Chilling Effects
Home Weather Reports Report Receiving a Cease and Desist Notice Search the Database Topics
Sending
Topic HomeFAQsMonitoring the legal climate for Internet activity
Stanford Center for Internet & Society
 Chilling Effects Clearinghouse > Piracy or Copyright Infringement > Notices > AT&T Claims Copyright TOS Violation @Home (NoticeID 188, http://chillingeffects.org/N/188) Location: https://www.chillingeffects.org/piracy/notice.cgi?NoticeID=188

AT&T Claims Copyright TOS Violation @Home

November 05, 2001

 

Sender Information:
[Private]
Sent by: [Private]
[Private]

Recipient Information:
[Private]
[Private]


Sent via:
Re: - TOS Violation - [Copyright] - Reply Required

AT&T @Home has been made aware that you have violated the AT&T @Home Service
Agreement and/or Acceptable Usage Policy. These policies can be found online
at http://home-members.excite.com/m_policies/overview.html. Failure to
comply with these policies may result in a permanent termination of your
service. The account holder is solely responsible for any and all activities
performed from your AT&T @Home service. Please read the following
information carefully to ensure that you understand the violation, our
policies, and what you need to do to respond to this warning.


Type of violation: Distribution of Copyrighted Material


Related Policy: Service Agreement, Section 6d: Customer shall not use the
AT&T Equipment or the Service to, directly or indirectly: (d) upload, post,
publish, transmit, reproduce, create derivative works of, or distribute in
any way, information, software or other material obtained through the
Service which is protected by copyright or other proprietary right, without
obtaining permission of the owner;


Explanation: AT&T @Home has received notice and verified that you are
distributing copyrighted material as shown below via your AT&T @Home
Service.


Action Required: Discontinue posting copyrighted material in newsgroups
immediately.
A reply to this email is required. Please read this message thoroughly
before you reply, as well as our policies as they are posted online. Keep
the subject of the email unchanged. You must reply to acknowledge that you
have received this warning and will ensure that there will be no further
violations of the Service Agreement.


General information regarding the security of your AT&T @Home connection can
be found at http://home-members.excite.com/m_policies/overview.html

Related Logs/Evidence:


IDSA: INTERACTIVE DIGITAL SOFTWARE ASSOCIATION
Thursday, November 01, 2001
Dear copyrightabuse@excitehome.net,
I am an authorized representative of the Interactive Digital Software
Association ("IDSA"), which represents the intellectual property interests of over thirty companies that publish interactive games for
video game consoles, personal computers, handheld devices and the
Internet.
IDSA is providing this letter of notification pursuant to the Digital Millennium Copyright Act and 17 USC § 512 (c) to make At Home
Corporation aware of material on its network or system that infringes
the exclusive copyright rights of one or more IDSA members. This notice
is addressed to you as the agent designated by At Home Corporation to
receive notifications of claimed infringement, as so reflected in the
current records of the U.S. Copyright Office. Under penalty of perjury,
we hereby affirm that the IDSA is authorized to act on behalf of the
IDSA members whose exclusive copyright rights we believe to be infringed
as described herein.
IDSA has a good faith belief that the Internet site found at
usenet:///ATTN mark your Spiderman fills -
e-spdman.ace infringes the rights of one or more IDSA members by
offering for download one or more unauthorized copies of one or more
game products protected by copyright, including, but not limited to:
Spider-Man (Game)
The unauthorized copies of such game product[s] appearing on, or made
available through, such site are listed and/or identified on such
Internet site by their titles, variations thereof or depictions of
associated artwork (any such game titles, copies, listings and/or other
depictions of, or references to, any contents of such game product, are
hereinafter referred to as "infringing Materials"). Based on the
information at its disposal on 10/30/2001 1:56:00 PM GMT, IDSA believes
that the statements in this notice are accurate and correctly describe
the infringing nature and status of the Infringing Material.
Accordingly, IDSA hereby requests At Home Corporation to immediately
remove or disable access to the Infringing Material at the url address
identified above.
Should you have any questions, please contact IDSA at the following
address, telephone and fax numbers, and/or e-mail address:
Interactive Digital Software Association
Attn: DMCA Enforcement
[Address]
[Phone number]
Regards,
[name]
Anti-Piracy Paralegal
------
Usenet Incident Summary
File Name: ATTN: mark your Spiderman fills - e-spdman.ace
Date: Tue Oct 30 13:56:03 GMT+00:00 2001
Admin Contact: abuse@home.net
Data
Path:
sn-us!sn-xit-01!supernews.com!newspeer.clara.net!news.clara.net!newsfeed


.freenet.de!newspeer1.nac.net!netnews.com!newshub2.rdc1.sfba.home.com!ne
ws.home.com!news1.rdc1.az.home.com.POSTED!not-for-mail

FAQ: Questions and Answers

[back to notice text]


Question: Why is "piracy" such a big issue now?

