Computer Ethics, Summer 2011
LT 412; 6:00-9:00 TTh, May 31, Class 3
Paper 1
Sony v Universal City Studios, 1984
This was apparently a near miss; originally it looked like the vote
would be 6-3 against Sony [wikipedia, based on Thurgood Marshall's
papers]. The four dissenters were solidly against Sony, taking a view
that the primary function of the betamax VCR was copyright
infringement. Even after the 5-4 Sony final decision, it seems clear
that a majority on the court (perhaps the original 6-3 majority) still
felt that personal home copying was not
fair use; ie was in fact infringement. Justice Stevens played a major
role in the shift; Justice White also played a role in getting the
court to realize that the issue was not whether such copying was
infringement, but whether the betamax should be prohibited because of
it.
There was also some concern on the court about to what extent Universal
City Studios should have to prove actual harm. They did not do so, but
that was largely because there was no market for home videos (how could
there have been?) and they would have been left to prove that the
existence of taped movies cut into advertising revenue for movies shown
on TV (most of you won't have experienced when that was sometimes a big
event). Requiring the plaintiff in a copyright case to prove actual
harm remains controversial; see the Perfect 10 case (later). In
Blackmun's dissent, he wrote,
[The copier] must demonstrate that he
had not impaired the copyright holder’s ability to demand compensation
from (or to deny access to) any group who would otherwise be willing to
pay to see or hear the copyrighted work.... Even a showing that the
infringement has resulted in a net benefit to the copyright holder will
not suffice.
Harry Blackmun, Thurgood Marshall, Lewis Powell, and William Rehnquist
dissented, holding that Sony's new device should not
be allowed. Blackmun wrote "there can be no question that under the
[copyright] Act the making of even a single unauthorized copy is
prohibited." Contrast this with Stevens' "One may search the
Copyright Act in vain for any sign that the elected representatives of
the millions of people who watch television every day have made it
unlawful to copy a program for later viewing at home". Why do you think
Stevens said this? And got four other justices to sign on to his
opinion?
Blackmun also stated the following regarding fair use (emphasis added):
Fair use may be found when a work is used "for purposes such as
criticism, comment, news reporting, teaching, . . . scholarship, or
research." ... other examples may be found in the case law. Each of
these uses, however, reflects a common theme: each is a productive use,
resulting in some added benefit to the public beyond that produced by
the first author's work....
"Productive" use seems to be a slightly lower standard than
"transformative" use, but in Blackmun's mind it was not Fair Use if you
were just making an outright copy ("consumptive" use). You had to be
adding something to society, somehow.
Where would we be if this decision had gone the other way? It seems
likely (though not certain) that the 1999 RIAA v Diamond case about the
Rio mp3-player would then have gone the other way. And if that
happened, Apple would likely never have introduced the iPod or iTunes
(and it seems pretty clear nobody else would have both the vision and
the clout to create something like iTunes), and perhaps not the iPhone
or iPad. And Apple pretty much created the smartphone market with the
iPhone; the cellular phone industry remains very conservative. Although
phones make excellent mp3 players, it is not at all clear the
telecommunications industry would have supported this use.
Noted IP-law commentator Pamela Samuelson wrote in her paper "The Generativity of Sony v Universal: The Intellectual Property Legacy of justice Stevens"
Sony has been highly influential in new technology cases, such as those permitting reverse engineering of computer programs and development of add-on software, and those limiting liability of Internet service providers and search engines. Digital access initiatives, such as the Internet Archive and Google’s Book Search Project,
rely on Sony as a key supporting precedent. Had Justice Blackmun’s fair
use analysis prevailed in Sony, few, if any, of these developments
would have survived copyright challenges.
Justice Stevens had a long history of feeling that the public was a
significant stakeholder in the decision to grant the "copyright
monopoly", and was inclined to take the public's interests seriously.
Blackmun, despite his universally acknowledged liberalism, argued
strenuously here against the rights of the public. Why? Likely he saw
the rights of creators as on the table here, challenged by a big corporation (Sony) that wanted to take them away.
Ironically, a different Sony outcome thus might have made file-sharing
more prevalent; without iTunes there would be no alternative to CD
purchases.
In 2003, following the successful shutdown of Napster -- whose Sony
defense was rejected by the Ninth Circuit -- the RIAA sued Aimster, a
similar music-sharing site, and made the following list of anti-Sony arguments
[from Samuelson]:
- The primary use of the defendant’s system was for infringement
- Aimster was providing a service rather than a machine
- There was an ongoing relationship between Aimster and its customers
- Aimster's service enabled not only home copying, but distribution
- The system was specifically designed to enable infringement
Judge Posner of the Seventh Circuit wrote that none of the above
applied, but that Aimster was in trouble anyway because [emphasis added
- pld] "Aimster has failed to produce any evidence that its
service has ever been used
for a noninfringing use, let alone evidence concerning the frequency of
such uses." Posner then wrote his own anti-Sony proposal, in the form of a cost-benefit argument, suggesting that
the SNIU model be replaced with an analysis of the legitimate benefits
of the new technology versus the social costs, and taking into account
the cost of adding technology to support the interests of content
owners. Unless that cost were prohibitively high, manufacturers would
be expected to take steps to minimize the potential for infringement.
Recording broadcasts remains controversial. Under FCC rules, HDTV receivers are to respect the "broadcast flag" and
limit the copying of TV broadcasts when indicated by the broadcaster.
The limit can be temporal (eg the copy must be viewed within seven
days); another idea is to limit replay to the original device. However,
the courts have struck down this rule because it was not based on
actual legislation from Congress. To date [May 2011], Congress has not
passed legislation mandating adherence to the broadcast flag.
Criminal copyright violations
In 1994 David LaMacchia ran a "warez" site as an MIT student; that is,
he created an ftp site for the trading of (bootleg) softwarez.
He did not profit from the software downloads; in this, his site was a
precursor of today's file-sharing systems.
