>on</strong>, <strong>the</strong> violati<strong>on</strong> of <strong>the</strong> rights oftransmissi<strong>on</strong> and access under <strong>the</strong> WIPO treaties might occur in yet ano<strong>the</strong>r country. Although<strong>the</strong> WIPO treaties may afford a vehicle for greater transnati<strong>on</strong>al uniformity of copyright law,<strong>the</strong>re is no guarantee that implementing legislati<strong>on</strong> in <strong>the</strong> various signatory countries will bec<strong>on</strong>sistently adopted, c<strong>on</strong>sistently interpreted, or c<strong>on</strong>sistently applied.In sum, copyright owners may have potentially unprecedented rights over use of <strong>the</strong>ircopyrighted material <strong>on</strong> <strong>the</strong> <strong>Internet</strong>. One can expect that <strong>the</strong> fair use and implied licensedoctrines (and <strong>the</strong>ir internati<strong>on</strong>al equivalents) will take center stage in resolving <strong>the</strong> balancebetween copyright owners’ and users’ rights <strong>on</strong> <strong>the</strong> <strong>Internet</strong>. How broadly <strong>the</strong>se doctrines willbe applied, and whe<strong>the</strong>r <strong>the</strong>y will be c<strong>on</strong>sistently applied in various countries, remains to beseen. <str<strong>on</strong>g>Copyright</str<strong>on</strong>g> lawyers will c<strong>on</strong>tinue to be busy.computer network that would replace <strong>the</strong> o<strong>the</strong>r rights to <strong>the</strong> extent <strong>the</strong>y are applicable to networktransmissi<strong>on</strong>s). See id. at 578-84.2356 In additi<strong>on</strong>, at least <strong>on</strong>e court held that where predicate acts occurred in <strong>the</strong> U.S. leading to infringements thatoccurred abroad, damages flowing worldwide from a U.S. infringement could be c<strong>on</strong>sidered. Update Art, Inc.v. Modiin Publishing, Ltd., 843 F.2d 67 (2d Cir. 1988).- 514 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!