OUTLINE OF U.S. COPYRIGHT LAW
BY DOUGLAS J. MASSON
I. HISTORY

            A. England

            Copyright law is a creation of the print era.[1] Before Gutenberg invented the printing press around 1430, there was no need for copyright laws because copying was prohibitively difficult and, without a practical means of mass production, there was no economic interest which might have encouraged legal protection.[2] Furthermore, literature was held to be part of a commonfund of knowledge.[3]

            After the introduction of the printing press in England in 1476, but before the enactment of the Statute of Anne[4] (the first "modern" Anglo-Saxon copyright law) in 1709, licensing acts performed the function of copyright law. The Charter of the Stationers' Company was granted in 1556 by Philip and Mary, the Roman Catholic successors to Henry VIII's Protestant son, Edward VI. The Charter authorized the stationers to make "ordinances, provisions, and statutes" for "the art or mistery of [s]tationery," as well as the power to search out illegal presses and books and things, allowing them to "[seize, take, or burn] the foresaid books or things, or any of them printed or to be printed contrary to the form of any statute, act, or proclamation . . . ."[5] These licensing acts served as a form of political censorship and trade regulation. The monarchy used a guild, a medieval economic institution, as an instrument, to censor the heresy and sedition made possible by the printing press.[6]

            In 1709, the Statute of Anne was enacted and copyright law became less a tool of the state and more a tool of authors and publishers.[7] Such a development reflected both an increasing respect for the rights of the authors as well as the growing economic opportunity of authors' creations.[8] It also specified that the time for which authors hold their copyrights are limited and specified by its title, Act for the Encouragement of Learning, that a well-informed public was an underlying motivation for copyright.[9] 

            B. United States

            The authority of Congress to pass copyright laws is grounded in Article I, Section 8, Clause 8 of the U. S. Constitution which says, "The Congress shall have Power . . . To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries."[10]  Congress exercised this authority soon after the adoption of the Constitution by enacting the Copyright Act of 1790, entitled “an act for the encouragement of learning, by securing the copies of maps, charts and books, to the authors and proprietors of such copies, during the times therein mentioned."[11] In 1790, the basic term of protection was 14 years from the date of filing, with the possibility of renewal for an additional 14 years.[12] Copyright laws were also passed in 1831 and 1909 before its last major revision was adopted in the form of the Copyright Act of 1976 ("Copyright Act").[13]

            The balance between author's rights and the public dissemination of  creative works struck in the Statute of Anne was transplanted to the U.S. in the Copyright Acts. In addition to allowing works to pass into the public domain after a certain period of time, public dissemination was further encouraged through the doctrine of fair use. The fair use exception to an authorís copyrights, which allows use of a work that would otherwise be a copyright violation based on "nature and objects of selections made, the quantity and value of the materials used, and the degree in which the use may prejudice the sale or diminish the profits, or supersede the objects, of the original work." was incorporated into U.S. law most prominently by the case of Folsom v. Marsh[14] in which the owners of some of George Washington's private letters objected to the use of those letters in the creation of a fictionalized biography of the President.

         II. CURRENT COPYRIGHT LAW

            A. General

            The federal copyright act specifies that copyright law in the United States is governed solely by the copyright act, thereby preempting attempts to govern copyright through any other law.[15] The act specifies that the common law and state law are prohibited from granting rights that fall within the scope of federal copyright.[16] State law is, therefore, preempted from granting alternate or additional rights concerning an original work of authorship fixed in a tangible medium of expression where that alternate or additional right would be "equivalent" to that provided by copyright.[17] 

            Protection of U.S. Copyright law is broad, extending to all unpublished works regardless of where or by whom they are created, works that are first published by an author who is a citizen of or resides in the United States, works that are first published in the United States, and works that are first published by an author who is a citizen of or residing in a nation that is party to a copyright treaty to which the United States is also a party.[18]

            "Copyright protection subsists . . . in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device."[19] Works of authorship include literary works; musical works, including any accompanying words; dramatic works, including any accompanying music; pantomimes and choreographic works; pictorial, graphic, and sculptural works; motion pictures and other audiovisual works; and sound recordings.[20]

            B. Requirements for protection

            There are three requirements for copyright protection: originality, creativity, and fixation. The originality requirement mandates that the work be an independent creation, meaning simply that it cannot have been copied.[21] "Original, as the term is used in copyright, means only that the work was independently created by the author (as opposed to copied from other works), and that it possesses at least some minimal degree of creativity."[22] This standard is much less rigorous than that of patent law which requires not only that there be an independent creation but that it also be novel, not known or practiced previously.[23]In theory, under copyright law, if an independently created work happened to be an exact duplicate of a previously existing work, the new work would not constitute an infringement.[24]

            To satisfy the creativity requirement a work need only have a de minimis amount of creativity.[25] Courts have found sufficient originality in such banal creations as the label on a box of cake which simply depicts pictures of cakes.[26] Though the creativity standard is very low, there are still limits on what will fulfill the requirement. For example, originality was not found to exist in fragmentary words or phrases.[27]

            In Feist v. Rural Telephone, a case involving the question of whether Rural Telephone's telephone directory was entitled to copyright protection, the Supreme Court held that the facts in the directory, the names and telephone numbers, were not created by Rural and therefore did not satisfy the originality requirement. The Court further held that "the way in which Rural selected, coordinated, and arranged those facts is not original in any way. Rural's selection of listings - subscribers' names, towns, and telephone numbers - could not be more obvious, and lacks the modicum of creativity necessary to transform mere selection into copyrightable expression. In fact, it is plausible to conclude that Rural did not truly "select" to publish its subscribers' names and telephone numbers, since it was required to do so by state law. Moreover, there is nothing remotely creative about arranging names alphabetically in a white pages directory. It is an age-old practice, firmly rooted in tradition and so commonplace that it has come to be expected as a matter of course."[28]

            Finally, the fixation requirement is similarly broad in that it allows for fixation even in media not yet developed. "[I]t makes no difference what the form, manner, or medium of fixation may be--whether it is in words, numbers, notes, sounds, pictures, or any other graphic or symbolic indicia, whether embodied in a physical object in written, printed, photographic, sculptural, punched, magnetic, or any other stable form, and whether it is capable of perception directly or by means of any machine or device."[29]

            Although the form of fixation is flexible, such things as an extemporaneous speech or a live street performance by a musician is not fixed in a tangible medium and is, therefore, not copyrightable. However, transmission via a broadcast network or the Internet with simultaneous fixation by tape machine or in the RAM or hard-drive of a computer is sufficiently fixed for purposes of copyright protection.[30]

            The fixation requirement was an elegant solution in the era of the printing press for the problem of how to go about protecting something so ephemeral as expression. Instead of having to come to grips with the transitory expression, the law could simply focus on the forms in which the expression was fixed. However, in the digital age, the media in which expression is fixed is becoming more fluid and more difficult to police. As John Perry Barlow wrote, "[s]o far we have placed all of our intellectual [property] protection on the containers and not on the contents. And one of the side effects of digital technology is that it makes those containers irrelevant. Books, CDs, filmstrips--whatever--don't need to exist anymore in order to get ideas out. So whereas we thought we have been in the wine business, suddenly we realized all along we've been in the bottling business."[31]

            Copyright protection arises as soon as the creative, original work of authorship is fixed in a tangible form.

