Chilling Effects
Home Weather Reports Report Receiving a Cease and Desist Notice Search the Database Topics
Sending
Topic HomeFAQsMonitoring the legal climate for Internet activity
Chilling Effects
 Chilling Effects Clearinghouse > DMCA Safe Harbor > Notices > RIAA Sends C&D to University (NoticeID 709, http://chillingeffects.org/N/709) Location: https://www.chillingeffects.org/dmca512/notice.cgi?NoticeID=709

RIAA Sends C&D to University

April 07, 2003

 

Sender Information:
Anti-Piracy Unit, RIAA
Sent by: [Private]
[Private]
Washington, D.C., 20036, US

Recipient Information:
[Private]
University of Pittsburgh
Pittsburgh, PA, 15238, USA


Sent via: email
Re: Unauthorized Sound Recordings - Case ID xxxxxx

First, let me say that this e-mail was not sent to me directly. It was sent to someone at my university, who then forwarded it to me with instructions in accordance to university policy. I am the target of the C&D, not [private] or [private] (please do not disclose their names). Thank you.



From: [private]
To: [private]@pitt.edu
Date: April 25, 2003
Subject: Formal Notice of Copyright Infringement - Ticket #xxxxxx

Dear [private],
The University has received a formal complaint from the Recording Industry Association of America, Inc. (RIAA) that on April 6, 2003 a computer using the IP address assigned to you by Computing Services and Systems Development (CSSD), xxx.xx.xx.xx was involved in sharing files protected by copyright. The complaint describes the material that was being illegally distributed as Depeche Mode - The Dead of Night.mp3, Eurythmics - Sweet Dreams (Are Made of This).mp3, Fatboy Slim - Because We Can.mp3, Cake - Prolonging the Magic.jpg, (The Pixies) - [03] - Something Against You.mp3, the orb - back to mine - 10 - aphex twin - blue calx.mp3, Wu - Tang - Wu-tang Forever Disc 2 - 16 - The Closing.mp3, Guns n' Roses - 06 - Pretty Tied Up.mp3, 08 - Bob Dylan - Hurricane.mp3, 09 - Ray Charles - Hard Times No One Knows.mp3. The method by which the material was distributed was described as being a peer to peer application.

Distribution of files without permission of the copyright holder including, digital movies, games, software, and music is prohibited under federal and state law including the No Electronic Theft Act, the Digital Millennium Copyright Act ("DMCA"), and others. University policy also prohibits members of the University community from illegally sharing copyrighted materials on its network. The University may terminate access to its networks by repeat violators of the DMCA, other laws, or University policy.

It is important that you remove the material identified above from your computer (along with any other copyrighted material that you may be sharing) with in five business days of the date of this letterand contact the Technology Help Desk at [private] to indicate that you have done so. Failure to contact the Technology Help Desk within the required period will result in the automatic suspension of service to the network port assigned to you. Repeat violations may also result in legal action against you by the copyright holders and may result in criminal liability. When contacting the Help Desk, please reference the ticket number at the top of this notice.

CSSD recognizes that you may be unaware that copyright protected files are available to other users from your computer. Assistance with configuring file sharing software to avoid unintentionally sharing files with others or resolving problems with a computer that has been accessed by an unauthorized user is available from the ResNet program. Contact the Help Desk as directed above and indicate that assistance is needed. Please also contact the Help Desk if you have any questions about this notice.

If you believe you lawfully possessed or distributed the above-mentioned file(s), you are also entitled to submit a counter-notification under the DMCA. Please contact the Help Desk for instructions on filing a counter-notification.

===============================
[private]
Supervisor, Campus Computing Labs/ResNet
[private]
Pittsburgh, Pennsylvania 15260
[xxx-xxx-xxxx]
Fax: [xxx-xxx-xxxx]
E-mail: [private]@pitt.edu


-----Original Message-----
From: RIAA Anti-Piracy [mailto:antipiracy2@riaa.com]
Sent: Monday, April 07, 2003 3:57 PM
To: [private]
Subject: Unauthorized Sound Recordings - Case ID xxxxxx

VIA EMAIL

April 07, 2003

[private]
University of Pittsburgh
[private]
Pittsburgh, PA 15238 US


Re: Copyright infringement at IP address: xxx.xx.xx.xx on 6 Apr 2003 15:59:23 EDT (GMT -0400)

Dear [private]:

I am contacting you on behalf of the Recording Industry Association of America, Inc. (RIAA) and its member record companies. The RIAA is a trade association whose member companies create, manufacture, and distribute approximately ninety (90) percent of all legitimate sound recordings sold in the United States. Under penalty of perjury, we submit that the RIAA is authorized to act on behalf of its member companies in matters involving the infringement of their sound recordings, including enforcing their copyrights and common law rights on the Internet.

