Professor Wendy Seltzer, email wendy.seltzer@brooklaw.edu
Safe Harbors and Chilling EffectsNovember 9, 2006
|
|
The Digital Millennium Copyright Act of 1998 has several parts, all packaged as
an update of copyright law for the digital millennium. Well look at anticircumvention
in a later week, but focus here on the safe harbors for online
service providers, the Online Copyright Infringement Liability Limitation Act codified at Section 512.
Scan the section 512 before reading the cases, then come back to read
it in more detail after. Theres a lot of detail packed into its
tangled prose.
RTC v. Netcom predates the DMCA, but remains relevant after since The failure
of a service providers conduct to qualify for limitation of liability under [Section
512] shall not bear adversely upon the consideration of a defense by the
service provider that the service providers conduct is not infringing under this title
or any other defense. 512(l). The discussion of secondary liability in RTC v.
Netcom should look familiar from A&M v. Napster, which drew upon its analysis.
The DMCA offers immunity from liability to those who fit within its definitions
and meet its procedural and substantive requirements. Naturally, that leads to litigation over
whether a given provider and situation meets the DMCA criteria. The courts in
Hendrickson v. eBay, Inc., and ALS Scan, Inc. v. RemarQ Communities, Inc., reach
different conclusions about providers conformity to the DMCA notice and takedown provision, 512(c).
Are the decisions consistent? What happens if a provider does not meet the
statutory criteria? Can a provider ignore DMCA 512 altogether?
Most of the safe harbor seems made for the demands of copyright claimants
and ISPs, but Online Policy Group v. Diebold, shows how the law can
be used by fair users as well, suing for DMCA misuse. Why do
you think Diebold invoked the DMCA in the first place? What are the
options available to someone whose online speech has been wrongly taken down?
The RIAA initially used another part of DMCA 512 in its campaign against
peer-to-peer infringers. The RIAA served ISPs with 512(h) subpoena[s] to identify infringer[s] to
attach names to the IP addresses RIAA agents found sharing music. Often, RIAA
followed these subpoenas with settlement requests, before (or instead of) filing complaints Verizon
challenged the practice, and the D.C. Circuit agreed that these subpoenas were not
authorized by the statute for peer-to-peer filesharing where the ISP was a conduit
but only where the ISP was performing a host or location function. Recording
Indus. Assn of Am. v. Verizon Internet Servs., 351 F.3d 1229 (D.C. Cir.
2003). The RIAA member labels turned to Doe lawsuits instead: suing several Doe
defendants at a time and issuing third-party discovery subpoenas to ISPs for the
same information.
Read the Chilling Effects Weather Report Google DMCA Takedowns: A three-month view, <http://www.chillingeffects.org/weather.cgi?WeatherID=498>,
to see the range of copyright claimants who have used the DMCA takedowns.
Google sends these notices to Chilling Effects and then links to the ChillingEffects.org
website when it has removed results from a search. For an example, scroll
to the bottom of the page at <http://www.google.com/search?q=kazaa+lite>. What part of the safe
harbor are claimants invoking against Google? Based on your understanding of the background
liability issues, does Google need the safe harbor in all instances?
Compare the DMCA safe harbor from copyright liability with the immunity from defamation
liability offered by CDA 230 (Week 3). Why might copyright and defamation be treated
differently? Do you agree with the policy priorities?
§ 512. Limitations on liability relating to material online
(a) Transitory digital network
communications. A service provider shall not be liable for monetary relief, or, except
as provided in subsection (j), for injunctive or other equitable relief, for infringement
of copyright by reason of the provider's transmitting, routing, or providing connections for,
material through a system or network controlled or operated by or for the
service provider, or by reason of the intermediate and transient storage of that
material in the course of such transmitting, routing, or providing connections, if--
(1) the
transmission of the material was initiated by or at the direction of a
person other than the service provider;
(2) the transmission, routing, provision of connections, or
storage is carried out through an automatic technical process without selection of the
material by the service provider;
(3) the service provider does not select the recipients
of the material except as an automatic response to the request of another
person;
(4) no copy of the material made by the service provider in the
course of such intermediate or transient storage is maintained on the system or
network in a manner ordinarily accessible to anyone other than anticipated recipients, and
no such copy is maintained on the system or network in a manner
ordinarily accessible to such anticipated recipients for a longer period than is reasonably
necessary for the transmission, routing, or provision of connections; and
(5) the material is
transmitted through the system or network without modification of its content.
(b) System caching.
(1)
Limitation on liability. A service provider shall not be liable for monetary relief,
or, except as provided in subsection (j), for injunctive or other equitable relief,
for infringement of copyright by reason of the intermediate and temporary storage of
material on a system or network controlled or operated by or for the
service provider in a case in which--
(A) the material is made available
online by a person other than the service provider;
(B) the material is
transmitted from the person described in subparagraph (A) through the system or network
to a person other than the person described in subparagraph (A) at the
direction of that other person; and
(C) the storage is carried out through
an automatic technical process for the purpose of making the material available to
users of the system or network who, after the material is transmitted as
described in subparagraph (B), request access to the material from the person described
in subparagraph (A),
if the conditions set forth in paragraph (2) are met.
(2) Conditions.
The conditions referred to in paragraph (1) are that--
(A) the material described
in paragraph (1) is transmitted to the subsequent users described in paragraph (1)(C)
without modification to its content from the manner in which the material was
transmitted from the person described in paragraph (1)(A);
(B) the service provider described
in paragraph (1) complies with rules concerning the refreshing, reloading, or other updating
of the material when specified by the person making the material available online
in accordance with a generally accepted industry standard data communications protocol for the
system or network through which that person makes the material available, except that
this subparagraph applies only if those rules are not used by the person
described in paragraph (1)(A) to prevent or unreasonably impair the intermediate storage to
which this subsection applies;
(C) the service provider does not interfere with the
ability of technology associated with the material to return to the person described
in paragraph (1)(A) the information that would have been available to that person
if the material had been obtained by the subsequent users described in paragraph
(1)(C) directly from that person, except that this subparagraph applies only if that
technology--
(i) does not significantly interfere with the performance of the provider's system or
network or with the intermediate storage of the material;
(ii) is consistent with generally
accepted industry standard communications protocols; and
(iii) does not extract information from the provider's
system or network other than the information that would have been available to
the person described in paragraph (1)(A) if the subsequent users had gained access
to the material directly from that person;
(D) if the person described in
paragraph (1)(A) has in effect a condition that a person must meet prior
to having access to the material, such as a condition based on payment
of a fee or provision of a password or other information, the service
provider permits access to the stored material in significant part only to users
of its system or network that have met those conditions and only in
accordance with those conditions; and
(E) if the person described in paragraph (1)(A)
makes that material available online without the authorization of the copyright owner of
the material, the service provider responds expeditiously to remove, or disable access to,
the material that is claimed to be infringing upon notification of claimed infringement
as described in subsection (c)(3), except that this subparagraph applies only if--
(i) the
material has previously been removed from the originating site or access to it
has been disabled, or a court has ordered that the material be removed
from the originating site or that access to the material on the originating
site be disabled; and
(ii) the party giving the notification includes in the notification
a statement confirming that the material has been removed from the originating site
or access to it has been disabled or that a court has ordered
that the material be removed from the originating site or that access to
the material on the originating site be disabled.
(c) Information residing on systems or
networks at direction of users.
(1) In general. A service provider shall not be
liable for monetary relief, or, except as provided in subsection (j), for injunctive
or other equitable relief, for infringement of copyright by reason of the storage
at the direction of a user of material that resides on a system
or network controlled or operated by or for the service provider, if the
service provider--
(A) (i) does not have actual knowledge that the material or
an activity using the material on the system or network is infringing;
(ii) in
the absence of such actual knowledge, is not aware of facts or circumstances
from which infringing activity is apparent; or
(iii) upon obtaining such knowledge or awareness,
acts expeditiously to remove, or disable access to, the material;
(B) does not
receive a financial benefit directly attributable to the infringing activity, in a case
in which the service provider has the right and ability to control such
activity; and
(C) upon notification of claimed infringement as described in paragraph (3),
responds expeditiously to remove, or disable access to, the material that is claimed
to be infringing or to be the subject of infringing activity.
(2) Designated agent.
The limitations on liability established in this subsection apply to a service provider
only if the service provider has designated an agent to receive notifications of
claimed infringement described in paragraph (3), by making available through its service, including
on its website in a location accessible to the public, and by providing
to the Copyright Office, substantially the following information:
(A) the name, address, phone
number, and electronic mail address of the agent.
(B) other contact information which
the Register of Copyrights may deem appropriate.
The Register of Copyrights shall maintain a
current directory of agents available to the public for inspection, including through the
Internet, in both electronic and hard copy formats, and may require payment of
a fee by service providers to cover the costs of maintaining the directory.
(3)
Elements of notification.
(A) To be effective under this subsection, a notification of
claimed infringement must be a written communication provided to the designated agent of
a service provider that includes substantially the following:
(i) A physical or electronic signature
of a person authorized to act on behalf of the owner of an
exclusive right that is allegedly infringed.
(ii) Identification of the copyrighted work claimed to
have been infringed, or, if multiple copyrighted works at a single online site
are covered by a single notification, a representative list of such works at
that site.
(iii) Identification of the material that is claimed to be infringing or
to be the subject of infringing activity and that is to be removed
or access to which is to be disabled, and information reasonably sufficient to
permit the service provider to locate the material.
(iv) Information reasonably sufficient to permit
the service provider to contact the complaining party, such as an address, telephone
number, and, if available, an electronic mail address at which the complaining party
may be contacted.
(v) A statement that the complaining party has a good faith
belief that use of the material in the manner complained of is not
authorized by the copyright owner, its agent, or the law.
(vi) A statement that
the information in the notification is accurate, and under penalty of perjury, that
the complaining party is authorized to act on behalf of the owner of
an exclusive right that is allegedly infringed.
(B) (i) Subject to clause (ii),
a notification from a copyright owner or from a person authorized to act
on behalf of the copyright owner that fails to comply substantially with the
provisions of subparagraph (A) shall not be considered under paragraph (1)(A) in determining
whether a service provider has actual knowledge or is aware of facts or
circumstances from which infringing activity is apparent.
(ii) In a case in which the
notification that is provided to the service provider's designated agent fails to comply
substantially with all the provisions of subparagraph (A) but substantially complies with clauses
(ii), (iii), and (iv) of subparagraph (A), clause (i) of this subparagraph applies
only if the service provider promptly attempts to contact the person making the
notification or takes other reasonable steps to assist in the receipt of notification
that substantially complies with all the provisions of subparagraph (A).
(d) Information location tools.
