| |||||||||||||||||||||
| Chilling Effects Clearinghouse > DMCA Safe Harbor > Notices > RIAA C&D's University of North Carolina for Ace of Base (NoticeID 1489, http://chillingeffects.org/N/1489) | Location: https://www.chillingeffects.org/dmca512/notice.cgi?NoticeID=1489 |
November 15, 2004
|
Sender Information: |
Recipient Information:
[Private]
University of North Carolina-Chapel Hill
Chapel HIll, NC, 27599-342, USA
Sent via: email
Re: Copyright Infringement
Dear Sir or Madam: I am contacting you on behalf of the Recording Industry Association of America, Inc. (RIAA) and its member record companies. The RIAA is a trade association whose member companies create, manufacture, and distribute approximately ninety (90) percent of all legitimate sound recordings sold in the United States. Under penalty of perjury, we submit that the RIAA is authorized to act on behalf of its member companies in matters involving the infringement of their sound recordings, including enforcing their copyrights and common law rights on the Internet. We believe a user on your network is offering an infringing sound recording for download through a peer to peer application. We have attached below the details of the infringing activity. We believe it is in everyone's interest for music consumers to be better educated about the subject of copyright law and music. In addition to taking steps to notify this network user about the illegal nature of this activity, we encourage you to refer him/her to the MUSIC Coalition's website at www.musicunited.org. The site contains valuable information about what's legal and what's not when it comes to copying music. You should understand that this letter constitutes notice to you that this network user may be liable for the infringing activity occurring on your network. In addition, under the Digital Millennium Copyright Act, if you ignore this notice, your institution may also be liable for any resulting infringement. This letter does not constitute a waiver of any right to recover damages incurred by virtue of any such unauthorized activities, and such rights as well as claims for other relief are expressly retained. Moreover, this letter does not constitute a waiver of our members' right to sue the user at issue for copyright infringement. Thank you in advance for your prompt assistance in this matter. If you have any questions, please feel free to contact me via e-mail at antipiracy2@riaa.com, via telephone at [private], or via mail at RIAA, [private], Washington, D.C., 20036. Please reference Case ID [private], in any response or communication regarding this infringement. [private] Online Copyright Protection List of infringing content:
We have a good faith belief that this activity is not authorized by copyright owners, their agent, or the law. We are asking for your immediate assistance in stopping this unauthorized activity. Specifically, we request that you remove or disable access to the infringing sound recording.
Sincerely,
RIAA
Infringement details: ---------------------------------------------- First Found: 12 Nov 2004 10:33:25 EST (GMT -0500)
Last Found: 12 Nov 2004 10:33:25 EST (GMT -0500)
Network: LimeWire
IP Address: 152.23.194.36
IP Port: 6346
Protocol: Gnutella
---------------------------------------------- Ace of Base - All That She Wants
|
Question: What kinds of things are copyrightable? Answer: In order for material to be copyrightable, it must be original and must be in a fixed medium. Only material that originated with the author can support a copyright. Items from the public domain which appear in a work, as well as work borrowed from others, cannot be the subject of an infringement claim. Also, certain stock material might not be copyrightable, such as footage that indicates a location like the standard shots of San Francisco in Star Trek IV: The Voyage Home. Also exempted are stock characters like the noisy punk rocker who gets the Vulcan death grip in Star Trek IV. The requirement that works be in a fixed medium leaves out certain forms of expression, most notably choreography and oral performances such as speeches. For instance, if I perform a Klingon death wail in a local park, my performance is not copyrightable. However, if I film the performance, then the film is copyrightable. Single words and short phrases are generally not protected by copyright, even when the name has been "coined" or newly-created by the mark owner. Logos that include original design elements can be protected under copyright or under trademark. Otherwise, words, phrases and titles may be protected only by trademark, however. Question: What does "under penalty of perjury" mean? Answer: Law.com offers a good definition of perjury: "Perjury is the the crime of intentionally lying after being duly sworn (to tell the truth) by a notary public, court clerk or other official. This false statement may be made in testimony in court, administrative hearings, depositions, answers to interrogatories, as well as by signing or acknowledging a written legal document (such as affidavit, declaration under penalty of perjury, deed, license application, tax return) known to contain false information. Although it is a crime, prosecutions for perjury are rare, because a defendant will argue he/she merely made a mistake or misunderstood." Question: What is copyright infringement? Are there any defenses? Answer: Infringement occurs whenever someone who is not the copyright holder (or a licensee of the copyright holder) exercises one of the exclusive rights listed above. The most common defense to an infringement claim is "fair use," a doctrine that allows people to use copyrighted material without permission in certain situations, such as quotations in a book review. To evaluate fair use of copyrighted material, the courts consider four factors:
