Jump to content

Copyright infringement

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Nbarth (talk | contribs) at 23:52, 20 November 2008 (See also: Anti-piracy). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

The Cathach of St. Columba, a seventh century book of psalms. Tradition cited it as the book whose illicit transcription by Saint Columba in 560 AD led to the overturn of an Irish copyright ruling by force of arms.[1]
An advertisement for copyright and patent preparation services from 1906, when copyright registration formalities were still required in the US.

Copyright infringement (or copyright violation) is the unauthorized use of material that is covered by copyright law, in a manner that violates one of the copyright owner's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.

For electronic and audio-visual media, unauthorized reproduction and distribution is occasionally referred to as piracy (an early reference was made by Daniel Defoe in 1703 when he said of his novel True-born Englishman : "Its being Printed again and again, by Pyrates"[2]). The practice of labeling the act of infringement as "piracy" actually predates copyright itself. Even prior to the 1709 enactment of the Statute of Anne, generally recognized as the first copyright law, the Stationers' Company of London in 1557 received a Royal Charter giving the company a monopoly on publication and tasking it with enforcing the charter. Those who violated the charter were labeled pirates as early as 1603.[3]

The legal basis for this usage dates from the same era, and has been consistently applied until the present time.[4][5] Critics of the use of the term "piracy" to describe such practices contend that it is pejorative, unfairly equates copyright infringement with more sinister activity,[6] though courts often hold that under law the two terms are interchangeable.[7]

The unlawful downloading of copyrighted material and sharing of recorded music over the internet in the form of MP3 and other audio files is more prominent now than since before the advent of the internet or the invention of Mp3, even after the demise of Napster and a series of infringement suits brought by the American recording industry. Promotional screener DVDs distributed by movie studios (often for consideration for awards) are a common source of unauthorized copying when movies are still in theatrical release, and the MPAA has attempted to restrict their use. Movies are also still copied by someone sneaking a camcorder into a movie theater and secretly taping the projection (also known as "camming"), although such copies are often of lesser quality than copied versions of the officially released film.

Some copyright owners have responded to infringement by displaying warning notices on commercially sold and DVDs; these warnings do not always give a fair picture of the purchaser's legal rights, which in the US generally include the rights to sell, exchange, rent or lend a purchased DVD.

Sharing copied music is legal in many countries, such as Canada, and parts of Europe, provided that the songs are not sold.

Bootleg recordings are musical recordings that have not been officially released by the artist or their associated management or production companies. They may consist of demos, outtakes or other studio material, or of illicit recordings of live performances. Music enthusiasts may use the term "bootleg" to differentiate these otherwise unavailable recordings from "pirated" copies of commercially released material, but these recordings are still covered by copyright despite their lack of formal release, and their distribution is still against the law.[citation needed]

The illegal use of text content is a form of copyright infringement. It is common on the world wide web for text to be copied from one site to another without consent of the author. Roberta Beach Jacobson criticizes the misappropriation of writers' work by websites in her article Copyrights and Wrongs. This article was added to articlestree.com[8] on November 27, 2001; ironically, it has since been copied to hundreds of websites,[9] many of them claiming copyright over the work or charging money to access it.

Sample Troll

Recently, certain companies have been purchasing portfolios of old music copyrights for the express purpose of enforcing those rights when a musician samples said old music for a new composition. These companies have been referred to by the pejorative term "Sample Troll." Their role in copyrights is seen to be analogous to the role of so called patent trolls in the patent arena.[10]

Servers enabling internet-based copyright infringement are often based in countries with less strict copyright laws or enforcement history.[11][12][13] BPI spokesman Matt Phillips has said the lax copyright laws in Eastern Europe and the post-Soviet countries made it hard to crack down on copyright infringement there.[14] Copyright holders are collaborating to fight this activity, through lobbying governments and other means.

