|
[back to notice text] Question: What does it mean to distribute circumvention tools?
Answer: Section 1201(a)(2) defines distribution as the "manufacture, import, offer to the public, provide, or otherwise traffic" of circumvention tools. This definition can be interpreted extremely broadly as evident in the court's analysis in the DVD encryption Universal v. Corley case. In its decision, the court considered not only making the source code of a program for free a type of distribution, but also found that merely linking to a web site containing illegal tools can constitute "trafficking."
[back to notice text] Question: What is a circumvention tool?
Answer: The prohibited tools under the DMCA are the programs which are primarily designed or produced for the purpose of circumvention of an access [1201(2)(a)] or copy control [1201(b)(1)(A)] mechanism. These programs can come in various forms including products, services, devices, or components. The DMCA includes in its definition of circumvention tools that these devices have limited commercially significant purposes other than circumvention or are marketed to be used for circumvention [1201(2)(B-C)], 1201(b)(1)(B-C)]. Congress intended the circumvention device bans to be analogous to laws that specifically prohibit the manufacture or distribution of descrambler boxes that allow access to cable television and satellite services without payment. However, the broad definition of circumvention tools in the DMCA creates numerous situations in which non-infringing uses of copyrighted works are prohibited as well merely because the technology necessary to engage in those legitimate uses is illegal under the circumvention device ban.
[back to notice text] Question: What are the DMCA's anti-circumvention provisions?
Answer: The Digital Millennium Copyright Act (DMCA) is the latest amendment to copyright law, which introduced a new category of copyright violations that prohibit the "circumvention" of technical locks and controls on the use of digital content and products. These anti-circumvention provisions put the force of law behind any technological systems used by copyright owners to control access to and copying of their digital works. The DMCA contains four main provisions:
- a prohibition on circumventing access controls [1201(a)(1)(A)];
- an access control circumvention device ban (sometimes called the "trafficking" ban) [1201(a)(2)];
- a copyright protection circumvention device ban [1201(b)]; and,
- a prohibition on the removal of copyright management information (CMI) [1202(b)].
The first provision prohibits the act of circumventing technological protection systems, the second and third ban technological devices that facilitate the circumvention of access control or copy controls, and the fourth prohibits individuals from removing information about access and use devices and rules. The first three provisions are also distinguishable in that the first two provisions focus on technological protection systems that provide access control to the copyright owner, while the third provision prohibits circumvention of technological protections against unauthorized duplication and other potentially copyright infringing activities.
[back to notice text] Question: If a hyperlink is just a location pointer, how can it be illegal?
Answer:
It probably isn't, however, a few courts have now held that a hyperlink violates the law if it points to illegal material with the purpose of disseminating that illegal material:
- In the DeCSS case, Universal v. Reimerdes, the court barred 2600 Magazine from posting hyperlinks to DeCSS code because it found the magazine had linked for the purpose of disseminating a circumvention device. (See Anticircumvention (DMCA).) The court ruled that it could regulate the link because of its "function," even if the link was also speech.
- In another case, Intellectual Reserve v. Utah Lighthouse Ministry, a Utah court found that linking to unauthorized copies of a text might be a contributory infringement of the work's copyright. (The defendant in that case had previously posted unauthorized copies on its own site, then replaced the copies with hyperlinks to other sites.)
By contrast, the court in Ticketmaster v. Tickets.com found that links were not infringements of copyright.
Like anything else on a website, a hyperlink could also be problematic if it misrepresents something about the website. For example, if the link and surrounding text falsely stated that a website is affiliated with another site or sponsored by the linked company, it might be false advertising or defamation.
Finally, post-Grokster, a hyperlink might be argued to induce copyright infringement, if the link were made knowing that the linked-to material was infringing and with the intent of inducing people to follow the link and infringe copyright.
In most cases, however, simple linking is unlikely to violate the law.
[back to notice text] Question: What are the notice and takedown procedures for web sites?
Answer: In order to have an allegedly infringing web site removed from a service provider's network, or to have access to an allegedly infringing website disabled, the copyright owner must provide notice to the service provider with the following information:
- The name, address, and electronic signature of the complaining party [512(c)(3)(A)(i)]
- The infringing materials and their Internet location [512(c)(3)(A)(ii-iii)], or if the service provider is an "information location tool" such as a search engine, the reference or link to the infringing materials [512(d)(3)].
- Sufficient information to identify the copyrighted works [512(c)(3)(A)(iv)].
- A statement by the owner that it has a good faith belief that there is no legal basis for the use of the materials complained of [512(c)(3)(A)(v)].
