Chilling Effects
Home Weather Reports Report Receiving a Cease and Desist Notice Search the Database Topics
Sending
Topic HomeFAQsMonitoring the legal climate for Internet activity
Chilling Effects
 Chilling Effects Clearinghouse > DMCA Safe Harbor > Notices > Cisco Demands Removal of Messages Offering Source Code (NoticeID 1511, http://chillingeffects.org/N/1511) Location: https://www.chillingeffects.org/notice.cgi?NoticeID=1511

Cisco Demands Removal of Messages Offering Source Code

November 05, 2004

 

Sender Information:
Cisco Systems, Inc. and Cisco Technology, Inc.
Sent by: [Private]
Orrick, Herrington & Sutcliffe LLP
Menlo Park, CA, 94025, US

Recipient Information:
[Private]
Google, Inc.
Mountain View, CA, 94043, USA


Sent via: fax
Re: Public Internet Posting of Confidential and Copyrighted Cisco Information

11/05/2004 11:55 FAX ORRICK 002/065

O R R I C K
ORRICK, HERRINGTON & SUTCLIFFE LLP
[redacted]
tel [redacted]
fax [redacted]
www.ORRICK.COM

November 5, 2004
U.S. MAIL AND FACSIMILE [redacted]

Google, Inc.
Attn: User Support, DMCA Complaints
[redacted]
Mountain View, CA 94043

Re: Public Internet Posting of Confidential and Copyrighted Cisco Information

Dear Sir or Madam:

I am an attorney representing Cisco Systems, Inc. and Cisco Technology, Inc. (collectively "Cisco"). On behalf of my client Cisco, I hereby submit the following notice of copyright infringement ("Notice") pursuant to 17 U.S.C. - 512(c)(3). I am also providing notice that Cisco's trade secrets are being made available on Google's website without Cisco's authorization. Under penalty of perjury, I submit that I am authorized to act on behalf of Cisco with regard to the alleged copyright infringement and trade secret misappropriation described herein.

This letler advises you that the following Google Group sites are currently posting and offering to sell Cisco copyrighted and trade secret material:

- http://groups.google.com/groups?dq=&hl=en&lr=&group=alt.gap.international.sales&selm=15d5a 144.0410312327.1d76e134%40posting.google.com

- http://groups.google.com/groups?dq=&hl=en&lr=&group=alt.gap.international.
sales&selm=15d5a144.0410312330.660789ff%40posting.google.com

We have also identified these sites by the following Google "Message-ID" numbers:

- Message-ID:<15d5a144.0410312330.660789ff@posting.google.com
- Message-ID:<15d5a144.0410312327.1d76e134@posting.google.com

We request that you immediately remove these messages and links from your website.

[redacted]
[redacted] [redacted]@orrick.com

DOCSSVI:285404A

11/05/2004 11:56 FAX ORRICK 003/065

O R R I C K

[redacted]
November 5, 2004
Page 2

As of November 4, 2004, a user, customer, or subscriber on your network was offering for download over the internet files containing the following copyrighted and trade secret material which is owned by Cisco:
- Cisco Pix 6.3.1-release source code.

This trade secret and copyrighted material were posted at the above-identified web addresses and Google "Message-ID" numbers. Enclosed for your records are print outs of these messages. I have a good faith belief that the posting and offer for sale of Cisco copyrighted ar d trade secret materials on Google's Group sites were not authorized by Cisco, its agents, or the law, and assert that the information in this letter is accurate, based on information presently available to me. We therefore expect Google to comply with this Notice and remove these messages and links immediately.

Thank you for your prompt attention to this matter. If you have any questions, please contact me at [redacted] or at [redacted]@orrick.com at your earliest convenience.

Very truly yours,
[redacted]

INC:llb
Enclosures
cc: [redacted], Cisco Systems, Inc.
[redacted], Google, Inc.

DOCSSVI:285404.1

11/05/2004 11:56 FAX ORRICK 004/065

Google Search: source code club cisco
Page 1 of 8

Advanced Groups Search Preferences
Google Groups

Groups Search result 2 for source code club cisco
Pgp File Encryption : 408 & 128-Bit SSL Data Encryption. Secure Your Site - Free
http://www.verisign.com

Encrypt email with PGP : Set up PGP email encryption with Apollo Hosting email services
support.apollohosting.com/

Public key encryption : Authentication, PKI Encryption & IT Security Consultants.
Fast quotes. : www.itglobalsecure.net

From: [redacted] ([redacted]@mighty.co.za)
Subject: SCC Newsletter #2
Newsgroups: alt.gap.international.sales
Date: 2004-10-31 23:27:22 PST

Search Result 2

This is the only article in this thread View: Original Format

SOURCE CODE CLUB NEWSLETTER #2 - November 1, 2004

TABLE OF CONTENTS
1) Contact Information
2) News
3) Buy
4) FAQ
5) About

Contact Information Two ways to contact us:

1) Post a PGP message encrypted with our public key via usenet to: alt . gap. international. sales This method of contact is preferred.

