Professional Documents
Culture Documents
Universal City Studios, Inc. v. Reimerdes 111 F.Supp.2d 294 (S.D.N.Y. 2000) aff'd 273 F.3d 429 (2d Cir. 2001) the link for the purpose of disseminating the technology. The Court issued a permanent injunction barring Corley from posting DeCSS or links to DeCSS. The Court found that damages would be difficult to calculate because who knows how many movies would be copied, and who knows how those copied movies would affect DVD sales. Corley argued that an injunction was silly because there was many places on the internet where you could get DeCSS, so it was too late to stop it. However, the Court found that an injunction was the best they could do to limit the damage. The Appellate Court affirmed. o The Appellate Court found that 1201(a)(2) was not a violation of st the 1 Amendment because it was content-neutral and furthered a substantial government interest unrelated to the suppression of free speech
Universal and other movies studios used an encryption system called CSS that made so that DVDs could only be played on licensed DVD players that wouldn't allow the user to copy the data. o CSS was shared with the companies that made the DVD players. Johansen was a hacker who reverse engineered a DVD player and developed a program called DeCSS that would let users copy the data DVDs. o Johansen was only 15 at the time! Universal started sending out cease and desist letter to all the web sites that allowed users to download the DeCSS code. Corley's website hosted the code, but deleted in when Universal threatened to sue. However, Corley provided links on their website to other websites that still had the code available. Universal sued Corley for copyright infringement. o Corley argued that this was a 1st Amendment freedom of speech issue because he didn't think CSS should be legal. o Universal argued that this was akin to publishing the combination to a bank vault to encourage people to rob the bank. The Trial Court found for Universal. o The Trial Court looked to the Digital Millennium Copyright Act (DMCA) (17 U.S.C. 1201(a)(2)) and found that DeCSS was a copyright violation because it's only purpose was to defeat copyright protection. Therefore offering to transfer the DeCSS code to a user was not legal. o The Court found that Corley engaged in the functional equivalent of transferring the DeCSS code to the user by linking to sites that hosted the code. Especially because many of the sites Corley linked to had nothing on them but the DeCSS code. The Court noted that if a site Corley linked to had the DeCSS code and also a lot of other content, then maybe that would be ok. o The Court addressed 1st Amendment concerns, and found that 101(a)(2) could not be used enforce an injunction against a linking site (like Corley's) absent clear and convincing evidence that the person responsible for the link: Knows that the relevant material is linked to the site, Knows that the material linked to the site is technology that may not lawfully be offered, and create or maintain
CHAMBERLAIN V. SKYLINK This case involves two competitors that produce universal garage door openers (GDOs). Universal garage door openers are used when people want to replace or purchase a spare transmitter to open their garage door. They are designed to interoperate with existing GDO systems, regardless of model. Chamberlain markets a "Security+" line of GDOs which includes rolling code software that actively alters the transmitted signal by cycling through a series of strings (of which only some are able to open the door). This rolling code is designed to protect against a potential "code grabbing" attack where a nearby burglar may try to record the garage door opening signal. Chamberlain claims that the rolling code system makes it unlikely for a burglar to send a valid signal by replaying the recorded one. With rolling code protection, a garage door will open if and only if the transmitted code is not among the last 1024 used codes and it is among the next 4096 codes. The Security+ has additional functionality that will cause the GDO to resynchronize when two signals out of the acceptable range are transmitted in rapid succession. This was added in the case that homeowners use the same transmitter on multiple garage doors. In 1992, Skylink produced a universal transmitter called Model 39 that was designed to work for both rolling code and non-rolling code GDOs. The Model 39 bypasses the Chamberlain's rolling code system by imitating Security+'s resynchronization feature.
