Professional Documents
Culture Documents
V. Technological Protections
SUMMARY
The WIPO Copyright Treaty (WCT) is a special agreement under the Berne Convention that deals with the
protection of works and the rights of their authors in the digital environment.
Any Contracting Party (even if it is not bound by the Berne Convention) must comply with the substantive
provisions of the 1971 (Paris) Act of the Berne Convention for the Protection of Literary and Artistic Works
(1886).
WCT mentions TWO SUBJECT MATTERS to be protected by copyright:
o (i) Computer programs: whatever the mode or form of their expression; and
o (ii) Databases: Compilations of data or other material ("databases"), in any form, which, by reason of
the selection or arrangement of their contents, constitute intellectual creations. (Where a database
does not constitute such a creation, it is outside the scope of this Treaty.)
As to the RIGHTS GRANTED TO AUTHORS, apart from the rights recognized by the Berne Convention, the
Treaty also grants:
o (i) the right of distribution;
o (ii) the right of rental;
o (iii) a broader right of communication to the public.
The right of distribution is the right to authorize the making available to the public of the original and
copies of a work through sale or other transfer of ownership.
The right of rental is the right to authorize commercial rental to the public of the original and copies of
three kinds of works:
o (i) computer programs (except where the computer program itself is not the essential object of the
rental);
o (ii) cinematographic works (but only in cases where commercial rental has led to widespread
copying of such works, materially impairing the exclusive right of reproduction);
o (iii) works embodied in phonograms as determined in the national law of Contracting Parties (except
for countries which, since April 15, 1994, have had a system in force for equitable remuneration of
such rental).
The right of communication to the public is the right to authorize any communication to the public, by wire
or wireless means, including "the making available to the public of works in a way that the members of the
public may access the work from a place and at a time individually chosen by them". The quoted
expression covers, in particular, on-demand, interactive communication through the Internet.
As to LIMITATIONS AND EXCEPTIONS:
o Article 10 of the WCT incorporates the so-called "three-step" test to determine limitations and
exceptions, as provided for in Article 9(2) of the Berne Convention, extending its application to all
rights.
o The Agreed Statement accompanying the WCT provides that such limitations and exceptions, as
established in national law in compliance with the Berne Convention, may be extended to the
digital environment. Contracting States may devise new exceptions and limitations appropriate to
the digital environment. The extension of existing or the creation of new limitations and exceptions is
allowed if the conditions of the "three-step" test are met.
As to DURATION, the term of protection must be at least 50 years for any kind of work.
The enjoyment and exercise of the rights provided for in the Treaty cannot be subject to any formality.
The Treaty obliges Contracting Parties to provide legal remedies against the circumvention of
technological measures (e.g., encryption) used by authors in connection with the exercise of their rights,
and against the removal or altering of information, such as certain data that identify works or their authors,
necessary for the management (e.g., licensing, collecting and distribution of royalties) of their rights ("rights
management information").
The Treaty obliges each Contracting Party to adopt, in accordance with its legal system, the measures
necessary to ensure the application of the Treaty. In particular, each Contracting Party must ensure that
enforcement procedures are available under its law so as to permit effective action against any act of
infringement of rights covered by the Treaty. Such action must include expeditious remedies to prevent
infringement as well as remedies that constitute a deterrent to further infringement.
The Treaty establishes an Assembly of the Contracting Parties whose main task is to address matters
concerning the maintenance and development of the Treaty. It entrusts to the Secretariat of WIPO the
administrative tasks concerning the Treaty.
The Treaty was concluded in 1996 and entered into force in 2002.
The Treaty is open to States members of WIPO and to the European Community. The Assembly constituted
by the Treaty may decide to admit other intergovernmental organizations to become party to the Treaty.
Instruments of ratification or accession must be deposited with the Director General of WIPO.
The WIPO Performances and Phonograms Treaty (WPPT) deals with the rights of two kinds of
beneficiaries, particularly in the digital environment:
o (i) performers (actors, singers, musicians, etc.); and
o (ii) producers of phonograms (persons or legal entities that take the initiative and have the
responsibility for the fixation of sounds).
o These rights are addressed in the same instrument, because most of the rights granted by the Treaty
to performers are rights connected to their fixed, purely aural performances (which are the subject
matter of phonograms).