            C. Uncopyrightable Works

            Certain works are not copyrightable. Works produced by federal government officers and employees, federal statutes and rules for example, are not protected.[32] Furthermore, copyright does not extend to an idea, procedure, process, system, method of operation, concept, principle, or discovery, regardless of the form in which it is described, explained, illustrated, or embodied in such work.[33] It is the manner in which the idea is expressed, not the idea itself, which is protected. For example, copyright protection is extended to pictorial, graphic, and sculptural works,[34] but the definition of pictorial, graphic, and sculptural works states that such works "shall include works of artistic craftsmanship insofar as their form but not their mechanical or utilitarian aspects are concerned; the design of a useful article . . . shall be considered a pictorial, graphic, or sculptural work only if, and only to the extent that, such design incorporates pictorial, graphic, or sculptural features that can be identified separately from, and are capable of existing independently of, the utilitarian aspects of the article."[35] So, the design of an ordinary belt buckle is not copyrightable whereas the unique elements of a belt buckle that is novel in some way are copyrightable. The dividing line between utilitarian and original, creative expression is not always an easy one to draw.[36]

            D. Exclusive Rights

            Copyright law grants the owner of a copyright certain exclusive rights.[37] These rights are the right to reproduce the copyrighted work in copies or phonorecords; to prepare derivative works based upon the copyrighted work;  to distribute copies or phonorecords of the copyrighted work to the public by sale or other transfer of ownership, or by rental, lease, or lending; in the case of literary, musical, dramatic, and choreographic works, pantomimes, and motion pictures and other audiovisual works, to perform the copyrighted work publicly; and in the case of literary, musical, dramatic, and choreographic works, pantomimes, and pictorial, graphic, or sculptural works, including the individual images of a motion picture or other audiovisual work, to display the copyrighted work publicly.[38]

            i. Reproduction Right

            The most basic right is the right of reproduction.[39] This right is implicated when a work or a portion of a work is reproduced for more than a "transitory duration" in any tangible medium of expression. Therefore you could reproduce a story by reading it aloud in a private setting (so as not to implicate the public performance right) but not reproduce it in other ways.

            ii. Derivative Works

            The next exclusive right is the right to prepare derivative works, the adaptation right.[40] A derivative work is "a work based upon one or more preexisting works, such as a translation, musical arrangement, dramatization, fictionalization, motion picture version, sound recording, art reproduction, abridgment, condensation, or any other form in which [the underlying] work may be recast, transformed, or adapted."[41] The purpose of the adaptation right is to allow the copyright owner to control more than simply verbatim forms of copying.

            iii. Distribution Right

            The copyright owner has the exclusive right to "distribute copies or phonorecords of the copyrighted work to the public by sale or other transfer of ownership, or by rental, lease, or lending."[42] The distribution prohibits a person from distributing unauthorized copies evenif that distributor did not make the copies himself. It is important to note, however, the "first sale doctrine", codified in 17 U.S.C. 109(a) allows the owner of a particular lawfully made copy of a work to "sell or otherwise dispose of the possession of that copy[.]"[43]

            The distribution right is  an especially important right with regard to the Internet, since the person who distributes a document on the World Wide Web does not necessarily make a copy. In a 1995 case, where an individual put a document copyrighted by the Church of Scientology through a bulletin board system that was provided Internet access by Netcom, the 9th Circuit Court of Appeals held that Netcom had not violated the distribution rights because Netcom's involvement was automated, incidental, and temporary, it was not directly infringing the Scientologists' copyright.[44] In Sega Enterprises, Ltd. v. MAPHIA, a bulletin board operator was found not to be liable for direct infringement of the distribution right for allowing users to upload and download copyrighted Sega video games.[45] These cases suggest it is the person who places the document on the server who is liable for direct infringement of the distribution right.[46]

            iv. Public Performance and Display Rights.

            The copyright owner has the exclusive right to display or perform a work publicly.[47] To perform or display a work "publicly" means-  "to perform or display it at a place open to the public or at any place where a substantial number of persons outside of a normal circle of a family and its social acquaintances is gathered; or, to transmit or otherwise communicate a performance or display of the work to . . . the public, by means of any device or process, whether the members of the public capable of receiving the performance or display receive it in the same place or in separate places and at the same time or at different times."[48]

            E. Infringement

            Copyright infringement can be either direct or indirect. It is worth noting that, contrary to recent rhetoric on the part of certain parties, copyright infringement is quite distinct from theft.[49]

            i. Direct infringement.

            Someone, other than the copyright owner, who engages in activity that is exclusively the right of the copyright owner without the owner's permission is engaging in copyright infringement unless the other person's use fits into one of the limitations on the owner's exclusive rights.[50] In addition to infringement by means of violating one of the exclusive rights set forth in 17 U.S.C. 106, unauthorized importation and distribution of certain works may also constitute infringement.[51]

            ii. Indirect Infringement

            Even if a person is not engaging in direct infringement of copyright, the person can be found to be liable for contributory or vicarious infringement under certain circumstances. "Although the Copyright Act does not expressly impose liability on anyone other than direct infringers, courts have long recognized that in certain circumstances, vicarious or contributory liability will be imposed." [52] It is axiomatic that, in order for one to be liable for indirect infringement, there must be an underlying direct infringement. This was an issue in the Napster case.[53] Napster argued that it did not make any infringing copies itself. It further argued that to the extent its users were making copies of copyrighted works, those users were entitled to do so under the American Home Recording Act of 1992.[54] Specifically, Napster argued, noncommercial sharing of music among individuals is common, legal, accepted, and protected under 17 U.S.C. 1008.[55] The trial court ruled against Napster on this argument, but the question is being appealed at the moment. If Napster's interpretation of the AHRA were deemed correct then even though its service enables copying of copyrighted materials on a large scale, the company would not be liable for indirect infringement for the very simple reason that there is no underlying infringement.

            (a) Vicarious Liability

            The concept of vicarious copyright liability was developed in the Second Circuit as an outgrowth of the agency principles of respondeat superior. The landmark case on vicarious liability for sales of counterfeit recordings is Shapiro Bernstein and Co. v. H. L. Green Co. [56] The doctrine was taken from the so-called "dance hall cases," in which the operator of an entertainment venue was held liable for infringing performances when the operator (1) could control the premises and (2) obtained a direct financial benefit from the audience, who paid to enjoy the infringing performance.[57] The rule was later articulated as being that one may be vicariously liable if he has the right and ability to control the infringing activity and also has a direct financial interest in the activity.[58]  The issue of contributory infringement was raised in the Netcom case.[59] In that case, the court held that there was a question of fact as to whether Netcom, the BBS operator, had the right and ability to control its user's infringing behavior. Despite Netcom's assertion that it did not have the right to control its users' postings before they occur and its assertion that it could not possibly screen messages before they are posted given the speed and volume of the data that goes through its system, the court in that case found there was enough evidence for a finder of fact to conclude Netcom did possess the requisite control due to its user policy which allowed for Netcom to take remedial action against user abuses, due to evidence that Netcom had taken actions to suspend users on over 1,000 occasions for commercial advertising, posting obscene materials, and off-topic postings, and due to evidence that it would be possible for Netcom to screen for certain words or postings from specific users.[60] The court found, however, there was no vicarious infringement by Netcom because there was no direct financial benefit to Netcom because of the infringing activity of its user.[61]

            (b) Contributory Infringement

            Contributory infringement originates in tort law and stems from the notion that one who directly contributes to another's infringement should be held accountable.[62] "[O]ne who, with knowledge of the infringing activity, induces, causes or materially contributes to the infringing conduct of another, may be held liable as a 'contributory' infringer."[63] The issue of contributory infringement was raised in the Netcom case.[64] In that case, the court held that there was a question of fact as to whether Netcom, the BBS operator, knew its customer was infringing the plaintiff's work. The plaintiff sent a letter to Netcom alleging that Netcom's customer was infringing the plaintiff's copyright, but contributory liability could not be established unless the plaintiff could prove that Netcom knew or should of known that its customer's use constituted infringement. Such knowledge will be difficult to prove where there is at least a colorable claim of fair use. "Where a BBS operator cannot reasonably verify a claim of infringement, either because of a possible fair use defense, the lack of copyright notices on the copies, or the copyright holder's failure to provide the necessary documentation to show that there is a likely infringement, the operator's lack of knowledge will be found reasonable and there will be no liability for contributory infringement for allowing the continued distribution of the works on its system."[65]

            Where a defendant has knowledge of the primary infringer's infringing activities, it will be liable if it "induces, causes or materially contributes to the infringing conduct of" the primary infringer.[66] Such participation must be substantial.[67] The court reasoned that providing a service that allowed for the automatic distribution of Usenet postings where such service remained largely under the service provider's control constituted substantial participation. It therefore held, it was fair to hold Netcom liable "assuming Netcom is able to take simple measures to prevent further damage to plaintiffs' copyrighted works … for contributory infringement where Netcom has knowledge of [its customer's] infringing postings yet continues to aid in the accomplishment of [its customer's] purpose of publicly distributing the postings."[68]

            F. Limitations on Exclusive Rights

            The Copyright Act imposes certain limitations on the exclusive rights of the copyright holder, most significantly the fair use limitation, but also limitations such as those involving libraries and archives, the first sale doctrine, performances and public displays by schools, religious organizations, and charitable organizations, archival copies of computer programs, and noncommercial copying of music.

            i. Fair Use.

