Professor Wendy Seltzer, email wendy.seltzer@brooklaw.edu
Week 4: Copyright 1, Direct Infringement |
|
For further reading (optional):
Copyright is a statutory bundle of rights of the copyright holder, limited by
exceptions including fair use.
17 U.S.C. § 106. Exclusive rights in copyrighted works
Subject to sections 107 through 122, the owner of copyright under this title has the exclusive rights to do and to authorize any of the following:
(1) to reproduce the copyrighted work in copies or phonorecords;
(2) to prepare derivative works based upon the copyrighted work;
(3) to distribute copies or phonorecords of the copyrighted work to the public by sale or other transfer of ownership, or by rental, lease, or lending;
(4) in the case of literary, musical, dramatic, and choreographic works, pantomimes, and motion pictures and other audiovisual works, to perform the copyrighted work publicly;
(5) in the case of literary, musical, dramatic, and choreographic works, pantomimes, and pictorial, graphic, or sculptural works, including the individual images of a motion picture or other audiovisual work, to display the copyrighted work publicly; and
(6) in the case of sound recordings, to perform the copyrighted work publicly by means of a digital audio transmission.
Read Playboy Enterprises v. Webbworld and MAI Systems Corp. v. Peak Computer, Inc.
with an eye to the question of what is a copy? Does the
Webbworld court have difficulty with this question? Does MAI v. Peak? Do the
courts decisions seem like good law? Good policy?
Follow-up to MAI and U.S. v. LaMacchia show Congressional response to developments in
copyright law and technology. In each case, Congress acted quickly to overrule specific
results of the cases, in one creating a new exception to copyright, in
the other, expanding the scope of criminal copyright infringement.
In Kelly v. Arriba Soft, the defendant image search engine conceded copying plaintiffs
photos, but claimed that copying into its database and display of thumbnail images
in response to searches was fair use. Follow the four-factor fair use analysis.
What were the photographers strongest arguments? What were the search engines? A second
issue in this case involved the display of inline images: when you clicked
a thumbnail in the search results, you would be shown the full-size image,
drawn from its original site but without any of the host sites surrounding
content. The Ninth Circuit did not address this issue for procedural reasons, and
the case settled before the district court could. How would your fair use
analysis compare for this aspect of image search?
Internet technology enables lots of creative juxtapositions of copyrighted works: search engines, sampling, web-based commentary, and re-mixing. Where is the line between creative re-use and infringement? Where does The Grey Album, see <http://www.greytuesday.org/>, fall? Creative Commons offers copyright licenses to make it easy for creators to encourage re-use of their works, with some rights reserved instead of all. Explore the Creative Commons website, <http://creativecommons.org/>, to see how the licenses work and the types of media to which people have applied them.
II. FACTUAL BACKGROUND
Since approximately 1953, Playboy Enterprises, Inc. ("PEI"), has published the monthly Playboy magazine
and other publications. It is undisputed here that PEI
holds valid copyrights for
the images in its magazine issues and other publications.
Defendant Webbworld, Inc. ("Webbworld"), is a Texas corporation that operated "Netpics," an adult-oriented
site on the Internet's World Wide Web, from about May 1996 until February
1997. Webbworld ceased operating at that time upon seizure of their equipment in
a raid by the Fort Worth police on charges of child pornography. The
gravamen of PEI's Complaint here is that the Defendants infringed certain copyrighted nude
and semi-nude female images ("the images"), some of which bore PEI trademarks. Webbworld
made those images available on the Netpics site to Internet users for a
monthly subscription fee.
The equipment for Webbworld's Netpics website consisted of fifteen personal computers, a modem,
and three telephone lines, all of which were located in an office building
in Dallas, Texas. One of the computers functioned as a news server; one
handled accounting and administrative data; and the remaining twelve were used as web servers.
The web servers were where the Netpics site "existed" on the World Wide
Web. They were used to store, reproduce, display, and distribute adult images to
Webbworld subscribers.
Webbworld obtained the images that it sold from selected adult-oriented Internet "newsgroups"
according
to the following general method. Defendant Ellis selected the particular adult-oriented newsgroups to
be downloaded. Periodically, Webbworld received a "news feed," which consisted of digital files
from the selected adult newsgroups. The information was downloaded onto the news server
computer. The feed consisted of both text and images, representing all of the
new material that had been posted onto the newsgroup since the last feed.
The heart of the Webbworld operation was "ScanNews," software that Ellis had developed.
ScanNews took the news feed, discarded most of the text, and retained the
sexually-oriented images. A small amount of identifying text was sometimes retained. After the
news feed was edited, the news server would announce to the twelve web
servers, via the ScanNews software, that its images were ready to be transferred.
Each of the web servers would contact the news server computer and copy
into memory the new adult images stored there. The news server then discarded
that data to make room for the next news feed.
Besides discarding text, the ScanNews software altered the news feed in a second
way. It created two "thumbnail" copies, one large and one small, for each
of the adult images downloaded from the Usenet. The thumbnail images enabled Webbworld
to display many images on a single screen. Moreover, the thumbnails could be
downloaded more quickly than full-sized images. The thumbnails were not part of the
news feed; they were created by the ScanNews software to facilitate Webbworld's sale
of the images they represented.
After being loaded onto the web servers, the thumbnail and full-sized adult images
were available to any Internet user willing to pay Webbworld a subscription fee
of $ 11.95 per month. The subscription process could be completed online in
about 30 seconds with a major credit card. Before gaining access to the
Webbworld Netpics site on the World Wide Web, a potential user would first
have had to gain access to the Internet via his or her Internet
service provider ("ISP"), sometimes called an access provider ("IAP"). Then, the person would
employ browser software to access various sites on the World Wide Web. Webbworld's
Internet address was "http://www.netpics.com." That address would be typed into a user's browser
software for immediate access to Webbworld's site.
