Chilling Effects
Home Weather Reports Report Receiving a Cease and Desist Notice Search the Database Topics
Sending
Topic HomeFAQsMonitoring the legal climate for Internet activity
Stanford Center for Internet & Society
 Chilling Effects Clearinghouse > Piracy or Copyright Infringement > Notices > Notice of AUP violation (NoticeID 1366, http://chillingeffects.org/N/1366) Location: https://www.chillingeffects.org/piracy/notice.cgi?NoticeID=1366

April 28, 2004

 

Sender Information:
ESA DMCA Enforcement
Sent by: [Private]
[Private]
Washington, DC, 20036, US

Recipient Information:
[Private]
[Private]


Sent via: email
Re: Notice of AUP violation

Dear Customer,

We are writing on behalf of Cox Communications to advise you that we have received a notification that you are using your Cox High Speed Internet service to post or transmit material that infringes the copyrights of a complainant's members. We have included a copy of the complaint letter. Pursuant to the provisions of the Digital Millennium Copyright Act ("DMCA"), which is codified at 17 U.S.C.

FAQ: Questions and Answers

[back to notice text]


Question: Can a copyright owner find out the identity of the individual responsible for the allegedly infringing material?

Answer: The safe harbor provisions permit a copyright owner to subpoena the identity of the individual allegedly responsible for the infringing activities. [512(h)] Such a subpoena is granted on the condition that the information about the individual's identity will only be used in relation to the protection of the intellectual property rights of the copyright owner. [512(h)(2)(C)]

The DMCA subpoena provision does not apply to requests for the identities of users of ISP conduit 512(a) services, but only to users of hosting or linking, for which a takedown may be sent under 512(c)(3)(A). Thus DMCA subpoenas cannot be used to find the identities of users engaged in peer-to-peer filesharing. Recording Industry Assoc. of America v. Verizon Internet Svcs., Inc.


[back to notice text]


Question: What does a service provider have to do in order to qualify for safe harbor protection?

Answer: In addition to informing its customers of its policies (discussed above), a service provider must follow the proper notice and takedown procedures (discussed above) and also meet several other requirements in order to qualify for exemption under the safe harbor provisions.

In order to facilitate the notification process in cases of infringement, ISPs which allow users to store information on their networks, such as a web hosting service, must designate an agent that will receive the notices from copyright owners that its network contains material which infringes their intellectual property rights. The service provider must then notify the Copyright Office of the agent's name and address and make that information publicly available on its web site. [512(c)(2)]

Finally, the service provider must not have knowledge that the material or activity is infringing or of the fact that the infringing material exists on its network. [512(c)(1)(A)], [512(d)(1)(A)]. If it does discover such material before being contacted by the copyright owners, it is instructed to remove, or disable access to, the material itself. [512(c)(1)(A)(iii)], [512(d)(1)(C)]. The service provider must not gain any financial benefit that is attributable to the infringing material. [512(c)(1)(B)], [512(d)(2)].


[back to notice text]


Question: What are the notice and takedown procedures for web sites?

Answer: In order to have an allegedly infringing web site removed from a service provider's network, or to have access to an allegedly infringing website disabled, the copyright owner must provide notice to the service provider with the following information:

  • The name, address, and electronic signature of the complaining party [512(c)(3)(A)(i)]
  • The infringing materials and their Internet location [512(c)(3)(A)(ii-iii)], or if the service provider is an "information location tool" such as a search engine, the reference or link to the infringing materials [512(d)(3)].
  • Sufficient information to identify the copyrighted works [512(c)(3)(A)(iv)].
  • A statement by the owner that it has a good faith belief that there is no legal basis for the use of the materials complained of [512(c)(3)(A)(v)].
  • A statement of the accuracy of the notice and, under penalty of perjury, that the complaining party is authorized to act on the behalf of the owner [512(c)(3)(A)(vi)].

Once notice is given to the service provider, or in circumstances where the service provider discovers the infringing material itself, it is required to expeditiously remove, or disable access to, the material. The safe harbor provisions do not require the service provider to notify the individual responsible for the allegedly infringing material before it has been removed, but they do require notification after the material is removed.


[back to notice text]


Question: What is the Digital Millennium Copyright Act?

Answer: The DMCA, as it is known, has a number of different parts. One part is the anticircumvention provisions, which make it illegal to "circumvent" a technological measure protecting access to or copying of a copyrighted work (see Anticircumvention (DMCA)). Another part gives web hosts and Internet service providers a "safe harbor" from copyright infringement claims if they implement certain notice and takedown procedures (see DMCA Safe Harbor).


[back to notice text]


Question: What is section 512 of the DMCA, and what are its various provisions?

Answer: The On-Line Copyright Infringement Liability Limitation Act (OCILLA), included as section 512 of the Digital Millennium Copyright Act (DMCA), was passed in 1998. It provides Internet Service Providers (ISPs), such as providers of DSL and dial-up Internet access, as well as other Online Service Providers (OSPs), such as search engines, with a


[back to notice text]


Question: What constitutes copyright infringement?

