| |||||||||||||||||||||
| Chilling Effects Clearinghouse > DMCA Safe Harbor > Notices > Microsoft Complains of Product Key in Google Cache (NoticeID 586, http://chillingeffects.org/N/586) | Location: https://www.chillingeffects.org/dmca512/notice.cgi?NoticeID=586 |
March 12, 2003
|
Sender Information: |
Recipient Information:
[Private]
Google, Inc.
Sent via: fax
Re: Notice of Infringing Activity - Ref. [private]
[Private], Redmond, WA 98052, United States of America E-mail: [Private] Fax To: User Support, DMCA complaints, Google, Inc. X Urgent For Review Please Comment X Please Reply Please Recycle Dear Madam or Sir, As per your email message dated March 11, 2003, please find enclosed a signed and duly We appreciate your cooperation and look forward to hearing from you. [Private] for Microsoft Corporation E-mail: [Private] VIA FAX: Demand for Immediate Take-Down: Notice of Infringing Activity URL: CASE #: [private] 11 March 2003 Dear Sir or Madam, Microsoft has received information that the domain listed above, which appears to be on 1. Identification of copyrighted works: Computer program: Copyright owner: 2. Infringing material or activity found at the following location: The above location is offering 'Cracks' or 'Product Keys', intended to circumvent 3. Statement of authority: I hereby certify under penalty of perjury that the information in this notice is accurate We hereby give notice of these activities to you and request that you take expeditious Yours sincerely, [Private] for Microsoft Corporation E-mail: [Private]
From: [Private]
Fax: [Private]
Pages: 3
Re: Notice of Infringing Activity - Ref. [private]
Date: 12/03/2003
completed copy of the Takedown Notice.
Yours sincerely,
Internet Investigator
[Private]
Redmond, WA 98052
United States of America
http://www.google.com/search?q=cache:hSq3VI5CmrwC:www.ibp.ru/ftp/Office%252
02000/PFILES/COMMON/SYSTEM/MAPI/1049/95/+omi9.dll&hl=cn&ie=UTF-8
servers under your control, is offering unlicensed copies of, or is engaged in other
unauthorized activities relating to copyrighted computer programs published by
Microsoft.
Office 2000 Premium
Microsoft Corporation
http://www.google.com/search?q=cache:hS3VI5CmrwC:www.ibp.ru/ftp/Office%252
02000/PFILES/COMMON/SYSTEM/MAPI/1049/95/+omi9.dll&hl=en&ie=UTF-8
technical measures that control access to Microsoft's copyrighted works and that protect
Microsoft's copyrights in those works.
and that I am authorized to act on behalf of Microsoft, the owner of the copyright(s) in
the work(s) identified above. I have a good faith belief that none of the materials or
activities listed above have been authorized by Microsoft, its agents, or the law.
action to remove or disable access to the matetial described above, and thereby prevent
the unauthorized distribution of these cracks and product keys via your company's network.
We appreciate your cooperation in this matter. Please advise us regarding what actions
you take.
Internet Investigator
[Private]
Redmond, WA 98052
United States of America
|
Question: Does a cease and desist letter recipient have a duty to remove materials alleged to infringe copyright? Answer: The cease and desist letter gives its recipient ("you") notice that someone is claiming something you've done or something on your site infringes a copyright. If the materials that are the subject of the notice are in fact infringing, then you do have a duty to remove them, although there may be statutory provisions (DMCA Safe Harbor) that protect you from a lawsuit if the materials were posted by someone else. You may have to give the poster notice of the complaint. If you do not believe that the materials are infringing, or if you believe that you are making fair use of the materials, you may choose to take the risk of not removing the materials, but a lawsuit might follow in which the complainer tries to prove they they are right and you are wrong. If the accuser obtains a court order, then you must take down the materials. Question: What is the Digital Millennium Copyright Act? Answer: The DMCA, as it is known, has a number of different parts. One part is the anticircumvention provisions, which make it illegal to "circumvent" a technological measure protecting access to or copying of a copyrighted work (see Anticircumvention (DMCA)). Another part gives web hosts and Internet service providers a "safe harbor" from copyright infringement claims if they implement certain notice and takedown procedures (see DMCA Safe Harbor). Question: What are the DMCA Safe Harbor Provisions?
Answer: In 1998, Congress passed the On-Line Copyright Infringement Liability Limitation Act (OCILLA) in an effort to protect service providers on the Internet from liability for the activities of its users. Codified as section 512 of the Digital Millennium Copyright Act (DMCA), this new law exempts on-line service providers that meet the criteria set forth in the safe harbor provisions from claims of copyright infringement made against them that result from the conduct of their customers. These safe harbor provisions are designed to shelter service providers from the infringing activities of their customers. If a service provider qualifies for the safe harbor exemption, only the individual infringing customer are liable for monetary damages; the service provider's network through which they engaged in the alleged activities is not liable. Question: What defines a service provider under Section 512 of the Digital Millennium Copyright Act (DMCA)?