Upon entering Netpics, a subscriber was given the choice whether to view images
in large or small thumbnail format. After making that choice, the user could
view a full-sized image by clicking on the corresponding thumbnail. Webbworld provided instructions
to its subscribers about viewing images and about downloading them into the memories
of their own computers for later retrieval.
Every day, Webbworld obtained between 5,000 and 10,000 new images. An approximately equal
number were deleted to make room for the new arrivals. On average, an
image was stored on Webbworld's computers and thus made available to subscribers for
about six days before being deleted. Webbworld normally stored and displayed about 40,000
to 70,000 images at any given time.
During the time Webbworld was in operation, many hundreds of copyrighted PEI images
appeared on the website. Some of those images appeared in close association with
one or more of PEI's trademarks. PEI never authorized Webbworld to reproduce, display,
or distribute any of those images or marks.
III. DIRECT COPYRIGHT INFRINGEMENT
Based on the facts related above, PEI alleges that Defendant Webbworld is directly
liable for copyright infringement. For the reasons that follow, the Court agrees.
To prevail on a claim for direct copyright infringement, PEI must prove (1)
ownership of the asserted copyrights, and (2) "copying" by Webbworld. Direct infringement does
not require intent or any particular state of mind. Religious Tech. Center v. Netcom On-Line Comm. Servs, 907 F. Supp. 1361, 1367 (N.D. Cal. 1995); see Playboy Enterprises, Inc. v. Frena, 839 F. Supp. 1552, 1559 (M.D. Fla. 1993) ("Intent or knowledge
is not an element of infringement, and thus even an innocent infringer is
liable . . .."); Key Maps, Inc. v. Pruitt, 470 F. Supp. 33, 38 (S.D. Tex. 1978) (explaining that intent to infringe need not be proved).
In this case, PEI has submitted to the Court twenty-nine copyright certificates of
registration. The parties have stipulated that the registrations are valid and enforceable. Accordingly,
the sole element of infringement remaining for PEI to prove is whether Webbworld
"copied" the registered images.
"Copying" is a judicial shorthand for the infringement of any of a copyright
owner's exclusive rights. see 17 U.S.C. § 106 (setting forth a copyright owner's rights). Because direct proof
of copying is rarely available to a copyright owner, copying is normally shown
by proving (a) that a defendant had access to the copyrighted work; and
(b) substantial similarity between the copyrighted work and the accused work. Alternatively, where
proof of access is absent, copying may be proved by showing a "striking
similarity" between the copyrighted work and the accused work. Ferguson v. National Broadcasting Co., 584 F.2d 111, 113 (5th Cir. 1978) (holding that if two
works are so strikingly similar as to preclude the possibility of independent creation,
copying may be proved without a showing of access).
In this case, Webbworld cannot claim to have lacked access to PEI's famous
publications. The uncontroverted testimony at trial is that PEI's periodicals are widely distributed
throughout the United States.
Even if proof of access were lacking, however, the Court would still find
"copying" to exist. The electronic images downloaded from Webbworld's computers and offered as
evidence at trial are not merely "strikingly similar" to PEI's photographs, but are
virtually identical. See Exh. 5 (consisting of twenty-nine tabs with the relevant copyright
registration, a photocopy of the copyrighted images, and copies of identical images downloaded
from the Netpics site). Furthermore, a few of Netpics' electronic copies self-proclaim their
origin by bearing a PEI title or emblem.
Having established that the accused electronic files are copies of PEI's photographs, PEI
must establish that Webbworld has violated one or more of the five exclusive
rights granted to a copyright holder. Under The Copyright Act, the bundle of
rights enjoyed by a copyright owner includes, among other things, the exclusive right
to do, or to authorize, any of the following:
(1) Reproduce the copyrighted work;
(2) Distribute copies of the copyrighted work to the public by sale or
other transfer of ownership; and/or
(3) Display the copyrighted work publicly.
17 U.S.C. § 106. Using, or authorizing the use of, a copyrighted work in any one
of these three ways, without permission of the copyright owner, constitutes actionable copyright
infringement. 17 U.S.C. § 501(a). In this case, PEI has established by a preponderance of the
evidence that Webbworld violated all three of these rights.
First, Webbworld "reproduced" unauthorized copies of copyrighted PEI images. On each of the
twelve Webbworld web server computers and for each of the images at issue,
Webbworld created two thumbnail copies and also reproduced a full-sized image downloaded from
the newsgroup. See MAI Systems Corp. v. Peak Computer, Inc., 991 F.2d 511, 519 (9th Cir. 1993), cert. dism'd, 510 U.S. 1033 (1994) (holding that copying occurs when a computer program
is transferred from a permanent storage device to a computer's random access memory).
Second, Webbworld "distributed" PEI's copyrighted works by allowing its users to download and
print copies of electronic image files. Those files, stored on the web servers,
contained virtually exact reproductions of copyrighted PEI images. Thus, Webbworld violated PEI's exclusive
right to distribute its copyrighted works.
Finally, Webbworld violated PEI's exclusive right to "display" its copyrighted works. To display
a work means "to show a copy of it, either directly or by
means of a film, slide, television image, or any other device or process."
17 U.S.C. § 101. Webbworld allowed its paying subscribers to view PEI's copyrighted works on their computer
monitors while online. Such action constitutes a display, as the Frena court explains:
The concept of display is broad. It covers "the projection of an image
on a screen or other surface by any method, the transmission of an
image by electronic or other means, and the showing of an image on
a cathode ray tube, or similar viewing apparatus connected with any sort of
information storage and retrieval system." H.R. Rep. No. 1476, 94th Cong., 2d Sess.
