Module 7: Enforcement: Difference between revisions
[unchecked revision] | [unchecked revision] |
Line 31: | Line 31: | ||
However, many copyright regimes also recognize forms of indirect or "secondary" infringement. Under certain circumstances, one can be found liable for the acts of another. For example, in the United States, one may be liable for “contributory infringement” if he or she knows about the infringing activity of another and does something to induce, cause, or materially contribute to that infringement. One may be liable for “vicarious infringement” based on the actions of another person, even without actual knowledge of the infringement, if she has the right and ability to control the other person’s acts and benefits directly from the infringement. | However, many copyright regimes also recognize forms of indirect or "secondary" infringement. Under certain circumstances, one can be found liable for the acts of another. For example, in the United States, one may be liable for “contributory infringement” if he or she knows about the infringing activity of another and does something to induce, cause, or materially contribute to that infringement. One may be liable for “vicarious infringement” based on the actions of another person, even without actual knowledge of the infringement, if she has the right and ability to control the other person’s acts and benefits directly from the infringement. | ||
Merely providing a device capable of committing direct infringement is usually not enough to incur liability for contributory or vicarious infringement. Generally speaking, if the device is capable of '''substantial non-infringing uses''' - like a copy machine or a computer - then the maker of that device will ordinarily not be liable for the actions of the device's users. However, under certain circumstances the maker of a device used by others to commit infringement can be liable for "inducement" of copyright infringement. In Metro-Goldwyn-Mayer Studios Inc. v. Grokster, Ltd., the US Supreme Court held that the distributor of file sharing software could be liable for copyright infringement if the distributor intended to promote the software's use for infringing purposes. | Merely providing a device capable of committing direct infringement is usually not enough to incur liability for contributory or vicarious infringement. Generally speaking, if the device is capable of '''substantial non-infringing uses''' - like a copy machine or a computer - then the maker of that device will ordinarily not be liable for the actions of the device's users. However, under certain circumstances the maker of a device used by others to commit infringement can be liable for "inducement" of copyright infringement. In Metro-Goldwyn-Mayer Studios Inc. v. Grokster, Ltd., the US Supreme Court held that the distributor of file sharing software could be liable for copyright infringement if the distributor intended to promote the software's use for infringing purposes and took "affirmative steps" to achieve that goal. | ||
Other countries also impose secondary liability for copyright infringement. In addition to punishing direct infringement, for example, the United Kingdom also imposes liability for providing a means of creating unauthorized copies, or supplying sound recordings or films for an infringing performance. Similarly, under South African law, infringement may occur when one either exercises one of the exclusive rights of the copyright holder without license (or other legal justification), or causes another person to do so. | Other countries also impose secondary liability for copyright infringement. In addition to punishing direct infringement, for example, the United Kingdom also imposes liability for providing a means of creating unauthorized copies, or supplying sound recordings or films for an infringing performance. Similarly, under South African law, infringement may occur when one either exercises one of the exclusive rights of the copyright holder without license (or other legal justification), or causes another person to do so. |
Revision as of 23:07, 28 February 2010
Learning objective
This module will provide a general overview of what it means to infringe another’s copyright and explain the various ways in which infringement may occur. It will also provide a description of some of the issues that commonly arise when a copyright holder decides to bring a copyright infringement lawsuit, and how such cases typically proceed and conclude. It will review some statutory provisions discussed in previous modules that provide liability exemptions for service providers, including libraries. Finally, the module will consider the appropriate roles of librarians with regard to copyright and copyright enforcement.
Case Study
Angela leaves Nadia an urgent phone message: “I received a cease and desist letter from a publisher complaining that, by including some of his works in one of my course packs, I am infringing his copyright. What should I do?”
How should Nadia respond?
Lesson
What Infringes Copyright?
Acts That May Infringe Copyright
As we have seen, the unauthorized exercise of an exclusive right of the copyright holder infringes copyright unless the use is covered by one of the exceptions or limitations discussed in Module 4. For example, making a copy of a book or record implicates the exclusive right of reproduction, and, if done without permission in a manner not covered by one of the exceptions, would infringe the rightsholder's copyright.
Infringement may also occur when one violates any of the moral rights recognized by the particular country’s copyright laws. These may include the right of an author to prevent distortion or mutilation of his or her work, the right to be attributed as the author of a work or not to have authorship falsely attributed.
