Stanford Law Review
Copyright (c) 2000 The Board of Trustees of Leland Stanford Junior University
May, 2000; 52 Stan. L. Rev. 1251
Hardware-Based ID, Rights Management, and Trusted
Systems
Jonathan Weinberg
(Professor of Law, Wayne State University)
I owe thanks to Phil Agre, Karl Auerbach, Lorrie Cranor, Jessica
Litman, Neil Netanel, Paul Resnick, and Joel Reidenberg. Earlier versions
of this paper were presented at a Haifa University Conference on the Commodification
of Information and at the Telecommunications Policy Research Conference.
All Internet citations were current as of May 22, 2000. Copyright ©
2000 by Jonathan Weinberg and the Board of Trustees of the Leland Stanford
Junior University.
IV. Trusted Systems and Common Identifiers
A. Introduction
I want to explore some of the social implications of implementing, on a
widespread basis, trusted systems based on identifiers such as the PSN. In
that connection, it seems to me that two characteristics of the PSN are notable.
First, the PSN is keyed to the holder's identity, rather than his characteristics.
It enforces a particular model of trust, in which to learn the characteristics
of a particular would-be information recipient, a publisher first ascertains
that person's identity and then looks up the characteristics associated with
that identity.
This model stands in contrast to a more privacy-protective approach, in which
a person can present credentials verifying certain characteristics, such
as country of residence, without necessarily disclosing his identity at all.
n74 For an example, consider an idea floated by Ira Magaziner in 1998.
n75 Magaziner was looking for an answer to one problem presented by Internet
anonymity: It undercuts the ability of geographic jurisdictions to tax, because
it may not be clear to the merchant and interested governments whether taxes
are due and to whom. Magaziner suggested that consumers could make purchases
online through the use of "electronic "resident cards'" encoding their country
of residence, so that escrow agents could collect taxes associated with that
jurisdiction. n76 The proposal was unworkable, but was in one respect
privacy-friendly: It contemplated that people would reveal, and carry with
them online, a single personal characteristic (their country of residence),
without having to reveal any other characteristics. The merchant could learn
a buyer's residence, but that information transaction would not reveal his
name. The PSN, by contrast, eschews this approach. For the PSN to be used
as the basis for a trusted system, the content provider must correlate the
PSN with its other data relating to the individual owning that computer,
by tying all of that data to the single identifier that the PSN represents.
The second notable characteristic of the PSN is that it is a common identifier.
That is, it is well-suited to use by different information collectors in
[*1269] unrelated transactions, increasing the ease with which a wide
range of information about a person can be aggregated into a single overall
dossier. n77 The greatest obstacle to efficient aggregation and manipulation
of data today is the need to reconcile inconsistent formats and identifiers;
n78 a standard, common GUID can eliminate that obstacle. n79 To the
extent that a variety of content providers and other merchants have each
collected information tied to individual PSNs, it is a simple matter to compile
those files into larger databases.
B. Privacy
Widespread deployment of trusted systems based on such global identifiers
will have social consequences. Such systems - in which the user's computer
identifies itself during every transaction, to anybody who asks - are pernicious
from a privacy perspective. They allow the user to be tracked through cyberspace
more easily and thoroughly than is possible under current technology. They
have the potential to make the Internet a forum in which database proprietors
have what Phil Agre has referred to as a "God's-eye view of the world" -
a perspective in which all things have their true names and our Internet
representations can straightforwardly be traced back to our real-world identities.
n80 Under such an architecture, a much greater [*1270] proportion
of ordinary transactions would require consumers to present unique identification
numbers that would in turn be digitally linked to a much wider range of personal
information. To the extent that collecting identification and assembling
dossiers is easy, content providers may do so even when they have no compelling
use for the information.
