Chilling Effects
Home Weather Reports Report Receiving a Cease and Desist Notice Search the Database Topics
Sending
Topic HomeFAQsMonitoring the legal climate for Internet activity
Chilling Effects
 Chilling Effects Clearinghouse > DMCA Safe Harbor > Notices > Photographer complains of Fonda/Kerry photo use (4) (NoticeID 2229, http://chillingeffects.org/N/2229) Printer-friendly version

Photographer complains of Fonda/Kerry photo use (4)

August 02, 2005

 

Sender Information:
Leif Skoogfors
Sent by: [Private]
[Private]
Media, PA, 19063, US

Recipient Information:
[Private]
Blogger [Google, Inc.]
Mountain View, CA, 94043, USA


Sent via: fax
Re: Copyright Abuse DMCA

Dear Administrator:

I hereby hereby: (1) notify Google, Inc. of infringements of my copyright by your operating at blogspirator.blogspot.com and (2) demand the expeditious removal of or prevention of access to blogspirator.blogspot.com infringing material, as identified below. In the event Google, Inc. does not comply with these demands, I reserves my right to take all appropriate action against Google, which may include, but is not limited to, claims of direct and contributory copyright infringement.

Whether or not your client blogspirator.blogspot.com has a designated agent with United States Copyright Office and/or, if appropriate listed the proscribed contact information on its publicly accessible web site to receive notices of infringement as a means to limit its liability for such infringements, as provided for by the DMCA, 17

image

 
FAQ: Questions and Answers

[back to notice text]


Question: Why does a web host or blogging service provider get DMCA takedown notices?

Answer: Many copyright claimants are making complaints under the Digital Millennium Copyright Act, Section 512(c)m a safe-harbor for hosts of "Information Residing on Systems or Networks At Direction of Users." This safe harbors give providers immunity from liability for users' possible copyright infringement -- if they "expeditiously" remove material when they get complaints. Whether or not the provider would have been liable for infringement by materials its users post, the provider can avoid the possibility of a lawsuit for money damages by following the DMCA's takedown procedure when it gets a complaint. The person whose information was removed can file a counter-notification if he or she believes the complaint was erroneous.

Question: What does a service provider have to do in order to qualify for safe harbor protection?

Answer: In addition to informing its customers of its policies (discussed above), a service provider must follow the proper notice and takedown procedures (discussed above) and also meet several other requirements in order to qualify for exemption under the safe harbor provisions.

In order to facilitate the notification process in cases of infringement, ISPs which allow users to store information on their networks, such as a web hosting service, must designate an agent that will receive the notices from copyright owners that its network contains material which infringes their intellectual property rights. The service provider must then notify the Copyright Office of the agent's name and address and make that information publicly available on its web site. [512(c)(2)]

Finally, the service provider must not have knowledge that the material or activity is infringing or of the fact that the infringing material exists on its network. [512(c)(1)(A)], [512(d)(1)(A)]. If it does discover such material before being contacted by the copyright owners, it is instructed to remove, or disable access to, the material itself. [512(c)(1)(A)(iii)], [512(d)(1)(C)]. The service provider must not gain any financial benefit that is attributable to the infringing material. [512(c)(1)(B)], [512(d)(2)].


Question: What are the provisions of 17 U.S.C. Section 512(c)(3) & 512(d)(3)?

Answer: Section 512(c)(3) sets out the elements for notification under the DMCA. Subsection A (17 U.S.C. 512(c)(3)(A)) states that to be effective a notification must include: 1) a physical/electronic signature of a person authorized to act on behalf of the owner of the infringed right; 2) identification of the copyrighted works claimed to have been infringed; 3) identification of the material that is claimed to be infringing or to be the subject of infringing activity and that is to be removed; 4) information reasonably sufficient to permit the service provider to contact the complaining party (e.g., the address, telephone number, or email address); 5) a statement that the complaining party has a good faith belief that use of the material is not authorized by the copyright owner; and 6) a statement that information in the complaint is accurate and that the complaining party is authorized to act on behalf of the copyright owner. Subsection B (17 U.S.C. 512(c)(3)(B)) states that if the complaining party does not substantially comply with these requirements the notice will not serve as actual notice for the purpose of Section 512.

Section 512(d)(3), which applies to "information location tools" such as search engines and directories, incorporates the above requirements; however, instead of the identification of the allegedly infringing material, the notification must identify the reference or link to the material claimed to be infringing.


Question: Does a service provider have to follow the safe harbor procedures?

Answer: No. An ISP may choose not to follow the DMCA takedown process, and do without the safe harbor. If it would not be liable under pre-DMCA copyright law (for example, because it is not contributorily or vicariously liable, or because there is no underlying copyright infringement), it can still raise those same defenses if it is sued.