Direct and Indirect Infringement
Copyright law typically distinguishes between two different kinds of infringement.
Direct infringement occurs when one exercises one of the copyright holder’s exclusive rights without authorization or legal justification. As stated in the previous section, this would include copying a book or record without permission.
However, many copyright regimes also recognize forms of indirect or "secondary" infringement. Under certain circumstances, one can be found liable for the acts of another. For example, in the United States, one may be liable for “contributory infringement” if he or she knows about the infringing activity of another and does something to induce, cause, or materially contribute to that infringement. One may be liable for “vicarious infringement” based on the actions of another person, even without actual knowledge of the infringement, if she has the right and ability to control the other person’s acts and benefits directly from the infringement.
Merely providing a device capable of committing direct infringement is usually not enough to incur liability for contributory or vicarious infringement. Generally speaking, if the device is capable of substantial non-infringing uses - like a copy machine or a computer - then the maker of that device will ordinarily not be liable for the actions of the device's users. However, under certain circumstances the maker of a device used by others to commit infringement can be liable for "inducement" of copyright infringement. In Metro-Goldwyn-Mayer Studios Inc. v. Grokster, Ltd., the US Supreme Court held that the distributor of file sharing software could be liable for copyright infringement if the distributor intended to promote the software's use for infringing purposes and took "affirmative steps" to achieve that goal.
Other countries also impose secondary liability for copyright infringement. In addition to punishing direct infringement, for example, the United Kingdom also imposes liability for providing a means of creating unauthorized copies, or supplying sound recordings or films for an infringing performance. Similarly, under South African law, infringement may occur when one either exercises one of the exclusive rights of the copyright holder without license (or other legal justification), or causes another person to do so.
Plagiarism and Copyright Infringement
As mentioned in Module 3, copyright infringement and plagiarism are similar concepts, but they are not identical. Copyright infringement only occurs when one copies the author's expression from a copyrighted work. Plagiarism, on the other hand, occurs whenever one uses the ideas or expressions of another without proper attribution. For this reason, some but not all acts of plagiarism will also be copyright infringement, such as when a scholar copies an entire paragraph from an earlier work. In some circumstances, plagiarism can also violate the moral right of attribution.
The distinction between plagiarism and copyright infringement also explains differences in their enforcement. Punishment for plagiarism is typically imposed by educational institutions or social norms. Plagiarism typically does not carry civil or criminal penalties, unless the plagiarist also copies the protected expression of the original author. In contrast, claims for copyright infringement are handled by courts and, as we will see, may be punishable by civil damages, fines, or imprisonment.
The Liability of Online Service Providers
Many countries have enacted “safe harbor” statutes that protect online service providers such as search engines, internet service providers, libraries or universities from liability for copyright infringement committed by their users. In order to be eligible for these exemptions, the service provider must comply with certain rules.
Some countries require online service providers to comply with so-called “notice and takedown” provisions to be protected by a safe harbor. For example, in the United States, if a copyright holder believes that a file hosted by a service provider infringes her copyright, the copyright holder may submit a notice to the provider to request that the file be removed. The notice must typically include the name of the complaining party and list any infringing materials, including the URL. It must also contain a good-faith statement by the copyright holder that the materials infringe on her copyright. It must conclude with a sworn statement of the accuracy of the notice and the notice provider's authorization to act on behalf of the rightsholder.
Upon receipt of a take-down notice, the service provider must quickly remove the infringing material or disable access to it. It must also notify the individual responsible for the infringing material of its removal. It is not necessary for the copyright holder to obtain a judicial decision that the material is, in fact, infringing in order to send a take-down notice. The safe harbor provisions allow the individual responsible for the content to file what's called a counter-notice to challenge a take-down notice. If the poster submits a counter-notice asserting that the material removed was not infringing, the service provider must notify the copyright holder. If the copyright holder does not file a lawsuit within two weeks, the service provider must then restore access to the material. The statute exempts service providers for liability for its good-faith removal of materials pursuant to a take-down notice, even if the material is ultimately determined not to be infringing.