2) Send email to: [redacted]@rediffmail.com

THE EMAIL COULD CHANGE OR GO DOWN. If you absolutely must get a message to SCC, we recommend using usenet. The SCC PGP public key is located on full disclosure mailing list archives, usenet, and the end of this newsletter. It is wise to make sure they all match, for your safety. This public key will NEVER change. Only PGP encrypted email will be responded to.

image

FAQ: Questions and Answers

[back to notice text]


Question: What defines a service provider under Section 512 of the Digital Millennium Copyright Act (DMCA)?

Answer: A service provider is defined as "an entity offering transmission, routing, or providing connections for digital online communications, between or among points specified by a user, of material of the user's choosing, without modification to the content of the material as sent or received" or "a provider of online services or network access, or the operator of facilities thereof." [512(k)(1)(A-B)] This broad definition includes network services companies such as Internet service providers (ISPs), search engines, bulletin board system operators, and even auction web sites. In A&M Records, Inc. v. Napster Inc., the court refused to extend the safe harbor provisions to the Napster software program and service, leaving open the question of whether peer-to-peer networks also qualify for safe harbor protection under Section 512.

There are four major categories of network systems offered by service providers that qualify for protection under the safe harbor provisions:

  • Conduit Communications include the transmission and routing of information, such as an email or Internet service provider, which store the material only temporarily on their networks. [Sec. 512(a)]
  • System Caching refers to the temporary copies of data that are made by service providers in providing the various services that require such copying in order to transfer data. [Sec. 512(b)]
  • Storage Systems refers to services which allow users to store information on their networks, such as a web hosting service or a chat room. [Sec. 512(c)]
  • Information Location Tools refer to services such as search engines, directories, or pages of recommended web sites which provide links to the allegedly infringing material. [Sec. 512(d)]


[back to notice text]


Question: What is the Digital Millennium Copyright Act?

Answer: The DMCA, as it is known, has a number of different parts. One part is the anticircumvention provisions, which make it illegal to "circumvent" a technological measure protecting access to or copying of a copyrighted work (see Anticircumvention (DMCA)). Another part gives web hosts and Internet service providers a "safe harbor" from copyright infringement claims if they implement certain notice and takedown procedures (see DMCA Safe Harbor).


[back to notice text]


Question: What is copyright infringement? Are there any defenses?

Answer: Infringement occurs whenever someone who is not the copyright holder (or a licensee of the copyright holder) exercises one of the exclusive rights listed above.

The most common defense to an infringement claim is "fair use," a doctrine that allows people to use copyrighted material without permission in certain situations, such as quotations in a book review. To evaluate fair use of copyrighted material, the courts consider four factors:


  1. the purpose and character of the use
  2. the nature of the copyrighted work
  3. the amount and substantiality of copying, and
  4. the market effect.

(17 U.S.C. 107)

The most significant factor in this analysis is the fourth, effect on the market. If a copier's use supplants demand for the original work, then it will be very difficult for him or her to claim fair use. On the other hand, if the use does not compete with the original, for example because it is a parody, criticism, or news report, it is more likely to be permitted as "fair use."

Trademarks are generally subject to fair use in two situations: First, advertisers and other speakers are allowed to use a competitor's trademark when referring to that competitor's product ("nominative use"). Second, the law protects "fair comment," for instance, in parody.


[back to notice text]


Question: What are the provisions of 17 U.S.C. Section 512(c)(3) & 512(d)(3)?

Answer: Section 512(c)(3) sets out the elements for notification under the DMCA. Subsection A (17 U.S.C. 512(c)(3)(A)) states that to be effective a notification must include: 1) a physical/electronic signature of a person authorized to act on behalf of the owner of the infringed right; 2) identification of the copyrighted works claimed to have been infringed; 3) identification of the material that is claimed to be infringing or to be the subject of infringing activity and that is to be removed; 4) information reasonably sufficient to permit the service provider to contact the complaining party (e.g., the address, telephone number, or email address); 5) a statement that the complaining party has a good faith belief that use of the material is not authorized by the copyright owner; and 6) a statement that information in the complaint is accurate and that the complaining party is authorized to act on behalf of the copyright owner. Subsection B (17 U.S.C. 512(c)(3)(B)) states that if the complaining party does not substantially comply with these requirements the notice will not serve as actual notice for the purpose of Section 512.

