| |||||||||||||||||||||
| Chilling Effects Clearinghouse > DMCA Safe Harbor > Notices > AzeoTech Requests Takedown of Cracks (NoticeID 1231, http://chillingeffects.org/N/1231) | Location: https://www.chillingeffects.org/dmca512/notice.cgi?NoticeID=1231 |
April 19, 2004
|
Sender Information: |
Recipient Information:
[Private]
Google, Inc.
Mountain View, CA, 94043, USA
Sent via: Fax
Re: Digital Millennium Copyright Violation
Memorandum To: Google From: [private] Date: 4/19/2004 Re: Digital Millennium Copyright Violation As requested here is the information related to links that appear under our trademark 1. The copyrighted work is out DAQFactory software and text from our website. It should also be noted that AzeoTech is a registered trademark, and DAQFactory will register in due course (in the next month or two). Some of these appear multiple times. Also, pretty much every site listed for the search " AzeoTech crack" or "DAQFactory crack". It should he noted that these sites list cracks for many packages and these links may not immediately link to the DAQFactory reference, but instead you have to go to a different page on their site (for example, on elunatic you have to go to archive 15). 3. I can be contacted at [private]@ azeotech.com or [private] 4. This should be available at the sites, though most of these are of foreign origin. 5. I have a good faith belief that use of the copyrighted materials described above on the allegedly infringing web pages is not authorized by the copyright owner, its agent, or the law 6. I swear, under penalty of perjury, that the information in the notification is accurate and that I am the copyright owner or am authorized to act on behalf of the owner of an exclusive right that is allegedly infringed Signed: [private]
DAQFactory that provide cracks for our copyrighted software therefore encouraging the theft of our software.
2. When searching for DAQFactory" the following sites appear that have cracks for our software that enable its distribution in violation of our copyright. They also display a product description that is verbatim from our website:
www.filedown.com/inicio.php?opcion=ver&id3=2930
elunatic.host.sk/0day.html
www.appzplanet.com/index.shtml?index-1.shtml (and subsites)
www.freesoftboard.de/board/phpbb/archive/topic/27585-1.html
www.sron.net/infoView/Article_138.html
www.zonewarez.com
crackspider.net/search.shtml?sid=179228&p=26&q=crack
www.interbat.com/french/wwwboard-vf/messages/293.html
These are just the results on the first 10 pages of the search. When searching for " AzeoTech " the following appears:
www.filedown.com/inicio.php?opcion=ver&id3=2930
elunatic.host.sk/0day.html
www.freesoftboard.de/board/phpbb/archive/topic/27585-1.html
www.appzplanet.com/index.shtml?index-1.shtml
www.mauisun.org/available2.html
www.interbat.com/french/wwwboard-vf/messages/293.html
President
AzeoTech, Inc.
[private]
Ashland, OR 97520
|
Question: What does a service provider have to do in order to qualify for safe harbor protection?
Answer: In addition to informing its customers of its policies (discussed above), a service provider must follow the proper notice and takedown procedures (discussed above) and also meet several other requirements in order to qualify for exemption under the safe harbor provisions. In order to facilitate the notification process in cases of infringement, ISPs which allow users to store information on their networks, such as a web hosting service, must designate an agent that will receive the notices from copyright owners that its network contains material which infringes their intellectual property rights. The service provider must then notify the Copyright Office of the agent's name and address and make that information publicly available on its web site. [512(c)(2)] Finally, the service provider must not have knowledge that the material or activity is infringing or of the fact that the infringing material exists on its network. [512(c)(1)(A)], [512(d)(1)(A)]. If it does discover such material before being contacted by the copyright owners, it is instructed to remove, or disable access to, the material itself. [512(c)(1)(A)(iii)], [512(d)(1)(C)]. The service provider must not gain any financial benefit that is attributable to the infringing material. [512(c)(1)(B)], [512(d)(2)]. Question: What are the DMCA's anti-circumvention provisions?
