The Intellectual Property Renaissance in Cyberspace: Why Copyright Law Could Be Unimportant on the Internet

Eric Schlachter

12 Berkeley Tech. L. J. 15 (1997)

[footnotes omitted]

 

INDEX

I. INTRODUCTION *

II. UNITED STATES COPYRIGHT LAW BASICS *

III. THREATS TO ENFORCING COPYRIGHT RIGHTS ON THE INTERNET *

A. No Loss of Quality In Reproduction *

B. No Meaningful Marginal Costs of Reproduction or Distribution *

C. Ability to Act Anonymously *

D. Uneducated Users *

E. Conclusion *

IV. ECONOMICS AND THE INTERNET *

A. Price-Setting Behavior in a Nearly Efficient Marketplace When Marginal Costs Are Meaningfully Zero *

1. MARGINAL COSTS ON THE INTERNET *

2. OPTIMAL PRICING *

B. Cross-subsidization of Intellectual Property Creation *

1. ADVERTISING *

2. SPONSORSHIPS *

3. "TRY BEFORE YOU BUY" *

4. SALES OF UPGRADES *

5. SALE OF COMPLEMENTARY TECHNOLOGY *

6. SALES OF PHYSICAL GOODS *

7. SALES OF SERVICES *

8. PERSONAL INFORMATION COLLECTION AND DATA MINING *

9. COMMUNITIES *

10. REINFORCEMENT OF PHYSICAL-SPACE MESSAGES *

C. Importance of Attribution *

D. Conclusion *

V. SOCIOLOGY OF THE INTERNET *

A. Attitudes Towards Intellectual Property *

1. INFORMATION WANTS TO BE FREE *

2. RIGHT OF ATTRIBUTION *

3. LIMITED USE OF WORKS SUBJECT TO COPYRIGHT *

4. MORAL RIGHTS *

5. STRONG INTELLECTUAL PROPERTY RIGHTS *

B. Internet Culture and Micro-Infringements *

C. Conditioning to Expect Freebies *

VI. TECHNOLOGIES AND METHODS FOR CONTROLLING INTELLECTUAL PROPERTY *

A. Pre-Infringement *

1. LIMITED FUNCTIONALITY *

2. DATE BOMB *

3. COPY PROTECTION *

4. ENCRYPTION ENVELOPES *

5. CONTRACTS *

B. Metering *

1. ACCESS CODES *

2. RIGHTS-MANAGEMENT ENVELOPES *

3. HARDWARE DEVICES *

4. DOWNLOADABLE EXECUTABLES *

5. CENTRALIZED COMPUTING *

6. DIGITAL CERTIFICATES *

7. COPYRIGHT CLEARINGHOUSES *

8. SALE OF PHYSICAL COPIES *

C. Post-Infringement *

1. AGENTS *

2. STEGANOGRAPHY *

3. COPYRIGHT LITIGATION *

D. Additional Problems Under Copyright Law Possibly Solvable by Technology *

1. LINKING *

2. CACHING *

E. Is Technology a Substitute for Copyright Law? *

VII. CONCLUSION *

 

I. INTRODUCTION

 

Influential futurist Ithiel de Sola Pool wrote:

For copyright, the implications [of electronic publishing] are fundamental. Established notions about copyright become obsolete, rooted as they are in the technology of print. The recognition of a copyright and the practice of paying royalties emerged with the printing press. With the arrival of electronic reproduction, these practices become unworkable. Electronic publishing is analogous not so much to the print shop of the eighteenth century as to word-of-mouth communication, to which copyright was never applied.

 

The emergence of electronic networks has undeniably placed significant pressure on our existing intellectual property system. As with each new technological advance, copyright law must adjust to fit the new circumstances presented by the Internet. Until law and technology reach an equilibrium, many predict that intellectual property creators will be reluctant to create works for the Internet environment since creators will be unable to protect their copyright interests. Others have argued that only minor adjustments are necessary to fit copyright law to electronic networks such as the Internet. Still others--a distinct minority--believe that copyright law has become less important in the age of electronic networks, and that production of intellectual property will continue unabated even without powerful copyright rights.

 

Unlike Professor Pool, we have the benefit of a few years of empirical evidence to draw upon in analyzing the effects of electronic networks on intellectual property. This article analyzes some of the lessons we have learned in the commercial Internet's toddler years to glean some insights into the implications for copyright law and Internet-based commerce. After analyzing recent economic, business, sociological and technological developments, this article concludes that, while copyright law has a role to play on the Internet, other developments overshadow copyright law as a tool for conforming behavior such that copyright law may be unimportant to the Internet. The public policy implications are clear: the business models, sociology and technology of the Internet are evolving so rapidly that efforts to conform copyright law to this environment would be detrimental.

 

Part II summarizes a few basic points of U.S. copyright law. Part III describes specific threats that the Internet poses to the enforcement of rights under copyright law. Part IV analyzes the economics of electronic networks to identify why intellectual property might be created even in a putatively anarchistic, piracy-infested environment such as the Internet. Part V discusses sociological attitudes towards intellectual property on the Internet, identifying why it will be difficult to conform behavior on the Internet to the strict letter of existing copyright laws. Part VI discusses technologies that copyright holders can use in the battle over works subject to copyright. Finally, part VII concludes with thoughts about how we can live in a world where copyright laws are not the primary influence on our behavior towards intellectual property.

 

II. UNITED STATES COPYRIGHT LAW BASICS

 

Many excellent summaries of U.S. copyright law exist, and this section will not attempt to duplicate those efforts. However, mapping out the basic contours of the existing U.S. copyright law scheme is helpful in understanding the import of the conclusions of this article.

 

The Constitution authorizes Congress to establish a legislative scheme "to promote Science and the useful Arts, by securing for limited Times to Authors...the exclusive right to their...writings. . . ." In response, Congress enacted the Copyright Act of 1909, which it later replaced with the Copyright Act of 1976 (the "Copyright Act").