A service provider shall not be liable for monetary relief, or, except as
provided in subsection (j), for injunctive or other equitable relief, for infringement of
copyright by reason of the provider referring or linking users to an online
location containing infringing material or infringing activity, by using information location tools, including
a directory, index, reference, pointer, or hypertext link, if the service provider--
(1) (A)
does not have actual knowledge that the material or activity is infringing;
(B)
in the absence of such actual knowledge, is not aware of facts or
circumstances from which infringing activity is apparent; or
(C) upon obtaining such knowledge
or awareness, acts expeditiously to remove, or disable access to, the material;
(2) does
not receive a financial benefit directly attributable to the infringing activity, in a
case in which the service provider has the right and ability to control
such activity; and
(3) upon notification of claimed infringement as described in subsection (c)(3),
responds expeditiously to remove, or disable access to, the material that is claimed
to be infringing or to be the subject of infringing activity, except that,
for purposes of this paragraph, the information described in subsection (c)(3)(A)(iii) shall be
identification of the reference or link, to material or activity claimed to be
infringing, that is to be removed or access to which is to be
disabled, and information reasonably sufficient to permit the service provider to locate that
reference or link.
(e) Limitation on liability of nonprofit educational institutions.
(1) When a public
or other nonprofit institution of higher education is a service provider, and when
a faculty member or graduate student who is an employee of such institution
is performing a teaching or research function, for the purposes of subsections (a)
and (b) such faculty member or graduate student shall be considered to be
a person other than the institution, and for the purposes of subsections (c)
and (d) such faculty member's or graduate student's knowledge or awareness of his
or her infringing activities shall not be attributed to the institution, if--
(A)
such faculty member's or graduate student's infringing activities do not involve the provision
of online access to instructional materials that are or were required or recommended,
within the preceding 3-year period, for a course taught at the institution by
such faculty member or graduate student;
(B) the institution has not, within the
preceding 3-year period, received more than two notifications described in subsection (c)(3) of
claimed infringement by such faculty member or graduate student, and such notifications of
claimed infringement were not actionable under subsection (f); and
(C) the institution provides
to all users of its system or network informational materials that accurately describe,
and promote compliance with, the laws of the United States relating to copyright.
(2)
For the purposes of this subsection, the limitations on injunctive relief contained in
subsections (j)(2) and (j)(3), but not those in (j)(1), shall apply.
(f) Misrepresentations. Any
person who knowingly materially misrepresents under this section--
(1) that material or activity is
infringing, or
(2) that material or activity was removed or disabled by mistake or
misidentification,
shall be liable for any damages, including costs and attorneys' fees, incurred by
the alleged infringer, by any copyright owner or copyright owner's authorized licensee, or
by a service provider, who is injured by such misrepresentation, as the result
of the service provider relying upon such misrepresentation in removing or disabling access
to the material or activity claimed to be infringing, or in replacing the
removed material or ceasing to disable access to it.
(g) Replacement of removed or
disabled material and limitation on other liability.
(1) No liability for taking down generally.
Subject to paragraph (2), a service provider shall not be liable to any
person for any claim based on the service provider's good faith disabling of
access to, or removal of, material or activity claimed to be infringing or
based on facts or circumstances from which infringing activity is apparent, regardless of
whether the material or activity is ultimately determined to be infringing.
(2) Exception. Paragraph
(1) shall not apply with respect to material residing at the direction of
a subscriber of the service provider on a system or network controlled or
operated by or for the service provider that is removed, or to which
access is disabled by the service provider, pursuant to a notice provided under
subsection (c)(1)(C), unless the service provider--
(A) takes reasonable steps promptly to notify
the subscriber that it has removed or disabled access to the material;
(B)
upon receipt of a counter notification described in paragraph (3), promptly provides the
person who provided the notification under subsection (c)(1)(C) with a copy of the
counter notification, and informs that person that it will replace the removed material
or cease disabling access to it in 10 business days; and
(C) replaces
the removed material and ceases disabling access to it not less than 10,
nor more than 14, business days following receipt of the counter notice, unless
its designated agent first receives notice from the person who submitted the notification
under subsection (c)(1)(C) that such person has filed an action seeking a court
order to restrain the subscriber from engaging in infringing activity relating to the
material on the service provider's system or network.
(3) Contents of counter notification. To
be effective under this subsection, a counter notification must be a written communication
provided to the service provider's designated agent that includes substantially the following:
(A)
A physical or electronic signature of the subscriber.
(B) Identification of the material
that has been removed or to which access has been disabled and the
location at which the material appeared before it was removed or access to
it was disabled.
(C) A statement under penalty of perjury that the subscriber
has a good faith belief that the material was removed or disabled as
a result of mistake or misidentification of the material to be removed or
disabled.
(D) The subscriber's name, address, and telephone number, and a statement that
the subscriber consents to the jurisdiction of Federal District Court for the judicial
district in which the address is located, or if the subscriber's address is
outside of the United States, for any judicial district in which the service
provider may be found, and that the subscriber will accept service of process
from the person who provided notification under subsection (c)(1)(C) or an agent of
such person.
(4) Limitation on other liability. A service provider's compliance with paragraph (2)
shall not subject the service provider to liability for copyright infringement with respect
to the material identified in the notice provided under subsection (c)(1)(C).
(h) Subpoena to
identify infringer.
(1) Request. A copyright owner or a person authorized to act on
the owner's behalf may request the clerk of any United States district court
to issue a subpoena to a service provider for identification of an alleged
infringer in accordance with this subsection.
(2) Contents of request. The request may be
made by filing with the clerk--
(A) a copy of a notification described
in subsection (c)(3)(A);
(B) a proposed subpoena; and
(C) a sworn declaration to
the effect that the purpose for which the subpoena is sought is to
obtain the identity of an alleged infringer and that such information will only
be used for the purpose of protecting rights under this title.
(3) Contents of
subpoena. The subpoena shall authorize and order the service provider receiving the notification
and the subpoena to expeditiously disclose to the copyright owner or person authorized
by the copyright owner information sufficient to identify the alleged infringer of the
material described in the notification to the extent such information is available to
the service provider.
(4) Basis for granting subpoena. If the notification filed satisfies the
provisions of subsection (c)(3)(A), the proposed subpoena is in proper form, and the
accompanying declaration is properly executed, the clerk shall expeditiously issue and sign the
proposed subpoena and return it to the requester for delivery to the service
provider.
(5) Actions of service provider receiving subpoena. Upon receipt of the issued subpoena,
either accompanying or subsequent to the receipt of a notification described in subsection
(c)(3)(A), the service provider shall expeditiously disclose to the copyright owner or person
authorized by the copyright owner the information required by the subpoena, notwithstanding any
other provision of law and regardless of whether the service provider responds to
the notification.
(6) Rules applicable to subpoena. Unless otherwise provided by this section or
by applicable rules of the court, the procedure for issuance and delivery of
the subpoena, and the remedies for noncompliance with the subpoena, shall be governed
to the greatest extent practicable by those provisions of the Federal Rules of
Civil Procedure governing the issuance, service, and enforcement of a subpoena duces tecum.
(i)
Conditions for eligibility.
(1) Accommodation of technology. The limitations on liability established by this
section shall apply to a service provider only if the service provider--
(A)
has adopted and reasonably implemented, and informs subscribers and account holders of the
service provider's system or network of, a policy that provides for the termination
in appropriate circumstances of subscribers and account holders of the service provider's system
or network who are repeat infringers; and
(B) accommodates and does not interfere
with standard technical measures.
(2) Definition. As used in this subsection, the term "standard
technical measures" means technical measures that are used by copyright owners to identify
or protect copyrighted works and--
(A) have been developed pursuant to a broad
consensus of copyright owners and service providers in an open, fair, voluntary, multi-industry
standards process;
(B) are available to any person on reasonable and nondiscriminatory terms;
and
(C) do not impose substantial costs on service providers or substantial burdens
on their systems or networks.
(j) Injunctions. The following rules shall apply in the
case of any application for an injunction under section 502 against a service
provider that is not subject to monetary remedies under this section:
(1) Scope of
relief.
(A) With respect to conduct other than that which qualifies for the
limitation on remedies set forth in subsection (a), the court may grant injunctive
relief with respect to a service provider only in one or more of
the following forms:
(i) An order restraining the service provider from providing access to
infringing material or activity residing at a particular online site on the provider's
system or network.
(ii) An order restraining the service provider from providing access to
a subscriber or account holder of the service provider's system or network who
is engaging in infringing activity and is identified in the order, by terminating
the accounts of the subscriber or account holder that are specified in the
order.
(iii) Such other injunctive relief as the court may consider necessary to prevent
or restrain infringement of copyrighted material specified in the order of the court
at a particular online location, if such relief is the least burdensome to
the service provider among the forms of relief comparably effective for that purpose.
(B) If the service provider qualifies for the limitation on remedies described in
subsection (a), the court may only grant injunctive relief in one or both
of the following forms:
(i) An order restraining the service provider from providing access
to a subscriber or account holder of the service provider's system or network
who is using the provider's service to engage in infringing activity and is
identified in the order, by terminating the accounts of the subscriber or account
holder that are specified in the order.
(ii) An order restraining the service provider
from providing access, by taking reasonable steps specified in the order to block
access, to a specific, identified, online location outside the United States.
(2) Considerations. The
court, in considering the relevant criteria for injunctive relief under applicable law, shall
consider--
(A) whether such an injunction, either alone or in combination with other
such injunctions issued against the same service provider under this subsection, would significantly
burden either the provider or the operation of the provider's system or network;
(B) the magnitude of the harm likely to be suffered by the copyright
owner in the digital network environment if steps are not taken to prevent
or restrain the infringement;
(C) whether implementation of such an injunction would be
technically feasible and effective, and would not interfere with access to noninfringing material
at other online locations; and
(D) whether other less burdensome and comparably effective
means of preventing or restraining access to the infringing material are available.
(3) Notice
and ex parte orders. Injunctive relief under this subsection shall be available only
after notice to the service provider and an opportunity for the service provider
to appear are provided, except for orders ensuring the preservation of evidence or
other orders having no material adverse effect on the operation of the service
provider's communications network.
(k) Definitions.
(1) Service provider.
(A) As used in subsection (a), the
term "service provider" means an entity offering the transmission, routing, or providing of
connections for digital online communications, between or among points specified by a user,
of material of the user's choosing, without modification to the content of the
material as sent or received.
(B) As used in this section, other than
subsection (a), the term "service provider" means a provider of online services or
network access, or the operator of facilities therefor, and includes an entity described
in subparagraph (A).
(2) Monetary relief. As used in this section, the term "monetary
relief" means damages, costs, attorneys' fees, and any other form of monetary payment.
(l)
Other defenses not affected. The failure of a service provider's conduct to qualify
for limitation of liability under this section shall not bear adversely upon the
consideration of a defense by the service provider that the service provider's conduct
is not infringing under this title or any other defense.
(m) Protection of privacy.
Nothing in this section shall be construed to condition the applicability of subsections
(a) through (d) on--
(1) a service provider monitoring its service or affirmatively seeking
facts indicating infringing activity, except to the extent consistent with a standard technical
measure complying with the provisions of subsection (i); or
(2) a service provider gaining
access to, removing, or disabling access to material in cases in which such
conduct is prohibited by law.
