Chilling Effects
Home Weather Reports Report Receiving a Cease and Desist Notice Search the Database Topics
Sending
Topic HomeFAQsMonitoring the legal climate for Internet activity
Chilling Effects
 Chilling Effects Clearinghouse > DMCA Safe Harbor > Notices > Universal to Cable Subscriber for eDonkey Movie Sharing (#1) (NoticeID 1446, http://chillingeffects.org/N/1446) Printer-friendly version

Universal to Cable Subscriber for eDonkey Movie Sharing (#1)

May 28, 2003

 

Sender Information:
VIVENDI UNIVERSAL ENTERTAINMENT
Sent by: [Private]
[Private]
Universal City, C, 91608, US

Recipient Information:
[Private]
[Private]
USA


Sent via: Email
Re: Unauthorized Use of Universal Motion Pictures

Universal City Studios Productions LLLP and its affiliated companies
(collectively, "Universal") are the exclusive owners of copyrights in many
motion pictures, including the motion pictures listed below.

It has come to our attention that Cox Communications Inc. is the service
provider for the IP address listed below, from which unauthorized copying
and distribution (downloading, uploading, file serving, file "swapping" or
other similar activities) of Universal's motion picture(s) listed below
is taking place. We believe that the Internet access of the user engaging
in this infringement is provided by [ISP Name] or a downstream service
provider who purchases this connectivity from Cox Communications Inc..

This unauthorized copying and distribution constitutes copyright
infringement under applicable national laws and international treaties.
Although various legal and equitable remedies may be available to
Universal as a result of such infringement, Universal believes that the entire
Internet community benefits when these matters are resolved cooperatively.
We urge you to take immediate action to stop this infringing activity and
inform us of the results of your actions. We appreciate your efforts
toward this common goal.

Please be advised that this letter is not and is not intended to be a
complete statement of the facts or law as they may pertain to this matter
or of Universal's positions, rights or remedies, legal or equitable, all
of which are specifically reserved.

Very truly yours,


[Private]
Manager of Internet Anti-Piracy,
Worldwide Anti-Piracy Operations
VIVENDI UNIVERSAL ENTERTAINMENT.
[Private]
Universal City, CA 91608
tel. [Private]
fax [Private]
[Private]@unistudios.com

*pgp public key is available on the key server at
ldap://keyserver.pgp.com
Notice ID: 437792


Title: Johnny English
Infringement Source: eDonkey
Initial Infringement Timestamp: 26 May 2003 00:27:58 GMT
Recent Infringment Timestamp: 26 May 2003 00:27:58 GMT
Infringer Username: None
Infringing Filename: Johnny English.avi
Infringing Filesize: 761298944
Infringers IP Address: [Private]
Infringers DNS Name: N/A
Infringing URL: ed2k://68.224.5.203:4662/Johnny English.avi

 
FAQ: Questions and Answers

[back to notice text]


Question: What defines a service provider under Section 512 of the Digital Millennium Copyright Act (DMCA)?

Answer: A service provider is defined as "an entity offering transmission, routing, or providing connections for digital online communications, between or among points specified by a user, of material of the user's choosing, without modification to the content of the material as sent or received" or "a provider of online services or network access, or the operator of facilities thereof." [512(k)(1)(A-B)] This broad definition includes network services companies such as Internet service providers (ISPs), search engines, bulletin board system operators, and even auction web sites. In A&M Records, Inc. v. Napster Inc., the court refused to extend the safe harbor provisions to the Napster software program and service, leaving open the question of whether peer-to-peer networks also qualify for safe harbor protection under Section 512.

There are four major categories of network systems offered by service providers that qualify for protection under the safe harbor provisions:

  • Conduit Communications include the transmission and routing of information, such as an email or Internet service provider, which store the material only temporarily on their networks. [Sec. 512(a)]
  • System Caching refers to the temporary copies of data that are made by service providers in providing the various services that require such copying in order to transfer data. [Sec. 512(b)]
  • Storage Systems refers to services which allow users to store information on their networks, such as a web hosting service or a chat room. [Sec. 512(c)]
  • Information Location Tools refer to services such as search engines, directories, or pages of recommended web sites which provide links to the allegedly infringing material. [Sec. 512(d)]


[back to notice text]


Question: Who may hold a copyright?

Answer: A copyright ordinarily vests in the creator or creators of a work (known as the author(s)), and is inherited as ordinary property. Copyrights are freely transferrable as property, at the discretion of the owner. 17 U.S.C.


[back to notice text]


Question: What may be copyrighted?

Answer: In order to be copyrightable, a work must be

1. fixed in a tangible medium of expression ; and
2. original.

Copyrights do not protect ideas, procedures, processes, systems, methods of operation, concepts, principles, or discoveries: they only protect physical representations. 17 U.S.C.


