Copyright infringement

From Wikipedia, the free encyclopedia

"Copyvio" redirects here. For the Wikipedia term, see Wikipedia:Copyvio.
The Cathach of St. Columba, a seventh century book of psalms.  Tradition cited it as the book whose illicit transcription by Saint Columba in 560 AD led to the overturn of an Irish copyright ruling by force of arms.[citation needed]
The Cathach of St. Columba, a seventh century book of psalms. Tradition cited it as the book whose illicit transcription by Saint Columba in 560 AD led to the overturn of an Irish copyright ruling by force of arms.[citation needed]
An advertisement for copyright and patent preparation services from 1906, when copyright registration formalities were still required in the US.
An advertisement for copyright and patent preparation services from 1906, when copyright registration formalities were still required in the US.

Copyright infringement (or copyright violation) is the unauthorized use of material that is covered by copyright law, in a manner that violates one of the copyright owner's exclusive rights, such as the right to reproduce or perform the copyrighted work, or to make derivative works.

Contents

[edit] The term "piracy"

The practice of labeling the act of infringement as "piracy" actually predates copyright itself. Even prior to the 1709 enactment of the Statute of Anne, generally recognized as the first copyright law, the Stationers' Company of London in 1557 received a Royal Charter giving the company a monopoly on publication and tasking it with enforcing the charter. Those who violated the charter were labeled pirates as early as 1603.[1]

For electronic and audio-visual media, unauthorized reproduction and distribution is occasionally referred to as piracy or theft (an early reference was made by Alfred Tennyson in the preface to his poem "The Lover's Tale" in 1879 where he mentions that sections of this work "have of late been mercilessly pirated").

The legal basis for this usage dates from the same era, and has been consistently applied until the present time.[2][3] Critics of the use of the term "piracy" to describe such practices contend that it unfairly equates copyright infringement with more sinister activity, though courts often hold that under law the two terms are interchangeable.[4]

[edit] Examples of copyright infringement

The unlawful downloading of copyrighted material and sharing of recorded music in the form of MP3 and other audio files is more prominent than ever[citation needed], even after the demise of Napster and a series of infringement suits brought by the American recording industry. Promotional screener DVDs distributed by movie studios (often for consideration for awards) are a common source of unauthorized copying when movies are still in theatrical release, and the MPAA has attempted to restrict their use. Movies are also still copied by someone sneaking a camcorder into a movie theater and secretly taping the projection (also known as "CAM"), although such copies are often of lesser quality than copied versions of the officially released film. Sharing copied music is legal in many countries, such as Canada, and parts of Europe, provided that this information is neither advertised, nor that the songs be sold.

Bootleg recordings are musical recordings that have not been officially released by the artist or their associated management or production companies. They may consist of demos, outtakes or other studio material, or of illicit recordings of live performances. Music enthusiasts may use the term "bootleg" to differentiate these otherwise unavailable recordings from "pirated" copies of commercially released material, but these recordings are still covered by copyright despite their lack of formal release, and their distribution is still against the law.[citation needed]

The illegal use of text content is a form of copyright infringement. It is common on the world wide web for text to be copied from one site to another without consent of the author. Roberta Beach Jacobson criticizes the misappropriation of writers' work by websites in her article Copyrights and Wrongs. This article was added to articlestree.com[5] on November 27, 2001; ironically, it has since been copied to hundreds of websites,[6] many of them claiming copyright over the work or charging money to access it.

Joke thievery, or "hacking" is a form of copyright infringement that has gone largely unnoticed by laymen, but has long been an issue for professional comics and comedic writers who have had no legal recourse other than personal enmity to enforce their claims [7]. In recent years, many notable comics have spoken out publicly regarding the practice of joke theft. Steven Rosenthal and Steve Silberberg have published a "Guide to Hack" to help new comics avoid Joke theft [8], which references (and gives credit to) an earlier work on the same subject by Andy Kindler called, "the Hacks Handbook"[9]

[edit] Sample Troll

Recently, certain companies have been purchasing portfolios of old music copyrights for the express purpose of enforcing those rights when a musician samples said old music for a new composition. These companies have been referred to by the pejorative term "Sample Troll." Their role in copyrights is seen to be analogous to the role of so called patent trolls in the patent arena.[10]

[edit] Worldwide collaboration to fight copyright infringement

Servers enabling internet-based copyright infringement are often based in countries with less strict copyright laws or enforcement history.[11][12][13] BPI spokesman Matt Phillips has said the lax copyright laws in Eastern Europe and the post-Soviet countries made it hard to crack down on copyright infringement there.[14] Copyright holders are collaborating to fight this activity, through lobbying governments and other means.