The European Union has created a similar, though more open-ended, take-down system in Directive 2000/31/EC (Directive on Electronic Commerce) [discussed in Module 2]. This Directive contains different rules for different kinds of service providers. Mere “conduits,” or services that only route and cache online traffic, are exempted from liability entirely. Providers that actually host data, however, are exempted only if they have no “actual knowledge” or “awareness” of illegal activities, and if they act quickly to remove or disable access to the infringing materials once they have been notified.
However, the question of what constitutes “actual knowledge” of hosting infringing materials has been left largely unanswered. This creates serious problems. It is unclear whether a service provider who receives a notice from a copyright holder that it may be hosting infringing materials will be deemed to have "actual knowledge" of hosting the materials. Likewise, it is uncertain what, if any, evidence such notices must include, whether the person sending it is required to identify himself and include a good-faith statement of belief of infringement, and under what circumstances the service provider is obligated to remove the content in order to take advantage of the safe-harbor provisions. The “awareness” of illegal activities criterion is similarly vague, and it is far from clear how rigorously providers must self-regulate and monitor the data they host or provide access to in order to come within the safe harbor provisions.
The European Union directive is broader than the US approach in that it does not provide a clearly articulated, multi-step approach for initiating and responding to take-down notices. Because of this lack of clarity, service providers have incentives to respond aggressively to take-down notices. Further, under the Directive, there does not appear to be a set procedure in place for a user to object to removal of the material, nor are providers required to notify a user when material is removed or made inaccessible.
The approaches taken by other countries to the exemption of online service providers from liability for infringement committed by their users may differ substantially. Australian law, for example, contains an exemption that is similar to that codified in the United States. However, it does not require service providers to notify the person who posted the material that has been removed. Israel likewise has a notice and take-down procedure as part of its safe harbor statute. Unlike the United States, though, it does not require the service provider to remove the material quickly upon the receipt of a complaint. Instead, it allows users three days to respond to the complaint before the material will be removed. Some countries - such as India - do not recognize safe harbor provisions for Internet service providers, and may hold them liable for copyright infringement committed by their users even if the provider has no active or direct involvement in that infringement.
Procedures and Penalties
Legal Procedures and Remedies
A copyright holder may decide to file a copyright infringement lawsuit if she believes that infringement of one of her exclusive rights has occurred. Typically, only the holder of the exclusive right that was infringed or a beneficial holder of that right may bring a copyright infringement claim.
The copyright holder may choose to sue the person or persons who committed direct infringement, and / or anyone else who may be found to be liable under the several theories of secondary or indirect infringement described above. In many countries, the copyright holder must bring the claim within a certain period of time after the act of copyright infringement occurs, or it will be barred by the statute of limitations. The length of the statute of limitations varies by country. For example, the statute of limitations for copyright infringement actions is 3 years in the United States, and six years in Australia. (17 U.S.C. section 507(b); Section 134(1) of the Australian Copyright Act.)
More on the doctrine of sovereign immunity.
At the outset of litigation, the defendant -- who could be an individual user, a librarian, or a library -- should consider whether settlement is a better alternative than proceeding toward full trial. Because the finer points of copyright infringement litigation are often complex, defending against an allegation of copyright infringement can be very expensive. Further, because many countries allow a plaintiff who succeeds in his copyright infringement lawsuit to collect damages as set by statute, instead of having to prove actual damages, the final awards in copyright infringement actions can be large. Finally, statutes or courts may even award attorney’s fees and other costs to the plaintiff if he prevails in his litigation.
In light of these considerations, the defendant may decide that settling with the plaintiff is a better option than facing the uncertainty and potential expense of litigation. In a settlement procedure, once the parties have agreed to a set of terms and once the defendant has complied with those terms, the plaintiff will dismiss his lawsuit. The terms of settlement can vary significantly. In some instances, the plaintiff may be content with the defendant simply removing the materials from her web site. In other cases, the plaintiff may demand that the defendant pay some amount of money in addition to removing the infringing material. Frequently, as part of a settlement, the parties will agree to a permanent injunction that prohibits the defendant from engaging in the same behavior in the future.
At other times, however, the defendant may decide that settlement is not appropriate, and thus will proceed with the litigation. In order to prevail in a copyright infringement lawsuit, the copyright holder must prove:
- that the work is copyrightable
- that she is the holder of the copyright
- that unauthorized exercise of one or more of the exclusive rights occurred.