We believe a user on your network, using the above referenced IP address, is offering 3,898 files for download through a peer to peer application. Many of these files contain copyrighted sound recordings including recordings by such artists as Depeche Mode, Eurythmics, Fatboy Slim, Cake, and Guns n' Roses that are owned by our member companies. For your reference we have included a representative list of some of the infringing sound recordings being offered at the above IP address.

We have a good faith belief that the above-described activity is not authorized by the copyright owners, their agent, or the law. We are asking for your immediate assistance in stopping this unauthorized activity. Specifically, we request that you remove or disable access to the infringing sound files via your system.

In addition, we believe it is in everyone's interest for music consumers to be better educated about the subject of copyright law and music. In addition to taking steps to notify this network user about the illegal nature of this activity, we encourage you to refer him/her to the MUSIC Coalition's new website at www.musicunited.org. The site contains valuable information about what's legal and what's not when it comes to copying music.

You should understand that this letter constitutes notice to you that this network user may be liable for the infringing activity occurring on your network. In addition, under the Digital Millennium Copyright Act, if you ignore this notice, your institution may also be liable for any resulting infringement. This letter does not constitute a waiver of any right to recover damages incurred by virtue of any such unauthorized activities, and such rights as well as claims for other relief are expressly retained.

Thank you in advance for your prompt assistance in this matter. If you have any questions, please feel free to contact me via e-mail at antipiracy2@riaa.com, via telephone at (xxx) xxx-xxxx, or via mail at RIAA, [private], Washington, D.C., 20036. Please reference Case ID xxxxxx in any response or communication regarding this infringement.


Sincerely,

Anti-Piracy Unit
RIAA

Title: The Dead of Night
File Name: Depeche Mode - The Dead of Night.mp3
File Size: 4600895
Artist: Depeche Mode
Length: 4 minutes 48 seconds
Album:
Language:
Keyword:
Resolution:
Genre:
Quality: 128
Description:

Title: Sweet Dreams (Are Made of This
File Name: Eurythmics - Sweet Dreams (Are Made of This).mp3
File Size: 3447012
Artist: Eurythmics
Length: 3 minutes 35 seconds
Album:
Language:
Keyword:
Resolution:
Genre:
Quality: 128
Description:

Title: Because We Can
File Name: Fatboy Slim - Because We Can.mp3
File Size: 3318696
Artist: Fatboy Slim
Length: 3 minutes 27 seconds
Album:
Language:
Keyword:
Resolution:
Genre:
Quality: 128
Description:

Title:
File Name: Cake - Prolonging the Magic.jpg
File Size: 10511
Artist:
Length: 0 minutes 0 seconds
Album:
Language:
Keyword:
Resolution: 200
Genre:
Quality: 0
Description:

Title: Something Against You
File Name: (The Pixies) - [03] - Something Against You.mp3
File Size: 1721457
Artist: Pixies
Length: 1 minutes 48 seconds
Album: Surfer Rosa
Language:
Keyword:
Resolution:
Genre: Pop
Quality: 128
Description: , AG# 6080B76B

Title: Aphex Twin - Blue Calx
File Name: the orb - back to mine - 10 - aphex twin - blue calx.mp3
File Size: 9645895
Artist: The Orb
Length: 6 minutes 42 seconds
Album: Back To Mine
Language:
Keyword:
Resolution:
Genre: Electronic
Quality: 192
Description:

Title: The Closing
File Name: Wu - Tang - Wu-tang Forever Disc 2 - 16 - The Closing.mp3
File Size: 3801808
Artist: Wu - Tang
Length: 2 minutes 38 seconds
Album: Wu-tang Forever Disc 2
Language:
Keyword:
Resolution:
Genre: Rap
Quality: 192
Description:

Title: Pretty Tied Up
File Name: Guns n' Roses - 06 - Pretty Tied Up.mp3
File Size: 8112256
Artist: Guns n' Roses
Length: 5 minutes 38 seconds
Album: November Rain At The Tokyo Dome (Disc 1)
Language:
Keyword:
Resolution:
Genre: Andere
Quality: 192
Description:

Title: Hurricane
File Name: 08 - Bob Dylan - Hurricane.mp3
File Size: 8219876
Artist: Bob Dylan
Length: 8 minutes 34 seconds
Album:
Language:
Keyword:
Resolution:
Genre:
Quality: 128
Description:

Title: Hard Times No One Knows
File Name: 09 - Ray Charles - Hard Times No One Knows.mp3
File Size: 2808558
Artist: Ray Charles
Length: 2 minutes 56 seconds
Album:
Language:
Keyword:
Resolution:
Genre:
Quality: 128
Description:

FAQ: Questions and Answers

[back to notice text]


Question: How are the safe harbor provisions applied to educational institutions?

