MCGIP, LLC v. Does 1-1,164, No. 10-7675 (N.D.Ill., filed December 2, 2010) [Download Complaint]
Filing of copyright infringement complaint will be precursor to more subpoenas seeking to identify unknown file-sharing defendants.
Another porn company has filed a copyright lawsuit against hundreds of anonymous John Doe defendants who allegedly used the Bittorrent protocol to trade plaintiffs’ copyrighted movies. So ISPs around the country should expect another wave of subpoenas sent to unmask these unknown file sharers. The works allegedly infringed in this case include provocative titles such as “Girlfriend Lost a Bet” and “Iraq Care Package.”
Interestingly, this complaint — unlike the complaints in similar Bittorrent porn copyright cases — contains a paragraph that tries to explain why over a thousand defendants should be joined in one lawsuit:
Joinder is appropriate because, on information and belief, each Defendant was contemporaneously engaged in a coordinated effort with the other Defendants to reproduce and distribute Plaintiff’s copyrighted works to each other and hundreds of third parties via the BitTorrent protocol.
This language appears to be an attempt to head-off arguments like those made by EFF and others in some of the other massive copyright infringement actions against scores of anonymous defendants.
Tanya Andersen has waged a years-long battle against the record companies after she was sued for copyright infringement for trading music files via a peer-to-peer network. She sued the RIAA and several record companies over a number of claims, including one for negligence, saying that the plaintiffs in the copyright case were negligent by “prosecuting sham litigation against” her and by failing to properly investigate the name of a pseudonymous file sharer.
The RIAA defendants moved for summary judgment on the negligence claim. The court granted the motion.
The court held that Oregon law (under which the negligence claim was brought) does not provide for the type of damages Andersen was seeking. She had claimed damages from emotional distress and physical ailments stemming from defendants’ alleged negligence.
Oregon’s “impact rule,” requires a “physical touching” for there to be emotional distress damages in cases like this. In this case, the actions of the plaintiffs that gave rise to Andersen’s alleged harm were the aggressive and otherwise objectionable tactics in pursuing the copyright litigation. Absent evidence of the required physical impact, her negligence claim failed.
Well this is interesting. One of the bittorrent copyright defendants who has been victimized targeted by the law firm of Dunlap, Grubb & Weaver, a/k/a the US Copyright Group, has filed a class action lawsuit against the law firm. The complaint [download], filed yesterday (November 24), is 96 pages long, includes 456 paragraphs of allegations, and contains 25 claims for relief. The claims include extortion under the Hobbs Act, common law extortion, conspiracy, violation of the Computer Fraud and Abuse Act, and a slew of fraud claims. Mounting a defense to this gargantuan effort is certainly going to cut into the profit margin that the US Copyright Group should expect from its dubious business model.
Greenberg Smoked Turkeys, Inc. v. Goode-Cook, Inc., No. 10-621, (Complaint filed November 23, 2010, E.D. Texas) [Download the Complaint]
Happy Thanksgiving. I’m grateful for your continued support and interest in Internet Cases. It truly is a pleasure to write these posts and to get your feedback and engagement. And it’s also a pleasure to bring you news of this ultra-timely new copyright lawsuit.
Greenberg Smoked Turkeys, as you might expect, sells turkeys. Since 1987 it has distributed these turkeys with some simple instructions, comprised of three short paragraphs. You can read these instructions which are embedded in the complaint. It posted these instructions on its website in 2003.
Some time thereafter, Greenberg alleges, its turkey selling competitor copied the instructions and began using the instructions on its own website. Thus this lawsuit.
Infringement claims over instructions can be a tricky endeavor. In copyright law, there’s something called the “merger doctrine.” This relates to the idea-expression dichotomy: ideas are not copyrightable but their expression is. Simple instructions or directions may not pass this threshold: in their simplicity, they may be expressing something in the only possible way. That kind of expression does not rise to the level of copyrightability.
Objection 1: Firesheep claims that its purpose is to demonstrate security vulnerabilities and is not intended for nefarious purposes. Would not what it does be illegal otherwise? If it complained about others using its code for similar purposes, would that not illustrate that its objective is other than educational and at that point it would then be breaking the law?
Objection 2: Firesheep has put its code out there and others should be able to use it as they see fit, especially to protect themselves from how the Firesheep code may be used. Further, all Blacksheep does is provide the tool. It is the individuals using it who are the infringers. Blacksheep should be left out of the equation.
On the contrary, if by “leveraging” Firesheep’s code, Blacksheep causes a copy of the Firesheep code to be made, this copying, if unauthorized by Firesheep, would seem to constitue an infringement.
I answer that, Blacksheep markets its product for the very purpose of combatting Firesheep, so one may find that Blacksheep has distributed such “device” with the object of promoting its use to infringe copyright, as shown by its clear expression to foster infringement. As such, Blacksheep could be contributorily liable for the conduct of its users.
