Chilling Effects
Home Weather Reports Report Receiving a Cease and Desist Notice Search the Database Topics
Sending
Topic HomeFAQsMonitoring the legal climate for Internet activity
Chilling Effects
 Chilling Effects Clearinghouse > DMCA Safe Harbor > Notices > ArticleInsider won't let it rest (NoticeID 1890, http://chillingeffects.org/N/1890) Location: https://www.chillingeffects.org/dmca512/notice.cgi?NoticeID=1890

ArticleInsider won't let it rest

April 29, 2005

 

Sender Information:
ArticleInsider.com
Sent by: [Private]
Infosearch Media Inc.
Marina Del Rey, CA, 90292, US

Recipient Information:
DMCA complaints
Google, Inc.


Sent via:
Re: Content Infringement Notice

Content Infringement Notice
Attn: User Support, DMCA complaints
On behalf of
ArticleInsider.com
April 29, 2005


Contact Info:
Infosearch Media, Inc.
[private]
Marina Del Rey, CA 90292
Phone: [private]
Fax: [private]
Attn: [private] at [private]@infosearchmedia.com

Incident#1
The copyrighted work at issue is the article "Ecommerce Website Development, The Next Step" by Jason Miller posted on the Article Insider web site at http://webdevelopment.articleinsider.com/33892 ecommerce website development.html
Search Query: "There are several things you should take into account before you decide to begin your ecommerce website development."
Infringing Web Pages:
http://www.bestwebatlanta.com/solutions ecommerce development atlanta.shtm
My email: [private]@infosearchmedia.com Address: Infosearch Media, Inc_ [private] Marina Del Rey, CA 90292 Phone: [private]
Email of infringing website: [private]@bestwebatlanta.com
I have a good faith belief that use of the copyrighted materials described above on the allegedly infringing web pages is not authorized by the copyright owner, its agent, or the law.
I swear, under penalty of perjury, that the information in the notification is accurate and that I am the copyright owner or am authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.
Signature
Fax to: [private]

Incident#2
The copyrighted work at issue is the article "Build an Online Store and Get Noticed" by Jason Miller posted on the Article Insider web site at http://webdevelopment.articleinsider.com/33893 build an online store.html
Search Query: "There are several things to take into consideration after you decide to build an online store." Infringing Web Pages:
http://www.bestwebatlanta.com/solutions ecommerce development atlanta.shtm
My email: [private]@infosearchmedia.com
Address: Infosearch Media, Inc. [private] Marina Del Rey, CA 90292 Phone: [private]
4. Email of infringing website: [private]@bestwehatlanta.com
5_ I have a good faith belief that use of the copyrighted materials described above on the allegedly infringing web pages is not authorized by the copyright owner, its agent, or the law.
6. I swear, under penalty of perjury, that the information in the notification is accurate and that I am the copyright owner or am authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.
7_ Signature
8. Fax to: [private]

Incident#3
The copyrighted work at issue is the article "Database Programming Services Give You the Power" by Jason Miller posted on the Article Insider web site at http://webdevelopment.articleinsider.com/33897 database_programming services.html
Search Query: "Databases are an essential part of any business from inventory to customer management."
Infringing Web Pages:
http://www.bestwebatlanta.com/solutions atlanta database development.shtml
My email: [private]@infosearchmedia.com Address: Infosearch Media, Inc. [private] Marina Del Rey, CA 90292 Phone: [private]
Email of infringing website: [private]@bestwebatlanta.com
I have a good faith belief that use of the copyrighted materials described above on the allegedly infringing web pages is not authorized by the copyright owner, its agent, or the law.
I swear, under penalty of perjury, that the information in the notification is accurate and that I am the copyright owner or am authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.
Signature
Fax to: [private]

Incident#4

The copyrighted work at issue is the article "Finding the Right ASP Development" by Jason Miller posted on the Article Insider web site at http://webdevelopment.articleinsider.com/33906 asp development.html
Search Query: "Customized software can make the difference between managing your business poorly and extremely efficiently."
Infringing Web Pages:
http://www.bestwebatlanta.com/resources asp index.shtml
My email: [private]@infosearchmedia_com Address: Infosearch Media, Inc. [private] Marina Del Rey, CA 90292 Phone: [private]
Email of infringing website: [private]@bestwebatlanta.com
I have a good faith belief that use of the copyrighted materials described above on the allegedly infringing web pages is not authorized by the copyright owner, its agent, or the law.
I swear, under penalty of perjury, that the information in the notification is accurate and that I am the copyright owner or am authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.
7_ Signature
8. Fax to: [private]