Because of the lack of a profit motive, the government lost its
case against him. The NET act
was passed by congress to address this in future cases. It
criminalizes some forms of noncommercial
copyright infringement, which until then hadn't
apparently been illegal. (Copyright owners like the RIAA, or in
LaMacchia's case Microsoft, could still go after you).
17 U.S.C. § 101
§ 101. Definitions
Add the following between "display" and "fixed":
The term "financial gain" includes receipt, or expectation of
receipt, of anything of value,
including the receipt of other copyrighted works.
Does this cover peer-to-peer filesharing? What if you are just
distributing music you love?
17 U.S.C. §§ 506
& 507
§ 506. Criminal
offenses
(a) Criminal
Infringement.--Any person who infringes a copyright willfully and for
purposes of commercial advantage or private financial gain shall be
punished as provided in
section 2319 of title 18. either--
- for purposes of commercial advantage or private financial gain,
or
- by the reproduction or distribution, including by electronic
means,
during any 180-day period, of 1 or more copies or phonorecords of 1 or
more copyrighted
works, which have a total retail value of more than $1,000,
shall be punished as provided
under section 2319 of title 18. For
purposes of this subsection, evidence of reproduction or
distribution of a copyrighted work, by itself, shall not be sufficient
to establish willful
infringement.
How does the NET act affect file sharing?
Note that the law includes both reproduction and distribution.
Note the retail $1000 cutoff. Arguably that is 1,000 tracks. So far,
prosecutors have been loathe to apply the NET act to music filesharers.
This is partly due, no doubt, to the added burden of proving "willful"
infringement: the law states that file sharing itself is not sufficient
to establish "willfulness" (infringement "with knowledge of or
'reckless disregard' for the plaintiffs' copyrights" --
arstechnica.com).
In 1994, mp3 file sharing had not yet become significant.
Napster
Napster was started June 1999. Content owners promptly sued, and Napster
lost in federal district court in 2000. The Ninth
Circuit appeals court then agreed to hear the case. They granted an
injunction allowing
Napster to continue operating until the case was decided, because they
took
seriously Napster's arguments that Napster might have "substantial
non-infringing uses" and that Napster was only a kind of search engine
while
the real copyright violators were the users. The Ninth Circuit
eventually found that Napster
did indeed have Substantial Non-Infringing Uses, but they ruled against
Napster by January 2001. After some negotiating, Napster was ordered in
March 2001 to remove infringing content,
which they technologically simply could not do, and so they shut down in
July of that year.
Bottom line: the Betamax videotaping precedent [below] was rejected
because,
although SNIUs existed for Napster, Napster had actual knowledge of
specific infringing material and failed to act to block or remove it.
Also, Napster did profit from it.
However,
the court refused to issue an injunction for quite a while; it was
clear that the Betamax precedent was being taken very seriously.
Legality in Napster era: napster.com was a clearinghouse for who was
online, and what songs they held. Actual copying was between peers.
Did that make it ok?
Napster figured the RIAA would never bother with individual lawsuits
against users.
Were they right?
Are such suits justified?
What evidence should be required to obtain a subpoena to identify the home users involved?
Note that signed and indie musicians fare VERY differently under the
napster model!
Also note the long-term implications for "future fans"
IS napster like radio?
Napsterized business model for musicians: make money giving live concerts, not selling CDs.
IS THIS REALISTIC? IS THIS FAIR? IS THIS JUST LIFE?
Is this a case of "harm" being unequal to "wrong"?
Question: is it ethical to cause harm?
What about economic harm?
RIAA Lawsuits

Part of the Napster business model was that the RIAA wouldn't ever
bother to sue individual music-file-sharers. But when file-sharing
continued after Napster was closed down, the RIAA felt forced to do
just that.
File-sharing software works by sharing your
files too; advertising
your music folder(s) online when you join the service. Investigators
look for these, by participating in online file-sharing networks. They
record your IP address and the listed songs; they also generally
download a few of the songs.
Different software works different
ways. Kazaa shows a "share" folder. bittorrent shows your connection to
a torrent "tracker" site, but there's no notion of "shared files".
Step 1: The RIAA files a "John Doe" lawsuit against your ISP.
They
issue a subpoena to your ISP, asking for your name, and, if relevant,
the MAC address of your computer. These subpoenas are almost always in
a group, asking for multiple customer names.
One legal criticism of RIAA lawsuits has been over joining together
of multiple individuals in one ISP lawsuit. Normally you can't do that
unless you believe the cases are related.
Prior to December 19, 2003, the RIAA didn't need to sue ISPs: it could
subpoena ISP records without
a lawsuit, under a provision of the DMCA. But then a court ruled that
this DMCA provision did not apply to RIAA-type cases. [RIAA v Verizon]
The ISP usually complies, usually without contacting you. However, it
is possible for either the ISP or you (if the ISP contacts you) to file
in court to "quash" the subpoena. You do need a reason for that,
however. It *is* possible to file to quash without giving up your
identity, but you have to hire a lawyer.
Step 2: the RIAA now sends you a settlement letter, offering you a
chance to settle before the lawsuit is filed. The settlement offer is
usually something like $500-1000 per track. The RIAA may or may not
distinguish between tracks that showed up in your directory, and/or
tracks that they actually downloaded.
You can refuse to settle. However, in that case the RIAA will almost
certainly go to Step 3.
Once the possibility of a
lawsuit is raised, destroying evidence becomes both a civil and criminal
offense.
Step 3: The RIAA files a lawsuit. They are likely to ask for a
forensic copy of
your hard drives (they may ask for the hard drives themselves, but
you're under no obligation to give them up). An independent forensic
examiner will copy the drive, and determine whether or not the songs
are there. (The MAC address from Step 1 plays a role here in determining
whether they've got the right computer; so does other identifying
information about KaZaa, etc.)
The cost of settlement typically goes up a little at this point.