 

The Copyright Act governs original works of authorship that are fixed in a tangible medium of expression. While the standard for originality is low, facts and ideas may not be copyrighted. For copyrightable works, the owner has the following exclusive rights:

(1) to reproduce the copyrighted work in copies or phonorecords;

 

(2) to prepare derivative works based upon the copyrighted work;

 

(3) to distribute copies or phonorecords of the copyrighted work to the public by sale or other transfer of ownership, or by rental, lease, or lending;

 

(4) in the case of literary, musical, dramatic, and choreographic works, pantomimes, and motion pictures and other audiovisual works, to perform the copyrighted work publicly;

 

(5) in the case of literary, musical, dramatic, and choreographic works, pantomimes, and pictorial, graphic, or sculptural works, including the individual images of a motion picture or other audiovisual work, to display the copyrighted work publicly; and

 

(6) in the case of sound recordings, to perform the copyrighted work publicly by means of a digital audio transmission. These exclusive rights are subject to numerous restrictions. First, in the case of works created after January 1, 1978, these rights cease 50 years after the death of the author, or, in the case of works made for hire, the earlier of 75 years from the date of first publication or 100 years from the date of creation.

 

Second, these exclusive rights are subject to the doctrine of fair use, which may permit the infringement of an exclusive right of a copyright owner if its conditions are met. The Copyright Act enumerates four factors that are to be considered to determine whether or not a use is fair:

(1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes;

 

(2) the nature of the copyrighted work;

 

(3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and

 

(4) the effect of the use upon the potential market for or value of the copyrighted work. In evaluating a claim of fair use, the court is to consider all four factors. However, taking 100 percent of a copyrighted work ordinarily militates against a finding of fair use, and the fourth factor is generally considered the most important.

 

There are numerous other statutory exceptions and limitations to copyright owners' rights, generally set out in Sections 108 to 120 of the Copyright Act.

 

Other intellectual property rights in U.S. law often also apply to works for which copyright protection is sought, including trade secret rights, trademark rights, patent rights, rights of publicity, and rights of privacy. While these other forms of intellectual property are not addressed in this paper, collectively they form an important additional basket of rights available to creators of intellectual property.

 

III. THREATS TO ENFORCING COPYRIGHT RIGHTS ON THE INTERNET

 

This section describes some of the unique ways that the Internet poses a threat to copyright owners' ability to enforce their copyrights.

 

A. No Loss of Quality In Reproduction

 

Unlike copies of intellectual property made using analog copiers (such as photocopy machines, video and music tape recorders, facsimile machines and others), digital copies of intellectual property produce perfect copies without any loss of quality. The first generation and the 1000th generation copy of digital material are indistinguishable. Since each copy is a perfect copy, no quality-related limits inhibit pirates from making as many copies as they please, and recipients of these copies have no incentive to return to authorized sources to get another copy equal in quality to the original version.

 

B. No Meaningful Marginal Costs of Reproduction or Distribution

 

Unlike the business of selling and distributing physical copies of books, magazines, music cassettes or CDs, video cassettes or software, the costs of making one extra copy of intellectual property on-line are insignificant, as are the distribution costs associated with moving that copy to the end user over the Internet. Assuming no per-byte or other volume costs are imposed on the site owner (which is the current state of the market), infringement can occur at virtually no marginal cost.

 

C. Ability to Act Anonymously

 

Using anonymous remailers and other existing technologies, pirates are able to act anonymously on-line, leaving no traceable trail of activity. Anonymity poses a significant threat on the Internet, because it theoretically allows pirates to cause harm without bearing any risk of loss, thus undermining the general presumption that those causing harm can be forced to internalize the costs of their actions. As a result, more infringement is likely to occur than if costs were properly internalized.

 

However, anonymous activity is not a copyright-specific problem; it applies to all crimes and torts that can be committed on-line. Therefore, it may be more appropriate to address the harm caused by anonymity generally, rather than drafting a specific resolution applicable only to losses suffered by copyright owners. Furthermore, there is a built-in limitation to the scope and size of anonymous actions, particularly if any element of the activity is commercial; at a certain point the activity should become large enough to leave at least shreds of evidence, both in physical space and cyberspace, sufficient to allow attribution.

 

D. Uneducated Users

 

Many users do not understand the existing copyright legal framework. While the lack of user education applies in both physical space and cyberspace, the Internet permits these users to widely disseminate works with relative ease. Often times, this publication can inadvertently cause harm, such as the forwarding of works subject to copyright to third parties. The result may be a number of relatively small infringements that, in the aggregate, can lead to significant losses for copyright holders.

 

E. Conclusion

 

The foregoing threats indicate that copyright holders face substantial risks on-line. Nevertheless, we already have ample evidence that intellectual property is still being created for distribution on the Internet. Indeed, a staggering--almost unmanageable--quantity of intellectual property continues to be produced and made available on-line despite these threats. Therefore, despite the assertions of those who believe that the threats posed on-line to copyrighted works would result in disincentives to create and distribute works, it appears other forces are at work on the Internet.

 

IV. ECONOMICS AND THE INTERNET

 

This section applies economic theory and surveys existing business models to suggest why, without increased copyright protection, intellectual property is still likely to be produced even if it is given away on the Internet.

 

A. Price-Setting Behavior in a Nearly Efficient Marketplace When Marginal Costs Are Meaningfully Zero

 

The Internet is not a perfectly efficient market, but it does represent a close approximation. Among the requirements for an efficient market are perfect information and zero transaction costs. First, while the Internet does not offer perfect information, some industries provide enough information on the Internet to give buyers an opportunity to compare prices based on nearly perfect information. On the Internet, it is likely that many additional industries will experience this phenomenon. Second, while transaction costs are not zero, the Internet has significantly reduced transaction costs. In particular, buyers may experience no marginal transaction costs attributable to using the Internet for finding purchasing opportunities or consummating a transaction.

 

In an efficient marketplace, a firm's profit-maximizing price is the price where marginal revenue from each sale of the product equals the marginal costs of the product. If marginal costs are zero, what is the profit maximizing price?

 

1. MARGINAL COSTS ON THE INTERNET

 

For many intellectual property creators, the marginal cost of each additional "sale" of the intellectual property is likely to be effectively zero. While many costs are associated with producing intellectual property, including the time of the creator and the Internet infrastructure (such as the hardware, software and Internet connection), these costs become fixed costs once the intellectual property is produced. At that point, if the intellectual property is uploaded to the Internet, the remaining costs are trivial--further reproduction or distribution on the Internet imposes no meaningful marginal costs.

