Professor Wendy Seltzer, email wendy.seltzer@brooklaw.edu
Week 5: Copyright 2: Music on the Net, peer-to-peer, and indirect liability - Readings |
|
For further reading (optional):
- Mark Lemley & R. Anthony Reese, Reducing Digital Copyright Infringement Without Restricting Innovation,
56 Stan. L. Rev (2004), <http://papers.ssrn.com/sol3/papers.cfm?abstract_id=525662>
- William Fisher, Promises to Keep (2005)
- Peter Biddle, Paul England, Marcus Peinado, and Bryan Willman, The Darknet and the
Future of Content Distribution (2002) <http://crypto.stanford.edu/DRM2002/darknet5.doc>
From the time of the player piano, copyright holders have tried to control
technologies through which their works can be experienced or infringed. The Betamax case,
Sony v. Universal, sets the backdrop for our consideration of the entertainment industry
response to Internet infringement. In 1984, the Supreme Court was asked to enjoin
the Sony Betamax on the ground that its primary uses infringed movie studio
copyrights. The Court refused, setting out principles of secondary copyright liability it then
had to apply, two decades later, to the question of filesharing software.
As you read A&M v. Napster and MGM v. Grokster, watch for the
tension between copyright and technology. Is Internet distribution different in relevant ways from
videocassette recording? Does Congress need to change the law? Watch too how liability
rules shape technology development. After the centralized directory service of Napster (1.0) was
enjoined, programmers and entrepreneurs quickly developed new filesharing programs with decentralized architectures to
serve the same users. Is this reaction to legal rulings nefarious inducement of
infringement or sensible risk management?
The entertainment industries have pursued other intermediaries, too. In Recording Industry Association of
America v. Diamond Multimedia Systems, 180 F.3d 1071 (9th Cir. 1999), the RIAA
sued the makers of the early MP3 player, the Diamond Rio for failing
to implement copy controls. Diamond escaped liability under the Audio Home Recording Act,
17 U.S.C. 1001 et seq., on the grounds that its device did not
meet the technical definition of a digital audio recording device. In 2002, major
labels sued to compel backbone ISPs to block access to a Chinese website,
Listen4ever.com, that was offering access to unauthorized music downloads. That suit was dropped
when Listen4ever went offline. Many colleges and universities have faced pressure to cooperate
with entertainment companies enforcement efforts. Some have responded by limiting or blocking access
to the ports most commonly used by peer-to-peer software; some have instituted network
monitoring to catch and punish students using filesharing software; some have bought group
access to music download sites like the new Napster or Rhapsody; some have
done nothing.
In 2003, the RIAA announced that its members had begun suing individuals for
illegally distributing substantial amounts (averaging more than 1,000 copyrighted music files each) of
copyrighted music on peer- to-peer networks. Since then, record companies have identified several
thousand individuals, including many at colleges and universities, by putting clients onto the
peer-to-peer networks to find IP addresses of those sharing major-label music. They then
seek the identities of the users of those IP addresses through Doe lawsuits
and subpoenas to ISPs. The Capitol Records v. Does 1-250 complaint is one
example of the essentially template complaint filed across the country. After identifying defendants,
the record companies typically send each a letter directing them to a settlement
center to discuss settlement options. Most of the Does have settled, with reported
settlements around $2,000 - $4,000. Does this methodology raise due process concerns? Does
it seem like an efficient or effective way to address copyright infringement?
Each side of the debate can point to studies, some showing that filesharing
has adversely affected music sales, others showing that those who share files buy
as much or more music. Compare S. Liebowitz, Will MP3 Downloads Annihilate the
Record Industry? The Evidence So Far, (June 2003), <http://www.utdallas.edu/~liebowit/intprop/records.pdf> (file sharing
has caused a
decline in music sales), with F. Oberholzer & K. Strumpf, The Effect of
File Sharing on Record Sales: An Empirical Analysis, (Mar. 2004), <http://www.unc.edu/~cigar/papers/FileSharing_March2004.pdf> (concluding that
"file sharing has no statistically significant effect on purchases of the average album").
Likewise, some artists such as Janis Ian and Wilco say theyve benefited from
fans sharing their files, while others such as Metallica have led the charge
against filesharing.
EFF, which defended Streamcast Networks, the makers of the Morpheus software, all the
way up to the Supreme Court, proposes shifting the frame of the debate.
Instead of asking who is the best target for infringement lawsuits, theyve asked
industry to consider offering a voluntary collective license to filesharing users. Like the
ASCAP or BMI blanket licenses offered for radio play, copyright owners could offer
users a subscription-like payment to download and share their music. Please skim the
whitepaper, A Better Way Forward, Voluntary Collective Licensing of Music File Sharing, <http://www.eff.org/share/?f=collective_lic_wp.html>.
Does the proposal seem realistic? How effectively would it address problems of digital
copyright?
