COPYRIGHT by Laith Mohammed Murad
Introduction
Until recently, copyright was not regarded as being of much relevance to the
sale of products other than traditionally "artistic" products such as books and
gramophone records. Today, however, in addition to these traditional areas,
copyright has become an extremely important weapon in preventing piracy of
computer software and preventing copying of various useful items to which "art"
has been applied. In this section, we shall consider the application of the
Copyright Act to computer software.
The U.S. Copyright statute provides copyright protection for original works
of authorship fixed in any tangible medium of expression, now known or later
developed, from which they can be perceived, reproduced, or otherwise
communicated, either directly or with the aid of a machine or device.[47]
Subject to certain provisions relating to "fair
use", the Copyright Act gives the copyright owner exclusive rights over the
reproduction, preparation of derivative works, distribution[48]
and public performance and display of the copyrighted work. Since the passage of
the Computer Software Rental Amendments Act in 1990[49]
it has also been an infringement in copyright to distribute a computer program
(including any tape, disk or other medium embodying such a program) for direct
or indirect commercial advantage by way of rental, lease or lending.
It is not necessary to take any particular steps once a work has been created
and "fixed in tangible form" for copyright to exist, although as noted above, in
many cases it will be necessary to register a copyright in a work before one can
proceed with an action for infringement of it. Once it exists, for works created
after January 1, 1978, copyright, in general, lasts for a period of seventy
years from the death of the author, or in the case of joint works from the death
of the last-to-die of the authors of the work. In the case of works made for
hire, however, protection runs for a period of ninety five years from
publication or one hundred and twenty years from its creation, whichever comes
first.[50]
In order to succeed in a copyright action, it is of course necessary for the
plaintiff to establish that the defendant "copied" the work in question. Since
it is rarely possible to produce direct evidence of the act of copying, the
courts will normally infer that copying has occurred if the plaintiff can show
that the defendant had access to the copyrighted work and that the alleged
infringement is substantially similar to the copyrighted work.[51]
However, if the defendant can show that there was independent creation of the
work in question, there is no copyright infringement.[52]
Unlike the patent statute, there is no statutory provision for an action for
contributory infringement of a copyright by providing an actual infringer with
the necessary equipment or materials to make a copy of a copyright work, the
courts have recognized the existence of such a right. In order to succeed,
however,, the Supreme Court in Sony Corporation of America v. Universal City
Studios[53]
held it is necessary to demonstrate that there are no "substantial
non-infringing uses" of the materials or equipment in question.[54]
The issue of contributory infringement lies at the core of the dispute between
the music recording industry and Napster Inc. Napster provides a service through
which users can, through the Internet, download music recordings that were
resident on computers of any other person who was logged on to Napster's site at
the time. This is done by software on the Napster site which searched out
computers on which the requested piece of music was present. The recording
industry regards this as being harmful to it as being likely to reduce the
legitimate sales of its recordings. The industry argued that by providing this
service, Napster was contributing to the actual infringement of the copyright in
a musical work that occurred when that work was down-loaded. In response to a
motion for a preliminary injunction, the district court judge rejected Napster's
claims that there were substantial non-infringing uses and also analogies to
taping of films broadcast in television which has been held by the Supreme Court
to be permissible as a fair use in the Sony case, at least when done to enable
the viewer to watch the film at a more convenient time.[55]
The Ninth Circuit Court of Appeals immediately stayed the injunction and ordered
an early oral hearing of Napster's appeal against the injunction on the ground
that the appellant had raised "substantial questions of first impression going
both to the merits and the form of the injunction."[56]
A basic principle laid down by the Supreme Court in the case of Baker v.
Selden in 1879 is that there is no infringement of copyright in using or
copying something if such copying or use is the only way for putting a
particular idea into practice.[57]
Copyright protection is available only for a particular expression of an idea,
not for the idea itself. (The case related to a book explaining a new system of
bookkeeping and including certain blank forms). In that case, it was held that
for the position to be otherwise there would be a grant of a monopoly "when no
examination of its novelty had ever been officially made which would be a
surprise and a fraud upon the public." The protection of ideas was to be a
matter of Letters Patent not copyright. Indeed Section 102(b) of the Copyright
Act 1976 specifically provides that
In no case does copyright protection for an
original work of authorship extend to any idea, procedure, process, system,
method of operation, concept, principle or discovery regardless of the form in
which it is described, explained, illustrated or embodied in such work. [58]
What copyright protection does give to the owner is a bundle of particular
rights that are to some extent dependent on the type of work involved. As noted
below, case law has classified computer software as falling within the statutory
definition of copyrightable subject matter as literary works., although some
manifestations of the software may be protectable as audio-visual works.
Literary works are defined as works, other than audiovisual works, expressed
in words, numbers, or other verbal or numerical symbols or indicia, regardless
of the nature of the material objects, such as books, periodicals, manuscripts,
phonorecords, film, tapes, disks, or cards, in which they are embodied.[59]
The bundle of rights given to the owner of copyright in literary works are
the rights to control 1)reproduction of the work, 2) preparation of derivative
works, 3) distribution of copies of the work, 4) public performances of the work
and 5) public display of the work.[60]
[ Top ]
Case Law Developments Relating to Copyright Protection for Computer
Software
The Early Days
Early in the development of the art of software writing, the originators
thereof feared that traditional forms of protection such as patents and
copyrights would not give them sufficient protection and relied upon trade
secret law. It soon became clear, however, that this was not the best solution
to the problem since to establish trade secret protection, one must take some
steps to impose a confidential relationship on those who have access to the
secret. In a free flowing industry such as the computer software business, this
is difficult.
Attention has, therefore, returned to the traditional protection of patents
and copyrights. As discussed in above many computer-related inventions are
patentable. However, patent protection cannot be obtained for inventions in this
field that do not meet the current test for patentable subject matter.
Furthermore, to be patentable the program must be "not obvious". This can be a
difficult requirement to fulfill. Furthermore, patent protection requires a
fairly prolonged examination by the Patent Office before any rights arise and is
thus not the ideal way of dealing with copyists who may be extremely quick off
the mark.
When a computer program is written out on a piece of paper, it is quite clear
that copyright exists in this work in the same way as it would in respect of any
other literary work. The first problem with which the courts had to grapple was
whether copyright law could be extended to cover computer programs which exist
merely in magnetic or electric form or as specific circuits etched on to a
silicon chip.
The United States Copyright Office has provided for the registration of
computer programs since 1964. However, that practice was on the basis it was the
duty of the Copyright Office to give applicants the benefit of a doubt as to
whether computer programs were protectable by law. Indeed, prior to the
Copyright Act of 1976, court decisions and the opinions of the leading writers
in the field were widely split on the question of whether computer programs were
entitled to copyright protection and, if so, to what extent protection was to be
given.