Advertisers and others already see great value in compiling dossiers of personally
identifiable information for each of us. Consider, in this regard, the recent
Abacus-Doubleclick merger. The combined company announced plans to cross-reference
Abacus's database of consumer buying habits, containing real names and addresses
and detailed buying information, with Doubleclick's database of consumer
Internet surfing and buying habits. n81 Doubleclick targets ads to
users, based on "dozens of characteristics, including geographical region,
language, and business." n82 It backed off plans to associate its online
information about individual consumers with Abacus's personally identifiable
offline information only in the face of Federal Trade Commission and state
investigations, private lawsuits, and a consumer boycott. n83 The adoption
of common identifiers would facilitate the correlation of individual data
profiles across databases without public relations headaches.
Systems facilitating the close tracking of content - of what people read,
view, or listen to - seem particularly problematic. All of these are the
constitutents of human thought. In the analog world, information or entertainment
goods are commonly sold on a cash basis, leaving no paper or electronic trail.
The copies themselves have no surveillance capabilities, and cannot report
back to their makers. The copyright owner, indeed, collects no information
about the user at all. n84 Trusted systems threaten to abandon those
rules, facilitating the monitoring of individual thought. They raise the
specter of the Panopticon, and of subtle and not-so-subtle pressures on individuals
[*1271] to eschew socially or governmentally disfavored information
goods. n85
C. Communications Policy
A second set of consequences relates to the effects of this technology on
the economics and politics of content markets. To begin with, all technological
measures protecting digital content (of which trusted systems are a subset)
raise an important set of issues typically associated with intellectual property
law. Such measures allow sellers of entertainment or information to assert
effective control over uses that are privileged by intellectual property
law, and over subject-matter that is assigned by intellectual property law
to the public domain. That is, they enable sellers to exercise control notwithstanding
intellectual property law's judgment that society in those circumstances
is best served by free use of the material by the public at large.
n86 Others have written cogently about these points, and I will not linger
long on them here. n87 Instead, I want to raise broader concerns, which
I believe resonate less with those of intellectual property law, and more
with those of communications policy generally. n88
[*1272] It is useful here to review two capabilities that trusted
systems based on common identifiers give to sellers of entertainment or information.
First, the reliable identification of the would-be consumer, together with
any other information the seller can collect describing that would-be consumer,
helps give the seller individualized information about each member of its
target audience. Second, the access and copy protection capabilities of the
system mean that the seller has much stronger control over which consumers
get access to the work; the seller therefore can sharply limit any secondary
market in the work.
In the Old Way of Doing Things, technical inefficiencies made it difficult
to disseminate speech to a dispersed but tightly controlled group of folks.
There was always some leakage: If you wanted to disseminate speech, you had
to give up some control over its dissemination. For example, once a content
owner distributed a copy of a work, it had no technological means of preventing
the owner of that copy from selling, loaning, privately displaying, or giving
away the copy as he chose. n89 And the copyright law's "first sale
doctrine" denied content owners the ability to impose such restrictions within
the four corners of the copyright law. n90 These limitations on content
owners' effective rights helped democratize access to content. They allowed
gratis redistribution of, and secondary markets in, copies of the works.
Though content owners have complained that the Internet threatens to divest
them of any control over the distribution of their works, trusted systems
threaten to eliminate even the small avenues for royalty-free redistribution
that exist in the nondigital world. n91
It is worth lingering on the role of sharing, and other forms of redistribution,
in the nontrusted system world. "Small-scale, decentralized reproduction
of intellectual property" has long been a fact of life in markets for information,
entertainment, and computer software. n92 People copy music tapes and
CDs for themselves, family, and friends; they photocopy magazine articles;
they allow family and friends to use, and copy, their computer software.
They persist in doing so, notwithstanding the best efforts of the copyright
industries to convince them that it is illegal, largely because they find
it [*1273] hard to believe that this is something the law does
or should proscribe. n93 And that system seems to work - at least,
it has not obviously injured in any palpable way producer incentives to create
intellectual property.