(n) Construction. Subsections (a), (b), (c), and (d) describe
separate and distinct functions for purposes of applying this section. Whether a service
provider qualifies for the limitation on liability in any one of those subsections
shall be based solely on the criteria in that subsection, and shall not
affect a determination of whether that service provider qualifies for the limitations on
liability under any other such subsection.
Plaintiffs Religious Technology Center ("RTC") and Bridge Publications, Inc. ("BPI") hold copyrights in
the unpublished and published works of L. Ron Hubbard, the late founder of
the Church of Scientology ("the Church"). Defendant Dennis Erlich ("Erlich") is a former
minister of Scientology turned vocal critic of the Church, whose pulpit is now
the Usenet newsgroup alt.religion.scientology ("a.r.s."), an on-line forum for discussion and criticism of
Scientology. Plaintiffs maintain that Erlich infringed their copyrights when he posted portions of
their works on a.r.s. Erlich gained his access to the Internet through defendant
Thomas Klemesrud's ("Klemesrud's") BBS "support.com." [A separate order granted a preliminary injunction against
Erlich because plaintiffs had shown a likelihood of success on their copyright infringement
claims against him.] Klemesrud is the operator of the BBS, which is run
out of his home and has approximately 500 paying users. Klemesrud's BBS is
not directly linked to the Internet, but gains its connection through the facilities
of defendant Netcom On-Line Communications, Inc. ("Netcom"), one of the largest providers of
Internet access in the United States.
After failing to convince Erlich to stop his postings, plaintiffs contacted defendants Klemesrud
and Netcom. Klemesrud responded to plaintiffs' demands that Erlich be kept off his
system by asking plaintiffs to prove that they owned the copyrights to the
works posted by Erlich. However, plaintiffs refused Klemesrud's request as unreasonable. Netcom similarly
refused plaintiffs' request that Erlich not be allowed to gain access to the
Internet through its system. Netcom contended that it would be impossible to prescreen
Erlich's postings and that to kick Erlich off the Internet meant kicking off
the hundreds of users of Klemesrud's BBS. Consequently, plaintiffs named Klemesrud and Netcom
in their suit against Erlich, although only on the copyright infringement claims.
... For the reasons set forth below, the court grants in part and
denies in part Netcom's motion for summary judgment and Klemesrud's motion for judgment
on the pleadings
.
To establish a claim of copyright infringement, a plaintiff must demonstrate (1) ownership
of a valid copyright and (2) "copying" of protectable expression by the defendant.
Baxter v. MCA, Inc., 812 F.2d 421, 423 (9th Cir.), cert. denied, 484 U.S. 954, 108 S. Ct. 346, 98 L. Ed. 2d 372 (1987). Infringement occurs when a defendant violates one of the
exclusive rights of the copyright holder. 17 U.S.C. § 501(a). These rights include the right to
reproduce the copyrighted work, the right to prepare derivative works, the right to
distribute copies to the public, and the right to publicly display the work.
17 U.S.C. §§ 106(1)-(3) & (5). The court has already determined that plaintiffs have established that
they own the copyrights
. The court also found plaintiffs likely to succeed on
their claim that defendant Erlich copied the Exhibit A and B works and
was not entitled to a fair use defense. Plaintiffs argue that, although Netcom
was not itself the source of any of the infringing materials on its
system, it nonetheless should be liable for infringement, either directly, contributorily, or vicariously.
Netcom disputes these theories of infringement and further argues that it is entitled
to its own fair use defense.
1. Direct Infringement
Infringement consists of the unauthorized
exercise of one of the exclusive rights of the copyright holder delineated in
section 106. 17 U.S.C. § 501. Direct infringement does not require intent or any
particular state of mind, n10 although willfulness is relevant to the award of
statutory damages. 17 U.S.C. § 504(c).
Undisputed Facts
The parties do not dispute the basic
processes that occur when Erlich posts his allegedly infringing messages to a.r.s. Erlich
connects to Klemesrud's BBS using a telephone and a modem. Erlich then transmits
his messages to Klemesrud's computer, where they are automatically briefly stored. According to
a prearranged pattern established by Netcom's software, Erlich's initial act of posting a
message to the Usenet results in the automatic copying of Erlich's message from
Klemesrud's computer onto Netcom's computer and onto other computers on the Usenet. In
order to ease transmission and for the convenience of Usenet users, Usenet servers
maintain postings from newsgroups for a short period of time--eleven days for Netcom's
system and three days for Klemesrud's system. Once on Netcom's computers, messages are
available to Netcom's customers and Usenet neighbors, who may then download the messages
to their own computers. Netcom's local server makes available its postings to a
group of Usenet servers, which do the same for other servers until all
Usenet sites worldwide have obtained access to the postings, which takes a matter
of hours.
Creation of Fixed Copies
In the present case, there is no
question after MAI that "copies" were created, as Erlich's act of sending a
message to a.r.s. caused reproductions of portions of plaintiffs' works on both Klemesrud's
and Netcom's storage devices. Even though the messages remained on their systems for
at most eleven days, they were sufficiently "fixed" to constitute recognizable copies under
the Copyright Act. See Information Infrastructure Task Force, Intellectual Property and the National
Information Infrastructure: The Report of the Working Group on Intellectual Property Rights 66
(1995) ("IITF Report").
Is Netcom Directly Liable for Making the Copies?
Accepting that copies were
made, Netcom argues that Erlich, and not Netcom, is directly liable for the
copying
. The court believes that Netcom's act of designing or implementing a system
that automatically and uniformly creates temporary copies of all data sent through it
is not unlike that of the owner of a copying machine who lets
the public make copies with it. Although some of the people using the
machine may directly infringe copyrights, courts analyze the machine owner's liability under the
rubric of contributory infringement, not direct infringement. Plaintiffs' theory would create many separate
acts of infringement and, carried to its natural extreme, would lead to unreasonable
liability. It is not difficult to conclude that Erlich infringes by copying a
protected work onto his computer and by posting a message to a newsgroup.
However, plaintiffs' theory further implicates a Usenet server that carries Erlich's message to
other servers regardless of whether that server acts without any human intervention beyond
the initial setting up of the system. It would also result in liability
for every single Usenet server in the worldwide link of computers transmitting Erlich's
message to every other computer. These parties, who are liable under plaintiffs' theory,
do no more than operate or implement a system that is essential if
Usenet messages are to be widely distributed. There is no need to construe
the Act to make all of these parties infringers. Although copyright is a
strict liability statute, there should still be some element of volition or causation
which is lacking where a defendant's system is merely used to create a
copy by a third party.
While it is possible that less "damage" would have
been done if Netcom had heeded plaintiffs' warnings and acted to prevent Erlich's
message from being forwarded, this is not relevant to its direct liability for
copying
. Whether a defendant makes a direct copy that constitutes infringement cannot depend
on whether it received a warning to delete the message.
[The court likewise concludes that Netcom is not directly liable for infringement of
the public distribution or display rights]
Conclusion
The court is not persuaded by plaintiffs' argument that Netcom is directly liable
for the copies that are made and stored on its computer. Where the
infringing subscriber is clearly directly liable for the same act, it does not
make sense to adopt a rule that could lead to the liability of
countless parties whose role in the infringement is nothing more than setting up
and operating a system that is necessary for the functioning of the Internet.
Such a result is unnecessary as there is already a party directly liable
for causing the copies to be made... . The court does not find
workable a theory of infringement that would hold the entire Internet liable for
activities that cannot reasonably be deterred... . Because the court cannot see any
meaningful distinction (without regard to knowledge) between what Netcom did and what every
other Usenet server does, the court finds that Netcom cannot be held liable
for direct infringement.
2. Contributory Infringement
Netcom is not free from liability just because it did not
directly infringe plaintiffs' works; it may still be liable as a contributory infringer.
Although there is no statutory rule of liability for infringement committed by others
.
Liability for participation in the infringement will be established where the defendant, "with
knowledge of the infringing activity, induces, causes or materially contributes to the infringing
conduct of another." Gershwin Publishing Corp. v. Columbia Artists Management, Inc., 443 F.2d 1159 (2d Cir. 1971).
a. Knowledge of Infringing Activity
Plaintiffs insist that Netcom knew that
Erlich was infringing their copyrights at least after receiving notice from plaintiffs' counsel
indicating that Erlich had posted copies of their works onto a.r.s. through Netcom's
system. Despite this knowledge, Netcom continued to allow Erlich to post messages to
a.r.s. and left the allegedly infringing messages on its system so that Netcom's
subscribers and other Usenet servers could access them. Netcom argues that it did
not possess the necessary type of knowledge because (1) it did not know
of Erlich's planned infringing activities when it agreed to lease its facilities to
Klemesrud, (2) it did not know that Erlich would infringe prior to any
of his postings, (3) it is unable to screen out infringing postings before
they are made, and (4) its knowledge of the infringing nature of Erlich's
postings was too equivocal given the difficulty in assessing whether the registrations were
valid and whether Erlich's use was fair. The court will address these arguments
in turn.
Netcom cites cases holding that there is no contributory infringement by the
lessors of premises that are later used for infringement unless the lessor had knowledge
of the intended use at the time of the signing of the lease.
Here, Netcom not only leases space but also serves as an access provider,
which includes the storage and transmission of information necessary to facilitate Erlich's postings
to a.r.s. Unlike a landlord, Netcom retains some control over, the use of
its system. Thus, the relevant time frame for knowledge is not when Netcom
entered into an agreement with Klemesrud. It should be when Netcom provided its
services to allow Erlich to infringe plaintiffs' copyrights.
It is undisputed that Netcom
did not know that Erlich was infringing before it received notice from plaintiffs.
However, the evidence reveals a question of fact as to whether Netcom knew
or should have known that Erlich had infringed plaintiffs' copyrights following receipt of
plaintiffs' letter. Because Netcom was arguably participating in Erlich's public distribution of plaintiffs'
works, there is a genuine issue as to whether Netcom knew of any
infringement by Erlich before it was too late to do anything about it.
If plaintiffs can prove the knowledge element, Netcom will be liable for contributory
infringement since its failure to simply cancel Erlich's infringing message and thereby stop
an infringing copy from being distributed worldwide constitutes substantial participation in Erlich's public
distribution of the message.
Netcom argues that its knowledge after receiving notice of Erlich's alleged infringing activities
was too equivocal given the difficulty in assessing whether registrations are valid and
whether use is fair. Although a mere unsupported allegation of infringement by a
copyright owner may not automatically put a defendant on notice of infringing activity,
Netcom's position that liability must be unequivocal is unsupportable.
Where works contain copyright notices
within them, as here, it is difficult to argue that a defendant did
not know that the works were copyrighted. To require proof of valid registrations
would be impractical and would perhaps take too long to verify, making it
impossible for a copyright holder to protect his or her works in some
cases, as works are automatically deleted less than two weeks after they are
posted. The court is more persuaded by the argument that it is beyond
the ability of a BBS operator to quickly and fairly determine when a
use is not infringement where there is at least a colorable claim of
fair use. Where a BBS operator cannot reasonably verify a claim of infringement,
either because of a possible fair use defense, the lack of copyright notices
on the copies, or the copyright holder's failure to provide the necessary documentation
to show that there is a likely infringement, the operator's lack of knowledge
will be found reasonable and there will be no liability for contributory infringement for
allowing the continued distribution of the works on its system.