The most significant factor in this analysis is the fourth, effect on the market. If a copier's use supplants demand for the original work, then it will be very difficult for him or her to claim fair use. On the other hand, if the use does not compete with the original, for example because it is a parody, criticism, or news report, it is more likely to be permitted as "fair use." Trademarks are generally subject to fair use in two situations: First, advertisers and other speakers are allowed to use a competitor's trademark when referring to that competitor's product ("nominative use"). Second, the law protects "fair comment," for instance, in parody. Question: Who may hold a copyright? Answer: A copyright ordinarily vests in the creator or creators of a work (known as the author(s)), and is inherited as ordinary property. Copyrights are freely transferrable as property, at the discretion of the owner. 17 U.S.C. Question: What rights are protected by copyright law? Answer: The purpose of copyright law is to encourage creative work by granting a temporary monopoly in an author's original creations. This monopoly takes the form of six rights in areas where the author retains exclusive control. These rights are: (1) the right of reproduction (i.e., copying), The law of copyright protects the first two rights in both private and public contexts, whereas an author can only restrict the last four rights in the public sphere. Claims of infringement must show that the defendant exercised one of these rights. For example, if I create unauthorized videotape copies of Star Trek II: The Wrath of Khan and distribute them to strangers on the street, then I have infringed both the copyright holder's rights of reproduction and distribution. If I merely re-enact The Wrath of Khan for my family in my home, then I have not infringed on the copyright. Names, ideas and facts are not protected by copyright. Trademark law, in contrast, is designed to protect consumers from confusion as to the source of goods (as well as to protect the trademark owner's market). To this end, the law gives the owner of a registered trademark the right to use the mark in commerce without confusion. If someone introduces a trademark into the market that is likely to cause confusion, then the newer mark infringes on the older one. The laws of trademark infringement and dilution protect against this likelihood of confusion. Trademark protects names, images and short phrases. Infringement protects against confusion about the origin of goods. The plaintiff in an infringement suit must show that defendant's use of the mark is likely to cause such a confusion. For instance, if I were an unscrupulous manufacturer, I might attempt to capitalize on the fame of Star Trek by creating a line of 'Spock Activewear.' If consumers could reasonably believe that my activewear was produced or endorsed by the owners of the Spock trademark, then I would be liable for infringement. The law of trademark dilution protects against confusion concerning the character of a registered trademark. Suppose I created a semi-automatic assault rifle and marketed it as 'The Lt. Uhura 5000.' Even if consumers could not reasonably believe that the Star Trek trademark holders produced this firearm, the trademark holders could claim that my use of their mark harmed the family-oriented character of their mark. I would be liable for dilution. Question: What defines a service provider under Section 512 of the Digital Millennium Copyright Act (DMCA)?
Answer: A service provider is defined as "an entity offering transmission, routing, or providing connections for digital online communications, between or among points specified by a user, of material of the user's choosing, without modification to the content of the material as sent or received" or "a provider of online services or network access, or the operator of facilities thereof." [512(k)(1)(A-B)] This broad definition includes network services companies such as Internet service providers (ISPs), search engines, bulletin board system operators, and even auction web sites. In A&M Records, Inc. v. Napster Inc., the court refused to extend the safe harbor provisions to the Napster software program and service, leaving open the question of whether peer-to-peer networks also qualify for safe harbor protection under Section 512. There are four major categories of network systems offered by service providers that qualify for protection under the safe harbor provisions:
Question: What defenses are there to copyright infringement? Answer: The primary defense to copyright infringement is "fair use." 17 U.S.C. Question: Is all copying piracy?
