| |||||||||||||||||||||
| Chilling Effects Clearinghouse > DMCA Safe Harbor > Notices > Notice to Google re "Vivian's Vow" (NoticeID 273, http://chillingeffects.org/N/273) | Location: https://www.chillingeffects.org/dmca512/notice.cgi?NoticeID=273 |
March 15, 2002
|
Sender Information: |
Recipient Information:
[Private]
Google, Inc.
Mountain View, CA, 94043
Sent via: email
Re: Notification of copyright infringement
Dear Sir or Madam, I have been retained as counsel by [private] in connection with a copyright infringement claim she has against Google. My client, [private], notified you in a previous communication dated Tuesday, February 26, 2002, about a link on your search engine to an unauthorized copy of a work, "Vivian's Vow", in which she owns the copyright. This notification provided you with actual knowledge that you are facilitating copyright infringement by maintaining links to the infringing material. Unfortunately, you are yet to remove the links to the infringing work from your system. Title II of the DMCA is clear in requiring that upon acquiring actual knowledge of a link to infringing material, an OSP must act "expeditiously to remove or block access to the material" in order to avoid liability for copyright infringement. I must emphasize that this is not an attempt to censor information, this is a legitimate demand by the copyright owner to cease direct infringing activity on Google's part for an infringing cache of the work located at [http://www.google.com/search?q=cache:5ZlWNsUUdfQC:www.cow.net/cows/sara.txt+sara+glover&hl=en&ie=ISO-8859-1] as well as to end contributory liability by removing Google's index reference [the first entry for http://www.google.com/search?hl=en&ie=ISO-8859-1&oe=ISO-8859-1&q=sara+glover] to the offending text. It is a completely unacceptable response that it would involve some effort on your part to comply with federal copyright law and international copyright treaties. The safe harbor rules of the DMCA do not contemplate a circumstance in which a service provider, having received specific notification that it is facilitating an ongoing infringement of copyright, may refuse to correct its infringing acts because of the technical or administrative complexity of so doing. If it is a complicated thing to do, I respectfully suggest that you revamp and reprioritize your technical and administrative procedures to make copyright compliance easier to accomplish. I must warn you that these continuing references to the infringing material create irreparable damage to my client and that any further delay in removing the offending references will be actionable for damages for willful infringement of copyright as well as invasion of privacy and infliction of emotional distress. My client reserves all rights to further action for your aforementioned infringing acts and omissions. Please provide me with notification of your compliance with this request as soon as you have removed the link and cache. Sincerely, [private] ----------------------------------------------------------------
Entertainment & Media Counselors, LLC
www.emcmatrix.com
www.musicindustrylaw.com
|
Question: What is copyright infringement? Are there any defenses? Answer: Infringement occurs whenever someone who is not the copyright holder (or a licensee of the copyright holder) exercises one of the exclusive rights listed above. The most common defense to an infringement claim is "fair use," a doctrine that allows people to use copyrighted material without permission in certain situations, such as quotations in a book review. To evaluate fair use of copyrighted material, the courts consider four factors:
The most significant factor in this analysis is the fourth, effect on the market. If a copier's use supplants demand for the original work, then it will be very difficult for him or her to claim fair use. On the other hand, if the use does not compete with the original, for example because it is a parody, criticism, or news report, it is more likely to be permitted as "fair use." Trademarks are generally subject to fair use in two situations: First, advertisers and other speakers are allowed to use a competitor's trademark when referring to that competitor's product ("nominative use"). Second, the law protects "fair comment," for instance, in parody. Question: What kinds of things are copyrightable? Answer: In order for material to be copyrightable, it must be original and must be in a fixed medium. Only material that originated with the author can support a copyright. Items from the public domain which appear in a work, as well as work borrowed from others, cannot be the subject of an infringement claim. Also, certain stock material might not be copyrightable, such as footage that indicates a location like the standard shots of San Francisco in Star Trek IV: The Voyage Home. Also exempted are stock characters like the noisy punk rocker who gets the Vulcan death grip in Star Trek IV. The requirement that works be in a fixed medium leaves out certain forms of expression, most notably choreography and oral performances such as speeches. For instance, if I perform a Klingon death wail in a local park, my performance is not copyrightable. However, if I film the performance, then the film is copyrightable. Single words and short phrases are generally not protected by copyright, even when the name has been "coined" or newly-created by the mark owner. Logos that include original design elements can be protected under copyright or under trademark. Otherwise, words, phrases and titles may be protected only by trademark, however. Question: What are the notice and takedown procedures for web sites?
