Is a DMCA subpoena to identify unknown infringers valid if the infringement has ended?

The Digital Millennium Copyright Act (“DMCA”) is well-known for its notice and takedown provisions. But the DMCA provides a number of other interesting mechanisms, including a procedure for potential copyright plaintiffs to send subpoenas to online service providers to learn the identity of users who posted infringing content to that service. A recent case involving some subpoenas that a copyright owner sent to eBay examines the relationship between the notice and takedown procedures on one hand, and the subpoena mechanism on the other. The question before the court was whether a DMCA subpoena is valid if, by the time it is served on the online service provider, that online service provider has already removed or has disabled access to that content.

Section 512(h) (17 U.S.C. 512(h)) spells out the DMCA subpoena process, and how it relates to the notice and takedown provisions. An online service provider must act expeditiously to identify the user who uploaded infringing content “[u]pon receipt of the issued subpoena, either accompanying or subsequent to the receipt of a [takedown request].” That plain language seems straightforward — an online service provider has to provide the identifying information in response to any subpoena it receives either with or subsequent to a takedown notice.

But it was not so straightforward in a 2011 case, where some confusing facts made for some confusing law. In Maximized Living, Inc., v. Google, Inc., 2011 WL 6749017 (N.D. Cal. December 22, 2011), the copyright holder sent a subpoena to the online service provider after the copyright holder had sent a DMCA takedown notice. That would appear to comport with the statute — the subpoena came subsequent to the takedown notice. But the problem in that case was that the takedown notice was not valid. By the time it was sent, the alleged infringer had already removed the infringing content. From that, the Maximized Living case pronounced that “the subpoena power of §512(h) is limited to currently infringing activity and does not reach former infringing activity that has ceased and thus can no longer be removed or disabled.”

In the recent case of In re DMCA Subpoena to eBay, Inc., eBay, as the recipient of subpoenas to identify some of its users, picked up on the Maximized Living holding to argue that it did not have to answer the subpoenas because it had already taken down the offending content pursuant to previous takedown notices. Since the subpoenas did not relate to “currently infringing activity,” eBay argued à la Maximized Living, that the subpoenas had not been issued under §512(h)’s power and were therefore invalid.

The court rejected eBay’s argument. The key distinction in this case was that, unlike in Maximized Living, the takedown notices in this case, when they issued, related to content that was on the eBay servers at the time the takedown notices were issued. Granted, some of those takedown notices went all the way back to early 2012 (query whether the subpoena should be valid if it would only uncover the identity of an infringer for whom the 3-year copyright statute of limitations had passed; but that wasn’t before the court).

So to simply state the rule in this case — for a DMCA subpoena to be valid, it has to relate to a valid DMCA takedown notice. That DMCA takedown notice is not valid unless it was served at a time when infringing content resided on the service. An online service provider cannot avoid the obligation of responding to a subpoena by taking down the content, thereby causing there to be no “currently infringing activity”. Such a rule would, as the court observed, cause the online service provider’s safe harbor protection to also shield the alleged infringer from being identified. That would indeed be an odd application of the DMCA’s protection. The court in this case avoided that outcome.

In re DMCA Subpoena to eBay, Inc., 2015 WL 3555270 (S.D. Cal. June 5, 2015).

Evan Brown is a Chicago attorney helping clients in matters dealing with copyright, technology, the internet and new media. Call him at (630) 362-7237, send email to ebrown [at] internetcases dot com, or follow him on Twitter @internetcases

Photo courtesy of Flickr user Thomas Galvez under this Creative Commons license.

Microsoft letter to GitHub over DRM-free music software is not the first copyright-ironic action against an intermediary

TorrentFreak has reported that Microsoft demanded that GitHub take the code repository of an app that provides access to unprotected Xbox Music tracks. Some are calling it ironic, given that Microsoft is offering access to DRM-free music through its API.

The situation is reminiscent (though not legally identical) to the weirdness we observed way back in 2006 when YouTube asked TechCruch to take down a tool that allowed people to download video clips. We recognized early on that YouTube was a copyright renegade. So it was surprising that it would take such an aggressive tactic toward purveyors of software that would make use of copyrighted works easier.

The Microsoft of today is certainly not the YouTube of 2006. So naturally its interests are different. But comparing the two scenarios yields the common conundrum of how one company that wants to more smoothly make content available deals with other technologies and platforms that do the same thing, but cut out the main monetizing opportunity.

It could be a phenomenon of copyright’s outdatedness. Both YouTube and Microsoft took action against others who were distributing technologies that touched on infringement by means of making copies of the works. That will likely remain an important protection under copyright law even after meaningful reform. But what is really at stake is the right to access content. If that were a meaningful right under the Copyright Act, companies would be less likely to take enforcement actions that appear on the surface to be ironic.

