Chilling Effects
Home Weather Reports Report Receiving a Cease and Desist Notice Search the Database Topics
Sending
Topic HomeFAQsMonitoring the legal climate for Internet activity
Chilling Effects
 Chilling Effects Clearinghouse > DMCA Safe Harbor > Notices > Stock Blocks, Inc. Requests Removal of Warez Spam (NoticeID 462, http://chillingeffects.org/N/462) Location: https://www.chillingeffects.org/notice.cgi?NoticeID=462

Stock Blocks, Inc. Requests Removal of Warez Spam

November 12, 2002

 

Sender Information:
Stock Blocks, Inc.
Sent by: [Private]
[Private]
North Stonington, CT, 06359, US

Recipient Information:
[Private]
Google, Inc.
Mountain View, CA, 94043, USA


Sent via: Fax
Re: DMCA complaint - Stock Blocks, Inc. - Newsgroup postings by bootlegger

DMCA complaint - Stock Blocks, Inc. - Newsgroup postings by bootlegger

FAX TRANSMITTAL

STOCK BLOCKS, INC.
[Private]
North Stonington, Connecticut 06359

Date: November 12, 2002

Attn: [private]

Company Name: Google, Inc. [private]
From: Stock Blocks, Inc.

# Pages (including cover sheet): 4

Dear [private],

I am faxing the attached info per the directions that
you sent me in response to an email I sent to
[private] on 30 October 2002.

Please let me know if there is any further
information that you need.

Thank you,

[private]
Stock Blocks, Inc.

DMCA complaint - Stock Blocks, Inc. - Newsgroup postings by bootlegger

1. Identify in sufficient detail the copyrighted work that you believe has been
infringed.

Insider TA TM (Copyright(C)1995-2002, Stock Blocks, Inc.) is investment software for stock traders, operating on the Windows 9x/Me/2000/NT/XP platform. We have advertised in several trade publications over the past eight years, as well as being the topic of several software reviews, both web-based and in print. Insider TA is also sold on our web site at http://www.stockblocks.com.

The copyrighted work at issue are [sic] various newsgroup spams that appear in
http://groups.google.com/groups.

2. Identify the material that you claim is infringing the copyrighted work listed in item #1 above.

Using Google's Advanced Search, I searched groups for the phrase "Insider TA" from Jan. 1, 2001 to the present day. The results show 5 listings, all of which are posts by one bootlegger who uses the anonymous email guess201@hotmail.com with various aliases:

Posted by "Vent", Insider TA is included in his list for CD#3...

o http://groups.google.com/groups?q=%22Insider+TA%22&hl=en&lr=&ie= UTF-8&as_drrb=b&as_mind=1&as_minm=1&as_miny=2001&as_maxd= 12&as_maxm =ll&as_maxy=2002&selm= anpjv4%24117ie%241%40ewald.scvmaxonline.com.sg&rnum=1

Posted by either "Vent", "GueZsTrader", and "GueZs", the following spams show Insider TA at the top of his list...

o http://groups.google.com/groups?q=%22Insider+TA%22&hl=en&lr=&ie= UTF-8&as_drrb=b&as_mind=1&as_minm=1&as_miny=2001&as_maxd = 12&as_maxm=11&as_maxy=2002&selm= amjtpu%24soaa%241%4Oengel.scvmaxonline.com.sg&rnum=2

o http://groups.google.com/groups?q=%22Insider+TA%22&hl =en&lr=&ie= UTF-8&as_drrb=b&as_mind=1&as_minm =1&as_miny=2001&as_maxd =12&as_maxm=11&as_maxy =2002&selm=9seOnj%24n5u%241%40newsie.singa.pore.net&rnum=3

o http://groups.google.com/groups?q=%22Insider+TA%22&hl=en&lr=&ie =UTF-B&as_drrb=b&as_miind=1&as_minm=1&as_miny =2001&as_maxd =12&as_maxm=11&as_maxy=2002&selm =9r7sel%24p7f%241%40newsie.singa.pore.net&rnum=4

o http://groups.google.com/groups?q=%22Insider+TA%22&hl=en&lr=&ie =UTF-8&as_drrb=b&as_mind=l&as_minm=1&as_miny =2001&as_maxd=12&as_maxm=ll&as_maxy =2002&selm =9qpb72%24oqf%241%40newsie.singa.pore.net&rnum=5