The 1976 Act itself was not very helpful in resolving these doubts, although
as noted above, Section 102 states that copyright protection exists in works
that are fixed in any present or future tangible medium even if it can be
reproduced only by means of a machine or other device. On the other hand,
Section 117 of the 1976 Act as originally enacted specifically stated that it
was not the intention of the Act to change the preexisting law in respect to
protection of computer programs. The Act, however, did not indicate what the
preexisting law was. This problem was finally resolved in 1980 by the passage of
the Computer Software Copyright Act 1980 which repealed original Section 117.
This repeal removed any doubt as to whether the broad definition of Section 102
extends to software. Furthermore, a new Section 117 was enacted which provided
that the owner of a computer program had a limited right to copy or adopt that
program if this was necessary to ensure that the program could be used in a
particular computer.[61]
Indeed, the new Act even provided a definition of a computer program as "a set
of statements or instructions to be used directly or indirectly in a computer in
order to bring about a certain result".
The first generation of cases to come before the courts mostly involved
actions for copyright infringement in ROM's (Read Only Memory). Three main lines
of argument were used by defendants to try to resist actions brought by the
originators of a computer program which have been incorporated into the
defendants ROMs. The first was that ROMs are utilitarian (the sub-argument of
this being that even if not all such ROM's are utilitarian, at least those whose
function is to work the computer itself are). The second was that since the
program as it appears on a ROM is in object code form and therefore not
intelligible to human beings, it falls outside the definition of "copy" in the
Copyright Act. The final line of argument used was that it is against public
policy to give computer manufacturers copyright protection for their software
because such protection would hinder competition in the development of new
computers.
The courts have not been impressed by arguments that computer software is
purely utilitarian when they are presented in the context of direct copying of a
particular program.[62]
For example, in an early case the Third Circuit Court of Appeals has rejected
the argument that the use of a computer program encoded in a ROM was utilitarian
and the argument that since the coding was in object code it was not a copy
intelligible to humans and, therefore, outside the Copyright Act protection.[63]
The latter point was established by analyzing the definition of "copy" in the
Copyright Act. Section 101 of the Act defines copies as:
material objects, other than phono records,
in which a work is fixed by any method now known or later developed and from
which the work can be perceived, reproduced or otherwise communicated either
directly or with the aid of a machine or device.
The court held that since Congress had chosen to define "copy" broadly in
this manner, it would be perverse to seek to interpret this broad language in a
manner which would severely limit the copyrightability of computer programs by
restricting this protection to the text and not to duplication of the program on
a fixed silicon chip. The court further rejected an argument that ROMs were
utilitarian objects and, thus, not subject to copyright protection by observing
that ROM's were not the objects which had to meet the test of copyrightability.
Only the original program had to be copyrightable. Once copyright existed in
that program, the only question remaining was whether a ROM constituted a copy
of it. As noted above, the court had no difficulty in deciding that this was the
case. A similar conclusion was drawn by the District Court in the Northern
District of Illinois.[64]
One might have expected defendants to be more effective in utilizing the
idea-expression dichotomy running through the United States copyright law when
the defendant has done something more than copy the source or object code
expression of the copyright owner's program. With a few exceptions, however, the
courts have still tended to favor the copyright owner. One case where the
argument was successful, however, was in Q-Co Industries, Inc. v.
Hoffman.[65]
In that case, the court denied a preliminary injunction to prevent the
defendants selling a program that was inspired by the program of the copyright
owner in a case where the alleged infringer had taken a program designed to run
on one type of hardware and had expended substantial effort to produce a program
that would fulfill the same function on different hardware. The court noted that
although the general structure of the two programs in question are very similar,
they were written in different languages and employed wholly distinct
algorithms. It concluded that the similarities "can be more closely analogize to
the concept of wheels for the car rather than the intricacies of a particular
suspension system ... it was the idea that was used rather than its expression.
Therefore, copyright infringement has not been established".
As can be seen from the cases discussed above where consideration of the
meaning of "copy" was of importance in determining whether there was copyright
protection for a given product, in copyright law unlike patent law the issues of
what constitutes protectable subject matter and what constitutes infringement
are often intertwined. Furthermore one should bear in mind the fact that unlike
the situation with patents, there is no Court of Appeals with nationwide
jurisdiction for copyright cases and so different views may be taken in
different circuits.
Once the basic issue of whether copyright protection could exist at all for
computer software had been resolved the next issue, which is still with us, was
to determine what exactly might be covered by copyright, particularly if the
alleged infringer had not copied code line by line but had taken something less
specific. The first group of cases to tackle this issue considered whether the
"look and feel" of the two programs is the same and if so and if the defendant
had access to the plaintiffs program, then copyright infringement was likely to
be held to have occurred . Thus, if there was substantial copying of details of
a program designed to fulfill a particular function on one type of hardware in
producing software to fulfill the same function on different hardware, the mere
fact that substantial effort was involved in making the conversion or even that
different programming languages were used might not avoid a finding of copyright
infringement. This is particularly the case if what is shown on the screen at
each stage of running both the copyrighted and the allegedly infringing program
or if similar errors appear in both programs.[66] [ Top ]
The "Look and Feel" Test
In Whelan Associates[67]
the Third Circuit Court of Appeals was confronted with the question of whether,
even if there was no copying of object code or source code, there could be
copyright infringement in copying the "overall structure" of a program. The case
was one where the alleged infringement was a rewrite of a program written in one
computer language in a different language. The court concluded that since
computer software was classified as a literary work under the Copyright Act and
since prior decisions had held that there could be infringement of copyright in
a play or book by copying the plot or plot devices of the play or book when the
total "concept and feel" of the alleged infringing work was substantially
similar to that of the copyrighted work, the same test should apply to
infringement of copyright in computer programs. The defendants had argued that
this conclusion was inappropriate in cases of computer software because of the
basic premise in copyright law that copyright should apply only to the
expression of an idea and not the idea itself. According to the defendants, the
structure of a computer program is by definition an idea rather than an
expression. The court, however, dismissed this argument by pointing out that it
was possible to write a totally different program to perform the same tasks as
both programs performed in the present case. The court thus concluded that the
detailed structure of a program was part of the expression of an idea rather
than an idea itself and upheld a finding of copyright infringement.
