Chilling Effects
Home Weather Reports Report Receiving a Cease and Desist Notice Search the Database Topics
Sending
Topic HomeFAQsMonitoring the legal climate for Internet activity
Electronic Frontier Foundation
 Chilling Effects Clearinghouse > Linking > Notices > Perfect 10 Says Links Earn a Zero (NoticeID 243, http://chillingeffects.org/N/243) Location: https://www.chillingeffects.org/linking/notice.cgi?NoticeID=243

Perfect 10 Says Links Earn a Zero

March 25, 2002

 

Sender Information:
Perfect 10 Magazine
Sent by: [Private]
[Private]

Recipient Information:
[Private]
luclinks.com
TO, 10044, ITALY


Sent via: email
Re: Copyright Infringement - Warning, you may be sued unless you comply

Dear Sirs,

It has come to our attention that luclinks.com is linking to thousands
of stolen images, including hundreds of stolen images owned by Perfect
10 Magazine.

Please be advised that Perfect 10 Magazine has invested in excess of
$25,000,000 for our images. We pay for our images and cannot compete
against entities that steal theirs.

In particular, Luclinks.com is linking to sites advertising images of
the following Perfect 10 models:

Nathalie De Nostuejouis, Julia Schultz, Lynn Thomas, Lissa Tombasova,
Inna Schevchenko, Caroline Stark, Adele Stephens, Irina Voronina,
Veronika Zemanova, Monica Zsibrita, Petra Havlasova, Rache Ter Horst,
Alexandria Karlsen, and Lucie Kotalova, among others.

This email is also being sent to ISPs that are hosting one or more
misappropriating websites on luclinks webpages, specifically
free-adult-hosting.net and sexplanets.com.

If your companies continue to link and/or host sites with
misappropriated content, we will sue you. If you care about preserving
the rights of copyright holders, you need to ask the celebrity sites
that you are linking to and/or hosting to provide licenses or other
proof that they own the rights to their images. Also please note that
the DMCA does not shield ISP with actual knowledge that they are hosting
sites with infringing content.

Thank you,


[Private]
Owner, Perfect 10 Magazine

FAQ: Questions and Answers

[back to notice text]


Question: What is a hyperlink?

Answer: Unless you typed the URL directly into your web browser, you probably followed a hyperlink to get to this page. A hyperlink is a location reference that the web browser interprets, often by underlining the text in blue, to "link" to another information resource when clicked. In HTML (HyperText Markup Language, the code used to write web pages), a hyperlink looks like this: link


[back to notice text]


Question: Can search engines be liable for copyright infringement by providing hyperlinks to search results?

Answer: Some Internet search engines have been getting "takedown" requests under the Digital Millennium Copyright Act, Section 512 (see DMCA Safe Harbor for more information). The DMCA provides a safe harbor to information location tools that comply with takedown notices, but it is not settled whether they would be liable for copyright infringement if they did not use the safe harbor. Arguably, computer-generated pages of links do not materially facilitate infringing activity or put their hosts on notice of copyright infringements.


[back to notice text]


Question: What is copyright infringement? Are there any defenses?

Answer: Infringement occurs whenever someone who is not the copyright holder (or a licensee of the copyright holder) exercises one of the exclusive rights listed above.

The most common defense to an infringement claim is "fair use," a doctrine that allows people to use copyrighted material without permission in certain situations, such as quotations in a book review. To evaluate fair use of copyrighted material, the courts consider four factors:


  1. the purpose and character of the use
  2. the nature of the copyrighted work
  3. the amount and substantiality of copying, and
  4. the market effect.

(17 U.S.C. 107)

The most significant factor in this analysis is the fourth, effect on the market. If a copier's use supplants demand for the original work, then it will be very difficult for him or her to claim fair use. On the other hand, if the use does not compete with the original, for example because it is a parody, criticism, or news report, it is more likely to be permitted as "fair use."

Trademarks are generally subject to fair use in two situations: First, advertisers and other speakers are allowed to use a competitor's trademark when referring to that competitor's product ("nominative use"). Second, the law protects "fair comment," for instance, in parody.


[back to notice text]


Question: What are the DMCA Safe Harbor Provisions?

Answer: In 1998, Congress passed the On-Line Copyright Infringement Liability Limitation Act (OCILLA) in an effort to protect service providers on the Internet from liability for the activities of its users. Codified as section 512 of the Digital Millennium Copyright Act (DMCA), this new law exempts on-line service providers that meet the criteria set forth in the safe harbor provisions from claims of copyright infringement made against them that result from the conduct of their customers. These safe harbor provisions are designed to shelter service providers from the infringing activities of their customers. If a service provider qualifies for the safe harbor exemption, only the individual infringing customer are liable for monetary damages; the service provider's network through which they engaged in the alleged activities is not liable.


[back to notice text]


Question: What defines a service provider under Section 512 of the Digital Millennium Copyright Act (DMCA)?

Answer: A service provider is defined as "an entity offering transmission, routing, or providing connections for digital online communications, between or among points specified by a user, of material of the user's choosing, without modification to the content of the material as sent or received" or "a provider of online services or network access, or the operator of facilities thereof." [512(k)(1)(A-B)] This broad definition includes network services companies such as Internet service providers (ISPs), search engines, bulletin board system operators, and even auction web sites. In A&M Records, Inc. v. Napster Inc., the court refused to extend the safe harbor provisions to the Napster software program and service, leaving open the question of whether peer-to-peer networks also qualify for safe harbor protection under Section 512.