Answer: The safe harbor provisions make a special exception to educational institutions that qualify as service providers under section 512. [512(e)] While a corporation is responsible for the activities of its employees, faculty members or graduate student employees who are performing teaching or research functions are not considered a part of the institution itself for certain infringing activities so as to maintain the academic freedom of these institutions. [512(e)(1)]

The institution can therefore avoid liability for infringement even if the infringing individuals knew they were infringing, provided that:

  • the infringing activities did not involve the provision of access to materials required for a course within the previous three years [512(e)(1)(A)]
  • the institution has not received more than two notifications of alleged infringement by the faculty member or graduate student in the preceding three year period [512(e)(1)(B)]
  • the institution provides all users of its network or system with informational materials that describe and promote compliance with copyright law [512(e)(1)(C)]


[back to notice text]


Question: What are the DMCA Safe Harbor Provisions?

Answer: In 1998, Congress passed the On-Line Copyright Infringement Liability Limitation Act (OCILLA) in an effort to protect service providers on the Internet from liability for the activities of its users. Codified as section 512 of the Digital Millennium Copyright Act (DMCA), this new law exempts on-line service providers that meet the criteria set forth in the safe harbor provisions from claims of copyright infringement made against them that result from the conduct of their customers. These safe harbor provisions are designed to shelter service providers from the infringing activities of their customers. If a service provider qualifies for the safe harbor exemption, only the individual infringing customer are liable for monetary damages; the service provider's network through which they engaged in the alleged activities is not liable.


[back to notice text]


Question: What happens if an individual is found to repeatedly infringe?

Answer: The safe harbor provisions require the service provider to include in its copyright infringement policies a termination policy that results in individuals who repeatedly infringe copyrighted material being removed from the service provider networks. [512(i)(1)(A)] This termination policy must be made public in the terms of use that the service provider includes in its contracts or on its web site.


[back to notice text]


Question: What are the counter-notice and put-back procedures?

Answer: In order to ensure that copyright owners do not wrongly insist on the removal of materials that actually do not infringe their copyrights, the safe harbor provisions require service providers to notify the subscribers if their materials have been removed and to provide them with an opportunity to send a written notice to the service provider stating that the material has been wrongly removed. [512(g)] If a subscriber provides a proper "counter-notice" claiming that the material does not infringe copyrights, the service provider must then promptly notify the claiming party of the individual's objection. [512(g)(2)] If the copyright owner does not bring a lawsuit in district court within 14 days, the service provider is then required to restore the material to its location on its network. [512(g)(2)(C)]

A proper counter-notice must contain the following information:

  • The subscriber's name, address, phone number and physical or electronic signature [512(g)(3)(A)]
  • Identification of the material and its location before removal [512(g)(3)(B)]
  • A statement under penalty of perjury that the material was removed by mistake or misidentification [512(g)(3)(C)]
  • Subscriber consent to local federal court jurisdiction, or if overseas, to an appropriate judicial body. [512(g)(3)(D)]

If it is determined that the copyright holder misrepresented its claim regarding the infringing material, the copyright holder then becomes liable to the person harmed for any damages that resulted from the improper removal of the material. [512(f)]

See also How do I file a DMCA counter-notice?, and the counter-notification generator.


[back to notice text]


Question: What is copyright infringement? Are there any defenses?

Answer: Infringement occurs whenever someone who is not the copyright holder (or a licensee of the copyright holder) exercises one of the exclusive rights listed above.

The most common defense to an infringement claim is "fair use," a doctrine that allows people to use copyrighted material without permission in certain situations, such as quotations in a book review. To evaluate fair use of copyrighted material, the courts consider four factors:


  1. the purpose and character of the use
  2. the nature of the copyrighted work
  3. the amount and substantiality of copying, and
  4. the market effect.

(17 U.S.C. 107)

The most significant factor in this analysis is the fourth, effect on the market. If a copier's use supplants demand for the original work, then it will be very difficult for him or her to claim fair use. On the other hand, if the use does not compete with the original, for example because it is a parody, criticism, or news report, it is more likely to be permitted as "fair use."

Trademarks are generally subject to fair use in two situations: First, advertisers and other speakers are allowed to use a competitor's trademark when referring to that competitor's product ("nominative use"). Second, the law protects "fair comment," for instance, in parody.


[back to notice text]


Question: What kinds of things are copyrightable?

Answer: In order for material to be copyrightable, it must be original and must be in a fixed medium.

Only material that originated with the author can support a copyright. Items from the public domain which appear in a work, as well as work borrowed from others, cannot be the subject of an infringement claim. Also, certain stock material might not be copyrightable, such as footage that indicates a location like the standard shots of San Francisco in Star Trek IV: The Voyage Home. Also exempted are stock characters like the noisy punk rocker who gets the Vulcan death grip in Star Trek IV.

