61
Copyright Infringement and Copyright Infringement and Anti-Piracy Anti-Piracy Protecting Your Client’s Intellectual Protecting Your Client’s Intellectual Property Property FALA Winter 2009 – New Orleans FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein Clyde DeWitt and Gill Sperlein

Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

Embed Size (px)

Citation preview

Page 1: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

Copyright Infringement and Anti-PiracyCopyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual PropertyProtecting Your Client’s Intellectual Property

FALA Winter 2009 – New OrleansFALA Winter 2009 – New OrleansClyde DeWitt and Gill SperleinClyde DeWitt and Gill Sperlein

Page 2: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

State of the ProblemState of the Problem A comprehensive 2005 study found that the A comprehensive 2005 study found that the

U.S. major motion picture studios lost $6.1 U.S. major motion picture studios lost $6.1 billion to piracy in 2005.billion to piracy in 2005.

One analysis by the Institute for Policy One analysis by the Institute for Policy Innovation concludes that global music piracy Innovation concludes that global music piracy causes $12.5 billion of economic losses every causes $12.5 billion of economic losses every year.year.

A recent survey showed that 90% of music A recent survey showed that 90% of music downloads are pirated.downloads are pirated.

Percentage of piracy of adult material is likely Percentage of piracy of adult material is likely to be higher then in the music and movie to be higher then in the music and movie industries because of the inability or industries because of the inability or reluctance of many consumers to make reluctance of many consumers to make legitimate purchases of adult movies.legitimate purchases of adult movies.

Page 3: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein
Page 4: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein
Page 5: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

Review of Copyright Law BasicsReview of Copyright Law Basics

Copyrights - The owner of copyright has the exclusive rights to do and to Copyrights - The owner of copyright has the exclusive rights to do and to authorize any of the following:authorize any of the following:

      (1) to (1) to reproducereproduce the copyrighted work in copies or phonorecords; the copyrighted work in copies or phonorecords;

      (2) to(2) to prepare derivative works prepare derivative works based upon the copyrighted work; based upon the copyrighted work;

      (3) to (3) to distributedistribute copies or phonorecords of the copyrighted work to the copies or phonorecords of the copyrighted work to the public by sale or other transfer of ownership, or by rental, lease, or public by sale or other transfer of ownership, or by rental, lease, or lending;lending;

      (4) in the case of literary, musical, dramatic, and choreographic works, (4) in the case of literary, musical, dramatic, and choreographic works, pantomimes, and motion pictures and other audiovisual works, to pantomimes, and motion pictures and other audiovisual works, to perform the copyrighted work publiclyperform the copyrighted work publicly;;

      (5) in the case of literary, musical, dramatic, and choreographic works, (5) in the case of literary, musical, dramatic, and choreographic works, pantomimes, and pictorial, graphic, or sculptural works, including the pantomimes, and pictorial, graphic, or sculptural works, including the individual images of a motion picture or other audiovisual work, to individual images of a motion picture or other audiovisual work, to display the copyrighted work publiclydisplay the copyrighted work publicly; and; and

      (6) in the case of sound recordings, to perform the copyrighted work (6) in the case of sound recordings, to perform the copyrighted work publicly by means of a digital audio transmission.publicly by means of a digital audio transmission.

Page 6: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

Review of Copyright Law Basics Review of Copyright Law Basics

Direct Infringement – The elements of Direct Infringement – The elements of direct copyright infringement are: direct copyright infringement are:

1)1) ownership of the copyright right; and ownership of the copyright right; and

2)2) a violation of one of the rights a violation of one of the rights exclusive to the copyright holderexclusive to the copyright holder

Page 7: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

Review of Copyright Law BasicsReview of Copyright Law Basics

Contributory Infringement – Contributory Infringement –

One is liable for contributory infringement One is liable for contributory infringement when:when:

1)1) with with knowledgeknowledge of the infringing activity, of the infringing activity,

2)2) he induces, causes or materially he induces, causes or materially contributes to the infringing conduct of contributes to the infringing conduct of another.another.

Contributory Infringement includes a Contributory Infringement includes a scienter element because it is akin to scienter element because it is akin to aiding and abetting.aiding and abetting.

Page 8: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

Review of Copyright Law BasicsReview of Copyright Law Basics

Inducement – Set forth in the Inducement – Set forth in the GroksterGrokster case.case.

Many viewed inducement as a new Many viewed inducement as a new theory, but it really is just one of the theory, but it really is just one of the forms contributory infringement can forms contributory infringement can take.take.

