[DOCID: f:hr551p2.105] From the House Reports Online via GPO Access [wais.access.gpo.gov] 105th Congress Rept. 105-551 HOUSE OF REPRESENTATIVES 2d Session Part 2 _______________________________________________________________________ DIGITAL MILLENNIUM COPYRIGHT ACT OF 1998 _______ July 22, 1998.--Committed to the Committee of the Whole House on the State of the Union and ordered to be printed _______________________________________________________________________ Mr. Bliley, from the Committee on Commerce, submitted the following R E P O R T together with ADDITIONAL VIEWS [To accompany H.R. 2281] [Including cost estimate of the Congressional Budget Office] The Committee on Commerce, to whom was referred the bill (H.R. 2281) to amend title 17, United States Code, to implement the World Intellectual Property Organization Copyright Treaty and Performances and Phonograms Treaty, having considered the same, report favorably thereon with an amendment and recommend that the bill as amended do pass. CONTENTS Page Amendment........................................................ 2 Purpose and Summary.............................................. 20 Background and Need for Legislation.............................. 21 Hearings......................................................... 28 Committee Consideration.......................................... 28 Roll Call Votes.................................................. 28 Committee Oversight Findings..................................... 32 Committee on Government Reform and Oversight..................... 32 New Budget Authority, Entitlement Authority, and Tax Expenditures 32 Committee Cost Estimate.......................................... 32 Congressional Budget Office Estimate............................. 32 Federal Mandates Statement....................................... 34 Advisory Committee Statement..................................... 35 Constitutional Authority Statement............................... 35 Applicability to Legislative Branch.............................. 35 Section-by-Section Analysis of the Legislation................... 35 Changes in Existing Law Made by the Bill, as Reported............ 68 Additional Views................................................. 85 The amendment is as follows: Strike out all after the enacting clause and insert in lieu thereof the following: SECTION 1. SHORT TITLE. This Act may be cited as the ``Digital Millennium Copyright Act of 1998''. SEC. 2. TABLE OF CONTENTS. Sec. 1. Short title. Sec. 2. Table of contents. TITLE I--WIPO TREATIES IMPLEMENTATION Sec. 101. Short title. Sec. 102. Circumvention of copyright protection systems. Sec. 103. Integrity of copyright management information. Sec. 104. Civil remedies. Sec. 105. Criminal offenses and penalties. Sec. 106. Savings clause. Sec. 107. Development and implementation of technological protection measures. Sec. 108. Technical amendments. Sec. 109. Effective date. TITLE II--INTERNET COPYRIGHT INFRINGEMENT LIABILITY Sec. 201. Short title. Sec. 202. Limitations on liability for Internet copyright infringement. Sec. 203. Limitations on exclusive rights; computer programs. Sec. 204. Liability of educational institutions for online infringement of copyright. Sec. 205. Evaluation of impact of copyright law and amendments on electronic commerce and technological development. Sec. 206. Effective date. TITLE III--EPHEMERAL RECORDINGS; DISTANCE EDUCATION; EXEMPTION FOR LIBRARIES AND ARCHIVES Sec. 301. Ephemeral recordings. Sec. 302. Limitations on exclusive rights; distance education. Sec. 303. Exemption for libraries and archives. TITLE IV--RELATED PROVISIONS Sec. 401. Report by National Telecommunications and Information Administration. TITLE I--WIPO TREATIES IMPLEMENTATION SEC. 101. SHORT TITLE. This title may be cited as the ``WIPO Copyright Treaties Implementation Act''. SEC. 102. CIRCUMVENTION OF COPYRIGHT PROTECTION SYSTEMS. (a) Violations Regarding Circumvention of Technological Protection Measures.--(1)(A) The Secretary of Commerce shall issue regulations prohibiting any person from circumventing a technological protection measure that effectively controls access to a work protected under title 17, United States Code, to the extent provided in this subsection, effective at the end of the 2-year period beginning on the date of the enactment of this Act. (B) During the 2-year period described in subparagraph (A), and in each succeeding 2-year period, the Secretary of Commerce, in consultation with the Assistant Secretary of Commerce for Communications and Information, the Commissioner of Patents and Trademarks, and the Register of Copyrights, shall conduct a rulemaking on the record to determine whether users of copyrighted works have been, or are likely to be in the succeeding 2-year period, adversely affected by the implementation of technological protection measures that effectively control access to works protected under title 17, United States Code, in their ability to make lawful uses under title 17, United States Code, of copyrighted works. In conducting such rulemaking, the Secretary shall examine-- (i) the availability for use of copyrighted works; (ii) the availability for use of works for archival, preservation, and educational purposes; (iii) the impact of the application of technological protection measures to copyrighted works on criticism, comment, news reporting, teaching, scholarship, or research; (iv) the effect of circumvention of technological protection measures on the market for or value of copyrighted works; and (v) such other factors as the Secretary, in consultation with the Assistant Secretary of Commerce for Communications and Information, the Commissioner of Patents and Trademarks, and the Register of Copyrights, considers appropriate. (C) The Secretary, with respect to each particular class of copyrighted works for which the Secretary has determined, pursuant to the rulemaking conducted under subparagraph (B), that lawful uses have been, or are likely to be, adversely affected, shall waive the applicability of the regulations issued under subparagraph (A) for the ensuing 2-year period. The determinations made in the rulemaking shall not be admissible in any action to enforce any provision of this Act other than this paragraph. (2) No person shall manufacture, import, offer to the public, provide, or otherwise traffic in any technology, product, service, device, component, or part thereof, that-- (A) is primarily designed or produced for the purpose of circumventing a technological protection measure that effectively controls access to a work protected under title 17, United States Code; (B) has only limited commercially significant purpose or use other than to circumvent a technological protection measure that effectively controls access to a work protected under title 17, United States Code; or (C) is marketed by that person or another acting in concert with that person with that person's knowledge for use in circumventing a technological protection measure that effectively controls access to a work protected under title 17, United States Code. (3) As used in this subsection-- (A) to ``circumvent a technological protection measure'' means to descramble a scrambled work, to decrypt an encrypted work, or otherwise to avoid, bypass, remove, deactivate, or impair a technological protection measure, without the authority of the copyright owner; and (B) a technological protection measure ``effectively controls access to a work'' if the measure, in the ordinary course of its operation, requires the application of information, or a process or a treatment, with the authority of the copyright owner, to gain access to the work. (b) Additional Violations.--(1) No person shall manufacture, import, offer to the public, provide, or otherwise traffic in any technology, product, service, device, component, or part thereof, that-- (A) is primarily designed or produced for the purpose of circumventing protection afforded by a technological protection measure that effectively protects a right of a copyright owner under title 17, United States Code, in a work or a portion thereof; (B) has only limited commercially significant purpose or use other than to circumvent protection afforded by a technological protection measure that effectively protects a right of a copyright owner under title 17, United States Code, in a work or a portion thereof; or (C) is marketed by that person or another acting in concert with that person with that person's knowledge for use in circumventing protection afforded by a technological protection measure that effectively protects a right of a copyright owner under title 17, United States Code, in a work or a portion thereof. (2) As used in this subsection-- (A) to ``circumvent protection afforded by a technological protection measure'' means avoiding, bypassing, removing, deactivating, or otherwise impairing a technological protection measure; and (B) a technological protection measure ``effectively protects a right of a copyright owner under title 17, United States Code'' if the measure, in the ordinary course of its operation, prevents, restricts, or otherwise limits the exercise of a right of a copyright owner under title 17, United States Code. (c) Other Rights, Etc., Not Affected.--(1) Nothing in this section shall affect rights, remedies, limitations, or defenses to copyright infringement, including fair use, under title 17, United States Code. (2) Nothing in this section shall enlarge or diminish vicarious or contributory liability for copyright infringement in connection with any technology, product, service, device, component, or part thereof. (3) Nothing in this section shall require that the design of, or design and selection of parts and components for, a consumer electronics, telecommunications, or computing product provide for a response to any particular technological protection measure. (4) Nothing in this section shall enlarge or diminish any rights of free speech or the press for activities using consumer electronics, telecommunications, or computing products. (d) Exemption for Nonprofit Libraries, Archives, and Educational Institutions.--(1) A nonprofit library, archives, or educational institution which gains access to a commercially exploited copyrighted work solely in order to make a good faith determination of whether to acquire a copy of that work for the sole purpose of engaging in conduct permitted under title 17, United States Code, shall not be in violation of the regulations issued under subsection (a)(1)(A). A copy of a work to which access has been gained under this paragraph-- (A) may not be retained longer than necessary to make such good faith determination; and (B) may not be used for any other purpose. (2) The exemption made available under paragraph (1) shall only apply with respect to a work when an identical copy of that work is not reasonably available in another form. (3) A nonprofit library, archives, or educational institution that willfully for the purpose of commercial advantage or financial gain violates paragraph (1)-- (A) shall, for the first offense, be subject to the civil remedies under section 104; and (B) shall, for repeated or subsequent offenses, in addition to the civil remedies under section 104, forfeit the exemption provided under paragraph (1). (4) This subsection may not be used as a defense to a claim under subsection (a)(2) or (b), nor may this subsection permit a nonprofit library, archives, or educational institution to manufacture, import, offer to the public, provide, or otherwise traffic in any technology, product, service, component, or part thereof, which circumvents a technological protection measure. (5) In order for a library or archives to qualify for the exemption under this subsection, the collections of that library or archives shall be-- (A) open to the public; or (B) available not only to researchers affiliated with the library or archives or with the institution of which it is a part, but also to other persons doing research in a specialized field. (e) Law Enforcement and Intelligence Activities.--This section does not prohibit any lawfully authorized investigative, protective, or intelligence activity of an officer, agent, or employee of the United States, a State, or a political subdivision of a State, or a person acting pursuant to a contract with the United States, a State, or a political subdivision of a State. (f) Reverse Engineering.--(1) Notwithstanding the regulations issued under subsection (a)(1)(A), a person who has lawfully obtained the right to use a copy of a computer program may circumvent a technological protection measure that effectively controls access to a particular portion of that program for the sole purpose of identifying and analyzing those elements of the program that are necessary to achieve interoperability of an independently created computer program with other programs, and that have not previously been readily available to the person engaging in the circumvention, to the extent any such acts of identification and analysis do not constitute infringement under title 17, United States Code. (2) Notwithstanding the provisions of subsections (a)(2) and (b), a person may develop and employ technological means to circumvent a technological protection measure, or to circumvent protection afforded by a technological protection measure, in order to make the identification and analysis permitted under paragraph (1), or for the limited purpose of achieving interoperability of an independently created computer program with other programs, if such means are necessary to achieve such interoperability, to the extent that doing so does not constitute infringement under title 17, United States Code. (3) The information acquired through the acts permitted under paragraph (1), and the means permitted under paragraph (2), may be made available to others if the person referred to in paragraph (1) or (2), as the case may be, provides such information or means solely for the purpose of achieving interoperability of an independently created computer program with other programs, and to the extent that doing so does not constitute infringement under title 17, United States Code, or violate other applicable law. (4) For purposes of this subsection, the term ``interoperability'' means the ability of computer programs to exchange information, and of such programs mutually to use the information which has been exchanged. (g) Encryption Research.-- (1) Definitions.--For purposes of this subsection-- (A) the term ``encryption research'' means activities necessary to identify and analyze flaws and vulnerabilities of encryption technologies applied to copyrighted works, if these activities are conducted to advance the state of knowledge in the field of encryption technology or to assist in the development of encryption products; and (B) the term ``encryption technology'' means the scrambling and descrambling of information using mathematical formulas or algorithms. (2) Permissible acts of encryption research.--Notwithstanding the provisions of subsection (a)(1)(A), it is not a violation of the regulations issued under that subsection for a person to circumvent a technological protection measure as applied to a copy, phonorecord, performance, or display of a published work in the course of an act of good faith encryption research if-- (A) the person lawfully obtained the encrypted copy, phonorecord, performance, or display of the published work; (B) such act is necessary to conduct such encryption research; (C) the person made a good faith effort to obtain authorization before the circumvention; and (D) such act does not constitute infringement under title 17, United States Code, or a violation of applicable law other than this section, including section 1030 of title 18, United States Code, and those provisions of title 18, United States Code, amended by the Computer Fraud and Abuse Act of 1986. (3) Factors in determining exemption.--In determining whether a person qualifies for the exemption under paragraph (2), the factors to be considered shall include-- (A) whether the information derived from the encryption research was disseminated, and if so, whether it was disseminated in a manner reasonably calculated to advance the state of knowledge or development of encryption technology, versus whether it was disseminated in a manner that facilitates infringement under title 17, United States Code, or a violation of applicable law other than this section, including a violation of privacy or breach of security; (B) whether the person is engaged in a legitimate course of study, is employed, or is appropriately trained or experienced, in the field of encryption technology; and (C) whether the person provides the copyright owner of the work to which the technological protection measure is applied with notice of the findings and documentation of the research, and the time when such notice is provided. (4) Use of technological means for research activities.-- Notwithstanding the provisions of subsection (a)(2), it is not a violation of that subsection for a person to-- (A) develop and employ technological means to circumvent a technological protection measure for the sole purpose of performing the acts of good faith encryption research described in paragraph (2); and (B) provide the technological means to another person with whom he or she is working collaboratively for the purpose of conducting the acts of good faith encryption research described in paragraph (2) or for the purpose of having that other person verify his or her acts of good faith encryption research described in paragraph (2). (5) Report to congress.--Not later than 1 year after the date of the enactment of this Act, the Assistant Secretary of Commerce for Communications and Information shall report to the Congress on the effect this subsection has had on-- (A) encryption research and the development of encryption technology; (B) the adequacy and effectiveness of technological protection for copyrighted works; and (C) protection of copyright owners against the unauthorized access to their encrypted copyrighted works. The Assistant Secretary shall include in such report recommendations, if any, on proposed amendments to this Act. (h) Components or Parts to Prevent Access of Minors to the Internet.--In applying subsection (a) and the regulations issued under subsection (a)(1)(A) to a component or part, the court may consider the necessity for its intended and actual incorporation in a technology, product, service, or device, which-- (1) does not itself violate the provisions of title 17, United States Code; and (2) has the sole purpose to prevent the access of minors to material on the Internet. (i) Protection of Personally Identifying Information.-- (1) Circumvention permitted.--Notwithstanding the provisions of subsection (a)(1)(A), it is not a violation of the regulations issued under that subsection for a person to circumvent a technological protection measure that effectively controls access to a work protected under title 17, United States Code, if-- (A) the technological protection measure, or the work it protects, contains the capability of collecting or disseminating personally identifying information reflecting the online activities of a natural person who seeks to gain access to the work protected; (B) in the normal course of its operation, the technological protection measure, or the work it protects, collects or disseminates personally identifying information about the person who seeks to gain access to the work protected, without providing conspicuous notice of such collection or dissemination to such person, and without providing such person with the capability to prevent or restrict such collection or dissemination; (C) the act of circumvention has the sole effect of identifying and disabling the capability described in subparagraph (A), and has no other effect on the ability of any person to gain access to any work; and (D) the act of circumvention is carried out solely for the purpose of preventing the collection or dissemination of personally identifying information about a natural person who seeks to gain access to the work protected, and is not in violation of any other law. (2) Inapplicability to certain technological protection measures.--This subsection does not apply to a technological protection measure, or a work it protects, that does not collect or disseminate personally identifying information and that is disclosed to a user as not having or using such capability. SEC. 103. INTEGRITY OF COPYRIGHT MANAGEMENT INFORMATION. (a) False Copyright Management Information.--No person shall knowingly and with the intent to induce, enable, facilitate, or conceal infringement-- (1) provide copyright management information that is false, or (2) distribute or import for distribution copyright management information that is false. (b) Removal or Alteration of Copyright Management Information.--No person shall, without the authority of the copyright owner or the law-- (1) intentionally remove or alter any copyright management information, (2) distribute or import for distribution copyright management information knowing that the copyright management information has been removed or altered without authority of the copyright owner or the law, or (3) distribute, import for distribution, or publicly perform works, copies of works, or phonorecords, knowing that copyright management information has been removed or altered without authority of the copyright owner or the law, knowing, or, with respect to civil remedies under section 104, having reasonable grounds to know, that it will induce, enable, facilitate, or conceal an infringement of any right under title 17, United States Code. (c) Definitions.--As used in this section-- (1) the terms ``distribute'', ``publicly perform'', ``copies'', and ``phonorecords'' have the meanings given those terms in title 17, United States Code; and (2) the term ``copyright management information'' means any of the following information conveyed in connection with copies or phonorecords of a work or performances or displays of a work, including in digital form, except that such term does not include any personally identifying information about a user of a work or of a copy, phonorecord, performance, or display of a work: (A) The title and other information identifying the work, including the information set forth on a notice of copyright. (B) The name of, and other identifying information about, the author of a work. (C) The name of, and other identifying information about, the copyright owner of the work, including the information set forth in a notice of copyright. (D) With the exception of public performances of works by radio and television broadcast stations, the name of, and other identifying information about, a performer whose performance is fixed in a work other than an audiovisual work. (E) With the exception of public performances of works by radio and television broadcast stations, in the case of an audiovisual work, the name of, and other identifying information about, a writer, performer, or director who is credited in the audiovisual work. (F) Terms and conditions for use of the work. (G) Identifying numbers or symbols referring to such information or links to such information. (H) Such other information as the Register of Copyrights may prescribe by regulation, except that the Register of Copyrights may not require the provision of any information concerning the user of a copyrighted work. (d) Law Enforcement and Intelligence Activities.--This section does not prohibit any lawfully authorized investigative, protective, or intelligence activity of an officer, agent, or employee of the United States, a State, or a political subdivision of a State, or a person acting pursuant to a contract with the United States, a State, or a political subdivision of a State. (e) Limitations on Liability.-- (1) Analog transmissions.--In the case of an analog transmission, a person who is making transmissions in its capacity as a broadcast station, or as a cable system (as defined in section 602 of the Communications Act of 1934), or someone who provides programming to such station or system, shall not be liable for a violation of subsection (b) if-- (A) avoiding the activity that constitutes such violation is not technically feasible or would create an undue financial hardship on such person; and (B) such person did not intend, by engaging in such activity, to induce, enable, facilitate, or conceal infringement of a right under title 17, United States Code. (2) Digital transmissions.-- (A) If a digital transmission standard for the placement of copyright management information for a category of works is set in a voluntary, consensus standard-setting process involving a representative cross-section of broadcast stations or cable systems and copyright owners of a category of works that are intended for public performance by such stations or systems, a person identified in paragraph (1) shall not be liable for a violation of subsection (b) with respect to the particular copyright management information addressed by such standard if-- (i) the placement of such information by someone other than such person is not in accordance with such standard; and (ii) the activity that constitutes such violation is not intended to induce, enable, facilitate, or conceal infringement of a right under title 17, United States Code. (B) Until a digital transmission standard has been set pursuant to subparagraph (A) with respect to the placement of copyright management information for a category or works, a person identified in paragraph (1) shall not be liable for a violation of subsection (b) with respect to such copyright management information, if the activity that constitutes such violation is not intended to induce, enable, facilitate, or conceal infringement of a right under title 17, United States Code, and if-- (i) the transmission of such information by such person would result in a perceptible visual or aural degradation of the digital signal; or (ii) the transmission of such information by such person would conflict with-- (I) an applicable government regulation relating to transmission of information in a digital signal; (II) an applicable industry-wide standard relating to the transmission of information in a digital signal that was adopted by a voluntary consensus standards body prior to the effective date of this title; or (III) an applicable industry-wide standard relating to the transmission of information in a digital signal that was adopted in a voluntary, consensus standards-setting process open to participation by a representative cross-section of broadcast stations or cable systems and copyright owners of a category of works that are intended for public performance by such stations or systems. (3) Definitions.--As used in this subsection-- (A) the term ``broadcast station'' has the meaning given that term in section 3 of the Communications Act of 1934 (47 U.S.C. 153)); and (B) the term ``cable system'' has the meaning given that term in section 602 of the Communications Act of 1934 (47 U.S.C. 522)). SEC. 104. CIVIL REMEDIES. (a) Civil Actions.--Any person injured by a violation of section 102 or 103, or of any regulation issued under section 102(a)(1), may bring a civil action in an appropriate United States district court for such violation. (b) Powers of the Court.--In an action brought under subsection (a), the court-- (1) may grant temporary and permanent injunctions on such terms as it deems reasonable to prevent or restrain a violation, but in no event shall impose a prior restraint on free speech or the press protected under the 1st amendment to the Constitution; (2) at any time while an action is pending, may order the impounding, on such terms as it deems reasonable, of any device or product that is in the custody or control of the alleged violator and that the court has reasonable cause to believe was involved in a violation; (3) may award damages under subsection (c); (4) in its discretion may allow the recovery of costs by or against any party other than the United States or an officer thereof; (5) in its discretion may award reasonable attorney's fees to the prevailing party; and (6) may, as part of a final judgment or decree finding a violation, order the remedial modification or the destruction of any device or product involved in the violation that is in the custody or control of the violator or has been impounded under paragraph (2). (c) Award of Damages.-- (1) In general.--Except as otherwise provided in this title, a person committing a violation of section 102 or 103, or of any regulation issued under section 102(a)(1), is liable for either-- (A) the actual damages and any additional profits of the violator, as provided in paragraph (2), or (B) statutory damages, as provided in paragraph (3). (2) Actual damages.--The court shall award to the complaining party the actual damages suffered by the party as a result of the violation, and any profits of the violator that are attributable to the violation and are not taken into account in computing the actual damages, if the complaining party elects such damages at any time before final judgment is entered. (3) Statutory damages.-- (A) At any time before final judgment is entered, a complaining party may elect to recover an award of statutory damages for each violation of section 102, or of a regulation issued under section 102(a)(1), in the sum of not less than $200 or more than $2,500 per act of circumvention, device, product, component, offer, or performance of service, as the court considers just. (B) At any time before final judgment is entered, a complaining party may elect to recover an award of statutory damages for each violation of section 103 in the sum of not less than $2,500 or more than $25,000. (4) Repeated violations.--In any case in which the injured party sustains the burden of proving, and the court finds, that a person has violated section 102 or 103, or any regulation issued under section 102(a)(1), within three years after a final judgment was entered against the person for another such violation, the court may increase the award of damages up to triple the amount that would otherwise be awarded, as the court considers just. (5) Innocent violations.-- (A) In general.--The court in its discretion may reduce or remit the total award of damages in any case in which the violator sustains the burden of proving, and the court finds, that the violator was not aware and had no reason to believe that its acts constituted a violation. (B) Nonprofit library, archives, or educational institutions.--In the case of a nonprofit library, archives, or educational institution, the court shall remit damages in any case in which the library, archives, or educational institution sustains the burden of proving, and the court finds, that the library, archives, or educational institution was not aware and had no reason to believe that its acts constituted a violation. SEC. 105. CRIMINAL OFFENSES AND PENALTIES. (a) In General.--Any person who violates section 102 or 103, or any regulation issued under section 102(a)(1), willfully and for purposes of commercial advantage or private financial gain-- (1) shall be fined not more than $500,000 or imprisoned for not more than 5 years, or both, for the first offense; and (2) shall be fined not more than $1,000,000 or imprisoned for not more than 10 years, or both, for any subsequent offense. (b) Limitation for Nonprofit Library, Archives, or Educational Institution.--Subsection (a) shall not apply to a nonprofit library, archives, or educational institution. (c) Statute of Limitations.--No criminal proceeding shall be brought under this section unless such proceeding is commenced within five years after the cause of action arose. SEC. 106. SAVINGS CLAUSE. Nothing in this title abrogates, diminishes, or weakens the provisions of, nor provides any defense or element of mitigation in a criminal prosecution or civil action under, any Federal or State law that prevents the violation of the privacy of an individual in connection with the individual's use of the Internet. SEC. 107. DEVELOPMENT AND IMPLEMENTATION OF TECHNOLOGICAL PROTECTION MEASURES. (a) Statement of Congressional Policy and Objective.--It is the sense of the Congress that technological protection measures play a crucial role in safeguarding the interests of both copyright owners and lawful users of copyrighted works in digital formats, by facilitating lawful uses of such works while protecting the private property interests of holders of rights under title 17, United States Code. Accordingly, the expeditious implementation of such measures, developed by the private sector through voluntary industry-led processes, is a key factor in realizing the full benefits of making available copyrighted works through digital networks, including the benefits set forth in this section. (b) Technological Protection Measures.--The technological protection measures referred to in subsection (a) shall include, but not be limited to, those which-- (1) enable nonprofit libraries, for nonprofit purposes, to continue to lend to library users copies or phonorecords that such libraries have lawfully acquired, including the lending of such copies or phonorecords in digital formats in a manner that prevents infringement; (2) effectively protect against the infringement of exclusive rights under title 17, United States Code, and facilitate the exercise of those exclusive rights; and (3) promote the development and implementation of diverse methods, mechanisms, and arrangements in the marketplace for making available copyrighted works in digital formats which provide opportunities for individual members of the public to make lawful uses of copyrighted works in digital formats. (c) Procedures for Developing and Implementing Technological Protection Measures.