Incident#5
The copyrighted work at issue is the article "Custom ASP Software: Designed for Your Business" by Jason Miller posted on the Article Insider web site at http://webdevelopment.articleinsider.com/33907 custom asp software.html
Search Query: "Custom ASP software is very sophisticated software which can save your organization a bounty of cash in the long run."
Infringing Web Pages:
http://www.bestwebatlanta.com/resources asp index.shtml
My email: [private]@infosearchmedia.cpm Address: Infosearch Media, Inc. [private] Marina Del Rey, CA 90292 Phone: [private]
Email of infringing website: [private]@bestwebatlantacom
I have a good faith belief that use of the copyrighted materials described above on the allegedly infringing web pages is not authorized by the copyright owner, its agent, or the law.
I swear, under penalty of perjury, that the information in the notification is accurate and that I am the copyright owner or am authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.
Signature
Fax to: [private]

Incident#6

The copyrighted work at issue is the article The Advance of ASP Programming" by Jason Miller posted on the Article Insider web site at http://webdevelopmentarticleinsider.com/33908 asp programming.html
Search Query: "ASP.Net is a newer programming language that has largely replaced ASP."
Infringing Web Pages:
http://www.bestwebatlanta.com/resources asp index.shtml
My email: [private]@infosearchmedia.com
Address: Infosearch Media, Inc. [private] Marina Del Rey, CA 90292 Phone: [private]
Email of infringing website: [private]@bestwebatlanta.com
I have a good faith belief that use of the copyrighted materials described above on the allegedly infringing web pages is not authorized by the copyright owner, its agent, or the law.
I swear, under penalty of perjury, that the information in the notification is accurate and that I am the copyright owner or am authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.
Signature
Fax to: [private]

Incident#7
The copyrighted work at issue is the article "Get Ahead with VB Software Development" by Jason Miller posted on the Article Insider web site at http://webdevelopment.articleinsider.com/33928 vb software development.htrnl
Search Query: "If you have any tasks which are repetitive then V13 software development can help automate your work day."
Infringing Web Pages: http://www.creatorshive.com/software

image

FAQ: Questions and Answers

[back to notice text]


Question: What are the notice and takedown procedures for web sites?

Answer: In order to have an allegedly infringing web site removed from a service provider's network, or to have access to an allegedly infringing website disabled, the copyright owner must provide notice to the service provider with the following information:

  • The name, address, and electronic signature of the complaining party [512(c)(3)(A)(i)]
  • The infringing materials and their Internet location [512(c)(3)(A)(ii-iii)], or if the service provider is an "information location tool" such as a search engine, the reference or link to the infringing materials [512(d)(3)].
  • Sufficient information to identify the copyrighted works [512(c)(3)(A)(iv)].
  • A statement by the owner that it has a good faith belief that there is no legal basis for the use of the materials complained of [512(c)(3)(A)(v)].
  • A statement of the accuracy of the notice and, under penalty of perjury, that the complaining party is authorized to act on the behalf of the owner [512(c)(3)(A)(vi)].

Once notice is given to the service provider, or in circumstances where the service provider discovers the infringing material itself, it is required to expeditiously remove, or disable access to, the material. The safe harbor provisions do not require the service provider to notify the individual responsible for the allegedly infringing material before it has been removed, but they do require notification after the material is removed.


[back to notice text]


Question: What does a service provider have to do in order to qualify for safe harbor protection?

Answer: In addition to informing its customers of its policies (discussed above), a service provider must follow the proper notice and takedown procedures (discussed above) and also meet several other requirements in order to qualify for exemption under the safe harbor provisions.

In order to facilitate the notification process in cases of infringement, ISPs which allow users to store information on their networks, such as a web hosting service, must designate an agent that will receive the notices from copyright owners that its network contains material which infringes their intellectual property rights. The service provider must then notify the Copyright Office of the agent's name and address and make that information publicly available on its web site. [512(c)(2)]

Finally, the service provider must not have knowledge that the material or activity is infringing or of the fact that the infringing material exists on its network. [512(c)(1)(A)], [512(d)(1)(A)]. If it does discover such material before being contacted by the copyright owners, it is instructed to remove, or disable access to, the material itself. [512(c)(1)(A)(iii)], [512(d)(1)(C)]. The service provider must not gain any financial benefit that is attributable to the infringing material. [512(c)(1)(B)], [512(d)(2)].


[back to notice text]


Question: What is the Digital Millennium Copyright Act?

Answer: The DMCA, as it is known, has a number of different parts. One part is the anticircumvention provisions, which make it illegal to "circumvent" a technological measure protecting access to or copying of a copyrighted work (see Anticircumvention (DMCA)). Another part gives web hosts and Internet service providers a "safe harbor" from copyright infringement claims if they implement certain notice and takedown procedures (see DMCA Safe Harbor).