The nontrusted-system world is also characterized by a lot of sharing, in
the vernacular sense, that does not implicate copyright law. As I noted above,
people lend each other analog copies of protected works, and read, watch,
or listen to works they have borrowed, all without implicating the copyright
laws at all. At least in a static analysis, n94 both of these sorts
of sharing are good, since they increase the distribution of information
and thus social benefit without any social cost. n95 Put another way,
sharing allows the distribution of information at the optimal demand price,
because that price is equal to the marginal cost of distribution, which in
this case is close to zero. n96 The most successful institutions in
American life today that are based on such sharing are public libraries,
which were established precisely to enable large-scale sharing of analog
works.
The trusted-system world could involve a number of changes to this status
quo. The content provider's enhanced control over access to the work could
constrain both types of sharing I have described above. It would allow content
providers to sharply limit the small-scale copying of intellectual property
that has become both accepted and commonplace among consumers today, but
that producers contend violates their copyrights. It could also greatly limit
the small-and large-scale lending and borrowing of intellectual property
that takes place today and is unimpeachably consistent with the copyright
laws. After all, as noted above, the control given content providers by trusted
systems does not rest on whether the content provider can assert intellectual
property rights in the work, or whether a particular use of the work by a
consumer would violate those rights.
The trusted-system world also seems well-suited to facilitate discrimination
on the part of the content provider, a change with more ambiguous results.
Most obviously, trusted systems will facilitate price discrimination - that
is, the content provider can ask different consumers to pay different prices,
unrelated to the provider's own costs. That is not the way markets typically
work: Most commonly, a producer sets a uniform price, which each consumer
chooses to pay or not pay. Sellers cannot effectively engage [*1274]
in price discrimination unless three conditions are met. n97 First,
the seller must be able to prevent (or limit) arbitrage - it must ensure
that buyers who paid a low price do not turn around and resell the information
or entertainment to someone who would otherwise be willing to pay the content
provider the higher price. Otherwise, any attempt by the producer to partition
the market would be unavailing. Trusted systems make this possible by greatly
enhancing the content provider's ability to control any redistribution of
the work.
Second, the seller must have market power. All copyright owners have some
degree of market power because of the legal control that intellectual property
law gives them; that is one reason they are able to charge prices in excess
of marginal cost. Some, naturally, have more market power than others, based
on the demand for the work and the availability of near-substitutes.
Finally, the seller must be able to set prices in a way that in fact reflects
consumers' willingness to pay. Trusted-system technology can make this possible
in two ways. First, as noted above, a trusted online architecture based on
global user or platform identifiers will allow content providers to tie each
consumer to a wide range of personally identifiable information. For example,
when the consumer presents her PSN to gain access to a digital work, the
content provider will be able to pull up other information associated with
that PSN in order to make a judgment about the particular consumer's willingness
to pay. n98 Alternatively, the content provider can shift its payment
model from the "sale" model prevalent today, in which the consumer buys a
copy of the work and can then read, listen to, or watch that copy an unlimited
number of times without further payment, to a "pay-per-read" system in which
the customer pays a smaller amount on each occasion that she reads, listens
to, or watches the work. This allows the content provider to collect more
money from those customers who want to use the work many times and presumably
are willing to pay more for that ability, and less from those who want to
view the work only once. The difference between those prices is largely unrelated
to the content provider's own costs. n99
Is this price discrimination a good thing or a bad one? Some have argued
that it is beneficial. n100 Price discrimination in information goods
is socially [*1275] useful, the argument runs, because it increases
the distribution of information. Without price discrimination, the content
provider must charge a single market price, and people unwilling to pay that
price will be shut out of the market entirely. If the content provider can
engage in price discrimination, by contrast, it can charge every consumer
the exact price that she is willing to pay, thus simultaneously maximizing
profits and maximizing the number of people who will be exposed to the information
and entertainment in question. "We can say with confidence that many more
consumers [will benefit] from the author's creation." n101
The matter, though, is not nearly so straightforward. Price discrimination
is unquestionably good for producers since it converts consumer surplus into
producer profits. But, as a general matter, whether price discrimination
increases overall welfare is a more difficult question, resting on the facts
of each case. n102 An increase in the distribution of the good is a
necessary, but not a sufficient, condition for increasing total welfare.