Some defenses that have NOT helped:
- the ISP is your school, and releasing school records is illegal.
(releasing names is not
illegal)
- you didn't know it was against the law.
Yes you did. Come on.
But it doesn't matter.
- you already owned the tracks on CD.
See the Gonzalez case; www.eff.org/wp/riaa-v-people-years-later.
Copyright
law allows you to make a backup copy of what you bought; there is no
provision for receiving your backup copy from someone else.
Some possibly valid defenses in court:
The problem with all these is that you don't want to be going to court,
and the RIAA does not have to consider these when settling.
It wasn't your computer.
Typically this is due to the ISP's
misidentification of you. Sometimes it's because someone jacked your
wi-fi. In this case the forensic examination of your computer will probably help.
Your roommate used your computer
Your
problem
here is proving that this is the case. In civil cases, the
burden-of-proof requirement for the plaintiff is much more modest than
in criminal cases.
Your kids used your computer
There is a very limited legal doctrine of parental responsibility.
Originally, the RIAA did sue parents, or made them settlement offers.
More recently, after several losses, the RIAA has been suing the minors
themselves. This is a little tricky; the court must appoint an
attorney, often at the RIAA's expense. Also, in Capitol_v_Foster,
Deborah Foster eventually won $68,000 in legal fees from the RIAA.
Foster's daughter did the downloading. (The case was brought in 2004;
the RIAA dropped their suit a year later but Foster continued with her
countersuit. The judge eventually ordered the award for legal costs
without a full trial.)
You didn't actually download any songs
What the RIAA has, as
evidence, isn't evidence of downloading. All they
have is evidence that you "offered" songs for downloading. At this
point it might matter a great deal whether the RIAA actually tried
downloading anything from your computer.
Jammie Thomas-Rasset
Jammie Thomas-Rasset had her case go
to trial (the first RIAA case to reach a jury trial; Tenenbaum's July
2009 trial was the second) and she lost and was ordered to pay
$220,000. But Judge Michael Davis rethought this issue, and in in
September 2008 rejected
the "offered for distribution" theory, and ordered a new trial. Alas,
the new trial reached a judgement against Thomas of $1.9 million
($80,000 per song). The judge then lowered the amount to a total of
$54,000, and the RIAA allegedly offered to settle for half that. But
Thomas-Rasset did not, and in November 2010 there was a third trial
leading to a total damage award of $1.5 million. The judge has yet to rule on reducing the award.
See http://www.citypages.com/2011-02-16/news/jammie-thomas-rasset-the-download-martyr (Feb 2011).
Joel Tenenbaum case
Joel Tenenbaum was caught downloading files by the
RIAA, and was offered their past settlement offer, typically about
$5000. He chose to fight. He got Harvard Law professor Charles Nesson to
take his case pro bono; Nesson
also involved his law-school class. They put up a vigorous and spirited
defense before Judge Nancy Gertner.
They lost.
When it came time to assess damages (July 31, 2009), the jury decided
$22,500 per track was fair, for
a total of $675,000. Oops.
Actually, a core part of Tenenbaum's defense, and the central part of
his appeal, is that the damages (and settlement offer) were
disproportionately high, and not tied to actual
damages. Normally, when you sue someone, all you can ask for is actual
damages. Actual retail cost of music tracks is about $1. Tenenbaum got socked with 22,500 times actual damages!
Tenenbaum's case was the second RIAA case to go to trial. Jammie
Thomas-Rasset was first; in her first case the verdict was $222,000.
Thomas-Rasset got a new trial; the second verdict was $1,920,000.
Moral: think hard about settling early.
Tenenbaum's music downloading appeared to be both intentional
and egregious; he had actually been sharing some 800 songs.
However, it was done when he was a student.
An interesting point about the case is how the judge dismissed the
fair-use claim based on the legal theory that fair use could not apply after
Apple opened its iTunes store; that is, once it became possible to buy
individual tracks, file-sharers lost any claim to fair use. That is,
the underlying justification for "fair use" was that mp3 tracks were
otherwise unavailable. Tenenbaum's appeal in part is about the idea
that until iTunes dropped DRM its music tracks were still not really
comparable to downloaded ones.
What do you think of this Fair Use argument?
See http://arstechnica.com/tech-policy/news/2009/07/o-tenenbaum-riaa-wins-675000-or-22500-per-song.ars.
and the links at the end to earlier articles.
It's really hard to generate much sympathy for the RIAA methods.
Consider, though, the theory that file sharing is a violation of their
copyrights, and that such individual lawsuits are the ONLYway to
proceed.
What's unfair about this process? What is fixable, within the
constraints of the US legal system?
Some things to think about:
- statuary damages for infringement
- rules for defendants who
cannot afford an attorney
- rules of evidence
RIAA-2
The RIAA has officially given up on filing lawsuits against infringers,
at least for now; they announced this policy in December 2008, just
after the Tenenbaum case (lawsuits still in the pipeline will
continue). The new policy is to work with ISPs to
- notify users of infringement for the first offense
- cut off
their internet access (perhaps slowing it for a while, first)
See http://www.wired.com/epicenter/2008/12/riaa-says-it-pl.
Why would ISPs want to go along with this plan? Here are a few reasons:
- file-sharers are also huge bandwidth hogs. (Linux users are too,
but there aren't enough of us to matter. (How many times a day do you
rebuild your kernel?)) The
broadband business model basically gives every customer the ability to
download several dozen gigabytes a day, but the hope is that most
customers will actually download somewhere in the range of dozens of
megabytes a day. File-sharers who download movies pretty solidly put
themselves in the heavy-downloaders camp, tying up resources for
everyone.
- The ISP might get sued. The RIAA probably wouldn't
win, but it would be an expensive hassle.
- It's the Right Thing
To Do. Knowingly cooperating with copyright infringement is wrong.
- Eventually,
the RIAA is likely to press for laws requiring
ISPs to cooperate. Better get started now.