  • Russia agrees with U.S. request to shut down allofmp3.com.[15]
  • China signs Memorandum of Understanding to help fight online copyright infringement with US Media Association.[16]

[edit] Legality

A short information film included on many DVDs equates copyright infringement with theft.
A short information film included on many DVDs equates copyright infringement with theft.
Two "strikingly similar" plush toys; infringement established.  Appendix page 1 Ty, Inc. v. GMA Accessories, Inc. 132 F.3d 1167, 1174 (7th Cir. 1997).
Two "strikingly similar" plush toys; infringement established. Appendix page 1 Ty, Inc. v. GMA Accessories, Inc. 132 F.3d 1167, 1174 (7th Cir. 1997).

The most important international treaty concerning copyright infringement is the Berne Convention of 1886 as amended. The United States became the 80th signatory of the treaty with the Berne Convention Implementation Act of 1988, over 100 years after the passage of the original treaty in Paris. The US signed the treaty with one important exception: it did not accept the recognition of moral rights in article 6 of the Berne Convention. Moral rights enable a copyright holder to "object to any distortion, mutilation, or other modification of, or other derogatory action in relation to, the said work, which would be prejudicial to his honor or reputation."[17] The US expressly stated in the Implementation Act that no other right (i.e. the 1st Amendment) shall be impacted by acceptance of the Convention. Literary criticism and parody are important parts of the US infringement defense of fair use. Consequently, the US provides less protection from infringement of moral rights than other Berne signatories.

In most jurisdictions, copyright infringement may be established by reproduction of the copyrighted work. This reproduction can often be shown by the presence of an unauthorized electronic copy of the work on a server. However, should the server file be secured, and not available to public access, infringement can be avoided by legitimate holders under the pre-tences of a "backup".

[edit] The infringement suit in American law

U.S. law requires a copyright holder to establish ownership of a valid copyright and the copying of constituent elements of the work that are original.[18] Assuming the plaintiff proves ownership of a valid copyright, the holder must then establish both actual copying and improper appropriation of the work. The burden lies with the plaintiff to establish these three elements in what is known as the prima facie case for infringement.

[edit] First element: establishing ownership of a valid copyright

A plaintiff establishes ownership by authorship (by the plaintiff itself or by one who assigned rights to the plaintiff) of (1) an original work of authorship that is (2) fixed in a tangible medium (e.g. a book or musical recording). Registration is not required for copyright itself, but in most cases is a jurisdictional requirement to bring the suit. Registration is also useful because it gives rise to the presumption of a valid copyright, and eliminates the innocent infringement defense, and (if timely made) it allows the plaintiff to elect statutory damages, and be eligible for a possible award of attorney fees.

Works that are not sufficiently original, or which constitute facts, a method or process cannot enjoy copy protection.[19]. U.S. Courts do not recognize the "sweat of the brow" doctrine, which originally allowed protection for those who labored to collect and organize facts. To combat this, business which assemble databases of information have relied on contract law where copyright law offers no protection.[20] For a work to be original, it must possess a "modicum of creativity", which is a "low threshold" although some creativity must exist.[21]

Copyright protects the fixed expression of ideas, but not the ideas themselves.[22] (Ideas are protected by patents). Nevertheless, an expression must exist in a fixed tangible medium.[23] A movie script writer who discusses a plot idea which has not yet been written would not be protected if another heard his idea and wrote a screenplay himself. Whether RAM constitutes a "fixed medium" is a contentious issue in copyright litigation because of the transitory nature of RAM.[24]

[edit] Second element: establishing actual copying

A plaintiff establishes actual copying with direct or indirect evidence. Direct evidence is satisfied either by a defendant's admission to copying or the testimony of witnesses who observed the defendant in the act. More commonly, a plaintiff relies on circumstantial or indirect evidence. A court will infer copying by a showing of a "striking similarity" between the copyrighted work and the alleged copy, along with a showing of both access and use of that access.[25] A plaintiff may establish access by proof of distribution over a large geographical area, or by eyewitness testimony that the defendant owned a copy of the protected work. Access alone is not sufficient to establish infringement. The plaintiff must show a similarity between the two works, and the degree of similarity will affect the probability that illicit copying in fact occurred in the court's eyes.[26] Even then, the plaintiff must show that the copying amounted to improper appropriation. Indeed, the US Supreme Court has held that not all copying constitutes infringement and a showing of misappropriation is necessary.[27]