n103
More to the point, in thinking about whether the price discrimination enabled
by trusted systems would be a good thing, we need to ask the question, "Compared
to what"? One of the key reasons that trusted systems enable price discrimination
is that they sharply decrease sharing; they are designed to eliminate any
redistribution of the information good beyond the control of the content
provider. That is, price discrimination allows the sale of information to
consumers willing to pay less, but at the expense of cutting off existing
means, through sharing and secondary markets, of getting the information
or entertainment at low or no cost to some of those same consumers. Indeed,
from a static perspective sharing is a more efficient way of allowing the
market to reach those consumers, since it makes the good available to them
at a price more nearly approaching the zero marginal cost of supplying it
to them.
Secondary markets, involving redistribution of information goods after their
first sale and outside the control of the initial seller, can do the same
job as price discrimination of getting information goods at lower prices
to lower-valuation users. That is what used bookstores are all about. The
price discrimination that trusted systems may facilitate therefore may not
increase the number of consumers getting the good at all; it may simply ensure
that the low-valuation consumers receive the good from the initial seller
rather than someone else. n104 Further, it does so at the distributional
cost of shifting all surplus away from consumers.
[*1276] The points I have made so far are open to a variety of counterarguments.
First, it might be argued that price discrimination will do a better job
of getting the information or entertainment to low-valuation users, many
of whom may not have the opportunity to gain access to the work through resale
or sharing. The copyright-law implications of issues surrounding small-scale
redistribution, even when no new copies are created (aside from the RAM copies
that are associated with any invocation of a digital work), are hotly debated
within the legal community. Large-scale copying and redistribution of digital
works is illegal even when no price is charged. n105 Yet public libraries,
at least, are set up precisely for the purpose of getting free information
works to users unwilling to pay the price set by the market. Consumers interested
in viewing a work only once and willing to wait until it is available can
borrow from the library; those interested in viewing the work multiple times
are more inclined to buy it. This is precisely the sort of result price discrimination
is supposed to achieve.
By contrast, it is unclear to what extent price discrimination in practice
can achieve the advantages theory promises for it. It is difficult to gauge
consumer preferences precisely, and publishers are unlikely to drop prices
too far based on guesses about a particular class of consumers' willingness
to pay. While theoretical perfect price discrimination promises perfectly
efficient markets, real-world third-degree discrimination will fall short
of that ideal, as publishers group consumers by second-best proxy characteristics
and attempt to set prices for each group. Nor will consumers easily accept
second-degree discrimination: The splashy failure of DIVX, a pay-per-view
movie format, should give rise to some doubt about the enthusiasm with which
ordinary folks will embrace usage-based prices for digital works. n106
Next, one might argue that if sharing were technologically disallowed then
market prices would fall. Without the possibility of sharing, the argument
runs, information goods are not as valuable to purchasers. Yet when the content
provider must set a single market price, it cannot easily raise that price
to take into account the benefits of sharing, because different buyers will
place significantly different values on the ability to share (and will in
[*1277] fact share with markedly different numbers of people).
n107 Moreover, the existence of leakage also acts to constrain prices, by
providing a near-substitute for the purchased good. n108
Finally and most obviously, one might argue that this analysis overlooks
the dynamic impact of sharing and the nature of secondary markets in digital
works: Sharing and resale do not generate revenues to the content provider,
so they do not provide incentives to stimulate production. More baldly, one
might argue that my discussion is in essence an argument for piracy - which
will certainly lower prices to the consumer, but at the cost of diminishing
incentives to produce. Secondary markets in the digital world, the argument
runs, may involve large numbers of illegal perfect copies. Sale of those
copies cuts directly into the profits, and thus the incentives, of the initial
producer.