Question: How do I file a DMCA counter-notice?

Answer: If you believe your material was removed because of mistake or misidentification, you can file a "counter notification" asking the service provider to put it back up. Chilling Effects offers a form to build your own counter-notice.

For more information on the DMCA Safe Harbors, see the FAQs on DMCA Safe Harbor. For more information on Copyright and defenses to copyright infringement, see Copyright.


[back to notice text]


Question: What is copyright protection?

Answer: A copyright protects a literary, musical, dramatic, choreographic, pictoral or graphic, audiovisual, or architectural work, or a sound recording, from being reproduced without the permision of the copyright owner. 17 U.S.C.


[back to notice text]


Question: What may be copyrighted?

Answer: In order to be copyrightable, a work must be

1. fixed in a tangible medium of expression ; and
2. original.

Copyrights do not protect ideas, procedures, processes, systems, methods of operation, concepts, principles, or discoveries: they only protect physical representations. 17 U.S.C.


[back to notice text]


Question: Who may hold a copyright?

Answer: A copyright ordinarily vests in the creator or creators of a work (known as the author(s)), and is inherited as ordinary property. Copyrights are freely transferrable as property, at the discretion of the owner. 17 U.S.C.


[back to notice text]


Question: What constitutes copyright infringement?

Answer: Subject to certain defenses, it is copyright infringement for someone other than the author to do the following without the author's permission:

1. reproduce (copy) the work;

2. create a new work derived from the original work (for example, by translating the work into a new language, by copying and distorting the image, or by transferring the work into a new medium of expression);

3. sell or give away the work, or a copy of the work, for the first time (but once the author has done so, the right to sell or give away the item is transferred to the new owner. This is known as the "first sale" doctrine: once a copyright owner has sold or given away the work or a copy of it, the recipient or purchaser may do as she pleases with what she posesses.) 17 U.S.C. ?109(a);

4. perform or display the work in public without permission from the copyright owner. 17 U.S.C. ?106. It is also copyright infringement to violate the "moral rights" of an author as defined by 17 U.S.C. 106A. Moral rights are discussed here.


[back to notice text]


Question: What defenses are there to copyright infringement?

Answer: The primary defense to copyright infringement is "fair use." 17 U.S.C.


[back to notice text]


Question: What are the provisions of 17 U.S.C. Section 512(c)(3) & 512(d)(3)?

Answer: Section 512(c)(3) sets out the elements for notification under the DMCA. Subsection A (17 U.S.C. 512(c)(3)(A)) states that to be effective a notification must include: 1) a physical/electronic signature of a person authorized to act on behalf of the owner of the infringed right; 2) identification of the copyrighted works claimed to have been infringed; 3) identification of the material that is claimed to be infringing or to be the subject of infringing activity and that is to be removed; 4) information reasonably sufficient to permit the service provider to contact the complaining party (e.g., the address, telephone number, or email address); 5) a statement that the complaining party has a good faith belief that use of the material is not authorized by the copyright owner; and 6) a statement that information in the complaint is accurate and that the complaining party is authorized to act on behalf of the copyright owner. Subsection B (17 U.S.C. 512(c)(3)(B)) states that if the complaining party does not substantially comply with these requirements the notice will not serve as actual notice for the purpose of Section 512.

Section 512(d)(3), which applies to "information location tools" such as search engines and directories, incorporates the above requirements; however, instead of the identification of the allegedly infringing material, the notification must identify the reference or link to the material claimed to be infringing.


[back to notice text]


Question: What is third-party liability, also known as "secondary liability"?

Answer: The concept of third party liability refers, as the name implies, to situations in which responsibility for harm can be placed on a party in addition to the one that actually caused the injury. The most common example comes from tort law: a customer in a grocery store drops a bottle of wine and another customer slips on the puddle and injures himself; he may bring an action for negligence against the customer who dropped the bottle and against the owner of the grocery store. Under the common law doctrine of third-party liability, a plaintiff must show not only that an injury actually occurred, but also (in most cases) that some sort of connection existed between the third party and the person who actually caused the injury.

As such the concept of third-party liability is often divided into two different types: contributory infringement and vicarious liability. Typically, contributory infringement exists when the third party either assists in the commission of the act which causes the injury, or simply induces the primary party to do so commit the act which caused the injury. (See What is contributory infringement?.) Vicarious liability often requires the third party to have exerted some form of control over the primary party


[back to notice text]


Question: What is copyright protection?

Answer: A copyright protects a literary, musical, dramatic, choreographic, pictoral or graphic, audiovisual, or architectural work, or a sound recording, from being reproduced without the permision of the copyright owner. 17 U.S.C.