There are four major categories of network systems offered by service providers that qualify for protection under the safe harbor provisions:

  • Conduit Communications include the transmission and routing of information, such as an email or Internet service provider, which store the material only temporarily on their networks. [Sec. 512(a)]
  • System Caching refers to the temporary copies of data that are made by service providers in providing the various services that require such copying in order to transfer data. [Sec. 512(b)]
  • Storage Systems refers to services which allow users to store information on their networks, such as a web hosting service or a chat room. [Sec. 512(c)]
  • Information Location Tools refer to services such as search engines, directories, or pages of recommended web sites which provide links to the allegedly infringing material. [Sec. 512(d)]


[back to notice text]


Question: Does a copyright owner have to specify the exact materials it alleges are infringing?

Answer: Proper notice under the safe harbor provisions requires the copyright owners to specifically identify the alleged infringing materials, or if the service provider is an "information location tool" such as a search engine, to specifically identify the links to the alleged infringing materials. [512(c)(3)(iii)], [512(d)(3)]. The provisions also require the copyright owners to identify the copyrighted work, or a representative list of the copyrighted works, that is claimed to be infringed. [512(c)(3)(A)(ii)]. Rather than simply sending a letter to the service provider that claims that infringing material exists on their system, these qualifications ensure that service providers are given a reasonable amount of information to locate the infringing materials and to effectively police their networks. [512(c)(3)(A)(iii)], [512(d)(3)].

However, in the recent case of ALS Scan, Inc. v. Remarq Communities, Inc., the court found that the copyright owner did not have to point out all of the infringing material, but only substantially all of the material. The relaxation of this specificity requirement shifts the burden of identifying the material to the service provider, raising the question of the extent to which a service provider must search through its system. OSP customers should note that this situation might encourage OSP's to err on the side of removing allegedly infringing material.


[back to notice text]


Question: What is third-party liability, also known as "secondary liability"?

Answer: The concept of third party liability refers, as the name implies, to situations in which responsibility for harm can be placed on a party in addition to the one that actually caused the injury. The most common example comes from tort law: a customer in a grocery store drops a bottle of wine and another customer slips on the puddle and injures himself; he may bring an action for negligence against the customer who dropped the bottle and against the owner of the grocery store. Under the common law doctrine of third-party liability, a plaintiff must show not only that an injury actually occurred, but also (in most cases) that some sort of connection existed between the third party and the person who actually caused the injury.

As such the concept of third-party liability is often divided into two different types: contributory infringement and vicarious liability. Typically, contributory infringement exists when the third party either assists in the commission of the act which causes the injury, or simply induces the primary party to do so commit the act which caused the injury. (See What is contributory infringement?.) Vicarious liability often requires the third party to have exerted some form of control over the primary party


[back to notice text]


Question: I have an unsettling feeling in the pit of my stomach about the tone of the C&D I received. Does the tone of the c & d mean I am going to lose this dispute?

Answer: "Gorilla Chest Thumping" refers to the tone of most C&Ds: it?s nasty. The first thing to do is take a deep breath. The second thing to do is to acknowledge that the tone of the letter is a function of the letter writer?s perception that aggression is the best defense: do not take it personally. The third thing to do is ignore the tone and focus on the facts. You may eventually choose to respond aggressively yourself, but do not do so because your opponent has egged you into a useless game of whose gorilla is bigger. Take a tip from Ani Di Franco: "If you play their game, girl, you?re never gonna win." Face Up and Sing, Out of Range, Righteous Babe Records (1994).


[back to notice text]


Question: Does a service provider have to follow the safe harbor procedures?

Answer: No. An ISP may choose not to follow the DMCA takedown process, and do without the safe harbor. If it would not be liable under pre-DMCA copyright law (for example, because it is not contributorily or vicariously liable, or because there is no underlying copyright infringement), it can still raise those same defenses if it is sued.


[back to notice text]


Question: What is the Digital Millennium Copyright Act?

Answer: The DMCA, as it is known, has a number of different parts. One part is the anticircumvention provisions, which make it illegal to "circumvent" a technological measure protecting access to or copying of a copyrighted work (see Anticircumvention (DMCA)). Another part gives web hosts and Internet service providers a "safe harbor" from copyright infringement claims if they implement certain notice and takedown procedures (see DMCA Safe Harbor).


[back to notice text]


Question: What are the provisions of 17 U.S.C. Section 512(c)(3) & 512(d)(3)?

Answer: Section 512(c)(3) sets out the elements for notification under the DMCA. Subsection A (17 U.S.C. 512(c)(3)(A)) states that to be effective a notification must include: 1) a physical/electronic signature of a person authorized to act on behalf of the owner of the infringed right; 2) identification of the copyrighted works claimed to have been infringed; 3) identification of the material that is claimed to be infringing or to be the subject of infringing activity and that is to be removed; 4) information reasonably sufficient to permit the service provider to contact the complaining party (e.g., the address, telephone number, or email address); 5) a statement that the complaining party has a good faith belief that use of the material is not authorized by the copyright owner; and 6) a statement that information in the complaint is accurate and that the complaining party is authorized to act on behalf of the copyright owner. Subsection B (17 U.S.C. 512(c)(3)(B)) states that if the complaining party does not substantially comply with these requirements the notice will not serve as actual notice for the purpose of Section 512.

Section 512(d)(3), which applies to "information location tools" such as search engines and directories, incorporates the above requirements; however, instead of the identification of the allegedly infringing material, the notification must identify the reference or link to the material claimed to be infringing.


Topic maintained by Electronic Frontier Foundation

Chilling Effects Clearinghouse - www.chillingeffects.org
Chilling Effects Clearinghouse page printed from: https://www.chillingeffects.org/linking/notice.cgi?NoticeID=243
disclaimer / privacy / about us & contacts