- A statement of the accuracy of the notice and, under penalty of perjury, that the complaining party is authorized to act on the behalf of the owner [512(c)(3)(A)(vi)].
Once notice is given to the service provider, or in circumstances where the service provider discovers the infringing material itself, it is required to expeditiously remove, or disable access to, the material. The safe harbor provisions do not require the service provider to notify the individual responsible for the allegedly infringing material before it has been removed, but they do require notification after the material is removed.
[back to notice text] Question: What are the notice and takedown procedures for web sites?
Answer: In order to have an allegedly infringing web site removed from a service provider's network, or to have access to an allegedly infringing website disabled, the copyright owner must provide notice to the service provider with the following information:
- The name, address, and electronic signature of the complaining party [512(c)(3)(A)(i)]
- The infringing materials and their Internet location [512(c)(3)(A)(ii-iii)], or if the service provider is an "information location tool" such as a search engine, the reference or link to the infringing materials [512(d)(3)].
- Sufficient information to identify the copyrighted works [512(c)(3)(A)(iv)].
- A statement by the owner that it has a good faith belief that there is no legal basis for the use of the materials complained of [512(c)(3)(A)(v)].
- A statement of the accuracy of the notice and, under penalty of perjury, that the complaining party is authorized to act on the behalf of the owner [512(c)(3)(A)(vi)].
Once notice is given to the service provider, or in circumstances where the service provider discovers the infringing material itself, it is required to expeditiously remove, or disable access to, the material. The safe harbor provisions do not require the service provider to notify the individual responsible for the allegedly infringing material before it has been removed, but they do require notification after the material is removed.
[back to notice text] Question: Can a copyright owner find out the identity of the individual responsible for the allegedly infringing material?
Answer: The safe harbor provisions permit a copyright owner to subpoena the identity of the individual allegedly responsible for the infringing activities. [512(h)] Such a subpoena is granted on the condition that the information about the individual's identity will only be used in relation to the protection of the intellectual property rights of the copyright owner. [512(h)(2)(C)] The DMCA subpoena provision does not apply to requests for the identities of users of ISP conduit 512(a) services, but only to users of hosting or linking, for which a takedown may be sent under 512(c)(3)(A). Thus DMCA subpoenas cannot be used to find the identities of users engaged in peer-to-peer filesharing. Recording Industry Assoc. of America v. Verizon Internet Svcs., Inc.
[back to notice text] Question: What rights are protected by copyright law?
Answer: The purpose of copyright law is to encourage creative work by granting a temporary monopoly in an author's original creations. This monopoly takes the form of six rights in areas where the author retains exclusive control. These rights are: (1) the right of reproduction (i.e., copying), (2) the right to create derivative works, (3) the right to distribution, (4) the right to performance, (5) the right to display, and (6) the digital transmission performance right. The law of copyright protects the first two rights in both private and public contexts, whereas an author can only restrict the last four rights in the public sphere. Claims of infringement must show that the defendant exercised one of these rights. For example, if I create unauthorized videotape copies of Star Trek II: The Wrath of Khan and distribute them to strangers on the street, then I have infringed both the copyright holder's rights of reproduction and distribution. If I merely re-enact The Wrath of Khan for my family in my home, then I have not infringed on the copyright. Names, ideas and facts are not protected by copyright. Trademark law, in contrast, is designed to protect consumers from confusion as to the source of goods (as well as to protect the trademark owner's market). To this end, the law gives the owner of a registered trademark the right to use the mark in commerce without confusion. If someone introduces a trademark into the market that is likely to cause confusion, then the newer mark infringes on the older one. The laws of trademark infringement and dilution protect against this likelihood of confusion. Trademark protects names, images and short phrases. Infringement protects against confusion about the origin of goods. The plaintiff in an infringement suit must show that defendant's use of the mark is likely to cause such a confusion. For instance, if I were an unscrupulous manufacturer, I might attempt to capitalize on the fame of Star Trek by creating a line of 'Spock Activewear.' If consumers could reasonably believe that my activewear was produced or endorsed by the owners of the Spock trademark, then I would be liable for infringement. The law of trademark dilution protects against confusion concerning the character of a registered trademark. Suppose I created a semi-automatic assault rifle and marketed it as 'The Lt. Uhura 5000.' Even if consumers could not reasonably believe that the Star Trek trademark holders produced this firearm, the trademark holders could claim that my use of their mark harmed the family-oriented character of their mark. I would be liable for dilution.
|