 

2. OPTIMAL PRICING

 

Economic theory predicts that if the marginal costs to "selling" intellectual property is zero, then some producers will accept zero marginal revenues. In other words, the profit-maximizing price for theses producers will be zero. Since this is a seemingly anomalous result, how can this be explained? There are at least four different possible explanations:

 

(i) A zero-revenue pricing strategy may persist only in the short run; but, ultimately, because no profits are being made, all producers will exit this business. This is fundamentally the assertion of those who believe that intellectual property owners must be paid directly for their creative efforts, or else they will not produce.

 

(ii) The only sustainable pricing strategy may be a scheme involving price discrimination, where prices are set in accordance with users' willingness to pay. In this situation, intellectual property will be offered at varying prices, including possibly free, depending on the user.

 

(iii) Traditional economic theory may break down on the Internet so that intellectual property will not be offered for free despite the absence of marginal variable costs. If this were true, the profit-maximizing price may not be where marginal revenue equals marginal cost. This would be a rather profound result, implicating large chunks of existing economic theory.

 

(iv) Finally, the profit-maximizing price on the Internet may be where marginal revenue equals marginal cost because intellectual property will be cross-subsidized by other products in a manner sufficient to cover the fixed costs associated with intellectual property creation and distribution. If this is true, a market price of zero for intellectual property can still create long-term economic profits attributable to intellectual property creation.

 

Of the four possible explanations, as explained in the remainder of this part IV, the author believes that the last proposition best explains why the production and distribution of intellectual property will continue even in the absence of marginal revenues directly attributable to users of the intellectual property.

 

The remainder of this part IV will discuss why the last theory is at least supportable when it comes to many categories of intellectual property on the Internet.

 

B. Cross-subsidization of Intellectual Property Creation

 

There is nothing new about the proposition that vendors may give away X to sell Y. In the classic formulation of its strategy, Gillette is credited with conceiving the business model of giving away razors to sell its blades. However, the deployment of this strategy is inherently limited because a razor is a tangible "thing" that will always have marginal costs to produce. On the Internet, where the marginal costs of reproduction and distribution of intellectual property are effectively zero, cross-subsidization becomes viable for a significantly greater number of products.

 

An intellectual property owner can use a myriad of alternative business models to extract value from the free distribution of intellectual property. If successful, these business models will permit the cross-subsidization of intellectual property creation. Internet entrepreneurs will be induced to create intellectual property if they are able to use it to make a profit from alternative revenue sources.

 

The remainder of part IV.B provides a survey of Internet-based cross- subsidization models that may support the production of intellectual property designed to be given away freely.

 

1. ADVERTISING

 

Advertising is one of the highest-profile business models on the Internet. Under the advertising model, a company gives away intellectual property to attract visitors to its site and then sells advertising space on its site to others. A broad range of companies are launching advertising-based attempts to freely give away intellectual property and substantive services, including email accounts, interactive news agents, editorial periodicals and search engines and indexes.

 

However, the slow increase in Internet advertising dollars suggests that, in the short run, advertising revenue may be insufficient to support the level of free distribution of intellectual property that exists today. Because the supply of advertisement placement opportunities exceeds the demand of advertisers, advertisers are becoming more demanding. Moreover, Internet users have grown weary of the often annoying banner advertisements. Nevertheless, the results obtainable from on-line advertising can be so compelling that certain advertisers have strong incentives to choose Internet advertising over other media.

 

Furthermore, other media industries indicate that multi-billion dollar industries can be built primarily on advertising. For example, the multi- billion dollar broadcast TV industry effectively gives away its intellectual property to viewers, supporting itself almost exclusively on advertising. The television broadcasting model is consistent with the contention that Internet users will not be required to pay for intellectual property, and that the production of intellectual property can be entirely supported by advertising.

 

In reality, many intellectual property owners will combine the advertising model with other forms of ancillary revenues. Nevertheless, advertising remains a critically important component of Internet cross-subsidization business models.

 

2. SPONSORSHIPS

 

A variant on the advertising model, sponsorship is the "co-branding" of intellectual property with the sponsor's trademarks. In the old days of television, sponsorship was common; companies would purchase all of the advertising for a show and be acknowledged as the sponsor. On-line, sponsorship can take many forms, but the fundamental premise is that the sponsor will be more integrated with the content than just sticking its banner ad at the top of the page. For example, Riddler <http:// www.riddler.com/home/html> promotes a contest which gives rewards to participants who can answer riddles that require the participants to visit sponsors' sites.

 

Sponsorship is emerging as a strong alternative to banner advertising, at least partly due to advertisers' dissatisfaction with the results from banner advertising. However, sponsored content also raises difficult issues about editorial integrity as the line between advertisement and editorial information becomes blurred.

 

3. "TRY BEFORE YOU BUY"

 

In the "try before you buy" model, companies provide consumers with a free copy of a work which is limited in some way (such as duration or functionality) in the hopes that the consumers will purchase a full copy. For example, a vendor may give away software in the hopes that recipients will return to purchase a copy. Moreover, in many instances consumers may unilaterally pirate works and then later decide to purchase legitimate copies, even though the vendor never intended to provide "try before you buy" copies. On the Internet, the "try before you buy" model has become extremely popular, in part because no meaningful marginal costs are associated with manufacturing or distributing trial copies. Thus, software, content and subscription services are routinely given away on a "try before you buy" basis.

 

4. SALES OF UPGRADES

 

Under the sale of upgrades model, consumers are freely given intellectual property with the expectation that some of them will purchase a superior version. In some ways a variant of the "try before you buy" model, this model capitalizes on the fact that version 1.0 of a product can be the best device to sell version 2.0. For example, sales of upgrades are ubiquitous in the modem software business, where companies bundle their "lite" version of software with the modem for free in the hope that consumers will upgrade to the "professional" version. However, the model is not limited to software; an author might give away a short story as a way to build demand for a "further adventures" sequel story or the movie.

 

5. SALE OF COMPLEMENTARY TECHNOLOGY

 

The truest application of Gillette's maxim, the Internet version might be "give away the client software to sell the server software." For example, the Internet's "browser software wars" have focused heavily on the free distribution of client software. With a large installed base of client software, the server software--which is sold and provides added functionality for people using the client software--becomes more attractive. More generally, software companies who also have hardware businesses may give away software to encourage the use of complementary proprietary hardware.

