| ![]() | ||||||||||||||||||||
| Chilling Effects Clearinghouse > Piracy or Copyright Infringement > Notices > Titan Complains of Image Infringement by Student (NoticeID 837, http://chillingeffects.org/N/837) | Location: https://www.chillingeffects.org/piracy/notice.cgi?NoticeID=837 |
September 03, 2003
|
Sender Information: |
Recipient Information:
[Private]
[Private]
Eugene, OR, 97403, USA
Sent via: email
Re: Re: Cease and Desist and Notice of DMCA Claim of Infringement [Notice ID: [private]]
From: [Private] Fwd: Re: Cease and Desist and Notice of DMCA Claim of Infringement [Notice ID: [private]] (fwd) -----BEGIN PGP SIGNED MESSAGE----- [Private], We received a Digital Millenium Copyright Act (DMCA) notice indicating lease [Private] Since this incident violates the [Private] Acceptable Use Policy the matter is Attached is the original complaint. Sincerely, Acceptable Use Policy Officer -----BEGIN PGP SIGNATURE----- iQCVAwUBP1Z8ycV+r+BcytBFAQEZ0QQAgv246Mxi2VUI+R4uHzasOxwvwPkyfle9
To: [Private]
CC: [Private], [Assoc. Dean]
that the IP address [Private] was engaged in unauthorized
distribution of copyrighted material. From available network and systems
information we were able to determine that the IP address in question was
assigned to your laptop at the time of the incident.
hardware ethernet [Private];
client-hostname "[Private]";
also being forwarded to Student Judicial Affairs for further
investigation/action.
[Private]
User Services and
Network Applications
voice #: [Private]
[Private]
>Date: Fri, 22 Aug 2003 11:26:28 -0700
>From: [Private]
>Subject: Re: Cease and Desist and Notice of DMCA Claim of Infringement [Notice
> ID: [private]]
>To: [Private]
>Reply-to: [Private]
>X-Library: Indy 9.0.11
>Original-recipient: [Private]
>X-OriginalArrivalTime: 22 Aug 2003 18:17:51.0541 (UTC)
> FILETIME=[B2EA7E50:01C368D9]
>
>-----BEGIN PGP SIGNED MESSAGE-----
>Hash: SHA1
>
>To:
>Registered Agent for: [Private]
>[Private]
>
>
>
>
>Notice ID: [private]
>
>From: [Private].
>
>Date: 22 Aug 2003 17:27:06 GMT
>
>Re: Notice of DMCA Claim of Infringement
>
>The above-referenced entity is hereby given notice of infringing acts
>valid under the DMCA copyright infringement notification requirements (17
>U.S.C. 512). I am the designated agent of the registered owner of the
>copyrights for the images and/or audio/visual works listed below. I
>believe your subscriber or account holder, identified below by the
>infringing IP address(es), used these works, at the dates and times cited
>below in a manner that was not authorized by the owner of the copyrights,
>its agent, or the law.
>
>I certify under penalty of perjury that I have a good faith belief the
>information contained in this notification is accurate to the best of my
>knowledge, and that I am authorized to act on behalf of the owner of the
>aforementioned copyright- protected materials.
>
>The verified and documented infringements listed below were traced to URLs
>and/or IP addresses controlled by your company. We demand that, upon
>receipt of this notification of claimed infringement, you expeditiously
>notify the subscriber or account holder to whom you assigned the IP
>address(es) on the date(s) listed and demand that he or she immediately
>remove the infringing material and cease and desist trading or sharing
>TITAN Media property. Under 17 U.S.C. 512(i), service providers are not
>eligible for the limitations on liability established by 17 U.S.C. 512
>[including those established in subsection (a)] unless they have adopted
>and reasonably implemented, and informed subscribers and account holders a
>policy that provides for the termination in appropriate circumstances of
>subscribers and account holders who are repeat infringers. Informing
>subscribers and account holders of acts of infringement is a crucial
>element to a policy providing for the termination of repeat infringers.
>
>This letter does not constitute an exhaustive statement of TITAN Media's
>legal position, nor is it a waiver of any of our rights and/or remedies in
>this or any other matter, all of which are expressly reserved. Your
>immediate attention to this matter is expected and appreciated.
>
>When responding to this communication, please retain the Subject Notice ID
>number in the Subject field.
>
>You may receive a subpoena requiring you to provide the name and other
>identifying information for this subscriber and are therefore requested to
>retain all files and documents necessary to recover that data.
>
>NOTE TO ISP: PLEASE FORWARD THIS ENTIRE MESSAGE TO THE SUBSCRIBER OR
>ACCOUNT HOLDER. THIS MAY ENABLE US TO RESOLVE THE ISSUE AND ARRANGE FOR
>RESTITUTION WITHOUT ISSUING A SUBPOENA TO YOU AS PROVIDED FOR UNDER 17
>U.S.C. 512 (h).