The RIAA model today
While the RIAA has officially gotten out of the business of suing
everyone, the US Copyright Group (USCG) has stepped up to the plate,
having begun operations in early 2010. They follow the RIAA model,
suing ISPs for the identities of subscribers and then sending
settlement letters. USCG does this at the behest of individual movie
producers; they have gone after downloaders of The Hurt Locker, for example. Many of the Hurt Locker cases were later dropped, likely over jurisdictional issues.
This program ran into a snag when, in March 2011, US District Court
Judge Harold Baker (Central District, Illinois (Urbana)), in the case VPR Internationale v Does, ruled that "an IP address is not a person", and that he would not
grant subpoenas of user names associated with given IP addresses. The
ruling not to grant the subpoena was issued in March, but the
explanation was not entered until April 29. Judge Baker cited FBI raids
on child-pornography suspects, who turned
out to be innocent but who had had their wifi hijacked. It remains to
be seen whether other District Court judges go along with this
approach. The ruling closes with a technical legal point:
In its order denying the motion for expedited discovery, the court noted that until at least one
person is served, the court lacks personal jurisdiction over anyone.
The court has no jurisdiction over any of the Does at this time; the
imprimatur of this court will not be used to advance a “fishing
expedition by means of a perversion of the purpose and intent” of class
actions.
In May 2011, some 23,000 users were receiving settlement offers for downloading the movie The Expendables. Many if not all these users were likely discovered before Judge Baker's March ruling.
As with the RIAA lawsuits, usually someone must be serving as an upload point in order to have their IP address captured.
While we are on the topic, the PROTECT IP act was passed by the Senate
Judiciary Committee on May 26, 2011; this law would allow judges to
seize domain names such as thepiratebay.org, isohunt.com,
cinematorrents.com and other torrent sites. For sites in the U.S., the
actual servers could also be seized. Note that the U.S. does pretty
much control the top-level DNS servers, but that nothing in principle
prevents users from pointing their DNS resolver at different, non-US,
"root servers".
Bill O'Reilly on Intellectual Property (also on Privacy): http://www.youtube.com/watch?v=hCSaF4KC3eE.
Bill's correspondent is attorney Megyn Kelly. Kelly acknowledges that
it is indeed a "federal offense to access email without authorization",
but goes on to say that the web site is probably ok [~2:00 minute
mark]. O'Reilly responds with "they're trafficking in stolen
merchandise" and compares it to if "you steal somebody's car".
At 3:13, he says there is "no difference between taking a person's
letter out of the mailbox and taking someones email off their internet
site".
Is there a difference?
To be fair, O'Reilly here is not talking about file sharing, but rather
someone hacking into someone (Palin's) private email account.
Michael Eisner, CEO
of Disney, testifying before Congress in June 2000: (as included in
Halbert & Ingulli, CyberEthics,
2004)
Eisner's statement remains a pretty clear example of a particular
point of view, even if some of his concerns are a bit dated. He does
use "intellectual property" as if you're just supposed to assume it's
the same as physical property. His comments about "Pirates of
Encryption" are a bit odd, especially considering that the goal of many
encryption crackers was and is the ability to play purchased DVDs on
arbitrary (eg linux) systems. Note that he appears to equate that with
credit-card theft.
[Although Eisner's remarks supposedly are from 2000, he refers to the 2003 movie Pirates of the Carribean.]
- Theft is theft. (Is this a deontological sentiment?)
-
Movies cost a lot
-
music downloading is as bad as credit card theft
-
Everyone has to play by infringement rules
-
distributing a DVD is no different from stealing newspapers
-
THEFT IS THEFT
-
[creators are entitled to] FULL RIGHTS OF OWNERSHIP
- "Today's
Internet pirates try to hide
behind some contrived New Age arguments of cyberspace"
Disney believes in technology
5 rules:
1. legislative mandate for technological fixes
2. international protection
3. public education - many don't know it is wrong
4. use appropriate technological measures
5. appropriate pricing
does free copying drive down prices?
DISCUSSION: Do you agree with Mr Eisner?
Conversly, does Disney engage in theft by overpricing (cf Eisner's 5th
rule)
Some side issues:
- What if anything was iCrave.com doing wrong? Apparently they were
simply streaming broadcast TV to the internet in real time; who loses?
They were wrapping the content in banner ads.
- How closely is file-sharing related to credit-card fraud and endangerment of children?
Can the FILM industry survive on the napster model?
Here we get into ECONOMICS. Thirty years ago, the movie industry income
from selling recordings was zero,
and the industry did fairly well. That said, it seems likely that going
back to those days would be impossible.
From 2002 to 2008, the film industry grossed more in DVD sales than at
the box office. However, that trend reversed in 2009. It is not clear
whether filesharing is a significant factor, or, for that matter, legal
on-demand downloads (which are not counted as DVD sales). (TV rights in
the past were often as large as box-office; I do not know if that trend
has continued but I doubt it.)
Figures in billions (http://www.reuters.com/article/2010/01/05/us-dvd-idUSTRE5BU0HS20100105):
|
box office
|
DVD, other sales
|
rental (all forms)
|
2008
|
8.99
|
10.06
|
1.20
|
2009
|
9.87
|
8.73
|
1.27
|
Other ethics/economics questions:
- What is the FAIR amount of money to pay for something?
- Can people be EXPLOITED by receiving too low an income?
- Is HARM to other people ever justified, aside from ECONOMIC HARM?
- Are there limits to justifable ECONOMIC harm?
Check out http://thepiratebay.org.
O brave new world!
What about the market for video games
that run on a general-purpose
computer, rather than a console, and which do not require a
subscription fee to access a central server? Supposedly the main reason
this market
has all but collapsed is that it is much too easy to defeat copy
protection, and with games running $50 each, there is considerable
incentive to do this.
If this is true, it would be an example of how inability to enforce copyrights led to collapse of a market.