Answer: The Digital Millennium Copyright Act (DMCA) is the latest amendment to copyright law, which introduced a new category of copyright violations that prohibit the "circumvention" of technical locks and controls on the use of digital content and products. These anti-circumvention provisions put the force of law behind any technological systems used by copyright owners to control access to and copying of their digital works. The DMCA contains four main provisions:
The first provision prohibits the act of circumventing technological protection systems, the second and third ban technological devices that facilitate the circumvention of access control or copy controls, and the fourth prohibits individuals from removing information about access and use devices and rules. The first three provisions are also distinguishable in that the first two provisions focus on technological protection systems that provide access control to the copyright owner, while the third provision prohibits circumvention of technological protections against unauthorized duplication and other potentially copyright infringing activities. Question: What are the DMCA Safe Harbor Provisions?
Answer: In 1998, Congress passed the On-Line Copyright Infringement Liability Limitation Act (OCILLA) in an effort to protect service providers on the Internet from liability for the activities of its users. Codified as section 512 of the Digital Millennium Copyright Act (DMCA), this new law exempts on-line service providers that meet the criteria set forth in the safe harbor provisions from claims of copyright infringement made against them that result from the conduct of their customers. These safe harbor provisions are designed to shelter service providers from the infringing activities of their customers. If a service provider qualifies for the safe harbor exemption, only the individual infringing customer are liable for monetary damages; the service provider's network through which they engaged in the alleged activities is not liable. Question: What are the notice and takedown procedures for web sites?
Answer: In order to have an allegedly infringing web site removed from a service provider's network, or to have access to an allegedly infringing website disabled, the copyright owner must provide notice to the service provider with the following information:
Once notice is given to the service provider, or in circumstances where the service provider discovers the infringing material itself, it is required to expeditiously remove, or disable access to, the material. The safe harbor provisions do not require the service provider to notify the individual responsible for the allegedly infringing material before it has been removed, but they do require notification after the material is removed. Question: Do the safe harbor provisions of section 512(c) apply to instances of alleged trademark infringement? Answer: Section 512(c) does not pertain to instances of trademark infringement. Sub-section (1) states, ?a service provider shall not be liable for . . . infringement of copyright by reason of the storage at the direction of a user of material that resides on a system or network controlled or operated by or for the service provider . . . .? (emphasis added). On its face, therefore, 512(c) is not applicable to a situation in which a trademark holder gives notice to an on-line service provider (OSP) (see What defines a service provider under Section 512...?) that a user is infringing his or her intellectual property rights. However, in the absence of any caselaw on the subject, should a trademark holder bring a claim for contributory infringement, an OSP might be able to mount a valid defense by analogy to section 512(c). See also Can an online service provider (OSP) be held contr...?. Question: What does it mean to distribute circumvention tools?
