TUTORIAL ON INTELLECTUAL PROPERTY LAW Pamela Samuelson & David Post Computers Freedom & Privacy April 4, 2000 1 OVERVIEW • Samuelson will do: – Overview on intellectual property & its purposes – Basics of copyright, emphasizing digital copyright issues – Basics of trade secrecy and DeCSS case • Post will do: – Trademark & domain name disputes – Patents for software & business methods 2 WHAT IS “IP”? • Intangible rights in commercially valuable information permitting owner to control market for products embodying the information • Copyrights for artistic & literary works • Patents for technological inventions • Trade secrets for commercially valuable secrets (e.g., source code, Coke formula) • Trademarks (e.g., Coke) to protect consumers against confusion 3 ELEMENTS OF IP LAW • Subject matter to be protected • Qualifications for protection – Who can claim – Procedure for claiming – Substantive criteria • • • • Set of exclusive rights Limitations on exclusive rights Infringement standard Set of remedies 4 DIFFERENT THEORIES • Utilitarian: grant rights to create incentives for beneficial investments • Natural rights: persons have natural rights in their creations if valuable • Personality-based: my creation is an extension of myself • Unjust enrichment: appropriating someone else’s work may be unfair 5 ELEMENTS OF COPYRIGHT • Subject matter: works of authorship (e.g., literary works, musical works, pictorial works; NB: software is a “literary work”) • Qualifications: – Who: the author (but in US, work for hire rule) – Procedure: rights attach automatically (but US authors must register to sue; remedies depend on regis.) – Criteria: “originality” (some creativity); in US, works must also be “fixed” in some tangible medium 6 COPYRIGHT ELEMENTS (2) • Set of exclusive rights (right to exclude others) – – – – to reproduce work in copies, to prepare derivative works, to distribute copies to the public, to publicly perform or display the work, or communicate it to the public – “moral rights” of integrity & attribution (US visual art) – some rights to control acts of those who facilitate or contribute to others’ infringement (e.g., ISPs, agents) 7 COPYRIGHT ELEMENTS (3) • Limitations on exclusive rights: – – – – – – Fair use (e.g., Sony Betamax, Acuff-Rose) in US Fair dealing in UK and Canada First sale (e.g., libraries, bookstores) Library-archival copying (e.g., ILL, course reserves) Classroom performances Special inter-industry compulsory licenses (e.g., cablenetwork TV) – Other (e.g., playing radio in fast food joint) 8 COPYRIGHT ELEMENTS (4) • Limitations on exclusive rights: duration – Berne standard: life + 50 years – EU & US: life + 70 years; 95 yrs from publication • Infringement standard: violating exclusive right (often copying of “expression” from protected work based on substantial similarity) • Remedies: injunctions, lost profits, infringers’ profits, “statutory damages,” costs, & sometimes attorney fees 9 “UNCOPYRIGHTABLE” STUFF • • • • • • • Ledger sheets and blank forms Rules and recipes (“merger”) White pages listings of telephone directories Facts and theories Ideas and principles Methods of operation/processes Bicycles and bicycle racks (too functional) 10 COMPILATIONS AND DERIVATIVE WORKS • Creativity in selection and arrangement of data or other elements = protectable compilation • Original expression added to preexisting work = protectable d/w (e.g., novel based on movie) • Compilation or derivative work copyright doesn’t extend to preexisting material (e.g., data or public domain play) • Use of infringing materials may invalidate copyright in compilation or derivative work 11 INTERNATIONAL TREATIES • Berne Convention for Protection of Literary & Artistic Works • Basic rule: “national treatment” (treat foreign nationals no worse than do own) • Berne has some minimum standards (duration, exclusive rights, no formalities) • WIPO administers treaties, hosts meetings to update, revise, or adopt new treaties 12 INTERNATIONAL TREATIES (2) • TRIPS (Trade-Related Aspects of Intellectual Property Rights) Agreement • Sets minimum standards for seven classes of IPR, including copyright, that binds WTO members • Must have substantively adequate laws, as well as adequate remedies and procedures and must enforce effectively • Dispute resolution process now available (e.g., EU challenge to US music licensing exception) 13 DIGITAL COMPLICATIONS • Digitized photographs of public domain works (e.g., Microsoft claims ownership in some) • Very easy to reselect and rearrange the data in databases; uncreative databases may be very valuable; EU has created a new form of IP right in contents of databases to deal with this • New ways to appropriate information (e.g., NBA sued Motorola for “stealing” data from NBA games for sports pager device) • Digital environment lacks geographic boundaries 14 DIGITAL COMPLICATIONS (2) • Can’t access or use digital information without making copies • Very cheap and easy to make multiple copies and disseminate via networks • Very easy to digitally manipulate w/o detection • People expect digital information to be free or nearly so • Many people think that private copying doesn’t infringe copyright; much of industry disagrees 15 DIGITAL COPYRIGHT CONTROVERSIES • • • • • • • Linking, framing, & filtering iCraveTV case Cyberpatrol case RIAA v. Diamond (Rio player case) UMG Recordings v. MP3.com Napster case DeCSS cases 16 US WHITE PAPER ON IP & THE NII (1995) • Full potential of NII won’t be realized unless IP/copyright owners are adequately protected • Many are withholding works from the ‘net because of threat of piracy • Copyright can be adapted to digital environment, need a few changes 17 WHITE PAPER POSITIONS • Authors have right to control temporary copies in RAM (reading or browsing as infringement?) • Fair use should recede (if work can be licensed, it must be licensed) • No more first sale/sharing rights (first sale only permits redistributing same copy, not making new ones) • ISPs should be held strictly liable for user infringements 18 WHITE PAPER POSITIONS • Need for new rules to make it illegal to remove or alter copyright management information (CMI) • Need to outlaw technologies useful for bypassing technical protection systems • Get international treaty to universalize these new norms 19 WIPO COPYRIGHT TREATY (1996) • Reproduction right applies to digital works (but no agreement on temporary copies) • Exclusive right to communicate digital works to the public by interactive service • Fair use and other exceptions can apply as appropriate; new exceptions OK • Merely providing facilities for communication not basis for liability 20 WIPO TREATY (2) • Tampering with copyright management information to enable or conceal infringement should be illegal • Need for “adequate protection” and “effective remedies” for circumvention of technical protection systems • Treaty not yet in effect, but US has ratified; EU in process of implementing; Canada has signed 21 DMCA • Digital Millennium Copyright Act (1998) • “Safe harbor” provisions for ISPs – – – – Transitory network communication System caching User-stored information Information location tools • Section 1201: anti-circumvention rules • Section 1202: false CMI/removal of CMI 22 DMCA ANTICIRCUMVENTION RULES • Treaty very vague; unclear what’s required • Campbell-Boucher bill in US: proposed to outlaw circumvention of TPS to enable copyright infringement • MPAA: wanted all circumvention outlawed • Compromise in DMCA: illegal to circumvent an access control, 17 U.S.C. s. 1201(a)(1) • But 2 year moratorium; LOC study; 7 exceptions 23 EXCEPTIONS TO CIRCUMVENTION RULE • Legitimate law enforcement & national security purposes • Reverse engineering for interoperability • Encryption research and computer security testing • Privacy protection & parental control • Nonprofit “shopping privilege” 24 ANTI-DEVICE PROVISIONS • Illegal to “manufacture, import, offer to public, provide or otherwise traffic” in • Any “technology, product, service, device, [or] component” • If primarily designed or produced to circumvent TPS, if only limited commercial purpose other than to circumvent TPS, or if marketed for circumvention uses 25 MORE ON DEVICE RULES • 1201(a)(2)--devices to circumvent effective access controls • 1201(b)(1)--devices to circumvent effective controls protecting right of cop. owners • Actual & statutory damages + injunctions • Felony provisions if willful & for profit • MPAA v. Reimerdes 1st civil case 26 CURIOUS THINGS ABOUT 1201 • Only 3 exceptions to 1201(a)(1) explicitly allow building tools • Only interoperability exception limits both anti-device rules • Did Congress mean to allow circumvention to make fair use, yet make it illegal to make tools needed to accomplish? (Ha! Ha!) • LOC to study