--The technological protection measures whose development and implementation the Congress anticipates are those which-- (1) are developed pursuant to a broad consensus in an open, fair, voluntary, and multi-industry process; (2) are made available on reasonable and nondiscriminatory terms; and (3) do not impose substantial costs or burdens on copyright owners or on manufacturers of hardware or software used in conjunction with copyrighted works in digital formats. (d) Oversight and Reporting.--(1) The Secretary of Commerce, in consultation with the Assistant Secretary of Commerce for Communications and Information and the Register of Copyrights, shall review the impact of the enactment of section 102 of this Act on the access of individual users to copyrighted works in digital formats and shall report annually thereon to the Committees on Commerce and on the Judiciary of the House of Representatives and the Committees on Commerce, Science, and Transportation and on the Judiciary of the Senate. (2) Each report under paragraph (1) shall address the following issues: (A) The status of the development and implementation of technological protection measures, including measures that advance the objectives of this section, and the effectiveness of technological protection measures in protecting the private property interests of copyright owners under title 17, United States Code. (B) The degree to which individual lawful users of copyrighted works-- (i) have access to the Internet and digital networks generally; (ii) are dependent upon such access for their use of copyrighted works; (iii) have available to them other channels for obtaining and using copyrighted works, other than the Internet and digital networks generally; (iv) are required to pay copyright owners or intermediaries for each lawful use of copyrighted works in digital formats to which they have access; and (v) are able to utilize nonprofit libraries to obtain access, through borrowing without payment by the user, to copyrighted works in digital formats. (C) The degree to which infringement of copyrighted works in digital formats is occurring. (D) Whether and the extent to which section 102, and the regulations issued under section 102(a)(1), are asserted as a basis for liability in claims brought against persons conducting research and development, including reverse engineering of copyrighted works, and the extent to which such claims constitute a serious impediment to the development and production of competitive goods and services. (E) The degree to which individual users of copyrighted materials in digital formats are able effectively to protect themselves against the use of technological protection measures to carry out or facilitate the undisclosed collection and dissemination of personally identifying information concerning the access to and use of such materials by such users. (F) Such other issues as the Secretary of Commerce, in consultation with the Assistant Secretary of Commerce for Communications and Information and the Register of Copyrights, identifies as relevant to the impact of the enactment of section 102 on the access of individual users to copyrighted works in digital formats. (3) The first report under this subsection shall be submitted not later than one year after the date of the enactment of this Act, and the last such report shall be submitted not later than three years after the date of the enactment of this Act. (4) The reports under this subsection may include such recommendations for additional legislative action as the Secretary of Commerce and the Register of Copyrights consider advisable in order to further the objectives of this section. SEC. 108. TECHNICAL AMENDMENTS. (a) Definitions.--Section 101 of title 17, United States Code, is amended-- (1) by striking the definition of ``Berne Convention work''; (2) in the definition of ``The `country of origin' of a Berne Convention work''-- (A) by striking ``The `country of origin' of a Berne Convention work, for purposes of section 411, is the United States if'' and inserting ``For purposes of section 411, a work is a `United States work' only if''; (B) in paragraph (1)-- (i) in subparagraph (B) by striking ``nation or nations adhering to the Berne Convention'' and inserting ``treaty party or parties''; (ii) in subparagraph (C) by striking ``does not adhere to the Berne Convention'' and inserting ``is not a treaty party''; and (iii) in subparagraph (D) by striking ``does not adhere to the Berne Convention'' and inserting ``is not a treaty party''; and (C) in the matter following paragraph (3) by striking ``For the purposes of section 411, the `country of origin' of any other Berne Convention work is not the United States.''; (3) by inserting after the definition of ``fixed'' the following: ``The `Geneva Phonograms Convention' is the Convention for the Protection of Producers of Phonograms Against Unauthorized Duplication of Their Phonograms, concluded at Geneva, Switzerland, on October 29, 1971.''; (4) by inserting after the definition of ``including'' the following: ``An `international agreement' is-- ``(1) the Universal Copyright Convention; ``(2) the Geneva Phonograms Convention; ``(3) the Berne Convention; ``(4) the WTO Agreement; ``(5) the WIPO Copyright Treaty; ``(6) the WIPO Performances and Phonograms Treaty; and ``(7) any other copyright treaty to which the United States is a party.''; (5) by inserting after the definition of ``transmit'' the following: ``A `treaty party' is a country or intergovernmental organization other than the United States that is a party to an international agreement.''; (6) by inserting after the definition of ``widow'' the following: ``The `WIPO Copyright Treaty' is the WIPO Copyright Treaty concluded at Geneva, Switzerland, on December 20, 1996.''; (7) by inserting after the definition of ``The `WIPO Copyright Treaty' '' the following: ``The `WIPO Performances and Phonograms Treaty' is the WIPO Performances and Phonograms Treaty concluded at Geneva, Switzerland, on December 20, 1996.''; and (8) by inserting after the definition of ``work made for hire'' the following: ``The terms `WTO Agreement' and `WTO member country' have the meanings given those terms in paragraphs (9) and (10), respectively, of section 2 of the Uruguay Round Agreements Act.''. (b) Subject Matter of Copyright; National Origin.--Section 104 of title 17, United States Code, is amended-- (1) in subsection (b)-- (A) in paragraph (1) by striking ``foreign nation that is a party to a copyright treaty to which the United States is also a party'' and inserting ``treaty party''; (B) in paragraph (2) by striking ``party to the Universal Copyright Convention'' and inserting ``treaty party''; (C) by redesignating paragraph (5) as paragraph (6); (D) by redesignating paragraph (3) as paragraph (5) and inserting it after paragraph (4); (E) by inserting after paragraph (2) the following: ``(3) the work is a sound recording that was first fixed in a treaty party; or''; (F) in paragraph (4) by striking ``Berne Convention work'' and inserting ``pictorial, graphic, or sculptural work that is incorporated in a building or other structure, or an architectural work that is embodied in a building and the building or structure is located in the United States or a treaty party''; and (G) by inserting after paragraph (6), as so redesignated, the following: ``For purposes of paragraph (2), a work that is published in the United States or a treaty party within 30 days after publication in a foreign nation that is not a treaty party shall be considered to be first published in the United States or such treaty party, as the case may be.''; and (2) by adding at the end the following new subsection: ``(d) Effect of Phonograms Treaties.--Notwithstanding the provisions of subsection (b), no works other than sound recordings shall be eligible for protection under this title solely by virtue of the adherence of the United States to the Geneva Phonograms Convention or the WIPO Performances and Phonograms Treaty.''. (c) Copyright in Restored Works.--Section 104A(h) of title 17, United States Code, is amended-- (1) in paragraph (1), by striking subparagraphs (A) and (B) and inserting the following: ``(A) a nation adhering to the Berne Convention; ``(B) a WTO member country; ``(C) a nation adhering to the WIPO Copyright Treaty; ``(D) a nation adhering to the WIPO Performances and Phonograms Treaty; or ``(E) subject to a Presidential proclamation under subsection (g).''; (2) by amending paragraph (3) to read as follows: ``(3) The term `eligible country' means a nation, other than the United States, that-- ``(A) becomes a WTO member country after the date of the enactment of the Uruguay Round Agreements Act; ``(B) on such date of enactment is, or after such date of enactment becomes, a nation adhering to the Berne Convention; ``(C) adheres to the WIPO Copyright Treaty; ``(D) adheres to the WIPO Performances and Phonograms Treaty; or ``(E) after such date of enactment becomes subject to a proclamation under subsection (g).''; (3) in paragraph (6)-- (A) in subparagraph (C)(iii) by striking ``and'' after the semicolon; (B) at the end of subparagraph (D) by striking the period and inserting ``; and''; and (C) by adding after subparagraph (D) the following: ``(E) if the source country for the work is an eligible country solely by virtue of its adherence to the WIPO Performances and Phonograms Treaty, is a sound recording.''; (4) in paragraph (8)(B)(i)-- (A) by inserting ``of which'' before ``the majority''; and (B) by striking ``of eligible countries''; and (5) by striking paragraph (9). (d) Registration and Infringement Actions.--Section 411(a) of title 17, United States Code, is amended in the first sentence-- (1) by striking ``actions for infringement of copyright in Berne Convention works whose country of origin is not the United States and''; and (2) by inserting ``United States'' after ``no action for infringement of the copyright in any''. (e) Statute of Limitations.--Section 507(a) of title 17, United State Code, is amended by striking ``No'' and inserting ``Except as expressly provided otherwise in this title, no''. SEC. 109. EFFECTIVE DATE. (a) In General.--Subject to subsection (b), the amendments made by this title shall take effect on the date of the enactment of this Act. (b) Amendments Relating to Certain International Agreements.--(1) The following shall take effect upon the entry into force of the WIPO Copyright Treaty with respect to the United States: (A) Paragraph (5) of the definition of ``international agreement'' contained in section 101 of title 17, United States Code, as amended by section 108(a)(4) of this Act. (B) The amendment made by section 108(a)(6) of this Act. (C) Subparagraph (C) of section 104A(h)(1) of title 17, United States Code, as amended by section 108(c)(1) of this Act. (D) Subparagraph (C) of section 104A(h)(3) of title 17, United States Code, as amended by section 108(c)(2) of this Act. (2) The following shall take effect upon the entry into force of the WIPO Performances and Phonograms Treaty with respect to the United States: (A) Paragraph (6) of the definition of ``international agreement'' contained in section 101 of title 17, United States Code, as amended by section 108(a)(4) of this Act. (B) The amendment made by section 108(a)(7) of this Act. (C) The amendment made by section 108(b)(2) of this Act. (D) Subparagraph (D) of section 104A(h)(1) of title 17, United States Code, as amended by section 108(c)(1) of this Act. (E) Subparagraph (D) of section 104A(h)(3) of title 17, United States Code, as amended by section 108(c)(2) of this Act. (F) The amendments made by section 108(c)(3) of this Act. TITLE II--INTERNET COPYRIGHT INFRINGEMENT LIABILITY SEC. 201. SHORT TITLE. This title may be cited as the ``Internet Copyright Infringement Liability Clarification Act of 1998''. SEC. 202. LIMITATIONS ON LIABILITY FOR INTERNET COPYRIGHT INFRINGEMENT. (a) In General.--Chapter 5 of title 17, United States Code, is amended by adding after section 511 the following new section: ``Sec. 512. Liability of service providers for online infringement of copyright ``(a) Digital Network Communications.--A service provider shall not be liable for monetary relief, or except as provided in subsection (i) for injunctive or other equitable relief, for infringement for the provider's transmitting, routing, or providing connections for, material through a system or network controlled or operated by or for the service provider, or the intermediate and transient storage of such material in the course of such transmitting, routing or providing connections, if-- ``(1) it was initiated by or at the direction of a person other than the service provider; ``(2) it is carried out through an automatic technical process without selection of such material by the service provider; ``(3) the service provider does not select the recipients of such material except as an automatic response to the request of another; ``(4) no such copy of such material made by the service provider is maintained on the system or network in a manner ordinarily accessible to anyone other than anticipated recipients, and no such copy is maintained on the system or network in a manner ordinarily accessible to the anticipated recipients for a longer period than is reasonably necessary for the communication; and ``(5) the material is transmitted without modification to its content. ``(b) System Caching.--A service provider shall not be liable for monetary relief, or except as provided in subsection (i) for injunctive or other equitable relief, for infringement for the intermediate and temporary storage of material on the system or network controlled or operated by or for the service provider: Provided, That-- ``(1) such material is made available online by a person other than such service provider, ``(2) such material is transmitted from the person described in paragraph (1) through such system or network to someone other than that person at the direction of such other person, ``(3) the storage is carried out through an automatic technical process for the purpose of making such material available to users of such system or network who subsequently request access to that material from the person described in paragraph (1): Provided further, That-- ``(4) such material is transmitted to such subsequent users without modification to its content from the manner in which the material otherwise was transmitted from the person described in paragraph (1); ``(5) such service provider complies with rules concerning the refreshing, reloading or other updating of such material when specified by the person making that material available online in accordance with an accepted industry standard data communications protocol for the system or network through which that person makes the material available: Provided further, That the rules are not used by the person described in paragraph (1) to prevent or unreasonably impair such intermediate storage; ``(6) such service provider does not interfere with the ability of technology associated with such material that returns to the person described in paragraph (1) the information that would have been available to such person if such material had been obtained by such subsequent users directly from such person: Provided further, That such technology-- ``(A) does not significantly interfere with the performance of the provider's system or network or with the intermediate storage of the material; ``(B) is consistent with accepted industry standard communications protocols; and ``(C) does not extract information from the provider's system or network other than the information that would have been available to such person if such material had been accessed by such users directly from such person; ``(7) either-- ``(A) the person described in paragraph (1) does not currently condition access to such material; or ``(B) if access to such material is so conditioned by such person, by a current individual pre-condition, such as a pre-condition based on payment of a fee, or provision of a password or other information, the service provider permits access to the stored material in significant part only to users of its system or network that have been so authorized and only in accordance with those conditions; and ``(8) if the person described in paragraph (1) makes that material available online without the authorization of the copyright owner, then the service provider responds expeditiously to remove, or disable access to, the material that is claimed to be infringing upon notification of claimed infringements described in subsection (c)(3): Provided further, That the material has previously been removed from the originating site, and the party giving the notification includes in the notification a statement confirming that such material has been removed or access to it has been disabled or ordered to be removed or have access disabled. ``(c) Information Stored on Service Providers.-- ``(1) In general.--A service provider shall not be liable for monetary relief, or except as provided in subsection (i) for injunctive or other equitable relief, for infringement for the storage at the direction of a user of material that resides on a system or network controlled or operated by or for the service provider, if the service provider-- ``(A)(i) does not have actual knowledge that the material or activity is infringing, ``(ii) in the absence of such actual knowledge, is not aware of facts or circumstances from which infringing activity is apparent, or ``(iii) if upon obtaining such knowledge or awareness, the service provider acts expeditiously to remove or disable access to, the material; ``(B) does not receive a financial benefit directly attributable to the infringing activity, where the service provider has the right and ability to control such activity; and ``(C) in the instance of a notification of claimed infringement as described in paragraph (3), responds expeditiously to remove, or disable access to, the material that is claimed to be infringing or to be the subject of infringing activity. ``(2) Designated agent.--The limitations on liability established in this subsection apply only if the service provider has designated an agent to receive notifications of claimed infringement described in paragraph (3), by substantially making the name, address, phone number, electronic mail address of such agent, and other contact information deemed appropriate by the Register of Copyrights, available through its service, including on its website, and by providing such information to the Copyright Office. The Register of Copyrights shall maintain a current directory of agents available to the public for inspection, including through the Internet, in both electronic and hard copy formats. ``(3) Elements of notification.-- ``(A) To be effective under this subsection, a notification of claimed infringement means any written communication provided to the service provider's designated agent that includes substantially the following-- ``(i) a physical or electronic signature of a person authorized to act on behalf of the owner of an exclusive right that is allegedly infringed; ``(ii) identification of the copyrighted work claimed to have been infringed, or, if multiple such works at a single online site are covered by a single notification, a representative list of such works at that site; ``(iii) identification of the material that is claimed to be infringing or to be the subject of infringing activity that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit the service provider to locate the material; ``(iv) information reasonably sufficient to permit the service provider to contact the complaining party, such as an address, telephone number, and, if available an electronic mail address at which the complaining party may be contacted; ``(v) a statement that the complaining party has a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, or its agent, or the law; and ``(vi) a statement that the information in the notification is accurate, and under penalty of perjury, that the complaining party has the authority to enforce the owner's rights that are claimed to be infringed. ``(B) A notification from the copyright owner or from a person authorized to act on behalf of the copyright owner that fails substantially to conform to the provisions of paragraph (3)(A) shall not be considered under paragraph (1)(A) in determining whether a service provider has actual knowledge or is aware of facts or circumstances from which infringing activity is apparent: Provided, That the provider promptly attempts to contact the complaining party or takes other reasonable steps to assist in the receipt of notice under paragraph (3)(A) when the notice is provided to the service provider's designated agent and substantially satisfies the provisions of paragraphs (3)(A) (ii), (iii), and (iv). ``(d) Information Location Tools.--A service provider shall not be liable for monetary relief, or except as provided in subsection (i) for injunctive or other equitable relief, for infringement for the provider referring or linking users to an online location containing infringing material or activity by using information location tools, including a directory, index, reference, pointer or hypertext link, if the provider-- ``(1) does not have actual knowledge that the material or activity is infringing or, in the absence of such actual knowledge, is not aware of facts or circumstances from which infringing activity is apparent; ``(2) does not receive a financial benefit directly attributable to the infringing activity, where the service provider has the right and ability to control such activity; and ``(3) responds expeditiously to remove or disable the reference or link upon notification of claimed infringement as described in subsection (c)(3): Provided, That for the purposes of this paragraph, the element in subsection (c)(3)(A)(iii) shall be identification of the reference or link, to material or activity claimed to be infringing, that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit the service provider to locate such reference or link. ``(e) Misrepresentations.--Any person who knowingly materially misrepresents under this section-- ``(1) that material or activity is infringing, or ``(2) that material or activity was removed or disabled by mistake or misidentification, shall be liable for any damages, including costs and attorneys' fees, incurred by the alleged infringer, by any copyright owner or copyright owner's authorized licensee, or by the service provider, who is injured by such misrepresentation, as the result of the service provider relying upon such misrepresentation in removing or disabling access to the material or activity claimed to be infringing, or in replacing the removed material or ceasing to disable access to it. ``(f) Replacement of Removed or Disabled Material and Limitation on Other Liability.-- ``(1) Subject to paragraph (2) of this subsection, a service provider shall not be liable to any person for any claim based on the service provider's good faith disabling of access to, or removal of, material or activity claimed to be infringing or based on facts or circumstances from which infringing activity is apparent, regardless of whether the material or activity is ultimately determined to be infringing. ``(2) Paragraph (1) of this subsection shall not apply with respect to material residing at the direction of a subscriber of the service provider on a system or network controlled or operated by or for the service provider that is removed, or to which access is disabled by the service provider pursuant to a notice provided under subsection (c)(1)(C), unless the service provider-- ``(A) takes reasonable steps promptly to notify the subscriber that it has removed or disabled access to the material; ``(B) upon receipt of a counter notice as described in paragraph (3), promptly provides the person who provided the notice under subsection (c)(1)(C) with a copy of the counter notice, and informs such person that it will replace the removed material or cease disabling access to it in ten business days; and ``(C) replaces the removed material and ceases disabling access to it not less than 10, nor more than 14, business days following receipt of the counter notice, unless its designated agent first receives notice from the person who submitted the notification under subsection (c)(1)(C) that such person has filed an action seeking a court order to restrain the subscriber from engaging in infringing activity relating to the material on the service provider's system or network. ``(3) To be effective under this subsection, a counter notification means any written communication provided to the service provider's designated agent that includes substantially the following: ``(A) A physical or electronic signature of the subscriber. ``(B) Identification of the material that has been removed or to which access has been disabled and the location at which such material appeared before it was removed or access was disabled. ``(C) A statement under penalty of perjury that the subscriber has a good faith belief that the material was removed or disabled as a result of mistake or misidentification of the material to be removed or disabled. ``(D) The subscriber's name, address and telephone number, and a statement that the subscriber consents to the jurisdiction of Federal Court for the judicial district in which the address is located, or if the subscriber's address is outside of the United States, for any judicial district in which the service provider may be found, and that the subscriber will accept service of process from the person who provided notice under subsection (c)(1)(C) or agent of such person. ``(4) A service provider's compliance with paragraph (2) shall not subject the service provider to liability for copyright infringement with respect to the material identified in the notice provided under subsection (c)(1)(C). ``(g) Identification of Direct Infringer.--The copyright owner or a person authorized to act on the owner's behalf may request an order for release of identification of an alleged infringer by filing-- ``(1) a copy of a notification described in subsection (c)(3)(A), including a proposed order, and ``(2) a sworn declaration that the purpose of the order is to obtain the identity of an alleged infringer and that such information will only be used for the purpose of this title, with the clerk of any United States district court. The order shall authorize and order the service provider receiving the notification to disclose expeditiously to the copyright owner or person authorized by the copyright owner information sufficient to identify the alleged direct infringer of the material described in the notification to the extent such information is available to the service provider. The order shall be expeditiously issued if the accompanying notification satisfies the provisions of subsection (c)(3)(A) and the accompanying declaration is properly executed. Upon receipt of the order, either accompanying or subsequent to the receipt of a notification described in subsection (c)(3)(A), a service provider shall expeditiously give to the copyright owner or person authorized by the copyright owner the information required by the order, notwithstanding any other provision of law and regardless of whether the service provider responds to the notification. ``(h) Conditions for Eligibility.-- ``(1) Accommodation of technology.--The limitations on liability established by this section shall apply only if the service provider-- ``(A) has adopted and reasonably implemented, and informs subscribers of the service of, a policy for the termination of subscribers of the service who are repeat infringers; and ``(B) accommodates and does not interfere with standard technical measures as defined in this subsection. ``(2) Definition.--As used in this section, `standard technical measures' are technical measures, used by copyright owners to identify or protect copyrighted works, that-- ``(A) have been developed pursuant to a broad consensus of copyright owners and service providers in an open, fair, voluntary, multi-industry standards process; ``(B) are available to any person on reasonable and nondiscriminatory terms; and ``(C) do not impose substantial costs on service providers or substantial burdens on their systems or networks. ``(i) Injunctions.--The following rules shall apply in the case of any application for an injunction under section 502 against a service provider that is not subject to monetary remedies by operation of this section. ``(1) Scope of relief.-- ``(A) With respect to conduct other than that which qualifies for the limitation on remedies as set forth in subsection (a), the court may only grant injunctive relief with respect to a service provider in one or more of the following forms-- ``(i) an order restraining it from providing access to infringing material or activity residing at a particular online site on the provider's system or network; ``(ii) an order restraining it from providing access to an identified subscriber of the service provider's system or network who is engaging in infringing activity by terminating the specified accounts of such subscriber; or ``(iii) such other injunctive remedies as the court may consider necessary to prevent or restrain infringement of specified copyrighted material at a particular online location: Provided, That such remedies are the least burdensome to the service provider that are comparably effective for that purpose. ``(B) If the service provider qualifies for the limitation on remedies described in subsection (a), the court may only grant injunctive relief in one or both of the following forms-- ``(i) an order restraining it from providing access to an identified subscriber of the service provider's system or network who is using the provider's service to engage in infringing activity by terminating the specified accounts of such subscriber; or ``(ii) an order restraining it from providing access, by taking specified reasonable steps to block access, to a specific, identified, foreign online location. ``(2) Considerations.--The court, in considering the relevant criteria for injunctive relief under applicable law, shall consider-- ``(A) whether such an injunction, either alone or in combination with other such injunctions issued against the same service provider under this subsection, would significantly burden either the provider or the operation of the provider's system or network; ``(B) the magnitude of the harm likely to be suffered by the copyright owner in the digital network environment if steps are not taken to prevent or restrain the infringement; ``(C) whether implementation of such an injunction would be technically feasible and effective, and would not interfere with access to noninfringing material at other online locations; and ``(D) whether other less burdensome and comparably effective means of preventing or restraining access to the infringing material are available. ``(3) Notice and ex parte orders.--Injunctive relief under this subsection shall not be available without notice to the service provider and an opportunity for such provider to appear, except for orders ensuring the preservation of evidence or other orders having no material adverse effect on the operation of the service provider's communications network. ``(j) Definitions.-- ``(1)(A) As used in subsection (a), the term `service provider' means an entity offering the transmission, routing or providing of connections for digital online communications, between or among points specified by a user, of material of theuser's choosing, without modification to the content of the material as sent or received. ``(B) As used in any other subsection of this section, the term `service provider' means a provider of online services or network access, or the operator of facilities therefor, and includes an entity described in the preceding paragraph of this subsection. ``(2) As used in this section, the term `monetary relief' means damages, costs, attorneys' fees, and any other form of monetary payment. ``(k) Other Defenses Not Affected.--The failure of a service provider's conduct to qualify for limitation of liability under this section shall not bear adversely upon the consideration of a defense by the service provider that the service provider's conduct is not infringing under this title or any other defense. ``(l) Protection of Privacy.--Nothing in this section shall be construed to condition the applicability of subsections (a) through (d) on-- ``(1) a service provider monitoring its service or affirmatively seeking facts indicating infringing activity except to the extent consistent with a standard technical measure complying with the provisions of subsection (h); or ``(2) a service provider accessing, removing, or disabling access to material where such conduct is prohibited by law. ``(m) Rule of Construction.--Subsections (a), (b), (c), and (d) are intended to describe separate and distinct functions for purposes of analysis under this section. Whether a service provider qualifies for the limitation on liability in any one such subsection shall be based solely on the criteria in each such subsection and shall not affect a determination of whether such service provider qualifies for the limitations on liability under any other such subsection.''. (b) Conforming Amendment.--The table of sections for chapter 5 of title 17, United States Code, is amended by adding at the end the following: ``512. Liability of service providers for online infringement of copyright.''. SEC. 203. LIMITATIONS ON EXCLUSIVE RIGHTS; COMPUTER PROGRAMS. Section 117 of title 17, United States Code, is amended-- (1) by striking ``Notwithstanding'' and inserting the following: ``(a) Making of Additional Copy or Adaptation by Owner of Copy.-- Notwithstanding''; (2) by striking ``Any exact'' and inserting the following: ``(b) Lease, Sale, or Other Transfer of Additional Copy or Adaptation.