  • Russia agrees with U.S. request to shut down allofmp3.com.[15]
  • China signs Memorandum of Understanding to help fight online copyright infringement with US Media Association.[16]

Legality

File:Piracy is a crime - Unskippable Anti-Piracy track.png
A short information film included on many DVDs equates copyright infringement with theft.
File:Ty copy infringement.jpg
Two "strikingly similar" plush toys; infringement established. Appendix page 1 Ty, Inc. v. GMA Accessories, Inc. 132 F.3d 1167, 1174 (7th Cir. 1997).

The most important international treaty concerning copyright infringement is the Berne Convention of 1886 as amended. The United States became the 80th signatory of the treaty with the Berne Convention Implementation Act of 1988, over 100 years after the passage of the original treaty in Paris. The US signed the treaty with one important exception: it did not accept the recognition of moral rights in article 6 of the Berne Convention. Moral rights enable a copyright holder to "object to any distortion, mutilation, or other modification of, or other derogatory action in relation to, the said work, which would be prejudicial to his honor or reputation."[17] The US expressly stated in the Implementation Act that no other right (i.e. the 1st Amendment) shall be impacted by acceptance of the Convention. Literary criticism and parody are important parts of the US infringement defense of fair use. Consequently, the US provides less protection from infringement of moral rights than other Berne signatories.

In most jurisdictions, copyright infringement may be established by reproduction of the copyrighted work. This reproduction can often be shown by the presence of an unauthorized electronic copy of the work on a server. However, should the server file be secured, and not available to public access, infringement can be avoided by legitimate holders under the pre-tences of a "backup"[citation needed].

The infringement suit in U.S. law

U.S. law requires a copyright holder to establish ownership of a valid copyright and the copying of constituent elements of the work that are original.[18] Assuming the plaintiff proves ownership of a valid copyright, the holder must then establish both actual copying and improper appropriation of the work. The burden lies with the plaintiff to establish these three elements in what is known as the prima facie case for infringement.

A plaintiff establishes ownership by authorship (by the plaintiff itself or by one who assigned rights to the plaintiff) of (1) an original work of authorship that is (2) fixed in a tangible medium (e.g. a book or musical recording). Registration is not required for copyright itself, but in most cases is a jurisdictional requirement to bring the suit. Registration is also useful because it gives rise to the presumption of a valid copyright, and eliminates the innocent infringement defense, and (if timely made) it allows the plaintiff to elect statutory damages, and be eligible for a possible award of attorney fees.

Works that are not sufficiently original, or which constitute facts, a method or process cannot enjoy copy protection.[19]. U.S. Courts do not recognize the "sweat of the brow" doctrine, which originally allowed protection for those who labored to collect and organize facts. To combat this, business which assemble databases of information have relied on contract law where copyright law offers no protection.[20] For a work to be original, it must possess a "modicum of creativity", which is a "low threshold" although some creativity must exist.[21]

Copyright protects the fixed expression of ideas, but not the ideas themselves.[22] (Ideas are protected by patents). Nevertheless, an expression must exist in a fixed tangible medium.[23] A movie script writer who discusses a plot idea which has not yet been written would not be protected if another heard his idea and wrote a screenplay himself. Whether RAM constitutes a "fixed medium" is a contentious issue in copyright litigation because of the transitory nature of RAM.[24]

Second element: establishing actual copying

A plaintiff establishes actual copying with direct or indirect evidence. Direct evidence is satisfied either by a defendant's admission to copying or the testimony of witnesses who observed the defendant in the act. More commonly, a plaintiff relies on circumstantial or indirect evidence. A court will infer copying by a showing of a "striking similarity" between the copyrighted work and the alleged copy, along with a showing of both access and use of that access.[25] A plaintiff may establish access by proof of distribution over a large geographical area, or by eyewitness testimony that the defendant owned a copy of the protected work. Access alone is not sufficient to establish infringement. The plaintiff must show a similarity between the two works, and the degree of similarity will affect the probability that illicit copying in fact occurred in the court's eyes.[26] Even then, the plaintiff must show that the copying amounted to improper appropriation. Indeed, the US Supreme Court has held that not all copying constitutes infringement and a showing of misappropriation is necessary.[27]