Console games represent, in a sense, a move by game makers to hardware-based copy protection.
(To be sure, game consoles also offer a standardized hardware platform
and guarantee high-performance graphics, but most personal computers
these days have high-performance graphics. Many of the most successful
PC-based games in fact involve registration and monthly fees (Second
Life (which can be played for free), World of Warcraft).)
Digital Restrictions Management
(aka Digital Rights Management)
How does DRM fit into the scheme here? Is it a reasonable response,
giving legitimate consumers the same level of access they had before?
Or is it the case that "only
the legitimate customers are punished"?
The general idea behind DRM is to have
- encrypted media files, with multiple possible decryption keys
- per-file,
per-user licenses, which
amount to the encrypted decryption key for a given file
- player
software (the DRM agent) that
can use some master decryption to decrypt the per-file decryption key
and then decrypt the licensed file. The
DRM agent respects the content owner's rights by not allowing the user
to
save or otherwise do anything with the decrypted stream other than play
it.
The last point is the sticky one: the software must act on behalf of
the far-away content owner, rather than on behalf of the person who
owns the hardware it is running on. Open-source DRM software is pretty
much impossible, for example; anyone could go into the source and add
code to save the decrypted stream in a DRM-free form. Windows too has
problems: anyone cat attach a debugger to the binary DRM software, and
with enough patience figure out either what the decryption key actually
is, or else insert binary code to allow saving the decrypted stream.
iPods, iPads, kindles, nooks, DVD players, and other closed
platforms are best for DRM. Under windows, DRM is one of the issues
leading Microsoft towards "secure" Palladium-style OS design under
which some processes can never have a debugger attached. ("Protected
processes" were introduced into Vista/win7.)
Most DRM platforms allow for retroactive
revocation of your license (presumably they will also refund your
money). This is creepy. Content providers can do this when your device
"phones home", when you attempt to download new content, or as part of
mandatory software upgrades.
Note that the music industry, led by iTunes, no longer focuses on DRM
sales. E-book readers, however, are still plunging ahead. One iPad
market-niche theory is that the machine will provide a good platform
for DRM-based movies and books.
Some older DRM mechanisms are based on the "per-play phone-home" model: the DRM
agent
contacts the central licensing office to verify the license. This
allows, of course, the licensing office to keep track of what you are
watching and when. This
raises a significant privacy concern. I have not heard of any recent
systems taking this approach.
Another major DRM issue is that different vendors support different
platforms. DRM might require you to purchase, and carry around with
you, several competing music players, in order to hold your entire
music library.
Perhaps the most vexing real-world DRM problem is that licenses are inevitably lost, sooner
or later. Keeping track of licenses is hard, and moving licensed
content from one iPod to the next (eg to the replacement unit) is
nontrivial. If the first iPod is lost or broken, and Apple no longer
supports the license, your content is lost. When Wal*Mart switched to
selling non-DRM music a year ago, they also dropped support for the DRM
music they'd sold in the past, meaning that those owners would see
their investment disappear whenever their current hardware platform
needed to be replaced.
Traditional CDs have a shelf life of (it is believed) a few decades,
and traditional books (at least on acid-free paper) have a shelf life
of centuries. Compare these to DRM lifetimes.
See also http://xkcd.com/488.
General copyright law rules
Different categories may be (and usually are) subject to different
rules. See http://copyright.gov/title17
for (voluminous) examples.
A local copy is at http://cs.luc.edu/pld/ethics/copyright2007.pdf.
Rules
for theatrical performances are tricky: these are ephemeral
performances! Videotaping a performance may violate actors'
rights.
Usual issue is rights of the DIRECTOR.
Copyright is held by creator unless:
- Sold
- the work is a Work For Hire
Copyright covers expression,
not content.
Famous case: Feist Publications v Rural Telephone Service:
(Feist v Rural) (1991, Justice O'Connor)
the phone book is NOT copyrightable.
(some European countries DO have "database protection". Gaak!!)
More info below
Note that if you buy a copy, you have right of private performance
(so to speak; there's no special recognition of it), but not public.
First Sale doctrine:
after YOU buy a copy, you can re-sell it. Copyright law only governs
the "first sale".
Who owns the copyright?
The creator, unless it is a "work for hire",
or the copyright is sold.
Fair Use:
This idea goes back to the constitution: the public has
some rights to copyrighted material. Limited
right of copying for reviews, etc
Good-faith defense protects schools, libraries, archives, and
public broadcasts (but not me and Joel Tenenbaum);
this limits statutory damages to $200 IF infringement was "reasonably
believed"
to be fair use. Note that, in the real world, this strategy doesn't
usually apply (though it probably means that schools don't get sued
much; it's not worth it.) Section 504(c)(2)(i).
In other cases, statutory damages may
be reduced to $200 if the "infringer was not aware and had no reason to
believe that his or her acts constituted an infringement of copyright".
Statutory damages are a flat amount you can ask for at trial
instead of
actual damages. See Section 504. Part of the theory is that by asking
for statutory damages, you do not have to prove the number of copies
made. But note the effect on the RIAA cases: actual damages might be in
the range of $1/track, if you're downloading for personal use, while
statutory damages are usually $750/track. Statutory damages were
created in an era when essentially all copyright cases that reached the
legal system involved bulk commercial copying. If a DVD street vendor
is arrested, statutory damages make sense, because of the likelihood
that a rather large number of copies have been sold in the past. But
file-sharing is about single copies.
Title 17 United States Code, Chapter 5, Section 504, Paragraph (c)
Statutory Damages. —
(1) Except as provided by clause (2) of
this subsection, the copyright owner may elect, at any time before
final judgment is rendered, to recover, instead of actual damages and
profits, an award of statutory damages for all infringements involved
in the action, with respect to any one work, for which any one
infringer is liable individually, or for which any two or more
infringers are liable jointly and severally, in a sum of not less than
$750 or more than $30,000 as the court considers just.