Evan Brown is an attorney in Chicago advising clients on matters dealing with copyright, technology, the internet and new media.

Is the Aereo decision a setback for innovation?

One of the big questions preceding the Supreme Court’s decision in the Aereo case earlier this week was whether a holding against Aereo would put cloud services into such a legally precarious position that the innovation and investment climate would chill. While the decision clearly makes Aereo’s use of its technology illegal, one should not be too quick to foretell a drastic impact on all hosted services. Here are some reasons why.

What cloud?

Let’s be clear about what we mean by “the cloud” in this context. Aereo’s technical model – which the court found to infringe copyright – captured over-the-air television content using one tiny antenna per customer, transcoded that content into one copy per customer, which Aereo stored and then streamed on-demand to the customer. The court found that model bore an “overwhelming likeness to the cable companies targeted by the [1976 Copyright Act]” to an extent that Aereo was “for all practical purposes a traditional cable system.” Aereo’s technological attempts such as the one-copy-per-customer method that it used to distinguish itself from traditional cable services were immaterial to the court. Aereo looked like a cable company, so the court treated it as one, with all the copyright consequences that go along with that status.

Aereo was a cloud service inasmuch as it stored the TV content and served it to its users when those users initiated the performances. It was the cable-like functions that got it into trouble, not necessarily the cloud-provider functions. That arguably leaves the rest of what we consider cloud services – online collaboration tools, centralized communications systems, most hosted applications, and the like – outside the scope of the court’s decision. Most software-as-a-service models, whether to the consumer or at the enterprise level, are unlike cable systems and thus likely stand clear of the sweep of the Aereo sickle.

The technology could live on.

One must also be sure to recognize that the court’s decision did not kill the technology altogether, but instead killed the use of the technology in the hands of one who does not have ownership or license to the content being delivered. Since the court found that Aereo’s service was “substantially similar” to cable systems, Aereo, its successors, or other players in the space could look to monetize the technology while paying the compulsory licenses that Section 111 of the Copyright Act spells out in dizzying complexity. Or the broadcasters and other content stakeholders could acquire Aereo-like technology and use it to supplement the other means of content delivery currently at play. In either scenario, the needs for investment and innovation in providing infrastructure (as well as the need for clarity on network neutrality) remain firmly intact.

The real likely effect.

This is not to say that Aereo will have no effect on development of technology in areas outside the particular facts of the case. The court’s decision expands the class of online intermediaries who may be liable for direct copyright infringement. In that respect, the case differs from other important technology-provider copyright cases like the Betamax case, Grokster and the Cablevision case. In those cases, the main question before the courts was whether the providers were secondarily liable for the infringement committed by their users. In Aereo, however, the question was whether Aereo itself was liable for infringement committed by providing the technology to others. The Supreme Court held that Aereo was a direct infringer because its functionality so closely resembled a cable company.

So the court has given copyright plaintiffs some new, additional angles to consider when pursuing infringement litigation against technology providers. Does the technology so resemble the technical model of a cable delivery system, particularly from the perspective of the end user, such that it de facto publicly performs the works delivered by the system? If so, then the Aereo test forbids it. Moreover, the case fuzzies the relatively bright line that began to be drawn almost 20 years ago with Religious Technology Center v. Netcom, requiring that for an internet intermediary to be liable for direct infringement, it need undertake some volitional conduct in furtherance of the infringement. That fuzziness will no doubt embolden some plaintiffs who otherwise would not have seen the potential for a cause of action against future defendant-innovators.

In reality, few platforms are likely to actually get “Aereoed” in litigation. The ones at greatest risk will be those that facilitate access to streaming content provided by others. But the fact that ultimate liability may not lie against a provider will likely do little to stop aggressive copyright plaintiffs from trying out the theory against all forms of remote storage providers. That’s the problem Justice Scalia identified in his dissent when he said the decision “will sow confusion for years to come.” Let’s hope that’s mostly an overstatement.

Evan Brown is an attorney in Chicago advising clients on matters dealing with technology, the internet and new media.

No infringement means no injunction in software dispute

Former members of a limited liability company, who participated in the development of four pieces of software while a part of the company, sued the LLC and its remaining members for copyright infringement. Defendants moved for summary judgment, arguing that plaintiffs’ infringement claims must fail because defendants had not used the allegedly copyrighted software outside of the licensing agreements the LLC signed while plaintiffs were still with the company. The court granted defendants’ summary judgment motion.