At least two threads intertwine in the discussion of digital music, those of culture and technology. On the one hand, the copyright law is supposed to promote the progress of science by giving artists and authors incentive to create and publish new works; on the other, it is not supposed to give them veto power over new technology for experiencing those works. When the Court refused to let Universal Studios jam the Betamax in its infancy, it opened the way for a now-thriving video rental market and ever-greater opportunities for the public to enjoy movies? Can we protect artists against online infringement of their copyrights without stifling technological innovation?
The question is thus whether the Betamax is capable of commercially significant noninfringing
uses. In order to resolve that question, we need not explore all the
different potential uses of the machine and determine whether or not they would
constitute infringement. Rather, we need only consider whether on the basis of the
facts as found by the District Court a significant number of them would
be noninfringing. Moreover, in order to resolve this case we need not give
precise content to the question of how much use is commercially significant. For
one potential use of the Betamax plainly satisfies this standard, however it is
understood: private, noncommercial time-shifting in the home. It does so both (A) because
respondents have no right to prevent other copyright holders from authorizing it for
their programs, and (B) because the District Court's factual findings reveal that even
the unauthorized home time-shifting of respondents' programs is legitimate fair use.
Although the District Court made these statements in the context of considering the
propriety of injunctive relief, the statements constitute a finding that the evidence concerning
"sports, religious, educational and other programming" was sufficient to establish a significant quantity
of broadcasting whose copying is now authorized, and a significant potential for future
authorized copying. That finding is amply supported by the record. In addition to
the religious and sports officials identified explicitly by the District Court, two items
in the record deserve specific mention.
First is the testimony of John Kenaston, the station manager of Channel 58,
an educational station in Los Angeles affiliated with the Public Broadcasting Service. He
explained and authenticated the station's published guide to its programs. For each program,
the guide tells whether unlimited home taping is authorized, home taping is authorized
subject to certain restrictions (such as erasure within seven days), or home taping
is not authorized at all. The Spring 1978 edition of the guide described
107 programs. Sixty-two of those programs or 58% authorize some home taping. Twenty-one
of them or almost 20% authorize unrestricted home taping.
Second is the testimony of Fred Rogers, president of the corporation that produces
and owns the copyright on Mister Rogers' Neighborhood. The program is carried by
more public television stations than any other program. Its audience numbers over 3,000,000
families a day. He testified that he had absolutely no objection to home
taping for noncommercial use and expressed the opinion that it is a real
service to families to be able to record children's programs and to show
them at appropriate times.
If there are millions of owners of VTR's who make copies of televised
sports events, religious broadcasts, and educational programs such as Mister Rogers' Neighborhood, and
if the proprietors of those programs welcome the practice, the business of supplying
the equipment that makes such copying feasible should not be stifled simply because
the equipment is used by some individuals to make unauthorized reproductions of respondents'
works. The respondents do not represent a class composed of all copyright holders.
Yet a finding of contributory infringement would inevitably frustrate the interests of broadcasters
in reaching the portion of their audience that is available only through time-shifting.
Of course, the fact that other copyright holders may welcome the practice of
time-shifting does not mean that respondents should be deemed to have granted a
license to copy their programs. Third-party conduct would be wholly irrelevant in an
action for direct infringement of respondents' copyrights. But in an action for contributory
infringement against the seller of copying equipment, the copyright holder may not prevail
unless the relief that he seeks affects only his programs, or unless he
speaks for virtually all copyright holders with an interest in the outcome. In
this case, the record makes it perfectly clear that there are many important
producers of national and local television programs who find nothing objectionable about the
enlargement in the size of the television audience that results from the practice
of time-shifting for private home use. The seller of the equipment that expands
those producers' audiences cannot be a contributory
infringer if, as is true in
this case, it has had no direct involvement with any infringing activity.
Napster facilitates the transmission of MP3 files between and among its users. Through
a process commonly called peer-to-peer file sharing, Napster allows its users to: (1)
make MP3 music files stored on individual computer hard drives available for copying
by other Napster users; (2) search for MP3 music files stored on other
users computers; and (3) transfer exact copies of the contents of other users
MP3 files from one computer to another via the Internet. These functions are
made possible by Napsters MusicShare software, available free of charge from Napsters Internet
site, and Napsters network servers and server-side software. Napster provides technical support for
the indexing and searching of MP3 files, as well as for its other
functions, including a chat room, where users can meet to discuss music, and
a directory where participating artists can provide information about their music.
...Software located on the Napster servers maintains a search index of Napsters collective
directory. To search the files available from Napster users currently connected to the
network servers, the individual user accesses a form in the MusicShare software stored
in his computer and enters either the name of a song or an
artist as the object of the search. The form is then transmitted to
a Napster server and automatically compared to the MP3 file names listed in
the servers search index. Napsters server compiles a list of all MP3 file
names pulled from the search index which include the same search terms entered
on the search form and transmits the list to the searching user. The
Napster server does not search the contents of any MP3 file; rather, the
search is limited to a text search of the file names indexed in
a particular cluster. Those file names may contain typographical errors or otherwise inaccurate
descriptions of the content of the files since they are designated by other
users. Napster, 114 F. Supp. 2d at 906.