Similar reasoning was subsequently used to uphold the copyrightability of
menu screens as shown on monitors when a computer was running a particular
program as audio visual works.[68]
Copyright infringement was also found in the unauthorized writing of a
computer program to implement a scheme embodied in a copyrighted literary work
that had previously been operated manually.[69]
A further development has occurred in consideration of whether copyright
protection exists for what is known as "microcode", i.e., the programs embodied
in a semiconductor chip for operating a computer. These had been arguments that
in view of the utilitarian nature of such "operations" software it should be
treated differently from the prior cases that had dealt with "application
software". However, in the first case of this type to come before the courts,
copyright protection was upheld. The judge commented "the methodology employed
in the creation of a microcode is to the court indistinguishable from that
employed in the creation of any computer program".[70]
Early in the 1990's, however, the pendulum began to swing as software writers
started to complain that the protection being given by the courts was overly
broad and as such was inhibiting new developments. Concern that the "look and
feel" test was leading to overly broad protection led at first to adoption of a
two part test assessing intrinsic and extrinsic similarities[71].
In Johnson Controls[72]
the court focused on the question of whether the structure, sequence and
organization of the alleged infringement was the same as that of the plaintiffs
program and in Lotus Dev Corp v. Paperback Software[73] a
different court looked at the flow charts of the parties to determine whether
there was infringement.
In 1992 the idea began to take hold that a computer program was in some ways
like a play or other literary work in which a variety of possibilities presented
themselves for protection from, at the most specific the actual script to, at
the most general, the broad outlines of the plot. Other traditional copyright
doctrines such as the concepts that in some cases there could be a merger
between the idea and its expression because of the limited ways in which a
particular idea could be expressed or that protection would not be afforded to
features that were dictated by external requirements also started to be applied
in the computer software field. The advantage of these approaches was that
copyright lawyers had already grappled with these issues over many years and if
the principles that had evolved in dealing with plays could be applied to
computer programs, thus should facilitate rapid development of the law.
One of the earliest case to use such an approach was Autoskill Inc v.
National Educational Support Systems Inc[74].
In this case Judge Mechem specifically declined to follow the look and feel
cases and stated:
A better approach for determining what is
idea as opposed to expression is known as the abstractions test articulated by
Judge Learned Hand in Nicholls v. Universal Pictures Corporation (17
USPQ 84 2nd Cir 1930)... [u]pon any work, and especially a play, a great
number of patterns of increasing generality will fit equally well, as more and
more of the incident is left out. The last may be no more than the most
general statement of what the play is about, and at times may consist of only
its title; but there is a point in this series of abstractions where they are
no longer protected, since otherwise the playwright could prevent the use of
his ideas to which, apart from his expression, his property never
extended. [ Top ]
The "Abstraction, Filtration, and Comparison" Tests
This abstractions test approach was developed more fully by the Second
Circuit Court of Appeals in the case of Computer Associates International Inc
v. Altai Inc.[75]
The court started its analysis by pointing out that since the statute provided
that computer programs are to be protected as literary works then, as is the
case with other literary works some protection of non-literal structures of
computer programs must be covered analogously with the position in other
literary works. After noting with approval Judge Learned Hand's decision in the
Nichols case mentioned above, and pointing out that "nobody has ever been
able to fix that boundary [between an idea and a expression] and nobody ever
can" the court went on to propose a three step analysis which has become to be
known as the abstraction-filtration-comparison test. In doing this the court
should first try to determine the level of generality at which it can be said
that expression of an idea differs from the idea itself. The court noted that
this was a standard technique in dealing with plays and other literary works and
suggested that in dealing with computer software it would be useful to follow
the designer's steps to try to establish the appropriate level. The court noted
that:
At the lowest level of abstraction, a
computer program may be thought of in its entirety as a set of individual
instructions organized into a hierarchy of modules. As a higher level of
abstraction the instructions in the lowest-level modules may be replaced
conceptually by the functions of those modules. At progressively higher levels
of abstraction, the functions of higher level modules conceptually replace the
implantation of those modules ... until finally one is left is left with
nothing but the ultimata function of the program.
The court did not indicate at which of these levels it felt the
idea-expression boundary was being crossed. However, from the general tenor of
the decision as a whole there is an implication that the highest level at which
expression might be found is in the organization and structure of hierarchy of
modules.
The second step in the test is the filtration step; the object of which is to
separate out protectable elements of the expression from nonprotectable
material. Such nonprotectable materials include elements dictated by efficiency,
elements dictated by external factors, and elements taken from the public
domain.
Finally the court noted that "the primary object of copyright is not to
reward the labor of authors but rather their original contribution.[76]
The final test is to compare what remains with the alleged infringement.
The abstraction-filtration-comparison test for determining whether there has
been infringement in cases other than where there has been direct actual
copying[77]
has now been endorsed by several appeal courts including: the Fourth[78],
Tenth[79]
Eleventh[80]
and Federal[81]
Circuit Courts of Appeals.[82]
In Lotus Development v. Borland[83],
however, the First Circuit doubted its usefulness in cases where the issue was
one of literal copying of a literal element of a program. As noted by the
Eleventh Circuit, this is not surprising since the test was developed to deal
with the problem of non-literal copying of non-literal elements (the court
defining literal elements as source code and object code only)[84]
In Computermax Inc v. UCR Inc.[85] a
district Court in Georgia (which is in the Eleventh Circuit) adopted the
abstraction-filtration-comparison test to find that there was copyright
infringement in copying the plaintiff's file structures since these structures
or not dictated by outside factors such as market forces and are not merely
analogous to blank forms since they collect and organize information entered by
the user.
The Fifth Circuit first apparently held that only literal copying of elements
of a computer program could be considered an infringement[86],
then simply recognized that non-literal elements of computer programs "such as
structure sequence and organization", may be copyrightable,[87]
and subsequently applied the abstraction-filtration-comparison test to conclude
that copyright protection could in principle exist in input and output formats
and used interfaces as long as these formats were not dictated by external
requirements.[88]
As long as such factors were not involved, the court found that the expressive
nature of such interfaces outweighed their utilitarian function. [ Top ]
Abstraction
In Harbor Software Inc. v. Applied Systems Inc.[89]
the court in its abstract analysis noted the possible applicability of the case
law relating to protection of compilations to the selection and arrangement of
modules in a program and that such protection was likely to be "thin". the court
in its abstract analysis noted the possible applicability of the case law
relating to protection of compilations to the selection and arrangement of
modules in a program and that such protection was likely to be "thin".
Filtration
In O.P. Solutions Inc.v. Intellectual Property Network Ltd.[90]
the court listed the filters that must be passed through before reaching the
point at which a comparison is made as including: 1) a test for originality, 2)
whether there has been a merger of the idea and the expression or the related
scenes a faire doctrine applies and 3) whether a public domain exception
applies.
In Bateman v. Mnemonics[91]
the Eleventh Circuit Court of Appeals held that the district court erred in
instructing a jury to filter out only nonliteral similarities in carrying out
the filtration stage of the abstraction-filtration-comparison test since the
purpose of this stage was to eliminate from consideration all unprotectable
elements such as ideas, facts, public domain information, merger material,
scenes a faire material and other unprotectable elements of the ... program
under consideration.