Each of these requirements is discussed in depth in earlier modules; we review them here briefly.
Unauthorized copying and reproduction is the most common form of copyright infringement. Copying may be demonstrated by direct proof, but such evidence is often unavailable. Copying may also by demonstrated indirectly, by presenting evidence of a substantial similarity between the original work and the copied work, and by demonstrating that the defendant had access to the copyright holder’s work. Access may be proven by facts showing specifically how the defendant could have obtained the copyrighted work. Alternatively, it may be shown by the fact that the copyrighted work was generally available and widely distributed. The substantial similarity requirement and the access requirement are interconnected in that the more similar the two works are, the less evidence the plaintiff needs to introduce regarding access to the work.
In defending against a claim of copyright infringement, the defendant may claim several defenses and exceptions, such as fair use, statute of limitations, uncopyrightability of the original work, public domain, first sale doctrine, safe-harbor provisions, independent creation, and other statutory exemptions. We examined those Exceptions and Limitations in detail in Module 4. Librarians accused of copyright infringement should of course review carefully the Exceptions and Limitations for Libraries, discussed in Module 4.
Most countries’ copyright regimes provide a broad range of remedies for copyright infringement. This is required by several of international agreements discussed in Module 2, including various European Union Directives as well as the TRIPS Agreement, which require members to establish enforcement procedures and remedies sufficient to prevent infringement and to serve as a deterrent to future infringements. (TRIPS Art. 41(1).) The copyright holder can typically seek temporary or permanent injunctive relief, actual damages suffered as the result of the infringement, statutory damages, award of trial costs and attorney fees. Finally, and under fairly limited circumstances, the infringing party may be found to be criminally liable, and sanctioned with fines and imprisonment.
To obtain a preliminary injunction against the infringement, the copyright holder typically has to establish a likelihood of success on the merits of the lawsuit and the possibility of irreparable injury if injunctive relief is not granted. If infringement is found, the copyright holder may be entitled to a permanent injunction, which results in seizure, impoundment, and destruction of the infringing works. U.S. courts routinely grant preliminary injunctions if the plaintiff is able to establish a prima facie case of infringement. In addition, seizure and impoundment procedures are part of international treaty obligations under Article 46 of the TRIPS Agreement.
The copyright holder is also likely to seek either actual or statutory damages arising from the copyright infringement. In establishing the amount of money to be recovered, the copyright holder may receive actual damages by demonstrating either the actual loss caused by the infringement, or the defendant’s profits attributable to the infringement. The goal is typically to place the copyright holder in a position he would have been in if the infringement had not occurred. The copyright holder may also claim injury suffered from not being credited with authorship or injury to business goodwill in computing damages. Further, some countries allow the recovery of immaterial or moral damages in instances where the violation of rights was particularly egregious, or where the infringement was intentional. For example, Art. 13(1)(a) of the EU Directive 2004/48/EC on the Enforcement of Intellectual Property Rights indicates that in calculating damages, the court may take into account non-economic factors such as the moral prejudice caused to the copyright holder by the infringement.
Because precise calculation of damages and lost profits may be difficult or even impossible in copyright infringement cases, most countries allow the copyright holder to choose to recover statutorily-set damages instead of having to compute and prove actual damages. For example, under U.S. law, if the copyright holder chooses this option, the court may award damages of between $750 and $30,000 for each copyrighted work infringed. If, however, the copyright holder proves that the defendant acted willfully, the statutory damages award may be as high as $150,000 per work. Conversely, if the defendant is able to demonstrate that he or she was unaware that his or her acts constituted copyright infringement, the court may reduce the damage award to $200 per work infringed. The statutory damages set by other countries vary, but the upper limits of the awards tend to be substantial. Israel, for example, permits an award of statutory damages for infringement of a copyright or a moral right of up to $26,000 at the court’s discretion, while Canada allows for statutory damages of between $500 and $20,000 per work infringed.
As noted above, plaintiffs in copyright infringement suits may attempt to recover some or all of their costs, as well as reasonable attorney’s fees. The courts typically have discretion to decide whether to award costs and fees, and if so, in what amount. Some countries allow courts to award costs (but not attorney’s fees) to losing parties.
