| ![]() | ||||||||||||||||||||
| Chilling Effects Clearinghouse > Copyright > Notices > SAIC objects to Archived infringement (NoticeID 2272, http://chillingeffects.org/N/2272) | Location: https://www.chillingeffects.org/copyright/notice.cgi?NoticeID=2272 |
August 10, 2005
|
Sender Information: |
Recipient Information:
[Private]
Internet Archive
San Francisco, CA, USA
Sent via: email
Re: Notification of Copyright Infringement Under the DMCA
Dear Internet Archive Copyright Agent: Confidentiality Notice:
We represent Science Applications International Corporation ("SAIC"), the owner of the copyrights in the website and corresponding HTML code used by its wholly-owned subsidiary SAIC-VCC. SAIC has received copyright registration certificates for the June 2002 versions of its website (TX 6-162-493) and HTML code (TX 6-162-492). Somewhat modified versions of the June 2002 versions of the website and code, the copyrights to which are also owned by SAIC, are currently located at www.saic-vcc.com. For your review, the June 2002 version of the website that SAIC registered is currently available on the Internet Archive WayBack Machine at the following address:
http://web.archive.org/web/20020602173711/http://www.saic-vcc.com/
It has come to our attention that your company is hosting archived pages from a website that was operated Anza Borrego Partners, Inc. at www.anzaborregopartners.com, and that such archived pages contain content and corresponding HTML code virtually identical (or at least substantially similar) to the website content and HTML code owned by SAIC. We and SAIC have a good faith belief that the use of SAIC's copyrighted website and code in this manner is not authorized by SAIC, any of its agents, or by the law. This unauthorized copying constitutes copyright infringement under the Copyright Act.
The particular archived pages at issue are identified by the Internet Archive WayBack Machine as the October 9, 2004 and October 11, 2004 archived versions of the website located at www.anzaborregopartners.com. For your convenience, the full address to the archived home pages of the infringing website are the following:
http://web.archive.org/web/20041009122954/http://www.anzaborregopartners.com/
http://web.archive.org/web/20041011181043/http://www.anzaborregopartners.com/
Because these archived versions of the Anza Borrego Partners website infringe SAIC's copyright rights, we ask you respond expeditiously to remove, or disable access to, the archived versions of this website.
We assert, under penalty of perjury, that Kilpatrick Stockton LLP is authorized to act on behalf of SAIC with respect to these copyrights. We also assert that all the information contained in this notification is accurate. Should you have any questions, please contact us at the email address, telephone number, or mailing address listed below.
Thank you in advance for your cooperation in this matter. Please accept the following as my electronic signature.
Sincerely,
s/ [private]
[private]
on behalf of Kilpatrick Stockton LLP
[private]
Kilpatrick Stockton LLP
[private]
[private]
Atlanta, GA 30309-4530
t 404[private]
f 404[private]
m 404[private]
[private]@KilpatrickStockton.com
www.KilpatrickStockton.com
This communication constitutes an electronic communication within the meaning of the Electronic Communications Privacy Act, 18 U.S.C. Section 2510, and its disclosure is strictly limited to the recipient intended by the sender of this message. This transmission, and any attachments, may contain confidential attorney-client privileged information and attorney work product. If you are not the intended recipient, any disclosure, copying, distribution or use of any of the information contained in or attached to this transmission is STRICTLY PROHIBITED. Please contact us immediately by return e-mail or at [private], and destroy the original transmission and its attachments without reading or saving in any manner.
**DISCLAIMER** Treasury Department Circular 230 Disclosure: To ensure compliance with requirements imposed by the Treasury Department, we inform you that any U.S. federal tax advice contained in this communication (including any attachments) is not intended or written to be used, and cannot be used, for the purpose of (i) avoiding penalties under the Internal Revenue Code or (ii) promoting, marketing or recommending to another party any transaction or matter addressed herein...
|
Question: What is copyright protection? Answer: A copyright protects a literary, musical, dramatic, choreographic, pictoral or graphic, audiovisual, or architectural work, or a sound recording, from being reproduced without the permision of the copyright owner. 17 U.S.C. Question: What may be copyrighted?
Answer:
In order to be copyrightable, a work must be Question: How can I find out whether a work has a registered copyright? Answer: Works are copyrighted as soon as they are "fixed in a tangible medium of expression," but some legal rights and remedies are available only if the work's copyright is registered. To find a copyright registration, you may search copyright records at the Copyright Office website, but be aware that not finding a match does not mean the work is uncopyrighted. Question: What constitutes copyright infringement?
Answer: Subject to certain defenses, it is copyright infringement for someone other than the author to do the following without the author's permission: Question: What defenses are there to copyright infringement? Answer: The primary defense to copyright infringement is "fair use." 17 U.S.C. Question: Does a copyright owner have to specify the exact materials it alleges are infringing?
