| |||||||||||||||||||||
| Chilling Effects Clearinghouse > DMCA Safe Harbor > Notices > Faronics Wants Deep Freeze on Reverse Engineered Info (NoticeID 2003, http://chillingeffects.org/N/2003) | Location: https://www.chillingeffects.org/dmca512/notice.cgi?NoticeID=2003 |
May 31, 2005
|
Sender Information: |
Recipient Information:
User Support, DMCA Complaints
Google, Inc.
Mountain View, CA, 94043, USA
Sent via: fax
Re: DMCA Infringement of Faronics Technologies Inc. Copyrighted Materials (aka "Deep Free
Re: DMCA Infringement of Faronics Technologies Inc. Copyrighted Materials (aka "Deep Freeze") Faronics Technologies Inc. ("Faronics") has identified material at several locations on the Web that represent a direct infringement of its copyrighted "Deep Freeze" security software and has determined that this material is not protected by the Fair Use or other protected provisions in Sections 107 through 122 of the Digital Millenium Copyright Act (DMCA). Pursuant to the Google Inc. ("Google") Terms of Service, which state in part: "It is our policy to respond to notices of alleged infringement that comply with the Digital Millennium Copyright Act (the text of which can be found at the U.S. Copyright Office Web Site, Faronics hereby requests that Google remove or disable access to material that is the subject of this infringing activity. As per Google's Infringement Notification policy in its Terms of Service, Faronics provides the following relevant information: 1. Copyrighted Work That Has Been Infringed Figure 1(above): Web Page at http://usuarios.arnet.com.ar/fliamarconato/pages/etutorial.html describing intent of posted material. Figure 4 (above): Web page at http://webs.uolsinectis.com.ar/c_delgado/pages/etutorial1.html showing disassembly of Faronics copyrighted material and violation of the Faronics MSLA and in turn the DMCA by the site author. 2. Material Infringing Copyrighted Work Listed In Item #1 Above Search Queries: Web pages containing infringing material: http://webs.uolsinectis.com.ar/c delaado/ http://usuarios.arnet.com.ar/fliamarconato/ Pages containing current links to infringing material: http://www.dslreports.com/forum/remark,13216523 Faronics? Contact: [Private], Chief Operating Officer Contacts for Owner/Administrators of Web Pages Containing Infringing Material Statement of Good Faith I have a good faith belief that use of the copyrighted materials described above on the allegedly infringing web pages is not authorized by the copyright owner, its agent, or the law. 7. Signature
Attn: User Support, DMCA Complaints:
http://lcweb.loc.gov/copyright/) and other applicable intellectual property laws, which may include
removing or disabling access to material claimed to be the subject of infringing activity."
The copyrighted work that is the subject of this infringement is a software application produced and owned by Faronics, titled "Deep Freeze". The infringing party or parties have violated the Faronics Deep Freeze Master Software License Agreement ("MSLA") where the MSLA states, "The Product may not be modified, reverse engineered, decompiled, or disassembled." This violation is evidenced by the infringing material itself, collected by Faronics. Examples follow in Figures 1 through 4 that clearly describe how the infringing party has decompiled or disassembled, and in turn, modified our copyrighted material in violation of the MSLA.
[Screenshot]
[Screenshot]
Figure 2(above): Web page at http://usuarios.arnet.com.ar/fliamarconato/pages/etutorial .html showing disassembly of Faronics copyrighted material and violation of the Faronics MSLA and in turn the DMCA by the site author.
[Screenshot]
Figure 3 (above): Web Page at http://webs.uolsinectis.com.ar/c_delgado/pages/emain.html describing intent of posted material.
[Screenshot]
Faronics
"deep freeze" + unfreezer
hack deep freeze
hack "deep freeze"
"deep freeze" hack
deep freeze hack
unfreeze deep freeze
"Need to unfreeze Deep Freeze?"
Need to unfreeze Deep Freeze?