only act, not device rules 27 PROBLEMS WITH A/C REGS • Legitimate purpose circumventions – existing exceptions overly narrow – need for general purpose exception – clarify that fair use circumvention is OK • “Dual use” technologies – tools to enable legitimate uses – how device rules could be narrowed • Copyright-centric regulations 28 EXCEPTIONS TOO NARROW • Interoperability: not just programs; other reverse engineering may be legitimate • Encryption and computer security research: – no authorization and expert requirements – OK to make tools – less onerous rules on disseminating results • Privacy exception: Windows 2000 hypothetical 29 A GENERAL PURPOSE EXCEPTION? • Need for “or other legitimate purpose” exception to access control rule • Examples of other legitimate acts: – if reasonable grounds to believe infringing copy or computer virus inside TPS – illegitimate invocation of “technical self-help” • Courts able to tell difference between legitimate & illegitimate acts 30 DUAL USE TECHNOLOGIES • Circumvention tools are not burglars’ tools • Ways to narrow rules: – substantial noninfringing use standard – intent/knowledge/injury/infringement requirement – commercially significant cf. apparent legitimate purpose (freeware should not be vulnerable) – technology-specific (e.g., circumvention of SCMS) • Think through relation between range of legitimate circumventions and availability of tools (if X is lawful, tool to do X should be OK) 31 COPYRIGHT-CENTRICITY • Encryption protects more than commercial copyrighted products (e.g., private personal communications, trade secret/confidential business information, e-cash) • Circumvention of encrypted information is a more general problem (sometimes legitimate, sometimes not) • So is the availability of circumvention technology • Would suggest the need for a general law 32 UNINTENDED CONSEQUENCES? • X makes software that circumvents Y’s encryption system • Z is a copyright owner who decides to use Y’s encryption system to protect digital pictures • Does X’s tool then become illegal? • Can Y sue X? Can Z sue X? What harm has X’s software done to Y or Z? • 1201 (a)(2) and (b)(1) does not require any underlying infringement; mere potential is enough 33 MPAA v. REIMERDES • Injunction vs. posting of DeCSS on websites or otherwise making it available • CSS is effective access control for DVDs • DeCSS circumvents it & has no other commercially significant purpose • Lack of evidence for Linux compatibility argument • Besides, 1201(f) only protects interoperation with “programs,” not “data” on DVD 34 ELEMENTS OF TRADE SECRECY • Information that can be used in business that is sufficiently valuable & secret as to afford an economic advantage to the holder • Outgrowth of unfair competition law • No “exclusive rights” as such, but protected vs. use of improper means & breach of confidence • Independent development & reverse engineering are legitimate ways to acquire a trade secret • Relief generally limited to period in which independent development would have occurred 35 DVD-CCA v. McLAUGHLIN • Trade secret misappropriation case • CSS = proprietary information; DVD-CCA took reasonable steps to maintain secret • Inference: someone must have violated clickwrap license forbidding reverse engineering • Breach of agreement was improper means • Even though DeCSS on web for 4 months, not to enjoin would encourage posting TS on Web • Judge upset by “boasting” about disrespect for law 36 IMPLICATIONS OF DVD-CCA • Anti-reverse engineering clauses are common in software licenses; enforceability much debated • Judge’s willingness to enforce and treat information obtained through reverse engineering as trade secret worrisome • Judge’s willingness to enjoin information that had been public for several months may be error • “Fruit of poisonous tree” rationale (judge knows Johansen didn’t reverse engineer, nor did many posters, yet held as trade secret misappropriators) 37 CONCLUSION TO PART I • Digital technology has posed many difficult questions and problems for copyright law • Much remains in controversy; how current cases are resolved matters a lot • Possible to build balance into law, but US “selling” broad anti-circumvention rules • Gap in perception about law as between copyright industry and the public; enforceability & respect for law contribute to difficulties • Easier to see the risks than the opportunities 38