Since Netcom was given
notice of an infringement claim before Erlich had completed his infringing activity, there
may be a question of fact as to whether Netcom knew or should
have known that such activities were infringing. Given the context of a dispute
between a former minister and a church he is criticizing, Netcom may be
able to show that its lack of knowledge that Erlich was infringing was
reasonable. However, Netcom admits that it did not even look at the postings
once given notice and that had it looked at the copyright notice and
statements regarding authorship it would have triggered an investigation into whether there was
infringement. These facts are sufficient to raise a question as to Netcom's knowledge
once it received a letter from plaintiffs on December 29, 1994.
b. Substantial
Participation
Where a defendant has knowledge of the primary infringer's infringing activities, it will
be liable if it "induces, causes or materially contributes to the infringing conduct
of" the primary infringer. Gershwin Publishing, 443 F.2d at 1162. Such participation must
be substantial.
Providing a service that allows for the automatic distribution of all Usenet postings,
infringing and noninfringing, goes well beyond renting a premises to an infringer. See
Fonovisa, Inc. v. Cherry Auction, Inc., 847 F.Supp. 1492, 1496 (E.D.Cal. 1994) (finding
that renting space at swap meet to known bootleggers not "substantial participation" in
the infringers' activities)... . Netcom allows Erlich's infringing messages to remain on its
system and be further distributed to other Usenet servers worldwide. It does not
completely relinquish control over how its system is used, unlike a landlord. Thus,
it is fair, assuming Netcom is able to take simple measures to prevent
further damage to plaintiffs' copyrighted works, to hold Netcom liable for contributory infringement
where Netcom has knowledge of Erlich's infringing postings yet continues to aid in
the accomplishment of Erlich's purpose of publicly distributing the postings. Accordingly, plaintiffs do
raise a genuine issue of material fact as to their theory of contributory
infringement as to the postings made after Netcom was on notice of plaintiffs'
infringement claim.
3. Vicarious Liability
Even if plaintiffs cannot prove that Netcom is contributorily liable for its participation
in the infringing activity, it may still seek to prove vicarious infringement based
on Netcom's relationship to Erlich. A defendant is liable for vicarious liability for
the actions of a primary infringer where the defendant (1) has the right
and ability to control the infringer's acts and (2) receives a direct financial
benefit from the infringement. Unlike contributory infringement, knowledge is not an element of
vicarious liability.
a. Right and Ability To Control
The first element of vicarious liability will be met if plaintiffs can show
that Netcom has the right and ability to supervise the conduct of its
subscribers. Netcom argues that it does not have the right to control its
users' postings before they occur. Plaintiffs dispute this and argue that Netcom's terms
and conditions, to which its subscribers must agree, specify that Netcom reserves the
right to take remedial action against subscribers. Plaintiffs argue that under "netiquette," the
informal rules and customs that have developed on the Internet, violation of copyrights
by a user is unacceptable and the access provider has a duty take
measures to prevent this; where the immediate service provider fails, the next service
provider up the transmission stream must act. Further evidence of Netcom's right to
restrict infringing activity is its prohibition of copyright infringement and its requirement that
its subscribers indemnify it for any damage to third parties. Plaintiffs have thus
raised a question of fact as to Netcom's right to control Erlich's use
of its services.
Netcom argues that it could not possibly screen messages before they are posted
given the speed and volume of the data that goes through its system.
Netcom further argues that it has never exercised control over the content of
its users' postings. Plaintiffs' expert opines otherwise, stating that with an easy software
modification Netcom could identify postings that contain particular words or come from particular
individuals. Plaintiffs further dispute Netcom's claim that it could not limit Erlich's access
to Usenet without kicking off all 500 subscribers of Klemesrud's BBS. As evidence
that Netcom has in fact exercised its ability to police its users' conduct,
plaintiffs cite evidence that Netcom has acted to suspend subscribers' accounts on over
one thousand occasions [for commercial advertising, posting obscene materials, and off-topic postings]. Further
evidence shows that Netcom can delete specific postings. Whether such sanctions occurred before
or after the abusive conduct is not material to whether Netcom can exercise
control. The court thus finds that plaintiffs have raised a genuine issue of
fact as to whether Netcom has the right and ability to exercise control
over the activities of its subscribers, and of Erlich in particular.
b. Direct Financial Benefit
Plaintiffs must further prove that Netcom receives a direct financial benefit from the
infringing activities of its users. For example, a landlord who has the right
and ability to supervise the tenant's activities is vicariously liable for the infringements
of the tenant where the rental amount is proportional to the proceeds of
the tenant's sales. However, where a defendant rents space or services on a
fixed rental fee that does not depend on the nature of the activity
of the lessee, courts usually find no vicarious liability because there is no
direct financial benefit from the infringement.... Plaintiffs cannot provide any evidence of a
direct financial benefit received by Netcom from Erlich's infringing postings.... Netcom receives a
fixed fee. There is no evidence that infringement by Erlich, or any other
user of Netcom's services, in any way enhances the value of Netcom's services
to subscribers or attracts new subscribers.... Plaintiffs point to Netcom's advertisements that, compared
to competitors like CompuServe and America Online, Netcom provides easy, regulation-free Internet access.
Plaintiffs assert that Netcom's policy attracts copyright infringers to its system, resulting in
a direct financial benefit. The court is not convinced that such an argument,
if true, would constitute a direct financial benefit to Netcom from Erlich's infringing
activities. Further, plaintiffs' argument is not supported by probative evidence... . Because plaintiffs
have failed to raise a question of fact on this vital element, their
claim of vicarious liability fails.
4. First Amendment Argument
Netcom argues that plaintiffs' theory of liability contravenes the first amendment, as it
would chill the use of the Internet because every access provider or user
would be subject to liability when a user posts an infringing work to
a Usenet newsgroup. While the court agrees that an overbroad injunction might implicate
the First Amendment ... imposing liability for infringement where it is otherwise appropriate
does not necessarily raise a First Amendment issue. The copyright concepts of the
idea/expression dichotomy and the fair use defense balance the important First Amendment rights
with the constitutional authority for "promot[ing] the progress of science and useful arts,"
U.S. CONST. art. I, § 8, cl. 8... .
5. Fair Use Defense
In balancing the various factors, the court finds that there is a question
of fact as to whether there is a valid fair use defense
. Accordingly,
the court does not find that Netcom's use was fair as a matter
of law.
C. Conclusion
The court finds that plaintiffs have raised a genuine issue of fact regarding
whether Netcom should have known that Erlich was infringing their copyrights after receiving
a letter from plaintiffs, whether Netcom substantially participated in the infringement, and whether
Netcom has a valid fair use defense. Accordingly, Netcom is not entitled to
summary judgment on plaintiffs' claim of contributory copyright infringement. However, plaintiffs' claims of
direct and vicarious infringement fail.
eBay provides an Internet website service where over 25 million buyers and
sellers of consumer goods and services have come together to buy and sell
items through either an auction or a fixed-price format
eBay's website allows sellers
to post "listings" (or advertisements) containing descriptions of items they wish to offer
for sale; and it allows buyers to bid for items they wish to
buy
On or about December 20, 2000, eBay received a "cease and desist" letter
from pro se Plaintiff Robert Hendrickson. The letter advised eBay that Plaintiff dba
Tobann International Pictures is the copyright owner of the documentary "Manson." The letter
also stated that pirated copies of "Manson" in digital video disk ("DVD") format
were being offered for sale on eBay. However, the letter did not explain
which copies of "Manson" in DVD format were infringing copies; nor did it
fully describe Plaintiff's copyright interest. The letter demanded that eBay cease and desist "from
any and all further conduct considered an infringement(s) of [Plaintiff's] right" or else
face prosecution "to the fullest extend provided by law."
Promptly after receiving this letter, eBay sent Plaintiff e-mails asking for more
detailed information concerning his copyright and the alleged infringing items. eBay advised Plaintiff
that he ha[d] to submit proper notice under the DMCA.
Specifically, we would
need you to, among other things, identify the exact items which you believe
infringe your rights. In addition, we would need a statement from you, under
penalty of perjury, that you own (or are the agent of the owner)
the copyrights in the documentary.
Plaintiff refused to
fill out eBay's Notice of Infringement form. Before filing suit,
Plaintiff never provided eBay the specific item numbers that it sought
.
Plaintiff alleges that
eBay participated in and facilitated the unlawful sale and distribution of pirated copies
of "Manson" DVDs by providing an online forum, tools and services to the
third party sellers.
[T]he issue raised by Plaintiff's copyright claim is
whether eBay
can be held secondarily liable for providing the type of selling platform/forum and
services that it provided, however limited or automated in nature, to sellers of
counterfeit copies of the film "Manson." Before the Court reaches the merits of
that question, the Court must address a preliminary issue: whether the DMCA shields
eBay from liability for copyright infringement.
The DMCA "is designed to facilitate the robust
development and world-wide expansion of electronic commerce, communications, research, development, and education." S.
Rep. No. 105-190, at 1 (105th Congress, 2d Session 1998). Title II of
the DMCA, set forth in 17 U.S.C. § 512, "protects qualifying Internet service providers
from liability for all monetary relief for direct, vicarious and contributory infringement." Id.
at 20. "Title II preserves strong incentives for service providers and copyright owners
to cooperate to detect and deal with copyright infringements that take place in
the digital networked environment." Id. at 40.
There is no dispute over whether eBay
is an Internet "service provider" within the meaning of Section 512. eBay clearly
meets the DMCA's broad definition of online "service provider." See 17 U.S.C. § 512(k)(1)(B)
("the term 'service provider' means a provider of online services or network access,
or the operator of facilities therefor").
[The court considered the various categories of 512
safe-harbor]
Subsection (c) limits liability for "infringement of copyright by reason of the
storage at the direction of a user of material that resides on a
system or network controlled or operated by or for the service provider." 17
U.S.C. § 512(c).
Here, because the focus of the copyright claims against eBay concerns
infringing activity -- the sale and distribution of pirated copies of "Manson" --
using "materials" posted eBay's website, Section 512(c) would provide eBay a safe harbor
from liability if eBay meets the conditions set forth therein.
Three requirements for safe
harbor are delineated in Section 512(c)(1). First, the service provider must demonstrate that
it does not have actual knowledge that an activity using the material stored
on its website is infringing or an awareness of "facts or circumstances from
which infringing activity is apparent." 17 U.S.C. § 512(c)(1)(A)(i)-(ii). Alternatively, the service provider must
show that it expeditiously removed or disabled access to the problematic material upon
obtaining knowledge or awareness of infringing activity. See 17 U.S.C. § 512(c)(1)(A)(iii). Second, the
service provider must show it "does not receive a financial benefit directly attributable
to the infringing activity" if the service provider has "the right and ability
to control such activity." 17 U.S.C. § 512(c)(1)(B). Third, the service provider must show
that it responded expeditiously to remove the material that is the subject of
infringing activity upon receiving notification of the claimed infringement in the manner described
in Section 512(c)(3). 17 U.S.C. § 512(c)(1)(C).
a. The Third Prong of the Test:
Notification of the Alleged Infringing Activity
Under the third prong of the test, the
service provider's duty to act is triggered only upon receipt of proper notice.