64 (Sept. 3, 1976), reprinted in 1976 U.S. Code Cong. & Admin. News
5659, 5677. The display right precludes unauthorized transmission of the display from one
place to another, for example, by a computer system. See H.R. Rep. No.
1476, 94th Cong., 2d Sess. 80 (Sept. 3, 1976), reprinted in 1976 U.S.
Code Cong. & Admin. News 5659, 5694.
839 F. Supp. at 1556-57.
Defendant Ives testified that no image existed until the Netpics subscriber downloaded it.
That assertion is disingenuous. The image existed in digital form on Webbworld's servers,
which made it available for decoding as an image file by the subscriber's
browser software. The subscriber could view the images merely by visiting the Webbworld
site. The evidence unequivocally shows that Webbworld electronically reproduced, distributed, and displayed PEI's
protected images.
Webbworld's primary defense to the claim of copyright infringement is that, as a
provider of access to Usenet images, it served as a mere conduit between
its subscribers and adult-oriented newsgroups. See Religious Technology Center v. Netcom On-Line Communication Services, Inc., 907 F. Supp. 1361, 1372-73 (N.D. Cal. 1995) ("RTC"). In RTC, the district court held
that an Internet access provider and Internet bulletin board service operator were not
directly liable for copyright infringement. Id. at 1366-72, 1381-82. The court reasoned, in part, that they were
mere conduits for unaltered information, even though infringing files were temporarily stored on
their computers. Id. Here, Webbworld principals testified similarly that the infringing images would
have existed on the Usenet whether or not Webbworld provided access to them
or not. They argue that to hold them liable would be to hold
the entire Internet liable for activities that cannot reasonably be monitored or deterred.
Webbworld's argument was rejected at summary judgment and is similarly unavailing after the
additional evidence presented at trial. See Webbworld, 968 F. Supp. at 1177. Unlike the defendant service provider in RTC,
Webbworld did not function as a mere provider of access. To visit the
Netpics site, a subscriber first was required to gain access to the Internet
itself by using an Internet service provider such as the defendant in RTC.
Webbworld did not sell access; it sold adult images.
Also unlike the Defendant in RTC, Webbworld did not function as a passive
conduit of unaltered information. Instead, Webbworld functioned primarily as a store, a commercial
destination within the Internet. Just as a merchant might re-package and sell merchandise
from a wholesaler, so did Webbworld re-package (by deleting text and creating thumbnails)
and sell images it obtained from the various newsgroups. In contrast to the
defendants in RTC, Webbworld took "affirmative steps to cause the copies to be
made." RTC, 907 F. Supp. at 1381. Such steps included using the ScanNews software to troll the Usenet for
Webbworld's product.
Webbworld contends that it had no control over the information its software retrieved
from the Usenet and no control over the images posted therein. See RTC, 907 F. Supp. at 1372 (finding
no liability because the defendant access provider "does not create or control the content
of the information available to its subscribers"). On the contrary, Webbworld exercised total
dominion over the content of its site and the product it offered its
clientele. As a shop owner may choose from what sources he or she
contracts to buy merchandise, so, too, did Webbworld have the ability to choose
its newsgroup sources. Clearly, a newsgroup named, for example, "alt.sex.playboy" or "alt.mag.playboy" might
instantly be perceived as problematic from the standpoint of federal copyright law. Alternatively,
Webbworld might simply have refrained from conducting business until it had developed software
or a manual system of oversight to prevent, or at least to minimize
the possibility of, copyright infringement. In any event, having developed and launched the
ScanNews software for commercial use, Webbworld cannot now evade liability by claiming helplessness
in the face of its "automatic" operation.
For those reasons, the Court rejects Webbworld's defenses and holds it directly liable
for infringing PEI's twenty-nine copyright registrations at issue in trial of this case.
MAI Systems Corp. v. Peak Computer, Inc.
991 F.2d 511 (9th Cir. 1993)
MAI Systems Corp., until recently, manufactured computers and designed software to run those
computers. The company continues to service its computers and the software necessary to
operate the computers. MAI software includes operating system software, which is necessary to
run any other program on the computer.
Peak Computer, Inc. is a company organized in 1990 that maintains computer systems
for its clients. Peak maintains MAI computers for more than one hundred clients
in Southern California. This accounts for between fifty and seventy percent of Peak's
business.
Peak's service of MAI computers includes routine maintenance and emergency repairs. Malfunctions often
are related to the failure of circuit boards inside the computers, and it
may be necessary for a Peak technician to operate the computer and its
operating system software in order to service the machine.
IV. COPYRIGHT INFRINGEMENT
The district court granted summary judgment in favor of MAI on its claims
of copyright infringement and issued a permanent injunction against Peak on these claims.
The alleged copyright violations include: (1) Peak's running of MAI software licenced to
Peak customers
A. Peak's running of MAI software licenced to Peak customers
To prevail on a claim of copyright infringement, a plaintiff must prove ownership
of a copyright and a "'copying' of protectable expression" beyond the scope of
a license.
MAI software licenses allow MAI customers to use the software for their own
internal information processing. This allowed use necessarily includes the loading of the software
into the computer's random access memory ("RAM") by a MAI customer. However, MAI
software licenses do not allow for the use or copying of MAI software
by third parties such as Peak. Therefore, any "copying" done by Peak is
"beyond the scope" of the license.