This was written to address large-scale commercial copyright
infringement. Should it apply to
personal use?
Laws (highlights only):
1790 copyright act: protected books and maps, for 17 years. "The earth
belongs in usufruct to the living": Thomas Jefferson
1909 copyright act: copy has to be in a form that can be seen and
read visually. Even back then this was a problem: piano rolls were the
medium of recorded music back then, and a court case established that
they were not copyrightable because they were not readable.
1972: Sound recordings were brought under Copyright.
But coverage was retroactive, and now lasts until 2067. There are NO
recordings in the public domain, unless the copyright holder has placed
them there.
1976 & 1980 copyright acts: mostly brings copyright up to date.
1976 act formally introduced the doctrine of Fair Use, previously
carved out by court cases, and formally covers television broadcasts.
1988: US signed Berne Convention, an international copyright treaty. We
held out until 1988 perhaps because Congress didn't believe in some of
its requirements [?]. 1989 Berne Convention Implementation Act: brings
US into conformance with Berne convention: most famous for no longer
requiring copyright notice on works.
[Berne Convention has since become WIPO: World Intellectual Property
Organization, a U.N. subsidiary.
WIPO: one-state-one-vote + north-south divide => rules harming
interests
of poor countries were blocked. Example: pharmaceutical patents
As a result, some international IP agreements are now under the
jurisdiction of the WTO (World Trade Organization), which the
first-world nations control more tightly.
Who has jurisdiction over IP law could be HUGELY important: the third
world is generally AGAINST tight IP law, while the first world is
generally FOR it (at least governments are)
Brief comment on treaty-based law:
A judge may work harder to find a way not to overrule a treaty,
than to find a way not to overrule an ordinary law.
1996: Communications Decency Act: not really about copyright, but it
will be important to us later.
- indecency v obscenity and the Internet
- Section 230
1997: No Electronic Theft act: David LaMacchia case (above);
criminalizes noncommercial copyright infringement if the value exceeds
$1000 and the infringement was willful.
In 1994, mp3 file sharing had not yet become significant.
1998: Digital Millenium Copyright Act passes. the two best-known and/or
most-controversial provisions:
- anticircumvention prohibition: it is illegal to help someone in
any way to circumvent copy protection
- safe-harbor / takedown
2005: recording movies in a theater is now a felony.
2009: Pro IP act
This may lead to an increase in statutory damage claims, by allowing plaintiffs to claim multiple infringements.
Some Famous Copyright Cases
Wikipedia famous copyright cases:
http://en.wikipedia.org/wiki/List_of_leading_legal_cases_in_copyright_law.
1964: Irving Berlin et al. v. E.C. Publications, Inc.: "Mad Magazine
case"
Mad Magazine published "sung-to-the-tune-of" alternative lyrics for
popular songs.
District court ruled in MAD's favor on 23 of 25 songs.
2nd Federal Circuit decided in MAD's favor on all 25 songs.
Sony v Universal City Studios, 1984, discussed previously.
1985, Dowling v United States, 473 U.S. 207
Supreme Court
Paul Dowling ran a bootleg record company, as an Elvis fan.
SCOTUS agreed with his claim that what he did was not "theft"
in the sense of "interstate transportation of stolen property",
or fraud in the sense of "mail fraud". This was an important case in
establishing that copyright infringement was legally not the same as
theft (or, more specifically, that the illegal copies could not be
equated with "stolen property"). However, the distinction was rather
technical, addressing only whether a federal law on interstate
transport of stolen property could be applied.
From the Supreme Court decision, http://laws.findlaw.com/us/473/207.html
The language of 2314 [the
interstate-transportation-of-stolen property act] does not "plainly and
unmistakably" cover such
conduct. The phonorecords in question were not "stolen, converted or
taken by fraud" for purposes of 2314. The section's language clearly
contemplates a physical identity
between the items unlawfully obtained
and those eventually transported, and hence some prior physical taking
of the subject goods. Since the statutorily defined property
rights of
a copyright holder have a character
distinct from the possessory
interest of the owner of simple "goods, wares, [or] merchandise,"
interference with copyright does not
easily equate with theft,
conversion, or fraud. The infringer of a copyright does not assume
physical control over the copyright nor wholly deprive its owner of its
use. Infringement implicates a more complex set of property interests
than does run-of-the-mill theft, conversion, or fraud
It follows that interference with
copyright does not easily equate with theft, conversion,
or fraud. The Copyright Act even employs a separate term of art to
define one who misappropriates a copyright: ... 'Anyone who violates
any of the exclusive rights of the copyright owner ... is an infringer
of the
copyright.'
Dowling's criminal copyright-infringement conviction still stood.
Note that Dowling's case clearly met the first item of USC §506(a)(1),
namely
(A) for purposes of commercial advantage or private financial
gain;
This was the standard that the courts ruled did not apply in the David laMacchia case.
1991, Feist Publications v Rural Telephone Service
Supreme Court
(Feist v Rural) (1991, Justice O'Connor; decision: http://www.law.cornell.edu/copyright/cases/499_US_340.htm)
phone book is NOT copyrightable.
Paragraph 8:
This case concerns the interaction of
two well-established
propositions. The first is that facts are not copyrightable; the
other, that
compilations of facts generally are.
The decision then goes on to explain this apparent contradiction.
First, the essential prerequisite for copyrightability is that the
matter be original.
Some
compilations are original, perhaps in terms of selection criteria or
presentation. The phone book displays no such originality. There is
more starting at ¶ 22 (subsection B); Article 8 of the Constitution is
referenced in ¶ 23. The gist of O'Connor's opinion is that, yes,
copyright law does go back to the Constitution, and has to be
considered. In ¶ 26, she writes,
But some courts misunderstood the
statute. ..These courts ignored §
3 and § 4, focusing their attention instead on § 5 of the Act. Section
5, however,
was purely technical in nature....
What really matters is not how
you register your copyright, but whether your work is original.