To use the hotlist function, the Napster user creates a list of other
users names from whom he has obtained MP3 files in the past. When
logged onto Napsters servers, the system alerts the user if any user on
his list (a hotlisted user) is also logged onto the system. If so,
the user can access an index of all MP3 file names in a
particular hotlisted users library and request a file in the library by selecting
the file name. The contents of the hotlisted users MP3 file are not
stored on the Napster system.
To transfer a copy of the contents of a requested MP3 file, the
Napster server software obtains the Internet address of the requesting user and the
Internet address of the host user (the user with the available files). The
Napster servers then communicate the host users Internet address to the requesting user.
The requesting users computer uses this information to establish a connection with the
host user and downloads a copy of the contents of the MP3 file
from one computer to the other over the Internet, peer-to-peer. A downloaded MP3
file can be played directly from the users hard drive using Napsters MusicShare
program or other software. The file may also be transferred back onto an
audio CD if the user has access to equipment designed for that purpose.
In both cases, the quality of the original sound recording is slightly diminished
by transfer to the MP3 format.
This architecture is described in some detail to promote an understanding of transmission
mechanics as opposed to the content of the transmissions. The content is the
subject of our copyright infringement analysis.
Plaintiffs claim Napster users are engaged in the wholesale reproduction and distribution of
copyrighted works, all constituting direct infringement. Secondary liability for copyright infringement does not
exist in the absence of direct infringement by a third party. Religious Tech.
Ctr. v. Netcom On-Line Communication Servs., Inc., 907 F. Supp. 1361, 1371 (N.D.
Cal. 1995) ([T]here can be no contributory infringement by a defendant without direct
infringement by another.). It follows that Napster does not facilitate infringement of the
copyright laws in the absence of direct infringement by its users. The district
court agreed. We note that the district courts conclusion that plaintiffs have presented
a prima facie case of direct infringement by Napster users is not presently
appealed by Napster.
Accordingly, we next address whether Napster is secondarily liable for the direct infringement
under two doctrines of copyright law: contributory copyright infringement and vicarious copyright infringement.
We first address plaintiffs claim that Napster is liable for contributory copyright infringement.
Traditionally, one who, with knowledge of the infringing activity, induces, causes or materially
contributes to the infringing conduct of another, may be held liable as a
contributory infringer. Gershwin Publg Corp. v. Columbia Artists Mgmt., Inc., 443 F.2d 1159,
1162 (2d Cir. 1971); see also Fonovisa, Inc. v. Cherry Auction, Inc., 76
F.3d 259, 264 (9th Cir. 1996). Put differently, liability exists if the defendant
engages in personal conduct that encourages or assists the infringement. Matthew Bender &
Co. v. West Publg Co., 158 F.3d 693, 706 (2d Cir. 1998).
The district
court determined that plaintiffs in all likelihood would establish Napsters liability as a
contributory infringer. The district court did not err; Napster, by its conduct, knowingly
encourages and assists the infringement of plaintiffs copyrights.
A. Knowledge
Contributory liability requires that the secondary infringer know or have reason to
know of direct infringement. Cable/Home Communication Corp. Network Prods., Inc., 902 F.2d 829,
845 & 846 n.29 (11th Cir. 1990); Religious Tech. Ctr. v. Netcom On-Line
Communication Servs., Inc., 907 F. Supp. 1361, 1373-74 (N.D. Cal. 1995) (framing issue
as whether Netcom knew or should have known of the infringing activities). The
district court found that Napster had both actual and constructive knowledge that its
users exchanged copyrighted music. The district court also concluded that the law does
not require knowledge of specific acts of infringement and rejected Napsters contention that
because the company cannot distinguish infringing from noninfringing files, it does not know
of the direct infringement. 114 F. Supp. 2d at 917.
It is apparent from the record that Napster has knowledge, both actual and
constructive, The district court found actual knowledge because: (1) a document authored by
Napster co-founder Sean Parker mentioned the need to remain ignorant of users real
names and IP addresses since they are exchanging pirated music; and (2) the
Recording Industry Association of America (RIAA) informed Napster of more than 12,000 infringing
files, some of which are still available. 114 F. Supp. 2d at 918.
The district court found constructive knowledge because: (a) Napster executives have recording industry
experience; (b) they have enforced intellectual property rights in other instances; (c) Napster
executives have downloaded copyrighted songs from the system; and (d) they have promoted
the site with screen shots listing infringing files. Id. at 919. of direct
infringement. Napster claims that it is nevertheless protected from contributory liability by the
teaching of Sony Corp. v. Universal City Studios, Inc., 464 U.S. 417 (1984).
We disagree. We observe that Napsters actual, specific knowledge of direct infringement renders
Sonys holding of limited assistance to Napster. We are compelled to make a
clear distinction between the architecture of the Napster system and Napsters conduct in
relation to the operational capacity of the system.