In response, Skylink claimed that "consumers use the Model 39 transmitter to activate [1] the Security+ GDOs with Chamberlain's consent." 1201(a)(3)(A) states that to "circumvent a technological measure" means to "descramble a scrambled work, to decrypt an encrypted work, or otherwise to avoid, bypass, remove, deactivate, or impair [1][2] a technological measure, without the authority of the copyright owner." They also claimed that the Model 39 transmitter served a variety of functions that were unrelated to circumvention, that Chamberlain had failed to demonstrate that its GDOs contained a computer program protected by copyright, that Skylink had not violated the DMCA because its acts fell within a safe harbor provision per 1201(f), and that Chamberlain's rolling code computer program did not protect a copyrighted computer program, but instead protects an uncopyrightable process. Chamberlain claimed that (1) Skylink had the burden to prove that their use was authorized and (2) Chamberlain "never gave consumers explicit authorization to [1] program competing universal transmitters into its rolling code openers." The District Court agreed with Skylink and because Chamberlain did not explicitly restrict the consumer's use of alternate transmitters, this was deemed an unconditional sale that implicitly authorized customers to use other transmitters. The court also noted that Chamberlain's construction and interpretation of the DMCA would make its own consumers violate 1201(a)(1), which prohibits circumvention of a technological
Static Control Components (SCC) is a company that makes "a wide range of technology products, including microchips that it sells to third-party companies for use in [1] remanufactured toner cartridges." In an effort to control and reduce the refilling and redistribution of toner cartridges, Lexmark began distributing two distinct varieties of its toner cartridges. Under what was then known as the Prebate Program (now the Lexmark Return Program), Lexmark sold certain printer cartridges at a discount to customers who agreed to use the cartridge only once and return it only to Lexmark for remanufacturing or recycling. Lexmark's "Non-Prebate" cartridges could be refilled by the user without restrictions and were [2] sold without any discount. "Prebate" cartridges were as much as $50 cheaper, but the user agreed (through a shrinkwrap license) to use the cartridge only once and return it to Lexmark. Lexmark touted the Prebate Program as a benefit to the environment and to their customers, since it would allow customers to get cheaper cartridges. For Lexmark, the benefit of the Prebate Program was that they could keep empty cartridges out of the hands of competing rechargers. Many users agreed to Lexmark's condition against purchasing unauthorized refills of the prebate cartridges. To enforce this agreement, Lexmark cartridges included a computer chip that communicated with a "Printer Engine Program" built into the printer. The chips built into "Prebate" cartridges also included a 55-byte computer program, the "Toner Loading Program", that calculated the amount of toner used during printing. When the
On the DMCA claims, the majority opinion first considered Lexmark's claim that the SCC chip circumvented the access controls on the Printer Engine Program. It held that Lexmark's authentication sequence did not "control access" to the program; rather, the purchase of the printer itself allowed access to the program. "Anyone who buys a Lexmark printer may read the literal code of the Printer Engine Program directly from the printer memory, with or without the benefit of the authentication sequence[...]No security device, in other words, protects access to the Printer Engine Program[...]"
[21]
Likewise, the majority opinion held that anyone purchasing a printer and toner cartridge could read the Toner Loading Program from the printer; so SCC did not circumvent an access control on the Toner Loading Program either.
[22]
The majority opinion also rejected the district court's conclusion that the interoperability defense did not apply. Since SCC had offered testimony that its chips did indeed contain independently-created programs in addition to Lexmark's Toner Loading Program, the Toner Loading Program could be seen as necessary to allow interoperation between SCC's own programs and the Lexmark printer. Concurring opinion[edit source | editbeta] In a concurring opinion, Judge Merritt agreed with Judge Sutton on the outcome of this particular case, but also indicated that he would go farther. I write separately to emphasize that our holding should not be limited to the narrow facts surrounding either the Toner Loading Program or the Printer Engine Program. We should make clear that in the future companies like Lexmark cannot use the DMCA in conjunction with copyright law to create monopolies of manufacturer goods for themselves[...] Judge Merritt opined that even if the programs involved were more complex (and thus more deserving of copyright protection), the key question would be the purpose of the circumvention technology. Under Judge Merritt's proposed framework, if a third party manufacturer's use of a circumvention technology was
[23]
expression is difficult in the context of computer programs; even though it may be possible to express the same idea in many different programs, "practical realities"hardware and software constraints, design standards, industry practices, etc.may make different expressions impractical.
[17]
"Lock-out" codes
codes that must be performed in a certain way in order to bypass a security systemare generally considered functional rather than creative, and thus unprotectable.
[17]
With these principles in mind, the majority opinion held that the district court had erred in three ways. First, it had held that the Toner Loading Program was copyrightable simply because it "could be written in a number of different ways", without considering the practical realities.
[18]
standard, it had refused to consider whether or not the alternative Toner Loading Programs proposed by Lexmark were practical. Third, it had concluded that the Toner Loading Program was not a "lock-out code", because it had not sufficiently considered how difficult it would be for SCCwithout Lexmark's knowledge of the code's structure and purposeto alter the code and still pass the printer's authentication mechanisms.
[20]
Lexmark filed a request for the full Sixth Circuit to hear the case en banc. The Sixth Circuit rejected this request in February 2005. Rule 13 of the United States Supreme Court Rules of Procedure requires the losing party in a case before a court of appeals to file a petition for a writ of certiorari within 90 days from the date the court of appeals enters its judgment, or from the date of the denial of a petition for rehearing in the court of appeals. The Sixth Circuit's judgment became final for all purposes when the 90-day period expired without Lexmark filing a cert petition. SCC hailed the finality of its victory by issuing a press release. Although SCC's press release suggested that the Supreme Court had actually refused to hear Lexmark's case, in fact no petition for certiorari had ever been filed.
[citation needed]
Concerning the copyrightability of the Toner Loading Program, Judge Feikens found that the record supported Lexmark's claim that the program could have been implemented in any number of ways, and therefore Lexmark's implementation was creative and copyrightable.