[back to notice text]


Question: Does a copyright owner have to specify the exact materials it alleges are infringing?

Answer: Proper notice under the safe harbor provisions requires the copyright owners to specifically identify the alleged infringing materials, or if the service provider is an "information location tool" such as a search engine, to specifically identify the links to the alleged infringing materials. [512(c)(3)(iii)], [512(d)(3)]. The provisions also require the copyright owners to identify the copyrighted work, or a representative list of the copyrighted works, that is claimed to be infringed. [512(c)(3)(A)(ii)]. Rather than simply sending a letter to the service provider that claims that infringing material exists on their system, these qualifications ensure that service providers are given a reasonable amount of information to locate the infringing materials and to effectively police their networks. [512(c)(3)(A)(iii)], [512(d)(3)].

However, in the recent case of ALS Scan, Inc. v. Remarq Communities, Inc., the court found that the copyright owner did not have to point out all of the infringing material, but only substantially all of the material. The relaxation of this specificity requirement shifts the burden of identifying the material to the service provider, raising the question of the extent to which a service provider must search through its system. OSP customers should note that this situation might encourage OSP's to err on the side of removing allegedly infringing material.


[back to notice text]


Question: Can I post a copyrighted image on my website?

Answer: Maybe. In order to determine whether you can post a copyrighted image on your website, a court would apply the four factor fair use analysis.

First, it is important to determine the purpose and character of the use. If the use is commercial in nature, rather than for nonprofit education purposes, it less likely to be considered a fair use. To determine if it is commercial, a court would consider whether the use was exploitative and for direct profit, or if instead any commercial character was incidental. Also, if the use is transformative and for a different purpose than the original work, it is more likely the first factor will weigh in favor of finding a fair use. For example, in Kelly v. Arriba Soft Corporation, the court found that posting "thumbnail" images on a website was a fair use because such images served a different purpose than the original images.

Second, the court would consider the nature of the copyrighted work. The reproduction of a predominantly factual work is more likely to be considred a fair use than the reproduction of a highly creative one.

Third, it is important to consider the amount and substantiality of the portion of the copyrighted image used. This inquiry looks at not only the quantity, but also on the expressive value, of the portion used. If a large amount of the original image is copied, or if the portion copied is substantially significant to the work as a whole, it is less likely the court will find such copying to be a fair use.

Finally, the most important factor in this inquiry is the effect of the use on the potential market for the copyright owner's work. If posting the image on the website leads to a reduction in sales of the copyrighted work or discourages people from accessing the copyright owner's website, a court is more likely to find that the use is not fair and has an adverse impact on the copyright owner's market.

These four factors will be evaluated by a court in a factual inquiry to determine whether the posting of the image would constitute a fair use.


[back to notice text]


Question: What are the counter-notice and put-back procedures?

Answer: In order to ensure that copyright owners do not wrongly insist on the removal of materials that actually do not infringe their copyrights, the safe harbor provisions require service providers to notify the subscribers if their materials have been removed and to provide them with an opportunity to send a written notice to the service provider stating that the material has been wrongly removed. [512(g)] If a subscriber provides a proper "counter-notice" claiming that the material does not infringe copyrights, the service provider must then promptly notify the claiming party of the individual's objection. [512(g)(2)] If the copyright owner does not bring a lawsuit in district court within 14 days, the service provider is then required to restore the material to its location on its network. [512(g)(2)(C)]

A proper counter-notice must contain the following information:

  • The subscriber's name, address, phone number and physical or electronic signature [512(g)(3)(A)]
  • Identification of the material and its location before removal [512(g)(3)(B)]
  • A statement under penalty of perjury that the material was removed by mistake or misidentification [512(g)(3)(C)]
  • Subscriber consent to local federal court jurisdiction, or if overseas, to an appropriate judicial body. [512(g)(3)(D)]

If it is determined that the copyright holder misrepresented its claim regarding the infringing material, the copyright holder then becomes liable to the person harmed for any damages that resulted from the improper removal of the material. [512(f)]

See also How do I file a DMCA counter-notice?, and the counter-notification generator.


[back to notice text]


Question: Does a service provider have to follow the safe harbor procedures?

Answer: No. An ISP may choose not to follow the DMCA takedown process, and do without the safe harbor. If it would not be liable under pre-DMCA copyright law (for example, because it is not contributorily or vicariously liable, or because there is no underlying copyright infringement), it can still raise those same defenses if it is sued.


Topic maintained by Chilling Effects

Topic Frequently Asked Questions (and Answers)
Chilling Effects Clearinghouse - www.chillingeffects.org
disclaimer / privacy / about us & contacts