--Any exact''; and (3) by adding at the end the following: ``(c) Machine Maintenance or Repair.--Notwithstanding the provisions of section 106, it is not an infringement for the owner or lessee of a machine to make or authorize the making of a copy of a computer program if such copy is made solely by virtue of the activation of a machine that lawfully contains an authorized copy of the computer program, for purposes only of maintenance or repair of that machine, if-- ``(1) such new copy is used in no other manner and is destroyed immediately after the maintenance or repair is completed; and ``(2) with respect to any computer program or part thereof that is not necessary for that machine to be activated, such program or part thereof is not accessed or used other than to make such new copy by virtue of the activation of the machine. ``(d) Definitions.--For purposes of this section-- ``(1) the `maintenance' of a machine is the servicing of the machine in order to make it work in accordance with its original specifications and any changes to those specifications authorized for that machine; and ``(2) the `repair' of a machine is the restoring of the machine to the state of working in accordance with its original specifications and any changes to those specifications authorized for that machine.''. SEC. 204. LIABILITY OF EDUCATIONAL INSTITUTIONS FOR ONLINE INFRINGEMENT OF COPYRIGHT. (a) Recommendations by Register of Copyrights.--Not later than six months after the date of the enactment of this Act, the Register of Copyrights, after consultation with representatives of copyright owners and nonprofit educational institutions, shall submit to the Congress recommendations regarding the liability of nonprofit educational institutions for copyright infringement committed with the use of computer systems for which such an institution is a service provider, as that term is defined in section 512 of title 17, United States Code (as added by section 202 of this Act), including recommendations for legislation that the Register of Copyrights considers appropriate regarding such liability, if any. (b) Factors.--In formulating recommendations under subsection (a), the Register of Copyrights shall consider, where relevant-- (1) current law regarding the direct, vicarious, and contributory liability of nonprofit educational institutions for infringement by faculty, administrative employees, students, graduate students, and students who are employees of such nonprofit educational institutions; (2) other users of their computer systems for whom nonprofit educational institutions may be responsible; (3) the unique nature of the relationship between nonprofit educational institutions and faculty; (4) what policies nonprofit educational institutions should adopt regarding copyright infringement by users of their computer systems; (5) what technological measures are available to monitor infringing uses; (6) what monitoring of their computer systems by nonprofit educational institutions is appropriate; (7) what due process nonprofit educational institutions should afford in disabling access by users of their computer systems who are alleged to have committed copyright infringement; (8) what distinctions, if any, should be drawn between computer systems which may be accessed from outside the nonprofit educational systems, those which may not, and combinations thereof; (9) the tradition of academic freedom; and (10) such other issues relating to the liability of nonprofit educational institutions for copyright infringement committed with the use of computer systems for which such an institution is a service provider that the Register considers appropriate. SEC. 205. EVALUATION OF IMPACT OF COPYRIGHT LAW AND AMENDMENTS ON ELECTRONIC COMMERCE AND TECHNOLOGICAL DEVELOPMENT. (a) Findings.--In order to maintain strong protection for intellectual property and promote the development of electronic commerce and the technologies to support that commerce, the Congress must have accurate and current information on the effects of intellectual property protection on electronic commerce and technology. The emergence of digital technology and the proliferation of copyrighted works in digital media, along with the amendments to copyright law contained in this Act, make it appropriate for the Congress to review these issues to ensure that neither copyright law nor electronic commerce inhibits the development of the other. (b) Evaluation by Secretary of Commerce.--The Secretary of Commerce, in consultation with the Assistant Secretary of Commerce for Communications and Information and the Register of Copyrights, shall evaluate-- (1) the effects of this Act and the amendments made by this Act on the development of electronic commerce and associated technology; and (2) the relationship between existing and emergent technology and existing copyright law. (c) Report to Congress.--The Secretary of Commerce shall, not later than 1 year after the date of the enactment of this Act, submit to the Congress a report on the evaluation conducted under subsection (b), including any legislative recommendations the Secretary may have. SEC. 206. EFFECTIVE DATE. This title and the amendments made by this title shall take effect on the date of the enactment of this Act. TITLE III--EPHEMERAL RECORDINGS; DISTANCE EDUCATION; EXEMPTION FOR LIBRARIES AND ARCHIVES SEC. 301. EPHEMERAL RECORDINGS. Section 112(a) of title 17, United States Code, is amended-- (1) by redesignating paragraphs (1), (2), and (3) as subparagraphs (A), (B), and (C), respectively; (2) by inserting ``(1)'' after ``(a)''; and (3) by inserting after ``114(a),'' the following: ``or for a transmitting organization that is a broadcast radio or television station licensed as such by theFederal Communications Commission that broadcasts a performance of a sound recording in a digital format on a nonsubscription basis,''; and (4) by adding at the end the following: ``(2) In a case in which a transmitting organization entitled to make a copy or phonorecord under paragraph (1) in connection with the transmission to the public of a performance or display of a work described in that paragraph is prevented from making such copy or phonorecord by reason of the application by the copyright owner of technical measures that prevent the reproduction of the work, the copyright owner shall make available to the transmitting organization the necessary means for permitting the making of such copy or phonorecord within the meaning of that paragraph, if it is technologically feasible and economically reasonable for the copyright owner to do so. If the copyright owner fails to do so in a timely manner in light of the transmitting organization's reasonable business requirements, the transmitting organization shall not be liable for a violation of the regulations issued under section 102(a)(1)(A) of the WIPO Copyright Treaties Implementation Act for engaging in such activities as are necessary to make such copies or phonorecords as permitted under paragraph (1) of this subsection.''. SEC. 302. LIMITATIONS ON EXCLUSIVE RIGHTS; DISTANCE EDUCATION. (a) Recommendations by National Telecommunications and Information Administration.--Not later than 6 months after the date of the enactment of this Act, the Assistant Secretary of Commerce for Communications and Information, after consultation with representatives of copyright owners, nonprofit educational institutions, and nonprofit libraries and archives, shall submit to the Congress recommendations on how to promote distance education through digital technologies, including interactive digital networks, while maintaining an appropriate balance between the rights of copyright owners and the needs of users of copyrighted works. Such recommendations shall include any legislation the Assistant Secretary considers appropriate to achieve the foregoing objective. (b) Factors.--In formulating recommendations under subsection (a), the Assistant Secretary of Commerce for Communications and Information shall consider-- (1) the need for an exemption from exclusive rights of copyright owners for distance education through digital networks; (2) the categories of works to be included under any distance education exemption; (3) the extent of appropriate quantitative limitations on the portions of works that may be used under any distance education exemption; (4) the parties who should be entitled to the benefits of any distance education exemption; (5) the parties who should be designated as eligible recipients of distance education materials under any distance education exemption; (6) whether and what types of technological measures can or should be employed to safeguard against unauthorized access to, and use or retention of, copyrighted materials as a condition to eligibility for any distance education exemption, including, in light of developing technological capabilities, the exemption set out in section 110(2) of title 17, United States Code; (7) the extent to which the availability of licenses for the use of copyrighted works in distance education through interactive digital networks should be considered in assessing eligibility for any distance education exemption; and (8) such other issues relating to distance education through interactive digital networks that the Assistant Secretary considers appropriate. SEC. 303. EXEMPTION FOR LIBRARIES AND ARCHIVES. Section 108 of title 17, United States Code, is amended-- (1) in subsection (a)-- (A) by striking ``Notwithstanding'' and inserting ``Except as otherwise provided in this title and notwithstanding''; (B) by inserting after ``no more than one copy or phonorecord of a work'' the following: ``, except as provided in subsections (b) and (c)''; and (C) in paragraph (3) by inserting after ``copyright'' the following: ``that appears on the copy or phonorecord that is reproduced under the provisions of this section, or includes a legend stating that the work may be protected by copyright if no such notice can be found on the copy or phonorecord that is reproduced under the provisions of this section''; (2) in subsection (b)-- (A) by striking ``a copy or phonorecord'' and inserting ``three copies or phonorecords''; (B) by striking ``in facsimile form''; and (C) by striking ``if the copy or phonorecord reproduced is currently in the collections of the library or archives.'' and inserting ``if-- ``(1) the copy or phonorecord reproduced is currently in the collections of the library or archives; and ``(2) any such copy or phonorecord that is reproduced in digital format is not otherwise distributed in that format and is not made available to the public in that format outside the premises of the library or archives.''; and (3) in subsection (c)-- (A) by striking ``a copy or phonorecord'' and inserting ``three copies or phonorecords''; (B) by striking ``in facsimile form''; (C) by inserting ``or if the existing format in which the work is stored has become obsolete,'' after ``stolen,''; and (D) by striking ``if the library or archives has, after a reasonable effort, determined that an unused replacement cannot be obtained at a fair price.'' and inserting ``if-- ``(1) the library or archives has, after a reasonable effort, determined that an unused replacement cannot be obtained at a fair price; and ``(2) any such copy or phonorecord that is reproduced in digital format is not made available to the public in that format except for use on the premises of the library or archives in lawful possession of such copy.''; and (E) by adding at the end the following: ``For purposes of this subsection, a format shall be considered obsolete if the machine or device necessary to render perceptible a work stored in that format is no longer manufactured or is no longer reasonably available in the commercial marketplace.''. TITLE IV--RELATED PROVISIONS SEC. 401. REPORT BY NATIONAL TELECOMMUNICATIONS AND INFORMATION ADMINISTRATION. Not later than 6 months after the date of the enactment of this Act, the Assistant Secretary of Commerce for Communications and Information shall report to the Congress on appropriate mechanisms to encourage the development of access protocols, encryption testing methods, and security testing methods which would allow lawful access to, with appropriate safeguards to prevent the unlawful copying of, encrypted works. The Assistant Secretary shall include in such report recommendations on proposed amendments to this Act, if any, for achieving such result and for mechanisms to ensure that such safeguards-- (1) would be developed pursuant to a broad consensus of copyright owners and cryptographic researchers and security administrators in an open, fair, voluntary standards-setting process; (2) to the extent feasible, would protect copyright owners against the unauthorized distribution or reproduction of their encrypted works; and (3) would not limit encryption research, to the extent such research is permitted by law as of the enactment of this Act. Purpose and Summary The purpose of H.R. 2281, the Digital Millennium Copyright Act of 1998, is to implement two international treaties (i.e., the ``Copyright Treaty,'' and the ``Performances and Phonograms Treaty'') signed by the United States and more than 125 other countries before the World Intellectual Property Organization (WIPO). The Clinton Administration's WIPO Treaties implementing legislation would have amended Title 17 of the United States Code to grant copyright owners a new right against ``circumvention'' of ``technological protection measures,'' and to establish new provisions dealing with the integrity of ``copyright management information.'' As reported by the Committee on the Judiciary, H.R. 2281 included two titles: Title I would implement the two WIPO treaties; and Title II would provide for limitations on copyright infringement liability for on-line and other service providers. Title I of H.R. 2281, as reported by the Committee on Commerce, also would implement the WIPO treaties, but through free-standing provisions of law rather than as amendments to Title 17. Title II, as amended by the Committee on Commerce, includes comprehensive provisions addressing copyright infringement liability for on-line and other service providers. Title III, as added by the Committee on Commerce, would address ephemeral recordings, the use of computer and other networks to foster distance learning, and exemptions for libraries and archives to permit them to use the latest technology to preserve deteriorating manuscripts and other works. With these proposed revisions, the Committee believes it has appropriately balanced the interests of content owners, on-line and other service providers, and information users in a way that will foster the continued development of electronic commerce and the growth of the Internet. Background and Need for Legislation Legislative History Much like the agricultural and industrial revolutions that preceded it, the digital revolution has unleashed a wave of economic prosperity and job growth. Today, the information technology industry is developing versatile and robust products to enhance the lives of individuals throughout the world, and our telecommunications industry is developing new means of distributing information to these consumers in every part of the globe. In this environment, the development of new laws and regulations will have a profound impact on the growth of electronic commerce and the Internet. In recognition of these developments, and as part of the effort to begin updating national laws for the digital era, delegates from over 150 countries (including the United States) convened in December 1996 to negotiate the Copyright Treaty and the Performances and Phonograms Treaty under the auspices of the World Intellectual Property Organization (WIPO). In July 1997, the Clinton Administration submitted the treaties to the Senate for ratification and submitted proposed implementing legislation to both the House and the Senate. On May 22, 1998, the Committee on the Judiciary reported H.R. 2281, the ``WIPO Copyright Treaties Implementation Act'' to the House. H.R. 2281 was sequentially referred to the Committee on Commerce for its consideration, initially for a period not to extend beyond June 19, 1998. Meanwhile, on May 14, 1998, the Senate adopted S. 2037, the ``Digital Millennium Copyright Act.'' The Senate included provisions to explicitly authorize reverse engineering for purposes of achieving interoperability between computer products. The Senate also added a provision to ensure that librarians and archivists could use the latest technology to preserve deteriorating manuscripts and other works. It also added a so-called ``no mandate'' provision with respect to the design of consumer electronics, telecommunications, and computer products. On June 5, 1998, the Subcommittee on Telecommunications, Trade, and Consumer Protection held a legislative hearing on H.R. 2281. The Committee had been advised that both H.R. 2281, as reported by the Committee on the Judiciary, and S. 2037, as passed by the Senate, were ``compromises'' that enjoyed ``broad support.'' But it became apparent at the hearing that both bills faced significant opposition from many private and public sector interests, including libraries, institutions of higher learning, consumer electronics and computer product manufacturers, and others with a vital stake in the growth of electronic commerce and the Internet. In light of the serious concerns raised at the hearing, and in recognition of the complexity of the issues posed by the legislation, Chairman Bliley requested that the Committee's referral be further extended. The Committee's referral was subsequently extended, for a period not to extend beyond July 22, 1998. Promoting Electronic Commerce The Committee on Commerce is in the midst of a wide-ranging review of all issues relating to electronic commerce, including the issues raised by this legislation. The growth of electronic commerce is having a profound impact on the nation's economy. Over the past decade, the information technology sector of our economy has grown rapidly and is seen by many as playing a leading role in the current economic expansion. According to The Emerging Digital Economy, a recent Department of Commerce report on electronic commerce, the information technology sector now constitutes 8.2 percent of the Nation's gross domestic product, up from 4.5 percent in 1985. At the end of 1997, approximately 7.4 million Americans were employed in this field. It is expected that estimates of the total value of economic activity conducted electronically in 2002 will range from $200 billion to more than $500 billion, compared to just $2.6 billion in 1996. H.R. 2281 is one of the most important pieces of legislation affecting electronic commerce that the 105th Congress will consider. It establishes a wide range of rules that will govern not only copyright owners in the marketplace for electronic commerce, but also consumers, manufacturers, distributors, libraries, educators, and on-line service providers. H.R. 2281, in other words, is about much more than intellectual property. It defines whether consumers and businesses may engage in certain conduct, or use certain devices, in the course of transacting electronic commerce. Indeed, many of these rules may determine the extent to which electronic commerce realizes its potential. The Committee on Commerce's role in considering this legislation is therefore critical. The Committee has a long- standing interest in addressing all issues relating to interstate and foreign commerce, including commerce transacted over all electronic mediums, such as the Internet, and regulation of interstate and foreign communications. This legislation implicates each of those interests in numerous ways. Understanding the Nexus Between Electronic Commerce and Intellectual Property The debate on this legislation highlighted two important priorities: promoting the continued growth and development of electronic commerce; and protecting intellectual property rights. These goals are mutually supportive. A thriving electronic marketplace provides new and powerful ways for the creators of intellectual property to make their works available to legitimate consumers in the digital environment. And a plentiful supply of intellectual property--whether in the form of software, music, movies, literature, or other works--drives the demand for a more flexible and efficient electronic marketplace. As electronic commerce and the laws governing intellectual property (especially copyright laws) change, the relationship between them may change as well. To ensure that Congresscontinues to enact policies that promote both of the above goals, it is important to have current information about the effects of these changes. For example, many new technologies for distributing real-time audio and video through the Internet function by storing small parts of copyrighted works in the memory of the recipient's computer. This technology is increasingly commonplace, but some providers of the technology are concerned that the making of these transient copies may subject them or their customers to liability under current copyright law. In another example, an increasing number of intellectual property works are being distributed using a ``client- server'' model, where the work is effectively ``borrowed'' by the user (e.g., infrequent users of expensive software purchase a certain number of uses, or viewers watch a movie on a pay-per-view basis). To operate in this environment, content providers will need both the technology to make new uses possible and the legal framework to ensure they can protect their work from piracy. The Committee on Commerce believes it is important to more precisely define the relationship between intellectual property and electronic commerce, and to understand the practical implications of this relationship on the development of technology to be used in promoting electronic commerce. To that end, the Committee adopted an amendment that directs the Secretary of Commerce (the Secretary) to report on the effects of this legislation on the development of electronic commerce and the relationship between technology and copyright law. In the course of preparing the report, the Secretary is directed to consult with both the Assistant Secretary of Commerce for Communications and Information (given the Assistant Secretary's expertise in the area of telecommunications and information services and technologies) and the Register of Copyrights (given the Register's expertise in the field of copyright). Prohibiting Certain Devices H.R. 2281, as reported by the Committee on the Judiciary, would regulate--in the name of copyright law--the manufacture and sale of devices that can be used to improperly circumvent technological protection measures. The Committee on Commerce adopted an amendment that moves the anti-circumvention provisions out of Title 17 and establishes them as free- standing provisions of law. The Committee believes that this is the most appropriate way to implement the treaties, in large part because these regulatory provisions have little, if anything, to do with copyright law. The anti-circumvention provisions (and the accompanying penalty provisions for violations of them) would be separate from, and cumulative to, the existing claims available to copyright owners. In the Committee's judgment, it therefore is more appropriate to implement the treaties through free-standing provisions of law rather than codifying them in Title 17. Article 1, Section 8, Clause 8 of the United States Constitution authorizes the Congress to promulgate laws governing the scope of proprietary rights in, and use privileges with respect to, intangible ``works of authorship.'' As set forth in the Constitution, the fundamental goal is ``[t]o promote the Progress of Science and useful Arts. * * *.'' In the more than 200 years since enactment of the first Federal copyright law in 1790, the maintenance of this balance has contributed significantly to the growth of markets for works of the imagination as well as the industries that use such works. Congress has historically advanced this constitutional objective by regulating the use of information--not the devices or means by which the information is delivered or used by information consumers--and by ensuring an appropriate balance between the interests of copyright owners and information users. For example, Section 106 of the Copyright Act (17 U.S.C. Sec. 106) establishes certain rights copyright owners have in their works, including limitations on the use of these works without their authorization. Likewise, Sections 107 through 121 of the Copyright Act (17 U.S.C. Sec. Sec. 107-121) set forth the circumstances in which such uses will be deemed permissible, or otherwise lawful even though unauthorized. And Sections 501 through 511, as well as Section 602 of the Copyright Act (17 U.S.C. Sec. Sec. 501-511, 602) specify rights of action for copyright infringement, and prescribe penalties in connection with those actions. In general, all of these provisions are technology neutral. They do not regulate commerce in information technology, i.e., products and devices for transmitting, storing, and using information. Instead, they prohibit certain actions and create exceptions to permit certain conduct deemed to be in the greater public interest, all in a way that balances the interests of copyright owners and users of copyrighted works. In a September 16, 1997, letter to Congress, 62 copyright law professors expressed their concern about the implications of regulating devices in the name of copyright law. They said in relevant part: Although [they] would be codified in Title 17, [the anti-circumvention provisions] would not be an ordinary copyright provision; liability under the section would result from conduct separate and independent from any act of copyright infringement or any intent to promote infringement. Thus, enactment of [the anti- circumvention provisions] would represent an unprecedented departure into the zone of what might be called paracopyright--an uncharted new domain of legislative provisions designed to strengthen copyright protection by regulating conduct which traditionally has fallen outside the regulatory sphere of intellectual property law. While the Committee on Commerce agrees with these distinguished professors, the Committee also recognizes that the digital environment poses a unique threat to the rights of copyright owners, and as such, necessitates protection against devices that undermine copyright interests. In contrast to the analog experience, digital technology enables pirates to reproduce and distribute perfect copies of works--at virtually no cost at all to the pirate. As technology advances, so must our laws. The Committee thus seeks to protect the interests of copyright owners in the digital environment, while ensuring that copyright law remain technology neutral. Hence, the Committee has removed the anti-circumvention provisions from Title 17, and established them as free-standing provisions of law. Fair Use in the Digital Environment H.R. 2281, as reported by the Committee on the Judiciary, provided that ``[n]o person shall circumvent a technological protection measure that effectively controls access to a work protected under Title 17, United States Code.'' The Committee on Commerce devoted substantial time and resources to analyzing the implications of this broad prohibition on the traditional principle of ``fair use.'' A recent editorial by the Richmond Times-Dispatch succinctly states the Committee's dilemma: Copyrights traditionally have permitted public access while protecting intellectual property. The U.S. approach--known as ``fair use''--benefits consumers and creators. A computer revolution that has increased access to information also creates opportunities for the holders of copyrights to impose fees for, among other things, research and the use of excerpts from published works. And digital technology--whatever that means--could be exploited to erode fair use.1 --------------------------------------------------------------------------- \1\ Fair Use, Richmond Times-Dispatch, July 13, 1998, at A-6. The principle of fair use involves a balancing process, whereby the exclusive interests of copyright owners are balanced against the competing needs of users of information. This balance is deeply embedded in the long history of copyright law. On the one hand, copyright law for centuries has sought to ensure that authors reap the rewards of their efforts and, at the same time, advance human knowledge through education and access to society's storehouse of knowledge on the other. This critical balance is now embodied in Section 106 of the Copyright Act (17 U.S.C. Sec. 106), which grants copyright holders a ``bundle'' of enumerated rights, and in Section 107, which codifies the ``fair use'' doctrine. Under the Copyright Act, ``fair use'' may be made of a copyrighted work ``for purposes such as criticism, comment, news reporting, teaching * * * scholarship or research'' under certain circumstances without the permission of the author. Fair use, thus, provides the basis for many of the most important day-to-day activities in libraries, as well as in scholarship and education. It also is critical to advancing the personal interests of consumers. Moreover, as many testified before the Committee, it is no less vital to American industries, which lead the world in technological innovation. As more and more industries migrate to electronic commerce, fair use becomes critical to promoting a robust electronic marketplace. The Committee on Commerce is in the midst of a wide-ranging review of all issues relating to electronic commerce, including the issues raised by this legislation. The digital environment forces this Committee to understand and, where necessary, modernize the rules of commerce as they apply to a digital environment--including the rules that ensure that consumers have a stake in the growth in electronic commerce. The Committee was therefore concerned to hear from many private and public interests that H.R. 2281, as reported by the Committee on the Judiciary, would undermine Congress'long- standing commitment to the concept of fair use. A June 4, 1998, letter to the Committee from the Consumers' Union is representative of the concerns raised by the fair use community in reaction to H.R. 2281, as reported by the Committee on the Judiciary. The letter states in part: These newly-created rights will dramatically diminish public access to information, reducing the ability of researchers, authors, critics, scholars, teachers, students, and consumers to find, to quote for publication and otherwise make fair use of them. It would be ironic if the great popularization of access to information, which is the promise of the electronic age, will be short-changed by legislation that purports to promote this promise, but in reality puts a monopoly stranglehold on information. The Committee on Commerce felt compelled to address these risks, including the risk that enactment of the bill could establish the legal framework that would inexorably create a ``pay-per-use'' society. At the same time, however, the Committee was mindful of the need to honor the United States' commitment to effectively implement the two WIPO treaties, as well as the fact that fair use principles certainly should not be extended beyond their current formulation. The Committee has struck a balance that is now embodied in Section 102(a)(1) of the bill, as reported by the Committee on Commerce. The Committee has endeavored to specify, with as much clarity as possible, how the right against anti-circumvention would be qualified to maintain balance between the interests of content creators and information users. The Committee considers it particularly important to ensure that the concept of fair use remains firmly established in the law. Consistent with the United States'' commitment to implement the two WIPO treaties, H.R. 2281, as reported by the Committee on Commerce, fully respects and extends into the digital environment the bedrock principle of ``balance'' in American intellectual property law for the benefit of both copyright owners and users. Promoting Encryption Research H.R. 2281, as reported by the Committee on the Judiciary, provided no exception for the field of encryption research to the bill's broad prohibition against the circumvention of technological protection measures. Recognizing the importance of the field of encryption research to electronic commerce, the Committee on Commerce crafted a provision that provides for an exception to the bill's anti-circumvention provisions. The effectiveness of technological protection measures to prevent theft of works depends, in large part, on the rapid and dynamic development of better technologies, including encryption-based technological protection measures. The development of encryption sciences requires, in part, ongoing research and testing activities by scientists of existing encryption methods, in order to build on those advances, thus promoting and advancing encryption technology generally. This testing could involve attempts to circumvent or defeat encryption systems for the purpose of detecting flaws and learning how to develop more impregnable systems. The goals of this legislation would be poorly served if these provisions had the undesirable and unintended consequence of chilling legitimate research activities in the area of encryption. In many cases, flaws in cryptography occur when an encryption system is actually applied. Research of such programs as applied is important both for the advancement of the field of encryption and for consumer protection. Electronic commerce will flourish only if legitimate encryption researchers discover, and correct, the flaws in encryption systems before illegitimate hackers discover and exploit these flaws. Accordingly, the Committee has fashioned an