6 OIL Casebook Topic VI: Copyright 6 OIL Casebook Topic VI: Copyright

This section considers copyright issues on the internet.

6.1 OIL Casebook: Intro to Copyright 6.1 OIL Casebook: Intro to Copyright

6.1.1 Cheat Sheet on Motions Practice 6.1.1 Cheat Sheet on Motions Practice

Under FRCP 12(c), a motion for judgment on the pleadings is a way for a party to challenge the substantive sufficiency of an opposing party’s pleadings.  Under FRCP 12(f), a motion to strike is a way to challenge the substantive sufficiency of defenses in an answer.  For instance, in Biggs v. Pub. Serv. Coordinated Transp., 280 F.2d 311 (3d. Cir. 1960), the court held that the defendant’s general denial of the plaintiff’s jurisdictional allegations could not possibly apply to the allegation that the defendant was a New Jersey corporation, and that the only fair interpretation of the answer is that that allegation must be deemed to be admitted.  A defendant typically can rely on a general denial to say it has denied specific allegations in a plaintiff’s complaint.  Thus, in Ways v. City of Lincoln, 2002 WL 1742664 (D. Neb. 2002), the court found that the defendants had effectively denied certain particular allegations because the defendants had stated in their answer that they “[d]eny that Plaintiff is entitled to any relief at law or in equity as alleged in the Complaint," and that they “[d]eny each and every other allegation contained in Plaintiff’s Amended Complaint except those specifically admitted herein . . . .”  Id. at *23.

Under FRCP 7(a), a plaintiff must reply to an answer that contains counterclaims.  Otherwise, whether to require a reply to an answer is within the discretion of the court. 

Under FRCP 8(b)(6), allegations to which a reply is not required are considered avoided or denied and a plaintiff may controvert them at trial, while allegations to which a reply is required are taken as admitted if not denied in the reply or if a reply is not filed.

6.1.2 Copyright Act: 17 U.S. Code § 102 - Subject matter of copyright: In general 6.1.2 Copyright Act: 17 U.S. Code § 102 - Subject matter of copyright: In general

(a) Copyright protection subsists, in accordance with this title, in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device. Works of authorship include the following categories:
(1) literary works;
(2) musical works, including any accompanying words;
(3) dramatic works, including any accompanying music;
(4) pantomimes and choreographic works;
(5) pictorial, graphic, and sculptural works;
(6) motion pictures and other audiovisual works;
(7) sound recordings; and
(8) architectural works.
(b) In no case does copyright protection for an original work of authorship extend to any idea, procedure, process, system, method of operation, concept, principle, or discovery, regardless of the form in which it is described, explained, illustrated, or embodied in such work.

6.1.3 Copyright Act: 17 U.S. Code § 106 - Exclusive rights in copyrighted works 6.1.3 Copyright Act: 17 U.S. Code § 106 - Exclusive rights in copyrighted works

Subject to sections 107 through 122, the owner of copyright under this title has the exclusive rights to do and to authorize any of the following:
(1) to reproduce the copyrighted work in copies or phonorecords;
(2) to prepare derivative works based upon the copyrighted work;
(3) to distribute copies or phonorecords of the copyrighted work to the public by sale or other transfer of ownership, or by rental, lease, or lending;
(4) in the case of literary, musical, dramatic, and choreographic works, pantomimes, and motion pictures and other audiovisual works, to perform the copyrighted work publicly;
(5) in the case of literary, musical, dramatic, and choreographic works, pantomimes, and pictorial, graphic, or sculptural works, including the individual images of a motion picture or other audiovisual work, to display the copyrighted work publicly; and
(6) in the case of sound recordings, to perform the copyrighted work publicly by means of a digital audio transmission.

6.1.4 MAI Systems Corp. v. Peak Computer, Inc. 6.1.4 MAI Systems Corp. v. Peak Computer, Inc.

991 F.2d 511 (1993)

MAI SYSTEMS CORPORATION, a Delaware corporation, Plaintiff-Appellee,
v.
PEAK COMPUTER, INC., a California corporation; Vincent Chiechi, an individual; Eric Francis, an individual, Defendants-Appellants.
MAI SYSTEMS CORPORATION, a Delaware corporation, Plaintiff-Appellee,
v.
PEAK COMPUTER, INC., a California corporation; Vincent Chiechi, an individual; Eric Francis, an individual, Defendants-Appellants.

Nos. 92-55363, 93-55106.

United States Court of Appeals, Ninth Circuit.

Argued and Submitted June 4, 1992.
Submitted February 24, 1993.[1]
Decided April 7, 1993.

[512] [513] William J. Robinson, Graham & James, Los Angeles, CA, for plaintiff-appellee.

James W. Miller, Musick, Peeler & Garrett, Los Angeles, CA, for defendants-appellants.

BEFORE: PREGERSON, BRUNETTI, and FERNANDEZ, Circuit Judges.

Argued and Submitted June 4, 1992 in No. 92-55363.

Submitted February 24, 1993 in No. 93-55106.[1]

BRUNETTI, Circuit Judge:

Peak Computer, Inc. and two of its employees appeal the district court's order issuing a preliminary injunction pending trial as well as the district court's order issuing a permanent injunction following the grant of partial summary judgment.

I. FACTS

MAI Systems Corp., until recently, manufactured computers and designed software to run those computers. The company continues to service its computers and the software necessary to operate the computers. MAI software includes operating system software, which is necessary to run any other program on the computer.

Peak Computer, Inc. is a company organized in 1990 that maintains computer systems for its clients. Peak maintains MAI computers for more than one hundred clients in Southern California. This accounts for between fifty and seventy percent of Peak's business.

Peak's service of MAI computers includes routine maintenance and emergency repairs. Malfunctions often are related to the failure of circuit boards inside the computers, and it may be necessary for a Peak technician to operate the computer and its operating system software in order to service the machine.

In August, 1991, Eric Francis left his job as customer service manager at MAI and joined Peak. Three other MAI employees joined Peak a short time later. Some businesses that had been using MAI to service their computers switched to Peak after learning of Francis's move.

II. PROCEDURAL HISTORY

On March 17, 1992, MAI filed suit in the district court against Peak, Peak's president Vincent Chiechi, and Francis. The complaint includes counts alleging copyright infringement, misappropriation of trade secrets, trademark infringement, false advertising, and unfair competition.

MAI asked the district court for a temporary restraining order and preliminary injunction pending the outcome of the suit. The district court issued a temporary restraining order on March 18, 1992 and converted it to a preliminary injunction on March 26, 1992. On April 15, 1992, the district court issued a written version of the preliminary injunction along with findings of fact and conclusions of law.

The preliminary injunction reads as follows:

A. Defendants [and certain others] are hereby immediately restrained and enjoined pending trial of this action from:

1. infringing MAI's copyrights in any manner and from using, publishing, copying, selling, distributing or otherwise disposing [514] of any copies or portions of copies of the following MAI copyrighted computer program packages: "MPx," "SPx," "GPx40," and "GPx70" (collectively hereinafter, "The Software");

2. misappropriating, using in any manner in their business including advertising connected therewith, and/or disclosing to others MAI's trade secrets and confidential information, including, without limitation, The Software, MAI's Field Information Bulletins ("FIB") and Customer Database;

3. maintaining any MAI computer system, wherein:

(a) "maintaining" is defined as the engaging in any act, including, without limitation, service, repair, or upkeep in any manner whatsoever, that involves as part of such act, or as a preliminary or subsequent step to such act, the use, directly or indirectly, of The Software, including, without limitation, MAI's operating system, diagnostic, utility, or other software;

(b) "use" is defined as including, without limitation, the acts of running, loading, or causing to be run or loaded, any MAI software from any magnetic storage or read-only-memory device into the computer memory of the central processing unit of the computer system; and

(c) "computer system" is defined as an MAI central processing unit in combination with either a video display, printer, disk drives, and/or keyboard;

4. soliciting any MAI computer maintenance customer pursuant to Francis' employment contracts with MAI;

5. maintaining any contract where customer information was obtained by Francis while employed by MAI pursuant to Francis' employment contract with MAI;

6. using in any manner in their business, or in advertising connected therewith, directly or indirectly, the trademarks MAI, BASIC FOUR, and/or MAI Basic Four, the letters MAI (collectively, the "MAI Trademarks") or any mark, word, or name similar to or in combination with MAI's marks that are likely to cause confusion, mistake or to deceive;

7. committing any act which otherwise infringes any of the MAI Trademarks;

8. advertising, directly or indirectly, that MAI Basic Four is part of Peak's Product line, that Peak has "satellite facilities," and/or that Peak's technicians are "specifically trained on the latest hardware releases of MAI;" and

9. engaging in any other acts that amount to unfair competition with MAI.

B. IT IS FURTHER ORDERED that Defendants [and certain others] shall hereby, pending trial in this action:

1. provide a full accounting of all MAI property, including all copyrighted works presently in their possession; and

2. retain any fees paid to them by any MAI maintenance client and place any such fees in an interest bearing escrow account pending final determination of the action at trial or further order of this Court.

We stayed the preliminary injunction in part by an order of June 9, 1992 which provides:

The preliminary injunction issued by the district court on April 15, 1992 is stayed to the following extent:

Section (A)(1), enjoining defendants from "infringing MAI's copyrights in any manner and from using, publishing, copying, selling, distributing, or otherwise disposing of any copies or portions of copies" or certain MAI software, is stayed to the extent that it prohibits defendants from operating MAI computers in order to maintain them.

Section A(2), enjoining defendants from misappropriating MAI trade secrets, is stayed to the extent that it prohibits defendants from operating MAI computers in order to maintain them.

Section A(3), enjoining defendants from "maintaining any MAI computer system," is stayed in its entirety, including subsections (a), (b), and (c).

Section (B), ordering defendants to "provide a full accounting of all MAI property" and to retain fees paid to them [515] by "any MAI maintenance client" in an escrow account, is stayed in its entirety, including subsections (1) and (2).

The remainder of the district court's preliminary injunction shall remain in effect. This order shall remain in effect pending further order of this court.

In January, 1993, we denied a motion by Peak to stay the district court proceedings. The district court then heard a motion for partial summary judgment on some of the same issues raised in the preliminary injunction. The district court granted partial summary judgment for MAI and entered a permanent injunction on the issues of copyright infringement and misappropriation of trade secrets on February 2, 1993 which provides:

A. Defendants [and certain others] are hereby permanently enjoined as follows:

1. Peak [and certain others] are permanently enjoined from copying, disseminating, selling, publishing, distributing, loaning, or otherwise infringing MAI's copyrighted works, or any derivatives thereof, including those works for which registrations have issued, and works for which registrations may issue in the future. The "copying" enjoined herein specifically includes the acts of loading, or causing to be loaded, directly or indirectly, any MAI software from any magnetic storage or read only memory device into the electronic random access memory of the central processing unit of a computer system. As used herein, "computer system" means an MAI central processing unit in combination with either a video display, printer, disk drives, and/or keyboard.

MAI's copyrighted works, and their derivatives, for which registrations have issued include:

         Work          Cert. of Reg. No.          Date Issued
BOSS/IX SOFTWARE
VERSION 7.5B*20        TX 3 368 502                 12/16/91

BOSS/VS LEVEL 7A*42    TXU 524 424 (Supp.)           7/01/92
DIAGNOSTICS            TXU 507 015 (Basic)           3/09/92

BOSS/VS LEVEL 7.5B     TXU 524 423 (Supp.)           7/01/92
DIAGNOSTICS            TXU 507 013 (Basic)           3/09/92

 

Additional MAI copyright registrations are listed on Exh. A hereto.

2. (a) Peak and Francis [and certain others] are permanently enjoined from misappropriating, using in any manner in their business, including advertising connected therewith, and/or disclosing to others MAI's trade secrets, as that term is used in California Civil Code § 3426.1(d). MAI's trade secrets, for purposes of this injunction, shall include, but not be limited to the following: MAI's software, MAI's Field Information Bulletins ("FIB") and all information in such FIB's, and MAI Customer Database and all information in such Database.

(b) In particular, the persons identified in subparagraph (a) herein are permanently enjoined from soliciting any MAI computer maintenance customer and from maintaining any contract with any former MAI computer maintenance customer where knowledge of any such customers was obtained by Francis during his employment with MAI.

We then stayed the permanent injunction in part by an order on February 4, 1993 which provides:

Appellants' emergency motion for stay of the district court's permanent injunction is granted in part. The injunction entered by the district court on February 2, 1993 is stayed to the following extent:

Section (A)(1), enjoining defendants from "infringing MAI's copyrighted works," is stayed to the extent that it prohibits defendants from loading MAI software or operating MAI computers in order to maintain them.

Section A(2), enjoining defendants from misappropriating MAI trade secrets, is stayed to the extent that it prohibits [516] defendants from loading MAI software or operating MAI computers in order to maintain them.

The remainder of the district court's permanent injunction shall remain in effect....

Since the permanent injunction covers some of the same issues appealed in the preliminary injunction, the appeal of those issues in the context of the preliminary injunction has become moot. See Burbank-Glendale-Pasadena Airport Authority v. Los Angeles, 979 F.2d 1338, 1340 n. 1 (9th Cir.1992). Therefore, we grant MAI's motion to dismiss the appeal of the preliminary injunction relative to the issues of copyright infringement and trade secret misappropriation. Since other issues covered in the preliminary injunction are not covered in the permanent injunction,[2] the appeals have been consolidated and both the permanent injunction and parts of the preliminary injunction are reviewed here.

III. JURISDICTION AND STANDARD OF REVIEW

We have jurisdiction over interlocutory orders granting injunctions under 28 U.S.C. § 1292(a)(1).

In addition, an appeal under 28 U.S.C. § 1292(a)(1) brings before the court the entire order, and, in the interests of judicial economy the court may decide the merits of the case. The court, however, generally will chose to decide only those matters `inextricably bound up with' the injunctive relief.

Bernard v. Air Line Pilots Ass'n, Int'l, AFL-CIO, 873 F.2d 213, 215 (9th Cir.1989) (citations omitted).

In this case, the district court's grant of the permanent injunction is "inextricably bound up" with the underlying decisions of that court on the merits of the copyright and trade secrets claims. Therefore, our review of the propriety of the permanent injunction is inextricably tied to the underlying decision, and this court has jurisdiction to review the entire order. Id.

A grant of summary judgment is reviewed de novo.[3] We must determine, viewing the evidence in the light most favorable to the nonmoving party, whether there are any genuine issues of material fact and whether the district court correctly applied the relevant substantive law. Federal Deposit Ins. Corp. v. O'Melveny & Meyers, 969 F.2d 744, 747 (9th Cir.1992). The court must not weigh the evidence or determine the truth of the matter but only determine whether there is a genuine issue for trial. Id.

A district court's grant of preliminary injunctive relief is subject to limited review. This court will reverse a preliminary injunction only where the district court "abused its discretion or based its decision on an erroneous legal standard or on clearly erroneous findings of fact." However, "questions of law underlying the issuance of a preliminary injunction" are reviewed de novo. Glick v. McKay, 937 F.2d 434, 436 (9th Cir.1991).

"To obtain a preliminary injunction, a party must show either (1) a likelihood of success on the merits and the possibility of irreparable injury, or (2) the existence of serious questions going to the merits and the balance of hardships tipping in [the movant's] favor. These two formulations represent two points on a sliding scale in which the required degree of irreparable harm increases as the probability of success decreases." Diamontiney v. Borg, [517] 918 F.2d 793, 795 (9th Cir.1990) (internal quotations and citations omitted).

In other words, "[w]here a party can show a strong chance of success on the merits, he need only show a possibility of irreparable harm. Where, on the other hand, a party can show only that serious questions are raised, he must show that the balance of hardships tips sharply in his favor." Bernard v. Air Line Pilots Ass'n, Int'l, AFL-CIO, 873 F.2d 213, 215 (9th Cir.1989).

IV. COPYRIGHT INFRINGEMENT

The district court granted summary judgment in favor of MAI on its claims of copyright infringement and issued a permanent injunction against Peak on these claims. The alleged copyright violations include: (1) Peak's running of MAI software licenced to Peak customers; (2) Peak's use of unlicensed software at its headquarters; and, (3) Peak's loaning of MAI computers and software to its customers. Each of these alleged violations must be considered separately.

A. Peak's running of MAI software licenced to Peak customers

To prevail on a claim of copyright infringement, a plaintiff must prove ownership of a copyright and a "`copying' of protectable expression" beyond the scope of a license. S.O.S., Inc. v. Payday, Inc., 886 F.2d 1081, 1085 (9th Cir.1989).

MAI software licenses allow MAI customers to use the software for their own internal information processing.[4] This allowed use necessarily includes the loading of the software into the computer's random access memory ("RAM") by a MAI customer. However, MAI software licenses do not allow for the use or copying of MAI software by third parties such as Peak. Therefore, any "copying" done by Peak is "beyond the scope" of the license.

It is not disputed that MAI owns the copyright to the software at issue here, however, Peak vigorously disputes the district court's conclusion that a "copying" occurred under the Copyright Act.

The Copyright Act defines "copies" as: material objects, other than phonorecords, in which a work is fixed by any method now known or later developed, and from which the work can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device.

17 U.S.C. § 101.

The Copyright Act then explains:

A work is "fixed" in a tangible medium of expression when its embodiment in a copy or phonorecord, by or under the authority of the author, is sufficiently permanent or stable to permit it to be perceived, reproduced, or otherwise communicated [518] for a period of more than transitory duration.

17 U.S.C. § 101.

The district court's grant of summary judgment on MAI's claims of copyright infringement reflects its conclusion that a "copying" for purposes of copyright law occurs when a computer program is transferred from a permanent storage device to a computer's RAM. This conclusion is consistent with its finding, in granting the preliminary injunction, that: "the loading of copyrighted computer software from a storage medium (hard disk, floppy disk, or read only memory) into the memory of a central processing unit ("CPU") causes a copy to be made. In the absence of ownership of the copyright or express permission by license, such acts constitute copyright infringement." We find that this conclusion is supported by the record and by the law.

Peak concedes that in maintaining its customer's computers, it uses MAI operating software "to the extent that the repair and maintenance process necessarily involves turning on the computer to make sure it is functional and thereby running the operating system." It is also uncontroverted that when the computer is turned on the operating system is loaded into the computer's RAM. As part of diagnosing a computer problem at the customer site, the Peak technician runs the computer's operating system software, allowing the technician to view the systems error log, which is part of the operating system, thereby enabling the technician to diagnose the problem.[5]

Peak argues that this loading of copyrighted software does not constitute a copyright violation because the "copy" created in RAM is not "fixed." However, by showing that Peak loads the software into the RAM and is then able to view the system error log and diagnose the problem with the computer, MAI has adequately shown that the representation created in the RAM is "sufficiently permanent or stable to permit it to be perceived, reproduced, or otherwise communicated for a period of more than transitory duration."

After reviewing the record, we find no specific facts (and Peak points to none) which indicate that the copy created in the RAM is not fixed. While Peak argues this issue in its pleadings, mere argument does not establish a genuine issue of material fact to defeat summary judgment. A party opposing a properly supported motion for summary judgment may not rest upon the mere allegations or denials in pleadings, but "must set forth specific facts showing that there is a genuine issue for trial." Fed.R.Civ.Proc. 56(e); Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 248, 106 S.Ct. 2505, 2510, 91 L.Ed.2d 202 (1986); Harper v. Wallingford, 877 F.2d 728 (9th Cir.1989).

The law also supports the conclusion that Peak's loading of copyrighted software into RAM creates a "copy" of that software in violation of the Copyright Act. In Apple Computer, Inc. v. Formula Int'l, Inc., 594 F.Supp. 617, 621 (C.D.Cal.1984), the district court held that the copying of copyrighted software onto silicon chips and subsequent sale of those chips is not protected by § 117 of the Copyright Act. Section 117 allows "the `owner'[6] of a copy of a computer program to make or authorize the making of another copy" without infringing copyright law, if it "is an essential step in the utilization of the computer program" or if the new copy is "for archival purposes [519] only." 17 U.S.C. § 117 (Supp.1988).[7] One of the grounds for finding that § 117 did not apply was the court's conclusion that the permanent copying of the software onto the silicon chips was not an "essential step" in the utilization of the software because the software could be used through RAM without making a permanent copy. The court stated:

RAM can be simply defined as a computer component in which data and computer programs can be temporarily recorded. Thus, the purchaser of [software] desiring to utilize all of the programs on the diskette could arrange to copy [the software] into RAM. This would only be a temporary fixation. It is a property of RAM that when the computer is turned off, the copy of the program recorded in RAM is lost.

Apple Computer at 622.

While we recognize that this language is not dispositive, it supports the view that the copy made in RAM is "fixed" and qualifies as a copy under the Copyright Act.

We have found no case which specifically holds that the copying of software into RAM creates a "copy" under the Copyright Act. However, it is generally accepted that the loading of software into a computer constitutes the creation of a copy under the Copyright Act. See e.g. Vault Corp. v. Quaid Software Ltd., 847 F.2d 255, 260 (5th Cir.1988) ("the act of loading a program from a medium of storage into a computer's memory creates a copy of the program"); 2 Nimmer on Copyright, § 8.08 at 8-105 (1983) ("Inputting a computer program entails the preparation of a copy."); Final Report of the National Commission on the New Technological Uses of Copyrighted Works, at 13 (1978) ("the placement of a work into a computer is the preparation of a copy"). We recognize that these authorities are somewhat troubling since they do not specify that a copy is created regardless of whether the software is loaded into the RAM, the hard disk or the read only memory ("ROM"). However, since we find that the copy created in the RAM can be "perceived, reproduced, or otherwise communicated," we hold that the loading of software into the RAM creates a copy under the Copyright Act. 17 U.S.C. § 101. We affirm the district court's grant of summary judgment as well as the permanent injunction as it relates to this issue.

B. Use of unlicensed software at headquarters

It is not disputed that Peak has several MAI computers with MAI operating software "up and running" at its headquarters. It is also not disputed that Peak only has a license to use MAI software to operate one system. As discussed above, we find that the loading of MAI's operating software into RAM, which occurs when an MAI system is turned on, constitutes a copyright violation. We affirm the district court's grant of summary judgment in favor of MAI on its claim that Peak violated its copyright through the unlicensed use of MAI software at Peak headquarters, and also affirm the permanent injunction as it relates to this issue.

C. Loaning of MAI computers and software

MAI contends that Peak violated the Copyright Act by loaning MAI computers and software to its customers. Among the exclusive rights given to the owner of a copyrighted work is the right to distribute copies of the work by lending. 17 U.S.C. § 106(3). Therefore, Peak's loaning of MAI software, if established, would constitute a violation of the Copyright Act.

[520] MAI argues that it is clear that Peak loaned out MAI computers because Peak advertisements describe the availability of loaner computers for its customers and Chiechi admitted that the available loaners included MAI computers. However, there was no evidence that a MAI computer was ever actually loaned to a Peak customer. Paul Boulanger, a Senior Field Engineer at Peak, testified in his deposition that he was not aware of any MAI systems being loaned to Peak customers or of any customer asking for one. Charles Weiner, a Field Service Manager at Peak, testified in his deposition that he did not have any knowledge of MAI systems being loaned to customers. Weighing this evidence in the light most favorable to Peak, whether Peak actually loaned out any MAI system remains a genuine issue of material fact.

As a general rule, a permanent injunction will be granted when liability has been established and there is a threat of continuing violations. See, National Football League v. McBee & Bruno's, Inc., 792 F.2d 726, 732 (8th Cir.1986); 3 Nimmer on Copyright § 14.06[B] at 14-88. However § 502(a) of the Copyright Act authorizes the court to "grant temporary and final injunctions on such terms as it may deem reasonable to prevent or restrain infringement of a copyright." 17 U.S.C. § 502(a) (emphasis added). While there has been no showing that Peak has actually loaned out any MAI software, the threat of a violation is clear as Peak has MAI computers in its loaner inventory. The permanent injunction is upheld as it relates to this issue.

V. MISAPPROPRIATION OF TRADE SECRETS

The district court granted summary judgment in favor of MAI on its misappropriation of trade secrets claims and issued a permanent injunction against Peak on these claims. The permanent injunction prohibits Peak from "misappropriating, using in any manner in their business, including advertising connected therewith, and/or disclosing to others MAI's trade secrets," including: (1) MAI Customer Database; (2) MAI Field Information Bulletins ("FIB"); and, (3) MAI software.

Peak argues that since MAI's motion for summary judgment only included argument regarding the customer database as a trade secret that the grant of summary judgment on the FIBs and software was overbroad. However, in Celotex Corp. v. Catrett, 477 U.S. 317, 106 S.Ct. 2548, 91 L.Ed.2d 265 (1986), the Supreme Court held that "so long as the losing party was on notice that she had to come forward with all of her evidence," summary judgment can properly be entered. Id. at 326, 106 S.Ct. at 2554. Although Celotex dealt with the court's authority to grant summary judgment sua sponte, its notice analysis is applicable to any summary judgment motion.

MAI argues that Peak had adequate notice because, while MAI only presented argument regarding the customer database, it moved for summary judgment on its claims of misappropriation of trade secrets generally, and, because MAI's Statement of Uncontroverted Facts included statements that the FIBs and software were trade secrets. We agree. However, we do not agree with MAI's contention that Peak has waived its right to appeal summary judgment on these issues by failing address the merits in the district court. Therefore, we reach the merits of the grant of summary judgment on each trade secret claim.

A. Customer Database

California has adopted the Uniform Trade Secrets Act ("UTSA") which codifies the basic principles of common law trade secret protection. Cal.Civ.Code §§ 3426-3426.10 (West Supp.1993). To establish a violation under the UTSA, it must be shown that a defendant has been unjustly enriched by the improper appropriation, use or disclosure of a "trade secret."

Peak argues both that the MAI Customer Database is not a "trade secret," and that even if it is a trade secret, that Peak did not "misappropriate" it.

The UTSA defines a "trade secret" as:

[521] information, including a formula, pattern, compilation, program, device, method, technique, or process, that:

(1) Derives independent economic value, actual or potential, from not being generally known to the public or to other persons who can obtain economic value from its disclosure or use; and

(2) Is the subject of efforts that are reasonable under the circumstances to maintain its secrecy.

Cal.Civ.Code § 3426.1(d) (West Supp.1993).

MAI contends its Customer Database is a valuable collection of data assembled over many years that allows MAI to tailor its service contracts and pricing to the unique needs of its customers and constitutes a trade secret.

We agree that the Customer Database qualifies as a trade secret. The Customer Database has potential economic value because it allows a competitor like Peak to direct its sales efforts to those potential customers that are already using the MAI computer system. Further, MAI took reasonable steps to insure the secrecy to this information as required by the UTSA. MAI required its employees to sign confidentiality agreements respecting its trade secrets, including the Customer Database. Thus, under the UTSA, the MAI Customer Database constitutes a trade secret.

We also agree with MAI that the record before the district court on summary judgment establishes that Peak misappropriated the Customer Database.

"Misappropriation" is defined under the UTSA as:

(1) Acquisition of a trade secret of another by a person who knows or has reason to know that the trade secret was acquired by improper means;[8] or

(2) Disclosure or use of a trade secret of another without express or implied consent by a person who:

(A) Used improper means to acquire knowledge of the trade secret; or

(B) At the time of disclosure or use, knew or had reason to know that his or her knowledge of the trade secret was: (i) Derived from or through a person who had utilized improper means to acquire it; (ii) Acquired under circumstances giving rise to a duty to maintain its secrecy or limit its use; or (iii) Derived from or through a person who owed a duty to the person seeking relief to maintain its secrecy or limit its use; or

(C) Before a material change of his or her position knew or had reason to know that it was a trade secret and that knowledge of it had been acquired by accident or by mistake.

Cal.Civ.Code § 3426.1(b) (West Supp.1993).

Peak contends that Francis never physically took any portion of MAI's customer database and that neither Francis nor any-one under his direction put information he had obtained from working at MAI in the Peak database. However, to find misappropriation under the UTSA, this need not be established.

The UTSA definition of "misappropriation" has been clarified by case law which establishes that the right to announce a new affiliation, even to trade secret clients of a former employer, is basic to an individual's right to engage in fair competition, and that the common law right to compete fairly and the right to announce a new business affiliation have survived the enactment of the UTSA. American Credit Indem. Co. v. Sacks, 213 Cal. App.3d 622, 262 Cal.Rptr. 92, 99-100 (Cal. Ct.App.1989). However, misappropriation occurs if information from a customer database is used to solicit customers. Id.

Merely informing a former employer's customers of a change of employment, without more, is not solicitation. Id. 262 Cal.Rptr. at 99 (citing Aetna Bldg. Maintenance Co. v. West, 39 Cal.2d 198, 246 P.2d 11 (1952)). However, in this case, Francis did more than merely announce his new affiliation with Peak. When Francis began [522] working for Peak, he called MAI customers whose names he recognized. Additionally, Francis personally went to visit some of these MAI customers with proposals to try and get them to switch over to Peak. These actions constituted solicitation and misappropriation under the UTSA definition. We affirm the district court's grant of summary judgment in favor of MAI on its claim that Peak misappropriated its Customer Database and affirm the permanent injunction as it relates to this issue.

B. Field Information Bulletins

MAI argues summary judgment was properly granted on its claim of misappropriation of the FIBs because the FIBs are a valuable trade secret of MAI and the evidence showed that the FIBs were being used by Peak to operate a business competing unfairly with MAI.

We agree that the FIBs constitute trade secrets. It is uncontroverted that they contain technical data developed by MAI to aid in the repair and servicing of MAI computers, and that MAI has taken reasonable steps to insure that the FIBs are not generally known to the public.

However, whether Peak has misappropriated the FIBs remains a genuine issue of material fact. The only evidence introduced by MAI to establish Peak's use of the FIBs is Peak's advertisements claiming that "Peak's system specialists are specifically trained on the latest hardware releases on MAI Basic Four." MAI asserts that if Peak did not use FIBs that this claim would have to be false. However, Weiner and Boulanger testified in their depositions that they had never seen a FIB at Peak. Similarly, Boulanger, Robert Pratt and Michael McIntosh[9] each testified that they did not have any FIB information when they left MAI. Weighing this evidence in the light most favorable to Peak, whether Peak used any of the FIBs remains a genuine issue of material fact, and the district court's grant of summary judgment on this claim of trade secret misappropriation is reversed and the permanent injunction is vacated as it relates to this issue.

C. Software

MAI contends the district court properly granted summary judgment on its claim of misappropriation of software because its software constitutes valuable unpublished works that allow its machines to be maintained. MAI argues that Peak misappropriated the software by loading it into the RAM.

We recognize that computer software can qualify for trade secret protection under the UTSA. See e.g., S.O.S., Inc. v. Payday, Inc., 886 F.2d 1081, 1089-90 (9th Cir.1989). However, a plaintiff who seeks relief for misappropriation of trade secrets must identify the trade secrets and carry the burden of showing that they exist. Diodes, Inc. v. Franzen, 260 Cal.App.2d 244, 67 Cal.Rptr. 19, 22-24 (1968); see also Universal Analytics Inc. v. MacNeal-Schwendler Corp., 707 F.Supp. 1170, 1177 (C.D.Cal.1989) (plaintiff failed to inform defendant or the court "precisely which trade secret it alleges was misappropriated"), aff'd, 914 F.2d 1256 (9th Cir.1990).

Here, while MAI asserts that it has trade secrets in its diagnostic software and operating system, and that its licensing agreements constitute reasonable efforts to maintain their secrecy, MAI does not specifically identify these trade secrets. In his Declaration, Joseph Perez, a Customer Service Manager at MAI, stated that the diagnostic software "contain valuable trade secrets of MAI," however, the Declaration does not specify what these trade secrets are. Additionally, we find no declaration or deposition testimony which specifically identifies any trade secrets. Since the trade secrets are not specifically identified, we cannot determine whether Peak has misappropriated any trade secrets by running the MAI operating software and/or diagnostic software in maintaining MAI systems for its customers, and we reverse the district court's grant of summary judgment in favor of MAI on its claim that [523] Peak misappropriated trade secrets in its computer software and vacate the permanent injunction as it relates to this issue.

VI. BREACH OF CONTRACT

The district court granted summary judgment in favor of MAI on its breach of contract claim against Eric Francis. It is clear from the depositions of Francis and Chiechi that Francis solicited customers and employees of MAI in breach of his employment contract with MAI, and we affirm the district court's grant of summary judgment on this issue and affirm the permanent injunction as it relates to this claim.

VII. PRELIMINARY INJUNCTION

A. Trademark Infringement

In granting the preliminary injunction, the district court found that Peak advertisements that "MAI Basic Four" computers are part of "Peak's Product Line" imply that Peak is a MAI dealer for new computers and constitute trademark infringement. The district court also found that: "Such acts are likely to cause confusion, mistake or deception in that potential purchasers of MAI computers and/or maintenance services will be led to believe that Peak's activities are associated with or sanctioned or approved by MAI."

Peak claims that the district court erred in granting the preliminary injunction because it did not apply the legal tests established by the Ninth Circuit to evaluate whether a likelihood of confusion existed. See e.g., J.B. Williams Co. v. Le Conte Cosmetics, Inc., 523 F.2d 187, 191 (9th Cir.1975) (five factor test to determine likelihood of confusion) cert. denied, 424 U.S. 913, 96 S.Ct. 1110, 47 L.Ed.2d 317 (1976); AMF, Inc. v. Sleekcraft Boats, 599 F.2d 341, 348-49 (9th Cir.1979) (eight factor test). However, the district court was not required to consider all these factors. As we recognized in Apple Computer, Inc. v. Formula Int'l, Inc., 725 F.2d 521 (9th Cir. 1984):

[I]n granting a preliminary injunction, the parties will not have had a full opportunity to either develop or present their cases and the district court will have had only a brief opportunity to consider the different factors relative to the likelihood of confusion determination.... The appropriate time for giving full consideration to [these factors] is when the merits of the case are tried.

Id. at 526 (citations and quotations omitted).

Peak has not shown how the district court clearly erred in its preliminary trademark conclusions. Accordingly, the district court did not abuse its discretion and this portion of the preliminary injunction is upheld.

B. False Advertising

In granting the preliminary injunction, the district court found that "Peak's advertising ... falsely misleads the public as to Peak's capability of servicing and maintaining MAI computer systems." The injunction prohibits Peak from "advertising, directly or indirectly, that MAI Basic Four is part of Peak's Product line, that Peak has `satellite facilities,' and/or that Peak's technicians are `specifically trained on the latest hardware releases of MAI.'"

Peak argues that these representations in its ads are not false. However, the district court's findings are supported by the record. Depositions show that Peak is not an authorized MAI dealer, that its technicians receive no ongoing training and that its "satellite facilities" are actually storage sheds. Perhaps the storage sheds could be legitimately characterized as satellite facilities, but the district court's conclusion otherwise was not clearly erroneous. Accordingly, the district court did not abuse its discretion and this portion of the preliminary injunction is upheld.

VIII. CONCLUSION

The following sections of the preliminary injunction issued by the district court on April 15, 1992 have been mooted by that court's issuing of a permanent injunction:

Section (A)(1), enjoining defendants from infringing MAI's copyrights; Section (A)(2) enjoining defendants from misappropriating [524] MAI trade secrets; Section (A)(3) enjoining defendants from maintaining MAI computers; Section (A)(4) enjoining defendants from soliciting customers; and, Section (A)(5) enjoining defendants from maintaining certain customer contracts.

The remainder of the district court's preliminary injunction shall remain in effect pending the district court's final judgment. Earlier orders of this court temporarily staying portions of the injunction are vacated.

The permanent injunction issued by the district court on February 2, 1993, is vacated to the following extent:

Section (A)(2)(a), enjoining defendants from "misappropriating ... MAI's trade secrets" is vacated as it relates to MAI's software and MAI's Field Information Bulletins.

The remainder of the permanent injunction shall remain in effect. Earlier orders of this court temporarily staying portions of the injunction are vacated.

The district court's grant of summary judgment is AFFIRMED in part and REVERSED in part. This case is REMANDED for proceedings consistent with this opinion.

[1] The panel unanimously finds this case suitable for decision without oral argument. Fed. R.App.P. 34(a); Ninth Circuit Rule 34-4.

[2] These issues include trademark infringement and false advertising.

[3] The Central District of California's Local Rule 7.14 provides for the filing of a Statement of Uncontroverted Facts and Conclusions of Law with each motion for summary judgment and for the filing of a Statement of Genuine Issues of Material Fact with all opposition papers. In granting summary judgment, the district court had before it these papers as well as MAI's Motion for Summary Judgment, Peak's Opposition, and MAI's Response. MAI's Statement of Uncontroverted Facts and Conclusions of Law and Peak's Statement of Genuine Issues of Material Fact rely on the declarations and deposition testimony which were filed with the district court in connection with MAI's earlier motion for a preliminary injunction. These declarations and deposition testimony make up the record in this case.

[4] A representative MAI software license provides in part:

4. Software License.

(a) License.... Customer may use the Software (one version with maximum of two copies permitted — a working and a backup copy) ... solely to fulfill Customer's own internal information processing needs on the particular items of Equipment ... for which the Software is configured and furnished by [MAI]. The provisions of this License ... shall apply to all versions and copies of the Software furnished to Customer pursuant to this Agreement. The term "Software" includes, without limitation, all basic operating system software....

(b) Customer Prohibited Acts.... Any possession or use of the Software ... not expressly authorized under this License or any act which might jeopardize [MAI]'s rights or interests in the Software ... is prohibited, including without limitation, examination, disclosure, copying, modification, reconfiguration, augmentation, adaptation, emulation, visual display or reduction to visually perceptible form or tampering....

(c) Customer Obligations. Customer acknowledges that the Software is [MAI]'s valuable and exclusive property, trade secret and copyrighted material. Accordingly, Customer shall ... (i) use the Software ... strictly as prescribed under this License, (ii) keep the Software ... confidential and not make [it] available to others....

A representative diagnostic license agreement provides in part:

6. Access/Non-Disclosure.

Licensee shall not give access nor shall it disclose the Diagnostics (in any form) ... to any person ... without the written permission of [MAI]. Licensee may authorize not more than three (3) of its bona fide employees to utilize the Diagnostics ... if, and only if, they agree to be bound by the terms hereof.

[5] MAI also alleges that Peak runs its diagnostic software in servicing MAI computers. Since Peak's running of the operating software constitutes copyright violation, it is not necessary for us to directly reach the issue of whether Peak also runs MAI's diagnostic software. However, we must note that Peak's field service manager, Charles Weiner, admits that MAI diagnostic software is built into the MAI MPx system and, further, that if Peak loads the MAI diagnostic software from whatever source into the computer's RAM, that such loading will produce the same copyright violation as loading the operating software.

[6] Since MAI licensed its software, the Peak customers do not qualify as "owners" of the software and are not eligible for protection under § 117.

[7] The current § 117 was enacted by Congress in 1980, as part of the Computer Software Copyright Act. This Act adopted the recommendations contained in the Final Report of the National Commission on New Technological Uses of Copyrighted Works ("CONTU") (1978). H.R.Rep. No. 1307, 96th Cong., 2d Sess., pt. 1, at 23. The CONTU was established by Congress in 1974 to perform research and make recommendations concerning copyright protection for computer programs. The new § 117 reflects the CONTU's conclusion that: "Because the placement of a work into a computer is the preparation of a copy, the law should provide that persons in rightful possession of copies of programs be able to use them freely without fear of exposure to copyright liability." Final Report at 13.

[8] The UTSA defines "improper means," as "theft, bribery, misrepresentation, breach or inducement of a breach of a duty to maintain secrecy, or espionage through electronic or other means." Cal.Civ.Code § 3426.1(a) (West Supp.1993).

[9] Pratt and Boulanger are both computer technicians who left MAI to work at Peak.

6.1.5 2.28 James H. Hutson, Americans and the Swiss constitution of 1848, excerpt, in The Sister Republics, Switzerland and the United States from 1776 to the Present, Library of Congress, Washington DC, 1991, p. 32 - 41 6.1.5 2.28 James H. Hutson, Americans and the Swiss constitution of 1848, excerpt, in The Sister Republics, Switzerland and the United States from 1776 to the Present, Library of Congress, Washington DC, 1991, p. 32 - 41

This is the edited section 117 after MAI v. Peak. Does it solve all the problems of that case? What if software is licensed rather than owned?

a) Background

A Special focus of this part of the Anthology is on the cultural exchanges and cultural encounters between Switzerland and the United States. According to James Hutson it is not immodest to say that we are talking about a special relationship. He writes in the introduction to the book at hand, that in 1776 the government of Switzerland known to its citizens as Eidgenossenschaft (community of the oath) had existed for almost 500 years. The Eidgenossenschaft was a Confederacy of 13 states called Cantons, which where republics of various sizes, some democratic, others aristocratic”. Republics were rare in 1776 and had little company in 18th century Europe. As the introduction states, therefore, many Swiss welcomed the Declaration of Independence of the United States “since it ushered a soulmate into the community of nations.” Republicanism was not the only bond between Switzerland and the United States. From 1776 on, political developments in one country often paralleled those in the other, and on important occasions served as a constitutional model for the others. First, according to James Hutson, the Amercian national constitution, the Articles of Confederation, was constructed on the Swiss model of a confederacy of some over sovereign states. Then, Americans repudiated confederal government in 1787 as impotent and unworkable and adapted a new federal constitution. The opponents of the new charter, the Anti Federalists argued that a Swiss style government was still a viable model which offered the best hope for the preservation of American liberty. The Swiss themselves repudiated confederate government in 1848 using many of the same arguments Americans had marshalled against it in 1787 and adapted a Federal constitution modelled after the American constitution of 1787. After the Civil War many American state and local governments adapted constitutional reforms borrowed from the Swiss. The initiative and referendum – which continues to this hour to give the politics of California and other influential states their distinctive tone. The institutional borrowing, according to James Hutson, between the United States and Switzerland ceased after the first World War. Not long afterwards Swiss and Americans ceased referring to each others countries as sister republics.

The editor has divided the book in various chapters, following the chronological order of the book and parallelizing it with the chronological and topical order of the part of the Americanization of Swiss law and legal culture of the Anthology. The book is a welcome addition to the views of the legal relationship between the United States and Switzerland by an American view. The book is vividly written and contains pictures. It is addressed to a broader public and contains a number of footnotes for further research. It is a short and coherent “red thread” (Roter Faden) of the history of the relationship from 1776 to about the first World War.

The author of the book James H. Hutson received his PhD in history from Yale University in 1964. He has been a member of the history department in Yale and William and Mary. Since 1982 he has been chief of the Libraries manuscript division. Dr. Hutson is the author of several books (see biography). We particularly draw the attention to a text written after World War II on the bombing of the Swiss city of Schaffhausen in April 1944 by American airplanes.

b) Summary

The text at hand is a chapter of the book The Sister Republics, Switzerland and the United States, from 1776 to the present, which accompanied an exhibition of the Library of Congress opening in May 1991 to celebrate the 700th anniversary of Switzerland.

The chapter of Hutsons book has to be read in conjunction with the text of William Rappard on Pennsylvania and Switzerland; the Americanization of the Swiss constitution, 1848 (text 2.27), which Hutson cites on several occasions. This chapter again contains interesting insights from an American perspective, which are relevant to the broader concept of the Anthology on legal culture.

"Sympathy for the American cause was far from universal in Switzerland. Though more scholarship is needed to establish the point, it appears that the Swiss divided along class lines in their reaction to the American Revolution. The secretary to the British Embassy in Bern reported to his superiors in 1780 that Swiss elites wanted to see the rebellion crushed, apparently because the subversion of authority being achieved by the Americans might prove contagious among restive populations in various Swiss Cantons. Their fears were evidently well founded, for scholars have claimed that the American Revolution was the model (Vorbild) for two of the most striking episodes of popular unrest in eighteenth century Swiss history: the peasant revolt led by Nicolas Chenaux against the government of Fribourg in 1781 and the Stäfa affair in the Canton of Zurich in 1795-96."

According to Hutson, there is no doubt, that the turmoil, created by the French Revolution focused the attention of many Swiss on the American constitution of 1787. In 1798 French troops invaded Switzerland, rapidly conquerded it and imposed the bone and indivisible Helvetic Republic. The Helvetic Republic was an example of what the American antifederalist called a "consolidated" government. The sovereignity and the independence of the Cantons were abolished and all power was exercised by a five-man directory.-Few were sorry when it collapsed in 1803. According to Hutson many Swiss who opposed the Helvetic Republic, did not want to revert to the politics of the old Confederation, in which the old Cantonal sovereignty had frustrated the achievement of worthy national objectives. What was needed, according to Hutson, was a federal system, such as the framers of the American Constitution had established in 1787. "According to William Rappard the trauma of the Helvetic Republic made the United States "very fashionable" with the Swiss. Politicians, academics and clerymen began extolling the American constitution as a model for Switzerland.

The text at hand comments the trials of tribulations of Switzerland in 1803 , in 1813 and the later steps of 1815 arguing that the revolution in Paris that year had encouraged Swiss liberals to oust, the aristocratic leadership. Many of the important Cantons established new governments that were based, according to Hutson, on a model of Jacksonian Democracy In the United States of popular sovereignty. Swiss liberals though were not prepared to open the door of political participation as wide as the Americans were. The text then traces step by step the developments up to 1848. Attractive though the American model appears to have been to many sections of the Swiss public, Swiss politicians, were in no hurry to adopt it as foundation of a new constitutional order. After the Swiss "Civil War" the political situation was such, that the diet installed a comitee to devise a Constitution, the drafting of which would be controlled by liberals and radicals. Hutson notes the uneven length of the constitutional document and cites Rappard again that it was drafted as a "conscious and deliberate imitation of American model". This was specifically the case in regard to bicameralism and federalism. As to federalism, the Swiss constitution of 1848, like the American constitution  of 1787, converted a league of sovereign states into a federal state, in which power was divided between different levels of government. Hutson notes differences in the making of the seperation of powers, the executive branch as the Swiss Federal Tribunal and finally as regards the power given to the central  government.

The text ends: "Despite these differences - and it would be possible to mention more - the important fact to remember in assessing the ties between the Sister Republics is that the major institutional features of the Swiss Constitution of 1848 - bicameralism and federalism - were copied from the American Constitution of 1787. As a Swiss scholar has recently asserted, one "could almost speak of a plagiary. " – a citation of an unpublished paper "The United States Constitution and Switzerland"of Jean-Francois Aubert, one of the most learned representatives of Swiss constitutional law, who was American trained as well.

c) Text

You can find a scan (PDF) of the original text here:
A_2.28_HUTSON_American And Swiss Constitution 1848

6.1.6 Cartoon Network LP v. CSC Holdings, Inc. 6.1.6 Cartoon Network LP v. CSC Holdings, Inc.

536 F.3d 121

The CARTOON NETWORK LP, LLLP and Cable News Network L.P., L.L.L.P., Plaintiffs-Counter-Claimants-Defendants-Appellees,
Twentieth Century Fox Film Corporation, Universal City Studios Productions LLLP, Paramount Pictures Corporation, Disney Enterprises Inc., CBS Broadcasting Inc., American Broadcasting Companies, Inc., NBC Studios, Inc., Plaintiffs-Counter-Defendants-Appellees,
v.
CSC HOLDINGS, INC. and Cablevision Systems Corporation, Defendants-Counterclaim-Plaintiffs-Third-Party Plaintiffs-Appellants,
v.
Turner Broadcasting System, Inc., Cable News Network LP, LLP, Turner Network Sales, Inc., Turner Classic Movies, L.P., LLLP, Turner Network Television LP, LLLP, Third-Party-Defendants-Appellees.

Docket No. 07-1480-cv(L).

Docket No. 07-1511-cv(CON).

United States Court of Appeals, Second Circuit.

Argued: October 24, 2007.

Decided: August 4, 2008.

[536 F.3d 122]  Jeffrey A. Lamken (Robert K. Kry and Joshua A. Klein, on the brief), Baker Botts L.L.P., Washington, D.C., and Timothy A. Macht (on the brief), New York, N.Y., for Defendants-Appellants.

Katherine B. Forrest (Antony L. Ryan, on the brief), Cravath, Swaine & Moore LLP, New York, N.Y., for Plaintiffs-Appellees The Cartoon Network LP, LLLP, et al.

Robert Alan Garrett (Hadrian R. Katz, Jon Michaels, Peter L. Zimroth, and Eleanor Lackman, on the brief), Arnold & Porter LLP, Washington, D.C., for Plaintiffs-Appellees Twentieth Century Fox Film Corporation, et al.

Marc E. Isserles, Cohen & Gresser LLP, New York, N.Y., for Amici Curiae Law Professors.

Henry A. Lanman, Trachtenberg Rodes & Friedberg LLP, New York, N.Y., for Amicus Curiae Professor Timothy Wu.

Solveig Singleton, The Progress & Freedom Foundation, Washington, D.C., for Amicus Curiae Progress & Freedom Foundation.

Carol A. Witschel, White & Case LLP, and Richard H. Reimer, New York, N.Y., for Amicus Curiae The American Society of Composers, Authors & Publishers.

Michael E. Salzman, Hughes Hubbard & Reed LLP, and Marvin Berenson, Broadcast Music Inc., New York, N.Y., for Amicus Curiae Broadcast Music, Inc.

David Sohn, Center for Democracy & Technology, Washington, D.C., Fred von Lohman, Electronic Freedom Foundation, San Francisco, Cal., Sherwin Siy, Public Knowledge, Washington D.C., William P. Heaston, Broadband Service Providers Association Regulatory Committee, Jonathan Band PLLC, Washington, D.C., Julie [536 F.3d 123] Kearney, Consumer Electronics Association, Arlington, Va., Michael F. Altschul et al., CTIA-The Wireless Association®, Washington, D.C., Jonathan Banks, USTelecom, Washington, D.C., Michael K. Kellogg et al., Kellogg, Huber, Hansen, Todd, Evans & Figel, P.L.L.C., Washington D.C., for Amici Curiae Center for Democracy & Technology et al.

Donald B. Verrilli, Jr., et al., Jenner & Block LLP, Washington, D.C., Kenneth L. Doroshow & Scott A. Zebrak, Recording Industry Association of America, Washington, D.C., Jacqueline C. Charlesworth, National Music Publishers' Association, Washington, D.C., Victor S. Perlman, American Society of Media Photographers, Inc., Philadelphia, Pa., Allan Robert Adler, Association of American Publishers, Washington, D.C., Linda Steinman, Davis Wright Tremaine LLP, New York, N.Y., David Korduner, Directors Guild of America, Inc., Los Angeles, Cal., Frederic Hirsch & Chun T. Wright, Entertainment Software Association, Washington, D.C., Susan Cleary, Independent Film & Television Alliance, Los Angeles, Cal., Gary Gertzog, National Football League, New York, N.Y., Thomas Ostertag, Office of the Commissioner of Baseball, New York, N.Y., Duncan Crabtree-Ireland, Screen Actors Guild, Inc., Los Angeles, Cal., John C. Beiter, Loeb & Loeb, LLP, Nashville, Tenn., Anthony R. Segall, Writers Guild of America, West, Inc., Los Angeles, Cal., for Amici Curiae American Society of Media Photographers, Inc. et al.

Steven J. Metalitz & J. Matthew Williams, Washington, D.C., for Amicus Curiae Americans for Tax Reform.

Before: WALKER, SACK, and LIVINGSTON, Circuit Judges.

JOHN M. WALKER, JR., Circuit Judge:

Defendant-Appellant Cablevision Systems Corporation ("Cablevision") wants to market a new "Remote Storage" Digital Video Recorder system ("RS-DVR"), using a technology akin to both traditional, set-top digital video recorders, like TiVo ("DVRs"), and the video-on-demand ("VOD") services provided by many cable companies. Plaintiffs-Appellees produce copyrighted movies and television programs that they provide to Cablevision pursuant to numerous licensing agreements. They contend that Cablevision, through the operation of its RS-DVR system as proposed, would directly infringe their copyrights both by making unauthorized reproductions, and by engaging in public performances, of their copyrighted works. The material facts are not in dispute. Because we conclude that Cablevision would not directly infringe plaintiffs' rights under the Copyright Act by offering its RS-DVR system to consumers, we reverse the district court's award of summary judgment to plaintiffs, and we vacate its injunction against Cablevision.

BACKGROUND

Today's television viewers increasingly use digital video recorders ("DVRs") instead of video cassette recorders ("VCRs") to record television programs and play them back later at their convenience. DVRs generally store recorded programming on an internal hard drive rather than a cassette. But, as this case demonstrates, the generic term "DVR" actually refers to a growing number of different devices and systems. Companies like TiVo sell a stand-alone DVR device that is typically connected to a user's cable box and television much like a VCR. Many cable companies also lease to their subscribers "set-top storage DVRs," which combine many of the functions of a standard cable box and a stand-alone DVR in a single device.

[536 F.3d 124] In March 2006, Cablevision, an operator of cable television systems, announced the advent of its new "Remote Storage DVR System." As designed, the RS-DVR allows Cablevision customers who do not have a stand-alone DVR to record cable programming on central hard drives housed and maintained by Cablevision at a "remote" location. RS-DVR customers may then receive playback of those programs through their home television sets, using only a remote control and a standard cable box equipped with the RS-DVR software. Cablevision notified its content providers, including plaintiffs, of its plans to offer RS-DVR, but it did not seek any license from them to operate or sell the RS-DVR.

Plaintiffs, which hold the copyrights to numerous movies and television programs, sued Cablevision for declaratory and injunctive relief. They alleged that Cablevision's proposed operation of the RS-DVR would directly infringe their exclusive rights to both reproduce and publicly perform their copyrighted works. Critically for our analysis here, plaintiffs alleged theories only of direct infringement, not contributory infringement, and defendants waived any defense based on fair use.

Ultimately, the United States District Court for the Southern District of New York (Denny Chin, Judge), awarded summary judgment to the plaintiffs and enjoined Cablevision from operating the RS-DVR system without licenses from its content providers. See Twentieth Century Fox Film Corp. v. Cablevision Sys. Corp. (Cablevision I), 478 F.Supp.2d 607 (S.D.N.Y.2007). At the outset, we think it helpful to an understanding of our decision to describe, in greater detail, both the RS-DVR and the district court's opinion.

I. Operation of the RS-DVR System

Cable companies like Cablevision aggregate television programming from a wide variety of "content providers"—the various broadcast and cable channels that produce or provide individual programs—and transmit those programs into the homes of their subscribers via coaxial cable. At the outset of the transmission process, Cablevision gathers the content of the various television channels into a single stream of data. Generally, this stream is processed and transmitted to Cablevision's customers in real time. Thus, if a Cartoon Network program is scheduled to air Monday night at 8pm, Cartoon Network transmits that program's data to Cablevision and other cable companies nationwide at that time, and the cable companies immediately re-transmit the data to customers who subscribe to that channel.

Under the new RS-DVR, this single stream of data is split into two streams. The first is routed immediately to customers as before. The second stream flows into a device called the Broadband Media Router ("BMR"), id. at 613, which buffers the data stream, reformats it, and sends it to the "Arroyo Server," which consists, in relevant part, of two data buffers and a number of high-capacity hard disks. The entire stream of data moves to the first buffer (the "primary ingest buffer"), at which point the server automatically inquires as to whether any customers want to record any of that programming. If a customer has requested a particular program, the data for that program move from the primary buffer into a secondary buffer, and then onto a portion of one of the hard disks allocated to that customer. As new data flow into the primary buffer, they overwrite a corresponding quantity of data already on the buffer. The primary ingest buffer holds no more than 0.1 seconds of each channel's programming at any moment. Thus, every tenth of a second, the data residing on this buffer are automatically erased and replaced. The [536 F.3d 125] data buffer in the BMR holds no more than 1.2 seconds of programming at any time. While buffering occurs at other points in the operation of the RS-DVR, only the BMR buffer and the primary ingest buffer are utilized absent any request from an individual subscriber.

As the district court observed, "the RS-DVR is not a single piece of equipment," but rather "a complex system requiring numerous computers, processes, networks of cables, and facilities staffed by personnel twenty-four hours a day and seven days a week." Id. at 612. To the customer, however, the processes of recording and playback on the RS-DVR are similar to that of a standard set-top DVR. Using a remote control, the customer can record programming by selecting a program in advance from an on-screen guide, or by pressing the record button while viewing a given program. A customer cannot, however, record the earlier portion of a program once it has begun. To begin playback, the customer selects the show from an on-screen list of previously recorded programs. See id. at 614-16. The principal difference in operation is that, instead of sending signals from the remote to an on-set box, the viewer sends signals from the remote, through the cable, to the Arroyo Server at Cablevision's central facility. See id. In this respect, RS-DVR more closely resembles a VOD service, whereby a cable subscriber uses his remote and cable box to request transmission of content, such as a movie, stored on computers at the cable company's facility. Id. at 612. But unlike a VOD service, RS-DVR users can only play content that they previously requested to be recorded.

Cablevision has some control over the content available for recording: a customer can only record programs on the channels offered by Cablevision (assuming he subscribes to them). Cablevision can also modify the system to limit the number of channels available and considered doing so during development of the RS-DVR. Id. at 613.

II. The District Court's Decision

In the district court, plaintiffs successfully argued that Cablevision's proposed system would directly infringe their copyrights in three ways. First, by briefly storing data in the primary ingest buffer and other data buffers integral to the function of the RS-DVR, Cablevision would make copies of protected works and thereby directly infringe plaintiffs' exclusive right of reproduction under the Copyright Act. Second, by copying programs onto the Arroyo Server hard disks (the "playback copies"), Cablevision would again directly infringe the reproduction right. And third, by transmitting the data from the Arroyo Server hard disks to its RS-DVR customers in response to a "playback" request, Cablevision would directly infringe plaintiffs' exclusive right of public performance. See id. at 617. Agreeing with all three arguments, the district court awarded summary declaratory judgment to plaintiffs and enjoined Cablevision from operating the RS-DVR system without obtaining licenses from the plaintiff copyright holders.

As to the buffer data, the district court rejected defendants' arguments 1) that the data were not "fixed" and therefore were not "copies" as defined in the Copyright Act, and 2) that any buffer copying was de minimis because the buffers stored only small amounts of data for very short periods of time. In rejecting the latter argument, the district court noted that the "aggregate effect of the buffering" was to reproduce the entirety of Cablevision's programming, and such copying "can hardly be called de minimis." Id. at 621.

[536 F.3d 126] On the issue of whether creation of the playback copies made Cablevision liable for direct infringement, the parties and the district court agreed that the dispositive question was "who makes the copies"? Id. at 617. Emphasizing Cablevision's "unfettered discretion" over the content available for recording, its ownership and maintenance of the RS-DVR components, and its "continuing relationship" with its RS-DVR customers, the district court concluded that "the copying of programming to the RS-DVR's Arroyo servers ... would be done not by the customer but by Cablevision, albeit at the customer's request." Id. at 618, 620, 621.

Finally, as to the public performance right, Cablevision conceded that, during the playback, "the streaming of recorded programming in response to a customer's request is a performance." Id. at 622. Cablevision contended, however, that the work was performed not by Cablevision, but by the customer, an argument the district court rejected "for the same reasons that [it] reject[ed] the argument that the customer is `doing' the copying involved in the RS-DVR." Id. Cablevision also argued that such a playback transmission was not "to the public," and therefore not a public performance as defined in the Copyright Act, because it "emanates from a distinct copy of a program uniquely associated with one customer's set-top box and intended for that customer's exclusive viewing in his or her home." Id. The district court disagreed, noting that "Cablevision would transmit the same program to members of the public, who may receive the performance at different times, depending on whether they view the program in real time or at a later time as an RS-DVR playback." Id. at 623 (emphasis added). The district court also relied on a case from the Northern District of California, On Command Video Corp. v. Columbia Pictures Industries, 777 F.Supp. 787 (N.D.Cal.1991), which held that when the relationship between the transmitter and the audience of a performance is commercial, the transmission is "to the public," see Cablevision I, 478 F.Supp.2d at 623 (citing On Command, 777 F.Supp. at 790).

Finding that the operation of the RS-DVR would infringe plaintiffs' copyrights, the district court awarded summary judgment to plaintiffs and enjoined Cablevision from copying or publicly performing plaintiffs' copyrighted works "in connection with its proposed RS-DVR system," unless it obtained the necessary licenses. Cablevision I, 478 F.Supp.2d at 624. Cablevision appealed.

DISCUSSION

We review a district court's grant of summary judgment de novo. Bill Graham Archives v. Dorling Kindersley Ltd., 448 F.3d 605, 607 (2d Cir.2006).

"Section 106 of the Copyright Act grants copyright holders a bundle of exclusive rights...." Id. at 607-08. This case implicates two of those rights: the right "to reproduce the copyrighted work in copies," and the right "to perform the copyrighted work publicly." 17 U.S.C. § 106(1), (4). As discussed above, the district court found that Cablevision infringed the first right by 1) buffering the data from its programming stream and 2) copying content onto the Arroyo Server hard disks to enable playback of a program requested by an RS-DVR customer. In addition, the district court found that Cablevision would infringe the public performance right by transmitting a program to an RS-DVR customer in response to that customer's playback request. We address each of these three allegedly infringing acts in turn.

[536 F.3d 127] I. The Buffer Data

It is undisputed that Cablevision, not any customer or other entity, takes the content from one stream of programming, after the split, and stores it, one small piece at a time, in the BMR buffer and the primary ingest buffer. As a result, the information is buffered before any customer requests a recording, and would be buffered even if no such request were made. The question is whether, by buffering the data that make up a given work, Cablevision "reproduce[s]" that work "in copies," 17 U.S.C. § 106(1), and thereby infringes the copyright holder's reproduction right.

"Copies," as defined in the Copyright Act, "are material objects ... in which a work is fixed by any method ... and from which the work can be ... reproduced." Id. § 101. The Act also provides that a work is "`fixed' in a tangible medium of expression when its embodiment ... is sufficiently permanent or stable to permit it to be ... reproduced ... for a period of more than transitory duration." Id. (emphasis added). We believe that this language plainly imposes two distinct but related requirements: the work must be embodied in a medium, i.e., placed in a medium such that it can be perceived, reproduced, etc., from that medium (the "embodiment requirement"), and it must remain thus embodied "for a period of more than transitory duration" (the "duration requirement"). See 2 Melville B. Nimmer & David Nimmer, Nimmer on Copyright § 8.02[B][3], at 8-32 (2007). Unless both requirements are met, the work is not "fixed" in the buffer, and, as a result, the buffer data is not a "copy" of the original work whose data is buffered.

The district court mistakenly limited its analysis primarily to the embodiment requirement. As a result of this error, once it determined that the buffer data was "[c]learly ... capable of being reproduced," i.e., that the work was embodied in the buffer, the district court concluded that the work was therefore "fixed" in the buffer, and that a copy had thus been made. Cablevision I, 478 F.Supp.2d at 621-22. In doing so, it relied on a line of cases beginning with MAI Systems Corp. v. Peak Computer Inc., 991 F.2d 511 (9th Cir.1993). It also relied on the United States Copyright Office's 2001 report on the Digital Millennium Copyright Act, which states, in essence, that an embodiment is fixed "[u]nless a reproduction manifests itself so fleetingly that it cannot be copied." U.S. Copyright Office, DMCA Section 104 Report 111 (Aug.2001) ("DMCA Report") (emphasis added), available at http://www.copyright.gov/reports/studies/dmca/sec-104-report-vol-1.pdf.

The district court's reliance on cases like MAI Systems is misplaced. In general, those cases conclude that an alleged copy is fixed without addressing the duration requirement; it does not follow, however, that those cases assume, much less establish, that such a requirement does not exist. Indeed, the duration requirement, by itself, was not at issue in MAI Systems and its progeny. As a result, they do not speak to the issues squarely before us here: If a work is only "embodied" in a medium for a period of transitory duration, can it be "fixed" in that medium, and thus a copy? And what constitutes a period "of more than transitory duration"?

In MAI Systems, defendant Peak Computer, Inc., performed maintenance and repairs on computers made and sold by MAI Systems. In order to service a customer's computer, a Peak employee had to operate the computer and run the computer's copyrighted operating system software. See MAI Sys., 991 F.2d at 513. The issue in MAI Systems was whether, [536 F.3d 128] by loading the software into the computer's RAM,[1] the repairman created a "copy" as defined in § 101. See id. at 517. The resolution of this issue turned on whether the software's embodiment in the computer's RAM was "fixed," within the meaning of the same section. The Ninth Circuit concluded that

by showing that Peak loads the software into the RAM and is then able to view the system error log and diagnose the problem with the computer, MAI has adequately shown that the representation created in the RAM is "sufficiently permanent or stable to permit it to be perceived, reproduced, or otherwise communicated for a period of more than transitory duration."

Id. at 518 (quoting 17 U.S.C. § 101).

The MAI Systems court referenced the "transitory duration" language but did not discuss or analyze it. The opinion notes that the defendants "vigorously" argued that the program's embodiment in the RAM was not a copy, but it does not specify the arguments defendants made. Id. at 517. This omission suggests that the parties did not litigate the significance of the "transitory duration" language, and the court therefore had no occasion to address it. This is unsurprising, because it seems fair to assume that in these cases the program was embodied in the RAM for at least several minutes.

Accordingly, we construe MAI Systems and its progeny as holding that loading a program into a computer's RAM can result in copying that program. We do not read MAI Systems as holding that, as a matter of law, loading a program into a form of RAM always results in copying. Such a holding would read the "transitory duration" language out of the definition, and we do not believe our sister circuit would dismiss this statutory language without even discussing it. It appears the parties in MAI Systems simply did not dispute that the duration requirement was satisfied; this line of cases simply concludes that when a program is loaded into RAM, the embodiment requirement is satisfied—an important holding in itself, and one we see no reason to quibble with here.[2]

At least one court, relying on MAI Systems in a highly similar factual setting, has made this point explicitly. In Advanced Computer Services of Michigan, Inc. v. MAI Systems Corp., the district court expressly noted that the unlicensed user in that case ran copyrighted diagnostic software "for minutes or longer," but that the program's embodiment in the computer's RAM might be too ephemeral to be fixed if the computer had been shut down "within [536 F.3d 129] seconds or fractions of a second" after loading the copyrighted program. 845 F.Supp. 356, 363 (E.D.Va.1994). We have no quarrel with this reasoning; it merely makes explicit the reasoning that is implicit in the other MAI Systems cases. Accordingly, those cases provide no support for the conclusion that the definition of "fixed" does not include a duration requirement. See Webster v. Fall, 266 U.S. 507, 511, 45 S.Ct. 148, 69 L.Ed. 411 (1924) ("Questions which merely lurk in the record, neither brought to the attention of the court nor ruled upon, are not to be considered as having been so decided as to constitute precedents.").

Nor does the Copyright Office's 2001 DMCA Report, also relied on by the district court in this case, explicitly suggest that the definition of "fixed" does not contain a duration requirement. However, as noted above, it does suggest that an embodiment is fixed "[u]nless a reproduction manifests itself so fleetingly that it cannot be copied, perceived or communicated." DMCA Report, supra, at 111. As we have stated, to determine whether a work is "fixed" in a given medium, the statutory language directs us to ask not only 1) whether a work is "embodied" in that medium, but also 2) whether it is embodied in the medium "for a period of more than transitory duration." According to the Copyright Office, if the work is capable of being copied from that medium for any amount of time, the answer to both questions is "yes." The problem with this interpretation is that it reads the "transitory duration" language out of the statute.

We assume, as the parties do, that the Copyright Office's pronouncement deserves only Skidmore deference, deference based on its "power to persuade." Skidmore v. Swift & Co., 323 U.S. 134, 140, 65 S.Ct. 161, 89 L.Ed. 124 (1944). And because the Office's interpretation does not explain why Congress would include language in a definition if it intended courts to ignore that language, we are not persuaded.

In sum, no case law or other authority dissuades us from concluding that the definition of "fixed" imposes both an embodiment requirement and a duration requirement. Accord CoStar Group Inc. v. LoopNet, Inc., 373 F.3d 544, 551 (4th Cir. 2004) (while temporary reproductions "may be made in this transmission process, they would appear not to be `fixed' in the sense that they are `of more than transitory duration'"). We now turn to whether, in this case, those requirements are met by the buffer data.

Cablevision does not seriously dispute that copyrighted works are "embodied" in the buffer. Data in the BMR buffer can be reformatted and transmitted to the other components of the RS-DVR system. Data in the primary ingest buffer can be copied onto the Arroyo hard disks if a user has requested a recording of that data. Thus, a work's "embodiment" in either buffer "is sufficiently permanent or stable to permit it to be perceived, reproduced," (as in the case of the ingest buffer) "or otherwise communicated" (as in the BMR buffer). 17 U.S.C. § 101. The result might be different if only a single second of a much longer work was placed in the buffer in isolation. In such a situation, it might be reasonable to conclude that only a minuscule portion of a work, rather than "a work" was embodied in the buffer. Here, however, where every second of an entire work is placed, one second at a time, in the buffer, we conclude that the work is embodied in the buffer.

Does any such embodiment last "for a period of more than transitory duration"? Id. No bit of data remains in any buffer for more than a fleeting 1.2 seconds. And unlike the data in cases like MAI [536 F.3d 130] Systems, which remained embodied in the computer's RAM memory until the user turned the computer off, each bit of data here is rapidly and automatically overwritten as soon as it is processed. While our inquiry is necessarily fact-specific, and other factors not present here may alter the duration analysis significantly, these facts strongly suggest that the works in this case are embodied in the buffer for only a "transitory" period, thus failing the duration requirement.

Against this evidence, plaintiffs argue only that the duration is not transitory because the data persist "long enough for Cablevision to make reproductions from them." Br. of Pls.-Appellees the Cartoon Network et al. at 51. As we have explained above, however, this reasoning impermissibly reads the duration language out of the statute, and we reject it. Given that the data reside in no buffer for more than 1.2 seconds before being automatically overwritten, and in the absence of compelling arguments to the contrary, we believe that the copyrighted works here are not "embodied" in the buffers for a period of more than transitory duration, and are therefore not "fixed" in the buffers. Accordingly, the acts of buffering in the operation of the RS-DVR do not create copies, as the Copyright Act defines that term. Our resolution of this issue renders it unnecessary for us to determine whether any copies produced by buffering data would be de minimis, and we express no opinion on that question.

II. Direct Liability for Creating the Playback Copies

In most copyright disputes, the allegedly infringing act and the identity of the infringer are never in doubt. These cases turn on whether the conduct in question does, in fact, infringe the plaintiff's copyright. In this case, however, the core of the dispute is over the authorship of the infringing conduct. After an RS-DVR subscriber selects a program to record, and that program airs, a copy of the program—a copyrighted work—resides on the hard disks of Cablevision's Arroyo Server, its creation unauthorized by the copyright holder. The question is who made this copy. If it is Cablevision, plaintiffs' theory of direct infringement succeeds; if it is the customer, plaintiffs' theory fails because Cablevision would then face, at most, secondary liability, a theory of liability expressly disavowed by plaintiffs.

Few cases examine the line between direct and contributory liability. Both parties cite a line of cases beginning with Religious Technology Center v. Netcom On-Line Communication Services, 907 F.Supp. 1361 (N.D.Cal.1995). In Netcom, a third-party customer of the defendant Internet service provider ("ISP") posted a copyrighted work that was automatically reproduced by the defendant's computer. The district court refused to impose direct liability on the ISP, reasoning that "[a]lthough copyright is a strict liability statute, there should still be some element of volition or causation which is lacking where a defendant's system is merely used to create a copy by a third party." Id. at 1370. Recently, the Fourth Circuit endorsed the Netcom decision, noting that

to establish direct liability under ... the Act, something more must be shown than mere ownership of a machine used by others to make illegal copies. There must be actual infringing conduct with a nexus sufficiently close and causal to the illegal copying that one could conclude that the machine owner himself trespassed on the exclusive domain of the copyright owner."

CoStar Group, Inc. v. LoopNet, Inc., 373 F.3d 544, 550 (4th Cir.2004).

[536 F.3d 131] Here, the district court pigeon-holed the conclusions reached in Netcom and its progeny as "premised on the unique attributes of the Internet." Cablevision I, 478 F.Supp.2d at 620. While the Netcom court was plainly concerned with a theory of direct liability that would effectively "hold the entire Internet liable" for the conduct of a single user, 907 F.Supp. at 1372, its reasoning and conclusions, consistent with precedents of this court and the Supreme Court, and with the text of the Copyright Act, transcend the Internet. Like the Fourth Circuit, we reject the contention that "the Netcom decision was driven by expedience and that its holding is inconsistent with the established law of copyright," CoStar, 373 F.3d at 549, and we find it "a particularly rational interpretation of § 106," id. at 551, rather than a special-purpose rule applicable only to ISPs.

When there is a dispute as to the author of an allegedly infringing instance of reproduction, Netcom and its progeny direct our attention to the volitional conduct that causes the copy to be made. There are only two instances of volitional conduct in this case: Cablevision's conduct in designing, housing, and maintaining a system that exists only to produce a copy, and a customer's conduct in ordering that system to produce a copy of a specific program. In the case of a VCR, it seems clear — and we know of no case holding otherwise — that the operator of the VCR, the person who actually presses the button to make the recording, supplies the necessary element of volition, not the person who manufactures, maintains, or, if distinct from the operator, owns the machine. We do not believe that an RS-DVR customer is sufficiently distinguishable from a VCR user to impose liability as a direct infringer on a different party for copies that are made automatically upon that customer's command.