Page 9: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

Review of Copyright Law BasicsReview of Copyright Law Basics

Vicarious Infringement - A defendant is Vicarious Infringement - A defendant is vicariously liable if it: vicariously liable if it:

1)1) has the right and ability to supervise has the right and ability to supervise the infringing activity; and the infringing activity; and

2)2) also has a direct financial interest in also has a direct financial interest in such activities. such activities.

Vicarious Infringement is based on Vicarious Infringement is based on respondent superiorrespondent superior and thus neither and thus neither negligence nor knowledge is required.negligence nor knowledge is required.

Page 10: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

Review of Copyright Law BasicsReview of Copyright Law Basics

Perfect 10 v. AmazonPerfect 10 v. Amazon and and Perfect 10 v. GooglePerfect 10 v. Google which were joined on appeal. which were joined on appeal. Perfect 10 v. Perfect 10 v. Amazon Inc.,Amazon Inc., 487 F.3d 701 (9 487 F.3d 701 (9thth Cir. 2007). Cir. 2007).

Perfect 10 sought to hold Google liable for Perfect 10 sought to hold Google liable for linking to infringing material on other linking to infringing material on other websites.websites.

The Ninth Circuit, upholding the District Court’s The Ninth Circuit, upholding the District Court’s ruling, stated that Google did not have the ruling, stated that Google did not have the practicalpractical ability to police third party ability to police third party websites’ infringing conduct. This is the first websites’ infringing conduct. This is the first time the word practical was added.time the word practical was added.

Page 11: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

Review of Copyright Law BasicsReview of Copyright Law Basics

Confusion – the courts (and many lawyers) often Confusion – the courts (and many lawyers) often conflate the elements of vicarious and conflate the elements of vicarious and contributory infringement, finding defendants not contributory infringement, finding defendants not liable for vicarious infringement because they liable for vicarious infringement because they either:either:

1) do not have knowledge of the infringement; or 1) do not have knowledge of the infringement; or

2) because they have taken good faith efforts to 2) because they have taken good faith efforts to reduce infringement. reduce infringement.

However, neither is applicable to vicarious However, neither is applicable to vicarious infringement, the purpose of which is to infringement, the purpose of which is to internalize the cost of infringement with the entity internalize the cost of infringement with the entity that is benefiting from the infringing activity. that is benefiting from the infringing activity.

Page 12: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

Anatomy of a PirateAnatomy of a Pirate

Page 13: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

Anatomy of a PirateAnatomy of a PirateWhere is infringement taking place?Where is infringement taking place?

Hard ProductHard Product

Video StoresVideo StoresVideo store owners ripping DVDs and selling them.Video store owners ripping DVDs and selling them.

Printers and duplicators Printers and duplicators

If your client has DVD authoring performed in Taiwan, If your client has DVD authoring performed in Taiwan, you can bet their movies are being pirated right at the you can bet their movies are being pirated right at the plant. Advise your clients to have duplicating done as plant. Advise your clients to have duplicating done as close to home as they can. They should work only with close to home as they can. They should work only with reputable manufactures and visit the plant and ensure reputable manufactures and visit the plant and ensure safeguards are in place.safeguards are in place.

E-Bay and adult auction websites. E-Bay and adult auction websites. Look for sellers who have multiple copies of a title and Look for sellers who have multiple copies of a title and who offer prices that are unreasonably low.who offer prices that are unreasonably low.

Page 14: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

Anatomy of a PirateAnatomy of a PirateWhere is infringement taking place?Where is infringement taking place?

On Line On Line

Peer to Peer (P2P) –Peer to Peer (P2P) – Napster. (no Longer in use) Material resides on Napster. (no Longer in use) Material resides on

the computers of the users. The content files do the computers of the users. The content files do not go to a centralized server or website. Users not go to a centralized server or website. Users download software that allows them to locate the download software that allows them to locate the files on the computers connected via the Internet. files on the computers connected via the Internet. Napster had a centralized data base on servers Napster had a centralized data base on servers Napster maintained to help users locate files on Napster maintained to help users locate files on other users’ computers. The Ninth Circuit ruled other users’ computers. The Ninth Circuit ruled that Napster was secondarily liable for the that Napster was secondarily liable for the infringing activity because they could control the infringing activity because they could control the piracy by controlling the centralized index server.piracy by controlling the centralized index server.

Page 15: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

Anatomy of a PirateAnatomy of a PirateWhere is infringement taking place?Where is infringement taking place?

Peer to Peer (P2P) –Peer to Peer (P2P) –2nd generation – Grokster and others2nd generation – Grokster and othersSoftware allows users to search the Software allows users to search the computers of other users. The 9th Circuit computers of other users. The 9th Circuit ruled that because there was no ruled that because there was no centralized database or index, defendants centralized database or index, defendants could not control the infringing activity could not control the infringing activity and there was no liability. However, the and there was no liability. However, the Supreme Court remanded saying there Supreme Court remanded saying there could still be secondary liability if could still be secondary liability if defendants induced infringement. defendants induced infringement.

