| ![]() | ||||||||||||||||||||
| Chilling Effects Clearinghouse > Piracy or Copyright Infringement > Notices > BSA demands Comcast user cease & desist (NoticeID 713, http://chillingeffects.org/N/713) | Location: https://www.chillingeffects.org/piracy/notice.cgi?NoticeID=713 |
July 17, 2003
|
Sender Information: |
Recipient Information:
[Individual user (through Comcast)]
[Private]
Sent via: email
Re: Policy Violation (Copyright - Serving) [TICKET_ID: ???????] {RPTR}:W:
* * * IMMEDIATE ACTION and REPLY REQUIRED * * * Please read this entire message, review the required action(s) below, and send a prompt From: Comcast Abuse Department [abuse@comcast.net] Comcast has been made aware that you have violated the Comcast Service Agreement and/or Type of violation: Distribution of Copyrighted Material Related Policy: Acceptable Usage Policy: (i) undertake or accomplish any unlawful purpose. This includes, but is not limited to, posting, storing, transmitting or disseminating information, data or material which is libelous, obscene, unlawful, threatening, defamatory, or which infringes the intellectual property rights of any person or entity, or which in any way constitutes or encourages conduct that would constitute a criminal offense, give rise to civil liability, or otherwise violate any local, state, federal or international law, order or regulation; (v) upload, post, publish, transmit, reproduce, create derivative works of, or distribute in any way information, software or other material obtained through the Service or otherwise that is protected by copyright or other proprietary right, without obtaining permission of the owner; (xiv) run programs, equipment, or servers from the Premises that provide network content or any other services to anyone outside of your Premises LAN (Local Area Network), also commonly referred to as public services or servers. Examples of prohibited services and servers include, but are not limited to, e-mail, Web hosting, file sharing, and proxy services and servers; Explanation: Comcast has received notification of alleged copyright infringement Action Required: We will require your timely assistance in blocking accessibility to *NOTE* Information regarding the security of your Comcast connection can be found on our web Related Logs / Evidence: Wednesday, June 18, 2003 Microsoft Office The Business Software Alliance (BSA) has determined that the connection lis= Infringement Details: What was located as infringing content:=20 The above computer program(s) is/are being made available for copying, thro= Based upon BSA's representation of the copyright owners in anti-piracy matt= We are giving notice of these activities pursuant to Section 512 of Title=20= We appreciate your cooperation in this matter. Please advise us regarding=20= Please include the following CaseID in any response you send: Case ID 79556= Yours sincerely, Washington, DC 20036 Should you have any questions regarding this matter, please call me at 1-888-(9am - 5pm MST mon - fri). Thank you, [Private] --- DO NOT REMOVE TEXT BELOW THIS LINE ---
reply message to acknowledge receipt of this email.
Acceptable Usage Policy. These policies can be found at
http://www.comcast.net/terms" name="text_LinkID" class="nlink" target="_new">http://www.comcast.net/terms. Failure to comply with these policies may
result in a permanent termination of your service. The account holder is solely
responsible for any and all activities performed from the Comcast service. Please read
the following information carefully to ensure that you understand the violation, our
policies, and what you need to do to respond to this warning.
Prohibited uses include, but are not limited to, using the Service, Customer Equipment, or the Comcast Equipment to:
originating from the Comcast account registered to you.
the alleged infringed materials and then notifying us when the materials are no longer
publicly available. By federal guidelines stated within the DMCA, this matter needs to
be resolved quickly. We will therefore require your immediate investigation into this
notification.
Additionally, please be advised that should Comcast receive further copyright
infringement complaints related to your Comcast Internet account, Comcast may terminate
the account in accordance with the Comcast Acceptable Usage Policy (AUP).
page: http://www.comcast.net/terms. This web page also provides links to our
Subscriber Agreement and Acceptable Use Policy (AUP), please review these policies
should you have any questions or concerns.
RE: Unauthorized Distribution of the following copyrighted computer progra=
m(s):
ted below, which appears to be using an Internet account under your control=
, is using a FastTrack network to offer unlicensed copies of copyrighted=20=
computer programs published by the BSA's member companies.