Answer: Section 1201(a)(2) defines distribution as the "manufacture, import, offer to the public, provide, or otherwise traffic" of circumvention tools. This definition can be interpreted extremely broadly as evident in the court's analysis in the DVD encryption Universal v. Corley case. In its decision, the court considered not only making the source code of a program for free a type of distribution, but also found that merely linking to a web site containing illegal tools can constitute "trafficking." Question: What kinds of things are copyrightable? Answer: In order for material to be copyrightable, it must be original and must be in a fixed medium. Only material that originated with the author can support a copyright. Items from the public domain which appear in a work, as well as work borrowed from others, cannot be the subject of an infringement claim. Also, certain stock material might not be copyrightable, such as footage that indicates a location like the standard shots of San Francisco in Star Trek IV: The Voyage Home. Also exempted are stock characters like the noisy punk rocker who gets the Vulcan death grip in Star Trek IV. The requirement that works be in a fixed medium leaves out certain forms of expression, most notably choreography and oral performances such as speeches. For instance, if I perform a Klingon death wail in a local park, my performance is not copyrightable. However, if I film the performance, then the film is copyrightable. Single words and short phrases are generally not protected by copyright, even when the name has been "coined" or newly-created by the mark owner. Logos that include original design elements can be protected under copyright or under trademark. Otherwise, words, phrases and titles may be protected only by trademark, however. Question: What rights are protected by copyright law? Answer: The purpose of copyright law is to encourage creative work by granting a temporary monopoly in an author's original creations. This monopoly takes the form of six rights in areas where the author retains exclusive control. These rights are: (1) the right of reproduction (i.e., copying), The law of copyright protects the first two rights in both private and public contexts, whereas an author can only restrict the last four rights in the public sphere. Claims of infringement must show that the defendant exercised one of these rights. For example, if I create unauthorized videotape copies of Star Trek II: The Wrath of Khan and distribute them to strangers on the street, then I have infringed both the copyright holder's rights of reproduction and distribution. If I merely re-enact The Wrath of Khan for my family in my home, then I have not infringed on the copyright. Names, ideas and facts are not protected by copyright. Trademark law, in contrast, is designed to protect consumers from confusion as to the source of goods (as well as to protect the trademark owner's market). To this end, the law gives the owner of a registered trademark the right to use the mark in commerce without confusion. If someone introduces a trademark into the market that is likely to cause confusion, then the newer mark infringes on the older one. The laws of trademark infringement and dilution protect against this likelihood of confusion. Trademark protects names, images and short phrases. Infringement protects against confusion about the origin of goods. The plaintiff in an infringement suit must show that defendant's use of the mark is likely to cause such a confusion. For instance, if I were an unscrupulous manufacturer, I might attempt to capitalize on the fame of Star Trek by creating a line of 'Spock Activewear.' If consumers could reasonably believe that my activewear was produced or endorsed by the owners of the Spock trademark, then I would be liable for infringement. The law of trademark dilution protects against confusion concerning the character of a registered trademark. Suppose I created a semi-automatic assault rifle and marketed it as 'The Lt. Uhura 5000.' Even if consumers could not reasonably believe that the Star Trek trademark holders produced this firearm, the trademark holders could claim that my use of their mark harmed the family-oriented character of their mark. I would be liable for dilution. Question: What kinds of things are copyrightable? Answer: In order for material to be copyrightable, it must be original and must be in a fixed medium. Only material that originated with the author can support a copyright. Items from the public domain which appear in a work, as well as work borrowed from others, cannot be the subject of an infringement claim. Also, certain stock material might not be copyrightable, such as footage that indicates a location like the standard shots of San Francisco in Star Trek IV: The Voyage Home. Also exempted are stock characters like the noisy punk rocker who gets the Vulcan death grip in Star Trek IV. The requirement that works be in a fixed medium leaves out certain forms of expression, most notably choreography and oral performances such as speeches. For instance, if I perform a Klingon death wail in a local park, my performance is not copyrightable. However, if I film the performance, then the film is copyrightable. Single words and short phrases are generally not protected by copyright, even when the name has been "coined" or newly-created by the mark owner. Logos that include original design elements can be protected under copyright or under trademark. Otherwise, words, phrases and titles may be protected only by trademark, however. Question: What exactly are the rights a trademark owner has? Answer: In the US, trademark rights come from actual use of the mark to label one's services or products or they come from filing an application with the Patent and Trademark Office (PTO) that states an intention to use the mark in future commerce. In most foreign countries, trademarks are valid only upon registration. There are two trademark rights: the right to use (or authorize use) and the right to register. The person who establishes priority rights in a mark gains the exclusive right to use