|
[back to notice text] Question: What is copyright infringement? Are there any defenses?
Answer: Infringement occurs whenever someone who is not the copyright holder (or a licensee of the copyright holder) exercises one of the exclusive rights listed above. The most common defense to an infringement claim is "fair use," a doctrine that allows people to use copyrighted material without permission in certain situations, such as quotations in a book review. To evaluate fair use of copyrighted material, the courts consider four factors: - the purpose and character of the use
- the nature of the copyrighted work
- the amount and substantiality of copying, and
- the market effect.
(17 U.S.C. 107) The most significant factor in this analysis is the fourth, effect on the market. If a copier's use supplants demand for the original work, then it will be very difficult for him or her to claim fair use. On the other hand, if the use does not compete with the original, for example because it is a parody, criticism, or news report, it is more likely to be permitted as "fair use." Trademarks are generally subject to fair use in two situations: First, advertisers and other speakers are allowed to use a competitor's trademark when referring to that competitor's product ("nominative use"). Second, the law protects "fair comment," for instance, in parody.
[back to notice text] Question: What are the DMCA's anti-circumvention provisions?
Answer: The Digital Millennium Copyright Act (DMCA) is the latest amendment to copyright law, which introduced a new category of copyright violations that prohibit the "circumvention" of technical locks and controls on the use of digital content and products. These anti-circumvention provisions put the force of law behind any technological systems used by copyright owners to control access to and copying of their digital works. The DMCA contains four main provisions:
- a prohibition on circumventing access controls [1201(a)(1)(A)];
- an access control circumvention device ban (sometimes called the "trafficking" ban) [1201(a)(2)];
- a copyright protection circumvention device ban [1201(b)]; and,
- a prohibition on the removal of copyright management information (CMI) [1202(b)].
The first provision prohibits the act of circumventing technological protection systems, the second and third ban technological devices that facilitate the circumvention of access control or copy controls, and the fourth prohibits individuals from removing information about access and use devices and rules. The first three provisions are also distinguishable in that the first two provisions focus on technological protection systems that provide access control to the copyright owner, while the third provision prohibits circumvention of technological protections against unauthorized duplication and other potentially copyright infringing activities.
[back to notice text] Question: What are the notice and takedown procedures for web sites?
Answer: In order to have an allegedly infringing web site removed from a service provider's network, or to have access to an allegedly infringing website disabled, the copyright owner must provide notice to the service provider with the following information:
- The name, address, and electronic signature of the complaining party [512(c)(3)(A)(i)]
- The infringing materials and their Internet location [512(c)(3)(A)(ii-iii)], or if the service provider is an "information location tool" such as a search engine, the reference or link to the infringing materials [512(d)(3)].
- Sufficient information to identify the copyrighted works [512(c)(3)(A)(iv)].
- A statement by the owner that it has a good faith belief that there is no legal basis for the use of the materials complained of [512(c)(3)(A)(v)].
- A statement of the accuracy of the notice and, under penalty of perjury, that the complaining party is authorized to act on the behalf of the owner [512(c)(3)(A)(vi)].
Once notice is given to the service provider, or in circumstances where the service provider discovers the infringing material itself, it is required to expeditiously remove, or disable access to, the material. The safe harbor provisions do not require the service provider to notify the individual responsible for the allegedly infringing material before it has been removed, but they do require notification after the material is removed.
[back to notice text] Question: What are the criteria a service provider must satisfy in order to qualify for safe harbor protection under Subsection 512(a) of the Digital Millennium Copyright Act?
Answer: Subsection 512(a) provides a safe harbor for service providers in regard to communications that do not reside on the service provider
[back to notice text] Question: What are the DMCA Safe Harbor Provisions?
Answer: In 1998, Congress passed the On-Line Copyright Infringement Liability Limitation Act (OCILLA) in an effort to protect service providers on the Internet from liability for the activities of its users. Codified as section 512 of the Digital Millennium Copyright Act (DMCA), this new law exempts on-line service providers that meet the criteria set forth in the safe harbor provisions from claims of copyright infringement made against them that result from the conduct of their customers. These safe harbor provisions are designed to shelter service providers from the infringing activities of their customers. If a service provider qualifies for the safe harbor exemption, only the individual infringing customer are liable for monetary damages; the service provider's network through which they engaged in the alleged activities is not liable.
|