Reply to Objection 1: One’s characterization of his own purpose does not ultimately determine whether that purpose is legal. Consider the law’s unwillingness to exhonerate a person accused of inflicting a black eye based on the defense that the assault was to study of the biological origins of bruising. But just below the surface here is the sentiment of the “unclean hands” doctrine. A court will not award relief to a party who comes to court with “unclean hands.” It may seem unfair for Firesheep to be so exploitative of others (privacy rights) and at the same time complain that others are being exploitative of its copyright rights.
Reply to Objection 2: The stated purpose of education or furtherance of the public interest, should not preclude Firesheep from claiming copyright in its code. Consider that no reasonable person will deny public television stations’ claim of copyright on their programming. One would infringe by posting NOVA to YouTube.
Design Furnishings, Inc. v. Zen Path LLC, No. 10-2765, 2010 WL 4321568 (E.D. Cal. October 21, 2010)
Decision shows court’s willingness to crack down on overreaching rights holders and abusive DMCA takedown practices.
Plaintiff and defendant both sell wicker furniture on eBay. Defendant sent 63 notices to eBay complaining that plaintiffs auctions infringed on defendant’s purported copyright in the furniture.
So plaintiff filed a lawsuit over the barrage of DMCA takedown notices, claiming, among other things, that defendant violated 17 U.S.C. 512(f) by knowingly and materially misrepresenting that plaintiff’s eBay auctions contained infringing material. Plaintiff asked the court to grant a temporary restraining order (TRO), stopping defendant from sending the notices to eBay. The court granted the motion.
The court found that plaintiff would likely succeed on its Section 512(f) claim because of the strong inference that defendant knew it did not have a valid copyright claim. On this point, the court found that the defendant appeared to be claiming copyright protection in the industrial design of the wicker furniture. But the Copyright Act excludes “useful articles” from the scope of copyright protection.
The court also found plaintiff might suffer irreparable harm if defendant were permitted to keep sending the bogus DMCA takedown notices. If eBay were to suspend plaintiff’s account, plaintiff might lose prospective customers and goodwill. This sort of harm was intangible and not capable of measurement. Because of the risk of harm, the court also found that the balance of equities tipped in plaintiff’s favor.
Finally, the court found that the TRO would serve the public interest. On this point the court made the intriguing observation that eBay’s policies of taking down content upon the mere allegations of infringement reverses the ordinary burden of proof in copyright infringement matters. The court granted the TRO to prevent defendant from “effectively shut[ting] down a competitor’s business on eBay simply by filing the notice that the seller’s product allegedly infringes on the complaining party’s copyright.”
“Performance” under Copyright Act requires “contemporaneous perceptibility”.
U.S. v. ASCAP, — F.3d —, No. 09-539 (2d Cir. September 28, 2010).
Yahoo and RealNetworks commenced a proceeding to determine the rate of a “blanket license” they would pay to ASCAP to perform musical works over the internet (e.g., through streaming services). (As an aside, such actions are brought in the U.S. District Court for the Southern District of New York pursuant to an antitrust consent order entered way back in the 1940′s.)
ASCAP wanted as big a piece of the pie as possible and argued that it should be paid royalties for songs that are downloaded. Remember, ASCAP only collects fees for the public performance (not the distribution or copying) of musical works. So it asked the court to find that each time a user downloads a file, that should be treated as a performance, and thus ASCAP should be entitled to payment.
The district court disagreed that a download is a performance as defined by the Copyright Act. ASCAP sought review with the Second Circuit. On appeal the court affirmed, agreeing that a download is not a performance.
The analysis is straightforward: The Copyright Act grants copyright owners the right, among other things, to perform the copyrighted work publicly. Under the Copyright Act, to “‘perform’ a work means to recite, render, play, dance, or act it, either directly or by means of any device or process.” Since a download plainly is neither a “dance” nor an “act,” the court had to determine whether a download of a musical work fell within the meaning of the terms “recite,” “render,” or “play.”
The court looked to dictionary definitions of the terms “recite,” “render” and “play” to observe that all three actions entail contemporaneous perceptibility. It found that music is neither recited, rendered, nor played when a recording (electronic or otherwise) is simply delivered to a potential listener.
In more detail, the court said that:
[music downloads] are simply transfers of electronic files containing digital copies from an on-line server to a local hard drive. The downloaded songs are not performed in any perceptible manner during the transfers; the user must take some further action to play the songs after they are downloaded. Because the electronic download itself involves no recitation, rendering, or playing of the musical work encoded in the digital transmission, we hold that such a download is not a performance of that work, as defined by [the Copyright Act].
So ASCAP’s piece of the pie was not as big as it wanted.
State v. Boyd, 2010 WL 3565414 (Ohio App. 1 Dist. September 15, 2010)
Defendant was convicted under Ohio state criminal law for selling pirated DVD movies on a street corner. This apparently was the first ever prosecution under a law — a “record pirating statute” — enacted in 1976 (which was two years before the Copyright Act took effect). Defendant sought review of his conviction with the state appellate court. On appeal, the court reversed the conviction.