[25]
Judge Feikens agreed that the record was The Sixth Circuit's decision is noteworthy for at least two reasons. First, all three judges took pains to emphasize in their opinions that the DMCA must be interpreted consistently with the broader public purposes of the copyright statute, rather than as a grant of new powers to makers of technology products to impose additional restrictions not contemplated by copyright. Second, the case represents a rare defeat for large printer manufacturers like Lexmark, HewlettPackard and Epson in their ongoing battle with third-party ink sellers.
inadequate for the district court to conclude that the Toner Loading Program was a "lock-out code". But he noted that Lexmark's expert had testified that the entire Toner Loading Program process could be turned off by flipping a single bit in the chip's code, and that it should have been possible for SCC to discover this; so copying the program may not have been practically necessary to.
[26]
On the DMCA counts, Judge Feikens agreed that Lexmark had not established a violation with regards to the Toner Loading Program, but for a very different reason than that found by the majority opinion. Judge Feikens noted that SCC had testified that it had not even been aware that the Toner Loading Program existed; it had copied the data on the Lexmark printer chip (including the Toner Loading Program) purely in an attempt to bypass the protection on the Printer Engine Program. Since the DMCA requires that an infringer knowingly circumvent access controls on the protected program, SCC could not have knowingly circumvented protections on a program it did not know existed.
[27]
IQ Group V. Weisner DIGITAL MILLENNIUM COPYRIGHT ACT The Digital Millennium Copyright Act does not protect service marks because service marks do not come within the protections offered a copyright owner under the Act and to allow otherwise would blur the boundaries between trademark law and copyright law. A company provided advertising services for insurance companies by sending out advertisements to insurance agents by e-mail. A particular insurance company retained the advertising agency to send out e-mail advertisements to insurance agents. The agency prepared an ad which displayed the insurance companys logo and a hyperlink which, when clicked, directed the user to a page of the ad agencys website that contained copyrighted information.
Judge Feikens agreed with the majority opinion, but also noted his belief that the consumer had acquired the rights to access this program by purchasing the printer, and therefore the DMCA would not apply to attempts to access it. Request for a rehearing
[28]
Kelly v. Arriba The defendant Arriba Soft operated a visual search engine t hat allowed users to search for and retrieve images from the Internet. To provide this functionality, Arriba Soft developed a computer program that would crawl the Internet searching for images to index. It would then download full-sized copies of those images onto Arriba Softs server and generate lower resolution thumbnail-sized copies of the images. Once the thumbnails were created, the program deleted the full-sized originals from the server.
th
Petitioner 20th Century Fox Film Corporation sought the assistance of the NBI in conducting searches and seizures in connection with the NBIs anti -film piracy campaign. Petitioner alleged that certain videotape outlets all over Metro Manila are engaged in the unauthorized sale and renting out of copyrighted films in violation of PD No. 49 (the old Intellectual Property Law).
88 - Columbia Pictures Industries, Inc. v. Aveco, Inc. (1986) Facts: Columbia Pictures Industries are producers of motion pictures. They brought this copyright infringement action against Aveco, Inc. because Columbia alleges that Avecos business of renting video cassettes of motion pictures and renting rooms in which the videos may be viewed, violates their exclusive rights under the Copyright Act of 1976. The district court agreed with Columbia and held that Aveco had infringed Columbias exclusive rights to publicly perform and authorize public performances of their copyrighted works. It also permanently enjoined Aveco from
10
11
12
64 - Habana v. Robles (1999) Facts: Petitioners are authors and copyright owners of the published works, produced through their combined resources and efforts, entitled COLLEGE ENGLISH FOR TODAY (CET for brevity), Books 1 and 2, and WORKBOOK FOR COLLEGE FRESHMAN ENGLISH, Series 1. Respondent Felicidad Robles and Goodwill Trading Co., Inc. are the author/publisher and distributor/seller of another published work entitled DEVELOPING ENGLISH PROFICIENCY (DEP for brevity), Books 1 and 2 which book was covered by copyrights issued to them. In the course of revising their published works, petitioners, by chance, came upon the book of respondent Robles and upon perusal of said book they were surprised to see that the book was strikingly similar to the contents, scheme of presentation, illustrations and illustrative examples in their own book, CET. After an itemized examination and comparison of the two books (CET and DEP), petitioners found that several pages of the respondents book are similar, if not all
13
16 - Joaquin v. Drilon (1999) Facts: BJ Productions, Inc. (BJPI) is the holder of a Certificate of Copyright of a dating game show named Rhoda and Me. BJPI submitted to the National Library an addendum to its certificate of copyright specifying the shows format and style of presentation. While watching tv, Joaquin (President of BJPI) saw on RPN Channel 9 an episode of Its a Date! which is produced by IXL Productions (IXL). He wrote a letter to the President of IXL, Zosa, informing him that BJPI had a copyright to Rhoda and Me and demanding that Its a Date be discontinued. Both shows have the same substance because two matches are made between a male and a female, both single, and the two couples are treated to a night or two
14
15
16
17