Answer: No. Copyright gives the owner exclusive rights to reproduce, adapt, publicly distribute, perform and display their work. Nonetheless, the law allows "fair use" of copyrighted material. Fair use permits, in certain circumstances, the use or copying of all or a portion of a copyrighted work without the permission of the owner. Copyrighted works may be used for purposes such as criticism, comment, news reporting, teaching, scholarship, or research. To decide whether a use is "fair use" or not, courts consider, in part: Courts balance these factors, placing an emphasis on the fourth, however rulings have been unpredictable. Parody may be protected by fair use where the user is actually making a comment on or criticism of the copyrighted material, even if a profit is made from the use. Still, distributing copyrighted software will rarely be fair use because people will use those copies instead of buying the software from the legitimate vendor. Question: Does the fair use doctrine permit individuals to upload and download digital audio files containing copyrighted music through a file-sharing service that facilitates transmission and retention of the files by its users? Answer: The courts that have considered this issue to date have held that this type of "peer to peer file sharing" violates the copyright owner's exclusive right to reproduce their copyrighted material and does not constitute a fair use. The Ninth Circuit Court of Appeals applied the four factor fair use analysis to address this issue. First, the court found that the purpose and character of such a use was not transformative, since the work was merely retransmitted in a different medium. Also, such use was found to be commercial in nature and resulted in the exploitation of copyrighted works since it saved the users the expense of purchasing the authorized copies. The court also focussed on the fourth factor, the effect of the use on the market. The court concluded that the internet service harmed the market for the plaintiff's copyrighted material by reducing CD sales and by interfereing with the copyright holder's attempts to charge for the same internet downloads. A&M Records v. Napster, 239 F.3d 1004; see also MGM v. Grokster Question: Does a copyright owner have to specify the exact materials it alleges are infringing?
Answer: Proper notice under the safe harbor provisions requires the copyright owners to specifically identify the alleged infringing materials, or if the service provider is an "information location tool" such as a search engine, to specifically identify the links to the alleged infringing materials. [512(c)(3)(iii)], [512(d)(3)]. The provisions also require the copyright owners to identify the copyrighted work, or a representative list of the copyrighted works, that is claimed to be infringed. [512(c)(3)(A)(ii)]. Rather than simply sending a letter to the service provider that claims that infringing material exists on their system, these qualifications ensure that service providers are given a reasonable amount of information to locate the infringing materials and to effectively police their networks. [512(c)(3)(A)(iii)], [512(d)(3)]. However, in the recent case of ALS Scan, Inc. v. Remarq Communities, Inc., the court found that the copyright owner did not have to point out all of the infringing material, but only substantially all of the material. The relaxation of this specificity requirement shifts the burden of identifying the material to the service provider, raising the question of the extent to which a service provider must search through its system. OSP customers should note that this situation might encourage OSP's to err on the side of removing allegedly infringing material. Question: What are the notice and takedown procedures for web sites?
Answer: In order to have an allegedly infringing web site removed from a service provider's network, or to have access to an allegedly infringing website disabled, the copyright owner must provide notice to the service provider with the following information:
Once notice is given to the service provider, or in circumstances where the service provider discovers the infringing material itself, it is required to expeditiously remove, or disable access to, the material. The safe harbor provisions do not require the service provider to notify the individual responsible for the allegedly infringing material before it has been removed, but they do require notification after the material is removed. Question: What does a service provider have to do in order to qualify for safe harbor protection?
Answer: In addition to informing its customers of its policies (discussed above), a service provider must follow the proper notice and takedown procedures (discussed above) and also meet several other requirements in order to qualify for exemption under the safe harbor provisions. In order to facilitate the notification process in cases of infringement, ISPs which allow users to store information on their networks, such as a web hosting service, must designate an agent that will receive the notices from copyright owners that its network contains material which infringes their intellectual property rights. The service provider must then notify the Copyright Office of the agent's name and address and make that information publicly available on its web site. [512(c)(2)] Finally, the service provider must not have knowledge that the material or activity is infringing or of the fact that the infringing material exists on its network. [512(c)(1)(A)], [512(d)(1)(A)]. If it does discover such material before being contacted by the copyright owners, it is instructed to remove, or disable access to, the material itself. [512(c)(1)(A)(iii)], [512(d)(1)(C)]. The service provider must not gain any financial benefit that is attributable to the infringing material. [512(c)(1)(B)], [512(d)(2)]. Question: What are the counter-notice and put-back procedures?