As far as performers are concerned, the Treaty grants performers economic rights in their
performances fixed in phonograms (not in audiovisual fixations, such as motion pictures):
o (i) the right of reproduction;
o (ii) the right of distribution;
o (iii) the right of rental;
o (iv) the right of making available.
The right of reproduction is the right to authorize direct or indirect reproduction of the phonogram in any
manner or form.
The right of distribution is the right to authorize the making available to the public of the original and copies
of the phonogram through sale or other transfer of ownership.
The right of rental is the right to authorize the commercial rental to the public of the original and copies of the
phonogram, as determined in the national law of the Contracting Parties (except for countries that, since
April 15, 1994, have had a system in force for equitable remuneration of such rental).
The right of making available is the right to authorize the making available to the public, by wire or wireless
means, of any performance fixed in a phonogram, in such a way that members of the public may access
the fixed performance from a place and at a time individually chosen by them. This right covers, in
particular, on-demand, interactive making available through the Internet.
As to unfixed (live) performances, the Treaty grants performers:
o (i) the right of broadcasting (except in the case of rebroadcasting);
o (ii) the right of communication to the public (except where the performance is a broadcast
performance); and
o (iii) the right of fixation.
The Treaty also grants performers moral rights, that is, the right to claim to be identified as the performer and
the right to object to any distortion, mutilation or other modification that would be prejudicial to the performer's
reputation.
PRODUCERS
As far as producers of phonograms are concerned, the Treaty grants them economic rights in their
phonograms:
o (i) the right of reproduction;
o (ii) the right of distribution;
o (iii) the right of rental; and
o (iv) the right of making available.
The right of reproduction is the right to authorize direct or indirect reproduction of the phonogram in any
manner or form.
The right of distribution is the right to authorize the making available to the public of the original and copies
of the phonogram through sale or other transfer of ownership.
The right of rental is the right to authorize the commercial rental to the public of the original and copies of the
phonogram, as determined in the national law of the Contracting Parties (except for countries that, since
April 15, 1994, have a system in force for equitable remuneration of such rental).
The right of making available is the right to authorize making available to the public, by wire or wireless
means, a phonogram in such a way that members of the public may access the phonogram from a place
and at a time individually chosen by them. This right covers, in particular, on-demand, interactive making
available through the Internet.
The Treaty provides that performers and producers of phonograms have the right to a single equitable
remuneration for the direct or indirect use of phonograms, published for commercial purposes, broadcasting
or communication to the public.
o However, any Contracting Party may restrict or – provided that it makes a reservation to the Treaty –
deny this right. In the case and to the extent of a reservation by a Contracting Party, the other
Contracting Parties are permitted to deny, vis-à-vis the reserving Contracting Party, national
treatment ("reciprocity")
LIMITATIONS AND EXCEPTIONS, Article 16 of the WPPT incorporates the so-called "threestep" test to
determine limitations and exceptions, as provided for in Article 9(2) of the Berne Convention, extending its
application to all rights. The accompanying Agreed Statement provides that such limitations and exceptions,
as established in national law in compliance with the Berne Convention, may be extended to the digital
environment. Contracting States may devise new exceptions and limitations appropriate to the digital
environment. The extension of existing or the creation of new limitations and exceptions is allowed if the
conditions of the "three-step" test are met.
The term of protection must be at least 50 years.
The enjoyment and exercise of the rights provided for in the Treaty cannot be subject to any formality.
The Treaty obliges Contracting Parties to provide for legal remedies against the circumvention of
technological measures (e.g., encryption) used by performers or phonogram producers in connection with the
exercise of their rights, and against the removal or altering of information – such as the indication of certain
data that identify the performer, performance, producer of the phonogram and the phonogram itself –
necessary for the management (e.g., licensing, collecting and distribution of royalties) of the said rights
("rights management information").
The Treaty obliges each Contracting Party to adopt, in accordance with its legal system, the measures
necessary to ensure the application of the Treaty. In particular, each Contracting Party must ensure that
enforcement procedures are available under its law so as to permit effective action against any act of
infringement of rights covered by the Treaty. Such action must include expeditious remedies to prevent
infringement as well as remedies that constitute a deterrent to further infringement.
The Treaty establishes an Assembly of the Contracting Parties whose main task is to address matters
concerning the maintenance and development of the Treaty. It entrusts to the Secretariat of WIPO the
administrative tasks concerning the Treaty.
The Treaty was concluded in 1996 and entered into force in 2002.