Answer: Digital technology allows perfect copies and easy distribution of some works. That makes it easier for people to make and get copies of songs or videogames, and more difficult for copyright holders (record companies, etc.) to control the works once they are released to the public. This new technology has changed the way content distributors relate with their customers, and law and business models are just trying to catch up.


[back to notice text]


Question: What are the DMCA Safe Harbor Provisions?

Answer: In 1998, Congress passed the On-Line Copyright Infringement Liability Limitation Act (OCILLA) in an effort to protect service providers on the Internet from liability for the activities of its users. Codified as section 512 of the Digital Millennium Copyright Act (DMCA), this new law exempts on-line service providers that meet the criteria set forth in the safe harbor provisions from claims of copyright infringement made against them that result from the conduct of their customers. These safe harbor provisions are designed to shelter service providers from the infringing activities of their customers. If a service provider qualifies for the safe harbor exemption, only the individual infringing customer are liable for monetary damages; the service provider's network through which they engaged in the alleged activities is not liable.


[back to notice text]


Question: What does a service provider have to do in order to qualify for safe harbor protection?

Answer: In addition to informing its customers of its policies (discussed above), a service provider must follow the proper notice and takedown procedures (discussed above) and also meet several other requirements in order to qualify for exemption under the safe harbor provisions.

In order to facilitate the notification process in cases of infringement, ISPs which allow users to store information on their networks, such as a web hosting service, must designate an agent that will receive the notices from copyright owners that its network contains material which infringes their intellectual property rights. The service provider must then notify the Copyright Office of the agent's name and address and make that information publicly available on its web site. [512(c)(2)]

Finally, the service provider must not have knowledge that the material or activity is infringing or of the fact that the infringing material exists on its network. [512(c)(1)(A)], [512(d)(1)(A)]. If it does discover such material before being contacted by the copyright owners, it is instructed to remove, or disable access to, the material itself. [512(c)(1)(A)(iii)], [512(d)(1)(C)]. The service provider must not gain any financial benefit that is attributable to the infringing material. [512(c)(1)(B)], [512(d)(2)].


[back to notice text]


Question: What are the counter-notice and put-back procedures?

Answer: In order to ensure that copyright owners do not wrongly insist on the removal of materials that actually do not infringe their copyrights, the safe harbor provisions require service providers to notify the subscribers if their materials have been removed and to provide them with an opportunity to send a written notice to the service provider stating that the material has been wrongly removed. [512(g)] If a subscriber provides a proper "counter-notice" claiming that the material does not infringe copyrights, the service provider must then promptly notify the claiming party of the individual's objection. [512(g)(2)] If the copyright owner does not bring a lawsuit in district court within 14 days, the service provider is then required to restore the material to its location on its network. [512(g)(2)(C)]

A proper counter-notice must contain the following information:

  • The subscriber's name, address, phone number and physical or electronic signature [512(g)(3)(A)]
  • Identification of the material and its location before removal [512(g)(3)(B)]
  • A statement under penalty of perjury that the material was removed by mistake or misidentification [512(g)(3)(C)]
  • Subscriber consent to local federal court jurisdiction, or if overseas, to an appropriate judicial body. [512(g)(3)(D)]

If it is determined that the copyright holder misrepresented its claim regarding the infringing material, the copyright holder then becomes liable to the person harmed for any damages that resulted from the improper removal of the material. [512(f)]

See also How do I file a DMCA counter-notice?, and the counter-notification generator.


[back to notice text]


Question: Why are copyright holders concerned about piracy?

Answer: Free speech is protected by the U.S. Constitution but so are property rights. Copyright law provides incentives for creating. One of the incentives for creating software, music, literature and other works is being able to reap the financial benefits as the creator. Illegitimate distribution of copies may prevent the copyright holder from benefiting from the sale of legitimate copies of the product. The theory is that significantly fewer people would buy copies from the copyright holder if other copies were available cheaper or for free.


