13.07.2015 Views

Advanced Copyright Issues on the Internet - Fenwick & West LLP

Advanced Copyright Issues on the Internet - Fenwick & West LLP

Advanced Copyright Issues on the Internet - Fenwick & West LLP

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

software c<strong>on</strong>stitutes a violati<strong>on</strong> of <strong>the</strong> DMCA. 800 The plaintiff Avaya sold PBX systems withmaintenance software embedded in <strong>the</strong>m. When selling a new system, Avaya supplied <strong>the</strong>customer with a set of default passwords that <strong>the</strong> customer used to first log in to <strong>the</strong> system.Avaya alleged that <strong>the</strong> passwords were used without authorizati<strong>on</strong> by <strong>the</strong> defendants to log inand gain access to Avaya’s maintenance software. Defendants moved for summary judgmentthat use of valid logins to gain access to software does not violate <strong>the</strong> DMCA. The court ruledthat summary judgment was not appropriate because granting <strong>the</strong> moti<strong>on</strong> would not result indismissal of any porti<strong>on</strong> of Avaya’s DMCA claims from <strong>the</strong> case. All that would be resolvedwould be <strong>the</strong> abstract issue of whe<strong>the</strong>r use of valid logins does not violate <strong>the</strong> DMCA. BecauseAvaya had not identified a single, specific PBX to which <strong>the</strong> alleged illegal c<strong>on</strong>duct was applied,ruling <strong>on</strong> <strong>the</strong> moti<strong>on</strong> would have no effect until such time as <strong>the</strong> defendants could prove which of<strong>the</strong> PBXs at issue were accessed with <strong>the</strong> known, valid logins that <strong>the</strong>y alleged were immunefrom DMCA liability. 801 “Avaya’s DMCA claims may or may not have merit, but a summaryjudgment rendered <strong>on</strong> a discrete set of facts that have yet to be proven is not <strong>the</strong> proper vehiclefor that determinati<strong>on</strong>.” 802(xx) Actuate v. IBMIn Actuate Corp. v. Internati<strong>on</strong>al Business Machines Corp., 803 Actuate alleged that IBM’sunauthorized posting <strong>on</strong> an IBM web site of Actuate’s copyrighted software for downloading,toge<strong>the</strong>r with <strong>the</strong> license keys that allowed for unlimited use of such software by downloaders,whe<strong>the</strong>r <strong>the</strong>y were authorized to use <strong>the</strong> software or not, c<strong>on</strong>stituted circumventi<strong>on</strong> oftechnological measures <strong>on</strong> <strong>the</strong> software that restricted access to it and trafficking incircumventi<strong>on</strong> devices. IBM filed a moti<strong>on</strong> to dismiss <strong>the</strong> claim, relying <strong>on</strong> <strong>the</strong> I.M.S., Egilman,and R.C. Olmstead cases for <strong>the</strong> propositi<strong>on</strong> that improper use of a legitimate password issued by<strong>the</strong> copyright holder does not c<strong>on</strong>stitute circumventi<strong>on</strong>. 804The court denied <strong>the</strong> moti<strong>on</strong>. It found <strong>the</strong> I.M.S., Egilman, and R.C. Olmstead cases inc<strong>on</strong>flict with <strong>the</strong> 321 Studios and <strong>the</strong> Microsoft v. EEE Business cases from <strong>the</strong> Nor<strong>the</strong>rn Districtof California with respect to <strong>the</strong> issue of whe<strong>the</strong>r <strong>the</strong> unauthorized use of an o<strong>the</strong>rwise legitimatepassword can c<strong>on</strong>stitute circumventi<strong>on</strong>. The court rejected IBM’s argument that <strong>the</strong> two lines ofcases were not inc<strong>on</strong>sistent <strong>on</strong> <strong>the</strong> ground that, in <strong>the</strong> 321 Studios and Microsoft v. EEE Businesscases, <strong>the</strong>re was no allegati<strong>on</strong> that <strong>the</strong> parties whose passwords were being used had issued thosepasswords to a third party. The court found no basis in 321 Studios for such a distincti<strong>on</strong>, andnoted that Egilman expressly rejected <strong>the</strong> distincti<strong>on</strong>. Accordingly, <strong>the</strong> court c<strong>on</strong>cluded that <strong>the</strong>two lines of cases simply reached c<strong>on</strong>tradictory results, and declined to follow <strong>the</strong> reas<strong>on</strong>ing of<strong>the</strong> I.M.S. line of cases. It instead followed <strong>the</strong> 321 Studios and <strong>the</strong> Microsoft v. EEE Business800801802803804Avaya, Inc. v. Telecom Labs, Inc., 2009 U.S. Dist. LEXIS 82609 (D.N.J. Sept. 9, 2009).Id. at *2 & *10-13.Id. at *13.2010 U.S. Dist. LEXIS 33095 (N.D. Cal. Apr. 5, 2010).Id. at *9-10.- 183 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!