Third element: establishing misappropriation

A copyrighted work may contain elements which are not copyrightable, such as facts, ideas, themes, or content in the public domain. A plaintiff alleging misappropriation must first demonstrate that what the defendant appropriated from the copyrighted work was protectible. Second, a plaintiff must show that the intended audience will recognize substantial similarities between the two works. The intended audience may be the general public, or a specialized field. The degree of similarity necessary for a court to find misappropriation is not easily defined. Indeed, "the test for infringement of a copyright is of necessity vague."[28] Two methods are used to determine if unlawful appropriation has occurred: the subtractive method and the totality method.

The subtractive method, also known as the "abstraction/subtraction approach" seeks to analyze what parts of a copyrighted work are protectible and which are not.[29] The unprotected elements are subtracted and the fact finder then determines whether substantial similarities exist in the protectible expression which remains. For instance, if the copyright holder for West Side Story alleged infringement, the elements of that musical borrowed from Romeo and Juliet would be subtracted before comparing it to the allegedly infringing work because Romeo and Juliet exists in the public domain.

The totality method, also known as the "total concept and feel" approach takes the work as a whole with all elements included when determining if a substantial similarity exists.[30] The individual elements of the alleged infringing work may by themselves be substantially different from their corresponding part in the copyrighted work, but nevertheless taken together be a clear misappropriation of copyrightable material.[31]

Modern courts may sometimes use both methods in its analysis of misappropriation.[32] In other instances, one method may find misappropriation while the other would not, making misappropriation a contentious topic in infringement litigation.[33]

Defenses to infringement

A defendant in an infringement action may rebut the presumption of copying by a showing of independent creation. It is possible for an author to create a work independently while bearing similarities to another. If access is not established, there is no copying, even if there is a striking similarity between the two works.[34] For this reason, corporations will destroy or return unsolicited mailings from authors as a policy.[35]

The legal doctrine of de minimis non curat lex, "the law does not care about trivial things," provides a de minimis copying defense against infringement. When the plaintiff establishes only a trivial use of the copyrighted work by the defendant, there is no infringement. For example, an out-of-focus copyrighted picture appearing only momentarily in the background of a commercial is not infringement.[36] The Beastie Boys successfully used this defense in a lawsuit over the use of three musical notes in the song "Pass the Mic."[37] The Beastie Boys had obtained a license to use the recording, but the rights to the song itself were retained by the original composer. The court held that use of three notes was not a sufficient use and amounted to de minimis copying. However, the Sixth Circuit has held that the de minimis defense is not available for the sampling of sound recordings because of their intrinsic value in saving the sampler time and costs in hiring musicians to perform the music however short.[38]

The two most important defenses to copyright infringement are the first sale doctrine and fair use.

The first sale doctrine is a defense to infringement of the distribution right. It permits a lawful purchaser of a copyrighted work to resell or otherwise dispose of it. This, however, is not a defense to the reproduction right.

Fair use is an affirmative defense, but its application will vary greatly depending on the facts and circumstances of the case. Courts apply a four part balancing test examining the scope of infringement, the effect on the copyright owner's rights (e.g. his or her ability to sell the work), the amount of the work copied, and the purpose of the infringement. Courts have held that a non-commercial use is not fair use when it has a substantial market effect. In cases with a small-scale impact, courts are more receptive to arguments regarding the effect on the copyright owner's market or potential market.

With the passage of the so-called No Electronic Theft Act (NET Act), US copyright law was changed to allow for the civil and criminal prosecution of persons allegedly engaged in copying of copyrighted works without permission that did not result in personal financial gain; historically, the criminal copyright law required infringement to be for financial gain. Among other things, the NET Act altered the definition of financial gain to include bartering and trading. In addition, under this US law, members of software piracy groups could also be prosecuted for participation in a criminal enterprise.