I do not contest that producer incentives are necessary. Publishers must
be able to sell information goods at a price sufficiently above marginal
cost, and for a sufficiently long period of time, to recover their fixed
(first-copy) costs. Otherwise, they would lose money. To that end, there
must be sufficient entry barriers limiting other folks' ability to sell those
works as cheaply. We do not know, though, how much in the way of incentives
producers need. n109 Ordinary economic theory suggests that publishers
will invest so long as they expect profits, taking into account normal rates
of return. If publishers have adequate incentives even without the extra
rents that price discrimination gives them, then we may get a better social
result by reaching lower-valuation users through secondary markets, sharing,
or even some degree of piracy than through the increased control that trusted
systems bring. n110
Further, there is a connection between media concentration and the power
of information providers to identify consumers and to thus discriminate.
To the extent that sellers' ability to price discriminate will rest on their
access to personally identifiable information about buyers, publishers with
access to those databases will have a competitive advantage over those who
[*1278] do not. This may have two negative effects. First, it will
tend to concentrate media markets - and, to the extent those markets are
characterized by winner-take-all dynamics, n111 will help determine
who those winners are. Second, it will increase the value of the dossiers,
and thus increase the commercial pressure on privacy.
The control facilitated by trusted systems and common identifiers may allow
other sorts of discrimination as well. Most generally, it will increase producers'
ability to pick and choose who will be allowed to view or read particular
works. Given the power of a common identifier such as Intel's PSN to facilitate
the association of a wide range of information with a given personal identifier,
producers could in theory use these tools to allow access to a speech work
only by persons who live in preferred zip codes, have certain levels of family
income, or are white. There may be only limited circumstances in which a
mass marketer of entertainment and information would have an incentive to
do so: Most obviously, perhaps, a publisher might discriminate because of
ideological motivations, or if particular content gained cachet from only
limited distribution. From a free speech and communications policy standpoint,
though, it seems disturbing to see extensive social investment in a technology
built around the ability to prevent the movement of speech and information
to the public at large.
For the most part, today, content producers and consumers share control over
the uses and dissemination of speech works. Content producers have extensive
control by virtue of their ability to produce and license the technological
artifacts (such as film reels) embodying those works, reinforced by the rights
granted them by the copyright law. Consumers have some control as well, by
virtue of their own abilities to use, copy, and manipulate such works in
ways that the copyright law either does not forbid or expressly privileges,
n112 or in ways that have been effectively immune from copyright enforcement.
And because these are speech works, that distribution of control has political
consequences. It shapes the overall movement of information and expression
within society. The rise of trusted systems based on common identifiers would
shift that control. n113
FOOTNOTES:
n74. See Agre, supra note 7, PP 18, 35; David Chaum, Security Without Identification:
Transaction Systems to Make Big Brother Obsolete, 28 Comm. of the ACM 1030,
1030 (1985); Lessig & Resnick, supra note 1, at 412-13. Part V infra
discusses this in greater detail.
n75. Ira Magaziner, at the time, was the President's Senior Internet Advisor.
n76. See Internet Taxation System is Mulled by White House, Wall St. J.,
Sept. 11, 1998, at B4.
n77. See David Chaum, Achieving Electronic Privacy, Sci. Am., Aug. 1992,
at 96 <http:// ganges.cs.tcd.ie/mepeirce/Project/Chaum/sciam.html>.
n78. For an example of an attempt to gain the benefits of such standardization,
consider the RosettaNet specification, under development by a consortium
of information technology companies. See RosettaNet, Executive Overview <www.rosettanet.org/general/overview.html>.