In ¶27, O'Connor directly
addresses the Lockians among us: she explicitly refutes the "sweat of
the brow" doctrine.
Making matters worse, these courts developed a new
theory to justify the protection of factual compilations. Known alternatively
as “sweat of the brow” or “industrious collection,” the
underlying notion was that copyright was a reward for the hard work that went
into compiling facts.
Instead, O'Connor held that it was originality that mattered.
In ¶ 32: "In enacting
the Copyright Act of 1976, Congress dropped the reference to “all the
writings
of an author” and replaced it with the phrase “original works of authorship.”"
¶ 46 states exactly what Feist did [emphasis added]. You can do it too.
There is no doubt that Feist took from the white
pages of Rural's directory a substantial amount of factual
information. At a
minimum, Feist copied the names, towns, and telephone numbers of 1,309
of Rural's
subscribers. Not all copying, however, is copyright infringement. To
establish
infringement, two elements must be proven: (1) ownership of a valid
copyright,
and (2) copying of constituent elements of the work that are original.
Bottom line, ¶ 50:
The selection, coordination, and
arrangement of
Rural's white pages do not
satisfy the minimum constitutional standards for
copyright protection. As mentioned at the outset, Rural's white pages
are entirely
typical. ... In preparing its white
pages, Rural simply takes the data provided by its subscribers and
lists it
alphabetically by surname. The end product is a garden-variety white
pages directory,
devoid of even the slightest trace of creativity.
Pamela Samuelson wrote in her paper "The Generativity of Sony v Universal: The Intelectual Property Legacy of justice Stevens"
The Register of Copyrights
characterized Feist as having “‘dropped a bomb’” on U.S. copyright law
17 because it upset settled expectations of publishers of directories
and databases who had long relied on “sweat of the brow” copyright
caselaw.
1991: Basic Books, Inc. v. Kinko's Graphics Corporation
Federal
District Court, NY
Just because it's been published in a book does not mean you can use it freely in
teaching a course. This was considered relatively obvious; nobody
appealed.
1993: Campbell v Acuff-Rose Music, relating to the 2 Live Crew parody of
Roy Orbison's Prety Woman.
1999: Estate of Martin Luther King, Jr., Inc. v. CBS, Inc.
MLK's "I have a dream" speech is not in
the public domain. The legal issue was that the speech was delivered in
1963, before the 1989 Berne Convention Implementation Act; however, the
copyright was not registered until AFTER the speech. In the pre-Berne
era, publication before copyright could make copyright impossible. The
technical issue:
did giving the speech constitute "general" publication or "limited"
publication?
2000: UMG v MP3.com
Federal District Court, NY
The court implicitly rules that you
can't download copies even if you
already own a copy, but that might not have been the central
issue.
Copyright and traditional music
A quote from http://www.edu-cyberpg.com/Music/musiclaw2.html:
John and Alan Lomax,
who also devoted themselves to collecting and preserving traditional
folk music, took the controversial step of copyrighting in their own
names the songs they collected, as if they had written the songs
themselves. They even copyrighted original songs collected from other
singers, such as Leadbelly's "Good Night Irene."
The Leadbelly incident occurred under the pre-Berne rules, where
first-to-register meant something, even if you were registering the
copyright of someone else's work.
2006-07 Da Vinci Code case:
(actually filed in England, which has
different laws): authors Leigh & Baigent of the 1982 book Holy Blood, Holy Grail
lost their suit against Dan Brown. They had introduced the theory that
Mary Magdalene was the wife of Jesus and that Mary and Jesus have
living heirs. This was a major plot element used in Brown's 2003 book The Da Vinci Code. Did Dan Brown
violate copyright?
Not if it was a "factual" theory, which is what the judge ended up
ruling.
MGM v Grokster, 2005
Introduced doctrine of copyright inducement
This case left Sony SNIU
framework intact, despite MGM's arguments against it. Indeed, the
justices took pains to argue that the Grokster situation was very
different than Sony's.
See http://w2.eff.org/IP/P2P/p2p_copyright_wp.php
for a lengthy article analyzing the decision.
The decision syllabus is at http://www.law.cornell.edu/supct/html/04-480.ZS.html,
with links to Souter's opinion.
The ruling introduced doctrine of copyright inducement
Note that the District Court and the Ninth Circuit granted summary
judgement to Grokster! That is, they felt Grokster's case was very strong under the Sony doctrine.
1. Inducement
Held: One who distributes a
device with the object of promoting its use to infringe
copyright, as shown by clear expression or other affirmative
steps taken to foster infringement, going beyond mere
distribution with knowledge of third-party action, is liable
for the resulting acts of infringement by third parties using
the device, regardless of the device’s lawful uses.
Pp. 10—24.
2. Contributory infringement
Contributory infringement is similar to "aiding and abetting"
liability: one who knowingly contributes to another's infringement may
be held accountable. The Sony
precedent might have blocked this, but if
your primary goal is unlawful (as was Grokster's), you lose.
3. Vicarious liability
Vicarious liability is derived from the same legal principle that
holds an employer responsible for the actions of its employees.
Despite offsetting considerations, the
argument for imposing
indirect liability here is
powerful, given the number of
infringing downloads that occur daily using respondents’
software. When a widely shared product is used to commit
infringement, it may be impossible to enforce rights in the
protected work effectively against all direct infringers, so
that the only practical
alternative is to go against the
device’s distributor for secondary liability on a theory
of contributory or vicarious
infringement.
Unlike points 1 and 2, point 3 applies even if Grokster had not
been actively encouraging copyright infringement. Note that part of the
issue here is the practicality
(or lack thereof) of going after individual users.
"Filtering" argument: if an ISP fails to implement blocking or
filtering,
they have vicarious liability.
MGM had been hoping to get Sony v Universal overturned. In this they
failed.