The Treaty is open to States members of WIPO and to the European Community. The Assembly constituted
by the Treaty may decide to admit other intergovernmental organizations to become party to the Treaty.
Instruments of ratification or accession must be deposited with the Director General of WIPO.
171.12. 'TECHNOLOGICAL MEASURE' means any technology, device or component that, in the normal
course of its operation, restricts acts in respect of a work, performance or sound recording, which are
not authorized by the authors, performers or producers of sound recordings concerned or permitted by law;
171.13. 'RIGHTS MANAGEMENT INFORMATION' means information which identifies the work, sound
recording or performance; the author of the work, producer of the sound recording or performer of
the performance; the owner of any right in the work, sound recording or performance; or information
about the terms and conditions of the use of the work, sound recording or performance; and any
number or code that represent such information, when any of these items is attached to a copy of
the work, sound recording or fixation of performance or appears in conjunction with the communication
to the public of a work, sound recording or performance.
SECTION 6. The Organizational Structure of the IPO. RA 10172 – Intellectual Property Code
6.1. The Office shall be headed by a Director General who shall be assisted by two (2) Deputies Director
General.
6.2. The Office shall be divided into seven (7) Bureaus, each of which shall be headed by a Director and
assisted by an Assistant Director. These Bureaus are:
6.3. The Director General, Deputies Director General, Directors and Assistant Directors shall be
appointed by the President, and the other officers and employees of the Office by the Secretary of Trade
and Industry, conformably with and under the Civil Service Law. (n)
Universal City Studios, Inc. v. Reimerdes, 111 F. Sugpp. 2d 294 (S.D.N.Y. 2000)
The movie studios claimed that all three defendants, by making available DeCSS, were 'trafficking in circumvention
devices', an illegal act under the DMCA. The studios sought injunctive relief in the form of a court order preventing
the defendants from further publicizing or disseminating the DeCSS program, as well as damages.
● A defendant's company (Eric Corley's), 2600 Enterprises, Inc., publishes a magazine entitled, 2600: The
Hacker Quarterly. 2600: The Hacker Quarterly is considered a "bible" to the hacker community.
○ The name of the magazine commemorates hackers, who in the 1960's successfully found a way to
explore "un-accessible" areas of the telephone system."
● This ability was accomplished by using a 2600-hertz tone over a long distance trunk connection to gain
access to "operator mode."' The website is a companion to the defendant's magazine and is primarily
managed by Mr. Corley. The website has been in existence since 1995.
● Beginning in November of 1999, the source and object code for DeCSS was posted on the 2600.com
website.
● Additionally, the website provided links to other sites that supposedly "mirrored" or offered DeCSS for
download. The Links to the "mirror" sites took three* forms:
○ (1) A link was provided to a website. The linked website would then, itself, contain a link from which
DeCSS could be downloaded. These pages might or might not contain other information than the link
to DeCSS.99
○ (2) The link from 2600.com's website would bring the web user to a website that provided links to
other pages which purportedly contained links to DeCSS.'
○ (3) By following the link, the download of DeCSS began immediately, albeit from a website other than
the defendant's.'
● Plaintiffs, eight major United States motion picture studios, distribute many of their copyrighted motion
pictures for home use on digital versatile disks ("DVDs"), which contain copies of the motion pictures in digital
form.
○ They protect those motion pictures from copying by using an encryption system called CSS.
○ CSS-protected motion pictures on DVDs may be viewed only on players and computer drives
equipped with licensed technology that permits the devices to decrypt and play--but not to copy--the
films.
● Late last year (1999), computer hackers (most prominently, a Norwegian teenager named Jon Johanson and
Eric Corley, publisher of 2600: The Hacker Quarterly magazine) devised a computer program called DeCSS
that circumvents the CSS protection system and allows CSS-protected motion pictures to be copied
and played on devices that lack the licensed decryption technology.
● Defendants quickly posted DeCSS on their Internet web site, thus making it readily available to much of the
world.
● Plaintiffs promptly brought this action under the Digital Millennium Copyright Act (the "DMCA") to enjoin
defendants from posting DeCSS and to prevent them from electronically "linking" their site to others that
post DeCSS.
○ Defendants responded with what they termed "electronic civil disobedience" --increasing their efforts
to link their web site to a large number of others that continue to make DeCSS available.
● Defendants contend that their actions do not violate the DMCA and, in any case, that the DMCA, as applied to
computer programs, or code, violates the First Amendment.