Answer: In order to ensure that copyright owners do not wrongly insist on the removal of materials that actually do not infringe their copyrights, the safe harbor provisions require service providers to notify the subscribers if their materials have been removed and to provide them with an opportunity to send a written notice to the service provider stating that the material has been wrongly removed. [512(g)] If a subscriber provides a proper "counter-notice" claiming that the material does not infringe copyrights, the service provider must then promptly notify the claiming party of the individual's objection. [512(g)(2)] If the copyright owner does not bring a lawsuit in district court within 14 days, the service provider is then required to restore the material to its location on its network. [512(g)(2)(C)] A proper counter-notice must contain the following information:
If it is determined that the copyright holder misrepresented its claim regarding the infringing material, the copyright holder then becomes liable to the person harmed for any damages that resulted from the improper removal of the material. [512(f)] See also How do I file a DMCA counter-notice?, and the counter-notification generator. Question: I use file sharing software. What can I do to make sure I'm not sued by the RIAA? Answer: The best way to protect yourself against an RIAA lawsuit is to avoid copyright infringement. First, ensure that you are not engaging in copyright infringement by removing any files from your shared directory that you do not have permission to distribute. Second, change any potentially misleading file names that might be confused with the name of an RIAA artist or song (e.g., "Madonna"). For a more detailed explanation of this process and other ideas to avoid being treated like a criminal, visit the EFF's page on the subject at http://www.eff.org/IP/P2P/howto-notgetsued.php. Question: Can a copyright owner find out the identity of the individual responsible for the allegedly infringing material? Answer: The safe harbor provisions permit a copyright owner to subpoena the identity of the individual allegedly responsible for the infringing activities. [512(h)] Such a subpoena is granted on the condition that the information about the individual's identity will only be used in relation to the protection of the intellectual property rights of the copyright owner. [512(h)(2)(C)] The DMCA subpoena provision does not apply to requests for the identities of users of ISP conduit 512(a) services, but only to users of hosting or linking, for which a takedown may be sent under 512(c)(3)(A). Thus DMCA subpoenas cannot be used to find the identities of users engaged in peer-to-peer filesharing. Recording Industry Assoc. of America v. Verizon Internet Svcs., Inc. Question: What are the DMCA Safe Harbor Provisions?
Answer: In 1998, Congress passed the On-Line Copyright Infringement Liability Limitation Act (OCILLA) in an effort to protect service providers on the Internet from liability for the activities of its users. Codified as section 512 of the Digital Millennium Copyright Act (DMCA), this new law exempts on-line service providers that meet the criteria set forth in the safe harbor provisions from claims of copyright infringement made against them that result from the conduct of their customers. These safe harbor provisions are designed to shelter service providers from the infringing activities of their customers. If a service provider qualifies for the safe harbor exemption, only the individual infringing customer are liable for monetary damages; the service provider's network through which they engaged in the alleged activities is not liable. Question: How are the safe harbor provisions applied to educational institutions?
Answer: The safe harbor provisions make a special exception to educational institutions that qualify as service providers under section 512. [512(e)] While a corporation is responsible for the activities of its employees, faculty members or graduate student employees who are performing teaching or research functions are not considered a part of the institution itself for certain infringing activities so as to maintain the academic freedom of these institutions. [512(e)(1)] The institution can therefore avoid liability for infringement even if the infringing individuals knew they were infringing, provided that:
Question: What does the "reservation of rights" language mean? What are they "waiving" at me? Answer: Many C&Ds will say something like, "This letter shall not be deemed to be a waiver of any rights or remedies, which are expressly reserved." This is just legalese for saying, "Even if you do what we ask in this letter, we can still sue you later." The language is standard; do not be alarmed. Litigation is extremely unpleasant, and unless your opponent is irrational (always a distinct possibility, of course), it will not bring litigation after it has obtained what it wants. Question: What are the penalties for copyright infringement, such as making infringing copies of software? Answer: In a civil suit, an infringer may be liable for a copyright owner's actual damages plus any profits made from the infringement. Alternatively, the copyright owner may avoid proving actual damage by electing a statutory damage recovery of up to $30,000 or, where the court determines that the infringement occurred willfully, up to $150,000. The actual amount will be based upon what the court in its discretion considers just. (17 U.S.C. 504) Violation of copyright law is also considered a federal crime when done willfully with an intent to profit. Criminal penalties include up to ten years imprisonment depending on the nature of the violation. (No Electronic Theft Act, 18 U.S.C. 2319) |
|
|