As noted above, in addition to the "abstraction" concept that is derived from
traditional copyright law, two other traditional doctrines are now often
referred to in computer case. These are the "merger" doctrine and the "scenes
a faire" doctrine. Both of these may have the effect of limiting copyright
protection in the software area. An example of the application of the former is
found in the recent case of Interactive Network Inc. v. NTN Communications
Inc.[92]
In this case it was held that the idea behind a prediction scheme for an
interactive video game played with televised football games merged with its
expression and so there was no infringement in copying the elements of the game
in which such merger had occurred. The copied elements were stated to be
"inherent in, inseparable from, or constrained by" the idea of an interactive
football game. The scenes a faire doctrine excludes from copyright
protection those elements that follow naturally from a works theme rather from
the author's creativity.[93]
The doctrine was applied, for example in Computer Associates v. Altai discussed
above as part of the filtration stage to eliminate from consideration any
features that were themselves incapable of protection.
In the case of Feist Publications Inc. v. Rural Telephone Service Co.
Inc.[94],
the United States Supreme Court considered the question whether copyright
protection can exist in compilations of data. A key question was what was
required to satisfy the "originality" requirement of the Copyright Act. In her
opinion, Justice O'Connor noted that this required not only that the author not
copy the work from another, but also the work involved "at least some minimal
degree of creativity". Although she noted the requisite level of creativity is
extremely low, she went on to note with approval that Supreme Court decisions in
the late 19th century had referred to the originality requirement that what
should be protected by copyright were the "fruits of intellectual labor". Thus,
in order for protection to arise something more than the "sweat of the brow" was
required.
Even though in principle there may be a broad interpretation of what may be
protected as a literary work, it must be recognized that in some circumstances
the degree of protection given even to a literary work may be rather narrow. Two
such situations have been seen which either are directly related to the computer
industry or are clearly relevant to it. The first is where the plaintiff's own
acts have the effect of narrowing its protection. A case in point is Apple
Computer Inc. v. Microsoft Corp[95].
In the early days, Apple had licensed Microsoft to use certain visual displays
produced by graphical user interface (GUI) programs. Subsequently it sued
Microsoft for infringement on the basis of certain displays that were present in
late generation Windows programs. The Court found that most of the acts
complained of were in fact covered by the license and concluded that so far as
unlicensed material was concerned, Apple's copyrights should be construed
narrowly because of the external limitations imposed upon Microsoft in view of
the limited number of ways in which a GUI could be expressed. In Adobe
Systems Inc. v. Southern Software Inc.[96]
It was held that a program for creating type fonts could have the minimum degree
of creativity required since in this area two independently working programmers
using the same data and the same tools can produce an indistinguishable output
that will have few points in common. [ Top ]
A second area in which narrow protection is traditional is in respect of
compilations[97].
Thus, copyright in a compilation extends only to that which has been created by
the person making the compilation and does not give any new right in preexisting
material that has been compiled.[98]
Similarly, the protection given to standard forms and similar documents has been
held to be very narrow.[99]
In the Feist case noted above the data constituted a list of names and
telephone numbers taken from a small rural telephone directory. The U.S.
Copyright Statute specifically refers to compilations being protectable by
copyright only if the facts included in the compilation have been "selected,
coordinated or arranged in such a way that the resulting work as a whole
constitutes an original work of authorship". Twentieth century cases in which
compilations of data had been held to constitute copyrightable subject matter
had been those wherein the person making the compilation had contributed
original elements of selection and arrangement. In the case of a telephone
directory, the compiler had no choice in the selection of entries and the
arrangement of them in alphabetical order was, she believed, so commonplace as
to preclude the necessary element of originality.
Some concern has been expressed by those involved in other types of database
compilation that this decision may affect copyrightability in such databases. It
should, however, be noted that the court focused heavily on the question of the
way in which data was selected and arranged and indicated that copyright
protection clearly could exist in such selections and arrangements as long as at
least a minimum degree of creativity was involved. It remains to be seen how
courts will view this requirement when confronted with databases organized in
accordance with, for example, commercial computer programs. In O.P. Solutions
Inc. v. Intellectual Property Network Ltd. noted above it was held that it
might be possible to show that the screen lay-out of a trademark docket
management system was "sufficiently original and creative to deserve copyright
protection as a compilation of facts". However, protection would be narrow and
infringement found only if the defendant's program "differs by no more than a
trivial degree".
Another traditional doctrine that has required review and application to the
computer age is the "blank forms" doctrine. Based on the Supreme Court's
decision in Baker v. Sedden noted above, it had long been the practice of
the Copyright Office to refuse to register blank forms for recording information
unless the form itself conveyed information.[100]
This practice has implications in the computer field in connection with the
design of screens and computer interfaces. In a non-computer case, Kregos v.
Associated Press[101],
the Second Circuit pointed out that "if [a blank form] contained a group of
headings whose selection (or possible arrangement) displayed cognizable
creativity, the author's choice of those headings would convey to users the
information that this group of categories was something out of the
ordinary."
A attack on the protectability of a database on the ground that it was a
"utilitarian object' failed in General Precision Tool Co. v. Pharma Tool
Corp.[102]
However, the effect of the Feist decision and its requirement that for
protection there must be some minimal degree of originality has been felt in the
software area as is shown by Mitel Inc. v. Iqtel Inc.[103]
where it was held that short arbitrary sequences of numbers, forming part of
what were known as "command codes" lacked sufficient originality to be the
subject of copyright protection. Other aspects of the command codes did require
intellectual effort for their creation, but even here the court found that "much
of the expression in [the] command codes was dictated by the proclivities of
technicians and limited by significant hardware, compatibility and industry
requirements and application of the scenes a faire doctrine meant that there was
nothing left that could be protected by copyright.
On the other hand, Feist's recognition that compilations of elements that are
themselves not protectable can be the subject of copyright protection when there
is the necessary selection coordination and arrangement was combined with the
abstraction-filtration-comparison test in Sofitel Inc. v. Dragon Medical and
Scientific Communications[104]
to conclude that copyright protection could exist in the "architecture" of a
computer program even if this was made up of unprotectable elements where it was
possible to conclude that there was a degree of expression in establishing
interrelationships between the various elements involved. [ Top ]
Comparison
Once filtration is complete the court moves on to comparing that which has
been found to be susceptible of protection with the alleged infringement.