[back to notice text]


Question: What rights are protected by copyright law?

Answer: The purpose of copyright law is to encourage creative work by granting a temporary monopoly in an author's original creations. This monopoly takes the form of six rights in areas where the author retains exclusive control. These rights are:

(1) the right of reproduction (i.e., copying),
(2) the right to create derivative works,
(3) the right to distribution,
(4) the right to performance,
(5) the right to display, and
(6) the digital transmission performance right.

The law of copyright protects the first two rights in both private and public contexts, whereas an author can only restrict the last four rights in the public sphere. Claims of infringement must show that the defendant exercised one of these rights. For example, if I create unauthorized videotape copies of Star Trek II: The Wrath of Khan and distribute them to strangers on the street, then I have infringed both the copyright holder's rights of reproduction and distribution. If I merely re-enact The Wrath of Khan for my family in my home, then I have not infringed on the copyright. Names, ideas and facts are not protected by copyright.

Trademark law, in contrast, is designed to protect consumers from confusion as to the source of goods (as well as to protect the trademark owner's market). To this end, the law gives the owner of a registered trademark the right to use the mark in commerce without confusion. If someone introduces a trademark into the market that is likely to cause confusion, then the newer mark infringes on the older one. The laws of trademark infringement and dilution protect against this likelihood of confusion. Trademark protects names, images and short phrases.

Infringement protects against confusion about the origin of goods. The plaintiff in an infringement suit must show that defendant's use of the mark is likely to cause such a confusion. For instance, if I were an unscrupulous manufacturer, I might attempt to capitalize on the fame of Star Trek by creating a line of 'Spock Activewear.' If consumers could reasonably believe that my activewear was produced or endorsed by the owners of the Spock trademark, then I would be liable for infringement.

The law of trademark dilution protects against confusion concerning the character of a registered trademark. Suppose I created a semi-automatic assault rifle and marketed it as 'The Lt. Uhura 5000.' Even if consumers could not reasonably believe that the Star Trek trademark holders produced this firearm, the trademark holders could claim that my use of their mark harmed the family-oriented character of their mark. I would be liable for dilution.


[back to notice text]


Question: What defines a service provider under Section 512 of the Digital Millennium Copyright Act (DMCA)?

Answer: A service provider is defined as "an entity offering transmission, routing, or providing connections for digital online communications, between or among points specified by a user, of material of the user's choosing, without modification to the content of the material as sent or received" or "a provider of online services or network access, or the operator of facilities thereof." [512(k)(1)(A-B)] This broad definition includes network services companies such as Internet service providers (ISPs), search engines, bulletin board system operators, and even auction web sites. In A&M Records, Inc. v. Napster Inc., the court refused to extend the safe harbor provisions to the Napster software program and service, leaving open the question of whether peer-to-peer networks also qualify for safe harbor protection under Section 512.

There are four major categories of network systems offered by service providers that qualify for protection under the safe harbor provisions:

  • Conduit Communications include the transmission and routing of information, such as an email or Internet service provider, which store the material only temporarily on their networks. [Sec. 512(a)]
  • System Caching refers to the temporary copies of data that are made by service providers in providing the various services that require such copying in order to transfer data. [Sec. 512(b)]
  • Storage Systems refers to services which allow users to store information on their networks, such as a web hosting service or a chat room. [Sec. 512(c)]
  • Information Location Tools refer to services such as search engines, directories, or pages of recommended web sites which provide links to the allegedly infringing material. [Sec. 512(d)]


[back to notice text]


Question: Does a copyright owner have to specify the exact materials it alleges are infringing?

Answer: Proper notice under the safe harbor provisions requires the copyright owners to specifically identify the alleged infringing materials, or if the service provider is an "information location tool" such as a search engine, to specifically identify the links to the alleged infringing materials. [512(c)(3)(iii)], [512(d)(3)]. The provisions also require the copyright owners to identify the copyrighted work, or a representative list of the copyrighted works, that is claimed to be infringed. [512(c)(3)(A)(ii)]. Rather than simply sending a letter to the service provider that claims that infringing material exists on their system, these qualifications ensure that service providers are given a reasonable amount of information to locate the infringing materials and to effectively police their networks. [512(c)(3)(A)(iii)], [512(d)(3)].

However, in the recent case of ALS Scan, Inc. v. Remarq Communities, Inc., the court found that the copyright owner did not have to point out all of the infringing material, but only substantially all of the material. The relaxation of this specificity requirement shifts the burden of identifying the material to the service provider, raising the question of the extent to which a service provider must search through its system. OSP customers should note that this situation might encourage OSP's to err on the side of removing allegedly infringing material.