"This guy found a way to do it!"
www.broadbandreports.com/forum/remark,13216523
http://www.broadbandreports.com/forum/remark,13216523~start=5~mode=flat
www.dslreports.com/forum/remark,13216523~reverse=0; days=30;root=wisp;mode=nest www.dslreports.com/forum/remark,13216523~start=3~mode=flat
www.dslreports.com/forum/remark,13462669 http://www.dslreports.com/forum/remark,13216523~start=6~mode=flat
www.dslreports.com/forum/remark,13216523~start=7~mode=flat
http://forum.pcstats.com/showthread.php?t=19103 www.hardcoreware.net/forum/archive/index.php/t-2885.html http://www.hardcoreware.net/forum/showthread.php?t=2885&page=4
http://www.hardcoreware.net/forum/showthread.php?threadid=2885&goto=newpost
http://www.hardcoreware.net/forum/showthread.php?p=339134#post339134
http://www.commentcamarche.net/forum/affich-1312676-desactiver-deep-freez http://www.forosdelweb.com/showthread.php?t=241539 http://www.casemodgod.com/cmg/ftopic-3950-previous.html http://emailpromoter.com/EP/3097-bc/links.shtml www.neowin.net/forum/lofiversion/index.php/t214696.html
http://www.trucoswindows.net/foro/index.php?s=017414ba1799e734aa88eed685314ee8&showtopic=21371 &st=0entry132375
Faronics Contact Address
Faronics Technologies Inc.
[private]
San Ramon, California
USA 94583
Tel: [private]
[private]@faronics.com
Host for: http://webs.uolsinectis.com.ar/c_delgado/ inetnum:216.244.192/18
owner: Sinectis S.A.
responsible: UOL Sinectis S.A.
address: [private]
address: C 1005AAK - BuenosAires -
country: AR
phone: [private]
person: UOL Sinectis S.A.
e-mail: [private]@UOLSINECTIS.COM.AR
Host for : http://usuarios.arnet.com.ar/fliamarconato/
owner: Arnet
responsible: [private]
address: [private]
address: 1425 - Buenos Aires - BA
country: AR
phone: [private]
e-mail: [private]@ARNET.NET.AR
Statement of Accuracy and Authority
I swear, under penalty of perjury, that the information in the notification is accurate and that I am the copyright owner or am authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.
[private], Chief Operating Officer, Faronics Technologies Inc.
|
Question: Why does a search engine get DMCA takedown notices for materials in its search listings? Answer: Many copyright claimants are making complaints under the Digital Millennium Copyright Act, Section 512(d), a safe-harbor for providers of "information location tools." These safe harbors give providers immunity from liability for users' possible copyright infringement -- if they "expeditiously" remove material when they get complaints. Whether or not the provider would have been liable for infringement by users' materials it links to, the provider can avoid the possibility of a lawsuit for money damages by following the DMCA's takedown procedure when it gets a complaint. The person whose information was removed can file a counter-notification if he or she believes the complaint was erroneous. Question: What does a service provider have to do in order to qualify for safe harbor protection?
Question: What constitutes copyright infringement?
Answer: Subject to certain defenses, it is copyright infringement for someone other than the author to do the following without the author's permission: Question: What rights are protected by copyright law? Answer: The purpose of copyright law is to encourage creative work by granting a temporary monopoly in an author's original creations. This monopoly takes the form of six rights in areas where the author retains exclusive control. These rights are: (1) the right of reproduction (i.e., copying), The law of copyright protects the first two rights in both private and public contexts, whereas an author can only restrict the last four rights in the public sphere. Claims of infringement must show that the defendant exercised one of these rights. For example, if I create unauthorized videotape copies of Star Trek II: The Wrath of Khan and distribute them to strangers on the street, then I have infringed both the copyright holder's rights of reproduction and distribution. If I merely re-enact The Wrath of Khan for my family in my home, then I have not infringed on the copyright. Question: What may be copyrighted?
Answer:
In order to be copyrightable, a work must be Question: What is fair use?
Answer: Copyright law seeks to promote the production and distribution of creative works by conferring property rights on authors. The principle of fair use serves to mediate between these property rights and the constitutional rights of public access and free speech embodied in the First Amendment. Fair use serves an important social function by allowing for the use of parts of creative works for the sake of criticism, commentary, and reporting. To decide whether a use is "fair use" or not, courts consider:
The principles of fair use are invoked when the transaction costs associated with gaining authorization from copyright owners to make use of works is too burdensome in reasonable circumstances. Fair use also permits the reproduction of art and information for the private, noncommercial sharing of those works. Fair use allows for market competitors to use copyrighted works in ways that allow them to extract the public domain aspects of those works in order to develop innovative products. Question: Are there exceptions in the DMCA to allow circumvention of technological protection systems?