Although traditionally it has been said that for there to be infringement a
"substantial" part of the work must be taken, the word "substantial" has often
been construed in a qualitative rather than a quantitative sense.[105]
The Second Circuit has expressed the requirement as follows:
It is only when the similarities between the
protected elements of the plaintiff's work and the allegedly infringing work
are of "small import quantitatively or qualitatively" that the defendant will
be found innocent of infringement. [106]
Finally in this section we should note certain acts that have been considered
by the courts to determine whether they constitute an impermissible use of
copyrighted software. Thus in MAI Systems Corp. v. Peak Computer Inc[107],
the Ninth Circuit Court of Appeals found that the simple unauthorized act of
loading a program into the random access memory of a computer constituted
infringement since it created a copy that can be "perceived, reproduced or
otherwise communicated".[108]
In Sega Enterprises Inc. v. Maphia[109]it
was found that not only was uploading a computer game on to a computer bulletin
board a direct copyright infringement but that the person who did this was also
liable as a contributory infringer whenever someone accessed the bulletin board
to down load the program. . On the other hand, it has been found that
unauthorized creation of a hypertext link to pages within someone else's web
site was not of itself a copyright infringement since a user of the link was
being transferred to a genuine page that had been made available by the
copyright owner.[110]
Fair Use
Like the copyright laws of almost all countries, the U.S. Copyright Law
provides for exceptions that permit certain acts which would otherwise be
actionable as copyright infringements. These provisions, known as the "fair use"
provisions apply to all copyright works and provide exceptions from copyright
protection for "purposes such as criticism, comment, news, reporting, teaching
(including multiple copies for classroom use) scholarship or research". In
deciding whether a use is fair, courts must consider:
(1) the purpose and character of the use, including whether such use is of
a commercial nature or is for nonprofit educational purposes;
(2) the nature of copyrighted work;
(3) the amount and substantiality of the portion used in relation to
the copyrighted work as a whole; and
(4) the effect of the use upon the potential market for or value of
the copyrighted work. [111]
On October 25, 1992 the Fair Use Provision was amended to make it clear that
"The fact a work is not published shall not itself bar a finding of fair use if
such finding is made upon consideration of all the above factors. [112]
Certain additional specific provisions are made for fair use in various
fields. For example, it is not a copyright infringement for the owner of a copy
of a computer program to make or authorize the making of another copy or
adaptation of that computer program provided:
(1) that such new a copy or adaptation is created as an essential step in
the utilization of the computer program in conjunction with a machine and that
it is used in no other manner, or
(2) that such new copy or adaptation is for archival purposes only and
that all archival copies are destroyed in the event that continued possession
of the computer program should cease to be rightful. [113]
The first two cases in which the application of the Fair Use Provisions to
computer software were considered by appellate courts both related to the
programs used in game consoles where competitors had carried out reverse
engineering to try to determine what programming needed to be included in a game
cartridge to enable it to be used in the game console in question. In the case
of Sega Enterprises v. Accolade Inc.[114]
the court carried out an analysis of the above listed factors emphasizing in
particular the question of the effect of the competitors on the value of the
copyrighted work (a factor on which the Supreme court had focused in the case of
Harper & Row v. Nation[115])
and noted that the purpose of the copyright statute was to promote the useful
arts rather than necessarily to give an inviolable monopoly to the original
producer of a copyright work. In the present case the court felt that permitting
a wider range of games to be played on the consoles in question was unlikely to
reduce sales of such consoles and thus held that such reverse engineering so as
to make a separate program operable with the console in question was a fair use.
A similar conclusion was reached by the Federal Circuit court of Appeals in
Atari Games Corp. v. Nintendo[116].
Later the Ninth Circuit in Sony Computer Entertainment v. Connectrix[117],
was faced with a case in which the defendants analyzed the basic input-output
system (BIOS) of Sony's Play Station so as to produce a program that would
enable a regular computer to emulate a Play Station. None of Sony's code ended
up by being included in the emulation software. The analysis had involved making
copies of Sony's BIOS. It was admitted that this was an act of copyright
infringement unless it was excused under the fair use doctrine. The court
analyzed the four factors set out above and concluded that the use was fair in
the present case. [ Top ]
On the first factor (purpose and character of the use), the Court focused on
the Supreme Court's decision in Campbell v. Acuff-Rose Music Inc.[118],
where it had been held that a key question in fair use analysis was the extent
to which the new work "adds something new, with a further purpose or different
character, altering the first with new expression, meaning or message, in other
words, whether and to what extent the new work is transformative". The Ninth
Circuit found that in the present case, the defendant's product was "modestly
transformative".
On the second factor (the nature of the work), the Ninth Circuit concluded
that Sony's BIOS "lies at a distance from the core" of Sony's protection since
"it contains unprotected aspects [of the program] that cannot be examined
without copying". It was therefore entitled to a "lower degree of protection
than traditional literary works". Moreover, the copying was necessary for the
defendants to determine the functional elements of Sony's BIOS.
On the third factor (the amount and substantiality of the portion taken), the
court found for Sony since the entire BIOS had been copied. However, it held
that "in a case of intermediate copying when the final product does not itself
contain infringing material, this factor is of very little weight"
On the fourth factor (effect of the use on the potential market) the Ninth
Circuit again relied on Campbell v. Acuff-Rose, noting that the mere fact
that the copying was done for a commercial purpose is not dispositive and that
the harm to the copyright holder is less likely when the infringement is a
transformative work than when it supplants or supersedes the original work.
Unlike the Sega case, in the present situation there would be some economic loss
to the copyright owner. But the court held that the competition that would arise
to Play Stations by sale of the defendant's emulation software "does not compel
a finding of no fair use". With virtually no reasoning or analysis to support
its view, the court held that "because [the defendant's emulation software] is
transformative, and does not merely supplant the PlayStation console, [it] is a
legitimate competitor in the market for platforms on which Sony and
Sony-licensed games can be played."
The court therefore found that three of the factors that needed consideration
favored the defendants and so the use in question qualified as fair use.
One should not, however, read too much into these decisions. In both cases
the reverse engineering (which involved dismantling chips incorporated in the
games console to determine the nature of the program used) was done as part of a
research program to enable the production of an article that was not itself a
copyright infringement. As was pointed out in the Atari case reverse
engineering to discern a program's nonprotectable ideas constitutes fair use but
any reproductions of the program must not exceed what is necessary to understand
its unprotected elements. Furthermore the fair use claim was only open to those
who possessed an authorized copy of the program in question.
A case where it was found that the fair use provisions legitimized
intermediate copying to study a computer program to disassemble it to discover
its nonprotectable elements is DSC Communications Corp v. DGI Technologies
Inc.[119]
The defendant purchased microprocessor cards embodying firmware that was the
subject of the plaintiffs copyright claim. They had the cards disassembled to
reveal the plaintiff's source code and then produced their own flow diagrams to
design a card that was compatible with but "not substantially similar" to that
of the plaintiffs. [ Top ]
The fact that the defendant's copying was done for a commercial purpose did
not destroy as fair use defense since the "hybrid nature of computer software in
possessing both creative and functional aspects meant that it was entitled to a
lower degree of protection than more traditional literary or musical works.