See id. Section 512(c)(3) sets forth the required elements for proper notification by
copyright holders. First, rights holders must provide written notification to the service provider's
designated agent. See 17 U.S.C. § 512(c)(3).
Preliminary, the Court rejects Plaintiff's argument that he need not submit written notification
in the manner described above (i.e., provide the notification referenced in the third
prong of the safe harbor test) as long as other facts show the
service provider received actual or constructive knowledge of infringing activity. Plaintiff refers to
the first prong of the safe harbor test set forth in Section 512(c)(1)(ii)
and (iii) in support of this argument. Plaintiff's argument has no merit.
The DMCA
expressly provides that if the copyright holder's attempted notification fails to "comply substantially"
with the elements of notification described in subsection (c)(3), that notification "shall not be
considered" when evaluating whether the service provider had actual or constructive knowledge of
the infringing activity under the first prong set forth in Section 512(c)(1). 17
U.S.C. § 512(c)(3)(B)(i). Here, Plaintiff does not dispute that he has not strictly complied
with Section 512(c)(3). The question is whether Plaintiff's imperfect attempts to give notice
satisfy Section 512(c)(3)'s "substantial[]" compliance requirement.
(1) No Statement Attesting to Good Faith And
Accuracy of Claim
Plaintiff's pre-suit "cease and desist" letter and e-mails to eBay do
not include several of the key elements for proper notice required by Section
513(c)(3). None of these writings includes a written statement under "penalty of perjury"
attesting to the fact "that the information in the notification is accurate .
. . [and] the complaining party is authorized to act on behalf of
the owner" of the copyright at issue. 17 U.S.C. § 512(c)(3)(A)(vi). Additionally, none of
these writings includes a written statement that Plaintiff "has a good faith belief that
use of the material in the manner complained of is not authorized." 17
U.S.C. § 512(c)(3)(A)(v). The complete failure to include these key elements in his written
communications to eBay, even after eBay specifically asked for these items, renders Plaintiff's notification
of claimed infringement deficient under Section 512(c)(3).
(2) Inadequate Identification of Material Claimed to
be the Subject of Infringing Activity
Moreover, the record shows that Plaintiff failed to
comply substantially with the requirement that he provide eBay with sufficient information to
identify the various listings that purportedly offered pirated copies of "Manson" for sale.
See 17 U.S.C. § 512(c)(3)(A)(iii). It is true that Plaintiff has informed eBay in
writing that counterfeit copies of "Manson" were being offered and sold on eBay's
website. However, when eBay requested that Plaintiff identify the alleged problematic listings by
the eBay item numbers, Plaintiff refused. Plaintiff contends that it is not his
job to do so once he has notified eBay of the existence of
infringing activity by eBay sellers.
The Court recognizes that there may be instances
where a copyright holder need not provide eBay with specific item numbers to
satisfy the identification requirement. For example, if a movie studio advised eBay that
all listings offering to sell a new movie (e.g., "Planet X,") that has
not yet been released in VHS or DVD format are unlawful, eBay could
easily search its website using the title "Planet X" and identify the offensive
listings. However, the record in this case indicates that specific item numbers were
necessary to enable eBay to identify problematic listings.
Plaintiff has never explained what distinguishes
an authorized copy of "Manson" from an unauthorized copy
. A copyright holder must
comply with the "written communication" requirement. See 17 U.S.C. § 512(3)(A). The writing requirement is
not one of the elements listed under the substantial compliance category. Therefore, the
Court disregards all evidence that purports to show Plaintiff gave notice that all
DVDs violate his copyright in "Manson."
In sum, the record in this case shows that proper identification under Section
512(c)(3)(A)(iii) should include the specific item numbers of the listings that are allegedly
offering pirated copies of "Manson" for sale. It is undisputed that Plaintiff refused
to provide specific item numbers of problematic listings before filing suit. Accordingly, the
Court holds that Plaintiff failed to comply substantially with Section 512(c)(3)'s identification requirement.
Consequently, eBay did not have a duty to act under the third prong
of the safe harbor test. See 17 U.S.C. § 512(c)(1)(C). Thus, if eBay establishes
that it meets the remaining prongs of the safe harbor test, eBay would
be entitled to judgment in its favor on the copyright claims.
b. The First
Prong of the Test: Actual or Constructive Knowledge
Under the DMCA, a notification from
a copyright owner that fails to comply substantially with Sections 512(c)(3)(A)(ii), (iii) or
(iv) "shall not be considered under [the first prong of the safe harbor
test] in determining whether a service provider has actual knowledge or is aware
of the facts or circumstances from which infringing activity is apparent." See 17
U.S.C. § 512(c)(3)(B)(i) & (ii) (emphasis added). As discussed above, Plaintiff's written notifications do
not comply substantially with Section (c)(3)(A)(ii)'s adequate identification requirement. Therefore, the Court does
not consider those notices when evaluating the actual or constructive knowledge prong of
the safe harbor test.
eBay's evidence shows that prior to this lawsuit, it did
not have actual or constructive knowledge that particular listings were being used by
particular sellers to sell pirated copies of "Manson." The limited information that Plaintiff
provided to eBay cannot, as a matter of law, establish actual or constructive
knowledge that particular listings were involved in infringing activity. Accordingly, the Court holds
that eBay has satisfied the first prong of the safe harbor test under
Section 512(c). See 17 U.S.C. § 512(c)(1)(A).
c. The Second Prong of the Test: Right
and Ability to Control Infringing Activity
To satisfy the second prong of the test,
eBay must show that it "does not receive a financial benefit directly attributable
to the infringing activity, in a case in which the service provider has
the right and ability to control such activity." 17 U.S.C. § 512(c)(1)(B). Because the
undisputed facts establish that eBay does not have the right and ability to
control the infringing activity, the Court need not evaluate the financial benefit element
of this prong.
Plaintiff's only argument on the "ability to control" issue centers on
eBay's ability to remove infringing listings (1) after it receives proper notification of
infringing activity and (2) upon detecting an "apparent" infringement on its own. Plaintiff
argues that the record shows eBay has the right and ability to control
the infringing activity because it has removed the listings for the sale of
various items in the past, including the listings offering pirated copies of "Manson"
(in response to Plaintiff's complaints). Plaintiff's argument has no merit.
First, the "right and
ability to control" the infringing activity, as the concept is used in the
DMCA, cannot simply mean the ability of a service provider to remove or
block access to materials posted on its website or stored in its system.
To hold otherwise would defeat the purpose of the DMCA and render the
statute internally inconsistent. The DMCA specifically requires a service provider to remove or
block access to materials posted on its system when it receives notice of
claimed infringement. See 17 U.S.C. §§ 512(c)(1)(C). The DMCA also provides that the limitations
on liability only apply to a service provider that has "adopted and reasonably
implemented . . . a policy that provides for the termination in appropriate
circumstances of [users] of the service provider's system or network who are repeat
infringers." See 17 U.S.C. § 512(i)(1)(A). Congress could not have intended for courts to
hold that a service provider loses immunity under the safe harbor provision of
the DMCA because it engages in acts that are specifically required by the
DMCA.
Second, eBay's voluntary practice of engaging in limited monitoring of its website for
"apparent" infringements under the VeRO program cannot, in and of itself, lead the
Court to conclude that eBay has the right and ability to control infringing
activity within the meaning of the DMCA. The legislative history shows that Congress
did not intend for companies such as eBay to be penalized when they
engage in voluntary efforts to combat piracy over the Internet
.
Because eBay has established
that it meets the test for safe harbor under Section 512(c), eBay is
entitled to summary judgment in its favor on the copyright claims.
RemarQ Communities, Inc., a Delaware corporation, is an online Internet service provider that
provides access to its subscribing members.
In providing access to newsgroups, RemarQ does
not monitor, regulate, or censor the content of articles posted in the newsgroup
by subscribing members. It does, however, have the ability to filter information contained
in the newsgroups and to screen its members from logging onto certain newsgroups,
such as those containing pornographic material.
Two of the newsgroups to which RemarQ provides
its subscribers access contain ALS Scan's name in the titles. These newsgroups -"alt.als"
and "alt.binaries.pictures.erotica.als" -- contain hundreds of postings that infringe ALS Scan's copyrights. These
postings are placed in these newsgroups by RemarQ's subscribers.
Upon discovering that RemarQ databases
contained material that infringed ALS Scan's copyrights, ALS Scan sent a letter, dated
August 2, 1999, to RemarQ, stating:
Both of these newsgroups ["alt.als" and "alt.binaries.pictures.erotica.als"] were created for the sole purpose
of violating our Federally filed Copyrights and Tradename. These newsgroups contain virtually all
Federally Copyrighted images. . . . Your servers provide access to these illegally
posted images [**4] and enable the illegal transmission of these images across state
lines.
This is a cease and desist letter. You are hereby ordered to cease
carrying these newsgroups within twenty-four (24) hours upon receipt of this correspondence .
. . .
America Online, Erol's, Mindspring, and others have all complied with our
cease and desist order and no longer carry these newsgroups.
* * *
Our ALS
Scan models can be identified at http://www.alsscan.com/modlinf2.html[.] Our copyright information can be reviewed
at http://www.alsscan.com/ copyrite.html[.]
For its principal argument, ALS Scan contends that it substantially complied with the
notification requirements of the DMCA and thereby denied RemarQ the "safe harbor" from
copyright infringement liability granted by that Act. See 17 U.S.C. § 512(c)(3)(A) (setting forth
notification requirements). It asserts that because its notification was sufficient to put RemarQ
on notice of its infringement activities, RemarQ lost its service-provider immunity from infringement
liability.
In this case, ALS Scan provided RemarQ with information that (1) identified two
sites created for the sole purpose of publishing ALS Scan's copyrighted works, (2)
asserted that virtually all the images at the two sites were its copyrighted
material, and (3) referred RemarQ to two web addresses where RemarQ could find
pictures of ALS Scan's models and obtain ALS Scan's copyright information. In addition,
it noted that material at the site could be identified as ALS Scan's
material because the material included ALS Scan's "name and/or copyright symbol next to
it." We believe that with this information, ALS Scan substantially complied with the
notification requirement of providing a representative list of infringing material as well as
information reasonably sufficient to enable RemarQ to locate the infringing material. To the
extent that ALS Scan's claims about infringing materials prove to be false, RemarQ
has remedies for any injury it suffers as a result of removing or disabling
noninfringing material. See 17 U.S.C. § 512(f), (g).