 

6. SALES OF PHYSICAL GOODS

 

Companies may use the free distribution of intellectual property to foster the sale of physical goods in many ways. For example, Digital initially intended to popularize its Alta Vista search engine in order to showcase the speed of its Alpha servers. Digital thus intended to give away a search tool as a way to enhance sales of its physical goods. Similarly, in the area of character merchandising, many companies may seek to build character awareness on-line through free distribution of character-related content; the increased character awareness may translate into increased demand for character-branded merchandise. Finally, electronic distribution of intellectual property could be used to create demand for physical copies of intellectual property that have been bolstered with additional content or experience-enhancing elements.

 

7. SALES OF SERVICES

 

Companies may stimulate demand for services by distributing free intellectual property on-line. For example, consultants may find it relatively easy to attract potential customers by distributing free content that demonstrates expertise. Alternatively, software companies can give away software as a way to sell systems integration or customized application development.

 

A notable example of the use of cross-subsidization to sell services is the free distribution of software as an avenue to sell technical support. For example, Microsoft gives away its Internet Explorer browser without a licensing fee, but users must purchase technical support. The sale of technical support unbundled from the underlying software has become increasingly popular.

 

8. PERSONAL INFORMATION COLLECTION AND DATA MINING

 

Internet sites can easily collect a fair amount of information about their users, much of it without the user's consent. For example, Internet sites can learn the user's IP address and most recently visited site. Furthermore, by placing a unique identifier into the user's "cookie" (or, with less precision, by analyzing the server logs), the Internet site can trace the user's activity through the site and glean insights into what the user looks at and for how long. In addition, many sites may request or require users to fill out registration forms which call for the disclosure of extensive personal information.

 

Companies can then exploit this information for commercial gain in a number of ways, such as selling email mailing lists to other companies or selling advertising space to companies that want to provide users with customized product offerings or page views based on their perceived preferences. Although the commercial use of this personal information can create some significant privacy issues, such use is generally not subject to legal restrictions in the United States.

 

9. COMMUNITIES

 

The Internet is particularly useful for facilitating community formation. In physical space, community formation may be inhibited by geography, the cost of communication, or the asynchronous methods of communication. On the Internet, however, groups can form quickly and cheaply since these barriers are absent. Moreover, the absence of these barriers may facilitate the formation of communities devoted to extremely narrow topics, which otherwise would not form.

 

The formation of Internet communities offers one of the most promising Internet business opportunities. If an Internet site can successfully attract like-minded people to interact with each other on the site, it will have a number of ways to extract value from these relationships. In addition to the obvious methods, such as selling the demographics to advertisers and selling the mailing list to merchants interested in reaching the target audience, the Internet site can extract value by enhancing the community members' ability to communicate with each other. The site could accomplish this by providing proprietary tools to facilitate onsite communication and tools and methods to facilitate and enrich physical-space meetings between members.

 

For example, WebGenesis <http://www.theglobe.com> provides chat rooms oriented primarily towards young adults. While the general public can access the chat rooms for free, subscribers receive "bonus" onsite privileges, including an onsite home page to which all their onsite chat postings are hypertext linked automatically, access to private chat rooms available only to other subscribers (who presumably are also dedicated chatters), and the ability to use tools such as Java that enhance the chatting experience. In other words, by providing the chat rooms for free, WebGenesis is able to identify those members of the communities who desire a greater relationship to the community and target these people for the sale of advanced onsite communications products.

 

Companies could also derive revenue opportunities from Internet communities by organizing conferences and other events of interest to the community. A site that forms a community dedicated to river rafting, for example, could sell river rafting trips to its members, an endeavor that would have the added value of creating an opportunity to meet other members of the community in physical space.

 

10. REINFORCEMENT OF PHYSICAL-SPACE MESSAGES

 

Internet sites can be used to reinforce marketing and sales efforts being made elsewhere. Such reinforcement can occur in the form of customer support and outreach, such as Federal Express' <http://www.fedex.com>, use of its website to provide data tracking services to its customers, or a software company's use of the Internet to distribute bug fixes, FAQs, usage tips and other forms of customer assistance.

 

Alternatively, some companies use Internet sites to increase customer loyalty or provide branding opportunities. For example, the websites prepared by Zima <http://www.zima.com> and Miller Genuine Draft <http:// www.mgdtaproom.com/> contain offerings designed to allow their consumers to feel like the part of a community and to encourage brand loyalty. The Internet market has been described as a "relationship" market; free intellectual property can be the way to initiate, build or reinforce the relationship.

 

C. Importance of Attribution

 

As the prior section has indicated, companies can try a myriad of methods of creating value by giving away intellectual property. However, for cross- subsidization to work, buyers impressed with product X (freely given away) must be led to product Y (for sale). In most cases, this will mean that product X must give proper attribution to the seller of product Y so that buyers can make the connection.

 

U.S. copyright law affords no "right of attribution" to owners of intellectual property distributed on the Internet. While some trademark, unfair competition, or right of publicity theories may limit the ability of users of intellectual property to falsely represent the origin of the intellectual property, there is no copyright obligation of attribution.

 

In some cases, attribution may be the only right that matters on the Internet. In fact, an intellectual property owner seeking cross-subsidization may encourage people to "infringe" the intellectual property through wide distribution, so long as attribution is given. Thus, existing copyright law lacks an important right, the absence of which could hinder the deployment of key business models on the Internet.

 

The NII White Paper recognized that attribution could be important and therefore recommended that copyright law be amended to "prohibit the provision, distribution or importation for distribution of copyright management information known to be false and the unauthorized removal or alteration of copyright management information." The White Paper defines copyright management information as the name of the copyright owner and the terms and conditions for use of the work.

 

While not adopted into law in the United States, a virtually identical proposal was adopted at the proceedings of the World Intellectual Property Organization ("WIPO"). Time will tell if the treaty will be adopted without changes in the United States.

 

The White Paper proposal and the WIPO treaty represent an important step toward the recognition of the right of attribution in the United States. However, the proposed law could have profound effects on some current Internet practices. First, website operators commonly incorporate content maintained on remote servers into the pages delivered to users through a direct hypertext link to the remote content. Intellectual property owners whose files are linked this way may object (1) because these direct-linked users do not actually visit their site, and (2) because the file may be displayed so as to suggest that the site providing the link is the source of the file. Does this form of direct linking run afoul of the White Paper's proposal? Should it? Would it matter if the linked-to site provided a notice denying access to others who attempted to link to the site?