Page 16: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

Anatomy of a PirateAnatomy of a PirateWhere is infringement taking place?Where is infringement taking place?

Peer to Peer (P2P) –Peer to Peer (P2P) –

Bit Torrent sitesBit Torrent sites

Used for large files. Used for large files.

May be responsible for up to 35% of all traffic on the Internet.May be responsible for up to 35% of all traffic on the Internet.

To share a file or group of files, a peer first creates a small file To share a file or group of files, a peer first creates a small file called a "torrent" (e.g. MyFile.torrent). This file contains called a "torrent" (e.g. MyFile.torrent). This file contains metadata about the files to be shared and about the tracker, metadata about the files to be shared and about the tracker, the computer that coordinates the file distribution. Peers that the computer that coordinates the file distribution. Peers that want to download the file must first obtain a torrent file for it, want to download the file must first obtain a torrent file for it, and connect to the specified tracker, which tells them from and connect to the specified tracker, which tells them from which other peers to download the pieces of the file. which other peers to download the pieces of the file.

It is possible to obtain the IP addresses of all current, and It is possible to obtain the IP addresses of all current, and possibly previous, participants in a swarm from the tracker.possibly previous, participants in a swarm from the tracker.

Page 17: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

Gaytorrent.ruGaytorrent.ru

Page 18: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

Gaytorrent.ruGaytorrent.ru

Page 19: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

Anatomy of a PirateAnatomy of a PirateWhere is infringement taking place?Where is infringement taking place?

User Generated Content Sites (UMGs)User Generated Content Sites (UMGs)

Most of us refer to these as tube sites. Most of us refer to these as tube sites.

Users upload content to the website. The content resides on the Users upload content to the website. The content resides on the servers of the tube site.servers of the tube site.

The tube sites generally earn revenue from advertising or by The tube sites generally earn revenue from advertising or by sending traffic to affiliate sites.sending traffic to affiliate sites.

Some UMG sites charge a membership to view material.Some UMG sites charge a membership to view material.

Many of the first generation adult tube sites have changed their Many of the first generation adult tube sites have changed their business model so they no longer accept content from anyone business model so they no longer accept content from anyone who wants to post it. Instead they obtain content from partners who wants to post it. Instead they obtain content from partners and operate the sites like the old thumbnail gallery posts or and operate the sites like the old thumbnail gallery posts or movie gallery posts.movie gallery posts.

Page 20: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

http://iworldnet.org/http://iworldnet.org/

Page 21: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

http://iworldnet.org/browse....http://iworldnet.org/browse....membersmembers

Page 22: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

http://iworldnet.org/video/all/10/1http://iworldnet.org/video/all/10/1

Page 23: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

http://iworldnet.org/video/gallery/Rough-Prison-sexhttp://iworldnet.org/video/gallery/Rough-Prison-sex

Page 24: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

Anatomy of a PirateAnatomy of a PirateWhere is infringement taking place?Where is infringement taking place?

One Click Hosting – Rapidshare, File Factory and others.One Click Hosting – Rapidshare, File Factory and others.

Users store content on massive servers. They are given a specific Users store content on massive servers. They are given a specific url/link to locate the content on the servers. Thus there is a centralized url/link to locate the content on the servers. Thus there is a centralized repository for the content, but no centralized index. repository for the content, but no centralized index.

To view the content you must have the link to locate the content.To view the content you must have the link to locate the content.

After loading the content to the One Click Hosting company’s servers, After loading the content to the One Click Hosting company’s servers, the infringers distribute the links through blogs, use groups or other on the infringers distribute the links through blogs, use groups or other on line locations.line locations.

Usually the content is stored in full resolution and full length.Usually the content is stored in full resolution and full length.

Anyone with the link can download the content.Anyone with the link can download the content.

The hosting company earns revenue by charging a monthly fee that The hosting company earns revenue by charging a monthly fee that enables users to download unlimited amounts of content.enables users to download unlimited amounts of content.

Page 25: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

http://www.rapidshare.com/http://www.rapidshare.com/

Page 26: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

http://www.rapidshare.com/http://www.rapidshare.com/

Page 27: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

http://www.rapidshare.com/http://www.rapidshare.com/

Page 28: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

http://rs463l3.rapidshare.com/cgi-bin/upload.cgi?rsuploadid=362873680269642109http://rs463l3.rapidshare.com/cgi-bin/upload.cgi?rsuploadid=362873680269642109

Page 29: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

rs463l3.rapidshare.com/cgi-bin/upload.cgi?rsuploadid=362873680269642109rs463l3.rapidshare.com/cgi-bin/upload.cgi?rsuploadid=362873680269642109

Page 30: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

Anatomy of a PirateAnatomy of a PirateWhere is infringement taking place?Where is infringement taking place?