[back to notice text]


Question: What rights are protected by copyright law?

Answer: The purpose of copyright law is to encourage creative work by granting a temporary monopoly in an author's original creations. This monopoly takes the form of six rights in areas where the author retains exclusive control. These rights are:

(1) the right of reproduction (i.e., copying),
(2) the right to create derivative works,
(3) the right to distribution,
(4) the right to performance,
(5) the right to display, and
(6) the digital transmission performance right.

The law of copyright protects the first two rights in both private and public contexts, whereas an author can only restrict the last four rights in the public sphere. Claims of infringement must show that the defendant exercised one of these rights. For example, if I create unauthorized videotape copies of Star Trek II: The Wrath of Khan and distribute them to strangers on the street, then I have infringed both the copyright holder's rights of reproduction and distribution. If I merely re-enact The Wrath of Khan for my family in my home, then I have not infringed on the copyright. Names, ideas and facts are not protected by copyright.

Trademark law, in contrast, is designed to protect consumers from confusion as to the source of goods (as well as to protect the trademark owner's market). To this end, the law gives the owner of a registered trademark the right to use the mark in commerce without confusion. If someone introduces a trademark into the market that is likely to cause confusion, then the newer mark infringes on the older one. The laws of trademark infringement and dilution protect against this likelihood of confusion. Trademark protects names, images and short phrases.

Infringement protects against confusion about the origin of goods. The plaintiff in an infringement suit must show that defendant's use of the mark is likely to cause such a confusion. For instance, if I were an unscrupulous manufacturer, I might attempt to capitalize on the fame of Star Trek by creating a line of 'Spock Activewear.' If consumers could reasonably believe that my activewear was produced or endorsed by the owners of the Spock trademark, then I would be liable for infringement.

The law of trademark dilution protects against confusion concerning the character of a registered trademark. Suppose I created a semi-automatic assault rifle and marketed it as 'The Lt. Uhura 5000.' Even if consumers could not reasonably believe that the Star Trek trademark holders produced this firearm, the trademark holders could claim that my use of their mark harmed the family-oriented character of their mark. I would be liable for dilution.


[back to notice text]


Question: What is vicarious liability?

Answer: Vicarious liability, a form of indirect copyright infringement, is found where an operator has (1) the right and ability to control users and (2) a direct financial benefit from allowing their acts of piracy. User agreements or Acceptable Use Policies may be evidence of an operator's authority over users. The financial benefit may include a subscription fee, advertising revenues, or even a bartered exchange for other copyrighted. Under the doctrine of vicarious liability, you may be found liable even if you do not have specific knowledge of infringing acts occurring on your site.


[back to notice text]


Question: Does a service provider have to notify its users about its policies regarding the removal of materials?

Answer: To qualify for exemption under the safe harbor provisions, the service provider must give notice to its users of its policies regarding copyright infringement and the consequences of repeated infringing activity. [512(i)(1)(A)] The notice can be a part of the contract signed by the user when signing up for the service or a page on the service provider's web site explaining the terms of use of their systems. While there are no specific rules about how this notice must be made, it must be "reasonably implemented" so that subscribers and account holders are informed of the terms. [512(i)(1)(A)]


[back to notice text]


Question: What is "intellectual property"?

Answer: Intellectual property refers to the rights one has in the product of one's intellect. This includes copyright (rights in creative expression)and patents (rights in inventions, discoveries, methods, compositions of matter, etc.) which are granted by article I, section 8 clause 8 of the US Constitution which gives Congress the power to "To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries."

Related rights include trademark (rights in the names one uses to identify one's goods and services), trade secret (confidential business practices), unfair trade practice, passing off, trade libel, false advertising, misappropriation. Laws protecting most of these rights exist at both the state and federal level. "Proprietary rights" is just a general term meaning "one's own rights."


[back to notice text]


Question: Does a copyright owner have to specify the exact materials it alleges are infringing?

Answer: Proper notice under the safe harbor provisions requires the copyright owners to specifically identify the alleged infringing materials, or if the service provider is an "information location tool" such as a search engine, to specifically identify the links to the alleged infringing materials. [512(c)(3)(iii)], [512(d)(3)]. The provisions also require the copyright owners to identify the copyrighted work, or a representative list of the copyrighted works, that is claimed to be infringed. [512(c)(3)(A)(ii)]. Rather than simply sending a letter to the service provider that claims that infringing material exists on their system, these qualifications ensure that service providers are given a reasonable amount of information to locate the infringing materials and to effectively police their networks. [512(c)(3)(A)(iii)], [512(d)(3)].