The district court's grant of summary judgment on MAI's claims of copyright infringement
reflects its conclusion that a "copying" for purposes of copyright law occurs when
a computer program is transferred from a permanent storage device to a computer's
RAM. This conclusion is consistent with its finding, in granting the preliminary injunction,
that: "the loading of copyrighted computer software from a storage medium (hard disk,
floppy disk, or read only memory) into the memory of a central processing
unit ("CPU") causes a copy to be made. In the absence of ownership
of the copyright or express permission by license, such acts constitute copyright infringement."
We find that this conclusion is supported by the record and by the
law.
Peak concedes that in maintaining its customer's computers, it uses MAI operating software
"to the extent that the repair and maintenance process necessarily involves turning on
the computer to make sure it is functional and thereby running the operating
system." It is also uncontroverted that when the computer is turned on the
operating system is loaded into the computer's RAM. As part of diagnosing a
computer problem at the customer site, the Peak technician runs the computer's operating
system software, allowing the technician to view the systems error log, which is
part of the operating system, thereby enabling the technician to diagnose the problem.
Peak argues that this loading of copyrighted software does not constitute a copyright
violation because the "copy" created in RAM is not "fixed." However, by showing
that Peak loads the software into the RAM and is then able to
view the system error log and diagnose the problem with the computer, MAI
has adequately shown that the representation created in the RAM is "sufficiently permanent
or stable to permit it to be perceived, reproduced, or otherwise communicated for
a period of more than transitory duration."
After reviewing the record, we find no specific facts (and Peak points to
none) which indicate that the copy created in the RAM is not fixed.
While Peak argues this issue in its pleadings, mere argument does not establish
a genuine issue of material fact to defeat summary judgment. A party opposing
a properly supported motion for summary judgment may not rest upon the mere
allegations or denials in pleadings, but "must set forth specific facts showing that
there is a genuine issue for trial.
The law also supports the conclusion that Peak's loading of copyrighted software into
RAM creates a "copy" of that software in violation of the Copyright Act.
In Apple Computer, Inc. v. Formula Int'l, Inc., 594 F. Supp. 617, 621 (C.D. Cal. 1984), the district court held that the copying of copyrighted software onto silicon
chips and subsequent sale of those chips is not protected by § 117 of
the Copyright Act. Section 117 allows "the 'owner' of a copy of a
computer program to make or authorize the making of another copy" without infringing
copyright law, if it "is an essential step in the utilization of the
computer program" or if the new copy is "for archival purposes only." 17 U.S.C. § 117 (Supp.
1988). One of the grounds for finding that § 117 did not apply was
the court's conclusion that the permanent copying of the software onto the silicon
chips was not an "essential step" in the utilization of the software because
the software could be used through RAM without making a permanent copy.
- - - - - - - - - - - - -
- Footnotes - - - - - - - - - - -
- - - -
n Since MAI licensed its software, the Peak customers do not qualify as
"owners" of the software and are not eligible for protection under § 117.
- - - - - - - - - - - - End
Footnotes- - - - - - - - - - - - -
-
While we recognize that this language is not dispositive, it supports the view
that the copy made in RAM is "fixed" and qualifies as a copy
under the Copyright Act.
We have found no case which specifically holds that the copying of software
into RAM creates a "copy" under the Copyright Act. However, it is generally
accepted that the loading of software into a computer constitutes the creation of
a copy under the Copyright Act. See e.g. Vault Corp. v. Quaid Software Ltd., 847 F.2d 255, 260 (5th Cir. 1988) ("the act of loading a
program from a medium of storage into a computer's memory creates a copy
of the program"); 2 Nimmer on Copyright, § 8.08 at 8-105 (1983)("Inputting a computer program entails the preparation
of a copy."); Final Report of the National Commission on the New Technological
Uses of Copyrighted Works, at 13 (1978) ("the placement of a work into
a computer is the preparation of a copy"). We recognize that these authorities
are somewhat troubling since they do not specify that a copy is created
regardless of whether the software is loaded into the RAM, the hard disk
or the read only memory ("ROM"). However, since we find that the copy created
in the RAM can be "perceived, reproduced, or otherwise communicated," we hold that
the loading of software into the RAM creates a copy under the Copyright
Act. 17 U.S.C. § 101. We affirm the district court's grant of summary judgment as well as
the permanent injunction as it relates to this issue.
In 1998, Congress amended Section 117 of the Copyright Act to overrule the
specific holding of MAI v. Peak with a maintenance or repair exception. This
legislation amends Section 117 to ensure that independent service organizations do not inadvertently
become liable for copyright infringement merely because they have turned on a machine
in order to service its hardware components. H.R. Rep. 105-551 (1998). The broader
import of the case, its holding that temporary RAM copies are copies within
the meaning of the Copyright Act, was not altered.
This case involves the application of copyright law to the vast world of
the internet and internet search engines. The plaintiff, Leslie Kelly, is a professional
photographer who has copyrighted many of his images of the American West. Some
of these images are located on Kelly's web site or other web sites
with which Kelly has a license agreement. The defendant, Arriba Soft Corp., [now
Ditto.com,] operates an internet search engine that displays its results in the form
of small pictures rather than the more usual form of text. Arriba obtained
its database of pictures by copying images from other web sites. By clicking
on one of these small pictures, called "thumbnails," the user can then view
a large version of that same picture within the context of the Arriba
web page.
When Kelly discovered that his photographs were part of Arriba's search engine database,
he brought a claim against Arriba for copyright infringement.
The search engine at issue in this case is unconventional in that it
displays the results of a user's query as "thumbnail" images. When a user
wants to search the internet for information on a certain topic, he or
she types a search term into a search engine, which then produces a
list of web sites that contain information relating to the search term. Normally,
the list of results is in text format. The Arriba search engine, however,
produces its list of results as small pictures.