            The fair use exception is the biggest exception to the copyright protections on a work. "[T]he fair use of a copyrighted work . . . for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright. In determining whether the use made of a work in any particular case is a fair use the factors to be considered shall include (1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; (2) the nature of the copyrighted work; (3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and (4) the effect of the use upon the potential market for or value of the copyrighted work."[69]

            An allegedly infringing use that is commercial is likely to draw the most scrutiny. The effect of a use on the market of the copyrighted work is the most important factor in determining whether the use is fair. That being said, there are no bright line rules to determining what is a fair use and what is not. The determination is to be made on a case by case basis.[70] "The text [of the fair use section of the copyright act] employs the terms "including" and "such as" in the preamble paragraph to indicate the "illustrative and not limitative" function of the examples given, which thus provide only general guidance about the sorts of copying that courts and Congress most commonly had found to be fair uses. Nor may the four statutory factors be treated in isolation, one from another. All are to be explored, and the results weighed together, in light of the purposes of copyright."[71]

            In Harper Row v. Nation Enterprises, the Supreme Court found that Nation Enterprises publication of  1,900 words of a manuscript by former President Gerald Ford did not constitute fair use based on the fact that the copyrighted work was theretofore unpublished, the use was commercial in nature, and the use was essentially competing in the same market as would the original and, therefore, would have a negative impact on the market of the copyrighted work.[72]

            On the other hand, neither commercial use nor extensive copying necessarily dictate against a finding of fair use. In Campbell v. Acuff-Rose Music, 510 U.S. 569 (1994), the Supreme Court found fair use despite extensive copying of Roy Orbison's song Oh, Pretty Woman by 2 Live Crew in their song Pretty Woman.[73]  The 2 Live Crew song took a substantialamount from the original for a commercial purpose, but extensive copying was arguably necessary to accomplish the song's purpose of parodying the orginal and, furthermore, the allegedly infringing use was not likely to have a substantial impact on the market of the original.[74]

            ii. Archival copies

            A library or archives may reproduce no more than one copy of a work if  the reproduction or distribution is made without any purpose of direct or indirect commercial advantage; (2) the collections of the library or archives are open to the public (or available not only to researchers affiliated with the library or archives or with the institution of which it is a part, but also to other persons doing research in a specialized field); and (3) the reproduction or distribution of the work includes a notice of copyright that appears on the copy, or includes a legend stating that the work may be protected by copyright.[75]

            iii. First Sale Doctrine

            Under the First Sale Doctrine, codified in 17 U.S.C. 109, allows the owner of a particular copy to sell that copy without the permission of the copyright owner,[76] to display that copy one image at a time.[77] However, an owner of a copy of a computer program or of a phonorecord may not  lease that copy for direct or indirect commercial advantage.[78] A nonprofit library or educational institution may, however, lend phonorecords.[79] A nonprofit library may, under certain circumstances lend computer programs as well.[80]

            iv. Performances and displays by educational, religious, and nonprofit institutions

            Performance or display of a work by instructors or pupils in the course of face-to-face teaching activities of a nonprofit educational institution or by transmission for educational purposes is not copyright infringement.[81] Nor is  performance of a nondramatic literary or musical work or of a dramatico-musical work of a religious nature, or display of a work, in the course of services at a place of worship or other religious assembly.[82] Under certain circumstances, "performance of a nondramatic literary or musical work otherwise than in a transmission to the public, without any purpose of direct or indirect commercial advantage and without payment of any fee or other compensation for the performance to any of its performers, promoters, or organizers" is permissible.[83] Other exceptions are made for private, home transmissions,[84] transmissions by small businesses,[85] performance of nondramatic musical works by nonprofit horticultural or agricultural organizations,[86] performances by music stores or video stores intended to promote sales of the audio or video products,[87] performances or transmissions designed to aid the handicapped,[88] and certain performances for the benefit of nonprofit veteranís or fraternal organizations.[89]

            v. Archival Copies of Computer Programs

            It is not an infringement for the owner of a copy of a computer program to make or authorize the making of another copy or adaptation of that computer program if (1) the new copy or adaptation is created as an essential step in the use of the computer program in conjunction with a machine, or (2) the new copy or adaptation is for archival purposes only and that all archival copies are destroyed in the event that continued possession of the computer program should cease to be rightful.[90]        

            Any exact copies prepared under this exception may be leased, sold, or otherwise transferred, along with the copy from which such copies were prepared, only as part of the lease, sale, or other transfer of all rights in the program.[91]

            vi. Recording Devices and Noncommercial Copying of Musical Recordings

            17 U.S.C. 1008 is technically a limitation on the ability of a copyright holder to bring suit rather than a limitation on an exclusive right. It provides that "no action may be brought . . . alleging infringement of copyright based on the manufacture, importation, or distribution of a digital audio recording device, a digital audio recording medium, an analog recording device, or an analog recording medium, or based on the noncommercial use by a consumer of such a device or medium for making digital musical recordings or analog musical recordings."[92]

            G. Duration

            Copyright in a work created on or after January 1, 1978, subsists from its creation and, generally, endures for a term consisting of the life of the author and 70 year after the author's death.[93] In the case of a joint work prepared by two or more authors who did not work for hire, the copyright endures for a term consisting of the life of the last surviving author and 70 years after such last surviving author's death.[94] In the case of an anonymous work, a pseudonymous work, or a work made for hire, the copyright endures for a term of 95 years from the year of its first publication, or a term of 120 years from the year of its creation, whichever expires first.[95] After a period of 95 years from the year of first publication of a work, or a period of 120 years from the year of its creation, whichever expires first, a person who obtains a certified report indicating that the records of  the Copyright Office disclose nothing to indicate that the author of the work is living, or died less than 70 years before, is entitled to the benefit of a presumption that the author has been dead for at least 70 years.[96] Copyright in a work created before January 1, 1978, but not theretofore in the public domain or copyrighted, subsists from January 1, 1978, and endures for the term of a copyrighted work created on or after January 1, 1978.[97] A term of copyright runs to the end of the year in which it expires.[98]

            Works created before 1978 were essentially granted a copyright term of 75 years from the date of their creation.[99] The 75 years was extended to 95 years by the Sony Bono Copyright Extension Act.[100] (This has been referred to as a true Mickey Mouse law benefitting as it does the Disney Corporation. The first Mickey Mouse cartoon was set to enter the public domain in 2003, and characters such as Donald Duck and Goofy would have followed shortly after.)[101]

            H. Ownership

            Ownership in copyright is distinct from ownership of any material object in which the work is embodied. Transfer of ownership of copyright does not transfer ownership of any material object and vice versa.[102]

            Copyright in a work vests initially in the author or authors of the work. The authors of a joint work are co-owner of copyright in the work.[103]   A joint work is a "work prepared by two or more authors with the intention that their contributions be merged into inseparable or interdependent parts of a unitary whole".[104] To constitute a joint authorship, each person's contribution must constitute copyrightable authorship (eg creativity, originality, fixation rather than merely contributing ideas).[105] Authors of a joint work hold undivided interests in it, that is partial ownership of the entire copyright, despite any differences in each authorís contribution.[106] Each author of a joint work maintains the right to use or license the work subject only to accounting to the other co-owner.[107]

            However, in the case of a work made for hire, the employer or person for whom the work was prepared is considered to be the author and, unless the parties have explicitly agreed otherwise in a document signed by both parties, the employer or other person owns all of the rights in the work.[108]

            A work made for hire is a work prepared by an employee within the scope of his or her employment.[109] Also included in the definition of "work for hire" are works specially ordered or commissioned: (1) as a contribution to a collective work, (2) as a part of a motion picture or other audiovisual work, (3) as a sound recording, (4) as a translation, (5) as a supplementary work, (6) as a compilation, (7) as an instructional text, (8) as a test, or (9) as an atlas if the parties expressly agree in a written instrument signed by them that the work shall be considered to be a work for hire.[110]

