together Online Distribution of Content Trenton Computer Festival College of New Jersey Ewing, New Jersey April 24, 2009 Frederic M. Wilf Morgan, Lewis & Bockius LLP The Challenge “Digital files cannot be made uncopyable, any more than water can be made not wet.” — Bruce Schneier, “The Futility of Digital Copy Prevention,” Crypto-Gram Newsletter <http://www.schneier.com/cryptogram-0105.html> (May 15, 2001) Online Distribution • Often called a “network of networks,” the Internet is also a medium that incorporates all prior media • Prior, independent communications technologies each become an application on the Internet • Television, movies, radio, newspaper, magazines, books, newsletters, etc., are all bits in files • Redistribution of pre-existing works • “Re-purposed” text, graphics, video, etc. • Concurrent distribution of new works in multiple formats • Internet-specific media such as web sites, ‘blogs, etc. Gregerson v. Vilana Financial • Photographer sued real estate company for infringement of photos copied from web site • Gregerson v. Vilana Financial, Inc., Civil No. 06-1164 (D. Minn. Feb. 15, 2008) • Held, actual damages awarded in the amount of $4462 for one image, $10,000 in statutory damages for another image • $5000 in damages awarded for removal of copyright management info • 17 U.S.C. § 1202 • No attorney’s fees awarded • Plaintiff appeared pro se Grokster Effects • Metro-Goldwyn-Mayer Studios, Inc. v. Grokster Ltd.,125 S. Ct. 2764 (2005) • Distributor of software or device with the intention of promoting its use to infringe copyright is liable for infringing acts by third parties • Must prove purposeful, culpable expression and conduct • File-sharing, P2P distribution of third party content continues, but more quietly • BitTorrent and other P2P technologies may be used by motion picture vendors to distribute movies online • Members of the MPAA may find the technology to be a cost-effective way to distribute licensed copies of movies – After all, we know the technology works… • But some networks allegedly “break” BitTorrent by slowing down the transmission of files Cablevision • Cablevision developed a remote-storage digital video recorder (RS DVR) system • Subscribers could use the cable system like a personal Tivo device • Twentieth Century Fox Film Corp. v. Cablevision Sys. Corp., No. 06 Civ. 3990, 478 F. Supp. 2d 607 (S.D.N.Y. March 22, 2007), reversed and remanded sub nom. Cartoon Network LP v. CSC Holdings, Inc., Nos. 07-1480-cv & 07-1511-cv (2d Cir. Aug. 4, 2008). • Held, “copies produced by the RS-DVR system are “made” by the RS-DVR customer, and Cablevision’s contribution to this reproduction by providing the system does not warrant the imposition of direct liability.” – It looks more like a Tivo than it does video on demand Warning: Protecting IP Rights via ‘Spyware’ • Software vendors and web site owners are using technology to determine whether copies of their software have been paid for • E.g., Microsoft Windows Vista and World of Warcraft • End user license agreement allows monitoring • Backlash on privacy issues • See, e.g., “A New Gaming Feature – Spyware” http://www.eff.org/deeplinks/archives/004076.php (Oct. 20, 2005) • See also discussion of the Sony BMG “Rootkit” debacle and the declaratory judgment action in MDY Industries, LLC v. Blizzard Ent. Inc. Copyright: Formalities • Copyright notice is optional, but still recommended • © 2008 Bea Jones • Copyright registration • Free forms at Copyright Office – 202/707-3000 for hard copy – http://www.copyright.gov/forms (.pdf) • $45 filing fee per application ($35 if you participate in the online beta) • Copy of work (e.g., program or web site) on disk or hard copy • Registration required: • For U.S. citizens, to file a copyright infringement action in court • For any copyright owner, file prior to infringement to qualify for the best remedies – Attorney’s fees – Statutory damages ($200 - $150,000) Digital Millennium Copyright Act (DMCA) • DMCA © • (“DMCA is not necessarily copyright law”) • Several discrete pieces, including • Online Copyright Infringement Liability Limitation Act • Copyright Protection and Management Systems • Vessel hull design • Not discussed here DMCA: Online Service Provider (§ 512) • “Online Service Provider” designation • File a form with the Copyright Office • http://www.copyright.gov/onlinesp • $80 filing fee • No liability if take-down provisions followed • Hendrickson v. eBay, Inc., No. CV 01-0495, http://news.findlaw.com/cnn/docs/ebay/hendrickson.pdf (C.D. Cal., Sep. 6, 2001) (§ 512 protects eBay against liability for sale of allegedly-infringing copies of videos) • In Viacom v. YouTube, Viacom argues that YouTube has not complied with § 512 