BlogsBlogs

Used to post links to unauthorized copies of content Used to post links to unauthorized copies of content residing on One Click Hosting sites. residing on One Click Hosting sites.

Occasionally used for other forms of distribution.Occasionally used for other forms of distribution.

Some allow flash streaming.Some allow flash streaming.

Most also allow imbedded clips, so if material is hosted Most also allow imbedded clips, so if material is hosted on another User Generated Content site it can play on on another User Generated Content site it can play on the blog.the blog.

Many of the popular gay adult blogs are hosted on Many of the popular gay adult blogs are hosted on blogspot.com which is owned by Goggle.blogspot.com which is owned by Goggle.

Page 31: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

http://municheee.blogspot.com/http://municheee.blogspot.com/

Page 32: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

http://municheee.blogspot.com/2008/10/full-vodeos-road-to-redneck-hollow.htmlhttp://municheee.blogspot.com/2008/10/full-vodeos-road-to-redneck-hollow.html

Page 33: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

http://municheee.blogspot.com/2008/10/full-vodeos-road-to-redneck-hollow.htmlhttp://municheee.blogspot.com/2008/10/full-vodeos-road-to-redneck-hollow.html

Page 34: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

http://rapidshare.com/files/130173639/RedH.part1.rarhttp://rapidshare.com/files/130173639/RedH.part1.rar

Page 35: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

http://rs92.rapidshare.com/files/130173639/RedH.part1.rarhttp://rs92.rapidshare.com/files/130173639/RedH.part1.rar

Page 36: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

http://rs92.rapidshare.com/files/130173639/RedH.part1.rarhttp://rs92.rapidshare.com/files/130173639/RedH.part1.rar

Page 37: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

Anatomy of a PirateAnatomy of a PirateWhere is infringement taking place?Where is infringement taking place?

Social Networking Sites – Ning.com and othersSocial Networking Sites – Ning.com and others

Similar to Facebook, but formed around a specific type of adult content.Similar to Facebook, but formed around a specific type of adult content.

Often photos are posted.Often photos are posted.

Members of the network usually have capability to upload content that Members of the network usually have capability to upload content that is converted to flash streaming clips. is converted to flash streaming clips.

Often members simply embed links to tube sites, so even though a clip Often members simply embed links to tube sites, so even though a clip may be on X-tube, it seems to play from the social network site.may be on X-tube, it seems to play from the social network site.

Also people post links to material stored on One Click Hosting sites.Also people post links to material stored on One Click Hosting sites.

The largest of the social network platforms, Ning, ceased allowing adult The largest of the social network platforms, Ning, ceased allowing adult because advertisers would not purchase ads on the adult oriented social because advertisers would not purchase ads on the adult oriented social networks and because they were receiving so many take down notices networks and because they were receiving so many take down notices for the adult sites.for the adult sites.

Page 38: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

ellentv.ning.com - mainellentv.ning.com - main

Page 39: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

Ellentv.ning.com - membersEllentv.ning.com - members

Page 40: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

Ellentv.ning.com/profile/AnonymousSurferEllentv.ning.com/profile/AnonymousSurfer

Page 41: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

ellentv.ning.com/videoellentv.ning.com/video

Page 42: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

ellentv.ning.com/video/elizabeth-playing-golf-2008ellentv.ning.com/video/elizabeth-playing-golf-2008

Page 43: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

Anatomy of a PirateAnatomy of a PirateWhere is infringement taking place?Where is infringement taking place?

Password exchangingPassword exchanging

Can happen in a number of different Can happen in a number of different environments. To combat this, your environments. To combat this, your website-operating clients should limit or website-operating clients should limit or monitor the amount of data each paid monitor the amount of data each paid member can access.member can access.

One member using an enormous amount One member using an enormous amount of bandwidth may indicate he distributed of bandwidth may indicate he distributed his password to others.his password to others.

Page 44: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

State of the LawState of the Law

Digital Millennium Copyright Act (DMCA) 17 U.S.C. §512. Digital Millennium Copyright Act (DMCA) 17 U.S.C. §512.

The DMCA was enacted in order to give Internet The DMCA was enacted in order to give Internet service providers some protection from liability for service providers some protection from liability for infringement occurring on their networks.infringement occurring on their networks.