Plaintiffs agreed that the software had not been used outside the license agreements with companies the LLC had entered while plaintiffs were with the company. But plaintiffs still sought injunctive relief with respect to their infringement claims.

To demonstrate copyright infringement, plaintiffs were required to prove “(1) ownership of a valid copyright, and (2) copying of constituent elements of the work that are original.” Feist Publ’ns, Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 362, 111 S.Ct. 1282, 113 L.Ed.2d 358 (1991)). In this case, plaintiffs essentially conceded that the second element of the Feist test was not met.

The court cited Arista Records, LLC v. Doe 3, 604 F.3d 110, 117 (2d. Cir.2010)) to note that in the second Feist element, “the word copying is shorthand for the infringing of any of the copyright owner’s five exclusive rights described in 17 U.S.C. § 106”. Those exclusive rights allow the owner to: (1) reproduce the copyrighted work; (2) prepare derivative works based upon the copyrighted work; (3) distribute copies of the copyrighted work; (4) perform the work publicly; and (5) display the copyrighted work. Because plaintiffs conceded that defendants had not used the software outside of the license agreements with its customers that were made while plaintiffs were still a part of the LLC, defendants had not infringed on plaintiffs purported exclusive rights.

Plaintiffs nevertheless claimed that they were entitled to injunctive relief to prevent defendants’ potential future use of the copyrighted software. Plaintiffs were required to show that: (1) they had suffered an irreparable injury; (2) that remedies at law were inadequate to compensate that injury; (3) that the balance of hardships warranted a remedy in equity in favor of plaintiffs; and (4) that the public interest would not be disserved by a permanent injunction.

Here, plaintiffs conceded that they had not suffered an injury – the copyrights had not been infringed. Instead, plaintiffs were arguing for a prospective injunction to prevent defendants from infringing upon a copyright for which there was no evidence defendants intended to infringe. The court denied the injunction, holding that a prospective injunction could be entered only on the basis of current, ongoing conduct that threatened future harm.

Brightharbour Consulting, LLC v. Docuconsulting, LLC, 2014 WL 1415186 (N.D.Ga. April 14, 2014)

Evan Brown is an attorney in Chicago, advising clients in technology transactions, intellectual property disputes, and other matters involving the internet and new media.

Unjust enrichment claim over unauthorized use of software was not preempted by the Copyright Act

preemptionThe Copyright Act is a federal law, and is drafted to “preempt” state laws that purport to give individuals rights that are “equivalent” to rights granted under the Copyright Act. The purpose of this preemption is to displace the effect of any equivalent state law, so that the federal framework gets to deal exclusively with copyright.

So when a plaintiff goes to court suing for copyright infringement and also adds a state law claim against the defendant based on the same underlying facts, defendants routinely move to dismiss that state law claim as preempted by the Copyright Act.

That is what happened in a recent case involving a plaintiff software developer who filed a copyright infringement case against a company for whom he had done some work. He added an “unjust enrichment” claim based on state law, which defendants moved to dismiss. But the court denied the motion, holding that in this situation, the unjust enrichment claim was not dealing with rights that were equivalent under the Copyright Act.

Plaintiff’s unjust enrichment claim was based on the fact that he had not been paid any money for the development work he provided to defendants. In other words, he delivered the copyrighted software, which defendants used without paying him. Sounds a lot like copyright infringement, doesn’t it? Or, more precisely, it sounds like the rights he was claiming were equivalent to those provided under the Copyright Act.

But the court held otherwise, namely, that plaintiff had pled an “extra element” that rendered his unjust enrichment claim to not be equivalent to rights under the Copyright Act.

The court drew an important distinction within the doctrine of unjust enrichment, between “implied-in-law” (quasi-) contracts, and “implied in fact” contracts. An implied-in-fact contract claim passes the threshold of having an “extra element” that defeats a preemption challenge, while an implied-in-law contract does not.

An implied-in-law contract is a “fictional” contract created by a court for equitable, not contractual, purposes. It is not an actual contract, but is a legal substitute formed to impose equity between two parties. An implied-in-fact contract, on the other hand, is indeed a contract that is agreed to by non-verbal conduct, rather than explicit words.

Infringement is the unauthorized use of a work, and a court applying an implied-in-law contract would simply be stepping in to remedy an injustice of that infringement. That is why an unjust enrichment claim based on an implied-in-law contract would be preempted. But the implied-in-fact contract has more to it – actual conduct (a factual reality) that is more than just the conduct of the infringement that took place. That is why an implied-in-fact contract claim of unjust enrichment passes the no-preemption test.