However, in the same case the defense of fair use failed in respect of other
software where the defendants possession was unauthorized (it had been down
loaded from another party that had use of it subject to certain contract terms
that did not permit such down loading).
The defense of fair use also failed in the case of Triad Systems Corp. v.
Southeastern Express Co.[120]
Triad makes and services computers, some of which are leased subject to a
license barring third parties from using the operating software incorporated
into the computers. Southeastern also services Triad computers, which involves
the step of causing Triad's copyright operating software to be copied into the
computers random access memory. This act constituted copyright infringement and
the court went on to consider a fair use defense. In balancing the fair use
factors, the court noted that the situation was very dissimilar from that in
Sega v. Accolade because in this case there was no independent creation
as the end result and the activities of the defendant had a direct adverse
effect on the plaintiff's market. Thus no public benefit arose from the
defendants' activities and the could not be permitted under the fair use
doctrine.
The issue of fair use came up in a totally different context in Kelly v.
Arriba Soft Corp.[121]
In this case the act of infringement was the display of "thumbnail" pictures of
the plaintiffs work as part of a listing of works produced by use of a "visual
search engine" which was used for searching the Internet. The site that was
alleged to infringe produced a list of sites where pictorial works meeting the
criteria of the search could be found together with a small image of the work
that could be found at such a site. The search engine operated against a data
base containing approximately two million thumbnail pictures. The owner of the
copyright in some of the original works referenced in the data base alleged
copyright infringement and claimed that it was damaged in that the search engine
when giving a site address for the original work took the searcher direct to the
image in question and so by-passed other material that browsers approaching the
image in other ways would have to view before reaching the images in question.
This deprived the owner of the copyright in the original work of advertising
opportunities. Relying heavily on the Supreme Court's decision in Campbell v.
Acuff-Rose referred to above, the court held that in the present case the
most important of the four factors that need to be considered in a fair use
analysis was the first. Since the product in this case was a significantly
transformative one, and there was no evidence to support a claim possible harm
to the copyright owner the factors in favor of a finding of fair use outweighed
the facts that the entire work had been copied and that this therefore included
the core of what was protected by copyright.
[ Top ]
Registration and Notice
Prior to the United States adherence to the Berne Copyright Convention
becoming effective on March 1, 1989, publication of a copyright work without
inclusion of a notice could destroy the copyright in the work and registration
of the work with the Copyright Office was an essential prerequisite before one
could bring suit against an infringer of the copyright.[122]
The Berne Convention requires that for those who are eligible to take
advantage of it, copyright protection should be available without formalities
and since March 1, 1989, the notice provisions are no longer in effect and the
registration provisions no longer apply in respect of works that were produced
outside the United states and whose claim to protection in the United states
arises under the Berne Convention, for example as a result of the author being a
national of a Berne Convention Country and not resident in the United States. If
rights arise in the United States in some other way, the old rules on
registration still apply. The courts are split on the question of whether an
actual registration certificate or merely the filing of an application for
registration is required before an infringement action can be brought with
respect to a non-Berne Convention work.[123]
Although copyright exists automatically by virtue of creation of the work and
for works qualifying under the Berne Convention registration is no longer
required before one can bring suit, there remain a number of advantages in
registering a work with the Copyright Office. These include: the ability to
obtain attorney fees and statutory damages which may be important if one cannot
prove economic damages; registration provides prima facie evidence of the facts
stated thereon; and protection is provided against a purported subsequent
fraudulent assignment of rights in the work. Registration is a relatively simple
procedure. However, it does normally require deposit of "identifying portions"
of a computer program, although "special relief" may be available, for example
if the program contains trade secret information.
Entitlement to Copyright Protection
Original Ownership, Work Made for Hire
Copyright for a work is in general owned by the authors. This is, however,
subject to a provision that in the case of a "work made for hire" the employer
or the person for whom the work was made is deemed to be the author unless there
is a written agreement to the contrary.[125]
A work made for hire is one that either is made by an employee as part of his
employment or is a specially ordered or commissioned work where the parties have
expressly agreed in writing that the work in question is a work made for hire.[126]
It is, therefore, important when commissioning anyone who is not an employee to
create a copyright work to ensure that a written agreement is signed by all
parties that expressly sets out the ownership of the copyright in any program
produced.
A not uncommon problem is whether or not a writer of a computer program is an
employee for the purposes of the work for hire provisions of the statute. In
1989, the Supreme Court considered the issue of who should be considered as an
employee for the purpose of this provision and indicated that a balancing test
similar to that used in agency law should be applied, Community for Creative
Non-violence v. Reid[127].
This test has been widely perceived as being more favorable to the actual
creator of a work than the previous law, thus making it important to ensure that
anyone other a full time in-house programmer writes a program, rights in the
program are defined fully in writing before the program is written. An example
of the application of the new approach in the computer industry is found in
MacLean Associates Inc. v. Mercer-MeidingerHansen[128]
where the court noted the writer of the software (a former principal of the
party claiming ownership who was thought by outsiders still to be acting as an
agent of that party) was at the relevant time working on a single project for
the party that claimed ownership, that the writer had absolute discretion over
how long and when to work, that he was paid on delivery of a product rather than
given a salary and that he did much of the work involved on his own equipment in
his own facilities and concluded that the work in question was not a work for
hire. Similarly, in a case where the party who commissioned the writing of a
program reported the payments that it made to the tax authorities as payments to
an independent contractor rather than as an employee and had not withheld any
portion of its payments for income tax or social security, the fact that the
writer of the program traveled extensively with the person commissioning the
work and he had directed the projects and hours that the writer worked did not
result in the program that was created being a work for hire. However, not all
works made by former employees automatically cease to be works for hire.[129]
If the modifications made after leaving employment lack sufficient originality,
the post-employment work may still be deemed a work made for hire, the copyright
in which belongs to the former employer.[130]
Where the work was created abroad, the question of ownership of copyright in
a work created by an employee it has been held that:
Copyright is a form of property, and the
usual rule is that the interests of the parties in property are determined by
the law of the state with "the most significant relationship" to the property
and the parties.
Where the authors were Russian nationals and first publication was in Russia,
Russian law was held to apply.[131] [ Top ]
Nationality Requirements
One further point to be borne in mind in connection with United States
copyright law is that if a work has been published (i.e. copies have been
distributed to the public or offered for further distribution or for public
performance or display) copyright protection is subject to nationality
requirements. Thus, there is no copyright protection for a work that was first
published outside the United States unless:
(1) one or more of the authors is a national or domiciliary of the
United States or of a country having a copyright treaty with the United States
or is stateless
(2) the work was first published in a country that is a member of the
Berne or Universal Copyright Conventions,
(3) the work was first published by the United Nations, one of its
agencies or the Organization of America States, or
(4) copyright protection has been conferred by means of Presidential
Proclamation relating to works of nationals or domiciles of a particular
country or works first published in such a country.