The district court emphasized the fact that copying is "instrumental" rather than "incidental" to the function of the RS-DVR system. Cablevision I, 478 F.Supp.2d at 620. While that may distinguish the RS-DVR from the ISPs in Netcom and CoStar, it does not distinguish the RS-DVR from a VCR, a photocopier, or even a typical copy shop. And the parties do not seem to contest that a company that merely makes photocopiers available to the public on its premises, without more, is not subject to liability for direct infringement for reproductions made by customers using those copiers. They only dispute whether Cablevision is similarly situated to such a proprietor.

The district court found Cablevision analogous to a copy shop that makes course packs for college professors. In the leading case involving such a shop, for example, "[t]he professor [gave] the copyshop the materials of which the coursepack [was] to be made up, and the copyshop [did] the rest." Princeton Univ. Press v. Mich. Document Servs., 99 F.3d 1381, 1384 (6th Cir.1996) (en banc). There did not appear to be any serious dispute in that case that the shop itself was directly liable for reproducing copyrighted works. The district court here found that Cablevision, like this copy shop, would be "doing" the copying, albeit "at the customer's behest." Cablevision I, 478 F.Supp.2d at 620.

But because volitional conduct is an important element of direct liability, the district court's analogy is flawed. In determining who actually "makes" a copy, a significant difference exists between making a request to a human employee, who then volitionally operates the copying system to make the copy, and issuing a command directly to a system, which automatically obeys commands and engages in no volitional conduct. In cases like Princeton [536 F.3d 132] University Press, the defendants operated a copying device and sold the product they made using that device. See 99 F.3d at 1383 ("The corporate defendant ... is a commercial copyshop that reproduced substantial segments of copyrighted works of scholarship, bound the copies into `coursepacks,' and sold the coursepacks to students. ..."). Here, by selling access to a system that automatically produces copies on command, Cablevision more closely resembles a store proprietor who charges customers to use a photocopier on his premises, and it seems incorrect to say, without more, that such a proprietor "makes" any copies when his machines are actually operated by his customers. See Netcom, 907 F.Supp. at 1369. Some courts have held to the contrary, but they do not explicitly explain why, and we find them unpersuasive. See, e.g., Elektra Records Co. v. Gem Elec. Distribs., Inc., 360 F.Supp. 821, 823 (E.D.N.Y.1973) (concluding that, "regardless" of whether customers or defendants' employees operated the tape-copying machines at defendants' stores, defendant had actively infringed copyrights).

The district court also emphasized Cablevision's "unfettered discretion in selecting the programming that it would make available for recording." Cablevision I, 478 F.Supp.2d at 620. This conduct is indeed more proximate to the creation of illegal copying than, say, operating an ISP or opening a copy shop, where all copied content was supplied by the customers themselves or other third parties. Nonetheless, we do not think it sufficiently proximate to the copying to displace the customer as the person who "makes" the copies when determining liability under the Copyright Act. Cablevision, we note, also has subscribers who use home VCRs or DVRs (like TiVo), and has significant control over the content recorded by these customers. But this control is limited to the channels of programming available to a customer and not to the programs themselves. Cablevision has no control over what programs are made available on individual channels or when those programs will air, if at all. In this respect, Cablevision possesses far less control over recordable content than it does in the VOD context, where it actively selects and makes available beforehand the individual programs available for viewing. For these reasons, we are not inclined to say that Cablevision, rather than the user, "does" the copying produced by the RS-DVR system. As a result, we find that the district court erred in concluding that Cablevision, rather than its RS-DVR customers, makes the copies carried out by the RS-DVR system.

Our refusal to find Cablevision directly liable on these facts is buttressed by the existence and contours of the Supreme Court's doctrine of contributory liability in the copyright context. After all, the purpose of any causation-based liability doctrine is to identify the actor (or actors) whose "conduct has been so significant and important a cause that [he or she] should be legally responsible." W. Page Keeton et al., Prosser and Keeton on Torts § 42, at 273 (5th ed.1984). But here, to the extent that we may construe the boundaries of direct liability more narrowly, the doctrine of contributory liability stands ready to provide adequate protection to copyrighted works.

Most of the facts found dispositive by the district court—e.g., Cablevision's "continuing relationship" with its RS-DVR customers, its control over recordable content, and the "instrumental[ity]" of copying to the RS-DVR system, Cablevision I, 478 F.Supp.2d at 618-20—seem to us more relevant to the question of contributory liability. In Sony Corp. of America v. Universal City Studios, Inc., the lack of an [536 F.3d 133] "ongoing relationship" between Sony and its VCR customers supported the Court's conclusion that it should not impose contributory liability on Sony for any infringing copying done by Sony VCR owners. 464 U.S. 417, 437-38, 104 S.Ct. 774, 78 L.Ed.2d 574 (1984). The Sony Court did deem it "just" to impose liability on a party in a "position to control" the infringing uses of another, but as a contributory, not direct, infringer. Id. at 437, 104 S.Ct. 774. And asking whether copying copyrighted material is only "incidental" to a given technology is akin to asking whether that technology has "commercially significant noninfringing uses," another inquiry the Sony Court found relevant to whether imposing contributory liability was just. Id. at 442, 104 S.Ct. 774.

The Supreme Court's desire to maintain a meaningful distinction between direct and contributory copyright infringement is consistent with congressional intent. The Patent Act, unlike the Copyright Act, expressly provides that someone who "actively induces infringement of a patent" is "liable as an infringer," 35 U.S.C. § 271(b), just like someone who commits the underlying infringing act by "us[ing]" a patented invention without authorization, id. § 271(a). In contrast, someone who merely "sells ... a material or apparatus for use in practicing a patented process" faces only liability as a "contributory infringer." Id. § 271(c). If Congress had meant to assign direct liability to both the person who actually commits a copyright-infringing act and any person who actively induces that infringement, the Patent Act tells us that it knew how to draft a statute that would have this effect. Because Congress did not do so, the Sony Court concluded that "[t]he Copyright Act does not expressly render anyone liable for infringement committed by another." 464 U.S. at 434, 104 S.Ct. 774. Furthermore, in cases like Sony, the Supreme Court has strongly signaled its intent to use the doctrine of contributory infringement, not direct infringement, to "identify[] the circumstances in which it is just to hold one individual accountable for the actions of another." Id. at 435, 104 S.Ct. 774. Thus, although Sony warns us that "the lines between direct infringement, contributory infringement, and vicarious liability are not clearly drawn," id. at 435 n. 17, 104 S.Ct. 774 (internal quotation marks and citation omitted), that decision does not absolve us of our duty to discern where that line falls in cases, like this one, that require us to decide the question.

The district court apparently concluded that Cablevision's operation of the RS-DVR system would contribute in such a major way to the copying done by another that it made sense to say that Cablevision was a direct infringer, and thus, in effect, was "doing" the relevant copying. There are certainly other cases, not binding on us, that follow this approach. See, e.g., Playboy Enters. v. Russ Hardenburgh, Inc., 982 F.Supp. 503, 513 (N.D.Ohio 1997) (noting that defendant ISP's encouragement of its users to copy protected files was "crucial" to finding that it was a direct infringer). We need not decide today whether one's contribution to the creation of an infringing copy may be so great that it warrants holding that party directly liable for the infringement, even though another party has actually made the copy. We conclude only that on the facts of this case, copies produced by the RS-DVR system are "made" by the RS-DVR customer, and Cablevision's contribution to this reproduction by providing the system does not warrant the imposition of direct liability. Therefore, Cablevision is entitled to summary judgment on this point, and the district court erred in awarding summary judgment to plaintiffs.

[536 F.3d 134] III. Transmission of RS-DVR Playback

Plaintiffs' final theory is that Cablevision will violate the Copyright Act by engaging in unauthorized public performances of their works through the playback of the RS-DVR copies. The Act grants a copyright owner the exclusive right, "in the case of ... motion pictures and other audiovisual works, to perform the copyrighted work publicly." 17 U.S.C. § 106(4). Section 101, the definitional section of the Act, explains that

[t]o perform or display a work "publicly" means (1) to perform or display it at a place open to the public or at any place where a substantial number of persons outside of a normal circle of a family and its social acquaintances is gathered; or (2) to transmit or otherwise communicate a performance or display of the work to a place specified by clause (1) or to the public, by means of any device or process, whether the members of the public capable of receiving the performance or display receive it in the same place or in separate places and at the same time or at different times.

Id. § 101.

The parties agree that this case does not implicate clause (1). Accordingly, we ask whether these facts satisfy the second, "transmit clause" of the public performance definition: Does Cablevision "transmit ... a performance ... of the work ... to the public"? Id. No one disputes that the RS-DVR playback results in the transmission of a performance of a work—the transmission from the Arroyo Server to the customer's television set. Cablevision contends that (1) the RS-DVR customer, rather than Cablevision, does the transmitting and thus the performing and (2) the transmission is not "to the public" under the transmit clause.

As to Cablevision's first argument, we note that our conclusion in Part II that the customer, not Cablevision, "does" the copying does not dictate a parallel conclusion that the customer, and not Cablevision, "performs" the copyrighted work. The definitions that delineate the contours of the reproduction and public performance rights vary in significant ways. For example, the statute defines the verb "perform" and the noun "copies," but not the verbs "reproduce" or "copy." Id. We need not address Cablevision's first argument further because, even if we assume that Cablevision makes the transmission when an RS-DVR playback occurs, we find that the RS-DVR playback, as described here, does not involve the transmission of a performance "to the public."

The statute itself does not expressly define the term "performance" or the phrase "to the public." It does explain that a transmission may be "to the public ... whether the members of the public capable of receiving the performance ... receive it in the same place or in separate places and at the same time or at different times." Id. This plain language instructs us that, in determining whether a transmission is "to the public," it is of no moment that the potential recipients of the transmission are in different places, or that they may receive the transmission at different times. The implication from this same language, however, is that it is relevant, in determining whether a transmission is made to the public, to discern who is "capable of receiving" the performance being transmitted. The fact that the statute says "capable of receiving the performance," instead of "capable of receiving the transmission," underscores the fact that a transmission of a performance is itself a performance. Cf. Buck v. Jewell-La Salle Realty Co., 283 U.S. 191, 197-98, 51 S.Ct. 410, 75 L.Ed. 971 (1931).

[536 F.3d 135] The legislative history of the transmit clause supports this interpretation. The House Report on the 1976 Copyright Act states that

[u]nder the bill, as under the present law, a performance made available by transmission to the public at large is "public" even though the recipients are not gathered in a single place, and even if there is no proof that any of the potential recipients was operating his receiving apparatus at the time of the transmission. The same principles apply whenever the potential recipients of the transmission represent a limited segment of the public, such as the occupants of hotel rooms or the subscribers of a cable television service.

H.R.Rep. No. 94-1476, at 64-65 (1976), reprinted in 1976 U.S.C.C.A.N. 5659, 5678 (emphases added).

Plaintiffs also reference a 1967 House Report, issued nearly a decade before the Act we are interpreting, stating that the same principles apply where the transmission is "capable of reaching different recipients at different times, as in the case of sounds or images stored in an information system and capable of being performed or displayed at the initiative of individual members of the public." H.R.Rep. No. 90-83, at 29 (1967) (emphases added). We question how much deference this report deserves. But we need not belabor the point here, as the 1967 report is consistent with both legislative history contemporaneous with the Act's passage and our own interpretation of the statute's plain meaning.

From the foregoing, it is evident that the transmit clause directs us to examine who precisely is "capable of receiving" a particular transmission of a performance. Cablevision argues that, because each RS-DVR transmission is made using a single unique copy of a work, made by an individual subscriber, one that can be decoded exclusively by that subscriber's cable box, only one subscriber is capable of receiving any given RS-DVR transmission. This argument accords with the language of the transmit clause, which, as described above, directs us to consider the potential audience of a given transmission. We are unpersuaded by the district court's reasoning and the plaintiffs' arguments that we should consider a larger potential audience in determining whether a transmission is "to the public."

The district court, in deciding whether the RS-DVR playback of a program to a particular customer is "to the public," apparently considered all of Cablevision's customers who subscribe to the channel airing that program and all of Cablevision's RS-DVR subscribers who request a copy of that program. Thus, it concluded that the RS-DVR playbacks constituted public performances because "Cablevision would transmit the same program to members of the public, who may receive the performance at different times, depending on whether they view the program in real time or at a later time as an RS-DVR playback." Cablevision I, 478 F.Supp.2d at 623 (emphasis added). In essence, the district court suggested that, in considering whether a transmission is "to the public," we consider not the potential audience of a particular transmission, but the potential audience of the underlying work (i.e., "the program") whose content is being transmitted.

We cannot reconcile the district court's approach with the language of the transmit clause. That clause speaks of people capable of receiving a particular "transmission" or "performance," and not of the potential audience of a particular "work." Indeed, such an approach would render the "to the public" language surplusage. Doubtless the potential audience for every [536 F.3d 136] copyrighted audiovisual work is the general public. As a result, any transmission of the content of a copyrighted work would constitute a public performance under the district court's interpretation. But the transmit clause obviously contemplates the existence of non-public transmissions; if it did not, Congress would have stopped drafting that clause after "performance."

On appeal, plaintiffs offer a slight variation of this interpretation. They argue that both in its real-time cablecast and via the RS-DVR playback, Cablevision is in fact transmitting the "same performance" of a given work: the performance of the work that occurs when the programming service supplying Cablevision's content transmits that content to Cablevision and the service's other licensees. See Br. of Pls.-Appellees Twentieth Century Fox Film Corp. et al. at 27 ("Fox Br.") ("The critical factor ... is that the same performance is transmitted to different subscribers at different times .... more specifically, the performance of that program by HBO or another programming service." (third emphasis added)).

Thus, according to plaintiffs, when Congress says that to perform a work publicly means to transmit ... a performance ... to the public, they really meant "transmit ... the `original performance' ... to the public." The implication of this theory is that to determine whether a given transmission of a performance is "to the public," we would consider not only the potential audience of that transmission, but also the potential audience of any transmission of the same underlying "original" performance.

Like the district court's interpretation, this view obviates any possibility of a purely private transmission. Furthermore, it makes Cablevision's liability depend, in part, on the actions of legal strangers. Assume that HBO transmits a copyrighted work to both Cablevision and Comcast. Cablevision merely retransmits the work from one Cablevision facility to another, while Comcast retransmits the program to its subscribers. Under plaintiffs' interpretation, Cablevision would still be transmitting the performance to the public, solely because Comcast has transmitted the same underlying performance to the public. Similarly, a hapless customer who records a program in his den and later transmits the recording to a television in his bedroom would be liable for publicly performing the work simply because some other party had once transmitted the same underlying performance to the public.

We do not believe Congress intended such odd results. Although the transmit clause is not a model of clarity, we believe that when Congress speaks of transmitting a performance to the public, it refers to the performance created by the act of transmission. Thus, HBO transmits its own performance of a work when it transmits to Cablevision, and Cablevision transmits its own performance of the same work when it retransmits the feed from HBO.

Furthermore, we believe it would be inconsistent with our own transmit clause jurisprudence to consider the potential audience of an upstream transmission by a third party when determining whether a defendant's own subsequent transmission of a performance is "to the public." In National Football League v. PrimeTime 24 Joint Venture (NFL), 211 F.3d 10 (2000), we examined the transmit clause in the context of satellite television provider PrimeTime, which captured protected content in the United States from the NFL, transmitted it from the United States to a satellite ("the uplink"), and then transmitted it from the satellite to subscribers in both the United States and Canada ("the downlink"). PrimeTime had a license to [536 F.3d 137] transmit to its U.S. customers, but not its Canadian customers. It argued that although the downlink transmission to its Canadian subscribers was a public performance, it could not be held liable for that act because it occurred entirely outside of the United States and therefore was not subject to the strictures of the Copyright Act. It also argued that the uplink transmission was not a public performance because it was a transmission to a single satellite. See id. at 12.

The NFL court did not question the first assumption, but it flatly rejected the second on a specific and germane ground:

We believe the most logical interpretation of the Copyright Act is to hold that a public performance or display includes each step in the process by which a protected work wends its way to its audience. Under that analysis, it is clear that PrimeTime's uplink transmission of signals captured in the United States is a step in the process by which NFL's protected work wends its way to a public audience.

Id. at 13 (emphasis added) (internal quotation and citation omitted). Thus, while the uplink transmission that took place in the United States was not, in itself, "to the public," the NFL court deemed it so because it ultimately resulted in an undisputed public performance. Notably, the NFL court did not base its decision on the fact that an upstream transmission by another party (the NFL) might have been to the public. Nor did the court base its decision on the fact that Primetime simultaneously transmitted a performance of the work to the public in the United States. Because NFL directs us to look downstream, rather than upstream or laterally, to determine whether any link in a chain of transmissions made by a party constitutes a public performance, we reject plaintiffs' contention that we examine the potential recipients of the content provider's initial transmission to determine who is capable of receiving the RS-DVR playback transmission.

Plaintiffs also rely on NFL for the proposition that Cablevision publicly performs a work when it splits its programming stream and transmits the second stream to the RS-DVR system. Because NFL only supports that conclusion if we determine that the final transmission in the chain (i.e., the RS-DVR playback transmission) is "to the public," plaintiffs' reliance on NFL is misplaced. NFL dealt with a chain of transmissions whose final link was undisputedly a public performance. It therefore does not guide our current inquiry.

In sum, none of the arguments advanced by plaintiffs or the district court alters our conclusion that, under the transmit clause, we must examine the potential audience of a given transmission by an alleged infringer to determine whether that transmission is "to the public." And because the RS-DVR system, as designed, only makes transmissions to one subscriber using a copy made by that subscriber, we believe that the universe of people capable of receiving an RS-DVR transmission is the single subscriber whose self-made copy is used to create that transmission.

Plaintiffs contend that it is "wholly irrelevant, in determining the existence of a public performance, whether `unique' copies of the same work are used to make the transmissions." Fox Br. at 27. But plaintiffs cite no authority for this contention. And our analysis of the transmit clause suggests that, in general, any factor that limits the potential audience of a transmission is relevant.

Furthermore, no transmission of an audiovisual work can be made, we assume, without using a copy of that work: to transmit a performance of a movie, for [536 F.3d 138] example, the transmitter generally must obtain a copy of that movie. As a result, in the context of movies, television programs, and other audiovisual works, the right of reproduction can reinforce and protect the right of public performance. If the owner of a copyright believes he is injured by a particular transmission of a performance of his work, he may be able to seek redress not only for the infringing transmission, but also for the underlying copying that facilitated the transmission. Given this interplay between the various rights in this context, it seems quite consistent with the Act to treat a transmission made using Copy A as distinct from one made using Copy B, just as we would treat a transmission made by Cablevision as distinct from an otherwise identical transmission made by Comcast. Both factors—the identity of the transmitter and the source material of the transmission—limit the potential audience of a transmission in this case and are therefore germane in determining whether that transmission is made "to the public."

Indeed, we believe that Columbia Pictures Industries, Inc. v. Redd Horne, Inc., 749 F.2d 154 (3d Cir.1984), relied on by both plaintiffs and the district court, supports our decision to accord significance to the existence and use of distinct copies in our transmit clause analysis. In that case, defendant operated a video rental store, Maxwell's, which also housed a number of small private booths containing seats and a television. Patrons would select a film, enter the booth, and close the door. An employee would then load a copy of the requested movie into a bank of VCRs at the front of the store and push play, thereby transmitting the content of the tape to the television in the viewing booth. See id. at 156-57.

The Third Circuit found that defendants' conduct constituted a public performance under both clauses of the statutory definition. In concluding that Maxwell's violated the transmit clause, that court explicitly relied on the fact that defendants showed the same copy of a work seriatim to its clientele, and it quoted a treatise emphasizing the same fact:

Professor Nimmer's examination of this definition is particularly pertinent: "if the same copy ... of a given work is repeatedly played (i.e., `performed') by different members of the public, albeit at different times, this constitutes a 'public' performance." 2 M. Nimmer, § 8.14[C][3], at 8-142 (emphasis in original). ... Although Maxwell's has only one copy of each film, it shows each copy repeatedly to different members of the public. This constitutes a public performance.

Id. at 159 (first omission in original).

Unfortunately, neither the Redd Horne court nor Prof. Nimmer explicitly explains why the use of a distinct copy affects the transmit clause inquiry. But our independent analysis confirms the soundness of their intuition: the use of a unique copy may limit the potential audience of a transmission and is therefore relevant to whether that transmission is made "to the public." Plaintiffs' unsupported arguments to the contrary are unavailing.

Given that each RS-DVR transmission is made to a given subscriber using a copy made by that subscriber, we conclude that such a transmission is not "to the public," without analyzing the contours of that phrase in great detail. No authority cited by the parties or the district court persuades us to the contrary.

In addition to Redd Horne, the district court also cited and analyzed On Command Video Corp. v. Columbia Pictures Industries, 777 F.Supp. 787 (N.D.Cal. 1991), in its transmit clause analysis. In that case, defendant On Command developed [536 F.3d 139] and sold "a system for the electronic delivery of movie video tapes," which it sold to hotels. Id. at 788. The hub of the system was a bank of video cassette players, each containing a copy of a particular movie. From his room, a hotel guest could select a movie via remote control from a list on his television. The corresponding cassette player would start, and its output would be transmitted to that guest's room. During this playback, the movie selected was unavailable to other guests. See id. The court concluded that the transmissions made by this system were made to the public "because the relationship between the transmitter of the performance, On Command, and the audience, hotel guests, is a commercial, `public' one regardless of where the viewing takes place." Id. at 790.

Thus, according to the On Command court, any commercial transmission is a transmission "to the public." We find this interpretation untenable, as it completely rewrites the language of the statutory definition. If Congress had wished to make all commercial transmissions public performances, the transmit clause would read: "to perform a work publicly means ... to transmit a performance for commercial purposes." In addition, this interpretation overlooks, as Congress did not, the possibility that even non-commercial transmissions to the public may diminish the value of a copyright. Finally, like Redd Horne, On Command is factually distinguishable, as successive transmissions to different viewers in that case could be made using a single copy of a given work. Thus, at the moment of transmission, any of the hotel's guests was capable of receiving a transmission made using a single copy of a given movie. As a result, the district court in this case erred in relying on On Command.

Plaintiffs also rely on Ford Motor Co. v. Summit Motor Products, Inc., 930 F.2d 277 (3d Cir.1991), in which the Third Circuit interpreted § 106(3) of the Copyright Act, which gives the copyright holder the exclusive right "to distribute copies ... of the copyrighted work to the public," 17 U.S.C. § 106(3) (emphasis added). The court concluded that "even one person can be the public for the purposes of section 106(3)." Ford, 930 F.2d at 299 (emphasis added). Commentators have criticized the Ford court for divesting the phrase "to the public" of "all meaning whatsoever," 2 Nimmer & Nimmer, supra, § 8.11[A], at 8-149, and the decision does appear to have that result. Whether this result was justified in the context of the distribution right is not for us to decide in this case. We merely note that we find no compelling reason, in the context of the transmit clause and the public performance right, to interpret the phrase "to the public" out of existence.

In sum, we find that the transmit clause directs us to identify the potential audience of a given transmission, i.e., the persons "capable of receiving" it, to determine whether that transmission is made "to the public." Because each RS-DVR playback transmission is made to a single subscriber using a single unique copy produced by that subscriber, we conclude that such transmissions are not performances "to the public," and therefore do not infringe any exclusive right of public performance. We base this decision on the application of undisputed facts; thus, Cablevision is entitled to summary judgment on this point.

This holding, we must emphasize, does not generally permit content delivery networks to avoid all copyright liability by making copies of each item of content and associating one unique copy with each subscriber to the network, or by giving their subscribers the capacity to make their own individual copies. We do not address whether such a network operator would be [536 F.3d 140] able to escape any other form of copyright liability, such as liability for unauthorized reproductions or liability for contributory infringement.

In sum, because we find, on undisputed facts, that Cablevision's proposed RS-DVR system would not directly infringe plaintiffs' exclusive rights to reproduce and publicly perform their copyrighted works, we grant summary judgment in favor of Cablevision with respect to both rights.

CONCLUSION

For the foregoing reasons, the district court's award of summary judgment to the plaintiffs is REVERSED and the district court's injunction against Cablevision is VACATED. The case is REMANDED for further proceedings consistent with this opinion.

[1] To run a computer program, the data representing that program must be transferred from a data storage medium (such as a floppy disk or a hard drive) to a form of Random Access Memory ("RAM") where the data can be processed. The data buffers at issue here are also a form of RAM.

[2] The same reasoning also distinguishes this court's opinion in Matthew Bender & Co. v. West Publishing Co., 158 F.3d 693 (2d Cir. 1998). Language in that opinion, taken out of context, suggests that the definition of "fixed" imposes only an embodiment requirement: "Under § 101's definition of `copies,' a work satisfies the fixation requirement when it is fixed in a material object from which it can be perceived or communicated directly or with the aid of a machine." Id. at 702. Like the MAI Systems cases, Matthew Bender only addresses the embodiment requirement: specifically, whether West's copyrighted arrangement of judicial opinions was "embedded" in a CD-ROM compilation of opinions when the cases were normally arranged differently but could be manipulated by the user to replicate West's copyrighted arrangement. Id. at 703. The opinion merely quotes the duration language without discussing it, see id. at 702; that case therefore does not compel us to conclude that the definition of "fixed" does not impose a duration requirement.

6.1.7 Playboy Enterprises, Inc. v. Frena 6.1.7 Playboy Enterprises, Inc. v. Frena

This case examines what it means to display a work publicly

839 F.Supp. 1552 (1993)

PLAYBOY ENTERPRISES, INC., Plaintiff,
v.
George FRENA, d/b/a Techs Warehouse BBS Systems and Consulting, and Mark Dyess, Defendants.

No. 93-489-Civ-J-20.

United States District Court, M.D. Florida, Jacksonville Division.

December 9, 1993.

[1553] [1554] George E. Schulz, Jr., Chad S. Roberts, Jacksonville, FL, David P. Peterson, John D. Vadenberg, Garth A. Winn Portland, OR, for plaintiff.

David M. Wiesenfeld, Carl D. Dawson, Jacksonville, FL, for defendants.

ORDER

SCHLESINGER, District Judge.

This cause is before the Court on Plaintiff's First Motion for Partial Summary Judgment (Copyright Infringement) as to Defendant Frena (Doc. No. S-1, filed July 26, 1993), and Plaintiff's Second and Third Motions for Partial Summary Judgment (Trademark Infringement and Lanham Act Violations) as to Defendant Frena (Doc. No. S-3, filed July 29, 1993). In its First Motion for Partial Summary Judgment, Plaintiff requests that the Court grant partial summary judgment that Defendant Frena infringed Plaintiff's copyrights and specifically that the 170 image files in question in Exhibit C to the Tesnakis Affidavit infringed Plaintiff's copyrights in 50 of Plaintiff's copyrighted magazines. In the Second and Third Motions for Partial Summary Judgment, Plaintiff requests that the Court grant partial summary judgment that Defendant Frena infringed Plaintiff's federally registered trademarks PLAYBOY® and PLAYMATE® specifically that Defendant Frena infringed United States Trademark registration numbers 600,018 and 721,987 and that Defendant Frena competed unfairly with Plaintiff, violating 15 U.S.C. § 1125(a). Furthermore, Plaintiff asks for oral argument on its Motions. Defendant Frena has filed responses to these Motions. (Doc. Nos. S-5 and S-6, filed August 4, 1993).

Defendant George Frena operates a subscription computer bulletin board service, Techs Warehouse BBS ("BBS"), that distributed unauthorized copies of Plaintiff Playboy Enterprises, Inc.'s ("PEI") copyrighted photographs. BBS is accessible via telephone modem to customers. For a fee, or to those who purchase certain products from Defendant Frena, anyone with an appropriately equipped computer can log onto BBS. Once logged on subscribers may browse through different BBS directories to look at the pictures and customers may also download[1] the high quality computerized copies of the photographs and then store the copied image from Frena's computer onto their home computer. Many of the images found on BBS include adult subject matter. One hundred and seventy of the images that were available on BBS were copies of photographs taken from PEI's copyrighted materials.

Defendant Frena admits that these materials were displayed on his BBS, see Answer at ¶ 23; Defendant's Admissions, Response No. 8, that he never obtained authorization or consent from PEI, see Answer at ¶¶ 38, 39 and 40, and that each of the accused computer graphic files on BBS is substantially similar to copyrighted PEI photographs, see Defendant's Admissions, Response No. 5. Defendant Frena also admits that each of the files in question has been downloaded[2] by one of his customers. See Defendant's Admissions, Response No. 11.

Subscribers can upload[3] material onto the bulletin board so that any other subscriber, by accessing their computer, can see that material. Defendant Frena states in his Affidavit filed August 4, 1993, that he never uploaded any of PEI's photographs onto BBS and that subscribers to BBS uploaded the photographs. See Affidavit of George Frena at ¶ 6 (Doc. No. S-7). Defendant Frena states that as soon as he was served with a summons and made aware of this matter, he removed the photographs from BBS and has since that time monitored BBS to prevent additional photographs of PEI from being uploaded. See Affidavit of George Frena at ¶ 6.

Summary judgment is appropriate "if the pleadings, depositions, answers to interrogatories [1555] and admissions on file, together with the affidavits, if any, show that there is no genuine issue as to any material fact and that the moving party is entitled to judgment as a matter of law." Fed.R.Civ.P. 56(c). The moving party bears the initial burden of showing the Court, by reference to materials on file that there are no genuine issues of material fact that should be decided at trial. Celotex Corp. v. Catrett, 477 U.S. 317, 106 S.Ct. 2548, 91 L.Ed.2d 265 (1986); Clark v. Coats & Clark, Inc., 929 F.2d 604 (11th Cir. 1991). A moving party discharges its burden on a motion for summary judgment by "showing" or "pointing out" to the Court that there is an absence of evidence to support the nonmoving party's case. Celotex, 477 U.S. at 325, 106 S.Ct. at 2554. Rule 56 permits the moving party to discharge its burden with or without supporting affidavits and to move for summary judgment on the case as a whole or on any claim. Id. When a moving party has discharged its burden, the nonmoving party must then "go beyond the pleadings," and by its own affidavits, or by "depositions, answers to interrogatories, and admissions on file," designate specific facts showing that there is a genuine issue for trial. Id. at 324.

In determining whether the moving party has met its burden of establishing that there is no genuine issue as to any material fact and that it is entitled to judgment as a matter of law, the Court must draw inferences from the evidence in the light most favorable to the nonmovant, Key West Harbor v. City of Key West, 987 F.2d 723, 726 (11th Cir.1993), and resolve all reasonable doubts in that party's favor. Spence v. Zimmerman, 873 F.2d 256, 257 (11th Cir.1989). The nonmovant need not be given the benefit of every inference, but only of every "reasonable" inference. Brown v. City of Clewiston, 848 F.2d 1534, 1540 n. 12 (11th Cir.1988). The Eleventh Circuit has explained the reasonableness standard:

In deciding whether an inference is reasonable, the Court must "cull the universe of possible inferences from the facts established by weighing each against the abstract standard of reasonableness." [citation omitted]. The opposing party's inferences need not be more probable than those inferences in favor of the movant to create a factual dispute, so long as they reasonably may be drawn from the facts. When more than one inference reasonably can be drawn, it is for the trier of fact to determine the proper one.

WSB-TV v. Lee, 842 F.2d 1266, 1270 (11th Cir.1988).

Thus, if a reasonable fact finder evaluating the evidence could draw more than one inference from the facts, and if that inference introduces a genuine issue of material fact, then the court should not grant the summary judgment motion. Augusta Iron and Steel Works v. Employers Insurance of Wausau, 835 F.2d 855, 856 (11th Cir.1988). It must be emphasized that the mere existence of some alleged factual dispute will not defeat an otherwise properly supported summary judgement motion. Rather, "the requirement is that there be no genuine issue of material fact." Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 247-48, 106 S.Ct. 2505, 2510, 91 L.Ed.2d 202 (1986). A dispute about a material fact is "genuine" if the "evidence is such that a reasonable jury could return a verdict for the nonmoving party." Id. at 248, 106 S.Ct. at 2510. The inquiry is "whether the evidence presents a sufficient disagreement to require submission to a jury or whether it is so one-sided that one party must prevail as a matter of law." Id. at 251-52, 106 S.Ct. at 2511-12.

I. COPYRIGHT INFRINGEMENT

The Copyright Act of 1976 gives copyright owners control over most, if not all, activities of conceivable commercial value. The statute provides that

the owner of a copyright ... has the exclusive rights to do and to authorize any of the following: (1) to reproduce the copyrighted work in copies ...; (2) to prepare derivative works based upon the copyrighted work; (3) to distribute copies ... of the copyrighted work to the public ... and (5) in the case of ... pictorial ... works ... to display the copyrighted work publicly.

17 U.S.C. § 106. Engaging in or authorizing any of these categories without the copyright owner's permission violates the exclusive [1556] rights of the copyright owner and constitutes infringement of the copyright. See 17 U.S.C. § 501(a).

To establish copyright infringement, PEI must show ownership of the copyright and "copying" by Defendant Frena, see Feist Publications, Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 111 S.Ct. 1282, 113 L.Ed.2d 358 (1991); Southern Bell Tel. & Tel. v. Assoc. Telephone Directory Publishers, 756 F.2d 801, 810 (11th Cir.1985).

There is no dispute that PEI owns the copyrights on the photographs in question. PEI owns copyright registrations for each of the 50 issues of Playboy publications that contain the photographs on BBS. See Tesnakis Affidavit at ¶ 9. The copyright registration certificate constitutes prima facie evidence in favor of Plaintiff. See Southern Bell Tel., 756 F.2d at 811. Once the plaintiff has established his prima facie ownership, the burden then shifts to the defendant to counter this evidence. See 3 MELVILLE B. NIMMER, Nimmer on Copyright § 13.01[A], at 13-7 (1993). Defendant Frena, however, failed to rebut the appropriate inference of validity.

Next, PEI must demonstrate copying by Defendant Frena. Since direct evidence of copying is rarely available in a copyright infringement action, copying may be inferentially proven by showing that Defendant Frena had access to the allegedly infringed work, that the allegedly infringing work is substantially similar to the copyrighted work, see Howard v. Sterchi, 974 F.2d 1272 (11th Cir.1992), and that one of the rights statutorily guaranteed to copyright owners is implicated by Frena's actions. See Ford Motor Co. v. Summit Motor Products, Inc., 930 F.2d 277, 291 (3d Cir.1991), cert. denied, ___ U.S. ___, 112 S.Ct. 373, 116 L.Ed.2d 324.

Access to the copyrighted work is not at issue. Access is essentially undeniable because every month PEI sells over 3.4 million copies of Playboy magazine throughout the United States. See Kent Affidavit at ¶ 4.

Substantial similarity is also a non-issue in this case. Defendant Frena has admitted that every one of the accused images is substantially similar to the PEI copyrighted photograph from which the accused image was produced. See Defendant's Admissions at ¶ 5. Moreover, not only are the accused works substantially similar to the copyrighted work, but the infringing photographs are essentially exact copies. See Exhibits A and B in the Tesnakis Affidavit. In many cases, the only difference is that PEI's written text appearing on the same page of the photograph has been removed from the infringing copy.

The next step is to determine whether Defendant Frena violated one of the rights statutorily guaranteed to copyright owners under 17 U.S.C. § 106. See 17 U.S.C. § 501(a).

Public distribution of a copyrighted work is a right reserved to the copyright owner, and usurpation of that right constitutes infringement. See Cable/Home Communication Corp. v. Network Productions, Inc., 902 F.2d 829, 843 (11th Cir.1990). PEI's right under 17 U.S.C. § 106(3) to distribute copies to the public has been implicated by Defendant Frena. Section 106(3) grants the copyright owner "the exclusive right to sell, give away, rent or lend any material embodiment of his work." 2 MELVILLE B. NIMMER, Nimmer on Copyright § 8.11[A], at 8-124.1 (1993). There is no dispute that Defendant Frena supplied a product containing unauthorized copies of a copyrighted work. It does not matter that Defendant Frena claims he did not make the copies itself. See JAY DRATLER, JR., Intellectual Property Law: Commercial, Creative and Industrial Property § 6.01[3], at 6-15 (1991).

Furthermore, the "display" rights of PEI have been infringed upon by Defendant Frena. See 17 U.S.C. § 106(5). The concept of display is broad. See 17 U.S.C. § 101. It covers "the projection of an image on a screen or other surface by any method, the transmission of an image by electronic or other means, and the showing of an image on a cathode ray tube, or similar viewing apparatus connected with any sort of information storage and retrieval system." H.R.Rep. No. 1476, 94th Cong., 2d Sess. 64 (Sept. 3, 1976), reprinted in 1976 U.S.Code Cong. & Admin.News [1557] 5659, 5677. The display right precludes unauthorized transmission of the display from one place to another, for example, by a computer system. See H.R.Rep. No. 1476, 94th Cong., 2d Sess. 80 (Sept. 3, 1976), reprinted in 1976 U.S.Code Cong. & Admin.News 5659, 5694; JAY DRATLER, JR., Intellectual Property Law: Commercial, Creative and Industrial Property § 6.01[4], at 624 (1991).

"Display" covers any showing of a "copy" of the work, "either directly or by means of a film, slide, television image or any other device or process." 17 U.S.C. § 101. However, in order for there to be copyright infringement, the display must be public. A "public display" is a display "at a place open to the public or ... where a substantial number of persons outside of a normal circle of family and its social acquaintenances is gathered." 2 MELVILLE B. NIMMER, Nimmer on Copyright § 8.14[C], at 8-169 (1993). A place is "open to the public" in this sense even if access is limited to paying customers. 2 MELVILLE B. NIMMER, Nimmer on Copyright § 8.14[C], at 8-169 n. 36 (1993); see Columbia Pictures Indus., Inc. v. Redd Horne Inc., 749 F.2d 154 (3d Cir.1984).

Defendant's display of PEI's copyrighted photographs to subscribers was a public display. Though limited to subscribers, the audience consisted of "a substantial number of persons outside of a normal circle of family and its social acquaintenances." 2 MELVILLE B. NIMMER, Nimmer on Copyright § 8.14[C], at 8-169 (1993). See also Thomas v. Pansy Ellen Products, 672 F.Supp. 237, 240 (W.D.North Carolina 1987) (display at a trade show was public even though limited to members); Ackee Music, Inc. v. Williams, 650 F.Supp. 653 (D.Kan.1986) (performance of copyrighted songs at defendant's private club constituted a public performance).

Defendant Frena argues that the affirmative defense of fair use precludes a finding of copyright infringement. "Fair use" describes "limited and useful forms of copying and distribution that are tolerated as exceptions to copyright protection." Cable/Home Communications Corp., 902 F.2d at 843 (citing Pacific & Southern Co. v. Duncan, 744 F.2d 1490, 1494 (11th Cir.1984), cert. denied, 471 U.S. 1004, 105 S.Ct. 1867, 85 L.Ed.2d 161 (1985)).

The question of fair use constitutes a mixed issue of law and fact. See Harper & Row, Publishers, Inc. v. Nation Enterprises., 471 U.S. 539, 560, 105 S.Ct. 2218, 2230, 85 L.Ed.2d 588 (1985). Fair use may be addressed on summary judgment. See Cable/Home Communications Corp., 902 F.2d at 843-45 (affirming summary judgment holding that fair use doctrine did not apply).

The Copyright Act mandates four nonexclusive factors which courts shall consider case by case in determining fair use. Cable/Home Communications Corp., 902 F.2d at 843; see 17 U.S.C. § 107. Section 107 does not attempt to define "fair use." It merely lists the factors to be considered in determining whether a use made of a work in a particular case is fair. Section 107 states:

[T]he fair use of a copyrighted work ... for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship or research, is not an infringement of copyright. In determining whether the use made of a work in any particular case is a fair use the factors to be considered shall include —

(1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes;

(2) the nature of the copyrighted work;

(3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and

(4) the effect of the use upon the potential market for or value of the copyrighted work.

17 U.S.C. § 107.

With respect to the first factor, "every commercial use of copyrighted material is presumptively an unfair exploitation of the monopoly privilege that belongs to the owner of the copyright ...," Harper & Row, Publishers, Inc., 471 U.S. at 562, 105 S.Ct. at 2231 (quoting Sony Corp. v. Universal City Studios, Inc., 464 U.S. 417, 451, 104 S.Ct. 774, 793, 78 L.Ed.2d 574 (1984)), so that "any [1558] commercial use tends to cut against a fair use defense." Triangle Publications, Inc. v. Knight-Ridder Newspapers, Inc., 626 F.2d 1171, 1175 (5th Cir.1980).

Defendant Frena's use was clearly commercial. BBS was provided to those paying twenty-five dollars ($25) per month or to those who purchased products from Defendant Frena. One who distributes copyrighted material for profit is engaged in a commercial use even if the customers supplied with such material themselves use it for personal use. See Pacific & Southern Co. v. Duncan, 572 F.Supp. 1186 (N.D.Ga.1983), affirmed, 744 F.2d 1490 (11th Cir.1984), cert. denied, 471 U.S. 1004, 105 S.Ct. 1867, 85 L.Ed.2d 161 (1985).

Implicit in the presumption that every commercial use is presumptively unfair is "some meaningful likelihood that future market harm exists." Cable/Home Communications Corp., 902 F.2d at 844 (citing Sony, 464 U.S. at 451, 104 S.Ct. at 793). It is clear that future market harm exists to PEI due to Frena's activities, as will be discussed in more detail under factor four.

The second factor is the "nature of the copyrighted work." 17 U.S.C. § 107. "Copyright protection is narrower, and the corresponding application of fair use defense greater, in the case of factual works than in the case of works of fiction or fantasy." 3 MELVILLE B. NIMMER, Nimmer on Copyright § 13.05[A], at 13-102.57 (1993). If a work is more appropriately characterized as entertainment, it is less likely that a claim of fair use will be accepted. See In New Era Publications Intern., ApS v. Carol Publishing Group, 904 F.2d 152 (2d Cir.), cert. denied, 498 U.S. 921, 111 S.Ct. 297, 112 L.Ed.2d 251 (1990). The copyrighted works involved in this case are in the category of fantasy and entertainment. Therefore, the second factor works against Frena's fair use defense.

Regarding the third factor, the amount and substantiality of the portion of the copyrighted work used, the Supreme Court has directed a qualitative evaluation of the copying of the copyrighted work. Cable/Home Communications Corp., 902 F.2d at 844 (citing Harper & Row, 471 U.S. at 564-65, 105 S.Ct. at 2232-33). That is, "a small degree of taking is sufficient to transgress fair use if the copying is the essential part of the copyrighted work." Id. See, e.g., Meeropol v. Nizer, 560 F.2d 1061, 1071 (2d Cir.1977) (although copyrighted letters were less than 1% of the infringing work, they were displayed prominently), cert. denied, 434 U.S. 1013, 98 S.Ct. 727, 54 L.Ed.2d 756 (1978); Roy Export Co. Establishment of Vaduz, Liechtenstein, Black, Inc. v. Columbia Broadcasting Sys., Inc., 503 F.Supp. 1137, 1145 (S.D.N.Y. 1980) (fifty-five seconds taken from a onehour and twenty-nine-minute film deemed qualitatively substantial for copyright infringement), aff'd, 672 F.2d 1095 (2d Cir.), cert. denied, 459 U.S. 826, 103 S.Ct. 60, 74 L.Ed.2d 63 (1982); Sheldon v. MetroGoldwyn Pictures Corp., 81 F.2d 49, 56 (2d Cir.) ("[N]o plagiarist can excuse the wrong by showing how much of his work he did not pirate."), cert. denied, 298 U.S. 669, 56 S.Ct. 835, 80 L.Ed. 1392 (1936).

There is no doubt that the photographs in Playboy magazine are an essential part of the copyrighted work. The Court is not implying that people do not read the articles in PEI's magazine. However, a major factor to PEI's success is the photographs in its magazine. By pirating the photographs for which PEI has become famous, Defendant Frena has taken a very important part of PEI's copyrighted publications.

The fourth factor, the "effect of the use upon the potential market for or value of the copyrighted work," 17 U.S.C. § 107(4), is "undoubtedly the single most important element of fair use, since a proper application of fair use does not impair materially the marketability of the copied work." Cable/Home Communications Corp., 902 F.2d at 845. This factor poses the issue of "whether unrestricted and widespread conduct of the sort engaged in by the defendant (whether in fact engaged in by the defendant or others) would result in a substantially adverse impact on the potential market for or value of the plaintiff's present work." 3 MELVILLE B. NIMMER, Nimmer on Copyright § 13.05[A], at 13.102.61-62 (1993). "[P]otential market means either an immediate or delayed market, and includes harm to derivative works." Cable/Home [1559] Communications Corp., 902 F.2d at 845.

Obviously, if this type of conduct became widespread, it would adversely affect the potential market for the copyrighted work. Such conduct would deny PEI considerable revenue to which it is entitled for the service it provides.

There is irrefutable evidence of direct copyright infringement in this case. It does not matter that Defendant Frena may have been unaware of the copyright infringement. Intent to infringe is not needed to find copyright infringement. Intent or knowledge is not an element of infringement, and thus even an innocent infringer is liable for infringement; rather, innocence is significant to a trial court when it fixes statutory damages, which is a remedy equitable in nature. See D.C. Comics Inc. v. Mini Gift Shop, 912 F.2d 29 (2d Cir.1990).

Frena argues that his commercial use was so insignificant as to justify holding for him under the principle of de minimis non curat lex. The Court disagrees. The detrimental market effects coupled with the commercial-use presumption negates the fair use defense. Defendant Frena infringed Plaintiff's copyrights; specifically, the 170 image files in question in Exhibit C to the Tesnakis Affidavit infringed Plaintiff's copyrights in 50 of Plaintiff's copyrighted magazines. The Court finds that the undisputed facts mandate partial summary judgment that Defendant Frena's unauthorized display and distribution of PEI's copyrighted material is copyright infringement under 17 U.S.C. § 501.

II. TRADEMARK INFRINGEMENT UNDER 15 U.S.C. § 1114

In addition to the use of PEI's copyrighted photographs on BBS, PEI's registered trademarks, PLAYBOY® and PLAYMATE®, were used to identify many of the files containing the photographs. Furthermore, PEI's text was removed from the photographs and Defendant Frena's name, Techs Warehouse BBS, and telephone number were placed on PEI's copyrighted photographs. This is uncontested. Therefore, Plaintiff has moved for partial summary judgment on the issues of trademark infringement under 15 U.S.C. § 1114 and unfair competition under 15 U.S.C. § 1125(a).

Defendant Frena admits that the registered trademarks PLAYBOY® and PLAYMATE® were used in file descriptors for 170 of the images found on BBS and that such file descriptors were displayed to his customers. See Answer at ¶¶ 51 and 52. Defendant Frena contends that when a subscriber uploads the material onto BBS, the same subscriber provides a description of the uploaded material for the BBS index. Defendant Frena contends that he himself has never placed the words "Playboy" or "Playmate" onto BBS. Defendant Frena further alleges that he, innocently and without malice, allowed subscribers to upload whatever they wanted onto BBS.

The first issue the Court must address is whether the marks PLAYBOY® and PLAYMATE® are distinctive enough to deserve protection under the Trademark Act of 1946 (commonly known as the Lanham Act), 15 U.S.C. § 1051 et seq., specifically § 32(1) of the Lanham Act, 15 U.S.C. § 1114(1). See Freedom Sav. and Loan Ass'n v. Way, 757 F.2d 1176 n. 1 (11th Cir.), cert. denied, 474 U.S. 845, 106 S.Ct. 134, 88 L.Ed.2d 110 (1985); Ice Cold Auto Air v. Cold Air & Accessories, 828 F.Supp. 925, 930 (M.D.Fla. 1993).

There are four categories of distinctiveness in which a mark may be classified. "In ascending order they are: (1) generic; (2) descriptive; (3) suggestive; and (4) arbitrary or fanciful." Investacorp, Inc. v. Arabian Investment Banking Corp., 931 F.2d 1519, 1522-23 (11th Cir.1991), cert. denied, ___ U.S. ___, 112 S.Ct. 639, 116 L.Ed.2d 657 (1991). The categorization of a term as generic, descriptive, suggestive or arbitrary typically resolves the issue of whether a mark is protectable, with generic marks getting the least protection and arbitrary or fanciful marks receiving the highest degree of protection.

PLAYBOY® and PLAYMATE® are suggestive marks since they implicitly refer to their products qualities. See PEI v. P.K. [1560] Sorren Export Co. Inc. of Florida, 546 F.Supp. 987, 995 (S.D.Fl.1982). They are well known marks and widely associated with PEI's products. These marks have acquired great distinctiveness among consumers, and are therefore entitled to a high degree of protection. See Playboy Enterprises, Inc. v. Chuckleberry Publishing, Inc., 486 F.Supp. 414, 419 (S.D.N.Y.1980).

Once the threshold question of whether the mark is distinctive enough to deserve protection is answered affirmatively, the Court must turn to the central inquiry of whether there is a "likelihood of confusion." See Freedom Sav. and Loan Ass'n, 757 F.2d at 1179; Ice Cold Auto Air, 828 F.Supp. at 934.

The following factors are highly relevant in deciding whether there is a likelihood of confusion: "(1) the type of mark at issue; (2) similarity of marks; (3) similarity of product or services; (4) identity of purchasers and similarity of retail outlets; .... (6) the defendant's intent; and (7) actual confusion." Ice Cold Auto Air, 828 F.Supp. at 935 (citing Freedom Sav. and Loan Ass'n, 757 F.2d at 1182-83). The Court, however, is not required to specifically mention each of these factors in making its decision. See Univ. of Georgia Athletic Ass'n v. Laite, 756 F.2d 1535, 1542 (11th Cir.1985) (analyzing the factors in the context of a claim of unfair competition).

Rather than simply determining whether a majority of these factors indicate a likelihood of confusion, a court must "evaluate the weight to be accorded the individual factors and then make its ultimate decision." AmBrit, Inc. v. Kraft, Inc., 812 F.2d 1531, 1538 (11th Cir.1986), cert. denied, 481 U.S. 1041, 107 S.Ct. 1983, 95 L.Ed.2d 822 (1987). An analysis of fewer than all seven factors may support a finding of likelihood of confusion. See Univ. of Georgia Athletic Ass'n, 756 F.2d at 1543. In the Eleventh Circuit, the type of mark and evidence of actual confusion are the most important factors. Dieter v. B & H Industries of Southwest Florida, Inc., 880 F.2d 322, 326 (11th Cir.1989), cert. denied, 498 U.S. 950, 111 S.Ct. 369, 112 L.Ed.2d 332 (1990).

In analyzing the type of mark, the Court must determine whether the mark is strong or weak in order to determine the level of protection to be extended to the mark. See Ice Cold Auto Air, 828 F.Supp. at 935.

The more distinctive a plaintiff's servicemark, the greater the likelihood that consumers will associate the registered trademark and all similar marks with the registered owner. The law therefore provides the greatest protection to strong and distinctive servicemarks; the strength of a mark depends on the extent of third party usage and the relationship between the name and the service or good it describes.

Freedom Sav. and Loan Assoc., 757 F.2d at 1182.

In analyzing the relationship between the name and the service or good it describes, the Court again considers the proper categorization of the mark. At this stage of the analysis, the goal is to determine the degree of distinctiveness of the mark. See Ambrit, Inc., 812 F.2d at 1539 n. 36. Suggestive and arbitrary marks are considered to be the most distinctive marks, and, as relatively strong marks, entitled to the strongest protection. See Ice Cold Auto Air, 828 F.Supp. at 935. The Court previously categorized the marks involved as suggestive marks which are, therefore, entitled to the strongest protection.

There is no issue as to the similarity of the marks in the instant case. Not only are the marks similar, they are exactly the same.

The greater the similarity between products and services, the greater the likelihood of confusion. See Exxon Corp. v. Texas Motor Exchange of Houston, Inc., 628 F.2d 500, 505 (5th Cir.1980). Defendant Frena's product consisted of computer images of nude women. Of course, this is the core of PEI's business. Even though Defendant Frena's photographs were available in a different medium than Plaintiff's, the services both parties provided were virtually identical.

A finding that Defendant adopted a mark with the intent of deriving benefit from the reputation of Plaintiff's service or product may alone be enough to justify an inference that there is confusing similarity. See Ambrit, Inc., 812 F.2d at 1542. Defendant [1561] contends that he did not intend to use Plaintiff's mark. However, a showing of intent or bad faith is unnecessary to establish a violation of § 1141(a). See Chanel, Inc. v. Italian Activewear of Florida, Inc., 931 F.2d 1472, 1476 (11th Cir.1991). Intent is just one of the factors to consider in evaluating whether the infringing use is likely to cause confusion. See Chanel, Inc., 931 F.2d at 1472, 1476 n. 4 (citing Original Appalachian Artworks, Inc. v. The Toy Loft, 684 F.2d 821, 831-32 (11th Cir.1982)).

Even though a guilty state of mind is relevant evidence of trademark infringement, an innocent state of mind is irrelevant on the issue of likelihood of confusion since the lack of intent to deceive does nothing to alleviate the confusion precipitated by similarity of trademarks. See 3A RUDOLF CALLMAN, The Law of Unfair Competition, Trademarks and Monopolies § 20.49, at 385 (4th ed. 1993).

"Although evidence of actual confusion is not necessary to a finding of likelihood of confusion, it is nevertheless the best evidence of likelihood of confusion." John H. Harland Co. v. Clarke Checks, Inc., 711 F.2d 966, 978 (11th Cir.1983) (quoting Amstar Corp. v. Domino's Pizza, Inc., 615 F.2d 252, 263 (5th Cir.), cert. denied, 449 U.S. 899, 101 S.Ct. 268, 66 L.Ed.2d 129 (1980)). Actual confusion by a few customers is evidence of likelihood of confusion by many customers. See Freedom Sav. and Loan Ass'n, 757 F.2d at 1185. Therefore, a plaintiff usually will not have to prove more than a few incidents of actual confusion. See id.

In its Motion for Summary Judgment, Plaintiff has not shown any evidence of actual confusion among consumers. However, it is not necessary to prove actual confusion on the part of customers. It is just that if evidence of actual confusion is available, it is so highly probative of likelihood of confusion that it can rarely be ignored.

An examination of the factors mentioned above indicates that Defendant Frena's use of PEI's marks is likely to confuse consumers. Defendant Frena is not merely using marks similar to those of Plaintiff, Defendant Frena is using the exact marks registered to Plaintiff.

This case involves a suggestive mark entitled to the strongest protection, Defendant Frena used the identical mark of Plaintiff and the services involved were virtually identical. Each of these elements tends to show a likelihood of confusion. It is likely that customers of Defendant Frena would believe that PEI was the source of Defendant Frena's images and that PEI either sponsored, endorsed or approved Defendant Frena's use of PEI's images.

It is well established that "falsely suggesting affiliation with the trademark owner in a manner likely to cause confusion as to source of sponsorship constitutes infringement." Burger King v. Mason, 710 F.2d 1480, 1492 (11th Cir.1983), cert. denied, 465 U.S. 1102, 104 S.Ct. 1599, 80 L.Ed.2d 130 (1984). Further, "the law is established that falsely suggesting the existence of affiliation with a well-known business by usurping the latter's good-will constitutes both trademark infringement and unfair competition." Showtime/The Movie Channel v. Covered Bridge Condominium Assoc., Inc., 693 F.Supp. 1080, 1089 (S.D.Fla.1988) (quoting Volkswagenwerk Aktiengesellschaft v. Tatum, 344 F.Supp. 235, 237 (S.D.Fla.1972)).

The Court finds that Defendant Frena infringed Plaintiff's federally registered trademarks PLAYBOY® and PLAYMATE®. More specifically, Defendant Frena infringed United States Trademark registration numbers 600,018 and 721,987.

III. UNFAIR COMPETITION UNDER 15 U.S.C. § 1125(a)

Section 43(a) of the Lanham Act, 15 U.S.C. § 1125(a), provides:

(a)(1) Any person who, or in connection with any goods or services, or any container for goods, uses in commerce any word, term, name, symbol, or device, or any combination thereof, or any false designation of origin, false or misleading description of fact, or false or misleading representation of fact which —

(A) is likely to cause confusion or to cause mistake, or to deceive as to the [1562] affiliation, connection, or association of such person with another person, or as to the origin, sponsorship, or approval of his or her goods, services or commercial activities by another person, or

(B) in commercial advertising or promotion, misrepresents the nature, characteristics, qualities, or geographic origin of his or her or another person's goods, services, or commercial activities,

shall be liable in a civil action by any person who believes that he or she is or is likely to be damages by such act.

15 U.S.C. § 1125(a). This statutory provision provides a federal cause of action for unfair competition. There are similarities between the analysis required for trademark infringement and for unfair competition. However, the unfair competition claim is broader. See Ice Cold Auto Air, 828 F.Supp. at 938 n. 14 (citing Freedom Sav. and Loan Ass'n v. Way, 757 F.2d 1176, 1186 (11th Cir.1985)), cert. denied, 474 U.S. 845, 106 S.Ct. 134, 88 L.Ed.2d 110 (1985).

15 U.S.C. § 1125(a) is designed to protect against a broader range of deceptive or unfair trade practices than 15 U.S.C. § 1114. In addition, both sections require the same test to determine whether the particular actions complained of are violative of their terms. See Showtime/The Movie Channel v. Covered Bridge Condo, 693 F.Supp. 1080, 1090 (S.D.Fla.1988). Thus, as a general rule, the same set of facts which support an action for trademark infringement also support an action for unfair competition. See Babbit Electronics Inc. v. Dynascan Corp., 828 F.Supp. 944, 957 (S.D.Fla.1993); Marathon Mrg. Co. v. Enerlite Products Corp., 767 F.2d 214, 217 (5th Cir.1985). Therefore, it appears that Defendant Frena violated 15 U.S.C. § 1125(a).

Defendant Frena has violated 15 U.S.C. § 1125(a) by falsely inferring and describing the origin of PEI's photographs. Defendant Frena makes it appear that PEI authorized Defendant Frena's product. Furthermore, the removal of PEI's trademarks from the photographs constitutes "reverse passing off." See 3A RUDOLF CALLMAN, The Law of Unfair Competition, Trademarks and Monopolies § 21.18, at 170 (4th ed. 1993).

PEI's trademarks were obliterated from the photographs, and then Defendant Frena attempted to take credit for Plaintiff's work by placing its own advertisement with its phone number on some of the photographs. Thus, PEI has been denied the right to public credit for the success and quality of its goods. Reverse passing off is a violation of § 43(a) of the Lanham Act. See Roho, Inc. v. Marquis, 902 F.2d 356 (5th Cir.1990); Debs v. Meliopoulos, 1991 U.S.Dist. LEXIS 19864 (N.D.Ga.1991).

There is no liability for reverse passing off when a defendant modifies a product to such an extent that the defendant converts it into something different in kind from the original product. Defendant Frena, however, did not convert PEI's product to such an extent that it could be considered different in kind from PEI's product.

In Roho, the defendant purchased the plaintiff's wheelchair cushions on the open market, removed plaintiff's labels therefrom, and fastened them together to make bed mattresses. It was held that the two products were commercially distinct, and that therefore defendant was not simply reselling the product of plaintiff. In the instant case, however, Defendant Frena is simply reselling the product of PEI stripped of its original identity.

Defendant Frena's actions of deleting Plaintiff's text from the photographs, adding his own text to some of the photographs and appropriating PEI's photographs without attribution to the copyright owner violated Section 43(a) of the Lanham Act. Defendant Frena competed unfairly with Plaintiff, violating 15 U.S.C. § 1125(a).

Accordingly,

(1) Plaintiff's Request for Oral Argument on its Motion for Partial Summary Judgment (Doc. No. S-1) is DENIED,

(2) Plaintiff's Request for Oral Argument on its Second and Third Motions for Partial Summary Judgment (Doc. No. S-3) is DENIED,

[1563] (3) Plaintiff's First Motion for Partial Summary Judgment (Copyright Infringement) as to Defendant Frena (Doc. No. S-1) is GRANTED,

(4) Plaintiff's Second and Third Motions for Partial Summary Judgment (Trademark Infringement and Lanham Act Violations) as to Defendant Frena (Doc. No. S-3) are GRANTED and

(4) The remaining issues of the injunction and damages are still remaining for the Court to decide.

DONE AND ORDERED.

[1] The process of transferring the image from the bulletin board to one's personal computer is known as downloading.

[2] See note 1.

[3] The process of transferring the image from one's personal computer to the bulletin board is known as uploading.

6.1.8 American Broadcasting Companies, Inc. v. Aereo, Inc. 6.1.8 American Broadcasting Companies, Inc. v. Aereo, Inc.

This case explores the breadth of the performance right. Is it too broad?

134 S.Ct. 2498 (2014)

AMERICAN BROADCASTING COMPANIES, INC., ET AL., PETITIONERS,
v.
AEREO, INC., FKA BAMBOOM LABS, INC.

No. 13-461.

Supreme Court of the United States.

Argued April 22, 2014.
Decided June 25, 2014.

BREYER, J., delivered the opinion of the Court, in which ROBERTS, C. J., and KENNEDY, GINSBURG, SOTOMAYOR, and KAGAN, JJ., joined. SCALIA, J., filed a dissenting opinion, in which THOMAS and ALITO, JJ., joined.

JUSTICE BREYER, delivered the opinion of the Court.

The Copyright Act of 1976 gives a copyright owner the "exclusive righ[t]" to "perform the copyrighted work publicly." 17 U. S. C. §106(4). The Act's Transmit Clause defines that exclusive right as including the right to

"transmit or otherwise communicate a performance. . . of the [copyrighted] work . . . to the public, by means of any device or process, whether the members of the public capable of receiving the performance . . . receive it in the same place or in separate places and at the same time or at different times." §101.

We must decide whether respondent Aereo, Inc., infringes this exclusive right by selling its subscribers a technologically complex service that allows them to watch television programs over the Internet at about the same time as the programs are broadcast over the air. We conclude that it does.

I

A

For a monthly fee, Aereo offers subscribers broadcast television programming over the Internet, virtually as the programming is being broadcast. Much of this program-ming is made up of copyrighted works. Aereo neither owns the copyright in those works nor holds a license from the copyright owners to perform those works publicly.

Aereo's system is made up of servers, transcoders, and thousands of dime-sized antennas housed in a central warehouse. It works roughly as follows: First, when a subscriber wants to watch a show that is currently being broadcast, he visits Aereo's website and selects, from a list of the local programming, the show he wishes to see.

Second, one of Aereo's servers selects an antenna, which it dedicates to the use of that subscriber (and that subscriber alone) for the duration of the selected show. A server then tunes the antenna to the over-the-air broadcast carrying the show. The antenna begins to receive the broadcast, and an Aereo transcoder translates the signals received into data that can be transmitted over the Internet.

Third, rather than directly send the data to the subscriber, a server saves the data in a subscriber-specific folder on Aereo's hard drive. In other words, Aereo's system creates a subscriber-specific copy—that is, a "personal" copy—of the subscriber's program of choice.

Fourth, once several seconds of programming have been saved, Aereo's server begins to stream the saved copy of the show to the subscriber over the Internet. (The subscriber may instead direct Aereo to stream the program at a later time, but that aspect of Aereo's service is not before us.) The subscriber can watch the streamed program on the screen of his personal computer, tablet, smart phone, Internet-connected television, or other Internet-connected device. The streaming continues, a mere few seconds behind the over-the-air broadcast, until the subscriber has received the entire show. See A Dictionary of Computing 494 (6th ed. 2008) (defining "streaming" as "[t]he process of providing a steady flow of audio or video data so that an Internet user is able to access it as it is transmitted").

Aereo emphasizes that the data that its system streams to each subscriber are the data from his own personal copy, made from the broadcast signals received by the particular antenna allotted to him. Its system does not transmit data saved in one subscriber's folder to any other subscriber. When two subscribers wish to watch the same program, Aereo's system activates two separate antennas and saves two separate copies of the program in two separate folders. It then streams the show to the subscribers through two separate transmissions—each from the subscriber's personal copy.

B

Petitioners are television producers, marketers, distributors, and broadcasters who own the copyrights in many of the programs that Aereo's system streams to its subscribers. They brought suit against Aereo for copyright infringement in Federal District Court. They sought a preliminary injunction, arguing that Aereo was infringing their right to "perform" their works "publicly," as the Transmit Clause defines those terms.

The District Court denied the preliminary injunction. 874 F. Supp. 2d 373 (SDNY 2012). Relying on prior Circuit precedent, a divided panel of the Second Circuit affirmed. WNET, Thirteen v. Aereo, Inc., 712 F. 3d 676 (2013) (citing Cartoon Network LP, LLLP v. CSC Holdings, Inc., 536 F. 3d 121 (2008)). In the Second Circuit's view, Aereo does not perform publicly within the meaning of the Transmit Clause because it does not transmit "to the public." Rather, each time Aereo streams a program to a subscriber, it sends a private transmission that is available only to that subscriber. The Second Circuit denied rehearing en banc, over the dissent of two judges. WNET, Thirteen v. Aereo, Inc., 722 F. 3d 500 (2013). We granted certiorari.

II

This case requires us to answer two questions: First, in operating in the manner described above, does Aereo "perform" at all? And second, if so, does Aereo do so "publicly"? We address these distinct questions in turn.

Does Aereo "perform"? See §106(4) ("[T]he owner of [a] copyright . . . has the exclusive righ[t] . . . to perform the copyrighted work publicly" (emphasis added)); §101 ("To perform . . . a work `publicly' means [among other things] to transmit . . . a performance . . . of the work . . . to the public . . ." (emphasis added)). Phrased another way, does Aereo "transmit . . . a performance" when a subscriber watches a show using Aereo's system, or is it only the subscriber who transmits? In Aereo's view, it does not perform. It does no more than supply equipment that "emulate[s] the operation of a home antenna and [digital video recorder (DVR)]." Brief for Respondent 41. Like a home antenna and DVR, Aereo's equipment simply responds to its subscribers' directives. So it is only the subscribers who "perform" when they use Aereo's equipment to stream television programs to themselves.

Considered alone, the language of the Act does not clearly indicate when an entity "perform[s]" (or "transmit[s]") and when it merely supplies equipment that allows others to do so. But when read in light of its purpose, the Act is unmistakable: An entity that engages in activities like Aereo's performs.

A

History makes plain that one of Congress' primary purposes in amending the Copyright Act in 1976 was to overturn this Court's determination that community antenna television (CATV) systems (the precursors of modern cable systems) fell outside the Act's scope. In Fortnightly Corp. v. United Artists Television, Inc., 392 U. S. 390 (1968), the Court considered a CATV system that carried local television broadcasting, much of which was copyrighted, to its subscribers in two cities. The CATV provider placed antennas on hills above the cities and used coaxial cables to carry the signals received by the antennas to the home television sets of its subscribers. The system amplified and modulated the signals in order to improve their strength and efficiently transmit them to subscribers. A subscriber "could choose any of the . . . programs he wished to view by simply turning the knob on his own television set." Id., at 392. The CATV provider "neither edited the programs received nor originated any programs of its own." Ibid.

Asked to decide whether the CATV provider infringed copyright holders' exclusive right to perform their works publicly, the Court held that the provider did not "perform" at all. See 17 U. S. C. §1(c) (1964 ed.) (granting copyright holder the exclusive right to "perform . . . in public for profit" a nondramatic literary work), §1(d) (granting copyright holder the exclusive right to "perform. . . publicly" a dramatic work). The Court drew a line: "Broadcasters perform. Viewers do not perform." 392 U. S., at 398 (footnote omitted). And a CATV provider "falls on the viewer's side of the line." Id., at 399.

The Court reasoned that CATV providers were unlike broadcasters:

"Broadcasters select the programs to be viewed; CATV systems simply carry, without editing, whatever programs they receive. Broadcasters procure programs and propagate them to the public; CATV systems receive programs that have been released to the public and carry them by private channels to additional viewers." Id., at 400.

Instead, CATV providers were more like viewers, for "the basic function [their] equipment serves is little different from that served by the equipment generally furnished by" viewers. Id., at 399. "Essentially," the Court said, "a CATV system no more than enhances the viewer's capacity to receive the broadcaster's signals [by] provid[ing] a well-located antenna with an efficient connection to the viewer's television set." Ibid. Viewers do not become performers by using "amplifying equipment," and a CATV provider should not be treated differently for providing viewers the same equipment. Id., at 398-400.

In Teleprompter Corp. v. Columbia Broadcasting System, Inc., 415 U. S. 394 (1974), the Court considered the copyright liability of a CATV provider that carried broadcast television programming into subscribers' homes from hundreds of miles away. Although the Court recognized that a viewer might not be able to afford amplifying equipment that would provide access to those distant signals, it nonetheless found that the CATV provider was more like a viewer than a broadcaster. Id., at 408-409. It explained: "The reception and rechanneling of [broadcast television signals] for simultaneous viewing is essentially a viewer function, irrespective of the distance between the broadcasting station and the ultimate viewer." Id., at 408.

The Court also recognized that the CATV system exercised some measure of choice over what to transmit. But that fact did not transform the CATV system into a broadcaster. A broadcaster exercises significant creativity in choosing what to air, the Court reasoned. Id., at 410. In contrast, the CATV provider makes an initial choice about which broadcast stations to retransmit, but then "`simply carr[ies], without editing, whatever programs [it] receive[s].'" Ibid. (quoting Fortnightly, supra, at 400 (alterations in original)).

B

In 1976 Congress amended the Copyright Act in large part to reject the Court's holdings in Fortnightly and Teleprompter. See H. R. Rep. No. 94-1476, pp. 86-87 (1976) (hereinafter H. R. Rep.) (The 1976 amendments "completely overturned" this Court's narrow construction of the Act in Fortnightly and Teleprompter). Congress enacted new language that erased the Court's line between broadcaster and viewer, in respect to "perform[ing]" a work. The amended statute clarifies that to "perform" an audiovisual work means "to show its images in any sequence or to make the sounds accompanying it audible." §101; see ibid. (defining "[a]udiovisual works" as "works that consist of a series of related images which are intrinsically intended to be shown by the use of machines . . ., together with accompanying sounds"). Under this new language, both the broadcaster and the viewer of a television program "perform," because they both show the program's images and make audible the program's sounds. See H. R. Rep., at 63 ("[A] broadcasting network is performing when it transmits [a singer's performance of a song] . . . and any individual is performing whenever he or she . . . communicates the performance by turning on a receiving set").

Congress also enacted the Transmit Clause, which specifies that an entity performs publicly when it "transmit[s]. . . a performance . . . to the public." §101; see ibid. (defining "[t]o `transmit' a performance" as "to communicate it by any device or process whereby images or sounds are received beyond the place from which they are sent"). Cable system activities, like those of the CATV systems in Fortnightly and Teleprompter, lie at the heart of the activities that Congress intended this language to cover. See H. R. Rep., at 63 ("[A] cable television system is performing when it retransmits [a network] broadcast to its subscribers"); see also ibid. ("[T]he concep[t] of public performance. . . cover[s] not only the initial rendition or showing, but also any further act by which that rendition or showing is transmitted or communicated to the public"). The Clause thus makes clear that an entity that acts like a CATV system itself performs, even if when doing so, it simply enhances viewers' ability to receive broadcast television signals.

Congress further created a new section of the Act to regulate cable companies' public performances of copyrighted works. See §111. Section 111 creates a complex, highly detailed compulsory licensing scheme that sets out the conditions, including the payment of compulsory fees, under which cable systems may retransmit broadcasts. H. R. Rep., at 88 (Section 111 is primarily "directed at the operation of cable television systems and the terms and conditions of their liability for the retransmission of copyrighted works").

Congress made these three changes to achieve a similar end: to bring the activities of cable systems within the scope of the Copyright Act.

C

This history makes clear that Aereo is not simply an equipment provider. Rather, Aereo, and not just its subscribers, "perform[s]" (or "transmit[s]"). Aereo's activities are substantially similar to those of the CATV companies that Congress amended the Act to reach. See id., at 89 ("[C]able systems are commercial enterprises whose basic retransmission operations are based on the carriage of copyrighted program material"). Aereo sells a service that allows subscribers to watch television programs, many of which are copyrighted, almost as they are being broadcast. In providing this service, Aereo uses its own equipment, housed in a centralized warehouse, outside of its users' homes. By means of its technology (antennas, transcoders, and servers), Aereo's system "receive[s] programs that have been released to the public and carr[ies] them by private channels to additional viewers." Fortnightly, 392 U. S., at 400. It "carr[ies] . . . whatever programs [it] receive[s]," and it offers "all the programming" of each over-the-air station it carries. Id., at 392, 400.

Aereo's equipment may serve a "viewer function"; it may enhance the viewer's ability to receive a broadcaster's programs. It may even emulate equipment a viewer could use at home. But the same was true of the equipment that was before the Court, and ultimately before Congress, in Fortnightly and Teleprompter.

We recognize, and Aereo and the dissent emphasize, one particular difference between Aereo's system and the cable systems at issue in Fortnightly and Teleprompter. The systems in those cases transmitted constantly; they sent continuous programming to each subscriber's television set. In contrast, Aereo's system remains inert until a subscriber indicates that she wants to watch a program. Only at that moment, in automatic response to the subscriber's request, does Aereo's system activate an antenna and begin to transmit the requested program.

This is a critical difference, says the dissent. It means that Aereo's subscribers, not Aereo, "selec[t] the copyrighted content" that is "perform[ed]," post, at 4 (opinion of SCALIA, J.), and for that reason they, not Aereo, "transmit" the performance. Aereo is thus like "a copy shop that provides its patrons with a library card." Post, at 5. A copy shop is not directly liable whenever a patron uses the shop's machines to "reproduce" copyrighted materials found in that library. See §106(1) ("exclusive righ[t] . . . to reproduce the copyrighted work"). And by the same token, Aereo should not be directly liable whenever its patrons use its equipment to "transmit" copyrighted television programs to their screens.