British law

In British Law, any modification of data stored on a computer so that unauthorised access is gained to software packages, games, movies, and music would be a criminal offence under §3 Computer Misuse Act 1990. So, if a read-only music CD is placed in a PC drive and the contents loaded into the computer's memory for playing, any application that allows the music to be copied and stored on the machine or an MP3 player would commit the offence in theory but, so far, there have been no prosecutions on this set of facts. More generally, §16 and 20 Copyright, Designs & Patents Act 1988 (as amended by the Copyright and Trade Marks (Offences and Enforcement) Act 2002) covers copyrighted materials. However this does grant the right to create backup copies of software, so that the original can be kept safe from damage, technically meaning companies must provide either additional discs or the means to overcome any copy protection. People who distribute and download copyrighted recordings without permission are liable to face civil actions for damages and penalties (the largest to date is £6,500, or $12,120.55). As in the United States, the enforcement agencies were able to identify the IP addresses and the ISPs were obliged to disclose the name and address of the owner of each such internet account but legislation was passed recently so that it isn't compulsory to hand over the information.[citation needed]

A 2006 survey carried out for the National Consumer Council indicated that over half of British adults infringe copyright law by copying and ripping music CDs, with 59% stating a belief that copying for personal use is legal.[39] However, ripping music from CDs to another format, such as MP3, is currently illegal. In 2006 The Institute for Public Policy Research called for a "public right to copy".[40] In January 2008 the government proposed changes to copyright law that would legalise copying for personal use.[41]

Criminal offences

For the most part, the criminal law is only used for commercial copyright infringement with one exception[citation needed], and an offence is committed when knowing or reasonably suspecting that the files are illegal copies[citation needed], and without the permission of the copyright owner, a person:

  • makes unauthorised copies e.g. burning music files or films on to CD-Rs or DVD-Rs;
  • distributes, sells or hires out unauthorised copies of CDs, VCDs and DVDs;
  • on a larger scale, distributes unauthorised copies as a commercial enterprise on the internet;
  • possesses unauthorised copies with a view to distributing, selling or hiring these to other people;
  • while not dealing commercially, distributes unauthorised copies of software packages, books, music, games, and films on such a scale as to have a measurable impact on the copyright owner's business;
  • publishing someone else's original copy work and claiming you have made it. (This is known as plagiarism and is completely different from copyright infringement, but laws concerning it come under the section of copyright law in some countries);
  • certain copyrights allow Archival copies of software to be made however these are not to be distributed.

The penalties for these "copyright infringement" offences depend on the seriousness of the offences:

  • before a magistrates' Court, the penalties for distributing unauthorised files are a maximum fine of £5,000 and/or six months imprisonment;
  • in the Crown Court, the penalties for distributing unauthorised files are an unlimited fine and/or up to 10 years imprisonment.

Also note §24 Copyright and Related Rights Regulations 2003 which creates a range of offences relating to the distribution of any device, product or component which is primarily designed, produced, or adapted for the purpose of enabling or facilitating the circumvention of effective technological measures. When this is for non-commercial purposes, it requires there to be a measurable effect on the rights holder's business.

Comparison to theft

Copyright infringement is often equated with theft, for instance in the title of the No Electronic Theft Act of 1997, but differs in certain respects.

Courts have distinguished between copyright infringement and theft, holding, for instance, in Dowling v. United States (1985) that bootleg phonorecords did not (for the purpose of the case) constitute stolen property, and writing:

interference with copyright does not easily equate with theft, conversion, or fraud. The Copyright Act even employs a separate term of art to define one who misappropriates a copyright: ... 'an infringer of the copyright.' ... The infringer invades a statutorily defined province guaranteed to the copyright holder alone. But he does not assume physical control over the copyright; nor does he wholly deprive its owner of its use. While one may colloquially link infringement with some general notion of wrongful appropriation, infringement plainly implicates a more complex set of property interests than does run-of-the-mill theft, conversion, or fraud.