Service providers (the definition for which is very broad) Service providers (the definition for which is very broad) must conform to certain requirements. must conform to certain requirements.

The DMCA offers protection in four main areas:The DMCA offers protection in four main areas: Transitory digital network communicationsTransitory digital network communications System cachingSystem caching Information residing on systems or networks at direction of Information residing on systems or networks at direction of

users (Likely the most relevant to you and your clients)users (Likely the most relevant to you and your clients) Information location toolsInformation location tools

Page 45: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

State of the LawState of the LawBroadly, the ISP must comply with the following requirements in order to be Broadly, the ISP must comply with the following requirements in order to be

eligible for immunity from liability for material residing on its networks eligible for immunity from liability for material residing on its networks at the direction of a user:at the direction of a user:

1)1) The ISP must implement a plan for dealing with repeat infringers and The ISP must implement a plan for dealing with repeat infringers and must inform its subscribers of the plan;must inform its subscribers of the plan;

2)2) The ISP must not interfere with "standard technical measures" taken by The ISP must not interfere with "standard technical measures" taken by copyright holders to identify or protect their content; The ISP must copyright holders to identify or protect their content; The ISP must register an agent for receiving copyright complaints with the Copyright register an agent for receiving copyright complaints with the Copyright Office;Office;

3)3) The ISP must not have knowledge of the infringing activity or upon The ISP must not have knowledge of the infringing activity or upon obtaining knowledge or receiving notice of infringement it must act obtaining knowledge or receiving notice of infringement it must act expeditiously to remove, or disable access to, the material; andexpeditiously to remove, or disable access to, the material; and

4)4) The ISP must not receive a financial benefit directly attributable to the The ISP must not receive a financial benefit directly attributable to the infringing activity, in a case in which the service provider has the right infringing activity, in a case in which the service provider has the right and ability to control such activityand ability to control such activity

Page 46: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

State of the LawState of the LawDMCA – Notice and Take Down ProceduresDMCA – Notice and Take Down Procedures

512(c)(3) Elements of notification.512(c)(3) Elements of notification.

            (A) To be effective under this subsection, a notification of claimed infringement must (A) To be effective under this subsection, a notification of claimed infringement must be a be a writtenwritten communication provided to the designated agent of a service provider communication provided to the designated agent of a service provider that includes substantially the following:that includes substantially the following:         (i) A physical or electronic          (i) A physical or electronic signaturesignature of a person authorized to act on behalf of of a person authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.the owner of an exclusive right that is allegedly infringed.         (ii)          (ii) Identification of the copyrighted workIdentification of the copyrighted work claimed to have been infringed, claimed to have been infringed, or, if multiple copyrighted works at a single online site are covered by a single or, if multiple copyrighted works at a single online site are covered by a single notification, a representative list of such works at that site.notification, a representative list of such works at that site.         (iii)          (iii) Identification of the material that is claimed to be infringingIdentification of the material that is claimed to be infringing or to be or to be the subject of infringing activity and that is to be removed or access to which is to be the subject of infringing activity and that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit the service provider to disabled, and information reasonably sufficient to permit the service provider to locate the material.locate the material.         (iv) Information reasonably sufficient to permit the service provider to contact          (iv) Information reasonably sufficient to permit the service provider to contact the complaining party, such as an the complaining party, such as an address, telephone number, and, if available, address, telephone number, and, if available, an electronic mail addressan electronic mail address at which the complaining party may be contacted. at which the complaining party may be contacted.         (v) A statement that the complaining party has a          (v) A statement that the complaining party has a good faith beliefgood faith belief that use of that use of the material in the manner complained of is not authorized by the copyright owner, the material in the manner complained of is not authorized by the copyright owner, its agent, or the law.its agent, or the law.         (vi) A statement that the information in the notification is          (vi) A statement that the information in the notification is accurate, and accurate, and under penalty of perjury, that the complaining party is authorized to act on under penalty of perjury, that the complaining party is authorized to act on behalf of the ownerbehalf of the owner of an exclusive right that is allegedly infringed. of an exclusive right that is allegedly infringed.

Page 47: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

State of the LawState of the Law

A&M Records v. Napster, Inc.A&M Records v. Napster, Inc., 239 F.3d 1004 , 239 F.3d 1004 (9th Cir. 2001)(9th Cir. 2001)

Napster operated a system in which the Napster operated a system in which the content resided on the individual computers content resided on the individual computers of its users. In order to locate files a of its users. In order to locate files a centralized indexing service resided on centralized indexing service resided on Napster’s servers. The trial court granted Napster’s servers. The trial court granted the Music Industries’ preliminary injunction the Music Industries’ preliminary injunction based on contributory and vicarious based on contributory and vicarious infringement. The Ninth circuit affirmed infringement. The Ninth circuit affirmed

Page 48: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

State of the LawState of the LawMGM Studios Inc. v. Grokster, Ltd.MGM Studios Inc. v. Grokster, Ltd., 545 U.S. 913, 545 U.S. 913

The defendants modified the Napster model so that there The defendants modified the Napster model so that there was no centralized index. The software searched the users’ was no centralized index. The software searched the users’ computers for desired titles. Thus, defendants could not computers for desired titles. Thus, defendants could not know of the infringement and could not control it.know of the infringement and could not control it.