DMCA complaint - Stock Blocks, Inc. - Newsgroup postings by bootlegger

3. Provide information reasonably sufficient to permit Google to contact you (email address is preferred).

[private]
Email: [private]
Phone: [private]

4. Provide information, if possible, sufficient to permit Google to notify the
owner/administrator of the web page that allegedly contains Infringing material
(email address is preferred).

Although there are a number of warez sites on anonymous web-hosting services (some of which have Insider TA listed), none of them -- as far as I know -- are under the jurisdiction of Google.com. So I have no information to provide for this section.

My only request to Google is to remove the above bootlegger postings that solicit the illegal sale of our software, Insider TA.

I have a good faith belief that use of the copyrighted materials described above on the allegedly infringing web pages is not authorized by the copyright owner, its agent, or the law.

I swear, under penalty of perjury, that the information in the notification is
accurate and that I am the copyright owner or am authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.


[private]
[private]
Stock Blocks, Inc.

Can postings by bootleggers be removed?

Subject: Can postings by bootleggers be removed?
Date: Wed, 30 Oct 2002 12:01:34 -0800
From: "Stock Blocks, Inc" [private]
To: [private]
CC: [private]

Dear Google Newsgroup support,

I represent Stock Blocks Inc, a software company.

From time to time, we discover newsgroup postings originating by unscrupulous
software pirates (are there any other kind?). They are including our software in listings of warez products they try to sell to people.

If we provide you the msg headers of these newsgroup postings, is it possible you can delete them from your databases so they won't show up in newsgroup searches?

Please let me know.

Thank you,

[private]
[private]
Stock Blocks, Inc.

image

FAQ: Questions and Answers

[back to notice text]


Question: What are the DMCA's anti-circumvention provisions?

Answer: The Digital Millennium Copyright Act (DMCA) is the latest amendment to copyright law, which introduced a new category of copyright violations that prohibit the "circumvention" of technical locks and controls on the use of digital content and products. These anti-circumvention provisions put the force of law behind any technological systems used by copyright owners to control access to and copying of their digital works.

The DMCA contains four main provisions:

  1. a prohibition on circumventing access controls [1201(a)(1)(A)];
  2. an access control circumvention device ban (sometimes called the "trafficking" ban) [1201(a)(2)];
  3. a copyright protection circumvention device ban [1201(b)]; and,
  4. a prohibition on the removal of copyright management information (CMI) [1202(b)].

The first provision prohibits the act of circumventing technological protection systems, the second and third ban technological devices that facilitate the circumvention of access control or copy controls, and the fourth prohibits individuals from removing information about access and use devices and rules. The first three provisions are also distinguishable in that the first two provisions focus on technological protection systems that provide access control to the copyright owner, while the third provision prohibits circumvention of technological protections against unauthorized duplication and other potentially copyright infringing activities.


[back to notice text]


Question: What are the DMCA Safe Harbor Provisions?

Answer: In 1998, Congress passed the On-Line Copyright Infringement Liability Limitation Act (OCILLA) in an effort to protect service providers on the Internet from liability for the activities of its users. Codified as section 512 of the Digital Millennium Copyright Act (DMCA), this new law exempts on-line service providers that meet the criteria set forth in the safe harbor provisions from claims of copyright infringement made against them that result from the conduct of their customers. These safe harbor provisions are designed to shelter service providers from the infringing activities of their customers. If a service provider qualifies for the safe harbor exemption, only the individual infringing customer are liable for monetary damages; the service provider's network through which they engaged in the alleged activities is not liable.