The point of the RosettaNet project is to build an XML-based language of
common data descriptors and business processes to streamline electronic business-to-business
transactions. See, e.g., Ellis Booker, XML Greases Supply Chain, Internet
Week, Aug. 23, 1999, at 1 <http://www.techweb.com/ se/directlink.cgi?INW19990823S0001>
(describing the current status of XML-driven supply chains). Yet an initial
draft of the RosettaNet specification raised controversy in part because
of the ease with which such standardization allows the sharing of personally
identifiable information: The specification directed vendors to provide the
purchaser's name and address to every company involved in the item's production.
See James Glave, RosettaNet: Nothing Personal?, Wired News (Sept. 10, 1999)
<http://wired.lycos.com/news/news/technology/story/21699.html>; James
Glave, The Killer Consumer Gossip App, Wired News (Sept. 10, 1999) <http://wired.lycos.com/news/
news/technology/story/21668.html>.
n79. See Graham Greenleaf, "IP, Phone Home": ECMS, (c)-tech, and Protecting
Privacy Against Surveillance by Digital Works 7-8 (1999) (paper presented
to the 21[su'st'] International Conference on Privacy and Personal Data Protection
held September 13-15, 1999, in Hong Kong) <http:// www2.austlii.edu.au/<diff>graham/publications/ip<uscore>privacy>
("The success, importance and danger of ECMS [electronic copyright management
systems] is likely to depend in large part on the extent to which they achieve
interoperability between multiple publishers (within one ECMS), and ultimately,
between different ECMS and different media types.").
n80. Agre, supra note 7, PP 23, 26. Agre, I should note, disclaims authorship.
See Email from Phil Agre to the author (May 10, 1999) (on file with the author).
He cites Donna Haraway's reference to the "god-trick" in connection with
the postulated ability to see like a God from a position transcendent and
outside of lived experience, see Donna J. Haraway, Situated Knowledges: The
Science Question in Feminism and the Privilege of Partial Perspective, in
Simians, Cyborgs, and Women: The Reinvention of Nature, 183, 193 (1991),
and Edwin Burtt's much earlier reference to a similar perspective in The
Metaphysical Foundations of Modern Physical Science: A Historical and Critical
Essay (1925). Neither author developed the idea, though, in relation to computer
representations of identity, much less privacy policy.
n81. See Courtney Macavinta, DoubleClick, Abacus Merge in $ 1.7 Billion Deal,
CNET News.com (Nov. 24, 1999) <http://news.cnet.com/news/0-1005-200-1463444.html>;
Courtney Macavinta, Privacy Advocates Target Abacus Shareholders, CNET News.com
(June 29, 1999) <http://www.news.cnet.com/news/0.1005-200-344244.html>;
Courtney Macavinta, Privacy Fears Raised by Doubleclick Database Plans, CNET
News.com (Jan. 25, 2000) <http://news.cnet.com/ news/0-1005-200-1531929.html>.
n82. See Doubleclick, Annual Report-Overview: Making Internet Advertising
Work <http:// www.doubleclick.net/annualreport/overview.htm>.
n83. See Diane Anderson & Keith Perine, Privacy Issue Makes Doubleclick
a Target, Standard (Feb. 3, 2000) <http://www.thestandard.com/article/display/0,1151,9480,00.html>;
Jeri Clausing, Michigan Moves Against Doubleclick, Cybertimes (Feb. 19, 2000)
<http://www. nytimes.com/library/tech/00/02/cyber/articles/18doubleclick.html>;
Bob Tedeschi, In a Shift, Doubleclick Puts Off Its Plan for Wider Use of
the Personal Data of Internet Consumers, N.Y. Times, Mar. 3, 2000, at C5.
n84. See Greenleaf, supra note 79, P 8.
n85. See Julie E. Cohen, Some Reflections on Copyright Management Systems
and Laws Designed to Protect Them, 12 Berkeley Tech. L.J. 161, 184-85 (1997).