------------------------------
Last Found: 18 Jun 2003 06:30:07 EDT (GMT -0400)
Network: KaZaA
IP Address: (removed)
IP Port: 1214
Protocol: FastTrack
Username: (removed)
------------------------------
Filename: Office XP.exe (404,601kb)
ugh downloading, at the above location without authorization from the copyr=
ight owner(s).
ers, we have a good faith belief that none of the materials or activities=20=
listed above have been authorized by the rightholders, their agents, or the=
law. BSA represents that the information in this notification is accurate=
and states, under penalty of perjury, that it is authorized to act in this=
matter on behalf of the copyright owners listed above.
17 of the U.S. Code (as enacted by the 'Online Copyright Infringement Liabi=
lity Limitation Act'). We expect that you will take expeditious action to=20=
remove or disable access to the materials described above, and thereby prev=
ent the illegal reproduction and distribution of pirated software via your=20=
company's network. As you know, illegal on-line activities can result in=20=
50 million people on the Internet accessing and downloading a copyrighted=20=
product worldwide without authorization - a highly damaging activity for=20=
the copyright holder.
what actions you take.
6
[Private]
Manager of Investigations
Business Software Alliance
URL: http://www.bsa.org
E-mail: @bsa.org
------------------------------------------------------------------------------------------------------------------
Comcast
Network Abuse and Policy Observance
|
Question: If I am accused of "piracy," what does this mean? Answer: "Piracy" is slang for copyright infringment, usually used to describe the unlawful copying of software, videogames, movies or MP3s. Copyright law gives a creator of software, music, literature and other works a limited monopoly to reproduce or distribute in the created work. If you are accused of piracy, then someone is claiming that you have violated their copyright by copying part or all of their work without authorization, or have enabled other people to make such copies. Question: Does a service provider have to notify its users about its policies regarding the removal of materials?
Answer: To qualify for exemption under the safe harbor provisions, the service provider must give notice to its users of its policies regarding copyright infringement and the consequences of repeated infringing activity. [512(i)(1)(A)] The notice can be a part of the contract signed by the user when signing up for the service or a page on the service provider's web site explaining the terms of use of their systems. While there are no specific rules about how this notice must be made, it must be "reasonably implemented" so that subscribers and account holders are informed of the terms. [512(i)(1)(A)] Question: What happens if an individual is found to repeatedly infringe?
Answer: The safe harbor provisions require the service provider to include in its copyright infringement policies a termination policy that results in individuals who repeatedly infringe copyrighted material being removed from the service provider networks. [512(i)(1)(A)] This termination policy must be made public in the terms of use that the service provider includes in its contracts or on its web site. Question: Does a cease and desist letter recipient have a duty to remove materials alleged to infringe copyright? Answer: The cease and desist letter gives its recipient ("you") notice that someone is claiming something you've done or something on your site infringes a copyright. If the materials that are the subject of the notice are in fact infringing, then you do have a duty to remove them, although there may be statutory provisions (DMCA Safe Harbor) that protect you from a lawsuit if the materials were posted by someone else. You may have to give the poster notice of the complaint. If you do not believe that the materials are infringing, or if you believe that you are making fair use of the materials, you may choose to take the risk of not removing the materials, but a lawsuit might follow in which the complainer tries to prove they they are right and you are wrong. If the accuser obtains a court order, then you must take down the materials. Question: What rights are protected by copyright law? Answer: The purpose of copyright law is to encourage creative work by granting a temporary monopoly in an author's original creations. This monopoly takes the form of six rights in areas where the author retains exclusive control. These rights are: (1) the right of reproduction (i.e., copying), The law of copyright protects the first two rights in both private and public contexts, whereas an author can only restrict the last four rights in the public sphere. Claims of infringement must show that the defendant exercised one of these rights. For example, if I create unauthorized videotape copies of Star Trek II: The Wrath of Khan and distribute them to strangers on the street, then I have infringed both the copyright holder's rights of reproduction and distribution. If I merely re-enact The Wrath of Khan for my family in my home, then I have not infringed on the copyright. Names, ideas and facts are not protected by copyright. Trademark law, in contrast, is designed to protect consumers from confusion as to the source of goods (as well as to protect the trademark owner's market). To this end, the law gives the owner of a registered trademark the right to use the mark in commerce without confusion. If someone introduces a trademark into the market that is likely to cause confusion, then the newer mark infringes on the older one. The laws of trademark