[back to notice text]


Question: Can a copyright owner find out the identity of the individual responsible for the allegedly infringing material?

Answer: The safe harbor provisions permit a copyright owner to subpoena the identity of the individual allegedly responsible for the infringing activities. [512(h)] Such a subpoena is granted on the condition that the information about the individual's identity will only be used in relation to the protection of the intellectual property rights of the copyright owner. [512(h)(2)(C)]

The DMCA subpoena provision does not apply to requests for the identities of users of ISP conduit 512(a) services, but only to users of hosting or linking, for which a takedown may be sent under 512(c)(3)(A). Thus DMCA subpoenas cannot be used to find the identities of users engaged in peer-to-peer filesharing. Recording Industry Assoc. of America v. Verizon Internet Svcs., Inc.


[back to notice text]


Question: To qualify for a DMCA Safe Harbor, do ISPs need to respond to notices for takedowns of alleged P2P infringements?

Answer: Section 512 provides safe harbor protection for four classes of online service providers. 512(a) covers conduit systems that transmit and route data between users and store copies only as part of that process. 512(b) protects caching systems, which temporarily retain copies for users requesting it from its original source. 512(c) protects storage systems that allow users to store information on their networks, such as a web hosting service or a chat room. Finally, 512(d) covers information location tools such as search engines or directories. (See What defines a service provider under Section 512...?)

Using typical P2P file-sharing services, users store files on their computers and send them directly to each other. The users


[back to notice text]


Question: What constitutes copyright infringement?

Answer: Subject to certain defenses, it is copyright infringement for someone other than the author to do the following without the author's permission:

1. reproduce (copy) the work;

2. create a new work derived from the original work (for example, by translating the work into a new language, by copying and distorting the image, or by transferring the work into a new medium of expression);

3. sell or give away the work, or a copy of the work, for the first time (but once the author has done so, the right to sell or give away the item is transferred to the new owner. This is known as the "first sale" doctrine: once a copyright owner has sold or given away the work or a copy of it, the recipient or purchaser may do as she pleases with what she posesses.) 17 U.S.C. ?109(a);

4. perform or display the work in public without permission from the copyright owner. 17 U.S.C. ?106. It is also copyright infringement to violate the "moral rights" of an author as defined by 17 U.S.C. 106A. Moral rights are discussed here.


[back to notice text]


Question: What rights are protected by copyright law?

Answer: The purpose of copyright law is to encourage creative work by granting a temporary monopoly in an author's original creations. This monopoly takes the form of six rights in areas where the author retains exclusive control. These rights are:

(1) the right of reproduction (i.e., copying),
(2) the right to create derivative works,
(3) the right to distribution,
(4) the right to performance,
(5) the right to display, and
(6) the digital transmission performance right.

The law of copyright protects the first two rights in both private and public contexts, whereas an author can only restrict the last four rights in the public sphere. Claims of infringement must show that the defendant exercised one of these rights. For example, if I create unauthorized videotape copies of Star Trek II: The Wrath of Khan and distribute them to strangers on the street, then I have infringed both the copyright holder's rights of reproduction and distribution. If I merely re-enact The Wrath of Khan for my family in my home, then I have not infringed on the copyright. Names, ideas and facts are not protected by copyright.

Trademark law, in contrast, is designed to protect consumers from confusion as to the source of goods (as well as to protect the trademark owner's market). To this end, the law gives the owner of a registered trademark the right to use the mark in commerce without confusion. If someone introduces a trademark into the market that is likely to cause confusion, then the newer mark infringes on the older one. The laws of trademark infringement and dilution protect against this likelihood of confusion. Trademark protects names, images and short phrases.

Infringement protects against confusion about the origin of goods. The plaintiff in an infringement suit must show that defendant's use of the mark is likely to cause such a confusion. For instance, if I were an unscrupulous manufacturer, I might attempt to capitalize on the fame of Star Trek by creating a line of 'Spock Activewear.' If consumers could reasonably believe that my activewear was produced or endorsed by the owners of the Spock trademark, then I would be liable for infringement.

The law of trademark dilution protects against confusion concerning the character of a registered trademark. Suppose I created a semi-automatic assault rifle and marketed it as 'The Lt. Uhura 5000.' Even if consumers could not reasonably believe that the Star Trek trademark holders produced this firearm, the trademark holders could claim that my use of their mark harmed the family-oriented character of their mark. I would be liable for dilution.


[back to notice text]


Question: What are the possible penalties for copyright infringement?