affirmative defense to permit legitimate encryption research. Protecting Personal Privacy in the Digital Environment H.R. 2281, as reported by the Committee on the Judiciary, contains numerous protections to protect the rights of copyright owners to ensure that they feel secure in releasing their works in a digital, on-line environment. The Committee on Commerce, however, believes that in reaching to protect the rights of copyright owners, Congress need not encroach upon the privacy interests of consumers. Digital technology is robust and versatile enough that it can surreptitiously gather consumers' personal information, and do so through the use of software that is protected, or ``cloaked,'' by a technological protection measure. And to the extent a consumer seeks to disable the gathering of such information, he or she may unwittingly violate the provisions of this bill. The Committee regards this as an extreme result, and believes that consumers must be accorded certain rights to protect their personal privacy. The Committee on Commerce adopted an amendment to strike a balance between the interests of copyright owners and the personal privacy of consumers. The amendment deals with the critical issue of privacy by creating a marketplace incentive for copyright owners to deal ``above board'' with consumers on personal data gathering practices. Indeed, the copyright community itself has expressed a strong desire to give consumers comfort in knowing that their personal privacy is being protected. The Committee views consumer confidence as critical to promoting a robust and reliable marketplace for electronic commerce. Once consumers are confident that their personal privacy is protected, this should all but eliminate the need for consumers to circumvent technological protection measures for the purpose of protecting their privacy. Copyright owners can help consumers to realize confidence in the digital environment by disclosing personal data gathering practices. Hearings The Subcommittee on Telecommunications, Trade, and Consumer Protection held a hearing on H.R. 2281 on June 5, 1998. The Subcommittee received testimony from: Mr. Marc Rotenberg, Director, Electronic Privacy Information Center; Mr. Gary Shapiro, President, Consumer Electronics Manufacturers Association; Mr. Jonathan Callas, Chief Technology Officer, Network Associates, Inc.; Mr. Chris Bryne, Director of Intellectual Property, Silicon Graphics, Inc., representing Information Technology Industry Council; Mr. Robert Holleyman, CEO, Business Software Alliance; Ms. Hilary Rosen, President and CEO, Recording Industry Association of America; Mr. Walter H. Hinton, Vice President, Strategy and Marketing, Storage Technology Corp.; Mr. George Vradenburg, III, Senior Vice President and General Counsel, America OnLine, Inc.; Mr. Steve Metalitz, Vice President, International Intellectual Property Alliance, representing the Motion Picture Association of America; Mr. Seth Greenstein, representing Digital Media Association [listed on witness list]; Mr. Robert Oakley, Director of the Law Library, Georgetown University Law Center; and Mr. Charles E. Phelps, Provost, University of Rochester. Committee Consideration The Subcommittee on Telecommunications, Trade, and Consumer Protection met in open markup session on June 17, 1998, and June 18, 1998, to consider H.R. 2281, a bill to amend Title 17, United States Code, to implement the World Intellectual Property Organization Copyright Treaty and Performances and Phonograms Treaty. On June 18, 1998, the Subcommittee approved H.R. 2281, the Digital Millennium Copyright Act of 1998, for Full Committee consideration, amended, by a voice vote. On July 17, 1998, the Committee on Commerce met in open markup session and ordered H.R. 2281 reported to the House, amended, by a roll call vote of 41 yeas to 0 nays. Roll Call Votes Clause 2(l)(2)(B) of Rule XI of the Rules of the House requires the Committee to list the recorded votes on the motion to report legislation and amendments thereto. A motion by Mr. Bliley to order H.R. 2281 reported to the House, amended, was agreed to by a roll call vote of 41 yeas to 0 nays. The following are the recorded vote on motion to report H.R. 2281, including the names of those Members voting for and against, and the voice votes taken on amendments offered to H.R. 2281. Committee Oversight Findings Pursuant to clause 2(l)(3)(A) of Rule XI of the Rules of the House of Representatives, the Committee held a legislative hearing and made findings that are reflected in this report. Committee on Government Reform and Oversight Pursuant to clause 2(l)(3)(D) of Rule XI of the Rules of the House of Representatives, no oversight findings have been submitted to the Committee by the Committee on Government Reform and Oversight. New Budget Authority, Entitlement Authority, and Tax Expenditures In compliance with clause 2(l)(3)(B) of Rule XI of the Rules of the House of Representatives, the Committee finds that H.R 2281, the Digital Millennium Copyright Act of 1998, would result in no new or increased budget authority, entitlement authority, or tax expenditures or revenues. Committee Cost Estimate The Committee adopts as its own the cost estimate prepared by the Director of the Congressional Budget Office pursuant to section 402 of the Congressional Budget Act of 1974. Congressional Budget Office Estimate Pursuant to clause 2(l)(3)(C) of Rule XI of the Rules of the House of Representatives, the following is the cost estimate provided by the Congressional Budget Office pursuant to section 402 of the Congressional Budget Act of 1974: U.S. Congress, Congressional Budget Office, Washington, DC, July 22, 1998. Hon. Tom Bliley, Chairman, Committee on Commerce, House of Representatives, Washington, DC. Dear Mr. Chairman: The Congressional Budget Office has prepared the enclosed cost estimate for H.R. 2281, Digital Millennium Copyright Act of 1998. If you wish further details on this estimate, we will be pleased to provide them. The CBO staff contact is Mark Hadley (for federal costs), Pepper Santalucia (for the state and local impact), and Matt Eyles (for the private-sector impact). Sincerely, June E. O'Neill, Director. Enclosure. H.R. 2281--Digital Millennium Copyright Act of 1998 Summary: H.R. 2281 would amend existing copyright laws to implement two World Intellectual Property Organization (WIPO) treaties, limit the liability of Internet providers for copyright infringement by their customers, clarify the treatment of ephemeral recordings, and require the study of various issues related to copyrights and emerging technologies. Assuming the appropriation of the necessary funds, CBO estimates that implementing H.R. 2281 would result in new federal spending of about $2 million in fiscal year 1999 and less than $250,000 a year over the 2000-2003 period. Enacting the bill would establish new criminal penalties and thus could affect both receipts and direct spending. Hence, pay-as-you-go procedures would apply, but CBO expects that any changes in receipts and direct spending would not be significant. H.R. 2281 contains an intergovernmental and a private- sector mandate as defined in the Unfunded Mandates Reform Act (UMRA), but the costs of the mandates would not exceed the thresholds in the law. (The thresholds are $50 million and $100 million in 1996, respectively, indexed annually for inflation.) Estimated cost to the Federal Government: For the purpose of this estimate, CBO assumes that H.R. 2281 will be enacted by the end of fiscal year 1998, and that the estimated amounts will be appropriated by the start of each fiscal year. The costs of this legislation fall within budget function 370 (commerce and housing credit). Title I of H.R. 2281 would amend U.S. copyright law to comply with two treaties produced by the December 1996 conference of the WIPO--one regarding the use of copyrighted material in digital environments and the other dealing with international copyright protectionof performers and producers of phonograms. Title II would limit the liability for copyright infringement of persons who are providers of on-line services or network access. Title III would clarify the treatment of ephemeral recordings and exempt libraries and archives from some provisions of this bill. Title IV would require the National Telecommunications and Information Administration (NTIA) to submit a report on encryption testing methods and mechanisms to encourage access protocols. H.R. 2281 would require the Register of Copyrights, the Secretary of Commerce, the Assistant Secretary of Commerce for Communications and Information, and the NTIA to submit six reports on issues related to copyrights in the digital age, including encryption, distance learning, liability of educational institutions, personal identifying information, and electronic commerce. In addition, title I would require the Secretary of Commerce to issue regulations prohibiting any person from circumventing technological protection measures on copyrighted works. Assuming the appropriation of the necessary amounts, producing reports and promulgating regulations required by H.R. 2281 would increase federal spending by about $2 million in fiscal year 1999 and less than $250,000 a year over the 2000-2003 period. The bill would establish new criminal penalties and thus could affect both receipts and direct spending; therefore, pay- as-you-go procedures would apply. Section 105 would establish criminal fines of up to $1 million for anyone attempting to circumvent copyright protection systems, or falsifying or altering copyright management information. Enacting this provision could increase governmental receipts from the collection of fines, but we estimate that any such increase would be less than $500,000 annually. Criminal fines are deposited in the Crime Victims Fund and are spent in the following year. Thus any change in direct spending from the fund would also amount to less than $500,000 annually. Pay-as-you-go considerations: The Balanced Budget and Emergency Deficit Control Act specifies pay-as-you-go procedures for legislation affecting direct spending and receipts. Enacting H.R. 2281 could affect both direct spending and receipts, but CBO estimates that any such changes would be insignificant. Intergovernmental and private-sector impact: Section 4 of UMRA excludes from the application of that act any legislative provisions that are necessary for the ratification or implementation of international treaty obligations. CBO has determined that title I of the bill fits within that exclusion because it is necessary for the implementation of the WIPO Copyright Treaty and the WIPO Performances and Phonograms Treaty. Title III of H.R. 2281, however, would impose a mandate on certain owners of copyrights who apply technical protections to works that prevent their reproduction. Title III would require copyright owners who employ mechanisms that prevent the reproduction of copyrighted works to make available to federally licensed broadcasters the necessary means to copy such works. Under current law, federally licensed broadcasters are authorized to reproduce copyright-protected material under specific conditions. Since this mandate would apply to both public and private entities that own copyrights, it would be considered both a private-sector and an intergovernmental mandate. However, the use of reproduction protections envisioned in the bill is not yet widespread. Furthermore, copyright owners may claim economic hardship or technological infeasibility to avoid the new requirement, and the costs of providing federally licensed broadcasters with the means to copy technically protected works would likely be modest. Therefore, CBO estimates that the direct cost of the new mandates would be well below the statutory thresholds in UMRA. Previous CBO estimate: On May 12, 1998, CBO transmitted an estimate of H.R. 2281 as ordered reported by the House Committee on the Judiciary on April 1, 1998. The Judiciary Committee's version of the bill included the first two titles, but did not require any of the reports required by the Commerce Committee's version. CBO estimated that enactment of the Judiciary Committee's version of H.R. 2281 would have no significant impact on the federal budget. Estimate prepared by: Federal Costs: Mark Hadley. Impact on State, Local, and Tribal Governments: Pepper Santalucia. Impact on the Private Sector: Matt Eyles. Estimate approved by: Paul N. Van de Water, Assistant Director for Budget Analysis. Federal Mandates Statement The Committee adopts as its own the estimate of Federal mandates prepared by the Director of the Congressional Budget Office pursuant to section 423 of the Unfunded Mandates Reform Act. Advisory Committee Statement No advisory committees within the meaning of section 5(b) of the Federal Advisory Committee Act were created by this legislation. Constitutional Authority Statement Pursuant to clause 2(l)(4) of Rule XI of the Rules of the House of Representatives, the Committee finds that the Constitutional authority for this legislation is provided in Article I, section 8, clause 3, which grants Congress the power to regulate commerce with foreign nations, among the several States, and with the Indian tribes. Applicability to Legislative Branch The Committee finds that the legislation does not relate to the terms and conditions of employment or access to public services or accommodations within the meaning of section 102(b)(3) of the Congressional Accountability Act. Section-by-Section Analysis of the Legislation Section 1. Short title Section 1 establishes that this Act may be cited as the ``Digital Millennium Copyright Act of 1998.'' Section 2. Table of contents Section 2 sets out the table of contents. TITLE I--WIPO TREATIES IMPLEMENTATION Section 101. Short title Section 101 establishes that the short title of Title I is the ``WIPO Copyright Treaties Implementation Act.'' Section 102. Circumvention of copyright protection systems As previously discussed in the background section to this report, the Committee was concerned that H.R. 2281, as reported by the Committee on the Judiciary, would undermine Congress' long-standing commitment to the principle of fair use. Throughout our history, the ability of individual members of the public to access and to use copyrighted materials has been a vital factor in the advancement of America's economic dynamism, social development, and educational achievement. In its consideration of H.R. 2281, the Committee on Commerce paid particular attention to how changing technologies may affect users' access in the future. Section 102(a)(1) of the bill responds to this concern. The growth and development of the Internet has already had a significant positive impact on the access of American students, researchers, consumers, and the public at large to informational resources that help them in their efforts to learn, acquire new skills, broaden their perspectives, entertain themselves, and become more active and informed citizens. A plethora of information, most of it embodied in materials subject to copyright protection, is available to individuals, often for free, that just a few years ago could have been located and acquired only through the expenditure of considerable time, resources, and money. New examples of this greatly expanded availability of copyrighted materials occur every day. Still, the Committee is concerned that marketplace realities may someday dictate a different outcome, resulting in less access, rather than more, to copyrighted materials that are important to education, scholarship, and other socially vital endeavors. This result could flow from a confluence of factors, including the elimination of print or other hard-copy versions, the permanent encryption of all electronic copies, and the adoption of business models that depend upon restricting distribution and availability, rather than upon maximizing it. In this scenario, it could be appropriate to modify the flat prohibition against the circumvention of effective technological measures that control access to copyrighted materials, in order to ensure that access for lawful purposes is not unjustifiably diminished. Given the threat of a diminution of otherwise lawful access to works and information, the Committee on Commerce believes that a ``fail-safe'' mechanism is required. This mechanism would monitor developments in the marketplace for copyrighted materials, and allow the enforceability of the prohibition against the act of circumvention to be selectively waived, for limited time periods, if necessary to prevent a diminution in the availability to individual users of a particular category of copyrighted materials. Section 102(a)(1) of the bill creates such a mechanism. It converts the statutory prohibition against the act of circumvention into a regulation, and creates a rulemaking proceeding in which the issue of whether enforcement of the regulation should be temporarily waived with regard to particular categories of works can be fully considered and fairly decided on the basis of real marketplace developments that may diminish otherwise lawful access to works. (a) Violations regarding circumvention of technological protection measures Section 102(a)(1) gives two responsibilities to the Secretary of Commerce. The first is to issue regulations against the circumvention of technological protection measures that effectively control access to a copyrighted work. The second is to convene a rulemaking proceeding and, in conjunction with other specified officials, to determine whether to waive the applicability of the regulations for the next two years with respect to any particular category of copyrighted materials. The Secretary's responsibility under subparagraph (A) is essentially ministerial. He or she is to simply recast, in the form of a regulation, the statutory prohibition against the act of circumvention of technological protection measures that effectively control access to copyrighted materials that was set forth in Section 102(a)(1) prior to its amendment. The Committee has chosen a regulatory, rather than a statutory, route for establishing this prohibition for only one reason: to provide greater flexibility in enforcement, through the rulemaking proceeding set forth in the subsequent subparagraphs of this subsection 102(a)(1). It does not intend to make any substantive change in the scope or meaning of the prohibition as it appeared in the bill prior its amendment, and it is not empowering the Secretary of Commerce to do so either. The regulation should conform in every particular to the provisions of the statute, which addresses all other relevant aspects of the regulatory prohibition, including exceptions (such as for privacy or for encryption research) as well as civil and criminal enforcement mechanisms and penalties. No additional definitions, limitations, defenses or other provisions may be added. The regulation is to take effect two years after the enactment of the statute. Subparagraph (B) sets forth the parameters of the Secretary's second responsibility: the convening of a rulemaking proceeding, consistent with the requirements of the Administrative Procedures Act. The goal of the proceeding is to assess whether the implementation of technological protection measures that effectively control access to copyrighted works is adversely affecting the ability of individual users to make lawful uses of copyrighted works. Many such technological protection measures are in effect today: these include the use of ``password codes'' to control authorized access to computer programs, for example, or encryption or scrambling of cable programming, videocassettes, and CD-ROMs. More such measures can be expected to be introduced in the near future. The primary goal of the rulemaking proceeding is to assess whether the prevalence of these technological protections, with respect to particular categories of copyrighted materials, is diminishing the ability of individuals to use these works in ways that are otherwise lawful. The main purpose for delaying for two years the effective date of the prohibition against circumvention of access control technologies is to allow the development of a sufficient record as to how the implementation of these technologies is affecting availability of works in the marketplace for lawful uses. The Committee also intends that the rulemaking proceeding should focus on distinct, verifiable and measurable impacts; should not be based upon de minimisimpacts; and will solicit input to consider a broad range of evidence of past or likely adverse impacts. The criteria listed in subparagraph (B) are illustrative of the questions that the rulemaking proceeding should ask. In each case, the focus must remain on whether the implementation of technological protection measures (such as encryption or scrambling) has caused adverse impact on the ability of users to make lawful uses. Adverse impacts that flow from other sources, or that are not clearly attributable to implementation of a technological protection measure, are outside the scope of the rulemaking. The rulemaking will be repeated on a biennial basis, and on each occasion, the assessment of adverse impacts on particular categories of works is to be determined de novo. The regulatory prohibition is presumed to apply to any and all kinds of works, including those as to which a waiver of applicability was previously in effect, unless, and until, the Secretary makes a new determination that the adverse impact criteria have been met with respect to a particular class and therefore issues a new waiver. In conducting the rulemaking proceeding, the Secretary must consult closely with the National Telecommunications and Information Administration, as well as with the Patent and Trademark Office and the Register of Copyrights. Subparagraph (C) spells out the determination that the Secretary must make at the conclusion of the rulemaking proceeding. If the rulemaking has produced insufficient evidence to determine whether there have been adverse impacts with respect to particular classes of copyrighted materials, the circumvention prohibition should go into effect with respect to those classes. Only in categories as to which the Secretary finds that adverse impacts have occurred, or that such impacts are likely to occur within the next two years, should he or she waive the applicability of the regulations for the next two years. The issue of defining the scope or boundaries of a ``particular class'' of copyrighted works as to which the implementation of technological protection measures has been shown to have had an adverse impact is an important one to be determined during the rulemaking proceedings. In assessing whether users of copyrighted works have been, or are likely to be adversely affected, the Secretary shall assess users' ability to make lawful uses of works ``within each particular class of copyrighted works specified in the rulemaking.'' The Committee intends that the ``particular class of copyrighted works'' be a narrow and focused subset of the broad categories of works of authorship than is identified in Section 102 of the Copyright Act (17 U.S.C. Sec. 102). The Secretary's determination is inapplicable in any case seeking to enforce any other provision of this legislation, including the manufacture or trafficking in circumvention devices that are prohibited by Section 102(a)(2) or 102(b)(1). To provide meaningful protection and enforcement of the copyright owner's right to control access to his or her copyrighted work (as defined under Section 102(a)(1)), Section 102(a)(2) supplements Section 102(a)(1) with prohibitions on creating and making available certain technologies, products and services used, developed or advertised to defeat technological protection measures that protect against unauthorized access.2 --------------------------------------------------------------------------- \2\ The Committee has previously reported laws that similarly protect against unauthorized access to works. See, e.g., 47 U.S.C. Sec. 553(a)(2) (prohibiting the manufacture or distribution of equipment intended for the unauthorized reception of cable television service); 47 U.S.C. Sec. 605(e)(4) (prohibiting the manufacture, assembly, import, and sale of equipment used in the unauthorized decryption of satellite cable programming); see also H. Rep. No. 780, 102d Cong., 2d Sess. (1992) (report accompanying H.R. 4567, which would have established the Audio Home Recording Act's anti-circumvention provisions as free-standing provisions of law). --------------------------------------------------------------------------- Specifically, Section 102(a)(2) prohibits any person from manufacturing, importing, offering to the public, providing, or otherwise trafficking in certain technologies, products, services, devices, components, or parts that can be used to circumvent a technological protection measure that otherwise effectively controls access to a copyrighted work. The Committee believes it is very important to emphasize that Section 102(a)(2) is aimed fundamentally at outlawing so-called ``black boxes'' that are expressly intended to facilitate circumvention of technological protection measures for purposes of gaining access to a work. This provision is not aimed at products that are capable of commercially significant noninfringing uses, such as consumer electronics, telecommunications, and computer products--including videocassette recorders, telecommunications switches, personal computers, and servers--used by businesses and consumers for perfectly legitimate purposes. Thus, for a technology, product, service, device, component, or part thereof to be prohibited under this subsection, one of three conditions must be met. It must: (1) be primarily designed or produced for the purpose of circumventing; (2) have only a limited commercially significant purpose or use other than to circumvent; or (3) be marketed by the person who manufactures it, imports it, offers it to the public, provides it or otherwise traffics in it, or by another person acting in concert with that person with that person's knowledge, for use in circumventing a technological protection measure that effectively controls access to a copyrighted work. This provision is designed to protect copyright owners, and simultaneously allow the development of technology. Section 102(a)(3) defines certain terms used throughout Section 102(a). Subparagraph (A) defines the term ``circumvent a technological protection measure'' as meaning ``to descramble a scrambled work, to decrypt an encrypted work, or otherwise to avoid, bypass, remove, deactivate, or impair a technological protection measure, without the authority of the copyright owner.'' This definition applies to subsection (a) only, which covers protections against unauthorized initial access to a copyrighted work. Subparagraph (B) states that a technological protection measure ``effectively controls access to a work'' if the measure, in the ordinary course of its operation, requires the application of information, or a process or a treatment, with the authority of the copyright owner, to gain access to the work. In the Committee's view, measures that can be deemed to ``effectively control access to a work'' would be those based onencryption, scrambling, authentication, or some other measure which requires the use of a ``key'' provided by a copyright owner to gain access to a work. (b) Additional violations Section 102(b) applies to those technological protection measures employed by copyright owners that effectively protect their copyrights, as opposed to those technological protection measures covered by Section 102(a), which prevent unauthorized access to a copyrighted work. Unlike subsection (a), which prohibits the circumvention of access control technologies, subsection (b) does not, by itself, prohibit the circumvention of effective technological copyright protection measures. Paralleling Section 102(a)(2), Section 102(b)(1) seeks to provide meaningful protection and enforcement of copyright owners' use of technological protection measures to protect their rights by prohibiting the act of making or selling the technological means to overcome these protections and thereby facilitate copyright infringement. Subsection (b)(1) prohibits manufacturing, importing, offering to the public, providing, or otherwise trafficking in certain technologies, products, services, devices, components, or parts thereof that can be used to circumvent a technological protection measure that effectively protects a right of a copyright owner. As previously stated in the discussion of Section 102(a)(2), the Committee believes it is very important to emphasize that Section 102(b)(1) is aimed fundamentally at outlawing so-called ``black boxes'' that are expressly intended to facilitate circumvention of technological protection measures for purposes of gaining access to a work. This provision is not aimed at products that are capable of commercially significant noninfringing uses, such as consumer electronics, telecommunications, and computer products--including videocassette recorders, telecommunications switches, personal computers, and servers--used by businesses and consumers for perfectly legitimate purposes. Thus, once again, for a technology, product, service, device, component, or part thereof to be prohibited under this subsection, one of three conditions must be met. It must: (1) be primarily designed or produced for the purpose of circumventing; (2) have only limited commercially significant purpose or use other than to circumvent; or (3) be marketed by the person who manufactures it, imports it, offers it to the public, provides it, or otherwise traffics in it, or by another person acting in concert with that person with that person's knowledge, for use in circumventing a technological protection measure that effectively protects the right of a copyright owner. Like Section 102(a)(2), this provision is designed to protect copyright owners, and simultaneously allow the development of technology. Section 102(b)(2) defines certain terms used solely within subsection (b). In particular, subparagraph (A) defines the term ``circumvent protection afforded by a technological protection measure'' as ``avoiding, bypassing, removing, deactivating, or otherwise impairing a technological protection measure.'' Subparagraph (B) provides that a technological protection measure ``effectively protects a right of a copyright owner'' if the measure, in the ordinary course of its operation, prevents, restricts, or otherwise limits the exercise of a copyright owner's rights. In the Committee's view, measures that can be deemed to ``effectively control access to a work'' would be those based on encryption, scrambling, authentication, or some other measure which requires the use of a ``key'' provided by a copyright owner to gain access to a work. With respect to the effectiveness of technological protection measures, the Committee believes it is important to stress as well that those measures that cause noticeable and recurring adverse effects on the authorized display or performance of works should not be deemed to be effective. Unless product designers are adequately consulted about the design and implementation of technological protection measures (and the means of preserving copyright management information), such measures may cause severe ``playability'' problems. The Committee on Commerce is particularly concerned that the introduction of such measures not impede the introduction of digital television monitors or new digital audio playback devices. The Committee has a strong, long-standing interest in encouraging the introduction in the market of exciting new products. Recently, for example, the Committee learned that, as initially proposed, a proprietary copy protection scheme that is today widely used to protect analog motion pictures could have caused significant viewability problems, including noticeable artifacts, with certain television sets until it was modified with the cooperation of the consumer electronics industry. Under the bill as reported, nothing would make it illegal for a manufacturer of a product or device (to which Section 102 would otherwise apply) to design or modify the product or device solely to the extent necessary to mitigate a frequently occurring and noticeable adverse effect on the authorized performance or display of a work that is caused by a technological protection measure in the ordinary course of its design and operation. Similarly, recognizing that a technological protection measure may cause a problem with a particular device, or combination of devices, used by a consumer, it is the Committee's view that nothing in the bill should be interpreted to make it illegal for a retailer or individual consumer to modify a product or device solely to the extent necessary to mitigate a noticeable adverse effect on the authorized performance or display of a work that is communicated to or received by that particular product or device if that adverse effect is caused by a technological protection measure in the ordinary course of its design and operation. The Committee believes that the affected industries should be able to work together to avoid such problems. The Committee is aware that multi-industry efforts to develop copy control technologies that are both effective and avoid such noticeable and recurring adverse effects have been underway over the past two years. The Committee strongly encourages the continuation of those efforts, which it views as offering substantial benefits to copyright owners in whose interest it is to achieve the introduction of effective technological protection (and copyright management information) measures that do not interfere with the normal operations of affected products. (c) Other rights, etc., not affected Subsection (c) sets forth several provisions clarifying the scope of Section 102. Section 102(c)(1) provides