infringement and dilution protect against this likelihood of confusion. Trademark protects names, images and short phrases. Infringement protects against confusion about the origin of goods. The plaintiff in an infringement suit must show that defendant's use of the mark is likely to cause such a confusion. For instance, if I were an unscrupulous manufacturer, I might attempt to capitalize on the fame of Star Trek by creating a line of 'Spock Activewear.' If consumers could reasonably believe that my activewear was produced or endorsed by the owners of the Spock trademark, then I would be liable for infringement. The law of trademark dilution protects against confusion concerning the character of a registered trademark. Suppose I created a semi-automatic assault rifle and marketed it as 'The Lt. Uhura 5000.' Even if consumers could not reasonably believe that the Star Trek trademark holders produced this firearm, the trademark holders could claim that my use of their mark harmed the family-oriented character of their mark. I would be liable for dilution. Question: What is copyright infringement? Are there any defenses? Answer: Infringement occurs whenever someone who is not the copyright holder (or a licensee of the copyright holder) exercises one of the exclusive rights listed above. The most common defense to an infringement claim is "fair use," a doctrine that allows people to use copyrighted material without permission in certain situations, such as quotations in a book review. To evaluate fair use of copyrighted material, the courts consider four factors:
The most significant factor in this analysis is the fourth, effect on the market. If a copier's use supplants demand for the original work, then it will be very difficult for him or her to claim fair use. On the other hand, if the use does not compete with the original, for example because it is a parody, criticism, or news report, it is more likely to be permitted as "fair use." Trademarks are generally subject to fair use in two situations: First, advertisers and other speakers are allowed to use a competitor's trademark when referring to that competitor's product ("nominative use"). Second, the law protects "fair comment," for instance, in parody. Question: What is "intellectual property"? Answer: Intellectual property refers to the rights one has in the product of one's intellect. This includes copyright (rights in creative expression)and patents (rights in inventions, discoveries, methods, compositions of matter, etc.) which are granted by article I, section 8 clause 8 of the US Constitution which gives Congress the power to "To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries." Related rights include trademark (rights in the names one uses to identify one's goods and services), trade secret (confidential business practices), unfair trade practice, passing off, trade libel, false advertising, misappropriation. Laws protecting most of these rights exist at both the state and federal level. "Proprietary rights" is just a general term meaning "one's own rights." Question: What are the possible penalties for copyright infringement?
Answer: Under the Copyright Act, penalties for copyright infringement can include:
A copyright owner can only sue for infringement on a work whose copyright was registered with the Copyright Office, and can get statutory damages and attorney's fees only if the copyright registration was filed before infringement or within three months of first publication. (17 U.S.C. 411 and 412) Question: What is copyright protection? Answer: A copyright protects a literary, musical, dramatic, choreographic, pictoral or graphic, audiovisual, or architectural work, or a sound recording, from being reproduced without the permision of the copyright owner. 17 U.S.C. Question: What is contributory infringement? Answer: The other form of indirect infringement, contributory infringement, requires (1) knowledge of the infringing activity and (2) a material contribution -- actual assistance or inducement -- to the alleged piracy. Posting access codes from authorized copies of software, serial numbers, or other tools to assist in accessing such software may subject you to liability. Providing a forum for uploading and downloading any copyrighted file or cracker utility may also be contributory infringement. Even though you may not actually make software directly available on your site, providing assistance (or supporting a forum in which others may provide assistance) in locating unauthorized copies of software, links to download sites, server space, or support for sites that do the above may contributorily infringe. Question: Does a cease and desist letter recipient have a duty to remove materials alleged to infringe copyright? Answer: The cease and desist letter gives its recipient ("you") notice that someone is claiming something you've done or something on your site infringes a copyright. If the materials that are the subject of the notice are in fact infringing, then you do have a duty to remove them, although there may be statutory provisions (DMCA Safe Harbor) that protect you from a lawsuit if the materials were posted by someone else. You may have to give the poster notice of the complaint. If you do not believe that the materials are infringing, or if you believe that you are making fair use of the materials, you may choose to take the risk of not removing the materials, but a lawsuit might follow in which the complainer tries to prove they they are right and you are wrong. If the accuser obtains a court order, then you must take down the materials. Question: What are the DMCA's anti-circumvention provisions?