 

Second, robots and agents can, for example, survey multiple search engines and display the search results to the end user in summary form, without displaying any advertising contained on the search engine's site (or, for that matter, giving any attribution to the search engine). As a result, the search engine sites must bear the costs of providing the service without getting the anticipated benefits from the consumers of the information. Does this type of robot behavior run afoul of White Paper's proposal? Should it? Would it matter if the search engine's site contained a notice that notified others that robots and agents were not welcome?

 

D. Conclusion

 

The large number of alternative business models presented above is necessarily incomplete; entrepreneurs have proven highly capable of developing new ways of extracting value from the Internet. However, the mere existence of so many alternatives reinforces the fundamental message: intellectual property creators can cross-subsidize the production of their works in many ways.

 

The impact of this concept is powerful: if even one person is able to produce and freely distribute a type of intellectual property through cross- subsidization, why would consumers continue to pay for an equivalent work? While each copyrightable creation is theoretically unique, many types of intellectual property have substitutes which consumers would readily choose if they were available for free. In other words, if the Internet is a relatively efficient market and intellectual property is somewhat fungible, then the free availability of a type of work should establish the market price for that type of intellectual property at zero.

 

The implications of this proposition are truly profound. It suggests that intellectual property owners who expect to be paid directly by end users will face extreme competitive pressures. A single entrepreneur able to cross- subsidize the production of substitute intellectual property should theoretically drive the market price to zero and eliminate all prospects that end users will directly pay for the intellectual property. Given the plethora of methods an entrepreneur could use to achieve this result, zero pricing may be inevitable for many classes of intellectual property.

 

However, some categories of intellectual property almost certainly will not be given away for free. For those categories that will support user payments, entrepreneurs can deploy various technologies to protect their intellectual property and increase the likelihood of payment. These technologies are discussed in part VI.

 

V. SOCIOLOGY OF THE INTERNET

 

While business and technological factors significantly impact the market for intellectual property, some noteworthy features about users' attitudes towards intellectual property also warrant attention. This section describes certain sociological aspects of the Internet culture and how they may influence users' willingness to pay.

 

A. Attitudes Towards Intellectual Property

 

Attitudes towards intellectual property can be placed on a spectrum ranging from "intellectual property should not be protected" to "intellectual property should be highly protected." Though not discrete nodes, five distinguishable segments of this spectrum can be identified:

 

1. INFORMATION WANTS TO BE FREE

 

Adherents to this perspective believe that any intellectual property should be in the public domain and available for all to use. While finding dogmatic adherents to this perspective may be difficult, finding people who believe that anything they find on the Internet is "fair game" for free use is relatively easy.

 

2. RIGHT OF ATTRIBUTION

 

Adherents to this perspective believe that intellectual property can be freely "infringed" so long as the source is attributed. Again, though it may difficult to find people who strictly adhere to this perspective, it is very easy to find people--even among creators of intellectual property--who subscribe to this perspective at least some of the time. Interestingly, U.S. copyright law rarely requires attribution (see part IV.C, supra), although netiquette usually encourages it.

 

3. LIMITED USE OF WORKS SUBJECT TO COPYRIGHT

 

Adherents to this perspective believe that intellectual property creators should have protectable rights in their creations, but they do not believe that these rights are absolute. Often, adherents want to strike a balance between protecting creators' interests and permitting "infringement" of the intellectual property in a manner consistent with their lifestyle or business. This position arguably represents the framework for existing U.S. copyright law, which gives significant protection to copyright holders but provides the fair use defense and statutory exemptions.

 

4. MORAL RIGHTS

 

"Moral rights" are the rights of the author to be attributed as the author of the work and to object to a particular use of the work. As between the author and any potential user (including assignees or licensees), this perspective strongly favors the author; often the author cannot assign his or her rights, and in some jurisdictions the author cannot waive the enforcement of his or her moral rights. Generally, moral rights reflect a belief that the author's creations are an extension of the author, and therefore the author can control how the public views author through his or her creations. U.S. copyright law does not explicitly recognize moral rights except in a very limited set of circumstances.

 

5. STRONG INTELLECTUAL PROPERTY RIGHTS

 

Adherents to this perspective believe that the author should have significant power to control the use of his or her intellectual property. Adherents would extend the author's power beyond moral rights and permit the author to control all uses of his or her work.

 

From a policy perspective, it is useful to think about how our copyright laws can conform the behavior of people who subscribe to the perspectives outlined above. Importantly, people who subscribe to the "information wants to be free" theory may very well abuse copyright restrictions regardless of the strength of intellectual property laws, in which case strengthening copyright laws to conform their behavior serves little purpose. To the extent that the Internet culture has increased the number of people unsupportive of strong intellectual property rights, new copyright laws designed to increase creators' rights are unlikely to produce the desired results.

 

B. Internet Culture and Micro-Infringements

 

Historically, the Internet has been populated by academics and technologists, many of whom would properly be categorized in the "Information Wants to be Free" segment (or perhaps the "Right of Attribution" segment) of the intellectual property attitude spectrum. While waves of newcomers to the Internet have diluted this culture, many of these newcomers bring complementary attitudes towards intellectual property.

 

Take, for example, people under the age of thirty. During most or all of their life, they have had easy access--often in their home--to a number of devices they could use to infringe copyrights: audio cassette recorders (and cheap blank tapes); video cassette recorders (and again cheap blank tapes); high quality, low cost photocopy machines; fax machines; and perhaps the most powerful copying device of all, the personal computer (and cheap blank disks and hard drives). As a result, the under-thirty generation has grown up being able to freely expropriate intellectual property easily and at little cost. As college students, how many of them bought most (or even some) of the software on their computer, rather than "borrowing" it from their folks or from a friend down the hall? How many of them put together a compilation tape of their favorite songs? How many of them made a cassette tape of someone else's music album? What mechanisms are in place--or could be put into place--to effectively convince these people that these acts are impermissible under the existing system?

 

The early Net users and the under-thirty crowd appear to have combined to create an interesting psychology on the Internet. The Internet community reacts with widespread disbelief when someone tries to assert that web browsing is an infringement, that linking to a third party's materials is an infringement, that forwarding an email to a mail list could be copyright infringement, or that setting up a fan site could be an infringement. Conceivably, the Internet community could be educated to understand why these actions implicate copyright rights, but changing the state of the Internet to conform to expansive readings of the copyright law would cause major upheaval. Furthermore, the logistics involved in trying to police these "micro-infringements" are daunting, and perhaps not efficient from a social cost versus social benefit standpoint. Indeed, such an approach could ultimately prove economically counterproductive for intellectual property owners as well.