To provide this service, Arriba developed a computer program that "crawls" the web
looking for images to index. This crawler downloads full-sized copies of the images
onto Arriba's server. The program then uses these copies to generate smaller, lower-resolution thumbnails
of the images. Once the thumbnails are created, the program deletes the full-sized
originals from the server. Although a user could copy these thumbnails to his
computer or disk, he cannot increase the resolution of the thumbnail; any enlargement
would result in a loss of clarity of the image.
The second component of the Arriba program occurs when the user double-clicks on
the thumbnail. From January 1999 to June 1999, clicking on the thumbnail produced
the "Images Attributes" page. This page used in-line linking to display the original
full-sized image, surrounded by text describing the size of the image, a link
to the original web site, the Arriba banner, and Arriba advertising.
In January 1999, Arriba's crawler visited web sites that contained Kelly's photographs. The
crawler copied thirty-five of Kelly's images to the Arriba database. Kelly had never
given permission to Arriba to copy his images and objected when he found
out that Arriba was using them. Arriba deleted the thumbnails of images that
came from Kelly's own web sites and placed those sites on a list
of sites that it would not crawl in the future. Several months later,
Arriba received Kelly's complaint of copyright infringement, which identified other images of his
that came from third-party web sites. Arriba subsequently deleted those thumbnails and placed those
third-party sites on a list of sites that it would not crawl in
the future.
An owner of a copyright has the exclusive right to reproduce, distribute, and
publicly display copies of the work. To establish a claim of copyright infringement
by reproduction, the plaintiff must show ownership of the copyright and copying by
the defendant. As to the thumbnails, Arriba conceded that Kelly established a prima
facie case of infringement of Kelly's reproduction rights.
A claim of copyright infringement is subject to certain statutory exceptions, including the
fair use exception. This exception "permits courts to avoid rigid application of the
copyright statute when, on occasion, it would stifle the very creativity which that
law is designed to foster." The statute sets out four factors to consider
in determining whether the use in a particular case is a fair use.
We must balance these factors in light of the objectives of copyright law,
rather than view them as definitive or determinative tests. We now turn to
the four fair use factors.
1. Purpose and character of the use.
The Supreme Court has rejected the proposition that a commercial use of the
copyrighted material ends the inquiry under this factor. Instead,
[t]he central purpose of this investigation is to see . . . whether
the new work merely supersede[s] the objects of the original creation, or instead
adds something new, with a further purpose or different character, altering the first
with new expression, meaning, or message; it asks, in other words, whether and
to what extent the new work is transformative.
The more transformative the new work, the less important the other factors, including
commercialism, become.
There is no dispute that Arriba operates its web site for commercial purposes
and that Kelly's images were part of Arriba's search engine database. As the
district court found, while such use of Kelly's images was commercial, it was
more incidental and less exploitative in nature than more traditional types of commercial
use. Arriba was neither using Kelly's images to directly promote its web site
nor trying to profit by selling Kelly's images. Instead, Kelly's images were among
thousands of images in Arriba's search engine data-base. Because the use of Kelly's
images was not highly exploitative, the commercial nature of the use weighs only
slightly against a finding of fair use.
The second part of the inquiry as to this factor involves the transformative nature
of the use. We must determine if Arriba's use of the images merely
superseded the object of the originals or instead added a further purpose or
different character. We find that Arriba's use of Kelly's images for its thumbnails
was transformative.
Although Arriba made exact replications of Kelly's images, the thumbnails were much smaller,
lower-resolution images that served an entirely different function than Kelly's original images. Kelly's
images are artistic works intended to inform and to engage the viewer in
an aesthetic experience. His images are used to portray scenes from the American
West in an aesthetic manner. Arriba's use of Kelly's images in the thumbnails
is unrelated to any aesthetic purpose. Arriba's search engine functions as a tool
to help index and improve access to images on the internet and their
related web sites. In fact, users are unlikely to enlarge the thumbnails and
use them for artistic purposes because the thumbnails are of much lower-resolution than
the originals; any enlargement results in a significant loss of clarity of the
image, making them inappropriate as display material.
Kelly asserts that because Arriba reproduced his exact images and added nothing to
them, Arriba's use cannot be transformative. Courts have been reluctant to find fair
use when an original work is merely retransmitted in a different medium. Those
cases are inapposite, however, because the resulting use of the copyrighted work in
those cases was the same as the original use. For instance, reproducing music
CDs in computer MP3 format does not change the fact that both formats
are used for entertainment purposes. Likewise, reproducing news footage into a different format
does not change the ultimate purpose of informing the public about current affairs.
Even in Infinity Broadcast Corp. v. Kirkwood, 150 F.3d 104, where the retransmission of radio
broadcasts over telephone lines was for the purpose of allowing advertisers and radio
stations to check on the broadcast of commercials or on-air talent, there was
nothing preventing listeners from subscribing to the service for entertainment purposes. Even though
the intended purpose of the retransmission may have been different from the purpose
of the original transmission, the result was that people could use both types
of transmissions for the same purpose.
This case involves more than merely a retransmission of Kelly's images in a
different medium. Arriba's use of the images serves a different function than Kelly's
use -- improving access to information on the internet versus artistic expression. Furthermore,
it would be unlikely that anyone would use Arriba's thumbnails for illustrative or
aesthetic purposes because enlarging them sacrifices their clarity. Because Arriba's use is not
superseding Kelly's use but, rather, has created a different purpose for the images,
Arriba's use is transformative.