[edit] Third element: establishing misappropriation

A copyrighted work may contain elements which are not copyrightable, such as facts, ideas, themes, or content in the public domain. A plaintiff alleging misappropriation must first demonstrate that what the defendant appropriated from the copyrighted work was protectible. Second, a plaintiff must show that the intended audience will recognize substantial similarities between the two works. The intended audience may be the general public, or a specialized field. The degree of similarity necessary for a court to find misappropriation is not easily defined. Indeed, "the test for infringement of a copyright is of necessity vague."[28] Two methods are used to determine if unlawful appropriation has occurred: the subtractive method and the totality method.

The subtractive method, also known as the "abstraction/subtraction approach" seeks to analyze what parts of a copyrighted work are protectible and which are not.[29] The unprotected elements are subtracted and the fact finder then determines whether substantial similarities exist in the protectible expression which remains. For instance, if the copyright holder for West Side Story alleged infringement, the elements of that musical borrowed from Romeo and Juliet would be subtracted before comparing it to the allegedly infringing work because Romeo and Juliet exists in the public domain.

The totality method, also known as the "total concept and feel" approach takes the work as a whole with all elements included when determining if a substantial similarity exists.[30] The individual elements of the alleged infringing work may by themselves be substantially different from their corresponding part in the copyrighted work, but nevertheless taken together be a clear misappropriation of copyrightable material.[31]

Modern courts may sometimes use both methods in its analysis of misappropriation.[32] In other instances, one method may find misappropriation while the other would not, making misappropriation a contentious topic in infringement litigation.[33]

[edit] Defenses to infringement

A defendant in an infringement action may rebut the presumption of copying by a showing of independent creation. It is possible for an author to create a work independently while bearing similarities to another. If access is not established, there is no copying, even if there is a striking similarity between the two works.[34] For this reason, corporations will destroy or return unsolicited mailings from authors as a policy.[35]

The legal doctrine of de minimis non curat lex, "the law does not care about trivial things," provides a de minimis copying defense against infringement. When the plaintiff establishes only a trivial use of the copyrighted work by the defendant, there is no infringement. For example, an out-of-focus copyrighted picture appearing only momentarily in the background of a commercial is not infringement.[36] The Beastie Boys successfully used this defense in a lawsuit over the use of three musical notes in the song "Pass the Mic."[37] The Beastie Boys had obtained a license to use the recording, but the rights to the song itself were retained by the original composer (copyrights can be divided). The court held that use of three notes was not a sufficient use and amounted to de minimis copying. However, the Sixth Circuit has held that the de minimis defense is not available for the sampling of sound recordings because of their intrinsic value in saving the sampler time and costs in hiring musicians to perform the music however short.[38]

The two most important defenses to copyright infringement are the first sale doctrine and fair use.

The first sale doctrine is a defense to infringement of the distribution right. It permits a lawful purchaser of a copyrighted work to resell or otherwise dispose of it. This, however, is not a defense to the reproduction right.

Fair use is an affirmative defense, but its application will vary greatly depending on the facts and circumstances of the case. Courts apply a four part balancing test examining the scope of infringement, the effect on the copyright owner's rights (e.g. his or her ability to sell the work), the amount of the work copied, and the purpose of the infringement. Courts have held that a non-commercial use is not fair use when it has a substantial market effect. In cases with a small-scale impact, courts are more receptive to arguments regarding the effect on the copyright owner's market or potential market.

[edit] Amendments to the 1976 Copyright Act

With the passage of the so-called No Electronic Theft Act (NET Act), US copyright law was changed to allow for the civil and criminal prosecution of persons allegedly engaged in copying of copyrighted works without permission that did not result in personal financial gain; historically, the criminal copyright law required infringement to be for financial gain. Among other things, the NET Act altered the definition of financial gain to include bartering and trading. In addition, under this US law, members of software piracy groups could also be prosecuted for participation in a criminal enterprise.