In our view, however, the dissent's copy shop argument, in whatever form, makes too much out of too little. Given Aereo's overwhelming likeness to the cable companies targeted by the 1976 amendments, this sole technological difference between Aereo and traditional cable companies does not make a critical difference here. The subscribers of the Fortnightly and Teleprompter cable systems also selected what programs to display on their receiving sets. Indeed, as we explained in Fortnightly, such a subscriber "could choose any of the . . . programs he wished to view by simply turning the knob on his own television set." 392 U. S., at 392. The same is true of an Aereo subscriber. Of course, in Fortnightly the television signals, in a sense, lurked behind the screen, ready to emerge when the subscriber turned the knob. Here the signals pursue their ordinary course of travel through the universe until today's "turn of the knob"—a click on a website—activates machinery that intercepts and reroutes them to Aereo's subscribers over the Internet. But this difference means nothing to the subscriber. It means nothing to the broadcaster. We do not see how this single difference, invisible to subscriber and broadcaster alike, could transform a system that is for all practical purposes a traditional cable system into "a copy shop that provides its patrons with a library card."

In other cases involving different kinds of service or technology providers, a user's involvement in the operation of the provider's equipment and selection of the content transmitted may well bear on whether the provider performs within the meaning of the Act. But the many similarities between Aereo and cable companies, considered in light of Congress' basic purposes in amending the Copyright Act, convince us that this difference is not critical here. We conclude that Aereo is not just an equipment supplier and that Aereo "perform[s]."

III

Next, we must consider whether Aereo performs petitioners' works "publicly," within the meaning of the Transmit Clause. Under the Clause, an entity performs a work publicly when it "transmit[s] . . . a performance . . . of the work . . . to the public." §101. Aereo denies that it satisfies this definition. It reasons as follows: First, the "performance" it "transmit[s]" is the performance created by its act of transmitting. And second, because each of these performances is capable of being received by one and only one subscriber, Aereo transmits privately, not publicly. Even assuming Aereo's first argument is correct, its second does not follow.

We begin with Aereo's first argument. What performance does Aereo transmit? Under the Act, "[t]o `transmit' a performance . . . is to communicate it by any device or process whereby images or sounds are received beyond the place from which they are sent." Ibid. And "[t]o `perform'" an audiovisual work means "to show its images in any sequence or to make the sounds accompanying it audible." Ibid.

Petitioners say Aereo transmits a prior performance of their works. Thus when Aereo retransmits a network's prior broadcast, the underlying broadcast (itself a performance) is the performance that Aereo transmits. Aereo, as discussed above, says the performance it transmits is the new performance created by its act of transmitting. That performance comes into existence when Aereo streams the sounds and images of a broadcast program to a subscriber's screen.

We assume arguendo that Aereo's first argument is correct. Thus, for present purposes, to transmit a performance of (at least) an audiovisual work means to communicate contemporaneously visible images and contemporaneously audible sounds of the work. Cf. United States v. American Soc. of Composers, Authors and Publishers, 627 F. 3d 64, 73 (CA2 2010) (holding that a download of a work is not a performance because the data transmitted are not "contemporaneously perceptible"). When an Aereo subscriber selects a program to watch, Aereo streams the program over the Internet to that subscriber. Aereo thereby "communicate[s]" to the subscriber, by means of a "device or process," the work's images and sounds. §101. And those images and sounds are contemporaneously visible and audible on the subscriber's computer (or other Internet-connected device). So under our assumed definition, Aereo transmits a performance whenever its subscribers watch a program.

But what about the Clause's further requirement that Aereo transmit a performance "to the public"? As we have said, an Aereo subscriber receives broadcast television signals with an antenna dedicated to him alone. Aereo's system makes from those signals a personal copy of the selected program. It streams the content of the copy to the same subscriber and to no one else. One and only one subscriber has the ability to see and hear each Aereo transmission. The fact that each transmission is to only one subscriber, in Aereo's view, means that it does not transmit a performance "to the public."

In terms of the Act's purposes, these differences do not distinguish Aereo's system from cable systems, which do perform "publicly." Viewed in terms of Congress' regulatory objectives, why should any of these technological differences matter? They concern the behind-the-scenes way in which Aereo delivers television programming to its viewers' screens. They do not render Aereo's commercial objective any different from that of cable companies. Nor do they significantly alter the viewing experience of Aereo's subscribers. Why would a subscriber who wishes to watch a television show care much whether images and sounds are delivered to his screen via a large multisubscriber antenna or one small dedicated antenna, whether they arrive instantaneously or after a few seconds' delay, or whether they are transmitted directly or after a personal copy is made? And why, if Aereo is right, could not modern CATV systems simply continue the same commercial and consumer-oriented activities, free of copyright restrictions, provided they substitute such new technologies for old? Congress would as much have intended to protect a copyright holder from the unlicensed activities of Aereo as from those of cable companies.

The text of the Clause effectuates Congress' intent. Aereo's argument to the contrary relies on the premise that "to transmit . . . a performance" means to make a single transmission. But the Clause suggests that an entity may transmit a performance through multiple, discrete transmissions. That is because one can "transmit" or "communicate" something through a set of actions. Thus one can transmit a message to one's friends, irrespective of whether one sends separate identical e-mails to each friend or a single e-mail to all at once. So can an elected official communicate an idea, slogan, or speech to her constituents, regardless of whether she communicates that idea, slogan, or speech during individual phone calls to each constituent or in a public square.

The fact that a singular noun ("a performance") follows the words "to transmit" does not suggest the contrary. One can sing a song to his family, whether he sings the same song one-on-one or in front of all together. Similarly, one's colleagues may watch a performance of a particular play—say, this season's modern-dress version of "Measure for Measure"—whether they do so at separate or at the same showings. By the same principle, an entity may transmit a performance through one or several transmissions, where the performance is of the same work.

The Transmit Clause must permit this interpretation, for it provides that one may transmit a performance to the public "whether the members of the public capable of receiving the performance . . . receive it . . . at the same time or at different times." §101. Were the words "to transmit . . . a performance" limited to a single act of communication, members of the public could not receive the performance communicated "at different times." Therefore, in light of the purpose and text of the Clause, we conclude that when an entity communicates the same contemporaneously perceptible images and sounds to multiple people, it transmits a performance to them regardless of the number of discrete communications it makes.

We do not see how the fact that Aereo transmits via personal copies of programs could make a difference. The Act applies to transmissions "by means of any device or process." Ibid. And retransmitting a television program using user-specific copies is a "process" of transmitting a performance. A "cop[y]" of a work is simply a "material objec[t] . . . in which a work is fixed . . . and from which the work can be perceived, reproduced, or otherwise communicated." Ibid. So whether Aereo transmits from the same or separate copies, it performs the same work; it shows the same images and makes audible the same sounds. Therefore, when Aereo streams the same television program to multiple subscribers, it "transmit[s] . . . a performance" to all of them.

Moreover, the subscribers to whom Aereo transmits television programs constitute "the public." Aereo communicates the same contemporaneously perceptible images and sounds to a large number of people who are unrelated and unknown to each other. This matters because, although the Act does not define "the public," it specifies that an entity performs publicly when it performs at "any place where a substantial number of persons outside of a normal circle of a family and its social acquaintances is gathered." Ibid. The Act thereby suggests that "the public" consists of a large group of people outside of a family and friends.

Neither the record nor Aereo suggests that Aereo's subscribers receive performances in their capacities as owners or possessors of the underlying works. This is relevant because when an entity performs to a set of people, whether they constitute "the public" often depends upon their relationship to the underlying work. When, for example, a valet parking attendant returns cars to their drivers, we would not say that the parking service provides cars "to the public." We would say that it provides the cars to their owners. We would say that a car dealership, on the other hand, does provide cars to the public, for it sells cars to individuals who lack a pre-existing relationship to the cars. Similarly, an entity that transmits a performance to individuals in their capacities as owners or possessors does not perform to "the public," whereas an entity like Aereo that transmits to large numbers of paying subscribers who lack any prior relationship to the works does so perform.

Finally, we note that Aereo's subscribers may receive the same programs at different times and locations. This fact does not help Aereo, however, for the Transmit Clause expressly provides that an entity may perform publicly "whether the members of the public capable of receiving the performance . . . receive it in the same place or in separate places and at the same time or at different times." Ibid. In other words, "the public" need not be situated together, spatially or temporally. For these reasons, we conclude that Aereo transmits a performance of petitioners' copyrighted works to the public, within the meaning of the Transmit Clause.

IV

Aereo and many of its supporting amici argue that to apply the Transmit Clause to Aereo's conduct will impose copyright liability on other technologies, including new technologies, that Congress could not possibly have wanted to reach. We agree that Congress, while intending the Transmit Clause to apply broadly to cable companies and their equivalents, did not intend to discourage or to control the emergence or use of different kinds of technologies. But we do not believe that our limited holding today will have that effect.

For one thing, the history of cable broadcast transmissions that led to the enactment of the Transmit Clause informs our conclusion that Aereo "perform[s]," but it does not determine whether different kinds of providers in different contexts also "perform." For another, an entity only transmits a performance when it communicates contemporaneously perceptible images and sounds of a work. See Brief for Respondent 31 ("[I]f a distributor . . . sells [multiple copies of a digital video disc] by mail to consumers, . . . [its] distribution of the DVDs merely makes it possible for the recipients to perform the work themselves—it is not a `device or process' by which the distributor publicly performs the work" (emphasis in original)).

Further, we have interpreted the term "the public" to apply to a group of individuals acting as ordinary members of the public who pay primarily to watch broadcast television programs, many of which are copyrighted. We have said that it does not extend to those who act as owners or possessors of the relevant product. And we have not considered whether the public performance right is infringed when the user of a service pays primarily for something other than the transmission of copyrighted works, such as the remote storage of content. See Brief for United States as Amicus Curiae 31 (distinguishing cloudbased storage services because they "offer consumers more numerous and convenient means of playing back copies that the consumers have already lawfully acquired" (emphasis in original)). In addition, an entity does not transmit to the public if it does not transmit to a substantial number of people outside of a family and its social circle.

We also note that courts often apply a statute's highly general language in light of the statute's basic purposes. Finally, the doctrine of "fair use" can help to prevent inappropriate or inequitable applications of the Clause. See Sony Corp. of America v. Universal City Studios, Inc., 464 U. S. 417 (1984).

We cannot now answer more precisely how the Transmit Clause or other provisions of the Copyright Act will apply to technologies not before us. We agree with the Solicitor General that "[q]uestions involving cloud computing, [remote storage] DVRs, and other novel issues not before the Court, as to which `Congress has not plainly marked [the] course,' should await a case in which they are squarely presented." Brief for United States as Amicus Curiae 34 (quoting Sony, supra, at 431 (alteration in original)). And we note that, to the extent commercial actors or other interested entities may be concerned with the relationship between the development and use of such technologies and the Copyright Act, they are of course free to seek action from Congress. Cf. Digital Millennium Copyright Act, 17 U. S. C. §512.

* * *

In sum, having considered the details of Aereo's practices, we find them highly similar to those of the CATV systems in Fortnightly and Teleprompter. And those are activities that the 1976 amendments sought to bring within the scope of the Copyright Act. Insofar as there are differences, those differences concern not the nature of the service that Aereo provides so much as the technological manner in which it provides the service. We conclude that those differences are not adequate to place Aereo's activities outside the scope of the Act.

For these reasons, we conclude that Aereo "perform[s]" petitioners' copyrighted works "publicly," as those terms are defined by the Transmit Clause. We therefore reverse the contrary judgment of the Court of Appeals, and we remand the case for further proceedings consistent with this opinion.

It is so ordered.

JUSTICE SCALIA, with whom JUSTICE THOMAS and JUSTICE ALITO join, dissenting.

This case is the latest skirmish in the long-running copyright battle over the delivery of television program-ming. Petitioners, a collection of television networks and affiliates (Networks), broadcast copyrighted programs on the public airwaves for all to see. Aereo, respondent, operates an automated system that allows subscribers to receive, on Internet-connected devices, programs that they select, including the Networks' copyrighted programs. The Networks sued Aereo for several forms of copyright infringement, but we are here concerned with a single claim: that Aereo violates the Networks'"exclusive righ[t]" to "perform" their programs "publicly." 17 U. S. C. §106(4). That claim fails at the very outset because Aereo does not "perform" at all. The Court manages to reach the opposite conclusion only by disregarding widely accepted rules for service-provider liability and adopting in their place an improvised standard ("looks-like-cable-TV") that will sow confusion for years to come.

I. Legal Standard

There are two types of liability for copyright infringement: direct and secondary. As its name suggests, the former applies when an actor personally engages in infringing conduct. See Sony Corp. of America v. Universal City Studios, Inc., 464 U. S. 417, 433 (1984). Secondary liability, by contrast, is a means of holding defendants responsible for infringement by third parties, even when the defendants "have not themselves engaged in the infringing activity." Id., at 435. It applies when a defendant "intentionally induc[es] or encourag[es]" infringing acts by others or profits from such acts "while declining to exercise a right to stop or limit [them]." Metro-Goldwyn-Mayer Studios Inc. v. Grokster, Ltd., 545 U. S. 913, 930 (2005).

Most suits against equipment manufacturers and service providers involve secondary-liability claims. For example, when movie studios sued to block the sale of Sony's Betamax videocassette recorder (VCR), they argued that Sony was liable because its customers were making unauthorized copies. See Sony, supra, at 434-435. Record labels and movie studios relied on a similar theory when they sued Grokster and StreamCast, two providers of peer-to-peer file-sharing software. See Grokster, supra, at 920-921, 927.

This suit, or rather the portion of it before us here, is fundamentally different. The Networks claim that Aereo directly infringes their public-performance right. Accordingly, the Networks must prove that Aereo "perform[s]" copyrighted works, §106(4), when its subscribers log in, select a channel, and push the "watch" button. That process undoubtedly results in a performance; the question is who does the performing. See Cartoon Network LP, LLLP v. CSC Holdings, Inc., 536 F. 3d 121, 130 (CA2 2008). If Aereo's subscribers perform but Aereo does not, the claim necessarily fails.

The Networks' claim is governed by a simple but profoundly important rule: A defendant may be held directly liable only if it has engaged in volitional conduct that violates the Act. See 3 W. Patry, Copyright §9:5.50 (2013). This requirement is firmly grounded in the Act's text, which defines "perform" in active, affirmative terms: One "perform[s]" a copyrighted "audiovisual work," such as a movie or news broadcast, by "show[ing] its images in any sequence" or "mak[ing] the sounds accompanying it audible." §101. And since the Act makes it unlawful to copy or perform copyrighted works, not to copy or perform in general, see §501(a), the volitional-act requirement demands conduct directed to the plaintiff's copyrighted material, see Sony, supra, at 434. Every Court of Appeals to have considered an automated-service provider's direct liability for copyright infringement has adopted that rule. See Fox Broadcasting Co. v. Dish Network LLC, 747 F. 3d 1060, 1066-1068 (CA9 2014); Cartoon Network, supra, at 130-131 (CA2 2008); CoStar Group, Inc. v. LoopNet, Inc., 373 F. 3d 544, 549-550 (CA4 2004).[1] Although we have not opined on the issue, our cases are fully consistent with a volitional-conduct requirement. For example, we gave several examples of direct infringement in Sony, each of which involved a volitional act directed to the plaintiff's copyrighted material. See 464 U. S., at 437, n. 18.

The volitional-conduct requirement is not at issue in most direct-infringement cases; the usual point of dispute is whether the defendant's conduct is infringing (e.g., Does the defendant's design copy the plaintiff's?), rather than whether the defendant has acted at all (e.g., Did this defendant create the infringing design?). But it comes right to the fore when a direct-infringement claim is lodged against a defendant who does nothing more than operate an automated, user-controlled system. See, e.g., Fox Broadcasting, supra, at 1067; Cartoon Network, supra, at 131. Internet-service providers are a prime example. When one user sends data to another, the provider's equipment facilitates the transfer automatically. Does that mean that the provider is directly liable when the transmission happens to result in the "reproduc[tion]," §106(1), of a copyrighted work? It does not. The provider's system is "totally indifferent to the material's content," whereas courts require "some aspect of volition" directed at the copyrighted material before direct liability may be imposed. CoStar, 373 F. 3d, at 550-551.[2] The defendant may be held directly liable only if the defendant itself "trespassed on the exclusive domain of the copyright owner." Id., at 550. Most of the time that issue will come down to who selects the copyrighted content: the defendant or its customers. See Cartoon Network, supra, at 131-132.

A comparison between copy shops and video-on-demand services illustrates the point. A copy shop rents out photocopiers on a per-use basis. One customer might copy his 10-year-old's drawings—a perfectly lawful thing to do— while another might duplicate a famous artist's copyrighted photographs—a use clearly prohibited by §106(1). Either way, the customer chooses the content and activates the copying function; the photocopier does nothing except in response to the customer's commands. Because the shop plays no role in selecting the content, it cannot be held directly liable when a customer makes an infringing copy. See CoStar, supra, at 550.

Video-on-demand services, like photocopiers, respond automatically to user input, but they differ in one crucial respect: They choose the content. When a user signs in to Netflix, for example, "thousands of . . . movies [and] TV episodes" carefully curated by Netflix are "available to watch instantly." See How [D]oes Netflix [W]ork?, online at http://help.netflix.com/en/node/412 (as visited June 20, 2014, and available in Clerk of Court's case file). That selection and arrangement by the service provider constitutes a volitional act directed to specific copyrighted works and thus serves as a basis for direct liability.

The distinction between direct and secondary liability would collapse if there were not a clear rule for determining whether the defendant committed the infringing act. See Cartoon Network, 536 F. 3d, at 132-133. The volitional-conduct requirement supplies that rule; its purpose is not to excuse defendants from accountability, but to channel the claims against them into the correct analytical track. See Brief for 36 Intellectual Property and Copyright Law Professors as Amici Curiae 7. Thus, in the example given above, the fact that the copy shop does not choose the content simply means that its culpability will be assessed using secondary-liability rules rather than direct-liability rules. See Sony, supra, at 434-442; Cartoon Network, supra, at 132-133.

II. Application to Aereo

So which is Aereo: the copy shop or the video-on-demand service? In truth, it is neither. Rather, it is akin to a copy shop that provides its patrons with a library card. Aereo offers access to an automated system consisting of routers, servers, transcoders, and dime-sized antennae. Like a photocopier or VCR, that system lies dormant until a subscriber activates it. When a subscriber selects a program, Aereo's system picks up the relevant broadcast signal, translates its audio and video components into digital data, stores the data in a user-specific file, and transmits that file's contents to the subscriber via the Internet—at which point the subscriber's laptop, tablet, or other device displays the broadcast just as an ordinary television would. The result of that process fits the statutory definition of a performance to a tee: The subscriber's device "show[s]" the broadcast's "images" and "make[s] the sounds accompanying" the broadcast "audible." §101. The only question is whether those performances are the product of Aereo's volitional conduct.

They are not. Unlike video-on-demand services, Aereo does not provide a prearranged assortment of movies and television shows. Rather, it assigns each subscriber an antenna that—like a library card—can be used to obtain whatever broadcasts are freely available. Some of those broadcasts are copyrighted; others are in the public domain. The key point is that subscribers call all the shots: Aereo's automated system does not relay any program, copyrighted or not, until a subscriber selects the program and tells Aereo to relay it. Aereo's operation of that system is a volitional act and a but-for cause of the resulting performances, but, as in the case of the copy shop, that degree of involvement is not enough for direct liability. See Grokster, 545 U. S., at 960 (BREYER, J., concurring) ("[T]he producer of a technology which permits unlawful copying does not himself engage in unlawful copying").

In sum, Aereo does not "perform" for the sole and simple reason that it does not make the choice of content. And because Aereo does not perform, it cannot be held directly liable for infringing the Networks' public-performance right.[3] That conclusion does not necessarily mean that Aereo's service complies with the Copyright Act. Quite the contrary. The Networks' complaint alleges that Aereo is directly and secondarily liable for infringing their publicperformance rights (§106(4)) and also their reproduction rights (§106(1)). Their request for a preliminary injunction—the only issue before this Court—is based exclusively on the direct-liability portion of the public-performance claim (and further limited to Aereo's "watch" function, as opposed to its "record" function). See App. to Pet. for Cert. 60a-61a. Affirming the judgment below would merely return this case to the lower courts for consideration of the Networks' remaining claims.

III. Guilt By Resemblance

The Court's conclusion that Aereo performs boils down to the following syllogism: (1) Congress amended the Act to overrule our decisions holding that cable systems do not perform when they retransmit over-the-air broadcasts;[4] (2) Aereo looks a lot like a cable system; therefore (3) Aereo performs. Ante, at 4-10. That reasoning suffers from a trio of defects.

First, it is built on the shakiest of foundations. Perceiving the text to be ambiguous, ante, at 4, the Court reaches out to decide the case based on a few isolated snippets of legislative history, ante, at 7-8 (citing H. R. Rep. No. 94-1476 (1976)). The Court treats those snippets as authoritative evidence of congressional intent even though they come from a single report issued by a committee whose members make up a small fraction of one of the two Houses of Congress. Little else need be said here about the severe shortcomings of that interpretative methodology. See Lawson v. FMR LLC, 571 U. S. ___, ___ (2014) (SCALIA, J., concurring in principal part and concurring in judgment) (slip op., at 1-2).

Second, the Court's reasoning fails on its own terms because there are material differences between the cable systems at issue in Teleprompter Corp. v. Columbia Broadcasting System, Inc., 415 U. S. 394 (1974), and Fortnightly Corp. v. United Artists Television, Inc., 392 U. S. 390 (1968), on the one hand and Aereo on the other. The former (which were then known as community-antenna television systems) captured the full range of broadcast signals and forwarded them to all subscribers at all times, whereas Aereo transmits only specific programs selected by the user, at specific times selected by the user. The Court acknowledges this distinction but blithely concludes that it "does not make a critical difference." Ante, at 10. Even if that were true, the Court fails to account for other salient differences between the two technologies.[5] Though cable systems started out essentially as dumb pipes that routed signals from point A to point B, see ante, at 5, by the 1970's, that kind of service "`no longer exist[ed],'" Brief for Petitioners in Columbia Broadcasting System, Inc. v. Teleprompter Corp., O. T. 1973, No. 72-1633, p. 22. At the time of our Teleprompter decision, cable companies "perform[ed] the same functions as `broadcasters' by deliberately selecting and importing distant signals, originating programs, [and] selling commercials," id., at 20, thus making them curators of content—more akin to video-ondemand services than copy shops. So far as the record reveals, Aereo does none of those things.

Third, and most importantly, even accepting that the 1976 amendments had as their purpose the overruling of our cable-TV cases, what they were meant to do and how they did it are two different questions—and it is the latter that governs the case before us here. The injury claimed is not violation of a law that says operations similar to cable TV are subject to copyright liability, but violation of §106(4) of the Copyright Act. And whatever soothing reasoning the Court uses to reach its result ("this looks like cable TV"), the consequence of its holding is that someone who implements this technology "perform[s]" under that provision. That greatly disrupts settled jurisprudence which, before today, applied the straightforward, bright-line test of volitional conduct directed at the copyrighted work. If that test is not outcome determinative in this case, presumably it is not outcome determinative elsewhere as well. And it is not clear what the Court proposes to replace it. Perhaps the Court means to adopt (invent, really) a two-tier version of the Copyright Act, one part of which applies to "cable companies and their equivalents" while the other governs everyone else. Ante, at 9-10, 16.

The rationale for the Court's ad hoc rule for cablesystem lookalikes is so broad that it renders nearly a third of the Court's opinion superfluous. Part II of the opinion concludes that Aereo performs because it resembles a cable company, and Congress amended the Act in 1976 "to bring the activities of cable systems within [its] scope." Ante, at 8. Part III of the opinion purports to address separately the question whether Aereo performs "publicly." Ante, at 10-15. Trouble is, that question cannot remain open if Congress's supposed intent to regulate whatever looks like a cable company must be given legal effect (as the Court says in Part II). The Act reaches only public performances, see §106(4), so Congress could not have regulated "the activities of cable systems" without deeming their retransmissions public performances. The upshot is this: If Aereo's similarity to a cable company means that it performs, then by necessity that same characteristic means that it does so publicly, and Part III of the Court's opinion discusses an issue that is no longer relevant—though discussing it certainly gives the opinion the "feel" of real textual analysis.

Making matters worse, the Court provides no criteria for determining when its cable-TV-lookalike rule applies. Must a defendant offer access to live television to qualify? If similarity to cable-television service is the measure, then the answer must be yes. But consider the implications of that answer: Aereo would be free to do exactly what it is doing right now so long as it built mandatory time shifting into its "watch" function.[6] Aereo would not be providing live television if it made subscribers wait to tune in until after a show's live broadcast ended. A subscriber could watch the 7 p.m. airing of a 1-hour program any time after 8 p.m. Assuming the Court does not intend to adopt such a do-nothing rule (though it very well may), there must be some other means of identifying who is and is not subject to its guilt-by-resemblance regime.

Two other criteria come to mind. One would cover any automated service that captures and stores live television broadcasts at a user's direction. That can't be right, since it is exactly what remote storage digital video recorders (RS-DVRs) do, see Cartoon Network, 536 F. 3d, at 124-125, and the Court insists that its "limited holding" does not decide the fate of those devices, ante, at 16-17. The other potential benchmark is the one offered by the Government: The cable-TV-lookalike rule embraces any entity that "operates an integrated system, substantially dependent on physical equipment that is used in common by [its] subscribers." Brief for United States as Amicus Curiae 20. The Court sensibly avoids that approach because it would sweep in Internet service providers and a host of other entities that quite obviously do not perform.

That leaves as the criterion of cable-TV-resemblance nothing but th'ol' totality-of-the-circumstances test (which is not a test at all but merely assertion of an intent to perform test-free, ad hoc, case-by-case evaluation). It will take years, perhaps decades, to determine which automated systems now in existence are governed by the traditional volitional-conduct test and which get the Aereo treatment. (And automated systems now in contemplation will have to take their chances.) The Court vows that its ruling will not affect cloud-storage providers and cabletelevision systems, see ante, at 16-17, but it cannot deliver on that promise given the imprecision of its result-driven rule. Indeed, the difficulties inherent in the Court's makeshift approach will become apparent in this very case. Today's decision addresses the legality of Aereo's "watch" function, which provides nearly contemporaneous access to live broadcasts. On remand, one of the first questions the lower courts will face is whether Aereo's "record" function, which allows subscribers to save a program while it is airing and watch it later, infringes the Networks' public-performance right. The volitionalconduct rule provides a clear answer to that question: Because Aereo does not select the programs viewed by its users, it does not perform. But it is impossible to say how the issue will come out under the Court's analysis, since cable companies did not offer remote recording and playback services when Congress amended the Copyright Act in 1976.

* * *

I share the Court's evident feeling that what Aereo is doing (or enabling to be done) to the Networks' copyrighted programming ought not to be allowed. But perhaps we need not distort the Copyright Act to forbid it. As discussed at the outset, Aereo's secondary liability for performance infringement is yet to be determined, as is its primary and secondary liability for reproduction infringement. If that does not suffice, then (assuming one shares the majority's estimation of right and wrong) what we have before us must be considered a "loophole" in the law. It is not the role of this Court to identify and plug loopholes. It is the role of good lawyers to identify and exploit them, and the role of Congress to eliminate them if it wishes. Congress can do that, I may add, in a much more targeted, better informed, and less disruptive fashion than the crude "looks-like-cable-TV" solution the Court invents today.

We came within one vote of declaring the VCR contraband 30 years ago in Sony. See 464 U. S., at 441, n. 21. The dissent in that case was driven in part by the plaintiffs' prediction that VCR technology would wreak all manner of havoc in the television and movie industries. See id., at 483 (opinion of Blackmun, J.); see also Brief for CBS, Inc., as Amicus Curiae, O. T. 1982, No. 81-1687, p. 2 (arguing that VCRs "directly threatened" the bottom line of "[e]very broadcaster").

The Networks make similarly dire predictions about Aereo. We are told that nothing less than "the very existence of broadcast television as we know it" is at stake. Brief for Petitioners 39. Aereo and its amici dispute those forecasts and make a few of their own, suggesting that a decision in the Networks' favor will stifle technological innovation and imperil billions of dollars of investments in cloud-storage services. See Brief for Respondents 48-51; Brief for BSA, The Software Alliance as Amicus Curiae 5-13. We are in no position to judge the validity of those self-interested claims or to foresee the path of future technological development. See Sony, supra, at 430-431; see also Grokster, 545 U. S., at 958 (BREYER, J., concurring). Hence, the proper course is not to bend and twist the Act's terms in an effort to produce a just outcome, but to apply the law as it stands and leave to Congress the task of deciding whether the Copyright Act needs an upgrade. I conclude, as the Court concluded in Sony: "It may well be that Congress will take a fresh look at this new technology, just as it so often has examined other innovations in the past. But it is not our job to apply laws that have not yet been written. Applying the copyright statute, as it now reads, to the facts as they have been developed in this case, the judgment of the Court of Appeals must be [affirmed]." 464 U. S., at 456.

I respectfully dissent.

[1] An unpublished decision of the Third Circuit is to the same effect. Parker v. Google, Inc., 242 Fed. Appx. 833, 836-837 (2007) (per curiam).

The Networks muster only one case they say stands for a different approach, New York Times Co. v. Tasini, 533 U. S. 483 (2001). Reply Brief 18. But Tasini is clearly inapposite; it dealt with the question whether the defendants' copying was permissible, not whether the defendants were the ones who made the copies. See 533 U. S., at 487-488, 492, 504-506.

[2] Congress has enacted several safe-harbor provisions applicable to automated network processes, see, e.g., 17 U. S. C. §512(a)-(b), but those provisions do not foreclose "any other defense," §512(l), including a volitional-conduct defense.

[3] Because I conclude that Aereo does not perform at all, I do not reach the question whether the performances in this case are to the public. See ante, at 10-15.

[4] See Teleprompter Corp. v. Columbia Broadcasting System, Inc., 415 U. S. 394 (1974); Fortnightly Corp. v. United Artists Television, Inc., 392 U. S. 390 (1968).

[5] The Court observes that "[t]he subscribers of the Fortnightly and Teleprompter cable systems . . . selected what programs to display on their receiving sets," but acknowledges that those choices were possible only because "the television signals, in a sense, lurked behind the screen, ready to emerge when the subscriber turned the knob." Ante, at 10. The latter point is dispositive: The signals were "ready to emerge" because the cable system—much like a video-on-demand provider— took affirmative, volitional steps to put them there. As discussed above, the same cannot be said of the programs available through Aereo's automated system.

[6] Broadcasts accessible through the "watch" function are technically not live because Aereo's servers take anywhere from a few seconds to a few minutes to begin transmitting data to a subscriber's device. But the resulting delay is so brief that it cannot reasonably be classified as time shifting.

6.1.9 London-Sire Records, Inc. v. Doe 1 et al. 6.1.9 London-Sire Records, Inc. v. Doe 1 et al.

This case examines what it means to distribute a copyrighted work in the age of electronic file distribution

542 F.Supp.2d 153

LONDON-SIRE RECORDS, INC., et al., Plaintiffs,
v.
DOE 1 et al., Defendants.

No. 04cv12434-NG.

United States District Court, D. Massachusetts.

March 31, 2008.

[156] John R. Bauer, Nancy M. Cremins, Robinson & Cole LLP, Boston, MA, Katheryn Jarvis, Moshe D. Rothman, Coggon Holme [157] Roberts & Owen LLP, Denver, CO, Emily A. Berger, San Francisco, CA, for Plaintiffs.

Raymond Sayeg, Jr. Law Office of Raymond Sayeg, Boston, MA, for Defendants.

ORDER ON MOTIONS TO QUASH

GERTNER, District Judge. 

This case consists of numerous actions consolidated under London-Sire Records, Inc. v. Does 1-4, Civil Action No. 04-cv-12434. The plaintiffs include several of the country's largest record companies. The defendants,[1] the plaintiffs claim, are individual computer users — mainly college students — who use "peer-to-peer" filesharing software to download and disseminate music without paying for it, infringing the plaintiffs' copyrights.

In these cases, the plaintiffs have been able to infer some infringing file-sharing activity from their investigations, but have not been able to discover the file-sharer's identity. They have an Internet Protocol [158] number ("IP number" or "IP address") identifying the file-sharer's computer, but no more. Consequently, the plaintiffs — with the Court's permission — have served subpoenas on a number of internet service providers ("ISPs"), largely colleges and universities, seeking a name to go with the number. To preserve the rights of those whose identities are sought, the Court has required the ISPs to delay responding to the subpoena until the individual defendants have had an opportunity to move to quash it before their identities are disclosed.[2] Several defendants have done so; those are the motions presently before the Court.

After briefing, argument, and amicus participation, the Court concludes that it has insufficient information to allow the plaintiffs to take expedited discovery under these circumstances. First, the movants are entitled to some First Amendment protection of their anonymity — albeit limited. Second, the defendants may have expectations of privacy with regard to their identity, but that depends on the terms of the internet service agreement they have with Boston University, which has not been provided to the Court. Third, the movants have raised an issue of fact with respect to the number of identities disclosed to the plaintiffs by the expedited discovery. As it currently exists, the plaintiffs' subpoena may invade the anonymity of many non-infringing internet users — anonymity that deserves protection by the Court. Under these circumstances, the best solution is in camera review of the terms of service agreement and the ISP's list of individuals who match the information supplied by the plaintiffs.

The Court will therefore GRANT two of the motions to quash (documents ##104 and 115), at least until the relevant information is obtained.[3] The plaintiffs may renew their motion for expedited discovery, addressing the Court's concerns by modifying the subpoena they seek to serve on Boston University, as discussed below.

I. BACKGROUND

A. Facts

In each of these cases, the facts are substantially identical. Since the defendants' motions are effectively motions to dismiss — there is almost no evidence in the case, and the movants argue, among other things, that the plaintiffs have failed to state a claim upon which relief can be granted — the Court will apply that standard of review to the pleadings. The plaintiffs' pleadings are taken as true, and the Court will draw all reasonable inferences in their favor. See, e.g., Rivera v. Rhode Island, 402 F.3d 27, 33 (1st Cir. 2005) (stating standard for motion to dismiss). To survive a motion to dismiss, the plaintiffs' pleaded facts must "possess enough heft to sho[w] that [they are] entitled to relief." Clark v. Boscher, 514 F.3d 107, 112 (1st Cir.2008) (internal quotation marks omitted) (quoting Bell Atlantic Corp. v. Twombly, ___ U.S. ___, 127 S.Ct. 1955, 1959, 167 L.Ed.2d 929 (2007)) (first alteration in Twombly). 

[159] The plaintiffs allege that the defendants used peer-to-peer software to "download and/or distribute to the public certain of the [plaintiffs'] Copyrighted Recordings.... Through his or her continuous and ongoing acts of downloading and/or distributing to the public the Copyrighted Recordings, each Defendant has violated Plaintiffs' exclusive rights of reproduction and distribution." E.g., Compl. at 5 (docket no. 07-cv-10834, document #1). To clarify the issues on which this case turns, the Court will briefly explain the nature of peer-to-peer software and its use.

Peer-to-peer software primarily exists to create decentralized networks of individual computer users. The software allows the users to communicate directly with one another, rather than routing their transmissions through a central server — thus the term "peer-to-peer" architecture, as opposed to "client-server." See, e.g., Metro-Goldwyn-Mayer Studios, Inc. v. Grokster, Ltd., 545 U.S. 913, 919-920 & n. 1, 125 S.Ct. 2764, 162 L.Ed.2d 781 (2005). Each type of architecture has distinct advantages and disadvantages, most of which are not relevant to this case.

What is relevant is that users in a peerto-peer network can remain relatively anonymous or pseudonymous. Because communications between two computers on a peer-to-peer network can take place directly, without passing through a central network server,[4] such transactions are not easily observable by a third party. By the nature of the network and software, then, peer-to-peer users can control what information they display to the world. See Linares Decl. at 4, Ex. A to PI. Mot. Leave to Take Immediate Discovery (docket no. 07-cv-10834, document #5). Moreover, generally speaking, anyone who has the requisite software and internet connection can participate in open peer-to-peer networks, such as the ones the defendants are alleged to have used in this case.

Peer-to-peer users can also transfer files over the network. Many such files are entirely legitimate. See Grokster, 545 U.S. at 920, 125 S.Ct. 2764. However, other files transferred are electronic versions of copyrighted music or video files. Notably, because the files on each user's computer are digital, another computer can make a precise copy of them with no attendant loss in quality. See Linares Decl. at 3-4, Ex. A to PI. Mot. Leave to Take Immediate Discovery (docket no. 07-cv-10834, document #5).

In this case, the plaintiffs allege that each of the defendants has taken part in just such a file transfer. To discover potentially infringing transfers, the plaintiffs (acting through their trade association, the Recording Industry Association of America, or "RIAA") have retained a third-party investigator, MediaSentry, Inc. [160] ("MediaSentry"). Id. at 4-5. MediaSentry essentially functions as an undercover user of the peer-to-peer networks. It connects to the network and searches for the plaintiff record companies' copyrighted files. Upon finding the files, it downloads them. See id. at 5-6. MediaSentry gathers what information it can about the computer from which the files were downloaded (the "sending computer.") Most crucially, that information includes the date and time at which the files were downloaded and the IP number of the sending computer. It can also include the user's name, but if given, the names are usually pseudonymous. See id. After the files are downloaded, the RIAA verifies that they can form the basis for a suit. It reviews a listing of the music files that the user has offered for download in order to determine whether they appear to be copyrighted sound recordings. The RIAA also listens to the downloaded music files from these users in order to confirm that they are, indeed, illegal copies of sound recordings whose copyrights are owned by RIAA members. Id. at 6.[5]

At this point, assuming the plaintiffs wish to sue, they cannot do so; they have only the IP number of the sending computer. An IP number is sometimes called an IP address because it is just that: an address. It serves as a locator declaring the place of a particular piece of electronic equipment so that electronic data may be sent to it, and is usually represented as a series of four numbers between 0 and 255. See, e.g., America Online v. Huang, 106 F.Supp.2d 848, 851 (E.D.Va.2000). (For example, 168.122.128.38 is one of the IP addresses allegedly used by a defendant in this case. See Doe List, Ex. A to Compl. (docket no. 07-cv-10834, document #1).)

But relatively few personal computer users have a specific, set IP address, called a "static" address. Instead, many use their computers to connect to a network provided by their ISP, which uses a certain range of IP addresses — say, all of the numbers between 168.122.1.x to 168.122.100.x. The ISP assigns an address within its range to the user's computer for the user's session, allocating the numbers within its range on an as-needed basis. This process is known as "dynamic" addressing. See, e.g., H. Brian Holland, Tempest in a Teapot or Tidal Wave? Cybersquatting Rights & Remedies Run Amok, 10 J. Tech. L. & Pol'y 301, 305 & nn. 13-18 (2005). This makes the plaintiffs' task of discovering the identity of a particular infringer more difficult. The IP address that they have noted as belonging to a particular user's computer may be assigned to a different user's computer in short order. See id.

However, the plaintiffs are not without leads. The range in which the IP address is assigned may reveal the user's ISP. See Linares Decl. at 7, Ex. A to PI. Mot. Leave to Take Immediate Discovery (docket no. 07-cv-10834, document #5); see also, e.g., Network-Tools.com, http://network-tools. com/default.asp (last visited Mar. 31, 2008) (providing such a service). And ISPs generally keep logs of which IP address is assigned to which user — although it may purge those logs after a certain period of time, which was one of the key facts relied [161] upon by the Court in granting expedited discovery. See Linares Decl. at 9, Ex. A to PI. Mot. Leave to Take Immediate Discovery (docket no. 07-cv-10834, document #5). Thus, the plaintiffs seek, though their subpoena, the opportunity to place their list of IP addresses side-by-side with the ISP's user logs to determine who was using the IP address at the moment of the alleged infringement. The ISPs, particularly colleges and universities, appropriately decline to reveal the identities of their users without a court order. Therefore, the plaintiffs bring "John Doe" lawsuits and seek discovery in order to determine the real identities of the defendants.

B. Procedural History

The plaintiff record companies have brought approximately forty "John Doe" cases in this Court, many-perhaps mostdesignating more than one defendant, grouped by ISP.[6] In each case, the Court has granted expedited discovery and leave to subpoena the ISP, recognizing that the plaintiffs' rights may be irreparably and unfairly prejudiced unless they are allowed to seek the defendants' identities. See, e.g., Order re: Expedited Discovery (Dec. 9, 2004) (document #7). Simultaneously, however, the Court has recognized that the defendants should have the opportunity to combat the subpoena if they desire to do so. Therefore, the Court has ordered that the ISP provide the individual users with notice of the lawsuit and a short statement of some of their rights before revealing their identities to the plaintiffs. Furthermore, the ISP may not respond to the subpoena for 14 days after each defendant has received notice. See id.; see also Appendix A (Court-Directed Notice).

Simultaneous with the grant of expedited discovery, the Court has consolidated each "John Doe" case with the first, London-Sire, No. 04-cv-12434. The cases involve similar, even virtually identical, issues of law and fact: the alleged use of peer-to-peer software to share copyrighted sound recordings and the discovery of defendants' identities through the use of a Rule 45 subpoena to their internet service provider. Consolidating the cases ensures administrative efficiency for the Court, the plaintiffs, and the ISP, and allows the defendants to see the defenses, if any, that other John Does have raised.[7]

In view of the $750 statutory minimum damages per song, 17 U.S.C. § 504(c)(2), most defendants choose to settle. The approximate settlement range appears to be $3,000 to $6,000 per defendant, a considerable amount of money, particularly to the college students who have been caught in the plaintiffs' nets.

Only three of the defendants have elected to fight the subpoena. Two are Doe defendants from the case originally titled Arista Records LLC v. Does 1-21, No. 07cv-10834 (consolidated on May 8, 2007). In that case, the plaintiffs sought discovery from Boston University as the defendants' ISP, and the two Does[8] separately moved [162] to quash the subpoena. Each primarily asserts that the plaintiffs have failed to state a sufficient claim for copyright infringement. See Mem. Supp. Mot. Quash (document #104); Mot. Quash (document #115). Because the two motions are substantively similar, the Court will address them together.

The third defendant to move to quash the subpoena is Doe no. 12 from Warner Brothers Records, Inc. v. Does 1-17, No. 07-cv-10924 (consolidated on May 18, 2007). The Internet Service Provider at issue is the University of Massachusetts. Doe no. 12 argues that she is not subject to personal jurisdiction in Massachusetts. See Mot. Quash (document #113).

The Court held a hearing on the Motions to Quash on January 28, 2008. Shortly thereafter, the Court granted the Electronic Frontier Foundation ("EFF") leave to file an amicus brief supporting the Motion to Quash. See Electronic Order (Feb. 6, 2008). Its brief principally treats the First Amendment implications of the subpoena[9] and the proper sweep of the copyright laws. The Court thanks the amicus for its participation.

The Court will examine first the motions of the two Does in the Boston University case, which argue that the subpoena ought to be denied on substantive grounds. It will then turn to the University of Massachusetts Doe's argument that the subpoena should be quashed for lack of personal jurisdiction.

II. LEGAL STANDARDS

This case is still at a preliminary stage: The plaintiffs seek to learn the identities of the defendants so that, the issue may be properly joined on the merits. Under Federal Rule 45, the Court "shall quash or modify the subpoena if it ... requires disclosure of privileged or other protected matter and no exception or' waiver applies." Fed.R.Civ.P. 45(c)(3)(A)(iii). The substantive inquiry is similar to the one necessary for issuing a protective order. See Micro Motion, Inc. v. Kane Steel Co., 894 F.2d 1318, 1322-23 (Fed.Cir.1990). The party requesting that the subpoena be quashed must show good cause for protection by specifically demonstrating that disclosure will cause a clearly defined and serious harm. See Anderson v. Cryovac, Inc., 805 F.2d 1, 7-8 (1st Cir. 1986); Glenmede Trust Co. v. Thompson, 56 F.3d 476, 483 (3d Cir.1995). The Court balances the harm of disclosure against the harm to the other party of restricting discovery.

The Court must therefore first consider whether the defendants' anonymity is entitled to privilege or other protection. If so, it will turn to the balancing test necessary under Rule 45(c)(3).

III. THE DEFENDANTS' ANONYMITY IS ENTITLED TO SOME FIRST AMENDMENT PROTECTION

The motion to quash raises two First Amendment issues-the right to anonymous speech and the right to whatever creative activity is involved in the defendants' acts. While the Court recognizes some limited First Amendment protection here, that protection only goes so far as to subject the plaintiffs' subpoenas to somewhat heightened scrutiny. Other courts have [163] reached the same conclusion. See, e.g., Sony Music Entm't v. Does 1-40, 326 F.Supp.2d 556, 564 (S.D.N.Y.2004).

As the Supreme Court has repeatedly held, the First Amendment protects anonymous speech. The right to anonymity is an important foundation of the right to speak freely. Indeed, "[a]nonymity is a shield from the tyranny of the majority. It ... exemplifies the purpose behind the Bill of Rights, and of the First Amendment in particular: to protect unpopular individuals from retaliation — and their ideas from suppression — at the hand of an intolerant society." Mclntyre v. Ohio Elections Comm'n, 514 U.S. 334, 357, 115 S.Ct. 1511, 131 L.Ed.2d 426 (1995). See also NAACP v. Alabama ex rel. Patterson, 357 U.S. 449, 460-62, 78 S.Ct. 1163, 2 L.Ed.2d 1488 (1958) (discussing generally the importance of anonymity). Still, the anonymous activity that is being protected must be "speech."

Copyright infringement, per se, is clearly not speech entitled to First Amendment protection. See Harper & Row Publishers, Inc. v. Nation Enters., 471 U.S. 539, 555-57, 560, 105 S.Ct. 2218, 85 L.Ed.2d 588 (1985) (discussing the First Amendment and copyright, and examining whether fair use doctrine applied to alleged act of copyright infringement). But there are some creative aspects of downloading music or making it available to others to copy: the value judgment of what is worthy of being copied; the association of one recording with another by placing them together in the same library; the self-expressive act of identification with a particular recording; the affirmation of joining others listening to the same recording or expressing the same idea. See Rebecca Tushnet, Copy This Essay: How Fair Use Doctrine Harms Free Speech and How Copying Serves It, 114 Yale L.J. 535, 545-47, 562-81 (2004); Jack M. Balkin, Digital Speech and Democratic Culture: A Theory of Freedom of Expression for the Information Society, 79 N.Y.U. L.Rev. 1, 45-46 (2004); cf. Harper & Row, 471 U.S. at 547, 105 S.Ct. 2218 (noting that compilation of pure fact "entails originality" in selection and ordering of the facts). Thus, while the aspect of a file-sharer's act that is infringing is not entitled to First Amendment protection, other aspects of it are. Cf, e.g., Schad v. Mount Ephraim, 452 U.S. 61, 66, 101 S.Ct. 2176, 68 L.Ed.2d 671 (1981) ("[N]ude dancing is not without its First Amendment protections from official regulation."); Eugene Volokh, Crime-Facilitating Speech, 57 Stan. L.Rev. 1095 (2005) (arguing that crime-facilitating speech has "some First Amendment value").

Nevertheless, the fact that there is First Amendment value associated with sharing music over a peer-to-peer network does not insulate the defendants from liability. Rather, the minimal First Amendment protection their activity garners[10] entitles them to some scrutiny of a discovery request that uses the power of the Court to threaten the privilege.[11]

[164] IV. APPLICATION OF THE BALANCING TEST

As to how to balance the harms, the Court finds persuasive the approach of the Southern District of New York in Sony Music, 326 F.Supp.2d 556. In that case, the court reviewed the leading cases on subpoenas seeking disclosure of defendants' identities from their ISP. It isolated five important factors:[12]

(1) a concrete showing of a prima facie claim of actionable harm, (2) specificity of the discovery request, (3) the absence of alternative means to obtain the subpoenaed information, (4) a central need for the subpoenaed information to advance the claim, and (5) the party's expectation of privacy.

Id. at 564-65 (citations omitted).[13] The first factor ensures that the defendants cannot pierce the defendants' anonymity based on an unsupported or legally insufficient pleading. The second, third, and fourth factors ensure that the subpoena is narrowly tailored to reveal no more information about the defendants than necessary, and to ensure that third parties who are not accused of infringement remain anonymous. The fifth factor considers the defendants' expectations of privacy, including whatever service arrangement they might have with their ISP.

The Court considers each factor in turn.

A. Factor One: Prima Facie Claim of Actionable Harm

This factor has three parts. First, the plaintiffs must assert an "actionable harm," a claim upon which relief can be granted. Second, the claim must be supported by prima facie evidence. That standard does not require the plaintiffs to prove their claim. They need only proffer sufficient evidence that, if credited, would support findings in their favor on all facts essential to their claim. See Adelson v. Hananel, 510 F.3d 43, 48 (1st Cir.2007) (discussing prima facie standard for personal jurisdiction). Finally, both the claim and the prima facie evidence supporting it must be "concrete." That is, they must be [165] reasonably grounded in allegations of a specific act of infringement.

The movants and the EFF argue that the plaintiffs have failed to meet their burden under each part of the test. See Mot. Quash at 3-7 (document #104); Mot. Quash at 4-10 (document #115); EFF Br. at 9-24 (document #152). Their arguments involve important and difficult questions of copyright law. Ultimately, however, the Court finds that the plaintiffs have satisfied this factor. Considering as true the facts they have pleaded, and drawing all reasonable inferences in their favor, the plaintiffs have made a concrete showing of a prima facie case of an actionable harm.

1. Whether the Plaintiffs Have Asserted a Claim Upon Which Relief Can Be Granted

A claim for copyright infringement has two elements. First, the plaintiffs must demonstrate that they hold a valid copyright (an issue the defendants do not contest.) Second, the plaintiff must show that the defendant violated of one of the exclusive rights held by a copyright owner. See T-Peg, Inc. v. Vermont Timber Works, Inc., 459 F.3d 97, 108 (1st Cir.2006); see also Feist Publ'ns, Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 360-61, 111 S.Ct. 1282, 113 L.Ed.2d 358 (1991); 17 U.S.C. § 501(a). The plaintiffs claim that "each [defendant, without the permission or consent of [p]laintiffs, has ... downloaded] or distribut[ed] to the public" music files to which the plaintiff holds the copyright. Compl. at 5 (docket no. 07-cv-10834, document #1). Two rights reserved to the copyright holder are at issue in this case: the right "to reproduce the copyrighted work in copies or phonorecords," 17 U.S.C. § 106(1), and the right "to distribute copies or phonorecords of the copyrighted work to the public by sale or other transfer of ownership, or by rental, lease, or lending," id. § 106(3).

The movants and the amicus present two broad arguments, each of which requires the Court to consider the scope of a copyright holder's exclusive rights under the statutes quoted above. First, they contend that the copyright laws require an actual dissemination of copyrighted material; merely making copyrighted material available for another person to copy, they argue, is only an attempt at infringement — which is not actionable. Mem. Supp. Mot. Quash at 4-6 (document #104); Mot. Quash at 7 (document #115); EFF Br. at 10-15 (document #152). Second, they contend that the scope of the rights given to copyright owners by § 106 is limited by the definition of "phonorecords" as "material objects" in 17 U.S.C. § 101.[14] In their view, the copyright owner's rights are limited to tangible, physical objects, and purely electronic transmissions over the internet fall outside those rights.[15] Suppl. Mem. L. Supp. Mot. Quash at 4-6 (document #149); Mot. Quash at 7 (document #115); EFF Br. at 15-24 (document #152). Both of these broad arguments question whether the plaintiffs have alleged a legally cognizable [166] harm under the copyright statutes. If they have not, then the subpoena must be quashed.

a. Whether the Copyright Holder's Right Extends Only to Actual Distributions

The first question the Court must address is whether the distribution right under 17 U.S.C. § 106(3) requires an actual dissemination to constitute an infringement.[16] It is an important issue, determining in part how to evaluate the proffered evidence in this case. MediaSentry, posing as just another peer-to-peer user, can easily verify that copyrighted material has been made available for download from a certain IP address. Arguably, though, MediaSentry's own downloads are not themselves copyright infringements because it is acting as an agent of the copyright holder, and copyright holders cannot infringe their own rights.[17] If that argument is accepted, MediaSentry's evidence cannot alone demonstrate an infringement.

The plaintiffs suggest two reasons why an actual distribution might not be required. First, the statute reserves to the copyright owner the right "to do and to authorize ... [the distribution of] copies or phonorecords of the copyrighted work to the public." § 106(3) (emphasis added). The language appears to grant two distinct rights: "doing" and "authorizing" a distribution. Making the copyrighted material available over the internet might constitute an actionable "authorization" of a distribution. Second, if mere authorization is not enough, the plaintiffs argue that in appropriate circumstances — including these — "making available" copyrighted material is sufficient to constitute an act of actual distribution. Neither argument has merit.

The First Circuit has squarely considered and rejected the proposition that copyright liability arises where the defendant authorized an infringement, but no actual infringement occurred. See Venegas-Hernandez v. Ass'n De Compositores & Editores de Musica Latinoamericana, 424 F.3d 50, 57-58 (1st Cir.2005). It noted that Congress' intent in adding "authorize" to the statute was to "avoid any questions as to the liability of contributory infringers." Id. at 58 (internal quotation marks omitted) (quoting H.R. Rep. 94-1476 ("House Report") at 52 (1976), reprinted in 1976 U.S.C.C.A.N. 5659, 5674). Authorization is sufficient to give rise to liability, but only if an infringing act occurs after the authorization. See id. at 59; see also Latin Am. Music Co. v. The Archdiocese of San Juan of the Roman Catholic & Apostolic Church, 499 F.3d 32, 46 (1st Cir.2007) (citing and applying Venegas-Hernandez).

Thus, to constitute a violation of the distribution right under § 106(3), the defendants' actions must do more than "authorize" a distribution; they must actually "do" it. The Court therefore moves to [167] the plaintiffs' second argument: Merely making copyrighted works available to the public is enough where, as in this case, the alleged distributor does not need to take any more affirmative steps before an unauthorized copy of the work changes hands. Other courts have split over whether that is a valid reading of the statute. Compare Hotaling v. Church of Jesus Christ of Latter-Day Saints, 118 F.3d 199 (4th Cir. 1997) (holding that making copyrighted material available is sufficient to constitute a distribution), and Arista Records LLC v. Greubel, 453 F.Supp.2d 961, 969-70 (N.D.Tex.2006) (citing and following Hotaling), and Warner Bros. Records, Inc. v. Payne, No. W-06-CA051, 2006 WL 2844415, at *3-*4 (W.D.Tex. July 17, 2006) (same), with In re Napster, Inc. Copyright Litig., 377 F.Supp.2d 796, 802-05 (N.D.Cal.2005) (criticizing Hotaling as being "contrary to the weight of [other] authorities" and "inconsistent with the text and legislative history of the Copyright Act of 1976"), and Natl Car Rental Sys., Inc. v. Computer Assocs. Int'l, Inc., 991 F.2d 426, 434 (8th Cir.1993) (stating that infringement of the distribution right requires the actual dissemination of copies or phonorecords).

To suggest that "making available" may be enough, the plaintiffs rely primarily on the Fourth Circuit's decision in Hotaling.[18] In that case, a library had an unauthorized copy of a book, which it "made available" to the public; the defendant argued that without a showing that any member of the public actually read the book, it could not be liable for "distribution." See id. at 201-02, 203. The district court agreed and granted summary judgment to the defendant. The Fourth Circuit reversed:

When a public library adds a work to its collection, lists the work in its index or catalog system, and makes the work available to the borrowing or browsing public, it has completed all the steps necessary for distribution to the public. At that point, members of the public can visit the library and use the work. Were this not to be considered distribution within the meaning of § 106(3), a copyright holder would be prejudiced by a library that does not keep records of public use, and the library would unjustly profit by its own omission.

Id.; see also id. at 204.

The plaintiffs contend that this case is analogous to Hotaling,[19] and suggest [168] that the Court should reach the same conclusion as the Fourth Circuit. But the EFF correctly points out a lacuna in the Fourth Circuit's reasoning. See EFF Br. at 15 (citing William F. Patry, 4 Patry on Copyright §§ 13:9, 13:11 (2007)). Merely because the defendant has "completed all the steps necessary for distribution" does not necessarily mean that a distribution has actually occurred.[20] It is a "distribution" that the statute plainly requires. See 17 U.S.C. § 106(3).

The plaintiffs encourage the Court to adopt a much more capacious definition of "distribution." They argue that the Supreme Court has held that the "terms `distribution' and `publication' ... [are] synonymous in the Copyright Act." Pls.' Resp. Opp. Amicus Curiae Br. at 2-3 (document #157) (citing Harper & Row, 471 U.S. at 552, 105 S.Ct. 2218).[21] They further note, correctly, that the statutory definition of publication can include offers to distribute. See 17 U.S.C. § 101. And sharing music files on a peer-to-peer network does, at least arguably, constitute an offer to distribute them.

While some lower courts have accepted the equation of publication and distribution, see Greubel, 453 F.Supp.2d at 969; In re Napster, 377 F.Supp.2d at 803, the plaintiffs' argument mischaracterizes the Supreme Court's decision in Harper & Row. The Supreme Court stated only that § 106(3) "recognized for the first time a distinct statutory right of first publication," and quoted the legislative history as establishing that § 106(3) gives a copyright holder "the right to control the first public distribution of an authorized copy ... of his work." Harper & Row, 471 U.S. at 552, 105 S.Ct. 2218 (internal quotation marks omitted) (quoting House Report at 62, reprinted in 1976 U.S.C.C.A.N. at 5675) (alteration in Harper & Row). That is a far cry from squarely holding that publication and distribution are congruent.

To the contrary, even a cursory examination of the statute suggests that the terms are not synonymous. "Distribution" is undefined in the copyright statutes. "Publication," however, is defined, and incorporates "distribution" as part of its definition:

'Publication' is the distribution of copies or phonorecords of a work to the public by sale or other transfer of ownership, or by rental, lease, or lending. The offering to distribute copies or phonorecords to a group of persons for purposes of further distribution, public performance, or public display, constitutes publication. A public performance or display [169] of a work does not of itself constitute publication.

17 U.S.C. § 101. By the plain meaning of the statute, all "distributions ... to the public" are publications. But not all publications are distributions to the public — the statute explicitly creates an additional category of publications that are not themselves distributions. For example, suppose an author has a copy of her (as yet unpublished) novel. If she sells that copy to a member of the public, it constitutes both distribution and publication. If she merely offers to sell it to the same member of the public, that is neither a distribution nor a publication. And if the author offers to sell the manuscript to a publishing house "for purposes of further distribution," but does not actually do so, that is a publication but not a distribution.

Plainly, "publication" and "distribution" are not identical. And Congress' decision to use the latter term when defining the copyright holder's rights in 17 U.S.C. § 106(3) must be given consequence. In this context, that means that the defendants cannot be liable for violating the plaintiffs' distribution right unless a "distribution" actually occurred.

But that does not mean that the plaintiffs' pleadings and evidence are insufficient. The Court can draw from the Complaint and the current record a reasonable inference in the plaintiffs' favor — that where the defendant has completed all the necessary steps for a public distribution, a reasonable fact-finder may infer that the distribution actually took place. As in Hotaling, the defendants have completed the necessary steps for distribution, albeit electronic: Per the plaintiffs' pleadings, each individual Doe defendant connected to the peer-to-peer network in such a way as to allow the public to make copies of the plaintiffs' copyrighted recordings. See Compl. at 5 (docket no. 07-cv-10834, document #1). Through their investigator, the plaintiffs have produced evidence that the files were, in fact, available for download. They have also alleged that sound recordings are illegally copied on a large scale, supporting the inference that the defendants participated in the peer-topeer network with the intent that other users could download from the defendants copies of the plaintiffs' copyrighted material. See Linares Decl. at 3-4, Ex. A to PI. Mot. Leave to Take Immediate Discovery (docket no. 07-cv-10834, document #5). At least at this stage of the proceedings, that is enough. The plaintiffs have pled an actual distribution and provided some concrete evidence to support their allegation.

b. Whether the Distribution Right Is Limited to Physical, Tangible Objects

Next, the movants and the EFF contend that the distribution right under 17 U.S.C. § 106(3) is limited to physical, tangible objects. By its terms, the distribution right only extends to distributions of "phonorecords of the copyrighted work to the public by sale or other transfer of ownership, or by rental, lease or lending." In turn, 17 U.S.C. § 101 defined "phonorecords" as "material objects in which sounds ... are fixed." The movants and the EFF focus on the phrase "material object," as well as the meaning of "sale or other transfer," and conclude that purely electronic file sharing does not fall within the scope of the right. If their argument is accepted, it would mean that the plaintiffs' Complaint is legally insufficient to allege a violation of the distribution right protected by§ 106(3).

The movants' argument is sweeping, carrying substantial implications for a great deal of internet commerce — any involving computer-to-computer electronic transfers of information. Indeed, this case is an exemplar. The plaintiffs have not [170] alleged a physical distribution. To the contrary, it is clear that their harm comes from the purely electronic copying of music files. See Linares Decl. at 3-4, Ex. A to PL Mot. Leave to Take Immediate Discovery (docket no. 07-cv-10834, document #5). After carefully considering the parties' and the EFF's arguments, the Court concludes that § 106(3) confers on copyright owners the right to control purely electronic distributions of their work.

As noted above, 17 U.S.C. § 106(3) applies to the distribution of "phonorecords." And "phonorecords" are defined in full as follows:

'Phonorecords' are material objects in which sounds, other than those accompanying a motion picture or other audiovisual work, are fixed by any method now known or later developed, and from which the sounds can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device. The term`phonorecords' includes the material object in which the sounds are first fixed.

17 U.S.C. § 101. The movants and the EFF contend that the electronic distribution, if it occurred, did not involve the "distribution" of a material object "by sale or other transfer of ownership, or by rental, lease or lending," as §§ 106(3) and 101 require. The argument has two closely related prongs-first, that no material object actually changed hands, and second, that even if it did, it was not through one of the methods of transfer enumerated in the statute.

Each of those arguments relies on an overly literal definition of "material object," and one that ignores the phrase's purpose in the copyright statutes. Congress intended for the copyright owner to be able to control the public distribution of items that can reproduce the artist's sound recording. It makes no difference that the distribution occurs electronically, or that the items are electronic sequences of data rather than physical objects.

Before squarely addressing the parties' arguments, however, the Court briefly revisits an important foundational issue — whether the electronic files at issue here can constitute "material objects" within the meaning of the copyright statutes. Doing so will help the Court explain the scope of the distribution right and frame the application of the Copyright Act to an electronic world.

(1) Electronic Files Are Material Objects

Understanding Congress' use of "material object" requires returning to a fundamental principle of the Copyright Act of 1976, Pub.L. No. 94-553, 90 Stat. 2541 (codified as amended in 17 U.S.C). Congress drew "a fundamental distinction between the`original work' which is the product of`authorship' and the multitude of material objects in which it can be embodied. Thus, in the sense of the [Copyright Act], a`book' is not a work of authorship, but is a particular kind of`copy.'" House Report at 53, reprinted in 1976 U.S.C.C.A.N. at 5666.[22]

The Copyright Act thus does not use materiality in its most obvious sense — to mean a tangible object with a certain heft, like a book or compact disc. Rather, [171] it refers to materiality as a medium in which a copyrighted work can be "fixed." See 17 U.S.C. § 101 ("A work is`fixed' in a tangible medium of expression when its embodiment in a copy or phonorecord, ... is sufficiently permanent or stable to permit it to be perceived, reproduced, or otherwise communicated for a period of more than transitory duration."). As the Second Circuit cogently explained, "[t]he sole purpose of § 101`s definitions of the words `copies' and`fixed' is to ... define the material objects in which copyrightable and infringing works may be embedded and to describe the requisite fixed nature of that work within the material object." Matthew Bender & Co., Inc. v. West Pub. Co., 158 F.3d 693, 702 (2d Cir.1998). The opposite is true as well. The sole purpose of the term "material object" is to provide a reference point for the terms "phonorecords" and "fixed."[23]

This analysis is borne out in other aspects of the Copyright Act — for example, the Act's abrogation of a common-law presumption regarding the sale of copyrights. At common-law, if an author sold her manuscript, the sale included the author's copyrights in the original work unless the sale agreement specifically excepted them. See, e.g., Yardley v. Houghton Mifflin Co., 108 F.2d 28, 30-31 (2d Cir.1939); Pushman v. New York Graphic Soc'y, Inc., 287 N.Y. 302, 306-07, 39 N.E.2d 249 (1942). Congress specifically abolished that presumption by distinguishing between the abstract, original work on the one hand, which is the source of the copyrights, and its material incarnation on the other, which is protected by the copyrights. See 17 U.S.C. § 202; House Report at 53, 123, reprinted in 1976 U.S.C.C.A.N. at 5666, 5739-40. Because the two are different, the author can freely sell a copy without disturbing the copyrights.

Thus, any object in which a sound recording can be fixed is a "material object." That includes the electronic files at issue here. When a user on a peer-to-peer network downloads a song from another user, he receives into his computer a digital sequence representing the sound recording. That sequence is magnetically encoded on a segment of his hard disk (or likewise written on other media.) With the right hardware and software, the downloader can use the magnetic sequence to reproduce the sound recording. The electronic file (or, perhaps more accurately, the appropriate segment of the hard disk) is therefore a "phonorecord" within the meaning of the statute. See § 101 (defining "fixed" and "phonorecords"); Matthew Bender & Co., 158 F.3d at 703-04. See also New York Times Co. v. Tasini 533 U.S. 483, 490-91, 121 S.Ct. 2381, 150 L.Ed.2d 500 (2001) (appearing to assume that electronic-only distributions constitute material objects); Stenograph LLC v. Bossard Assocs., Inc., 144 F.3d 96, 100 (D.C.Cir.1998) (holding that installation [172] of software onto a computer results in "copying"); Working Group on Intellectual Property Rights, Intellectual Property and the National Information Infrastructure 213 (1995), available at http://www. uspto.gov/go/com/doc/ipnii/ipnii.pdf (noting that electronic transmissions implicate copyright holders' rights and strongly implying that electronic files constitute "material objects").

With that background, the Court turns to the movants' and the EFF's arguments.

(2) The Transmission of an Electronic File Constitutes a "Distribution" Within the Meaning of § 106(3)

The movants and the EFF present two reasons why the Court should decline to find that purely electronic transmissions are a violation of the distribution right. First, they note that the distribution right is limited to "phonorecords of the copyrighted work," 17 U.S.C. § 106(3), and that part of the definition of "phonorecords" is that they are "material objects," id. § 101. They focus on the phrase "material objects" to suggest that a copyright owner's distribution right only extends to "tangible" objects. See EFF Br. at 15-16. Because there was no exchange of tangible objects in this case — no "hand-to-hand" exchange of physical things — they argue that the plaintiffs' distribution right was not infringed by the defendants' actions.

The movants' second argument focuses on a different phrase in § 106(3): "distribution" is limited to exchanges "by sale or other transfer of ownership, or by rental, lease, or lending." They note, correctly, that an electronic download does not divest the sending computer of its file, and therefore does not implicate any ownership rights over the sound file held by the transferor. Therefore, they conclude, an electronic file does not fit within the defined limits of the distribution right.

The movants' two arguments appear to be analytically distinct, but in fact each is the obverse of the other: Any time the transfer of copyrighted material takes place electronically, both contentions at least potentially come into play. Electronic transfers generally involve the reading of data at point A and the replication of that data at point B. Whenever that is true, one person might be stationed at point A and another at point B, obviating the need for a "hand-to-hand" transfer. Similarly, because the data at point A is not necessarily destroyed by the process of reading it, the person at point A might retain ownership over the original, forestalling the need for a "sale or other transfer of ownership," as stated in § 106(3).

Clearly, that description accurately characterizes electronic file transfers. The internet makes it possible for a sending computer in Boston and a downloader in California to communicate quickly and easily; the physical distance between the two, as well as the purely electronic nature of the transfer, makes the movants' argument attractive. But the "point A-to-point B" characterization is no less apt for an older technology, such as a fax transfer over a phone line. And it also applies to cases in which point A and point B are very close together — even in the same room.[24] The movants' argument thus pivots on the nature of the transfer, in which the copyrighted work is read by a machine, translated into data, transmitted (in data form), and re-translated elsewhere.

[173] After carefully considering the parties' and the EFF's arguments, the Court concludes that 17 U.S.C. § 106(3) does reach this kind of transaction. First, while the statute requires that distribution be of "material objects," there is no reason to limit "distribution" to processes in which a material object exists throughout the entire transaction — as opposed to a transaction in which a material object is created elsewhere at its finish. Second, while the statute addresses ownership, it is the newly minted ownership rights held by the transferee that concern it, not whether the transferor gives up his own.

The first point requires that the Court closely examine the scope of the distribution right under § 106(3). The statute provides copyright owners with the exclusive right "to distribute ... phonorecords of the copyrighted work to the public by sale or other transfer of ownership, or by rental, lease, or lending." 17 U.S.C. § 106(3). In turn, phonorecords are defined in part as "material objects in which sounds ... are fixed by any method." Id. § 101. And as discussed above, in the sense of the Copyright Act, "material objects" should not be understood as separating tangible copies from non-tangible copies. Rather, it separates a copy from the abstract original work and from a performance of the work. See supra Section IV.A.l.b.(1).

Read contextually, it is clear that this right was intended to allow the author to control the rate and terms at which copies or phonorecords of the work become available to the public. In that sense, it is closely related to the reproduction right under § 106(1), but it is not the same. As Congress noted, "a printer [who] reproduces copies without selling them [and] a retailer [who] sells copies without having anything to do with their reproduction" invade different rights. House Report at 61, reprinted in 1976 U.S.C.C.A.N. at 5675. Under § 106(3),

[T]he copyright owner [has] the right to control the first public distribution of an authorized copy or phonorecord of his work, whether by sale, gift, loan, or some rental or lease arrangement. Likewise, any unauthorized public distribution of copies or phonorecords that were unlawfully made [is] an infringement. As section 109 makes clear, however, the copyright owner's rights under section 106(3) cease with respect to a particular copy or phonorecord once he has parted with ownership of it.

House Report at 62, reprinted in 1976 U.S.C.C.A.N. at 5675-76. Clearly, § 106(3) addresses concerns for the market for copies or phonorecords of the copyrighted work, and does so more explicitly and directly than the other provisions of § 106.[25]

An electronic file transfer is plainly within the sort of transaction that § 106(3) was intended to reach. Indeed, electronic transfers comprise a growing part of the legitimate market for copyrighted sound recordings. See, e.g., Verne Kopytoff & [174] Ellen Lee, Tech Chronicles, S.F. Chron., Feb. 27, 2008, at CI (reporting that through its iTunes Store, which operates exclusively via electronic file transfer, Apple has sold more than 4 billion songs to 50 million customers).[26] What matters in the marketplace is not whether a material object "changes hands," but whether, when the transaction is completed, the distributee has a material object. The Court therefore concludes that electronic file transfers fit within the definition of "distribution" of a phonorecord.[27]

For similar reasons, the Court concludes that an electronic file transfer can constitute a "transfer of ownership" as that term is used in § 106(3). As noted above, Congress wrote § 106(3) to reach the "unauthorized public distribution of copies or phonorecords that were unlawfully made." House Report at 62, reprinted in 1976 U.S.C.C.A.N. at 5676. That certainly includes situations where, as here, an "original copy" is read at point A and duplicated elsewhere at point B.[28] Since the focus of § 106(3) is the ability of the author to control the market, it is concerned with the ability of a transferor to create ownership in someone else — not the transferor's ability simultaneously to retain his own ownership.

This conclusion is supported by a comparison to the "first sale" doctrine, codified at 17 U.S.C. § 109. The "first sale" doctrine provides that once an author has released an authorized copy or phonorecord of her work, she has relinquished all control over that particular copy or phonorecord. See id. § 109(a); House Report at 79-80, reprinted in 1976 U.S.C.C.A.N. at 5693-94. The person who bought the copy — the "secondary" purchaser — may sell it to whomever she pleases, and at the terms she directs. The market implications are clear. The author controls the volume of copies entering the market, but once there, he has no right to control their secondary and successive redistribution. To be sure, the author retains a certain degree of control over the secondary sale, at least to the extent that he can control that redistributions through the terms in the original sales contract. But he must bring a contract suit, not an infringement action. See id. at 79, reprinted in 1976 U.S.C.C.A.N. at 5693. See also, e.g., Am. Int'l Pictures, Inc. v. Foreman, 576 F.2d 661, 664 (5th Cir.1978) (holding that where copyrighted material is resold subject to restrictions, and the secondary buyer violates those restrictions, no copyright infringement action lies). More often and more practically, however, the author will simply price the new copies or phonorecords to reflect the work's value in a secondary market. See, e.g., Vincent v. City Colleges of Chicago, 485 F.3d 919 (7th Cir.2007) (citing Stanley M. Besen & Sheila N. Kirby, Private Copying, Appropriability & Optimal, Copyright Royalties, 32 J.L. & Econ. 255 (1989)).