Answer: In order to have an allegedly infringing web site removed from a service provider's network, or to have access to an allegedly infringing website disabled, the copyright owner must provide notice to the service provider with the following information:
Once notice is given to the service provider, or in circumstances where the service provider discovers the infringing material itself, it is required to expeditiously remove, or disable access to, the material. The safe harbor provisions do not require the service provider to notify the individual responsible for the allegedly infringing material before it has been removed, but they do require notification after the material is removed. Question: What is contributory infringement? Answer: The other form of indirect infringement, contributory infringement, requires (1) knowledge of the infringing activity and (2) a material contribution -- actual assistance or inducement -- to the alleged piracy. Posting access codes from authorized copies of software, serial numbers, or other tools to assist in accessing such software may subject you to liability. Providing a forum for uploading and downloading any copyrighted file or cracker utility may also be contributory infringement. Even though you may not actually make software directly available on your site, providing assistance (or supporting a forum in which others may provide assistance) in locating unauthorized copies of software, links to download sites, server space, or support for sites that do the above may contributorily infringe. Question: What defines a service provider under Section 512 of the Digital Millennium Copyright Act (DMCA)?
Answer: A service provider is defined as "an entity offering transmission, routing, or providing connections for digital online communications, between or among points specified by a user, of material of the user's choosing, without modification to the content of the material as sent or received" or "a provider of online services or network access, or the operator of facilities thereof." [512(k)(1)(A-B)] This broad definition includes network services companies such as Internet service providers (ISPs), search engines, bulletin board system operators, and even auction web sites. In A&M Records, Inc. v. Napster Inc., the court refused to extend the safe harbor provisions to the Napster software program and service, leaving open the question of whether peer-to-peer networks also qualify for safe harbor protection under Section 512. There are four major categories of network systems offered by service providers that qualify for protection under the safe harbor provisions:
Question: What are the DMCA Safe Harbor Provisions?
Answer: In 1998, Congress passed the On-Line Copyright Infringement Liability Limitation Act (OCILLA) in an effort to protect service providers on the Internet from liability for the activities of its users. Codified as section 512 of the Digital Millennium Copyright Act (DMCA), this new law exempts on-line service providers that meet the criteria set forth in the safe harbor provisions from claims of copyright infringement made against them that result from the conduct of their customers. These safe harbor provisions are designed to shelter service providers from the infringing activities of their customers. If a service provider qualifies for the safe harbor exemption, only the individual infringing customer are liable for monetary damages; the service provider's network through which they engaged in the alleged activities is not liable. Question: What rights are protected by copyright law? Answer: The purpose of copyright law is to encourage creative work by granting a temporary monopoly in an author's original creations. This monopoly takes the form of six rights in areas where the author retains exclusive control. These rights are: (1) the right of reproduction (i.e., copying), The law of copyright protects the first two rights in both private and public contexts, whereas an author can only restrict the last four rights in the public sphere. Claims of infringement must show that the defendant exercised one of these rights. For example, if I create unauthorized videotape copies of Star Trek II: The Wrath of Khan and distribute them to strangers on the street, then I have infringed both the copyright holder's rights of reproduction and distribution. If I merely re-enact The Wrath of Khan for my family in my home, then I have not infringed on the copyright. Names, ideas and facts are not protected by copyright. Trademark law, in contrast, is designed to protect consumers from confusion as to the source of goods (as well as to protect the trademark owner's market). To this end, the law gives the owner of a registered trademark the right to use the mark in commerce without confusion. If someone introduces a trademark into the market that is likely to cause confusion, then the newer mark infringes on the older one. The laws of trademark infringement and dilution protect against this likelihood of confusion. Trademark protects names, images and short phrases. Infringement protects against confusion about the origin of goods. The plaintiff in an infringement suit must show that defendant's use of the mark is likely to cause such a confusion. For instance, if I were an unscrupulous manufacturer, I might attempt to capitalize on the fame of Star Trek by creating a line of 'Spock Activewear.' If consumers could reasonably believe that my activewear was produced or endorsed by the owners of the Spock trademark, then I would be