— Dowling v. United States, 473 U.S. 207, pp. 217–218

The key distinction generally drawn, as indicated above, is that while copyright infringement may (or may not) cause economic loss to the copyright holder, as theft does, it does not appropriate a physical object, nor deprive the copyright holder of the use of the copyright. That information can be replicated without destroying an original is an old observation,[42] and a cornerstone of intellectual property law. In economic terms, information is not an exclusive good; this has led some to argue that it is very different in character, and that laws for physical property and intellectual property should be very different.[43]

Conversely, as the above states, "theft" is used colloquially to indicate "wrongful appropriation".[44] The use of the term "theft" to indicate various mental crimes, has a long history in Jewish law, in the tenant of Geneivat da'at (גניבת דעת‎, literally "mind theft"), though this primarily deals with deception or fraud, not copyright.

The debate on whether to call copyright infringement "theft" thus turns on how meaningful this distinction is, and how misleading it is to equate the terms: is copyright infringement essentially theft, or is it fundamentally different in character? More broadly, how similar are physical property and intellectual property?

See also

For a substantial discussion of copyright infringement in the domain of computer programs, see copyright infringement of software.

References

  1. ^ "The Cathach / The Psalter of St. Columba". Royal Irish Academy. 2008-01-30. Retrieved 2008-06-09.
  2. ^ Oxford English Dictionary
  3. ^ T. Dekker Wonderfull Yeare 1603 http://www.uoregon.edu/~rbear/yeare.html
  4. ^ See Berne Copyright Convention, 1886: "Pirated works may be seized on importation into those countries of the Union where the original work enjoys legal protection." (Art. 12).
  5. ^ See also Massachusetts Circuit Court Folsom v. Marsh, 1841: "If so much is taken, that the value of the original is sensibly diminished, or the labors of the original author are substantially to an injurious extent appropriated by another, that is sufficient, in point of law, to constitute a piracy pro tanto."
  6. ^ Some Confusing or Loaded Words and Phrases that are Worth Avoiding, Free Software Foundation
  7. ^ For example, see Dowling v. United States, 473 U.S. 207 (1985), et al.
  8. ^ Jacobson, Roberta Beach (2001-11-27). "Copyrights and Wrongs". www.articlestree.com. Retrieved 2007-04-07. {{cite web}}: Check date values in: |date= (help)
  9. ^ "Results 1 - 10 of about 371 for "Roberta Beach Jacobson" "Copyrights and Wrongs"". www.google.com. Retrieved 2007-04-07. {{cite web}}: Text "date = 2007-4-7" ignored (help)
  10. ^ Wu, Tim (2006-11-16). "Jay-Z Versus the Sample Troll". slate.com. Retrieved 2007-02-05.
  11. ^ Isenberg, Doug (2002-09-04). "Is this the way to fight copyright infringement?". News.com. Retrieved 2007-02-05.
  12. ^ "'Korean Wave' piracy hits music industry". BBC. 2001-11-09. Retrieved 2007-02-05.
  13. ^ "Pakistan - copyright piracy hub". BBC. 2005-05-03. Retrieved 2007-02-05.
  14. ^ "Music piracy in UK soars". BBC. 2002-12-18. Retrieved 2007-02-05.
  15. ^ Natali Del Conte (2006-11-28). "Russia Agrees To US Request To Shut Down AllofMP3.com". TechCrunch. Retrieved 2007-02-05.
  16. ^ IPTV Guy. "Chinese Government promises to help fight online piracy". Web TV Wire. Retrieved 2007-02-05.
  17. ^ see Berne Convention Article 6, bis
  18. ^ see Feist v. Rural Telephone 499 U.S. 340, 361 (1991)