The 9th Circuit found no liability, but the Supreme Court The 9th Circuit found no liability, but the Supreme Court interpreted the case differently and remanded to determine interpreted the case differently and remanded to determine if the defendants had induced infringement. if the defendants had induced infringement.

“ “One who distributes a device with the object of promoting One who distributes a device with the object of promoting its use to infringe copyright, as shown by clear expression or its use to infringe copyright, as shown by clear expression or other affirmative steps taken to foster infringement, going other affirmative steps taken to foster infringement, going beyond mere distribution with knowledge of third-party beyond mere distribution with knowledge of third-party action, is liable for the resulting acts of infringement by third action, is liable for the resulting acts of infringement by third parties using the device, regardless of the device's lawful parties using the device, regardless of the device's lawful uses.”uses.”

Page 49: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

State of the LawState of the LawCartoon Network LP, LLLP v. CSC Holdings, Inc.Cartoon Network LP, LLLP v. CSC Holdings, Inc., 536 F.3d 121 (2d Cir. N.Y. 2008)., 536 F.3d 121 (2d Cir. N.Y. 2008).

This is not an Internet case, thus the provisions of the DMCA did not apply. This is not an Internet case, thus the provisions of the DMCA did not apply. CSC Holdings made a remote DVR device that allowed users to record CSC Holdings made a remote DVR device that allowed users to record television shows on a remote device and play them back later. In overturning television shows on a remote device and play them back later. In overturning the trial court’s order granting plaintiff’s summary judgment motion, the 2nd the trial court’s order granting plaintiff’s summary judgment motion, the 2nd circuit relied heavily on ideas the Supreme Court set out in the Sony Betamax circuit relied heavily on ideas the Supreme Court set out in the Sony Betamax case. The court basically ruled that one cannot be liable for infringement case. The court basically ruled that one cannot be liable for infringement simply for making a machine that is capable of being used for infringing simply for making a machine that is capable of being used for infringing activity. This is probably a correct ruling. activity. This is probably a correct ruling.

In discussing whether or not CSC could be held In discussing whether or not CSC could be held directlydirectly liable, the 2nd Circuit liable, the 2nd Circuit wrote, “[i]n determining who actually "makes" a copy, a significant difference wrote, “[i]n determining who actually "makes" a copy, a significant difference exists between making a request to a human employee, who then volitionally exists between making a request to a human employee, who then volitionally operates the copying system to make the copy, and issuing a command operates the copying system to make the copy, and issuing a command directly to a system, which automatically obeys commands and engages in no directly to a system, which automatically obeys commands and engages in no volitional conduct.”volitional conduct.”

The district court in the The district court in the Io GroupIo Group case which I will discuss next seized on that case which I will discuss next seized on that sentence. Indeed, after a year of waiting, the Io Group decision came down sentence. Indeed, after a year of waiting, the Io Group decision came down within a week of the within a week of the Cartoon Network Cartoon Network ruling. The problem is that the ruling. The problem is that the discussion from which this quote was lifted was about the volition required in discussion from which this quote was lifted was about the volition required in order for a finding of order for a finding of directdirect infringement. In the infringement. In the Io GroupIo Group, ruling Magistrate , ruling Magistrate Judge Lloyd relied on the quote to support an unrelated analysis.Judge Lloyd relied on the quote to support an unrelated analysis.

Page 50: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

State of the LawState of the LawIo Group, Inc. v. Veoh Networks, Inc.Io Group, Inc. v. Veoh Networks, Inc., 2007 U.S. Dist. LEXIS 31639 (N.D. Cal. Apr. 13, , 2007 U.S. Dist. LEXIS 31639 (N.D. Cal. Apr. 13,

2007).2007).