it to label or identify their goods or services, and to authorize others to do so. According to the Lanham Act, determining who has priority rights in a mark involves establishing who was the first to use it to identify his/her goods. The PTO determines who has the right to register the mark. Someone who registers a trademark with the intent to use it gains "constructive use" when he/she begins using it, which entitles him/her to nationwide priority in the mark. However, if two users claim ownership of the same mark (or similar marks) at the same time, and neither has registered it, a court must decide who has the right to the mark. The court can issue an injunction (a ruling that requires other people to stop using the mark) or award damages if people other than the owner use the trademark (infringement). Trademark owners do not acquire the exclusive ownership of words. They only obtain the right to use the mark in commerce and to prevent competitors in the same line of goods or services from using a confusingly similar mark. The same word can therefore be trademarked by different producers to label different kinds of goods. Examples are Delta Airlines and Delta Faucets. Owners of famous marks have broader rights to use their marks than do owners of less-well-known marks. They can prevent uses of their marks by others on goods that do not even compete with the famous product. Question: How can I find out if someone has a valid trademark? Answer: It isn't easy. In the United States, a trademark owner isn't required to register the mark anywhere, so there is no single central list of them all. Unlike most other nations, registration here is optional. Many owners do register their marks with the government, however, to better notify the world of their claims. Each state has its own trademark registry for goods and services sold locally. For companies that sell in more than one state, there is a US federal registry that is accessible online through TESS. TESS is searchable by key word as well as by registration number. Because registration is not required, however, a word might still be a protected mark even if it doesn't appear in any of these locations. When a company is selecting a new brand, its trademark attorney will usually conduct a "trademark availability" search which will look in many different locations to try and ferret out competing uses of the desired name. Business directories, Internet search engines, telephone directories are other searched sources. Multi-national vendors will search trademark registries in foreign nations as well. Even the most exhaustive search will not be conclusive, however, but it will usually indicate that if there is any other commercial use, it is probably limited to a very local area. It is OK to use the same mark as another company, so long as the new use isn't likely to confuse consumers. Question: Does a copyright owner have to specify the exact materials it alleges are infringing?
Answer: Proper notice under the safe harbor provisions requires the copyright owners to specifically identify the alleged infringing materials, or if the service provider is an "information location tool" such as a search engine, to specifically identify the links to the alleged infringing materials. [512(c)(3)(iii)], [512(d)(3)]. The provisions also require the copyright owners to identify the copyrighted work, or a representative list of the copyrighted works, that is claimed to be infringed. [512(c)(3)(A)(ii)]. Rather than simply sending a letter to the service provider that claims that infringing material exists on their system, these qualifications ensure that service providers are given a reasonable amount of information to locate the infringing materials and to effectively police their networks. [512(c)(3)(A)(iii)], [512(d)(3)]. However, in the recent case of ALS Scan, Inc. v. Remarq Communities, Inc., the court found that the copyright owner did not have to point out all of the infringing material, but only substantially all of the material. The relaxation of this specificity requirement shifts the burden of identifying the material to the service provider, raising the question of the extent to which a service provider must search through its system. OSP customers should note that this situation might encourage OSP's to err on the side of removing allegedly infringing material. Question: Is there really a difference between access controls and copy controls?
Answer: While there is a difference in the types of activities controlled by these technological protection measures, some copyright owners try to merge access and use controls in the implementation of these systems. For example, in trying to implement a "pay-per-use" business model, some copyright owners use a single persistent control system that charge separately for the different uses of a work even after paying to access a work. Question: What is copyright infringement? Are there any defenses? Answer: Infringement occurs whenever someone who is not the copyright holder (or a licensee of the copyright holder) exercises one of the exclusive rights listed above. The most common defense to an infringement claim is "fair use," a doctrine that allows people to use copyrighted material without permission in certain situations, such as quotations in a book review. To evaluate fair use of copyrighted material, the courts consider four factors:
The most significant factor in this analysis is the fourth, effect on the market. If a copier's use supplants demand for the original work, then it will be very difficult for him or her to claim fair use. On the other hand, if the use does not compete with the original, for example because it is a parody, criticism, or news report, it is more likely to be permitted as "fair use." Trademarks are generally subject to fair use in two situations: First, advertisers and other speakers are allowed to use a competitor's trademark when referring to that competitor's product ("nominative use"). Second, the law protects "fair comment," for instance, in parody. Question: What happens if an individual is found to repeatedly infringe?