            With regard to a collective work, copyright in each separate contribution is distinct from the copyright in the work as a whole. The copyright in each contribution vests initially in the author of the contribution. In the absence of an express transfer of the copyright or any of the rights under it, the owner of copyright in the collective work is presumed to have acquired only the privilege of reproducing and distributing the contribution as part of that particular collective work.[111]  

            A transfer in copyright ownership, other than by operation of law, is not valid unless it is done by means of a writing signed by the owner of the rights conveyed.[112] The writing requirement applies to transfers of exclusive rights but not to nonexclusive rights.[113]

            A transfer of ownership recorded with the Copyright Office gives all persons constructive notice of the transfer. If there are two conflicting transfers, the one executed first prevails regardless of the order in which the transfers were recorded with the Copyright Office if the first transfer is recorded within two months of the transfer. If the first is recorded more than two months after the transfer, the first still prevails unless the second transfer is recorded first and was taken in good faith for valuable consideration without knowledge of the earlier transfer.[114] A nonexclusive license prevails over a conflicting transfer of copyright ownership if evidenced by a signed written instrument and the license was taken before the transfer or in good faith before recordation of the transfer and without notice.[115]

            Whether a work was a work for hire or merely a work in which rights were transferred by the author to someone else is important, among other reasons, because of the right of an author to terminate transfers and licenses. Subject to various factors, in the case of any work other than a work made for hire, an author is entitled to terminate the grant of a transfer or license of copyright executed by the author on or after January 1, 1978.[116] The author may terminate the grant during a five year period beginning 35 years from the date of the execution of the grant or, if the grant covers the publication of the work, 35 years from the date of publication or 40 years from the grant, whichever is earlier.[117] The termination is effected by serving notice upon the grantee of the author's intent to terminate the grant. The notice must state the date of the termination and must be served upon the grantor not less than two years but not more than 10 years prior to the termination.[118] 

            It is also important to be clear about whether an independent contractor is making a work for hire or merely transferring some rights in the work. If the contractor is transferring some rights, it's important to set forth exactly what those rights are. For example, in a recent  case, the Massachusetts District court determined that a software designer creating codes as an independent contractor who had not entered into a work for hire agreement was likely to be able to show he had retained  the exclusive right to reproduce the codes and prepare derivative works while the corporation he was contracting with obtained only the exclusive right to distribute copies of the code contained in the software library.[119]

            I. Notice, Deposit, & Registration

            If notice of copyright is provided in a manner that complies with certain specifications, a defense of "innocent infringement" will be unavailable to a person who is alleged to have infringed copyright.[120] Examples of sufficient notice include a software program where notice was included in ASCII,[121] on the boot-up screen,[122] and on the initial screen in the Print Shop program.[123] However, a copyright notice that appeared randomly and infrequently during a video game was deemed to be insufficient.[124] For works created prior to March 1, 1989, failure to provide sufficient notice of copyright placed a work in the public domain.[125] One of the amendments to the copyright law implementing the Berne Convention made the copyright notice provision permissive rather than mandatory and, therefore, failure to place notice of copyright on the work no longer places a work in the public domain.[126]

            Where a work lacks notice and where an infringer is able to prove that (s)he was misled by the lack of notice, the infringer is not liable for statutory or actual damages sustained by the copyright owner prior to the infringer having been given notice of copyright.[127] A court may, however, award in its discretion some or all of the profits made by the infringer as a result of the infringement.[128]

            The copyright owner of a published work (or person owning the exclusive right of publication) is required to deposit two complete copies of a work with the Copyright Office for the use or disposition of the Library of Congress.[129]The Register of Copyrights may exempt, by regulation, any categories of material from the deposit requirements or require the deposit of only one copy.[130] After publication, the Register of Copyrights may make a written demand for the required deposit and failure to comply with the demand within three months of the demand makes the copyright owner liable for a fine of up to $250 plus the retail price of the copies or cost to the Library of Congress of obtaining the copies.[131] A fine of up to $2,500 may be levied if the failure to comply is willful.[132] The deposit requirements are not, however, a condition of copyright protection.[133] The Copyright Office is currently developing the "Copyright Office Electronic Registration Recordation and Deposit System" (CORDS) which is intended to be "a system for copyright registration and recordation with copyright applications, copies of works, and copyright related documents transmitted in digital form over communications networks such as the Internet."[134] Currently, however, deposits have to be accomplished by mail or other physical deposit. A description of the deposit system can be found in the Copyright Office's Circular 7D.[135]

            A copyright owner may register the copyrighted work. To register a work, the owner must deposit with the Library of Congress one copy in the case of an unpublished work, a work published outside of the United States, or a contribution to a collective work, or  two copies in the case of a work published in the United States,[136] along with an application,[137] and a fee of $20 plus adjustments made by the Copyright Office under specified circumstances.[138] (The fee is currently set at $30).[139]  The Register of Copyrights is required to review the material deposited by an applicant to determine whether it constitutes copyrightable material. If it does, the Register is required to issue a certificate of registration. A certificate of registration constitutes prima facie evidence of the validity of the copyright.[140] If the Register denies an application, the Register is required to notify the applicant in writing of the reasons for the denial.[141] Registration is required before a copyright owner may bring an action for an alleged infringement of a work whose country of origin is the United States. It is not necessary that the work have been registered prior to the alleged infringement. In the case of works that are denied registration because the Register has deemed them not to be subject to copyright, the person alleging infringement is required to serve a copy of the complaint on the Register to initiate an infringement suit.[142] Furthermore, a copyright owner is not eligible to receive damages or attorney's fees for infringement commencing before the effective date of a copyright registration.[143] This ineligibility does not apply if the work is registered within three months of publication.[144]

            J. Remedies

            There are several remedies available to a copyright owner when a person has been found to have infringed the owner's rights. Any court with jurisdiction over copyright is entitled to issue an injunction it may deem reasonable to prevent or restrain infringement of copyright.[145] A court may order allegedly infringing copies and tools used to make copies impounded while an action is pending.[146] A copyright owner that has proven infringement is entitled to the owner's actual damages and the infringer's profits or, in the alternative, statutory damages of between $750 and $30,000 as the court, in its discretion, deems just. This amount may be lowered to as little as $200 if the court determinesthe infringer had no reason to know he was infringing or raised to as much as $150,000 if the infringement is found to be wilfull.[147] With the exceptions noted above, a court may also award costs and a reasonable attorneyís fee to the prevailing party.[148]

            Criminal penalties are also available for persons who wilfully infringe a a copyright either for commercial advantage[149] or by reproducing or distributing copies of one or more works within a 180 day period with a value of more than $1,000.[150] Persons who fraudulently place a copyright notice, fraudulently removes a copyright notice, or falsely represents a material fact in a copyright application is subject to a $2,500 fine.[151]

            There is a three year statute of limitation with regard to civil actions of copyright infringement and a five year statute of limitation with regard to criminal actions.[152]

            K. Digital Millenium Copyright Act of 1998

            In 1998, the Digital Millenium Copyright Act (DMCA) was passed. It contained provisions that prohibited the manufacture, sale, or use of devices or services that circumvent measures that prevent unauthorized access to copyrighted materials and the manufacture or sale of devices or services that circumvent measures that prevent unauthorized copying of copyrighted materials.[153] It also contained provisions designed to protect copyright management information[154] as well as provisions that limit the liability of online service providers.[155]

            i. Anticircumvention Provision

            Effective October 28, 2000, the DMCA prohibits making, selling, or using devices or services that are primarily used to circumvent technological measures designed to control access to copyrighted material.[156] The DMCA also prohibits making or selling devices or services that are primarily used to circumvent technological measures designed to control copying copyrighted material.[157] The actual circumvention of measures designed to control copying is not prohibited because of a concern that this would diminish the ability of the public to take advantage of fair use and other limitations on a copyright owner's exclusive rights.[158]