However, in the recent case of ALS Scan, Inc. v. Remarq Communities, Inc., the court found that the copyright owner did not have to point out all of the infringing material, but only substantially all of the material. The relaxation of this specificity requirement shifts the burden of identifying the material to the service provider, raising the question of the extent to which a service provider must search through its system. OSP customers should note that this situation might encourage OSP's to err on the side of removing allegedly infringing material.


[back to notice text]


Question: What are the notice and takedown procedures for web sites?

Answer: In order to have an allegedly infringing web site removed from a service provider's network, or to have access to an allegedly infringing website disabled, the copyright owner must provide notice to the service provider with the following information:

  • The name, address, and electronic signature of the complaining party [512(c)(3)(A)(i)]
  • The infringing materials and their Internet location [512(c)(3)(A)(ii-iii)], or if the service provider is an "information location tool" such as a search engine, the reference or link to the infringing materials [512(d)(3)].
  • Sufficient information to identify the copyrighted works [512(c)(3)(A)(iv)].
  • A statement by the owner that it has a good faith belief that there is no legal basis for the use of the materials complained of [512(c)(3)(A)(v)].
  • A statement of the accuracy of the notice and, under penalty of perjury, that the complaining party is authorized to act on the behalf of the owner [512(c)(3)(A)(vi)].

Once notice is given to the service provider, or in circumstances where the service provider discovers the infringing material itself, it is required to expeditiously remove, or disable access to, the material. The safe harbor provisions do not require the service provider to notify the individual responsible for the allegedly infringing material before it has been removed, but they do require notification after the material is removed.


[back to notice text]


Question: If I am accused of "piracy," what does this mean?

Answer: "Piracy" is slang for copyright infringment, usually used to describe the unlawful copying of software, videogames, movies or MP3s. Copyright law gives a creator of software, music, literature and other works a limited monopoly to reproduce or distribute in the created work. If you are accused of piracy, then someone is claiming that you have violated their copyright by copying part or all of their work without authorization, or have enabled other people to make such copies.


[back to notice text]


Question: I run a website but I never actually upload or download copyrighted materials. Could I be liable for what visitors to my site do?

Answer: You could. Under certain circumstances, bulletin board operators and webmasters can be subject to both civil and criminal liability for contributory or vicarious copyright infringement when unauthorized copies of software (or the direct means to obtain such software) are found on their sites. If you know that people are using your site to find warez or cracked video games, you may have an obligation to do something about it, particularly if you benefit financially in any way, or are able to control the unlawful copying. You can protect yourself by complying with the DMCA Safe Harbor.


[back to notice text]


Question: Am I protected by Digital Millennium Copyright Act's Safe Harbor?

Answer: You may be, if you follow the DMCA's strict requirements, though different courts have disagreed on how to apply the protections. The DMCA, in the Safe Harbor provisions of 17 U.S.C. 512, limits the liability of "online service providers" (OSPs) for copyright infringement by their users. Though some debate remains over who qualifies as an OSP, the rule's history suggests that website and bulletin board operators qualify for its protections. The Safe Harbors apply to:
1. Storage of material on a system at a user's request. (e.g. pirated software, serial numbers or cracker utilities posted on message boards or in chat rooms)
2. Referral to other online resources. (e.g. linking to other sites that make infringing material available)
3. Caching of online materials from other sites. (e.g. temporary storage of other web pages on one's own server)
4. Acting as a conduit between users. (e.g. automatic delivery of e-mail between users)

In order to be protected for storage and linking (1 and 2, above), you must:
i. Lack actual knowledge and immediately remove or block access to the material when becoming aware of the infringement
ii. Not benefit financially from the activity
iii. Comply with the notice and takedown provisions and set up an agent to deal with complaints in accordance with the Act

In order to be protected for acting as a conduit (4, above):
i. A person other than the OSP must initiate the transmission
ii. The process must happen automatically, without any selection or modification of material or recipients by the OSP
iii. No copies of the material should be kept longer than necessary by the OSP


Topic maintained by Stanford Center for Internet & Society

Chilling Effects Clearinghouse - www.chillingeffects.org
Chilling Effects Clearinghouse page printed from: https://www.chillingeffects.org/piracy/notice.cgi?NoticeID=188
disclaimer / privacy / about us & contacts