Accordingly, we reverse the district court's ruling
granting summary judgment in favor of RemarQ on the basis of ALS Scan's
noncompliance with the notification provisions of 17 U.S.C. § 512(c)(3)(A)(ii) and (iii). Because our
ruling only removes the safe harbor defense, we remand for further proceedings on
ALS Scan's copyright infringement claims and any other affirmative defenses that RemarQ may
have.
.
Plaintiffs Nelson Chu Pavlosky and Luke Thomas
Smith are students at Swarthmore College. Using internet access provided by Swarthmore, which
for present purposes is considered their internet service provider ("ISP"), Pavlosky and Smith
posted the email archive on various websites. An on-line newspaper, IndyMedia, published an
article criticizing Diebold's electronic voting machines and containing a hyperlink to the email
archive. Plaintiff Online Policy Group ("OPG") provides IndyMedia's internet access. OPG, in turn,
obtains internet access from an upstream ISP, Hurricane Electric.
In response to the activities of Pavlosky, Smith, and IndyMedia, and in an
alleged effort to prevent further public viewing of the email archive, Diebold sent
cease and desist letters to many ISPs, including Swarthmore, OPG, and Hurricane, pursuant
to the safe harbor provisions of the Digital Millennium Copyright Act ("DMCA"). Swarthmore,
OPG, and Hurricane were advised that pursuant to these provisions they would be
shielded from a copyright infringement suit by Diebold if they disabled access to
or removed the allegedly infringing material. Swarthmore thereafter required Pavlosky and Smith to
remove the email archive from their website. At the same time, Hurricane notified
OPG that it might be required to terminate OPG's internet access if IndyMedia's
hyperlink to the email archive was not removed. Hurricane agreed, however, not to
act during the pendency of the present action, and consequently OPG did not
disable access to or remove any material.
Diebold has not filed any lawsuits related
to publication of the email archive. Plaintiffs Smith, Pavlosky, and OPG nonetheless seek
injunctive, declaratory, and monetary relief from this Court, alleging that Diebold's claim of
copyright infringement was based on knowing material misrepresentation
Internet Service Provider Safe Harbor Provisions
Section 202 of the DMCA contains various nonexclusive
[FN7] safe harbors designed to limit the liability of ISPs for incidental acts
of copyright infringement. It provides immunity to ISPs that satisfy the conditions of
eligibility, see 17 U.S.C. § 512(i), "from copyright infringement liability for passive,' automatic' actions
in which [an ISP's] system engages through a technological process initiated by another
without the knowledge of the" ISP. ALS Scan, Inc. v. RemarQ Communities, Inc., 239 F.3d 619, 625 (4th Cir. 2001). Once the ISP has actual knowledge
of the infringing material, it loses the safe harbor protections unless it complies with
the DMCA.
- - - - - - - - - - - -
- - Footnotes - - - - - - - - - -
- - - - -
FN7 Nothing in the DMCA suggests that Congress intended
this statute to constitute the exclusive legal basis for protecting a copyright or
defending against allegations of infringement. In fact, 17 U.S.C. § 512(l) provides that "failure
to . . . qualify for limitation of liability under this section shall
not bear adversely upon the consideration of . . . any other defense."
- - - - - - - - - - - -
End Footnotes- - - - - - - - - - - -
- -
17 U.S.C. § 512(a) -- the "conduit" safe harbor -- does not require
notice and takedown of any content. Instead, an ISP is not liable for
"transmitting, routing, or providing connections, for material through a system or network controlled
or operated by or for the service provider" if the ISP did not
(1) initiate the transmission, (2) select the material in a nonautomatic way, (3)
select the recipients in a nonautomatic way, (4) retain a copy for longer
than necessary to transmit it, and (5) modify the material. 17 U.S.C. § 512(a).
In contrast, section 512(c) -- the "storage" safe harbor -- does require notice
and takedown of allegedly infringing material. This provision
gives Internet service providers a safe harbor from liability for infringement of copyright
by reason of the storage at the direction of a user of material
that resides on a system or network controlled or operated by or for
the service provider as long as the service provider can show that: (1)
it has neither actual knowledge that its system contains infringing materials nor an
awareness of facts or circumstances from which infringement is apparent, or it has
expeditiously removed or disabled access to infringing material upon obtaining actual knowledge of
infringement; (2) it receives no financial benefit directly attributable to infringing activity; and
(3) it responded expeditiously to remove or disable access to material claimed to
be infringing after receiving from the copyright holder a notification conforming with requirements
of § 512(c)(3).
ALS Scan, Inc., 239 F.3d at 623. 17 U.S.C. § 512(d) provides a similar safe harbor from liability for copyright
infringement resulting from use of "information location tools," which include "hypertext links" ("hyperlinks").
Section 512(g) provides for replacement of the removed material upon counter-notice by the
alleged infringer. Upon counter-notice of noninfringement by an ISP subscriber, the ISP may
reestablish access to the content without fear of liability. Such replacement generally must
be performed within approximately fourteen days. See 17 U.S.C. § 512(g)(2)(C).
17 U.S.C. § 512(f) provides
as follows:
Misrepresentations. -- Any person who knowingly materially misrepresents under this section --
(1) that
material or activity is infringing, or
(2) that material or activity was removed or
disabled by mistake or misidentification,
shall be liable for any damages, including costs and
attorneys' fees, incurred by the alleged infringer, by any copyright owner or copyright
owner's authorized licensee, or by a service provider, who is injured by such
misrepresentation, as the result of the service provider relying upon such misrepresentation in
removing or disabling access to the material or activity claimed to be infringing,
or in replacing the removed material or ceasing to disable access to it.
Thus, any person who sends a cease and desist letter with knowledge that
claims of infringement are false may be liable for damages.
Misrepresentation of Copyright Infringement: 17 U.S.C. § 512(f)
1. Publication of some of the contents
in the email archive is lawful.
At the hearing on Plaintiffs' motion for preliminary
injunction, Diebold's counsel asserted that portions of the email archive contain material that
is copyrighted and has no "public interest" value. However, Diebold did not identify
and has never identified specific emails that contain copyrighted content, and thus it
has not provided evidence to support its counsel's assertion. At the same time,
Diebold appears to have acknowledged that at least some of the emails are
subject to the fair use doctrine.
The purpose, character, nature of the use, and the effect of the use
upon the potential market for or value of the copyrighted work all indicate
that at least part of the email archive is not protected by copyright
law. The email archive was posted or hyperlinked to for the purpose of
informing the public about the problems associated with Diebold's electronic voting machines. It
is hard to imagine a subject the discussion of which could be more
in the public interest. If Diebold's machines in fact do tabulate voters' preferences
incorrectly, the very legitimacy of elections would be suspect. Moreover, Diebold has identified
no specific commercial purpose or interest affected by publication of the email archive,
and there is no evidence that such publication actually had or may have
any affect on the putative market value, if any, of Diebold's allegedly copyrighted
material. Even if it is true that portions of the email archive have
commercial value, there is no evidence that Plaintiffs have attempted or intended to
sell copies of the email archive for profit. Publishing or hyperlinking to the
email archive did not prevent Diebold from making a profit from the content
of the archive because there is no evidence that Diebold itself intended to
or could profit from such content. At most, Plaintiffs' activity might have reduced
Diebold's profits because it helped inform potential customers of problems with the machines.
However, copyright law is not designed to prevent such an outcome. See, e.g.,
Acuff-Rose, 510 U.S. at 591-92. Rather, the goal of copyright law is to protect creative works in order
to promote their creation. To the extent that Diebold argues that publication of
the entire email archive diminished the value of some of its proprietary software
or systems information, it must be noted that there is no evidence that
Plaintiffs published or linked to the archive in order to profit. Finally, Plaintiffs'
and IndyMedia's use was transformative: they used the email archive to support criticism
that is in the public interest, not to develop electronic voting technology. Accordingly,
there is no genuine issue of material fact that Diebold, through its use
of the DMCA, sought to and did in fact suppress publication of content
that is not subject to copyright protection.
2. Diebold violated section 512(f) .
Plaintiffs argue that
Diebold "knowingly materially misrepresented" that publication of the email archive constituted copyright infringement
and thus is liable for damages pursuant t o 17 U.S.C. § 512(f). The
parties dispute the meaning of the phrase "knowingly materially misrepresents." Plaintiffs argue that
a type of preliminary injunction standard should be applied. That is, the Court
should conclude that Diebold violated section 512(f) if it did not have a
"likelihood of success" on the merits of a copyright infringement claim when it
sent the DMCA letters. Diebold contends that the Court should apply a type
of Federal Rule of Civil Procedure 11 ("Rule 11") standard and thus conclude
that Diebold did not violate section 512(f) unless sending the DMCA letters was
"frivolous." Because the DMCA is of relatively recent vintage, the issue appears to
be one of first impression.
The Court concludes that neither standard is appropriate. A requirement that a party
have an objectively measured "likelihood of success on the merits" in order to
assert claims of copyright infringement would impermissibly chill the rights of copyright owners.
At the same time, in requiring a showing of "knowing material misrepresentation," Congress
explicitly adopted a standard different from that embodied in Rule 11, which contains
a variety of other requirements that are not necessarily coextensive with those set
forth in section 512(f). The Court concludes that the statutory language is sufficiently
clear on its face and does not require importation of standards from other
legal contexts. A party is liable if it "knowingly" and "materially" misrepresents that
copyright infringement has occurred. "Knowingly" means that a party actually knew, should have
known if it acted with reasonable care or diligence, or would have had
no substantial doubt had it been acting in good faith, that it was
making misrepresentations. See BLACK'S LAW DICTIONARY (8th ed. 2004) (definitions of "knowledge," in
particular, "actual" and "constructive" knowledge). "Material" means that the misrepresentation affected the ISP's
response to a DMCA letter. See id.
Applying this standard and in light of
the evidence in the record, the Court concludes as a matter of law
that Diebold knowingly materially misrepresented that Plaintiffs infringed Diebold's copyright interest, at least
with respect to the portions of the email archive clearly subject to the
fair use exception. No reasonable copyright holder could have believed that the portions
of the email archive discussing possible technical problems with Diebold's voting machines were
protected by copyright, and there is no genuine issue of fact that Diebold
knew -- and indeed that it specifically intended [FN15: Indeed, Diebold's counsel stated
that "the DMCA provides the rapid response, the rapid remedies that Congress had
in mind."] -- that its letters to OPG and Swarthmore would result in
prevention of publication of that content. The misrepresentations were material in that they
resulted in removal of the content from websites and the initiation of the
present lawsuit. The fact that Diebold never actually brought suit against any alleged
infringer suggests strongly that Diebold sought to use the DMCA's safe harbor provisions
-- which were designed to protect ISPs, not copyright holders -- as a
sword to suppress publication of embarrassing content rather than as a shield to
protect its intellectual property.
[The plaintiffs subsequently settled the damages question for $125,000 from Diebold.]
Michael Davis-Wilson, Electronic Frontier Foundation volunteer, June 2, 2005
Abstract: Google receives more than 30 copyright-based takedown demands each month invoking the Digital Millennium Copyright Act. A review of three months of notices shows they cluster in a few big categories: C&Ds from companies and individuals demanding removal of competitors sites; C&Ds demanding removal of cracks or material copied wholesale; and C&Ds demanding removal of criticism.