liable for infringement. The law of trademark dilution protects against confusion concerning the character of a registered trademark. Suppose I created a semi-automatic assault rifle and marketed it as 'The Lt. Uhura 5000.' Even if consumers could not reasonably believe that the Star Trek trademark holders produced this firearm, the trademark holders could claim that my use of their mark harmed the family-oriented character of their mark. I would be liable for dilution. Question: How can a webmaster directly infringe copyright? Answer: Courts are split on whether an operator of a web site that simply acts as a conduit for others to share information may be found directly liable for copyright infringement. Though technically, even a passive operator violates the copyright holder's exclusive right to distribute and display their materials, most courts have required an affirmative step by the operator to further the infringement. Thus creating and maintaining a system where others may post pirated software and information that helps others obtain pirated software would not generally be sufficient whereby actively participating and encouraging the piracy would be. Posting any tools which help users circumvent copy protection ("cracker utilities") is also prohibited by Question: What is vicarious liability? Answer: Vicarious liability, a form of indirect copyright infringement, is found where an operator has (1) the right and ability to control users and (2) a direct financial benefit from allowing their acts of piracy. User agreements or Acceptable Use Policies may be evidence of an operator's authority over users. The financial benefit may include a subscription fee, advertising revenues, or even a bartered exchange for other copyrighted. Under the doctrine of vicarious liability, you may be found liable even if you do not have specific knowledge of infringing acts occurring on your site. Question: What are the DMCA Safe Harbor Provisions?
Answer: In 1998, Congress passed the On-Line Copyright Infringement Liability Limitation Act (OCILLA) in an effort to protect service providers on the Internet from liability for the activities of its users. Codified as section 512 of the Digital Millennium Copyright Act (DMCA), this new law exempts on-line service providers that meet the criteria set forth in the safe harbor provisions from claims of copyright infringement made against them that result from the conduct of their customers. These safe harbor provisions are designed to shelter service providers from the infringing activities of their customers. If a service provider qualifies for the safe harbor exemption, only the individual infringing customer are liable for monetary damages; the service provider's network through which they engaged in the alleged activities is not liable. Question: Where can I find the text of the U.S. Copyright Act? Answer: The federal Copyright Act may be found at http://www.loc.gov/copyright/title17/. Question: Does a copyright owner have to specify the exact materials it alleges are infringing?
Answer: Proper notice under the safe harbor provisions requires the copyright owners to specifically identify the alleged infringing materials, or if the service provider is an "information location tool" such as a search engine, to specifically identify the links to the alleged infringing materials. [512(c)(3)(iii)], [512(d)(3)]. The provisions also require the copyright owners to identify the copyrighted work, or a representative list of the copyrighted works, that is claimed to be infringed. [512(c)(3)(A)(ii)]. Rather than simply sending a letter to the service provider that claims that infringing material exists on their system, these qualifications ensure that service providers are given a reasonable amount of information to locate the infringing materials and to effectively police their networks. [512(c)(3)(A)(iii)], [512(d)(3)]. However, in the recent case of ALS Scan, Inc. v. Remarq Communities, Inc., the court found that the copyright owner did not have to point out all of the infringing material, but only substantially all of the material. The relaxation of this specificity requirement shifts the burden of identifying the material to the service provider, raising the question of the extent to which a service provider must search through its system. OSP customers should note that this situation might encourage OSP's to err on the side of removing allegedly infringing material. Question: What happens if an individual is found to repeatedly infringe?
Answer: The safe harbor provisions require the service provider to include in its copyright infringement policies a termination policy that results in individuals who repeatedly infringe copyrighted material being removed from the service provider networks. [512(i)(1)(A)] This termination policy must be made public in the terms of use that the service provider includes in its contracts or on its web site. Question: Why are copyright holders concerned about piracy? Answer: Free speech is protected by the U.S. Constitution but so are property rights. Copyright law provides incentives for creating. One of the incentives for creating software, music, literature and other works is being able to reap the financial benefits as the creator. Illegitimate distribution of copies may prevent the copyright holder from benefiting from the sale of legitimate copies of the product. The theory is that significantly fewer people would buy copies from the copyright holder if other copies were available cheaper or for free. |
|
|