Conversely, where ownership is created through an illegal copy, the first [175] sale doctrine does not provide a defense to a distribution suit. See Quality King Distrib.. Inc. v. L'anza Research Int'l, Inc., 523 U.S. 135, 148, 118 S.Ct. 1125, 140 L.Ed.2d 254 (1998). The distinction makes sense: where ownership is created through an illegal copy, the copyright holder has never had the chance to exercise his market rights over the copy. That is precisely the situation here.[29]

2. Whether the Plaintiffs Have Adduced Prima Facie Evidence of Infringement

The second sub-element of the Sony Music test's first factor asks whether the plaintiffs have presented prima facie evidence of infringement. See 326 F.Supp.2d at 564. Just as police cannot invade the privacy of a home without some concrete evidence of wrongdoing inside, plaintiffs should not be able to use the Court to invade others' anonymity on mere allegation. By requiring plaintiffs to make out a prima facie case of infringement, the standard requires plaintiffs to adduce evidence showing that their complaint and subpoena are more than a mere fishing expedition. The plaintiffs need not actually prove their case at this stage; they need only present evidence adequate to allow a reasonable fact-finder to find that each element of their claim is supported. See Adelson, 510 F.3d at 48.' They have done so.

The first element of a copyright infringement suit is a valid copyright. See T-Peg, 459 F.3d at 108. The plaintiffs have asserted, and the defendants have not challenged, that they hold the copyright to each of the sound recordings incorporated into the complaint. See Compl. at 4-5 (docket no. 07-cv-10834, document #1).

The second element is violation of one of the copyright holder's exclusive rights. See T-Peg, 459 F.3d at 108. The movants and the EFF argue that because the plaintiffs have not demonstrated an actual infringement, they have not asserted an actual violation.[30] They reason that the [176] investigator downloading the files from the defendants' computers was an agent of the plaintiffs, and plaintiffs cannot infringe their own copyrights. See Mem. Supp. Mot. Quash at 4-6 (document #149); EFF Br. at 12 n. 8 (document #152).

The Court need not now decide the precise nature of the evidence Media-Sentry gathered. While the parties dispute whether an investigator's download can be a perfected infringement, the downloads are also relevant, as described above, for another purpose: demonstrating that such infringement was technically feasible, thereby demonstrating that distributions could occur.

The plaintiffs have alleged that each defendant shared many, many music files — at least 100, and sometimes almost 700. See Ex. A to Compl. (docket no. 07-cv-10834, document #1) (providing information for each Doe, including number of copyrighted music files shared); Linares Decl. at 4, Ex. A to PI. Mot. Leave to Take Immediate Discovery (docket no. 07-cv-10834, document #5) (attesting to the veracity of the information contained in Exhibit A to the Complaint).[31] As noted above, that evidence supports an inference that the defendants participated in the peer-to-peer network precisely to share copyrighted files. The evidence and allegations, taken together, are sufficient to allow a statistically reasonable inference that at least one copyrighted work was downloaded at least once. That is sufficient to make out a prima facie case for present purposes.[32] Discovery may well reveal other factors relevant to the statistical inference, such as the length of time the defendant used peer-to-peer networks.

The plaintiffs have satisfied their burden for a prima facie case. As noted above, merely exposing music files to the internet is not copyright infringement. The defendants may still argue that they did not know that logging onto the peer-topeer network would allow others to access these particular files, or contest the nature of the files, or present affirmative evidence rebutting the statistical inference that downloads occurred. But these are substantive defenses for a later stage. Plaintiffs need not prove knowledge or intent in order to make out a prima facie case of infringement. See Feist, 499 U.S. at 361, [177] 111 S.Ct. 1282; Data Gen. Corp. v. Grumman Sys. Support Corp., 36 F.3d 1147, 1160 n. 19 (1st Cir.1994). As noted above, they are not required to win their case in order to serve the defendants with process.

3. Whether the Plaintiffs Have Tied Their Allegations and Evidence to Specific Acts of Infringement

The third sub-element of the first Sony Music factor is that the allegations be "concrete" — that they be tied to specific acts of infringement. See 326 F.Supp.2d at 564. The movants argue that the plaintiffs have failed to do so. Mot. Quash at 7-10 (document #115). In considering this question, the Court must keep in mind that transfers on a peer-to-peer network are not observable by outside users. To show infringement,[33] the plaintiffs are obliged to build a chain of inferences. The Court finds that, on this record, the chain is adequately anchored to specific allegations to satisfy this sub-element.

The plaintiffs have alleged that each of the defendants used the peer-to-peer network to distribute copies of specific sound recordings, detailed in Exhibit A to the Complaint. For instance, Doe no. 21, one of the movants here, is alleged to have distributed the song "Clocks," by the artist Coldplay. Capitol Records holds the copyright to that song. See Ex. A to Compl. (docket no. 07-cv-10834, document #1). The plaintiffs allege that the downloading creates a precise copy of the song. And Doe no. 21 is alleged to have "continuously used, and [to] continue[] to use," a peerto-peer network. Compl. at 5 (docket no. 07-cv10834, document #1). Finally, the fact of MediaSentry's download shows that it was, in fact, possible to download "Clocks" from Doe no. 21's computer as of 6:56 a.m. on January 25, 2007. Thus, the plaintiffs have alleged the specific content at issue; the essential nature of the infringement of that content; a rough time period in which the infringement took place; and that at a certain time, the defendant had taken every step necessary for an infringement of Capitol Records's rights in "Clocks" to occur.

While the plaintiffs must eventually prove that an actual infringement of those rights occurred, they may certainly do so through circumstantial proof and inference. And drawing a reasonable inference in the plaintiffs' favor, one did occur. The plaintiffs' current showing is adequate to satisfy both Federal Rule of Civil Procedure 8 and the more exacting standard of Sony Music — even if they could not directly observe, and thus allege, an infringing act. See, e.g., 5 Patry, Patry on Copyright, §§ 19:3 (listing necessary elements to plead a copyright claim), 19:10 (discussing pleading acts of infringement with specificity).

B. Factors Two, Three, and Four: Need and Narrow Tailoring

The second, third, and fourth factors in the Sony Music test are designed to ensure that the subpoena is appropriate to the plaintiffs' needs, their allegations, and' the preliminary evidence they have presented. The Court weighs "(2) specificity of the discovery request, (3) the absence of alternative means to obtain the subpoenaed information, [and] (4) a central need for the subpoenaed information to advance the claim." Sony Music, 326 F.Supp.2d at 565. Thus, the second factor prevents the subpoena from being so overbroad that it unreasonably invades the anonymity of users who are not alleged to have infringed copyright. The third cuts against the subpoena if there is another [178] reasonable and less-intrusive means to gather the same information. And the fourth tests whether the plaintiffs must have the information to proceed. On the circumstances of this case, the third and fourth factors support the disclosure of the defendants' identities. However, the Court is unable to determine on this record whether the plaintiffs' request is adequately specific to satisfy the second factor.

1. Specificity of the Discovery Request

The second Sony Music factor examines the breadth of the information sought by the plaintiffs. It has two aspects: first, the breadth of the information the plaintiffs seek, and second, whether the subpoena requires the ISP to reveal identifying information for numerous non-infringing parties, piercing the First Amendment anonymity to which they are entitled.

Under the Court's Order permitting expedited discovery, the plaintiffs are limited to identifying information: "name, address, telephone number, e-mail address, and Media Access Control addresses for each defendant." Amended Order re: Expedited Discovery at 1 (May 9, 2007) (docket no. 07-cv-10834, document #8).[34] The Court further ordered that "[n]o further information about the Doe defendants shall be revealed." Id. These limits are appropriate because they allow the plaintiffs to discover whom they are suing — the purpose of the expedited discovery — but no more. It does not, for example, permit disclosure of any information regarding the defendant's internet use.

Second, the Court must consider whether the information sought can be reasonably traced to a particular defendant. Generally speaking, according to the plaintiffs, the combination of IP address and date and time of access is sufficient to allow identification of the defendant. See Mem. Supp. Ex Parte Application for Leave To Take Immediate Discovery at 2 (docket no. 07-cv-10834, document #5).

That claim may not always be true. More than one computer may be placed under a single IP number. Thus, it is possible that the ISP may not be able to identify with any specificity which of numerous users is the one in question. See Stengel Decl. at 3 (document #118). If that is the case, giving the plaintiffs a long list of possible infringers would permit precisely the sort of fishing expedition the Sony Music test is designed to avoid. On the other hand, the ISP may frequently be able to narrow the list to a handful of possible users. In that situation, the plaintiffs should be entitled to use discovery to determine the identity of the alleged infringer. While it still might be possible that an unauthorized user was the actual infringer, see id., that is a matter better left for further discovery and presentation of the plaintiffs' claims on their merits.

The problem calls for a pragmatic solution that carefully respects the anonymity [179] of potentially innocent parties. Therefore, the Court will undertake to review particular cases as they come up, based on the number of users at issue and the degree of particularity with which the plaintiffs would be able to pick out the alleged infringer from a list. The subpoena to be served on Boston University shall be modified as discussed below in Section IV.D.

2. Absence of Alternative Means to Obtain Information

The third Sony Music factor requires that the plaintiffs have no other, less-intrusive way of obtaining the information they seek. This factor appears to be met in this case. Only the ISP has any record of which IP addresses were assigned to which users. To other entities online, those users would appear only as their IP addresses. The movants have not suggested any other method of obtaining the defendants' information; nor is the Court aware of any.

3. Central Need to Litigation

Finally, it is evident that the plaintiffs need the information in order to further the litigation. Without names and addresses, the plaintiffs cannot serve process, and the litigation can never progress. Therefore, the plaintiffs do have a central need for this information.

C. Factor Five: The Defendants' Expectations of Privacy

The final Sony Music factor regards the expectation of privacy held by the Doe defendants, as well as other innocent users who may be dragged into the case (for example, because they shared an IP address with an alleged infringer.) See 326 F.Supp.2d at 565.

As discussed above, see Section III, the alleged infringers have only a thin First Amendment protection. See Harper & Row, 471 U.S. at 559-60, 105 S.Ct. 2218.[35] Moreover, many internet service providers require their users to acknowledge as a condition of service that they are forbidden from infringing copyright owners' rights, and that the ISP may be required to disclose their identity in litigation. See, e.g., Sony Music, 326 F.Supp.2d at 559.

The record is unfortunately silent as to Boston University's terms of service agreement, if one exists. That agreement could conceivably make a substantial difference to the expectation of privacy a student has in his or her internet use. The process through which the plaintiffs determine whether a particular user actually used a peer-to-peer network to distribute music files may be much more intrusive than merely obtaining identities. In one case before the Court,[36] the plaintiffs have sought to obtain an image of a defendant's hard disk,[37] allowing a forensic computer [180] expert to inspect it to determine whether the defendant possessed an electronic copy of the plaintiffs' copyrighted material. See Pls.' Mot. Compel Discovery (docket no. 03-cv-11661, document #527).[38]

The Court finds that the terms of service arrangement, if one exists, would be extremely helpful in analyzing the privacy interests at issue. As this is an important factor for the Sony Music test, the Court will require that the subpoena served on Boston University be modified to require that it submit to the Court its terms of service arrangement.

D. Required Modifications to the Subpoenas

For the reasons explained above in Sections IV.B.1 and IV.C, the Court lacks the information to adjudicate whether the plaintiffs have carried their burden in demonstrating a need for expedited discovery under the Sony Music test. Therefore, the Motions to Quash that assert privacy interests (documents ##104 and 115) are GRANTED. The plaintiffs may renew their motion for expedited discovery, but must attach to such motion a copy of the Rule 45 subpoena to be served on Boston University. The subpoena must include the following language or language substantially similar:

The ISP shall submit to the Court, under seal, the information requested by the plaintiffs for its consideration in camera. For any IP address provided by the plaintiffs for which the ISP is unable to determine, to a reasonable degree of technical certainty, the identity of the user, it shall submit a list of all such users and a brief statement explaining the difficulty in selecting among them the alleged infringer.

The ISP shall simultaneously submit to the Court its terms of service agreement with its users, or, if it does not have a terms of service agreement, a statement to that effect.

The submissions by the ISP shall be made no later than 14 days after service of the subpoena.

The ISP shall not disclose to the plaintiffs any information regarding the identities of the defendants unless ordered to do so by this Court.

The Court, with the Sony Music framework thus in place, will consider the plaintiffs' request for expedited discovery as made in their renewed motion.

V. THE MOTION TO QUASH FOR LACK OF PERSONAL JURISDICTION

In addition to the Motions to Quash filed by the Boston University Does, one other Doe has filed a Motion to Quash. She claims that the Court lacks personal jurisdiction over her. She asserts, among other things, that she has never lived in Massachusetts and that "none of [her] visits to the State of Massachusetts had any relationship to the matter for which [she is] being sued, namely [her] alleged use of filesharing systems from [her] home in Maryland." Doe Aff. at 1, Ex. A to Mot. Quash Due to Lack of Personal Jurisdiction (document #113). The Court has the discretion to permit jurisdictional discovery. See, e.g., United States v. Swiss Am. Bank, Ltd., 274 F.3d [181] 610, 626 (1st Cir.2001). It is appropriate to do so in this case.

The only information the Court has before it is Jane Doe's affidavit — signed as Jane Doe — attesting that she is not a Massachusetts resident. On the facts of this case, that is an insufficient basis to disallow jurisdictional discovery. Even taking all of the facts in her affidavit as true, it is possible that the Court properly has personal jurisdiction. The Massachusetts long-arm statute permits jurisdiction to the extent allowed by constitutional limits. Daynard v. Ness, Motley, Loadholt, Richardson & Poole, P.A., 290 F.3d 42, 52 (1st Cir.2002) (quoting 'Automatic' Sprinkler Corp. of Am. v. Seneca Foods Corp., 361 Mass. 441, 280 N.E.2d 423 (1972)). It is a broad license. For example, Jane Doe might well be subject to jurisdiction if she infringed the plaintiffs' copyrights on a trip into Massachusetts. See Mass. Gen. Laws ch. 223A, § 3(c)-(d). It would be premature to adjudicate personal jurisdiction on this record.

The Motion to Quash Due to Lack of Personal Jurisdiction (document #113) is DENIED without prejudice.

VI. CONCLUSION

For the foregoing reasons, the Motions to Quash (document ##103 and 115) are GRANTED. The plaintiffs' Motion for Expedited Discovery may be renewed subject to the requirements on the subpoena set forth above in Section IV.D. Boston University is ORDERED not to destroy the information sought by plaintiffs unless the subpoena is not renewed by April 16, 2008. Furthermore, the Motion to Quash Due to Lack of Personal Jurisdiction (document #113) is DENIED without prejudice.

SO ORDERED.

APPENDIX A

COURT — DIRECTED NOTICE REGARDING ISSUANCE OF SUBPOENA

A subpoena has been issued directing Boston University, your Internet Service Provider ("ISP"), to disclose your name. The subpoena has been issued because you have been sued in the United States District Court for the District of Massachusetts in Boston, Massachusetts, as a "John Doe" by several major record companies. You have been sued for infringing copyrights on the Internet by uploading and/or downloading music. The record companies have identified you only as a "John Doe" and have served a subpoena on your ISP to learn your identity. This notice is intended to inform you of some of your rights and options.

YOUR NAME HAS NOT YET BEEN DISCLOSED. YOUR NAME WILL BE DISCLOSED IN 14 DAYS IF YOU DO NOT CHALLENGE THE SUBPOENA.

Your name has not yet been disclosed. The record companies have given the Court enough information about your alleged infringement to obtain a subpoena to identify you, but the Court has not yet decided whether you are liable for infringement. You can challenge the subpoena in Court. You have 14 days from the date that you receive this notice to file a motion to quash or vacate the subpoena. If you file a motion to quash the subpoena, your identity will not be disclosed until the motion is resolved (and the companies cannot proceed against you until you are identified). The second page of this notice can assist you in locating an attorney, and lists other resources to help you determine how to respond to the subpoena. If you do not file a motion to quash, at the end of the 14 day period, your ISP will send the record [182] company plaintiffs your identification information.

OTHER ISSUES REGARDING THE LAWSUIT AGAINST YOU

To maintain a lawsuit against you in the District Court of Massachusetts, the record companies must establish jurisdiction over you in Massachusetts. If you do not live or work in Massachusetts, or visit the state regularly, you may be able to challenge the Massachusetts court's jurisdiction over you. If your challenge is successful, the case in Massachusetts will be dismissed, but the record companies may be able to file against you in another state where there is jurisdiction.

The record companies may be willing to discuss the possible settlement of their claims against you. The parties may be able to reach a settlement agreement without your name appearing on the public record. You may be asked to disclose your identity to the record companies if you seek to pursue settlement. If a settlement is reached, the case against you will be dismissed. It is possible that defendants who seek to settle at the beginning of a case will be offered more favorable settlement terms by the record companies. You may contact the record companies' representatives by phone at (206) 973-4145, by fax at (206) 242-0905, or by email at infosettlementsupportcenter.com.

You may also wish to find your own lawyer (see resource list below) to help you evaluate whether it is in your interest to try to reach a settlement or to defend against the lawsuit.

RESOURCE LIST

The organizations listed below provide guidance on how to find an attorney. If you live in or near Massachusetts or Boston, the second and third listings below provide referrals for local attorneys.

American Bar Association

http://www.abanet/org/legalservices/ findlegalhelp/home.htm

Massachusetts Bar Association

http://www.massbar.org

Lawyer referral service — (617) 338-0610

Boston Bar Association

http://www.bostonbar.org

Lawyer referral service — (617) 742-0625

The organizations listed below have appeared before other courts around the country in similar lawsuits as "friends of the court" to attempt to protect what they believe to be the due process and First Amendment rights of Doe defendants.

Electronic Frontier Foundation

454 Shotwell Street

San Francisco, California 94110-1914

email: RIAAcases@eff.org

Public Citizen

1600 20th Street, NW

Washington, DC 20009

phone: (202)588-7721

email: litigation@citizen.org

[1] The defendants in this case have not yet been named; the Court simply refers to them as "the defendants." Those who contest the subpoena are "the movants."

[2] Specifically, the Court requires that the plaintiffs attach a "Court-Directed Notice Regarding Issuance of Subpoena," which the ISPs distribute to the individuals in question. The Notice informs the putative defendants that they have the opportunity to move to quash the subpoena, as these defendants have done. See Appendix A (Court-Directed Notice).

[3] Document #115 is styled "Reply Memorandum of Law of Defendant`Doe,' "but the Court has no other related documents. The Court takes the filing as a pro se Motion to Quash, and for clarity's sake, refers to it as such.

[4] This is a small oversimplification. Many popular peer-to-peer networks use a "supernode" architecture. A supernode is a semicentralized computer that operates only to relay search queries and responses within the peer-to-peer network. Once the desired file is located, however, it may be transferred directly from one computer to another. See, e.g., Peter S. Menell & David Nimmer, Legal Realism in Action: Indirect Copyright Liability's Continuing Tort Framework and Sony's De Facto Demise, 55 UCLA L.Rev. 143, 183-84 (2007).

The history of peer-to-peer networks has been one of increasing decentralization, and thus, increasing anonymity. See id. at 179-85 (tracing history of peer-to-peer network technologies through lawsuits asserting contributory copyright liability). Some newer peer-topeer technologies even dispense with supernodes. See, e.g., Grokster, 545 U.S. at 922, 125 S.Ct. 2764; Matthew Helton, Secondary Liability for Copyright Infringement: BitTorrent as a Vehicle for Establishing a New Copyright Definition for Staple Articles of Commerce, 40 Colum. J.L. & Soc. Probs. 1, 20-21 (2006) (discussing new version of software that permits direct peer-to-peer connection without the need for a proxy computer).

[5] At the hearing, the defendants protested that it is impossible to determine whether a sound recording is "illegal" merely by listening to it. See Bestavros Decl. at 2-3 (document #110). True enough. Indeed, one of the key features of digital copyright infringement is that an nth-generation copy is more or less identical to a non-infringing first-generation copy, so there is no drop in sound quality over time. But listening to the files is still important. The defendants must ascertain that what is labeled as a sound recording to which they hold the copyright actually is such a recording (and not, say, a misnamed file or fair use that would not infringe the copyright.)

[6] According to the amicus brief of the Electronic Frontier Foundation, more than 20,000 individuals have been sued nationwide. Amicus Curiae Br. of the Electronic Frontier Foundation ("EFF Br.") at 5-9 (document #152).

[7] For these reasons, insofar as one of the movant Does requests severance, see Mot. Quash at 1-3 (document #115), the motion is DENIED without prejudice. The case against each Doe will be individually considered for purposes of any rulings on the merits, and the movant may renew the severance request before trial if the case proceeds to that stage.

[8] It is not clear which Does are the two movants. The Doe filing one Motion to Quash (document #115) identifies him or herself as Doe no. 21; the Doe filing the other Motion to Quash (document #103) called himself Doe no. 1. Doe no. 1 has been dismissed, however. See Notice of Dismissal (document #122) (dismissing Doe no. 1 from the civil action originally docketed with number 07-cv-10834); Notice of Dismissal (document #136) (same).

[9] The EFF's First Amendment arguments are taken on their merits, contrary to the plaintiffs' contention that no party has raised them. See Pls.' Resp. Opp. Amicus Curiae Br. at 2-3 (document #157). At least one of the motions to quash raises the same issues, albeit in less detail. See Mem. L. Supp. Mot. Quash at 7-8 (document #104).

[10] See Sony Music, 326 F.Supp.2d at 564 (finding file-sharers' activity "qualifies as speech, but only to a degree," because the "real purpose is to obtain music for free"); In re Verizon Internet Svcs., Inc., 257 F.Supp.2d 244, 260 (D.D.C.2003), rev'd on other grounds, Recording Indus. Ass'n of Am., Inc. v. Verizon Internet Svcs., Inc., 351 F.3d 1229 (D.C.Cir. 2003) (holding that file-sharers were entitled to some anonymity on First Amendment grounds, "even though the degree of protection is minimal where alleged copyright infringement is the expression at issue").

[11] Other forms of speech also receive such intermediate valuation. See Florida Bar v. Went For It, Inc., 515 U.S. 618, 623, 115 S.Ct. 2371, 132 L.Ed.2d 541 (noting that commercial speech is entitled to "a limited measure of protection, commensurate with its subordinate position in the scale of First Amendment values" (internal quotation omitted)). The Court need not, and does not, express a view as to the proper place of file-sharing in the speech hierarchy; it is enough for present purposes to determine that it has some First Amendment value.

[12] In doing so, the court subsumed the analysis a number of other leading cases, including, for example, Dendrite International, Inc. v. Doe, 342 N.J.Super. 134, 775 A.2d 756, 760, 772 (2001), a case relied upon by the EFF. See Sony Music, 326 F.Supp.2d at 563-64. Dendrite, like many other cases involving internet speech, is not directly applicable to these facts. In that case, the plaintiff asserted that the anonymous defendant had defamed it on an internet bulletin board — an act much more clearly in the wheelhouse of the First Amendment's protections. See 342 N.J.Super. at 140-41, 775 A.2d at 760. The court in that case therefore sensibly elected to apply a more stringent standard than the one appropriate here. See id., 342 N.J.Super. at 149 — 59, 775 A.2d at 765-72.

[13] A number of other courts have also found the Sony Music approach persuasive, some on substantially different facts. See Best Western Int'l, No. CV-06-1537-DGC, 2006 WL 2091695, at *3-*5 (D.Ariz. July 25, 2006) (posting to internet bulletin boards); Gen. Bd. of Global Ministries of the United Methodist Church v. Cablevision Lightpath, Inc., No. C06-3669-ETB, 2006 WL 3479332, at *4-*5 (E.D.N.Y. Nov.30, 2006) (unauthorized access to email); Elektra Entm't Group v. Does 1-9, No. 04CV2289-RWS, 2004 WL 2095581, at *2-*5 (S.D.N.Y. Sept.8, 2004) (file-sharing and copyright infringement). But see Mobilisa, Inc. v. Doe, 217 Ariz. 103, 170 P.3d 712, 720 (Ariz.App.2007) (declining to apply Sony Music standard in case involving alleged unlawful access to plaintiffs' computer server by anonymous user, and applying a more stringent standard).

[14] The parties refer to "copies." The statute makes clear that where sound recordings are at issue, "phonorecords" is a more precise term. See 17 U.S.C. § 101. The two terms appear to be functionally interchangeable, however, differing only in the nature of the copyrighted work. See H.R. Rep. 94-1476 at 53 (1976), reprinted in 1976 U.S.C.C.A.N. at 5666 (noting that under the copyright statutes, "`copies' and `phonorecords' together will comprise all of the material objects in which copyrightable works are capable of being fixed").

[15] Strictly speaking, much of the parties' briefing on this issue is directed toward the scope of the distribution right under § 106(3), not the reproduction right under § 106(1). But both refer to "copies or phonorecords," so the arguments implicate both rights, though to different degrees.

[16] The plaintiffs have also alleged a violation of their reproduction rights under § 106(1). Under that statute, a copyright owner's rights are infringed whenever an unauthorized person "reproduce[s] the copyrighted work in copies or phonorecords." The plaintiffs have alleged that the defendants downloaded music, as well as distributed it, and that they did not have authorization to do so. See Compl. at 5 (docket no. 07-cv-10834, document #1). At least subject to arguments over the definition of "phonorecords," discussed below, the plaintiffs thus appear to have alleged a legally sufficient harm under § 106(1). It is still appropriate to address briefly the distribution right under § 106(3), however; it was the focus of the parties' briefing and arguably constitutes the crux of the alleged infringement in this case. The Court's analysis may also inform later arguments, such as summary judgment or request for further data from the ISP not authorized by the current scope of the subpoena.

[17] See Mem. Supp. Mot. Quash at 4-6 (document #149); EFF Br. at 12 n. 8 (document #152). The Court need not reach this issue now.

[18] The plaintiffs also cite A & M Records, Inc. v. Napster, Inc., 239 F.3d 1004 (9th Cir.2001). In A & M v. Napster, the Ninth Circuit considered a suit against a provider of peer-to-peer services. The court stated that "Napster users who upload file names to the search index for others to copy violate plaintiffs' distribution rights." Id. at 1014. As the EFF argues, the Ninth Circuit's reasoning is not persuasive here. First, as the district court noted in that case, "it is pretty much acknowledged" that infringement had occurred. Id. (internal quotation marks omitted). Second, because the plaintiffs were suing the peer-topeer network provider rather than any particular user, they did not need to show that any particular copyright was infringed. It was enough to show that approximately 70% of the available material infringed the plaintiffs' copyrights. See id. at 1013. Finally, the court's very statement may betray a slight misunderstanding about the way the technology worked — it was not the "file names" that were copied, as the court's statement seems to imply, but the actual files themselves. Indeed, merely "upload[ing] file names" does not even constitute making the files themselves available. But see Motown Record Co., LP v. DePietro, No. 04-CV-2246, 2007 WL 576284, at *3 & n. 38 (E.D.Pa. Feb. 16, 2007) (finding A & M v. Napster persuasive on facts similar to those in the case at bar).

[19] Indeed, this case is closer to the facts of Hotaling than were the facts in the Napster litigation. In In re Napster, the court considered an "indexing" system in which central computer servers kept a record of which peerto-peer users had which files, somewhat analogous to the supernodes used by the peer-topeer system at issue here. See supra note 4. In rejecting the plaintiffs' theory, the court noted that the index was only an index-not the actual file containing the sound recording. See In re Napster, 377 F.Supp.2d at 803. In this case, the individual peer-to-peer users are alleged to have had the electronic files on their hard disks, not merely a reference. See also Perfect 10, Inc. v. Amazon.com, Inc., 508 F.3d 1146, 1162-63 (9th Cir.2007) (distinguishing Google's process of indexing images and providing thumbnails to users on similar grounds).

[20] The First Circuit's decisions in Venegas-Hernandez, 424 F.3d at 57-59, and Latin American Music Co., 499 F.3d at 46, appear to support this distinction.

[21] Before the Copyright Act was passed in 1976, "publication" determined the date on which statutory protection of the copyright began. See 17 U.S.C. § 24 (1970), repealed by Copyrights Act of 1976, ch. 3, § 302, 90 Stat. 2541. It occurred when "`the original or tangible copies of a work [were] ... made available to the general public'" Bartok v. Boosey & Hawkes, Inc., 523 F.2d 941, 945 (2d Cir.1975) (quoting Melville B. Nimmer, Nimmer on Copyright § 49 at 194-95 (1974)). It did not include the mere public performance of a work. See Ferris v. Frohman, 223 U.S. 424, 435-36, 32 S.Ct. 263, 56 L.Ed. 492 (1912).

[22] The term "material object" also distinguishes a tangible copy of a work from its performance. Compare 17 U.S.C. § 101 (defining "copies"), with id. (defining "perform"). Clearly, different copyrights are implicated by the ownership of a phonorecord and by a public performance of the sound recording physically embodied in that phonorecord. Compare 17 U.S.C. § 106(1), with id. § 106(3), and with id. §§ 106(4), 106(6). While this seems an elementary distinction, it is important to the scope of the distribution right, discussed more extensively below.

[23] This point of view is supported by Congress' abrogation of one judicial doctrine concerning the nature of a "copy." In White-Smith Music Publishing Co. v. Apollo Co., 209 U.S. 1, 28 S.Ct. 319, 52 L.Ed. 655 (1908), the Supreme Court rejected the argument that the copyright for a piece of music applied to the perforated sheets used to instruct a player piano, holding that it was limited to sheet music from which a person could read and reproduce the music. Because the perforated sheets were not intelligible to a person, the Court held, they were not "copies." Id. at 17, 28 S.Ct. 319. Congress rightly rejected this "artificial and largely unjustifiable distinction[]," House Report at 52, reprinted in 1976 U.S.C.C.A.N. at 5665, by expanding the definition of "fixed" to include methods that required machines. Concurrently, Congress sought to broaden the definition of the medium in which copyrighted material could be fixed. See id. at 52-53, reprinted in 1976 U.S.C.C.A.N. at 5665-66. A "material object" is thus largely, if not entirely, a vehicle for the fixation requirement.

[24] Suppose someone has a copy of a copyrighted poem on a single sheet of paper. He announces, "I'm going to be at the copy machine with the poem pressing the`Copy' button, but I'm not going to touch the new copies that come out in the tray." If another person takes one of the new copies, no hand-to-hand transfer of a tangible object has occurred, and the person who presses the copy button has not been divested of ownership in his original.

[25] The House Report does not specifically address the distribution right as a protection of the copyright owner's right to control the market, but it is an inescapable inference from the nature of the right. See, e.g., Harper & Row, 471 U.S. at 558, 105 S.Ct. 2218 ("By establishing a marketable right to the use of one's expression, copyright supplies the economic incentive to create and disseminate ideas."); cf. House Report at 62-63, reprinted in 1976 U.S.C.C.A.N. at 5676 (noting that too broad an exception to performance rights for non-profit users could allow free displays and performances to "supplant markets for printed copies"); id. at 80, reprinted in 1976 U.S.C.C.A.N. at 5694 (expressing concern that illegitimate fair use could affect the copyright owner's market for distribution of copies). The Court does not express a view as to the extent to which peer-to-peer file sharing actually does cause economic damage to copyright owners.

[26] It is perhaps in recognition of this fact of internet-era life — and in recognition of the fact that copyrighted material can be "distributed" electronically — that Congress has made available compulsory licenses "to distribute [phonorecords] to the public for private use, including by means of a digital phonorecord delivery." 17 U.S.C. § 115.

[27] The reading is not a stretch. The dictionary definition of "to distribute" includes, inter alia, "to disperse through a space ...; spread; scatter[;] to promote, sell, and ship or deliver ... to individual customers ... [;] to pass out or deliver ... to intended recipients." Random House Unabridged Dictionary 572 (2d ed.1993). An electronic file transfer fits comfortably within each.

[28] It is irrelevant that such an action may also infringe the reproduction right secured to the copyright holder under 17 U.S.C. § 106(1). A single action can infringe more than one right held under § 106.

[29] The EFF's reliance on Age v. Paramount Communications, 59 F.3d 317, 325 (2d Cir. 1995), is misplaced. The plaintiff in Agee claimed the violation of several different rights after Paramount used his music as a soundtrack to a video without authorization; most relevantly, the plaintiff claimed violation of the distribution right protected by § 106(3). The video traveled from Paramount to local affiliate television stations, and from there to the public. The court concluded that the broadcast, as it traveled from the affiliate stations to the public, was a public performance, not the distribution of a copy. The affiliates were only the intermediaries through which Paramount's right to perform was exercised. See Agee, 59 F.3d at 325; see also 17 U.S.C. § 112(e)(1) (permitting retention of "ephemeral recordings" for retransmission). A key fact was that the transmission was designed to be transitory. Electronic files, such as those transferred here, are not.

The Court recognizes that electronic copies can be of varying permanence, see MAI Sys. Corp. v. Peak Computer, Inc., 991 F.2d 511, 518-19 (9th Cir. 1993) (discussing whether loading copyrighted software into temporary random access memory constitutes a "copy" under the Copyright Act), and it is not clear that all of them should be treated equally under the copyright statutes. But this is a clear case, at one end of the spectrum. The files at issue here were downloaded precisely to be copies, indefinitely replayable and transferable. The Court has no need to consider modes of electronic transmission beyond transfers over peer-to-peer networks.

[30] Counsel for one movant also represents that none of the movant's music files were unlicensed. See Suppl. Mem. Supp. Mot. Quash at 9-10 (document #149). While that may be the case, it is not clear why it is relevant to allegations of unlicensed distribution under 17 U.S.C. § 106(3). And insofar as it is relevant to allegations of unlicensed copying under 17 U.S.C. § 106(1), it is a matter better left for after discovery, when counsel's representation can be supported by evidence.

The same movant further contends that the Linares affidavit, which forms the basis of some of the plaintiffs' prima facie case, should be stricken. The movant claims that MediaSentry, the private investigator who downloaded the files from the Does and recorded their IP addresses, see Linares Decl. at 4-6, Ex. A to PL Mot. Leave to Take Immediate Discovery (docket no. 07-cv 10834, document #5), does not have the license to undertake private investigations required by Massachusetts General Laws ch. 147, §§ 23-25. The Court has no evidence properly before it as to whether or not MediaSentry has a license, how MediaSentry gathers its information, or whether that information is publicly available. It therefore declines to reach the issue on this record; the movant may refile a motion to strike.

[31] From the Linares Declaration, it is easily inferred how this information is gained. MediaSentry, on finding an alleged infringer, requests through the peer-to-peer software a list of all the files available to be shared on the sending computer. It then culls through the resulting list of files to isolate (and count) the plaintiffs' copyrighted sound recordings. See Linares Decl. at 5-6, Ex. A to PI. Mot. Leave to Take Immediate Discovery (docket no. 07-cv-10834, document #5).

[32] This general inference of infringement is not inconsistent with the "concrete" criterion discussed below. It bears re-emphasis that this is a preliminary stage of the litigation; the plaintiffs need only show that some infringement was likely and that they have specifically identified at least some of the copyrighted material at issue. This protects the defendants from a fishing expedition in which plaintiffs only wish to investigate specific behavior — for example, the large use of bandwidth by a single user continuously over a long period of time or the mere use of a peerto-peer network.

[33] At least, absent MediaSentry's downloads — again, the Court does not decide whether those downloads can constitute direct evidence of actual infringements.

[34] The Media Access Control ("MAC") number is a unique identifier embedded in most network adaptors — the physical piece of hardware that permits a user to connect to a network, and thus to the internet. The MAC address is used by the ISP in routing information through the network and is specific to the user's computer; it is therefore uniquely relevant in allowing a fact-finder to determine whether the defendant was, in fact, infringing the plaintiff's copyright. Although sophisticated users can use software to make MAC addresses appear otherwise than they actually are — a process called "spoofing" — the addresses are still highly probative evidence in this litigation. See, e.g., Daniel Kamitaki, Note, Beyond E-Mail: Threats to Network Security and Privileged Information for the Modem Law Firm, 15 S. Cal. Interdisc. L.J. 307, 312 & nn. 30-34 (2006) (discussing MAC addresses generally); United States v. Carter, No. 07-CR-00184-RLH, 2008 WL 623600, at *12 (D.Nev. Mar.6, 2008) (noting possibility of spoofing).

[35] Insofar as the defendants wish to assert a more substantial First Amendment value — fair use, for example — that is a matter better left for later in the litigation.

[36] The Court may take judicial notice of related proceedings. See, e.g., Anderson v. Rochester-Genesee Reg'l Transp. Auth., 337 F.3d 201, 205 n. 4 (2d Cir.2003).

[37] That is, a precise copy of the hard drive, exactly as it is in the defendant's computer. This allows the plaintiffs not only to see what is obviously present on the user's computer, but also deleted or concealed files. "`Deleting a file does not actually erase that data from the computer's storage devices. Rather, it simply finds the data's entry in the disk directory and changes it to a`not used' status — thus permitting the computer to write over the`deleted' data. Until the computer writes over the`deleted' data, however, it may be recovered by searching the disk itself rather than the disk's directory. Accordingly, many files are recoverable long after they have been deleted' — even if neither the computer user nor the computer itself is aware of their existence." Shira A. Scheindlin & Jeffrey Rabkin, Electronic Discovery in Federal Civil Litigation: Is Rule 34 Up to the Task?, 41 B.C. L.Rev. 327, 337 (2000) (footnotes omitted).

[38] Of course, even an infringer's non-infringing information is entitled to some protection. But the situation is more serious where the defendant asked to permit an image of her computer may not be an infringer at all.

6.1.10 Section 106 Hypotheticals Introduction to Intellectual Property Professor Post 6.1.10 Section 106 Hypotheticals Introduction to Intellectual Property Professor Post

Courtesy Professor Post (Temple Law)

Identify which of the exclusive rights granted by §106 the copyright holder could plausibly allege have been violated in the following hypotheticals:

1. Charlotte turns on the FM radio in her office; it is playing a recording of Bob Dylan’s “Tangled Up in Blue”(which you may assume is protected by copyright).

2. Daniel goes to an exhibition at the Philadelphia Museum of Art, where he sees a sculpture by Klaus Herring entitled “Abstract #33.” [Assume Herring’s sculpture is protected by copyright]. His sister is getting married this coming weekend, and as a surprise, Daniel carves an ice sculpture closely resembling the shape and proportions of “Abstract #33.”

3. Assume that Motion Pictures, Inc. (“MPI”) owns the copyright in the recently-released film “There Will Be Blood.” Ellen buys a copy of the DVD version at her local video store. Using her computer, she makes a copy of the DVD and sends it to her brother in Canada. She is a high school teacher, and she brings the DVD with her to school one day and shows it to her students.

4. Fergus buys fifty copies of Ian McEwan’s award winning novel Atonement. [Assume it is a copyright protected work] He gives all of the copies (except one) to his friends and relatives at Christmas. As part of his efforts to learn Italian, he translates the fifth and sixth chapters of the book into Italian. He also writes a song –“There will be no Atonement Anymore”–in which he imagines how the lead character from the novel (Briony Tallis) would have reacted had she visited Las Vegas. He performs the song at a local Philadelphia nightclub

5. Georgia owns an art gallery specializing in 20th century paintings and photographs. She obtains two large paintings by Jasper Johns and a series of photographs taken by Diane Arbus, hangs them in her gallery, and offers them for sale. [Assume the Johns paintings and Arbus photos are protected by copyright]. She takes photographs of the Johns painting and puts copies of the photograph (a) in her current catalogue (a listing of all art available for sale at the gallery) and (b) on her website.

6. Herman, CEO of Multiplex, Inc., buys a copy of “The Best American Poetry of 2008.” He is so moved by one of the poems in the collection that he reads it out loud at Multiplex, Inc.’s annual shareholder’s meeting.

6.2 OIL Casebook: Derivative Works 6.2 OIL Casebook: Derivative Works

6.2.1 Midway Mfg. Co. v. Artic Int'l, Inc. 6.2.1 Midway Mfg. Co. v. Artic Int'l, Inc.

This case examines the fixation of video games when the user participates in the creation, and then considers whether speeded up circuit boards are a derivative work

704 F.2d 1009 (1983)

MIDWAY MFG. CO., an Illinois corporation, Plaintiff-Appellee,
v.
ARTIC INTERNATIONAL, INC., a New Jersey corporation, Defendant-Appellant.

No. 82-1607.

United States Court of Appeals, Seventh Circuit.

Argued November 29, 1982.
Decided April 11, 1983.

[1010] Richard G. Kinney, Chicago, Ill., for defendant-appellant.

Eric C. Cohen, Fitch, Even, Tabin, Flannery & Welsh, Chicago, Ill., for plaintiff-appellee.

Before CUMMINGS, Chief Judge, POSNER, Circuit Judge, and SWYGERT, Senior Circuit Judge.

CUMMINGS, Chief Judge.

This appeal involves questions regarding the scope of protection video games enjoy under the 1976 Copyright Act, 90 Stat. 2541, 17 U.S.C. § 101 et seq.

Plaintiff manufactures video game machines. Inside these machines are printed circuit boards capable of causing images to appear on a television picture screen and sounds to emanate from a speaker when an electric current is passed through them. On the outside of each machine are a picture screen, sound speaker, and a lever or button that allows a person using the machine to alter the images appearing on the machine's picture screen and the sounds emanating from its speaker. Each machine can produce a large number of related images and sounds. These sounds and images are stored on the machine's circuit boards—how the circuits are arranged and connected determines the set of sounds and images the machine is capable of making. When a person touches the control lever or button on the outside of the machine he sends a signal to the circuit boards inside the machine which causes them to retrieve and display one of the sounds and images stored in them. Playing a video game involves manipulating the controls on the machine so that some of the images stored in the machine's circuitry appear on its picture screen and some of its sounds emanate from its speaker.

Defendant sells printed circuit boards for use inside video game machines. One of the circuit boards defendant sells speeds up the rate of play—how fast the sounds and images change—of "Galaxian," one of plaintiff's video games, when inserted in place of one of the "Galaxian" machine's circuit boards. Another of defendant's circuit boards stores a set of images and sounds almost identical to that stored in the [1011] circuit boards of plaintiff's "Pac-Man" video game machine[1] so that the video game people play on machines containing defendant's circuit board looks and sounds virtually the same as plaintiff's "Pac-Man" game.

Plaintiff sued defendant alleging that defendant's sale of these two circuit boards infringes its copyrights in its "Galaxian" and "Pac-Man" video games. In a memorandum opinion and order reported at 547 F.Supp. 999 (N.D.Ill.1982), the district court granted plaintiff's motion for a preliminary injunction and denied defendant's motion for summary judgment. The district court's order enjoins defendant from manufacturing or distributing circuit boards that can be used to play video games substantially similar to those protected by plaintiff's copyrights. Defendant appeals from that order on the ground that plaintiff has not shown a likelihood of succeeding on the merits of its claim of copyright infringement. We affirm for the reasons that follow.

Plaintiff claims that its "Pac-Man" and "Galaxian" video games are "audiovisual works" protected under the 1976 Copyright Act. Section 101 of that Act defines audiovisual works as

works that consist of a series of related images which are intrinsically intended to be shown by the use of machines or devices such as projectors, viewers, or electronic equipment, together with accompanying sounds, if any, regardless of the nature of the material objects, such as films or tapes, in which the works are embodied. 17 U.S.C. § 101.

It is not immediately obvious that video games fall within this definition. The phrase "series of related images" might be construed to refer only to a set of images displayed in a fixed sequence. Construed that way, video games do not qualify as audiovisual works. Each time a video game is played, a different sequence of images appears on the screen of the video game machine—assuming the game is not played exactly the same way each time. But the phrase might also be construed more broadly to refer to any set of images displayed as some kind of unit. That is how we construed it in WGN Continental Broadcasting Co. v. United Video, Inc., 693 F.2d 622 (7th Cir.1982), where we held that a news program and a thematically related textual display ("teletext") transmitted on the same television signal but broadcast on different television channels constituted a single audiovisual work. We see no reason to construe it more narrowly here. As we noted there, the legislative history of the Copyright Act of 1976 suggests that "Congress probably wanted the courts to interpret the definitional provisions of the new act flexibly, so that it would cover new technologies as they appeared, rather than to interpret those provisions narrowly and so force Congress periodically to update the act." 693 F.2d at 627.

There is a second difficulty that must be overcome if video games are to be classified as audiovisual works. Strictly speaking, the particular sequence of images that appears on the screen of a video game machine when the game is played is not the same work as the set of images stored in the machine's circuit boards. The person playing the game can vary the order in which the stored images appear on the screen by moving the machine's control lever. That makes playing a video game a little like arranging words in a dictionary into sentences or paints on a palette into a painting. The question is whether the creative effort in playing a video game is enough like writing or painting to make each performance of a video game the work of the player and not the game's inventor.

We think it is not. Television viewers may vary the order of images transmitted on the same signal but broadcast on different channels by pressing a button that changes the channel on their television. In the WGN case, we held that the creative effort required to do that did not make the sequence of images appearing on a viewer's [1012] television screen the work of the viewer and not of the television station that transmitted the images. Playing a video game is more like changing channels on a television than it is like writing a novel or painting a picture. The player of a video game does not have control over the sequence of images that appears on the video game screen. He cannot create any sequence he wants out of the images stored on the game's circuit boards. The most he can do is choose one of the limited number of sequences the game allows him to choose. He is unlike a writer or a painter because the video game in effect writes the sentences and paints the painting for him; he merely chooses one of the sentences stored in its memory, one of the paintings stored in its collection.

Defendant suggests another reason why plaintiff's video games are not copyrightable—because the printed circuit boards in which the games are fixed are patentable. We reject this argument for the same reason District Judge Decker rejected it. See 547 F.Supp. at 1008-1009. Plaintiff claims copyrights in audiovisual works—the distinctive set of images and sounds stored in its circuit boards. It does not claim copyrights in the design of those circuit boards, so it matters not that those designs may be patentable. Recording images and sounds in circuit boards does not destroy their copyrightability any more than does recording them on rolls of celluloid film. Defendant cites Apple Computer, Inc. v. Franklin Computer Corp., 545 F.Supp. 812 (E.D.Pa.1982), and The Magnavox Co. v. Mattell, Inc., 216 U.S.P.Q. 28 (N.D.Ill.1982) in support of its argument, but those cases are easily distinguished. Both dealt with copyrights in computer programs, not with copyrights in audiovisual works fixed in computer programs. We thus conclude that video games are copyrightable as audiovisual works under the 1976 Copyright Act and we note that every other federal court (including our own) that has confronted this issue has reached the same conclusion. Williams Electronics, Inc. v. Artic International, Inc., 685 F.2d 870 (3rd Cir.1982); Atari, Inc. v. North American Philips Consumer Electronics Corp., 672 F.2d 607, 617 (7th Cir.1982); Stern Electronics, Inc. v. Kaufman, 669 F.2d 852 (2nd Cir.1982); Midway Manufacturing Co. v. Dirkschneider, 543 F.Supp. 466 (D.Neb. 1981). Cf. WGN Continental Broadcasting Co. v. United Video, Inc., 693 F.2d 622, 625-626 (7th Cir.1982).

Defendant next argues that plaintiff's copyrights are invalid because the 1976 Copyright Act does not apply to plaintiff's video games. Section 117 of the 1976 Copyright Act was amended in 1980 to define the exclusive rights of owners of copyrights in computer programs. As originally enacted, Section 117 provided that the 1909 Copyright Act and common law were to govern the rights of a copyright owner "with respect to the use of the [copyrighted] work in conjunction with" computers. Defendant argues that the 1980 amendment does not apply to copyrights, like those of plaintiff, in existence before the amendment took effect and that the original Section 117 requires that we look to the 1909 Act and common law to determine whether the circuit boards defendant manufactures are copies of plaintiff's audiovisual works.

We disagree. Even if the 1980 amendment applies only to copyrights issued after its effective date—an issue we do not decide—the district court properly applied the 1976 Act. The language and legislative history of the 1980 amendment are convincing that original Section 117 was intended only to leave unaltered the existing law governing the exclusive rights of owners of copyrights in computer programs. See H.Rep. No. 96-1307, 96th Cong., 2nd Sess. 27 (1980) (Part I) (Judiciary Committee), reprinted in 1980 U.S.Code Cong. & Ad.News 6460, 6486; id. at 19 (Part II) (Committee on Government Operations), reprinted in 1980 U.S.Code Cong. & Ad.News 6509; Tandy Corp. v. Personal Micro Computers, Inc., 524 F.Supp. 171, 174-175 (N.D. Cal.1981). It was not intended to permit pirating of audiovisual works stored in computers.

[1013] Defendant also argues that even if plaintiff's video games are copyrightable, plaintiff's asserted copyrights are invalid because the works they protect were originally published without the notice of copyright required by Section 401 of the 1976 Act. Plaintiff purchased the copyrights it asserts in this suit in 1979 and early 1980 from a Japanese company that invented the video game machines plaintiff now markets. Defendant claims that the Japanese company published in Japan without notice of copyright the audiovisual works stored in these machines before it assigned its copyrights to plaintiff. Even if that is so, however, the copyrights plaintiff purchased from the Japanese company are valid. Plaintiff registered its works in the United States in May and November 1980 (Supp. App. 102, 110)—within five years of the date they were originally published in Japan. Section 405(a)(2) affords a copyright owner five years within which to remedy the omission of a copyright notice from published copies of a work. Defendant does not allege that plaintiff has omitted to put a notice of copyright on any of the machines plaintiff has distributed in the United States or that its alleged infringement of plaintiff's copyrights was in reliance upon the omission of such notice from those copies originally published in Japan.

The final argument of defendant's that we address is that selling plaintiff's licensees circuit boards that speed up the rate of play of plaintiff's video games is not an infringement of plaintiff's copyrights. Speeding up the rate of play of a video game is a little like playing at 45 or 78 revolutions per minute ("RPM's") a phonograph record recorded at 33 RPM's. If a discotheque licensee did that, it would probably not be an infringement of the record company's copyright in the record. One might argue by analogy that it is not a copyright infringement for video game licensees to speed up the rate of play of video games, and that it is not a contributory infringement for the defendant to sell licensees circuit boards that enable them to do that.

There is this critical difference between playing records at a faster than recorded speed and playing video games at a faster than manufactured rate: there is an enormous demand for speeded-up video games but there is little if any demand for speeded-up records. Not many people want to hear 33 RPM records played at 45 and 78 RPM's so that record licensors would not care if their licensees play them at that speed. But there is a big demand for speeded-up video games. Speeding up a video game's action makes the game more challenging and exciting and increases the licensee's revenue per game. Speeded-up games end sooner than normal games and consequently if players are willing to pay an additional price-per-minute in exchange for the challenge and excitement of a faster game, licensees will take in greater total revenues. Video game copyright owners would undoubtedly like to lay their hands on some of that extra revenue and therefore it cannot be assumed that licensees are implicitly authorized to use speeded-up circuit boards in the machines plaintiff supplies.

Among a copyright owner's exclusive rights is the right "to prepare derivative works based upon the copyrighted work." 17 U.S.C. § 106(2). If, as we hold, the speeded-up "Galaxian" game that a licensee creates with a circuit board supplied by the defendant is a derivative work based upon "Galaxian," a licensee who lacks the plaintiff's authorization to create a derivative work is a direct infringer and the defendant is a contributory infringer through its sale of the speeded-up circuit board. See, e.g., Gershwin Publishing Corp. v. Columbia Artists Mgmt., Inc., 443 F.2d 1159, 1162 (2d Cir.1971); Universal City Studios, Inc. v. Sony Corp. of America, 659 F.2d 963, 975 (9th Cir.1981), certiorari granted, 457 U.S. 1116, 102 S.Ct. 2926, 73 L.Ed.2d 1326 (1982).

Section 101 of the 1976 Copyright Act defines a derivative work as "a work based upon one or more preexisting works, such as a translation, musical arrangement, dramatization, fictionalization, motion picture [1014] version, sound recording, art reproduction, abridgment, condensation, or any other form in which a work may be recast, transformed, or adapted." It is not obvious from this language whether a speeded-up video game is a derivative work. A speeded-up phonograph record probably is not. Cf. Shapiro, Bernstein & Co. v. Jerry Vogel Music Co., 73 F.Supp. 165, 167 (S.D.N.Y. 1947) ("The change in time of the added chorus, and the slight variation in the base of the accompaniment, there being no change in the tune or lyrics, would not be `new work'"); 1 Nimmer on Copyright § 3.03 (1982). But that is because the additional value to the copyright owner of having the right to market separately the speeded-up version of the recorded performance is too trivial to warrant legal protection for that right. A speeded-up video game is a substantially different product from the original game. As noted, it is more exciting to play and it requires some creative effort to produce. For that reason, the owner of the copyright on the game should be entitled to monopolize it on the same theory that he is entitled to monopolize the derivative works specifically listed in Section 101. The current rage for video games was not anticipated in 1976, and like any new technology the video game does not fit with complete ease the definition of derivative work in Section 101 of the 1976 Act. But the amount by which the language of Section 101 must be stretched to accommodate speeded-up video games is, we believe, within the limits within which Congress wanted the new Act to operate. Cf. WGN Continental Broadcasting Co., supra, 693 F.2d at 627; Williams Electronics, Inc., supra, 685 F.2d at 873-874; Atari, supra, 672 F.2d at 614-620.

Defendant raises other arguments on appeal, all of which we reject for the reasons set forth in District Judge Decker's exhaustive opinion. See 547 F.Supp. at 1005-1012.

AFFIRMED.

[1] We described the "Pac-Man" video game in some detail in Atari, Inc. v. North American Philips Consumer Electronics Corp., 672 F.2d 607, 610, 611 (7th Cir.1982).

6.2.2 1-800 CONTACTS, Inc. v. WhenU.com 6.2.2 1-800 CONTACTS, Inc. v. WhenU.com

309 F.Supp.2d 467 (2003)

1-800 CONTACTS, INC., Plaintiff,
v.
WHENU.COM and Vision Direct, Inc., Defendants.

No. 02 Civ. 8043(DAB).

United States District Court, S.D. New York.

December 22, 2003.

[468] [469] [470] [471] Marshall R. King, Terence P. Ross, Gibson, Dunn & Crutcher, L.L.P., New York, NY, for the Plaintiff.

Arnold Paul Lutzker, Carl Herman Settlemyer, Maureen Cohen Harrington, Lutzker & Lutzker, L.L.P., Washington, DC, Celia Goldwag Barenholtz, John A. Morris, Kronish, Lieb, Weiner & Hellman L.L.P., New York, NY, for Defendant WhenU.com.

James D. Jacobs, Wilson, Elser, Moskowitz, Edelman & Dicker LLP, White Plains, NY, for Defendant Vision Direct, Inc.

Opinion

BATTS, District Judge.

Before the Court is a Motion for a Preliminary Injunction by Plaintiff 1-800 Contacts ("1-800 Contacts" or "Plaintiff") to enjoin Defendants from delivering to computer users competitive "pop-up" Internet advertisements, in violation of federal and state copyright, trademark, and unfair competition laws. For the reasons set forth herein, Plaintiff's motion is GRANTED in part.

[472] I. BACKGROUND

A. Procedural Background

On October 9, 2002, Plaintiff filed this action with ten claims for relief.[1] With its Complaint, Plaintiff also filed a Motion for Preliminary Injunction,[2] to enjoin Defendants from: 1.) Placing, or causing any other entity to place, advertisements of any kind on any copy of Plaintiff's website, without the express consent of the Plaintiff; 2.) Altering or modifying, or causing any other entity to alter or modify, any copy of Plaintiff's website in any way, including its appearance or how it is displayed; 3.) Infringing, or causing any other entity to infringe, Plaintiff's copyright; 4.) Making any designations of origin, descriptions, representations or suggestions that Plaintiff is the source, sponsor or in any way affiliated with Defendant Vision Direct's website and services; 5.) Acting in any manner that causes Defendants' products, services, websites, or advertisements to be in any way associated with Plaintiff's products, services, or website, including, but not limited to, any means of marketing advertising, or agreements with third parties likely to induce the belief that Defendants or Defendants' websites, advertisements, products or services are in any way associated connected, or affiliated with, or licensed or authorized by Plaintiff; 6.) Infringing, or causing any other entity to infringe, Plaintiff's trademarks and/or service marks rights; 7.) Unfairly designating the origin of Defendant Vision Direct's website and services, or otherwise creating confusion regarding the origin of Defendant Vision Direct's website and services; 8.) Unfairly competing with Plaintiff in any manner; 9.) Acting, or causing another entity to act, in any manner likely to dilute, tarnish, or blur the distinctiveness of the 1-800 CONTACTS marks; 10.) Causing a likelihood of confusion or injuries to Plaintiff's business reputation; 11.) Interfering with Plaintiff's reasonable business expectations. (Plaintiff's Proposed Order, filed October 9, 2002.)

On October 22, 2002, the Court held a conference call with the parties, during which the parties agreed to cease the allegedly offending "pop-up" advertising conduct until a preliminary injunction hearing. The parties agreed to allow Defendants sufficient time to conduct a consumer survey to rebut Plaintiff's survey evidence and scheduled a Preliminary Injunction hearing for February 7, 2003.[3]

[473] On January 7, 2003, the Court ordered, by memo-endorsement of a letter request from Defendant WhenU.com ("WhenU" or "WhenU.com"), an adjournment of the Preliminary Injunction Hearing in this case to March 18, 2003. (Memo-Endorsement of Def. Jan. 6, 2003.) On January 31, 2003, Defendant WhenU.com filed its Memorandum of Law in Opposition to Plaintiff's Motion for a Preliminary Injunction ("WhenU.com Jan. 31, 2003"),[4] and Defendant Vision Direct filed its Memorandum in Opposition as well ("Vision Direct Jan. 31, 2003").[5]

On February 28, 2003, Plaintiff filed its Memorandum of Law in Reply to Defendant WhenU.com's Opposition and its Memorandum of Law in Reply to Defendant Vision Direct's Opposition ("Pl. Feb. 28, 2003").

Evidentiary hearings and argument were heard on March 18, March 19, April 8, and April 10, 2003. The Court incorporates herein the record of the evidentiary hearings and argument. Relevant hearing testimony and arguments are set forth in more detail below.[6]

B. Factual Background

The undisputed facts in this section, with the legal conclusions and facts found in the Discussion section, infra, constitute the Court's Findings of Fact and Conclusions of Law for purposes of Rule 52(a).

1. The Parties

Plaintiff 1-800 Contacts, Inc. ("1-800 Contacts") sells and markets replacement contact lenses and related products through its website, located at http://www.1800Contacts.com, and also through telephone and mail orders. (Declaration of Jason Mathison ("Mathison Dec.") ¶ 4; Plaintiff's October 9, 2002 Memorandum ("Pl. Oct. 9, 2002") at 3). Plaintiff has registered the "WE DELIVER, YOU SAVE" mark with the United States Patent and Trademark Office ("USPTO"), and has filed for registration of the mark "1-800 CONTACTS" and the 1-800 CONTACTS logo. (Complaint ("Compl.") Ex A-C; Pl. Oct. 9, 2002 at 4.) Plaintiff has expended considerable sums on marketing these marks; in 2001, 1-800 Contacts spent $27,118,000 on marketing. (Mathison Dec. ¶ 7; Pl. Oct. 9, 2002 at 4.) Since the founding of 1-800 Contacts in 1995, Plaintiff has continuously used its service marks to promote and identify its services in the United States and abroad. (Mathison Dec. ¶ 6) Plaintiff's sales have grown from $3,600,000 in 1995 to $169,000,000 in 2001. (Mathison Decl. ¶ 8; Pl. Oct. 9, 2002 at 3.)

Plaintiff is the sole owner of the 1-800Contacts.com website. (Mathison Dec. ¶ 5; Pl. Oct. 9, 2002 at 4.) Plaintiff registered its copyright to the 1-800Contacts.com website with the Copyright Office of the United States Library of Congress on October 2, 2000.[7] (Compl., Exh. D.) Over 221,800 people visited Plaintiff's [474] website in the month of September, 2002.[8] (Mathison Dec. ¶ 9; Pl. Oct. 9, 2002 at 4.)

Defendant Vision Direct, Inc. sells and markets replacement contact lenses and related products through its website, located at http://www.visiondirect.com. (Mummery Dec. ¶ 2; Vision Direct Jan. 31, 2002 at 2.) Vision Direct and 1-800 Contacts are competitors. Id. Defendant Vision Direct has registered and maintains a registration in the domain name[9]www.www1800Contacts.com. (Barrier Aff. Ex. A.)

Defendant WhenU.com is a software company that has developed and distributes, among other products, the "SaveNow" program, a proprietary software application. (Tr. at 34; Naider Aff. ¶ 22.)

2. The Internet and the Windows Operating Environment

Since Plaintiff's claims arise from alleged anti-competitive and infringing action by Defendants through the Defendants' use of proprietary software that is distributed to computer users, a brief explanation of the Internet, the computer operating environment and associated terms and definitions is helpful. These facts are not in dispute.

The Internet is a global network of millions of interconnected computers. (Compl.¶ 20.) With a computer that is connected to the Internet, a computer user can access computer code and information that is stored on the Internet in repositories called "servers." (Tr. at 137-38.) Much of the information stored in servers on the Internet can be viewed by a computer user in the form of "webpages," which are collections of pictures and information, retrieved from the Internet, and assembled on the user's computer screen. (Compl.¶ 20.) "Websites" are collection of webpages that are organized and linked together to allow a computer user to move from webpage to webpage easily. (Id.) A single website may contain information or pictures that are stored on many different servers. (Tr. at 139-140.)

To gain access to the Internet, a computer user generally connects to the Internet using an internet service provider ("ISP").[10] (Tr. at 136.) The ISP provides access to the Internet, which allows the user's computer to communicate with the Internet. (Tr. at 136.) Once a connection to the Internet has been established through an ISP, a user may "browse" or "surf" the Internet by using a software program called an Internet browser ("browser"). (Tr. at 136.) Microsoft Internet Explorer is one example of a browser program.[11] (Tr. at 135.) Through the browser, a user retrieves information located on Internet servers.[12] (Tr. at 138.)

To retrieve information from the Internet, a user may type the address[13] of a [475] website into the web browser — the user's computer will then request information from the server or servers on which the website resides,[14] and then will access the pertinent information on those servers. (Tr. at 137-38.)

Many computer users ("users") access the Internet with computers that use the Microsoft Windows operating system ("Windows"). Windows allows a user to work in numerous software applications simultaneously. (Naider Aff. at 4.) In Windows, the background screen is called the "desktop." When a software program is launched, a "window" appears on the desktop, within which the functions of that program are displayed and operate. (Naider Aff. at 4.) A user may open multiple windows simultaneously, allowing the user to launch and use more than one software application at the same time. Individual windows may be moved around the desktop, and because the computer screen is two-dimensional, one window may obscure another window, thus appearing to be "in front of" another window. (Naider Aff. at 4-5.)

A "search engine" is a website (or in some cases, a software program) that a computer user can use to find information on the Internet.[15] Typically, a computer user will type in a word or words describing what is sought, and the search engine will identify websites and webpages that contain those words.[16]

[476] 3. The SaveNow Program

The following description of the operation and function of the SaveNow software is not in dispute. The SaveNow program is computer software that only operates in the Microsoft Windows operating system. (Tr. at 27.) The SaveNow software, if installed, resides on individual computer users' computer desktops. (Tr. at 34; Naider Aff. ¶ 22.) When a computer user who has installed the SaveNow software (a "SaveNow user") browses the Internet, the SaveNow software scans activity conducted within the SaveNow user's Internet browser, (Naider Aff. ¶ 25), comparing URLs, website addresses, search terms and webpage content accessed by the SaveNow user with a proprietary directory,[17] using algorithms contained in the software. (Tr. at 34, 55; Naider Aff. ¶ 23.)

Entering an URL into the browser can "trigger" the SaveNow software to deliver a "pop-up" advertisement.[18] (Tr. at 172.) When a user types a search word or URL into the Internet browser, the SaveNow software looks to see what category of products or services the address belongs to. (Tr. at 144.) In general, if the SaveNow user's Internet usage "matches" information contained in the SaveNow directory, the SaveNow software will determine that an ad should be shown, will retrieve a pop-up advertisement from a server over the Internet, and will display that pop-up ad in a new window appearing on the user's computer screen. (Tr. at 34, 141, 145; Naider Aff. ¶ 26.) More pertinent to this case, when a user types in "1800contacts.com," the URL for Plaintiff's website, the SaveNow software recognizes that the user is interested in the eye-care category, and retrieves from an Internet server a pop-up advertisement from that category. (Tr. at 144-45.) Mr. Naider described the functioning of the proprietary directory contained in the SaveNow program:

[E]ssentially, the program contains a directory of the Internet, and ... has over 40,000 elements in this directory. Elements such as URL's, but many other elements, such as search terms, something we call key-word algorithms. So an example of a key-word algorithm would be, the software processes the content of the page and if I'm reading an article where the word "diabetes" appears four times and the word "type I" or "type II" in conjunction with that, that would be an example of a key-word algorithm. All of those elements, the URL's, the search terms, the key-word algorithms, are processed and compared against this directory of 40,000, and growing, elements. And then a decision is made that says, OK, this user is engaged in activity in a particular category — again, it may be hotel travel or air travel, in this case contact lenses or eye care — and the ad units themselves are basically associated with categories, such that if the software detects, by looking at these elements, activity in a category, it may display an ad that's relevant to that category.

(Tr. at 65.)

Usually there is a "few-second" delay between the moment a user accesses a [477] website, and the point at which a SaveNow pop-up advertisement appears on the user's screen. (Tr. at 146.)

If a SaveNow user who has accessed the 1-800 Contacts website and has received a WhenU.com pop-up advertisement does not want to view the advertisement or the advertiser's website, the user can click on the visible portion of the window containing the 1-800 Contacts website, and the 1-800 Contacts website will move to the front of the screen display, with the pop-up ad moving behind the website window. (Tr. at 63-64.) Or, if the user recognizes that a different website has appeared on the screen, the user can close the pop-up website by clicking on its "x," or close, button. If the user clicks on the pop-up ad, the main browser window (containing the 1-800 Contacts website) will be navigated to the website of the advertiser that was featured inside the pop-up advertisement. (Tr. at 63.)

The contents of the SaveNow proprietary directory are automatically updated. (Tr. at 142.) When a SaveNow user connects to the Internet, the SaveNow software receives information and updates itself without any prompting or conscious choice by the user. (Tr. at 142-43.) The SaveNow software does not store any information about the individual computer user, or track the user's usage of the computer. (Tr. at 28.) Once installed, the SaveNow software requires no action by the user to activate its operations; instead, the SaveNow software responds to a user's "in-the-moment" activities by generating pop-up advertisement windows that are related to the content of the websites a user has accessed. (Tr. at 27-28.)

Computer users typically install the SaveNow software as part of a "bundle"[19] of other software applications that consumers download at no cost. (Tr. at 67, Naider Aff. ¶ 33). A user who installs a typical software "bundle" clicks through four screens,[20] (Tr. at 68), and to proceed with installing the software "bundle," is required to approve a license agreement with WhenU, by clicking "I Agree" on the installation window.[21] (Tr. at 68; Memo in Opposition at 10). There have been approximately 100 million downloads of the [478] SaveNow program. (Tr. at 166.) The SaveNow software can be uninstalled from a user's computer, and Mr. Naider testified that approximately 75 million people have uninstalled the program. (Tr. at 70-71.)

The SaveNow software generates at least three kinds of ads — an ad may be a small "pop-up" advertisement appearing in the bottom right-hand corner of a user's screen; it may be a "pop-under" advertisement that appears behind the webpage the user initially visited; or it may be a "panoramic" advertisement that stretches across the bottom of the user's computer screen. (Naider Aff. ¶ 41.)

Pop-up advertisement windows generated by the SaveNow software are "branded" — a green "$" mark and the text "SaveNow!" are affixed to the top of the pop-up window. On the upper right-hand corner of the SaveNow ad windows, next to the "X" symbol that typically closes windows, is a "?" symbol that, when clicked, opens a new window containing a notice explaining the SaveNow software and a link to a page with more detailed information for removing or "uninstalling" the software.[22] (Tr. at 56-61; Naider Aff. ¶ 42.) As of the filing of this lawsuit, the pop-up advertisement windows contained text, at the bottom right of the pop-up window, stating: "A WhenU offer — click? for info."[23]Id.

One of the elements contained in the SaveNow proprietary software directory is the URL, "1800Contacts.com," which is the Internet website address for Plaintiff 1-800 Contacts. (Tr. at 134.) Since at least the Summer of 2002, when computer users who had the SaveNow software installed on their computers ("SaveNow users") accessed Plaintiff's website, pop-up or pop-under advertisements for Defendant Vision Direct would appear on the user's screen. (Pl. Oct. 9, 2002 at 8; Mathison Decl. at ¶ 14).

WhenU.com's clients "buy categories" of goods or services, paying for delivery of their advertisements or coupons to SaveNow users' screens when the SaveNow users are working in relevant categories. (Tr. at 65-66, 152.) Under some of WhenU.com's contracts, advertisers pay WhenU.com to deliver pop-up advertisements to SaveNow users' screens; under other contracts, advertisers pay WhenU.com based on the number of people who click on the pop-up advertisements; still other advertisers pay WhenU.com based on the number of actual purchases made by SaveNow users from pop-up ads that have been delivered to their computers. (Tr. at 152.) Thus, WhenU.com has a fee relationship with the advertisers who pay it to deliver pop-up advertisements, and a free relationship with consumers who [479] install the SaveNow software on their computers, but no relationship with the companies on whose websites the pop-up advertisements appear.

C. Plaintiff's Theory of the Case

Plaintiff argues that it has been harmed by the creation of an "impermissible affiliation between Plaintiff and Defendant," since because of Defendants' pop-up advertising, users "are likely to have the impression that the pop-up advertisements operate in cooperation with, rather than in competition against, the Plaintiff." (Pl. Oct. 9, 2002 at 10-11). Plaintiff argues the "pop-up advertisements also interfere with and disrupt the carefully designed display of content" on Plaintiff's copyrighted website. (Id.) Plaintiff argues further that the pop-up advertising enables Defendants to "profit illegally from unauthorized pop-up advertisements delivered to Plaintiff's website," (Id. at 11), and that through the pop-up advertisements, "Defendants are free-riding on the name, reputation, and goodwill that Plaintiff has worked so hard to attain." (Id.) Plaintiff argues that, by causing pop-up advertisements to appear on the copyrighted 1-800 Contacts website, Defendants have altered the copyrighted website, and in so doing, have infringed Plaintiff's exclusive rights to display its copyrighted works and to prepare derivative works. (Tr. at 359.) Plaintiff also argues that Defendants' pop-up advertising has created a likelihood of confusion between Defendant Vision Direct and Plaintiff, and that since Plaintiff has a valid trademark, Defendants have infringed Plaintiff's trademark. (Tr. at 369-70.)

Plaintiff's expert, William D. Neal, conducted a consumer survey to determine whether Defendants' pop-up advertising scheme was likely to cause confusion as to the source of the pop-up advertisements. (Tr. at 209, 243; Neal Dec. ¶ 3.) Specifically, Mr. Neal's overall research goal was to "[d]etermine whether online shoppers who wear or expect to wear contact lenses in the future, and who have the SaveNow software from WhenU.com installed on their computers, are confused and/or misled as to the source of SaveNow generated pop-up advertisements." (Neal Dec., Ex. B.)

Mr. Neal began with an Internet panel[24] to gather potential respondents to his survey. (Tr. at 210, 215.) Mr. Neal testified that from the initial 3.5 million people in the Internet panel, he selected a sample of 100,000 people,[25] and invited them to take a survey, and that approximately 46,000 people responded to that invitation. (Tr. [480] at 210.) Of this group, Mr. Neal determined that approximately 9.6% had the SaveNow software installed on their computers. (Tr. at 210.) Mr. Neal testified that his survey data was based on responses of 994 respondents, about half of whom were individuals who had the SaveNow software installed on their computers. (Tr. at 209.) The survey was administered online. (Neal Dec., Ex. B.)

From the survey, Mr. Neal concluded that 76% of survey respondents who had SaveNow software on their computer did not know that SaveNow software generates pop-up advertisements on their computer screens when they visited certain websites.[26] (Tr. at 211; Neal Dec. at ¶ 7c). Mr. Neal concluded that 60% of survey respondents who had experienced pop-up advertisements on their computer believe that "pop-up advertisements are placed on the website on which they appear by the owners of that site,"[27] and 52% believe that "pop-up advertisements have been pre-screened and approved by the website on which they appear."[28] (Tr. at 211; Neal Dec. at ¶ 7d). Mr. Neal also concluded that 51% of the survey respondents who had SaveNow software installed on their computer had never heard of that software program,[29] and that 68% did not know it was installed on their computer prior to his research study.[30] (Tr. at 210, Neal Dec. at ¶ 7b).

Mr. Neal testified that "a specific trademark was not researched" in his survey. (Tr. at 249.) Mr. Neal testified he did not view a SaveNow pop-up advertisement prior to administering the survey, (Tr. at 258), and did not show survey respondents an example of a SaveNow pop-up advertisement. (Tr. at 264.) Mr. Neal's survey did not ask whether the respondent had ever seen a SaveNow pop-up ad, (Tr. at 265.), did not attempt to distinguish between SaveNow pop-up ads and other pop-up ads, (Tr. at 266-67), and did not determine whether differences between SaveNow ads and other pop-up ads might have affected users' perceptions of the advertisements provided by SaveNow. (Tr. at 268-69.) Mr. Neal testified that although he had not provided survey respondents with an example of a SaveNow pop-up advertisement, it was "very reasonable" to assume that SaveNow users would have seen SaveNow pop-up ads. (Tr. at 272.) Mr. Neal testified that the reason he did [481] not research a specific trademark was that he understood

that there is a plethora of ads that can be demonstrated or generated through SaveNow, everything from contact lenses to indoor/outdoor carpet to almost anything else. To try to generate that plethora of ads in a research experiment would have been, one, very difficult. The other problem we have is how do you design a control for that? It's nearly impossible. My alternative position was to rely on people's recent recall of what they were seeing in terms of pop-up ads and ask them about their beliefs of those pop-up ads, who generated them, who authorized them, who was paying for them.