The Copyright Act was intended to promote creativity, thereby benefitting the artist and the public
alike. To preserve the potential future use of artistic works for purposes of
teaching, research, criticism, and news reporting, Congress created the fair use exception. Arriba's
use of Kelly's images pro-motes the goals of the Copyright Act and the
fair use exception. The thumbnails do not stifle artistic creativity because they are
not used for illustrative or artistic purposes and there-fore do not supplant the
need for the originals. In addition, they benefit the public by enhancing information-gathering
techniques on the internet.
In Sony Computer Entertainment America, Inc. v. Bleem, we held that when Bleem
copied "screen shots" from Sony computer games and used them in its own
advertising, it was a fair use. In finding that the first factor weighed
in favor of Bleem, we noted that "comparative advertising redounds greatly to the
purchasing public's benefit with very little corresponding loss to the integrity of Sony's
copyrighted material." Similarly, this first factor weighs in favor of Arriba due to
the public benefit of the search engine and the minimal loss of integrity
to Kelly's images.
2. Nature of the copyrighted work.
"Works that are creative in nature are closer to the core of intended
copyright protection than are more fact-based works." Photographs that are meant to be
viewed by the public for informative and aesthetic purposes, such as Kelly's, are
generally creative in nature. The fact that a work is published or unpublished
also is a critical element of its nature. Published works are more likely
to qualify as fair use because the first appearance of the artist's expression
has already occurred. Kelly's images appeared on the internet before Arriba used them
in its search image. When considering both of these elements, we find that
this factor weighs only slightly in favor of Kelly.
3. Amount and substantiality of portion used.
"While wholesale copying does not preclude fair use per se, copying an entire
work militates against a finding of fair use." However, the extent of permissible
copying varies with the purpose and character of the use. If the secondary
user only copies as much as is necessary for his or her intended
use, then this factor will not weigh against him or her.
This factor neither weighs for nor against either party because, although Arriba did
copy each of Kelly's images as a whole, it was reasonable to do
so in light of Arriba's use of the images. It was necessary for
Arriba to copy the entire image to allow users to recognize the image
and decide whether to pursue more information about the image or the originating
web site. If Arriba only copied part of the image, it would be
more difficult to identify it, thereby reducing the usefulness of the visual search
engine.
4. Effect of the use upon the potential market for or value of
the copyrighted work.
This last factor requires courts to consider "not only the extent of market
harm caused by the particular actions of the alleged infringer, but also 'whether
unrestricted and wide-spread conduct of the sort engaged in by the defendant .
. . would result in a substantially adverse impact on the potential market
for the original.' " A transformative work is less likely to have an
adverse impact on the market of the original than a work that merely
supersedes the copyrighted work.
Kelly's images are related to several potential markets. One purpose of the photographs
is to attract internet users to his web site, where he sells advertising
space as well as books and travel packages. In addition, Kelly could sell
or license his photographs to other web sites or to a stock photo
data-base, which then could offer the images to its customers.
Arriba's use of Kelly's images in its thumbnails does not harm the market
for Kelly's images or the value of his images. By showing the thumbnails
on its results page when users entered terms related to Kelly's images, the
search engine would guide users to Kelly's web site rather than away from
it. Even if users were more interested in the image itself rather than
the information on the web page, they would still have to go to
Kelly's site to see the full-sized image. The thumbnails would not be a
substitute for the full-sized images because the thumbnails lose their clarity when enlarged.
If a user wanted to view or download a quality image, he or
she would have to visit Kelly's web site. This would hold true whether
the thumbnails are solely in Arriba's database or are more widespread and found
in other search engine databases.
Arriba's use of Kelly's images also would not harm Kelly's ability to sell or
license his full-sized images. Arriba does not sell or license its thumbnails to
other parties. Anyone who downloaded the thumbnails would not be successful selling full-sized
images enlarged from the thumbnails because of the low resolution of the thumbnails.
There would be no way to view, create, or sell a clear, full-sized
image without going to Kelly's web sites. Therefore, Arriba's creation and use of
the thumbnails does not harm the market for or value of Kelly's images.
This factor weighs in favor of Arriba.
Having considered the four fair use factors and found that two weigh in
favor of Arriba, one is neutral, and one weighs slightly in favor of
Kelly, we conclude that Arriba's use of Kelly's images as thumbnails in its
search engine is a fair use.
This case presents the issue of whether new wine can be poured into
an old bottle. The facts, as seen in the light most favorable to
the government, are these. The defendant, David LaMacchia, is a twenty-one year old
student at the Massachusetts Institute of Technology (MIT). LaMacchia, a computer hacker, used
MIT's computer network to gain entree to the Internet. Using pseudonyms and an
encrypted address, LaMacchia set up an electronic bulletin board which he named Cynosure.
He encouraged his correspondents to upload popular software applications (Excel 5.0 and WordPerfect
6.0) and computer games (Sim City 2000). These he transferred to a second
encrypted address (Cynosure II) where they could be downloaded by other users with
access to the Cynosure password. Although LaMacchia was at pains to impress the
need for circumspection on the part of his subscribers, the worldwide traffic generated
by the offer of free software attracted the notice of university and federal
authorities.
On April 7, 1994, a federal grand jury returned a one count indictment
charging LaMacchia with conspiring with "persons unknown" to violate 18 U.S.C. § 1343, the wire fraud statute.
According to the indictment, LaMacchia devised a scheme to defraud that had as
its object the facilitation "on an international scale" of the "illegal copying and
distribution of copyrighted software" without payment of licensing fees and royalties to software
manufacturers and vendors. The indictment alleges that LaMacchia's scheme [*537] caused losses of
more than one million dollars to software copyright holders. The indictment does not
allege that LaMacchia sought or derived any personal benefit from the scheme to
defraud.