            Manufacturers of electronic, telecommunications, or computing equipment are not required to design products to affirmative respond to a particular technological measure except that analog VCRs must be designed to conform to the Macrovision anticopying mechanism. Rights holders are prohibited from applying Macrovision to free television and basic and extended basic tier cable broadcasts.[159]

            Governmental activities such as law enforcement and intelligence activities are not subject to the anticircumvention provisions.[160] Exemptions from the anticircumvention provisions may also be made through administrative rulemaking by the Librarian of Congress upon the recommendation of the Register of Copyright for classes of work likely to be adversely affected by virtue of the prohibitions.[161] Nonprofit libraries, archives, and educational institutions are exempted for the purpose of circumventing solely to determine whether to obtain an authorized copy of the work.[162] A person who has lawfully obtained the right to use a copy of a computer program may circumvent an access control measure for the sole purpose of identifying and analyzing elements of the program necessary to achieve interoperability with other programs to the extent the acts of identification and analysis do not otherwise constitute a violation of copyright.[163] The encryption research exception allows circumvention to identify flaws and vulnerabilities of encryption technologies if the person lawfully obtained an encrypted copy of the published work, the circumvention is necessary to conduct the encryption research, the person made a good faith attempt to obtain authorization before the circumvention, and the act does not otherwise violate copyright law.[164] When considering whether a component or part is in violation of the anticircumvention provisions, a court may consider whether the component or part has the sole purpose of preventing the access of minors to materials on the Internet.[165] The DMCA also permits circumvention where the act of circumvention has the sole effect of identifying and disabling the ability of a technological measure or the work it protects to collect or disseminate personally identifying information about a person's online activities.[166] And, finally, circumvention is allowed for the purpose of testing the security of a computer, computer system, or network with the authorization of the owner or operator of the computer, computer system, or network.[167]

            ii. Copyright Management Information

            The DMCA prohibits a person from knowingly providing or distributing copyright management information that is false with the intent to induce, enable, facilitate, or conceal infringement. Intentionally removing or altering copyright management information or distributing copyright management information knowing that the information has been removed or altered is also prohibited if the person knows or should know that the prohibited activity will induce, enable, facilitate, or conceal an infringement.[168] Copyright Management Information includes information that identifies the work, the author, the copyright owner, and terms and conditions of use. It does not include personally identifying information about the user of a work.[169]

            A general exemption is provided for law enforcement, intelligence, and other governmental activities.[170] There are also limitations on liability for broadcast stations and cable systems where there was no intent to enable, facilitate, or conceal infringement.[171]

            A willful first offense for violating the anticircumvention provisions or copyright management information provisions for commercial gain can bring a $500,000 fine and up to a five year jail sentence.[172]

            iii. Limitation on Liability for Online Service Providers

            The DMCA creates four new limitations on liability for copyright infringement by online service providers. The limitations apply to four categories of conduct by a service provider: transitory communications; system caching; storage of information on systems or networks at direction of users; and information location tools.[173] The determination of whether a service provider qualifies for one of the limitations does not have a bearing upon whether it is eligible for the others.[174] The section also provides a method whereby copyright owners can obtain a subpoena ordering a service provider to disclose the identity of a subscriber.[175]

            (a) General Qualification Requirements

            To be eligible for any of the limitations, a service provider must adopt and reasonably implement a policy of terminating the accounts of subscribers who are repeat infringers and  accommodate and not interfere with measures copyright owners use to identify or protect works where those measures meet certain specifications.[176] For the purpose of the transitory communications limitation, a service provider is an entity that transmits, routes, and provides connections for digital, online communications between points specified by the user without modification of the material's content.[177] For the other exceptions, a service provider is a provider of online services or network access or the operator of facilities therefore.[178]

            (b) Transitory Communications Limitation

            This provision limits the liability of service providers in circumstances where the provider merely acts as a data conduit, transmitting digital information from one point on a network to another at someone else's request. To qualify for this limitation, the service provider's activities must meet the following conditions:

 

            * The transmission must be initiated by a person other than the provider.

            *The transmission, routing, provision of connections, or copying must be carried out by an automatic technical process without selection of material by the service provider. 

            * The service provider must not determine the recipients of the material.

            * Any intermediate copies must not ordinarily be accessible to anyone other than anticipated recipients, and must not be retained for longer than reasonably necessary.

            * The material must be transmitted with no modification to its content.[179]

            (c) Limitation for System Caching

            This provision limits liability for service providers for caching copies, a practice that helps reduce bandwidth requirements for a service provider. "The limitation applies to acts of intermediate and temporary storage, when carried out through an automatic technical process for the purpose of making the material available to subscribers who subsequently request it."[180] However, the content may not be modified; the provider must comply with rules about refreshing material, replacing retained copies of material with material from the original location; when specified in accordance with a generally accepted industry standard data communication protocol, the provider may not interfere with technology designed to return "hit" information to the original site if the technology meets certain requirements; the provider may not make the material available to those who would not otherwise have access to it; and, once notified of material that was posted without the copyright owner's authorization, the provider must remove the material.[181]

            (d) Limitation for Information Residing on a System at the Direction of Users

            This provision limits the liability of a service provider for infringing material stored on a system at the direction of a user. To be eligible, a service provider must have less than a requisite amount of knowledge, must not have a financial benefit directly attributable to the infringement if the provider has the right and ability to control the infringing activity, and must expeditiously take down or block access to material upon being notified in the specified manner of an alleged infringement.[182]

            The service provider must also have filed with the Copyright Office a designation of an agent to receive notice of claimed infringement.[183]  To protect against the possibility of erroneous or fraudulent notifications of infringement, the service provider is required to notify the subscriber it has removed or disabled the material. If the subscriber provides a counternotification in the specified manner that the material should not have been removed, the service provider is required to replace or reactivate the material within 10 to 14 business days after receiving notification.[184]

            Penalties are provided for knowing material misrepresentations of notification or counternotification. The penalties provide for damages, costs, and attorneys fees.[185]

            (e) Limitation for Information Location Tools

            This provision limits liability for referring or linking users to a site that contains infringing material by using information location tools. The provision applies if the provider lacks a certain requisite knowledge that the material is infringing, the provider does not receive a direct financial benefit from the infringing activity if the provider has the right and ability to control the infringing activity, and upon receiving notification the provider must expeditiously block or remove access to the material.[186] The provisions guarding against fraudulent notification or counternotification for information residing on a system at the direction of a user applies to the information location tool limitation as well.[187]

            (f) Special Rules for Nonprofit Educational Institutions

            The DMCA makes an exception for nonprofit educational institutions that limits the effect a faculty member or graduate student employee can have on the educational institution's eligibility for one of the limitations on liability for online service providers. In the case of the transitory communications limitation and the system caching limitation, such a faculty member or graduate student is considered to be "a person other than the institution" while in the case of the other limitations, the knowledge of the faculty member or graduate student is not attributed to the educational institution.[188] This exception is available if: (1) the infringing activity does not involve providing online access to course materials required or recommended during the past three years; (2) the institution has not received more than twonotifications in the past three years of infringement by the faculty member or graduate student; and (3) the institution provides all of its users with informational materials describing and promoting compliance with copyright law.[189]

            iv. DVDCCA

            On August 17, 2000, Judge Kaplan of the Southern District of New York issued an opinion on the DMCA in the case of Universal Studios, Inc. v. Remeirdes.[190] The case involved  a system used by the Motion Picture Association of America (MPAA) to encrypt "digital versatile disks" (DVDs) known as Content Scramble System (CSS). Computer programmers designed a program that decrypted the system called DeCSS which allowed individuals to circumvent the encryption. DeCSS made it possible for individuals to copy DVDs as well as to view a DVD on a DVD player that had not been licensed by the MPAA. The most noteworthy defendant was Eric Corley. Corley is commonly known by his pseudonym Emmanuel Goldstein, a nod to the fictional underground leader in George Orwell's 1984. Corley publishes a web 'zine called 2600 along with a corresponding web site. After DeCSS was released, Corley posted the source and object code to the 2600 web site along with a list of links to other mirror sites that purported to house the DeCSS code. 