○ This is the Court's decision after trial, and the decision may be summarized in a nutshell.
● Defendants argue first that the DMCA should not be construed to reach their conduct, principally because the
DMCA, so applied, could prevent those who wish to gain access to technologically protected copyrighted
works in order to make fair--that is, non-infringing--use of them from doing so.
○ They argue that those who would make fair use of technologically protected copyrighted works need
means, such as DeCSS, of circumventing access control measures not for piracy, but to make
lawful use of those works.
ISSUES:
1) Whether the defendants violated the Anti-Trafficking Provision of the DMCA? - YES;
2) Whether the defendants' conduct fell into one of the exceptions afforded under the Act? - NO;
3) Whether linking to other sites that contain the DeCSS code is prohibited by the DMCA;? - YES;
4) Whether the DeCSScode is protected speech for First Amendment purposes? - NOT FULLY PROTECTED
● The question whether the development of a Linux DVD player motivated those who wrote DeCSS is
immaterial to the question whether the defendants now before the Court violated the anti-trafficking provision
of the DMCA.
● The inescapable facts are that
○ (1) CSS is a technological means that effectively controls access to plaintiffs' copyrighted works,
○ (2) the one and only function of DeCSS is to circumvent CSS, and
○ (3) defendants offered and provided DeCSS by posting it on their website.
● Whether defendants did so to infringe, or to permit or encourage others to infringe, copyrighted works in
violation of other provisions of the Copyright Act simply does not matter for purposes of 1201 (a)(2).
● The offering or provision of the program is the prohibited conduct- and it is prohibited irrespective of why the
program was written, except to whatever extent motive may be germane to determining whether their conduct
falls within one of the statutory exceptions.
● The exceptions claimed by the defendants, according to the DMCA, were (1) reverse engineering; (2)
encryption research; (3) security testing; and, (4) fair use.
○ Reverse engineering (one may circumvent, or develop and employ technological means to
circumvent access- control measures in order to achieve interoperability with another computer
program provided that doing so does not infringe another's copyright.)- even if defendants had done
the reverse engineering themselves, they could only post DeCSS for the sole purpose of providing
interoperability and the defendants in this case did not post DeCSS solely for interoperability
purposes.' Therefore, the Court concluded that this exception would not apply to the defendants'
case.'
○ Encryption research - no evidence to suggest that the defendants made any good faith effort to
obtain permission from the copyright owners, and furthermore, defendants were not engaged in
encryption research.
○ Security testing - The Court found that nothing in the record of Reimerdes indicated DeCSS had
anything to do with testing computers, computer systems, or computer networks.
○ Fair use - The Court acknowledged that certain uses deemed fair would still violate the DMCA.
The Court worked its way around the conflict between the DMCA and the fair use doctrine by holding
fast to the fact that defendants were not charged with copyright violation.
■ Rather the Court held that defendants were charged with circumventing a technological
measure that controlled access to copyrighted works in violation of the DMCA.
■ Had Congress wanted fair use to apply to situations like the one before us, the Court noted,
Congress would have said so.
● The Court concluded that links to sites where the DeCSS downloading is automatically begun once the
user clicks on the link is trafficking.
● Also, links to sites that provide only the DeCSS code or simply provide another link to the code is
trafficking.'
● The last type of linking, where the page linked to contain a "good deal" of content other than DeCSS, the
Court posited is more troublesome.'
● However, the Court held, regardless of the potential problems with banning links to these types of pages, that
defendants' conduct involved the active solicitation of others to post the code and by doing so they offered or
otherwise trafficked in the DeCSS code.
● The court held that all computer code - whether source code or object code -is a means of expressing ideas,
and the First Amendment must be brought into play before code may be prohibited or restricted.' However,
determining the level of scrutiny to be applied to statutes or regulations that prohibit or restrict computer code
is the question of most importance, the Court noted.
● The Court stated that simply because "words, symbols and even actions convey ideas and evoke
emotions does not inevitably place them beyond the power of government."'
● Two categories of restrictions on speech have been developed by the Supreme Court:
○ (1) content-based restrictions (restrictions based on the message,ideas, or subject matter of the
contents), and
○ (2) content-neutral restrictions(restrictions not motivated by a desire to limit the message)
● The restriction on speech is subject to a legal standard depending upon the type of restriction (either
content-based or content-neutral).