In rare cases, copyright infringement may result in criminal sanctions. Typically, to succeed in a criminal copyright infringement suit, the government must demonstrate that the defendant infringed a copyright, did so willfully, and did so for commercial advantage or private financial gain. Persons who knowingly and willfully aid and abet a person to commit copyright infringement may be subject to the same criminal penalties as the infringer. A good-faith belief by the defendant that the infringing conduct was legal will typically suffice to defeat the “willfulness” requirement in a criminal prosecution. If, however, the government is able to demonstrate all required elements of criminal copyright infringement, the sanctions may be severe. Under US law, for example, a commercial infringer may be fined up to $250,000 and imprisoned for up to five years. However, criminal prosecutions of individual infringers are infrequent, and seem largely limited to instances such as willful copying of copyrighted material with the intent to sell or otherwise distribute the copies.
Cross-border Infringement, Extraterritoriality, Conflict of Laws and Jurisdictional Limitations
Despite attempts to create some uniformity in international copyright laws, domestic legal procedures, burdens of proof, and the availability and amount of damages vary considerably across countries. Because of these differences, the plaintiff’s choice of which country and court to bring her suit in becomes important. However, whether a particular forum is available is likely to be limited by the substantive law of copyright and the doctrines of extraterritoriality, choice of law, and conflict of laws.
For instance, a copyright holder cannot usually sue in one country for acts of copyright infringement that occurred in a different country. This is because, with a few exceptions, the doctrine of extraterritoriality means that a country's laws only apply within the geographic borders of that country. Applying this doctrine, courts in the United States have almost uniformly rejected attempts to apply U.S. copyright law to conduct outside of the United States. Most other countries have taken the same position.
The doctrine of extraterritoriality has been complicated, however, by digital technologies and the rise of the Internet. With physical goods, it is usually easy to identify "where" an act of copyright infringement occurred. However, digital infringement may involve several steps that occur in different countries governed by different copyright regimes. This muddles the question of where an actual infringement took place.
Courts have not been consistent in analyzing this issue. For example, some early decisions suggested that an American authorizing an infringement that occurs on foreign soil does not violate US copyright law. Subsequent courts have been reluctant to follow this reasoning. Instead, they have held that US law applies to any infringement where a single "predicate act" -- an act which led to the infringement -- occurred in the United States.
If a particular infringement is alleged to have occurred at least in part in more than one country, a court will engage in a “conflict of laws” analysis to determine which country’s law will govern the infringement action. Because the same act of infringement may occur in several different countries, it is possible that courts in different countries might apply different countries' laws to the same action. Sometimes, a court will rule that the applicable law is the law of the country in which the infringement occurred. As such, that law will govern all elements of the action without regard to the nationality of the author, the country of origin of the copyrighted work, or the place of first publication of the copyrighted work. However, this view has been criticized by some commentators because its application would result in the application of different laws every time the work crosses a national border.
An alternative approach is to apply different laws to originality, ownership, and infringement -- the different elements of the infringement action. Under this view, a U.S. court would have to apply U.S. law to resolve issues of originality if the work is first published in the U.S. The law applicable to ownership is likely to be the law of the country that has the most significant relationship to the copyrighted work and to the parties involved. Finally, under the general principle of lex loci delicti (the place of wrong), the law applicable to the actual infringement is likely to be that of the country in which the actual infringement occurred.
The dominant view seems to be that courts should apply the law of the place where the infringement actually occurred. This view is consistent with the territorial limitations of copyright law, as well as the general consensus that the protections granted by copyright are largely domestic. It is also consistent with Article 5(2) of the Berne Convention, which provides that copyright protection is to be “governed exclusively by the laws of the country where protection is claimed.” At the same time, application of this view to digital acts of infringement may create significant enforcement difficulties and greatly increase the complexity of the case, as digital distribution and reproduction make it easy to disseminate copyrighted works to persons in different countries with different copyright regimes.
The Complex Responsibilities of Librarians
Libraries are major purchasers of copyrighted works and make these works available to the public. Although librarians typically seek to prevent copyright infringement of library materials, the ultimate responsibility of librarians is to provide access to materials and information services, not to enforce copyright law. Several library organizations have attempted to provide guidance as to the appropriate balance between protecting the rights of authors and serving the needs of library patrons.