[back to notice text]


Question: What are the notice and takedown procedures for web sites?

Answer: In order to have an allegedly infringing web site removed from a service provider's network, or to have access to an allegedly infringing website disabled, the copyright owner must provide notice to the service provider with the following information:

  • The name, address, and electronic signature of the complaining party [512(c)(3)(A)(i)]
  • The infringing materials and their Internet location [512(c)(3)(A)(ii-iii)], or if the service provider is an "information location tool" such as a search engine, the reference or link to the infringing materials [512(d)(3)].
  • Sufficient information to identify the copyrighted works [512(c)(3)(A)(iv)].
  • A statement by the owner that it has a good faith belief that there is no legal basis for the use of the materials complained of [512(c)(3)(A)(v)].
  • A statement of the accuracy of the notice and, under penalty of perjury, that the complaining party is authorized to act on the behalf of the owner [512(c)(3)(A)(vi)].

Once notice is given to the service provider, or in circumstances where the service provider discovers the infringing material itself, it is required to expeditiously remove, or disable access to, the material. The safe harbor provisions do not require the service provider to notify the individual responsible for the allegedly infringing material before it has been removed, but they do require notification after the material is removed.


[back to notice text]


Question: Does a copyright owner have to specify the exact materials it alleges are infringing?

Answer: Proper notice under the safe harbor provisions requires the copyright owners to specifically identify the alleged infringing materials, or if the service provider is an "information location tool" such as a search engine, to specifically identify the links to the alleged infringing materials. [512(c)(3)(iii)], [512(d)(3)]. The provisions also require the copyright owners to identify the copyrighted work, or a representative list of the copyrighted works, that is claimed to be infringed. [512(c)(3)(A)(ii)]. Rather than simply sending a letter to the service provider that claims that infringing material exists on their system, these qualifications ensure that service providers are given a reasonable amount of information to locate the infringing materials and to effectively police their networks. [512(c)(3)(A)(iii)], [512(d)(3)].

However, in the recent case of ALS Scan, Inc. v. Remarq Communities, Inc., the court found that the copyright owner did not have to point out all of the infringing material, but only substantially all of the material. The relaxation of this specificity requirement shifts the burden of identifying the material to the service provider, raising the question of the extent to which a service provider must search through its system. OSP customers should note that this situation might encourage OSP's to err on the side of removing allegedly infringing material.


[back to notice text]


Question: What kinds of things are copyrightable?

Answer: In order for material to be copyrightable, it must be original and must be in a fixed medium.

Only material that originated with the author can support a copyright. Items from the public domain which appear in a work, as well as work borrowed from others, cannot be the subject of an infringement claim. Also, certain stock material might not be copyrightable, such as footage that indicates a location like the standard shots of San Francisco in Star Trek IV: The Voyage Home. Also exempted are stock characters like the noisy punk rocker who gets the Vulcan death grip in Star Trek IV.

The requirement that works be in a fixed medium leaves out certain forms of expression, most notably choreography and oral performances such as speeches. For instance, if I perform a Klingon death wail in a local park, my performance is not copyrightable. However, if I film the performance, then the film is copyrightable.

Single words and short phrases are generally not protected by copyright, even when the name has been "coined" or newly-created by the mark owner. Logos that include original design elements can be protected under copyright or under trademark. Otherwise, words, phrases and titles may be protected only by trademark, however.


[back to notice text]


Question: What happens if an individual is found to repeatedly infringe?

Answer: The safe harbor provisions require the service provider to include in its copyright infringement policies a termination policy that results in individuals who repeatedly infringe copyrighted material being removed from the service provider networks. [512(i)(1)(A)] This termination policy must be made public in the terms of use that the service provider includes in its contracts or on its web site.