Answer: Under the Copyright Act, penalties for copyright infringement can include:

  1. an injunction against further infringement -- such as an order preventing the infringer from future copying or distribution of the copyrighted works
  2. impounding or destruction of infringing copies
  3. damages -- either actual damages and the infringer's profits, or statutory damages
  4. costs and attorney's fees

A copyright owner can only sue for infringement on a work whose copyright was registered with the Copyright Office, and can get statutory damages and attorney's fees only if the copyright registration was filed before infringement or within three months of first publication. (17 U.S.C. 411 and 412)


[back to notice text]


Question: What are the notice and takedown procedures for web sites?

Answer: In order to have an allegedly infringing web site removed from a service provider's network, or to have access to an allegedly infringing website disabled, the copyright owner must provide notice to the service provider with the following information:

  • The name, address, and electronic signature of the complaining party [512(c)(3)(A)(i)]
  • The infringing materials and their Internet location [512(c)(3)(A)(ii-iii)], or if the service provider is an "information location tool" such as a search engine, the reference or link to the infringing materials [512(d)(3)].
  • Sufficient information to identify the copyrighted works [512(c)(3)(A)(iv)].
  • A statement by the owner that it has a good faith belief that there is no legal basis for the use of the materials complained of [512(c)(3)(A)(v)].
  • A statement of the accuracy of the notice and, under penalty of perjury, that the complaining party is authorized to act on the behalf of the owner [512(c)(3)(A)(vi)].

Once notice is given to the service provider, or in circumstances where the service provider discovers the infringing material itself, it is required to expeditiously remove, or disable access to, the material. The safe harbor provisions do not require the service provider to notify the individual responsible for the allegedly infringing material before it has been removed, but they do require notification after the material is removed.


[back to notice text]


Question: What are the counter-notice and put-back procedures?

Answer: In order to ensure that copyright owners do not wrongly insist on the removal of materials that actually do not infringe their copyrights, the safe harbor provisions require service providers to notify the subscribers if their materials have been removed and to provide them with an opportunity to send a written notice to the service provider stating that the material has been wrongly removed. [512(g)] If a subscriber provides a proper "counter-notice" claiming that the material does not infringe copyrights, the service provider must then promptly notify the claiming party of the individual's objection. [512(g)(2)] If the copyright owner does not bring a lawsuit in district court within 14 days, the service provider is then required to restore the material to its location on its network. [512(g)(2)(C)]

A proper counter-notice must contain the following information:

  • The subscriber's name, address, phone number and physical or electronic signature [512(g)(3)(A)]
  • Identification of the material and its location before removal [512(g)(3)(B)]
  • A statement under penalty of perjury that the material was removed by mistake or misidentification [512(g)(3)(C)]
  • Subscriber consent to local federal court jurisdiction, or if overseas, to an appropriate judicial body. [512(g)(3)(D)]

If it is determined that the copyright holder misrepresented its claim regarding the infringing material, the copyright holder then becomes liable to the person harmed for any damages that resulted from the improper removal of the material. [512(f)]

See also How do I file a DMCA counter-notice?, and the counter-notification generator.


[back to notice text]


Question: What does the "reservation of rights" language mean? What are they "waiving" at me?

Answer: Many C&Ds will say something like, "This letter shall not be deemed to be a waiver of any rights or remedies, which are expressly reserved." This is just legalese for saying, "Even if you do what we ask in this letter, we can still sue you later." The language is standard; do not be alarmed. Litigation is extremely unpleasant, and unless your opponent is irrational (always a distinct possibility, of course), it will not bring litigation after it has obtained what it wants.


[back to notice text]


Question: Does a copyright owner have to specify the exact materials it alleges are infringing?

Answer: Proper notice under the safe harbor provisions requires the copyright owners to specifically identify the alleged infringing materials, or if the service provider is an "information location tool" such as a search engine, to specifically identify the links to the alleged infringing materials. [512(c)(3)(iii)], [512(d)(3)]. The provisions also require the copyright owners to identify the copyrighted work, or a representative list of the copyrighted works, that is claimed to be infringed. [512(c)(3)(A)(ii)]. Rather than simply sending a letter to the service provider that claims that infringing material exists on their system, these qualifications ensure that service providers are given a reasonable amount of information to locate the infringing materials and to effectively police their networks. [512(c)(3)(A)(iii)], [512(d)(3)].

However, in the recent case of ALS Scan, Inc. v. Remarq Communities, Inc., the court found that the copyright owner did not have to point out all of the infringing material, but only substantially all of the material. The relaxation of this specificity requirement shifts the burden of identifying the material to the service provider, raising the question of the extent to which a service provider must search through its system. OSP customers should note that this situation might encourage OSP's to err on the side of removing allegedly infringing material.


Topic maintained by Chilling Effects

Topic Frequently Asked Questions (and Answers)
Chilling Effects Clearinghouse - www.chillingeffects.org
disclaimer / privacy / about us & contacts