[edit] British law

In British Law, any modification of data stored on a computer so that unauthorised access is gained to software packages, games, movies, and music would be a criminal offence under §3 Computer Misuse Act 1990. So, if a read-only music CD is placed in a PC drive and the contents loaded into the computer's memory for playing, any application that allows the music to be copied and stored on the machine or an MP3 player would commit the offence in theory but, so far, there have been no prosecutions on this set of facts. More generally, §16 and 20 Copyright, Designs & Patents Act 1988 (as amended by the Copyright, however this does grant the right to create backup copies of software, so that the original can be kept safe from damage, technically meaning companies must provide either additional discs or the means to overcome any copy protection. and Trade Marks (Offences and Enforcement) Act 2002) cover copyrighted materials, and people who distribute and download copyrighted recordings without permission are liable to face civil actions for damages and penalties (the largest to date is £6,500, or $12,120.55). As in the United States, the enforcement agencies were able to identify the IP addresses and the ISPs were obliged to disclose the name and address of the owner of each such internet account but legislation was passed recently so that it isn't compulsory to hand over the information.[citation needed]

A 2006 survey carried out for the National Consumer Council indicated that over half of British adults infringe copyright law by copying and ripping music CDs, with 59% stating a belief that copying for personal use is legal.[39] However, ripping music from CDs to another format, such as MP3, is currently illegal. In 2006 The Institute for Public Policy Research called for a "public right to copy".[40] In January 2008 the government proposed changes to copyright law that would legalise copying for personal use.[41]

[edit] Criminal offences

For the most part, the criminal law is only used for commercial copyright infringement with one exception[citation needed], and an offence is committed when knowing or reasonably suspecting that the files are illegal copies[citation needed], and without the permission of the copyright owner, a person:

  • makes unauthorised copies e.g. burning music files or films on to CD-Rs or DVD-Rs;
  • distributes, sells or hires out unauthorised copies of CDs, VCDs and DVDs;
  • on a larger scale, distributes unauthorised copies as a commercial enterprise on the internet;
  • possesses unauthorised copies with a view to distributing, selling or hiring these to other people;
  • while not dealing commercially, distributes unauthorised copies of software packages, books, music, games, and films on such a scale as to have a measurable impact on the copyright owner's business;
  • publishing someone else's original copy work and claiming you have made it. (This is known as plagiarism and is completely different from copyright infringement, but laws concerning it come under the section of copyright law in some countries);
  • certain copyrights allow Archival copies of software to be made however these are not to be distributed.

The penalties for these "copyright infringement" offences depend on the seriousness of the offences:

  • before a magistrates' Court, the penalties for distributing unauthorised files are a maximum fine of £5,000 and/or six months imprisonment;
  • in the Crown Court, the penalties for distributing unauthorised files are an unlimited fine and/or up to 10 years imprisonment.

Also note §24 Copyright and Related Rights Regulations 2003 which creates a range of offences relating to the distribution of any device, product or component which is primarily designed, produced, or adapted for the purpose of enabling or facilitating the circumvention of effective technological measures. When this is for non-commercial purposes, it requires there to be a measurable effect on the rights holder's business.

[edit] See also

For a substantial discussion of copyright infringement in the domain of computer programs, see copyright infringement of software.