(Compare this to the 2010 case of Christen v. Iparadigms that dealt with Turnitin.com.)

Mahavisno v. Compendia Bioscience, Inc., 2014 WL 340369 (E.D.Mich. January 30, 2014)

Co-founder liable for sending company’s social media followers to new competing company’s Facebook page

2261434057_87ddea278a_zThe owners of an LLC successfully published a magazine for several years, but the business declined and the company eventually filed bankruptcy. While the bankruptcy proceedings were still underway, one of the owners started up a new magazine publishing the same subject matter. He essentially took over the old company’s website to promote the new magazine. And he posted to the LLC’s Facebook page on three separate occasions, “reminding” those who liked the page to instead like his new company’s Facebook page.

The bankruptcy trustee began an adversary proceeding against the owner asserting, among other things, breach of fiduciary duty, unfair trade practices, and copyright infringement. The bankruptcy court held a trial on these claims and found the owner liable.

On the breach of fiduciary duty claim, the court equated the “reminding” of Facebook users to visit and like the new company’s Facebook page was equivalent to using the company’s confidential information. Similarly, as for the unfair trade practices claim (under the Louisiana Unfair Trade Practices Act), the court found that social media is “an important marketing tool,” and held that “taking away followers of [the old company] and diverting them to [the Facebook page of the new company]” was an unfair trade practice.

On the copyright infringement claim, the court found that the images and articles on the website belonged to the old company under the work made for hire doctrine and that the owner had not obtained consent nor paid compensation for their use in connection with the new enterprise.

In re Thundervision, L.L.C., 2014 WL 468224 (Bkrtcy.E.D.La. February 5, 2014)

Photo credit: Flickr user 1lenore under this Creative Commons license.

Must a service provider remove all content a repeat infringer uploaded to qualify for the DMCA safe harbor?

459px-Enjoy_Don't_DestroyDoes an online service provider forfeit the safe harbor protections of the Digital Millennium Copyright Act if, when terminating the account of a repeat infringer, it does not delete all content the repeat infringer uploaded — infringing and noninfringing alike? A recent decision involving the antique internet technology Usenet sheds light on an answer.

Active copyright plaintiff Perfect 10 sued Usenet provider Giganews for direct and secondary liability for hosting allegedly infringing materials on the Giganews servers. Giganews asserted the safe harbor of the DMCA (17 U.S.C. 512) as an affirmative defense. Perfect 10 moved for summary judgment on whether the safe harbor applied – it argued that the safe harbor did not apply, Giganews argued that it did. The court denied Perfect 10’s motion.

Perfect 10 asserted that Giganews had not reasonably implemented a policy to terminate the accounts of repeat infringers as required by 17 U.S.C. 512 (i)(1)(A). One of the arguments Perfect 10 made was that Giganews did not reasonably implement its repeat infringer policy because Giganews terminated the accounts of the infringers but did not also delete all the content the infringers had uploaded.

The court was not persuaded that § 512(i)(1)(A) requires a service provider to disable or delete all content a repeat infringer has ever posted. The plain language of the statute requires “termination … of subscribers and account holders,” not the deletion of content. And because a requirement of taking down all content, not just infringing content, would serve no infringement-preventing purpose, the court held that there was no justification for reading such a requirement into the statute.

Perfect 10, Inc. v. Giganews, Inc., — F.Supp.2d —, 2014 WL 323655 (C.D.Cal. January 29, 2014)

No copyright protection for two word phrase

quipIn a final pretrial order, plaintiff stated that “to this day [defendant] persists in using [plaintiff’s] copyrighted ‘usurpassed performance’ language on its packages.” Defendant filed a motion in limine (a motion to exclude evidence) to preclude plaintiff from introducing evidence or putting on testimony that would infer or suggest the phrase “unsurpassed performance” has been registered as a copyright.

The court granted the motion.

Under the Copyright Act, “[w]ords and short phrases such as names, titles, and slogans” are not subject to copyright. 37 C.F.R. § 202.1(a). The court looked to a number of cases in which short phrases had been denied copyright protection. For example, other courts had held that “Where Words Come Alive,” “Earth Protector,” “Chipper,” and “Retail Plus” were not copyrightable material.

One wonders whether plaintiff was really trying to assert some form of unfair competition or trademark infringement. The notion is worth entertaining for but a brief moment, till one realizes that laudatory phrases such as “unsurpassed performance” find no protection under trademark law either.