Google has been receiving a growing number of Cease & Desist notices and takedown demands now averaging 30 a month in the three years the search engine has been sending notices to Chilling Effects. These notices come from all sorts of complainants offering a wide range of rationales, primarily invoking copyright and the safe harbor provisions of the Digital Millennium Copyright Act (see DMCA Safe Harbor Provisions). Googles takedown requests offer an interesting opportunity to examine the many different sorts of online activity that receive C&D notices and some common purposes behind those notices. This weather report examined 103 takedown notices sent to Google over a period of three months. (complete list of Google DMCA notices)
Most of the takedown requests sent to Google do not target the companys content, but user-created content that Google indexes. So why is Google involved at all? Why arent these notices just sent directly to the alleged infringers? Clearly, the complainants think that they are more likely to get what they want from Google than they would from the people whose activity they object to.
As a dominant Internet intermediary, Google is accessible where an alleged infringer may be difficult to contact. Some complainants turn to Google only after their attempts to deal directly with alleged infringers or their service providers have failed. Sometimes people dont acknowledge notices sent to them. If the service provider for the material in question is based in a nation with different intellectual property laws or enforcement, it may ignore notices entirely. For example, one complaint in the database comes from a site operator claiming that his site was mirrored in its entirety by a Russian host who ignored months of complaints, Copyright Owner of Adult Websites Requests Removal of Infringing Content.
Whats more, Google faces strong incentives to respond to complaints of infringement in its search results or hosted content. The DMCAs safe harbor provisions protect hosts and providers of information location tools from monetary liability if they promptly remove allegedly infringing material from their listings. On the flip side, the provisions leave service providers open to suit if they refuse takedown demands. In the face of uncertain liability, Google may find it cheaper to remove a challenged site from its listings. Unfortunately, in many cases, removing a site from Google Search is almost as good as removing it from the Net entirely.
These incentives combine to lead many complainants to frame their takedown demands as copyright complaints. The C&Ds reviewed cluster in a handful of categories: C&Ds from companies and individuals demanding removal of competitors sites; C&Ds demanding removal of cracks or material copied wholesale; and C&Ds demanding removal of criticism.
The largest
group of complaints to Google in the period studied came from
companies requesting that websites of their competitors be removed
from Google Search. The infringement claim usually turns on some sort
of promotional material advertising language or information
about the products or services on offer - but the alleged infringement
is rarely central to the companys business; these are jewelry
merchants and safari operators, not publishers or software
developers. The claims validity varies: some sites targeted for
complaint seem to have essentially mirrored the complainants
site and changed the contact address, while others merely say similar
things about similar products. ZSComm.com, a vendor of international
phone cards, offers a typical complaint of this type, Hold the phone (cards),
claiming that a competitor has misappropriated text from his sales
pages:
On http://www.zscomm.com/albania.htm (my website) I have used the following text: "Check out the lowest calling cards rates and phone cards rates below. Click on the calling card name for more details and to purchase. We provide the rates of all of the phone cards to specific countries for convenience." at the top of the page for my visitors.
Regardless of how similar the allegedly infringing page might be, one wonders how many different ways there can be to claim low prices on Albanian phone cards. In many such cases, the similarities would be excused by the "scenes a faire" doctrine, rather than taken as evidence of infringement.
This sort of takedown request is problematic because even when
there may be a valid complaint, the notices main object often
seems to be the elimination of a competitor - indeed, a handful of
notices also demand that any harm done to their Google ranking by the
allegedly infringing site be reversed, like this one from Greenlife,
DMCA complaint again
www.namibiatourism.com :
As a result of this, it appears that google has penalized www.honeymoon-safari.net as the site has disappeared from your SERPS, after holding top positions for over 2 years. I would appreciate if you could please remove any penalty from this site asap, as I have never plagiarised or lifted any work or content from others...ever!
The only option available to Google in this situation removal suppresses a site entirely when the alleged infringement may be unintentional and could often be remedied entirely by a simple paraphrase.
The second most popular form of notice alleges actual piracy. Unlike the first type of complaint, the allegedly infringed material here is critical to the complainants business cracked software, copied educational materials, etc. The alleged infringer is not usually an established web site, or at least not one within US jurisdiction; instead, the infringers are Usenet posters, bloggers, or foreign warez sites. For this reason, the same complainants appear over and over again, as the material theyre trying to control gets reposted within hours of being taken down. Witness, for example, Microsofts unending campaign against people posting product keys for Microsoft software (see e.g. Microsoft Complains About Crack in DVM0day Blog (#3)). In the most extreme case, Stars Edge Productions has sent in dozens of complaints about a single Usenet poster (Avatar / Star's Edge).
The
third, and most troubling, common type of C&D uses takedown policy to
quash criticism. In each of these cases, the complaint demands that a
site be removed because it says uncomplimentary things about the
complainant. Overseas, these complaints usually rely on defamation
law. In the US, however, that tactic is less viable; defamation is
difficult to prove under US law even against the original poster, and
CDA § 230 exempts service providers from liability for defamation
committed by their users, rendering all such actions not Googles
problem. Denied the tool of defamation, complainants seeking to
suppress criticism turn to intellectual property law. Some complaints
claim that the alleged infringer violated their trademarks by
mentioning their company by name; others claim that the publication of
embarrassing email correspondence violates their copyright. WSI
Internet Consulting has maintained that an alleged infringer violated
their copyright by redistributing a press release, WSI Seeks Removal of Another
Hijacked Press Release :
This matter is identical to the issue we brought to your attention previously on or about March 31st, 2004 whereby the same party had, without our consent, posted a copy of a press release on various other web pages . . . The press release has wrongfully been posted to the following web pages, each of which has been separately identified by search query and infringing web pages described below...
These complaints are disturbing because they appear to be attempts to silence inconvenient speech; in the case of IP-based complaints, they do so using laws that were designed for a different purpose altogether.
The takedown requests that Google receives show us a microcosm of the problems of abuse and overreach in the implementation of intellectual property law. Legal mechanisms intended to protect the owners of IP are often used to suppress competition and quash legitimate speech. When they are used against actual infringement, the remedies available are often excessive, and just as often fail to successfully stop infringement. Dozens of legitimate websites are taken down, and the true pirates keep coming back.
JOHN M. WALKER, JR., Chief Judge:
Defendant-appellant WhenU.com, Inc. ("WhenU") is an internet marketing company that uses a proprietary software called "SaveNow" to monitor a computer user's internet activity in order to provide the computer user with advertising, in the form of "pop-up ads," that is relevant to that activity. Plaintiff-appellee 1-800 Contacts, Inc. ("1-800") is a distributor that sells contact lenses and related products by mail, telephone, and internet website. At the time 1-800 filed this action it owned a registered trademark in the service mark "WE DELIVER. YOU SAVE." and had filed applications to register the service mark "1-800CONTACTS"
1-800 filed a complaint alleging, inter alia, that WhenU was infringing 1-800's trademarks, in violation of the Lanham Act, 15 U.S.C. §§ 1114(1), 1125(a)(1), by causing pop-up ads of 1-800's competitors to appear on a [computer user]'s desktop when the [computer user] has accessed 1-800's website
WhenU provides a proprietary software called "SaveNow" without charge to individual [computer user]s, usually as part of a bundle of software that the [computer user] voluntarily downloads from the internet. "Once installed, the SaveNow software requires no action by the computer user to activate its operations; instead, the SaveNow software responds to a computer user's 'in-the-moment' activities by generating pop-up advertisement windows" that are relevant to those specific activities. 1-800 Contacts, 309 F. Supp. 2d at 477. To deliver contextually relevant advertising to [computer user]s, the SaveNow software employs an internal directory comprising "approximately 32,000 [website addresses] and [address] fragments, 29,000 search terms and 1,200 keyword algorithms," that correlate with particular consumer interests to screen the words a [computer user] types into a web browser or search engine or that appear within the internet sites a [computer user] visits.
When the SaveNow software recognizes a term, it randomly selects an advertisement from the corresponding product or service category to deliver to the [computer user]'s computer screen at roughly the same time the website or search result sought by the [computer user] appears. As the district court explained,
The SaveNow software generates at least three kinds of ads--an ad may be a small 'pop-up' . . . [that appears] in the bottom right-hand corner of a computer user's screen; it may be a 'pop-under' advertisement that appears behind the webpage the computer user initially visited; or it may be a 'panoramic' ad[] that stretches across the bottom of the computer user's computer screen.
Each type of ad appears in a window that is separate from the particular website or search-results page the [computer user] has accessed. Id. In addition, a label stating "A WhenU Offer--click ? for info." appears in the window frame surrounding the ad, together with a button on the top right of the window frame marked "?" that, when clicked by the [computer user], displays a new window containing information about WhenU and its ads, as well as instructions for uninstalling the resident SaveNow software.
Usually there is a "few-second" delay between the moment a user accesses a website, and the point at which a SaveNow pop-up advertisement appears on the computer user's screen.
If a SaveNow user who has accessed the 1-800 Contacts website and has received a WhenU.com pop-up advertisement does not want to view the advertisement or the advertiser's website, the user can click on the visible portion of the [1-800] window . . ., [which will move] the 1-800 Contacts website . . . to the front of the screen display, with the pop-up ad moving behind the website window. Or, . . . the computer user can close the pop-up website by clicking on its "X," or close, button. If the user clicks on the pop-up ad, the main browser window (containing the 1-800 Contacts website) will be navigated to the website of the advertiser that was featured inside the pop-up advertisement.
- - - - - - - - - - - - - - Footnotes - - - - - - - - - - - - - - -
Specifically, [computer user]s are informed that
"this offer is brought to you by WhenU.com, through the SaveNow service. SaveNow alerts you to offers and services at the moment when they are most relevant to you. SaveNow does not collect any personal information or browsing history from its users. Your privacy is 100 percent protected. The offers shown to you by SaveNow are not affiliated with the site you are visiting. For more about SaveNow, click here or e-mail information at WhenU.com. At WhenU, we are committed to putting you in control of your Internet experience."
- - - - - - - - - - - - End Footnotes- - - - - - - - - - - - - -
In its complaint, 1-800 alleges that WhenU's conduct infringes 1-800's trademarks, in violation of Sections 32(1) and 43(a) of the Lanham Act, 15 U.S.C. §§ 1114(1), 1125(a), by delivering advertisements of 1-800's competitors (e.g., Vision Direct, Inc.) to [computer user]s who have intentionally accessed 1-800's website. Although somewhat difficult to discern from the complaint, the allegations that pertain specifically to 1-800's trademark claims appear to be as follows: (1) WhenU's pop-up ads appear "on," "over," or "on top of" the 1-800 website without 1-800's authorization, and change its appearance; (2) as a result, the ads impermissibly "appear to be an integral and fully authorized part of [1-800's] website"; (3) in addition, WhenU's unauthorized pop-up ads "interfere with and disrupt the carefully designed display of content" on the website, thereby altering and hindering a [computer user]'s access to 1-800's website; (4) WhenU is thereby "free-riding" and "trad[ing] upon the goodwill and substantial customer recognition associated with the 1-800 Contacts marks"; and (5) WhenU is using 1-800's trademarks in a manner that creates a likelihood of confusion.