For example, the American Library Association Code of Ethics notes that recognition and respect for intellectual property rights is one of the principles that should guide librarians’ ethical decision-making. However, the Code also emphasizes that the ALA is committed to upholding the principles of intellectual freedom and resisting efforts to censor library resources.
The United Kingdom’s Chartered Institute of Library and Information Professionals (CILIP) supports similar values in its Code of Professional Practice. Its code requires members to “defend the legitimate needs and interests of information users, while upholding the moral and legal rights of the creators and distributors of intellectual property.”
Finally, the International Federation of Library Associations and Institutions (IFLA) has released a statement setting forth its position on copyright. The IFLA has acknowledged that librarians have a long-standing role in informing and educating users about the importance of copyright law and compliance with it. However, it also emphasizes that overprotection of copyright leads to unreasonable restrictions to access and knowledge. It has suggested that copyright law should establish clear limitations on liability of third parties, such as librarians, in instances where compliance cannot practically or reasonably be enforced.
Back to the case study
Nadia and Angela should first ascertain whether there is any merit to the publisher's complaint. For example, they should check to determine whether the copyright on the work has expired or whether the inclusion of a copy of the work in the packet of course materials is protected by any of the exceptions and limitations in their nation's copyright laws. If they have any doubts on this score, they should consult a lawyer. The lawyer will provide them advice not just concerning the permissibility of their behavior, but also concerning the potential penalties they face if the publisher brings suit. With the lawyer's aid, they should then decide whether to remove the material at issue from the course materials.
Additional resources
In "Secondary Liability for Copyright Infringement in the US"((.link_red)) (2006), Professor Jane Ginsburg provides a good review of the law governing contributory and vicarious copyright infringement.
The Stanford Technology Law Review examines the same subject in "Interpreting Grokster: Limits on the Scope of Secondary Liability for Copyright Infringement"((.link_green)) (2006).
Another good treatment of the same subject is Jay Dratler, "A Theory of Secondary Liability for Copyright Infringement"((.link_green)) (2005).
A shrewd, forward-looking study of secondary liability doctrines with specific reference to filesharing is Guy Pessach, "An International-Comparative Perspective on Peer-to-Peer File-Sharing and Third Party Liability in Copyright Law: Framing the Past, Present, and Next Generations' Questions,"((.link_red)) 40 Vanderbilt Journal Transnational Law 87 (2007).
An authoritative discussion of the meaning of plagiarism is American Historical Association, Statement on Standards of Professional Conduct, #4: Plagiarism (2005).
A thoughtful recent statement by the IFLA concerning the copyright system and its impact on libraries can be found Here((.link_green)).
Cases
The following judicial opinions explore and apply some of the principles discussed in this module:
Sony Corporation of America v. Universal City Studios, Inc., 464 U.S. 417 (1984)((.link_red)) (secondary liability)
CBS Songs Limited & Others v. Amstrad Consumer Electronics Plc and Anor., House of Lords, 12 May 1988((.link_green)) (secondary liability)
Assignment and discussion questions
1. Does your country have a safe harbor limiting service providers’ liability? If yes, please describe the mechanism.
2. Select one activity of your library, describe it and elaborate best practices to avoid copyright infringement. For example, you might draft a set of guidelines for professors who prepare course packs or a notice to be displayed next to the printing machine or the computers available to patrons.
1. Please review the safe harbor policies available in the countries of your colleagues. Which ones offer the most favorable conditions for libraries and for what reasons?
2. Please comment on a few notices of your colleagues. These should be clear and inclusive, but not overbroad.
Contributors
This module was created by Dmitriy Tishyevich. It was then edited by a team including Sebastian Diaz, William Fisher, Urs Gasser, Adam Holland, Kimberley Isbell, Peter Jaszi, Colin Maclay, Andrew Moshirnia, and Chris Peterson.
Course Materials:
- Module 1: Copyright and the Public Domain
- Module 2: The International Framework
- Module 3: The Scope of Copyright Law
- Module 4: Rights, Exceptions, and Limitations
- Module 5: Managing Rights
- Module 6: Creative Approaches and Alternatives
- Module 7: Enforcement
- Module 8: Traditional Knowledge
- Module 9: Activism
- Glossary