Answer: There are seven exemptions built into section 1201 of the DMCA, some of which permit the circumvention of access and copy controls for limited purposes, some of which allow for the limited distribution of circumvention tools in particular circumstances. These seven exemptions are for:
In addition to these seven exemptions, the Library of Congress is required every three years to exempt the circumvention of measures that prevent the "fair use" of copyrighted works. [1201(a)(1)(B-E)] The DMCA also contains provisions that ensure that the traditional rights of copyright law still apply to the DMCA. Section 1201(c)(1) provides that the rights, remedies, limitations, or defenses to claims of copyright infringement still apply. Section 1201(c)(4) states that these provisions should not affect the rights to free speech or freedom of the press for activities using electronics, telecommunications, or computing products. Question: What is the Digital Millennium Copyright Act? Answer: The DMCA, as it is known, has a number of different parts. One part is the anticircumvention provisions, which make it illegal to "circumvent" a technological measure protecting access to or copying of a copyrighted work (see Anticircumvention (DMCA)). Another part gives web hosts and Internet service providers a "safe harbor" from copyright infringement claims if they implement certain notice and takedown procedures (see DMCA Safe Harbor). Question: Does a service provider have to notify its users about its policies regarding the removal of materials?
Answer: To qualify for exemption under the safe harbor provisions, the service provider must give notice to its users of its policies regarding copyright infringement and the consequences of repeated infringing activity. [512(i)(1)(A)] The notice can be a part of the contract signed by the user when signing up for the service or a page on the service provider's web site explaining the terms of use of their systems. While there are no specific rules about how this notice must be made, it must be "reasonably implemented" so that subscribers and account holders are informed of the terms. [512(i)(1)(A)] Question: What are the notice and takedown procedures for web sites?
Answer: In order to have an allegedly infringing web site removed from a service provider's network, or to have access to an allegedly infringing website disabled, the copyright owner must provide notice to the service provider with the following information:
Once notice is given to the service provider, or in circumstances where the service provider discovers the infringing material itself, it is required to expeditiously remove, or disable access to, the material. The safe harbor provisions do not require the service provider to notify the individual responsible for the allegedly infringing material before it has been removed, but they do require notification after the material is removed. Question: Does a DMCA takedown mean the material taken down was infringing? Answer: No. ISPs can take down material according to the DMCA anytime they receive a compliant notice alleging copyright infringement (see What are the notice and takedown procedures for we...?). The ISP does not have to investigate to determine whether the material was truly infringing before taking it down. The fact that someone has claimed infringement does not prove that infringement occurred -- there might be a fair use defense, or the claim might have been false or even frivolous. In order to ensure that copyright owners do not wrongly insist on the removal of materials that actually do not infringe their copyrights, the safe harbor provisions of the DMCA require service providers to notify the subscribers if their materials have been removed and to provide them with an opportunity to send a written notice to the service provider stating that the material has been wrongly removed. [512(g)] If a subscriber provides a proper "counter-notice" claiming that the material does not infringe copyrights, the service provider must then promptly notify the claiming party of the individual's objection. [512(g)(2)] If the copyright owner does not bring a lawsuit in district court within 14 days, the service provider is then required to restore the material to its location on its network. [512(g)(2)(C)] A proper counter-notice must contain the following information: The subscriber's name, address, phone number and physical or electronic signature [512(g)(3)(A)] Identification of the material and its location before removal [512(g)(3)(B)] A statement under penalty of perjury that the material was removed by mistake or misidentification [512(g)(3)(C)] Subscriber consent to local federal court jurisdiction, or if overseas, to an appropriate judicial body. [512(g)(3)(D)] If it is determined that the copyright holder misrepresented its claim regarding the infringing material, the copyright holder then becomes liable to the OSP for any damages that resulted from the improper removal of the material. [512(f)] Question: Does a copyright owner have to specify the exact materials it alleges are infringing?