n86. Given its enactment of the Digital Copyright Millennium Act of 1998,
Pub. L. No. 105-304, 112 Stat. 2860 (1998), which criminalizes the act of
"circumventing" such technological protections, Congress appears not to share
that concern. See generally Pamela Samuelson, Intellectual Property and the
Digital Economy: Why the Anticircumvention Regulations Need to be Revised
<http://www.sims.berkeley.edu/<diff>pam/papers/Samuelson<uscore>IP<uscore>dig&
usc ore;eco<uscore>htm.htm> (criticizing the anticircumvention rules).
n87. See generally, e.g., Symposium, Intellectual Property and Contract Law
in the Information Age: The Impact of Article 2B of the Uniform Commercial
Code on the Future of Transactions in Information and Electronic Commerce,
13 Berkeley Tech. L.J. 809 (1998) (collection of articles critically examining
proposed Article 2B of the Uniform Commercial Code); James Boyle, Foucault
in Cyberspace: Surveillance, Sovereignty, and Hardwired Censors, 66 U. Cin.
L. Rev. 177 (1997) (explaining that legal rules barring circumvention of
technological protection measures clothe both the state and content providers
with power they would not otherwise have); Julie E. Cohen, Copyright and
the Jurisprudence of Self-Help, 13 Berkeley Tech. L.J. 1089 (1998) (arguing
that self-enforcing digital contracts grant publishers absolute control inconsistent
with copyright and First Amendment principles); Mark A. Lemley, Dealing with
Overlapping Copyrights on the Internet, 22 U. Dayton L. Rev. 547 (1997) (emphasizing
the broad scope of rights granted to copyright holders by a rote application
of the existing statute to Internet technology); Lawrence Lessig, Intellectual
Property and Code, 11 St. John's J. Legal Comment. 635 (1996) (suggesting
that technological protection of intellectual property can make legal protections
irrelevant, and thus privatize law); Jessica Litman, Reforming Information
Law in Copyright's Image, 22 U. Dayton. L. Rev. 587 (1997) (pointing out
the dangers to important information-policy concerns presented by the intersection
of copyright law and Internet technology); Greenleaf, supra note 79 (observing
that technical protections of intellectual property may obviate public interest
protections in intellectual property law).
n88. Cf. Kenneth W. Dam, Self-Help in the Digital Jungle, 28 J. Legal Stud.
393, 395-97 (1999) (suggesting that copyright scholars, precisely because
they tend to approach technological protection systems from an intellectual
property standpoint, have been insufficiently appreciative of the virtues
of technological protections).
n89. See Litman, supra note 87, at 600-01.
n90. See id.
n91. See note 12 supra and accompanying text.
n92. Stanley M. Besen & Sheila Nataraj Kirby, Private Copying, Appropriability,
and Optimal Copying Royalties, 32 J.L. & Econ. 255, 255 (1989); see also
Yannis Bakos, Erik Brynjolfsson & Douglas Lichtman, Shared Information
Goods, 42 J.L. & Econ. 117 (1999) (investigating how consumer sharing
of information goods affects seller profits); Litman, Copyright Noncompliance
(Or Why We Can't "Just Say Yes" to Licensing), supra note 17; Michael J.
Meurer, Price Discrimination, Personal Use and Piracy: Copyright Protection
of Digital Works, 45 Buff. L. Rev. 845, 852-56 (1997) (discussing the economic
impacts of unauthorized sharing).
n93. See Litman, Copyright Noncompliance (Or Why We Can't "Just Say Yes"
to Licensing), supra note 17, at 252-53; Jessica Litman, Revising Copyright
Law for the Information Age, 75 Or. L. Rev. 19, 40-41 (1996).
n94. But see text following note 108 infra (discussing the dynamic impact
of sharing).
n95. See Kenneth J. Arrow, Economic Welfare and the Allocation of Resources
for Invention, in The Rate and Direction of Inventive Activity: Economic
and Social Factors 609 (1962); Yochai Benkler, Free as the Air to Common
Use: First Amendment Constraints on Enclosure of the Public Domain, 74 N.Y.U.