The Sony Court refused to hold the manufacturer and retailers of video tape
recorders liable for contributory infringement despite evidence that such machines could be and
were used to infringe plaintiffs copyrighted television shows. Sony stated that if liability
is to be imposed on petitioners in this case, it must rest on
the fact that they have sold equipment with constructive knowledge of the fact
that their customers may use that equipment to make unauthorized copies of copyrighted
material. Id. at 439 (emphasis added). The Sony Court declined to impute the
requisite level of knowledge where the defendants made and sold equipment capable of
both infringing and substantial noninfringing uses. Id. at 442 (adopting a modified staple
article of commerce doctrine from patent law). See also Universal City Studios, Inc.
v. Sony Corp., 480 F. Supp. 429, 459 (C.D. Cal. 1979) (This court
agrees with defendants that their knowledge was insufficient to make them contributory infringers.),
revd, 659 F.2d 963 (9th Cir. 1981), revd, 464 U.S. 417 (1984); Alfred
C. Yen, Internet Service Provider Liability for Subscriber Copyright Infringement, Enterprise Liability, and
the First Amendment, 88 Geo. L.J. 1833, 1874 & 1893 n.210 (2000) (suggesting
that, after Sony, most Internet service providers lack the requisite level of knowledge
for the imposition of contributory liability).
Regardless of the number of Napsters infringing versus noninfringing uses, the evidentiary
record here supported the district courts finding that plaintiffs would likely prevail in
establishing that Napster knew or had reason to know of its users infringement
of plaintiffs copyrights
. [I]f a computer system operator learns of specific infringing material
available on his system and fails to purge such material from the system,
the operator knows of and contributes to direct infringement. See Netcom, 907 F.
Supp. at 1374. Conversely, absent any specific information which identifies infringing activity, a
computer system operator cannot be liable for contributory infringement merely because the structure
of the system allows for the exchange of copyrighted material. See Sony, 464
U.S. at 436, 442-43. To enjoin simply because a computer network allows for
infringing use would, in our opinion, violate Sony and potentially restrict activity unrelated
to infringing use.
We nevertheless conclude that sufficient knowledge exists to impose contributory liability when linked
to demonstrated infringing use of the Napster system. See Napster, 114 F. Supp.
2d at 919 (Religious Technology Center would not mandate a determination that Napster,
Inc. lacks the knowledge requisite to contributory infringement.). The record supports the district
courts finding that Napster has actual knowledge that specific infringing material is available
using its system, that it could block access to the system by suppliers
of the infringing material, and that it failed to remove the material. See
Napster, 114 F. Supp. 2d at 918, 920-21. As stated by the district
court:
Plaintiff[s] . . . demonstrate that defendant had actual notice of direct infringement
because the RIAA informed it of more than 12,000 infringing files. See Creighton
12/3/99 Dec., Exh. D. Although Napster, Inc. purportedly terminated the users offering these
files, the songs are still available using the Napster service, as are the
copyrighted works which the record company plaintiffs identified in Schedules A and B
of their complaint. See Creighton Supp. Dec. PP 3-4.
114 F. Supp. 2d at 918.
B. Material Contribution
Under the facts as found by the district court, Napster materially
contributes to the infringing activity. Relying on Fonovisa, the district court concluded that
[w]ithout the support services defendant provides, Napster users could not find and download
the music they want with the ease of which defendant boasts. Napster, 114
F. Supp. 2d at 919-20 (Napster is an integrated service designed to enable
users to locate and download MP3 music files.). We agree that Napster provides
the site and facilities for direct infringement. See Fonovisa, 76 F.3d at 264;
cf. Netcom, 907 F. Supp. at 1372 (Netcom will be liable for contributory
infringement since its failure to cancel [a users] infringing message and thereby stop
an infringing copy from being distributed worldwide constitutes substantial participation.). The district court
correctly applied the reasoning in Fonovisa, and properly found that Napster materially contributes
to direct infringement.
We affirm the district courts conclusion that plaintiffs have demonstrated a likelihood of
success on the merits of the contributory copyright infringement claim.
Before moving into this discussion, we note that Sonys staple article of commerce
analysis has no application to Napsters potential liability for vicarious copyright infringement. See
Sony, 464 U.S. at 434-435; see generally Anne Hiaring, Copyright Infringement Issues on
the Internet, 617 PLI/Pat 455, 528 (Sept. 2, 2000) (indicating that the staple
article of commerce doctrine provides a defense only to contributory infringement, not to
vicarious infringement). The issues of Sonys liability under the doctrines of direct infringement
and vicarious liability were not before the Supreme Court, although the Court recognized
that the lines between direct infringement, contributory infringement, and vicarious liability are not
clearly drawn. Id. at 435 n.17. Consequently, when the Sony Court used the
term vicarious liability, it did so broadly and outside of a technical analysis
of the doctrine of vicarious copyright infringement. Id. at 435 ([V]icarious liability is
imposed in virtually all areas of the law, and the concept of contributory
infringement is merely a species of the broader problem of identifying the circumstances
in which it is just to hold one individual accountable for the actions
of another.); see also Blacks Law Dictionary 927 (7th ed. 1999) (defining vicarious
liability in a manner similar to the definition used in Sony).