 

More generally, the combination of the Internet culture and the general effect of technological evolution may be affecting our collective attitudes toward intellectual property. We have become a culture largely comfortable with serial micro-infringements. Generally, we want to respect other people's intellectual property rights, but we also want to run our lives in a way that ultimately results in numerous minor, almost trivial, but still theoretically actionable infringements. The effect of trying to try to apply copyright laws (or worse, to try to strengthen them) to overcome this attitude would likely be regressive.

 

C. Conditioning to Expect Freebies

 

Because so many intellectual property owners are giving away valuable intellectual property for free, users are becoming conditioned to expect free intellectual property everywhere they go. In this environment, users become very reluctant to pay for intellectual property, since they know that free substitutes are likely to be available elsewhere. Even minor non-cash impediments, such as required registration forms, may be sufficient to drive users away. This conditioning makes it increasingly difficult for intellectual property owners to charge users directly for intellectual property.

 

VI. TECHNOLOGIES AND METHODS FOR CONTROLLING INTELLECTUAL PROPERTY

 

This section analyzes existing technological tools and other methods that enable intellectual property owners to protect their property. Technology will by necessity play an essential role in the controlled distribution of intellectual property on the Internet, despite the fact that many categories of intellectual property will be made available to consumers free of charge. Technology will help support revenue-producing markets in those categories of intellectual property that are not going to be freely given away, and it may also help those intellectual property owners who desire attribution.

 

Some people believe that the availability of the technologies described in this section will lead to the development of a micropayment economy, where even minor uses of intellectual property will result in micropayments to the intellectual property owners. In addition to this result being unlikely for the reasons described in part IV, micropayments raise other difficult issues. In particular, the transaction costs of micropayments can be relatively large--and any customer support is likely to be too costly to provide.

 

Clearly no single technology or method can prevent all forms of infringement. However, it is both theoretically and practically possible that a combination of technologies and other methods will provide significant protection against unwanted infringement throughout the productive life of the intellectual property. By setting up impediments to infringement, the intellectual property owner can conform the behavior of those who are unwilling to invest the extra effort to infringe. Furthermore, while the pirates will have plenty of incentive to defeat the technology, "technology does tend to favor the good guys because the good guys are better funded."

 

A. Pre-Infringement

 

This section describes technologies and methods that copyright owners may put into place before distributing their intellectual property to control or inhibit infringement of their works.

 

1. LIMITED FUNCTIONALITY

 

Under this approach, intellectual property owners provide a copy of the work which is functionally limited. This approach provides one way to technically implement the "try before you buy" and "sell the upgrades" business models. For example, software creators can distribute software that cannot print or save. Under a slightly different approach, a software vendor can distribute "buggy" software, such as beta versions. While buggy software gives people the opportunity to use and become familiar with it, buggy software also induces those who desire stable software to purchase it. As a last example, database providers or other vendors of large pieces of intellectual property can deliver the content in small chunks, making it difficult to compile the complete work.

 

2. DATE BOMB

 

Analogous to the limited functionality approach, under this approach the intellectual property owner distributes fully functional intellectual property but locks off access at a pre-specified date. Under a variant of this approach, the vendor can lock off access after a certain number of uses (i.e., after viewing the file 10 times, the file may no longer be viewed).

 

3. COPY PROTECTION

 

Under this approach, the vendor limits the number of times a file can be copied. Copy protection was standard in the 1980s, but it fell into disfavor largely because consumers resented the inconvenience and because copy protection was relatively easy to break. While users are unlikely to be significantly more responsive to copy protection schemes now, copy protection is currently being used in certain situations. For example, a creator can save a file in Adobe Acrobat's PDF format in a manner that prevents others from making copies, either directly or by such indirect means as printing the screen or copying the text displayed on the screen. While this form of copy protection is probably not "hack-proof," it is sufficient to inhibit the vast majority of users from copying files.

 

4. ENCRYPTION ENVELOPES

 

Encryption envelopes are software devices which encrypt intellectual property in such a way that access can be obtained only by using the proper key. These devices are often referred to by IBM's trademark name "cryptolopes." Creators can protect their works by distributing files in cryptolopes and requiring users to pay for keys that remove the work from the envelope.

 

5. CONTRACTS

Contracts are an underrated pre-infringement control. When properly formed, contracts enable intellectual property owners to restrict the use of their intellectual property in excess of the rights granted under copyright laws. An unresolved debate continues about the extent to which on-line shrinkwrap contracts (sometimes referred to as "clickthrough agreements") are enforceable. If such agreements are enforceable, intellectual property owners may choose to rely heavily on contract law to control the use of their intellectual property.

 

B. Metering

 

This section describes technologies and methods that intellectual property owners can use to ensure payment prior to or at the time of a consumer's use of the intellectual property.

 

1. ACCESS CODES

 

Many of the devices described in the pre-infringement section can be coupled with "access code" devices. These devices permit users "unlock" protective mechanisms embedded in intellectual properties themselves, such as date bombs or functional limitations. This method allows the intellectual property owner to meter usage of the intellectual property, either by unlocking the intellectual property for a one-time license fee or by requiring periodic procurement of access codes.

 

2. RIGHTS-MANAGEMENT ENVELOPES

 

As with encryption envelopes, the creator places intellectual property inside special software envelopes. However, under this approach the envelope periodically communicates with a home base to implement the business parameters imposed by the intellectual property owner. For example, Wave Interactive Networks <http://www. winhome.com> provides a system which allows publishers to encrypt a file as a .wxn file, which when activated causes the Wave plug-in to debit the user's account maintained at Wave's website.

 

3. HARDWARE DEVICES

 

Hardware device approaches require the user to acquire and install the requisite hardware device. For example, using a debit card approach, the user purchases a debit card that is pre-loaded with a certain amount of value. After installation, the debit card is debited automatically as the user consumes the intellectual property. In a "superdistribution" approach, the hardware device meters the usage of intellectual property and automatically debits an account maintained at a central base. In this way, even if the recipient has received a copy forwarded from a third party, the hardware device can ensure payment to the intellectual property owner.