Answer: A service provider is defined as "an entity offering transmission, routing, or providing connections for digital online communications, between or among points specified by a user, of material of the user's choosing, without modification to the content of the material as sent or received" or "a provider of online services or network access, or the operator of facilities thereof." [512(k)(1)(A-B)] This broad definition includes network services companies such as Internet service providers (ISPs), search engines, bulletin board system operators, and even auction web sites. In A&M Records, Inc. v. Napster Inc., the court refused to extend the safe harbor provisions to the Napster software program and service, leaving open the question of whether peer-to-peer networks also qualify for safe harbor protection under Section 512. There are four major categories of network systems offered by service providers that qualify for protection under the safe harbor provisions:
Question: What are the notice and takedown procedures for web sites?
Answer: In order to have an allegedly infringing web site removed from a service provider's network, or to have access to an allegedly infringing website disabled, the copyright owner must provide notice to the service provider with the following information:
Once notice is given to the service provider, or in circumstances where the service provider discovers the infringing material itself, it is required to expeditiously remove, or disable access to, the material. The safe harbor provisions do not require the service provider to notify the individual responsible for the allegedly infringing material before it has been removed, but they do require notification after the material is removed. Question: Does a copyright owner have to specify the exact materials it alleges are infringing?
Answer: Proper notice under the safe harbor provisions requires the copyright owners to specifically identify the alleged infringing materials, or if the service provider is an "information location tool" such as a search engine, to specifically identify the links to the alleged infringing materials. [512(c)(3)(iii)], [512(d)(3)]. The provisions also require the copyright owners to identify the copyrighted work, or a representative list of the copyrighted works, that is claimed to be infringed. [512(c)(3)(A)(ii)]. Rather than simply sending a letter to the service provider that claims that infringing material exists on their system, these qualifications ensure that service providers are given a reasonable amount of information to locate the infringing materials and to effectively police their networks. [512(c)(3)(A)(iii)], [512(d)(3)]. However, in the recent case of ALS Scan, Inc. v. Remarq Communities, Inc., the court found that the copyright owner did not have to point out all of the infringing material, but only substantially all of the material. The relaxation of this specificity requirement shifts the burden of identifying the material to the service provider, raising the question of the extent to which a service provider must search through its system. OSP customers should note that this situation might encourage OSP's to err on the side of removing allegedly infringing material. Question: What does it mean to distribute circumvention tools?
Answer: Section 1201(a)(2) defines distribution as the "manufacture, import, offer to the public, provide, or otherwise traffic" of circumvention tools. This definition can be interpreted extremely broadly as evident in the court's analysis in the DVD encryption Universal v. Corley case. In its decision, the court considered not only making the source code of a program for free a type of distribution, but also found that merely linking to a web site containing illegal tools can constitute "trafficking." Question: Is all copying piracy?
Answer: No. Copyright gives the owner exclusive rights to reproduce, adapt, publicly distribute, perform and display their work. Nonetheless, the law allows "fair use" of copyrighted material. Fair use permits, in certain circumstances, the use or copying of all or a portion of a copyrighted work without the permission of the owner. Copyrighted works may be used for purposes such as criticism, comment, news reporting, teaching, scholarship, or research. To decide whether a use is "fair use" or not, courts consider, in part: Courts balance these factors, placing an emphasis on the fourth, however rulings have been unpredictable. Parody may be protected by fair use where the user is actually making a comment on or criticism of the copyrighted material, even if a profit is made from the use. Still, distributing copyrighted software will rarely be fair use because people will use those copies instead of buying the software from the legitimate vendor. Question: What is copyright infringement? Are there any defenses? Answer: Infringement occurs whenever someone who is not the copyright holder (or a licensee of the copyright holder) exercises one of the exclusive rights listed above. The most common defense to an infringement claim is "fair use," a doctrine that allows people to use copyrighted material without permission in certain situations, such as quotations in a book review. To evaluate fair use of copyrighted material, the courts consider four factors:
The most significant factor in this analysis is the fourth, effect on the market. If a copier's use supplants demand for the original work, then it will be very difficult for him or her to claim fair use. On the other hand, if the use does not compete with the original, for example because it is a parody, criticism, or news report, it is more likely to be permitted as "fair use." Trademarks are generally subject to fair use in two situations: First, advertisers and other speakers are allowed to use a competitor's trademark when referring to that competitor's product ("nominative use"). Second, the law protects "fair comment," for instance, in parody. Question: What kinds of things are copyrightable? Answer: In order for material to be copyrightable, it must be original and must be in a fixed medium. Only material that originated with the author can support a copyright. Items from the public domain which appear in a work, as well as work borrowed from others, cannot be the subject of an infringement claim. Also, certain stock material might not be copyrightable, such as footage that indicates a location like the standard shots of San Francisco in Star Trek IV: The Voyage Home. Also exempted are stock characters like the noisy punk rocker who gets the Vulcan death grip in Star Trek IV. The requirement that works be in a fixed medium leaves out certain forms of expression, most notably choreography and oral performances such as speeches. For instance, if I perform a Klingon death wail in a local park, my performance is not copyrightable. However, if I film the performance, then the film is copyrightable. Single words and short phrases are generally not protected by copyright, even when the name has been "coined" or newly-created by the mark owner. Logos that include original design elements can be protected under copyright or under trademark. Otherwise, words, phrases and titles may be protected only by trademark, however. Question: What does it mean to distribute circumvention tools?