that Section 102 shall not have any effect on rights, remedies, limitations, or defenses to copyright infringement, including fair use, under Title 17. Section 102(c)(2) provides that Section 102 shall not alter the existing doctrines of contributory or vicarious liability for copyright infringement in connection with any technology, product, service, device, component or part thereof. Section 102(c)(3) clarifies that nothing in Section 102 creates an affirmative mandate requiring manufacturers of consumer electronics, telecommunications, and computing products to design their products or their parts and components to affirmatively respond to any particular technological protection measure employed to protect a copyrighted work. Lastly, Section 102(c)(4) makes clear that nothing in Section 102 enlarges or diminishes any rights of free speech or the press for activities using consumer electronics, telecommunications, or computing products. (d) Exemption for nonprofit libraries, archives, and educational institutions Section 102(d) provides a limited exemption from the regulations issued pursuant to Section 102(a)(1)(A) to qualified nonprofit libraries, archives, and educational institutions. In particular, Section 102(d)(1) allows a nonprofit library, nonprofit archives or nonprofit educational institution to obtain access to a copyrighted work for the sole purpose of making a good faith determination as to whether it wishes to acquire a copy, or portion of a copy, of that work in order to engage in permitted conduct. A qualifying institution may not gain access for a period of time longer than necessary to determine whether it wishes to obtain a copy, or portion of a copy, for such purposes, and the right to gain access shall not apply for any other purpose. Section 102(d)(2) provides that the right to obtain access under this paragraph only applies when the nonprofit library, nonprofit archives, or nonprofit educational institution cannot obtain a copy of an identical work by other means, and such an entity may not use the exemption in this paragraph for commercial advantage or financial gain without penalty. Section 102(d)(3) seeks to protect the legitimate interests of copyright owners by providing a civil remedy against a library, archive, or educational institution that violates Section 102(d)(1). Section 102(d)(4) provides that this subsection may not be used as a defense to the prohibitions on manufacturing or selling devices contained in Sections 102(a)(2) or 102(b). Finally, Section 102(d)(5) provides that a library or archive, to be eligible for the exemption in paragraph (1), must maintain its collections open to the public and available, not only to researchers affiliated with the library or archives or with the institution of which it is a part, but also to other persons doing research in a specialized field. (e) Law enforcement and intelligence activities Section 102(e) creates an exception for the lawfully authorized investigative, protective, or intelligence activities of an officer, agent, or employee of, the United States, a State, or a political subdivision of a State, or of persons acting pursuant to a contract with such an entity. (f) Reverse engineering Section 102(f) is intended to promote reverse engineering by permitting the circumvention of access control technologies for the sole purpose of achieving software interoperability. Section 102(f)(1) permits the act of circumvention in only certain instances. To begin with, the copy of the computer program which is the subject of the analysis must be lawfully acquired (i.e., the computer program must be acquired from a legitimate source, along with any necessary serial codes, passwords, or other such means as may be necessary to be able to use the program as it was designed to be used by a consumer of the product). In addition, the acts must be limited to those elements of the program which must be analyzed to achieve interoperability of an independently created program with other programs. The resulting product must also be a new and original work, in that it may not infringe the original computer program. Moreover, the objective of the analysis must be to identify and extract such elements as are necessary to achieve interoperability which are not otherwise available to the person. Finally, the goal of this section is to ensure that current law is not changed, and not to encourage or permit infringement. Thus, each of the acts undertaken must avoid infringing the copyright of the author of the underlying computer program. Section 102(f)(2) recognizes that, to accomplish the acts permitted under Section 102(f)(1), a person may need to make and use certain tools. The Committee believes that such tools are generally available and used by programmers today in developing computer programs (e.g., compilers, trace analyzers, and disassemblers). Such tools are not prohibited by this Section. But the Committee also recognizes that, in certain instances, it is possible that a person may need to develop special tools to achieve the permitted purpose of interoperability. Thus, Section 102(f)(2) creates an exception to the prohibition on making circumvention tools contained in Sections 102(a)(2) and 102(b)(1). These excepted tools can be either software or hardware. Once again, though, Section 102(f)(2) limits any person from acting in a way that constitutes infringing activity. Similarly, Section 102(f)(3) recognizes that developing complex computer programs often involves the efforts of many persons. For example, some of these persons may be hired to develop a specific portion of the final product. For that person to perform these tasks, some of the information acquired through the permitted analysis, and the tools to accomplish it, may have to be made available to that person. Section 102(f)(3) allows developers of independently created software to rely on third parties either to develop the necessary circumvention tools, or to identify the necessary information to achieve interoperability. The ability to rely on third parties is particularly important for small software developers who do not have the capability of performing these functions in-house. This provision permits such sharing of information and tools. The Committee, however, recognizes that making such information or tools generally available could undermine the objectives of Section 102. Section 102(f)(3) therefore imposes strict limitations on the exceptions created in Section 102(f). Acts of sharing information and tools is permitted solely for the purpose of achieving interoperability of an independently createdcomputer program with other programs. If a person makes this information available for a purpose other than to achieve interoperability of an independently created computer program with other programs, then such action is a violation of this Act. In addition, these acts are permitted only to the extent that doing so does not constitute infringement, or violate other applicable law. Section 102(f)(4) defines ``interoperability'' as the ability of computer programs to exchange information, and for such programs mutually to use the information which has been exchanged. The seamless exchange of information is a key element of software interoperability. Hence, Section 102(f) applies to computer programs as such, regardless of their medium of fixation and not to works generally, such as music or audiovisual works, which may be fixed and distributed in digital form. Because the goal of interoperability is the touchstone of the exceptions contained in Section 102(f), the Committee emphasizes that nothing in those subsections can be read to authorize the circumvention of any technological protection measure that controls access to any work other than a computer program, or the trafficking in products or services for that purpose. (g) Encryption research As previously discussed in the background section to this report, the Committee views encryption research as critical to the growth and vibrancy of electronic commerce. Section 102(g) therefore provides statutory clarification for the field of encryption research, in light of the prohibitions otherwise contained in Section 102. Section 102(g)(1) defines ``encryption research'' and ``encryption technology.'' Section 102(g)(2) identifies permissible encryption research activities, notwithstanding the provisions of Section 102(a)(1)(A), including: whether the person lawfully obtained the encrypted copy; the necessity of the research; whether the person made a good faith effort to obtain authorization before circumventing; and whether the research constitutes infringement or a violation of other applicable law. The Committee recognizes that courts may be unfamiliar with encryption research and technology, and may have difficulty distinguishing between a legitimate encryption research and a so-called ``hacker'' who seeks to cloak his activities with this defense. Section 102(g)(3) therefore contains a non- exhaustive list of factors a court shall consider in determining whether a person properly qualifies for the encryption research defense. Section 102(g)(4) is concerned with the development and distribution of tools--typically software--which are needed to conduct permissible encryption research. In particular, subparagraph (A) provides that it is not a violation of Section 102(a)(2) to develop and employ technological means to circumvent for the sole purpose of performing acts of good faith encryption research permitted under Section 102(g)(2). Subparagraph (B) permits a person to provide such technological means to another person with whom the first person is collaborating in good faith encryption research permitted under Section 102(g)(2). Additionally, a person may provide the technological means to another person for the purpose of having the second person verify the results of the first person's good faith encryption research. The Committee is aware of additional concerns that Section 102 might inadvertently restrict a systems operator's ability to perform certain functions critical to the management of sophisticated computer networks. For example, many independent programmers have created utilities designed to assist in the recovery of passwords or password-protected works when system users have forgotten their passwords. Because Section 102 prohibits circumvention without the authorization of the copyright owner, circumvention to gain access to one's own work, as a matter of logic, does not violate Section 102. The law would also not prohibit certain kinds of commercial ``key-cracker'' products, e.g., a computer program optimized to crack certain ``40-bit'' encryption keys. Such machines are often rented to commercial customers for the purpose of quick data recovery of encrypted data. Again, if these products do not meet any of the three criteria under Section 102(a)(2) because these products facilitate a person's access to his or her own works, they would not be prohibited by Section 102. In addition, network and web site management programs increasingly contain components that test systems security and identify common vulnerabilities. These programs are valuable tools for systems administrators and web site operators to use in the course of their regular testing of their systems' security. The testing of such ``firewalls'' does not violate Section 102 because in most cases the firewalls are protecting computer and communications systems and not necessarily the specific works stored therein. Accordingly, it is the view of the Committee that no special exception is needed for these types of legitimate products. Finally, Section 102(g)(5) requires the Assistant Secretary of Commerce for Communications and Information to report to Congress, within one year of enactment, on the effect Section 102(g) has had on the field of encryption research, the adequacy of technological protection for copyrighted works, and protection of copyright owners against unauthorized access. (h) Components or parts to prevent access of minors to the Internet The Committee is concerned that Section 102(a) might inadvertently make it unlawful for parents to protect their children from pornography and other harmful material available on the Internet, or have unintended legal consequences for manufacturers of products designed solely to enable parents to protect their children in this fashion. Section 102(h) addresses these concerns. (i) Protection of personally identifying information As previously stated in the background section to this report, Section 102(i)(1) is designed to ensure that if a copyright owner conspicuously discloses that the technological protection measure, or any work it protects, contains any personal data gathering capability, and the consumer is given the capability to curtail or prohibit effectively any such gathering or dissemination of personal information, then the consumer could not legally circumvent thetechnological protection measure. In addition, under Section 102(i)(2), if the copyright holder conspicuously discloses that the technological protection measure, or any work it protects, does not contain the capability of collecting or disseminating personally identifying information reflecting the on-line activities of a person who seeks to gain access to the work protected, then (once again) the consumer could not legally circumvent the technological protection measure. In both such circumstances, there would be no need for consumers to circumvent technological protection measures because conspicuous disclosures indicate whether data gathering is being conducted and if so, the capability for thwarting such privacy invasions is extended to consumers. Only if there is no disclosure of privacy-related practices, or instances where consumers are left without the capability to disable the gathering of personal information, could a consumer circumvent a technological protection measure to protect his or her own privacy. Section 103. Integrity of copyright management information Section 103 implements the obligation contained in Article 12 of the Copyright Treaty and Article 19 of the Performances and Phonograms Treaty that contracting parties ``provide adequate and effective legal remedies'' against any person who knowingly and without authority removes or alters copyright management information (CMI), or who distributes, imports, broadcasts, or communicates to the public, works or copies of works knowing that such information has been removed or altered without authority. (a) False copyright management information Section 103(a) establishes a general prohibition against intentionally providing false copyright management information, as defined in subsection (c), and against distributing, or importing for distribution, false copyright management information. (b) Removal or alteration of copyright management information Section 103(b) establishes general prohibitions against removing or altering CMI, against distributing or importing for distribution altered CMI, and against distributing, importing for distribution or publicly performing works in which CMI has been removed. (c) Definitions Section 103(c) defines ``copyright management information.'' To fall within the definition, the information must be conveyed in connection with copies or phonorecords, performances or displays of the copyrighted work. (d) Law enforcement and intelligence activities Section 103(d) creates an exception for the lawfully authorized investigative, protective, or intelligence activities of an officer, agent, or employee of, the United States, a State, or a political subdivision of a State, or of persons acting pursuant to a contract with such an entity. (e) Limitations on liability Section 103(e) recognizes special problems that certain broadcasting or cable entities may have with the transmission of copyright management information. Under Section 103(e), radio and television broadcasters, cable systems, and persons who provide programming to such broadcasters or systems, who do not intend to induce, enable, facilitate or conceal infringement may be eligible for a limitation on liability for violation of the copyright management information provisions of Section 103(b) in certain, limited situations. In the case of an analog transmission, Section 103(e)(1) provides that an eligible person will not be held liable for violating provisions of subsection (b) if it is not ``technically feasible'' for that person to avoid the violation or if avoiding the violation would ``create an undue financial hardship.'' Avoiding a violation of subsection (b) with respect to the transmission of credits that are of an excessive duration in relation to standard practice in the relevant industries (for instance, the motion picture and television broadcast industries) is one example of an activity that may ``create an undue financial hardship'' under Section 103(e)(1). As indicated above, this limitation on liability applies only if such person did not intend, by engaging in such activity, to induce, enable, facilitate, or conceal infringement. Section 103(e)(2) provides a limitation on liability in the case of a digital transmission, and contemplates voluntary digital transmission standards for the placement of copyright management information. Separate standards are likely to be set for the location of copyright management information in different categories of works. For instance, the standard(s) for the location of the name of the copyright owner in a sound recording or musical work to be broadcast by radio stations may differ--and be set in a separate standard-setting process--from the standard for the location of such information in a motion picture to be broadcast by television stations. Paragraph (2)(A) provides that if a digital transmission standard for the placement of copyright management information for a category of works is set in a voluntary, consensus standard-setting process involving a representative cross- section of the relevant copyright owners and relevant transmitting industry, including, but not limited to, representatives of radio or television broadcast stations, cable systems, and copyright owners of a category of works that are intended for public performance by such stations or systems, an eligible person will not be liable for a violation of subsection (b) if the copyright management information involved in the violation was not placed in a location specified by the standard for that information. The eligible person, however, cannot qualify for this limitation on liability if that person was responsible for the nonconforming placement. Section 103(e)(2)(B)(i) provides that until such a standard is set for a category of works, an eligible person will not be liable for a violation of subsection (b) if the transmission of the copyright management information would cause a perceptible visual or aural degradation of the digital signal. Section 103(e)(2)(B)(ii) provides that during this time period before a standard is set, an eligible person also will not be liable if the digital transmission of the information would conflict with an applicable government regulation or industry standard relating to transmission of information in a digital signal, such as the regulation requiring the placement of closed captioning in line 21 of the vertical blanking interval (47 U.S.C. Sec. 613; 47 C.F.R. Sec. 79.1). For purposes of this paragraph, however, the applicable industry-wide standard must be of a type specified in subparagraphs (2)(B)(ii) (II) or (III). The first type, defined in paragraph (2)(B)(ii)(II), includes only those standards that were adopted by a voluntary, consensus standards body, such as the Advanced Television Systems Committee, before the effective date of Section 103. The other type, defined in subparagraph (2)(B)(ii)(III), includes only those standards adopted in a voluntary, consensus standards-setting process open to participation by groups, including but not limited to a representative cross-section of radio or television broadcast stations, cable systems, and copyright owners of a category of works that are intended for public performance by such stations or systems. Section 104. Civil remedies (a) Civil actions Section 104(a) sets forth the general proposition that civil remedies are available for violations of Sections 102 and 103. This provision also establishes the jurisdiction for such civil actions as the ``appropriate U.S. district court'' and limits standing to those persons injured by a violation of Sections 102 or 103. (b) Powers of the court Section 104(b) defines the powers of the court hearing a case brought under Section 104(a). (c) Award of damages Section 104(c) is divided into five paragraphs, each of which addresses the awarding of damages to a prevailing party in an action brought under Section 104(a). Section 105. Criminal offenses and penalties (a) In general Section 105(a) provides for criminal penalties for violations of Sections 102 and 103. (b) Limitation for nonprofit library, archives, or educational institution Section 105(b) exempts completely any nonprofit library, nonprofit archives, or nonprofit educational institution from the criminal penalties contained in subsection (a). (c) Statute of limitations Section 105(c) provides for a 5-year statute of limitations for criminal offenses. Section 106. Savings clause Section 106 establishes that nothing in Title I in any way limits the applicability of Federal or State privacy laws relating to the use of the Internet. Section 107. Development and implementation of technological protection measures Section 107 establishes a mechanism for monitoring, evaluating, and informing the Congress of the impact of this legislation, especially on the key issue of the role of technological protection measures. (a) Statement of congressional policy and objective Section 107(a) expresses the sense of Congress that technological protection measures, developed by the private sector through voluntary, industry-led processes, will play a crucial role in the healthy development of the Internet and other new paths for dissemination of copyrighted materials. Such measures can facilitate lawful uses of such materials, while safeguarding the private property interests that are recognized by the copyright law. Section 107(a) thus identifies an open, voluntary, multi-industry process for expeditious implementation of these technological protection measures. (b) Technological protection measures Section 107(b) mandates at least three technological protection measures for implementation pursuant to Section 107(a) that are especially important in achieving the full potential of the Internet and other digital media: (1) those that enable nonprofit libraries to continue in their critical role of lending copyrighted materials to individual patrons; (2) those that effectively protect against infringement of copyrighted materials; and (3) those that facilitate a diversity of legitimate uses, by individual members of the public, of copyrighted works in digital formats. (c) Procedures for developing and implementing technological protection measures Section 107(c) makes clear that Congress anticipates that the technological protection measures whose development and implementation are mandated pursuant to Section 107(a) will:be developed pursuant to a broad, private sector consensus; be made available on reasonable and non-discriminatory terms; and not impose substantial costs or burdens on copyright owners or on manufacturers of hardware and software used in conjunction with copyrighted works in digital formats. (d) Oversight and reporting Section 107(d) establishes an oversight process for monitoring the impact of this legislation, and specifically its anti-circumvention provisions, on the access of individuals to copyrighted materials in digital formats. For example, the Secretary would have to evaluate the extent to which Section 102 and the regulations issued thereunder pose a serious impediment to the development and production of competitive goods and services. It specifically directs the Secretary of Commerce, in consultation with the Register of Copyrights and the Assistant Secretary of Commerce for Communications and Information, to report, over the course of the next three years, annually to the House Committees on Commerce and on the Judiciary, and the Senate Committees on Commerce, Science, and Transportation and on the Judiciary on the extent of that impact. Section 108. Technical amendments Section 108 incorporates numerous technical amendments. Section 109. Effective date. Section 109 makes the effective date the date of enactment. TITLE II--INTERNET COPYRIGHT INFRINGEMENT LIABILITY The liability of on-line service providers and Internet access providers for copyright infringements that take place in the on-line environment has been a controversial issue. Title II of the Digital Millennium Copyright Act addresses this complex issue. Title II preserves strong incentives for service providers and copyright owners to cooperate to detect and deal with copyright infringements that take place in the digital networked environment. At the same time, it provides greater certainty to service providers concerning their legal exposure for infringements that may occur in the course of their activities. New Section 512 contains limitations on service providers' liability for five general categories of activity set forth in subsections (a) through (d) and subsection (f). As provided in subsection (k), new Section 512 is not intended to imply that a service provider is or is not liable as an infringer either for conduct that qualifies for a limitation of liability or for conduct that fails to so qualify. Rather, the limitations of liability apply if the provider is found to be liable under existing principles of law. The limitations in subsections (a) through (d) protect qualifying service providers from liability for all monetary relief for direct, vicarious and contributory infringement. Monetary relief is defined in subsection (j)(2) as encompassing damages, costs, attorneys' fees, and any other form of monetary payment. These subsections also limit injunctive relief against qualifying service providers to the extent specified in subsection (i). To qualify for these protections, service providers must meet the conditions set forth in subsection (h), and service providers' activities at issue must involve a function described in subsection (a), (b), (c), (d) or (f), respectively. The liability limitations apply to networks ``operated by or for the service provider,'' thereby protecting both service providers who offer a service and subcontractors who may operate parts of, or an entire, system or network for another service provider. Section 201. Short title Section 201 establishes the short title for Title II as the ``Internet Copyright Infringement Liability Clarification Act of 1998.'' Section 202. Limitations on liability for Internet copyright infringement (a) In general Section 202(a) amends chapter 5 of the Copyright Act (17 U.S.C. Sec. 501, et seq.) to create a new Section 512, titled ``Liability of service providers for on-line infringement of copyright.'' New Section 512(a) applies to communications functions associated with sending digital communications of others across digital networks, such as the Internet and other on-line networks. It establishes a limitation on liability for infringements that may occur in the provision of services falling within the definition of subsection (j)(1)(A). The limitations on injunctive relief set forth in subsection (i)(1)(B) are applicable when the functions at issue fall within the provisions of subsection (a), and the service provider meets the threshold criteria of subsection (h). These threshold criteria apply to all of the liability limitations contained in new Section 512. Subsection (a) applies to service providers transmitting, routing, or providing connections for material, and some forms of intermediate and transient storage of material in the course of performing these functions. For example, in the course of moving packets of information across digital on-line networks, many intermediate and transient copies of the information may be made in routers and servers along the way. Such copies are created as an automatic consequence of the transmission process. In this context, ``intermediate and transient'' refers to such a copy made and/or stored in the course of a transmission, not a copy made or stored at the points where the transmission is initiated or received. The use of the term ``transmitting'' throughout new Section 512 is not intended to be limited to transmissions of ``a performance or display'' of ``images or sounds'' within the meaning of Section 101 of the Copyright Act. Subsections (a)(1) through (5) limit the range of activities that qualify under this subsection to ones in which a service provider plays the role of a ``conduit'' for thecommunications of others. This limitation on liability applies if: (1) the communication was initiated by or at the direction of a person other than the service provider; (2) it is carried out through an automatic technical process without selection of the material by the service provider; (3) the service provider does not select the recipients of the material except as an automatic response to the request of another; (4) no copy of the material made in the course of intermediate or transient storage is maintained on the system or network so that it is ordinarily accessible to anyone other than the anticipated recipients, and no copy is maintained on the system or network in a manner ordinarily accessible to the anticipated recipients for a longer period than is reasonably necessary for the communication; and (5) the content (but not necessarily the form) of the material is not modified in the course of transmission. Thus, for example, an e- mail transmission may appear to the recipient without bolding or italics resulting from format codes contained in the sender's message. The term ``selection of the material'' in subsection (a)(2) means the editorial function of determining what material to send, or the specific sources of material to place on-line (e.g., a radio station), rather than ``an automatic technical process'' of responding to a command or request, such as one from a user, an Internet location tool, or another network. The term ``automatic response to the request of another'' is intended to encompass a service provider's actions in responding to requests by a user or other networks, such as requests to forward e-mail traffic or to route messages to a mailing list agent (such as a ``Listserv'') or other discussion group. The Committee intends subsection (a)(4) to cover copies made of material while it is en route to its destination, such as copies made on a router or mail server, storage of a web page in the course of transmission to a specific user, store and forward functions, and other transient copies that occur en route. The term ``ordinarily accessible'' is intended to encompass stored material that is routinely accessible to third parties. For example, the fact that an illegal intruder might be able to obtain access to the material would not make it ordinarily accessible to third parties. Neither, for example, would occasional access in the course of maintenance by service provider personnel, nor access by law enforcement officials pursuant to subpoena make the material ``ordinarily accessible.'' However, the term does not include copies made by a service provider for the purpose of making the material available to other users. Such copying is addressed in subsection (b). New Section 512(b) applies to a different form of intermediate and temporary storage than is addressed in subsection (a). In terminology describing current technology, this storage is a form of ``caching,'' which is used on some networks to increase network performance and to reduce network congestion generally, as well as to reduce congestion and delays to popular sites. This storage is intermediate in the sense that the service provider serves as an intermediary between the originating site and the ultimate user. The material in question is stored on the service provider's system or network for some period of time to facilitate access by users subsequent to the one who previously sought access to it. For subsection (b) to apply, the material must be made available on an originating site, transmitted at the direction of another person through the system or network operated by or for the service provider to a different person, and stored through an automatic technical process so that users of the system or network who subsequently request access to the material from the originating site may obtain access to the material from the system or network. Subsections (b)(1) through (b)(5) clarify the circumstances under which subsection (b) applies. Subsection (b)(1) provides that the material must be transmitted to subsequent users without modification to its content in comparison to the way it was originally transmitted from the originating site. The Committee intends that this restriction apply, for example, so that a service provider who caches material from another site does not change the advertising associated with the cached material on the originating site without authorization from the originating site. Subsection (b)(2) limits the applicability of the subsection to circumstances where the service provider complies with certain updating commands. Subsection (b)(3) provides that the service provider shall not interfere with the ability of certain technology that is associated with the work by the operator of the originating site to return to the originating site information, such as user ``hit'' counts, that would have been available to the site had it not been cached. The technology, however, must: (i) not significantly interfere with the performance of the storing provider's system