(Tr. at 272-73.)

D. Defendant WhenU's Theory of the Case

According to Avi Naider, CEO of WhenU.com, the SaveNow software was conceived to "revolutionize marketing from implied interest, interests that are deducted [sic] based on who a consumer is and what their personal information is, to actual interests, when you shop, when you travel, when you invest. And that's why we named the company WhenU.com." (Tr. at 24.) Mr. Naider testified that the way the SaveNow software works is that

the software runs in the background, and it doesn't require anything of the user. That's the point. Meaning if the user actually has to go and start saying to the software, OK, fine, offers on travel, they can do that through a search engine. This is a piece of software that is designed to remind the user, to push information to the user. So the user is on the Internet, they're looking at, let's say, travel or any other type of activity. The software, in a separate window, will deliver, or it may deliver, an ad to them that's relevant based on their in-the-moment activity.

(Tr. at 27, emphasis added.)

Mr. Naider testified that the SaveNow program performs "contextual marketing," which Mr. Naider defined as "delivering something to a consumer when they need it." (Tr. at 29.) As an example of contextual marketing, Mr. Naider discussed a receipt he had received after completing a grocery-store purchase of, among other things, a lactose-free, non-dairy milk product. Printed at the bottom of the store receipt was a coupon for a lactose-free, non-milk product, which Mr. Naider testified he received because a marketing company had identified his potential preferences from his purchasing behavior. (Tr. at 31.)

Mr. Naider analogized the operation of the pop-up windows generated by the SaveNow software to the functioning of several other common software programs. Specifically, using images from computer screen captures, Mr. Naider demonstrated that, in Windows, it is possible to have multiple windows, containing unrelated program applications, running at the same time. (Tr. at 36.) Mr. Naider continued, by demonstrating that windows generated by a Windows "instant messaging" application[31] would pop up without warning while he was working in an unrelated spreadsheet program, in order to deliver messages sent over the Internet by friends. (Tr. at 37-38.) Mr. Naider also testified that on his home computer he received messages and alerts from programs,[32] that [482] he had not triggered through any action of his own. (Tr. at 41.) Mr. Naider testified that, in general, computer users in the Windows operating environment expect to be working in multiple windows simultaneously, and that in "pushing" information to the user, the SaveNow software was acting much like other software applications that opened new "pop-up" windows. (Tr. at 41, 49-50.) Mr. Naider also testified that the pop-up windows had "no physical relationship with the main browser window," that the SaveNow software had "absolutely no knowledge" of where the main browser window was, and that the pop-up advertisements did not alter the main browser window in any way. (Tr. at 51.)

At the hearing, Professor John Deighton, an expert in interactive marketing, testified that as a result of the structure of the Internet, a new publishing and retailing model has developed. (Tr. at 85-94.) Professor Deighton said the economic investment required to publish on the Internet is much lower than in traditional publishing industries[33] and that, although 60 percent of the population of the United States is part of the Internet "audience," "no significant group of that audience is in any one place at any one time." (Tr. at 84-88.) As a result, Professor Deighton said that a new model has emerged, wherein publishing and retailing have "conjoined," and that individual websites are "a combination of publisher and marketplace," since it is expected that the websites will be read like a publication, but also an expectation that there will be competition, as in a marketplace. (Tr. at 88-90.) Professor Deighton said that the WhenU software is an example of a model for retailing and publishing that "will return to the Internet some of the cost that was made to build the Internet." (Tr. at 89.)

Professor Deighton also testified that a preliminary injunction in this case would have "some short-term immediate impacts and some chilling long-term impacts." (Tr. at 98.) Specifically, Professor Deighton testified that consumers who had elected to use the WhenU.com software would be frustrated in their attempts to continue to use it, and that competition in the advertising sector might be chilled. (Tr. at 98-99.) Dr. Deighton testified further:

The Internet is not a decade old and we have seen enormous fortunes made and lost. That process must be allowed to continue if the right model to support this wonderful institution is going to be discovered. I think that unnecessarily harsh restrictions on this initiative would discourage others from similar initiatives or improved initiatives.

(Tr. at 100.)

Defendants did not conduct their own survey to determine whether the SaveNow software caused consumer confusion. Instead, to challenge the validity of Mr. Neal's survey, Defendant WhenU.com produced Dr. Jacob Jacoby. Dr. Jacoby attacked Mr. Neal's research on a number of fronts.

Dr. Jacoby testified that because Mr. Neal failed to show any WhenU.com ads to survey respondents, survey respondents could not have had a "clear indication in their minds as to what [Mr. Neal] meant" when he defined pop-up ads. (Tr. at 290-91.)

Dr. Jacoby also testified that if Mr. Neal had intended to conduct a survey that revealed what respondents recalled about [483] pop-up advertising, Mr. Neal should have asked the survey respondents what they recalled about advertising, instead of providing his own definition of pop-up advertisements, followed by questions about pop-up advertisements. (Tr. at 294.) Dr. Jacoby testified that he had "never seen recall used in assessing likelihood of confusion," (Tr. at 295.), and that use of recall threatened the validity of Mr. Neal's survey, since there was nothing to guarantee that pop-up advertisements the survey respondents had seen were generated by the SaveNow program. (Tr. at 296.) Dr. Jacoby testified that this was significant because pop-up advertisements vary in size, placement, and content. (Tr. at 297.) Dr. Jacoby testified that the recall problem could have been avoided by use of an example, in order to distinguish SaveNow advertisements from other pop-up advertisements. (Tr. at 298.) In sum, Dr. Jacoby testified that Mr. Neal's suggestion of a definition of pop-up advertisements was "a leading, loaded kind of language." (Tr. at 304.)

Dr. Jacoby further testified that Mr. Neal inappropriately colored the language of questions, by suggesting that pop-up advertisements appeared "on a website" instead of on the computer screen, and by telling the respondents that pop-up advertisements were not authorized by the websites on which they appeared. (Tr. at 306-09.)

Avi Naider, the president of WhenU.com, testified that a preliminary injunction would result in damage to his company in excess of $10,000,000 over twelve months. (Tr. at 34.) His estimate of this amount was based on current or future advertisers who would cancel their advertising orders in order to avoid negative publicity or possible litigation. (Tr. at 33, 165.)

In a declaration attached to Defendant Vision Direct's Memorandum of Law, Ian Mummery stated:[34]

A preliminary injunction against Vision Direct would undoubtedly damage it, possibly irreparably. Vision Direct's reputation is unblemished and must remain so if Vision Direct is to continue its spectacular success. Customers will undoubtedly be hesitent [sic] to purchase contact lenses from a company that has been enjoined.

(Mummery Dec. ¶ 9).

In addition, Mr. Mummery's declaration stated that on September 17, 2002, three weeks before this action was filed, Defendant Vision Direct voluntarily instructed its co-defendant, WhenU.com, to cease placing "pop-up" ads on Plaintiff's website, and that Vision Direct has no intention of resuming use of the offending pop-up advertising. (Mummery Dec. ¶ 7, 8.) Mr. Mummery's declaration also stated that Defendant Vision Direct had sued its co-defendant WhenU.com and Coastal Contacts, an Internet replacement contact lens retailer who is not a party in this case, for conduct that is substantially the same as that for which Vision Direct is being sued in this case.[35] (Mummery Dec. ¶ 8.)

[484] II. DISCUSSION

A. Standard for Preliminary Injunction

It is well-settled in this Circuit that "a party seeking a preliminary injunction must demonstrate (1) the likelihood of irreparable injury in the absence of such an injunction, and (2) either (a) likelihood of success on the merits or (b) sufficiently serious questions going to the merits to make them a fair ground for litigation plus a balance of hardships tipping decidedly toward the party requesting the preliminary relief."[36]Fed. Express Corp. v. Fed. Espresso, Inc., 201 F.3d 168, 173 (2d Cir.2000); Procter & Gamble Co. v. Chesebrough-Pond's, Inc., 747 F.2d 114, 118 (2d Cir.1984); Coca-Cola Co. v. Tropicana Prods., Inc., 690 F.2d 312, 314-15 (2d Cir.1982); United States v. Siemens Corp., 621 F.2d 499, 505 (2d Cir.1980).

B. Copyright Claims

To establish a prima facie case of copyright infringement, a Plaintiff must show "1) Ownership of valid copyright, and 2) Copying of constituent elements of the work that are original." Feist Publications Inc. v. Rural Tel. Serv. Co., Inc., 499 U.S. 340, 361, 111 S.Ct. 1282, 113 L.Ed.2d 358 (1991); On Davis v. The Gap, Inc., 246 F.3d 152, 158-59 (2d Cir.2001) (finding on the basis of this standard that "the owner of a copyright is thus entitled to prevail in a claim for declaratory judgment of infringement without showing entitlement to monetary relief").

Plaintiff has filed as an exhibit to its Complaint a certificate of registration with the United States Copyright Office of the "1800 Contacts Web site," (Memorandum in Support at 4; Complaint Exh. D); this serves as prima facie evidence of valid ownership of a copyright. 17 U.S.C. § 410(c). This protection extends to both the computer code for the website and the screen displays of the website. OP Solutions, Inc. v. Intellectual Property Network Ltd., 1999 WL 47191 at *10 (S.D.N.Y.1999), 1999 U.S. Dist. LEXIS 16639, at *10 (noting that the protection accorded "non-literal" elements of a computer program extends to screen displays); Harbor Software, Inc. v. Applied Systems, Inc., 925 F.Supp. 1042, 1045 (S.D.N.Y.1996) (finding sufficient expressive choices in the selection and arrangement of information compiled in screen reports and displays to satisfy the minimal requirement of originality to warrant protection).

Plaintiff alleges that Defendants have "copied" constituent elements of Plaintiff's website in the "broad sense of invasion of one of the exclusive rights secured to copyright owners under the Copyright Act." (Pl. Oct. 9, 2002 at 28) (quoting Dynamic Solutions, Inc. v. Planning & Control, Inc., 646 F.Supp. 1329, 1337 n. 12 (S.D.N.Y.1986)). Plaintiff argues that the 1-800 Contacts website, as perceived by a SaveNow user,[37] appears differently than [485] the copyrighted website, and that the website's appearance has therefore been "modified and that Defendants' pop-up scheme caused this modification." (Pl. February 28, 2003 at 7). Specifically, Plaintiff alleges that Defendants have invaded Plaintiff's exclusive right to display the 1-800 Contacts website, in violation of 17 U.S.C. § 106(1), and its exclusive right to prepare derivative works based on the 1-800 Contacts website, secured to Plaintiff under 17 U.S.C. § 106(2).

1. Display Right, 17 U.S.C. § 106(1)

Plaintiff alleges that Defendants have invaded Plaintiff's exclusive right to display the 1-800 Contacts website. 17 U.S.C. § 106(1). Plaintiff argues it gives computer users a license to "use and display" its website, but does not give them a license to alter the website or change its appearance in any way. Plaintiff argues that, by delivering pop-up advertisements to a SaveNow user's computer while the user views Plaintiff's website, Defendants create a new screen display that incorporates Plaintiff's copyrighted work, thereby infringing Plaintiff's exclusive right to display its copyrighted work. (Memorandum in Support at 29).

For this Court to hold that computer users are limited in their use of Plaintiff's website to viewing the website without any obstructing windows or programs would be to subject countless computer users and software developers to liability for copyright infringement and contributory copyright infringement, since the modern computer environment in which Plaintiff's website exists allows users to obscure, cover, and change the appearance of browser windows containing Plaintiff's website.

Without authority or evidence for the claim that users exceed their license to view the copyrighted 1-800 Contacts website when they obscure the website with other browser windows (including pop-up ads generated by the SaveNow program), Plaintiff has little basis for its claim that Defendants have infringed its display right.

2. Derivative Works Right, 17 U.S.C. § 106(2)

Plaintiff also alleges that Defendants have invaded Plaintiff's exclusive right to prepare derivative works based on the 1-800 Contacts website, secured to Plaintiff under 17 U.S.C. § 106(2).

Section 106 of the Copyright Act provides that "the owner of copyright under this title has the exclusive right to ... prepare derivative works based upon the copyrighted work." 17 U.S.C. § 106. However, Plaintiff has failed to show that [486] Defendants have created a "derivative work" that infringes Plaintiff's exclusive rights under § 106(2).

Plaintiff argues that, by delivering pop-up advertisements to a SaveNow user's computer while the user views Plaintiff's website, Defendants are adding a Vision Direct advertisement to Plaintiff's copyrighted screen display, thus creating a derivative of the Plaintiff's copyrighted screen display, and in the process violating "two fundamental tenets of copyright law — exceeding the license granted and destroying the author's control over the manner in which its work is presented." (Pl. Oct. 9, 2002 at 30).

For the reason set forth above, to the extent Plaintiff's derivative work argument relies on a theory that Defendants cause or contribute to copyright infringement by a SaveNow user when viewing Plaintiff's copyrighted screen display, in excess of the license granted by Plaintiff,[38] this argument fails.

Plaintiff's second theory is that Defendants have created a derivative work by adding to or deleting from Plaintiff's copyrighted website, and therefore have transformed or recast the website, in derogation of Plaintiff's exclusive derivative work right. (Pl. Oct. 9, 2002 at 29.) Plaintiff argues that to infringe their derivative work right, Defendants need not have made a copy of the original work in order to create a derivative work,[39] and that to violate its protected right to prepare derivative works, Defendants "need only transform or recast the copyrighted work in some way," as by "adding to or deleting from" Plaintiff's copyrighted website. (Pl. Oct. 9, 2002 at 29.) Plaintiff analogizes the pop-up ads in this case to advertisements added to and interspersed throughout the text of a copyrighted book in National Bank of Commerce v. Shaklee Corp., 503 F.Supp. 533 (W.D.Tex.1980), which were found to be "unauthorized additions" to the book text, in violation of the book author's copyright. (Pl. Oct. 9, 2002 at 30). Plaintiff's argument fails because Defendants have not created a "derivative work."

In order for Plaintiff's derivative work right to have been infringed, the Court must find that the screen display of the 1-800 Contacts website, with Defendant's pop-up ads, is in fact a "derivative work," as defined at 17 U.S.C. § 101.

A "derivative work" is:

... a work based upon one or more preexisting works, such as a translation, musical arrangement, dramatization, fictionalization, motion picture version, sound recording, art reproduction, abridgment, condensation, or any other form in which a work may be recast, transformed, or adapted. A work consisting of editorial revisions, annotations, elaborations, or other modifications which, as a whole, represent an original work of authorship, is a `derivative work'.

17 U.S.C. § 101 (emphasis added).

In general, copyright protection is limited to protection of

... original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either [487] directly or with the aid of a machine or device.

17 U.S.C. § 102.

A work is "fixed" in a tangible medium of expression:

... when its embodiment in a copy or phonorecord, by or under the authority of the author, is sufficiently permanent or stable to permit it to be perceived, reproduced or otherwise communicated for a period of more than transitory duration. A work consisting of sounds, images, or both, that are being transmitted, is "fixed" for purposes of this title if a fixation of the work is being made simultaneously with its transmission.

17 U.S.C. § 101.

Applying the "fixation" requirement here, Plaintiff has failed to show that its website, and Defendants' pop-up advertisements are "sufficiently permanent or stable to permit it to be perceived, reproduced or otherwise communicated for a period of more than transitory duration." 17 U.S.C. § 101. Indeed, Defendants' pop-up ad windows may be moved, obscured, or "closed" entirely — thus completely disappearing from perception, with a single click of a mouse. (Tr. at 63-64.) Moreover, to the extent pop-up advertisements fit the description of "transmitted images," they are not "fixed" works, since there is no evidence that a fixation is made "simultaneously with" the pop-up advertisements' "transmission" to the viewer of the website.[40] 17 U.S.C. § 101.

Given that the screen display of the 1-800 Contacts website with Defendant's pop-up ads is not "fixed in any medium," it is not sufficiently "original" to qualify as a derivative work under the second sentence of 17 U.S.C. § 101.

The first sentence of 17 U.S.C. § 101 also allows "non-original" works to qualify for "derivative" work status. Since the screen display of the 1-800 Contacts website with Defendant's pop-up ads is not a "translation, musical arrangement, dramatization, fictionalization, motion picture version, sound recording, art reproduction, abridgment, condensation," for Plaintiff's to prevail, it must show that Defendants have "recast, transformed, or adapted" the 1-800 Contacts website. None of these three actions seems to describe what is done to Plaintiff's website by Defendants' pop-up ads, since Plaintiff's website remains "intact" on the computer screen. Defendants' pop-up ads may "obscure" or "cover" a portion of Plaintiff's website — but they do not "change" the website, and accordingly do not "recast, transform or adapt" the website. Lee v. A.R.T. Company, 125 F.3d 580, 582 (7th Cir.1997) (mounting plaintiff's art works on ceramic tiles did not create "derivative work," and therefore did not infringe plaintiff's copyright). Moreover, if obscuring a browser window containing a copyrighted website with another computer window produces a "derivative work," then any action by a computer user that produced a computer window or visual graphic that altered the screen appearance of Plaintiff's website, however slight, would require Plaintiff's permission. A definition of "derivative work" that sweeps within the scope of the copyright law a multi-tasking Internet shopper whose word-processing program [488] obscures the screen display of Plaintiff's website is indeed "jarring," and not supported by the definition set forth at 17 U.S.C. § 101. See id.

Since Plaintiff has failed to demonstrate that Defendants have invaded the exclusive rights secured to Plaintiff under the Copyright Act, there is little likelihood that Plaintiff will succeed on the merits of its copyright claims. Dynamic Solutions, Inc. v. Planning Control, Inc., 646 F.Supp. 1329, 1337 n. 12 (S.D.N.Y.1986). In view of this finding, there is no need to address the question of irreparable injury on these grounds.

Accordingly, Plaintiff's motion for a preliminary injunction based on the Defendants' alleged infringement of Plaintiff's copyrights is DENIED.

C. Trademark Infringement

The Lanham Act prohibits the use in commerce, without consent, of any "registered mark in connection with the sale, offering for sale, distribution, or advertising of any goods," in a way that is likely to cause confusion. 15 U.S.C. § 1114(1)(a). The act also prohibits the infringement of any unregistered, common law trademark. 15 U.S.C. § 1125(a)(1); Time, Inc. v. Petersen Publishing Co., 173 F.3d 113, 117 (2d Cir.1999); Genesee Brewing Co., Inc. v. Stroh Brewing Co., 124 F.3d 137, 142 (2d Cir.1997). Under 15 U.S.C. § 1125(a)(1), the plaintiff has the burden of proving:

a) ownership of a valid mark that is entitled to protection under the Lanham Act;

b) Defendant's use of the mark is likely to cause confusion within the consuming public.[41]

In a trademark infringement case, "a showing of likelihood of confusion establishes both a likelihood of success on the merits and irreparable harm ... assuming that the plaintiff has a protectible mark." Hasbro, Inc. v. Lanard Toys, Ltd., 858 F.2d 70, 73 (2d Cir.1988) (citations omitted).

1. "Use" under the Lanham Act

Defendant WhenU.com argues it is not using Plaintiff's mark for purposes of the Lanham Act. Defendant notes that, as a result of features of the Windows operating environment that allow users to open multiple windows at one time, Defendant WhenU's SaveNow program generates new windows, displayed simultaneously with other pages. (Naider Aff. ¶ 40-42; WhenU.com Jan. 31, 2003 at 15-16). As a result, windows generated by SaveNow may be visible at the same time as a window containing Plaintiff's website, but WhenU.com argues this is not "use" within the Lanham Act. Defendant WhenU.com argues that "[n]othing is more fundamental than that a plaintiff cannot prevail on a claim for trademark infringement, pursuant to Section 1114 of the Lanham Act, or unfair competition, pursuant to Section 1125(a) of the Lanham Act, unless it can show that the defendant is using one of its marks in commerce in a way that is likely to cause confusion." (WhenU.com Jan. 31, 2003 at 17-18.)

A trademark is "used in commerce" for purposes of the Lanham Act "when it is used or displayed in the sale or advertising of services and the services are rendered in commerce, or the services are rendered in more than one State or in the United States and a foreign country and the person rendering the services is engaged in commerce in connection with the services." 15 U.S.C. § 1127.

[489] Defendants here use Plaintiff's mark in two ways. First, in causing pop-up advertisements for Defendant Vision Direct to appear when SaveNow users have specifically attempted to access Plaintiff's website — on which Plaintiff's trademark appears — Defendants are displaying Plaintiff's mark "in the ... advertising of" Defendant Vision Direct's services. Both Defendant Vision Direct and Plaintiff 1-800 Contacts are retail providers of replacement contact lenses, and therefore are unquestionably providing services "rendered in commerce." SaveNow users that type Plaintiff's website address into their browsers are clearly attempting to access Plaintiff's website because of prior knowledge of the website, knowledge that is dependent on Plaintiff's reputation and goodwill. SaveNow users that type Plaintiff's trademark "1-800 Contacts" into a search engine in an attempt to find the URL for Plaintiff's website are exhibiting a similar knowledge of Plaintiff's goods and services, and pop-up advertisements that capitalize on this are clearly using Plaintiff's mark. Thus, by causing pop-up advertisements to appear when SaveNow users have specifically attempted to find or access Plaintiff's website, Defendants are "using" Plaintiff's marks that appear on Plaintiff's website. 15 U.S.C. § 1127.

Second, Defendant WhenU.com includes Plaintiff's URL, , in the proprietary WhenU.com directory of terms that triggers pop-up advertisements on SaveNow users' computers. (Tr. at 134.) In so doing, Defendant WhenU.com "uses" Plaintiff's mark, by including a version of Plaintiff's 1-800 CONTACTS mark, to advertise and publicize companies that are in direct competition with Plaintiff.

Accordingly, the Court finds that Defendants have "used" Plaintiff's mark in commerce. OBH, Inc. v. Spotlight Magazine, Inc., 86 F.Supp.2d 176, 185-86 (W.D.N.Y.2000) (finding defendants to have "used in commerce" plaintiffs' mark where defendants: 1. used plaintiffs' trademark as the domain name for defendants' web site — which contained a link to defendants' other web site that was operated for commercial purposes; 2. used plaintiffs' trademark on the Internet, an international network; and 3. affected plaintiffs' ability to offer their services in commerce); Planned Parenthood Fed'n of Am., Inc. v. Bucci, 1997 WL 133313, at *3 (S.D.N.Y. Mar.24, 1997), aff'd, 152 F.3d 920 (2d Cir.1998), cert. denied, 525 U.S. 834, 119 S.Ct. 90, 142 L.Ed.2d 71 (1998).

Defendant errs in construing use "in connection with the services" to require "use as a trademark to identify or distinguish products or services." In support of its too narrow reading of the definition of "use," Defendant cites Lone Star Steakhouse v. Longhorn Steaks, 106 F.3d 355, 361 (11th Cir.1997). In Lone Star, the 11th Circuit upheld the district court's denial of the plaintiff restaurant owner's motion for a preliminary injunction, because plaintiffs had not "used" the service mark at issue prior to the defendant's registration of a similar mark. The court held that, as a matter of law, use of the mark "on a sign displayed on an interior wall of Plaintiff's ... [r]estaurant ... did not constitute a valid service mark use because it was not being used to identify or distinguish the services being offered." 106 F.3d at 361. The facts here are not controlled by the Lone Star court's reasoning. First, the question here is not whether Plaintiff adequately used its mark to establish a valid service mark; the question is whether Defendant is "using" Plaintiff's trademark. Second, even if this Court were to find that the standard for "use" required to establish a valid service mark is the same as the standard for "use" in the infringement context, in any case WhenU's use exceeds that of the plaintiff in Lone Star. Here, [490] WhenU.com is doing far more than merely "displaying" Plaintiff's mark. WhenU's advertisements are delivered to a SaveNow user when the user directly accesses Plaintiff's website — thus allowing Defendant Vision Direct to profit from the goodwill and reputation in Plaintiff's website that led the user to access Plaintiff's website in the first place.

Defendant WhenU.com also cites Holiday Inns, Inc. v. 800 Reservation, Inc., 86 F.3d 619, 623-25 (6th Cir.1996), wherein the Sixth Circuit reversed the district court, which had found that the defendant — who used a 1-800 telephone number that differed from plaintiff's 1-800 HOLIDAY telephone number in the use of a "zero" instead of the "o" — had "used" plaintiff's mark because there was a "clear violation of the spirit, if not the letter, of the Lanham Act." The Sixth Circuit, noting that § 32 of the Lanham Act forbids the "use in commerce [of] any reproduction, counterfeit, copy, or colorable imitation of a registered mark ... which ... is likely to cause confusion," reversed because the defendants did not actually "use" the plaintiff's mark, since plaintiff's number was 1-800 HOLIDAY,[42] and defendants were using 1-800 409-4329, and also because the defendants "did not create any confusion," since the district court found that the defendants had "never advertised or publicized anything to do with Holiday Inns or its telephone number." Holiday Inns, Inc., 86 F.3d at 623-25 (emphasis in original). Again, this case does not support Defendant WhenU.com's claim that it has not "used" Plaintiff's website within the meaning of the Lanham Act.[43]

b. Confusion Under the Lanham Act

Confusion for purposes of the Lanham Act is shown where there is a "likelihood that an appreciable number of ordinarily prudent purchasers are likely to be misled, or indeed simply confused, as to the source of the goods in question" or where "consumers are likely to believe that the challenged use of a trademark is somehow sponsored, endorsed, or authorized by its owner." New York Stock Exchange, Inc. v. New York, New York Hotel LLC, 293 F.3d 550 (2d Cir.2002) (internal citations and quotations omitted). Thus, "[c]onfusion" for purposes of the Lanham Act includes confusion "of any kind, including confusion as to source, sponsorship, affiliation, connection or identification." Guinness United Distillers & Vintners v. Anheuser-Bush, 2002 WL 1543817, *2 (S.D.N.Y.2002); Tommy Hilfiger Licensing, Inc. v. Nature Labs, LLC, 221 F.Supp.2d 410, 413-14 (S.D.N.Y.2002).

Under the Lanham Act, actionable "confusion" may take a number of forms. In some cases, there may be actual confusion among members of the consuming public, and the plaintiff may be able to demonstrate — even at the preliminary injunction stage of the case — such actual confusion. E.g., Register.Com, Inc. v. Domain Registry of America, Inc., 2002 WL 31894625, *11 (S.D.N.Y.2002); Les Ballets Trockadero de Monte Carlo, Inc. v. Trevino, 945 F.Supp. 563 (S.D.N.Y.1996) (confusion [491] among consumers, plaintiff's employees, and defendant's friends sufficient to show actual confusion).

However, a plaintiff may be unable to prove actual confusion in the market — in some cases because the market for a particular mark or product has not yet developed, or because the plaintiff has acted early enough to prevent actual confusion from developing. Thus, although in order to support a claim of infringement a plaintiff must show a probability, not just a possibility, of confusion, Streetwise Maps, Inc. v. VanDam, Inc., 159 F.3d 739, 743 (2d Cir.1998), a likelihood of confusion is actionable even absent evidence of actual confusion. E.g., Hasbro, Inc. v. Lanard Toys, Ltd., 858 F.2d 70 (2d Cir.1988) (finding likelihood of confusion despite lack of evidence of actual confusion); Centaur Communications, Ltd. v. A/S/M Communications, Inc., 830 F.2d 1217, 1227 (2d Cir.1987) (finding lack of actual confusion did not undermine district court finding of likelihood of confusion), overruled on other grounds, 973 F.2d 1033, 1043-44 (2d Cir.1992); Lexington Management Corp. v. Lexington Capital Partners, 10 F.Supp.2d 271, 286 (S.D.N.Y.1998) (lack of evidence of actual confusion neither supported nor detracted from plaintiff's motion for preliminary injunction); Clinique Laboratories, Inc. v. Dep Corp., 945 F.Supp. 547, 555 (S.D.N.Y.1996).

Confusion need not be limited to the "point of sale" to be actionable under the Lanham Act. The Second Circuit has held that confusion among non-purchasers, arising from use of a mark outside of a retail environment after any sale or purchase of a product has concluded, is actionable under the Lanham Act.[44]Clinique Laboratories, Inc., 945 F.Supp. at 558 (S.D.N.Y.1996) (use of disclaimers insufficient to address post-sale confusion among consumers).

Confusion that occurs prior to a sale may also be actionable under the Lanham Act. One such type of actionable pre-sale confusion, "initial interest confusion," occurs when a consumer, seeking a particular trademark holder's product, is instead lured away to the product of a competitor because of the competitor's use of a similar mark, even though the consumer is not actually confused about the source of the products or services at the time of actual purchase. See Mobil Oil Corp. v. Pegasus Petroleum Corp., 818 F.2d 254 (2d Cir.1987).

Although the term "initial interest confusion" was coined in a Ninth Circuit case, Brookfield Communications, Inc. v. West Coast Entertainment Corp., 174 F.3d 1036 (9th Cir.1999), the principle that such confusion is actionable as grounds for a trademark [492] infringement action originated in this Circuit. Mobil Oil Corp. v. Pegasus Petroleum Corp., 818 F.2d 254 (2d Cir.1987); Grotrian, Helfferich, Schulz, Th. Steinweg Nachf v. Steinway and Sons, 523 F.2d 1331, 1342 (2d Cir.1975) (finding harm to the defendant in the likelihood that a consumer, upon hearing plaintiff's name and thinking it had some connection with defendant's name, would consider plaintiff's product on that basis, since plaintiff's name would attract potential customers based on the reputation built up by the defendant for many years); Lois Sportswear, U.S.A., Inc. v. Levi Strauss & Co., 799 F.2d 867, 872 (2d Cir.1986) (acknowledging that the likelihood of confusion among potential customers is actionable harm under the Lanham Act); Jordache Enters., Inc. v. Levi Strauss & Co., 841 F.Supp. 506, 514-15 (S.D.N.Y.1993) ("Types of confusion that constitute trademark infringement include where ... potential consumers initially are attracted to the junior user's mark by virtue of its similarity to the senior user's mark, even though these consumers are not actually confused at the time of purchase".)

In Mobil Oil Corp. v. Pegasus Petroleum Corp., 229 U.S.P.Q. 890, 1986 WL 83765 (S.D.N.Y.1986), the district court found that plaintiff oil company would be harmed by "the likelihood that potential purchasers will think that there is some connection or nexus between the products and business of [defendant] and that of [plaintiff]." 229 U.S.P.Q. at 894, 1986 WL 83765. On appeal, the Second Circuit upheld the district court's finding, noting specifically that the district judge had

found a likelihood of confusion not in the fact that a third party would do business with Pegasus Petroleum believing it related to Mobil, but rather in the likelihood that Pegasus Petroleum would gain crucial credibility during the initial phases of a deal. For example, an oil trader might listen to a cold phone call from Pegasus Petroleum — an admittedly oft used procedure in the oil trading business — when otherwise he might not, because of the possibility that Pegasus Petroleum is related to Mobil.

Mobil Oil Corp. v. Pegasus Petroleum Corp., 818 F.2d 254, 259 (2d Cir.1987).

Application of this principle to the Internet context was recognized in Brookfield Communications, Inc. v. West Coast Entertainment Corp., 174 F.3d 1036 (9th Cir.1999), in which the Ninth Circuit held that the Lanham Act bars a website owner from including in its HTML code any term that is confusingly similar to a competitor's mark. In Brookfield, the court found that the defendant's use of terms confusingly similar to plaintiff's trademarked term "MovieBuff" in metatags[45] placed in defendant's website would result in initial interest confusion "in the sense that, by using `moviebuff.com' or `MovieBuff' to divert people looking for `MovieBuff' to its website, [defendant] improperly benefits from the goodwill that [plaintiff] developed in its mark." Brookfield, 174 F.3d at 1062. The court held that the resulting likelihood of initial interest confusion was actionable under the Lanham Act.[46]Brookfield, 174 F.3d at 1063.

[493] District courts in this circuit have noted that, on the Internet, initial interest confusion occurs when "potential consumers of one website will be diverted and distracted to a competing website." Bihari v. Gross 119 F.Supp.2d 309, 319 (S.D.N.Y.2000) ("In the cyberspace context, the concern is that potential customers of one website will be diverted and distracted to a competing website. The harm is that the potential customer believes that the competing website is associated with the website the customer was originally searching for and will not resume searching for the original website."); BigStar Entertainment, Inc. v. Next Big Star, Inc., 105 F.Supp.2d 185, 207 (S.D.N.Y.2000) ("The concern is that many of those initially interested potential customers of plaintiff's would be diverted and distracted by defendants' site and would either believe that defendants' site is associated with plaintiff's or would not return to plaintiff's domain."); Planned Parenthood, 1997 WL 133313, at *12 (Defendant's use of a domain name and home page address similar to plaintiff's mark "on their face, causes confusion among Internet users and may cause Internet users who seek plaintiff's web site to expend time and energy accessing defendant's web site."); New York State Soc. of Certified Public Accountants v. Eric Louis Assoc., Inc., 79 F.Supp.2d 331, 342 (S.D.N.Y.1999) (Use by defendant of a domain name and metatag similar to plaintiff's common law service mark "caused a likelihood of confusion because it created initial interest confusion.").

As part of its argument that Defendants' pop-up advertising results in a likelihood of confusion, Plaintiff argues it has been injured by "initial interest confusion." (Pl. Oct. 19, 2002 at 20-21). Defendant WhenU.com devotes only a footnote to its argument that Plaintiff cannot show initial interest confusion "because consumers are not drawn to another online location without knowing where they are being taken." (Memorandum in Opposition at 24 n. 14 (citing BigStar Entm't, Inc. v. Next Big Star, Inc., 105 F.Supp.2d 185, 207-208 (S.D.N.Y.2000))). Defendant apparently misunderstands both the doctrine of initial interest confusion and the context of its quote from BigStar. The harm to Plaintiff from initial interest confusion lies not in the loss of Internet users who are unknowingly whisked away from Plaintiff's website; instead, harm to the Plaintiff from initial interest confusion lies in the possibility that, through the use of pop-up advertisements Defendant Vision Direct "would gain crucial credibility during the initial phases of a deal." Mobil Oil Corp. v. Pegasus Petroleum Corp., 818 F.2d at 259. BigStar in no way requires that a consumer be unaware that he or she is being drawn to another online location:

Even if the customer quickly becomes aware of the competing source's actual identity and can rectify the mistake, the damage to the first user that the courts have identified manifest in three ways: the original diversion of the prospective customers' interest; the potential consequent effect of that diversion on the customer's ultimate decision whether or not to purchase caused by an erroneous impression that two sources of a product may be associated; and the initial credibility which may be accorded by the interested buyer to the junior user's products — customer consideration that otherwise may be unwarranted and that may be built on the strength of the senior user's mark, reputation and goodwill.

[494] BigStar Entertainment, Inc. v. Next Big Star, Inc., 105 F.Supp.2d 185, 207 (S.D.N.Y.2000)

The Court finds that the principle of initial interest confusion is applicable in the specific context of Internet sales, and applies the Polaroid factors[47] "with an eye to how they bear on the likelihood that"[48] Defendants' pop-up advertisements will confuse consumers into thinking that Defendants are somehow associated with Plaintiff or that Plaintiff has consented to their use of the pop-up advertisements. Lois Sportswear, U.S.A., Inc. v. Levi Strauss & Co., 799 F.2d 867, 872 (2d Cir.1986).

3. Likelihood of Confusion

Traditionally, whether a mark is likely to cause confusion is determined by the familiar eight-factor test set forth by Judge Friendly in Polaroid Corp. v. Polarad Elecs. Corp., 287 F.2d 492, 495 (2d Cir.), cert. denied, 368 U.S. 820, 82 S.Ct. 36, 7 L.Ed.2d 25 (1961). Under the Polaroid test, courts assess[49] the likelihood of consumer confusion by examining:

1) the strength of Plaintiff's Mark;

2) the similarity between the plaintiff's and defendant's marks;

3) proximity of the parties' services;

4) the likelihood that one party will "bridge the gap" into the other's product line;

5) the existence of actual confusion between the marks;

6) the good faith of the Defendant in using the mark;

7) the quality of the Defendant's services;

8) the sophistication of the consumers.

Polaroid, 287 F.2d at 495.

However, while a trial court considering the likelihood of confusion must evaluate the Polaroid factors,[50] the Second Circuit has cautioned that the Polaroid factors are not always dispositive. Streetwise Maps, Inc. v. VanDam, Inc., 159 F.3d 739 (2d Cir.1998); Estee Lauder Inc. v. The Gap. Inc., 108 F.3d 1503 (2d Cir.1997). Moreover, courts may consider other variables in evaluating the likelihood of confusion, and irrelevant factors may be abandoned. See Gruner + Jahr USA Publishing v. Meredith Corp., 991 F.2d 1072, 1077 (2d Cir.1993). The unique facts of each case must be considered in evaluating the likelihood of confusion. W.W.W. Pharm. Co., Inc. v. Gillette Co., 984 F.2d 567, 572 (2d Cir.1993); Thompson Medical Co. v. Pfizer Inc., 753 F.2d 208, 214 (2d Cir.1985) [495] ("[T]he complexities attendant to an accurate assessment of likelihood of confusion require that the entire panoply of elements constituting the relevant factual landscape be comprehensively examined. No single Polaroid factor is pre-eminent, nor can the presence or absence of one without analysis of the others, determine the outcome of an infringement suit.")

a. Strength of Plaintiff's Mark

In W.W.W. Pharmaceutical Co., Inc. v. Gillette Co., 984 F.2d 567, 572 (2d Cir.1993) limited on other grounds, Deere & Co. v. MTD Prods., Inc., 41 F.3d 39, 46 (2d Cir.1994), the Second Circuit set forth the test for the strength of a mark:

The focus under this factor is on the distinctiveness of the mark, or more precisely, its tendency to identify the goods sold under the mark as emanating from a particular, although possibly anonymous source. Turning on its "origin-indicating" quality in the eyes of the purchasing public, a mark's strength is assessed using two factors: (1) the degree to which it is inherently distinctive; and (2) the degree to which it is distinctive in the marketplace.

To gauge the inherent distinctiveness of a mark, courts have used four categories: generic, descriptive, suggestive, and arbitrary or fanciful. A generic mark is generally a common description of goods and is ineligible for trademark protection. A descriptive mark describes a product's features, qualities or ingredients in ordinary language, and may be protected only if secondary meaning is established. A suggestive mark employs terms which do not describe but merely suggest the features of the product, requiring the purchaser to use imagination, thought and perception to reach a conclusion as to the nature of goods ... Fanciful or arbitrary marks are eligible for protection without proof of secondary meaning and with ease of establishing infringement.

984 F.2d at 572 (internal citations and quotations omitted).

Because Plaintiff's mark, 1-800 Contacts, "is not a common description of goods," the Court finds Plaintiff's mark is not generic. Cline v. 1-888-PLUMBING Group, Inc., 146 F.Supp.2d 351 (S.D.N.Y.2001) (finding the mark "1-888-PLUMBING" not generic, but instead descriptive).[51]

Plaintiff's 1-800 CONTACTS mark is not descriptive, since it does not convey an immediate idea of the ingredients, qualities, or characteristics of the contact lens products sold by Plaintiff, and neither informs a consumer about qualities, ingredients or characteristics nor points to contact lens' intended purpose, [496] function or intended use, size, or merit. Gruner + Jahr USA Publishing v. Meredith Corp., 991 F.2d 1072, 1076 (2d Cir.1993); Abercrombie & Fitch Co. v. Hunting World, Inc., 537 F.2d 4 (2d Cir.1976).

Plaintiff's 1-800 CONTACTS mark is clearly suggestive since, although it may take some imagination to grasp that what Plaintiff markets is contact lenses (as opposed to electrical contacts or business contacts), the mark suggests Plaintiff's product. Thus, the Court finds that since Plaintiff's mark is suggestive, it is inherently distinctive and satisfies the first prong of the strength test set forth supra.

The 1-800 CONTACTS mark is also distinctive in the marketplace. Plaintiff has invested significant sums in marketing its marks — in 2001, Plaintiff spent $27,118,000 on marketing. (Mathison Dec. at ¶ 7.) Such efforts have generated significant sales — some $169,000,000 worth in 2001. (Id.) Over 221,800 people visited Plaintiff's website in the month of September, 2002. (Mathison Dec. at ¶ 9.) These figures are persuasive evidence that Plaintiff has established distinctiveness in the marketplace. Lois Sportswear, U.S.A., Inc. v. Levi Strauss & Co., 631 F.Supp. 735, 741 (S.D.N.Y.1985) (evidence of widespread advertising and promotion of defendants' product that featured defendant's mark, continuous use of the mark for more than a century, and sales figures were all relevant to determination of the strength of the mark).

That Plaintiff's mark has gained such an identity is apparent from the fact that Defendant WhenU.com uses Plaintiff's trademarked name in its directory of terms that will "trigger" a pop-up advertisement for eye-care products.[52] Defendant WhenU.com's CEO stated in his affidavit that "[t]he web address is included in the eye-care category of WhenU's directory solely for the purpose of identifying consumers who visit the web address as consumers potentially interested in eye care products such as contact lenses." (Naider Aff. at 10). Accordingly, Plaintiff's mark passes the test for being a strong mark.

b. Similarity between Plaintiff's and Defendant's marks[53]

"In assessing the similarity of the marks, `courts look to the overall impression created by the logos and the context in which they are found and consider the totality of factors that could cause confusion among prospective purchasers.'" Lexington Management Corp. v. Lexington Capital Partners, 10 F.Supp.2d 271, 279 n. 4 (S.D.N.Y.1998), (quoting Gruner + Jahr USA Publishing, 991 F.2d at 1078 (2d Cir.1993)). A court should look not just at "the typewritten and aural similarity of the marks, but [also at] how they are presented in the marketplace" to determine: [497] 1.) whether the similarity between the two marks is likely to cause confusion and 2.) what effect the similarity has upon prospective purchasers." Sports Authority, Inc. v. Prime Hospitality Corp., 89 F.3d 955, 962 (2d Cir.1996).

Defendant WhenU.com has included the URL address of Plaintiff's website, < www.1800Contacts.com>, in its proprietary directory of terms, (Tr. at 134), so that pop-up advertisements for the website of Defendant Vision Direct and other competitors will appear when computer users enter Plaintiff's URL into the address bar on their Internet browsers. (Tr. at 144-45.) Defendants also use the address www.1800Contacts.com in the advertising of Defendant Vision Direct's products by causing pop-up advertisements to appear when a SaveNow user types the address into an Internet browser.

The website address , used by Defendants in the SaveNow proprietary directory of terms incorporates completely the Plaintiff's trademark 1-800 CONTACTS. As used in the WhenU.com directory, Plaintiff's address, , differs from Plaintiff's trademark only in the omission of spaces and grammatical marks, and in the addition of the "www" and ".com." These distinctions are not significant. TCPIP Holding Co., Inc. v. Haar Communications, Inc., 244 F.3d 88, 101-02 (2d Cir.2001) (omission of spaces and addition of domain identifier ".com" or ".net" "are of little or no significance," since "it is necessary in the registration of an internet address to eliminate spaces and possessive punctuation"); OBH, Inc. v. Spotlight Magazine, Inc., 86 F.Supp.2d 176 (W.D.N.Y.2000) (finding "The Buffalo News" and "thebuffalonews.com," for all intents and purposes, identical); New York State Soc'y of Certified Pub. Accountants v. Eric Louis Assocs., Inc., 79 F.Supp.2d 331, 340 (S.D.N.Y.1999) (finding "nysscpa.com" nearly identical to "NYSSCPA"); Planned Parenthood Fed'n of Am., Inc. v. Bucci, 1997 WL 133313, at *8 (S.D.N.Y. Mar.24, 1997) (finding "plannedparenthood.com" nearly identical to "Planned Parenthood"), aff'd, 152 F.3d 920 (2d Cir.1998), cert. denied, 525 U.S. 834, 119 S.Ct. 90, 142 L.Ed.2d 71 (1998).

The similarity of the mark used by Defendants to Plaintiff's 1-800 Contacts mark is clearly relevant and increases the likelihood of confusion. If Defendants used a mark less similar to Plaintiff's mark — for example, "www.contacts.com" — then a SaveNow user who received Defendants' pop-up advertisements after typing into a browser "www.contacts.com" would be less likely to associate Plaintiff's mark with Defendants' pop-up advertisements. Accordingly, the Court finds Plaintiff's mark and the mark used by Defendants to be extremely similar, and that this similarity weighs in favor of a finding of likelihood of confusion.

c. Proximity of the parties' services

This factor is satisfied if Plaintiff shows that the parties' products are sufficiently related that customers are likely to confuse the source of origin. Lexington Management v. Lexington Capital Partners, 10 F.Supp.2d 271, 284-85 (S.D.N.Y.1998) (Noting that the Second Circuit has suggested that "the `proximity of products' factor should be considered together with the `sophistication of buyers'") (citing Cadbury Beverages v. Cott, 73 F.3d 474, 480 (2d Cir.1996)); see also Beneficial Corp. v. Beneficial Capital Corp., 529 F.Supp. 445, 449 (S.D.N.Y.1982) (noting that "the closeness of two products is, at least in part, a function of the extent to which purchasers can and do examine and distinguish them").

Here, the service offered by Plaintiff is identical to the service offered by Defendant [498] Vision Direct — both offer replacement contact lenses to consumers over the Internet. Defendant Vision Direct concedes that it is a competitor of Plaintiff. (Mummery Dec. ¶ 2.)

Defendant WhenU.com does not provide a service similar to Plaintiff's, since WhenU.com is a provider of Internet marketing services, and Plaintiff is an Internet retailer of contact lenses. However, it is apparent that WhenU's SaveNow software relies on the close similarity between Plaintiff's services and those of Defendant Vision Direct. At the hearing, WhenU's CEO, Avi Naider, described how the SaveNow software operates to trigger pop-up advertisements — by identifying the category of services provided by 1-800 Contacts, and then retrieving and displaying a pop-up advertisement of a competitor who fits into the same category of services. (Tr. at 65, 144-45.) Clearly, WhenU.com is intentionally benefitting from the fact that Defendant Vision Direct provides services that are substantially the same as Plaintiff's services.

Additionally, analysis of this factor "with an eye to" the likelihood of initial interest confusion adds support to the Court's finding that this factor weighs in favor Plaintiff. The close proximity of services provided by Defendant Vision Direct and Plaintiff increases the likelihood that consumers, having clicked on the pop-up advertisements provided by the SaveNow software, would shift their interest from Plaintiff's website and services to those of Vision Direct. Thus, the close similarity of Defendant Vision Direct's services to Plaintiff's increases the likelihood that, by "piggy-backing" on the good will and reputation of Plaintiff, Defendant's pop-up advertisements might divert potential customers from Plaintiff. Accordingly, this factor tips in favor of Plaintiff.

d. Likelihood that one party will "bridge the gap" into the other's product line

"Where the market for competing goods or services is the same, there is no need to consider whether plaintiff will bridge the gap between the markets." Planned Parenthood Federation of America, Inc. v. Bucci, 1997 WL 133313 at *8 (S.D.N.Y.1997) (declining to consider this factor where both plaintiff and defendant, whose websites were both on the Internet, were "vying for users in the same `market'") (citing Paddington Corp. v. Attiki Importers & Distributors, Inc., 996 F.2d 577, 586 (2d Cir.1993) (upholding the district court's finding that, where plaintiff's and defendant's ouzo products "would compete in the same market," the "likelihood-of-bridging-the-gap factor" was irrelevant)). Accordingly, while there is no need to address this factor, were the Court to do so, it is clear it would weigh in Plaintiff's favor.

e. Existence of actual confusion between the marks

"Actual confusion" is defined as the likelihood of consumer confusion that enables a seller to pass off his goods as the goods of another. W.W.W. Pharm. Co., Inc. v. Gillette Co., 984 F.2d 567, 574 (2d Cir.1993); Les Ballets Trockadero de Monte Carlo, Inc. v. Trevino, 945 F.Supp. 563, 571 (S.D.N.Y.1996).

However, "it is black letter law that actual confusion need not be shown to prevail under the Lanham Act, since actual confusion is very difficult to prove and the Act requires only a likelihood of confusion as to source." Lois Sportswear, U.S.A., Inc. v. Levi Strauss & Co., 799 F.2d 867, 875 (2d Cir.1986); see also Guinness United Distillers & Vintners v. Anheuser-Bush, 2002 WL 1543817, *4 (S.D.N.Y.2002) (finding plaintiff's survey, showing only 2% [499] actual confusion among consumers to weigh in favor of defendant, but nonetheless granting plaintiff's motion for preliminary injunction on the strength of other factors); Lexington Management Corp. v. Lexington Capital Partners, 10 F.Supp.2d 271, 286 (S.D.N.Y.1998) (where plaintiff provided no evidence of actual confusion in connection with its motion, this Polaroid factor neither supported nor detracted from plaintiff's motion for preliminary injunction).

As evidentiary support for its claim that consumers are likely to be confused by Defendants' pop-up advertisements as to their source, Plaintiff proffered its consumer survey, conducted by William D. Neal. (Pl. Oct. 9.2002 at 19.) The goal of Mr. Neal's survey was to "[d]etermine whether online shoppers who wear or expect to wear contact lenses in the near future, and who have the SaveNow software from WhenU.com installed on their computers, are confused and/or mislead as to the source of SaveNow generated pop-up advertisements." (Neal Aff., Ex. B at 16.) Plaintiff also notes that Defendants, who requested and were granted an opportunity to conduct its own survey, did not conduct one. (Tr. at 371.)

Proof of actual confusion, in the form of market research survey evidence, is highly probative of the likelihood of consumer confusion, "subject to the condition that `[t]he survey must ... have been fairly prepared and its results directed to the relevant issues.'" Schieffelin & Co. v. Jack Co. of Boca, Inc., 850 F.Supp. 232, 245 (S.D.N.Y.1994) (quoting Universal City Studios, Inc. v. Nintendo Co., 746 F.2d 112, 118 (2d Cir.1984)). However, survey evidence is not required to show actual confusion. The Sports Authority, Inc. v. Prime Hospitality Corp., 89 F.3d 955, 964 (2d Cir.1996).

The evidentiary value of a consumer survey's results depends upon the underlying objectivity of the survey itself, which is determined by reference to, inter alia: whether the proper universe was examined and the representative sample was drawn from that universe; whether the survey's methodology and execution were in accordance with generally accepted standards of objective procedure and statistics in the field of such surveys; whether the questions were leading or suggestive; whether the data gathered was accurately reported; and whether persons conducting the survey were recognized experts. See Universal City Studios v. Nintendo Co., Ltd., 746 F.2d 112, 118 (2d Cir.1984); SmithKline Beecham Consumer Healthcare v. Johnson & Johnson-Merck, 2001 WL 588846 at *11 (S.D.N.Y.2001).

Plaintiff's survey statistics rely on numerous leading questions that suggested their own answers,[54] and that are therefore entitled to little weight in assessing consumer confusion. Universal City Studios, Inc. v. Nintendo Co., Ltd., 746 F.2d 112 (2d Cir.1984) (Responses to survey question [500] that read, "To the best of your knowledge, was the Donkey Kong game made with the approval or under the authority of the people who produce the King Kong movies?" were not probative of confusion, because "[a] survey question which begs its answer cannot be a true indicator of the likelihood of consumer confusion.").

Even if these questions are disregarded, the survey is burdened by other flaws. To have substantial probative value, Plaintiff's survey must examine the impression of a junior mark on a potential consumer. See Conopco v. Cosmair, Inc., 49 F.Supp.2d 242, 253 (S.D.N.Y.1999) (citing Bristol-Myers Squibb Co. v. McNeil-P.P.C., Inc., 973 F.2d 1033, 1042 (2d Cir.1992)). "Typically, trademark infringement surveys use stimuli, such as pictures, advertisements or clothing, that directly expose potential consumers to the products or the marks in question." Trouble v. Wet Seal, Inc., 179 F.Supp.2d 291, 308 (S.D.N.Y.2001). Plaintiff's expert, Mr. Neal, testified that "a specific trademark was not researched" in his survey, (Tr. at 249), and that in the survey he did not show respondents an example of a SaveNow pop-up advertisement prior to drafting the survey. (Tr. at 264.) Mr. Neal's survey also did not ask whether survey respondents had ever seen a SaveNow pop-up ad, (Tr. at 265.), did not attempt to distinguish between SaveNow pop-up ads and other pop-up ads, (Tr. at 266-67), and did not determine whether differences between SaveNow ads and other pop-up ads might have affected users' perceptions of the advertisements provided by SaveNow. (Tr. at 268-69.)

Mr. Neal denied that he was conducting a trademark infringement survey; even so, the survey failed to use any stimulus that would inform consumers as to the competing products or marks in question. Mr. Neal also testified that although he had not provided survey respondents with an example of a SaveNow pop-up advertisement, it was "very reasonable" to assume that SaveNow users would have seen SaveNow pop-up ads. (Tr. at 272.) But this testimony is insufficient to support the leap Plaintiff requires of this Court. First, it does not necessarily follow that all survey respondents who had the SaveNow software on their computers saw SaveNow advertisements. (Tr. at 303.) Second, even if survey respondents who had SaveNow on their computers had seen SaveNow ads, it does not necessarily follow that those respondents were thinking of the SaveNow ads they had seen when they answered the survey questions from recall. (Tr. at 303.) Finally, since survey respondents answered questions about pop-up advertisements generally, it is just as "reasonable" to assume that they were thinking about pop-up advertisements from other sources when they answered the survey. Accordingly, Mr. Neal's survey, as designed and carried out, is not dispositive of whether pop-up advertisements generated by the SaveNow software has caused actual confusion among SaveNow users, and is not evidence of actual confusion.

However, Mr. Neal's survey is at least suggestive of the likelihood of initial interest confusion. The survey results indicate that 68% of 490 surveyed SaveNow users did not know that they had the SaveNow software on their computers, that 76% of those who knew the SaveNow software was on their computers were unaware of what the SaveNow software does, that 59% of SaveNow users believed that "pop-up advertisements are placed on the website on which they appear by the owners of that website," and that 52% of all users believed "pop-up advertisements have been pre-screened and approved by the website on which they appear." (Neal Aff. ¶ 7.) The fact that a significant number of SaveNow users may believe that pop-up advertisements are associated with the [501] owner of the website on which it appears is relevant to the likelihood of initial interest confusion, since this means a consumer is likely to associate a Vision Direct pop-up advertisement generated by the SaveNow program with the 1800-Contacts websites on which it appeared.

It seems likely that a SaveNow user, thinking the Vision Direct pop-up advertisement generated by SaveNow was part of the 1-800 Contacts website, might be lured into clicking on the Vision Direct SaveNow pop-up advertisement, which would result in the user's main browser window shifting to Vision Direct's website, making likely that the consumer's attention and interest would shift to Vision Direct's website, and that ultimately the consumer would purchase products from Vision Direct, instead of from 1-800 Contacts. Although the survey does not show that a SaveNow user who receives a Vision Direct pop-up advertisement is likely to click on it, nor that a consumer who is diverted from the 1-800 Contacts website to the Vision Direct website is likely to purchase products from the Vision Direct website, this only reduces the weight of the survey evidence in establishing a risk of initial interest confusion. Lois Sportswear, U.S.A., Inc. v. Levi Strauss & Co., 799 F.2d 867 (2d Cir.1986) ("While the complete absence of actual confusion evidence after a significant period of competition may weigh in a defendant's favor, such an inference is unjustified in the instant case in view of the survey evidence, even with its methodological defects. While these defects go to the weight of the survey, it is still somewhat probative of actual confusion in the post-sale context.") Nonetheless, the survey is supportive of the likelihood of initial interest confusion.

In view of the foregoing, the Court finds that the evidence does not support a finding of actual source confusion; however, in view of the survey's weak probative value in establishing the likelihood of initial interest confusion, this factor weighs in favor of neither Defendant nor Plaintiff.

Of course, since actual confusion is only one of the eight factors considered under Polaroid, that Plaintiff has not presented evidence of actual source confusion does not require a finding of no likelihood of confusion. The Mobil Oil court upheld the lower court where the district judge

found a likelihood of confusion not in the fact that a third party would do business with [defendant] believing it related to [plaintiff], but rather in the likelihood that [defendant] would gain crucial credibility during the initial phases of a deal. For example, an oil trader might listen to a cold phone call from [defendant] — an admittedly oft used procedure in the oil trading business — when otherwise he might not, because of the possibility that [defendant] is related to [plaintiff].

818 F.2d at 259.

Thus, while 1-800 Contacts' survey evidence is methodologically insufficient to show that a third party would do business with Vision Direct believing Vision Direct's advertisements (placed by WhenU's software) are related to 1-800 Contacts, this is not determinative of whether Plaintiff has established a likelihood of confusion generally.

f. Bad faith of the Defendant in using the mark

In analyzing the "bad faith" factor, the question is whether Defendants used Plaintiff's mark with the "intention of capitalizing on plaintiff's reputation and goodwill and any confusion between his and the senior user's product.'" Lang v. Retirement Living Publ'g Co., 949 F.2d 576, 583 (2d Cir.1991) (quoting Edison Brothers Stores, Inc. v. Cosmair, Inc., 651 [502] F.Supp. 1547, 1560 (S.D.N.Y.1987)). It is apparent that Defendants here did not "innocently select" Plaintiff's 1-800 CONTACTS mark for inclusion in its proprietary directory of terms. Instead, WhenU.com's president and CEO testified and affirmed in a sworn affidavit that the 1-800 CONTACTS trademark was included in the WhenU.com proprietary directory. (Tr. at 134.)

Actual or constructive knowledge of a trademark owner's exclusive right to use a registered mark may signal bad faith. Mobil Oil at 259. Here, Defendant WhenU.com has knowingly included Plaintiff's mark in the SaveNow proprietary software directory, to increase the competitive advantage of Defendant Vision Direct. Such knowing use of Plaintiff's mark supports a finding of bad faith. Accordingly, this factor tips in favor of Plaintiff.

g. Quality of the Defendant's services

The quality of Defendant's product may be relevant because:

(1) an inferior product may cause injury to the plaintiff trademark owner because people may think that the senior and junior products came from the same source; or (2) products of equal quality may tend to create confusion as to source because of this very similarity.

Hormel Foods Corp. v. Jim Henson Prods., 73 F.3d 497, 505 (2d Cir.1996).

Plaintiff notes that "Defendants' services may or may not have the same quality as Plaintiff's services," but argues that the fact that Defendant's services are of comparable quality may confuse customers further, "precisely because the services are so similar." (Pl. Oct. 9, 2002 at 22.) However, here there is no evidence regarding the quality of Defendant's products. Without evidence, this factor could cut in favor of either Defendants or Plaintiff, Tommy Hilfiger Licensing, Inc. v. Nature Labs, LLC, 221 F.Supp.2d 410, 420 (S.D.N.Y.2002), and accordingly the Court finds it to be of assistance to neither Plaintiff nor Defendants.

h. Sophistication of the Consumers

Plaintiff argues that the level of care and attention paid by consumers on the Internet is diminished, and that therefore this factor cuts in Plaintiff's favor, as the likelihood of confusion will be high. (Pl. Oct. 9, 2002 at 23.) (citing Something Old, Something New, Inc. v. QVC, Inc., 53 U.S.P.Q.2d 1715, 1724 (S.D.N.Y.1999)). In Something Old, Something New, the court considered the sophistication of consumers purchasing goods from a cable television and website home shopping network and found that "[a]rguably, home shoppers are more subject to impulse buying than store shoppers; the product can be easily glorified and the consequence of the purchase can be masked." Id. By contrast, here there are no passive couch-potato consumers. Internet shoppers have a specific product in mind when they go online and have the ability to navigate the Internet to get what they want. Moreover, in the mixed publishing/retailing context of the Internet, (Tr. at 88-90), only a few clicks of a mouse by the consumer separates a pop-up advertisement from an actual purchase by that consumer. Thus, consumers who have typed Plaintiff's < 1800Contacts.com> URL into the browser bar are clearly searching for contact lens products, and expect to be able to complete a transaction with Plaintiff in a short span of time, with little effort or transaction costs.

However, whether or not consumers of replacement contact lenses on the Internet are "sophisticated" will not change the harm that flows from initial interest confusion, since that harm arises when consumers' interest is diverted from Plaintiff's products by association of Plaintiff's trademark with Defendants' products. Since [503] the harm from initial interest confusion does not depend on actual confusion, the sophistication of consumers does not mitigate the likelihood of initial interest confusion. Mobil Oil Corp. v. Pegasus Petroleum Corp., 818 F.2d 254, 260 (2d Cir.1987) (upholding a finding of trademark infringement where defendant's use of plaintiff's mark made probable "that potential purchasers would be misled into an initial interest" in defendant competitor's product, despite the sophistication of the consumers); Lois Sportswear, U.S.A., Inc. v. Levi Strauss & Co., 799 F.2d 867, 875 (2d Cir.1986) (sophistication of the buyers of expensive designer blue jeans contributed to, rather than prevented, initial interest confusion caused by infringer's use of trademark stitching patterns substantially similar to mark owner's, since sophisticated jeans consumers would be more likely to assume some sort of association between the mark-owner and the infringer); Grotrian, Helfferich, Schulz, Th. Steinweg Nachf v. Steinway and Sons, 523 F.2d 1331, 1342 (2d Cir.1975); New York State Soc. of Certified Public Accountants v. Eric Louis Associates, Inc., 79 F.Supp.2d 331, 341-42 (S.D.N.Y.1999) (sophistication of consumers does not mitigate initial interest confusion, since sophisticated consumers are as likely to be initially confused as unsophisticated consumers); Kompan A.S. v. Park Structures, Inc., 890 F.Supp. 1167 (N.D.N.Y.1995) (holding that the sophistication of purchasers of expensive playground equipment does not prevent initial confusion caused by defendants copying of plaintiff's trade dress).

The fact that Defendants' pop-up advertisement for competing Internet contact lenses retailers appears shortly after a consumer types into the browser bar Plaintiff's trademarked name and accesses Plaintiff's homepage increases the likelihood that a consumer might assume Defendants' pop-up advertisements are endorsed or licensed by Plaintiff, since the user will first see the 1-800 Contacts website, with logos and graphics, and then will see the pop-up advertisement. Planned Parenthood Fed'n. of Amer., Inc. v. Bucci, 1997 WL 133313, *8 (S.D.N.Y.1997) (plaintiff's mark appeared during a short delay while trademark infringer's homepage loaded, increasing the likelihood that Internet users would believe they had accessed plaintiff's website). Even if a consumer who clicked on Defendants' pop-up advertisements and accessed Defendant Vision Direct's website eventually realized — prior to purchasing anything — that Vision Direct's website was not related to Plaintiff, the consumer might then proceed to purchase replacement contacts on Vision Direct's website, instead of taking the steps necessary to return to Plaintiff's website. Bihari v. Gross 119 F.Supp.2d 309, 319 (S.D.N.Y.2000); BigStar Entm't, Inc. v. Next Big Star, 105 F.Supp.2d 185, 207 (S.D.N.Y.2000). Accordingly, this factor weighs in favor of the Plaintiff.

i. Other Factors: Branding by WhenU.com

Defendant WhenU.com argues that it has taken steps to ensure effectively there will be no confusion among consumers as to the source of the pop-up advertisements. Advertisement windows generated by Defendant WhenU's SaveNow software are "branded" — a green "$" mark and the text "SaveNow!" are affixed to the top of the window. (Naider Aff. ¶ 42; Memo in Opposition at 11.) On the upper right-hand corner of the SaveNow ad windows, next to the "X" symbol that typically closes windows, is a "?" symbol that, when clicked, opens a new window containing an explanation of the SaveNow software and a direct link to a page with more detailed information for removing or "uninstalling" the software. (Memo in Opposition at 11.) At the bottom right of the advertisement window is text stating: "A WhenU offer — click ? for info." (Memo in Opposition at [504] 11[55] (citing Upjohn Co. v. AHPC, 598 F.Supp. 550, 561-62 (S.D.N.Y.1984))).

WhenU.com argues that its disclaimers are "the preferred way of alleviating consumer confusion." (WhenU.com Memorandum at 23). WhenU.com argues further that, "unlike the use of trademarks in metatags to "trick" consumers into believing that a website is in fact the website that they intended to visit, where ... consumers see both the website they accessed as well as WhenU's clearly labelled ad, they are not likely to be confused." (Memorandum in Opposition at 24, n. 14 (citing Bihari v. Gross, 119 F.Supp.2d 309, 321-322 (S.D.N.Y.2000))).

While the Second Circuit has "found the use of disclaimers to be an adequate remedy when they are sufficient to avoid substantially the risk of consumer confusion," it is also important to note that "each case must be judged by considering the circumstances of the relevant business and its consumers." See Home Box Office, Inc. v. Showtime/The Movie Channel Inc., 832 F.2d 1311, 1315 (2d Cir.1987).

Here, consumer confusion caused by the pop-up advertisements can hardly be alleviated by WhenU's use of disclaimers with terms that are buried in other web pages, requiring viewers to scroll down or click on a link. Moreover, Defendant "has failed to come forth with any evidence whatsoever to support its contention that the disclaimer would reduce consumer confusion." Charles of the Ritz Group Ltd. v. Quality King Distribs., Inc., 832 F.2d 1317, 1324 (2d Cir.1987). The burden imposed upon Defendants to "come forward with evidence sufficient to demonstrate that [its disclaimers] would significantly reduce the likelihood of consumer confusion" is a heavy one. Home Box Office, Inc. v. Showtime/The Movie Channel Inc., 832 F.2d 1311 (2d Cir.1987).

Even if Defendants had offered evidence of the effect of its branding and disclaimers, such evidence would do little to counter Plaintiff's showing of the likelihood of initial interest confusion. OBH, Inc. v. Spotlight Magazine Inc., 86 F.Supp.2d 176, 190 (W.D.N.Y.2000) (rejecting disclaimer defense because defendant's disclaimer could not remedy initial interest confusion caused by defendant's use of plaintiff's mark on its website); NYS Soc'y of CPAs v. Eric Louis Associates, 79 F.Supp.2d 331 (S.D.N.Y.1999) (same); Planned Parenthood Fed'n of Am., Inc. v. Bucci, 1997 WL 133313 (S.D.N.Y.1997) (same); cf. Lois Sportswear, U.S.A., Inc. v. Levi Strauss & Co., 799 F.2d 867 (2d Cir.1986) (finding a likelihood of confusion in the post-sale context, and finding that "[a]ppellants' labeling in no way dispels the likelihood that consumers will conclude that appellants' jeans are somehow connected to appellee by virtue of the nearly identical stitching patterns").

Accordingly, Defendant WhenU's use of the "Save!" brand, the "A WhenU ad" brand, and the license agreement on installation do not alleviate Plaintiff's showing of a likelihood of confusion.

In sum, as discussed above, the Polaroid factors weigh heavily in favor of the Plaintiff's showing a likelihood of both source confusion and initial interest confusion. Having established a likelihood of confusion, Plaintiff has established both a likelihood [505] of success on the merits and irreparable harm on its trademark infringement claim. Hasbro, Inc. v. Lanard Toys. Ltd., 858 F.2d 70, 73 (2d Cir.1988).

C. Cybersquatting

The Second Circuit has described cybersquatting as follows:

Cybersquatting involves the registration as domain names of well-known trademarks by non-trademark holders who then try to sell the names back to the trademark owners. Since domain name registrars do not check to see whether a domain name request is related to existing trademarks, it has been simple and inexpensive for any person to register as domain names the marks of established companies. This prevents use of the domain name by the mark owners, who not infrequently have been willing to pay `ransom' in order to get `their names' back.

Sporty's Farm L.L.C. v. Sportsman's Market, Inc., 202 F.3d 489, 493 (2d Cir.2000)

In passing the Anticybersquatting Consumer Protection Act ("ACPA"), Pub.L. No. 106-113 (1999), Congress provided a federal remedy for cybersquatting. 15 U.S.C. § 1125(d)(1)(A) provides

A person shall be liable in a civil action by the owner of a mark, including a personal name which is protected as a mark under this section, if, without regard to the goods or services of the parties, that person —

(i) has a bad faith intent to profit from that mark, including a personal name which is protected as a mark under this section; and

(ii) registers, traffics in, or uses a domain name that

(I) in the case of a mark that is distinctive at the time of registration of the domain name, is identical or confusingly similar to that mark;

(II) in the case of a famous mark that is famous at the time of the registration of the domain name, is identical or confusingly similar to or dilutive of that mark; ...

15 U.S.C. § 1125(d)(1)(A).

"[A] court may order the forfeiture or cancellation of the domain name or the transfer of the domain name to the owner of the mark." 15 U.S.C. § 1125(d)(1)(C).

Plaintiff 1-800 Contacts has continuously used its marks in commerce since its inception in 1995. (Mathison Aff. ¶ 6.) Defendant Vision Direct registered[56] and maintains its registration in the domain name www.www1800Contacts.com. (Barrier Aff. Ex. A.) Plaintiff argues that this domain name is "almost identical" to Plaintiff's www.1-800Contacts.com website domain name, and that Defendant Vision Direct registered and maintains the www.www1800Contacts.com domain name with the bad faith intent to divert consumers from the 1-800 Contacts website to Defendant Vision Direct's website, and to profit from the use of Plaintiff's mark. (Pl. 10/9/02 at 32.) Vision Direct has not addressed these arguments.

The Court has already concluded that the 1-800 Contacts mark is suggestive, and also distinctive. See Discussion, supra.

The domain name registered by Defendant Vision Direct, www.www1800Contacts.com, differs from Plaintiff's 1-800 Contacts mark in the addition of the web prefix "www" and the omission of spaces. These distinctions are not significant.[57]

The statute provides that

[506] In determining whether a person has a bad faith intent described under subparagraph (a), a court may consider factors such as, but not limited to

(I) the trademark or other intellectual property rights of the person, if any, in the domain name;

(II) the extent to which the domain name consists of the legal name of the person or a name that is otherwise commonly used to identify that person;

(III) the person's prior use, if any, of the domain name in connection with the bona fide offering of any goods or services;

(IV) the person's bona fide noncommercial or fair use of the mark in a site accessible under the domain name;

(V) the person's intent to divert consumers from the mark owner's online location to a site accessible under the domain name that could harm the goodwill represented by the mark, either for commercial gain or with the intent to tarnish or disparage the mark, by creating a likelihood of confusion as to the source, sponsorship, affiliation, or endorsement of the site;

* * * *

(IX) the extent to which the mark incorporated in the person's domain name registration is or is not distinctive and famous within the meaning of subsection (c)(1) of this section.

15 U.S.C. § 1125(d)(1)(B)(i).

Relying on these factors, it is apparent that Vision Direct has acted with bad faith. Vision Direct has no trademark rights in the domain name, is not identified by the domain name, has not demonstrated any prior bona fide use of the domain name or any site accessible using the domain name — accordingly, these factors weigh in favor of the Plaintiff. 15 U.S.C. § 1125(d)(1)(B)(i)(I-IV). Defendant Vision Direct and Plaintiff are competitors, offering virtually identical services over the Internet — this alone tends to show that Vision Direct has registered the www.www1800Contacts.com domain name with the "intent to divert consumers from the mark owner's online location to a site accessible under the domain name that could harm the goodwill represented by the mark, either for commercial gain or with the intent to tarnish or disparage the mark, by creating a likelihood of confusion as to the source, sponsorship, affiliation, or endorsement of the site." 15 U.S.C. § 1125(d)(1)(B)(i)(V).

Accordingly, the Court finds sufficient evidence to establish the bad faith of Defendant Vision Direct in registering and maintaining the www.www1800Contacts.com domain name. Based on the foregoing, Plaintiff has established a likelihood of success on its Cybersquatting claims.

Some district courts have found the trademark infringment principle applies in cybersquatting actions under the ACPA — that irreparable harm may be caused by the improper registration, trafficking or use of a confusingly similar domain name. E.g. Advance Magazine Publishers Inc. v. Vogue Int'l, 123 F.Supp.2d 790, 801 (D.N.J.2000) (citing Shields v. Zuccarini, 89 F.Supp.2d 634, 641 (E.D.Pa.2000)). However, other courts have not applied this principle, and have required a showing of irreparable harm to the plaintiff. E.g., BroadBridge Media, L.L.C. v. Hypercd.com, 106 F.Supp.2d 505, 509-10 (S.D.N.Y.2000). The Second Circuit has not weighed in on the distinction between irreparable harm for purposes of trademark infringement claims and cybersquatting claims. This Court joins the courts that find irreparable harm may be presumed on a motion for a preliminary injunction in a cybersquatting case where a [507] plaintiff has shown a likelihood of success on the merits.[58] Accordingly, issuance of a preliminary injunction against Defendant Vision Direct's use of the domain name www.www1800Contacts.com is appropriate.

D. Mootness

Defendant Vision Direct argues it should not be preliminarily enjoined in this case because any grounds for relief that Plaintiff may have had prior to the filing of the lawsuit have been mooted.[59] (Vision Direct Jan. 31, 2003 at 3.) Vision Direct notes that it voluntarily instructed its co-defendant, WhenU.com, to cease placing "pop-up" ads on Plaintiff's website three weeks before this action was filed,[60] and claims it has no intention of resuming use of the offending pop-up advertising. (Id. at 2-3; Mummery Dec. ¶ 7, 8.) Vision Direct also notes that it sued Coastal Contacts for substantially the same conduct in 02-Civ-9788. (Vision Direct Jan. 31, 2003 at 3.)