L. Rev. 354, 424 (1999).
n96. See Benkler, supra note 95, at 424 & n.273.
n97. See Meurer, supra note 92, at 870.
n98. Economists refer to this as third-degree price discrimination. See W.
Kip Viscusi, John M. Vernon & Joseph E. Harrington, Jr., Economics of
Regulation and Antitrust 290-91 (2d ed. 1995).
n99. This falls within a category that economists refer to as second-degree
price discrimination. See id. at 249-55, 290-91.
n100. See, e.g., Fisher, supra note 5 (arguing that price discrimination
makes information products available to a wider range of consumers). But
see Wendy J. Gordon, Intellectual Property as Price Discrimination: Implications
for Contract, 73 Chi.-Kent L. Rev. 1367 (1998) (querying Fisher's premises).
n101. Fisher, supra note 5, at 1239.
n102. See Viscusi et al., supra note 98, at 290-95; Meurer, supra note 92,
at 896-98.
n103. See Viscusi et al., supra note 98, at 293-95; Meurer, supra note 92,
at 898.
n104. See Gordon, supra note 100, at 1378-89.
n105. See No Electronic Theft (NET) Act of 1997, Pub. L. No. 105-147, 111
Stat. 2678 (codified at, inter alia, 17 U.S.C. 506-07 & 18 U.S.C. 2319-2320);
William McCall, College Student Convicted of Piracy, AP Online, Aug. 21,
1999, available in Westlaw, WL 22036202 (describing the first conviction
under the 1997 law).
n106. The DIVX plan was that a user would purchase a videodisk for $ 4-5,
and have free access for 48 hours after the first play. After that time,
the user would pay a fee for every subsequent viewing; those viewings would
be purchased through a central server connected to the DIVX player by telephone
line. See David Dranove & Neil Gandel, The DVD vs. DIVX Standard War:
Network Effects and Empirical Evidence of Vaporware 8 (Tel Aviv Univ. Eltan
Berlgas School of Economics Working Paper No. 14-99, 1999). DIVX was discontinued,
for lack of consumer interest, in June 1999. See Carl Laron, Of Edsels and
DIVX, Electronics Now, Sept. 1, 1999, at 2.
n107. Bakos et al., supra note 92, engage in a much more sophisticated analysis
of this phenomenon. The authors conclude that sharing decreases producer
profit when the diversity in team size, defined as the number of consumers
sharing any particular copy of the good, exceeds the diversity in individual
consumer valuations. They note that seller profit is enhanced if high-valuing
consumers tend to share with low-valuing consumers rather than with each
other, and if low-valuing consumers tend to share with a greater number of
people than do high-valuing consumers. Both of these contingencies will tend
to "even out" the value that each team places on the good, and thus will
allow the producer to reflect that value more nearly in its selling price.
Id. at 122-27.
n108. See Benkler, supra note 95, at 433 n.302.
n109. See Litman, The Exclusive Right to Read, supra note 17, at 44-46.
n110. See Bakos et. al., supra note 92, at 148 ("Profitability and social
efficiency need not go hand in hand: sharing can be profitable [for content
providers] in situations where it is not efficient, and efficient in situations
where it is not profitable.").
n111. See note 68 supra.
n112. See, e.g., 17 U.S.C. 1008 (privileging consumers' noncommercial use
of digital audio recording devices, digital audio recording media, analog
recording devices, and analog recording media for making musical recordings);
Recording Indus. Ass'n v. Diamond Multimedia Sys., 180 F.3d 1072 (9th Cir.
1999) (declining to enjoin the manufacture and sale of the Rio portable music
player, which plays downloaded MP3 files).
n113. See generally Lawrence Lessig, Code and Other Laws of Cyberspace 154-56
(1999) (raising equity-based concerns).