[back to notice text]


Question: Does a service provider have to notify its users about its policies regarding the removal of materials?

Answer: To qualify for exemption under the safe harbor provisions, the service provider must give notice to its users of its policies regarding copyright infringement and the consequences of repeated infringing activity. [512(i)(1)(A)] The notice can be a part of the contract signed by the user when signing up for the service or a page on the service provider's web site explaining the terms of use of their systems. While there are no specific rules about how this notice must be made, it must be "reasonably implemented" so that subscribers and account holders are informed of the terms. [512(i)(1)(A)]


[back to notice text]


Question: Can a copyright owner find out the identity of the individual responsible for the allegedly infringing material?

Answer: The safe harbor provisions permit a copyright owner to subpoena the identity of the individual allegedly responsible for the infringing activities. [512(h)] Such a subpoena is granted on the condition that the information about the individual's identity will only be used in relation to the protection of the intellectual property rights of the copyright owner. [512(h)(2)(C)]

The DMCA subpoena provision does not apply to requests for the identities of users of ISP conduit 512(a) services, but only to users of hosting or linking, for which a takedown may be sent under 512(c)(3)(A). Thus DMCA subpoenas cannot be used to find the identities of users engaged in peer-to-peer filesharing. Recording Industry Assoc. of America v. Verizon Internet Svcs., Inc.


[back to notice text]


Question: What defines a service provider under Section 512 of the Digital Millennium Copyright Act (DMCA)?

Answer: A service provider is defined as "an entity offering transmission, routing, or providing connections for digital online communications, between or among points specified by a user, of material of the user's choosing, without modification to the content of the material as sent or received" or "a provider of online services or network access, or the operator of facilities thereof." [512(k)(1)(A-B)] This broad definition includes network services companies such as Internet service providers (ISPs), search engines, bulletin board system operators, and even auction web sites. In A&M Records, Inc. v. Napster Inc., the court refused to extend the safe harbor provisions to the Napster software program and service, leaving open the question of whether peer-to-peer networks also qualify for safe harbor protection under Section 512.

There are four major categories of network systems offered by service providers that qualify for protection under the safe harbor provisions:

  • Conduit Communications include the transmission and routing of information, such as an email or Internet service provider, which store the material only temporarily on their networks. [Sec. 512(a)]
  • System Caching refers to the temporary copies of data that are made by service providers in providing the various services that require such copying in order to transfer data. [Sec. 512(b)]
  • Storage Systems refers to services which allow users to store information on their networks, such as a web hosting service or a chat room. [Sec. 512(c)]
  • Information Location Tools refer to services such as search engines, directories, or pages of recommended web sites which provide links to the allegedly infringing material. [Sec. 512(d)]


[back to notice text]


Question: What rights are protected by copyright law?

Answer: The purpose of copyright law is to encourage creative work by granting a temporary monopoly in an author's original creations. This monopoly takes the form of six rights in areas where the author retains exclusive control. These rights are:

(1) the right of reproduction (i.e., copying),
(2) the right to create derivative works,
(3) the right to distribution,
(4) the right to performance,
(5) the right to display, and
(6) the digital transmission performance right.

The law of copyright protects the first two rights in both private and public contexts, whereas an author can only restrict the last four rights in the public sphere. Claims of infringement must show that the defendant exercised one of these rights. For example, if I create unauthorized videotape copies of Star Trek II: The Wrath of Khan and distribute them to strangers on the street, then I have infringed both the copyright holder's rights of reproduction and distribution. If I merely re-enact The Wrath of Khan for my family in my home, then I have not infringed on the copyright. Names, ideas and facts are not protected by copyright.

Trademark law, in contrast, is designed to protect consumers from confusion as to the source of goods (as well as to protect the trademark owner's market). To this end, the law gives the owner of a registered trademark the right to use the mark in commerce without confusion. If someone introduces a trademark into the market that is likely to cause confusion, then the newer mark infringes on the older one. The laws of trademark infringement and dilution protect against this likelihood of confusion. Trademark protects names, images and short phrases.