and is liable to Viacom for over $1 billion § 512: Perfect 10 v. CCBill • Perfect 10 alleged that CCBill and CWIE were vicariously and secondarily liable for hosting web sites that contained allegedly-infringing copies of Perfect 10’s copyright-protected photographs » Perfect 10, Inc. v. CCBill, LLC, No. 04-57143 (9th Cir. March 29, 2007) • Held, § 512 safe harbor requires that a hosting company meet all requirements of § 512 including filing the designation of agent form, and reasonably implementing a policy of terminating repeat infringers, including tracking each complaint and each termination • Held, take-down notices under § 512(c) must “substantially” comply with all of the elements listed in the statute DRM in Streaming Media • Real Networks, Inc. v. Streambox, Inc. • 2000 WL 127311 (W.D. Wash. 2000) • Real uses an authentication sequence (Secret Handshake) to insure that media will only be streamed from a RealServer to a RealPlayer (e.g., the right users) • Real uses embedded data (Copy Switch) to determine whether the media may be copied by the recipient (e.g., the right uses) • Streambox’s software mimics a RealPlayer’s Secret Handshake so that media streamed to it behaves as if it were a RealPlayer, and it allows the user to copy media even though the Copy Switch may be set to “off” • Held, mimicking of Secret Handshake violates §1201(a)(2), while bypassing Copy Switch violates §1201(b) DRM: DMCA Violation Involves a Copyright Right • There is no violation of the DMCA, 17 U.S.C. § 1201 without proof that a technological protection method was circumvented for the purpose of infringing a right protected by the Copyright Act • Nordstrom Consulting Inc. v. M&S Technologies, Inc., No. 06 C 3234 (N.D. Ill. March 4, 2008) • Defendants apparently circumvented password protection to access plaintiff’s software for the purpose of repairing or replacing a licensed copy of the software, which is expressly permitted under the Copyright Act • Thus, no DMCA violation DeCSS Cases • Content Scramble System (CSS) is a TPM that protects movies on DVDs • CSS cracked, and the cracking program (DeCSS) distributed online, obsoleting CSS programs in DVD players worldwide • In each case, defendants’ web sites distribute copies of DeCSS and link to other web sites that distribute DeCSS • 2600 Case (Universal City Studios v. Reimerdes/Corley) • Universal City Studios, Inc. v. Reimerdes, No. 00-Civ-0277, 111 F. Supp. 2d 294 (S.D.N.Y. Aug. 17, 2000) <http://www.nysd.uscourts.gov/courtweb/pdf / D02NYSC/00-08117.pdf, aff’d sub nom. Universal City Studios, Inc. v. Corley, No. 00-9185, 2001 U.S. App. LEXIS 25330 (2d Cir. Nov. 28, 2001) <http://laws.findlaw.com/2nd/009185.html > 2600 DeCSS Case • Permanent injunction granted • CSS is an ACT designed to protect copyrighted movies • DeCSS has no commercially significant purpose, other than to crack CSS ACT • Distribution of DeCSS violates prohibition on trafficking in devices that circumvent ACT • Courts turn away all First Amendment and reverse engineering (§1201(f)) arguments • Lessons: • (1) Where reasonable steps are used to protect copyright-protected content, distribution of cracking tools is actionable • (2) Expect the ACT to be cracked, and plan accordingly DVD CCA DeCSS Case • Can a TPM/ACT be a trade secret? • DVD Copy Control Ass’n, Inc. v. Bunner, No. S102588 (Cal. Aug. 25, 2003), on remand, No. H021153 (Cal. App. Feb. 27, 2004) • Cal. Supreme Court upholds injunction • CSS may be a trade secret under UTSA • Reverse engineering not an “improper means” to discover a trade secret • After remand, the plaintiff dismisses, but Cal. App. Ct. holds reverse engineering is a proper way to learn a trade secret, so injunction should never have been granted in the first place • Lesson: A TPM/ACT may be protected as a trade secret, but the use of reverse engineering to discover how it works is still not a violation of trade secret law BnetD Case • Davidson & Assocs v. Jung, No. 04-3654 (8th Cir. Sept. 1, 2005) http://www.ca8.uscourts.gov/opndir/05/09/043654P.pdf • Plaintiffs sold games and an online service (Battle.net) • Defendants reverse-engineered the games and created an online emulation (bnetd.org) of Battle.net that allowed both licensed and unlicensed versions of the games to play • Held, plaintiff’s use of a “secret handshake” to validate use of the games was an ACT that was circumvented because bnetd.org works with both licensed and unlicensed versions of the games BnetD (continued) • Is the decision right, wrong or confused? • Bnetd.org is an alternative service that does not directly circumvent the ACT, but allows both circumvented and non-circumvented copies of the games to play together • If the games have been