As a practical matter, most major countries are parties to the Berne and
Universal Copyright Conventions. A notable exception is Taiwan (which is
apparently covered by an old treaty between China and the United States).[132]
Copyright Enforcement
Unlike infringement of a patent, infringement of a copyright may, if carried
out willfully and for purposes of commercial advantage or private financial
gain, be prosecuted as a crime as well as a civil wrong. The maximum penalty
depends on the exact nature of the defendants acts but in the most egregious
cases can be a fine of $250,000 and /or imprisonment for five years.[133]
More normally, however, enforcement is by a civil action by the copyright
owner. In this case the plaintiffs remedies may include an injunction,
impoundment and destruction of infringing goods and damages either in the form
of actual damages suffered plus any additional profit made by the infringer or
statutory damages. Normally statutory damages may lie in the range $500 to
$20,000. The Statute of limitations for copyright actions is three years. [134]
The general rule in civil litigation in the United States is that each party
is fully responsible for its own costs in any litigation. Thus a party who feels
aggrieved may bring a law suit against another without fear that if the suit is
lost he or she will have to recompense the other party for the costs that it
incurred in defending the suit.
Section 505 of the Copyright Act varies this general rule and provides that a
court may in some cases award reasonable attorneys' fees to the prevailing party
as part of the costs in any copyright infringement action.[135]
In Fogerty v. Fantasy, Inc., the U.S. Supreme Court recently held that
attorneys' fees awarded in copyright infringement actions must be made on the
same basis to both prevailing plaintiffs and prevailing defendants. In so
holding, the Court reversed a Ninth Circuit decision and rejected its "dual
standard", under which prevailing defendants needed to show that the lawsuit was
brought frivolously or in bad faith in order to recover attorneys' fees. Prior
to the Court's decision, the various circuit courts of appeal were divided in
their approach in awarding attorneys' fees under the Copyright Act. The Second,
Seventh and District of Columbia Circuits, for example, also followed this dual
standard, whereas the Third, Fourth and Eleventh Circuits adopted an
"evenhanded" approach, wherein no distinction is made between prevailing
plaintiffs and defendants. [ Top ]
In the Fogerty case, Fantasy, Inc. brought a lawsuit against
singer/songwriter John Fogerty, claiming that a song written by Fogerty in 1985
was copied from a song which Fogerty had written in 1970, but the copyright of
which was owned by Fantasy. After successfully defending against this copyright
infringement claim, Fogerty moved for attorneys' fees under the Copyright Act.
The district court denied the motion because Fantasy did not bring the suit
frivolously or in bad faith. The Ninth Circuit affirmed.
Fantasy presented several arguments to the Court in support of the Ninth
Circuit's dual standard, each of which was rejected by the Court.
Fantasy argued that the statutory language of Section 505 supported this dual
standard. In support of its position, Fantasy pointed to the Civil Rights Act of
1964, which has identical language with respect to attorneys' fees awards, but
under which different standards for awarding attorneys' fees to prevailing
plaintiffs and prevailing defendants have been routinely upheld. The Court
rejected this argument, differentiating between the objectives of the Copyright
and Civil Rights Acts. Civil rights plaintiffs, for example, often cannot afford
to bring lawsuits against defendants with greater resources. Accordingly,
Congress sought to provide incentives for these plaintiffs by treating them more
favorably than defendants. Unlike the Civil Rights Act, where Congress sought to
provide incentives to plaintiffs to bring meritorious lawsuits, the objective of
the Copyright Act is to encourage the production of "original literary, artistic
and musical expression for the good of the public" and, contrary to civil rights
cases, both plaintiffs and defendants in copyright infringement actions range
from "corporate behemoths to starving artists."
Fantasy had also argued that the policies and objectives of the Copyright Act
support the dual standard because it encourages plaintiffs to bring meritorious
copyright infringement claims. The Court rejected this argument, reasoning that
the objective of the Copyright Act is to stimulate artistic creativity for the
general public good and not simply to maximize the number of meritorious
copyright infringement actions. A successful defense of copyright infringement
may advance the policies of the Copyright Act as much as the successful
prosecution of a copyright claim.
Although the Court did not set forth any precise formula for making a
determination of when to award attorneys' fees, the Court noted that factors
such as "frivolous, motivation, objective unreasonableness (both in the factual
and in the legal components of the case) and the need in particular
circumstances to advance considerations of compensation and deterrence" may be
considered so long as they are applied equitably to both plaintiffs and
defendants. [ Top ]
Digital Millennium Copyright Act
Copyright Management
On December 20, 1996 two new treaties relating to copyright were signed in
Geneva. Both contain provisions on computer-related issues, in particular having
regard to matters arising from use of the Internet. The first of the new
treaties, entitled WIPO Copyright Treaty amends the Berne Convention in a number
of ways. The second, entitled WIPO Performances and Phonograms Treaty,
complements the Rome Convention (a convention to which the United States is not
a party), although membership of the Rome Convention is not a pre-requisite to
membership of the new convention. A further proposed treaty that was expected to
be considered in Geneva relating to protection for matter extracted from
databases was deferred for later consideration.
In order to ratify the treaties two changes were required in United States
Law. These relate to the provisions requiring member states to make it unlawful
either to circumvent copyright protection devices or to remove or alter
copyright management information. The changes were effected by the Digital
Millennium Copyright Act.