● Restrictions on non-speech elements of expressive conduct, the Court claimed, should receive a content-
neutral analysis.
● In upholding a regulation of non-speech elements or content-neutral restrictions,
○ the restriction must serve an important governmental interest
○ and restrict First Amendment principles no more than necessary.
● The court determined that DeCSS has a sufficiently high level of functional, non-speech elements
inherent in it (as do all computer programs) to deserve only a content-neutral analysis under the First
Amendment doctrine.
● The Court asserted that in passing the test employed for content-neutral or non-speech elements, the DMCA
was a law passed to further an important governmental interest - that of suppressing copyright piracy
and to promote the availability of copyrighted works in digital form, not of suppressing the expressive
content that may be inherent in DeCSS and code similar to it.
● The court concluded that the DMCA as applied to posting and linking here did not contravene U.S.
Const. amend.
● Plaintiffs have established by clear and convincing evidence that these defendants linked to sites posting
DeCSS, knowing that it was a circumvention device.
● Indeed, they initially touted it as a way to get free movies, and they later maintained the links to promote the
dissemination of the program in an effort to defeat effective judicial relief. They now know that
dissemination of DeCSS violates the DMCA.
● An anti-linking injunction on these facts does no violence to the First Amendment.
○ Nor should it chill the activities of web site operators dealing with different materials, as they
may be held liable only on a compelling showing of deliberate evasion of the statute.
● Thus, plaintiffs were entitled to appropriate injunctive and declaratory relief.
Chamberlain Group, Inc. v. Skylink Tech, Inc., 381 F.3d 1178 (Fed. Cir. 2004), cert. denied, 125 S.Ct. 1669
(2005)
● Chamberlain sued Skylink on the ground that the latter is violating the DMCA, specifically the anti-trafficking
provision of 1201 (1)(a)(2).
● Section 1201. Circumvention of copyright protection system
○ (a) Violations regarding circumvention of technological measures
○ (1)(a) No person shall circumvent a tech measure that controls access to a work protected under the
title
○ (2) No person shall manufacture, import, offer to the public, provide or traffic in any technology
product, service, device , component or part that:
■ (A) primarily designed or produced for the purpose of circumventing a tech measure that
controls access to a work protected under this title
■ (B) has only limited commercially significant purpose or use other than to circumvent a tech
measure that controls access to a work
■ (C ) Marketed by that person or another acting in concert with that person with that person’s
knowledge for use in circumventing a tech measure
■ CIRCUMVENT A TECH MEASURE – means to descramble a scrambled work, decrypt an
encrypted work or to avoid, bypass, remove, deactivate, or impair a technological measure
without authority of the copyright owner.
■ a technological measure "effectively controls access to a work" if the measure, in the ordinary
course of its operation, requires the application of information, or a process or a treatment,
with the authority of the copyright owner, to gain access to the work.
● Garage Door Openers
○ Hand-held portable transmitter and a garage opening device mounted in a homeowner’s garage.
○ The opening device has a receiver with a signal-processing software and a motor to close or open the
garage door.
○ A user must activate the transmitter, send a radio frequency to signal to the receiver located on the
opening device.
● Skylink and Chamberlain are distributors of universal transmitters.(Model 39 and Security +line )
● Chamberlain alleges that Skylink’s transmitters renders their transmitter, Security+, insecure by allowing
unauthorized users to circumvent the security inherent in rolling codes.
○ Rolling codes is a copyrighted computer program of Chamberlain that constantly changes the
transmitter signal needed to open the garage door.
● A homeowner who purchases a Chamberlain GDO owns it and has a right to use it to access his or her own
garage. At the time of sale, Chamberlain does not place any explicit terms or condition on use to limit the
ways that a purchaser may use its products. A homeowner who wishes to use a Model 39 must first program it
into the GDO. Skylink characterizes this action as the homeowner's authorization of the Model 39 to
interoperate with the GDO. In other words, according to Skylink, Chamberlain GDO consumers who purchase
a Skylink transmitter have Chamberlain's implicit permission to purchase and to use any brand of transmitter
that will open their GDO. The District Court agreed that Chamberlain's unconditioned sale implied
authorization.
● In short, the District Court concluded that because Chamberlain never restricted its customers' use of
competing transmitters with its Security+ line, those customers had implicit authorization to use Skylink's
Model 39. Because of that implicit authorization, Chamberlain could not possibly meet its burden of proving
that Skylink trafficked in a device designed to circumvent a technological measure to gain unauthorized
access to Chamberlain's copyrighted computer programs.