Infringement protects against confusion about the origin of goods. The plaintiff in an infringement suit must show that defendant's use of the mark is likely to cause such a confusion. For instance, if I were an unscrupulous manufacturer, I might attempt to capitalize on the fame of Star Trek by creating a line of 'Spock Activewear.' If consumers could reasonably believe that my activewear was produced or endorsed by the owners of the Spock trademark, then I would be liable for infringement.

The law of trademark dilution protects against confusion concerning the character of a registered trademark. Suppose I created a semi-automatic assault rifle and marketed it as 'The Lt. Uhura 5000.' Even if consumers could not reasonably believe that the Star Trek trademark holders produced this firearm, the trademark holders could claim that my use of their mark harmed the family-oriented character of their mark. I would be liable for dilution.


[back to notice text]


Question: What are the counter-notice and put-back procedures?

Answer: In order to ensure that copyright owners do not wrongly insist on the removal of materials that actually do not infringe their copyrights, the safe harbor provisions require service providers to notify the subscribers if their materials have been removed and to provide them with an opportunity to send a written notice to the service provider stating that the material has been wrongly removed. [512(g)] If a subscriber provides a proper "counter-notice" claiming that the material does not infringe copyrights, the service provider must then promptly notify the claiming party of the individual's objection. [512(g)(2)] If the copyright owner does not bring a lawsuit in district court within 14 days, the service provider is then required to restore the material to its location on its network. [512(g)(2)(C)]

A proper counter-notice must contain the following information:

  • The subscriber's name, address, phone number and physical or electronic signature [512(g)(3)(A)]
  • Identification of the material and its location before removal [512(g)(3)(B)]
  • A statement under penalty of perjury that the material was removed by mistake or misidentification [512(g)(3)(C)]
  • Subscriber consent to local federal court jurisdiction, or if overseas, to an appropriate judicial body. [512(g)(3)(D)]

If it is determined that the copyright holder misrepresented its claim regarding the infringing material, the copyright holder then becomes liable to the person harmed for any damages that resulted from the improper removal of the material. [512(f)]

See also How do I file a DMCA counter-notice?, and the counter-notification generator.


[back to notice text]


Question: What defines a service provider under Section 512 of the Digital Millennium Copyright Act (DMCA)?

Answer: A service provider is defined as "an entity offering transmission, routing, or providing connections for digital online communications, between or among points specified by a user, of material of the user's choosing, without modification to the content of the material as sent or received" or "a provider of online services or network access, or the operator of facilities thereof." [512(k)(1)(A-B)] This broad definition includes network services companies such as Internet service providers (ISPs), search engines, bulletin board system operators, and even auction web sites. In A&M Records, Inc. v. Napster Inc., the court refused to extend the safe harbor provisions to the Napster software program and service, leaving open the question of whether peer-to-peer networks also qualify for safe harbor protection under Section 512.

There are four major categories of network systems offered by service providers that qualify for protection under the safe harbor provisions:

  • Conduit Communications include the transmission and routing of information, such as an email or Internet service provider, which store the material only temporarily on their networks. [Sec. 512(a)]
  • System Caching refers to the temporary copies of data that are made by service providers in providing the various services that require such copying in order to transfer data. [Sec. 512(b)]
  • Storage Systems refers to services which allow users to store information on their networks, such as a web hosting service or a chat room. [Sec. 512(c)]
  • Information Location Tools refer to services such as search engines, directories, or pages of recommended web sites which provide links to the allegedly infringing material. [Sec. 512(d)]


Topic maintained by Chilling Effects

Chilling Effects Clearinghouse - www.chillingeffects.org
Chilling Effects Clearinghouse page printed from: https://www.chillingeffects.org/notice.cgi?NoticeID=462
disclaimer / privacy / about us & contacts