DISCUSSION
WhenU challenges the district court's finding that WhenU "uses" 1-800's trademarks within the meaning of the Lanham Act, 15 U.S.C. § 1127. See 1-800 Contacts, 309 F. Supp. 2d at 489. In the alternative, WhenU argues that the district court erred in finding that WhenU's pop-up ads create a likelihood of both source confusion and "initial interest confusion," as to whether WhenU is "somehow associated with [1-800] or that [1-800] has consented to [WhenU's] use of the pop-up ad[s]." Id. at 494; see id. at 503-04. Because we agree with WhenU that it does not "use" 1-800's trademarks, we need not and do not address the issue of likelihood of confusion.
Lanham Act
In order to prevail on a trademark infringement claim for registered trademarks, pursuant to 15 U.S.C. § 1114, or unregistered trademarks, pursuant to 15 U.S.C. § 1125(a)(1), n10 a plaintiff must establish that (1) it has a valid mark that is entitled to protection under the Lanham Act; and that (2) the defendant used the mark, (3) in commerce, (4) "in connection with the sale . . . or advertising of goods or services," 15 U.S.C. § 1114(1)(a), (5) without the plaintiff's consent . In addition, the plaintiff must show that defendant's use of that mark "is likely to cause confusion . . . as to the affiliation, connection, or association of [defendant] with [plaintiff], or as to the origin, sponsorship, or approval of [the defendant's] goods, services, or commercial activities by [plaintiff]." 15 U.S.C. § 1125(a)(1)(A);
The only issue before us on appeal is whether the district court erred in finding that 1-800 had demonstrated a likelihood of success on its trademark claims.
II. "Use" Under the Lanham Act
The Lanham Act defines "use in commerce," in relevant part, as follows:
. . . . For purposes of this Chapter, a mark shall be deemed to be in use in commerce-15 U.S.C. § 1127.(1) on goods when-
(A) it is placed in any manner on the goods or their containers or the displays associated therewith or on the tags or labels affixed thereto, or if the nature of the goods makes such placement impracticable, then on documents associated with the goods or their sale, and
(B) the goods are sold or transported in commerce, and
(2) on services when it is used or displayed in the sale or advertising of services and the services are rendered in commerce . . . .
A. The SaveNow Directory
The district court held that WhenU's inclusion of 1-800's website address in the SaveNow directory constitutes a prohibited "use" of 1-800's trademark. Id. at 489. We disagree.
At the outset, we note that WhenU does not "use" 1-800's trademark in the manner ordinarily at issue in an infringement claim: it does not "place" 1-800 trademarks on any goods or services in order to pass them off as emanating from or authorized by 1-800. The fact is that WhenU does not reproduce or display 1-800's trademarks at all, nor does it cause the trademarks to be displayed to a [computer user]. Rather, WhenU reproduces 1-800's website address, identical, to 1-800's 1-800CONTACTS trademark. See 1-800 Contacts, 309 F. Supp. 2d at 478-79.
The district court found that the differences between 1-800's trademarks and the website address utilized by WhenU were insignificant because they were limited to the addition of the "www." and ".com" and the omission of the hyphen and a space. See id. We conclude that, to the contrary, the differences between the marks are quite significant because they transform 1-800's trademark -- which is entitled to protection under the Lanham Act -- into a word combination that functions more or less like a public key to 1-800's website.
Moreover, it is plain that WhenU is using 1-800's website address precisely because it is a website address, rather than because it bears any resemblance to 1-800's trademark, because the only place WhenU reproduces the address is in the SaveNow directory. Although the directory resides in the [computer user]'s computer, it is inaccessible to both the [computer user] and the general public. See id. at 476 (noting that directory is scrambled to preclude access). Thus, the appearance of 1-800's website address in the directory does not create a possibility of visual confusion with 1-800's mark. More important, a WhenU pop-up ad cannot be triggered by a [computer user]'s input of the 1-800 trademark or the appearance of that trademark on a webpage accessed by the [computer user]. Rather, in order for WhenU to capitalize on the fame and recognition of 1-800's trademark - the improper motivation both 1-800 and the district court ascribe to WhenU - it would have needed to put the actual trademark on the list.
A company's internal utilization of a trademark in a way that does not communicate it to the public is analogous to a individual's private thoughts about a trademark. Such conduct simply does not violate the Lanham Act, which is concerned with the use of trademarks in connection with the sale of goods or services in a manner likely to lead to consumer confusion as to the source of such goods or services. See 15 U.S.C. § 1127; see also Louis Altman, 4 Callmann on Unfair Competition, Trademarks and Monopolies § 22:25 n.1 (4th ed. 2004) ("A fortiori, a defendant who does not sell, but merely uses internally within his own company, the trademarked product of another, is not a trademark infringer or unfair competitor by virtue of such use.").
Accordingly, we conclude that WhenU's inclusion of the 1-800 website address in its SaveNow directory does not infringe on 1-800's trademark.
B. The Pop-up Advertisements
The primary issue to be resolved by this appeal is whether the placement of pop-up ads on a [computer user]'s screen contemporaneously with either the 1-800 website or a list of search results obtained by the [computer user]'s input of the 1-800 website address constitutes "use" under the Lanham Act, 15 U.S.C. §§ 1114(1), 1125(a). The district court reasoned that WhenU, by "causing pop-up advertisements for Defendant Vision Direct to appear when SaveNow users have specifically attempted to access [1-800]'s website, . . . [is] displaying [1-800]'s mark in the . . . advertising of . . . Vision Direct's services." 1-800 Contacts, 309 F. Supp. 2d at 489.
The fatal flaw with this holding is that WhenU's pop-up ads do not display the 1-800 trademark. The district court's holding, however, appears to have been based on the court's acceptance of 1-800's claim that WhenU's pop-up ads appear "on" and affect 1-800's website. See, e.g., id. at 479 (stating that WhenU has "no relationship with the companies on whose websites the pop-up advertisements appear") (emphasis omitted) (emphasis added). As we explained above, the WhenU pop-up ads appear in a separate window that is prominently branded with the WhenU mark; they have absolutely no tangible effect on the appearance or functionality of the 1-800 website.
More important, the appearance of WhenU's pop-up ad is not contingent upon or related to 1-800's trademark, the trademark's appearance on 1-800's website, or the mark's similarity to 1-800's website address. Rather, the contemporaneous display of the ads and trademarks is the result of the happenstance that 1-800 chose to use a mark similar to its trademark as the address to its web page and to place its trademark on its website. The pop-up ad, which is triggered by the [computer user]'s input of 1-800's website address, would appear even if 1-800's trademarks were not displayed on its website. A pop-up ad could also appear if the [computer user] typed the 1-800 website address, not as an address, but as a search term in the browser's search engine, and then accessed 1-800's website by using the hyperlink that appeared in the list of search results.
In addition, 1-800's website address is not the only term in the SaveNow directory that could trigger a Vision Direct ad to "pop up" on 1-800's website. For example, an ad could be triggered if a [computer user] searched for "contacts" or "eye care," both terms contained in the directory, and then clicked on the listed hyperlink to 1-800's website.
Exemplifying the conceptual difficulty that inheres in this issue, the district court's decision suggests that the crux of WhenU's wrongdoing -- and the primary basis for the district court's finding of "use" -- is WhenU's alleged effort to capitalize on a [computer user]'s specific attempt to access the 1-800 website. As the court explained it,
WhenU.com is doing far more than merely "displaying" Plaintiff's mark. WhenU's advertisements are delivered to a SaveNow user when the user directly accesses Plaintiff's website--thus allowing Defendant Vision Direct to profit from the goodwill and reputation in Plaintiff's website that led the user to access Plaintiff's website in the first place.1-800 Contacts, 309 F. Supp. 2d at 490. Absent improper use of 1-800's trademark, however, such conduct does not violate the Lanham Act. Indeed, it is routine for vendors to seek specific "product placement" in retail stores precisely to capitalize on their competitors' name recognition. For example, a drug store typically places its own store-brand generic products next to the trademarked products they emulate in order to induce a customer who has specifically sought out the trademarked product to consider the store's less-expensive alternative. WhenU employs this same marketing strategy by informing [computer user]s who have sought out a specific trademarked product about available coupons, discounts, or alternative products that may be of interest to them.
1-800 disputes this analogy by arguing that unlike a drugstore, only the 1-800 website is displayed when the pop-up ad appears. This response, however, ignores the fact that a [computer user] who has installed the SaveNow software receives WhenU pop-up ads in a myriad of contexts, the vast majority of which are unlikely to have anything to do with 1-800 or the [computer user]'s input of the 1-800 website address .
Perhaps because ultimately 1-800 is unable to explain precisely how WhenU "uses" its trademark, it resorts to bootstrapping a finding of "use" by alleging other elements of a trademark claim. For example, 1-800 invariably refers to WhenU's pop-up ads as "unauthorized" in an effort, it would seem, to establish by sheer force of repetition the element of unauthorized use of a trademark. Not surprisingly, 1-800 cites no legal authority for the proposition that advertisements, software applications, or any other visual image that can appear on a [computer user]'s computer screen must be authorized by the owner of any website that will appear contemporaneously with that image. The fact is that WhenU does not need 1-800's authorization to display a separate window containing an ad any more than Corel would need authorization from Microsoft to display its WordPerfect word-processor in a window contemporaneously with a Word word-processing window. Moreover, contrary to 1-800's repeated admonitions, WhenU's pop-up ads are authorized -- if unwittingly -- by the [computer user] who has downloaded the SaveNow software.
1-800 also argues that WhenU's conduct is "use" because it is likely to confuse [computer user]s as to the source of the ad. It buttresses this claim with a survey it submitted to the district court that purportedly demonstrates, inter alia, that (1) a majority of [computer user]s believe that pop-up ads that appear on websites are sponsored by those websites, and (2) numerous [computer user]s are unaware that they have downloaded the SaveNow software. Again, this rationale puts the cart before the horse. Not only are "use," "in commerce," and "likelihood of confusion" three distinct elements of a trademark infringement claim, but "use" must be decided as a threshold matter because, while any number of activities may be "in commerce" or create a likelihood of confusion, no such activity is actionable under the Lanham Act absent the "use" of a trademark. 15 U.S.C. § 1114; see People for the Ethical Treatment of Animals v. Doughney, 263 F.3d 359, 364 (4th Cir. 2001). Because 1-800 has failed to establish such "use," its trademark infringement claims fail.
For the foregoing reasons, we reverse the district court's entry of a preliminary injunction and remand with instructions to (1) dismiss with prejudice 1-800's trademark infringement claims against WhenU, and (2) proceed with 1-800's remaining claims.