A. Financial Benefit
The district court determined that plaintiffs had demonstrated they would likely
succeed in establishing that Napster has a direct financial interest in the infringing
activity. Napster, 114 F. Supp. 2d at 921-22. We agree. Financial benefit exists
where the availability of infringing material acts as a draw for customers. Fonovisa,
76 F.3d at 263-64 (stating that financial benefit may be shown where infringing
performances enhance the attractiveness of a venue). Ample evidence supports the district courts
finding that Napsters future revenue is directly dependent upon increases in userbase. More
users register with the Napster system as the quality and quantity of available
music increases. 114 F. Supp. 2d at 902. We conclude that the district
court did not err in determining that Napster financially benefits from the availability
of protected works on its system.
B. Supervision
The district court determined that Napster has the right and ability to
supervise its users conduct. Napster, 114 F. Supp. 2d at 920-21 (finding that
Napsters representations to the court regarding its improved methods of blocking users about
whom rights holders complain . . . is tantamount to an admission that
defendant can, and sometimes does, police its service). We agree in part.
The ability to block infringers access to a particular environment for any reason
whatsoever is evidence of the right and ability to supervise. See Fonovisa, 76
F.3d at 262 (Cherry Auction had the right to terminate vendors for any
reason whatsoever and through that right had the ability to control the activities
of vendors on the premises.); cf. Netcom, 907 F. Supp. at 1375-76 (indicating
that plaintiff raised a genuine issue of fact regarding ability to supervise by
presenting evidence that an electronic bulletin board service can suspend subscribers accounts). Here,
plaintiffs have demonstrated that Napster retains the right to control access to its
system. Napster has an express reservation of rights policy, stating on its website
that it expressly reserves the right to refuse service and terminate accounts in
[its] discretion, including, but not limited to, if Napster believes that user conduct
violates applicable law . . . or for any reason in Napsters sole
discretion, with or without cause.
To escape imposition of vicarious liability, the reserved right to police must be
exercised to its fullest extent. Turning a blind eye to detectable acts of
infringement for the sake of profit gives rise to liability. See, e.g., Fonovisa,
76 F.3d at 261 (There is no dispute for the purposes of this
appeal that Cherry Auction and its operators were aware that vendors in their
swap meets were selling counterfeit recordings.); see also Gershwin, 443 F.2d at 1161-62
(citing Shapiro, Bernstein & Co. v. H.L. Greene Co., 316 F.2d 304 (2d
Cir. 1963), for the proposition that failure to police the conduct of the
primary infringer leads to imposition of vicarious liability for copyright infringement).
The district court correctly determined that Napster had the right and ability to
police its system and failed to exercise that right to prevent the exchange
of copyrighted material. The district court, however, failed to recognize that the boundaries
of the premises that Napster controls and patrols are limited. See, e.g., Fonovisa,
76 F.2d at 262-63 (in addition to having the right to exclude vendors,
defendant controlled and patrolled the premises); see also Polygram, 855 F. Supp. at
1328-29 (in addition to having the contractual right to remove exhibitors, trade show
operator reserved the right to police during the show and had its employees
walk the aisles to ensure rules compliance). Put differently, Napsters reserved right and
ability to police is cabined by the systems current architecture. As shown by
the record, the Napster system does not read the content of indexed files,
other than to check that they are in the proper MP3 format.
Napster,
however, has the ability to locate infringing material listed on its search indices,
and the right to terminate users access to the system. The file name
indices, therefore, are within the premises that Napster has the ability to police.
We recognize that the files are user-named and may not match copyrighted material
exactly (for example, the artist or song could be spelled wrong). For Napster
to function effectively, however, file names must reasonably or roughly correspond to the
material contained in the files, otherwise no user could ever locate any desired
music. As a practical matter, Napster, its users and the record company plaintiffs
have equal access to infringing material by employing Napsters search function.
Our review of the record requires us to accept the district courts conclusion
that plaintiffs have demonstrated a likelihood of success on the merits of the
vicarious copyright infringement claim. Napsters failure to police the systems premises, combined with
a showing that Napster financially benefits from the continuing availability of infringing files
on its system, leads to the imposition of vicarious liability
.
The district court correctly recognized that a preliminary injunction against Napsters participation in
copyright infringement is not only warranted but required. We believe, however, that the
scope of the injunction needs modification in light of our opinion. Specifically, we
reiterate that contributory liability may potentially be imposed only to the extent that
Napster: (1) receives reasonable knowledge of specific infringing files with copyrighted musical compositions
and sound recordings; (2) knows or should know that such files are available
on the Napster system; and (3) fails to act to prevent viral distribution
of the works. See Netcom, 907 F. Supp. at 1374-75. The mere existence
of the Napster system, absent actual notice and Napsters demonstrated failure to remove
the offending material, is insufficient to impose contributory liability. See Sony, 464 U.S.
at 442-43.