Answer: Section 1201(a)(2) defines distribution as the "manufacture, import, offer to the public, provide, or otherwise traffic" of circumvention tools. This definition can be interpreted extremely broadly as evident in the court's analysis in the DVD encryption Universal v. Corley case. In its decision, the court considered not only making the source code of a program for free a type of distribution, but also found that merely linking to a web site containing illegal tools can constitute "trafficking." Question: What does circumvention mean?
Answer: Circumvention, according to Section 1201(a)(3)(A), means "to descramble a scrambled work, to decrypt an encrypted work, or otherwise to avoid, bypass, remove, deactivate, or impair a technological measure, without the authority of the copyright owner." While the full scope of activities and practices that would fall under this definition has not yet been examined by the courts, any act of undoing a "lock" or "block" in a digital system may well be considered circumvention. Question: What are technological protection measures?
Answer: Technological protection systems are already in place in DVDs, eBooks, video game consoles, robotic toys, Internet streaming, and password-protected sections of web sites. The fact that a digital protection may be really weak and easy to circumvent has not prevented courts from applying this law to punish those who bypass them. The DMCA defines an access control mechanism as a measure which "in the ordinary course of its operation, requires the application of information, or a process or a treatment, with the authority of the copyright owner, to gain access to the work." [1201(a)(3)(B)] An access control is a technology, like a password or encryption that controls who or what is able to interact with the copyrighted work. It is a violation of the DMCA to circumvent access controls, but it is also a violation to provide tools to others that circumvent access controls (including selling, distributing free of charge, and possibly even linking to a site with such technology Question: Is there really a difference between access controls and copy controls?
Answer: While there is a difference in the types of activities controlled by these technological protection measures, some copyright owners try to merge access and use controls in the implementation of these systems. For example, in trying to implement a "pay-per-use" business model, some copyright owners use a single persistent control system that charge separately for the different uses of a work even after paying to access a work. Question: What rights are protected by copyright law? Answer: The purpose of copyright law is to encourage creative work by granting a temporary monopoly in an author's original creations. This monopoly takes the form of six rights in areas where the author retains exclusive control. These rights are: (1) the right of reproduction (i.e., copying), The law of copyright protects the first two rights in both private and public contexts, whereas an author can only restrict the last four rights in the public sphere. Claims of infringement must show that the defendant exercised one of these rights. For example, if I create unauthorized videotape copies of Star Trek II: The Wrath of Khan and distribute them to strangers on the street, then I have infringed both the copyright holder's rights of reproduction and distribution. If I merely re-enact The Wrath of Khan for my family in my home, then I have not infringed on the copyright. Names, ideas and facts are not protected by copyright. Trademark law, in contrast, is designed to protect consumers from confusion as to the source of goods (as well as to protect the trademark owner's market). To this end, the law gives the owner of a registered trademark the right to use the mark in commerce without confusion. If someone introduces a trademark into the market that is likely to cause confusion, then the newer mark infringes on the older one. The laws of trademark infringement and dilution protect against this likelihood of confusion. Trademark protects names, images and short phrases. Infringement protects against confusion about the origin of goods. The plaintiff in an infringement suit must show that defendant's use of the mark is likely to cause such a confusion. For instance, if I were an unscrupulous manufacturer, I might attempt to capitalize on the fame of Star Trek by creating a line of 'Spock Activewear.' If consumers could reasonably believe that my activewear was produced or endorsed by the owners of the Spock trademark, then I would be liable for infringement. The law of trademark dilution protects against confusion concerning the character of a registered trademark. Suppose I created a semi-automatic assault rifle and marketed it as 'The Lt. Uhura 5000.' Even if consumers could not reasonably believe that the Star Trek trademark holders produced this firearm, the trademark holders could claim that my use of their mark harmed the family-oriented character of their mark. I would be liable for dilution. |
|
|