I brought suit against Veoh, a user generated content site, on behalf of Titan Media. I brought suit against Veoh, a user generated content site, on behalf of Titan Media. Our theory was that Veoh lost any DMCA protection because it gained a Our theory was that Veoh lost any DMCA protection because it gained a financial benefit and while it had the right and ability to control the infringing financial benefit and while it had the right and ability to control the infringing activity. The court ruled that the infringing activity occurred when the user activity. The court ruled that the infringing activity occurred when the user uploaded the content to the site and that Veoh had no way to control what uploaded the content to the site and that Veoh had no way to control what individuals uploaded. The Court failed to understand that infringing activity individuals uploaded. The Court failed to understand that infringing activity (further reproduction, distribution and public display) did not only happen (further reproduction, distribution and public display) did not only happen when the content was copied and uploaded, but also after the content was when the content was copied and uploaded, but also after the content was uploaded. The court also conflated contributory infringement (which requires uploaded. The court also conflated contributory infringement (which requires knowledge of the infringing activity) and vicarious infringement which does knowledge of the infringing activity) and vicarious infringement which does not. The court placed a great deal of emphasis on measures Veoh claimed to not. The court placed a great deal of emphasis on measures Veoh claimed to put in place to prevent infringement. put in place to prevent infringement.

This Court and some other courts who have looked at contributory infringement This Court and some other courts who have looked at contributory infringement claims (the DMCA provision relating to this came from contributory liability claims (the DMCA provision relating to this came from contributory liability theories) fail to understand the purpose of the theory. Contributory theories) fail to understand the purpose of the theory. Contributory infringement is akin to respondent superior. The idea is that when you profit infringement is akin to respondent superior. The idea is that when you profit from an activity, and you have the ability to reduce risks, you must exercise from an activity, and you have the ability to reduce risks, you must exercise that ability. that ability.

Titan Media did not appeal because the same issues are now being litigated in the Titan Media did not appeal because the same issues are now being litigated in the UMGUMG and and ViacomViacom cases by more well financed plaintiffs. cases by more well financed plaintiffs.

Page 51: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

State of the LawState of the LawUMG Recordings, Inc. v. Veoh Networks, IncUMG Recordings, Inc. v. Veoh Networks, Inc., 2008 U.S. Dist. ., 2008 U.S. Dist.

LEXIS 104980 (C.D. Cal. Dec. 29, 2008).LEXIS 104980 (C.D. Cal. Dec. 29, 2008).

Universal Music Group has also brought suit against Veoh. Universal Music Group has also brought suit against Veoh. UMG brought a partial motion for summary judgment UMG brought a partial motion for summary judgment focusing on one narrow issue. They argued that since the focusing on one narrow issue. They argued that since the DMCA only offers safe harbor “for infringement of DMCA only offers safe harbor “for infringement of copyright by reason of the copyright by reason of the storagestorage at the direction of a at the direction of a user of material that resides on a system or network user of material that resides on a system or network controlled or operated by or for the service provider” and controlled or operated by or for the service provider” and since the infringement at issue was caused by actions since the infringement at issue was caused by actions other then storing (e.g. copying, distributing) then the other then storing (e.g. copying, distributing) then the DMCA did not protect Veoh.DMCA did not protect Veoh.

The judge rejected the argument, saying that such activities The judge rejected the argument, saying that such activities were contemplated by the DMCA and it would be were contemplated by the DMCA and it would be impossible to engage in storage without also engaging in impossible to engage in storage without also engaging in other activities such as reproduction and distributing. other activities such as reproduction and distributing.

Page 52: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

State of the LawState of the Law

Capitol Records, Inc. v. ThomasCapitol Records, Inc. v. Thomas, 579 F. Supp. 2d , 579 F. Supp. 2d 1210 (D. Minn. 2008). 1210 (D. Minn. 2008).

The Court held that under 8th Circuit law, making The Court held that under 8th Circuit law, making available on a P2P site without evidence of available on a P2P site without evidence of someone else downloading is not distribution someone else downloading is not distribution under the Copyright Act and thus not under the Copyright Act and thus not actionable.actionable.

A new trial ordered base on a faulty jury A new trial ordered base on a faulty jury instruction. It was not clear whether or not the instruction. It was not clear whether or not the jury found unauthorized reproduction had also jury found unauthorized reproduction had also occurred. Defendant also challenged the occurred. Defendant also challenged the statutory damage award as unconstitutional statutory damage award as unconstitutional but that issue was not reached.but that issue was not reached.

Page 53: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

Anti Piracy 101Anti Piracy 101What can you do for you clientWhat can you do for you client

Remind your clients to register their Remind your clients to register their works!works!

They must register their works in order to They must register their works in order to be eligible for statutory damages and be eligible for statutory damages and attorney fees.attorney fees.

Actual damages can be very difficult to Actual damages can be very difficult to prove in a copyright infringement case.prove in a copyright infringement case.