In sum, Chamberlain argues that "Skylink violates the prima facie requirement of anti-trafficking § 1201(a)(2)."
o Chamberlain has not alleged that Skylink's Model 39 infringes its copyrights, nor has it alleged that
the Model 39 contributes to third-party infringement of its copyrights. Chamberlain's allegation is
considerably more straightforward: The only way for the Model 39 to interoperate with a Security+
GDO is by "accessing" copyrighted software. Skylink has therefore committed a per se violation of the
DMCA.
Chamberlain, however, has failed to show not only the requisite lack of authorization, but also the necessary
fifth element of its claim, the critical nexus between access and protection. Chamberlain neither alleged
copyright infringement nor explained how the access provided by the Model 39 transmitter facilitates the
infringement of any right that the Copyright Act protects. There can therefore be no reasonable relationship
between the access that homeowners gain to Chamberlain's copyrighted software when using Skylink's Model
39 transmitter and the protections that the Copyright Act grants to Chamberlain.
The Copyright Act authorized Chamberlain's customers to use the copy of Chamberlain's copyrighted
software embedded in the GDOs that they purchased. Chamberlain's customers are therefore immune from §
1201(a)(1) circumvention liability. In the absence of allegations of either copyright infringement or § 1201(a)(1)
circumvention, Skylink cannot be liable for § 1201(a)(2) trafficking. The District Court's grant of summary
judgment in Skylink's favor was correct. Chamberlain failed to allege a claim under 17 U.S.C. § 1201.
The DMCA does not create a new property right for copyright owners. Nor, for that matter, does it divest the
public of the property rights that the Copyright Act has long granted to the public. The anticircumvention and
anti-trafficking provisions of the DMCA create new grounds of liability. A copyright owner seeking to impose
liability on an accused circumventor must demonstrate a reasonable relationship between the circumvention
at issue and a use relating to a property right for which the Copyright Act permits the copyright owner to
withhold authorization—as well as notice that authorization was withheld. A copyright owner seeking to
impose liability on an accused trafficker must demonstrate that the trafficker's device enables either copyright
infringement or a prohibited circumvention. Here, the District Court correctly ruled that Chamberlain pled no
connection between unauthorized use of its copyrighted software and Skylink's accused transmitter. This
connection is critical to sustaining a cause of action under the DMCA.
Lexmark International, Inc. v. Static Control Components, Inc., 387 F.3d 522 (6th Cir. 2005)
FACTS:
● Lexmark sold discount toner cartridges for its printers that only Lexmark could re-fill because it had a
microchip that was designed to prevent it from functioning from other toner catrdiges that Lexmar did not refill.
○ Static Control Component (SCC) mimicked Lexmark’s computer chip and sold it to companies.
o SCC copied their microchip in violation of the federal copyright statute. By copying the chip, it violated
the DMCA by circumventing a technological measure designed to control access to the Printer
Engine Program.
The general copyright statute, 17 U.S.C. § 101: grants copyright protection to "original works
of authorship fixed in any tangible medium of expression," but does not "extend to any idea,
procedure, process, system, method of operation, concept, principle, or discovery,"
The Digital Millennium Copyright Act (DMCA), 17 U.S.C. § 1201: proscribes the sale of
products that may be used to "circumvent a technological measure that effectively controls
access to a work" protected by the copyright statute.
The use of the Toner Loading Program was indeed a likely copyright violation, because the Toner Loading
Program was not a "lock-out code" that SCC was entitled to copy under the DMCA, and because the
Toner Loading Program could be rewritten in different ways (and therefore had enough creativity to qualify
for copyright protection).
The Copyright Office's decision to grant copyright registration to the two programs showed that the
programs were probably copyrightable.
o because of the complexity of the authentication system, SCC could not have known that it could
bypass the authentication without using Lexmark's copyrighted program; but it held that this did not
matter because "Innocent infringement, however, is still infringement."
Fair use did not apply.
On the DMCA claims, the court found that the SCC microchip circumvented Lexmark's authentication
sequence, and that the reverse engineering exception to the DMCA did not apply, because it only
covers the independent creation of new programs that must interoperate with existing ones, and SCC
did not create any new program.