Although Vision Direct may have ceased its use of the complained-of pop-up advertisements, the Court nonetheless has authority to issue a preliminary injunction. See Blisscraft of Hollywood v. United Plastics Co., 294 F.2d 694, 701 (2d Cir.1961) (Injunction issued against future infringement although the defendant discontinued the use of offending labels, since the defendant continued to dispute the validity of the trademark); United States v. W.T. Grant Co., 345 U.S. 629, 633, 73 S.Ct. 894, 97 L.Ed. 1303 (1953) ("[t]he court's power to grant injunctive relief survives discontinuance of the illegal conduct" since the "purpose of an injunction is to prevent future conduct"). Moreover, since here there is little to support a conclusion that use by Defendant Vision Direct of pop-up advertisements will not reoccur, the Court rejects Defendant's claim that a preliminary injunction should not issue merely because Defendant has ceased the offending conduct. E.g., United Farm Workers v. Sloan's Supermarkets, Inc., 352 F.Supp. 1025, 1028-29 (S.D.N.Y.1972); Consumers Union of United States, Inc. v. Theodore Hamm Brewing Co., 314 F.Supp. 697, 701 (D.Conn.1970); Consumers Union of United States, Inc. v. Admiral Corp., 186 F.Supp. 800, 801 (S.D.N.Y.1960).

Vision Direct's claim that "no likelihood exists that Vision Direct will resume causing pop-up advertisements to appear on 1-800's web pages" is supported by nothing more than the affidavit of Ian Mummery stating that "Vision Direct has no intention of again participating in pop-up advertising." (Mummery Dec. at ¶ 8.) This avowed lack of "intention" to participate is a far cry from a guarantee by Vision Direct that it will not participate in pop-up advertising in the future. Here, Vision Direct has not convinced the Court that it has voluntarily done "everything within its power" to ensure that "there is not even a slight danger that it would now turn around and embark upon another course of deceptive conduct." Twentieth Century [508] Fox v. Suarez Corp., 1998 WL 126065, *3-5 (S.D.N.Y.1998)(denying preliminary injunction where defendant voluntarily changed website and attempted to cancel 42 advertisements, and "[p]laintiff ... specifically conceded that the defendant [did] everything within its power to cancel all advertisements").

Vision Direct argues that the balance of the hardships weighs in favor of denying the injunction, because of the harm to its reputation that will result from the imposition of a preliminary injunction against it. In support of its argument, Vision Direct cites United Farm Workers v. Sloan's Supermarkets, Inc., 352 F.Supp. at 1028-29. In Sloan's, the court acknowledged that "a preliminary injunction is not precluded merely because the action complained of has ceased, or because it was inadvertent, or because the defendant has sworn it will not happen again, or because the defendant might suffer some harm from the injunction," but held that the balance of harms tipped in favor of denying a preliminary injunction where "[t]he mere announcement to the public that [defendant] had been preliminarily enjoined ... would convey an incorrect impression of the defendant's position with regard to the plaintiff union; would misrepresent its good faith efforts; and would likely do considerable injury to its general business reputation which is not presently justified by the record".

However, here Vision Direct has offered only statements by Ian Mummery, that

[a] preliminary injunction against Vision Direct would undoubtedly damage it, possibly irreparably. Vision Direct's reputation is unblemished and must remain so if Vision Direct is to continue its spectacular success. Customers will undoubtedly be hesitent [sic] to purchase contact lenses from a company that has been enjoined.

(Mummery Dec. ¶ 9.)

Mr. Mummery provides no basis for his conclusions about what "undoubtedly" might happen. Notwithstanding his speculation, it is far from clear that enjoining Defendant Vision Direct from placing pop-up advertisements on Plaintiff's website will have any effect at all on sales by Vision Direct. Accordingly, these statements are insufficient to sustain Vision Direct's burden of showing that a preliminary injunction will harm its good will and reputation.

E. Other Claims

Plaintiff advances several other related theories under the Lanham Act and state law, in support of its Motion for Preliminary Injunction. As none of those theories, if established, would entitle plaintiff to greater relief" than that appropriate under its infringement and cybersquatting claims, "there is no need to consider them." E.G.L. Gem Lab Ltd. v. Gem Quality Institute, Inc., 90 F.Supp.2d 277, 298 (S.D.N.Y.2000).

F. Remedies

Defendant uses Plaintiff's mark within the meaning of the Lanham Act by causing pop-up advertisements to appear when SaveNow users have specifically attempted to find or access Plaintiff's website, by either typing Plaintiff's web address into the browser bar or by typing the Plaintiff's mark into a search engine. Defendant also uses Plaintiff's mark by including Plaintiff's mark and confusingly similar terms as elements in the proprietary SaveNow directory. These uses are likely to cause source confusion and initial interest confusion.

As Professor Deighton noted, the distinction between marketing and publishing [509] may be diminishing in the context of the unique environment of the Internet. (Tr. at 88-90.) On the other hand, technological advances should not trample on the traditionally-protected rights established by the trademark infringement laws. On the Internet, online shoppers have a myriad of competing retailers literally at their fingertips, are easily able to research preferences, and with very little time and effort are able to enact their preferences with purchases. In this context, the good will and reputation that Plaintiff and other online retailers have established is of extreme importance. Plaintiff has spent considerable sums to establish and maintain its marks' notoriety with online consumers, and is entitled to protect this investment from conduct that infringes those marks. An online shopper who has knowledge of Plaintiff's mark and an interest sufficient to choose to visit or find Plaintiff's website is a potential buyer that Plaintiff is entitled to protect from confusion.

Enjoining the Defendants from triggering pop-up advertisements when SaveNow users type in Plaintiff's website address and/or type Plaintiff's mark into a search engine will prevent Defendants from capitalizing on the goodwill and reputation that Plaintiff has earned through its own investment. Such an injunction will eliminate the likelihood that a SaveNow user will be confused as to the source of the pop-up advertisements that appear when the 1-800 Contacts website is accessed; it will also eliminate the likelihood that a SaveNow user would be lured from Plaintiff's website to Defendant Vision Direct's website in the initial phases of the user's attempts to shop for contact lens products on Plaintiff's website.

Of course, an injunction should not impede traffic in the more general free-for-all of the Internet superhighway, where general information is often sought. For example, a SaveNow user who enters a generic term such as "contact lenses" into a search engine is clearly looking for general information, and has not exhibited any preference for 1-800 Contacts. Plaintiff's website, as well as Defendant Vision Direct's website, may appear on the results page of the search engine along with other contact lens retailers and manufacturers. In this environment, all contact lens retailers including Plaintiff and Defendant Vision Direct, are "on the same page," and the unique interplay of publishing and marketing provided by the technology of the Internet should be given free reign.

Accordingly, it is appropriate that Defendants be preliminarily enjoined from using Plaintiff's mark or confusingly similar terms as an element in the SaveNow proprietary directory. It is also appropriate that Defendants be preliminarily enjoined from causing pop-up advertisements to appear when a computer user has made a specific choice to access or find Plaintiff's website by typing Plaintiff's mark into the URL bar of a web browser or into an Internet search engine.

Since it is likely that Plaintiff will succeed in its claims that Defendant Vision Direct registered and maintained a registration of the domain name www.www1800Contacts.com, that the domain name is confusingly similar to Plaintiff's 1800Contacts mark, and that the registration and maintenance of registration was in bad faith, it is also appropriate that Defendant Vision Direct be and hereby is ORDERED to cancel its registration of the domain name www.www1800Contacts.com.

III. CONCLUSION

For the foregoing reasons, 1-800 Contacts' Motion for a preliminary injunction is GRANTED in part and in DENIED in part.

[510] Defendants are preliminarily enjoined from: 1) including the 1-800 Contacts mark, and confusingly similar terms, as elements in the SaveNow software directory, and 2) displaying Plaintiff's mark "in the ... advertising of" Defendant Vision Direct's services, by causing Defendant Vision Direct's pop-up advertisements to appear when a computer user has made a specific choice to access or find Plaintiff's website by typing Plaintiff's mark into the URL bar of a web browser or into an Internet search engine. Within 30 days of the date of this Order, Defendants SHALL effect this injunction.

Plaintiff's Motion for preliminary injunctive relief on its cybersquatting claims is GRANTED. Defendant Vision Direct shall within 30 days of the date of this Order cancel its registration of the www.www1800Contacts.com domain name.

Plaintiff's Motion for preliminary injunctive relief on its copyright claims is DENIED.

The parties shall appear before the Court for a case conference on January 16, 2004 at 11:00 AM.

SO ORDERED.

[1] Plaintiff's claims included: 1.) Trademark infringement, in violation of the Section 32(1) of the Lanham Act, 15 U.S.C. § 1114; 2.) Unfair Competition, in violation of Section 43(a) of the Lanham Act, 15 U.S.C. § 1125(a); 3.) False designation of origin, in violation of Section 43(a) of the Lanham Act, 15 U.S.C. § 1125(a); 4.) Trademark dilution, in violation of Section 43(c) of the Lanham Act, 15 U.S.C. § 1125(c); 5.) Cybersquatting, in violation of Section 43(c) of the Lanham Act, 15 U.S.C. § 1125(d); 6.) Copyright infringement, in violation of the Federal Copyright Act, 17 U.S.C. §§ 101, et seq.; 7.) Contributory Copyright Infringement, in violation of the Federal Copyright Act, 17 U.S.C. §§ 101, et seq.; 8.) Dilution of trademark and/or injury to business reputation, in violation of N.Y.G.B.L. § 360-1; 9.) Common law unfair competition; and 10.) Tortious Interference with Prospective Economic Advantage.

[2] With its Preliminary Injunction Motion, Plaintiff filed a Memorandum of Law ("Pl. October 9, 2002"), supported by the Declaration of Jason Mathison ("Mathison Dec.") and the Affidavit of Amy Barrier ("Barrier Aff.").

[3] In a follow-up call on October 24, 2002, the parties notified the Court that they had formalized a stipulation, under which the parties ceased pop-up advertising activities on each others' websites, to "continue in effect through a hearing by this Court on Plaintiff's Motion for a Preliminary Injunction." (October 29, 2002 Stipulation and Order at 4). The Court signed the Stipulation on October 29, 2002 and reset the Preliminary Injunction hearing date to February 24, 2003.

[4] Defendant WhenU.com's Opposition was supported by the Affidavit of Avi Naider ("Naider Aff."), the Declaration of Dr. Jacob Jacoby ("Jacoby Dec."), and the Declaration of Dr. John A. Deighton ("Deighton Dec.")

[5] WhenU.com's Opposition was supported by the Declaration of Ian Mummery ("Mummery Dec.").

[6] References to the Preliminary Injunction hearing transcript are denoted by "Tr."

[7] Appended to Plaintiff's Complaint is Certificate of Registration No. VA-1-032-662, which provides, inter alia, that the "1800 Contacts Web site" was completed in the year 2000, that the work was first published on March 1, 2000, and that the effective date of the copyright registration was October, 2, 2000. (Compl., Ex. D.)

[8] Mr. Mathison's Declaration states that "Approximately 221,864 people visited the website in the past month" — his declaration was dated October 4, 2002.

[9] See fn. 13, infra.

[10] Examples of ISPs include Earthlink, Verizon, NetZero, America Online.

[11] Other examples of browser programs include Netscape Navigator, Opera, and Mozilla; in addition, many residential ISPs like Earthlink and America Online provide their own proprietary browsers.

[12] With appropriate software, any computer that is connected to the Internet can act as a server, by providing access, via the Internet, to other computer users who are connected to the Internet. Thus, there are many, many servers acting as "hosts" for information that is found on the Internet.

[13] The Second Circuit has explained that

Web pages are designated by an address called a domain name. A domain name consists of two parts: a top level domain and a secondary level domain. The top level domain is the domain name's suffix. Currently, the Internet is divided primarily into six top level domains: (1) .edu for educational institutions; (2) .org for non-governmental and non-commercial organizations; (3) .gov for governmental entities; (4) .net for networks; (5) .com for commercial users, and (6) a nation-specific domain, which is .us in the United States. The secondary level domain is the remainder of the address, and can consist of combinations of letters, numbers, and some typographical symbols. To take a simple example, in the domain name "cnn.com," cnn ("Cable News Network") represents the secondary level domain and .com represents the top level domain. Each domain name is unique.

Sporty's Farm L.L.C. v. Sportsman's Market, Inc., 202 F.3d 489, 492-93 (2d Cir.2000).

In common usage, an "URL" (Uniform Resource Locator) is the location for a specific webpage, such that if the URL were entered into a browser, the webpage would appear. By contrast, a "domain name" is often used to refer to the URL for the "front" or "home" page of a website. Thus, the domain name for the 1-800 Contacts is www.1800Contacts.com, while the URL for a specific webpage within the 1-800 Contacts website might be www.1800Contacts.com/xxxxx.xxx, with the "x's" providing specific locations within the 1-800 Contacts domain. The URL of a webpage may be entered directly into a web browser to retrieve that webpage.

[14] Given that a single website contains text and information located on multiple servers, when a user's computer accesses a single website, the computer may be receiving information from several different servers. (Tr. at 140.) Avi Naider, CEO of WhenU analogized accessing a website to fishing:

The way a desktop computer actually operates is it communicates with multiple servers at the same time. So it's not a one-to-one thing. A desktop, even in the 1-800 Contacts web page, the text for the page might come from one server that might be owned by the 1-800 Contacts company, the images on the webpage might come from a commercial server somewhere that's set up to deliver images. Different elements on a desktop can come from lots of different places. Maybe the best way to describe a desktop is you've got lots of open fishing lines. Once you establish a connection into the Internet, you've sort of got your boat out into the ocean, and you can toss out lots of different lines to lots of different places and collect information from lots of different places.

(Tr. at 139.)

[15] Examples of search engines are www.Google.com, www.Yahoo.com and www.AskJeeves.com.

[16] The Second Circuit has defined the term "search engine" operationally:

A search engine will find all web pages on the Internet with a particular word or phrase. Given the current state of search engine technology, that search will often produce a list of hundreds of web sites through which the user must sort in order to find what he or she is looking for.

Sporty's Farm L.L.C. v. Sportsman's Market, Inc., 202 F.3d 489, 493 (2d Cir.2000)

[17] The directory is stored on the SaveNow user's computer as a part of the SaveNow application. (Naider Aff. ¶ 23.)

[18] "Pop-up" windows are windows containing notifications or advertisements that appear on the screen, usually without any triggering action by the computer user.

[19] E.g. if a user wants a free cartoon character screensaver, in order to get it the user has to accept also the other programs it is bundled with. The screensaver is the lure that hooks the user into downloading the bundled software.

[20] As demonstrated at the hearing, the first screen encountered by a user installing a typical software bundle is a welcome screen, the second screen contains a license agreement for a screensaver software program (not related to WhenU.com's software), the third screen contains an opportunity to join an email list for the screensaver program, and the fourth screen describes where on the computer the software will be installed. (Tr. at 68.)

[21] A "typical" SaveNow License Agreement states, in pertinent part:

SaveNow shows users relevant contextual information and offers as they surf the Web. There are a vast number of offers and services available to Internet users that SaveNow may display. In addition, WhenU.com negotiates exclusive offers to maximize value for users. The software's goal is to show users information about these offers and services — right at the moment when they need it. Offers and information are provided to users by showing a limited number of relevant ads in the form of interstitials ("pop-up ads") and other ad formats. These offers and ads are shown when users visit various sites across the Internet, based on URLs visited by the user and/or search terms typed into search engines and/or the HTML content of the page viewed by the user. SaveNow ads/offers are delivered independently from the site the user happens to be visiting when they see a SaveNow ad/offer and are not endorsed or affiliated with anyone other than WhenU.com.

(Naider Aff. ¶ 23, Ex. G.)

[22] The notice says:

This offer is brought to you by WhenU.com, through the SaveNow service. SaveNow alerts you to offers and services at the moment when they are most relevant to you. SaveNow does not collect any personal information or browsing history from its users. Your privacy is 100 percent protected. The offers shown to you by SaveNow are not affiliated with the site you are visiting. For more about SaveNow, click here or e-mail information at WhenU.com. At WhenU, we are committed to putting you in control of your Internet experience.

(Tr. at 58-59).

[23] In December 2002, subsequent to the filing of this lawsuit, WhenU.com replaced this text with a new disclaimer, stating: "This is a WhenU offer and is not sponsored or displayed by the websites you are visiting. More ..." If a user clicks on the "More," a new window displays the same statement that was generated when the user clicked on the "?" character. (Tr. at 58.) However, since "there is no guarantee that Defendants will not simply return to the same conduct if the case is dismissed without issuance of an injunction," the Court considers the disclaimers as they appeared at the time the action was filed. OBH, Inc. v. Spotlight Magazine, Inc., 86 F.Supp.2d 176, 186 n. 8 (W.D.N.Y.2000).

[24] In his "Description of Data Analyst Online Panel," Mr. Neal affirms that:

A sample of respondents was drawn from American Consumer OpinionTM Online, Decision Analyst, Inc.'s Internet panel of over 3,500,000 consumers. These respondents were screened, and qualified participants were invited to Decision Analyst's encrypted OpinionSurveyTM Internet server to complete the survey.

(Neal Aff., Ex. D.)

Mr. Neal notes that "[t]he maximum number of surveys completed per panel household is two surveys per month, although this maximum is rarely achieved. The average panel household participates in three or four studies per year." Id.

Mr. Neal also states that "Panels are recruited by a combination of online and offline methods (telephone, mail, banner advertising, print advertising, publicity). The recruiting is designed to make each panel as representative of its target population as possible. American Consumer OpinionTM Online is linked to over 1,000 other Internet sites to provide a steady stream of new panelists."

[25] Mr. Neal drew a "nationally representative stratified quota sample" from the internet panel, "balanced by geography and demographics such as age and income." (Neal Dec., Ex. D.)

[26] In response to Question 9, "Were you aware that, when viewing websites on the Internet, SaveNow software causes `Pop-Up' advertisements to be displayed on your computer which are not authorized by the website on which they apppear?", 75.74% of those respondents who had SaveNow on their computers responded "No." (Neal Dec., Ex. E.)

[27] In response to Question 4-1, "I believe that `Pop-Up' advertisements are placed on the website on which they appear by the owners of the website", 59.98% of those respondents who had SaveNow on their computers responded "Agree," while 61.11% who did not have SaveNow on their computers responded "Agree." (Neal Dec., Ex. E.)

[28] In response to Question 4-6, "I believe that `Pop-Up' advertisements have been pre-screened and approved by the website on which they appear", 52.04% of those respondents who had SaveNow on their computers responded "Agree," while 52.21% who did not have SaveNow on their computers responded "Agree." (Neal Dec., Ex. E.)

[29] In response to Question 5, "Prior to your participation in this survey, had you ever heard of a free software program offered by WhenU.com called SaveNow?", 51.02% of those respondents who had SaveNow on their computers responded "No." (Neal Dec., Ex. E.)

[30] In response to Question 6, "Prior to your participation in this survey, did you know that the SaveNow software from WhenU.com was installed on your computer?", 68.16% of those respondents who had SaveNow on their computers responded "No." (Neal Dec., Ex. E.)

[31] The "instant messaging" windows demonstrated were generated by an America Online program; however Mr. Naider testified that other instant messaging applications behaved similarly. (Tr. at 42.)

[32] Mr. Naider referred specifically to a video software, called "Realplayer," which he testified "every once in a while, something pops in front of my screen from them." (Tr. at 41.)

[33] Professor Deighton testified that "[c]reating a website is within the reach of a child." (Tr. at 87.)

[34] Mr. Mummery's declaration was attached to Vision Direct's opposition to Plaintiff's motion. However, although Mr. Mummery makes his declarations upon personal knowledge, (Mummery Dec. ¶ 1), he does not identify what position he holds at Vision Direct. Mr. Mummery was not called to testify at the Preliminary Injunction hearing.

[35] On December 11, 2002, Defendant Vision Direct filed a separate action, Vision Direct v. WhenU.Com and Coastal Contacts, Inc., 02-Civ-9788 (DAB), against WhenU.com, its co-defendant in this case, and against Coastal Contacts, a Canadian corporation that is not a party in this case. With the complaint in 02-Civ-9788, Vision Direct also filed an application for an ex parte Temporary Restraining Order. The Court held a conference call with counsel for all parties to both cases on December 16, 2002. Based on that call, on December 18, 2002 the Court denied Vision Direct's application for a Temporary Restraining Order, and denied the parties' requests for full discovery in this case until the disposition of the Preliminary Injunction motion.

[36] Citing Abdul Wali v. Coughlin, 754 F.2d 1015, 1025 (2d Cir.1985), Plaintiff argues that, to show a likelihood of success on the merits, a party moving for a preliminary injunction "need not show that success is an absolute certainty," but that instead a movant need only show that the probability of success is "better than 50%" despite the fact that "considerable room for doubt" may remain about the ultimate case outcome. (Memorandum in Support at 12). Plaintiff misstates the relevant standard, since the Second Circuit specifically noted in Abdul Wali that where, as here, a grant of preliminary injunctive relief would do more than merely maintain the status quo, the movant "must show a substantial likelihood of success on the merits, i.e., that their cause is considerably more likely to succeed than fail." 754 F.2d 1015, 1026 overruled on other grounds, 482 U.S. 342, 107 S.Ct. 2400, 96 L.Ed.2d 282 (1987).

[37] Plaintiff argues that, under New York Times Co. v. Tasini, 533 U.S. 483, 121 S.Ct. 2381, 150 L.Ed.2d 500 (2001), "this Court must view Plaintiff's website as would a PC user surfing the web in order to determine whether Defendant modified Plaintiff's copyrighted works." Plaintiff appears to read Tasini too broadly. (Pl. Feb. 28, 2003 at 7). In Tasini, the Supreme Court held that the privilege accorded a newspaper, as a collective work copyright owner under § 201(c) of the Copyright Act, to reproduce and distribute parts of a collective work did not shield the newspaper from liability for permitting electronic publishers to include the work of individual authors in electronic online Databases. Tasini, 533 U.S. at 500, 121 S.Ct. 2381. The Court explained that "[i]n determining whether the Articles have been reproduced and distributed `as part of' a `revision' of the collective works in issue, we focus on the Articles as presented to, and perceptible by, the user of the Databases." Tasini, 533 U.S. at 499-500, 121 S.Ct. 2381. Although the Tasini Court turned to the perceptions of the computer user to determine whether articles had been reproduced and distributed "as part of" a "revision" of collective works for purposes of § 201(c), Tasini does not require this Court to "view Plaintiff's website as would a PC user surfing the web in order to determine whether Defendant modified Plaintiff's copyrighted works" in preparing a derivative work in violation of 17 U.S.C. § 106(2).

[38] Memorandum in Support, at 28 (citing Matthew Bender & Co., Inc. v. West Publ'g Co., 158 F.3d 693 (2d Cir.1998)).

[39] Plaintiff cites Aymes v. Bonelli, 47 F.3d 23, 25 (2d Cir.1995) as support for this proposition. However, in Aymes the defendant conceded that it had altered the computer program at issue and thereby created a "derivative work." Aymes, 47 F.3d at 25.

[40] The lack of any "fixation" here explains why Plaintiff errs in its assertion that this case is analogous to National Bank of Commerce v. Shaklee Corp., 503 F.Supp. 533 (W.D.Tex.1980). While in this case any "derivative" work created when a computer user views Plaintiff's copyrighted website as modified by Defendants' pop-up advertisements is not fixed in any tangible medium of expression, the books published with unauthorized interspersed advertisements in National Bank of Commerce v. Shaklee Corp., were clearly "fixed" in print.

[41] Arrow Fastener Co. v. Stanley Works, 59 F.3d 384, 390 (2d Cir.1995) (internal citations omitted); Estee Lauder, Inc. v. The Gap, Inc., 108 F.3d 1503, 1508 (2d Cir.1997).

[42] On a telephone keypad, 1-800 HOLIDAY translates numerically as 1-800 469-4329.

[43] While this case was sub judice, Defendants called to the Court's attention two decisions denying a preliminary injunction, by finding that "use" did not occur. In Wells Fargo & Co. v. WhenU.com, 293 F.Supp.2d 734, 763 (E.D.Mich.2003), the court determined that inclusion in SaveNow's proprietary directory of the Plaintiff's trademark was not "use," based on its reading of Sixth Circuit case law. In U-Haul Intern., Inc. v. WhenU.com, Inc., 279 F.Supp.2d 723, 728 (E.D.Va.2003), the court made a similar ruling based on a factual finding that WhenU.com uses the marks for a "pure machine-linking function." This Court disagrees with, and is not bound by these findings.

[44] In Lois Sportswear, U.S.A., Inc. v. Levi Strauss & Co., 631 F.Supp. 735 (S.D.N.Y.1985), the plaintiff sought a declaration that the pattern of stitching on the back pockets of its jeans, which was virtually identical to the trademarked stitch pattern on the back pocket of the declaratory defendant's jeans — "two curved arches intercepting at midpoint" — did not infringe defendant's trademark. Id. at 737-39.

The district court held that, even if there were little likelihood of point-of-sale confusion among consumers, there was a "substantial likelihood of confusion among prospective purchasers viewing the marks in a post-sale context," and accordingly granted summary judgment for defendants. Id. at 747-48.

On appeal, the Second Circuit reaffirmed that harm to a trademark owner — resulting from the likelihood that misuse of a mark might attract potential consumers to the junior user's product "based on the reputation built up by [the trademark owner]" — was actionable under the Lanham Act, and that "the Lanham Act was designed to prevent a competitor from such a bootstrapping of a trademark owner's goodwill ..." Lois Sportswear, U.S.A., Inc. v. Levi Strauss & Co., 799 F.2d 867, 872 (2d Cir.1986).

[45] A metatag is "buried code" that is not visible to Internet users, which is referenced by domain name search engines or directories to determine whether a website corresponds to descriptive keywords entered into the search engine by a computer user. Those websites with metatags corresponding to the requested keywords appear on the computer screen as the search engine's response. Brookfield, 174 F.3d at 1061-62 n. 23.

[46] The facts of the case required the 9th Circuit to clarify whether use of a competitor's mark in a website's "metatags" infringed the competitor's rights under the Lanham Act. The Ninth Circuit defined "metatags" as "HTML code not visible to Web users but used by search engines in determining which sites correspond to the keywords entered by a Web user." Brookfield Communications, Inc., 174 F.3d at 1061 n. 23.

[47] See Polaroid Corp. v. Polarad Elecs. Corp., 287 F.2d 492, 495 (2d Cir.), cert. denied, 368 U.S. 820, 82 S.Ct. 36, 7 L.Ed.2d 25 (1961).

[48] In Lois Sportswear, U.S.A., Inc. v. Levi Strauss & Co., 799 F.2d 867, 872 (2d Cir.1986), the Second Circuit stated

the Polaroid factors must be applied in the instant case with an eye to how they bear on the likelihood that the appellants' use of appellee's trademark stitching pattern will confuse consumers into thinking that appellee is somehow associated with appellants or has consented to their use of the stitching pattern regardless of labeling.

[49] "The ultimate conclusion as to whether a likelihood of confusion exists is not to be determined in accordance with some rigid formula. The Polaroid factors serve as a useful guide through a difficult quagmire. Each case, however, presents its own peculiar circumstances." Lois Sportswear, U.S.A., Inc. v. Levi Strauss & Co., 799 F.2d 867, 872 (2d Cir.1986).

[50] "The steady application of Polaroid is critical to the proper development of trademark law, for it is only when the Polaroid factors are applied consistently and clearly over time that the relevant distinctions between different factual configurations can emerge." New Kayak Pool Corp. v. R & P Pools, Inc., 246 F.3d 183 (2d Cir.2001) (remanding for consideration of the Polaroid factors).

[51] Defendant argues that "1-800 CONTACTS" is "merely" a phone number that uses the generic term "contacts," and that the 1-800 CONTACTS mark and logo are therefore entitled to protection only against confusingly similar phone numbers. (Memorandum in Opposition at 21-22.) However, the case Defendant cites in support of this argument, Dial-A-Mattress Franchise Corp. v. Page, 880 F.2d 675, 678 (2d Cir.1989), does not limit the protection of telephone numbers against trademark infringement solely to "confusingly similar phone numbers." Instead, the court in Dial-A-Mattress stated

[t]he principles limiting protection for the use of generic terms serve to prevent a marketer from appropriating for its exclusive use words that must remain available to competitors to inform their customers as to the nature of the competitor's business or product. These principles do not require that a competitor remain free to confuse the public with a telephone number or the letters identifying that number that are deceptively similar to those of a first user.

Id. at 678.

[52] It is also of note here that Defendant Vision Direct registered and maintains a registration for the domain name www.www1800Contacts.com.

[53] Traditional cases addressing the question of similarity in the Polaroid factors have contemplated that the consumer actually sees or hears the parties' marks or logos, and might confuse the junior mark with the senior mark. In the Internet context, the issue is not whether the WhenU or Vision Direct marks themselves are similar to the Plaintiff's marks, but whether the marks used by the Defendants (whether actually seen by the consumer or not) are so similar to Plaintiff's mark that that similarity could ultimately cause consumer confusion. See Brookfield Communications, Inc. v. West Coast Entertainment Corp., 174 F.3d 1036, 1061 n. 23 (9th Cir.1999) (placement of a trademarked term in metatags, which the court defined as "HTML code not visible to Web users but used by search engines in determining which sites correspond to the keywords entered by a Web user," was actionable use under the Lanham Act).

[54] Question 4-2 reads, "I believe that anyone should have the right to place `Pop-Up' advertisements on any website at any time, even if the owner of the website does not authorize or approve it." (Neal Aff., Ex. C at 32.) By suggesting in the second clause that the pop-up ads might be unauthorized, Mr. Neal's survey suggests that they should not be permitted on the website. Question 4-5 reads: "I believe that `Pop-Up' advertisements are sometimes not sponsored by or authorized by the website on which they appear." However, Question 9 reads: "Were you aware that, when viewing websites on the Internet, SaveNow software causes `Pop-Up' advertisements to be displayed on your computer which are not authorized by the website on which they appear?" (Neal Aff., Ex. C at 35.) Since Question 9 flatly states that pop-up ads generated by SaveNow software are unauthorized, the survey itself suggest the answer to Question 4-5.

[55] As noted above, in December 2002, subsequent to the filing of this lawsuit, WhenU.com replaced this text with a new disclaimer, stating: "This is a WhenU offer and is not sponsored or displayed by the websites you are visiting. More ...," (Memo in Opposition at 10). However, since "there is no guarantee that Defendants will not simply return to the same conduct if the case is dismissed without issuance of an injunction," the Court considers the disclaimers as they appeared at the time the action was filed. OBH, Inc. v. Spotlight Magazine, Inc., 86 F.Supp.2d 176, 186 n. 8 (W.D.N.Y.2000).

[56] It appears from that the registration occurred sometime in 2002. (Barrier Aff. Ex. A.)

[57] See discussion, infra, p. 497.

[58] It is not insignificant that Congress chose to make the ACPA part of the Lanham Act, and for purposes of preliminary injunctions on trademark infringement claims under the Lanham Act, irreparable harm is presumed upon a finding of a likelihood of confusion.

[59] Arguing "[i]f a defendant voluntarily ceases the complained-of activities, a preliminary injunction request is moot when there is no reasonable expectation that the complained-of activities will resume in the future," Defendant Vision Direct cites American Express Travel Related Services, Inc. v. MasterCard International, Inc., 776 F.Supp. 787, 790-91 (S.D.N.Y.1991); Upjohn v. American Home Products Corp., 598 F.Supp. at 550, 554-55. (Vision Direct Jan. 31, 2003 at 3.)

[60] Defendant alleges that it voluntarily ceased its pop-up advertising activities on September 17, 2002. (Mummery Dec. ¶ 7, 8.)

6.2.3 Lewis Galoob Toys Inc. v. Nintendo of America Inc 6.2.3 Lewis Galoob Toys Inc. v. Nintendo of America Inc

This short excerpt considers whether modern "speedup" chips are a derivative work

964 F.2d 965 (1992)

LEWIS GALOOB TOYS, INC., Plaintiff-Appellee,
v.
NINTENDO OF AMERICA, INC., Defendant-Appellant.
NINTENDO OF AMERICA, INC., Plaintiff-Appellant,
v.
LEWIS GALOOB TOYS, INC., Defendant-Appellee.

No. 91-16205.

United States Court of Appeals, Ninth Circuit.

Argued and Submitted March 12, 1992.
Decided May 21, 1992.
As Amended August 5, 1992.

[966] Thomas G. Gallatin, Jr., Mudge Rose Guthrie Alexander & Ferdon, New York City, for defendant-appellant.

Jerome B. Falk, Jr., Howard, Rice, Nemerovski, Canady, Robertson & Falk, San Francisco, Cal., for plaintiff-appellee.

Before FARRIS and RYMER, Circuit Judges, and KENYON,[1] District Judge.

[967] FARRIS, Circuit Judge:

Nintendo of America appeals the district court's judgment following a bench trial (1) declaring that Lewis Galoob Toys' Game Genie does not violate any Nintendo copyrights and dissolving a temporary injunction and (2) denying Nintendo's request for a permanent injunction enjoining Galoob from marketing the Game Genie. Lewis Galoob Toys, Inc. v. Nintendo of America, Inc., 780 F.Supp. 1283 (N.D.Cal.1991). We have appellate jurisdiction pursuant to 15 U.S.C. § 1121 and 28 U.S.C. §§ 1291 and 1292(a)(1). We affirm.

FACTS

The Nintendo Entertainment System is a home video game system marketed by Nintendo. To use the system, the player inserts a cartridge containing a video game that Nintendo produces or licenses others to produce. By pressing buttons and manipulating a control pad, the player controls one of the game's characters and progresses through the game. The games are protected as audiovisual works under 17 U.S.C. § 102(a)(6).

The Game Genie is a device manufactured by Galoob that allows the player to alter up to three features of a Nintendo game. For example, the Game Genie can increase the number of lives of the player's character, increase the speed at which the character moves, and allow the character to float above obstacles. The player controls the changes made by the Game Genie by entering codes provided by the Game Genie Programming Manual and Code Book. The player also can experiment with variations of these codes.

The Game Genie functions by blocking the value for a single data byte sent by the game cartridge to the central processing unit in the Nintendo Entertainment System and replacing it with a new value. If that value controls the character's strength, for example, then the character can be made invincible by increasing the value sufficiently. The Game Genie is inserted between a game cartridge and the Nintendo Entertainment System. The Game Genie does not alter the data that is stored in the game cartridge. Its effects are temporary.

DISCUSSION

1. Derivative work

The Copyright Act of 1976 confers upon copyright holders the exclusive right to prepare and authorize others to prepare derivative works based on their copyrighted works. See 17 U.S.C. § 106(2). Nintendo argues that the district court erred in concluding that the audiovisual displays created by the Game Genie are not derivative works. The court's conclusions of law are reviewed de novo. See Rozay's Transfer v. Local Freight Drivers, Local 208, 850 F.2d 1321, 1326 (9th Cir.1988), cert. denied, 490 U.S. 1030, 109 S.Ct. 1768, 104 L.Ed.2d 203 (1989). Its findings of fact are reviewed for clear error. See id.

A derivative work must incorporate a protected work in some concrete or permanent "form." The Copyright Act defines a derivative work as follows:

A "derivative work" is a work based upon one or more preexisting works, such as a translation, musical arrangement, dramatization, fictionalization, motion picture version, sound recording, art reproduction, abridgment, condensation, or any other form in which a work may be recast, transformed, or adapted. A work consisting of editorial revisions, annotations, elaborations, or other modifications which, as a whole, represent an original work of authorship, is a "derivative work."

17 U.S.C. § 101 (emphasis added). The examples of derivative works provided by the Act all physically incorporate the underlying work or works. The Act's legislative history similarly indicates that "the infringing work must incorporate a portion of the copyrighted work in some form." 1976 U.S.Code Cong. & Admin.News 5659, 5675. See also Mirage Editions, Inc. v. Albuquerque A.R.T. Co., 856 F.2d 1341, 1343-44 (9th Cir.1988) (discussing same), cert. denied, 489 U.S. 1018, 109 S.Ct. 1135, 103 L.Ed.2d 196 (1989).

Our analysis is not controlled by the Copyright Act's definition of "fixed." The [968] Act defines copies as "material objects, other than phonorecords, in which a work is fixed by any method." 17 U.S.C. § 101 (emphasis added). The Act's definition of "derivative work," in contrast, lacks any such reference to fixation. See id. Further, we have held in a copyright infringement action that "[i]t makes no difference that the derivation may not satisfy certain requirements for statutory copyright registration itself." Lone Ranger Television v. Program Radio Corp., 740 F.2d 718, 722 (9th Cir.1984). See also Paul Goldstein, Derivative Rights and Derivative Works in Copyright, 30 J. Copyright Soc'y U.S.A. 209, 231 n. 75 (1983) ("the Act does not require that the derivative work be protectable for its preparation to infringe"). Cf. Kalem Co. v. Harper Bros., 222 U.S. 55, 61, 32 S.Ct. 20, 21, 56 L.Ed. 92 (1911) (finding the movie "Ben Hur" infringed copyright in the book Ben Hur even though Copyright Act did not yet include movies as protectable works). A derivative work must be fixed to be protected under the Act, see 17 U.S.C. § 102(a), but not to infringe.

The argument that a derivative work must be fixed because "[a] `derivative work' is a work," 17 U.S.C. § 101, and "[a] work is `created' when it is fixed in a copy or phonorecord for the first time," id., relies on a misapplication of the Copyright Act's definition of "created":

A work is `created' when it is fixed in a copy or phonorecord for the first time; where a work is prepared over a period of time, the portion of it that has been fixed at any particular time constitutes the work as of that time, and where the work has been prepared in different versions, each version constitutes a separate work.

Id. The definition clarifies the time at which a work is created. If the provision were a definition of "work," it would not use that term in such a casual manner. The Act does not contain a definition of "work." Rather, it contains specific definitions: "audiovisual works," "literary works," and "pictorial, graphic and sculptural works," for example. The definition of "derivative work" does not require fixation.

The district court's finding that no independent work is created, see Galoob, 780 F.Supp. at 1291, is supported by the record. The Game Genie merely enhances the audiovisual displays (or underlying data bytes) that originate in Nintendo game cartridges. The altered displays do not incorporate a portion of a copyrighted work in some concrete or permanent form. Nintendo argues that the Game Genie's displays are as fixed in the hardware and software used to create them as Nintendo's original displays. Nintendo's argument ignores the fact that the Game Genie cannot produce an audiovisual display; the underlying display must be produced by a Nintendo Entertainment System and game cartridge. Even if we were to rely on the Copyright Act's definition of "fixed," we would similarly conclude that the resulting display is not "embodied," see 17 U.S.C. § 101, in the Game Genie. It cannot be a derivative work.

Mirage Editions is illustrative. Albuquerque A.R.T. transferred artworks from a commemorative book to individual ceramic tiles. See Mirage Editions, 856 F.2d at 1342. We held that "[b]y borrowing and mounting the preexisting, copyrighted individual art images without the consent of the copyright proprietors ... [Albuquerque A.R.T.] has prepared a derivative work and infringed the subject copyrights." Id. at 1343. The ceramic tiles physically incorporated the copyrighted works in a form that could be sold. Perhaps more importantly, sales of the tiles supplanted purchasers' demand for the underlying works. Our holding in Mirage Editions would have been much different if Albuquerque A.R.T. had distributed lenses that merely enabled users to view several artworks simultaneously.

Nintendo asserted at oral argument that the existence of a $150 million market for the Game Genie indicates that its audiovisual display must be fixed. We understand Nintendo's argument; consumers clearly would not purchase the Game Genie if its display was not "sufficiently permanent or [969] stable to permit it to be perceived ... for a period of more than transitory duration." 17 U.S.C. § 101. But, Nintendo's reliance on the Act's definition of "fixed" is misplaced. Nintendo's argument also proves too much; the existence of a market does not, and cannot, determine conclusively whether a work is an infringing derivative work. For example, although there is a market for kaleidoscopes, it does not necessarily follow that kaleidoscopes create unlawful derivative works when pointed at protected artwork. The same can be said of countless other products that enhance, but do not replace, copyrighted works.

Nintendo also argues that our analysis should focus exclusively on the audiovisual displays created by the Game Genie, i.e., that we should compare the altered displays to Nintendo's original displays. Nintendo emphasizes that "`[a]udiovisual works' are works that consist of a series of related images ... regardless of the nature of the material objects ... in which the works are embodied." 17 U.S.C. § 101 (emphasis added). The Copyright Act's definition of "audiovisual works" is inapposite; the only question before us is whether the audiovisual displays created by the Game Genie are "derivative works." The Act does not similarly provide that a work can be a derivative work regardless of the nature of the material objects in which the work is embodied. A derivative work must incorporate a protected work in some concrete or permanent form. We cannot ignore the actual source of the Game Genie's display.

Nintendo relies heavily on Midway Mfg. Co. v. Artic Int'l, Inc., 704 F.2d 1009 (7th Cir.), cert. denied, 464 U.S. 823, 104 S.Ct. 90, 78 L.Ed.2d 98 (1983). Midway can be distinguished. The defendant in Midway, Artic International, marketed a computer chip that could be inserted in Galaxian video games to speed up the rate of play. The Seventh Circuit held that the speeded-up version of Galaxian was a derivative work. Id. at 1013-14. Artic's chip substantially copied and replaced the chip that was originally distributed by Midway. Purchasers of Artic's chip also benefited economically by offering the altered game for use by the general public. The Game Genie does not physically incorporate a portion of a copyrighted work, nor does it supplant demand for a component of that work. The court in Midway acknowledged that the Copyright Act's definition of "derivative work" "must be stretched to accommodate speeded-up video games." Id. at 1014. Stretching that definition further would chill innovation and fail to protect "society's competing interest in the free flow of ideas, information, and commerce." Sony Corp. of America v. Universal Studios, Inc., 464 U.S. 417, 429, 104 S.Ct. 774, 782, 78 L.Ed.2d 574 (1984).

In holding that the audiovisual displays created by the Game Genie are not derivative works, we recognize that technology often advances by improvement rather than replacement. See Christian H. Nadan, Note, A Proposal to Recognize Component Works: How a Teddy Bears on the Competing Ends of Copyright Law, 78 Cal.L.Rev. 1633, 1635 (1990). Some time ago, for example, computer companies began marketing spell-checkers that operate within existing word processors by signalling the writer when a word is misspelled. These applications, as well as countless others, could not be produced and marketed if courts were to conclude that the word processor and spell-checker combination is a derivative work based on the word processor alone. The Game Genie is useless by itself, it can only enhance, and cannot duplicate or recaste, a Nintendo game's output. It does not contain or produce a Nintendo game's output in some concrete or permanent form, nor does it supplant demand for Nintendo game cartridges. Such innovations rarely will constitute infringing derivative works under the Copyright Act. See generally Nadan, supra, at 1667-72.

2. Fair use

"The doctrine of fair use allows a holder of the privilege to use copyrighted material in a reasonable manner without the consent of the copyright owner." Narell v. Freeman, 872 F.2d 907, 913 (9th Cir.1989) (citations omitted). The district court concluded that, even if the audiovisual displays created by the Game Genie are derivative works, Galoob is not liable under 17 U.S.C. § 107 because the displays are a fair use of Nintendo's copyrighted displays. "Whether a use of copyrighted material is a `fair use' is a mixed question of law and fact. If the district court found sufficient facts to evaluate each of the statutory factors, the appellate court may decide whether defendants may claim the fair use defense as a matter of law." Abend v. MCA, Inc., 863 F.2d 1465, 1468 (9th Cir.1988), aff'd sub nom. Stewart v. Abend, 495 U.S. 207, 110 S.Ct. 1750, 109 L.Ed.2d 184 (1990).

[970] Section 107 codifies the fair use defense:

In determining whether the use made of a work in any particular case is a fair use the factors to be considered shall include —

(1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes;

(2) the nature of the copyrighted work;

(3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole;

(4) the effect of the use upon the potential market for or value of the copyrighted work.

The factors are nonexclusive, see Fisher v. Dees, 794 F.2d 432, 435 (9th Cir.1986), and section 107 does not indicate how much weight should be ascribed to each.

Much of the parties' dispute regarding the fair use defense concerns the proper focus of the court's inquiry: (1) Galoob or (2) consumers who purchase and use the Game Genie. Nintendo's complaint does not allege direct infringement, nor did it try the case on that theory. The complaint, for example, alleges only that "Galoob's marketing advertising [sic], promoting and selling of Game Genie has and will contribute to the creation of infringing derivatives of Nintendo's copyrighted ... games." (emphasis added). Contributory infringement is a form of third party liability. See Melville B. Nimmer & David Nimmer, 3 Nimmer on Copyright § 12.04[A][2], at 12-68 (1991). The district court properly focused on whether consumers who purchase and use the Game Genie would be infringing Nintendo's copyrights by creating (what are now assumed to be) derivative works.

Nintendo emphasizes that the district court ultimately addressed its direct infringement by authorization argument. The court concluded that, "[b]ecause the Game Genie does not create a derivative work when used in conjunction with a copyrighted video game, Galoob does not `authorize the use of a copyrighted work without the actual authority from the copyright owner.'" Galoob, 780 F.Supp. at 1298 (quoting Sony, 464 U.S. at 435 n. 17, 104 S.Ct. at 785 n. 17). Although infringement by authorization is a form of direct infringement, this does not change the proper focus of our inquiry; a party cannot authorize another party to infringe a copyright unless the authorized conduct would itself be unlawful.

Nintendo disputes this conclusion. According to Nintendo, a party can unlawfully authorize another party to use a copyrighted work even if that party's use of the work would not violate the Copyright Act. Nintendo's argument is unpersuasive. In Sony, 464 U.S. at 449, 104 S.Ct. at 792, for example, the Court considered whether consumers were using the Betamax for a commercial or noncommercial purpose even though Sony itself obviously was acting in its own commercial self-interest. Professor Nimmer similarly concludes that, "to the extent that an activity does not violate one of those five enumerated rights [see 17 U.S.C. § 106], authorizing such activity does not constitute copyright infringement." 3 Nimmer on Copyright § 12.04[A][3][a], at 12-80 n.82.

The district court concluded that "a family's use of a Game Genie for private home enjoyment must be characterized as a non-commercial, nonprofit activity." Galoob, 780 F.Supp. at 1293. Nintendo argues that Game Genie users are supplanting its commercially valuable right to make and sell derivative works. Nintendo's reliance on Harper & Row Publishers, Inc. v. Nation Enters., 471 U.S. 539, 562, 105 S.Ct. 2218, 2231, 85 L.Ed.2d 588 (1985), is misplaced. The commercially valuable right at issue in Harper & Row was the right of first publication; Nation Enterprises intended to publish the copyrighted materials for profit. See id. at 562-63, 105 S.Ct. at 2231-32. See also Sony, 464 U.S. at 449, 104 S.Ct. at 792 ("If the Betamax were used to make copies for a commercial or profit-making purpose, such use would presumptively be unfair."). Game Genie users are engaged in a non-profit activity. Their use of the Game Genie to create derivative works therefore is presumptively fair. See Sony, 464 U.S. at 449, 104 S.Ct. at 792.

The district court also concluded that "[t]he [Nintendo] works' published nature supports the fairness of the use." Galoob, 780 F.Supp. at 1293. Nintendo argues that it has not published the derivative works created by the Game Genie. This argument ignores the plain language of section 107: "the factors to be considered shall include ... the nature of the copyrighted work." The argument also would make the fair use defense unavailable in all cases of derivative works, including "criticism, comment, news reporting, teaching ..., scholarship, or research." 17 U.S.C. § 107. A commentary that incorporated large portions of For Whom the Bell Tolls, for [971] example, would be undeserving of fair use protection because the incorporated portions would constitute an unpublished derivative work. This cannot be the law.

The district court further concluded that the amount of the portion used in relation to the copyrighted work as a whole "cannot assist Nintendo in overcoming the presumption of fair use." Galoob, 780 F.Supp. at 1293. The video tape recorders at issue in Sony allowed consumers to tape copyrighted works in their entirety. The Supreme Court nevertheless held that, "when one considers ... that [video tape recording] merely enables a viewer to see such a work which he had been invited to witness in its entirety free of charge, the fact that the entire work is reproduced does not have its ordinary effect of militating against a finding of fair use." 464 U.S. at 449-50, 104 S.Ct. at 792 (citations omitted). Consumers are not invited to witness Nintendo's audiovisual displays free of charge, but, once they have paid to do so, the fact that the derivative works created by the Game Genie are comprised almost entirely of Nintendo's copyrighted displays does not militate against a finding of fair use.

Nintendo would distinguish Sony because it involved copying copyrighted works rather than creating derivative works based on those works. In other words, the consumers in Sony could lawfully copy the copyrighted works because they were invited to view those works free of charge. Game Genie users, in contrast, are not invited to view derivative works based on Nintendo's copyrighted works without first paying for that privilege. Sony cannot be read so narrowly. It is difficult to imagine that the Court would have reached a different conclusion if Betamax purchasers were skipping portions of copyrighted works or viewing denouements before climaxes. Sony recognizes that a party who distributes a copyrighted work cannot dictate how that work is to be enjoyed. Consumers may use a Betamax to view copyrighted works at a more convenient time. They similarly may use a Game Genie to enhance a Nintendo Game cartridge's audiovisual display in such a way as to make the experience more enjoyable.

"The fourth factor is the `most important, and indeed, central fair use factor.'" Stewart, 495 U.S. at 238, 110 S.Ct. at 1769 (quoting 3 Nimmer on Copyright § 13.05[A], at 13-81). The district court concluded that "Nintendo has failed to show any harm to the present market for its copyrighted games and has failed to establish the reasonable likelihood of a potential market for slightly altered versions of the games at suit." Galoob, 780 F.Supp. at 1295. Nintendo's main argument on appeal is that the test for market harm encompasses the potential market for derivative works. Because the Game Genie is used for a noncommercial purpose, the likelihood of future harm may not be presumed. See Sony, 464 U.S. at 451, 104 S.Ct. at 793. Nintendo must show "by a preponderance of the evidence that some meaningful likelihood of future harm exists." Id. (emphasis supplied).

Nintendo's argument is supported by case law. Although the Copyright Act requires a court to consider "the effect of the use upon the potential market for or value of the copyrighted work," 17 U.S.C. § 107(4) (emphasis added), we held in Abend that "[a]lthough the motion picture will have no adverse effect on bookstore sales of the [underlying] novel — and may in fact have a beneficial effect — it is `clear that [the film's producer] may not invoke the defense of fair use.'" 863 F.2d at 1482 (quoting 3 Nimmer on Copyright § 13.05[B], at 13-84). We explained: "`If the defendant's work adversely affects the value of any of the rights in the copyrighted work ... the use is not fair even if the rights thus affected have not as yet been exercised by the plaintiff.'" Id. (quoting 3 Nimmer on Copyright § 13.05[B], at 13-84 to 13-85 (footnotes omitted)). The Supreme Court specifically affirmed our finding that the motion picture adaptation "impinged on the ability to market new versions of the story." Stewart, 495 U.S. at 238, 110 S.Ct. at 1769.

Still, Nintendo's argument is undermined by the facts. The district court considered the potential market for derivative works based on Nintendo game cartridges and found that: (1) "Nintendo has not, to date, issued or considered issuing altered versions of existing games," Galoob, 780 F.Supp. at 1295, and (2) Nintendo "has failed to show the reasonable likelihood of such a market." Id. The record supports the court's findings. According to Stephen Beck, Galoob's expert witness, junior or expert versions of existing Nintendo games would enjoy very little market interest because the original version of each game already has been designed to appeal to the largest number of consumers. Mr. Beck [972] also testified that a new game must include new material or "the game player is going to feel very cheated and robbed, and [the] product will have a bad reputation and word of mouth will probably kill its sales." Howard Lincoln, Senior Vice President of Nintendo of America, acknowledged that Nintendo has no present plans to market such games.

The district court also noted that Nintendo's assertion that it may wish to re-release altered versions of its game cartridges is contradicted by its position in various other lawsuits:

In those actions, Nintendo opposes antitrust claims by using the vagaries of the video game industry to rebut the impact and permanence of its market control, if any. Having indoctrinated this Court as to the fast pace and instability of the video game industry, Nintendo may not now, without any data, redefine that market in its request for the extraordinary remedy sought herein.... While board games may never die, good video games are mortal.

Galoob, 780 F.Supp. at 1295. The existence of this potential market cannot be presumed. See Sony, 464 U.S. at 451, 104 S.Ct. at 793. See also Wright v. Warner Books, Inc., 953 F.2d 731, 739 (2d Cir.1991) (affirming district court's finding of no reasonable likelihood of injury to alleged market because "[p]laintiff has offered no evidence that the project will go forward"). The fourth and most important fair use factor also favors Galoob.

Nintendo's most persuasive argument is that the creative nature of its audiovisual displays weighs against a finding of fair use. The Supreme Court has acknowledged that "fair use is more likely to be found in factual works than fictional works." Stewart, 495 U.S. at 237, 110 S.Ct. at 1769. This consideration weighs against a finding of fair use, but it is not dispositive. See Sony, 464 U.S. at 448, 104 S.Ct. at 792 (fair use defense is an "equitable rule of reason"). The district court could properly conclude that Game Genie users are making a fair use of Nintendo's displays.

3. Temporary and permanent injunction

Galoob has not violated the Copyright Act. Nintendo therefore is not entitled to a temporary or permanent injunction.

AFFIRMED.

RYMER, Circuit Judge, concurring in the judgment:

I concur in the judgment for reasons stated by the district court, Lewis Galoob Toys, Inc. v. Nintendo of America, Inc., 780 F.Supp. 1283 (N.D.Cal.1991).

[1] Honorable David V. Kenyon, United States District Judge for the Central District of California, sitting by designation.

6.2.4 Micro Star v. FormGen Inc. 6.2.4 Micro Star v. FormGen Inc.

154 F.3d 1107

1998 Copr.L.Dec. P 27,820, 48 U.S.P.Q.2d 1026,
98 Cal. Daily Op. Serv. 7130,
98 Daily Journal D.A.R. 9859

MICRO STAR, Plaintiff-Appellant,
v.
FORMGEN INC., a corporation; GT Interactive Software Corp.;
3D Realms Entertainment, aka 3D Realms
Entertainment; DOES, 1 through 100,
inclusive., Defendants-Appellees.
MICRO STAR, Plaintiff-Appellant/Cross-Appellee,
v.
FORMGEN INC., a corporation; GT Interactive Software Corp.;
3D Realms Entertainment, aka 3D Realms
Entertainment; Does, 1 through 100,
inclusive., Defendants-Appellees/Cross-Appellants.

Nos. 96-56426, 96-56433.

United States Court of Appeals,
Ninth Circuit.

Argued and Submitted Nov. 4, 1997.
Decided Sept. 11, 1998.

[1109] Philip H. Stillman, Flynn, Sheridan, Tabb & Stillman, San Diego, CA, for plaintiff-appellant/cross-appellee.

Michael S. Oberman, Kramer, Levin, Naftalis & Frankel, New York City, for defendants-appellees/cross-appellants.

Mark E. Nebergall, Mark Traphagen, Software Publishers Association, Washington, DC, for defendants-appellees/cross-appellants.

Gail E. Markels, Interactive Digital Software Association, New York City, for defendants-appellees/cross-appellants.

Appeal from the United States District Court for the Southern District of California Marilyn L. Huff, District Judge, Presiding. D.C. No. CV-96-03435-MLH.

Before: KOZINSKI, THOMPSON[*] and TROTT, Circuit Judges.

KOZINSKI, Circuit Judge.

Duke Nukem routinely vanquishes Octabrain and the Protozoid Slimer. But what about the dreaded Micro Star?

I

FormGen Inc., GT Interactive Software Corp. and Apogee Software, Ltd. (collectively FormGen) made, distributed and own the rights to Duke Nukem 3D (D/N-3D), an immensely popular (and very cool) computer game. D/N-3D is played from the first-person perspective; the player assumes the personality and point of view of the title character, who is seen on the screen only as a pair of hands and an occasional boot, much as one might see oneself in real life without the aid of a mirror.[1] Players explore a futuristic city infested with evil aliens and other hazards. The goal is to zap them before they zap you, while searching for the hidden passage to the next level. The basic game comes with twenty-nine levels, each with a different combination of scenery, aliens, and other challenges. The game also includes a "Build Editor," a utility that enables players to create their own levels. With FormGen's encouragement, players frequently post levels they have created on the Internet where others can download them. Micro Star, a computer software distributor, did just that: It downloaded 300 user-created levels and stamped them onto a CD, which it then sold commercially as Nuke It (N/I). N/I is packaged in a box decorated with numerous "screen shots," pictures of what the new levels look like when played.

Micro Star filed suit in district court, seeking a declaratory judgment that N/I did not infringe on any of FormGen's copyrights. FormGen counterclaimed, seeking a preliminary injunction barring further production and distribution of N/I. Relying on Lewis Galoob Toys, Inc. v. Nintendo of Am., Inc., 964 F.2d 965 (9th Cir.1992), the district court held that N/I was not a derivative work and therefore did not infringe FormGen's copyright. The district court did, however, grant a preliminary injunction as to the screen shots, finding that N/I's packaging violated FormGen's copyright by reproducing pictures of D/N-3D characters without a license. The court rejected Micro Star's fair use claims. Both sides appeal their losses.

II

A party seeking a preliminary injunction must show "either a likelihood of success on the merits and the possibility of irreparable injury, or that serious questions going to the merits were raised and the balance of hardships tips sharply in its favor." Johnson Controls, Inc. v. Phoenix Control Systems, Inc., 886 F.2d 1173, 1174 (9th Cir.1989). Because "in a copyright infringement claim, a showing of a reasonable likelihood of success on the merits raises a presumption of irreparable harm," id., FormGen need only show a likelihood of success on the merits to get the preliminary injunction it seeks (barring the manufacture and distribution of N/I) and to preserve the preliminary injunction it already won (barring the screen shots on N/I's packaging).

III

To succeed on the merits of its claim that N/I infringes FormGen's copyright, FormGen must show (1) ownership of the copyright to D/N-3D, and (2) copying of protected expression by Micro Star. See Triad Systems Corp. v. Southeastern Express Co., 64 F.3d 1330, 1335 (9th Cir.1995). FormGen's [1110] copyright registration creates a presumption of ownership, see id., and we are satisfied that FormGen has established its ownership of the copyright. We therefore focus on the latter issue.

FormGen alleges that its copyright is infringed by Micro Star's unauthorized commercial exploitation of user-created game levels. In order to understand FormGen's claims, one must first understand the way D/N-3D works. The game consists of three separate components: the game engine, the source art library and the MAP files.[2] The game engine is the heart of the computer program; in some sense, it is the program. It tells the computer when to read data, save and load games, play sounds and project images onto the screen. In order to create the audiovisual display for a particular level, the game engine invokes the MAP file that corresponds to that level. Each MAP file contains a series of instructions that tell the game engine (and, through it, the computer) what to put where. For instance, the MAP file might say scuba gear goes at the bottom of the screen. The game engine then goes to the source art library, finds the image of the scuba gear, and puts it in just the right place on the screen.[3] The MAP file describes the level in painstaking detail, but it does not actually contain any of the copyrighted art itself; everything that appears on the screen actually comes from the art library. Think of the game's audiovisual display as a paint-by-numbers kit. The MAP file might tell you to put blue paint in section number 565, but it doesn't contain any blue paint itself; the blue paint comes from your palette, which is the low-tech analog of the art library, while you play the role of the game engine. When the player selects one of the N/I levels, the game engine references the N/I MAP files, but still uses the D/N-3D art library to generate the images that make up that level.

FormGen points out that a copyright holder enjoys the exclusive right to prepare derivative works based on D/N-3D. See 17 U.S.C. § 106(2) (1994). According to FormGen, the audiovisual displays generated when D/N-3D is run in conjunction with the N/I CD MAP files are derivative works that infringe this exclusivity. Is FormGen right? The answer is not obvious.

The Copyright Act defines a derivative work as

a work based upon one or more preexisting works, such as a translation, musical arrangement, dramatization, fictionalization, motion picture version, sound recording, art reproduction, abridgment, condensation, or any other form in which a work may be recast, transformed, or adapted. A work consisting of editorial revisions, annotations, elaborations, or other modifications which, as a whole, represent an original work of authorship, is a "derivative work."

Id. § 101. The statutory language is hopelessly overbroad, however, for "[e]very book in literature, science and art, borrows and must necessarily borrow, and use much which was well known and used before." Emerson v. Davies, 8 F. Cas. 615, 619 (C.C.D.Mass.1845) (No. 4436), quoted in 1 Nimmer on Copyright, § 3.01, at 3-2 (1997). To narrow the statute to a manageable level, we have developed certain criteria a work must satisfy in order to qualify as a derivative work. One of these is that a derivative work must exist in a "concrete or permanent form," Galoob, 964 F.2d at 967 (internal quotation marks omitted), and must substantially incorporate protected material from the preexisting work, see Litchfield v. Spielberg, 736 F.2d 1352, 1357 (9th Cir.1984). Micro Star argues that N/I is not a derivative work because the audiovisual displays generated when D/N-3D is run with N/I's MAP files are [1111] not incorporated in any concrete or permanent form, and the MAP files do not copy any of D/N-3D's protected expression. It is mistaken on both counts.

The requirement that a derivative work must assume a concrete or permanent form was recognized without much discussion in Galoob. There, we noted that all the Copyright Act's examples of derivative works took some definite, physical form and concluded that this was a requirement of the Act. See Galoob, 964 F.2d at 967-68; see also Edward G. Black & Michael H. Page, Add-On Infringements, 15 Hastings Comm/Ent. L.J. 615, 625 (1993) (noting that in Galoob the Ninth Circuit "re-examined the statutory definition of derivative works offered in section 101 and found an independent fixation requirement of sorts built into the statutory definition of derivative works"). Obviously, N/I's MAP files themselves exist in a concrete or permanent form; they are burned onto a CD-ROM. See ProCD, Inc. v. Zeidenberg, 86 F.3d 1447, 1453 (7th Cir.1996) (computer files on a CD are fixed in a tangible medium of expression). But what about the audiovisual displays generated when D/N-3D runs the N/I MAP files--i.e., the actual game level as displayed on the screen? Micro Star argues that, because the audiovisual displays in Galoob didn't meet the "concrete or permanent form" requirement, neither do N/I's.

In Galoob, we considered audiovisual displays created using a device called the Game Genie, which was sold for use with the Nintendo Entertainment System. The Game Genie allowed players to alter individual features of a game, such as a character's strength or speed, by selectively "blocking the value for a single data byte sent by the game cartridge to the [Nintendo console] and replacing it with a new value." Galoob, 964 F.2d at 967. Players chose which data value to replace by entering a code; over a billion different codes were possible. The Game Genie was dumb; it functioned only as a window into the computer program, allowing players to temporarily modify individual aspects of the game. See Lewis Galoob Toys, Inc. v. Nintendo of Am., Inc., 780 F.Supp. 1283, 1289 (N.D.Cal.1991).

Nintendo sued, claiming that when the Game Genie modified the game system's audiovisual display, it created an infringing derivative work. We rejected this claim because "[a] derivative work must incorporate a protected work in some concrete or permanent form." Galoob, 964 F.2d at 967 (internal quotation marks omitted). The audiovisual displays generated by combining the Nintendo System with the Game Genie were not incorporated in any permanent form; when the game was over, they were gone. Of course, they could be reconstructed, but only if the next player chose to reenter the same codes.[4]

Micro Star argues that the MAP files on N/I are a more advanced version of the Game Genie, replacing old values (the MAP files in the original game) with new values (N/I's MAP files). But, whereas the audiovisual displays created by Game Genie were never recorded in any permanent form, the audiovisual displays generated by D/N-3D from the N/I MAP files are in the MAP files themselves. In Galoob, the audiovisual display was defined by the original game cartridge, not by the Game Genie; no one could possibly say that the data values inserted by the Game Genie described the audiovisual display. In the present case the audiovisual display that appears on the computer monitor when a N/I level is played is described--in exact detail--by a N/I MAP file.

This raises the interesting question whether an exact, down to the last detail, description of an audiovisual display (and--by definition--we know that MAP files do describe audiovisual displays down to the last detail) [1112] counts as a permanent or concrete form for purposes of Galoob. We see no reason it shouldn't. What, after all, does sheet music do but describe in precise detail the way a copyrighted melody sounds? See 1 William F. Patry, Copyright Law and Practice 168 (1994) ("[A] musical composition may be embodied in sheet music...."). To be copyrighted, pantomimes and dances may be "described in sufficient detail to enable the work to be performed from that description." Id. at 243 (citing Compendium II of Copyright Office Practices § 463); see also Horgan v. Macmillan, Inc., 789 F.2d 157, 160 (2d Cir.1986). Similarly, the N/I MAP files describe the audiovisual display that is to be generated when the player chooses to play D/N-3D using the N/I levels. Because the audiovisual displays assume a concrete or permanent form in the MAP files, Galoob stands as no bar to finding that they are derivative works.

In addition, "[a] work will be considered a derivative work only if it would be considered an infringing work if the material which it has derived from a preexisting work had been taken without the consent of a copyright proprietor of such preexisting work." Mirage Editions v. Albuquerque A.R.T. Co., 856 F.2d 1341, 1343 (quoting 1 Nimmer on Copyright § 3.01 (1986)) (internal quotation marks omitted). "To prove infringement, [FormGen] must show that [D/N-3D's and N/I's audiovisual displays] are substantially similar in both ideas and expression." Litchfield v. Spielberg, 736 F.2d 1352, 1356 (9th Cir.1984) (emphasis omitted). Similarity of ideas may be shown by comparing the objective details of the works: plot, theme, dialogue, mood, setting, characters, etc. See id. Similarity of expression focuses on the response of the ordinary reasonable person, and considers the total concept and feel of the works. See id. at 1356-57. FormGen will doubtless succeed in making these showings since the audiovisual displays generated when the player chooses the N/I levels come entirely out of D/N-3D's source art library. Cf. Atari, Inc. v. North Am. Philips Consumer Elec. Corp., 672 F.2d 607, 620 (7th Cir.1982) (finding two video games substantially similar because they shared the same "total concept and feel").

Micro Star further argues that the MAP files are not derivative works because they do not, in fact, incorporate any of D/N-3D's protected expression. In particular, Micro Star makes much of the fact that the N/I MAP files reference the source art library, but do not actually contain any art files themselves. Therefore, it claims, nothing of D/N-3D's is reproduced in the MAP files. In making this argument, Micro Star misconstrues the protected work. The work that Micro Star infringes is the D/N-3D story itself--a beefy commando type named Duke who wanders around post-Apocalypse Los Angeles, shooting Pig Cops with a gun, lobbing hand grenades, searching for medkits and steroids, using a jetpack to leap over obstacles, blowing up gas tanks, avoiding radioactive slime. A copyright owner holds the right to create sequels, see Trust Co. Bank v. MGM/UA Entertainment Co., 772 F.2d 740 (11th Cir.1985), and the stories told in the N/I MAP files are surely sequels, telling new (though somewhat repetitive) tales of Duke's fabulous adventures. A book about Duke Nukem would infringe for the same reason, even if it contained no pictures.[5]

Micro Star nonetheless claims that its use of D/N-3D's protected expression falls within the doctrine of fair use, which permits unauthorized use of copyrighted works "for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research." 17 U.S.C. § 107; see Narell v. Freeman, 872 F.2d 907, 913 (9th Cir.1989). Section 107 instructs courts "determining whether the use made of a work in any particular case is a fair use" to consider four factors: (1) the purpose and character of the use, including whether it is commercial in nature; (2) the nature of the copyrighted work; (3) the amount and substantiality of the copied material in relation to the copyrighted work as a whole; and (4) the effect of the use on the potential market for the copyrighted work. 17 U.S.C. § 107.

[1113] As a preliminary matter, Micro Star asks us to focus on the player's use of the N/I CD in evaluating the fair use claim, because-according to Micro Star-the player actually creates the derivative work. In Galoob, after we assumed for purposes of argument that the Game Genie did create derivative works, we went on to consider the fair use defense from the player's point of view. See Galoob, 964 F.2d at 970. But the fair use analysis in Galoob was not necessary and therefore is clearly dicta. More significantly, Nintendo alleged only contributory infringement--that Galoob was helping consumers create derivative works; FormGen here alleges direct infringement by Micro Star, because the MAP files encompass new Duke stories, which are themselves derivative works.

Our examination of the section 107 factors yields straightforward results. Micro Star's use of FormGen's protected expression was made purely for financial gain. While that does not end our inquiry, see Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569, 584, 114 S.Ct. 1164, 127 L.Ed.2d 500 (1994), "every commercial use of copyrighted material is presumptively an unfair exploitation of the monopoly privilege that belongs to the owner of the copyright." Sony Corp. of Am. v. Universal City Studios, Inc., 464 U.S. 417, 451, 104 S.Ct. 774, 78 L.Ed.2d 574 (1984).[6] The Supreme Court has explained that the second factor, the nature of the copyrighted work, is particularly significant because "some works are closer to the core of intended copyright protection than others, with the consequence that fair use is more difficult to establish when the former works are copied." Campbell, 510 U.S. at 586, 114 S.Ct. 1164. The fair use defense will be much less likely to succeed when it is applied to fiction or fantasy creations, as opposed to factual works such as telephone listings. See United Tel. Co. v. Johnson Publ'g Co., 855 F.2d 604, 609 (8th Cir.1988); see also Stewart v. Abend, 495 U.S. 207, 237, 110 S.Ct. 1750, 109 L.Ed.2d 184 (1990). Duke Nukem's world is made up of aliens, radioactive slime and freezer weapons-clearly fantasies, even by Los Angeles standards. N/I MAP files "expressly use[ ] the [D/N-3D] story's unique setting, characters, [and] plot," Stewart, 495 U.S. at 238, 110 S.Ct. 1750; both the quantity and importance of the material Micro Star used are substantial. Finally, by selling N/I, Micro Star "impinged on [FormGen's] ability to market new versions of the [D/N-3D] story." Stewart, 495 U.S. at 238, 110 S.Ct. 1750; see also Twin Peaks Productions, Inc. v. Publications Int'l, Ltd., 996 F.2d 1366, 1377 (2d Cir.1993). Only FormGen has the right to enter that market; whether it chooses to do so is entirely its business. "[N/I] neither falls into any of the categories enumerated in section 107 nor meets the four criteria set forth in section 107." Stewart, 495 U.S. at 237, 110 S.Ct. 1750. It is not protected by fair use.

Micro Star also argues that it is the beneficiary of the implicit license FormGen gave to its customers by authorizing them to create new levels. Section 204 of the Copyright Act requires the transfer of the exclusive rights granted to copyright owners (including the right to prepare derivative works) to be in writing. See 17 U.S.C. § 204(a); Effects Assocs., Inc. v. Cohen, 908 F.2d 555, 556 (9th Cir.1990). A nonexclusive license may, however, be granted orally or implied by conduct. See Effects, 908 F.2d at 558. Nothing indicates that FormGen granted Micro Star any written license at all; nor is there evidence of a nonexclusive oral license. The only written license FormGen conceivably granted was to players who designed their own new levels, but that license contains a significant limitation: Any new levels the players create "must be offered [to others] solely for free." The parties dispute whether the license is binding, but it doesn't matter. If the license is valid, it clearly prohibits commercial distribution of levels; if it doesn't, FormGen hasn't granted any written licenses at all.[7]

[1114] In case FormGen didn't license away its rights, Micro Star argues that, by providing the Build Editor and encouraging players to create their own levels, FormGen abandoned all rights to its protected expression. It is well settled that rights gained under the Copyright Act may be abandoned. But abandonment of a right must be manifested by some overt act indicating an intention to abandon that right. See Hampton v. Paramount Pictures Corp., 279 F.2d 100, 104 (9th Cir.1960). Given that it overtly encouraged players to make and freely distribute new levels, FormGen may indeed have abandoned its exclusive right to do the same. But abandoning some rights is not the same as abandoning all rights, and FormGen never overtly abandoned its rights to profit commercially from new levels. Indeed, FormGen warned players not to distribute the levels commercially and has actively enforced that limitation by bringing suits such as this one.

IV

Because FormGen will likely succeed at trial in proving that Micro Star has infringed its copyright, we reverse the district court's order denying a preliminary injunction and remand for entry of such an injunction. Of course, we affirm the grant of the preliminary injunction barring Micro Star from selling N/I in boxes covered with screen shots of the game. [8]

AFFIRMED in part, REVERSED in part, and REMANDED. Micro Star to bear costs of both appeals.

---------------

[*] Judge Thompson was drawn to replace Judge Floyd Gibson who became unavailable after the case was submitted.

[1] This form of play was pioneered by a company called id Software with its classic Wolfenstein 3D character.

[2] So-called because the files all end with the extension ".MAP". Also, no doubt, because they contain the layout for the various levels.

[3] Actually, this is all a bit metaphorical. Computer programs don't actually go anywhere or fetch anything. Rather, the game engine receives the player's instruction as to which game level to select and instructs the processor to access the MAP file corresponding to that level. The MAP file, in turn, consists of a series of instructions indicating which art images go where. When the MAP file calls for a particular art image, the game engine tells the processor to access the art library for instructions on how each pixel on the screen must be colored in order to paint that image.

[4] A low-tech example might aid understanding. Imagine a product called the Pink Screener, which consists of a big piece of pink cellophane stretched over a frame. When put in front of a television, it makes everything on the screen look pinker. Someone who manages to record the programs with this pink cast (maybe by filming the screen) would have created an infringing derivative work. But the audiovisual display observed by a person watching television through the Pink Screener is not a derivative work because it does not incorporate the modified image in any permanent or concrete form. The Game Genie might be described as a fancy Pink Screener for video games, changing a value of the game as perceived by the current player, but never incorporating the new audiovisual display into a permanent or concrete form.