directly modified to play with bnetd.org, then both the modifications of the games and any distribution of the modifications may very well be a violation of Sec. 1201 BnetD (continued) • However, if the games have not been modified, and if bnetd emulates plaintiff’s Battle.net without copying it, then there may have been no violation of Section 1201 because bnetd.org is not an infringing copy of the Battle.net software owned by plaintiff – Section 1201(f) allows reverse engineering for software interoperability – 8th Circuit confuses circumvention of the games with emulation of the online environment Lexmark v. Static Control • Lexmark Int’l, Inc. v. Static Control Components, Inc., • No. 03-5400, 387 F.3d 522 (6th Cir. 2004) <http://www.ca6.uscourts.gov/opinions.pdf/04a0364p-06.pdf>, rehearing and rehearing en banc denied • No. 04-CV-84-KSF (E.D. Ky. Feb. 23, 2006) (joint stipulation of summary judgment with regard to DMCA claims) • Lexmark adds microchips and software to some of its toner cartridges, which the printer queries on start-up and other times Lexmark v. Static Control (continued) • Toner Loading Program (TLP) – Small programs (37-55 bytes) » Case caption in ASCII is larger – Estimates amount of toner left in cartridges • Printer Engine Program (PEP) – Larger program (equates to 20 pages of source code – Handles various functions of the printer, including checksum on TLP Lexmark (continued) • Authentication sequence • “Are you a Lexmark cartridge?” • Authentication, using 6 codes stored in each cartridge chip • If authentication succeeds, TLP downloaded to printer and checksum performed • LXK ticker symbol (ASCII 4C 58 4B) embedded (“salted”) in TLP in chips attached to toner cartridges • Static Control Components makes remanufactured toner cartridge components, including parts to remanufacture Lexmark cartridges • SCC’s chip includes copies of Lexmark’s chip-based software Lexmark Case Holding • Lexmark’s TLP software probably not protected by copyright • Lack of originality • Limited number of alternative ways to prepare competing works • TLP probably used as a lock-out code, so it may not be protectable under the Copyright Act • Lexmark’s authentication sequence does not control access to PEP • Buying the printer provides access to PEP • Authentication sequence does not prevent anyone from reading the PEP code • Authentication sequence used to keep out non-Lexmark cartridges Lexmark Case Lesson • Lesson 1: To obtain the benefits of Section 1201 • The content must be protected under the Copyright Act • The TPM/ACT must control access to the content • The TPM/ACT must control use of the content to the extent that such use is reserved to the copyright owner (e.g., one or more the copyright exclusive rights) • Lesson 2: • Under these facts, a rights owner may use a TPM to reduce copying by competitors, but Section 1201 will not serve as the basis for a claim if the TPM is circumvented Chamberlain v. Skylink • Chamberlain Group, Inc. v. Skylink Technologies, Inc. • No. 02-C-6376 (E.D. Ill. Aug. 29, 2003), aff’d, No. 04-1118, 381 F.3d 1178 (Fed. Cir. 2004) <http://laws.findlaw.com/fed/041118.html >, petition for review denied No. 04997 (Sup. Ct. March 21, 2005) • Chamberlain makes garage door openers (GDOs), with “rolling code” technology, which change the code each time the transmitter button is pressed • Reduce the likelihood that a burglar will use a “code grabber” to learn a fixed code and open the garage door • Make it harder for third parties to make universal replacement transmitters • Skylink makes replacement transmitters, including one that replaces rolling code transmitters (mimics “resynchronization” of rolling codes) Chamberlain Holding • Plaintiff fails to allege that defendant’s transmitter circumvented an ACT for the purpose of infringing plaintiff’s copyrights • Under §1201(a)(2), plaintiff must prove: • ownership of a valid copyright • effectively controlled by a TPM/ACT that has been circumvented Chamberlain Holding (continued) • that third parties can now access in a manner that infringes or facilitates infringing a right protected by the Copyright Act • because of a product that defendant either – designed or produced primarily for circumvention, or – primarily used for circumvention, or – marketed for use in circumvention of TPM/ACT • “A copyright owner seeking to impose liability on an accused trafficker must demonstrate that the trafficker’s device enables either copyright infringement or a prohibited circumvention.” Healthcare Advocates • Healthcare Advocates, Inc. v. Harding, Earley, Follmer & Frailey • No. 2:05-CV-03524-RK (E.D. Pa. July 20, 2007) • Plaintiff’s web site was copied by Archive.org, which maintains a