Chilling Effects
Home Weather Reports Report Receiving a Cease and Desist Notice Search the Database Topics
Sending
Topic HomeFAQsMonitoring the legal climate for Internet activity
Chilling Effects
 Chilling Effects Clearinghouse > DMCA Safe Harbor > Notices > Microsoft Isn't On Crack, It Is Just Complaining of Serial Number Cracks (NoticeID 1639, http://chillingeffects.org/N/1639) Printer-friendly version

Microsoft Isn't On Crack, It Is Just Complaining of Serial Number Cracks

January 21, 2005

 

Sender Information:
Microsoft Corporation
Sent by: NULL
[Private]
Redmond, WA, 98052, US

Recipient Information:
[Private]
Blogger [Google, Inc.]


Sent via: email
Re: Demand for Immediate Take-Down: Notice of Infringing Activity

VIA EMAIL:

Demand for Immediate Take-Down: Notice of Infringing Activity

URL: http://gte794n.blogspot.com/2003_12_01_gte794n_archive.html
CASE #: 36076

21 January 2005

Dear Sir or Madam,

Microsoft has received information that the domain listed above, which appears to be on servers under your control, is offering unlicensed copies of, or is engaged in other unauthorized activities relating to copyrighted computer programs published by Microsoft.

1. Identification of copyrighted works:

Computer program(s):
BizTalk Server 2000
BackOffice Server 2000
Office Professional Edition 2003
Mobile Information Server 2002
Project 2002 Server
Share Point Portal Server 2001
Visual Studio .NET Professional
Windows 2000 Professional
Windows 2000 Server

Copyright owner:
Microsoft Corporation

2. Copyright infringing material or activity found at the following location(s): http://gte794n.blogspot.com/2003_12_01_gte794n_archive.html

The above location is offering 'Cracks' or 'Product Keys', intended to circumvent technical measures that control access to Microsoft's copyrighted works and that protect Microsoft's copyrights in those works.

3. Statement of authority:

I hereby certify under penalty of perjury that the information in this notice is accurate and that I am authorized to act on behalf of Microsoft, the owner of the copyright(s) in the work(s) identified above. I have a good faith belief that none of the materials or activities listed above have been authorized by Microsoft, its agents, or the law.

We hereby give notice of these activities to you and request that you take expeditious action to remove or disable access to the material described above, and thereby prevent the unauthorized distribution of these cracks and product keys via your company's network.

We appreciate your cooperation in this matter. Please advise us regarding what actions you take.

Yours sincerely,

[private]
Internet Investigator

on behalf of Microsoft Corporation
[private]
Redmond, WA 98052
United States of America

E-mail: [private]@microsoft-antipiracy.com

image

 
FAQ: Questions and Answers

[back to notice text]


Question: What is copyright infringement? Are there any defenses?

Answer: Infringement occurs whenever someone who is not the copyright holder (or a licensee of the copyright holder) exercises one of the exclusive rights listed above.

The most common defense to an infringement claim is "fair use," a doctrine that allows people to use copyrighted material without permission in certain situations, such as quotations in a book review. To evaluate fair use of copyrighted material, the courts consider four factors:


  1. the purpose and character of the use
  2. the nature of the copyrighted work
  3. the amount and substantiality of copying, and
  4. the market effect.

(17 U.S.C. 107)

The most significant factor in this analysis is the fourth, effect on the market. If a copier's use supplants demand for the original work, then it will be very difficult for him or her to claim fair use. On the other hand, if the use does not compete with the original, for example because it is a parody, criticism, or news report, it is more likely to be permitted as "fair use."

Trademarks are generally subject to fair use in two situations: First, advertisers and other speakers are allowed to use a competitor's trademark when referring to that competitor's product ("nominative use"). Second, the law protects "fair comment," for instance, in parody.


[back to notice text]


Question: What are the DMCA's anti-circumvention provisions?

Answer: The Digital Millennium Copyright Act (DMCA) is the latest amendment to copyright law, which introduced a new category of copyright violations that prohibit the "circumvention" of technical locks and controls on the use of digital content and products. These anti-circumvention provisions put the force of law behind any technological systems used by copyright owners to control access to and copying of their digital works.

The DMCA contains four main provisions:

  1. a prohibition on circumventing access controls [1201(a)(1)(A)];
  2. an access control circumvention device ban (sometimes called the "trafficking" ban) [1201(a)(2)];
  3. a copyright protection circumvention device ban [1201(b)]; and,
  4. a prohibition on the removal of copyright management information (CMI) [1202(b)].

The first provision prohibits the act of circumventing technological protection systems, the second and third ban technological devices that facilitate the circumvention of access control or copy controls, and the fourth prohibits individuals from removing information about access and use devices and rules. The first three provisions are also distinguishable in that the first two provisions focus on technological protection systems that provide access control to the copyright owner, while the third provision prohibits circumvention of technological protections against unauthorized duplication and other potentially copyright infringing activities.


[back to notice text]


Question: What are the notice and takedown procedures for web sites?

Answer: In order to have an allegedly infringing web site removed from a service provider's network, or to have access to an allegedly infringing website disabled, the copyright owner must provide notice to the service provider with the following information:

  • The name, address, and electronic signature of the complaining party [512(c)(3)(A)(i)]
  • The infringing materials and their Internet location [512(c)(3)(A)(ii-iii)], or if the service provider is an "information location tool" such as a search engine, the reference or link to the infringing materials [512(d)(3)].
  • Sufficient information to identify the copyrighted works [512(c)(3)(A)(iv)].
  • A statement by the owner that it has a good faith belief that there is no legal basis for the use of the materials complained of [512(c)(3)(A)(v)].
  • A statement of the accuracy of the notice and, under penalty of perjury, that the complaining party is authorized to act on the behalf of the owner [512(c)(3)(A)(vi)].

Once notice is given to the service provider, or in circumstances where the service provider discovers the infringing material itself, it is required to expeditiously remove, or disable access to, the material. The safe harbor provisions do not require the service provider to notify the individual responsible for the allegedly infringing material before it has been removed, but they do require notification after the material is removed.


[back to notice text]


Question: What are the criteria a service provider must satisfy in order to qualify for safe harbor protection under Subsection 512(a) of the Digital Millennium Copyright Act?

Answer: Subsection 512(a) provides a safe harbor for service providers in regard to communications that do not reside on the service provider


[back to notice text]


Question: What are the DMCA Safe Harbor Provisions?

Answer: In 1998, Congress passed the On-Line Copyright Infringement Liability Limitation Act (OCILLA) in an effort to protect service providers on the Internet from liability for the activities of its users. Codified as section 512 of the Digital Millennium Copyright Act (DMCA), this new law exempts on-line service providers that meet the criteria set forth in the safe harbor provisions from claims of copyright infringement made against them that result from the conduct of their customers. These safe harbor provisions are designed to shelter service providers from the infringing activities of their customers. If a service provider qualifies for the safe harbor exemption, only the individual infringing customer are liable for monetary damages; the service provider's network through which they engaged in the alleged activities is not liable.


Topic maintained by Chilling Effects

Topic Frequently Asked Questions (and Answers)
Chilling Effects Clearinghouse - www.chillingeffects.org
disclaimer / privacy / about us & contacts