[5] We note that the N/I MAP files can only be used with D/N-3D. If another game could use the MAP files to tell the story of a mousy fellow who travels through a beige maze, killing vicious saltshakers with paper-clips, then the MAP files would not incorporate the protected expression of D/N-3D because they would not be telling a D/N-3D story.

[6] Of course, transformative works have greater recourse to the fair use defense as they "lie at the heart of the fair use doctrine's guarantee of breathing space within the confines of copyright ... and the more transformative the new work, the less will be the significance of other factors, like commercialism, that may weigh against a finding of fair use." Campbell, 510 U.S. at 579, 114 S.Ct. 1164 (citations omitted). N/I can hardly be described as transformative; anything but.

[7] We would have no reason to sever the limitation from the license; the limitation is plainly stated in the User License, unambiguous, and not the least bit unreasonable. Indeed, it is precisely the sort of term we would expect to see in such a license.

[8] Micro Star raises various other claims alleging copyright misuse and abuse of the discovery process. However, nothing indicates that FormGen abused its copyright. See Triad Systems Corp. v. Southeastern Express Co., 64 F.3d 1330, 1337 (9th Cir.1995). And we are at a loss to understand why Micro Star complains about the discovery process; certainly the district court did not abuse its discretion. See Sopcak v. Northern Mountain Helicopter Serv., 52 F.3d 817, 819 (9th Cir.1995).

6.3 OIL Casebook: Copyright Fair Use 6.3 OIL Casebook: Copyright Fair Use

6.3.1 Authors Guild, Inc. v. HathiTrust 6.3.1 Authors Guild, Inc. v. HathiTrust

This case provides a good introduction to the policies and history of fair use, while also applying the doctrine to the most modern of contexts.

755 F.3d 87 (2014)

AUTHORS GUILD, INC., AUSTRALIAN SOCIETY OF AUTHORS LIMITED, UNION DES ECRIVAINES ET DES ECRIVAINS QUEBECOIS, ANGELO LOUKAKIS, ROXANA ROBINSON, ANDRE ROY, JAMES SHAPIRO, DANIELE SIMPSON, T.J. STILES, FAY WELDON, AUTHORS LEAGUE FUND, INC., AUTHORS' LICENSING AND COLLECTING SOCIETY, SVERIGES FORFATTARFORBUND, NORSK FAGLITTERAER FORFATTER-OG OVERSETTERFORENING, WRITERS' UNION OF CANADA, PAT CUMMINGS, ERIK GRUNDSTROM, HELGE RONNING, JACK R. SALAMANCA, Plaintiffs-Appellants,
v.
HATHITRUST, CORNELL UNIVERSITY, MARY SUE COLEMAN, President, University of Michigan, JANET NAPOLITANO, President, University of California, RAYMOND W. CROSS, President, University of Wisconsin System, MICHAEL MCROBBIE, President, Indiana University, Defendants-Appellees,[1]
NATIONAL FEDERATION OF 1 THE BLIND, GEORGINA KLEEGE, BLAIR SEIDLITZ, COURTNEY WHEELER, ELLEN HOLLOMAN, Intervenor Defendants-Appellees.[2]

No. 12-4547-cv.

United States Court of Appeals, Second Circuit.

Argued: October 30, 2013.
Decided: June 10, 2014.

EDWARD H. ROSENTHAL (Jeremy S. Goldman, Anna Kadyshevich, on the brief), Frankfurt Kurnit Klein & Selz, P.C., New York, NY, for Plaintiffs-Appellants.

JOSEPH PETERSEN (Robert Potter, Joseph Beck, Andrew Pequignot, Allison Scott Roach, on the brief), Kilpatrick Townsend & Stockton LLP, New York, NY, for Defendants-Appellees.

DANIEL F. GOLDSTEIN (Jessica P. Weber, on the brief), Brown Goldstein & Levy, LLP, Baltimore, MD; Robert J. Bernstein, New York, NY, on the brief; Peter Jaszi, Chevy Chase, MD, on the brief, for Intervenor Defendants-Appellees.

Jennifer M. Urban, Pamela Samuelson, David Hansen, Samuelson Law, Technology & Public Policy Clinic, University of California, Berkeley, School of Law, Berkeley, CA, for Amici Curiae 133 Academic Authors.

Blake E. Reid, Brian Wolfman, Institute for Public Representation, Georgetown University Law Center, Washington, DC, for Amicus Curiae American Association of People with Disabilities.

Jonathan Band, Jonathan Band PLLC, Washington, DC, for Amicus Curiae American Library Association.

David Leichtman, Hillel I. Parness, Shane D. St. Hill, Robins, Kaplan, Miller & Ciresi L.L.P., New York, NY, for Amicus Curiae American Society of Journalists and Authors, Inc.

Brian G. Joseph, Karyn K. Ablin, Wiley Rein LLP; Ada Meloy, General Counsel, American Council on Education, Washington, DC, for Amici Curiae American Council on Education, Association of American Universities, et al.

Elizabeth A. McNamara, Alison B. Schary, Colin J. Peng-Sue, Davis Wright Tremaine LLP, New York, NY, for Amicus Curiae the Associated Press.

Mary E. Rasenberger, Nancy E. Wolff, Eleanor M. Lackman, Nicholas J. Tardif, Cowan DeBaets, Abrahams & Sheppard LLP, New York, NY, for Amicus Curiae Association of American Publishers.

Jo Anne Simon, Mary J. Goodwin, Amy F. Robertson, Jo Anne Simon, P.C., Brooklyn, NY, for Amici Curiae Association on Higher Education and Disability, Marilyn J. Bartlett, et al.

Brandon Butler, Washington, DC, for Amici Curiae Beneficent Technolology, Inc., and Learning Ally, Inc.

Susan M. Kornfield, Bodman PLC, Ann Arbor, MI, for Amici Curiae Board of Trustees of the University of Illinois, Board of Trustees of Michigan State University, et al.

Jason Schultz, Berkeley, CA; Matthew Sag, Chicago, IL, for Amici Curiae Digital Humanities and Law Scholars.

Michael Waterstone, Los Angeles, CA; Robert Dinerstein, Washington, DC; Christopher H. Knauf, Knauf Associates, Santa Monica, CA; Michael Stein, Cambridge, MA, for Amici Curiae Disability Law Professors.

Roderick M. Thompson, Stephanie P. Skaff, Deepak Gupta, Rochelle L. Woods, Farella Braun + Martel LLP, San Francisco, CA; Corynne McSherry, Daniel Nazer, Electronic Frontier Foundation, San Francisco, CA; John Bergmayer, Public Knowledge, Washington, DC; David Sohn, Center for Democracy & Technology, Washington, DC, for Amicus Curiae Electronic Frontier Foundation.

Stephen M. Schaetzel, Meunier Carlin & Curfman, LLC, Atlanta, GA, for Amicus Curiae Emory Vaccine Center.

Frederick A. Brodie, Pillsbury Winthrop Shaw Pittman LLP, New York, NY, for Amicus Curiae the Leland Stanford Junior University.

Eric J. Grannis, The Law Offices of Eric J. Grannis, New York, NY, for Amici Curiae Medical Historians.

Steven B. Fabrizio, Kenneth L. Doroshow, Steven R. Englund, Jenner & Block LLP, Washington, DC, for Amicus Curiae Motion Picture Association of America, Inc.

Before: WALKER, CABRANES, and PARKER, Circuit Judges.

BARRINGTON D. PARKER, Circuit Judge.

Beginning in 2004, several research universities including the University of Michigan, the University of California at Berkeley, Cornell University, and the University of Indiana agreed to allow Google to electronically scan the books in their collections. In October 2008, thirteen universities announced plans to create a repository for the digital copies and founded an organization called HathiTrust to set up and operate the HathiTrust Digital Library (or "HDL"). Colleges, universities, and other nonprofit institutions became members of HathiTrust and made the books in their collections available for inclusion in the HDL. HathiTrust currently has 80 member institutions and the HDL contains digital copies of more than ten million works, published over many centuries, written in a multitude of languages, covering almost every subject imaginable. This appeal requires us to decide whether the HDL's use of copyrighted material is protected against a claim of copyright infringement under the doctrine of fair use. See 18 U.S.C. § 107.

BACKGROUND

A. The HathiTrust Digital Library

HathiTrust permits three uses of the copyrighted works in the HDL repository. First, HathiTrust allows the general public to search for particular terms across all digital copies in the repository. Unless the copyright holder authorizes broader use, the search results show only the page numbers on which the search term is found within the work and the number of times the term appears on each page. The HDL does not display to the user any text from the underlying copyrighted work (either in "snippet" form or otherwise). Consequently, the user is not able to view either the page on which the term appears or any other portion of the book.

Below is an example of the results a user might see after running an HDL full-text search:

[Image Omitted]

J.A. 681 ¶ 80 (Wilkin Decl.).

Second, the HDL allows member libraries to provide patrons with certified print disabilities access to the full text of copyrighted works. A "print disability" is any disability that prevents a person from effectively reading printed material. Blindness is one example, but print disabilities also include those that prevent a person from physically holding a book or turning pages. To use this service, a patron must obtain certification of his disability from a qualified expert. Through the HDL, a print-disabled user can obtain access to the contents of works in the digital library using adaptive technologies such as software that converts the text into spoken words, or that magnifies the text. Currently, the University of Michigan's library is the only HDL member that permits such access, although other member libraries intend to provide it in the future.

Third, by preserving the copyrighted books in digital form, the HDL permits members to create a replacement copy of the work, if the member already owned an original copy, the member's original copy is lost, destroyed, or stolen, and a replacement copy is unobtainable at a "fair" price elsewhere.

The HDL stores digital copies of the works in four different locations. One copy is stored on its primary server in Michigan, one on its secondary server in Indiana, and two on separate backup tapes at the University of Michigan.[3] Each copy contains the full text of the work, in a machine readable format, as well as the images of each page in the work as they appear in the print version.

B. The Orphan Works Project

Separate and apart from the HDL, in May 2011, the University of Michigan developed a project known as the Orphan Works Project (or "OWP"). An "orphan work" is an out-of-print work that is still in copyright, but whose copyright holder cannot be readily identified or located. See U.S. Copyright Office, Notice of Inquiry, Orphan Works and Mass Digitization, 77 Fed. Reg. 64555 (Oct. 22, 2012).

The University of Michigan conceived of the OWP in two stages: First, the project would attempt to identify out-of-print works, try to find their copyright holders, and, if no copyright holder could be found, publish a list of orphan works candidates to enable the copyright holders to come forward or be otherwise located. If no copyright holder came forward, the work was to be designated as an orphan work. Second, those works identified as orphan works would be made accessible in digital format to the OWP's library patrons (with simultaneous viewers limited to the number of hard copies owned by the library).

The University evidently became concerned that its screening process was not adequately distinguishing between orphan works (which were to be included in the OWP) and in-print works (which were not). As a result, before the OWP was brought online, but after the complaint was filed in this case, the University indefinitely suspended the project. No copyrighted work has been distributed or displayed through the project and it remains suspended as of this writing.

C. Proceedings in the District Court

This case began when twenty authors and authors' associations (collectively, the "Authors") sued HathiTrust, one of its member universities, and the presidents of four other member universities (collectively, the "Libraries") for copyright infringement seeking declaratory and injunctive relief. The National Federation of the Blind and three print-disabled students (the "Intervenors") were permitted to intervene to defend their ability to continue using the HDL.

The Libraries initially moved for partial judgment on the pleadings on the ground that the authors' associations lacked standing to assert claims on behalf of their members and that the claims related to the OWP were not ripe. See Fed. R. Civ. P. 12(c). The Libraries then moved for summary judgment on the remaining claims on the ground that their uses of copyrighted material were protected by the doctrine of fair use, see 17 U.S.C. § 107, and also by the Chafee Amendment, see id. § 121. The Intervenors moved for summary judgment on substantially the same grounds as the Libraries and, finally, the Authors cross-moved for summary judgment.

D. The District Court's Opinion

The district court granted the Libraries' and Intervenors' motions for summary judgment on the infringement claims on the basis that the three uses permitted by the HDL were fair uses. In this assessment, the district court gave considerable weight to what it found to be the "transformative" nature of the three uses and to what it described as the HDL's "invaluable" contribution to the advancement of knowledge, Authors Guild, Inc. v. HathiTrust, 902 F. Supp. 2d 445, 460-64 (S.D.N.Y. 2012). The district court explained:

Although I recognize that the facts here may on some levels be without precedent, I am convinced that they fall safely within the protection of fair use such that there is no genuine issue of material fact. I cannot imagine a definition of fair use that would not encompass the transformative uses made by [the HDL] and would require that I terminate this invaluable contribution to the progress of science and cultivation of the arts that at the same time effectuates the ideals espoused by the [Americans With Disabilities Act of 1990, Pub. L. No. 101-336, 104 Stat. 327 (codified as amended at 42 U.S.C. §§ 12101, et seq.)].

Id. at 464.

Next, the district court addressed the Libraries' Chafee Amendment defense. Under the Amendment, "authorized entities" are permitted to reproduce or distribute copies of a previously published, nondramatic literary work in specialized formats exclusively for use by the blind or other persons with disabilities. See 17 U.S.C. § 121; HathiTrust, 902 F. Supp. 2d at 465. Under § 121, an "`authorized entity' means a nonprofit organization or a governmental agency that has a primary mission to provide specialized services relating to training, education, or adaptive reading or information access needs of blind or other persons with disabilities." 17 U.S.C. § 121(d)(1).

The district court stated that the ADA requires that libraries of educational institutions, such as the Libraries in this case, "have a primary mission to reproduce and distribute their collections to print-disabled individuals," which, according to Judge Baer, made "each library a potential `authorized entity' under the Chafee Amendment." HathiTrust, 902 F. Supp. 2d at 465. As a result, the district court concluded that "[t]he provision of access to previously published non-dramatic literary works within the HDL fits squarely within the Chafee Amendment, although Defendants may certainly rely on fair use . . . to justify copies made outside of these categories or in the event that they are not authorized entities." Id.

The district court held that certain associational plaintiffs lacked standing under the Copyright Act and dismissed them from the suit. Id. at 450-55. The district court also held that the OWP claims were unripe for judicial review in the absence of crucial information about what the program would look like and whom it would affect should it be implemented, and because the Authors would suffer no hardship by deferring litigation until such time as the Libraries released the details of a new OWP and a revised list of orphan work candidates. Id. at 455-56. The court entered judgment against the Authors, and this appeal followed.

DISCUSSION

We review de novo under well-established standards the district court's decisions granting summary judgment and judgment on the pleadings. See Maraschiello v. City of Buffalo Police Dep't, 709 F.3d 87, 92 (2d Cir. 2013) (summary judgment); LaFaro v. N.Y. Cardiothoracic Grp., PLLC, 570 F. 3d 471, 475 (2d Cir. 2009) (judgment on the pleadings).

As a threshold matter, we consider whether the authors' associations have standing to assert infringement claims on behalf of their members.

Three of these authors' associations—Authors Guild, Inc., Australian Society of Authors Limited, and Writers' Union of Canada—claim to have standing, solely as a matter of U.S. law, to seek an injunction for copyright infringement on their members' behalf. But, as we have previously explained, § 501 of "the Copyright Act does not permit copyright holders to choose third parties to bring suits on their behalf." ABKCO Music, Inc. v. Harrisongs Music, Ltd., 944 F.2d 971, 980 (2d Cir. 1991); see also Itar-Tass Russian News Agency v. Russian Kurier, Inc., 153 F.3d 82, 92 (2d Cir. 1998) ("United States law permits suit only by owners of `an exclusive right under a copyright' . . . ." (quoting 17 U.S.C. § 501(b))). Accordingly, we agree with the district court that these associations lack standing to bring suit on behalf of their members, and they were properly dismissed from the suit.

The remaining four authors' associations—Union des Écrivaines et des Écrivains Québécois, Authors' Licensing and Collecting Society, Sveriges Författarförbund, and Norsk faglitterær forfattero og oversetterforening—assert that foreign law confers upon them certain exclusive rights to enforce the copyrights of their foreign members (an assertion that the Libraries do not contest on this appeal). These four associations do have standing to bring suit on behalf of their members. See Itar-Tass, 153 F.3d at 93-94 (recognizing that an association authorized by foreign law to administer its foreign members' copyrights has standing to seek injunctive relief on behalf of those members in U.S. court).

I. Fair Use[4]

A

As the Supreme Court has explained, the overriding purpose of copyright is "`[t]o promote the Progress of Science and useful Arts. . . .'" Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569, 574 (1994) (quoting U.S. CONST. art. I, § 8, cl. 8); see also Twentieth Century Music Corp. v. Aiken, 422 U.S. 151, 156 (1975). This goal has animated copyright law in Anglo-American history, beginning with the first copyright statute, the Statute of Anne of 1709, which declared itself to be "[a]n Act for the Encouragement of Learning, by Vesting the Copies of Printed Books in the Authors . . . during the Times therein mentioned." Act for the Encouragement of Learning, 8 Anne, ch. 19. In short, our law recognizes that copyright is "not an inevitable, divine, or natural right that confers on authors the absolute ownership of their creations. It is designed rather to stimulate activity and progress in the arts for the intellectual enrichment of the public." Pierre N. Leval, Toward a Fair Use Standard, 103 HARV. L. REV. 1105, 1107 (1990).

The Copyright Act furthers this core purpose by granting authors a limited monopoly over (and thus the opportunity to profit from) the dissemination of their original works of authorship. See 17 U.S.C. §§ 102, 106, 302-305. The Copyright Act confers upon authors certain enumerated exclusive rights over their works during the term of the copyright, including the rights to reproduce the copyrighted work and to distribute those copies to the public. Id. § 106(1), (3). The Act also gives authors the exclusive right to prepare certain new works—called "derivative works"—that are based upon the copyrighted work. Id. § 106(2). Paradigmatic examples of derivative works include the translation of a novel into another language, the adaptation of a novel into a movie or a play, or the recasting of a novel as an e-book or an audiobook. See id. § 101. As a general rule, for works created after January 1, 1978, copyright protection lasts for the life of the author plus an additional 70 years. Id. § 302.

At the same time, there are important limits to an author's rights to control original and derivative works. One such limit is the doctrine of "fair use," which allows the public to draw upon copyrighted materials without the permission of the copyright holder in certain circumstances. See id. § 107 ("[T]he fair use of a copyrighted work . . . is not an infringement of copyright."). "From the infancy of copyright protection, some opportunity for fair use of copyrighted materials has been thought necessary to fulfill copyright's very purpose, `[t]o promote the Progress of Science and useful Arts. . . .'" Campbell, 510 U.S. at 574.

Under the fair-use doctrine, a book reviewer may, for example, quote from an original work in order to illustrate a point and substantiate criticisms, see Folsom v. Marsh, 9 F. Cas. 342, 344 (C.C.D. Mass. 1841) (No. 4901), and a biographer may quote from unpublished journals and letters for similar purposes, see Wright v. Warner Books, Inc., 953 F.2d 731 (2d Cir. 1991). An artist may employ copyrighted photographs in a new work that uses a fundamentally different artistic approach, aesthetic, and character from the original. See Cariou v. Prince, 714 F.3d 694, 706 (2d Cir. 2013). An internet search engine can display low-resolution versions of copyrighted images in order to direct the user to the website where the original could be found. See Perfect 10, Inc. v. Amazon.com, Inc., 508 F.3d 1146, 1165 (9th Cir. 2007); Kelly v. Arriba Soft Corp., 336 F.3d 811, 818-22 (9th Cir. 2002). A newspaper can publish a copyrighted photograph (taken for a modeling portfolio) in order to inform and entertain the newspaper's readership about a news story. See Nunez v. Caribbean Int'l News Corp., 235 F.3d 18, 25 (1st Cir. 2000). A viewer can create a recording of a broadcast television show in order to view it at a later time. See Sony Corp. of Am. v. Universal City Studios, Inc., 464 U.S. 417, 447-450 (1984). And a competitor may create copies of copyrighted software for the purpose of analyzing that software and discovering how it functions (a process called "reverse engineering"). See Sony Comp. Entertainment, Inc. v. Connectix Corp., 203 F.3d 596, 599-601 (9th Cir. 2000).

The doctrine is generally subject to an important proviso: A fair use must not excessively damage the market for the original by providing the public with a substitute for that original work. Thus, a book review may fairly quote a copyrighted book "for the purposes of fair and reasonable criticism," Folsom, 9 F. Cas. at 344, but the review may not quote extensively from the "heart" of a forthcoming memoir in a manner that usurps the right of first publication and serves as a substitute for purchasing the memoir, Harper & Row, Publishers, Inc. v. Nation Enters., 471 U.S. 539 (1985).

In 1976, as part of a wholesale revision of the Copyright Act, Congress codified the judicially created fair-use doctrine at 17 U.S.C. § 107. See Copyright Act of 1976, Pub. L. No. 94-553, § 107, 90 Stat. 2541, 2546 (1976) (codified as amended at 17 U.S.C. § 107). Section 107 requires a court to consider four nonexclusive factors which are to be weighed together to assess whether a particular use is fair:

(1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes;

(2) the nature of the copyrighted work;

(3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and

(4) the effect of the use upon the potential market for or value of the copyrighted work.

17 U.S.C. § 107.

An important focus of the first factor is whether the use is "transformative." A use is transformative if it does something more than repackage or republish the original copyrighted work. The inquiry is whether the work "adds something new, with a further purpose or different character, altering the first with new expression, meaning or message. . . ." Campbell, 510 U.S. at 579 (citing Leval, 103 HARV. L. REV. at 1111). "[T]he more transformative the new work, the less will be the significance of other factors . . . that may weigh against a finding of fair use." Id. Contrary to what the district court implied, a use does not become transformative by making an "invaluable contribution to the progress of science and cultivation of the arts." HathiTrust, 902 F. Supp. 2d at 464. Added value or utility is not the test: a transformative work is one that serves a new and different function from the original work and is not a substitute for it.

The second factor considers whether the copyrighted work is "of the creative or instructive type that the copyright laws value and seek to foster." Leval, 103 HARV. L. REV. at 1117; see also Folsom, 9 F. Cas. at 348 ("[W]e must often . . . look to the nature and objects of the selections made . . . ."). For example, the law of fair use "recognizes a greater need to disseminate factual works than works of fiction or fantasy." Harper & Row, 471 U.S. at 563.

The third factor asks whether the secondary use employs more of the copyrighted work than is necessary, and whether the copying was excessive in relation to any valid purposes asserted under the first factor. Campbell, 510 U.S. at 586-87. In weighing this factor, we assess the quantity and value of the materials used and whether the amount copied is reasonable in relation to the purported justifications for the use under the first factor. Leval, 103 HARV. L. REV. at 1123.

Finally, the fourth factor requires us to assess the impact of the use on the traditional market for the copyrighted work. This is the "single most important element of fair use." Harper & Row, 471 U.S. at 566. To defeat a claim of fair use, the copyright holder must point to market harm that results because the secondary use serves as a substitute for the original work. See Campbell, 510 U.S. at 591 ("cognizable market harm" is limited to "market substitution"); see also NXIVM Corp. v. Ross Inst., 364 F.3d 471, 481-82 (2d Cir. 2004).

B

As discussed above, the Libraries permit three uses of the digital copies deposited in the HDL. We now consider whether these uses are "fair" within the meaning of our copyright law.

1. Full-Text Search

It is not disputed that, in order to perform a full-text search of books, the Libraries must first create digital copies of the entire books. Importantly, as we have seen, the HDL does not allow users to view any portion of the books they are searching. Consequently, in providing this service, the HDL does not add into circulation any new, human-readable copies of any books. Instead, the HDL simply permits users to "word search"—that is, to locate where specific words or phrases appear in the digitized books. Applying the relevant factors, we conclude that this use is a fair use.

i.

Turning to the first factor, we conclude that the creation of a full-text searchable database is a quintessentially transformative use. As the example on page 7, supra, demonstrates, the result of a word search is different in purpose, character, expression, meaning, and message from the page (and the book) from which it is drawn. Indeed, we can discern little or no resemblance between the original text and the results of the HDL full-text search.

There is no evidence that the Authors write with the purpose of enabling text searches of their books. Consequently, the full-text search function does not "supersede[] the objects [or purposes] of the original creation," Campbell, 510 U.S. at 579 (internal quotation marks omitted). The HDL does not "merely repackage[] or republish[] the original[s]," Leval, 103 HARV. L. REV. at 1111, or merely recast "an original work into a new mode of presentation," Castle Rock Entm't, Inc. v. Carol Publ'g Grp., Inc., 150 F.3d 132, 143 (2d Cir. 1998). Instead, by enabling full-text search, the HDL adds to the original something new with a different purpose and a different character.

Full-text search adds a great deal more to the copyrighted works at issue than did the transformative uses we approved in several other cases. For example, in Cariou v. Prince, we found that certain photograph collages were transformative, even though the collages were cast in the same medium as the copyrighted photographs. 714 F.3d at 706. Similarly, in Bill Graham Archives v. Dorling Kindersley Ltd., we held that it was a transformative use to include in a biography copyrighted concert photos, even though the photos were unaltered (except for being reduced in size). 448 F.3d 605, 609-11 (2d Cir. 2006); see also Blanch v. Koons, 467 F.3d 244, 252-53 (2d Cir. 2006) (transformative use of copyrighted photographs in collage painting); Leibovitz v. Paramount Pictures Corp., 137 F.3d 109, 114 (2d Cir. 1998) (transformative use of copyrighted photograph in advertisement).

Cases from other Circuits reinforce this conclusion. In Perfect 10, Inc., the Ninth Circuit held that the use of copyrighted thumbnail images in internet search results was transformative because the thumbnail copies served a different function from the original copyrighted images. 508 F.3d at 1165; accord Arriba Soft Corp., 336 F.3d at 819. And in A.V. ex rel. Vanderhye v. iParadigms, LLC, a company created electronic copies of unaltered student papers for use in connection with a computer program that detects plagiarism. Even though the electronic copies made no "substantive alteration to" the copyrighted student essays, the Fourth Circuit held that plagiarism detection constituted a transformative use of the copyrighted works. 562 F.3d 630, 639-40.

ii.

The second fair-use factor—the nature of the copyrighted work—is not dispositive. The HDL permits the full-text search of every type of work imaginable. Consequently, there is no dispute that the works at issue are of the type that the copyright laws value and seek to protect. However, "this factor `may be of limited usefulness where,' as here, `the creative work . . . is being used for a transformative purpose." Cariou, 714 F.3d at 710 (quoting Bill Graham Archives, 448 F.3d at 612). Accordingly, our fair-use analysis hinges on the other three factors.

iii.

The third factor asks whether the copying used more of the copyrighted work than necessary and whether the copying was excessive. As we have noted, "[t]here are no absolute rules as to how much of a copyrighted work may be copied and still be considered a fair use." Maxtone-Graham v. Burtchaell, 803 F.2d 1253, 1263 (2d Cir. 1986). "[T]he extent of permissible copying varies with the purpose and character of the use." Campbell, 510 U.S. at 586-87. The crux of the inquiry is whether "no more was taken than necessary." Id. at 589. For some purposes, it may be necessary to copy the entire copyrighted work, in which case Factor Three does not weigh against a finding of fair use. See Bill Graham Archives, 448 F.3d at 613 (entire image copied); Arriba Soft, 336 F.3d at 821 ("If Arriba only copied part of the image, it would be more difficult to identify it, thereby reducing the usefulness of the visual search engine.").

In order to enable the full-text search function, the Libraries, as we have seen, created digital copies of all the books in their collections.[5] Because it was reasonably necessary for the HDL to make use of the entirety of the works in order to enable the full-text search function, we do not believe the copying was excessive.

The Authors also contend that the copying is excessive because the HDL creates and maintains copies of the works at four different locations Appellants' Br. 27-28. But the record demonstrates that these copies are also reasonably necessary in order to facilitate the HDL's legitimate uses. In particular, the HDL's services are offered to patrons through two servers, one at the University of Michigan (the primary server) and an identical one at the University of Indiana (the "mirror" server). Both servers contain copies of the digital works at issue. According to the HDL executive director, the "existence of a[n] [identical] mirror site allows for balancing the load of user web traffic to avoid overburdening a single site, and each site acts as a back-up of the HDL collection in the event that one site were to cease operation (for example, due to failure caused by a disaster, or even as a result of routine maintenance)." J.A. 682-83 ¶ 88-89 (Wilkin Decl.). To further guard against the risk of data loss, the HDL stores copies of the works on two encrypted backup tapes, which are disconnected from the internet and are placed in separate secure locations on the University of Michigan campus. Id. at 683 ¶ 90. The HDL creates these backup tapes so that the data could be restored in "the event of a disaster causing large-scale data loss" to the primary and mirror servers. Id.

We have no reason to think that these copies are excessive or unreasonable in relation to the purposes identified by the Libraries and permitted by the law of copyright. In sum, even viewing the evidence in the light most favorable to the Authors, the record demonstrates that these copies are reasonably necessary to facilitate the services HDL provides to the public and to mitigate the risk of disaster or data loss. Accordingly, we conclude that this factor favors the Libraries.

iv.

The fourth factor requires us to consider "the effect of the use upon the potential market for or value of the copyrighted work," 17 U.S.C. § 107(4), and, in particular, whether the secondary use "usurps the market of the original work," NXIVM Corp., 364 F.3d at 482.

The Libraries contend that the full-text-search use poses no harm to any existing or potential traditional market and point to the fact that, in discovery, the Authors admitted that they were unable to identify "any specific, quantifiable past harm, or any documents relating to any such past harm," resulting from any of the Libraries' uses of their works (including full-text search). Defs.-Appellees' Br. 38 (citing Pls.' Resps. to Interrogs.). The district court agreed with this contention, as do we.

At the outset, it is important to recall that the Factor Four analysis is concerned with only one type of economic injury to a copyright holder: the harm that results because the secondary use serves as a substitute for the original work. See Campbell, 510 U.S. at 591 ("cognizable market harm" is limited to "market substitution"). In other words, under Factor Four, any economic "harm" caused by transformative uses does not count because such uses, by definition, do not serve as substitutes for the original work. See Bill Graham Archives, 448 F.3d at 614.

To illustrate why this is so, consider how copyright law treats book reviews. Book reviews often contain quotations of copyrighted material to illustrate the reviewer's points and substantiate his criticisms; this is a paradigmatic fair use. And a negative book review can cause a degree of economic injury to the author by dissuading readers from purchasing copies of her book, even when the review does not serve as a substitute for the original. But, obviously, in that case, the author has no cause for complaint under Factor Four: The only market harms that count are the ones that are caused because the secondary use serves as a substitute for the original, not when the secondary use is transformative (as in quotations in a book review). See Campbell, 510 U.S. at 591-92 ("[W]hen a lethal parody, like a scathing theater review, kills demand for the original, it does not produce a harm cognizable under the Copyright Act.").

The Authors assert two reasons why the full-text-search function harms their traditional markets. The first is a "lost sale" theory which posits that a market for licensing books for digital search could possibly develop in the future, and the HDL impairs the emergence of such a market because it allows patrons to search books without any need for a license. Thus, according to the Authors, every copy employed by the HDL in generating full-text searches represents a lost opportunity to license the book for search. Appellants' Br. 43.

This theory of market harm does not work under Factor Four, because the full-text search function does not serve as a substitute for the books that are being searched. See Campbell, 510 U.S. at 591-92; Bill Graham Archives, 448 F.3d at 614. Thus, it is irrelevant that the Libraries might be willing to purchase licenses in order to engage in this transformative use (if the use were deemed unfair). Lost licensing revenue counts under Factor Four only when the use serves as a substitute for the original and the full-text-search use does not.

Next, the Authors assert that the HDL creates the risk of a security breach which might impose irreparable damage on the Authors and their works. In particular, the Authors speculate that, if hackers were able to obtain unauthorized access to the books stored at the HDL, the full text of these tens of millions of books might be distributed worldwide without restriction, "decimat[ing]" the traditional market for those works. Appellants' Br. 40.

The record before us documents the extensive security measures the Libraries have undertaken to safeguard against the risk of a data breach. Some of those measures were described by the HDL executive director as follows:

First, [HDL] maintains . . . rigorous physical security controls. HDL servers, storage, and networking equipment at Michigan and Indiana University are mounted in locked racks, and only six individuals at Michigan and three at Indiana University have keys. The data centers housing HDL servers, storage, and networking equipment at each site location are monitored by video surveillance, and entry requires use of both a keycard and a biometric sensor.

Second, network access to the HDL corpus is highly restricted, even for the staff of the data centers housing HDL equipment at Michigan and Indiana University. For example, two levels of network firewalls are in place at each site, and Indiana University data

center staff do not have network access to the HDL corpus, only access to the physical equipment. For the backup tapes, network access is limited to the administrators of the backup system, and these individuals are not provided the encryption key that would be required to access the encrypted files on the backup tapes.

Web access to the HDL corpus is also highly restricted. Access by users of the HDL service is governed by primarily by [sic] the HDL rights database, which classifies each work by presumed copyright status, and also by a user's authentication to the system (e.g., as an individual certified to have a print disability by Michigan's Office of Services for Students with Disabilities).. . .

Even where we do permit a work to be read online, such as a work in the public domain, we make efforts to ensure that inappropriate levels of access do not take place. For example, a mass download prevention system called "choke" is used to measure the rate of activity (such as the rate a user is reading pages) by each individual user. If a user's rate of activity exceeds certain thresholds, the system assumes that the user is mechanized (e.g., a web robot) and blocks that user's access for a set period of time.

J.A. 683-85 ¶¶ 94-96, 98 (Wilkins Decl.).

This showing of the security measures taken by the Libraries is essentially unrebutted. Consequently, we see no basis in the record on which to conclude that a security breach is likely to occur, much less one that would result in the public release of the specific copyrighted works belonging to any of the plaintiffs in this case. Cf. Clapper v. Amnesty Int'l USA, ___ U.S. ___, ___, 133 S. Ct. 1138, 1143, 1149 (2013) (risk of future harm must be "certainly impending," rather than merely "conjectural" or "hypothetical," to constitute a cognizable injury-in-fact); Sony Corp., 464 U.S. at 453-54 (concluding that time-shifting using a Betamax is fair use because the copyright owners' "prediction that live television or movie audiences will decrease" was merely "speculative"). Factor Four thus favors a finding of fair use.

Without foreclosing a future claim based on circumstances not now predictable, and based on a different record, we hold that the balance of relevant factors in this case favors the Libraries. In sum, we conclude that the doctrine of fair use allows the Libraries to digitize copyrighted works for the purpose of permitting full-text searches.

2. Access to the Print-Disabled

The HDL also provides print-disabled patrons with versions of all of the works contained in its digital archive in formats accessible to them. In order to obtain access to the works, a patron must submit documentation from a qualified expert verifying that the disability prevents him or her from reading printed materials, and the patron must be affiliated with an HDL member that has opted-into the program. Currently, the University of Michigan is the only HDL member institution that has opted-in. We conclude that this use is also protected by the doctrine of fair use.

i.

In applying the Factor One analysis, the district court concluded that "[t]he use of digital copies to facilitate access for print-disabled persons is [a] transformative" use. HathiTrust, 902 F. Supp. 2d at 461. This is a misapprehension; providing expanded access to the print disabled is not "transformative."

As discussed above, a transformative use adds something new to the copyrighted work and does not merely supersede the purposes of the original creation. See Campbell, 510 U.S. at 579. The Authors state that they "write books to be read (or listened to)." Appellants' Br. 34-35. By making copyrighted works available in formats accessible to the disabled, the HDL enables a larger audience to read those works, but the underlying purpose of the HDL's use is the same as the author's original purpose.

Indeed, when the HDL recasts copyrighted works into new formats to be read by the disabled, it appears, at first glance, to be creating derivative works over which the author ordinarily maintains control. See 17 U.S.C. § 106(2). As previously noted, paradigmatic examples of derivative works include translations of the original into a different language, or adaptations of the original into different forms or media. See id. § 101 (defining "derivative work"). The Authors contend that by converting their works into a different, accessible format, the HDL is simply creating a derivative work.

It is true that, oftentimes, the print-disabled audience has no means of obtaining access to the copyrighted works included in the HDL. But, similarly, the non-English-speaking audience cannot gain access to untranslated books written in English and an unauthorized translation is not transformative simply because it enables a new audience to read a work.

This observation does not end the analysis. "While a transformative use generally is more likely to qualify as fair use, `transformative use is not absolutely necessary for a finding of fair use.'" Swatch Grp. Mgmt. Servs. Ltd. v. Bloomberg L.P., ___ F.3d ___, ___, 2014 WL 2219162, at *7 (2d Cir. 2014) (quoting Campbell, 510 U.S. at 579). We conclude that providing access to the print-disabled is still a valid purpose under Factor One even though it is not transformative. We reach that conclusion for several reasons.

First, the Supreme Court has already said so. As Justice Stevens wrote for the Court: "Making a copy of a copyrighted work for the convenience of a blind person is expressly identified by the House Committee Report as an example of fair use, with no suggestion that anything more than a purpose to entertain or to inform need motivate the copying." Sony Corp. of Am., 464 U.S. at 455 n.40.

Our conclusion is reinforced by the legislative history on which he relied. The House Committee Report that accompanied codification of the fair use doctrine in the Copyright Act of 1976 expressly stated that making copies accessible "for the use of blind persons" posed a "special instance illustrating the application of the fair use doctrine . . . ." H.R. REP. NO. 94-1476, at 73 (1976), reprinted in 1976 U.S.C.C.A.N. 5659, 5686. The Committee noted that "special [blind-accessible formats] . . . are not usually made by the publishers for commercial distribution." Id. In light of its understanding of the market (or lack thereof) for books accessible to the blind, the Committee explained that "the making of a single copy or phonorecord by an individual as a free service for a blind persons [sic] would properly be considered a fair use under section 107." Id. We believe this guidance supports a finding of fair use in the unique circumstances presented by print-disabled readers.

Since the passage of the 1976 Copyright Act, Congress has reaffirmed its commitment to ameliorating the hardships faced by the blind and the print disabled. In the Americans with Disabilities Act, Congress declared that our "Nation's proper goals regarding individuals with disabilities are to assure equality of opportunity, full participation, independent living, and economic self-sufficiency for such individuals." 42 U.S.C. § 12101(7). Similarly, the Chafee Amendment illustrates Congress's intent that copyright law make appropriate accommodations for the blind and print disabled. See 17 U.S.C. § 121.

ii.

Through the HDL, the disabled can obtain access to copyrighted works of all kinds, and there is no dispute that those works are of the sort that merit protection under the Copyright Act. As a result, Factor Two weighs against fair use. This does not preclude a finding of fair use, however, given our analysis of the other factors. Cf. Davis v. Gap, Inc., 246 F.3d 152, 175 (2d Cir. 2001) ("The second statutory factor, the nature of the copyrighted work . . ., is rarely found to be determinative.").

iii.

Regarding Factor Three, as previously noted, the HDL retains copies as digital image files and as text-only files, which are then stored in four separate locations. The Authors contend that this amount of copying is excessive because the Libraries have not demonstrated their need to retain the digital image files in addition to the text files.

We are unconvinced. The text files are required for text searching and to create text-to-speech capabilities for the blind and disabled. But the image files will provide an additional and often more useful method by which many disabled patrons, especially students and scholars, can obtain access to these works. These image files contain information, such as pictures, charts, diagrams, and the layout of the text on the printed page that cannot be converted to text or speech. None of this is captured by the HDL's text-only copies. Many legally blind patrons are capable of viewing these images if they are sufficiently magnified or if the color contrasts are increased. And other disabled patrons, whose physical impairments prevent them from turning pages or from holding books, may also be able to use assistive devices to view all of the content contained in the image files for a book. For those individuals, gaining access to the HDL's image files—in addition to the text-only files—is necessary to perceive the books fully. Consequently, it is reasonable for the Libraries to retain both the text and image copies.[6]

iv.

The fourth factor also weighs in favor of a finding of fair use. It is undisputed that the present-day market for books accessible to the handicapped is so insignificant that "it is common practice in the publishing industry for authors to forgo royalties that are generated through the sale of books manufactured in specialized formats for the blind. . . ." Appellants' Br. 34. "[T]he number of accessible books currently available to the blind for borrowing is a mere few hundred thousand titles, a minute percentage of the world's books. In contrast, the HDL contains more than ten million accessible volumes." J.A. 173 ¶ 10 (Maurer Decl.). When considering the 1976 Act, Congress was well aware of this problem. The House Committee Report observed that publishers did not "usually ma[ke]" their books available in specialized formats for the blind. H.R. REP. NO. 94-1476, at 73, 1976 U.S.C.C.A.N. at 5686. That observation remains true today.

Weighing the factors together, we conclude that the doctrine of fair use allows the Libraries to provide full digital access to copyrighted works to their print-disabled patrons.[7]

3. Preservation

By storing digital copies of the books, the HDL preserves them for generations to come, and ensures that they will still exist when their copyright terms lapse. Under certain circumstances, the HDL also proposes to make one additional use of the digitized works while they remain under copyright: The HDL will permit member libraries to create a replacement copy of a book, to be read and consumed by patrons, if (1) the member already owned an original copy, (2) the member's original copy is lost, destroyed, or stolen, and (3) a replacement copy is unobtainable at a fair price. The Authors claim that this use infringes their copyrights.

Even though the parties assume that this issue is appropriate for our determination, we are not convinced that this is so. The record before the district court does not reflect whether the plaintiffs own copyrights in any works that would be effectively irreplaceable at a fair price by the Libraries and, thus, would be potentially subject to being copied by the Libraries in case of the loss or destruction of an original. The Authors are not entitled to make this argument on behalf of others, because § 501 of "the Copyright Act does not permit copyright holders to choose third parties to bring suits on their behalf." ABKCO Music, 944 F.2d at 980; see also our discussion of standing, supra pp. 12-13.

Because the record before us does not reflect the existence of a non-speculative risk that the HDL might create replacement copies of the plaintiffs' copyrighted work, we do not believe plaintiffs have standing to bring this claim, and this concern does not present a live controversy for adjudication. See Clapper, ___ U.S. at ___, 133 S. Ct. at 1147; Jennifer Matthew Nursing & Rehab. Ctr. v. U.S. Dep't of Health & Human Servs., 607 F.3d 951, 955 (2d Cir. 2010) (noting that we have an "independent obligation" to evaluate subject matter jurisdiction, including whether there is "a live controversy"). Accordingly, we vacate the district court's judgment insofar as it adjudicated this issue without first considering whether plaintiffs have standing to challenge the preservation use of the HDL, and we remand for the district court to so determine.

II. Ripeness of Claims Relating to the Orphan Works Project

The district court also held that the infringement claims asserted in connection with the OWP were not ripe for adjudication because the project has been abandoned and the record contained no information about whether the program will be revived and, if so, what it would look like or whom it would affect. HathiTrust, 902 F. Supp. 2d at 455-56. We agree.

In considering whether a claim is ripe, we consider (1) "the fitness of the issues for judicial decision" and (2) "the hardship to the parties of withholding court consideration." Murphy v. New Milford Zoning Comm'n, 402 F.3d 342, 347 (2d Cir. 2005) (quoting Abbott Labs. v. Gardner, 387 U.S. 136, 149 (1967)).

The fitness analysis is concerned with whether the issues sought to be adjudicated are contingent on unknowable future events. N.Y. Civil Liberties Union v. Grandeau, 528 F. 3d 122, 132 (2d Cir. 2008). The Authors assert that their OWP claim is fit for judicial decision because it "will not change based upon the particular procedures that [the University of Michigan] ultimately employs to identify orphan works." Appellants' Br. 13. According to the Authors, the legality of the OWP does not depend upon the specific means the Libraries ultimately employ to identify orphan candidates or the time the Libraries wait before making works available. Rather, the Authors believe that any iteration of the OWP that results in the publication of complete copyrighted works is an infringement of copyright.

We are not persuaded that these concerns create a ripe dispute. Even assuming, arguendo, that "[a]ny iteration of the OWP under which copyrighted works are made available for public view and download" would infringe someone's copyright, id., it does not follow that the OWP will inevitably infringe the copyrights held by the remaining plaintiffs in this case.[8] It is conceivable that, should the University of Michigan ever revive the OWP, the procedures it ultimately implements to identify orphan works would successfully identify and exclude works to which a plaintiff in this suit holds a copyright. Consequently, we cannot say that any of the plaintiffs face a "certainly impending" harm under our ripeness analysis, Clapper, ___ U.S. at ___, 133 S. Ct. at 1147; see also Grandeau, 528 F.3d at 130 n.8.

Nor do we perceive any hardship if decision is withheld. See Grandeau, 528 F.3d at 134. The Authors argue that they would suffer hardship because "there is nothing to stop the Libraries from reinstituting the OWP and then, if owners of the listed works come forward, suspending it again." Appellants' Br. 16.

We disagree. As indicated above, it is far from clear that the University of Michigan or HathiTrust will reinstitute the OWP in a manner that would infringe the copyrights of any proper plaintiffs. If that occurs, the Authors may always return to court. Suffice it to say that "[t]he mere possibility of future injury, unless it is the cause of some present detriment, does not constitute hardship." Grandeau, 528 F.3d at 134 (internal quotation marks omitted). For these reasons, we conclude that the OWP claims are not ripe for adjudication.

CONCLUSION

The judgment of the district court is AFFIRMED, in part, insofar as the district court concluded that certain plaintiffs-appellants lack associational standing; that the doctrine of "fair use" allows defendants-appellees to create a full-text searchable database of copyrighted works and to provide those works in formats accessible to those with disabilities; and that claims predicated upon the Orphan Works Project are not ripe for adjudication. We VACATE the judgment, in part, insofar as it rests on the district court's holding related to the claim of infringement predicated upon defendants-appellees' preservation of copyrighted works, and we REMAND for further proceedings consistent with this opinion.

[1] Pursuant to Federal Rule of Appellate Procedure 43(c)(2), we automatically substitute the current president of the University of California, Janet Napolitano, and the current president of the University of Wisconsin System, Raymond W. Cross, in place of their predecessors-in-office.

[2] The Clerk of Court is directed to amend the caption as set forth above.

[3] Separate from the HDL, one copy is also kept by Google. Google's use of its copy is the subject of a separate lawsuit currently pending in this Court. See Authors Guild, Inc. v. Google, Inc., 721 F.3d 132 (2d Cir. 2013), on remand, 954 F. Supp. 2d 282 (S.D.N.Y. 2013), appeal docketed, No. 13-4829 (2d Cir. Dec. 23, 2013).

[4] Plaintiffs argue that the fair use defense is inapplicable to the activities at issue here, because the Copyright Act includes another section, 108, which governs "Reproduction [of copyrighted works] by Libraries . . ." 17 U.S.C. § 108. However, section 108 also includes a "savings clause," which states, "Nothing in this section in any way affects the right of fair use as provided by section 107. . . ." § 108(f)(4). Thus, we do not construe § 108 as foreclosing our analysis of the Libraries' activities under fair use, and we proceed with that analysis.

[5] The HDL also creates digital copies of the images of each page of the books. As the Libraries acknowledge, the HDL does not need to retain these copies to enable the full-text search use. We discuss the fair-use justification for these copies in the context of the disability-access use, see infra pp. 29-30.

[6] The Authors also complain that the HDL creates and maintains four separate copies of the copyrighted works at issue. Appellants' Br. 27-28. For reasons discussed in the full-text search section, this does not preclude a finding of fair use. See supra pp. 20-22.

[7] In light of our holding, we need not consider whether the disability-access use is protected under the Chafee Amendment, 17 U.S.C. § 121.

[8] We note that, in addition to our conclusion about ripeness, the same reasoning leads us to conclude that the remaining plaintiffs lack standing to bring this claim, see our discussion of standing, supra pp. 12-13.

6.3.2 Los Angeles Times v. Free Republic 6.3.2 Los Angeles Times v. Free Republic

This case comes out differently on fair use than the book search case, despite the use of new. Why?

LOS ANGELES TIMES, and The Washington Post Company and its wholly owned subsidiary, Washingtonpost.Newsweek Interactive Company, Plaintiffs,
v.
FREE REPUBLIC, Electronic Orchard, Jim Robinson, and Does 1 Through 10, inclusive, Defendants.

No. CV 98–7840 MMM (AJWx).

United States District Court, C.D. California

April 4, 2000.

ORDER GRANTING PLAINTIFFS' MOTION FOR PARTIAL SUMMARY JUDGMENT AND DENYING DEFENDANTS' MOTION FOR SUMMARY JUDGMENT

MARGARET M. MORROW, District Judge.

[1] Plaintiffs Los Angeles Times and The Washington Post Company publish newspapers in print and online versions. Defendant Free Republic is a "bulletin board" website whose members use the site to post news articles to which they add remarks or commentary. Other visitors to the site then read the articles and add their comments. For the most part, Free Republic members post the entire text of articles in which they are interested; among these are verbatim copies of articles from the Los Angeles Times and Washington Post websites. Plaintiffs' complaint alleges that the unauthorized copying and posting of the articles on the Free Republic site constitutes copyright infringement.

Defendants have now moved for summary judgment. They assert that the copying of news articles onto their website is protected by the fair use doctrine. Plaintiffs have filed a cross-motion for partial summary judgment, arguing that defendants may not invoke fair use as a defense.

The fair use doctrine, codified at 17 U.S.C. § 107, permits the reproduction of copyrighted works for certain purposes. Section 107 sets forth four nonexclusive factors to be considered in determining whether a defendant's copying is fair use: "(1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; (2) the nature of the copyrighted work; (3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and (4) the effect of the use upon the potential market for or value of the copyrighted work." 17 U.S.C. § 107. Based on the evidence submitted by the parties, the court concludes that the first, third and fourth factors militate against a finding of fair use in this case. The second factor weighs in defendants' favor. The balance of all factors tips toward plaintiffs, and the court thus finds that defendants are not entitled to assert a fair use defense to the claims of copyright infringement alleged in the complaint.

Defendants also allege that the First Amendment protects the posting of plaintiffs' news articles to their website. They contend that, absent wholesale copying, Free Republic visitors will be unable to express their criticism and comments. There are other methods in which the visitors' rights of free expression can be protected, however, and the court cannot conclude that enforcing plaintiffs' rights under the copyright law impermissibly restricts defendants' right to free speech.

I. FACTUAL BACKGROUND[1]

A. The Parties

Plaintiffs publish the Los Angeles Times and The Washington Post in print and online at "http://www.latimes.com" and "http://www.washingtonpost.com."[2] Their respective websites contain the current edition of the newspaper, which can be viewed free of charge, and archived articles that users must pay to view,[3] The Times charges $1.50 to view an archived article, while the Post charges from $1.50 to $2.95 depending on the time of day.[4] In addition to income generated in this fashion, the websites also produce advertising and licensing revenue for the papers.[5] Because advertising is sold "CPM" (cost per thousand), the revenue generated from this source depends on the volume of traffic the sites experience during a given period.[6] The parties dispute the extent to which being able to access archived articles at a different site for free affects plaintiffs' ability to advertise, license, and sell the archived articles.[7]

[2] Defendant Jim Robinson is the owner and operator of defendants Electronic Orchard and Free Republic.[8] Although no longer actively engaged in business, Electronic Orchard is a for-profit limited liability company that offers "Internet programming and design services."[9] Free Republic is a limited liability corporation that operates freerepublic.com.[10] The website, which has been operational since 1996, allows registered visitors to "post" news articles and comments concerning them on the site.[11] Registered members may then post additional comments.[12] Free Republic has approximately 20,000 registered participants. The website receives as many as 100,000 hits per day, and between 25 and 50 million page views each month.[13]

Plaintiffs contend that "perfect copies" of news articles appearing in their publications and on their websites are posted to the Free Republic site. Defendants maintain that the posted articles are merely "purported copies" of the original, and assert that one can verify that a posting is an exact copy only by visiting plaintiffs' websites.[14] Defendants nonetheless apparently concede that some of the postings are verbatim copies of original articles.[15]

B. Defendants' Profit Or Non–Profit Status

The parties dispute whether Free Republic is a for-profit or not-for-profit entity.[16] Despite this purported disagreement, it appears uncontroverted that Free Republic is presently a for-profit limited liability company. Free Republic's corporate counsel is currently preparing documents seeking tax-exempt status for the Free Republic Institute, a company incorporated on September 27, 1999.[17]Nothing has yet been submitted to the IRS, however, and tax-exempt status has not been granted.[18]

Defendants contend that Robinson was not paid to create the Free Republic website, that he receives no salary from the entity, and that he receives almost no compensation for posting banners or links on the site.[19] Plaintiffs counter that Free Republic earns revenue through commercial advertising, merchandise sales, saleable consumer data, donations, "voluntary" subscriptions, and membership dues.[20] They also assert that Robinson uses the Free Republic site to advertise Electronic Orchard's services.[21]

Defendants dispute these claims, contending that they have received no advertising revenue, commissions or donations for permitting various individuals and entities to place links on the freerepublic.com site. They assert, in fact, that the links have in some instances been posted on the site by third-party users.[22] Defendants also contend that Electronic Orchard has received no business or financial benefit from any links appearing on the Free Republic website, and that Robinson has placed links for Electronic Orchard customers there solely as a courtesy.[23] Defendants maintain that Free Republic does not collect consumer data, and that it has not sold any information regarding its registered users to any other entity.[24] Additionally, they contend they have no connection with membership organizations of Free Republic supporters, and receive no benefit from dues revenue generated by these groups.[25]Defendants concede, however, that Free Republic has facilitated links to web pages run by third-party supporters where donations to Free Republic and/or Robinson are solicited. They also acknowledge that the website carries links to third-party web pages that offer Free Republic-related souvenir items in exchange for donations.[26]

C. The Impact Of The Free Republic Site On Traffic At Plaintiffs' Websites

[3] The parties also dispute whether the posting of plaintiffs' news articles to the Free Republic site causes an increase or decrease in traffic at the Times and Post websites, whether it diminishes the available market for sale of plaintiffs' news articles, and whether it has a negative impact on plaintiffs' ability to license the works. Defendants assert that plaintiffs' websites actually gain viewers because people go to them after visiting the Free Republic site.[27] Plaintiffs maintain they lose traffic when Internet users read an article posted on freerepublic.com rather than visiting the Times or Post websites. They further assert that their ability to sell copies of the archived articles and their ability to license the works is diminished by having copies made freely available on the Free Republic site.[28]

II. DISCUSSION

A. Legal Standard Governing Motions For Summary Judgment

A motion for summary judgment must be granted when "the pleadings, depositions, answers to interrogatories, and admissions on file, together with the affidavits, if any, show that there is no genuine issue as to any material fact and that the moving party is entitled to a judgment as a matter of law." Fed.R.Civ.P. 56(c). A party seeking summary judgment bears the initial burden of informing the court of the basis for its motion and of identifying those portions of the pleadings and discovery responses which demonstrate the absence of a genuine issue of material fact. See Celotex Corp. v. Catrett, 477 U.S. 317, 323, 106 S.Ct. 2548, 91 L.Ed.2d 265 (1986). Where the moving party will have the burden of proof on an issue at trial, the movant must affirmatively demonstrate that no reasonable trier of fact could find other than for the moving party. On an issue as to which the nonmoving party will have the burden of proof at trial, however, the movant can prevail merely by pointing out that there is an absence of evidence to support the nonmoving party's case. See id. If the moving party meets its initial burden, the nonmoving party must then set forth, by affidavit or as otherwise provided in Rule 56, "specific facts showing that there is a genuine issue for trial." Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 250, 106 S.Ct. 2505, 91 L.Ed.2d 202 (1986); Fed.R.Civ.P. 56(e).

In judging evidence at the summary judgment stage, the court does not make credibility determinations or weigh conflicting evidence. Rather, it draws all inferences in the light most favorable to the nonmoving party. See T.W. Electric Service, Inc. v. Pacific Electric Contractors Ass'n, 809 F.2d 626, 630–31 (9th Cir.1987). The evidence presented by the parties must be admissible. Fed.R.Civ.P. 56(e). Conclusory, speculative testimony in affidavits and moving papers is not sufficient to raise genuine issues of fact and defeat summary judgment. See Falls Riverway Realty, Inc. v. Niagara Falls, 754 F.2d 49, 56 (2d Cir.1985); Thornhill Pub. Co., Inc. v. GTE Corp., 594 F.2d 730, 738 (9th Cir.1979).

[4] Fair use is a mixed question of law and fact. Harper & Row, Publishers, Inc. v. Nation Enter., 471 U.S. 539, 560, 105 S.Ct. 2218, 85 L.Ed.2d 588 (1985). It is nonetheless proper to decide the issue at the summary judgment stage if the historical facts are undisputed and the only question is the proper legal conclusion to be drawn from those facts. Narell v. Freeman, 872 F.2d 907, 910 (9th Cir.1989) ("Fair use is a mixed question of law and fact that may be resolved on summary judgment if a reasonable trier of fact could reach only one conclusion"); Hustler Magazine, Inc. v. Moral Majority, Inc., 796 F.2d 1148, 1151 (9th Cir.1986) ("If there are no genuine issues of material fact, or if, even after resolving all issues in favor of the opposing party, a reasonable trier of fact can reach only one conclusion, a court may conclude as a matter of law whether the challenged use qualifies as a fair use of the copyrighted work"); Fisher v. Dees, 794 F.2d 432, 436 (9th Cir.1986) (fair use issue was properly resolved on summary judgment because "[n]o material historical facts [were] at issue in this case [and t]he parties dispute[d] only the ultimate conclusions to be drawn from the admitted facts").

B. Elements Of Copyright Infringement

"Copyright law protects an author's expression; facts and ideas within a work are not protected." Shaw v. Lindheim, 919 F.2d 1353, 1356 (9th Cir.1990). See also Sid & Marty Kroft Television Productions v. McDonald's Corp., 562 F.2d 1157, 1163 (9th Cir.1977) ("It is an axiom of copyright law that the protection granted to a copyrighted work extends only to the particular expression of the idea and never to the idea itself"). Copyright infringement is established by demonstrating (1) ownership of a valid copyright and (2) copying of the original elements of the protected work. Feist Publications v. Rural Telephone Service Co., 499 U.S. 340, 361, 111 S.Ct. 1282, 113 L.Ed.2d 358 (1991); Kouf v. Walt Disney Pictures & Television, 16 F.3d 1042, 1043, n. 2 (9th Cir.1994). To prove copying, plaintiffs must show that defendants had access to the copyrighted work and that there is a substantial similarity between the copyrighted work and defendants' work. Brown Bag Software v. Symantec Corp., 960 F.2d 1465, 1472 (9th Cir.1992); Chase–Riboud v. Dreamworks, Inc., 987 F.Supp. 1222, 1224 (C.D.Cal.1997).

Before proceeding to the substance of the parties' motions, it is important to state what issues are not before the court at this time. Because the parties address the availability of a defense to copyright infringement, their motions assume for present purposes that such a claim can be proved. The court expresses no opinion as to whether this is so, given that the "copying" of news articles at issue in this case is to a large extent copying by third-party users of the Free Republic site. The court also makes no determination as to whether plaintiffs have in any manner consented to the copying of their articles.[29]

C. The Fair Use Defense

[5] The fair use defense is a limitation on the exclusive right of a copyright owner "to reproduce the copyrighted work in copies." 17 U.S.C. § 106(1). It is codified at 17 U.S.C. § 107, which provides:

"Notwithstanding the provisions of sections 106 and 106A, the fair use of a copyrighted work, including such use by reproduction in copies or phonorecords or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright. In determining whether the use made of a work in any particular case is a fair use the factors to be considered shall include—

(1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes;

(2) the nature of the copyrighted work;

(3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and

(4) the effect of the use upon the potential market for or value of the copyrighted work.

The fact that a work is unpublished shall not itself bar a finding of fair use if such finding is made upon consideration of all the above factors."

Because fair use is an affirmative defense to a claim of infringement, defendants carry the burden of proof on the issue. American Geophysical Union v. Texaco Inc., 60 F.3d 913, 918 (2d Cir.1995); Columbia Pictures v. Miramax Films Corp., 11 F.Supp.2d 1179, 1187 (C.D.Cal.1998) ("[b]ecause fair use is an affirmative defense, Defendants bear the burden of proof on all of its factors"). See also Dr. Seuss Enterprises, L.P. v. Penguin Books USA, Inc., 109 F.3d 1394, 1403 (9th Cir.), cert. dismissed, 521 U.S. 1146, 118 S.Ct. 27, 138 L.Ed.2d 1057 (1997).

1. The Purpose And Character Of The Use

The first factor listed in § 107 is "the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes." 17 U.S.C. § 107. This factor assesses whether "the new work 'merely supersedes the objects' of the original creation, or instead adds something new, with a further purpose or different character, altering the first with new expression, meaning, or message; it asks, in other words, whether and to what extent the new work is 'transformative.' " Campbell v. Acuff–Rose Music, Inc., 510 U.S. 569, 579, 114 S.Ct. 1164, 127 L.Ed.2d 500 (1995) (quoting Folsom v. Marsh, 9 F.Cas. 342, 348 (D.Mass.1841)). "... [T]he more transformative the new work, the less will be the significance of other factors, like commercialism, that may weigh against a finding of fair use." Campbell, supra, 510 U.S. at 579.

Inquiry concerning the character and purpose of a challenged use should be guided by the examples provided in the statute—i.e., whether the use was for purposes of "criticism, comment, news reporting, teaching ..., scholarship, or research." 17 U.S.C. § 107; Campbell, supra. The list, however, is not intended to be exhaustive or to single out any particular use as presumptively fair. Harper & Row, supra, 471 U.S. at 561. Indeed, the fact that a use falls within one of these categories "is simply one factor in [the] fair use analysis." Id. Similarly, while the statute draws a distinction between non-profit and commercial use, not every commercial use of a copyrighted work is presumptively unfair. Campbell, supra, 510 U.S. at 579.

a. The Purpose Of Free Republic's Use And The Extent To Which Its Work Is Transformative

[6] There is no dispute that at least some of the items posted on the Free Republic website are exact copies of plaintiffs' articles.[30]While defendants assert there is "no evidence" that all of the Times and Post articles that have been posted are verbatim copies,[31]the evidence they have presented reveals that, generally, exact copies of whole or substantial portions of articles[32] are posted.[33]

There is little transformative about copying the entirety or large portions of a work verbatim. See Nihon Keizai Shimbun, supra, 166 F.3d at 72 (where the infringing news abstracts were "for the most part direct translations of Nikkei articles," the court held that the first factor "weigh[ed] strongly against fair use"); Infinity Broadcast Corp. v. Kirkwood, 150 F.3d 104, 108 (2d Cir.1998) (holding that "[t]here [was] no transformation" where defendant retransmitted original broadcasts over the telephone); Los Angeles News Service v. Reuters Television Int'l, 149 F.3d 987, 993 (9th Cir.1998) (defendant's unauthorized copying of news footage "was not very transformative" because it did "not explain the footage, edit the content of the footage, or include editorial comment"); Sundeman v. The Seajay Society, Inc., 142 F.3d 194, 205–06 (4th Cir.1998) (while it does not preclude a finding of fair use, "[c]opying an entire work weighs against [such a] finding"); Princeton University Press v. Michigan Document Service, 99 F.3d 1381, 1389 (6th Cir.1996)("If you make verbatim copies of 95 pages of a 316–page book, you have not transformed the 95 pages very much—even if you juxtapose them to excerpts from other works and package everything conveniently. This kind of mechanical 'transformation' bears little resemblance to the creative metamorphosis accomplished by the parodists in the Campbell case"), cert. denied, 520 U.S. 1156, 117 S.Ct. 1336, 137 L.Ed.2d 495 (1997); Religious Technology Center v. Netcom On-line Communication Services, Inc., 923 F.Supp. 1231, 1243 (N.D.Cal.1995) ("Netcom On–Line II ") (defendant's posting of plaintiffs' copyrighted material on the Internet was "only minimally transformative since, unlike the typical critic, [defendant] adds little new expression to the Church's works"). As the Supreme Court said in Campbell, supra:

"[W]hether 'a substantial portion of the infringing work was copied verbatim' from the copyrighted work is a relevant question, ... for it may reveal a dearth of transformative character or purpose under the first factor, or a greater likelihood of market harm under the fourth; a work composed primarily of an original, particularly its heart, with little added or changed, is more likely to be a merely superseding use, fulfilling demand for the original." Campbell, supra, 510 U.S. at 587–88.

See also 3 M. and D. Nimmer, NIMMER ON COPYRIGHT, § 13.05[D][1] ("whatever the intent of the copier, a verbatim reproduction will of necessity serve the function of the plaintiff's work").

[7] Defendants proffer two reasons why their full text copying of plaintiffs' articles is nonetheless transformative. First, they assert that the copies of the articles found on the Free Republic site do not in reality substitute for the originals found on plaintiffs' web pages. Second, they contend they copy no more than necessary to fulfill their purpose of criticizing the manner in which the media covers current events and politics. Each of these contentions will be examined in turn.

Defendants' first argument—that the copies of plaintiffs' articles found on the Free Republic site do not substitute for those on plaintiffs' sites—focuses on readers' ability to access and review specific articles in which they are interested. Defendants contend that using the Free Republic site to read current articles would be impractical since there is a delay between the time information is posted to the site and the time it is indexed by third-party search engines. Additionally, they assert that the imprecision of search language makes it difficult to locate archived articles at the site.[34] These arguments overlook the fact that the Free Republic site has its own search engine that apparently has immediate search capability.[35]

Even were this not true, the articles posted on the Free Republic site ultimately serve the same purpose as "that [for which] one would normally seek to obtain the original—to have it available ... for ready reference if and when [website visitors adding comments] need[ ] to look at it." American Geophysical Union v. Texaco, Inc., 60 F.3d 913, 918 (2d Cir.1995) (the court held that the first fair use factor weighed against a defendant that encouraged its employees to make unauthorized photocopies of articles in scientific and medical journals and keep them in their offices for ready reference).

Defendants' web page acknowledges this. It states, inter alia, that the Free Republic site is a place where visitors "can often find breaking news and up to the minute updates."[36] Indeed, it is clear from the content of the representative pages submitted by defendants that visitors can read copies of plaintiffs' current and archived articles at the Free Republic site. For those who visit the site regularly, therefore, the articles posted there serve as substitutes for the originals found on plaintiffs' websites or in their newspapers.

Defendants next argue that their use of plaintiffs' works is transformative because registered Free Republic users add comments and criticism concerning the articles following a posting. Copying portions of a copyrighted work for the purpose of criticism or commentary is often considered fair use. See Twin Peaks Productions, Inc. v. Publications Int'l, Ltd., 996 F.2d 1366, 1375 (9th Cir.1993) ("Inevitably, some identification of the subject matter of a writing must occur before any useful comment may be made about it, and it is not uncommon for works serving a fair use purpose to give at least a brief indication of the plot. Works of criticism, teaching, and news reporting customarily do so"). The fact that criticism is involved, however, does end the inquiry. See Harper & Row, supra, 471 U.S. at 561 (list contained in § 107 is not intended to be exhaustive or to single out any particular use as presumptively fair); Sony Corp., supra, 464 U.S. at 452 ("[e]ven copying for noncommercial purposes may impair the copyright holder's ability to obtain the rewards that Congress intended him to have"). Rather, it must be considered in combination with other circumstances to determine if the first factor favors defendants. See Twin Peaks, supra, 996 F.2d at 1375–76 (" 'Purpose' in fair use analysis is not an all-or-nothing matter. The issue is not simply whether a challenged work serves one of the non-exclusive purposes identified in section 107, such as comment or criticism, but whether it does so to an insignificant or a substantial extent. The weight ascribed to the 'purpose' factor involves a more refined assessment than the initial, fairly easy decision that a work serves a purpose illustrated by the categories listed in section 107").

[8] Since the first posting of an article to the Free Republic site often contains little or no commentary, it does not significantly transform plaintiffs' work. In Netcom On–Line II, supra, defendant posted verbatim copies of works copyrighted by the Church of Scientology to an Internet website "with little or no added comment or criticism." Id. at 1243. The court found that the works were only "minimally transformative" because "unlike the typical critic, [defendant] add[ed] little new expression to the Church's works." Id.The court specifically rejected defendant's argument that his copying was fair use because subsequent visitors added further comments. It concluded that while the copying of "works that were previously posted by their authors on the basis of an implied license or fair use argument" might be justified, such a defense would not be available "where the first posting made an unauthorized copy of a copyrighted work." Id. at 1247, n. 18.[37]

Similarly, in Religious Technology Center v. Lerma, 1996 WL 633131 (E.D.Va.1996),[38] defendant downloaded or scanned into his computer portions of works copyrighted by the Church of Scientology. He then posted segments of the works on the Internet. Id. at * 4. Defendant argued that his use was transformative, because he was a "dedicated researcher delving into the theory and scholarship of Scientology," and was "providing materials which 'add new value to public knowledge and understanding, thereby advancing the goals of copyright as set forth in the Constitution.' " Id. at * 5. The court rejected this argument, noting that it did "not justify the wholesale copying and republication of copyrighted material," and concluding that "[t]he degree of copying by [defendant] combined with the absence of commentary on most of his Internet postings, is inconsistent with the scholarship exception." Id.[39]

Additionally, even where copying serves the "criticism, comment and news reporting" purposes highlighted in § 107, its extent cannot exceed what is necessary to the purpose. See Twin Peaks, supra, 996 F.2d at 1375–76 (the fact that defendant "detailed ... the plots [of episodes of a television series] ... far beyond merely identifying their basic outline for the transformative purposes of comment or criticism" weighed against a finding of fair use because the "abridgment ... elaborate[d] in detail far beyond what is required to serve any legitimate [transformative] purpose"); Toho Co., Ltd. v. William Morrow and Co., Inc., 33 F.Supp.2d 1206, 1217 (C.D.Cal.1998)(relying, inter alia, on the fact that the infringing work contained detailed plot summaries of the Godzilla movies to find that the first fair use factor weighed heavily in favor of a copyright plaintiff, despite the fact that the work also contained "numerous biographies [and] analyses of the movies, including commentary, trivia and other bits of information"). Thus, an individualized assessment of the purpose for which defendants are copying the works and a comparison of that purpose to the amount copied is required. See Campbell, supra, 510 U.S. at 586–87 ("we recognize that the extent of permissible copying varies with the purpose and character of the use"); Sundeman, supra, 142 F.3d at 205–05 (same). See also Sony Corp. of America v. Universal City Studios, Inc., 464 U.S. 417, 449–50, 104 S.Ct. 774, 78 L.Ed.2d 574 (1984) (reproduction of an entire television program did "not have its ordinary effect of militating against a finding of fair use" where programs were videotaped for home viewing); Harper & Row, supra, 471 U.S. at 564 ("[E]ven substantial quotations might qualify as fair use in a review of a published work or a news account of a speech").

[9] Here, it seems clear that the primary purpose of the postings to the Free Republic site is to facilitate discussion, criticism and comment by registered visitors. Defendants contend that copying all or parts of articles verbatim is necessary to facilitate this purpose.[40] They argue that full text posting is required because links expire after a week or two, and because unsophisticated Internet users will have difficulty accessing a linked site.[41] Defendants' assertion that links expire after a period of time is presumably a reference to the fact that articles are available on plaintiffs' websites free of charge only for a certain number of days.Thereafter, there is a charge for viewing and/or printing them. That this is so does not make linking plaintiffs' websites to the Free Republic site "impractical." It merely requires that Free Republic visitors pay a fee for viewing plaintiffs' articles just as other members of the public do. Similarly, defendants' suggestion that articles are posted to the Free Republic site long after they are published is not supported by the representative postings they have submitted.[42] These reflect that the vast majority of comments are posted the same day the articles appear or within one to three days afterwards.[43] Finally, defendants' assertion that unsophisticated Internet users would be confused by links is unpersuasive. Linking is familiar to most Internet users, even those who are new to the web.

As evidence that verbatim copying is in fact not necessary to defendants' purpose, plaintiffs cite the fact that defendants provided a hypertext link to Jewish World Review's website at its request, and requested that registered Free Republic visitors no longer copy the publication's articles verbatim.[44] That defendants accommodated Jewish World Review belies their current contention that only verbatim posting of articles will serve the criticism and comment purposes of the Free Republic site. Indeed, they acknowledge that honoring Jewish World Review's request "did not significantly detract from the purpose of the freerepublic.com website."[45]

The fact that linking the text of an article as it appears on plaintiffs' websites to the Free Republic site, or summarizing the article's text, is not as easy or convenient for Free Republic users as full text posting does not render the practice a fair use. Rather, the focus of the inquiry must be whether verbatim copying is necessary to defendants' critical purpose. See Campbell, supra, 510 U.S. at 586–87; Castle Rock Entertainment, Inc. v. Carol Publishing Group, Inc., 150 F.3d 132, 144 (2d Cir.1998) ("The inquiry must focus upon whether '[t]he extent of ... copying' is consistent with or more than necessary to further 'the purpose and character of the use' "); Rogers v. Koons, 960 F.2d 301, 311 (2d Cir.1992) ("It is not fair use when more of the original is copied than necessary"); Walt Disney Prods. v. Air Pirates, 581 F.2d 571, 758 (9th Cir.1978) ("[w]hile other factors in the fair use calculus may not be sufficient by themselves to preclude the fair use defense, ... excessive copying precludes fair use").