Paragraphs (b) and (c) in the syllabus addresses the Sony precedent. The bottom line is
that, while the Sony SNIU doctrine remains, Grokster went further
(paragraph c):
The rule on inducement of infringement as
developed in the early cases is no different today. Evidence
of active steps taken to encourage direct infringement, such as
advertising an infringing use or instructing how to engage in
an infringing use, shows an affirmative intent that the product
be used to infringe, and overcomes the
law’s reluctance to
find liability when a defendant merely sells a commercial
product suitable for some lawful use.
Note that paragraph (d) begins: "On the
record presented, respondents’ unlawful objective is
unmistakable."
Finally, the court was unanimous in ruling that Grokster was liable for
inducement. The 5-4 split was over whether Sony needed formal modification, with the answer being
no for the time being.
What if Grokster had not
actively induced users to engage in copyright infringement? Would that
have gotten them off the hook?
Baase points out on page 218 (1st paragraph) that the DMCA has eroded
this doctrine of SNIUs-make-it-ok; under the DMCA, circumvention of
copy protection is illegal even if it
has SNIUs. But this applies only to circumvention, not other potentially infringing uses.
At the top of page 216, Baase points out that it is not just computer
technology that leads to societal debates about whether the technology
should be banned. Drugs, guns, and power tools are also in this
category.
Reverse engineering
Many reverse-engineering cases are based on
copyright, and on the Sony case in particuar.
Sega Enterprises v Accolade, Ninth Circuit, 1992:
Accolade made copies of the Sega ROM and reverse-engineered it.
Accolade won.
Sega argued that all four Fair Use factors were in their favor. The
Ninth Circuit dismissed much of this, pointing out that copies of
Sega's program were not being distributed at all, and were not even
being used for infringing game play within Accolade. The copies were made only to create new games;
Accolade's only "harm" to Sega was as competitor. The Ninth Circuit did cite the Sony
decision regarding the possibility that an entire copy might in some
cases be fair use, and that "[w]hen technological change has rendered
its literal terms ambiguous, the Copyright Act must be construed in
light of this basic purpose [to stimulate artistic creativity for the
general public good]" (in turn quoting an earlier copyright case).
Atari Games v Nintendo, 1992: another reverse-engineering case; also won
by the defendant
Sony Computer v Connectix, 2000: Connectix copied Sony BIOS and
reengineered
it so that Sony Playstation games could be played on a computer.
Bottom line: the courts have had a pretty strong history of not
allowing copyrights to interfere with reverse engineering. Note that
these cases are about pre-DMCA copyright law (the DMCA officially
acknowledges a right to reverse engineering, §1201(f)), and are also
not about license claims made
by the plaintiff (that is, that the license terms of the software forbid
reverse-engineering).
DMCA, 1999
Extends copyright to boat hulls. Who paid for that?
Section
1301.
Implements WIPO treaty
PROVIDES LEGAL SUPPORT FOR COPY PROTECTION; provides (severe) penalties
for even SPEAKING about circumvention
(eg supplying online explanations); called 'anti-circumvention measures'
See §1201(a)(1)(A), and also §1201(a)(2):
(2)
No person shall manufacture, import, offer to the
public, provide, or otherwise traffic in any technology, product,
service, device, component, or part thereof, that—
[We will return to these later under the topic "rights of computer
owners", and also "speech"]
Provides LIMITED exceptions for those doing "legitimate" encryption (not "security") research.
See Section 1201g.
Note in particular 1201(g)(2)(C) (making a good-faith effort to obtain
authorization), and 1201(g)(3): Factors in determining exemption
(especially (B)).
Mandates macrovision-brand copyprotection for VHS tape
Allows petitioning the Library of Congress to approve exceptions
to the anti-circumvention rules; in cases where these have seriously
impacted non-infringing use.
Examples: when equipment to support
the anti-circumvention measure (eg dongle, certain disk drive, certain
hardware platform) is obsolete.
Dmitry Sklyarov was arrested on July 16, 2001 after his DEFCON
presentation
related to breaking Adobe's e-book anticircumvention measures. He was
held in prison for three weeks (until August 6), and then required to
remain in the US until December 13, 2001.
His Russian employer, Elcomsoft, sold software that
allowed users to bypass Adobe's copy protection on e-books. Sklyarov
was charged for this. Adobe issued a press release stating that "the
prosecution of this individual in this particular case is not conducive
to the best interests of any of the parties involved or the industry."
On December 17, 2002, a Federal jury found Elcomsoft not guilty.
Note that at no time did the US government allege that any of
Sklyarov's or Elcomsoft's activities were carried out within the US.
This is not an uncommon situation regarding jurisdiction.
DMCA Contains OCILLA: Online Copyright Infringement Liability Limitation
Act
This act protects ISPs from claims when users put up infringing
material.
It establishes the legal framework for "takedown notices". Also for
"putback notices", but there are more stringent rules for the latter.
Who is Loyola's Takedown agent?
See the small "Copyright & Disclaimer 2009" link at the bottom of
the main luc.edu page, leading to http://luc.edu/info/copyright_disclaimer_2008.shtml,
and then to a mailto: link to "our DMCA agent".
Summary of Takedown/Putback
process
Takedown request must have
- description of infringing material
- good-faith claim that use is not legal
- sworn statement requestor is authorized to act by copyright holder
The ISP must take down material "promptly", and notify the user.
The user can respond with a putback
request, which must contain the following:
- description of material
- good-faith claim use is
legal, subject to perjury
- acknowledgement of court jurisdiction
The ISP then can put material back after 10 business days (to give
original
complainant time to file a lawsuit). If a suit is filed, the material stays
down.
If a suit is filed at that time or later, it will be filed against the
user and not the ISP.
OCILLA does NOT protect end-user in any way; in fact, it puts a
burden on the end-user.
It does protect the ISP
OCILLA also specifies rules about subpoenas to ISPs for end-user
identity; these were what the RIAA first used.
Why do you think blackboard is so popular? Hint: not because it's easy
to use.