            The court analyzed the effect of Corley's actions as twofold. "First, the availability of DeCSS on the Internet effectively has compromised plaintiffs' system of copyright protection for DVDs, requiring them either to tolerate increased piracy or to expend resources to develop and implement a replacement system unless the availability of DeCSS is terminated. It is analogous to the publication of a bank vault combination in a national newspaper. Even if no one uses the combination to open the vault, its mere publication has the effect of defeating the bankís security system, forcing the bank to reprogram the lock."[191] Second, the potential of DeCSS to allow decryption, copying, and distribution over the Internet could threaten the revenue from sales of DVDs by the copyright holders as well as impeding as yet undeveloped initiatives the motion picture industry could possibly undertake to distribute motion pictures in digital form.[192]

            For posting the DeCSS code and linking to other sites that distributed the code, the defendant was accused of violating 17 U.S.C. 1201(a)(2), which  prohibits, in the court's words, "creating and making available certain technologies . . . developed or advertised to defeat technological protections against unauthorized access to a work."[193] The court reasoned that DeCSS was clearly "a means of circumventing a technological access control measure" and, therefore, that if DeCSS fell within one of the three prohibited categories (primarily designed or produced to circumvent access, limited commercially significant purpose other than access circumvention, or marketed for the purpose of circumvention) it would be prohibited.[194]  By admission of the defendants (and suggested by the name DeCSS), the purpose of DeCSS is to circumvent CSS and, therefore, it violates 17 U.S.C. 1201(a)(2)(A).

            The court, therefore, found it immaterial that DeCSS was arguably the only way to develop a DVD player that ran on the Linux operating system. The copyright law was not concerned with whether its effect was to prohibit a viable DVD player for Linux. The court found that the interoperability exception to the anticircumvention provisions was unavailable because the defendants "did not post DeCSS 'solely' to achieve interoperability with Linux or anything else."[195] The court found defendant did not fall under the encryption exception because there was no good faith attempt to obtain authorization, among other things, and did not fall under the security testing exception for similar reasons.[196]

            The court also found that no fair use exception was available to the defendants because there is no fair use exception to the access anticircumvention provisions, particularly the provisions prohibiting trafficking in anticircumvention products.[197] Fair use applies to exceptions to the exclusive rights of authors. The anticircumvention prohibition is, at least as the statute is drafted, something distinct from the exclusive rights.

            The court found a clear violation, not only in the actual code posted to the 2600 site, but also in the links that allowed for the "automatic download" of DeCSS,[198] making the potentially far reaching statement that in such cases "[d]efendants are engaged in the functional equivalent of transferring the DeCSS code to the user themselves."[199] The court found links to web pages that display nothing more than the DeCSS and no other content a slightly tougher question but still a scenario in which the defendant is liable.[200] The court did not, however, believe liability would be found if the defendants were merely linking to a  page in which many things other than DeCSS were posted.[201]

            The court considered the First Amendment implications of the anti-trafficking provisions of the DMCA. "DeCSS, like any other computer program, is a series of instructions that causes a computer to perform a particular sequence of tasks which, in the aggregate, decrypt CSS-protected files. Thus, it has a distinctly functional, non-speech aspect in addition to reflecting the thoughts of the programmers. It enables anyone who receives it and who has a modicum of computer skills to circumvent plaintiffs' access control system."[202] Due to the functional nature of DeCSS, the court found that the DMCA, which the court asserts is content neutral, was an appropriate exercise of  power in that it was meant to accomplish a goal Congress deemed important, that of protecting copyrighted materials from anticircumvention technologies.[203] However, the discussion of the court on the subject suggests that the First Amendment should not be allowed to apply because if the First Amendment were allowed to trump the anti-trafficking portions of the DMCA, it would be impossible as a practical matter to protect copyright owners' rights in works that find their way online. To make its point, the court compares circumvention technology to a disease noting the exception that in this case, the diseased individuals do not suffer from their sickness and are not, therefore, driven to seek treatment.[204] The court also found that links are in large part functional as opposed to expressive and, therefore, the First Amendment does not demand their regulation be subjected to heightened scrutiny. With regard to the DMCA, the courtenunciated the following rule with regard to the anticircumvention provisions' regulation of links: "[T]here may be no injunction against, nor liability for, linking to a site containing circumvention technology, the offering of which is unlawful under the DMCA, absent clear and convincing evidence that those responsible for the link (a) know at the relevant time that the offending material is on the linked-to site, (b) know that it is circumvention technology that may not lawfully be offered, and (c) create or maintain the link for the purpose of disseminating that technology."[205]

            The court, therefore, held that the defendants had violated the DMCA and that the DMCA did not violate the First Amendment.

            v. Napster

            The Napster case[206] involved Napster, a company that provided software that allows peer-to-peer file sharing, meaning one personal computer user has access to the files residing on the computer of another user. Napster also provides a centralized listing service that allows a user to determine which files another user has made accessible. Napster is used primarily to exchange music in the MP3 format. The Recording Industry Association of America (RIAA) filed suit against Napster asserting that it was contributorily and vicariously liable for copyright infringement because its product facilitated copyright infringement on a wide scale.

            Among its defenses, Napster asserted that its users were not, for the most part, infringing due to the American Home Recording Act which allows for noncommercial copying (discussed above) and also asserted that it was an online service provider that fell into the transitory communications or possibly the information location tool limitation on liability of the DMCA.

            The RIAA contested these assertions arguing that Napster was not an online service provider nor did it fall into one of the safe harbors.

            The language of subsection 512(a) makes the safe harbor applicable, as a threshold matter, to service providers "transmitting, routing or providing connections for, material through a system or network controlled or operated by or for the service provider . . . ."[207] Because users' files do not pass through Napster's system or network, the court held that the transitory communications safe harbor was not available to Napster.[208] Even if the court had deemed the safe harbor available to Napster, Napster's argument would have failed because Napster failed to adopt, reasonably implement, and inform subscribers of, a policy that provides for the termination in appropriate circumstances of subscribers and account holders of the service provider's system or network who are repeat infringers as required for any safe harbor to apply  under 17 U.S.C. 512(i).[209]

 



[1] M. Ethan Katsh, Law in a Digital World: Computer Networks and Cyberspace, 38 Vill. L. Rev. 403, 413 (1993).

[2] See Sony Corp. v. Universal Studios, Inc., 464 U.S. 417, 430-31 (1984) ("Indeed it was the invention of a new form of copying equipment--the printing press--that gave rise to the original need for copyright protection.").

[3]  Katsh, supra note 1, at 172.

[4] Act for the Encouragement of Learning, 1709, 8 Anne, ch. 21 (Eng.).

[5] The Charter of the Company of Stationers of London, reprinted in 1 EDWARD ARBER, A TRANSCRIPT OF THE REGISTERS OF THE COMPANY OF STATIONERS OF LONDON, 1554-1640 A.D. xxviii-xxxii (Peter Smith ed., 1950) (1875).

[6] Katsh, supra note 1, at 173-74. The English monarchy chartered the Stationers' Company, a guild with an exclusive monopoly on printing. Only a member of the guild had the right to make copies of a manuscript. Beholden as it was to the monarchy, the creation of the Stationers' Company was an effective means of governmental surveillance of the press. Mark Rose, Authors and Owners--The Invention of Copyright 12 (1993). In fact, the preamble to the Stationers' Company Charter explicitly states the royal purpose:

"[K]now ye that we, considering and manifestly perceiving that certain seditious and heretical books rhymes and treatises are daily published and printed by divers scandalous malicious schismatical and heretical persons, not only moving our subjects and leiges to sedition and disobedience against us, our crown and dignity, but also to renew and move very great and detestable heresies against the faith and sound catholic doctrine of Holy Mother Church, and wishing to provide a suitable remedy in this behalf."

Id. (citing A Transcript of the Registers of the Company of Stationers of London: 1554-1640, 1875-1894 xxviii (Edward

Arber ed., 1950)).

[7] Katsh, supra note 1, at 174.

[8] Id. at 174-75.

[9] Statute of Anne, supra note 4.

[10] U.S. Const. art. I, 8, cl. 8.

[11] Act of May 31, 1790, 1st Cong., 2d sess., 1 stat. 124.

[12] Id.

[13] 17 U.S.C. 101 et seq.

