13.07.2015 Views

Advanced Copyright Issues on the Internet - Fenwick & West LLP

Advanced Copyright Issues on the Internet - Fenwick & West LLP

Advanced Copyright Issues on the Internet - Fenwick & West LLP

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

In United States v. Whitehead, 816 <strong>the</strong> Ninth Circuit affirmed <strong>the</strong> sentence for a man whowas c<strong>on</strong>victed of selling over $1 milli<strong>on</strong> worth of counterfeit access cards that allowed hiscustomers to access DirecTV’s digital satellite feed without paying for it. The court found noabuse of discreti<strong>on</strong> in <strong>the</strong> district court’s c<strong>on</strong>clusi<strong>on</strong> that a substantial amount of communityservice (1000 hours), a hefty restituti<strong>on</strong> order ($50,000) and five years of supervised releasewere more appropriate than pris<strong>on</strong>, even though <strong>the</strong> punishment was below that of <strong>the</strong> federalsentencing guidelines, which called for a range of 41 to 51 m<strong>on</strong>ths in pris<strong>on</strong>. 817Sword(15) O<strong>the</strong>r Uses of <strong>the</strong> Anti-Circumventi<strong>on</strong> Provisi<strong>on</strong>s as aThe RealNetworks and Reimerdes cases suggest how <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>sof <strong>the</strong> DMCA might be used as a “sword” in o<strong>the</strong>r ways. For example, <strong>the</strong> manufacturer of adatabase product that enables users to password protect data files might bring an acti<strong>on</strong> under <strong>the</strong>DMCA against <strong>the</strong> manufacturer of “cracking” software that enables third parties to bypass ordeactivate <strong>the</strong> password protecti<strong>on</strong> <strong>on</strong> such data files. The manufacturer of <strong>the</strong> database productmight, for example, allege “injury” from <strong>the</strong> “cracking” software in <strong>the</strong> form of damage to itsreputati<strong>on</strong> as <strong>the</strong> manufacturer of a “secure” product. Alternatively, if a claim were made against<strong>the</strong> database product manufacturer by a user alleging injury resulting from <strong>the</strong> user’s data filebeing “cracked” by a third party, such claim would provide ano<strong>the</strong>r basis for <strong>the</strong> databaseproduct manufacturer to allege its own injury from <strong>the</strong> “cracking” software.O<strong>the</strong>r recent examples of attempts at creative use of <strong>the</strong> anti-circumventi<strong>on</strong> provisi<strong>on</strong>s asa sword are <strong>the</strong> following:Comp<strong>on</strong>ents, Inc.(i)Lexmark Internati<strong>on</strong>al, Inc. v. Static C<strong>on</strong>trolLexmark sold t<strong>on</strong>er cartridges for use with its laser printers. The cartridges were of twotypes: “regular” cartridges that could be refilled and remanufactured freely by third parties, and“prebate” cartridges that could be used <strong>on</strong>ly <strong>on</strong>ce, and for which <strong>the</strong> c<strong>on</strong>sumer agreed, in <strong>the</strong>form of a shrinkwrap agreement placed across <strong>the</strong> top of every prebate cartridge box, to return<strong>the</strong> used cartridge to Lexmark for remanufacturing and recycling. Lexmark’s printers c<strong>on</strong>tainedtwo computer programs – a Printer Engine Program that c<strong>on</strong>trolled various printer operati<strong>on</strong>ssuch as paper feed, paper movement, and motor c<strong>on</strong>trol, and a T<strong>on</strong>er Loading Program of 37 to55 bytes, which resided within microchips attached to <strong>the</strong> t<strong>on</strong>er cartridges and enabled Lexmarkprinters to approximate <strong>the</strong> amount of t<strong>on</strong>er remaining in <strong>the</strong> cartridge. 818To protect <strong>the</strong> Printer Engine Programs and T<strong>on</strong>er Loading Programs, and to preventunauthorized t<strong>on</strong>er cartridges from being used with Lexmark’s printers, Lexmark’s printers usedan au<strong>the</strong>nticati<strong>on</strong> sequence that ran each time a t<strong>on</strong>er cartridge was inserted into a Lexmarkprinter, <strong>the</strong> printer was powered <strong>on</strong>, or whenever <strong>the</strong> printer was opened and closed. The816817818532 F.3d 991 (9 th Cir. 2008).Id. at 992.Lexmark Internati<strong>on</strong>al, Inc. v. Static C<strong>on</strong>trol Comp<strong>on</strong>ents, Inc., 253 F. Supp. 2d 943, 948-49 (E.D. Ky. 2003).- 186 -

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!