Predator International, Inc. v. Gamo Outdoor USA, Inc., 2014 WL 321069 (D.Colo. January 29, 2014)

No copyright liability against founder of competing company for overseeing development of infringing website

oversightAfter defendant left plaintiff’s employment to co-found a competing company, plaintiff sued defendant personally for copyright infringement based on the new company’s website’s resemblance to plaintiff’s website. The infringement theory was interesting – plaintiff alleged that defendant did not commit the infringement himself, but that he was secondarily liable for playing a significant role in the direct infringement by the new company’s employees.

Defendant moved to dismiss the copyright infringement claim. The court granted the motion.

There are two types of secondary copyright infringement liability: contributory liability and vicarious liability. A defendant is a contributory infringer if it (1) has knowledge of a third party’s infringing activity, and (2) induces, causes, or materially contributes to the infringing conduct. See Perfect 10, Inc. v. Visa Int’l Service Ass’n, 494 F.3d 788, 795 (9th Cir.2007) (quoting Ellison v. Robertson, 357 F.3d 1072, 1076 (9th Cir.2004)). In the context of copyright law, vicarious liability extends beyond an employer/employee relationship to cases in which a defendant has the right and ability to supervise the infringing activity and also has a direct financial interest in such activities. A & M Records, Inc. v. Napster, Inc., 239 F.3d 1004, 1022 (9th Cir.2011) (quoting Fonovisa, Inc. v. Cherry Auction, Inc., 76 F.3d 259, 262 (9th Cir.1996)).

In this case, the court held that plaintiff had not alleged enough detail to state a claim of secondary liability against defendant. Instead, the complaint simply recited the elements of contributory and vicarious liability. Specifically, plaintiffs failed to allege:

  • That defendant was uniquely in possession of the original material on plaintiff’s website, but rather plaintiffs alleged that the material was publically available on the website for anyone to read and copy.
  • How defendant, as a non-employee (but founder) of the new company, was personally responsible for the content of the new company’s website. (Interestingly, the court held it was not sufficient to allege that defendant was a founder of the new company. Although plaintiffs alleged some factual details about what was actually copied from plaintiff’s website, they alleged no factual details as to defendant’s personal involvement in the infringement.)
  • Facts that suggested that defendant induced the new company to infringe plaintiff’s website.
  • Facts that suggested that defendant had the right to control and supervise the new company’s employees who were involved in the alleged infringement.

Plaintiff’s attempts to impose secondary liability were (if they had worked) a clever method for accomplishing the same objective as piercing the corporate veil. Granular control by the individual founder could be equated with the “alter ego” aspect of the veil-piercing analysis. The absence of such specific control by the individual defendant, however, left the possibility of liability only with the company.

BioD, LLC v. Amnio Technology, LLC, 2014 WL 268644 (D.Ariz. January 24, 2014)

Does publication on the web give rise to “access” in copyright infringement analysis?

2003lookbackPlaintiff sued defendant for copyright infringement. Defendant moved for judgment on the pleadings (which is essentially the same thing as a motion to dismiss for failure to state a claim except it is after defendant files an answer). Defendant asserted that plaintiff had not pled copyright infringement because under the Seventh Circuit’s “substantial similarity” test to demonstrate infringement, plaintiff had not pled defendant had “access” to the allegedly infringed work.

The court rejected defendant’s argument and denied the motion for judgment on the pleadings on this issue.

In some copyright infringement cases, a plaintiff may not have direct evidence that the defendant committed infringement. In those situations, a finder of fact may infer that infringement has occurred when it is shown that:

  • the defendant had access to the copyrighted work; and
  • the accused work is substantially similar to the copyrighted work.

In this case, defendant argued it never had access to plaintiff’s designs that it was alleged to have infringed. But the court considered the online publication, 11 years ago, of plaintiff’s designs, to find access for purposes of the motion for judgment on the pleadings:

With regard to online publication, in 2003, [plaintiff] first published the [allegedly infringed work] at [its website]. The Internet already was widely used and accessible at that time. Because the non-movant is entitled to reasonable favorable inferences in evaluating a motion for judgment on the pleadings, the online publication is enough to establish access for purposes of denying [defendant’s] motion for judgment on the pleadings.

The court’s decision provides no meaningful analysis as to why publication on the web gives rise to access. It states the finding above in such a conclusory manner as if to indicate it sets forth some per se rule. But one is left to wonder whether other factual nuance would change the answer to the inquiry: What if publication were in 1993 rather than 2003, at a time when many, many fewer people were on the web? What if the publication were behind a paywall for which defendant had no authorization to pass? What if defendant pled it did not utilize the web for this sort of information, or, even more compellingly, not at all?

Skyline Design, Inc. v. McGrory Glass, Inc., 2014 WL 258564 (N.D.Ill. January 23, 2014)

Scroll to top