library of web sites as published from time to time, and viewed by defendant using the Wayback Machine • Plaintiff sought to block access to historical copies of its web site by adding a robots.txt file containing a denial text string • Held, • Copying a web site for litigation purposes is a fair use • Robots.txt is a TPM • No circumvention of a TPM when there is no attempt at circumvention, and theTPM malfunctions, so no DMCA violation Sony Rootkit • In re Sony BMG CD Technologies Litigation, No. 1:05-cv-09575-NRB (S.D.N.Y. Jan. 6, 2006) • Sony BMG used two different DRM software packages on different audio CDs to restrict consumer uses of the CDs, report customer listening of the CDs, and condition use of the music on accepting terms in an accompanying end user license agreement (“EULA”) • Like a “rootkit,” the software concealed its presence through the use of hidden files, maintained connections with Sony BMG’s servers, and introduced substantial security vulnerabilities • After substantial negative publicity, Sony BMG offered an uninstaller, but the uninstaller introduced new vulnerabilities Sony Rootkit (continued) • Sony BMG eventually acknowledged both the DRM software and the problems it caused, and recalled all of the discs • Sony BMG had refused to refund the amounts paid for the discs • Under the settlement, Sony BMG provides a menu of remedies based on the particular DRM software encountered on a disk-by-disk basis • For example, consumers who bought CDs with First4Internet’s Extended Copy Protection (“XCP”) DRM software packages may exchange them for copies of the same CDs with no DRM, and download MP3 copies of the music; and Sony BMG provides each consumer with a choice of – a check for $7.50 plus one free download from a 200-title list, or – three free downloads from the list Sony Rootkit (continued) • Other cases are still pending • Sony BMG has sued Amergence Group (f/k/a SunComm Int’l), one of the TPM providers • For more information, see • Electronic Frontier Foundation at http://www.eff.org/sony • Halderman & Felten, “Lessons from the Sony CD DRM Episode,” http://itpolicy.princeton.edu/pub/sonydrm-ext.pdf (Feb. 15, 2006) • “Unintended Consequences: Seven Years Under the DMCA,” http://www.eff.org (4th ed. April 2006) Macrovision v. Sima Products • Macrovision v. Sima Products Corp. • No. 05 Civ. 5587 (RO) (S.D.N.Y. April 20, 2006). • Macrovision’s Analog Copy Protection technology (“ACP”) makes it more difficult to copy the analog signal generated by a DVD player when playing a movie or other digital content • Effect is that copies of the analog signal are degraded • Sima’s products, called “CopyThis!” and “GoDVD,” eliminate ACP from the analog signal, thus allowing higher quality copies to be made from the analog signal • Held, injunction granted as Sima’s products violate 1201(a)(2) prohibition on trafficking in technology that circumvents a technological measure that controls access to copyrighted content Storage Technology • Storage Technology Corp. v. Custom Hardware Eng. & Consulting, Ltd. – 421 F.3d 1307 (Fed. Cir. 2005), reh’g denied 431 F.3d 1374, on remand Civil Action No. 02-12102 (D. Mass. June 28, 2006) • Storage Tech makes data storage “silos” of data cartridges, and which are controlled by a password-protected maintenance program • Custom found a way to circumvent the password protection so that Custom may provide maintenance for the Storage Tech silos • Held, maintenance of software permitted under 17 U.S.C. § 117(c) Storage Technology (continued) • Held, since maintenance is permitted under Title 17, then circumvention to perform maintenance does not violate § 1201 • Held, some of the code plaintiff claims was protected under the Copyright Act and circumvented by Custom, was already being given out for free by plaintiff, so defendant had not circumvented any of the plaintiff’s rights • Held, attorney’s fees may be awarded under 17 U.S.C. § 1203(b)(5) WoW Glider • Glider is add-on software that allows a user to automate the actions of the user’s World of Warcraft (WoW) characters • The user walks away from the computer; the character keeps going • http://www.wowglider.com • Declaratory judgment action seeks declaration that Glider does not infringe copyrights in WoW and does not circumvent WoW’s Warden software, which looks for violations by WoW users • MDY Industries, LLC v. Blizzard Ent. Inc., No. CV 06-0255 (D. Az.) (complaint filed Oct. 25, 2006, order issued Jan. 28, 2009) • Court held that WoW’s Warden is a TPM that protects dynamic nonliteral elements of WoW, and Glider circumvents Warden • Court enters a $6.5 million judgment against MDY Industries Jacobsen v. Katzer • Jacobsen v. Katzer, No. 2008-1001 (CAFC