[back to notice text]


Question: What are the communication requirements that Section 512 imposes on OSPs, complainants, and alleged infringers?

Answer: Each of the parties -- the complainant, the Online Service Provider (OSP), and the alleged infringer -- has the right to communicate with the other parties. In addition, OSPs and complainants are required to engage in certain communications in order to take advantage of the DMCA's notice-and-takedown and safe harbor provisions. (For more information about the process see FAQ 130.)

The complainant starts the Sec. 512 process by notifying the Online Service Provider (OSP) or the OSP?s agent in writing of a copyright infringement. (See [FAQ 127 for more information about what constitutes an OSP and FAQ 450 for more information about what constitutes copyright infringement.) Section 512(c)(3)(A)(iii) sets out the requirements for notice to OSPs. Under this section, the complainant must specifically identify the material that is claimed to be infringing or to be subject of infringing activity and that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit the service provider to locate the material.

Section 512(d)(3) sets out the procedure for contacting information location tools, such as search engines. Under Sec. 512(d), the complainant must identify the reference or link to the allegedly infringing material, and must provide enough information for the search engine to locate the link. (For more information about the contents of notices, see FAQ 440.)

The complainant is not required to contact the alleged infringer at any time. [§ 512(h)(5).] However, complainants who do wish to contact the infringer, or to file suit on an infringer, may use the Sec. 512(h) subpoena process to require an OSP provide its customers? identifying information to the complainant.

The OSP has two separate sets of communication obligations. First, the OSP is generally required to establish policies regarding copyright infringement and repeat infringers and to inform subscribers and account holders about those policies as well as about the actions taken against repeat infringers. [§ 512(i)(1)(A).] This applies both to Sec. 512(c) ISPs and Sec. 512(d) information location tools.

Second, once an OSP receives a Section 512 takedown notice, either one, Sec. 512(c) ISPs or Sec. 512(d) information location tools, is required to notify its subscriber that it has disabled access to the allegedly infringing material. [§ 512(g)(2)(A).]

A recipient is not required to respond in any way to Sec. 512 notices from OSPs or complainants. However, without a recipient response, the OSP will generally remove or disable access to the material, possibly even disabling an ISP account. To avoid this, the recipient may file a counter-notification with the OSP, denying that the material infringes copyright. [§ 512(g)] If an OSP receives a counter-notification, then the service provider must notify the complainant that it will cease disabling access in 10 business days unless the complainant obtains a court-imposed restraining order. [§ 512(g)(2)(C)]


[back to notice text]


Question: What are the counter-notice and put-back procedures?

Answer: In order to ensure that copyright owners do not wrongly insist on the removal of materials that actually do not infringe their copyrights, the safe harbor provisions require service providers to notify the subscribers if their materials have been removed and to provide them with an opportunity to send a written notice to the service provider stating that the material has been wrongly removed. [512(g)] If a subscriber provides a proper "counter-notice" claiming that the material does not infringe copyrights, the service provider must then promptly notify the claiming party of the individual's objection. [512(g)(2)] If the copyright owner does not bring a lawsuit in district court within 14 days, the service provider is then required to restore the material to its location on its network. [512(g)(2)(C)]

A proper counter-notice must contain the following information:

  • The subscriber's name, address, phone number and physical or electronic signature [512(g)(3)(A)]
  • Identification of the material and its location before removal [512(g)(3)(B)]
  • A statement under penalty of perjury that the material was removed by mistake or misidentification [512(g)(3)(C)]
  • Subscriber consent to local federal court jurisdiction, or if overseas, to an appropriate judicial body. [512(g)(3)(D)]

If it is determined that the copyright holder misrepresented its claim regarding the infringing material, the copyright holder then becomes liable to the person harmed for any damages that resulted from the improper removal of the material. [512(f)]

See also How do I file a DMCA counter-notice?, and the counter-notification generator.


[back to notice text]


Question: What does "under penalty of perjury" mean?

Answer: Law.com offers a good definition of perjury: "Perjury is the the crime of intentionally lying after being duly sworn (to tell the truth) by a notary public, court clerk or other official. This false statement may be made in testimony in court, administrative hearings, depositions, answers to interrogatories, as well as by signing or acknowledging a written legal document (such as affidavit, declaration under penalty of perjury, deed, license application, tax return) known to contain false information. Although it is a crime, prosecutions for perjury are rare, because a defendant will argue he/she merely made a mistake or misunderstood."


Topic maintained by Chilling Effects

Chilling Effects Clearinghouse - www.chillingeffects.org
Chilling Effects Clearinghouse page printed from: https://www.chillingeffects.org/dmca512/notice.cgi?NoticeID=1890
disclaimer / privacy / about us & contacts