 

4. DOWNLOADABLE EXECUTABLES

 

Downloadable executables, such as Java applets and ActiveX scripts, are pieces of code which download from the server to the client on a "use and discard" basis. In other words, the executable runs during a particular session but will be flushed from RAM at the end of the session. These executables can be metered out because they need to be downloaded each session.

 

5. CENTRALIZED COMPUTING

 

Under this approach, all of the executables, other than a user interface on the client side, remain at the server. Therefore, the user's computer must establish contact with the server each time the executable is used, allowing the central computer to meter access. Centralized computing is actually the old "timeshare" model used in the early days of computing, when the client's processing power was so weak that centralizing processing power at the server level was more efficient.

 

6. DIGITAL CERTIFICATES

 

In the digital signature context, a certification authority issues to a user an electronic file (a "digital certificate") which identifies the user as the owner of a public key. However, digital certificates can be used to certify more information than mere identity. For example, they can be used to identify rights associated with a particular person. In these ways, vendors can use digital certificates to control access to system resources, including intellectual property files, by making files available to users who can provide a digital certificate with specified rights (such access, downloading, use, etc., including time limits). A user would obtain the digital certificate from either the vendor or a third party.

 

7. COPYRIGHT CLEARINGHOUSES

 

Under this approach, intellectual property owners would vest "clearinghouses" with the ability to license usage of their intellectual property. A user would pay a license fee to such a clearinghouse to obtain rights to the intellectual property. Copyright clearinghouses currently exist for music-related intellectual property, although these are products of statutory compulsory licensing. No similar comprehensive mechanisms have developed for other forms of intellectual property, despite some long- standing attempts to do so and the widely recognized benefits of having such a scheme in place. As a result, some technological efforts are being made to include copyright management information in all electronic files so that contact information for procuring copyright permissions will always be available.

 

8. SALE OF PHYSICAL COPIES

 

As anachronistic as it may sound, selling physical copies of intellectual property remains a highly effective method of metering the usage of intellectual property. While the electronic distribution of intellectual property has many advantages, numerous advantages to purchasing physical copies of works available on the Internet still remain. First, many people still prefer reading physical copies over reading electronic copies. Second, obtaining a mass-produced physical copy rather than printing out the electronic copy may be beneficial from a cost or quality standpoint. Third, in the case of large electronic files, obtaining a physical copy may be more time-effective or convenient than downloading the electronic copy. Fourth, the consumer may use devices that have been optimized for use with physical copies, providing results that exceed the results available from using the downloaded electronic copy. Therefore, we should expect that certain categories of intellectual property will continue to be demanded in physical versions.

 

C. Post-Infringement

 

This section describes technologies and methods that creators can use to identify infringements and thus enhance enforcement of intellectual property rights.

 

1. AGENTS

 

Agents are programs that can implement specified commands automatically. Intellectual property owners can used agents to search the public spaces of the Internet to find infringing copies. While agent technology is still being developed and refined, even today creators can perform a relatively powerful set of searches using full-text search engines such as HotBot <http:// www.hotbot.com> and Alta Vista <http://www.altavista.digital.com>.

 

2. STEGANOGRAPHY

 

Steganography, as applied to electronic files, refers to the process of hiding information in files in such a way that the hidden information is not easily detected by the user. Intellectual property owners can use steganography in a number of different ways on the Internet. One approach is to insert into the file a "digital watermark" which can be used to prove that an infringing file was the creation of the intellectual property owner and not the pirate. The owner of the work could also store copyright management information using this technology. Another approach is to encode a unique serial number into each authorized copy of the file, enabling the owner to trace infringing copies to a particular source.

 

3. COPYRIGHT LITIGATION

 

Copyright litigation is a powerful tool for enforcing intellectual property rights, one that should not be overlooked. While not every infringement will be the subject of litigation, the threat of litigation helps keep large pirate operations in check. Copyright litigation not only helps the intellectual property owner obtain relief for specific acts of infringement, it publicly warns others of the dangers of infringement. Indeed, a number of intellectual property owners have had well-publicized successes enforcing their copyrights against on-line infringers.

 

D. Additional Problems Under Copyright Law Possibly Solvable by Technology

 

This section discusses some additional complex issues under U.S. copyright law that are not fully addressed by the technologies and methods described in parts VI.A-C, supra, but are still addressable by technology. In particular, linking and caching are both techniques used in the normal functioning of the Internet, yet their permissibility under U.S. copyright law is unclear.

 

When the technologies available for controlling linking and caching are combined with the technologies and methods described in parts VI.A-C, supra, the mosaic of the overall set of protection technologies and methods available to intellectual property owners becomes clearer. This clarity will lead to the question, discussed in part VI.E, infra, of whether situations exist the intellectual property owner should have the obligation--if he or she wants to exercise it--to prevent users from infringing before the owner is given the right to claim infringement.

 

1. LINKING

 

Hypertext linking is one of the blessings of the Internet, but its application has proven problematic. Most copyright experts generally believe that linking should not lead to copyright liability, because the mechanical operation of the hypertext link does not implicate one of the exclusive rights of copyright owners; a hypertext-linked URL is merely an instruction which is loaded into the user's browser software, and the browser software does all of the work from there. As a result, the server providing the hypertext link never makes a copy or otherwise processes any of the data from the linked site.

 

While the plain language of the copyright statute suggests the above conclusion, commentators, to ensure that linking is not copyright infringement, have argued that uploading intellectual property to the Internet grants an "implied license" to link. Alternatively, linking might be considered fair use.

 

Of course, given the alternative business models discussed earlier, in many cases Internet sites eagerly seek out linking as an entree to generate ancillary values. In fact, a nascent business of providing links has developed. However, if an Internet site does desire to keep others from linking to some or all of its pages, a number of technologies are available to inhibit linking:

. The system operator (the "sysop") can make the page a "dynamic" page by building the page only when the user causes the execution of a program resident on the server. This prevents linking because dynamic pages have no fixed reference point to which to link. This technique, while effective, is also currently somewhat expensive. Alternatively, the low-technology approach is for the sysop to manually change the page's URL periodically, so that any links made to the page will become ineffective.

 

. If the sysop desires to prevent a specific site from linking to a page, the sysop may code the page in such a way that it refuses browsers who access the site from the forbidden linking site.