Answer: The Digital Millennium Copyright Act (DMCA) is the latest amendment to copyright law, which introduced a new category of copyright violations that prohibit the "circumvention" of technical locks and controls on the use of digital content and products. These anti-circumvention provisions put the force of law behind any technological systems used by copyright owners to control access to and copying of their digital works. The DMCA contains four main provisions:
The first provision prohibits the act of circumventing technological protection systems, the second and third ban technological devices that facilitate the circumvention of access control or copy controls, and the fourth prohibits individuals from removing information about access and use devices and rules. The first three provisions are also distinguishable in that the first two provisions focus on technological protection systems that provide access control to the copyright owner, while the third provision prohibits circumvention of technological protections against unauthorized duplication and other potentially copyright infringing activities. Question: What are the notice and takedown procedures for web sites?
Answer: In order to have an allegedly infringing web site removed from a service provider's network, or to have access to an allegedly infringing website disabled, the copyright owner must provide notice to the service provider with the following information:
Once notice is given to the service provider, or in circumstances where the service provider discovers the infringing material itself, it is required to expeditiously remove, or disable access to, the material. The safe harbor provisions do not require the service provider to notify the individual responsible for the allegedly infringing material before it has been removed, but they do require notification after the material is removed. Question: Aren't I allowed to make a backup copy of my software? Answer: Yes, but only for specifically authorized archival purposes, as specified in 17 U.S.C. sec. 117(2). This does not authorize sharing or selling of backup copies. The rule allows transfer to another person only with the explicit authorization of the copyright owner and only if he original copy is transferred. Backups for individual use and those considered "an essential step" in using the software with an individual's computer are also authorized. Question: Is all copying piracy?
Answer: No. Copyright gives the owner exclusive rights to reproduce, adapt, publicly distribute, perform and display their work. Nonetheless, the law allows "fair use" of copyrighted material. Fair use permits, in certain circumstances, the use or copying of all or a portion of a copyrighted work without the permission of the owner. Copyrighted works may be used for purposes such as criticism, comment, news reporting, teaching, scholarship, or research. To decide whether a use is "fair use" or not, courts consider, in part: Courts balance these factors, placing an emphasis on the fourth, however rulings have been unpredictable. Parody may be protected by fair use where the user is actually making a comment on or criticism of the copyrighted material, even if a profit is made from the use. Still, distributing copyrighted software will rarely be fair use because people will use those copies instead of buying the software from the legitimate vendor. Question: What are the notice and takedown procedures for web sites?
Answer: In order to have an allegedly infringing web site removed from a service provider's network, or to have access to an allegedly infringing website disabled, the copyright owner must provide notice to the service provider with the following information:
Once notice is given to the service provider, or in circumstances where the service provider discovers the infringing material itself, it is required to expeditiously remove, or disable access to, the material. The safe harbor provisions do not require the service provider to notify the individual responsible for the allegedly infringing material before it has been removed, but they do require notification after the material is removed. Question: I didn Answer: No. Copyright infringement actions do not require that you actually knew that the files were protected by copyright or that your use of the files violated federal law. Claims of ignorance cannot be used as a defense to direct copyright infringement, Lack of knowledge, is, however, a defense to contributory infringement. See What is contributory infringement? Question: Why is "piracy" such a big issue now? Answer: Digital technology allows perfect copies and easy distribution of some works. That makes it easier for people to make and get copies of songs or videogames, and more difficult for copyright holders (record companies, etc.) to control the works once they are released to the public. This new technology has changed the way content distributors relate with their customers, and law and business models are just trying to catch up. |
|
|