Answer: Proper notice under the safe harbor provisions requires the copyright owners to specifically identify the alleged infringing materials, or if the service provider is an "information location tool" such as a search engine, to specifically identify the links to the alleged infringing materials. [512(c)(3)(iii)], [512(d)(3)]. The provisions also require the copyright owners to identify the copyrighted work, or a representative list of the copyrighted works, that is claimed to be infringed. [512(c)(3)(A)(ii)]. Rather than simply sending a letter to the service provider that claims that infringing material exists on their system, these qualifications ensure that service providers are given a reasonable amount of information to locate the infringing materials and to effectively police their networks. [512(c)(3)(A)(iii)], [512(d)(3)]. However, in the recent case of ALS Scan, Inc. v. Remarq Communities, Inc., the court found that the copyright owner did not have to point out all of the infringing material, but only substantially all of the material. The relaxation of this specificity requirement shifts the burden of identifying the material to the service provider, raising the question of the extent to which a service provider must search through its system. OSP customers should note that this situation might encourage OSP's to err on the side of removing allegedly infringing material. Question: What are the DMCA Safe Harbor Provisions?
Answer: In 1998, Congress passed the On-Line Copyright Infringement Liability Limitation Act (OCILLA) in an effort to protect service providers on the Internet from liability for the activities of its users. Codified as section 512 of the Digital Millennium Copyright Act (DMCA), this new law exempts on-line service providers that meet the criteria set forth in the safe harbor provisions from claims of copyright infringement made against them that result from the conduct of their customers. These safe harbor provisions are designed to shelter service providers from the infringing activities of their customers. If a service provider qualifies for the safe harbor exemption, only the individual infringing customer are liable for monetary damages; the service provider's network through which they engaged in the alleged activities is not liable. Question: What defines a service provider under Section 512 of the Digital Millennium Copyright Act (DMCA)?
Answer: A service provider is defined as "an entity offering transmission, routing, or providing connections for digital online communications, between or among points specified by a user, of material of the user's choosing, without modification to the content of the material as sent or received" or "a provider of online services or network access, or the operator of facilities thereof." [512(k)(1)(A-B)] This broad definition includes network services companies such as Internet service providers (ISPs), search engines, bulletin board system operators, and even auction web sites. In A&M Records, Inc. v. Napster Inc., the court refused to extend the safe harbor provisions to the Napster software program and service, leaving open the question of whether peer-to-peer networks also qualify for safe harbor protection under Section 512. There are four major categories of network systems offered by service providers that qualify for protection under the safe harbor provisions:
Question: What does a service provider have to do in order to qualify for safe harbor protection?
Answer: In addition to informing its customers of its policies (discussed above), a service provider must follow the proper notice and takedown procedures (discussed above) and also meet several other requirements in order to qualify for exemption under the safe harbor provisions. In order to facilitate the notification process in cases of infringement, ISPs which allow users to store information on their networks, such as a web hosting service, must designate an agent that will receive the notices from copyright owners that its network contains material which infringes their intellectual property rights. The service provider must then notify the Copyright Office of the agent's name and address and make that information publicly available on its web site. [512(c)(2)] Finally, the service provider must not have knowledge that the material or activity is infringing or of the fact that the infringing material exists on its network. [512(c)(1)(A)], [512(d)(1)(A)]. If it does discover such material before being contacted by the copyright owners, it is instructed to remove, or disable access to, the material itself. [512(c)(1)(A)(iii)], [512(d)(1)(C)]. The service provider must not gain any financial benefit that is attributable to the infringing material. [512(c)(1)(B)], [512(d)(2)]. Question: What are the notice and takedown procedures for web sites?
Answer: In order to have an allegedly infringing web site removed from a service provider's network, or to have access to an allegedly infringing website disabled, the copyright owner must provide notice to the service provider with the following information:
Once notice is given to the service provider, or in circumstances where the service provider discovers the infringing material itself, it is required to expeditiously remove, or disable access to, the material. The safe harbor provisions do not require the service provider to notify the individual responsible for the allegedly infringing material before it has been removed, but they do require notification after the material is removed. Question: What are the counter-notice and put-back procedures?
Answer: In order to ensure that copyright owners do not wrongly insist on the removal of materials that actually do not infringe their copyrights, the safe harbor provisions require service providers to notify the subscribers if their materials have been removed and to provide them with an opportunity to send a written notice to the service provider stating that the material has been wrongly removed. [512(g)] If a subscriber provides a proper "counter-notice" claiming that the material does not infringe copyrights, the service provider must then promptly notify the claiming party of the individual's objection. [512(g)(2)] If the copyright owner does not bring a lawsuit in district court within 14 days, the service provider is then required to restore the material to its location on its network. [512(g)(2)(C)] A proper counter-notice must contain the following information:
If it is determined that the copyright holder misrepresented its claim regarding the infringing material, the copyright holder then becomes liable to the person harmed for any damages that resulted from the improper removal of the material. [512(f)] See also How do I file a DMCA counter-notice?, and the counter-notification generator. Question: Is a cease-and-desist letter confidential? Answer: There is ordinarily no expectation of privacy or confidentiality in a letter sent to an adversary. Unless you have made a specific promise of confidentiality beforehand, such as in a protective agreement or NDA, a letter demanding confidentiality doesn't bind you. |
|
|