 

. In the case of automatic linking performed by robots and spiders (such as those used by the search engines), the sysop may load information into the header of the page that instructs the robots and spiders not to index the page.

 

. The page can be password protected, although this practice inhibits the page's free accessibility to people browsing the Internet.

 

To address the problem of unattributed graphics being incorporated into pages on a remote system, the graphic may contain a program that automatically causes a notice to appear to users who access it that the graphic is the copyrighted work of the intellectual property owner.

 

2. CACHING

 

Caching is a loosely used term that generally refers to the process of making an extra copy of a file or set of files for more convenient retrieval. On the Internet, caching of third party files can occur both locally on the user's client computer (either in RAM or on the hard drive) or at the server level (called "proxy caching"). When a user requests a file that has been cached, the browser will deliver the file from the cache rather than retrieving a fresh copy over the Internet.

 

Although different concepts, similar issues to caching arise with mirroring (establishing an identical copy of an Internet site on a different server), archiving (providing an historical repository for information, such as with newsgroups and mail lists, where the proceedings would otherwise be evanescent), and full-text indexing (the copying of a document for loading into a full text or nearly full-text database which is searchable for key words or concepts).

 

Caching is an integral part of the Internet's operation, in part because it speeds the user's access to files and in part because it reduces the infrastructure required for operation of the Internet (by reducing the number of files that must be transferred using the infrastructure). Without caching, our already taxed infrastructure would be even more clogged, to the point where it may become unworkable. As a result, a number of serious business plans have been predicated on using caching.

 

However, caching could cause harm because the copies in the cache are not necessarily the most current and up-to-date copies. For example, users relying on the cached copy may unwittingly use out-of-date material; similarly, harms such as defamation or infringement that existed on the original page may propagate for years until flushed from each cache where they have been replicated. Also, since caching is an infringement under a literal reading of U.S. copyright law, either caching must be the subject of an implied license or fair use defense or it is (at least theoretically) actionable.

 

Internet sites can deploy a number of technologies to restrict or prevent caching:

. Sysops can make the page a "dynamic" page by building the page only when the user causes the execution of a program resident on the server. As in the case of linking, this solution may be expensive.

 

. Sysops may place information on the page's header which tells the party trying to cache the page when to replace the copy in the cache with a new copy (this is called an "expiry header"). In the case of a sysop who does not want the page cached at all, the sysop merely sets the expiry date as a date before the date on which the information is loaded. Unfortunately, no technology standards presently exist under which caching entities can read and manage this process automatically, so a sysop's instructions may well be ignored or not processed.

 

. The page can be password protected, although again this inhibits the page's free accessibility to Internet browsers.

 

Finally, parties trying to establish caches have an incentive to deploy software that automatically updates the cache every time the cached page changes. While this practice solves many of the problems, it leaves control of the process with the entity doing the caching rather than with the website being cached.

 

E. Is Technology a Substitute for Copyright Law?

 

Many on the Internet implicitly believe that the failure of an intellectual property owner to use available technology to prevent infringement controls grants to all comers an implied license to infringe. This attitude is seen most often in the arguments raised against copyright infringement for linking and caching. However, based on all of the possible technological controls available to intellectual property owners as described in this part VI, the "use technology or accept infringement" argument might be expanded to apply to all types of infringement, going far beyond just linking and caching.

 

In some ways, this argument is unprecedented. No other situation come to mind where a copyright owner's failure to use technological protective controls has the effect of diminishing their rights under copyright law. Why should the Internet create a new paradigm?

 

On the other hand, the normal functioning of the Internet is predicated on multiple infringements of copyright rights. If we want the Internet to work as it currently operates and as it can operate in the future, we must reduce the chilling effect of the threat of copyright litigation by changing the rules (or interpreting them differently) or placing some burden on intellectual property owners to "opt out" of the system by deploying technology controls.

 

Given that many intellectual property owners' business models are based on encouraging "infringement" by users, and that many users believe (innocently but mistakenly) that intellectual property found on the Internet is free for the taking, a trend is emerging toward increasing the burden placed on intellectual property owners to adopt technology controls rather than relying on copyright infringement litigation. Interestingly, this trend is incompatible with the efforts of those seeking to increase the scope of the copyright laws.

 

VII. CONCLUSION

 

Even though many of this article's specifics will be out-of-date soon after it is published, its general conclusions should have lasting relevancy to the policies of future U.S. copyright law. This article has marshaled evidence to support the following conclusions:

. The creation and dissemination of intellectual property, both on the Internet and more generally, seems highly robust despite all of the threats.

 

. The economics of the Internet dictate that, in many cases, businesses must find a way to generate revenues without charging users for intellectual property.

 

A wide variety of sustainable business models permit businesses to accomplish that end.

 

. Users are becoming increasingly unwilling to pay directly for intellectual property.

 

. The elimination of all infringements is an impossible and possibly undesirable goal.

 

. A cadre of entrepreneurs and existing companies are introducing a wide variety of technologies that intellectual property owners can use to manage the process of infringements.

 

. The perception is increasing that intellectual property owners should be required to use the available technological tools rather than relying on the threat of litigation over micro-infringements.

 

As a practical reality of these conclusions, the real battle between intellectual property owners and Internet users is being waged using the business models and technological tools available to intellectual property owners. Combined with the trends in sociological beliefs about the Internet, the business models and technological tools will evolve over time to make copyright law increasingly less important as a tool for conforming behavior on the Internet.

 

Concluding that copyright law's unimportance on the Internet suggests that copyright law should be abolished generally would be inaccurate. The fact that the existing copyright laws may have no effect on the way creators and consumers operate on the Internet does not mean that we no longer need these laws. Existing copyright laws are critically important to the world of physical space. This holds true even though the Internet may become the preeminent vehicle for the dissemination of intellectual property.

 

However, except in the possible case of attribution rights, no new laws designed to increase the rights of intellectual property owners on the Internet are currently needed. Any such legislation would most likely destroy the delicate balance being struck in the marketplace right now. Furthermore, any anomaly in the existing laws is likely to be resolved by technological and business innovation, which is occurring at a dizzying rate.

 

We live in an energizing information age, where we are beginning to realize many of yesterday's dreams about information exchange on a global scale. We should facilitate this environment by letting the marketplace reach its own equilibrium. We can do this best by pursuing legislation which regulates only the most extreme behavior, leaving the rest of the spectrum of behavior for marketplace solutions.