>
>NOTE TO SUBSCRIBER OR ACCOUNT HOLDER: YOU ARE AT RISK OF BEING SUED FOR
>YOUR ILLEGAL ACTIONS. TO DETERMINE HOW YOU MAY BE ABLE TO AVOID A
>LAWSUIT, REFER TO www.TitanLegal.com.
>
>
>
>Sincerely,
>
>
>
[Private]
>General Counsel, TITAN Media Inc.
>[Private]
[Private]
>
[Private]
>
>Notice ID: [private]
>
>Infringing Files that must be removed and/or blocked from access are:
>
>Title: Tourist Trade
>Infringement Source: FastTrack
>Infringement Timestamp: 20 Aug 2003 20:36:00 GMT
>Infringer Username: [Private]
>Infringing Filename: [Private]
>Infringing Filesize: 847906816
>Infringer IP Address: [Private]
>Infringer DNS Name: [Private]
>Infringing URL: [Private]
>
>
>
>
>-----BEGIN PGP SIGNATURE-----
>Version: 8.0
>
>iQA/AwUBP0ZgVCz7uxPzTUswEQJD8ACfTB6hqaae4eN/fbzaQe8/X4iIKY0AoI/r
>IYuAtv6q9e/VcQVgyWtC+MJI
>=TftE
>-----END PGP SIGNATURE-----
Version: 2.6.3a
Charset: noconv
az8WNI0ZlsEoDiUZxoUVL/eaet2gwjdmCrFxiiLDOSFCexKHFS3uRk/j/ngEezVK
JHNiX4nTuC8cyJqxsgT00fS5RUuyuARKAdlzjPxnnYsBn9wPzVTAKWzYG/wQUsnm
O9nT+P2iVzk=
=7uZ/
-----END PGP SIGNATURE-----
|
Question: What does a request to "cease and desist" mean? Answer: A request to cease and desist is basically asking the party to immediately stop the infriging behavior and then permanently refrain from it. Question: What is copyright infringement? Are there any defenses? Answer: Infringement occurs whenever someone who is not the copyright holder (or a licensee of the copyright holder) exercises one of the exclusive rights listed above. The most common defense to an infringement claim is "fair use," a doctrine that allows people to use copyrighted material without permission in certain situations, such as quotations in a book review. To evaluate fair use of copyrighted material, the courts consider four factors:
The most significant factor in this analysis is the fourth, effect on the market. If a copier's use supplants demand for the original work, then it will be very difficult for him or her to claim fair use. On the other hand, if the use does not compete with the original, for example because it is a parody, criticism, or news report, it is more likely to be permitted as "fair use." Trademarks are generally subject to fair use in two situations: First, advertisers and other speakers are allowed to use a competitor's trademark when referring to that competitor's product ("nominative use"). Second, the law protects "fair comment," for instance, in parody. Question: What are the DMCA's anti-circumvention provisions?
Answer: The Digital Millennium Copyright Act (DMCA) is the latest amendment to copyright law, which introduced a new category of copyright violations that prohibit the "circumvention" of technical locks and controls on the use of digital content and products. These anti-circumvention provisions put the force of law behind any technological systems used by copyright owners to control access to and copying of their digital works. The DMCA contains four main provisions:
The first provision prohibits the act of circumventing technological protection systems, the second and third ban technological devices that facilitate the circumvention of access control or copy controls, and the fourth prohibits individuals from removing information about access and use devices and rules. The first three provisions are also distinguishable in that the first two provisions focus on technological protection systems that provide access control to the copyright owner, while the third provision prohibits circumvention of technological protections against unauthorized duplication and other potentially copyright infringing activities. Question: What are the penalties for copyright infringement, such as making infringing copies of software? Answer: In a civil suit, an infringer may be liable for a copyright owner's actual damages plus any profits made from the infringement. Alternatively, the copyright owner may avoid proving actual damage by electing a statutory damage recovery of up to $30,000 or, where the court determines that the infringement occurred willfully, up to $150,000. The actual amount will be based upon what the court in its discretion considers just. (17 U.S.C. 504) Violation of copyright law is also considered a federal crime when done willfully with an intent to profit. Criminal penalties include up to ten years imprisonment depending on the nature of the violation. (No Electronic Theft Act, 18 U.S.C. 2319) Question: ISP as Copyright Cop Answer: Notice that this letter comes from an Internet Service Provider (ISP) and not from a copyright owner. The Digital Millenium Copyright Act both protects ISPs from copyright liability (leaving the end user with that liability) and requires ISPs to participiate in a "takedown" process when copyright owners claim infriging use. See the FAQs associated with this notice for more information. Question: What are the notice and takedown procedures for web sites?