or network or with intermediate storage of the material; (ii) be consistent with generally accepted industry standard communications protocols applicable to Internet and on-line communications, such as those approved by the Internet Engineering Task Force and the World Wide Web Consortium; and (iii) not extract information beyond that which would have been obtained had the subsequent users obtained access to the material directly on the originating site. Subsection (b)(4) applies to circumstances in which the originating site imposes a prior condition on access. Subsection (b)(5) establishes a notification and take-down procedure for cached material modeled on the procedure under new Section 512(c). However, this take-down obligation does not apply unless the material has previously been removed from the originating site, or the party submitting the notification has obtained a court order for it to be removed from the originating site and notifies the service provider's designated agent of that order. This proviso has been added to subsection (b)(5) because storage under subsection (b) occurs automatically, and unless infringing material has been removed from the originating site, the infringing material would ordinarily simply be re-cached. New Section 512(c) limits the liability of qualifying service providers for claims of direct, vicarious and contributory infringement for storage at the direction of a user of material that resides on a system or network controlled or operated by or for the service provider. Examples of such storage include providing server space for a user's web site, for a chatroom, or other forum in which material may be posted at the direction of users. Subsection (c) defines the scope of this limitation on liability. It also sets forth procedural requirements that copyright owners or their agents and service providers must follow with respect to notifications of claimedinfringement under subsection (c)(3). Information that resides on the system or network operated by or for the service provider through its own acts or decisions and not at the direction of a user does not fall within the liability limitation of subsection (c). New subsection (c)(1)(A) sets forth the applicable knowledge standard. This standard is met either by actual knowledge of infringement or, in the absence of such knowledge, by awareness of facts or circumstances from which infringing activity is apparent. The term ``activity'' is intended to mean activity using the material on the system or network. The Committee intends such activity to refer to wrongful activity that is occurring at the site on the provider's system or network at which the material resides, regardless of whether copyright infringement is technically deemed to occur at that site or at the location where the material is received. For example, the activity at an on-line site offering audio or video may be unauthorized public performance of a musical composition, a sound recording, or an audio-visual work, rather than (or in addition to) the creation of an unauthorized copy of any of these works. New subsection (c)(1)(A)(ii) can best be described as a ``red flag'' test. As stated in new subsection (c)(l), a service provider need not monitor its service or affirmatively seek facts indicating infringing activity (except to the extent consistent with a standard technical measure complying with new subsection (h)), in order to claim this limitation on liability (or, indeed any other limitation provided by the legislation). However, if the service provider becomes aware of a ``red flag'' from which infringing activity is apparent, it will lose the limitation of liability if it takes no action. The ``red flag'' test has both a subjective and an objective element. In determining whether the service provider was aware of a ``red flag,'' the subjective awareness of the service provider of the facts or circumstances in question must be determined. However, in deciding whether those facts or circumstances constitute a ``red flag''--in other words, whether infringing activity would have been apparent to a reasonable person operating under the same or similar circumstances--an objective standard should be used. New subsection (c)(1)(A)(iii) provides that once a service provider obtains actual knowledge or awareness of facts or circumstances from which infringing material or activity on the service provider's system or network is apparent, the service provider does not lose the limitation of liability set forth in subsection (c) if it acts expeditiously to remove or disable access to the infringing material. Because the factual circumstances and technical parameters may vary from case to case, it is not possible to identify a uniform time limit for expeditious action. New subsection (c)(1)(B) sets forth the circumstances under which a service provider would lose the protection of subsection (c) by virtue of its benefit from and control over infringing activity. In determining whether the financial benefit criterion is satisfied, courts should take a common- sense, fact-based approach, not a formalistic one. In general, a service provider conducting a legitimate business would not be considered to receive a ``financial benefit directly attributable to the infringing activity'' where the infringer makes the same kind of payment as non-infringing users of the provider's service. Thus, receiving a one-time set-up fee and flat, periodic payments for service from a person engaging in infringing activities would not constitute receiving a ``financial benefit directly attributable to the infringing activity.'' Nor is subsection (c)(1)(B) intended to cover fees based on the length of the message (e.g., per number of bytes) or by connect time. It would however, include any such fees where the value of the service lies in providing access to infringing material. New subsection (c)(1)(C) establishes that in cases where a service provider is notified of infringing activity by a copyright owner or its authorized agent, in accordance with the notification procedures of new subsection (c)(3), the limitation on the service provider's liability shall be maintained only if the service provider acts expeditiously either to remove the infringing material from its system or to prevent further access to the infringing material on the system or network. This ``notice and take-down'' procedure is a formalization and refinement of a cooperative process that has been employed to deal efficiently with network-based copyright infringement. The Committee emphasizes that new Section 512 does not specifically mandate use of a notice and take-down procedure. Instead, a service provider wishing to benefit from the limitation on liability under new subsection (c) must ``take down'' or disable access to infringing material residing on its system or network in cases where it has actual knowledge or that the criteria for the ``red flag'' test are met--even if the copyright owner or its agent does not notify it of a claimed infringement. On the other hand, the service provider is free to refuse to ``take down'' the material or site--even after receiving a notification of claimed infringement from the copyright owner. In such a situation, the service provider's liability, if any, will be decided without reference to new Section 512(c). At the same time, copyright owners are not obligated to give notification of claimed infringement in order to enforce their rights. However, neither actual knowledge nor awareness of a ``red flag'' may be imputed to a service provider based on information from a copyright owner or its agent that does not comply with the notification provisions of new subsection (c)(3), in which case the limitation on liability set forth in new subsection (c) may still apply. New Section 512(c)(2) provides that to qualify for the limitation on liability in new subsection (c), the service provider must designate an agent to receive notifications under new subsection (c)(1)(C). The designation, provided to the Register of Copyrights, and made available on the service provider's web site, is to contain certain information necessary to communicate with the service provider concerning allegedly infringing material or activity. The Register of Copyrights is directed to maintain a directory of designated agents available for inspection by the public, both on the web site of the Library of Congress, and in hard copy format on file at the Copyright Office. The Committee does not intend or anticipate that the Register will publish hard copies of the directory. The directory shall have entries for the name, address, telephone number, and electronic mail address of an agent designated by service providers. The service provider's designation shall substantially comply with these elements. New Section 512(c)(3) sets forth the procedures under which copyright owners and their agents may provide effective notification to a service provider of allegations of infringement on theprovider's system or network. New subsection (c)(3)(A) requires that to count as an effective notification, the notification must be in writing and submitted to the service provider's designated agent. New subsections (c)(3)(A)(i)-(vi) then set forth the information to be included in an effective notification. The standard against which a notification is to be judged is one of substantial compliance. New subsection (c)(3)(A)(i) provides that the notification must be signed by the copyright owner, or its authorized agent, to be effective. The requirement for signature, either physical or electronic, relates to the verification requirements of new subsections (c)(3)(A)(v) and (vi). New subsection (c)(3)(A)(ii) requires that the copyright owner identify the copyrighted work alleged to have been infringed. Where multiple works at a single on-line site are covered by a single notification, a representative list of such works at that site is sufficient. Thus, for example, where a party is operating an unauthorized Internet jukebox from a particular site, it is not necessary that the notification list every musical composition or sound recording that has been, may have been, or could be infringed at that site. Instead, it is sufficient for the copyright owner to provide the service provider with a representative list of those compositions or recordings in order that the service provider can understand the nature and scope of the infringement being claimed. New subsection (c)(3)(A)(iii) requires that the copyright owner or its authorized agent provide the service provider with information reasonably sufficient to permit the service provider to identify and locate the allegedly infringing material. An example of such sufficient information would be a copy or description of the allegedly infringing material and the so-called ``uniform resource locator'' (URL) (i.e., web site address) which allegedly contains the infringing material. The goal of this provision is to provide the service provider with adequate information to find and examine the allegedly infringing material expeditiously. New subsection (c)(3)(A)(iv) requires that the copyright owner or its authorized agent provide reasonably sufficient identifying information concerning the owner or its agent who submits the notification, such as an address, telephone number, and (if available) an electronic mail address so that the service provider may contact the complaining party. New subsection (c)(3)(A)(v) makes clear that the notification from complaining parties must contain a statement that the complaining party has a good faith belief that the allegedly infringing use is not authorized by the copyright owner, or its agent, or the law. New subsection (c)(3)(A)(vi) specifies that the notification must contain a statement that the information contained therein is accurate. The complaining party--be it the copyright owner, or an authorized representative--also must confirm under penalty of perjury, that it has authority to act on behalf of the owner of the exclusive right that is allegedly being infringed. The term ``perjury'' is used in the sense found elsewhere in the United States Code. See, e.g., 28 U.S.C. Sec. 1746; 18 U.S.C. Sec. 1621. New subsection (c)(3)(B) addresses the effect of notifications that do not substantially comply with the requirements of new subsection (c)(3). Under new subsection (c)(3)(B), the court shall not consider such notifications as evidence of whether the service provider has actual knowledge, is aware of facts or circumstances, or has received a notification for purposes of new subsection (c)(1)(A). However, a defective notice provided to the designated agent may be considered in evaluating the service provider's knowledge or awareness of facts and circumstances, if: (i) the complaining party has provided the requisite information concerning the identification of the copyrighted work, identification of the allegedly infringing material, and information sufficient for the service provider to contact the complaining party; and (ii) the service provider does not promptly attempt to contact the person making the notification or take other reasonable steps to assist in the receipt of notification that substantially complies with new subsection (c)(3)(A). If the service provider subsequently receives a substantially compliant notice, the provisions of new subsection (c)(1)(C) would then apply upon receipt of such notice. The Committee intends that the substantial compliance standard in new subsections (c)(2) and (c)(3) be applied so that technical errors (e.g., misspelling a name, supplying an outdated area code if the phone number is accompanied by an accurate address, supplying an outdated name if accompanied by an e-mail address that remains valid for the successor of the prior designated agent or agent of a copyright owner) do not disqualify service providers and copyright owners from the protections afforded under subsection (c). The Committee expects that the parties will comply with the functional requirements of the notification provisions--such as providing sufficient information so that a designated agent or the complaining party submitting a notification may be contacted efficiently--in order to ensure that the notification and take- down procedures set forth in this subsection operate efficiently. New Section 512(d) addresses instances where information location tools refer or link users to an on-line location containing infringing material or infringing activity. The term ``infringing activity'' means the wrongful activity that is occurring at the location to which the user is linked or referred by the information location tool, without regard to whether copyright infringement is technically deemed to have occurred at that location or at the location where the material is received. The term ``information location tools'' includes: a directory or index of on-line sites or material, such as a search engine that identifies pages by specified criteria; a reference to other on-line material, such as a list of recommended sites; a pointer that stands for an Internet location or address; and a hypertext link which allows users to access material without entering its address. New subsection (d) incorporates the notification and take- down procedures of new subsection (c), and applies them to the provision of references and links to infringing sites. A service provider is entitled to the liability limitations of new subsection (d) if it: (1) lacks actual knowledge of infringement on the other site, and is not aware of facts or circumstances from which infringing activity in that location is apparent; (2) does not receive a financial benefit directly attributable to the infringing activity on the site, where the service provider has the right and ability to control the infringing activity; and (3) responds expeditiously to remove or disable the reference or link upon receiving a notification of claimed infringement as described in new subsection (c)(3). The notification procedures under new subsection (d) follow those set forth in new subsection (c). However, the information submitted by the complaining party under new subsection (c)(3)(A)(iii) is the identification of the reference or link to infringing material oractivity, and the information reasonably sufficient to permit the service provider to locate that reference or link. New Section 512(d) provides a safe harbor that would limit the liability of a service provider that refers or links users to an on-line location containing infringing material or activity by using ``information location tools,'' such as hyperlink directories and indexes. A question has been raised as to whether a service provider would be disqualified from the safe harbor based solely on evidence that it had viewed the infringing Internet site. If so, there is concern that on-line directories prepared by human editors and reviewers, who view and classify various Internet sites, would be denied eligibility to the information location tools safe harbor, in an unintended number of cases and circumstances. This is an important concern because such on-line directories play a valuable role in assisting Internet users to identify and locate the information they seek on the decentralized and dynamic networks of the Internet. Like the information storage safe harbor in Section 512(c), a service provider would qualify for this safe harbor if, among other requirements, it ``does not have actual knowledge that the material or activity is infringing'' or, in the absence of such actual knowledge, it is ``not aware of facts or circumstances from which infringing activity is apparent.'' Under this standard, a service provider would have no obligation to seek out copyright infringement, but it would not qualify for the safe harbor if it had turned a blind eye to ``red flags'' of obvious infringement. For instance, the copyright owner could show that the provider was aware of facts from which infringing activity was apparent if the copyright owner could prove that the location was clearly, at the time the directory provider viewed it, a ``pirate'' site of the type described below, where sound recordings, software, movies, or books were available for unauthorized downloading, public performance, or public display. Absent such ``red flags'' or actual knowledge, a directory provider would not be similarly aware merely because it saw one or more well known photographs of a celebrity at a site devoted to that person. The provider could not be expected, during the course of its brief cataloguing visit, to determine whether the photograph was still protected by copyright or was in the public domain; if the photograph was still protected by copyright, whether the use was licensed; and if the use was not licensed, whether it was permitted under the fair use doctrine. The intended objective of this standard is to exclude from the safe harbor sophisticated ``pirate'' directories--which refer Internet users to other selected Internet sites where pirate software, books, movies, and music can be downloaded or transmitted. Such pirate directories refer Internet users to sites that are obviously infringing because they typically use words such as ``pirate,'' ``bootleg,'' or slang terms in their URL and header information to make their illegal purpose obvious, in the first place, to the pirate directories as well as other Internet users. Because the infringing nature of such sites would be apparent from even a brief and casual viewing, safe harbor status for a provider that views such a site and then establishes a link to it would not be appropriate. Pirate directories do not follow the routine business practices of legitimate service providers preparing directories, and thus evidence that they have viewed the infringing site may be all that is available for copyright owners to rebut their claim to a safe harbor. In this way, the ``red flag'' test in new Section 512(d) strikes the right balance. The common-sense result of this ``red flag'' test is that on-line editors and catalogers would not be required to make discriminating judgments about potential copyright infringement. If, however, an Internet site is obviously pirate, then seeing it may be all that is needed for the service provider to encounter a ``red flag.'' A provider proceeding in the face of such a ``red flag'' must do so without the benefit of a safe harbor. Information location tools are essential to the operation of the Internet; without them, users would not be able to find the information they need. Directories are particularly helpful in conducting effective searches by filtering out irrelevant and offensive material. The Yahoo! directory, for example, currently categorizes over 800,000 on-line locations and serves as a ``card catalogue'' to the World Wide Web, which over 35,000,000 different users visit each month. Directories such as Yahoo!'s usually are created by people visiting sites to categorize them. It is precisely the human judgment and editorial discretion exercised by these cataloguers which makes directories valuable. This provision is intended to promote the development of information location tools generally, and Internet directories such as Yahoo!'s in particular, by establishing a safe harbor from copyright infringement liability for information location tool providers if they comply with the notice and take-down procedures and other requirements of new subsection (d). The knowledge or awareness standard should not be applied in a manner which would create a disincentive to the development of directories which involve human intervention. Absent actual knowledge, awareness of infringement as provided in new subsection (d) should typically be imputed to a directory provider only with respect to pirate sites or in similarly obvious and conspicuous circumstances, and not simply because the provider viewed an infringing site during the course of assembling the directory. New Section 512(e) establishes a right of action against any person who knowingly misrepresents that material or activity on-line is infringing, or that material or activity was removed or disabled by mistake or misidentification under the ``put-back'' procedure set forth in new subsection (f). Actions may be brought under new subsection (e) by any copyright owner, a copyright owner's licensee, or by a service provider, who is injured by such misrepresentation, as a result of the service provider relying upon the misrepresentation in either taking down material or putting material back on-line. Defendants who make such a knowing misrepresentation are liable for any damages, including costs and attorneys'' fees, incurred by any of these parties as a result of the service provider's reliance upon the misrepresentation. This subsection is intended to deter knowingly false allegations to service providers in recognition that such misrepresentations are detrimental to rights holders, service providers, and Internet users. New Section 512(f) provides immunity to service providers for taking down infringing material, and establishes a ``put back'' procedure under which subscribers may contest a complaining party's notification of infringement provided under new subsection (c)(3). The put-back procedures were added to balance the incentives created in new Section 512 for service providers to take down material against third parties' interests in ensuring that material not be taken down. In particular, new subsection (f)(1) immunizes service providers from any claim based on the service provider's good-faith disabling of access to, or removal of, material or activity claimed to be infringing. The immunity also applies where the service provider disables access to, or removes, material or activity based on facts or circumstances from which infringing activity is apparent. This immunity is available even if the material or activity is ultimately determined not to be infringing. The purpose of this subsection is to protect service providers from liability to third parties whose material service providers take down in a good faith effort to comply with the requirements of new subsection (c)(1). New subsection (f)(2) establishes a ``put back'' procedure through an exception to the immunity set forth in new subsection (f)(1). The exception applies in a case in which the service provider, pursuant to a notification provided under new subsection (c)(1)(C) in accordance with new subsection (c)(3), takes down material that a subscriber has posted to the system or network. In such instances, to retain the immunity set forth in new subsection (f)(1) with respect to the subscriber whose content is taken down, the service provider must take three steps. First, under new subsection (f)(2)(A), the service provider is to take reasonable steps to notify the subscriber promptly of the removal or disabling of access to the subscriber's material. The Committee intends that ``reasonable steps'' include, for example, sending an e-mail notice to an e-mail address associated with a posting, or if only the subscriber's name is identified in the posting, sending an e-mail to an e- mail address that the subscriber submitted with its subscription. The Committee does not intend that this subsection impose any obligation on service providers to search beyond the four corners of a subscriber's posting or their own records for that subscriber in order to obtain contact information. Nor does the Committee intend to create any right on the part of subscribers who submit falsified information in their postings or subscriptions to complain if a service provider relies upon the information submitted by the subscriber. Second, pursuant to new subsection (f)(2)(B), the subscriber may then file a counter notification, in accordance with the requirements of new subsection (f)(3), contesting the original take down on grounds of mistake or misidentification of the material and requesting ``put back'' of the material that the service provider has taken down. If a subscriber files a counter notification with the service provider's designated agent, new subsection (f)(2)(B) calls for the service provider to promptly forward a copy to the complaining party who submitted the take down request. And third, under new subsection (f)(2)(C), the service provider is to place the subscriber's material back on-line, or cease disabling access to it, between 10 and 14 business days after receiving the counter notification, unless the designated agent receives a further noticefrom the complaining party that the complaining party has filed an action seeking a court order to restrain the subscriber from engaging in the infringing activity on the service provider's system or network with regard to the material in question. Subscriber counter notifications must substantially comply with defined requirements set forth in new subsection (f)(3). Notifications shall be signed by the subscriber physically or by electronic signature; identify the material taken down and the location from which it was taken down; include a statement under penalty of perjury that the subscriber has a good faith belief that the material was taken down as a result of mistake or misidentification of the material; and include the subscriber's contact information, as well as a statement consenting to the jurisdiction of a Federal district court and to accept service of process from the complaining party or the complaining party's agent. The substantial compliance standard is the same as that set forth in new subsections (c) (2) and (3). New subsection (f)(4) is included to make clear the obvious proposition that a service provider's compliance with the put- back procedure does not subject it to liability for copyright infringement or cause it to lose its liability limitation with respect to the replaced material. New Section 512(g) creates a procedure by which copyright owners or their authorized agents who have submitted or will submit a request for notification satisfying the requirements of new subsection (c)(3)(A) may obtain an order for identification of alleged infringers who are users of a service provider's system or network. Under this procedure, the copyright owner or agent files three documents with the clerk of any Federal district court: a copy of the notification; a proposed order; and a sworn declaration that the purpose of the order is to obtain the identity of an alleged infringer, and that the information obtained will only be used to protect the owner's rights under this Title. Orders issued under new subsection (g) shall authorize and order the service provider expeditiously to disclose to the person seeking the order information sufficient to identify the alleged infringer to the extent such information is available to the service provider. The Committee intends that an order for disclosure be interpreted as requiring disclosure of information in the possession of the service provider, rather than obliging the service provider to conduct searches for information that is available from other systems or networks. The Committee intends that such orders be expeditiously issued if the notification meets the provisions of new subsection (c)(3)(A) and the declaration is properly executed. The issuing of the order should be a ministerial function performed quickly for this provision to have its intended effect. After receiving the order, the service provider shall expeditiously disclose to the copyright owner or its agent the information required by the order to the extent that the information is available to the service provider, regardless of whether the service provider responds to the notification of claimed infringement. New Section 512(h) sets forth two conditions that a service provider must satisfy to be eligible for the limitations on liability provided in new subsections (a) through (d). First, the service provider is expected to adopt and reasonably implement a policy for the termination in appropriate circumstances of the accounts of subscribers 3 of the provider's service who are repeat on-line infringers of copyright. The Committee recognizes that there are different degrees of on-line copyright infringement, from the inadvertent and noncommercial, to the willful and commercial. In addition, the Committee does not intend this provision to undermine the principles of new subsection (l) or the knowledge standard of new subsection (c) by suggesting that a provider must investigate possible infringements, monitor its service, or make difficult judgments as to whether conduct is or is not infringing. However, those who repeatedly or flagrantly abuse their access to the Internet through disrespect for the intellectual property rights of others should know that there is a realistic threat of losing that access. --------------------------------------------------------------------------- \3\ In using the term ``subscribers,'' the Committee intends to include account holders that have a business relationship with the service provider that justifies treating them as subscribers, for the purposes of new Section 512, even if no formal subscription agreement exists. For example, ``subscribers'' would include students who are granted access to a university's system or network for digital on-line communications; employees who have access to their employer's system or network; or household members with access to a consumer on-line service by virtue of a subscription agreement between the service provider and another member of that household. --------------------------------------------------------------------------- Second, a provider's system must accommodate, and not interfere with, standard technical measures used to identify or protect copyrighted works. The Committee believes that technology is likely to be the solution to many of the issues facing copyright owners and service providers in this digital age. For that reason, the Committee has included new subsection (h)(1)(B), which is intended to encourage appropriate technological solutions to protect copyrighted works. The Committee strongly urges all of the affected parties expeditiously to commence voluntary, inter-industry discussions to agree upon and implement the best technological solutions available to achieve these goals. New subsection (h)(1)(B) is explicitly limited to ``standard technical measures'' that have been developed pursuant to a broad consensus of both copyright owners and service providers in an open, fair, voluntary, multi-industry standards process. The Committee anticipates that these provisions could be developed both in recognized open standards bodies or in ad hoc groups, as long as the process used is open, fair, voluntary, and multi-industry and the measures developed otherwise conform to the requirements of the definition of standard technical measures set forth in new subsection (h)(2). A number of recognized open standards bodies have substantial experience with Internet issues. The Committee also notes that an ad hoc approach has been successful in developing standards in other contexts, such as the process that has developed copy protection technology for use in connection with digital video disk players. New Section 512(i) defines the terms and conditions under which an injunction may be issued against a service provider that qualifies for the limitations on liability set forth in new subsections (a) through (d), but is otherwise subject to an injunction under existing principles of law. New subsection (i)(1) limits the scope of injunctive relief that may be ordered against a qualifying provider. New subsection (i)(2) identifies factors a court must consider in deciding whether to grant injunctive relief and in determining the appropriate scope of injunctive relief. New subsection (i)(1) is divided into two subparagraphs. New subparagraph (A) defines the scope of injunctive relief available against service providers who qualify for the limitations of liability set forth in new subsections (b), (c) or (d). Only three forms of injunctive relief may be granted. First, pursuant to new subsection (i)(1)(A)(i), the court may provide for the removal or blocking of infringing material or activity that is residing at a specific location on the provider's system or network. This is essentially an order to take the actions identified in new subsection (c)(1)(C) to ``remove, or disable access'' to the material that is claimed to be infringing or to be the subject of infringing activity. Second, under new subsection (i)(1)(A)(ii), the court may order the provider to terminate the accounts of a subscriber 4 of the provider's service who is engaging in infringing activity. And third, pursuant to new subsection (i)(1)(A)(iii), the court may, under appropriate circumstances, enter a different form of injunction if the court considers it necessary to prevent or restrain infringement of specific copyrighted material that resides at an identified on-line location. If a court enters an injunction other than that contemplated in new subparagraphs (A) (i) or (ii), the court must determine that the injunctive relief is the least burdensome relief to the service provider among those forms of relief that are comparably effective. --------------------------------------------------------------------------- \4\ See supra note 3. --------------------------------------------------------------------------- New subsection (i)(1)(B) sets forth a different set of remedies available for injunctions against service providers qualifying for the limitation on remedies set forth in new subsection (a). In such cases, if a court determines that injunctive relief is appropriate, it may only grant injunctive relief in one or both of two specified forms. The first, pursuant to new subparagraph (B)(i), is an order to the service provider to terminate subscriber accounts that are specified in the order. The second form of relief, pursuant to new subparagraph (B)(ii) and available in cases in which a provider is engaging in infringing activity relating to a foreign on- line location, is an order to take reasonable steps to block access to a specific, identified foreign on-line location. Such blocking orders are not available against a service provider qualifying under new subsection (a) in the case of infringing activity on a site within the United States or its territories. New subsection (i)(2) sets forth mandatory considerations for the court beyond those that exist under current law. These additional considerations require the court to consider factors of particular significance in the digital on-line environment. New subsection (i)(3) prohibits most forms of ex parte injunctive relief (including temporary and preliminary relief) against a service provider qualifying for a liability limitation under new Section 512. A court may issue an order to ensure the preservation of evidence or where the order will have no material adverse effect on the operation of the provider's network. New Section 512(j) provides definitions of the term ``service provider'' as used in this Title, as well as a definition of the term ``monetary relief.'' Only an entity that is performing the functions of a ``service provider'' is eligible for the limitations on liability set forth in new Section 512 with respect to those functions. The first definition of a ``service provider,'' set forth in new subsection (j)(1)(A), narrowly defines a range of functions and applies only to use of the term in new subsection (a). As used in new subsection (a), the term ``service provider'' means any entity offering the transmission, routing or providing of connections for digital on-line communications, between or among points specified by a user, of material of a user's choosing without modification to the content of the material as sent or received. This free-standing definition is derived from the definition of ``telecommunications'' found in the Communications Act of 1934 (47 U.S.C. Sec. 153(48)) in recognition of the fact that the functions covered by new subsection (a) are essentially conduit-only functions. The Committee, however, has tweaked the definition for purposes of new subsection (j)(1)(A) to ensure that it captures offerings over the Internet and other on-line media. Thus, the definition in new subsection (j)(1)(A) not only includes ``the offering of transmission, routing or providing of connections,'' but also requires that the service provider be providing such services for communications that are both ``digital'' and ``on-line.'' By ``on-line'' communications, the Committee means communications over interactive computer networks, such as the Internet. Thus, over-the-air broadcasting, whether in analog or digital form, or a cable television system, or a satellite television service, would not qualify, except to the extent it provides users with on-line access to a digital network such as the Internet, or it provides transmission, routing, or connections to connect material to such a network, and then only with respect to those functions. An entity is not disqualified from being a ``service provider'' because it alters the form of the material, so long as it does not alter the content of the material. As a threshold matter, a service provider's performance of a particular function with respect to allegedly infringing activity falls within the ``service provider'' definition in new subsection (j)(1)(A) if and only if such function is within the range of functions defined in new subsection (j)(1)(A). For example, hosting a web site does not fall within the new subsection (j)(1)(A) definition, whereas the mere provision of connectivity to a web site does fall within that definition. The new subsection (j)(1)(A) definition is not intended to exclude providers that perform additional functions, including the functions identified in new subsection (j)(1)(B). Conversely, the fact that a provider performs some functions that fall within the definition of new subparagraph (A) does not imply that its other functions that do not fall within the definition of new subparagraph (A) qualify for the limitation of liability under new subsection (a). The second definition of ``service provider,'' set forth in new subsection (j)(1)(B), applies to the term as used in any other new subsection of new Section 512. This definition is broader than the first, covering providers of on-line services or network access, or the operator of facilities therefor. This definition includes, for example, services such as providing Internet access, e-mail, chat room and web page hosting services. The new subsection (j)(1)(B) definition of service provider, for example, includes universities and schools to the extent they perform the functions identified in new subsection (j)(1)(B). The definition also specifically includes any entity that falls within the first definition of service provider. A broadcaster or cable television system or satellite television service would not qualify, except to the extent it performs functions covered by (j)(1)(B). Finally, new subsection (j)(2) defines the term ``monetary relief'' broadly for purposes of this Section as encompassing damages, costs, attorneys' fees and any other form of monetary payment. New Section 512(k) clarifies that other defenses under copyright law are not affected and codifies several important principles. In particular, new Section 512 does not define what is actionable copyright infringement in the on-line environment, and does not create any new exceptions to the exclusive rights under copyright law. The rest of the Copyright Act sets those rules. Similarly, new Section 512 does not create any new liabilities for service providers or affect any defense available to a service provider. Enactment of new Section 512 does not bear upon whether a service provider is or is not an infringer when its conduct falls within the scope of new Section 512. Even if a service provider's activities fall outside the limitations on liability specified in the bill, the service provider is not necessarily an infringer; liability in these circumstances would be adjudicated based on the doctrines of direct, vicarious or contributory liability for infringement as they are articulated in the Copyright Act and in the court decisions interpreting and applying that statute, which are unchanged by new Section 512. In the event that a service provider does not qualify for the limitation on liability, it still may claim all of the defenses available to it under current law. New section 512 simply defines the circumstances under which a service provider, as defined in this new Section, may enjoy a limitation on liability for copyright infringement. New Section 512(l) is designed to protect the privacy of Internet users. This new subsection makes clear that the applicability of new subsections (a) through (d) is in no way conditioned on a service provider: (1) monitoring its service or affirmatively seeking facts indicating infringing activity except to the extent consistent with implementing a standard technical measure under new subsection (h); or (2) accessing, removing or disabling access to, material if such conduct is prohibited by law, such as the Electronic Communications Privacy Act. New Section 512(m) establishes a rule of construction applicable to new subsections (a) through (d). New Section 512's limitations on liability are based on functions, and each limitation is intended to describe a separate and distinct function. Consider, for example, a service provider that provides a hyperlink to a site containing infringing material which it then caches on its system in order to facilitate access to it by its users. This service provider is engaging in at least three functions that may be subject to the limitation on liability: transitory digital network communications under new subsection (a); system caching under new subsection (b); and information location tools under new subsection (d). If this service provider (as defined in new subsection (j)(1)(A) in the case of transitory digital communications, or as defined in new subsection (j)(1)(B) in the case of system caching or information location tools) meets the threshold criteria spelled out in new subsection (h)(1), then for its acts of system caching defined in new subsection (b), it may avail itself of the liability limitations stated in new subsection (b), which incorporate the limitations on injunctive relief described in new subsection (i)(1)(B) and (i)(3). If it is claimed that the same company is committing an infringement by using information location tools to link its users to infringing material, as defined in new subsection (d), then its fulfillment of the requirements to claim the system caching liability limitation does not affect whether it qualifies for the liability limitation for information location tools; the criteria in new subsection (d), rather than those in new subsection (b), are applicable. New Section 512(m) codifies this principle by providing that the determination of whether a service provider qualifies for one liability limitation has no effect on the determination of whether it qualifies for a separate and distinct liability limitation under another new subsection of new Section 512. (a) Conforming amendment Section 202(b) amends the table of sections for chapter 5 of the Copyright Act (17 U.S.C. Sec. 501 et seq.) to reflect the new Section 512, as created by this title. Section 203. Limitation on exclusive rights; computer programs Section 203 effects a minor, yet important, clarification in Section 117 of the Copyright Act (17 U.S.C. Sec. 117) to ensure that the lawful owner or lessee of a computer machine may authorize an independent service provider--a person unaffiliated with either the owner or lessee of the machine--to activate the machine for the sole purpose of servicing its hardware components. Section 204. Liability of educational institutions for online infringement of copyright (a) Recommendations by Register of Copyrights Section 204(a) directs the Register of Copyrights to consult with representatives of copyright owners and nonprofit educational institutions and to submit to the Congress within 6 months after enactment of the bill recommendations regarding the liability of nonprofit educational institutions for copyright infringements that take place through the use of the institution's computer system or network, where the institution qualifies as a ``service provider'' under the provisions of this Title. Included in the Register's report are to be any recommendations for legislation that the Register considers appropriate. (b) Factors Section 204(b) sets forth specific considerations that the Register shall take into account, where relevant, in formulating recommendations to the Congress. Section 205. Evaluation of impact of copyright law and amendments on electronic commerce and technological development As previously stated in the background section to this report, the Committee believes it is important to more precisely evaluate the relationship between intellectual property and electronic commerce, and to understand the practical implications of this relationship on thedevelopment of technology to be used in promoting electronic commerce. Section 205 enables Congress to make that evaluation. (a) Findings Section 205(a) finds that Congress must have accurate and current information on the effects of intellectual property protection on electronic commerce and technology. (b) Evaluation by Secretary of Commerce Section 205(b) directs the Secretary of Commerce, in consultation with the Assistant Secretary of Commerce for Communications and Information and the Register of Copyrights, to evaluate the effects of this legislation on the development of electronic commerce and associated technology, as well as the relationship between existing and emergent technology, on the one hand, and existing copyright law, on the other. (c) Report to Congress Section 205(c) directs the Secretary of Commerce to submit a report to Congress, within one year of enactment, on the evaluation required pursuant to Section 205(b). Section 206. Effective date Section 206 establishes the effective date for Title II as the date of enactment. TITLE III--EPHEMERAL RECORDINGS; DISTANCE EDUCATION; EXEMPTION FOR LIBRARIES AND ARCHIVES Section 301. Ephemeral recordings Section 301 amends Section 112 of the Copyright Act (17 U.S.C. Sec. 112) to address two issues concerning the application of the ephemeral recording exemption in the digital age. The first of these issues is the relationship between the ephemeral recording exemption and the Digital Performance Right in Sound Recordings Act of 1995 (DPRA). DPRA granted sound recording copyright owners the exclusive right to perform their works publicly by means of digital audio transmission, subject to certain limitations, particularly those set forth in Section 114(d). Among those limitations is an exemption for non- subscription broadcast transmissions, which are defined as those made by terrestrial broadcast stations licensed as such by the Federal Communications Commission. (17 U.S.C. Sec. 114(d)(1)(A)(iii), (j)(2)). The ephemeral recording exemption presently privileges certain activities of a transmitting organization when it is entitled to transmit a performance or display under a license or transfer of copyright ownership or under the limitations on exclusive rights in sound recordings specified by Section 114(a). The Committee believes that the ephemeral recording exemption should apply to broadcast radio and television stations when they make non- subscription digital broadcasts permitted by DPRA. The Committee has therefore changed the existing language of the ephemeral recording exemption (redesignated as Section 112(a)(1)) to extend explicitly to broadcasters the same privilege they already enjoy with respect to analog broadcasts. The second of these issues is the relationship between the ephemeral recording exemption and the anti-circumvention provisions that the bill adds as Section 102 of this legislation. Concerns were expressed that if use of copy protection technologies became widespread, a transmitting organization might be prevented from engaging in its traditional activities of assembling transmission programs and making ephemeral recordings permitted by Section 112 for purposes of its own transmissions within its local service area and of archival preservation and security. To address this concern, the Committee has added to Section 112 a new paragraph that permits transmitting organizations to engage in activities that otherwise would violate the regulations to be issued under Section 102(a)(1) in certain limited circumstances when necessary for the exercise of the transmitting organization's privilege to make ephemeral recordings under redesignated Section 112(a)(1). By way of example, if a radio station could not make a permitted ephemeral recording from a commercially available phonorecord without violating the regulations to be issued under Section 102(a)(1), then the radio station could request from the copyright owner the necessary means of making a permitted ephemeral recording. If the copyright owner did not then either provide a phonorecord that could be reproduced or otherwise provide the necessary means of making a permitted ephemeral recording from the phonorecord already in the possession of the radio station, the radio station would not be liable for violating the regulations to be issued under Section 102(a)(1) for taking the steps necessary for engaging in activities permitted under Section 112(a)(1). The radio station would, of course, be liable for violating the regulations to be issued under Section 102(a)(1) if it engaged in activities prohibited by that Section in other than the limited circumstances permitted by Section 112(a)(1). Section 302. Limitation on exclusive rights; distance education (a) Recommendations by National Telecommunications and Information Administration Section 302(a) directs the Assistant Secretary of Commerce for Communications and Information to consult with representatives of copyright owners, non-profit educational institutions, and nonprofit libraries and archives and to submit recommendations to the Congress no later than 6 months after the date of enactment of the bill on how to promote distance education through digital technologies, including interactive digital networks, while maintaining an appropriate balance between the rights of copyright owners and the needs of users. Where appropriate, the Assistant Secretary shall include legislative recommendations to achieve those objectives. (b) Factors Section 302(b) specifies considerations which the Assistant Secretary of Commerce for Communications and Information shall take into account in formulating such recommendations. Section 303. Exemption for libraries and archives Section 303 allows libraries and archives to take advantage of digital technologies when engaging in specified preservation activities. TITLE IV--RELATED PROVISIONS Section 401. Report by the National Telecommunications and Information Administration Section 401 requires the Assistant Secretary of Commerce for Communications and Information to submit a report to Congress, within six months on enactment, on appropriate mechanisms to encourage the development of access protocols, encryption testing methods, and security testing methods which would allow lawful access to, with appropriate safeguards to prevent the unlawful copying of, encrypted works. Changes in Existing Law Made by the Bill, as Reported In compliance with clause 3 of rule XIII of the Rules of the House of Representatives, changes in existing law made by the bill, as reported, are shown as follows (existing law proposed to be omitted is enclosed in black brackets, new matter is printed in italic, existing law in which no change is proposed is shown in roman): TITLE 17, UNITED STATES CODE * * * * * * * CHAPTER 1--SUBJECT MATTER AND SCOPE OF COPYRIGHT * * * * * * * Sec. 101. Definitions Except as otherwise provided in this title, as used in this title, the following terms and their variant forms mean the following: An ``anonymous work'' is a work on the copies or phonorecords of which no natural person is identified as author. * * * * * * * [A work is a ``Berne Convention work'' if-- [(1) in the case of an unpublished work, one or more of the authors is a national of a nation adhering to the Berne Convention, or in the case of a published work, one or more of the authors is a national of a nation adhering to the Berne Convention on the date of first publication; [(2) the work was first published in a nation adhering to the Berne Convention, or was simultaneously first published in a nation adhering to the Berne Convention and in a foreign nation that does not adhere to the Berne Convention; [(3) in the case of an audiovisual work-- [(A) if one or more of the authors is a legal entity, that author has its headquarters in a nation adhering to the Berne Convention; or [(B) if one or more of the authors is an individual, that author is domiciled, or has his or her habitual residence in, a nation adhering to the Berne Convention; [(4) in the case of a pictorial, graphic, or sculptural work that is incorporated in a building or other structure, the building or structure is located in a nation adhering to the Berne Convention; or [(5) in the case of an architectural work embodied in a building, such building is erected in a country adhering to the Berne Convention. For purposes of paragraph (1), an author who is domiciled in or has his or her habitual residence in, a nation adhering to the Berne Convention is considered to be a national of that nation. For purposes of paragraph (2), a work is considered to have been simultaneously published in two or more nations if its dates of publication are within 30 days of one another.] * * * * * * * [The ``country of origin'' of a Berne Convention work, for purposes of section 411, is the United States if] For purposes of section 411, a work is a ``United States work'' only if-- (1) in the case of a published work, the work is first published-- (A) in the United States; (B) simultaneously in the United States and another [nation or nations adhering to the Berne Convention] treaty party or parties, whose law grants a term of copyright protection that is the same as or longer than the term provided in the United States; (C) simultaneously in the United States and a foreign nation that [does not adhere to the Berne Convention] is not a treaty party; or (D) in a foreign nation that [does not adhere to the Berne Convention] is not a treaty party, and all of the authors of the work are nationals, domiciliaries, or habitual residents of, or in the case of an audiovisual work legal entities with headquarters in, the United States; * * * * * * * (3) in the case of a pictorial, graphic, or sculptural work incorporated in a building or structure, the building or structure is located in the United States. [For the purposes of section 411, the ``country of origin'' of any other Berne Convention work is not the United States.] * * * * * * * A work is ``fixed'' in a tangible medium of expression when its embodiment in a copy or phonorecord, by or under the authority of the author, is sufficiently permanent or stable to permit it to be perceived, reproduced, or otherwise communicated for a period of more than transitory duration. A work consisting of sounds, images, or both, that are being transmitted, is ``fixed'' for purposes of this title if a fixation of the work is being made simultaneously with its transmission. The ``Geneva Phonograms Convention'' is the Convention for the Protection of Producers of Phonograms Against Unauthorized Duplication of Their Phonograms, concluded at Geneva, Switzerland, on October 29, 1971. The terms ``including'' and ``such as'' are illustrative and not limitative. An ``international agreement'' is-- (1) the Universal Copyright Convention; (2) the Geneva Phonograms Convention; (3) the Berne Convention; (4) the WTO Agreement; (5) the WIPO Copyright Treaty; (6) the WIPO Performances and Phonograms Treaty; and (7) any other copyright treaty to which the United States is a party. * * * * * * * To ``transmit'' a performance or display is to communicate it by any device or process whereby images or sounds are received beyond the place from which they are sent. A ``treaty party'' is a country or intergovernmental organization other than the United States that is a party to an international agreement. * * * * * * * The author's ``widow'' or ``widower'' is the author's surviving spouse under the law of the author's domicile at the time of his or her death, whether or not the spouse has later remarried. The ``WIPO Copyright Treaty'' is the WIPO Copyright Treaty concluded at Geneva, Switzerland, on December 20, 1996. The ``WIPO Performances and Phonograms Treaty'' is the WIPO Performances and Phonograms Treaty concluded at Geneva, Switzerland, on December 20, 1996. * * * * * * * A ``work made for hire'' is-- (1) * * * * * * * * * * The terms ``WTO Agreement'' and ``WTO member country'' have the meanings given those terms in paragraphs (9) and (10), respectively, of section 2 of the Uruguay Round Agreements Act. * * * * * * * Sec. 104. Subject matter of copyright: National origin (a) Unpublished Works.--The works specified by sections 102 and 103, while unpublished, are subject to protection under this title without regard to the nationality or domicile of the author. (b) Published Works.--The works specified by sections 102 and 103, when published, are subject to protection under this title if-- (1) on the date of first publication, one or more of the authors is a national or domiciliary of the United States, or is a national, domiciliary, or sovereign authority of a [foreign nation that is a party to a copyright treaty to which the United States is also a party] treaty party, or is a stateless person, wherever that person may be domiciled; or (2) the work is first published in the United States or in a foreign nation that, on the date of first publication, is a [party to the Universal Copyright Convention] treaty party; or (3) the work is a sound recording that was first fixed in a treaty party; or (4) the work is a [Berne Convention work] pictorial, graphic, or sculptural work that is incorporated in a building or other structure, or an architectural work that is embodied in a building and the building or structure is located in the United States or a treaty party; or [(3)] (5) the work is first published by the United Nations or any of its specialized agencies, or by the Organization of American States; or [(5)] (6) the work comes within the scope of a Presidential proclamation. Whenever the President finds that a particular foreign nation extends, to works by authors who are nationals or domiciliaries of the United States or to works that are first published in the United States, copyright protection on substantially the same basis as that on which the foreign nation extends protection to works of its own nationals and domiciliaries and works first published in that nation, the President may by proclamation extend protection under this title to works of which one or more of the authors is, on the date of first publication, a national, domiciliary, or sovereign authority of that nation, or which was first published in that nation. The President may revise, suspend, or revoke any such proclamation or impose any conditions or limitations on protection under a proclamation. For purposes of paragraph (2), a work that is published in the United States or a treaty party within 30 days after publication in a foreign nation that is not a treaty party shall be considered to be first published in the United States or such treaty party, as the case may be. * * * * * * * (d) Effect of Phonograms Treaties.--Notwithstanding the provisions of subsection (b), no works other than sound recordings shall be eligible for protection under this title solely by virtue of the adherence of the United States to the Geneva Phonograms Convention or the WIPO Performances and Phonograms Treaty. Sec. 104A. Copyright in restored works (a) * * * * * * * * * * (h) Definitions.--For purposes of this section and section 109(a): (1) The term ``date of adherence or proclamation'' means the earlier of the date on which a foreign nation which, as of the date the WTO Agreement enters into force with respect to the United States, is not a nation adhering to the Berne Convention or a WTO member country, becomes-- [(A) a nation adhering to the Berne Convention or a WTO member country; or [(B) subject to a Presidential proclamation under subsection (g).] (A) a nation adhering to the Berne Convention; (B) a WTO member country; (C) a nation adhering to the WIPO Copyright Treaty; (D) a nation adhering to the WIPO Performances and Phonograms Treaty; or (E) subject to a Presidential proclamation under subsection (g). * * * * * * * [(3) The term ``eligible country'' means a nation, other than the United States, that-- [(A) becomes a WTO member country after the date of the enactment of the Uruguay Round Agreements Act; [(B) on such date of enactment is, or after such date of enactment becomes, a member of the Berne Convention; or [(C) after such date of enactment becomes subject to a proclamation under subsection (g). For purposes of this section, a nation that is a member of the Berne Convention on the date of the enactment of the Uruguay Round Agreements Act shall be construed to become an eligible country on such date of enactment.] (3) The term ``eligible country'' means a nation, other than the United States, that-- (A) becomes a WTO member country after the date of the enactment of the Uruguay Round Agreements Act; (B) on such date of enactment is, or after such date of enactment becomes, a nation adhering to the Berne Convention; (C) adheres to the WIPO Copyright Treaty; (D) adheres to the WIPO Performances and Phonograms Treaty; or (E) after such date of enactment becomes subject to a proclamation under subsection (g). * * * * * * * (6) The term ``restored work'' means an original work of authorship that-- (A) * * * * * * * * * * (C) is in the public domain in the United States due to-- (i) * * * * * * * * * * (iii) lack of national eligibility; [and] (D) has at least one author or rightholder who was, at the time the work was created, a national or domiciliary of an eligible country, and if published, was first published in an eligible country and not published in the United States during the 30-day period following publication in such eligible country[.]; and (E) if the source country for the work is an eligible country solely by virtue of its adherence to the WIPO Performances and Phonograms Treaty, is a sound recording. * * * * * * * (8) The ``source country'' of a restored work is-- (A) a nation other than the United States; (B) in the case of an unpublished work-- (i) the eligible country in which the author or rightholder is a national or domiciliary, or, if a restored work has more than 1 author or rightholder, of which the majority of foreign authors or rightholders are nationals or domiciliaries [of eligible countries]; or * * * * * * * [(9) The terms ``WTO Agreement'' and ``WTO member country'' have the meanings given those terms in paragraphs (9) and (10), respectively, of section 2 of the Uruguay Round Agreements Act.] * * * * * * * Sec. 108. Limitations on exclusive rights: Reproduction by libraries and archives (a) [Notwithstanding] Except as otherwise provided in this title and notwithstanding the provisions of section 106, it is not an infringement of copyright for a library or archives, or any of its employees acting within the scope of their employment, to reproduce no more than one copy or phonorecord of a work, except as provided in subsections (b) and (c), or to distribute such copy or phonorecord, under the conditions specified by this section, if-- (1) * * * * * * * * * * (3) the reproduction or distribution of the work includes a notice of copyright that appears on the copy or phonorecord that is reproduced under the provisions of this section, or includes a legend stating that the work may be protected by copyright if no such notice can be found on the copy or phonorecord that is reproduced under the provisions of this section. (b) The rights of reproduction and distribution under this section apply to [a copy or phonorecord] three copies or phonorecords of an unpublished work duplicated [in facsimile form] solely for purposes of preservation and security or for deposit for research use in another library or archives of the type described by clause (2) of subsection (a), [if the copy or phonorecord reproduced is currently in the collections of the library or archives.] if-- (1) the copy or phonorecord reproduced is currently in the collections of the library or archives; and (2) any such copy or phonorecord that is reproduced in digital format is not otherwise distributed in that format and is not made available to the public in that format outside the premises of the library or archives. (c) The right of reproduction under this section applies to [a copy or phonorecord] three copies or phonorecords of a published work duplicated [in facsimile form] solely for the purpose of replacement of a copy or phonorecord that is damaged, deteriorating, lost, or stolen, or if the existing format in which the work is stored has become obsolete, [if the library or archives has, after a reasonable effort, determined that an unused replacement cannot be obtained at a fair price.] if-- (1) the library or archives has, after a reasonable effort, determined that an unused replacement cannot be obtained at a fair price; and (2) any such copy or phonorecord that is reproduced in digital format is not made available to the public in that format except for use on the premises of the library or archives in lawful possession of such copy. For purposes of this subsection, a format shall be considered obsolete if the machine or device necessary to render perceptible a work stored in that format is no longer manufactured or is no longer reasonably available in the commercial marketplace. * * * * * * * Sec. 112. Limitations on exclusive rights: Ephemeral recordings (a)(1) Notwithstanding the provisions of section 106, and except in the case of a motion picture or other audiovisual work, it is not an infringement of copyright for a transmitting organization entitled to transmit to the public a performance or display of a work, under a license or transfer of the copyright or under the limitations on exclusive rights in sound recordings specified by section 114(a), or for a transmitting organization that is a broadcast radio or television station licensed as such by the Federal Communications Commission that broadcasts a performance of a sound recording in a digital format on a nonsubscription basis, to make no more than one copy or phonorecord of a particular transmission program embodying the performance or display, if-- [(1)] (A) the copy or phonorecord is retained and used solely by the transmitting organization that made it, and no further copies or phonorecords are reproduced from it; and [(2)] (B) the copy or phonorecord is used solely for the transmitting organization's own transmissions within its local service area, or for purposes of archival preservation or security; and [(3)] (C) unless preserved exclusively for archival purposes, the copy or phonorecord is destroyed within six months from the date the transmission program was first transmitted to the public. (2) In a case in which a transmitting organization entitled to make a copy or phonorecord under paragraph (1) in connection with the transmission to the public of a performance or display of a work described in that paragraph is prevented from making such copy or phonorecord by reason of the application by the copyright owner of technical measures that prevent the reproduction of the work, the copyright owner shall make available to the transmitting organization the necessary means for permitting the making of such copy or phonorecord within the meaning of that paragraph, if it is technologically feasible and economically reasonable for the copyright owner to do so. If the copyright owner fails to do so in a timely manner in light of the transmitting organization's reasonable business requirements, the transmitting organization shall not be liable for a violation of section 102(a)(1) of the WIPO Copyright Treaties Implementation Act for engaging in such activities as are necessary to make such copies or phonorecords as permitted under paragraph (1) of this subsection. * * * * * * * Sec. 117. Limitations on exclusive rights: Computer programs [Notwithstanding] (a) Making of Additional Copy or Adaptation by Owner of Copy.