Page 54: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

Anti Piracy 101Anti Piracy 101What can you do for you clientWhat can you do for you clientExplain the notice and take down procedures of Explain the notice and take down procedures of the DMCA. the DMCA.

Empower your client to take action on their own Empower your client to take action on their own by sending take down notices. This will do by sending take down notices. This will do nothing to stop the infringement, but it will get nothing to stop the infringement, but it will get the infringing material down as soon as possible.the infringing material down as soon as possible.

If your clients might eventually bring suit against If your clients might eventually bring suit against the infringers or against a third party for the infringers or against a third party for secondary liability, make sure they preserve secondary liability, make sure they preserve evidence before the content is taken down. Print evidence before the content is taken down. Print out pages with the url and time/date stamps.out pages with the url and time/date stamps.

Page 55: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

Anti Piracy 101Anti Piracy 101What can you do for you clientWhat can you do for you client

Consider litigation as a deterrence.Consider litigation as a deterrence.

Many pirating locations have a list Many pirating locations have a list of studios that they warn against of studios that they warn against posting.posting.

Try to get on those lists by making Try to get on those lists by making some noise.some noise.

Page 56: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

Bigdickclub.tvBigdickclub.tv

Page 57: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

Gaytorrents.ruGaytorrents.ru

Page 58: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

Anti Piracy 101Anti Piracy 101What can you do for you clientWhat can you do for you clientDMCA subpoenas. 15 U.S.C.512(h)DMCA subpoenas. 15 U.S.C.512(h)

The DMCA has a special provision whereby you The DMCA has a special provision whereby you can subpoena service providers for information can subpoena service providers for information about infringers without first filing suit. about infringers without first filing suit.

This is not available for P2P infringement. The This is not available for P2P infringement. The material must be residing on a website and material must be residing on a website and therefore subject to a DMCA take down notice.therefore subject to a DMCA take down notice.

If the material is infringed in a true P-2-P If the material is infringed in a true P-2-P context, you will have to file a John Doe lawsuit context, you will have to file a John Doe lawsuit first, before you can engage in a discovery. first, before you can engage in a discovery.

Page 59: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

Anti Piracy 101Anti Piracy 101What can you do for you clientWhat can you do for you client

Pre-Litigation Settlement offersPre-Litigation Settlement offers

This technique can be used in a number of situations This technique can be used in a number of situations including P2P. The music and film industry lawyers have including P2P. The music and film industry lawyers have adapted this method to a large degree.adapted this method to a large degree.

The idea is that you request the service provider forward The idea is that you request the service provider forward a settlement offer to the direct infringer with a warning a settlement offer to the direct infringer with a warning that if they do not accept, you will take steps to identify that if they do not accept, you will take steps to identify them and bring suit against them. In order to work the them and bring suit against them. In order to work the settlement figure must be low enough that it makes more settlement figure must be low enough that it makes more sense to pay the low settlement fee then to risk litigation. sense to pay the low settlement fee then to risk litigation.

In the United States you need to be willing to follow In the United States you need to be willing to follow through and sue at least some of the non-settling through and sue at least some of the non-settling infringers.infringers.

Page 60: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

Anti Piracy 101Anti Piracy 101What can you do for you clientWhat can you do for you client

John Doe suits against direct infringers. John Doe suits against direct infringers.

When you file the complaint you must file a When you file the complaint you must file a motion to take early discovery. This will allow you motion to take early discovery. This will allow you to obtain the ip address of the account used to to obtain the ip address of the account used to access the Internet by the infringer. You can then access the Internet by the infringer. You can then subpoena the ISP for the subscriber information. subpoena the ISP for the subscriber information. At this point it is a good idea to do some At this point it is a good idea to do some additional investigation before substituting the additional investigation before substituting the name of the account holder so that you do not name of the account holder so that you do not wind up with some of the embarrassing cases the wind up with some of the embarrassing cases the RIAA had where they sued grandmothers, etc. It’s RIAA had where they sued grandmothers, etc. It’s also a good time to again discuss settlement.also a good time to again discuss settlement.

Page 61: Copyright Infringement and Anti-Piracy Protecting Your Client’s Intellectual Property FALA Winter 2009 – New Orleans Clyde DeWitt and Gill Sperlein

Anti Piracy 101Anti Piracy 101What can you do for you clientWhat can you do for you client

If there is reason to believe a third If there is reason to believe a third party can be held accountable party can be held accountable under secondary liability theories, under secondary liability theories, consider filing suit, baring in mind consider filing suit, baring in mind that this area of the law is in a state that this area of the law is in a state of flux. We will know more as the of flux. We will know more as the Viacom v. YoutubeViacom v. Youtube and and UMG v. UMG v. VeohVeoh cases progress. cases progress.