[edit] References

  1. ^ T. Dekker Wonderfull Yeare 1603 http://www.uoregon.edu/~rbear/yeare.html
  2. ^ See Berne Copyright Convention, 1886: "Pirated works may be seized on importation into those countries of the Union where the original work enjoys legal protection." (Art. 12).
  3. ^ See also Massachusetts Circuit Court Folsom v. Marsh, 1841: "If so much is taken, that the value of the original is sensibly diminished, or the labors of the original author are substantially to an injurious extent appropriated by another, that is sufficient, in point of law, to constitute a piracy pro tanto."
  4. ^ For example, see Dowling v. United States, 473 U.S. 207 (1985), et al.
  5. ^ Jacobson, Roberta Beach (2001-11-27). Copyrights and Wrongs. www.articlestree.com. Retrieved on 2007-04-07.
  6. ^ Results 1 - 10 of about 371 for "Roberta Beach Jacobson" "Copyrights and Wrongs". www.google.com. Retrieved on 2007-04-07.
  7. ^ Getlin, Larry (2007-02-14). Take the Funny and Run.
  8. ^ The Complete Guide To Hack Stand-Up Comedy
  9. ^ NATIONAL LAMPOON February 1991 pp. 34-36
  10. ^ Wu, Tim. "Jay-Z Versus the Sample Troll", slate.com, 2006-11-16. Retrieved on 2007-02-05. 
  11. ^ Isenberg, Doug. "Is this the way to fight copyright infringement?", News.com, 2002-09-04. Retrieved on 2007-02-05. 
  12. ^ "'Korean Wave' piracy hits music industry", BBC, 2001-11-09. Retrieved on 2007-02-05. 
  13. ^ "Pakistan - copyright piracy hub", BBC, 2005-05-03. Retrieved on 2007-02-05. 
  14. ^ "Music piracy in UK soars", BBC, 2002-12-18. Retrieved on 2007-02-05. 
  15. ^ Natali Del Conte. "Russia Agrees To US Request To Shut Down AllofMP3.com", TechCrunch, 2006-11-28. Retrieved on 2007-02-05. 
  16. ^ IPTV Guy. "Chinese Government promises to help fight online piracy", Web TV Wire. Retrieved on 2007-02-05. 
  17. ^ see Berne Convention Article 6, bis
  18. ^ see Feist v. Rural Telephone 499 U.S. 340, 361 (1991)
  19. ^ see Feist v. Rural Telephone 499 U.S. 340 (1991) (holding that an arrangement of telephone numbers in alphabetical order was not sufficiently original to garner copyright protection)
  20. ^ see e.g., ProCD, Inc. v. Zeidenberg, 86 F.3d 1447 (7th Cir. 1996) (holding that a software license agreement was not preempted by copyright law and could legally restrain the purchaser of a database from copying under contract law).
  21. ^ Feist at 346.
  22. ^ see Baker v. Selden, 101 U.S. 99 (1880)
  23. ^ see Midway Manufacturing Co. v. Artic International, Inc. 574 F.Supp. 999, aff'd, 704 F.2d 1009 (7th Cir 1982) (holding the computer ROM of Pac Man to be a sufficient fixation even though the game changes each time played.)
  24. ^ see Mai Systems Corp. v. Peak Computer Inc., 991 F.2d 511 (9th Cir. 1993) (program in RAM memory a fixation).
  25. ^ see Ty, Inc. v. GMA Accessories, Inc. 132 F.3d 1167 (7th Cir. 1997).
  26. ^ Id. 132 F.3d 1167
  27. ^ see Feist at 361
  28. ^ Judge Learned Hand, Peter Pan Fabrics, Inc. v. Martin Weiner Corp., 274 F.2d 487, 489 (2nd Cir. 1960).
  29. ^ see Nichols v. Universal Pictures Corp., 45 F.2d 119 (2nd Cir. 1930)
  30. ^ see Roth Greeting Cards v. United Card Co., 429 F.2d 1106 (9th Cir. 1970).
  31. ^ see Sid & Marty Krofft Television Productions, Inc. v. McDonald's Corp., 562 F.2d 1157 (9th Cir. 1977) (holding that a series of McDonald's commercials portraying "McDonaldland" had used as its basis the "H.R. Pufnstuf" television show. Corresponding characters to each, while displaying marked differences, taken altogether demonstrated that McDonald's had captured the total concept and feel of the show and had thus infringed).
  32. ^ see Castle Rock Entertainment, Inc. v. Carol Publishing Group, 150 F.3d 132, 140 (2nd Cir. 1998).
  33. ^ see Computer Associates International, Inc. v. Altai, Inc., 982 F.2d 693, (2nd Cir. 1992) (where court chose the subtraction method for two computer programs whose total concept were the same. Individual copied elements of the program were non-protectible material because they constituted a process or idea in the program, their utilitarian aspects barring copyright protection; no infringement found).
  34. ^ see Selle v. Gibb 741 F.2d 896 (7th Cir. 1984) (court held no infringement in The Bee Gees' song, "How Deep is Your Love" despite similarity to the melody of an unreleased song from an unknown composer).
  35. ^ see Takeall v. Pepsico, Inc., 14 F.3d 596 (4th Cir. 1993)(unpublished opinion; brief of appellee page 9) (Ventriloquist performer who coined phrase "You got the right one, uh-huh" sued PepsiCo over similar phrase in Ray Charles commercials. Performer had sent an unsolicited promotional package to Pepsi, which was not forwarded to marketing executives).
  36. ^ Gordon v. Nextel Communications 345 F.3d 922 (6th Cir.).
  37. ^ Newton v. Diamond 388 F.3d 1189 (9th Cir. 2004)
  38. ^ Bridgeport Music, Inc. v. Dimension Films 410 F.3d 792, 802 (6th Cir. 2005)
  39. ^ Shake-up 'absurd' copyright laws, says NCC. National Consumer Council (2006-05-11).
  40. ^ "Copying own CDs 'should be legal'", BBC News, 2006-10-29. 
  41. ^ "Copying CDs could be made legal", BBC News, 2008-01-08. 

[edit] External links