On September 30, 1994, the defendant brought a motion to dismiss, arguing that
the government had improperly resorted to the wire fraud statute as a copyright
enforcement tool in defiance of the Supreme Court's decision in Dowling v. United States, 473 U.S. 207 (1985)....
THE DOWLING DECISION
Paul Edmond Dowling was convicted of conspiracy, interstate transportation of stolen property [ITSP],
copyright violations and mail fraud in the Central District of California. Dowling and
his co-conspirators sold bootleg Elvis Presley recordings by soliciting catalogue orders from post
office boxes in Glendale, California. The infringing recordings were shipped in interstate commerce
to Maryland and Florida. The eight ITSP counts on which Dowling was convicted
involved thousands of phonograph albums. "Each album contained performances of copyrighted musical compositions
for the use of which no licenses had been obtained nor royalties paid
. . . ." Dowling, supra at 212. Dowling appealed his convictions (except those involving copyright infringement).
The Ninth Circuit Court of Appeals affirmed.
The Supreme Court granted certiorari only as to Dowling's convictions for interstate transportation
of stolen property. The Court, in an opinion by Justice Blackmun, held that
a copyrighted musical composition impressed on a bootleg phonograph record is not property
that is "stolen, converted, or taken by fraud" within the meaning of the
Stolen Property Act. Justice Blackmun emphasized that cases prosecuted under § 2314 had traditionally
involved "physical 'goods, wares [or] merchandise.'" The statute "seems clearly to contemplate a
physical identity between the items unlawfully obtained and those eventually transported, and hence
some prior physical taking of the subject goods." Id. at 216. In Dowling's case there was
no evidence "that Dowling wrongfully came by the phonorecords actually shipped or the
physical materials from which they were made." Dowling, supra at 214.
Justice Blackmun felt compelled, however, to answer the government's argument that the unauthorized
use of the underlying musical compositions was itself sufficient to render the offending
phonorecords property "stolen, converted or taken by fraud."
The Government's theory here would make theft, conversion, or fraud equivalent to wrongful
appropriation of statutorily protected rights in copyright. The copyright owner, however, holds no
ordinary chattel. A copyright, like other intellectual property, comprises a series of carefully
defined and carefully delimited interests to which the law affords correspondingly exact protections.
Id. at 216.
A copyright, as Justice Blackmun explained, is unlike an ordinary chattel because the
holder does not acquire exclusive dominion over the thing owned. The limited nature
of the property interest conferred by copyright stems from an overriding First Amendment
concern for the free dissemination of ideas. "The primary objective of copyright is
not to reward the labor of authors, but 'to promote the Progress of
Science and useful Arts.' Art. I, § 8, cl. 8." Feist Publications, Inc. v. Rural Telephone Service Co., 499 U.S. 340, 349, (1991). Data General Corp v Grumman Systems Support, 36 F.3d 1147, 1187 (1st Cir. 1994) (same). Justice
Blackmun offered the "fair use" doctrine (17 U.S.C. § 107) and the statutory scheme of compulsory licensing
of musical compositions (17 U.S.C. § 115) as examples of ways in which the property rights of
a copyright holder are circumscribed by the Copyright Act. Dowling, supra at 217.
It follows that interference with copyright does not easily equate with theft, conversion
or fraud. The Copyright Act even employs a separate term of art to
define one who misappropriates a copyright: "Anyone who violates any of the exclusive
rights of the copyright owner," that is, anyone who trespasses into his exclusive
domain by using or authorizing the use of the copyrighted work in one
of the five ways set forth in the statute, "is an infringer of
the copyright." There is no dispute in this case that Dowling's unauthorized inclusion
on his bootleg albums of performances of copyrighted compositions constituted infringement of those
copyrights. It is less clear, however, that the taking that occurs when an
infringer arrogates the use of another's protected work comfortably fits the terms associated
with physical removal employed by § 2314. The infringer invades a statutorily defined province
guaranteed to the copyright holder alone. But he does not assume physical control
over the copyright; nor does he wholly deprive its owner of its use.
The ITSP statute, Justice Blackmun observed, had its roots in efforts by Congress
to supplement the efforts of state authorities frustrated by jurisdictional problems arising from
the transportation of stolen property across state lines. Id. at 219-220.
No such need for supplemental federal action has ever existed, however, with respect
to copyright infringement, for the obvious reason that Congress always has had the
bestowed authority to legislate directly in this area. . . . Given that
power, it is implausible to suppose that Congress intended to combat the problem
of copyright infringement by the circuitous route hypothesized by the government. . .
. In sum, the premise of § 2314 -- the need to fill with
federal action an enforcement chasm created by limited state jurisdiction -- simply does
not apply to the conduct the Government seeks to reach here. Id at 220-221.
A review of the evolution of criminal penalties in the Copyright Act led
Justice Blackmun to observe that:
"The history of the criminal infringement provisions of the Copyright Act reveals a good
deal of care on Congress' part before subjecting copyright infringement to serious criminal
penalties. . . . In stark contrast, the Government's theory of this case
presupposes a congressional decision to bring the felony provisions of § 2314, which make
available the comparatively light fine of not more than $ 10,000 but the
relatively harsh term of imprisonment of up to 10 years, to bear on
the distribution of a sufficient quantity of any infringing goods simply because of
the presence here of a factor--interstate transportation--not otherwise though relevant to copyright law.
The Government thereby presumes congressional adoption of an indirect but blunderbuss solution to
a problem treated with precision when considered directly. Id. at 225-226.