Conversely, Napster may be vicariously liable when it fails to affirmatively use its
ability to patrol its system and preclude access to potentially infringing files listed
in its search index. Napster has both the ability to use its search
function to identify infringing musical recordings and the right to bar participation of
users who engage in the transmission of infringing files.
The preliminary injunction which
we stayed is overbroad because it places on Napster the entire burden of
ensuring that no copying, downloading, uploading, transmitting, or distributing of plaintiffs works occur
on the system. As stated, we place the burden on plaintiffs to provide
notice to Napster of copyrighted works and files containing such works available on
the Napster system before Napster has the duty to disable access to the
offending content. Napster, however, also bears the burden of policing the system within
the limits of the system. Here, we recognize that this is not an
exact science in that the files are user named. In crafting the injunction
on remand, the district court should recognize that Napsters system does not currently
appear to allow Napster access to users MP3 files.
Justice Souter delivered the opinion of the Court.
Respondents, Grokster, Ltd., and StreamCast Networks, Inc., defendants in the trial court, distribute
free software products that allow computer users to share electronic files through peer-to-peer
networks, so called because users' computers communicate directly with each other, not through
central servers. The advantage of peer-to-peer networks over information networks of other types
shows up in their substantial and growing popularity. Because they need no central
computer server to mediate the exchange of information or files among users, the
high-bandwidth communications capacity for a server may be dispensed with, and the need
for costly server storage space is eliminated. Since copies of a file (particularly
a popular one) are available on many users' computers, file requests and retrievals
may be faster than on other types of networks, and since file exchanges
do not travel through a server, communications can take place between any computers
that remain connected to the network without risk that a glitch in the
server will disable the network in its entirety. Given these benefits in security,
cost, and efficiency, peer-to-peer networks are employed to store and distribute electronic files
by universities, government agencies, corporations, and libraries, among others.
Other users of peer-to-peer networks include individual recipients of Grokster's and StreamCast's software,
and although the networks that they enjoy through using the software can be
used to share any type of digital file, they have prominently employed those
networks in sharing copyrighted music and video files without authorization. A group of
copyright holders (MGM for short, but including motion picture studios, recording companies, songwriters,
and music publishers) sued Grokster and StreamCast for their users' copyright infringements, alleging
that they knowingly and intentionally distributed their software to enable users to reproduce
and distribute the copyrighted works in violation of the Copyright Act, 17 U. S. C.
§101 et seq. (2000 ed. and Supp. II). MGM sought damages and an
injunction.
Discovery during the litigation revealed the way the software worked, the business aims
of each defendant company, and the predilections of the users
.[With both defendants software,
users can search for files, the search results are communicated to the requesting
computer, and the user can download desired files directly from peers' computers.] Grokster
and StreamCast use no servers to intercept the content of the search requests
or to mediate the file transfers conducted by users of the software, there
being no central point through which the substance of the communications passes in
either direction.
Although Grokster and StreamCast do not therefore know when particular files are copied,
a few searches using their software would show what is available on the
networks the software reaches. MGM commissioned a statistician to conduct a systematic search,
and his study showed that nearly 90% of the files available for download
on the FastTrack system were copyrighted works. Grokster and StreamCast dispute this figure,
raising methodological problems and arguing that free copying even of copyrighted works may
be authorized by the rightholders. They also argue that potential noninfringing uses of
their software are significant in kind, even if infrequent in practice. Some musical
performers, for example, have gained new audiences by distributing their copyrighted works for
free across peer-to-peer networks, and some distributors of unprotected content have used peer-to-peer
networks to disseminate files, Shakespeare being an example. Indeed, StreamCast has given Morpheus
users the opportunity to download the briefs in this very case, though their
popularity has not been quantified.
Grokster and StreamCast are not, however, merely passive recipients of information about infringing
use. The record is replete with evidence that from the moment Grokster and
StreamCast began to distribute their free software, each one clearly voiced the objective
that recipients use it to download copyrighted works, and each took active steps
to encourage infringement.
After the notorious file-sharing service, Napster, was sued by copyright holders for facilitation
of copyright infringement, A & M Records, Inc. v. Napster, Inc., 114 F. Supp.
2d 896 (ND Cal. 2000), aff'd in part, rev'd in part, 239 F. 3d
1004 (CA9 2001), StreamCast gave away a software program of a kind known
as OpenNap, designed as compatible with the Napster program and open to Napster
users for downloading files from other Napster and OpenNap users' computers. Evidence indicates
that "[i]t was always [StreamCast's] intent to use [its OpenNap network] to be
able to capture email addresses of [its] initial target market so that [it]
could promote [its] StreamCast Morpheus interface to them," App. 861; indeed, the OpenNap
program was engineered " 'to leverage Napster's 50 million user base,' " id., at 746.