Answer: Subject to certain defenses, it is copyright infringement for someone other than the author to do the following without the author's permission:

1. reproduce (copy) the work;

2. create a new work derived from the original work (for example, by translating the work into a new language, by copying and distorting the image, or by transferring the work into a new medium of expression);

3. sell or give away the work, or a copy of the work, for the first time (but once the author has done so, the right to sell or give away the item is transferred to the new owner. This is known as the "first sale" doctrine: once a copyright owner has sold or given away the work or a copy of it, the recipient or purchaser may do as she pleases with what she posesses.) 17 U.S.C. ?109(a);

4. perform or display the work in public without permission from the copyright owner. 17 U.S.C. ?106. It is also copyright infringement to violate the "moral rights" of an author as defined by 17 U.S.C. 106A. Moral rights are discussed here.


[back to notice text]


Question: Can an online service provider (OSP) be held contributorily liable for acts of trademark infringement by one of its users?

Answer: Under section 512(c) of the DMCA an OSP will not be held liable for instances of copyright infringement so long as the OSP satisfies certain statutory requirements. (See What are the DMCA Safe Harbor Provisions?.) However, there is no equivalent legislation pertaining to trademark infringement, and given the paucity of caselaw concerning liability of OSPs in such instances, it remains an open question as to whether or not an OSP could, or should, be held liable for acts of trademark infringement by its users.

In trademark law contributory liability exists when a manufacturer or distributor intentionally induces another party to infringe a valid trademark, or when it continues to supply products to a party that it knows, or has reason to know, is using the products to engage in trademark infringement. Inwood Laboratories v. Ives Laboratories, 456 U.S. 844 (1982). (See What is contributory trademark infringement?.)

Lower courts have since disagreed somewhat over what exactly satisfies the


[back to notice text]


Question: What are the counter-notice and put-back procedures?

Answer: In order to ensure that copyright owners do not wrongly insist on the removal of materials that actually do not infringe their copyrights, the safe harbor provisions require service providers to notify the subscribers if their materials have been removed and to provide them with an opportunity to send a written notice to the service provider stating that the material has been wrongly removed. [512(g)] If a subscriber provides a proper "counter-notice" claiming that the material does not infringe copyrights, the service provider must then promptly notify the claiming party of the individual's objection. [512(g)(2)] If the copyright owner does not bring a lawsuit in district court within 14 days, the service provider is then required to restore the material to its location on its network. [512(g)(2)(C)]

A proper counter-notice must contain the following information:

  • The subscriber's name, address, phone number and physical or electronic signature [512(g)(3)(A)]
  • Identification of the material and its location before removal [512(g)(3)(B)]
  • A statement under penalty of perjury that the material was removed by mistake or misidentification [512(g)(3)(C)]
  • Subscriber consent to local federal court jurisdiction, or if overseas, to an appropriate judicial body. [512(g)(3)(D)]

If it is determined that the copyright holder misrepresented its claim regarding the infringing material, the copyright holder then becomes liable to the person harmed for any damages that resulted from the improper removal of the material. [512(f)]

See also How do I file a DMCA counter-notice?, and the counter-notification generator.


[back to notice text]


Question: What does "under penalty of perjury" mean?

Answer: Law.com offers a good definition of perjury: "Perjury is the the crime of intentionally lying after being duly sworn (to tell the truth) by a notary public, court clerk or other official. This false statement may be made in testimony in court, administrative hearings, depositions, answers to interrogatories, as well as by signing or acknowledging a written legal document (such as affidavit, declaration under penalty of perjury, deed, license application, tax return) known to contain false information. Although it is a crime, prosecutions for perjury are rare, because a defendant will argue he/she merely made a mistake or misunderstood."


[back to notice text]


Question: What are the provisions of 17 U.S.C. Section 512(c)(3) & 512(d)(3)?

Answer: Section 512(c)(3) sets out the elements for notification under the DMCA. Subsection A (17 U.S.C. 512(c)(3)(A)) states that to be effective a notification must include: 1) a physical/electronic signature of a person authorized to act on behalf of the owner of the infringed right; 2) identification of the copyrighted works claimed to have been infringed; 3) identification of the material that is claimed to be infringing or to be the subject of infringing activity and that is to be removed; 4) information reasonably sufficient to permit the service provider to contact the complaining party (e.g., the address, telephone number, or email address); 5) a statement that the complaining party has a good faith belief that use of the material is not authorized by the copyright owner; and 6) a statement that information in the complaint is accurate and that the complaining party is authorized to act on behalf of the copyright owner. Subsection B (17 U.S.C. 512(c)(3)(B)) states that if the complaining party does not substantially comply with these requirements the notice will not serve as actual notice for the purpose of Section 512.

Section 512(d)(3), which applies to "information location tools" such as search engines and directories, incorporates the above requirements; however, instead of the identification of the allegedly infringing material, the notification must identify the reference or link to the material claimed to be infringing.


[back to notice text]


Question: I use file sharing software. What can I do to make sure I'm not sued by the RIAA?

Answer: The best way to protect yourself against an RIAA lawsuit is to avoid copyright infringement. First, ensure that you are not engaging in copyright infringement by removing any files from your shared directory that you do not have permission to distribute. Second, change any potentially misleading file names that might be confused with the name of an RIAA artist or song (e.g., "Madonna"). For a more detailed explanation of this process and other ideas to avoid being treated like a criminal, visit the EFF's page on the subject at http://www.eff.org/IP/P2P/howto-notgetsued.php.


Topic maintained by Stanford Center for Internet & Society

Chilling Effects Clearinghouse - www.chillingeffects.org
Chilling Effects Clearinghouse page printed from: https://www.chillingeffects.org/piracy/notice.cgi?NoticeID=1366
disclaimer / privacy / about us & contacts