Answer: In order to have an allegedly infringing web site removed from a service provider's network, or to have access to an allegedly infringing website disabled, the copyright owner must provide notice to the service provider with the following information:
Once notice is given to the service provider, or in circumstances where the service provider discovers the infringing material itself, it is required to expeditiously remove, or disable access to, the material. The safe harbor provisions do not require the service provider to notify the individual responsible for the allegedly infringing material before it has been removed, but they do require notification after the material is removed. Question: Who may hold a copyright? Answer: A copyright ordinarily vests in the creator or creators of a work (known as the author(s)), and is inherited as ordinary property. Copyrights are freely transferrable as property, at the discretion of the owner. 17 U.S.C. Question: What rights are protected by copyright law? Answer: The purpose of copyright law is to encourage creative work by granting a temporary monopoly in an author's original creations. This monopoly takes the form of six rights in areas where the author retains exclusive control. These rights are: (1) the right of reproduction (i.e., copying), The law of copyright protects the first two rights in both private and public contexts, whereas an author can only restrict the last four rights in the public sphere. Claims of infringement must show that the defendant exercised one of these rights. For example, if I create unauthorized videotape copies of Star Trek II: The Wrath of Khan and distribute them to strangers on the street, then I have infringed both the copyright holder's rights of reproduction and distribution. If I merely re-enact The Wrath of Khan for my family in my home, then I have not infringed on the copyright. Names, ideas and facts are not protected by copyright. Trademark law, in contrast, is designed to protect consumers from confusion as to the source of goods (as well as to protect the trademark owner's market). To this end, the law gives the owner of a registered trademark the right to use the mark in commerce without confusion. If someone introduces a trademark into the market that is likely to cause confusion, then the newer mark infringes on the older one. The laws of trademark infringement and dilution protect against this likelihood of confusion. Trademark protects names, images and short phrases. Infringement protects against confusion about the origin of goods. The plaintiff in an infringement suit must show that defendant's use of the mark is likely to cause such a confusion. For instance, if I were an unscrupulous manufacturer, I might attempt to capitalize on the fame of Star Trek by creating a line of 'Spock Activewear.' If consumers could reasonably believe that my activewear was produced or endorsed by the owners of the Spock trademark, then I would be liable for infringement. The law of trademark dilution protects against confusion concerning the character of a registered trademark. Suppose I created a semi-automatic assault rifle and marketed it as 'The Lt. Uhura 5000.' Even if consumers could not reasonably believe that the Star Trek trademark holders produced this firearm, the trademark holders could claim that my use of their mark harmed the family-oriented character of their mark. I would be liable for dilution. Question: Does a cease and desist letter recipient have a duty to remove materials alleged to infringe copyright? Answer: The cease and desist letter gives its recipient ("you") notice that someone is claiming something you've done or something on your site infringes a copyright. If the materials that are the subject of the notice are in fact infringing, then you do have a duty to remove them, although there may be statutory provisions (DMCA Safe Harbor) that protect you from a lawsuit if the materials were posted by someone else. You may have to give the poster notice of the complaint. If you do not believe that the materials are infringing, or if you believe that you are making fair use of the materials, you may choose to take the risk of not removing the materials, but a lawsuit might follow in which the complainer tries to prove they they are right and you are wrong. If the accuser obtains a court order, then you must take down the materials. Question: ISP as Copyright Cop Answer: Notice that this letter comes from an Internet Service Provider (ISP) and not from a copyright owner. The Digital Millenium Copyright Act both protects ISPs from copyright liability (leaving the end user with that liability) and requires ISPs to participiate in a "takedown" process when copyright owners claim infriging use. See the FAQs associated with this notice for more information. Question: What is a subpoena (also spelled "subpena")? Answer: A subpoena is a formal demand that a person or company produce evidence in or for a civil or criminal lawsuit. A subpoena duces tecum (the kind most commonly used in John Doe cases) requires only the production of identified documents or categories of documents. Question: Can a copyright owner find out the identity of the individual responsible for the allegedly infringing material? Answer: The safe harbor provisions permit a copyright owner to subpoena the identity of the individual allegedly responsible for the infringing activities. [512(h)] Such a subpoena is granted on the condition that the information about the individual's identity will only be used in relation to the protection of the intellectual property rights of the copyright owner. [512(h)(2)(C)] The DMCA subpoena provision does not apply to requests for the identities of users of ISP conduit 512(a) services, but only to users of hosting or linking, for which a takedown may be sent under 512(c)(3)(A). Thus DMCA subpoenas cannot be used to find the identities of users engaged in peer-to-peer filesharing. Recording Industry Assoc. of America v. Verizon Internet Svcs., Inc. Question: What are the possible penalties for copyright infringement?
Answer: Under the Copyright Act, penalties for copyright infringement can include:
A copyright owner can only sue for infringement on a work whose copyright was registered with the Copyright Office, and can get statutory damages and attorney's fees only if the copyright registration was filed before infringement or within three months of first publication. (17 U.S.C. 411 and 412) |
|
|