The evidence that Grokster sought to capture the market of former Napster users
is sparser but revealing, for Grokster launched its own OpenNap system called Swaptor
and inserted digital codes into its Web site so that computer users using
Web search engines to look for "Napster" or "[f]ree filesharing" would be directed
to the Grokster Web site, where they could download the Grokster software. Id.,
at 992-993. And Grokster's name is an apparent derivative of Napster.
In addition to this evidence of express promotion, marketing, and intent to promote
further, the business models employed by Grokster and StreamCast confirm that their principal
object was use of their software to download copyrighted works. Grokster and StreamCast
receive no revenue from users, who obtain the software itself for nothing. Instead,
both companies generate income by selling advertising space, and they stream the advertising
to Grokster and Morpheus users while they are employing the programs. As the
number of users of each program increases, advertising opportunities become worth more. While
there is doubtless some demand for free Shakespeare, the evidence shows that substantive
volume is a function of free access to copyrighted work. Users seeking Top
40 songs, for example, or the latest release by Modest Mouse, are certain
to be far more numerous than those seeking a free Decameron, and Grokster
and StreamCast translated that demand into dollars.
Finally, there is no evidence that either company made an effort to filter
copyrighted material from users' downloads or otherwise impede the sharing of copyrighted files
After discovery, the parties on each side of the case cross-moved for summary
judgment
. The District Court held that those who used the Grokster and Morpheus
software to download copyrighted media files directly infringed MGM's copyrights, a conclusion not
contested on appeal, but the court nonetheless granted summary judgment in favor of
Grokster and StreamCast as to any liability arising from distribution of the then
current versions of their software. Distributing that software gave rise to no liability
in the court's view, because its use did not provide the distributors with
actual knowledge of specific acts of infringement.
The Court of Appeals affirmed.
the court read Sony Corp. of America v.
Universal City Studios, Inc., 464 U. S. 417 (1984), as holding that distribution of a commercial product
capable of substantial noninfringing uses could not give rise to contributory liability for
infringement unless the distributor had actual knowledge of specific instances of infringement and
failed to act on that knowledge. The fact that the software was capable
of substantial noninfringing uses in the Ninth Circuit's view meant that Grokster and
StreamCast were not liable, because they had no such actual knowledge, owing to
the decentralized architecture of their software. The court also held that Grokster and
StreamCast did not materially contribute to their users' infringement because it was the
users themselves who searched for, retrieved, and stored the infringing files, with no
involvement by the defendants beyond providing the software in the first place.
The Ninth Circuit also considered whether Grokster and StreamCast could be liable under
a theory of vicarious infringement. The court held against liability because the defendants
did not monitor or control the use of the software, had no agreed-upon
right or current ability to supervise its use, and had no independent duty
to police infringement. We granted certiorari. 543 U. S. ___ (2004).
The argument for imposing indirect liability in this case is
a powerful one,
given the number of infringing downloads that occur every day using StreamCast's and
Grokster's software. When a widely shared service or product is used to commit
infringement, it may be impossible to enforce rights in the protected work effectively
against all direct infringers, the only practical alternative being to go against the
distributor of the copying device for secondary liability on a theory of contributory
or vicarious infringement. See In re Aimster Copyright Litigation, 334 F. 3d 643, 645-646 (CA7
2003).
One infringes contributorily by intentionally inducing or encouraging direct infringement,
and infringes vicariously
by profiting from direct infringement while declining to exercise a right to stop
or limit it,
Although "[t]he Copyright Act does not expressly render anyone liable for
infringement committed by another," Sony Corp. v. Universal City Studios, 464 U. S., at 434, these doctrines
of secondary liability emerged from common law principles and are well established in
the law
.
We agree with MGM that the Court of Appeals misapplied Sony, which it
read as limiting secondary liability quite beyond the circumstances to which the case
applied. Sony barred secondary liability based on presuming or imputing intent to cause
infringement solely from the design or distribution of a product capable of substantial
lawful use, which the distributor knows is in fact used for infringement. The
Ninth Circuit has read Sony's limitation to mean that whenever a product is
capable of substantial lawful use, the producer can never be held contributorily liable
for third parties' infringing use of it
even when an actual purpose to
cause infringing use is shown by evidence independent of design and distribution of
the product
.
This view of Sony, however, was error, converting the case from one about
liability resting on imputed intent to one about liability on any theory. Because
Sony did not displace other theories of secondary liability
we do not revisit
Sony further, as MGM requests, to add a more quantified description of the
point of balance between protection and commerce when liability rests solely on distribution
with knowledge that unlawful use will occur.
Sony's rule limits imputing culpable intent as a matter of law from the
characteristics or uses of a distributed product. But nothing in Sony requires courts
to ignore evidence of intent if there is such evidence, and the case
was never meant to foreclose rules of fault-based liability derived from the common
law
.