--Notwithstanding the provisions of section 106, it is not an infringement for the owner of a copy of a computer program to make or authorize the making of another copy or adaptation of that computer program provided: (1) * * * * * * * * * * [Any exact] (b) Lease, Sale, or Other Transfer of Additional Copy or Adaptation.--Any exact copies prepared in accordance with the provisions of this section may be leased, sold, or otherwise transferred, along with the copy from which such copies were prepared, only as part of the lease, sale, or other transfer of all rights in the program. Adaptations so prepared may be transferred only with the authorization of the copyright owner. (c) Machine Maintenance or Repair.--Notwithstanding the provisions of section 106, it is not an infringement for the owner or lessee of a machine to make or authorize the making of a copy of a computer program if such copy is made solely by virtue of the activation of a machine that lawfully contains an authorized copy of the computer program, for purposes only of maintenance or repair of that machine, if-- (1) such new copy is used in no other manner and is destroyed immediately after the maintenance or repair is completed; and (2) with respect to any computer program or part thereof that is not necessary for that machine to be activated, such program or part thereof is not accessed or used other than to make such new copy by virtue of the activation of the machine. (d) Definitions.--For purposes of this section-- (1) the ``maintenance'' of a machine is the servicing of the machine in order to make it work in accordance with its original specifications and any changes to those specifications authorized for that machine; and (2) the ``repair'' of a machine is the restoring of the machine to the state of working in accordance with its original specifications and any changes to those specifications authorized for that machine. * * * * * * * CHAPTER 4--COPYRIGHT NOTICE, DEPOSIT, AND REGISTRATION * * * * * * * Sec. 411. Registration and infringement actions (a) Except for [actions for infringement of copyright in Berne Convention works whose country of origin is not the United States and] an action brought for a violation of the rights of the authorunder section 106A(a), and subject to the provisions of subsection (b), no action for infringement of the copyright in any United States work shall be instituted until registration of the copyright claim has been made in accordance with this title. In any case, however, where the deposit, application, and fee required for registration have been delivered to the Copyright Office in proper form and registration has been refused, the applicant is entitled to institute an action for infringement if notice thereof, with a copy of the complaint, is served on the Register of Copyrights. The Register may, at his or her option, become a party to the action with respect to the issue of registrability of the copyright claim by entering an appearance within sixty days after such service, but the Register's failure to become a party shall not deprive the court of jurisdiction to determine that issue. * * * * * * * CHAPTER 5--COPYRIGHT INFRINGEMENT AND REMEDIES Sec. 501. Infringement of copyright. * * * * * * * 512. Liability of service providers for online infringement of copyright. * * * * * * * Sec. 507. Limitations on actions (a) Criminal Proceedings.--[No] Except as expressly provided otherwise in this title, no criminal proceeding shall be maintained under the provisions of this title unless it is commenced within 5 years after the cause of action arose. * * * * * * * Sec. 512. Liability of service providers for online infringement of copyright (a) Digital Network Communications.--A service provider shall not be liable for monetary relief, or except as provided in subsection (i) for injunctive or other equitable relief, for infringement for the provider's transmitting, routing, or providing connections for, material through a system or network controlled or operated by or for the service provider, or the intermediate and transient storage of such material in the course of such transmitting, routing or providing connections, if-- (1) it was initiated by or at the direction of a person other than the service provider; (2) it is carried out through an automatic technical process without selection of such material by the service provider; (3) the service provider does not select the recipients of such material except as an automatic response to the request of another; (4) no such copy of such material made by the service provider is maintained on the system or network in a manner ordinarily accessible to anyone other than anticipated recipients, and no such copy is maintained on the system or network in a manner ordinarily accessible to the anticipated recipients for a longer period than is reasonably necessary for the communication; and (5) the material is transmitted without modification to its content. (b) System Caching.--A service provider shall not be liable for monetary relief, or except as provided in subsection (i) for injunctive or other equitable relief, for infringement for the intermediate and temporary storage of material on the system or network controlled or operated by or for the service provider: Provided, That-- (1) such material is made available online by a person other than such service provider, (2) such material is transmitted from the person described in paragraph (1) through such system or network to someone other than that person at the direction of such other person, (3) the storage is carried out through an automatic technical process for the purpose of making such material available to users of such system or network who subsequently request access to that material from the person described in paragraph (1): Provided further, That-- (4) such material is transmitted to such subsequent users without modification to its content from the manner in which the material otherwise was transmitted from the person described in paragraph (1); (5) such service provider complies with rules concerning the refreshing, reloading or other updating of such material when specified by the person making that material available online in accordance with an accepted industry standard data communications protocol for the system or network through which that person makes the material available: Provided further, That the rules are not used by the person described in paragraph (1) to prevent or unreasonably impair such intermediate storage; (6) such service provider does not interfere with the ability of technology associated with such material that returns to the person described in paragraph (1) the information that would have been available to such person if such material had been obtained by such subsequent users directly from such person: Provided further, That such technology-- (A) does not significantly interfere with the performance of the provider's system or network or with the intermediate storage of the material; (B) is consistent with accepted industry standard communications protocols; and (C) does not extract information from the provider's system or network other than the information that would have been available to such person if such material had been accessed by such users directly from such person; (7) either-- (A) the person described in paragraph (1) does not currently condition access to such material; or (B) if access to such material is so conditioned by such person, by a current individual pre-condition, such as a pre- condition based on payment of a fee, or provision of apassword or other information, the service provider permits access to the stored material in significant part only to users of its system or network that have been so authorized and only in accordance with those conditions; and (8) if the person described in paragraph (1) makes that material available online without the authorization of the copyright owner, then the service provider responds expeditiously to remove, or disable access to, the material that is claimed to be infringing upon notification of claimed infringements described in subsection (c)(3): Provided further, That the material has previously been removed from the originating site, and the party giving the notification includes in the notification a statement confirming that such material has been removed or access to it has been disabled or ordered to be removed or have access disabled. (c) Information Stored on Service Providers.-- (1) In general.--A service provider shall not be liable for monetary relief, or except as provided in subsection (i) for injunctive or other equitable relief, for infringement for the storage at the direction of a user of material that resides on a system or network controlled or operated by or for the service provider, if the service provider-- (A)(i) does not have actual knowledge that the material or activity is infringing, (ii) in the absence of such actual knowledge, is not aware of facts or circumstances from which infringing activity is apparent, or (iii) if upon obtaining such knowledge or awareness, the service provider acts expeditiously to remove or disable access to, the material; (B) does not receive a financial benefit directly attributable to the infringing activity, where the service provider has the right and ability to control such activity; and (C) in the instance of a notification of claimed infringement as described in paragraph (3), responds expeditiously to remove, or disable access to, the material that is claimed to be infringing or to be the subject of infringing activity. (2) Designated agent.--The limitations on liability established in this subsection apply only if the service provider has designated an agent to receive notifications of claimed infringement described in paragraph (3), by substantially making the name, address, phone number, electronic mail address of such agent, and other contact information deemed appropriate by the Register of Copyrights, available through its service, including on its website, and by providing such information to the Copyright Office. The Register of Copyrights shall maintain a current directory of agents available to the public for inspection, including through the Internet, in both electronic and hard copy formats. (3) Elements of notification.-- (A) To be effective under this subsection, a notification of claimed infringement means any written communication provided to the service provider's designated agent that includes substantially the following-- (i) a physical or electronic signature of a person authorized to act on behalf of the owner of an exclusive right that is allegedly infringed; (ii) identification of the copyrighted work claimed to have been infringed, or, if multiple such works at a single online site are covered by a single notification, a representative list of such works at that site; (iii) identification of the material that is claimed to be infringing or to be the subject of infringing activity that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit the service provider to locate the material; (iv) information reasonably sufficient to permit the service provider to contact the complaining party, such as an address, telephone number, and, if available an electronic mail address at which the complaining party may be contacted; (v) a statement that the complaining party has a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, or its agent, or the law; and (vi) a statement that the information in the notification is accurate, and under penalty of perjury, that the complaining party has the authority to enforce the owner's rights that are claimed to be infringed. (B) A notification from the copyright owner or from a person authorized to act on behalf of the copyright owner that fails substantially to conform to the provisions of paragraph (3)(A) shall not be considered under paragraph (1)(A) in determining whether a service provider has actual knowledge or is aware of facts or circumstances from which infringing activity is apparent: Provided, That the provider promptly attempts to contact the complaining party or takes other reasonable steps to assist in the receipt of notice under paragraph (3)(A) when the notice is provided to the service provider's designated agent and substantially satisfies the provisions of paragraphs (3)(A) (ii), (iii), and (iv). (d) Information Location Tools.--A service provider shall not be liable for monetary relief, or except as provided in subsection (i) for injunctive or other equitable relief, for infringement for the provider referring or linking users to an online location containing infringing material or activity by using information location tools, including a directory, index, reference, pointer or hypertext link, if the provider-- (1) does not have actual knowledge that the material or activity is infringing or, in the absence of such actual knowledge, is not aware of facts or circumstances from which infringing activity is apparent; (2) does not receive a financial benefit directly attributable to the infringing activity, where the service provider has the right and ability to control such activity; and (3) responds expeditiously to remove or disable the reference or link upon notification of claimed infringement as described in subsection (c)(3): Provided, That for the purposes of thisparagraph, the element in subsection (c)(3)(A)(iii) shall be identification of the reference or link, to material or activity claimed to be infringing, that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit the service provider to locate such reference or link. (e) Misrepresentations.--Any person who knowingly materially misrepresents under this section-- (1) that material or activity is infringing, or (2) that material or activity was removed or disabled by mistake or misidentification, shall be liable for any damages, including costs and attorneys' fees, incurred by the alleged infringer, by any copyright owner or copyright owner's authorized licensee, or by the service provider, who is injured by such misrepresentation, as the result of the service provider relying upon such misrepresentation in removing or disabling access to the material or activity claimed to be infringing, or in replacing the removed material or ceasing to disable access to it. (f) Replacement of Removed or Disabled Material and Limitation on Other Liability.-- (1) Subject to paragraph (2) of this subsection, a service provider shall not be liable to any person for any claim based on the service provider's good faith disabling of access to, or removal of, material or activity claimed to be infringing or based on facts or circumstances from which infringing activity is apparent, regardless of whether the material or activity is ultimately determined to be infringing. (2) Paragraph (1) of this subsection shall not apply with respect to material residing at the direction of a subscriber of the service provider on a system or network controlled or operated by or for the service provider that is removed, or to which access is disabled by the service provider pursuant to a notice provided under subsection (c)(1)(C), unless the service provider-- (A) takes reasonable steps promptly to notify the subscriber that it has removed or disabled access to the material; (B) upon receipt of a counter notice as described in paragraph (3), promptly provides the person who provided the notice under subsection (c)(1)(C) with a copy of the counter notice, and informs such person that it will replace the removed material or cease disabling access to it in ten business days; and (C) replaces the removed material and ceases disabling access to it not less than 10, nor more than 14, business days following receipt of the counter notice, unless its designated agent first receives notice from the person who submitted the notification under subsection (c)(1)(C) that such person has filed an action seeking a court order to restrain the subscriber from engaging in infringing activity relating to the material on the service provider's system or network. (3) To be effective under this subsection, a counter notification means any written communication provided to the service provider's designated agent that includes substantially the following: (A) A physical or electronic signature of the subscriber. (B) Identification of the material that has been removed or to which access has been disabled and the location at which such material appeared before it was removed or access was disabled. (C) A statement under penalty of perjury that the subscriber has a good faith belief that the material was removed or disabled as a result of mistake or misidentification of the material to be removed or disabled. (D) The subscriber's name, address and telephone number, and a statement that the subscriber consents to the jurisdiction of Federal Court for the judicial district in which the address is located, or if the subscriber's address is outside of the United States, for any judicial district in which the service provider may be found, and that the subscriber will accept service of process from the person who provided notice under subsection (c)(1)(C) or agent of such person. (4) A service provider's compliance with paragraph (2) shall not subject the service provider to liability for copyright infringement with respect to the material identified in the notice provided under subsection (c)(1)(C). (g) Identification of Direct Infringer.--The copyright owner or a person authorized to act on the owner's behalf may request an order for release of identification of an alleged infringer by filing-- (1) a copy of a notification described in subsection (c)(3)(A), including a proposed order, and (2) a sworn declaration that the purpose of the order is to obtain the identity of an alleged infringer and that such information will only be used for the purpose of this title, with the clerk of any United States district court. The order shall authorize and order the service provider receiving the notification to disclose expeditiously to the copyright owner or person authorized by the copyright owner information sufficient to identify the alleged direct infringer of the material described in the notification to the extent such information is available to the service provider. The order shall be expeditiously issued if the accompanying notification satisfies the provisions of subsection (c)(3)(A) and the accompanying declaration is properly executed. Upon receipt of the order, either accompanying or subsequent to the receipt of a notification described in subsection (c)(3)(A), a service provider shall expeditiously give to the copyright owner or person authorized by the copyright owner the information required by the order, notwithstanding any other provision of law and regardless of whether the service provider responds to the notification. (h) Conditions for Eligibility.-- (1) Accommodation of technology.--The limitations on liability established by this section shall apply only if the service provider-- (A) has adopted and reasonably implemented, and informs subscribers of the service of, a policy for the termination of subscribers of the service who are repeat infringers; and (B) accommodates and does not interfere with standard technical measures as defined in this subsection. (2) Definition.--As used in this section, ``standard technical measures'' are technical measures, used by copyright owners to identify or protect copyrighted works, that-- (A) have been developed pursuant to a broad consensus of copyright owners and service providers in an open, fair, voluntary, multi- industry standards process; (B) are available to any person on reasonable and nondiscriminatory terms; and (C) do not impose substantial costs on service providers or substantial burdens on their systems or networks. (i) Injunctions.--The following rules shall apply in the case of any application for an injunction under section 502 against a service provider that is not subject to monetary remedies by operation of this section. (1) Scope of relief.-- (A) With respect to conduct other than that which qualifies for the limitation on remedies as set forth in subsection (a), the court may only grant injunctive relief with respect to a service provider in one or more of the following forms-- (i) an order restraining it from providing access to infringing material or activity residing at a particular online site on the provider's system or network; (ii) an order restraining it from providing access to an identified subscriber of the service provider's system or network who is engaging in infringing activity by terminating the specified accounts of such subscriber; or (iii) such other injunctive remedies as the court may consider necessary to prevent or restrain infringement of specified copyrighted material at a particular online location: Provided, That such remedies are the least burdensome to the service provider that are comparably effective for that purpose. (B) If the service provider qualifies for the limitation on remedies described in subsection (a), the court may only grant injunctive relief in one or both of the following forms-- (i) an order restraining it from providing access to an identified subscriber of the service provider's system or network who is using the provider's service to engage in infringing activity by terminating the specified accounts of such subscriber; or (ii) an order restraining it from providing access, by taking specified reasonable steps to block access, to a specific, identified, foreign online location. (2) Considerations.--The court, in considering the relevant criteria for injunctive relief under applicable law, shall consider-- (A) whether such an injunction, either alone or in combination with other such injunctions issued against the same service provider under this subsection, would significantly burden either the provider or the operation of the provider's system or network; (B) the magnitude of the harm likely to be suffered by the copyright owner in the digital network environment if steps are not taken to prevent or restrain the infringement; (C) whether implementation of such an injunction would be technically feasible and effective, and would not interfere with access to noninfringing material at other online locations; and (D) whether other less burdensome and comparably effective means of preventing or restraining access to the infringing material are available. (3) Notice and ex parte orders.--Injunctive relief under this subsection shall not be available without notice to the service provider and an opportunity for such provider to appear, except for orders ensuring the preservation of evidence or other orders having no material adverse effect on the operation of the service provider's communications network. (j) Definitions.-- (1)(A) As used in subsection (a), the term ``service provider'' means an entity offering the transmission, routing or providing of connections for digital online communications, between or among points specified by a user, of material of the user's choosing, without modification to the content of the material as sent or received. (B) As used in any other subsection of this section, the term ``service provider'' means a provider of online services or network access, or the operator of facilities therefor, and includes an entity described in the preceding paragraph of this subsection. (2) As used in this section, the term ``monetary relief'' means damages, costs, attorneys' fees, and any other form of monetary payment. (k) Other Defenses Not Affected.--The failure of a service provider's conduct to qualify for limitation of liability under this section shall not bear adversely upon the consideration of a defense by the service provider that the service provider's conduct is not infringing under this title or any other defense. (l) Protection of Privacy.--Nothing in this section shall be construed to condition the applicability of subsections (a) through (d) on-- (1) a service provider monitoring its service or affirmatively seeking facts indicating infringing activity except to the extent consistent with a standard technical measure complying with the provisions of subsection (h); or (2) a service provider accessing, removing, or disabling access to material where such conduct is prohibited by law. (m) Rule of Construction.--Subsections (a), (b), (c), and (d) are intended to describe separate and distinct functions for purposes of analysis under this section. Whether a service provider qualifies for the limitation on liability in any one such subsection shall be based solely on the criteria in each such subsection and shall not affect a determination of whether such service provider qualifies for the limitations on liability under any other such subsection. * * * * * * * ADDITIONAL VIEWS OF SCOTT KLUG AND RICK BOUCHER Although we support the House Commerce Committee's changes and improvements to H.R. 2281, the Digital Millennium Copyright Act of 1998, we remain troubled by the implications of this legislation. In its original version, H.R. 2281 contained a provision that would have made it unlawful to circumvent technological protection measures that effectively control access to a work, for any reason. In other words, the bill, if passed unchanged, would have given copyright owners the legislative muscle to ``lock up'' their works in perpetuity--unless each and every one of us separately negotiated for access. In short, this provision converted an unobstructed marketplace that tolerates ``free'' access in some circumstances to a ``pay-per-access'' system, no exceptions permitted. In our opinion, this not only stands copyright law on its head, it makes a mockery of our Constitution. Article I, Section 8, Clause 8 is very clear in its directive: ``The Congress shall have Power * * * To Promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writing and Discoveries.'' (emphasis added). Congress has limited these rights both in terms of scope and duration. In interpreting the Copyright Clause, the Supreme Court has said: The monopoly privileges that Congress may authorize are neither unlimited nor primarily designed to provide special private benefit. Rather, the limited grant is a means by which an important public purpose may be achieved. It is intended to motivate the creative activity of authors and inventors by the provision of a special reward, and to allow the public access to the products of their genius after the limited period of exclusive control has expired. The copyright law, like the patent statutes, makes reward to the owner a secondary consideration. Sony Corporation v. Universal City Studios, Inc., 464 U.S. 417, 429 (1984) (emphasis added). The anti-circumvention language of H.R. 2281, even as amended, bootstraps the limited monopoly into a perpetual right. It also fundamentally alters the balance that has been carefully struck in 200 years of copyright case law, by making the private incentive of content owners the paramount consideration--at the expense of research, scholarship, education, literary or political commentary, indeed, the future viability of information in the public domain. In so doing, this legislation goes well beyond the rights contemplated for copyright owners in the Constitution. The Klug amendment, representing a compromise between those on the content side and ``fair use'' proponents, simply delays this constitutional problem for a period of two years. Delegating authority to develop anti-circumvention regulations to the Secretary of Commerce was a means to eliminate the stalemate that existed, but it is not, by itself a comment on the need for limitations on this anti-circumvention rights. It also strikes us that Congress is not acting prudently by passing a law guaranteed to create lifetime employment for attorneys and copyright specialists, given the constitutional and definitional problems already identified. What we set out to do was to restore some balance in the discussion and to place private incentive in its proper context. We had proposed to do this by legislating an equivalent fair use defense for the new right to control access. For reasons not clear to us, and despite the WIPO Treaty language ``recognizing the need to maintain a balance between the rights of authors and the larger public interest, particularly education, research and access to information * * *,'' our proposal was met with strenuous objection. It continued to be criticized even after it had been redrafted, and extensively tailored, in response to the myriad of piracy concerns that were raised. The compromise amendment that Representative Klug ultimately offered at full committee is silent on the applicability of traditional copyright limitations and defenses, though it does give ``information users'' the ability to argue that the application of technological protection measures adversely impacts their ability to access information. This diminution in availability includes both access under license terms and traditional free access to information. Our expectation is that the rulemaking will also focus on the extent to which exceptions and limitations to this prohibition are appropriate and necessary to maintain balance in our copyright laws. In view of this legislation's overwhelming attention to the regulation of devices in other contexts, it should be clearly understood that the Section 102(a)(1) amendment addresses conduct only and does not delegate to the Secretary of Commerce the power to regulate the design of devices. Moreover, the bill, by its terms (like the WIPO treaties), covers only those measures that are ``effective.'' Pursuant to this limitation, an amendment we offered which was adopted at subcommittee clarified that device and component designers and manufacturers are not under any legal obligation to respond to or to accommodate any particular technological protection measure. Without such clarification, the bill could have been construed as governing not only those technological protection measures that are already ``effective'', such as those based on encryption, but also those that might conceivably be made ``effective'' through enactment of the legislation. This result would be a far cry from governing ``circumvention.'' For similar reasons, it was clearly understood in the full committee consideration that a measure is not ``effective'', and consequently not covered by this bill, to the extent that protecting the measure against circumvention would cause degradation of the otherwise lawful performance of a device or authorized display of a work. In the end, this legislation purports to protect creators. It may well be that additional protections are necessary, though we think the 1976 Copyright Act is sufficiently flexible to deal with changing technology. Whatever protections Congress grants should not be wielded as a club to thwart consumer demand for innovative products, consumer demand for access to information, consumer demand for tools to exercise their lawful rights, and consumer expectations that the people and expertise will exist to service these products. Scott Klug. Rick Boucher.