Answer: Proper notice under the safe harbor provisions requires the copyright owners to specifically identify the alleged infringing materials, or if the service provider is an "information location tool" such as a search engine, to specifically identify the links to the alleged infringing materials. [512(c)(3)(iii)], [512(d)(3)]. The provisions also require the copyright owners to identify the copyrighted work, or a representative list of the copyrighted works, that is claimed to be infringed. [512(c)(3)(A)(ii)]. Rather than simply sending a letter to the service provider that claims that infringing material exists on their system, these qualifications ensure that service providers are given a reasonable amount of information to locate the infringing materials and to effectively police their networks. [512(c)(3)(A)(iii)], [512(d)(3)]. However, in the recent case of ALS Scan, Inc. v. Remarq Communities, Inc., the court found that the copyright owner did not have to point out all of the infringing material, but only substantially all of the material. The relaxation of this specificity requirement shifts the burden of identifying the material to the service provider, raising the question of the extent to which a service provider must search through its system. OSP customers should note that this situation might encourage OSP's to err on the side of removing allegedly infringing material. Question: What is reverse engineering? Answer: Reverse engineering is the general process of analyzing a technology specifically to ascertain how it was designed or how it operates. This kind of inquiry engages individuals in a constructive learning process about the operation of systems and products. Reverse engineering as a method is not confined to any particular purpose, but is often an important part of the scientific method and technological development. The process of taking something apart and revealing the way in which it works is often an effective way to learn how to build a technology or make improvements to it. Through reverse engineering, a researcher gathers the technical data necessary for the documentation of the operation of a technology or component of a system. In "black box" reverse engineering, systems are observed without examining internal structure, while in "white box" reverse engineering the inner workings of the system are inspected. When reverse engineering software, researchers are able to examine the strength of systems and identify their weaknesses in terms of performance, security, and interoperability. The reverse engineering process allows researchers to understand both how a program works and also what aspects of the program contribute to its not working. Independent manufacturers can participate in a competitive market that rewards the improvements made on dominant products. For example, security audits, which allow users of software to better protect their systems and networks by revealing security flaws, require reverse engineering. The creation of better designs and the interoperability of existing products often begin with reverse engineering. Question: Are licensing provisions prohibiting reverse engineering enforceable? Answer: While the validity of licensing prohibitions of reverse engineering has not yet been decided by courts, the conflict between state laws that would enforce these provisions and federal intellectual property law has been addressed. When considering cases where breach of contract or trade secret misappropriation is claimed (both state law claims), courts must first determine whether or not intellectual property law preempts those contracts enforced by the individual state. Preemption occurs when courts determine that federal intellectual property law must be considered in order to address the issues involved in the particular provisions. Section 301 of the Copyright Act provides that a state law claim is preempted if:
In order for the claim to be preempted it must first pass this equivalency test, which determines whether the state-created rights in upholding the contract are merely alternative articulations of the exclusive rights of copyright law. If the court determines that the contract provisions contain an "extra element" that require analysis of the contract to be preempted by copyright law, the courts generally proceed to an analysis of the possible infringement or exemption under fair use of the activities of the reverse engineer. Question: What is disassembly or decompilation of a computer software program? Answer: In the development of software, the source code in which programmers originally write is translated into object (binary) code. The translation is done with a computer program called an "assembler" or "compiler," depending on the source code's language, such as Java, C++, or assembly. A great deal of the original programmer's instructions, including commentary, notations, and specifications, are not included in the translation from source to object code (the assembly or compilation). Disassembly or decompilation reverses this process by reading the object code of the program and translating them into source code. By presenting the information in a computer language that a software programmer can understand, the reverse engineer can analyze the structure of the program and identify how it operates. The data generated in the disassembly of a typical computer program is one to many files with thousands of lines of computer code. Because much of the original programmer's commentary, notations, and specifications are not retained in the object code, the reverse engineered code constitutes only a part of the program information included in the original source code. Engineers must interpret the resulting source code using knowledge and expertise to recreate the data structures of the original program and understand the overall design rationale of the system. Not all reverse engineering efforts require "decompilation" of software. Some "black box" reverse engineering is done by characterizing software through observation of its interaction with system components, other software, and other (external) systems through networks. Question: What is good faith? Answer: Good faith is defined by Black's Law Dictionary as "a state of mind consisting in ... honesty in belief or purpose ... or absence of intent to defraud or to seek unconscionable advantage." Good faith can be a defense to legal claims where the plaintiff must establish that the defendant had a particular state of mind, such as an intent to do harm. Essentially, it is a defense that can be used by the defendant to establish that he or she was void of the requisite mental culpability necessary to hold him or her liable for an alleged harm. Question: Who may hold a copyright? Answer: A copyright ordinarily vests in the creator or creators of a work (known as the author(s)), and is inherited as ordinary property. Copyrights are freely transferrable as property, at the discretion of the owner. 17 U.S.C. Question: What if the letter accuses me of something I'm not doing? Answer: If the cease-and-desist misinterprets what your website is doing, for example claiming you're "reproducing" things you just link to, you can try to send a response that clarifies the facts -- especially if the factual difference is legally relevant. First, though, you may want to judge from the tone of the letter whether that's likely to resolve the matter, or instead just to draw more attention to you and make the requester angrier. |
|
|