[14]  9 F. Cas. 342 (C.C.D. Mass. 1841)

[15] 17 U.S.C. 301

[16] Id.

[17] Trotter Hardy, Contracts, Copyright and Preemption in a Digital World, 1 RICH. J.L. & TECH. 2, paragraph 23 (1995) (found at http://www.richmond.edu/~jolt/v1i1/hardy.html). However, the question of when a state law provides "equivalent" rights is not well settled and is beyond the scope of this article. See id. for a more thorough discussion.

[18] 17 U.S.C. 104.

[19] 17 U.S.C 102 (a)

[20] 17 U.S.C. 102 (a).

[21] 17 U.S.C. 102(a).

[22] Feist Publications, Inc. v. Rural Telephone Service Co., 499 U.S. 340, 345 (1991)

[23] 35 U.S.C. 101, 102.

[24] Marshall A. Leaffer, Understanding Copyright Law 33 (2d ed. 1995).

[25] Feist, supra note 22, at 345 (stating that "even a slight amount will suffice.").

[26] Leaffer, supra note 24, at 42 (citing Kitchens of Sara Lee, Inc. v. Nifty Foods Corp., 266 F.2d 541, 545 (2d Cir. 1959)).

[27] Id. (citing Aberto-Culver Co. v. Andrea Dumon, Inc., 466 F.2d 705 (7th Cir. 1972) (holding that the phrase "most personal sort of deodorant" is not copyrightable)).

[28] Feist, supra note 22, at 361-64.

[29] H.R. Rep. No. 1476, 94th Cong., 2d Sess. 47, 52 (1976), reprinted in 1976 U.S.C.C.A.N. 5659, 5665 [hereinafter House Report]

[30] MAI Systems Corp. v. Peak Computer, Inc., 991 F.2d 511 (9th Cir. 1993), ("`copying' for purposes of copyright law occurs when a computer program is transferred from a permanent storage device to a computer's RAM"); 17 U.S.C. 101 (definition of "fixed" includes a "work consisting of sounds, images, or both that are being transmitted...if fixation of the work is being made simultaneously with its transmission").

[31] John P. Barlow, The Economy of Ideas, 2.3 Wired, Mar. 1994, at 84. Also see Masson, Douglas J., Fixation on Fixation: Why Imposing Old Copyright Law on New Technology Will Not Work, 71 Ind.L.J. 1049 (1996). 

[32] 17 U.S.C. 105

[33] 17 U.S.C. 102(b).

[34] 17 U.S.C. 102(a).

[35] 17 U.S.C. 101.

[36] See Brandir International v. Cascade Pacific Lumber Co., 834 F.2d 1142, 1144-45 (2d Cir. 1987).

[37] These rights are balanced by certain exceptions such as fair use in an attempt to balance the policy of inducing creation (through the grant of the exclusive rights) with the desire to facilitate the exchange of ideas and information.

[38] 17 U.S.C. 106.

[39] 17 U.S.C. 106(1).

[40] 17 U.S.C. 106(2).

[41] 17 U.S.C. 101.

[42] 17 U.S.C. 106(3).

[43] 17 U.S.C. 109(a).

[44] RTC v. Netcom, 907 F.Supp. 1361 (N.D. Cal. 1995). The Digital Millenium Copyright Act, discussed infra, has since put forth specifications as to the copyright liability of Internet Service Providers.

[45] Sega Enterprises Ltd. v. Maphia, 857 F.Supp. 679 (N.D. Cal. 1994). The bulletin board operator was, however, found to be contributorily liable.

[46] But see Playboy Enterprises., Inc. v. Frena, 839 F. Supp. 1552 (M.D. Fla. 1993) (in which a bulletin board operator was found liable for direct infringement for allowing users to upload and download copyrighted photographs from Playboy magazine).

[47] 17 U.S.C. 106(4)-(5).

[48] 17 U.S.C. 101.

[49] Dowling v. United States, 473 U.S. 207 (1985) ("It follows that interference with copyright does not easily equate with theft, conversion, or fraud. The Copyright Act even employs a separate term of art to define one who misappropriates a copyright: Anyone who violates any of the exclusive rights of the copyright owner, that is, anyone who trespasses into his exclusive domain by using or authorizing the use of the copyrighted work in one of the five ways set forth in the statute, is an infringer of the copyright." [17 U.S.C.] 501(a)."). The district court of the Southern District of New York either was unaware or unmindful of Dowling in the DeCSS case when it asserted that its decsion would "contribute to a climate of appropriate respect for intellectual property rights in an age in which the excitement of ready access to untold quantities of information has blurred in some minds the fact that taking what is not yours and not freely offered to you is stealing." Universal Studios v. Remeirdes, et. al. at 87 (S.D.N.Y 2000) available at http://www.2600.com/dvd/docs/2000/0817-decision.pdf).

[50] 17 U.S.C. 505.

[51] 17 U.S.C. 601.

[52] Fonovisa, Inc. v. Cherry Auction, Inc., 76 F.3d 259 (9th Cir. 1996). See Sony Corp. of America v. Universal City Studios, Inc., 464 U.S. 417, 435 (1984) (explaining that "vicarious liability is imposed in virtually all areas of the law, and the concept of contributory infringement is merely a species of the broader problem of identifying circumstances in which it is just to hold one individually accountable for the actions of another").

[53] A&M Records v. Napster, Case No. 99-5183 (N.D.Ca 2000).

[54] 17 U.S.C. 1001-1010.

[55] Opposition of Defendant Napster, Inc. to Plaintiffís Motion for Preliminary Injunction at 1. Found at http://dl.napster.com/opposition.pdf.

[56] 316 F.2d 304 (2d Cir. 1963).

[57]  See e.g. Buck v. Jewell-LaSalle Realty Co., 238 U.S. 191, 198-199 (1931); Dreamland Ballroom, Inc. v. Shapiro, Bernstein & Co., 36 F.2d 354 (7th Cir. 1929). For example,

a landlord who has the right and ability to supervise the tenant's activities is vicariously liable for the infringements of the tenant where the rental amount is proportional to the proceeds of the tenant's sales. Shapiro, Bernstein, 316 F.2d at 306. However, where a defendant rents space or services on a fixed rental fee that does not depend on the nature of the activity of the lessee, courts usually find no vicarious liability because there is no direct financial benefit from the infringement. See, e.g., Roy Export Co., v. Trustees of Columbia University, 344 F. Supp. 1350, 1353 (S.D.N.Y. 1972) (finding no vicarious liability of university because no financial benefit from allowing screening of bootlegged films); Fonovisa, 847 F. Supp. at 1496 (finding swap meet operators did not financially benefit from fixed fee).

[58] Gershwin Publishing Corp. v. Columbia Artists Management, Inc., 443 F.2d 1159, 1162 (2d Cir. 1971).

[59] RTC v. Netcom, supra note 44.

[60] Id.

[61] Id.

[62] See Sony v. Universal City, 464 U.S. at 417;

[63] Gershwin, 443 F.2d at 1162.

[64] RTC v. Netcom, supra note 43.

[65] Id.

[66]Id. citing Gershwin Publishing, 443 F.2d at 1162.

[67] Id. citing Apple Computer, Inc. v. Microsoft Corp., 821 F. Supp. 616, 625 (N.D. Cal. 1993), aff'd, 35 F.3d 1435 (9th Cir. 1994); Demetriades v. Kaufmann, 690 F. Supp. 289, 294 (S.D.N.Y. 1988).

[68] Id.

[69] 17 U.S.C. 107.

[70] Campbell v. Acuff-Rose Music, 510 U.S. 569 (1994).

[71] Id.

[72] Harper & Row v. Nation Enterprises, 471 U.S. 539 (1985).

[73] Campbell v. Acuff-Rose Music, 510 U.S. 569 (1994).

[74] Id.

[75] 17 U.S.C. 108.

[76] 17 U.S.C. 109(a).

[77] 17 U.S.C. 109(c).

[78] 17 U.S.C. 109(b).

[79] Id.

[80] 17 U.S.C. 109(b)(2)(A).

[81] 17 U.S.C. 110(1)-(2).

[82] 17 U.S.C. 110(3).

[83] 17 U.S.C. 110(4).