  19. ^ see Feist v. Rural Telephone 499 U.S. 340 (1991) (holding that an arrangement of telephone numbers in alphabetical order was not sufficiently original to garner copyright protection)
  20. ^ see e.g., ProCD, Inc. v. Zeidenberg, 86 F.3d 1447 (7th Cir. 1996) (holding that a software license agreement was not preempted by copyright law and could legally restrain the purchaser of a database from copying under contract law).
  21. ^ Feist at 346.
  22. ^ see Baker v. Selden, 101 U.S. 99 (1880)
  23. ^ see Midway Manufacturing Co. v. Artic International, Inc. 574 F.Supp. 999, aff'd, 704 F.2d 1009 (7th Cir 1982) (holding the computer ROM of Pac Man to be a sufficient fixation even though the game changes each time played.)
  24. ^ see Mai Systems Corp. v. Peak Computer Inc., 991 F.2d 511 (9th Cir. 1993) (program in RAM memory a fixation).
  25. ^ see Ty, Inc. v. GMA Accessories, Inc. 132 F.3d 1167 (7th Cir. 1997).
  26. ^ Id. 132 F.3d 1167
  27. ^ see Feist at 361
  28. ^ Judge Learned Hand, Peter Pan Fabrics, Inc. v. Martin Weiner Corp., 274 F.2d 487, 489 (2nd Cir. 1960).
  29. ^ see Nichols v. Universal Pictures Corp., 45 F.2d 119 (2nd Cir. 1930)
  30. ^ see Roth Greeting Cards v. United Card Co., 429 F.2d 1106 (9th Cir. 1970).
  31. ^ see Sid & Marty Krofft Television Productions, Inc. v. McDonald's Corp., 562 F.2d 1157 (9th Cir. 1977) (holding that a series of McDonald's commercials portraying "McDonaldland" had used as its basis the "H.R. Pufnstuf" television show. Corresponding characters to each, while displaying marked differences, taken altogether demonstrated that McDonald's had captured the total concept and feel of the show and had thus infringed).
  32. ^ see Castle Rock Entertainment, Inc. v. Carol Publishing Group, 150 F.3d 132, 140 (2nd Cir. 1998).
  33. ^ see Computer Associates International, Inc. v. Altai, Inc., 982 F.2d 693, (2nd Cir. 1992) (where court chose the subtraction method for two computer programs whose total concept were the same. Individual copied elements of the program were non-protectible material because they constituted a process or idea in the program, their utilitarian aspects barring copyright protection; no infringement found).
  34. ^ see Selle v. Gibb 741 F.2d 896 (7th Cir. 1984) (court held no infringement in The Bee Gees' song, "How Deep is Your Love" despite similarity to the melody of an unreleased song from an unknown composer).
  35. ^ see Takeall v. Pepsico, Inc., 14 F.3d 596 (4th Cir. 1993)(unpublished opinion; brief of appellee page 9) (Ventriloquist performer who coined phrase "You got the right one, uh-huh" sued PepsiCo over similar phrase in Ray Charles commercials. Performer had sent an unsolicited promotional package to Pepsi, which was not forwarded to marketing executives).
  36. ^ Gordon v. Nextel Communications 345 F.3d 922 (6th Cir.).
  37. ^ Newton v. Diamond 388 F.3d 1189 (9th Cir. 2004)
  38. ^ Bridgeport Music, Inc. v. Dimension Films 410 F.3d 792, 802 (6th Cir. 2005)
  39. ^ "Shake-up 'absurd' copyright laws, says NCC". National Consumer Council. 2006-05-11.
  40. ^ "Copying own CDs 'should be legal'". BBC News. 2006-10-29.
  41. ^ "Copying CDs could be made legal". BBC News. 2008-01-08.
  42. ^ See for instance [[q:Thomas Jefferson|]]: "He who receives an idea from me, receives instruction himself without lessening mine; as he who lights his taper at mine, receives light without darkening me."
  43. ^ Joseph Stiglitz, in Towards a Pro-Development and Balanced Intellectual Property Regime, argues that information is a global public good.
  44. ^ "While one may colloquially link infringement with some general notion of wrongful appropriation,"