The classic case of direct evidence of unlawful purpose occurs when one induces
commission of infringement by another, or "entic[es] or persuad[es] another" to infringe, Black's
Law Dictionary 790 (8th ed. 2004), as by advertising. Thus at common law
a copyright or patent defendant who "not only expected but invoked [infringing use]
by advertisement" was liable for infringement
The rule on inducement of infringement as developed in the early cases is
no different today. [A]dvertising an infringing use or instructing how to engage in
an infringing use, show an affirmative intent that the product be used to
infringe, and a showing that infringement was encouraged overcomes the law's reluctance to
find liability when a defendant merely sells a commercial product suitable for some
lawful use
For the same reasons that Sony took the staple-article doctrine of patent law
as a model for its copyright safe-harbor rule, the inducement rule, too, is
a sensible one for copyright. We adopt it here, holding that one who
distributes a device with the object of promoting its use to infringe copyright,
as shown by clear expression or other affirmative steps taken to foster infringement,
is liable for the resulting acts of infringement by third parties. We are,
of course, mindful of the need to keep from trenching on regular commerce
or discouraging the development of technologies with lawful and unlawful potential. Accordingly, just
as Sony did not find intentional inducement despite the knowledge of the VCR
manufacturer that its device could be used to infringe, 464 U. S., at 439, n. 19, mere knowledge
of infringing potential or of actual infringing uses would not be enough here
to subject a distributor to liability. Nor would ordinary acts incident to product
distribution, such as offering customers technical support or product updates, support liability in
themselves. The inducement rule, instead, premises liability on purposeful, culpable expression and conduct,
and thus does nothing to compromise legitimate commerce or discourage innovation having a
lawful promise.
The only apparent question about treating MGM's evidence as sufficient to withstand summary
judgment under the theory of inducement goes to the need on MGM's part
to adduce evidence that StreamCast and Grokster communicated an inducing message to their
software users. The classic instance of inducement is by advertisement or solicitation that
broadcasts a message designed to stimulate others to commit violations. MGM claims that
such a message is shown here. It is undisputed that StreamCast beamed onto
the computer screens of users of Napster-compatible programs ads urging the adoption of
its OpenNap program
Those who accepted StreamCast's OpenNap program were offered software to
perform the same services, which a factfinder could conclude would readily have been
understood in the Napster market as the ability to download copyrighted music files.
Grokster distributed an electronic newsletter containing links to articles promoting its software's ability
to access popular copyrighted music. And anyone whose Napster or free file-sharing searches
turned up a link to Grokster would have understood Grokster to be offering
the same file-sharing ability as Napster, and to the same people who probably
used Napster for infringing downloads; that would also have been the understanding of
anyone offered Grokster's suggestively named Swaptor software, its version of OpenNap. And both
companies communicated a clear message by responding affirmatively to requests for help in
locating and playing copyrighted materials.
In StreamCast's case, of course, the evidence just described was supplemented by other
unequivocal indications of unlawful purpose in the internal communications and advertising designs aimed
at Napster users ("When the lights went off at Napster ... where did
the users go?" App. 836 (ellipsis in original)). Whether the messages were communicated
is not to the point on this record. The function of the message
in the theory of inducement is to prove by a defendant's own statements
that his unlawful purpose disqualifies him from claiming protection (and incidentally to point
to actual violators likely to be found among those who hear or read
the message).
Three features of this evidence of intent are particularly notable. First, each company
showed itself to be aiming to satisfy a known source of demand for
copyright infringement, the market comprising former Napster users. StreamCast's internal documents made constant
reference to Napster,
. Grokster's name is apparently derived from Napster
Second, this evidence of unlawful objective is given added significance by MGM's showing
that neither company attempted to develop filtering tools or other mechanisms to diminish
the infringing activity using their software. While the Ninth Circuit treated the defendants'
failure to develop such tools as irrelevant because they lacked an independent duty
to monitor their users' activity, we think this evidence underscores Grokster's and StreamCast's
intentional facilitation of their users' infringement.
---
Note 12: Of course, in the absence of other evidence of intent, a
court would be unable to find contributory infringement liability merely based on a
failure to take affirmative steps to prevent infringement, if the device otherwise was
capable of substantial noninfringing uses. Such a holding would tread too close to
the Sony safe harbor.
---
Third, there is a further complement to the direct evidence of unlawful objective.
It is useful to recall that StreamCast and Grokster make money by selling
advertising space, by directing ads to the screens of computers employing their software.
As the record shows, the more the software is used, the more ads
are sent out and the greater the advertising revenue becomes
the commercial sense
of their enterprise turns on high-volume use, which the record shows is infringing.
This evidence alone would not justify an inference of unlawful intent, but viewed
in the context of the entire record its import is clear.
The unlawful objective is unmistakable.
In addition to intent to bring about infringement and distribution of a device suitable for infringing use, the inducement theory of course requires evidence of actual infringement by recipients of the device, the software in this case. As the account of the facts indicates, there is evidence of infringement on a gigantic scale, and there is no serious issue of the adequacy of MGM's showing on this point in order to survive the companies' summary judgment requests there is no question that the summary judgment evidence is at least adequate to entitle MGM to go forward with claims for damages and equitable relief.