The requirement that works be in a fixed medium leaves out certain forms of expression, most notably choreography and oral performances such as speeches. For instance, if I perform a Klingon death wail in a local park, my performance is not copyrightable. However, if I film the performance, then the film is copyrightable.

Single words and short phrases are generally not protected by copyright, even when the name has been "coined" or newly-created by the mark owner. Logos that include original design elements can be protected under copyright or under trademark. Otherwise, words, phrases and titles may be protected only by trademark, however.


[back to notice text]


Question: Does a copyright owner have to specify the exact materials it alleges are infringing?

Answer: Proper notice under the safe harbor provisions requires the copyright owners to specifically identify the alleged infringing materials, or if the service provider is an "information location tool" such as a search engine, to specifically identify the links to the alleged infringing materials. [512(c)(3)(iii)], [512(d)(3)]. The provisions also require the copyright owners to identify the copyrighted work, or a representative list of the copyrighted works, that is claimed to be infringed. [512(c)(3)(A)(ii)]. Rather than simply sending a letter to the service provider that claims that infringing material exists on their system, these qualifications ensure that service providers are given a reasonable amount of information to locate the infringing materials and to effectively police their networks. [512(c)(3)(A)(iii)], [512(d)(3)].

However, in the recent case of ALS Scan, Inc. v. Remarq Communities, Inc., the court found that the copyright owner did not have to point out all of the infringing material, but only substantially all of the material. The relaxation of this specificity requirement shifts the burden of identifying the material to the service provider, raising the question of the extent to which a service provider must search through its system. OSP customers should note that this situation might encourage OSP's to err on the side of removing allegedly infringing material.


[back to notice text]


Question: What does a service provider have to do in order to qualify for safe harbor protection?

Answer: In addition to informing its customers of its policies (discussed above), a service provider must follow the proper notice and takedown procedures (discussed above) and also meet several other requirements in order to qualify for exemption under the safe harbor provisions.

In order to facilitate the notification process in cases of infringement, ISPs which allow users to store information on their networks, such as a web hosting service, must designate an agent that will receive the notices from copyright owners that its network contains material which infringes their intellectual property rights. The service provider must then notify the Copyright Office of the agent's name and address and make that information publicly available on its web site. [512(c)(2)]

Finally, the service provider must not have knowledge that the material or activity is infringing or of the fact that the infringing material exists on its network. [512(c)(1)(A)], [512(d)(1)(A)]. If it does discover such material before being contacted by the copyright owners, it is instructed to remove, or disable access to, the material itself. [512(c)(1)(A)(iii)], [512(d)(1)(C)]. The service provider must not gain any financial benefit that is attributable to the infringing material. [512(c)(1)(B)], [512(d)(2)].


[back to notice text]


Question: What are the notice and takedown procedures for web sites?

Answer: In order to have an allegedly infringing web site removed from a service provider's network, or to have access to an allegedly infringing website disabled, the copyright owner must provide notice to the service provider with the following information:

  • The name, address, and electronic signature of the complaining party [512(c)(3)(A)(i)]
  • The infringing materials and their Internet location [512(c)(3)(A)(ii-iii)], or if the service provider is an "information location tool" such as a search engine, the reference or link to the infringing materials [512(d)(3)].
  • Sufficient information to identify the copyrighted works [512(c)(3)(A)(iv)].
  • A statement by the owner that it has a good faith belief that there is no legal basis for the use of the materials complained of [512(c)(3)(A)(v)].
  • A statement of the accuracy of the notice and, under penalty of perjury, that the complaining party is authorized to act on the behalf of the owner [512(c)(3)(A)(vi)].

Once notice is given to the service provider, or in circumstances where the service provider discovers the infringing material itself, it is required to expeditiously remove, or disable access to, the material. The safe harbor provisions do not require the service provider to notify the individual responsible for the allegedly infringing material before it has been removed, but they do require notification after the material is removed.


[back to notice text]


Question: If a service provider qualifies for protection under one of the DMCA section 512 safe harbors, does this preclude the service provider from protection under other 512 safe harbors?

Answer: Whether a service provider is entitled to protection under any one of subsections 512(a) - 512(d) will be based solely on the criteria in that subsection and will not affect a determination of whether that service provider qualifies for limitations on liability under any other subsection 512(a) - (d) [512(n)].


[back to notice text]


Question: What is the significance of Section 512(a) of the DMCA to service providers?

Answer: If a service provider falls within the requirements of subsection 512(a), then it will not be liable for monetary, injunctive, or other equitable relief. Specifically, a service provider will not be liable for copyright infringement by reason of (1) the service provider


Topic maintained by Chilling Effects

Chilling Effects Clearinghouse - www.chillingeffects.org
Chilling Effects Clearinghouse page printed from: https://www.chillingeffects.org/dmca512/notice.cgi?NoticeID=709
disclaimer / privacy / about us & contacts