In his opinion, the critical question is the purpose of the circumvention technology. Because the purpose of the law
is to prohibit piracy of copyright protected works such as movies, music, and computer programs,
an anticircumvention claim should not be permitted to go forward unless the plaintiff can demonstrate that
the circumvention supports piracy. A broad reading of the statute is necessary, he argues, to prevent manufacturers
from creating monopolies for durable goods such as replacement parts through the use of more elaborate
lock-out codes. And the burden of proof to demonstrate piracy must be on the plaintiff in order to prevent the threat
of litigation by powerful manufacturers against smaller rivals and thereby thwart development of devices that facilitate
legitimate access to consumer goods. Only then should the burden of proof shift to the defendant to invoke a statutory
exception, such as the reverse engineering exception.
IQ Group, Ltd. v. Wiesner Publishing, LLC, 409 F. Supp. 2d 587 (D.N.J. 2006)
FACTS:
IQ, an online advertising firm, distributed ads for two insurance companies: National Senior Associate
Company (‘‘NSAC’’) and Capital Care, Inc.
IQ included in the ads its own logo and a hyperlink to copyright information on its own web site
Both NSAC and Capital Care subsequently hired Wiesner to distribute ads for them.
o Wiesner distributed the same ads that IQ had formerly distributed, but it removed the IQ logo and
the hyperlink to IQ’s web site.
IQ registered copyright in the ads and then sued Wiesner, NSAC, and Capital Care, alleging copyright
infringement
o The logo falls within ‘‘copyright management information’’ as defined in the DMCA in some of its 8
categories:
category 2 (‘‘[t]he name of, and other identifying information about, the author of a work’’),
category 3 (‘‘[t]he name of, and other identifying information about, the copyright owner
of the work’’)
category 7 (‘‘[i]dentifying numbers or symbols referring to such information or links to
such information’’).
IQ contends as well that the hyperlink falls within categories 3 and 7, and that the hyperlink points to a
website containing information falling within category 6 (‘‘[t]erms and conditions for use of the work’’)
ISSUE: Whether the information removed by Wiesner from the NSAC and Capital Care ads functioned as a
component of an automated copyright protection or management system? NO
IQ asks this Court to construe the DMCA so as to allow a logo, functioning as a service mark, to come within
the definition of copyright management information which, by operation of the DMCA, would act to protect the
copyright of its owner logo in an email, to the extent that it operates as a trademark or service mark, could
communicate information that indicates the source of the email. a symbol that refers to identifying information,
so a very broad interpretation of §1202(c) might conceivably include a logo
o The problem is that this construction allows a trademark to invoke DMCA protection of
copyrights
The Supreme Court cautioned against blurring the boundaries between trademark law and copyright law:
would create a species of mutant copyright law.’
The text of §1202 appears to define ‘‘copyright management information’’ quite broadly, to the point that
the section, read literally, applies wherever any author has affixed anything that might refer to his or her name
o The DMCA directly protects not the copy- rights, but the technological measures that protect the
copyrights.
o WIPO protected CMI as part of ‘‘a double protection for technical measures.’
In the framework of the WIPO treaties, technical measures such as CMI are components of automated
copyright protection systems: ‘‘As digital identification systems and other technologies that enable the marking
and protection of works have started to develop, right holders have feared that these technological tools might
themselves be cracked by other technologies or machines, or that they might be easily modified or removed.’’
Id. The WIPO treaties, and hence the DMCA, protect CMI so as to protect the technological measures of
copyright protection themselves
Congress intended the DMCA to apply to “electronic commerce” and the “electronic marketplace” and to
“digital networks”
Known as the ‘‘White Paper,’’ the Report [of the IITF’s Working Group on Intellectual Property Rights]
presented a draft of §§1201and 1202 of the DMCA
o The White Paper demonstrates that the Working Group on Intellectual Property Rights, in drafting
§1202, understood this section to protect the integrity of automated copyright management
systems functioning within a computer network environment
To come within § 1202, the information removed must function as a component of an automated
copyright protection or management system.
IQ has not alleged that the logo or the hyperlink were intended to serve such a function. Rather, to the extent
that they functioned to protect copyright at all, they functioned to inform people who would make copyright
management decisions.
No evidence that IQ intended that an automated system would use the logo or hyperlink to manage
copyrights, nor that the logo or hyperlink performed such a function, nor that Wiesner's actions otherwise
impeded or circumvented the effective functioning of an automated copyright protection system.