The court held that the state record pirating statute (R.C. 1333.52) was preempted by Section 301 of the Copyright Act (17 U.S.C. 301).
It was not clear which subsection of the record pirating statute defendant had been accused of violating. The statute provides:
No person shall purposely do either of the following: (1) Transcribe, without the consent of the owner, any sounds recorded on a phonograph record, disc, wire, tape, film, or other article on which sounds are recorded, with intent to sell or use for profit through public performance any product derived from the transcription. . . .
No person shall purposely manufacture, sell, or distribute for profit any phonograph record, tape, or album of phonographic records or tapes unless the record and the outside cover, box, or jacket of the record, tape, or album clearly and conspicuously discloses the name and street address of the manufacturer of the record, tape, or album, and the name of the performer or group whose performance is recorded. . . .
The Copyright Act expressly preempts certain state-law actions. Section 301 states that all legal or equitable rights that are equivalent to any of the exclusive rights conferred by the Copyright Act and that come within the subject matter of copyright . . . are governed exclusively by the Copyright Act.
In this case, there was no dispute that the movies were within the subject matter of federal copyright law. The more detailed analysis came in examining the question of whether the work was governed exclusively by the Copyright Act. That inquiry looks to see whether there is a qualitatively different “extra element” in the state law claim beyond what is required to show copyright infringement.
The court looked to two similar Ohio cases in which defendants had engaged in similar conduct. In State v. Perry, the Ohio supreme court found that the statute supporting the prosecution for “unauthorized use of property” by uploading and downloading computer software to an internet bulletin board service was preempted. In State v. Moning, the court held that a computer crime statute that prohibited the unauthorized access to data in a database was not preempted. The unauthorized access provided the extra element in that case.
West Bay One v. Does 1 – 1,653, — F.Supp.2d. —, 2010 WL 3522265 (D.D.C. September 10, 2010)
Achte/Neunte Boll Kino Beteiligungs v. Does 1 – 4,577, — F.Supp.2d —, 2010 WL 3522256 (D.D.C. September 10, 2010)
In mass copyright infringement cases against alleged traders of copyrighted movies via Bittorrent, unknown defendants had no reasonable expectation of privacy in their subscriber information held by internet service provider.
Several unknown “Doe” defendants who were sued for copyright infringement for trading movies via Bittorrent moved to quash the subpoenas that the plaintiff copyright owners served on the defendants’ internet service providers.
The subpoenas sought subscriber information such as the defendants’ names, addresses and MAC addresses, so that they could be named as defendants in the copyright litigation.
Defendants moved to quash the subpoenas, arguing that their subscriber information was private information that should not be disclosed pursuant to a Rule 45 subpoena. The court denied the motions and ordered the subscriber information produced.
The court held that the defendants did not have a reasonable expectation of privacy in their subscriber information held by the internet service providers. It cited to a number of cases that supported this holding, each of which had found that a person loses his or her expectation of privacy in information when that information is disclosed to a third party. See Guest v. Leis (6th Cir.), U.S. v. Hambrick (4th Cir.), and U.S. v. Kennedy (D. Kan.).
In footnotes, the court also addressed the potential First Amendment rights that the defendants would have to engage in anonymous file sharing. It quickly dispensed with any notion that such activities were protected in this case, as the pleadings on file set forth a prima facie case of infringement. “[C]ourts have routinely held that a defendant’s First Amendment privacy interests are exceedingly small where the ‘speech’ is the alleged infringement of copyrights.”
Let’s set aside for a moment any objections or snickering we might have about Righthaven’s approach, or any disdain we may feel about spamigation in general. There’s one paragraph in the Angle complaint which demonstrates a plaintiff mindset that is over the top on just about any reasonable scale.
In addition to the ususal demands for copyright infringement relief in the complaint (e.g., statutory damages, costs, attorney’s fees, injunction, etc.), Righthaven asks that the court:
[d]irect the current domain name registrar, Namesecure, and any successor domain name registrar for the Domain to lock the Domain and transfer control of the Domain to Righthaven.
This is a copyright lawsuit, not one for trademark infringement or cybersquatting. Nothing in the Copyright Act provides the transfer of a domain name as a remedy. Such an order would be tantamount to handing the whole website over to Righthaven just because there may have been a couple of infringing items.
The Copyright Act does provide for the impounding and disposition of infringing articles (See 17 USC 503). So it’s plausible that a court would award the deletion of the actual alleged infringing articles. Or if it wanted to be weirdly and anachronistically quaint about it, could order that the infringing files on the server be removed and somehow destroyed in a way additional to just being deleted. In any event, there’s no basis for a court to order the transfer of a domain name as a result of copyright infringement.
I’ll let you, the reader, decide what you will about Righthaven. But if you decide that their tactics are silly, and in some cases uncalled-for, you won’t be alone.