Aug. 13, 2008) (http://www.cafc.uscourts.gov/opinions/081001.pdf visited Aug. 13, 2008) • Jacobsen and Katzer wrote competing software for model trains • Jacobsen’s software was distributed under the Artistic License 1.0 • http://www.opensource.org/licenses/artistic-license-1.0.php • Katzer’s employees or predecessor copied Jacobsen’s code into Katzer’s software, but failed to comply with the provisions of the Artistic License Jacobsen v. Katzer: Federal Circuit • Federal Circuit vacates and remands to trial court • Broad distribution to the general public does not equate to an unlimited license • In other words, free distribution does not equate to public domain • The Artistic License as used by Jacobsen required Katzer to do certain things • Failure to comply with the terms of the license means that Katzer violated conditions of the copyright license, rather than breach of contractual terms or covenants • Irreparable harm may be presumed as violations of the conditions of the license means that Katzer’s uses of the Jacobsen software were not authorized Jacobsen: Conclusion • Held, terms in the Artistic License violated by Katzer were conditions, not covenants • Any use of the software without complying with the terms in the Artistic License were outside the scope of the license granted by Jacobsen • Cites Nimmer that distribution of copies without a copyright notice pursuant to a license that required copyright notice equates to copyright infringement • Once again, copies distributed in compliance with the conditions are fully licensed, while copies not distributed in compliance are infringing copies Jacobsen: Implications • Confirms that free/open source licensors may pursue full set of copyright remedies against those who fail to comply with their license • Injunctive relief • Presumption of irreparable harm • Actual damages (if any) • Statutory damages • Attorney’s fees (!) • Licensor must still comply with Copyright Act requirements, including copyright registration Other Recent Cases • Software Law Freedom Center has been “busy” • Reached a settlement with SuperMicro over alleged violation of open source license for Busybox utilities • Andersen v. Super Micro Computer, Inc., No. 1:08-cv-05269-RMB (S.D.N.Y. filed June 9, 2008) • Filed cases against Extreme Networks and Hammer Storage over their alleged use of the Busybox utilities in violation of the open source license • Andersen v. Extreme Networks, Inc., No. 08-CV-6426 (S.D.N.Y., filed July 17, 2008) • Andersen v. Bell MicroProducts, Inc. d/b/a Hammer Storage, No. 08-CV-5270 (S.D.N.Y., filed June 9, 2008) Lessons Learned • Technology is not the enemy, but is an enabler of each of the parties who have skin in the game • Section 512 can be a powerful safe harbor for ISPs, web site owners and other online providers, if you dot the I’s and cross the T’s • Content owners who want to sue online providers must similarly dot the I’s and cross the T’s Lessons Learned • Where appropriate, use of a TPM may be a good way to protect content, regardless of whether any circumvention of that TPM can serve as the basis for a claim under Section 1201 • To enforce a claim under Section 1201, courts are requiring a connection between the circumvention and the protection of a right under the Copyright Act • Circumvention enables copyright infringement • Circumvention enables uses not permitted by the copyright owner – Types of copying – Use in connection with plaintiff’s software • Section 1201 does not apply where TPM/ACT used solely to protect against competitors • Section 1201 should be amended to allow circumvention for fair uses permitted under 17 U.S.C. § 107 Lessons Learned • Decreased use of digital rights management • Since the Sony Rootkit debacle, fewer music publishers have used DRM • Book publishers are using DRM less than they used to • “Publishers Phase Out Piracy Protection on Audio Books,” N.Y. Times (March 3, 2008) • Publishers should continue to use digital watermarking and other passive techniques to identify copies of their works • Publishers should be cautious about using technological protection measures that actively control access and use unless they have been fully vetted Our Team Frederic M. Wilf Morgan, Lewis & Bockius LLP fwilf@morganlewis.com 502 Carnegie Center Princeton, NJ 08540 609.919.6646 1701 Market Street Philadelphia, PA 19103 215.963.5453 Fred Wilf practices business, technology and intellectual property law, with a focus on information technology and the Internet worldwide Beijing Boston Brussels Chicago Dallas Frankfurt Harrisburg Houston Irvine London Los Angeles Miami Minneapolis New York Palo Alto Paris Philadelphia Pittsburgh Princeton San Francisco Tokyo Washington