Section 512(d)(3), which applies to "information location tools" such as search engines and directories, incorporates the above requirements; however, instead of the identification of the allegedly infringing material, the notification must identify the reference or link to the material claimed to be infringing.


[back to notice text]


Question: What are the notice and takedown procedures for web sites?

Answer: In order to have an allegedly infringing web site removed from a service provider's network, or to have access to an allegedly infringing website disabled, the copyright owner must provide notice to the service provider with the following information:

  • The name, address, and electronic signature of the complaining party [512(c)(3)(A)(i)]
  • The infringing materials and their Internet location [512(c)(3)(A)(ii-iii)], or if the service provider is an "information location tool" such as a search engine, the reference or link to the infringing materials [512(d)(3)].
  • Sufficient information to identify the copyrighted works [512(c)(3)(A)(iv)].
  • A statement by the owner that it has a good faith belief that there is no legal basis for the use of the materials complained of [512(c)(3)(A)(v)].
  • A statement of the accuracy of the notice and, under penalty of perjury, that the complaining party is authorized to act on the behalf of the owner [512(c)(3)(A)(vi)].

Once notice is given to the service provider, or in circumstances where the service provider discovers the infringing material itself, it is required to expeditiously remove, or disable access to, the material. The safe harbor provisions do not require the service provider to notify the individual responsible for the allegedly infringing material before it has been removed, but they do require notification after the material is removed.


[back to notice text]


Question: What is a trade secret?

Answer: A trade secret is business information that is the subject of reasonable efforts to preserve confidentiality and has value because it is not generally known in the trade. Such confidential information will be protected against those who obtain access through improper methods or by breach of confidence. Infringement on a trade secret is a tort and a type of unfair competition. Every alleged infringement of a trade secret involves two main issues: (1) whether there is valuable and secret business information; and (2) whether this defendant used improper means to obtain that information.


[back to notice text]


Question: What defines a service provider under Section 512 of the Digital Millennium Copyright Act (DMCA)?

Answer: A service provider is defined as "an entity offering transmission, routing, or providing connections for digital online communications, between or among points specified by a user, of material of the user's choosing, without modification to the content of the material as sent or received" or "a provider of online services or network access, or the operator of facilities thereof." [512(k)(1)(A-B)] This broad definition includes network services companies such as Internet service providers (ISPs), search engines, bulletin board system operators, and even auction web sites. In A&M Records, Inc. v. Napster Inc., the court refused to extend the safe harbor provisions to the Napster software program and service, leaving open the question of whether peer-to-peer networks also qualify for safe harbor protection under Section 512.

There are four major categories of network systems offered by service providers that qualify for protection under the safe harbor provisions:

  • Conduit Communications include the transmission and routing of information, such as an email or Internet service provider, which store the material only temporarily on their networks. [Sec. 512(a)]
  • System Caching refers to the temporary copies of data that are made by service providers in providing the various services that require such copying in order to transfer data. [Sec. 512(b)]
  • Storage Systems refers to services which allow users to store information on their networks, such as a web hosting service or a chat room. [Sec. 512(c)]
  • Information Location Tools refer to services such as search engines, directories, or pages of recommended web sites which provide links to the allegedly infringing material. [Sec. 512(d)]


[back to notice text]


Question: What does "under penalty of perjury" mean?

Answer: Law.com offers a good definition of perjury: "Perjury is the the crime of intentionally lying after being duly sworn (to tell the truth) by a notary public, court clerk or other official. This false statement may be made in testimony in court, administrative hearings, depositions, answers to interrogatories, as well as by signing or acknowledging a written legal document (such as affidavit, declaration under penalty of perjury, deed, license application, tax return) known to contain false information. Although it is a crime, prosecutions for perjury are rare, because a defendant will argue he/she merely made a mistake or misunderstood."


[back to notice text]


Question: Does a copyright owner have to specify the exact materials it alleges are infringing?