Finally, noting that the government's expansive reading of the Stolen Property Act would
have the unsettling effect of criminalizing a broad range of conduct involving copyright
and other intellectual property that had been historically regulated by the civil laws,
Justice Blackmun concluded that "the deliberation with which Congress over the last decade
has addressed the problem of copyright infringement for profit, as well as the
precision with which it has chosen to apply criminal penalties in this area,
demonstrates anew the wisdom of leaving it to the legislature to define crime
and prescribe penalties. Here, the language of § 2314 does not 'plainly and unmistakably'
cover petitioner Dowling's conduct." Id at 228 (footnote omitted). Dowling's ITSP convictions were reversed.
THE COPYRIGHT LAW
Article I, § 8, cl. 8 of the U.S. Constitution grants Congress the exclusive
power "to promote the Progress of Science and useful Arts, by securing for
limited Times to Authors and Inventors the exclusive Right to their respective writings
and Discoveries." Thus "the remedies for infringement 'are only those prescribed by Congress.'"
Sony Corporation of America v. Universal City Studios, Inc., 464 U.S. 417, 431 (1984). Since 1897, when criminal copyright infringement was first introduced into U.S. copyright law,
the concept differentiating criminal from civil copyright violations has been that the infringement
must be pursued for purposes of commercial exploitation.
DISCUSSION
The wire fraud statute, 18 U.S.C. § 1343 was enacted in 1952.
to complement the mail fraud
statute by giving federal prosecutors jurisdiction over frauds involving the use of interstate
(or foreign) wire transmissions
. Wire fraud offers an especially pleasing feature from the
government's perspective that is particularly relevant to LaMacchia's case. Unlike the criminal copyright
statute, 17 U.S.C. § 506(a), the mail and wire fraud statutes do not require that a
defendant be shown to have sought to personally profit from the scheme to
defraud.
[E]ven were I to accept the argument made by the government in Dowling,
that illegal conduct alone may suffice to satisfy the fraud element of [§
1343], the holding would not cover LaMacchia's case for the simple reason that
what LaMacchia is alleged to have done is not criminal conduct under § 506(a)
of the Copyright Act. n12
A copyright, like other intellectual property, comprises a series of carefully defined and
carefully delimited interests to which the law affords correspondingly exact protections." Dowling, supra at 216.
What the government is seeking to do is to punish conduct that reasonable people
might agree deserves the sanctions of the criminal law. But as Justice Blackmun
observed in Dowling, copyright is an area in which Congress has chosen to
tread cautiously, relying "chiefly . . . on an array of civil remedies
to provide copyright holders protection against infringement," while mandating "studiously graded penalties" in
those instances where Congress has concluded that the deterrent effect of criminal sanctions
are required. Dowling, supra at 221, 225. "This step-by-step, carefully considered approach is consistent with Congress' traditional sensitivity
to the special concerns implicated by the copyright laws." Id at 225. Indeed, the responsiveness of
Congress to the impact of new technology on the law of copyright, limned
earlier in this opinion, confirms Justice Blackmun's conviction of "the wisdom of leaving
it to the legislature to define crime and prescribe penalties." Dowling, supra at 228.
"The judiciary's reluctance to expand the protections afforded by the copyright without explicit legislative
guidance is a recurring theme. Sound policy, as well as history, supports our
consistent deference to Congress when major technological innovations alter the market for copyrighted
materials. Congress has the institutional authority and the institutional ability to accommodate fully
the varied permutations of competing interests that are inevitably implicated by such new
technology."
Sony Corporation of America v. Universal City Studios, Inc., 464 U.S. 417, 431, 78 L. Ed. 2d 574, 104 S. Ct. 774 (1984) (citations omitted).
While the government's objective is a laudable one, particularly when the facts alleged
in this case are considered, its interpretation of the wire fraud statute would
serve to criminalize the conduct of not only persons like LaMacchia, but also
the myriad of home computer users who succumb to the temptation to copy
even a single software program for private use. It is not clear that
making criminals of a large number of consumers of computer software is a
result that even the software industry would consider desirable.
This is not, of course, to suggest that there is anything edifying about
what LaMacchia is alleged to have done. If the indictment is to be
believed, one might at best describe his actions as heedlessly irresponsible, and at
worst as nihilistic, self-indulgent, and lacking in any fundamental sense of values. Criminal
as well as civil penalties should probably attach to willful, multiple infringements of
copyrighted software even absent a commercial motive on the part of the infringer.
One can envision ways that the copyright law could be modified to permit
such prosecution. But, "'it is the legislature, not the Court which is to
define a crime, and ordain its punishment.'" Dowling, supra at 214.
ORDER
For the foregoing reasons, defendant LaMacchia's motion to dismiss is ALLOWED.
SO ORDERED.
Shortly following the dismissal of LaMacchia, Congress responded with the No Electronic Theft
(NET) Act, to reverse the practical consequences of United States v. LaMacchia by
adding a new definition of financial gain and provision § 506(a)(2) below:
17 U.S.C. § 506 . Criminal offenses
(a) Criminal Infringement. Any person who infringes a copyright willfully either
(1) for purposes of commercial advantage or private financial gain, or
(2) by the reproduction or distribution, including by electronic means, during any 180-day
period, of 1 or more copies or phonorecords of 1 or more copyrighted
works, which have a total retail value of more than $1,000,
shall be punished as provided under section 2319 of title 18, United States
Code. For purposes of this subsection, evidence of reproduction or distribution of a
copyrighted work, by itself, shall not be sufficient to establish willful infringement.
17 U.S.C. § 101: The term financial gain includes receipt, or expectation of
receipt, of anything of value, including the receipt of other copyrighted works.