Answer: The safe harbor provisions require the service provider to include in its copyright infringement policies a termination policy that results in individuals who repeatedly infringe copyrighted material being removed from the service provider networks. [512(i)(1)(A)] This termination policy must be made public in the terms of use that the service provider includes in its contracts or on its web site. Question: Does a copyright owner have to specify the exact materials it alleges are infringing?
Answer: Proper notice under the safe harbor provisions requires the copyright owners to specifically identify the alleged infringing materials, or if the service provider is an "information location tool" such as a search engine, to specifically identify the links to the alleged infringing materials. [512(c)(3)(iii)], [512(d)(3)]. The provisions also require the copyright owners to identify the copyrighted work, or a representative list of the copyrighted works, that is claimed to be infringed. [512(c)(3)(A)(ii)]. Rather than simply sending a letter to the service provider that claims that infringing material exists on their system, these qualifications ensure that service providers are given a reasonable amount of information to locate the infringing materials and to effectively police their networks. [512(c)(3)(A)(iii)], [512(d)(3)]. However, in the recent case of ALS Scan, Inc. v. Remarq Communities, Inc., the court found that the copyright owner did not have to point out all of the infringing material, but only substantially all of the material. The relaxation of this specificity requirement shifts the burden of identifying the material to the service provider, raising the question of the extent to which a service provider must search through its system. OSP customers should note that this situation might encourage OSP's to err on the side of removing allegedly infringing material. Question: Does a copyright owner have to specify the exact materials it alleges are infringing?
Answer: Proper notice under the safe harbor provisions requires the copyright owners to specifically identify the alleged infringing materials, or if the service provider is an "information location tool" such as a search engine, to specifically identify the links to the alleged infringing materials. [512(c)(3)(iii)], [512(d)(3)]. The provisions also require the copyright owners to identify the copyrighted work, or a representative list of the copyrighted works, that is claimed to be infringed. [512(c)(3)(A)(ii)]. Rather than simply sending a letter to the service provider that claims that infringing material exists on their system, these qualifications ensure that service providers are given a reasonable amount of information to locate the infringing materials and to effectively police their networks. [512(c)(3)(A)(iii)], [512(d)(3)]. However, in the recent case of ALS Scan, Inc. v. Remarq Communities, Inc., the court found that the copyright owner did not have to point out all of the infringing material, but only substantially all of the material. The relaxation of this specificity requirement shifts the burden of identifying the material to the service provider, raising the question of the extent to which a service provider must search through its system. OSP customers should note that this situation might encourage OSP's to err on the side of removing allegedly infringing material. Question: What constitutes copyright infringement?
Answer: Subject to certain defenses, it is copyright infringement for someone other than the author to do the following without the author's permission: Question: What are the counter-notice and put-back procedures?
Answer: In order to ensure that copyright owners do not wrongly insist on the removal of materials that actually do not infringe their copyrights, the safe harbor provisions require service providers to notify the subscribers if their materials have been removed and to provide them with an opportunity to send a written notice to the service provider stating that the material has been wrongly removed. [512(g)] If a subscriber provides a proper "counter-notice" claiming that the material does not infringe copyrights, the service provider must then promptly notify the claiming party of the individual's objection. [512(g)(2)] If the copyright owner does not bring a lawsuit in district court within 14 days, the service provider is then required to restore the material to its location on its network. [512(g)(2)(C)] A proper counter-notice must contain the following information:
If it is determined that the copyright holder misrepresented its claim regarding the infringing material, the copyright holder then becomes liable to the person harmed for any damages that resulted from the improper removal of the material. [512(f)] See also How do I file a DMCA counter-notice?, and the counter-notification generator. |
|
|