Answer: Proper notice under the safe harbor provisions requires the copyright owners to specifically identify the alleged infringing materials, or if the service provider is an "information location tool" such as a search engine, to specifically identify the links to the alleged infringing materials. [512(c)(3)(iii)], [512(d)(3)]. The provisions also require the copyright owners to identify the copyrighted work, or a representative list of the copyrighted works, that is claimed to be infringed. [512(c)(3)(A)(ii)]. Rather than simply sending a letter to the service provider that claims that infringing material exists on their system, these qualifications ensure that service providers are given a reasonable amount of information to locate the infringing materials and to effectively police their networks. [512(c)(3)(A)(iii)], [512(d)(3)].

However, in the recent case of ALS Scan, Inc. v. Remarq Communities, Inc., the court found that the copyright owner did not have to point out all of the infringing material, but only substantially all of the material. The relaxation of this specificity requirement shifts the burden of identifying the material to the service provider, raising the question of the extent to which a service provider must search through its system. OSP customers should note that this situation might encourage OSP's to err on the side of removing allegedly infringing material.


[back to notice text]


Question: What are the DMCA Safe Harbor Provisions?

Answer: In 1998, Congress passed the On-Line Copyright Infringement Liability Limitation Act (OCILLA) in an effort to protect service providers on the Internet from liability for the activities of its users. Codified as section 512 of the Digital Millennium Copyright Act (DMCA), this new law exempts on-line service providers that meet the criteria set forth in the safe harbor provisions from claims of copyright infringement made against them that result from the conduct of their customers. These safe harbor provisions are designed to shelter service providers from the infringing activities of their customers. If a service provider qualifies for the safe harbor exemption, only the individual infringing customer are liable for monetary damages; the service provider's network through which they engaged in the alleged activities is not liable.


[back to notice text]


Question: What may be copyrighted?

Answer: In order to be copyrightable, a work must be

1. fixed in a tangible medium of expression ; and
2. original.

Copyrights do not protect ideas, procedures, processes, systems, methods of operation, concepts, principles, or discoveries: they only protect physical representations. 17 U.S.C.


[back to notice text]


Question: What does a service provider have to do in order to qualify for safe harbor protection?

Answer: In addition to informing its customers of its policies (discussed above), a service provider must follow the proper notice and takedown procedures (discussed above) and also meet several other requirements in order to qualify for exemption under the safe harbor provisions.

In order to facilitate the notification process in cases of infringement, ISPs which allow users to store information on their networks, such as a web hosting service, must designate an agent that will receive the notices from copyright owners that its network contains material which infringes their intellectual property rights. The service provider must then notify the Copyright Office of the agent's name and address and make that information publicly available on its web site. [512(c)(2)]

Finally, the service provider must not have knowledge that the material or activity is infringing or of the fact that the infringing material exists on its network. [512(c)(1)(A)], [512(d)(1)(A)]. If it does discover such material before being contacted by the copyright owners, it is instructed to remove, or disable access to, the material itself. [512(c)(1)(A)(iii)], [512(d)(1)(C)]. The service provider must not gain any financial benefit that is attributable to the infringing material. [512(c)(1)(B)], [512(d)(2)].


[back to notice text]


Question: What are the counter-notice and put-back procedures?

Answer: In order to ensure that copyright owners do not wrongly insist on the removal of materials that actually do not infringe their copyrights, the safe harbor provisions require service providers to notify the subscribers if their materials have been removed and to provide them with an opportunity to send a written notice to the service provider stating that the material has been wrongly removed. [512(g)] If a subscriber provides a proper "counter-notice" claiming that the material does not infringe copyrights, the service provider must then promptly notify the claiming party of the individual's objection. [512(g)(2)] If the copyright owner does not bring a lawsuit in district court within 14 days, the service provider is then required to restore the material to its location on its network. [512(g)(2)(C)]

A proper counter-notice must contain the following information:

  • The subscriber's name, address, phone number and physical or electronic signature [512(g)(3)(A)]
  • Identification of the material and its location before removal [512(g)(3)(B)]
  • A statement under penalty of perjury that the material was removed by mistake or misidentification [512(g)(3)(C)]
  • Subscriber consent to local federal court jurisdiction, or if overseas, to an appropriate judicial body. [512(g)(3)(D)]

If it is determined that the copyright holder misrepresented its claim regarding the infringing material, the copyright holder then becomes liable to the person harmed for any damages that resulted from the improper removal of the material. [512(f)]

See also How do I file a DMCA counter-notice?, and the counter-notification generator.


Topic maintained by Chilling Effects

Chilling Effects Clearinghouse - www.chillingeffects.org
Chilling Effects Clearinghouse page printed from: https://www.chillingeffects.org/notice.cgi?NoticeID=1511
disclaimer / privacy / about us & contacts