Because the IQ logo removed by Wiesner did not function as a component of an automated copyright
protection or management system, it does not fall within the definition of “copyright management information”
in 17 U.S.C. § 1202(c).
With regard to the IQ logo in the NSAC and Capital Care ads, Wiesner has not violated any part of 17 U.S.C.
§ 1202.
Because the hyperlink removed by Wiesner did not function as a component of an automated
copyright protection or management system, it does not fall within the definition of “copyright
management information” in 17 U.S.C. § 1202(c).
With regard to the hyperlink in the NSAC and Capital Care ads, Wiesner has not violated any part of 17
U.S.C. § 1202.
Recit Ready:
Leslie Kelly, a professional photographer, alleged that Arriba Soft Corp.’s (Arriba) search engine infringed Kelly’s
photographs. Arriba operated a visual search engine that “crawled” the internet searching for images that it copied
and then generated as smaller, lower-resolution “thumbnail” copies for display on a search results page.
Did Arriba's reproduction and display of Kelly's works constitute fair use under § 107 of the Copyright Act?
YES
The court ruled that although Arriba made exact replications of Kelly's images, the thumbnails were much
smaller, lower-resolution images that served an entirely different function than the original images. Kelly's images
served an aesthetic purpose while Arriba's thumbnails were unrelated to any aesthetic purpose and were designed as
a tool to help index and improve access to images on the internet. Users were unlikely to enlarge the thumbnails
and use them for artistic purposes because the thumbnails were of much lower-resolution than the originals, making
them inappropriate as display material. Thus, Arriba's use was transformative. Further, given the thumbnails' lack
of artistic purpose, their use did not stifle creativity. The appellate court determined that two of the four factors
under § 107 weighed in favor of Arriba, which was sufficient for a finding of fair use.
FACTS:
1. Leslie Kelly, is a professional photographer who has copyrighted many of his images of the American West.
Some of these images are located on Kelly's web site or other web sites with which Kelly has a license
agreement.
2. Arriba Soft Corp., operates an internet search engine that displays its results in the form of small pictures
rather than the more usual form of text. Arriba obtained its database of pictures by copying images from
other web sites. By clicking on one of these small pictures, called “thumbnails,” the user can then view a large
version of that same picture within the context of the Arriba web page.
3. When Kelly discovered that his photographs were part of Arriba's search engine database, he brought a
claim against Arriba for copyright infringement.
4. The district court found that Kelly had established a prima facie case of copyright infringement based on Arriba's
unauthorized reproduction and display of Kelly's works, but that this reproduction and display constituted a
non-infringing “fair use” under Section 107 of the Copyright Act.
- The search engine at issue in this case is unconventional in that it displays the results of a user's query as
“thumbnail” images. When a user wants to search the internet for information on a certain topic, he or she
types a search term into a search engine, which then produces a list of web sites that contain information
relating to the search term. Normally, the list of results is in text format. The Arriba search engine, however,
produces its list of results as small pictures.
- To provide this service, Arriba developed a computer program that “crawls” the web looking for images to
index. This crawler downloads full-sized copies of the images onto Arriba's server. The program then uses
these copies to generate smaller, lower-resolution thumbnails of the images. Once the thumbnails are
created, the program deletes the full-sized originals from the server. Although a user could copy these
thumbnails to his computer or disk, he cannot increase the resolution of the thumbnail; any enlargement
would result in a loss of clarity of the image.
- The second component of the Arriba program occurs when the user double-clicks on the thumbnail. From
January 1999 to June 1999, clicking on the thumbnail produced the “Images Attributes” page. This page
used in-line linking to display the original full-sized image, surrounded by text describing the size of the
image, a link to the original web site, the Arriba banner, and Arriba advertising.
ISSUE: Did Arriba's reproduction and display of Kelly's works constitute fair use under § 107 of the Copyright
Act? YES
DISPOSITION: We hold that Arriba's reproduction of Kelly's images for use as thumbnails in Arriba's search
engine is a fair use under the Copyright Act. However, we hold that the district court should not have reached
whether Arriba's display of Kelly's full-sized images is a fair use because the parties never moved for summary
judgment on this claim and Arriba never conceded the prima facie case as to the full-size images. The district court's
opinion is affirmed as to the thumbnails and reversed as to the display of the full-sized images. We remand
for further proceedings consistent with this opinion. Each party shall bear its own costs and fees on appeal.