[84] 17 U.S.C. 110(5).

[85] Id.

[86] 17 U.S.C. 110(6).

[87] 17 U.S.C. 110(7).

[88] 17 U.S.C. 110(8)-(9).

[89] 17 U.S.C. 110(10).

[90] 17 U.S.C. 117(a).

[91] 17 U.S.C. 117(b).

[92] 17 U.S.C. 1008.

[93] 17 U.S.C. 302(a).

[94] 17 U.S.C. 302(b).

[95] 17 U.S.C. 302(c).

[96] 17 U.S.C. 302(e).

[97] 17 U.S.C. 303.

[98] 17 U.S.C. 305.

[99] 17 U.S.C. 304.

[100] P.L. 105-298, Title I, effective October 27, 1998.

[101] Slaton, Joyce, "A Mickey Mouse Copyright Law?", Wired News, Jan. 13, 1999, http://www.wirednews.com/news/print/0,1294,17327,00.html.

[102] 17 U.S.C. 202.

[103] 17 U.S.C. 201(a).

[104] 17 U.S.C. 101.

[105] See Ashton-Tate v. Ross, 916 F.2d 516 (9th Cir. 1990).

[106] Erickson v. Trinity Theatre, Inc., 13 F.3d 1061 (7th Cir. 1994); Respect Inc. v. Committee on Status of Women, 815 F.Supp 1112 (N.D. Ill. 1993).

[107] Kaplan v. Vincent, 937 F. Supp. 307 (S.D.N.Y. 1996).

[108] 17 U.S.C. 201(b).

[109] 17 U.S.C. 101.

[110] Id.

[111] 17 U.S.C. 201(c).

[112]17 U.S.C. 204.

[113] Effects Associates v. Cohen, 908 F.2d 555 (5th Cir. 1990).

[114] 17 U.S.C. 205.

[115] Id.

[116] 17 U.S.C. 203.

[117] Id.

[118] Id.

[119] Accusoft Corp v. Palo, 923 F.Supp 290 (D. Mass 1996).

[120] 17 U.S.C. 401, 402.

[121] E.F. Johnson Co. v. Uniden Corp. of America, 623 F.Supp. 1485 (D.C. Minn. 1985).

[122] Digital Communications Associates, Inc. v. Softklone Distributing Corp., 659 F.Supp. 449 (N.D.Ga. 1987).

[123] Broderbund Software, Inc. v. Unison World, Inc., 648 F.Supp. 1127 (N.D.Cal. 1986).

[124] Videotronics, Inc. v. Bend Electronics, 586 F.Supp. 478 (D.C.Nev. 1984).

[125] See Norma Ribbon & Trimming, Inc. v. Little, 51 F.3d 45 (5th Cir. 1995).; Innovative Network, Inc. v. Satellite Airlines Ticketing Centers, Inc., 871 F.Supp. 709 (S.D.N.Y. 1995).

[126] Id.

[127] 17 U.S.C. 405.

[128] Id.

[129] 17 U.S.C. 407(a).

[130] 17 U.S.C. 407(c).

[131] 17 U.S.C. 407(d).

[132] Id.

[133] 17 U.S.C. 407(a).

[134] "Copyright Office Electronic Registration Recordation and Deposit System"  http://www.loc.gov/copyright/cords/cords.html.

[135] Available at http://www.loc.gov/copyright/circs/circ07d.pdf.

[136] 17 U.S.C. 408.

[137] 17 U.S.C. 409.

[138] 17 U.S.C. 708.

[139] United States Copyright Office, ìCircular 1î, p. 7, found at http://www.loc.gov/copyright/circs/circ01.pdf, (2000).

[140] 17 U.S.C. 410.

[141] Id.

[142] 17 U.S.C. 411.

[143] 17 U.S.C. 412; Budget Cinema, Inc. v. Watertower Associates, 81 F.3d 729 (7th Cir. 1996).

[144] 17 U.S.C. 412.

[145] 17 U.S.C. 502.

[146] 17 U.S.C. 503.

[147] 17 U.S.C. 504.

[148] 17 U.S.C. 505.

[149] 17 U.S.C. 506.

[150] 17 U.S.C. 506; this provision was added by the "No Electronic Theft Act", Pub.L. 105-47, sec. 2(b) (adopted December 16, 1997.)

[151] Id.

[152] 17 U.S.C. 507.

[153] 17 U.S.C. 1201.

[154] 17 U.S.C. 1202.

[155] 17 U.S.C. 512.

[156] 17 U.S.C. 1201(a)(2); 17 U.S.C. 1201(a)(1)(A); United States Copyright Office, The Digital Millenium Copyright Act, U.S. Copyright Office Summary (hereinafter DMCA Summary), December 1998 at 4. Available at http://www.loc.gov/copyright/legislation/dmca.pdf.

[157] With regard to the anticircumvention provisions, "copying" is used as shorthand for the unauthorized exercise of any of a copyright owner's exclusive rights.

[158] DMCA Summary at 4.

[159] 17 U.S.C. 1201(k); DMCA Summary at 4.

[160] 17 U.S.C. 1201(e).

[161] 17 U.S.C. 1201(a)(1)(B)-(E).

[162] 17 U.S.C. 1201(d).

[163] 17 U.S.C. 1201(f).

[164] 17 U.S.C. 1201(g).

[165] 17 U.S.C. 1201(h).

[166] 17 U.S.C. 1201(i).

[167] 17 U.S.C. 1201(j).

[168] 17 U.S.C. 1202(a)-(b).

[169] 17 U.S.C. 1202(c)

[170] 17 U.S.C. 1202(d)

[171] 17 U.S.C. 1202(e)

[172] 17 U.S.C. 1204.

[173] DMCA Summary at 8; 17 U.S.C. 512.

[174] Id.

[175] DMCA Summary at 8.

[176] 17 U.S.C. 512(i).

[177] 17 U.S.C. 512(k)(1)(A).

[178] 17 U.S.C. 512(k)(l)(B).

[179] 17 U.S.C. 512(a); DMCA Summary at 10.

[180] DMCA Summary at 11.

[181] DMCA Summary at 11; 17 U.S.C. 512(b).

[182] DMCA Summary at 11; 17 U.S.C. 512(c).

[183] 17 U.S.C. 512(c)(2).

[184] 17 U.S.C. 512(g).

[185] 17 U.S.C. 512(f).

[186] 17 US.C. 512(d).

[187] 17 U.S.C. 512(f).

[188] 17 U.S.C. 512(e).

[189] Id.

[190] Available at http://www.2600.com/dvd/docs/2000/0817-decision.pdf

[191]Remeirdes at 27. This author would note that this particular analogy suffers from not recognizing the distinction between intellectual and physical property. One struggles to think of an example where taking property from vault is acceptable whereas there are broad exceptions to a copyright holder's exclusive rights.

[192] Id. at 28.

[193] Id. at 29 citing 17 U.S.C. 1201(a)(2).

[194] The defendants noted that these categories all required that the protection be 'effective' protection and suggested that CSS was ineffective. The court, however, concluded that as a matter of law that CSS was effective regardless of the strength of the encryption. Id. at 36.

[195] Id. at 37. The court did not credit the defendant's argument that because players that play CCS encrypted DVDS are widely available on Windows and Macintosh systems, the only real effect of DeCSS was to allow a Linux player to be created without the blessing of the MPAA.

[196] Id. at 40.

[197] Id. at 40-44.

[198]  Id. at 48. Presumably by ìautomatic downloadî the court is referring to a link that refers to a file that is in a format not readily readable by a browser. Apparently the court prefers files formatted in text or hypertext markup language to other formats.

[199] Id.

[200] Id.

[201] Id.

[202] Id. at 55.

[203] Id.

[204] Id. at 60-64.

[205] Id. at 79-80.

[206] A&M Records v. Napster, Case No.99-5183 (N.D.Ca 2000). Available at http://www.cand.uscourts.gov/cand/tentrule.nsf/4f9d4c4a03b0cf70882567980073b2e4/9379871378883e0b882568d9005fd108/$FILE/Napster2.sjo.pdf

[207] 17 U.S.C. 512(a).

[208] Napster at 12.

[209] Id. at 12.