The most significant changes effected by the new law are:
(1) to provide that from October 28, 2000 it shall in general be
unlawful to circumvent a technological measure that effectively controls
access to a protected work; [136]
(2) to make it unlawful to manufacture, import, offer to the public,
provide, or otherwise traffic in any technology, product, service, device,
component, or part thereof, that -
(a) is primarily designed or produced for the purpose of
circumventing a technological measure that effectively controls access to a
work or protects a right of a copyright owner in a work protected by
copyright or as a mask work;
(b) has only limited commercially significant purpose or use other
than to circumvent a technological measure that effectively controls access
to a work or protects a right of a copyright owner in a work protected by
copyright or as a mask work; or
(c) is marketed by that person or another acting in concert with
that person with that person's knowledge for use in circumventing a
technological measure that effectively controls access to a work or protects
a right of a copyright owner in a work protected by copyright or as a mask
work; [137]
and
(3) to make it unlawful to provide false copyright management
information or intentionally to remove or alter any copyright management
information. [138]
[ Top ]
There are a few exceptions under the first two of these provisions, for
example for:
(1) law enforcement; [139]
(2) in order to carry out reverse engineering on a program that the
researcher has a legitimate right to use if the reverse engineering is for the
sole purpose of identifying and analyzing those elements of the program that
are necessary to achieve interoperability of an independently created computer
program with other programs, and that have not previously been readily
available to the person engaging in the circumvention, to the extent any such
acts of identification and analysis; [140]
(3) certain encryption research; [141]
and
(4) if
(a) the technological measure, or the work it protects, contains the
capability of collecting or disseminating personally identifying information
reflecting the online activities of a natural person who seeks to gain
access to the work protected;
(b) in the normal course of its operation, the technological
measure, or the work it protects, collects or disseminates personally
identifying information about the person who seeks to gain access to the
work protected, without providing conspicuous notice of such collection or
dissemination to such person, and without providing such person with the
capability to prevent or restrict such collection or dissemination;
(c) the act of circumvention has the sole effect of identifying and
disabling the capability described in subparagraph (A), and has no other
effect on the ability of any person to gain access to any work; and
(d) the act of circumvention is carried out solely for the purpose
of preventing the collection or dissemination of personally identifying
information about a natural person who seeks to gain access to the work
protected, and is not in violation of any other law. [142]
In addition to exposure to civil action by those who have been harmed by such
unlawful acts, violation of either of these provisions for commercial advantage
or private financial gain may result in fines of up to $500,000 and/or five
years' imprisonment for the first offense and fines of up to $1,000,000 and/or
ten years' imprisonment for any subsequent offense. [ Top ]
During the period before the law takes full effect, the Librarian of Congress
is to make a determination as to whether rules are required to make exceptions
from the general prohibition to prevent the new law from having an adverse
effect on non-infringing uses of particular classes of work. A number of
exceptions from the law are specifically set out including circumvention of such
technological measures in the course of analyzing those elements of a program as
are necessary to achieve interoperability with an independently created computer
program or in the course of carrying out research into encryption
technology.
As from April 28, 2000, most analog video cassette recorders and camcorders
made, imported or offered to the public in the United States will have to
conform to automatic gain control copy control technology. Furthermore it will
be unlawful with immediate effect to manufacture, import or offer to the public
most analog video cassette recorders and camcorders if they had been fitted with
automatic gain control copy control technology and they had been modified so
that they no longer conform to that technology.
In the case of Sony Computer Entertainment America Inc. v. GameMasters
Inc [143]
it was held that the prohibition on distribution of technologies products or
services used to circumvent technological measures which control access to a
system protected by copyright was breached by sale of a game "enhancer" that
permitted the use of the plaintiffs PlayStation game console with games that
were not authorized by the plaintiff. The enhancer overrides some of the
computer logic in the system to enable players to modify the rules (i.e. to
"cheat" in the game being played) and to permit the user to use the console to
play games that were marketed by the plaintiff for distribution only in Japan or
Europe. The games are supplied on a CD ROM which contains encrypted data which
permit the games to be played only on consoles supplied to the appropriate
jurisdiction unless that encrypted data is circumvented. This is what the
enhancer does and the court therefore held that sale of the enhancer was a
violation of the statute.
On-Line Service Providers
An additional feature of the Digital Millennium Copyright Act related to
those who provide services on the Internet.[144]
As long as certain requirements are met, this provision protects on-line service
providers[145]
from damages and most injunctive relief in respect of claims for copyright
infringement that arise as a result of the activities of users of the service.
For such a service provider to be protected, its involvement in any copyright
infringement must be limited to transmitting, routing, or providing connections
for, material through a system or network controlled or operated by or for the
service provider, or by reason of the intermediate and transient storage of that
material in the course of such transmitting, routing, or providing connections,
and:
(1) the transmission of the material was initiated by or at the
direction of a person other than the service provider;
(2) the transmission, routing, provision of connections, or storage is
carried out through an automatic technical process without selection of the
material by the service provider;
(3) the service provider does not select the recipients of the
material except as an automatic response to the request of another person;
(4) no copy of the material made by the service provider in the course
of such intermediate or transient storage is maintained on the system or
network in a manner ordinarily accessible to anyone other than anticipated
recipients, and no such copy is maintained on the system or network in a
manner ordinarily accessible to such anticipated recipients for a longer
period than is reasonably necessary for the transmission, routing, or
provision of connections; and
(5) the material is transmitted through the system or network without
modification of its content. [146]
[ Top ]
Service providers may also be protected against copyright infringement in
certain situations relating to system caching where the material is sent by
someone other than the service provider and is transmitted through the system or
network and the storage is carried out through an automatic technical process
for the purpose of making the material available to users of the system or
network who, after the material is transmitted through the system to someone
other than the sender, request access to the material from the sender as long as
the service provider takes no steps to involve itself with the content of the
material in question.[147]
Somewhat similar provisions protect service providers from damages and most
injunctive relief for any copyright infringement for which they might otherwise
be liable resulting from storage of information on their systems or networks
where such storage is at the direction of users of the system or network.[148]
Additionally protection is also provided where the service provider who
refers or links users to information location tools (e.g. search engines).[149]
In this case, however, protection is subject to a number of conditions including
the service provider's lack of knowledge that the material or activity in
question is infringing or awareness of facts or circumstances from which
infringement is apparent and does not receive any financial benefit directly
attributable to the infringing activity. Furthermore on becoming aware of
infringement or facts or circumstances from which infringement is apparent, the
service provider must "respond expeditiously to remove or disable access to" the
infringing material.
On the other hand, a service provider is required to respond to subpoenas
requesting details of actual infringers who are using its system.[150]
Furthermore, the protection is only given if, inter alia, the service provider
has adopted and reasonably implemented, and informs subscribers and account
holders of the service provider's system or network of, a policy that provides
for the termination in appropriate circumstances of subscribers and account
holders of the service provider's system or network who are repeat infringers.[151]
The meaning of the provisions relating to transitory network communications
and information location tools came before the courts in A&M Records v.
Napster Inc.[152]
Napster operated an Internet browser that its subscribers could use to find
music stored on other computers that were linked to the browser and to down load
such music to play on their own computers. It was claimed that insofar as music
that was covered by copyright was concerned, such action amounted to
contributory infringement of the copyright in such music. Napster claimed that
it was protected by the "safe harbors" noted above for service providers and
sought summary adjudication on this issue. The District Court disagreed. So far
as Napster's claim under the "transitory network communications" safe harbor is
concerned, the court found that Napster had not established that its role was
that of transmitting, routing or providing connections through "its" system (as
opposed to the Internet) and so failed to establish its right to claim
protection at all. So far as the protection for search engine providers is
concerned, the judge found insufficient evidence that Napster had adopted a
copyright compliance policy that was timely or reasonable as required by the
statute. The judge noted in particular that Napster had only adopted a formal
copyright policy after the suit had been started and that Napster was alleged to
have taken less rigorous methods than might be possible to prevent repeated
infringement by the same user. This being the case, there were factual issues to
be resolved so that summary adjudication was not appropriate.
[ Top ]
|