Chilling Effects
Home Weather Reports Report Receiving a Cease and Desist Notice Search the Database Topics
Sending
Topic HomeFAQsMonitoring the legal climate for Internet activity
Stanford Center for Internet & Society
 Chilling Effects Clearinghouse > John Doe Anonymity > Notices > Re: Demand for Immediate Take-Down: Notice of Infringing Activity (NoticeID 1319, http://chillingeffects.org/N/1319) Location: https://www.chillingeffects.org/johndoe/notice.cgi?NoticeID=1319

September 20, 2007

 

Sender Information:
Microsoft Corporation
Sent by: [Private]
[Private]
Coudersport, PA, 16915 US, US

Recipient Information:
Adelphia Subscriber
[Private]
42303, USA


Sent via: Postal
Re: Re: Demand for Immediate Take-Down: Notice of Infringing Activity

Case No. 3341909

Dear Adelphia Communications Corporation:
Microsoft Corporation ("Microsoft") has received information that an individual has used the below-referenced IP address at the noted date and time to offer Microsofts key generator code, which can be used to produce the random alphanumeric keys that are needed to activate software upon installation, for both volume license and standard editions of several Microsoft products, including Windows XP Professional, Microsoft Office XP and Windows Server 2003.

1. Identification of copyrighted/procted works:
Computer program(s)
Key generator code for access to, and activation of:
Microsoft Windows Operating Systems
Microsoft Office Programs
Microsoft Visio
Copyright owner(s):
Microsoft Corporation

2. Infringing material or activity offered on the following IP address at the noted date and time:
[Private]
13 Jun 2004 16:21:1 EDT GMT -0400)
The above IP adress has been used to offer the key generator code, which circumvents the technical measures that control authorized access to Microsoft's copyrighted works and protect Microsoft's copyrights in those works.

3. Statement of authority:
I hereby certify under penalty of perjury that the information in this notice is accurate and that I am authorized to act on behalf of Microsoft, the owner of the copyright(s) in the work(s) listed above. I have a good faith belief that none of the materials or activities listed above have been authorized by Microsoft, its agents, or the law. Further, the key generator code constitutes an unlawful access device under 18 U.S.C. 1029 and the possession, transfer, distribution, or aiding and abetting of these actions constitutes a violation of the criminal laws of the U.S. We herby give notice of these activities to you and request that you take expeditious action to remove or disable access to the individual who has engaged in the conduct described above, and thereby prevent the unauthorized distribution of these cracks and product keys via your company's network. We appreciate your cooperation in this matter.

Please advise us reguarding what actions you take.
Yours sincerely,
[Private]

- - - - - - - - - - - - - - -

Infringement Detail:
Infringing Work: Key Generator
Filename: MS.Windows.And.Office.KeyGen.-.FASO.rar
First found: 13 Jun 2004 16:21:1 EDT (GMT -0400)
Last found: 13 Jun 2004 16:21:1 EDT (GMT -0400)
Filesize: 34k
IP Address: [Private]
IP Port: 4661
Network: eDonkey
Protocol: eDonkey

FAQ: Questions and Answers

[back to notice text]


Question: What are the DMCA's anti-circumvention provisions?

Answer: The Digital Millennium Copyright Act (DMCA) is the latest amendment to copyright law, which introduced a new category of copyright violations that prohibit the "circumvention" of technical locks and controls on the use of digital content and products. These anti-circumvention provisions put the force of law behind any technological systems used by copyright owners to control access to and copying of their digital works.

The DMCA contains four main provisions:

  1. a prohibition on circumventing access controls [1201(a)(1)(A)];
  2. an access control circumvention device ban (sometimes called the "trafficking" ban) [1201(a)(2)];
  3. a copyright protection circumvention device ban [1201(b)]; and,
  4. a prohibition on the removal of copyright management information (CMI) [1202(b)].

The first provision prohibits the act of circumventing technological protection systems, the second and third ban technological devices that facilitate the circumvention of access control or copy controls, and the fourth prohibits individuals from removing information about access and use devices and rules. The first three provisions are also distinguishable in that the first two provisions focus on technological protection systems that provide access control to the copyright owner, while the third provision prohibits circumvention of technological protections against unauthorized duplication and other potentially copyright infringing activities.


Topic maintained by Stanford Center for Internet & Society

Chilling Effects Clearinghouse - www.chillingeffects.org
Chilling Effects Clearinghouse page printed from: https://www.chillingeffects.org/johndoe/notice.cgi?NoticeID=1319
disclaimer / privacy / about us & contacts