[10] Defendants have not met their burden of demonstrating that verbatim copying of all or a substantial portion of plaintiffs' articles is necessary to achieve their critical purpose. They argue that the purpose of full text posting is to enable Free Republic users to criticize the manner in which the media covers current events.[46] The statement of purpose found on the website, however, is somewhat different. There, defendants state that visitors to the Free Republic site "are encouraged to comment on the news of the day ... and ... to contribute whatever information they may have to help others better understand a particular story."[47] In fact, a review of the representative articles submitted by defendants reveals that visitors' commentary focuses much more on the news of the day than it does on the manner in which the media reports that news.[48] This is significant, since the extent of copying that might be necessary to comment on the nature of the media's coverage of a news event is arguably greater than the amount needed to facilitate comment on the event itself. Commentary on news events requires only recitation of the underlying facts, not verbatim repetition of another's creative expression of those facts in a news article. So too, the fact that a particular media outlet published a given story, or approached that story from a particular angle can be communicated to a large degree without posting a full text copy of the report.[49] For this reason, the court concludes that verbatim posting of plaintiffs' articles is "more than is necessary" to further defendants' critical purpose. See Castle Rock Entertainment, supra, 150 F.3d at 144. See also Hustler Magazine, Inc. v. Moral Majority, Inc., 796 F.2d 1148, 1153 (9th Cir.1986) (examining whether defendant copied "more than was necessary" in responding to a parody).

For all these reasons, the court concludes that defendants' use of plaintiffs' articles is minimally, if at all, transformative.

b. Commercial Nature Of The Free Republic Website

In addition to examining defendants' purpose in copying plaintiffs' articles, the first fair use factor also directs that the court evaluate the "character" of the use. The mere fact that a use is commercial does not "give rise to a presumption of unfairness." Sony Computer Entertainment, Inc. v. Connectix Corp., 203 F.3d 596, 606 (9th Cir.2000). See also Campbell, supra, 510 U.S. at 584–85 (noting that the Court's earlier decision in Sony, supra, 464 U.S. at 451, "called for no hard evidentiary presumption"). Rather, a defendant's commercial purpose is only "a separate factor that tends to weigh against a finding of fair use." Campbell, supra, 510 U.S. at 585. Thus, a court evaluating the first fair use factor "must weigh the extent of any transformation ... against the significance of other factors, including commercialism, that militate against fair use." Sony Computer, supra, 203 F.3d at 607.

[11] The parties vigorously dispute whether defendants' operation of the Free Republic website is a profit or non-profit venture as those terms are used in § 107. Their disagreement focuses on the corporate status of Free Republic, and on the extent to which defendants' operation of the website generates revenue, donations, and commissions.

Defendants argue that Free Republic is a non-profit organization and that they make no money from operating the website. The undisputed evidence reveals that Free Republic is currently a for-profit company. It also demonstrates that Free Republic solicits donations from visitors to the website who wish to support its mission and operations.[50] In addition to these direct solicitations, defendants concede that they have facilitated links to third-party web pages where donations to Free Republic and/or Robinson are requested, and where donors receive Free Republic-related souvenir items in exchange for a contribution.[51]

There is also evidence that the Free Republic web page advertises the website design services of Electronic Orchard, and contains links to Electronic Orchard clients.[52] Defendants maintain that these links have been included as a courtesy to Electronic Orchard customers, and that they receive no revenue from them. Accepting this as true, the fact that Electronic Orchard's services are advertised and that Robinson is able to provide free links for his clients' businesses demonstrates that he and Electronic Orchard derive goodwill from the Free Republic site.

Nonetheless, defendants' operation possesses many characteristics of a non-profit entity. It does not market or sell a product, and does not generate revenue in the traditional sense. "The commercial nature of a use is a matter of degree, not an absolute...." Maxtone–Graham v. Burtchaell, 803 F.2d 1253, 1262 (2d Cir.1986). See also Sega Enterprises Ltd. v. Accolade, Inc., 977 F.2d 1510, 1522 (9th Cir.1993) (same). Here, while the Free Republic operation has commercial aspects, its overall character is more properly viewed as non-commercial.

Additionally, the Free Republic site provides a public service by fostering debate and discussion regarding the issues of the day. This too is a factor that should be taken into account in assessing the character of defendants' use of plaintiffs' copyrighted material. See Sega Enterprises, supra, 977 F.2d at 1523 ("Public benefit need not be direct or tangible, but may arise because the challenged use serves a public interest"); Hustler, supra, 796 F.2d at 1153 ("When the use has both commercial and non-profit characteristics, the court may consider 'whether the alleged infringing use was primarily for public benefit or for private commercial gain' ").

Section 107(1) does not mandate "a clear-cut choice between two polar characterizations, 'commercial' and 'non-profit.' " Maxtone–Graham, supra, 803 F.2d at 1262. Here, choosing one of these two extremes does not properly reflect the nature of the Free Republic site, or defendants' activities in operating it. Rather, attempting the "sensitive balancing of interests" required for application of the fair use doctrine (Campbell, supra, 510 U.S. at 584; Sony, supra, 464 U.S. at 455, n. 40), the court finds that the operation of the Free Republic site is only minimally commercial.

[12] The relevant inquiry, however, "is not whether the sole motive of the use is monetary gain but whether the user stands to profit from exploitation of the copyrighted material without paying the customary price." Harper & Row, supra, 471 U.S. at 562. See Campbell, supra, 510 U.S. at 584 ("the mere fact that a use is educational and not for profit does not insulate it from a finding of infringement, any more than the commercial character of a use bars a finding of fairness"); Infinity Broadcasting, supra, 150 F.3d at 110 ("societal benefit does not guarantee a finding of fair use"); Marcus v. Rowley, 695 F.2d 1171, 1175 (9th Cir.1983) ("a finding of a nonprofit educational purpose does not automatically compel a finding of fair use").[53] Here, defendants and registered third-party visitors to the Free Republic site copy and post plaintiffs' news articles, which are then available to others visiting the site free of charge. Since the general purpose of the site is to provide a forum where individuals can discuss current events and media coverage of them, posting copies of plaintiffs' articles assists in attracting viewers to the site.

In Marobie–FL, Inc. v. National Assoc. of Fir Equipment Distributors, 983 F.Supp. 1167 (N.D.Ill.1997), the court examined an analogous situation in which a non-profit organization placed copyrighted clip art on its website without paying the copyright owners. Id. at 1175. Despite defendant's non-profit status, the court found that "its conduct [could] still be considered commercial." Id. The court reasoned that defendant had obtained the clip art for free, although it would ordinarily have cost money, and then had made the files available on its website to members and other Internet users without charge. Id. This was beneficial to it, since the organization used the website "for the commercial purposes of promoting the association (whose members pay dues) and generating advertising revenue." Id. Consequently, the court concluded that defendant's use of the clip art "enhanced the Web Page and furthered ... commercial purposes." Id. See also Marcus, supra, 697 F.2d at 1175–76 (the court held that a defendant who replicated a substantial portion of plaintiff's copyrighted work could not assert a fair use defense despite the fact that her copying was for a nonprofit educational purpose, since both she and plaintiff used the material for the same purpose, i.e., to teach cake decorating); Television Digest, Inc. v. United States Telephone Assoc., 841 F.Supp. 5, 9–10 (D.D.C.1993) (the court concluded that a non-profit trade association's duplication and distribution of a copyrighted newsletter was not a non-commercial use because it saved money by photocopying one subscription issue rather than ordering the number of subscriptions it required per reader); Encyclopedia Britannica Educational Corp. v. Crooks, 447 F.Supp. 243, 252 (W.D.N.Y.1978) (a non-profit educational services corporation that videotaped copyrighted films, made copies, and distributed them to public schools was not making fair use of the films since it was reproducing large numbers of the videotapes in a "highly organized and systematic" way).

[13] Cases decided since Marobie–FL have utilized a more nuanced approach in evaluating the commercial/non-commercial aspect of the first fair use factor. Recent Ninth Circuit decisions, for example, assess whether a defendant's copying led directly to the generation of revenue and profit, or whether it merely had an indirect relation to commercial gain. See Sony Computer, supra, 203 F.3d at 607 (because defendant copied video game for purpose of reverse engineering it and producing software that would be compatible with it, its "commercial use of the copyrighted material was an intermediate one, and thus was only 'indirect or derivative' "); Sega Enterprises, supra, 977 F.2d at 1522 (although defendant's ultimate purpose was the commercial one of developing Genesis-compatible games for sale, "its direct purpose in copying Sega's code, and thus its direct use of the copyrighted material, was simply to study the functional requirements for Genesis compatibility so that it could modify existing games and make them usable with the Genesis console").

Citing Sega, the Second Circuit has described the proper analysis as "differentiating between a direct commercial use and [a] more indirect relation to ... commercial activity." American Geophysical, supra, 60 F.3d at 921. In American Geophysical, the court stated that the heart of "[t]he commercial/nonprofit dichotomy concerns the unfairness that arises when a secondary user makes unauthorized use of copyrighted material to capture significant revenues as a direct consequence of copying the original work." Id. at 922. Since, in the case before it, Texaco did not derive direct or immediate revenue or profits from photocopying articles in scientific and medical journals for members of its research staff, the court held that its use was "intermediate," and that the link between the copying and Texaco's commercial gain was "somewhat attenuated." Id. at 921, 922. Nonetheless, it concluded that Texaco "reap[ed] at least some indirect benefit from its photocopying," and that this in turn had some impact on its ability to develop marketable products. Id. at 922. Accordingly, the court stated, "it is not obvious why it is fair for Texaco to avoid having to pay at least some price to copyright holders for the right to photocopy the original articles." Id.

Here, the analysis is much the same. Defendants do not generate revenue or profits from posting plaintiffs' articles on the Free Republic website. At most, they derive indirect economic benefit by enhancing the website's cachet, increasing registrations, and hence increasing donations and other forms of support. Coupled with the fact that Free Republic has many of the attributes of a non-profit organization, this indirect benefit argues against a finding that the use is strictly commercial. Rather, it is more appropriate to conclude that, while defendants do not necessarily "exploit" the articles for commercial gain, their posting to the Free Republic site allows defendants and other visitors to avoid paying the "customary price" charged for the works. See Harper & Row, supra, 471 U.S. at 562.

c. Conclusion Regarding First Fair Use Factor

[14] Following Campbell, it is clear that the court must balance and weigh the various elements of the first fair use factor in deciding whether it favors plaintiffs or defendants. See Campbell, supra, 510 U.S. at 584 (emphasizing the need for a "sensitive balancing of interests," and noting that Congress has "eschewed a rigid, bright-line approach to fair use," quoting Sony, supra, 464 U.S. 455, n. 40). See also Sony Computer, supra, 203 F.3d at 607 ("we must weigh the extent of any transformation ... against the significance of other factors, including commercialism, that militate against fair use"). In the process, it must bear in mind that "the concept of a 'transformative use' is central to a proper analysis under the first factor." American Geophysical, supra, 60 F.3d at 923. For this reason, "[t]he more critical inquiry under the first factor and in fair use analysis generally is ... whether and to what extent the new work is transformative," not whether the use is commercial. Castle Rock, supra, 150 F.3d at 142 (internal quotations omitted).

Here, the court has found that defendants' copying of plaintiffs' articles is minimally, if at all, transformative. The comments of the individual who posts an article generally add little by way of comment or criticism to its substance. The extent of the copying is more than is necessary to foster the critical purpose it is designed to serve. Because the copying is verbatim, encompasses large numbers of articles, and occurs on an almost daily basis, the evidence supports a finding that defendants (and visitors to the Free Republic page) engage in extensive, systematic copying of plaintiffs' works.

Weighed against the essentially non-transformative nature of defendants' use is the fact that they do not directly derive revenue or profit from the posting of plaintiffs' articles, and the fact that their operation of the Free Republic website has many characteristics of a non-profit venture. So too, their use of plaintiffs' articles appears to be intended more for public benefit than for private commercial gain.

Since the "central purpose" of the inquiry on the first fair use factor is to determine "whether the new work merely 'supersede[s] the objects' of the original creation, ... or instead adds something new" (Campbell, supra, 510 U.S. at 579), the court finds that the nontransformative character of the copying in this case tips the scale in plaintiffs' favor, and outweighs the non-profit/public benefit nature of the purpose for which the copying is performed. This is particularly true since the posting of plaintiffs' articles to the Free Republic site amounts to "systematic ... multiplying [of] the available number of copies" of the articles, "thereby serving the same purpose" for which licenses are sold or archive charges imposed. See American Geophysical, supra, 60 F.3d at 924. The first fair use factor thus favors plaintiffs.

2. The Nature Of The Copyrighted Work

[15] The second factor identified in § 107 recognizes "that some works are closer to the core of intended copyright protection than others, with the consequence that fair use is more difficult to establish when the former works are copied." Campbell, supra 510 U.S. at 586. Thus, "the more creative a work, the more protection it should be accorded from copying; correlatively, the more informational or functional the plaintiff's work, the broader should be the scope of the fair use defense." NIMMER, supra, § 13.05[A][2][a]. Newspaper articles to a large extent gather and report facts. Nonetheless, a news reporter must determine which facts are significant and recount them in an interesting and appealing manner. See Harper & Row, supra, 471 U.S. at 547 ("[c]reation of a nonfiction work, even a compilation of pure fact, entails originality").

A number of cases that have analyzed alleged copying of news articles or videotapes of news events have concluded that the second fair use factor weighs in the defendant's favor. See Reuters Television, supra, 149 F.3d at 994 (the court held that the second factor weighed in favor of defendants that copied news footage); Los Angeles News Service v. KCAL–TV Channel 9, 108 F.3d 1119, 1122 (9th Cir.1997) (the second factor weighed in favor of a finding of fair use where defendants copied news footage);Los Angeles News Service v. Tullo, 973 F.2d 791, 792, 798 (9th Cir.1992) (the second factor favored a video news clipping service that used portions of copyrighted videotapes of newsworthy events). See also American Geophysical, supra, 60 F.3d at 925 (given the "manifestly factual character of the ... articles" from scientific and medical journals copied by defendant, the court held that the second factor weighed in favor of fair use); Television Digest, supra, 841 F.Supp. at 10 (the court found that the second factor weighed in favor of a defendant that copied a newsletter containing original news stories). Compare Nihon Keizai Shimbun, supra,166 F.3d at 72–73 (in a suit by a newspaper publisher against a defendant that gathered news articles from various sources and sold "abstracts" of them to its customers, the court recognized that newspaper articles are predominantly factual in nature and that expressive elements do not dominate, but nonetheless concluded that the second "factor is at most neutral on the question of fair use").

While plaintiffs' news articles certainly contain expressive elements, they are predominantly factual. Consequently, defendants' fair use claim is stronger than it would be had the works been purely fictional. See Sony, supra, 464 U.S. at 455, n. 40 ("Copying a news broadcast may have a stronger claim to fair use than copying a motion picture"). The court concludes that the second factor weighs in favor of a finding of fair use of the news articles by defendants in this case.

3. The Amount And Substantiality Of The Portion Used In Relation To The Copyrighted Work As A Whole

[16] Defendants concede that they have copied and posted entire articles published in plaintiffs' newspapers, although they dispute that all of plaintiffs' articles posted to the Free Republic site are verbatim copies. As noted earlier, defendants' evidence does not support their contention in this regard. In his deposition, defendant Robinson conceded that verbatim copying of entire articles or substantial portions thereof is the norm, and the exhibits submitted by defendants bear this out.[54]

The fact that exact copies of plaintiffs' article are posted to the Free Republic site weighs strongly against a finding of fair use in this case. See American Geophysical, supra, 60 F.3d at 926 (defendant's copying of entire copyrighted articles militated against a finding of fair use and led the court to conclude that the third factor weighed in plaintiffs' favor); Hustler, supra, 796 F.2d at 1155 ("although wholesale copying does not preclude fair use per se," reproducing an entire parody was the type of wholesale copying that "militate[d] against a finding of fair use"); Supermarket of Homes, Inc. v. San Fernando Valley Board of Realtors, 786 F.2d 1440, 1409 (9th Cir.1986) ( "[g]enerally, no more of a work may be taken than is necessary to make the accompanying comment understandable"); Television Digest, supra, 841 F.Supp. at 10 (because an entire copyrighted work was used, the court concluded that the third factor weighed against a finding of fair use); NIMMER, supra, § 13.05 [A][3] ("whatever the use, generally, it may not constitute a fair use if the entire work is reproduced").

Citing the fact that plaintiffs' copyright registration covers their newspapers as a whole, defendants contend that the papers are plaintiffs' "works," and not the individual articles that appear in them. Thus, they contend, the copying of a single article constitutes reproduction of only a small portion of the work. This proposition is not supported by the case law. See American Geophysical, supra, 60 F.3d at 925–26 (despite the fact that plaintiffs' copyright registration covered their journals as a whole, the court held that copying an entire article was equivalent to copying the entire work); Hustler, supra, 796 F.2d at 1155 (stating that "[a] creative work does not deserve less copyright protection just because it is part of a composite work" and holding that the copying of a one-page parody from a 154–page magazine constituted reproduction of the entire work); Netcom On–Line II, supra, 923 F.Supp. at 1247 ("although many of Hubbard's lectures, policy statements, and course packets are collected into larger volumes, and registered as a whole, they may still constitute separate works for the purposes of this factor"); Lerma, supra, 1996 WL 633131 at * 9 ("we find that the Works at issue in this case are combined in 'collections' and that each subpart must be considered a 'single work' for the purposes of fair use analysis").

[17] Defendants also contend that copying all or a substantial portion of the articles is essential to the critical purpose of the Free Republic website. See Campbell, supra, 510 U.S. at 586 (the applicable test to use in assessing the third fair use factor is whether the amount copied was "reasonable in relation to the purpose of the copying"). In assessing such an argument, Campbell instructs that the court focus on "the persuasiveness of a [copier's] justification for the particular copying done," and noted that "the enquiry will harken back to the first of the statutory factors, for ... the extent of the permissible copying varies with the purpose and character of the use." Id. at 586–87.

As detailed in the court's consideration of the first fair use factor, defendants have not offered a persuasive argument that full-text copying is essential to the critical purpose of the Free Republic site. Contrasted with the purpose and character of me use, the wholesale copying of plaintiffs' articles weighs against a finding of fair use. See Castle Rock, supra, 150 F.3d at 144 ("In Campbell, ... the Supreme Court clarified that the third factor—the amount and substantiality of the portion of the copyrighted work used—must be examined in context. The inquiry must focus upon whether '[t]he extent of ... copying' is consistent with or more than necessary to further 'the purpose and character of the use' "); Infinity Broadcasting, supra, 150 F.3d at 110 ("the question most relevant to th[e third] factor [is] whether 'no more was taken than necessary' ").

4. The Effect Of The Use On The Potential Market For Or Value Of The Copyrighted Work

The fourth factor examines "the effect of the use upon the potential market for or value of the copyrighted work." 17 U.S.C. § 107(4). It requires evaluating not only the extent of market harm caused by the alleged infringer's use, but also " 'whether unrestricted and widespread conduct of the sort engaged in by the defendant ... would result in a substantially adverse impact on the potential market' for the original." Campbell, supra (quoting NIMMER, supra, § 13.05[A][4] ); Harper & Row, supra, 471 U.S. at 568. In this regard, it is significant if widespread use of the type in which the defendant is engaged would "diminish[ ] potential sales, interfer[e] with marketability, or usurp[ ] the market" for the original. Sega, supra, 977 F.2d at 1523 (noting that if copying had this effect, "all other considerations might be irrelevant"). Markets for derivative works, i.e., those markets 'that creators of original works would in general develop or license others to develop,' must be considered in addition to the market for the original. Campbell, supra, 510 U.S. at 590, 592. See also American Geophysical, supra, 60 F.3d at 929–30; Cable/Home Communication Corp. v. Network Productions, Inc., 902 F.2d 829, 845 (11th Cir.1990) (" 'potential market' means either an immediate or a delayed market, and includes harm to derivative works").

[18] In assessing the fourth factor, courts frequently contrast a use that "suppresses" or "destroys" the market for the original or derivative works with one that "usurps" or "substitutes" for those markets. See, e.g., Castle Rock, supra, 150 F.3d at 145. See also Campbell, supra, 510 U.S. at 593; Sony Computer, supra, 203 F.3d at 607; Sundeman, supra, 142 F.3d at 207; Sega, supra, 977 F.2d at 1523. "[A] work that merely supplants or supersedes another is likely to cause a substantially adverse impact on the potential market of the original, [while] a transformative work is less likely to do so." Sony Computer, supra, 203 F.3d at 607. See also Sega, supra, 977 F.2d at 1523 ("The Harper & Row Court found a use that effectively usurped the market for the copyrighted work by supplanting that work to be dispositive").

Applying these principles to the present case, the undisputed evidence shows that the Free Republic website has approximately 20,000 registered users, receives as many as 100,000 hits per day, and attracts between 25 and 50 million page views each month. The evidence also shows that visitors to the site are able to read full text copies of articles from plaintiffs' newspapers and archives without purchasing the papers, visiting plaintiffs' websites or paying the fee plaintiffs charge for retrieving an article from their archives. While defendants argue that the Free Republic site is a "poor substitute" for locating plaintiffs' articles on their websites,[55]the court has found that for those individuals who visit the site, the articles posted to freerepublic.com do substitute for the original works. Given the number of registered visitors, hits and page views Free Republic attracts, the court cannot accept defendants' assertion that the site has only a de minimis effect on plaintiffs' ability to control the market for the copyrighted works.[56]

Moreover, this kind of de minimis argument has been rejected by the courts. In Infinity Broadcasting, for example, the court considered the fair use defense of an individual who operated a "dial-up" service that allowed "subscribers (for a fee) to listen over the telephone to contemporaneous radio broadcast in remote cities," including broadcasts by stations owned by the plaintiff. Infinity Broadcasting, supra, 150 F.3d at 106. Infinity offered a similar service on a limited basis to certain clients, but acknowledged that it had "no present interest" in developing the market further. Id. at 107, 111. The defendant argued that its operation was likely to have no material effect on the value of the copyrighted works because it was "directed to a narrow and specialized audience" and generated "extremely modest" revenues. Id. at 111. The court rejected this. Noting that it could not conclude defendant's use had only a negligible effect on Infinity's ability to exploit the potential market, the court stated:

[19] "Infinity, in the exercise of its business judgment, has decided that its best current use of listen lines is to offer them at no additional cost to certain 'valued customers.' Dial–Up disrupts this practice by removing Infinity's control over who should have access to such lines. Kirkwood is selling Infinity's copyrighted material in a market that Infinity, as the copyright owner, is exclusively entitled to exploit. Kirkwood does not suppress demand for Infinity's broadcasts in the manner of a reviewer, but instead replaces Infinity as the supplier of those broadcasts to meet the demand of his customers. This is precisely the kind of harm the fourth factor aims to prevent." Id.[57]

See also Sega Enterprises Ltd. v. Maphia, 948 F.Supp. 923, 937 (N.D.Cal.1996) (in finding that the fourth fair use factor cut against a bulletin board service that allowed users to download plaintiff's video games, the court rejected defendant's argument that any impact on plaintiff's sales was de minimis, since only a limited number of users had copiers that enabled them to play the games, the users probably played in their own homes, and there was no evidence that they had further distributed the downloaded video games; the court determined that "unrestricted and widespread conduct of this sort would result in a substantial adverse impact on the market for the Sega games"); Playboy Enterprises, Inc. v. Frena, 839 F.Supp. 1552, 1559 (M.D.Fla.1993) (rejecting defendant's argument that his use was de minimis).

This is precisely defendants' argument here—that the Free Republic site is small in comparison to the sites operated by plaintiffs, is not known to the general public, and thus could not divert a substantial amount of business from plaintiffs. As the copyright holders, however, plaintiffs have the "right to control" access to the articles, and defendants' activities affect a market plaintiffs currently seek to exploit.

Plaintiffs assert they have lost and will lose revenue because visitors to the Free Republic site can read plaintiffs' archived news articles without paying the fee they would be charged for accessing the articles at plaintiffs' sites. Similarly, plaintiffs contend that defendants' use affects their ability to generate licensing revenue, since the fact that the articles are available for free viewing on Free Republic's web page diminishes their value to licensees. Finally, plaintiffs argue that defendants' copying reduces the number of people visiting their sites, and thus causes them to lose advertising revenue calculated on the number of hits they receive.[58]

Defendants respond that plaintiffs have not adduced evidence of lost revenue resulting from operation of the Free Republic site. This, however, is not determinative. See Sony, supra, 464 U.S. at 451 ("Actual present harm need not be shown"). In Reuters, supra,149 F.3d at 994, defendants copied plaintiffs' news footage without permission. Plaintiffs could not prove that they had lost sales of the footage or that they had suffered any actual adverse market effect. Id. The court noted that allowing a customer to buy the footage from defendants rather than plaintiffs lessened the market for plaintiffs' footage, and concluded that "such actions if permitted would result in a substantially adverse impact on the potential market for the original works." Id. See also Ringgold v. Black Entertainment Television, 126 F.3d 70, 81 (2d Cir.1997) (artist who created a story quilt that was used as set decoration for a television program was "not required to show a decline in the number of licensing requests for" a poster depicting the quilt since the program aired so long as she could demonstrate that there was "a 'traditional, reasonable, or likely to be developed' market for licensing [the] work as set decoration").

[20] Here, plaintiffs have shown that they are attempting to exploit the market for viewing their articles online, for selling copies of archived articles, and for licensing others to display or sell the articles.[59] Defendants' use "substitutes" for the originals, and has the potential of lessening the frequency with which individuals visit plaintiffs' websites, of diminishing the market for the sale of archived articles, and decreasing me interest in licensing the articles. See Hustler, supra, 796 F.2d at 1155–56 (if the copying "fulfill[s] 'the demand for the original' works and 'diminish [es] or prejudice[s]' their potential sale," this justifies a finding that the fourth fair use factor favors the copyright holder); Wainwright Securities, supra, 558 F.2d at 96 (defendant's abstracts filled the demand for plaintiff's financial reports).

Defendants counter that there is no evidence that people who view me articles on me Free Republic site would ever have visited plaintiffs' websites. It is not necessary, however, to show with certainty that future harm will result. See Sony, supra, 464 U.S. at 451. Rather, "[w]hat is necessary is a showing by a preponderance of the evidence that some meaningful likelihood of future harm exists."Id. That likelihood is present when articles that would otherwise be available only at sites controlled or licensed by plaintiffs are available at a different site as well. The likelihood only increases when one considers the impact on the market if defendants' practice of full text copying were to become widespread.

Defendants also contend that plaintiffs actually benefit from having their articles posted verbatim on the Free Republic site. While they argue that plaintiffs' sites receive "literally tens of thousands, if not hundreds of thousands of hits per month"[60] as a result of referrals from the Free Republic site, this overstates their expert's quantification of the number of referral hits. In his declaration, Richard Stout states that the Los Angeles Times' website receives approximately 20,000 hits per month from users who visit the Free Republic site before accessing the Times' site. Stout estimates that these referral hits generate approximately $1,000 in revenue for the paper each month.[61] Defendants argue that this information regarding referral hits demonstrates that plaintiffs' advertising revenue is not diminished because of a reduction in the number of hits to their sites. Stout's declaration, however, does not address how many hits are diverted from plaintiffs' websites as a consequence of the posting of articles to the Free Republic site, and this is the pertinent inquiry in terms of potential market harm.

Defendants assert the evidence regarding referral hits demonstrates that Free Republic is creating a demand for plaintiffs' works. Even if this is the case, it does not mandate a conclusion that the fourth fair use factor favors defendants. Courts have routinely rejected the argument that a use is fair because it increases demand for the plaintiff's copyrighted work. See Campbell, supra, 510 U.S. at 591, n. 21 (even if a "film producer's appropriation of a composer's previously unknown song ... turns the song into a commercial success[,] the boon to the song does not make the film's ... copying fair"); Ringgold, supra, 126 F.3d at 81, n. 16 ("Even if the unauthorized use of plaintiff's work in the televised program might increase poster sales, that would not preclude her entitlement to a licensing fee"); D.C. Comics Inc. v. Reel Fantasy, Inc., 698 F.2d 24, 28 (2d Cir.1982) ("Since one of the benefits of ownership of copyrighted material is the right to license its use for a fee, even a speculated increase in DC's comic book sales as a consequence of RFI's infringement would not call the fair use defense into play as a matter of law. The owner of the copyright is in the best position to balance the prospect of increased sales against revenue from a license"); Storm Impact, Inc. v. Software of the Month Club, 13 F.Supp.2d 782, 790 (N.D.Ill.1998) ("This argument that increased distribution of the author's work is a benefit to the author has been rejected by the Supreme Court," citing Harper & Row, supra, 471 U.S. at 569)).

[21] In short, plaintiffs have demonstrated that they are attempting to exploit the market for viewing their articles online, for selling copies of archived articles, and for licensing others to display or sell the articles. They have demonstrated that the availability of verbatim copies of the articles at the Free Republic site has the potential to interfere with these markets, particularly if it becomes a widespread practice. See Sony, supra, 464 U.S. at 451; Tullo, supra, 973 F.2d at 798; Hustler, supra, 796 F.2d at 1155 (copyright owner may demonstrate that there is "some meaningful likelihood of future harm" by showing that, "should the challenged use become widespread, it would adversely affect the potential market for the work"; this inquiry focuses on "whether the infringing use (1) 'tends to diminish or prejudice the potential sale of [the] work,' or (2) tends to interfere with the marketability of the work"). Defendants, who bear the burden of proof on fair use, have not rebutted this showing by proving "an absence of 'usurpation' harm to" plaintiffs. Infinity Broadcasting, supra, 150 F.3d at 111. Accordingly, the fourth factor weighs against a finding of fair use in this case.

5. Balancing The Fair Use Factors

In sum, three of the four fair use factors weigh in plaintiffs' favor. Moreover, the factor that favors defendants—the nature of the copyrighted work—does not provide strong support for a fair use finding, since defendants copied both the factual and the expressive elements of plaintiffs' news articles. Conversely, the amount and substantiality of the copying and the lack of any significant transformation of the articles weigh heavily in favor of plaintiffs on this issue. The court thus finds that defendants may not assert a fair use defense to plaintiffs' copyright infringement claim. See Reuters, supra, 149 F.3d at 994–95 ("the district court, having found that only one of the four statutory factors weighed in favor of defendants, correctly concluded that the fair use defense did not apply"); Tullo, supra, 973 F.2d at 799 (since only one of the four fair use factors—the nature of the copyrighted work—supported a fair use finding, the court held that the defense could not be invoked to shield defendant from liability for infringing plaintiff's copyrights).

D. First Amendment Defense

Defendants assert, as a separate defense, the fact that the First Amendment protects their posting of copies of plaintiffs' news articles to the Free Republic website.[62] Defendants contend that visitors to the Free Republic site will be unable to express their views concerning the manner in which the media covers current events since the omissions and biases in the articles will be difficult to communicate to readers without the full text of the article available.[63]

In Harper & Row, supra, Nation magazine reprinted, without authorization, 300 words from the memoirs of President Gerald Ford. 471 U.S. at 542–45. The Court noted that factual information concerning current events contained in news articles is not protected by copyright. It stated, however, that "copyright assures those who write and publish factual narratives ... that they may at least enjoy the right to market the original expression contained therein as just compensation for their investment." Id. at 556–57 (citing Zacchini v. Scripps–Howard Broadcasting Co., 433 U.S. 562, 575, 97 S.Ct. 2849, 53 L.Ed.2d 965 (1977)). It stressed that copyright fosters free expression because it "supplies the economic incentive to create and disseminate ideas" by "establishing a marketable right to the use of one's expression." Id. at 558. It noted that copyright also promotes the countervailing First Amendment right to refrain from speech by protecting the owner of a copyrighted work from being forced to publish it. Id. at 559. For all these reasons, the Court concluded that "that copyright's idea/expression dichotomy 'strike[s] a definitional balance between the First Amendment and the Copyright Act by permitting free communication of facts while still protecting an author's expression.' " Id. at 556. Accordingly, it rejected defendant's First Amendment argument that material could be copied because it was "newsworthy," (id. at 559) and "limited its inquiry to 'the traditional equities of fair use,' unexpanded by any free speech concerns." NIMMER, supra, § 1.10[B][2] (quoting Harper & Row, supra, 471 U.S. at 560). Courts have generally interpreted this discussion in Harper & Row to mean that First Amendment considerations are subsumed within the fair use Analysis. Nihon Keizai Shimbun, supra, 166 F.3d at 74 ("We have repeatedly rejected First Amendment challenges to injunctions from copyright infringement on the ground that First Amendment concerns are protected by and coextensive with the fair use doctrine"); Twin Peaks, supra, 996 F.2d at 1378 ("except perhaps in an extraordinary case, 'the fair use doctrine encompasses all claims of first amendment in the copyright field' "); Tullo, supra, 973 F.2d at 795 ("Copyright law incorporates First Amendment goals by ensuring that copyright protection extends only to the forms in which ideas and information are expressed and not to the ideas and information themselves.... First Amendment concerns are also addressed in the copyright field through the 'fair use' doctrine").

[22] Nimmer argues that if the "copying of the expression is essential effectively to convey the idea expressed," then the First Amendment protects the copying regardless of copyright. As the court in Tullo noted, "[n]o court has adopted Nimmer's proposal." Tullo, supra, 973 F.2d at 796, n. 5. Nimmer argues that the Supreme Court in Harper & Row implicitly adopted this framework when it acknowledged that some of the briefer quotations from President Ford's memoirs were "arguably necessary adequately to convey the facts; for example, Mr. Ford's characterization of the White House tapes as the 'smoking gun' is perhaps so integral to the idea expressed as to be inseparable from it." Harper & Row, supra, 471 U.S. at 563; NIMMER, supra, § 1.10[D].

Even assuming this is true, defendants have failed to show that copying plaintiffs' news articles verbatim is essential to communication of the opinions and criticisms visitors to the website express. As discussed above in connection with analysis of defendants' fair use defense, visitors' comments more often concern the underlying news event than they do the manner in which that event was covered by the media. And, even where media coverage is the subject of the critique, the gist of the comments (which concern the fact that a particular media outlet published a story or approached the story from a particular angle) can generally be communicated without full text copying of the article. The availability of alternatives—such as linking and summarizing—further undercuts any claim that First Amendment rights are implicated. While defendants and other users of the Free Republic site may find these options less ideal than copying plaintiffs' articles verbatim, this does not demonstrate that a First Amendment violation will occur if full text posting is prohibited.

III. CONCLUSION

For the foregoing reasons, plaintiffs' motion for summary adjudication with respect to fair use is granted, and defendants' motion is denied.

[1] All parties have filed evidentiary objections to the declarations submitted in support of or opposition to the cross-motions. To the extent the court has considered evidence contained in the declarations, it has ruled on the objections to that evidence and noted its rulings in this order. To the extent evidence contained in the declarations is not mentioned in this order, it has not been considered by the court, and no ruling on the objections is required.

[2] Declaration of Carol Perruso ("Perruso Decl."), ¶ 2; Declaration of Eric Koefoot ("Koefoot Decl."), ¶¶ 2–3.

[3] Perruso Decl., ¶ 4; Koefoot Decl., ¶ 4

[4] Plaintiffs' Statement of Uncontroverted Facts and Conclusions of Law ("Pls.' Facts"), ¶ 50; Defendants' Response to Plaintiffs' Separate Statement of Uncontroverted Facts ("Defs.' Genuine Issues"), ¶ 50. The price per view figures cited in the text are set forth in the Perruso (Los Angeles Times) and Koefoot (Washington Post) declarations. While defendants have objected to the paragraphs of the declarations in which this information is found, their objection appears to relate to the declarants' assertion that it is not "impractical" to view the full text of an archived article on plaintiffs' websites rather than the Free Republic's site. (See Perruso Decl., ¶ 8; Koefoot Decl., ¶ 8; Defendants' Evidentiary Objections to Declarations of Carol Perruso, Eric Koefoot and Chappell Aldridge ("Defs.' Objections") at 2:7–10, 4:21–24.) The statements concerning the amounts charged for viewing articles on the Times and Post websites are not irrelevant, do not lack foundation, and are not ambiguous, speculative or conclusory. Consequently, to the extent defendants object to this aspect of the declarations, their objections are overruled.

[5] Perruso Decl., ¶¶ 10–12; Koefoot Decl., ¶¶ 10–12. Defendants object to paragraphs 10 and 12 of the Perruso and Koefoot declarations on the basis that they lack foundation, and are ambiguous, conclusory and speculative. (See Defs.' Objections at 2:12–15, 2:17–22, 4:26–28, 5:3–8.) Perruso and Koefoot are executive officers of their respective companies, and have personal knowledge of company operations and Internet business generally. Each is aware of the sources of revenue generated by their company's website, and of the factors that cause such revenue to increase or decrease. The testimony, which is general in nature and not directed specifically to the impact of the Free Republic site, is not speculative, ambiguous or conclusory. Consequently, defendants' objections to these portions of the Perruso and Koefoot declarations are overruled.

[6] Pls.' Facts, ¶¶ 33, 48; Defs.' Genuine Issues, ¶¶ 33, 48.

[7] See Pls.' Facts, ¶¶ 49, 51, 52; Defs.' Genuine Issues, ¶¶ 49, 51, 52.

[8] Defendants' Exhibits—Vol. 4, Ex. 1009 [Deposition of James Curtis Robinson ("Robinson Depo.") ] at 25:6–26:10, 19:16–19. Robinson's son, John, and Amy DeFendis are co-owners of the two companies. (Id. at 25:24–26:10.)

[9] Id. at 20:2–12; Pls.' Facts, ¶ 24; Defs.' Genuine Issues, ¶ 24.

[10] Robinson Depo. at 26:16–20.

[11] Pls.' Facts, ¶¶ 1, 24, 25; Defs.' Genuine Issues, ¶¶ 1, 24, 25; Declaration of James Robinson ("Robinson Decl."), ¶ 35; Memorandum of Points and Authorities in Support of Defendants' Motion for Summary Judgment ("Defs.' Mot.") at 7:17–24; Declaration of Heather L. Wayland ("Wayland Decl."), Ex. B (D000441, D000445).

[12] See, e.g., Wayland Decl., Ex. D.

[13] Pl.'s Facts, ¶¶ 18, 38; Defs.' Genuine Issues, ¶¶ 18, 38.

[14] See, e.g., Pls.' Facts, ¶¶ 45, 47; Defs.' Genuine Issues, ¶¶ 45, 47, 49. 51, 52.

[15] Defs.' Genuine Issues, ¶¶ 45, 47, 49, 51, 52 ("... [W]ith the exception of a very few articles, there is no evidence in the record to establish that the articles are 'perfect copies' as Plaintiffs allege").

[16] See Pls.' Facts, ¶ 23; Defs.' Genuine Issues, ¶ 23; Defendants' Separate Statement of Uncontroverted Facts ("Defs.' Facts"), ¶ 6; Plaintiffs' Response to Defendants' Separate Statement of Uncontroverted Facts ("Pls.' Genuine Issues"), ¶ 6.

[17] Free Republic Institute will apparently assume responsibility for operation of the website, freerepublic.com. (See Robinson Depo. at 98:15–21.)

[18] See Declaration of Harold Szabo ("Szabo Decl."), ¶¶ 3–6. Plaintiffs object to the Szabo Declaration on the basis that it is irrelevant, vague and ambiguous, without foundation, conclusory, and speculative, and that it offers improper opinion testimony to the extent it suggests tax-exempt status will be granted. (See Plaintiffs' Evidentiary Objections to Declarations of Richard L. Stout and Howard K. Szabo ("Pls.' Objections") at 11:21–15:19.) These objections are overruled as Szabo has personal knowledge of his retention, the work he was asked to perform, and the tasks he has completed to date. Thus, the statements he offers concerning the incorporation of Free Republic Institute and the status of his work on the tax-exempt application are neither vague, ambiguous, speculative or conclusory. Additionally, Szabo offers no opinions concerning the ultimate outcome of the application for tax-exempt status. Finally, while plaintiffs dispute the relevance of the information set forth in Szabo's declaration, this objection is not an attack on the admissibility of the evidence. Rather, it is argument concerning the legal import of the information Szabo provides. Consequently, there is no basis for striking the declaration.

[19] Robinson Depo. at 24:1–8, 27:18–28:23, 38:4–40:12.

[20] Pls.' Facts, ¶¶ 27, 28, 29, 30, 31, 32, 34, 35.

[21] Pls.' Facts, ¶¶ 27, 28. Plaintiffs additionally note that the Free Republic website uses a ".com" domain name of the type generally employed by commercial entities. (Pls.' Facts, ¶ 26.) Defendants dispute the relevance of this fact, noting that use of a ".com" domain name does not indicate whether their business is for-profit or not-for-profit. (Defs.' Genuine Issues, ¶ 26; Supplemental Declaration of Richard Stout ("Supp. Stout Decl."), ¶¶ 35–38.)

[22] Defs.' Genuine Issues, ¶¶ 32, 34.

[23] See Defs.' Genuine Issues, ¶¶ 27, 28,

[24] Defs.' Genuine Issues, ¶ 35.

[25] Defs.' Genuine Issues, ¶ 31.

[26] See Defs.' Genuine Issues, ¶¶ 29, 30.

[27] Defs.' Genuine Issues, ¶¶ 49, 51, 52. As support, defendants rely, in part, on the Declaration of Rick Stout. Plaintiffs have filed objections to portions of this declaration, only certain of which are pertinent here. (See Pls.' Objections at 3:8–11:19.) Specifically, plaintiffs object to paragraphs 46, 50 and 51 on the basis that they lack foundation and are irrelevant, conclusory, speculative, vague and ambiguous. Plaintiffs' objections to paragraph 46 are overruled, as Stout has demonstrated that he is qualified to offer an opinion concerning the traffic moving from the Free Republic site to the Times site, and has offered a detailed explanation of his methodology in the preceding paragraphs of the declaration. As respects paragraphs 50 and 51, it is true that the opinions set forth therein are general. Stout's qualifications and his specific expertise in analyzing Internet traffic permits him to offer an opinion concerning the relative impact of freerepublic.com on plaintiffs' websites, however, and the generalized nature of the conclusions found in these paragraphs goes to their weight rather than their admissibility.

[28] Pls.' Facts, ¶¶ 49, 51, 52. Plaintiffs support these contentions with citations to the Perruso, Koefoot and Aldridge Declarations. Defendants object to the relevant portions of these declarations on the basis that they lack foundation, are speculative, conclusory, and ambiguous, and assume facts not in evidence. The relevant statements are found at paragraph 21 of the Perruso and Koefoot Declarations, and paragraphs 3–6 of the Aldridge Declaration. In his declaration, Chappell Aldridge details a search he made for an article on the Post website and his retrieval of the full text of the article on the Free Republic site. The testimony is based on personal knowledge, and is not speculative, conclusory or ambiguous. Consequently, the court overrules defendants' objections to the Aldridge declaration, with the exception that the court has not considered the argumentative statement that this method of accessing articles is "a dodge ... available to anyone." As respects the Perruso and Koefoot Declarations, each is an executive officer of his or her respective company, and each thus has personal knowledge of company operations and Internet business generally. This knowledge provides a sufficient foundation for the expression of the opinions set forth in the declarations concerning the impact of freerepublic.com on traffic at the Times and Post sites. The generalized nature of the opinions offered goes to their weight rather than their admissibility. Consequently, defendants' objections to these portions of the Perruso, Koefoot and Aldridge declarations are overruled.

[29] Defendants Robinson and Free Republic admit that they have personally posted certain of plaintiffs' articles on the Free Republic site. (See Defs.' Genuine Issues, ¶ 9.) Because several thousand articles have been posted to the site, however, defendants assert that much of the posting has been done by registered third-party users. (See Pls.' Facts, ¶¶ 10, 41; Defs.' Genuine Issues, ¶¶ 10, 41). Plaintiffs contend that defendants provide instructions and tools that permit third-party copying, that they have the ability to control what is posted on their website, and that they have removed certain postings from time to time. (Pls.' Facts, ¶¶ 11, 12, 13.) Defendants agree that they have the technical ability to remove material from the site, but argue that it is not feasible to monitor the large quantity of daily postings the site receives. (Defs.' Genuine Issues, ¶¶ 12, 13.) They do not respond directly to the assertion that they provide tools and instructions that permit third parties to copy plaintiffs' articles; rather, they acknowledge that "the Free Republic web site provides a virtual 'bulletin board' forum which enables and allows registered users to post whatever content they wish." (Defs.' Genuine Issues, ¶ 11.) Whether defendants' operation of the Free Republic website, and the posting by third parties of verbatim copies of plaintiffs' copyrighted news articles renders defendants liable for copyright infringement is not an issue decided in this order. Similarly, the court does not address defendants' assertion that plaintiffs' posting of the articles on their websites constitutes implied consent for others to copy the works. (See Defs.' Genuine Issues, ¶¶ 6, 7, 9, 10, 11.)

[30] See Defendants' Exhibits—Vol. 4, Ex. 1009 at 53:8–54:3.

[31] See Defs.' Genuine Issues, ¶¶ 45, 46, 47 ("with the exception of a very few articles, there is no evidence in the record to establish that the articles are 'perfect copies' as Plaintiffs allege").

[32] Copying excerpts from the articles would satisfy the "copying" element of plaintiffs' copyright claim. See Nihon Keizai Shimbun, Inc. v. Comline Business Data, Inc., 166 F.3d 65, 70–71 (2d Cir.1999) (holding that there was substantial similarity between defendants' abstracts and plaintiffs' news stories because the "abstracts appear[ed] to be direct, if not word-for-word, translations of the Nikkei articles, edited only for clarity," to "use[ ] about two-thirds of the protectable material in the corresponding Nikkei article," to "track the information in the articles sentence by sentence, in sequence," occasionally "combin[ing] two Nikkei sentences, divid[ing] a sentence, or rearrang[ing] the facts among different sentences," and to "adopt[ ], by and large, the exact same structure and organization of the facts reported by Nikkei"). See also Wainwright Sec. Inc. v. Wall St. Transcript Corp., 558 F.2d 91, 93–94 and n. 1 (2d Cir.1977) (the court held that defendant had infringed plaintiff's copyrights by summarizing its analytical financial reports because it "appropriated almost verbatim the most creative and original aspects of the reports, the financial analyses and predictions, which represent a substantial investment of time, money and labor"), cert. denied, 434 U.S. 1014, 98 S.Ct. 730, 54 L.Ed.2d 759 (1978).

[33] See Defendants' Exhibits—Vol. 2, Exs. 1006; Vol. 3, 1007; Vol. 4, Ex. 1009 at 55:14–18 (Robinson's testimony that "[most people do not summarize" but post full text articles). Defendants contend that the only way to determine if the items posted to the Free Republic site are verbatim copies is to conduct a side-by-side comparison of the posting and the original article. Defendants bear the burden of proof on the issue of fair use. To the extent they wish to argue that something other than whole articles or substantial portions of articles are posted, they must adduce evidence that this is so. As noted, their evidence supports a contrary conclusion.

[34] See Defs.' Mot. at 11:14–12:3. See also Supp. Stout Decl., ¶¶ 4–25.

[35] See Defendants' Exhibits—Vol. 4, Exs. 1002, 1003; Aldridge Decl., ¶ 5.

[36] Wayland Decl., Ex. C (D000448).

[37] While the court made this observation in analyzing the third fair use factor, it is equally relevant in evaluating the extent to which a particular work is transformative.

[38] The court believes that Netcom On–Line II and Lerma are more pertinent to analysis of defendants' fair use defense than the decision in Religious Technology Center v. Netcom On–Line Communication Services, Inc., 907 F.Supp. 1361 (N.D.Cal.1995) ("Netcom On–Line I "). In Netcom On–Line I, the court considered the fair use defense of Internet access provider Netcom On–Line. In doing so, it distinguished Netcom's involvement in the posting of copyrighted works from that of the individual who actually posted copies of the works to a Usenet newsgroup. The poster gained access to the web through a bulletin board service that was not directly linked to the Internet, but that connected through the facilities of Netcom On–Line. See id. at 1365–66. The court stated: "The proper focus here is on whether Netcom's actions qualify as fair use, not on whether Erlich himself engaged in fair use; the court has already found that Erlich was not likely entitled to his own fair use defense, as his postings contained large portions of plaintiffs' published and unpublished works quoted verbatim with little added commentary." Id. at 1378. Despite the commercial nature of Netcom's function as an Internet access provider, the court found that the first fair use factor weighed in its favor, inter alia, because (1) "its financial incentive [was] unrelated to the infringing activity and [it] receive[d] no direct financial benefit from the acts of infringement"; (2) "there [was] no easy way for a defendant like Netcom to secure a license for carrying every possible type of copyrighted work onto the Internet," and thus it "should not be seen as 'profit[ing] from the exploitation of the copyrighted work without paying the customary prices' "; (3) Netcom did not "directly gain anything from the content of the information available to its subscribers on the Internet"; and (4) it did not "provide the files or solicit infringing works." Id. at 1379. Here, defendants admit that they themselves post copies of plaintiffs' new articles to the Free Republic site. Additionally, their relationship to the site, and to the material posted, is significantly more direct than that of Netcom, a company that maintains a software system that automatically forwards messages received from subscribers onto the Usenet, and temporarily stores copies of the messages on its system in the process. See id. at 1368.

[39] The decision in Religious Technology Center v. F.A.C.T.NET, Inc., 901 F.Supp. 1519 (D.Colo.1995) is not to the contrary. There, because the matter before it was a motion for preliminary injunction, the court did not make final legal rulings, but merely assessed the likelihood that plaintiff would prevail on the merits. Defendant in the case,F.A.C.T.NET, was a nonprofit corporation that maintained a library of materials concerning the Church of Scientology. Certain of its materials were posted on an Internet bulletin board by Arnaldo Lerma (the defendant in the case cited in text). Id. at 1521–22. Focusing heavily on the fact that it had copied the works for inclusion in its private library, the court found that F.A.C.T.NET was likely to prevail on its fair use defense. See id. at 1524. As respects its possible involvement in supplying materials to Lerma for Internet posting (an involvement F.A.C.T.NET denied), the court noted evidence that the postings "were made in the context of ongoing dialogue in [a] particular newsgroup," and that they "form[ed] part of the topical debate concerning whether the Works are of substance or are perpetuated as part of systemic mind control." Id. at 1526. Because plaintiff had adduced no evidence "showing a likelihood that a follower of the Church would consider the postings by Lerma as a market substitute for the Works," nor any demonstrating that the postings "were of a commercial nature or had any effect on the potential market for the works," the court held they might "well be considered as having been made for the purposes of criticism, comment or research falling within the fair use doctrine." Id. Given the limited nature of the evidence before it, the F.A.C.T.NET court's "preliminary" findings are substantially less persuasive than, and cannot be said to contradict, the Lerma court's direct and detailed analysis of Lerma's posting activities.

[40] See Defs.' Mot. at 17:21–23. See also id. at 12:20–23; 13:20–21; Defs.' Genuine Issues, ¶ 42; Defendants' Exhibits—Vol. 4, Ex. 1009 at 75:12–76:20.

[41] Defs.' Genuine Issues, ¶ 42.

[42] See id., ¶ 42.

[43] See Defendants' Exhibits—Vol. 2, Ex. 1006; Vol. 3, Ex. 1007.

[44] See Wayland Decl., Ex. Q.

[45] Defs. Genuine Issues, ¶ 43. While defendants dispute the proposition that "widespread use of such 'links' would not significantly detract from the purpose of the freerepublic.com site, ... and contend that there is controverting evidence," none of the evidence they cite in support addresses the subject.

[46] Defs. Mot. at 12:20–22; 17:21–23.

[47] Wayland Decl., Ex. C (D000448).

[48] See Defendants' Exhibits—Vol. 2, Ex. 1006; Vol. 3, Ex. 1007.

[49] Indeed, a few Free Republic visitors summarize the content of news articles rather than post verbatim copies of the text with little apparent impact on the quantity and quality of the commentary their postings attract. (See, e.g., Defendants' Exhibits—Vol. 2, Ex. 1006 at 24–25.)

[50] See Wayland Decl., Ex. M (TM092) ("FreeRepublic is supported by donations. We are a non commercial and NOT for profit public forum and discussion group. If you would like to sponsor FreeRepublic and/or place a [n] ad or banner linking your website, contact Jim. If you would like to support FreeRepublic, donations may be sent to: [¶] Jim Robinson[,] c/o Electronic Orchard[,] P.O. Box 9771[,] Fresno, CA 93794–9771.[¶] Or click here to donate by secure credit card transaction"). See also id., Ex. P (TM001, TM084).

[51] See Defs.' Genuine Issues, ¶¶ 29, 30.

[52] Wayland Decl., Ex. M (TM092) ("Jim also operates Electronic Orchard[,] an Internet web design and software development company located in Fresco, California. Please visit www.e-orchard.com and our clients' websites. We can also create and/or host your website. For effective Internet software that gets results, contact Jim Robinson"). See also id., Ex. P (TM001, TM084).

[53] In American Geophysical, the court stated that the proper focus of the commercial/non-commercial inquiry is "on the use of the copyrighted material," not on the profit or not-for-profit status of the user. American Geophysical, supra, 60 F.3d at 921–22. Nonetheless, it noted that the profit or non-profit status of the user was not "irrelevant' and "need not [be] ignore[d]." Id. at 921, 922.

[54] See Defendants' Exhibits—Vol. 2, Ex. 1006; Vol. 3, Ex. 1007; Vol. 4, Ex. 1009 at 55:14–18.

[55] Defs.' Opp. at 20:4–5.

[56] See id. at 20:7–8; Stout Decl., ¶¶ 47–51. In his declaration, Richard Stout opines that the detrimental impact of the Free Republic site on plaintiffs' websites is "trivial." (Id., ¶ 51.) He bases this conclusion on the fact that the volume of traffic visiting the Free Republic site is "trivial" in comparison with the number of visitors to plaintiffs' sites, and that only a small percentage of the articles that appear on the Free Republic site are from plaintiffs' publications. (Id., ¶¶ 48, 49.) Thus, he concludes that the "general public" wishing to read articles from plaintiffs' publications has "no reason to believe" that the Free Republic site is a better place to view plaintiff's articles than the papers' own websites. (Id., ¶ 50.) This overlooks the fact that those who visit the Free Republic site can read plaintiffs' articles without visiting their websites. As to those individuals, the articles posted to the Free Republic site clearly substitute for the originals, and make a visit to plaintiffs' websites unnecessary.

[57] While the Supreme Court's decision in Sony suggests that some potential markets should be considered "too insubstantial [or speculative] to tilt the fourth fair use factor in favor of the copyright holder" (see American Geophysical, supra, 60 F.3d at 930, n. 18), the market is presently being exploited by plaintiffs via their websites, and thus cannot be said to be of this type.

[58] At the hearing on the motions, defendants claimed they had been "sandbagged" because, contrary to the declarations submitted in connection with the motions for summary judgment, plaintiffs' designated Rule 30(b)(6) witnesses testified at their depositions that mere was no evidence that posting plaintiffs' articles to the Free Republic site diverted hits from plaintiffs' websites. Specifically, defendants cited Koefoot's testimony, in which he said there was no quantitative data that defendants' posting of articles diverted traffic from the Washington Post website. (See Defendants' Exhibits—Vol. 7, Ex. 1012 (Deposition of Eric Koefoot) at 56:15–57:24.) Koefoot added, however, that "qualitative data" supported such a conclusion since it is self-evident that a person who reads an article on the Free Republic site will not go to the Washington Post site to read the same thing. (Id. at 57:25–58:8.) Defendants also cited Eric Schvimmer's deposition testimony, in which he stated that he did not search for, and did not know of, any documents showing an decrease or increase in the number of hits to the Washington Post's website as a result of defendants' allegedly infringing acts. (Defendants' Exhibits—Vol. 6, Ex. 1011 (Deposition of Eric Schvimmer) at 65:6–11, Ex. 5 at 6.) Plaintiffs did not submit a declaration from Schvimmer in connection with the motions. They did submit Koefoot's declaration, however, which contains generalized statements to the effect that the Washington Post website loses potential "hits" when people can access Post articles at the Free Republic site. (Koefoot Decl., ¶¶ 21–22.) Perruso makes an almost identical statement respecting the Los Angeles Times' website in her declaration. (Perruso Decl., ¶¶ 20–21.) These statements do not contradict the deposition testimony. While plaintiffs may have no "quantitative data" to support the claim, they have consistently asserted that the Free Republic site reduces traffic on their web pages.

[59] Koefoot Decl., ¶¶ 8, 10–13; Perruso Decl., ¶¶ 8, 10–13.

[60] Defs.' Mot. at 14:16.

[61] See Stout Decl., ¶ 46. Stout's figures concern the Los Angeles Times site only.

[62] Often, First Amendment concerns are considered as part of the fair use analysis. See, e.g., Hustler, supra, 796 F.2d at 1151–52 ("Courts balance [me fair use] factors to determine whether the public interest in me free flow of information outweighs the copyright holder's interest in exclusive control over the work").

[63] Defs.' Mot. at 17:21–23.

6.3.3 Clean Flicks of Colorado LLC v. Soderbergh 6.3.3 Clean Flicks of Colorado LLC v. Soderbergh

This case tests what transformative means for derivative works and fair use

433 F.Supp.2d 1236 (2006)

CLEAN FLICKS OF COLORADO, LLC, Plaintiff, and
CleanFlicks, LLC; ASR Management Corporation d/b/a CleanFilms f/k/a MyCleanFlicks; Family Flix, USA, LLC; and Play It Clean Video, LLC, Counterclaim Defendants,
v.
Steven SODERBERGH; Robert Altman; Michael Apted; Taylor Hack ford; Curtis Hanson; Norman Jewison; John Landis; Michael Mann; Phillip Noyce; Brad Silberling; Betty Thomas; Irwin Winkler; Martin Scorsese; Steven Spielberg; Robert Redford; Sydney Pollack; Metro-Goldwyn-Mayer Studios, Inc.; Time Warner Entertainment Co., LP; Sony Pictures Entertainment; Disney Enterprises, Inc.; Dreamworks LLC; Universal City Studios, Inc.; Twentieth Century Fox Film Corp.; and Paramount Pictures Corporation, Defendants-Counterclaimants, and
The Directors Guild of America, Defendant-in-Intervention and Counterclaimant-in-Intervention.

Civil Action No. 02-CV-01662-RPM.

United States District Court, D. Colorado.

July 6, 2006.

[1237] David N. Schachter, Sherman & Howard, L.L.C., Denver, CO, Scott Joseph Mikulecky, Sherman & Howard, L.L.C., Colorado Springs, CO, for Plaintiff and Counterclaim Defendants.

Christopher P. Beall, Natalie Marie Hanlon-Leh, Thomas Buchan Kelley, Faegre & Benon, LLP, Denver, CO, Jonathan Zavin, Loeb & Loeb, LLP, New York, NY, for Defendants-Counterclaimants.

Erika Zimmer Enger, Dorsey & Whitney, LLP, Mark A. Wielga, Nathan Michael Longenecker, Temkin Wielga Hardt & Longenecker, L.L.P., Denver, CO, Ernest J. Getto, Latham & Watkins, San Francisco, CA, for Defendants-Counterclaimants, Defendant-in-Intervention and Counterclaimant-in-Intervention.

Jeffrey Nahinu Aldous, Leefe, Gibbs, Sullivan Dupre and Aldous, Attorneys Law, Provo, UT, Mark Yablonovich, Initiative Legal Group, LLP, Los Angeles, CA, Cameron T. Chandler, Kathleen E. Craigmile, Bennington, Johnson, Biermann & Craigmile, LLC, Denver, CO, Howard Troy Romero, Romero Montague P.S., Bellevue, WA, Mark F. Wright, Wright Law Group, PLLC, Chandler, AZ, for Counterclaim Defendants.

Family Flix, U.S.A., L.L.C., Provo, UT, pro se.

Play It Clean Video, L.L.C., Joann Moulton, Saint George, UT, pro se.

MEMORANDUM OPINION AND ORDER

MATSCH, Senior District Judge.

After years of pleadings with multiple claims, counterclaims and parties, many of them now dismissed by stipulation, the Motion Picture Studios[1] ("Studios") have moved for a partial summary judgment on their counterclaims of copyright infringement against the parties characterized as "Mechanical Editing Parties." An injunction is the relief requested against CleanFlicks, LLC, ("CleanFlicks"), Family Flix, U.S.A., L.L.C. ("Family Flix"), as creators and distributors of infringing works and against ASR Management Corporation, d/b/a CleanFilms, f/k/a MyCleanFlicks ("CleanFilms") and Play It Clean Video, LLC ("Play It Clean"), as distributors of infringing works. While the counterclaim defendants have argued that there are factual disputes to be resolved by a trial, the Court has determined that those disputes [1238] are not material to the legal issues raised wider Fed.R.Civ.P. 56 and that the Studios are entitled to the injunctive relief requested. Subject matter jurisdiction is pleaded and found under 28 U.S.C. §§ 1338 & 1367(a).

The applicable law is the Copyright Act, 17 U.S.C. §§ 101-122. The Studios, in the aggregate, have valid copyrights for the motion pictures ("movies") identified by name in the filed papers and, therefore, have the exclusive rights granted by § 106 of the Act. They sell and otherwise distribute their movies to the consuming public in various ways, including on DVDs and VHS videocassettes for purchase and rental. They also sell and otherwise distribute edited versions of their movies for use by airlines, network television and syndicated television broadcasters. The Studios' edits are made to conform to such criteria as ratings, content standards and practices, run time, formatting and industry standards. The Studios do not now sell or rent copies of edited versions of their movies on home video directly to consumers. That is the market reached by the counterclaim defendants' businesses.

CleanFlicks is a limited liability company in Utah, owned by Ray and Sharon Lines. It has created and publicly distributed copies of the Studios' movies that it altered by deleting "sex, nudity, profanity and gory violence," using its own guidelines. CleanFlicks began editing movies on VHS videocassettes in June, 2000, added DVDs at some time and now does only DVDs. The deletions are from both audio and visual content of the movies. The editing techniques used include redaction of audio content, replacing the redaction with ambient noise, "blending" of audio and visual content to provide transition of edited scenes, cropping, fogging or the use of a black bar to obscure visual content.

CleanFlicks first obtains an original copy of the movie from its customer or by its own purchase from an authorized retailer. It then makes a digital copy of the entire movie onto the hard drive of a computer, overcoming such technology as a digital content scrambling protection system in the acquired DVD, that is designed to prevent copying. After using software to make the edits, the company downloads from the computer an edited master copy which is then used to create a new recordable DVD-R to be sold to the public, directly or indirectly through a retailer. Thus, the content of the authorized DVD has been changed and the encryption removed. The DVD-R bears the CleanFlicks trademark. CleanFlicks makes direct sales and rentals to consumers online through its web-site requiring the purchaser to buy both the authorized and edited copies. CleanFlicks purchases an authorized copy of each edited copy it rents. CleanFlicks stops selling to any retailer that makes unauthorized copies of an edited movie.

Family Flix is an Arizona limited liability company owned by Richard and Sandra Teraci. It also copies authorized versions of movies into a computer and edits them to delete "profanity, nudity, strong graphic violence and sexual content or innuendos." Using methods comparable to CleanFlicks, Family Flix sells or rents its DVD-Rs directly to subscribers and to retailers. The original DVD is disabled and generally mounted inside the case with the DVD-R. The Family Flix logo with a disclaimer sticker is put on the case. There are no technical obstructions to copying the DVD-Rs.

CleanFilms, a Utah corporation, and Play It Clean Video, LLC, a Utah limited liability company, both rent and sell edited versions of the movies, obtained from Family Flix, CleanFlicks and others not [1239] parties in this case. CleanFilms maintains an inventory of the unedited versions of the copies it rents or sells to its members in a one-to-one ratio. Play It Clean does not keep an inventory of unedited copies; it relies on its suppliers' representations that they purchase such a copy for each copy sold.

Each of the counterclaim defendants is a commercial entity, obtaining revenue from the sale and rental of the edited movies by their pricing and subscription practices.

The Studios claim that CleanFlicks and Family Flix are infringing their exclusive right to reproduce the copyrighted works under § 106(1); that CleanFlicks and Family Flix are violating the Studios' right to create derivative works under § 106(2); and that all four of the counterclaim defendants are infringing the exclusive right of distribution of copies under § 106(3).

Section 106(1) provides that the owner of a copyright has the exclusive right to "reproduce the copyrighted work in copies or phonorecords." Section 101 defines "copies" as "material objects, other than phonorecords, in which a work is fixed by any method now known or later developed, and from which the work can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device. The term `copies' includes the material object, other than a phonorecord, in which the work is first fixed." The reproduction complained of is the making by CleanFlicks and Family Flix of voluminous fixed copies of the edited master versions of the Studios' movies, i.e., copies of copies, for which their "one-to-one ratio" of edited to original version argument does not preclude a finding of infringement.

Section 106(3) gives the owner of a copyright the exclusive right "to distribute copies or phonorecords of the copyrighted work to the public by sale or other transfer of ownership, or by rental, lease, or lending." Here, it is undisputed that all four of the counterclaim defendants distributed, by sale and rental, copies (albeit edited) of the Studios' copyrighted works and are therefore liable for infringement in the absence of any applicable defense.

All of the counterclaim defendants assert that they are making "fair use" of the copyrighted works, invoking the limitations on the exclusive rights granted by § 106, as provided in § 107 of the Act. The pertinent language of that section reads as follows:

Notwithstanding the provisions of sections 106 and 106A, the fair use of a copyrighted work, including such use by reproduction in copies or phonorecords or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of a copyright. In determining whether the use made of a work in any particular case is a fair use the factors to be considered shall include —

(1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes;

(2) the nature of the copyrighted work;

(3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and

(4) the effect of the use upon the potential market for or value of the copyrighted work.

Fair use is an affirmative defense on which the counterclaim defendants have the burden of proof. They argue that they have made a sufficient showing of the applicability of the fair use doctrine to warrant a trial.

[1240] The Supreme Court in Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569, 114 S.Ct. 1164, 127 L.Ed.2d 500 (1994) has instructed that the fair use doctrine must be applied using a case-by-case analysis, considering all four of the statutory factors, no one of which should be considered controlling.

Under the purpose and character of use factor, the counterclaim defendants concede that their use of the copyrighted works is for commercial gain, but argue, correctly, that under Campbell, that fact is not determinative. They seek to establish a public policy test that they are criticizing the objectionable content commonly found in current movies and that they are providing more socially acceptable alternatives to enable families to view the films together, without exposing children to the presumed harmful effects emanating from the objectionable content.

They seek some comfort in language appearing in the opinion deciding Chicago Bd. of Education v. Substance, Inc., 354 F.3d 624 (7th Cir.2003), that the privilege protects public criticism and may justify substantial copying of that which is being criticized. The holding in that case was an affirmance of the denial of the fair use defense under summary judgment standards. Ironically, Judge Posner wrote that a teacher does not have the right to publish the criticized tests indiscriminately "any more than a person who dislikes Michelangelo's statue of David has a right to take a sledgehammer to it." Id. at 630. Or, as maybe more aptly said in this case, to put a fig leaf on it to make it more acceptable for viewing by parents with young children.

The accused parties make much of their public policy argument and have submitted many communications from viewers expressing their appreciation for the opportunity to view movies in the setting of the family home without concern for any harmful effects on their children. This argument is inconsequential to copyright law and is addressed in the wrong forum. This Court is not free to determine the social value of copyrighted works. What is protected are the creator's rights to protect its creation in the form in which it was created.

During the pendency of this case Congress enacted the Family Movie Act of 2005, Pub.L. No. 109-9, 119 Stat. 218, 223-224, amending § 110 to provide an exemption for the editing of motion pictures by a member of a private household if no fixed copy of the altered version of the motion picture is created. That statute eliminated from this case those parties selling technology enabling such private editing. The legislative history shows that the amendment was not intended to exempt actions resulting in fixed copies of altered works which the House Committee believed illegal.[2] Thus, the appropriate branch of government had the opportunity to make the policy choice now urged and rejected it.

The Studios contend that the counterclaim defendants are violating the right to create derivative works, being the edited versions of their films. A "derivative work" is defined in § 101 as

A "derivative work" is a work based upon one or more preexisting works, such as a translation, musical arrangement, dramatization, fictionalization, motion picture version, sound recording, art reproduction, abridgment, condensation, or any other form in which a work may be recast, transformed, or adapted. A work consisting of editorial revisions, annotations, elaborations, or other modifications which, as a whole, represent an [1241] original work of authorship, is a "derivative work".

This raises the question of whether these DVD-Rs are "transformative." That same question arises under the fair use defense. The parties take inconsistent positions on this question. The counterclaim defendants argue that they are making a transformative use of the copyrighted works for purposes of the first factor under § 107(1) — that the purpose and character of their use are for criticism of the objectionable content of the movies, and then deny that their edited versions are derivative works because they are not recasting or revising the copyrighted material in a manner that can be characterized as a work of authorship within the statutory definition. On the other hand, the Studios say that the edited versions meet the definition of derivative works but deny that the character of the use is transformative within the scope of the fair use defense.

The transformative nature of the use of copyrighted material requires such a contribution of originality as may be of such public benefit as would serve the underlying purpose of providing copyright protection, as identified in Article 1, § 8 of the Constitution: . . . to Promote the Progress of Science and useful Arts."

In Campbell, the Supreme Court said that a use is transformative if it "adds something new, with a further purpose or different character, altering the first with new expression, meaning or message." Campbell, 510 U.S. at 579, 114 S.Ct. 1164. The counterclaim defendants add nothing new to these movies. They delete scenes and dialogue from them.

Since oral argument in this case the Second Circuit Court of Appeals decided Bill Graham Archives v. Dorling Kindersley Ltd., 448 F.3d 605 (2d Cir.2006). It held that the publisher of a "coffee table book," telling the story of the Grateful Dead, made fair use of that music group's artistic images on its event posters and tickets. In so doing, the opinion addressed all of the statutory factors and emphasized that these images were not exploitative and their appearance was only incidental to the commercial value of the historical/biographical book. Therefore, the use of the copyrighted images was "transformatively different from the images' original expressive purpose and [the publisher] does not seek to exploit the images' expressive value for commercial gain." Id. at 612.

That is in sharp contrast to the counterclaim defendants' use of the copyrighted works in this case. It is undisputed that the edits are a small percentage of most of the films copied and the use is clearly for commercial gain. There is nothing transformative about the edited copies. Therefore, the first statutory factor in the fair use defense does not support the infringers.

The non-transformative nature of the edited copies coupled with the creative expressions of the movies weigh heavily in favor of the Studios under the second factor, the nature of the copyrighted work.

The third factor requires an examination of the quantitative and qualitative nature of the copyrighted material taken. Campbell, supra at 586-587; Bill Graham Archives, supra at 613. This factor also weighs against fair use as the amount used is substantial for the movies are copied in almost their entirety for non-transformative use.

The primary argument on the fair use defense is the fourth statutory factor. The counterclaim defendants contend that there is no adverse effect from their use of the movies on the value of the copyrighted work to the Studios. They suggest that the Studios benefit because they are selling [1242] more copies of their movies as a result of the editing parties' practice of maintaining a one-to-one ratio of the original and edited versions. It is assumed that the consumers of the edited versions would not have themselves purchased the authorized versions because of the objectionable content and the Studios do not compete in this alternative market.

The argument has superficial appeal but it ignores the intrinsic value of the right to control the content of the copyrighted work which is the essence of the law of copyright. Whether these films should be edited in a manner that would make them acceptable to more of the public playing them on DVD in a home environment is more than merely a matter of marketing; it is a question of what audience the copyright owner wants to reach.

Section 107 is a partial codification of the equitable doctrine of fair use as an affirmative defense to copyright infringement that has long been a part of the common law of copyright. The Supreme Court recounted the history of this equitable defense in Harper & Row Publishers, Inc. v. Nation Enterprises, 471 U.S. 539, 105 S.Ct. 2218, 85 L.Ed.2d 588 (1985), and commented that it is predicated on a theory of an author's implied consent to reasonable and customary use when he releases his work for public consumption. Id. at 550, 105 S.Ct. 2218. That theory is not applicable here because the infringing parties are exploiting a market for movies that is different from what the Studios have released into and for an audience the Studios have not sought to reach.

Accepting all of the counterclaim defendants' factual allegations as true, the fair use defense is not applicable to this case. But because the infringing copies of these movies are not used in a transformative manner, they are not derivative works and do not violate § 106(2).

The counterclaim defendants assert the "first sale" doctrine as another affirmative defense. That doctrine protects the purchaser in any use of the authorized copy acquired but does not permit the making of additional copies. The Studios have made clear that they are not asserting that the use of a lawfully acquired copy in making the digital master copy is an infringement; they are asking this Court to prevent the use of that master copy in making the edits and creating the copies that are distributed to the public. Accordingly, the first sale doctrine has no relevance to this case.[3]

Counterclaim defendants CleanFilms, Family Flix, and Play It Clean in their replies raised waiver, estoppel and laches as additional affirmative defenses but they have failed to provide any support for them.

The counterclaim defendants argue the grant of the requested injunction would destroy their businesses and deprive the public of the benefit of seeing these movies without offending their sensibilities to the deleted material. They rely heavily on Williams & Wilkins Co. v. United States, 203 Ct.C1. 74, 487 F.2d 1345 (1973), aff'd, 420 U.S. 376, 95 S.Ct. 1344, 43 L.Ed.2d 264 (1975), in their claim that in weighing the equities to determine whether an injunction under § 502 is a reasonable remedy, the court must recognize the loss to the public of this viewing experience against the lack of any lost revenue to the Studios. They say there is no economic loss because the Studios are not in the [1243] same market and their sales have increased under the one-to-one policy requiring purchase of the originals.

In Williams & Wilkins, the court, in a divided opinion, held that government libraries' photocopying of medical journals for use by researchers should be considered fair use because medical science would be seriously hurt if such copying were stopped.. The dissenting judges were sharply critical of the majority view and it has not become a guiding precedent, particularly because of the unique factual context. At any rate, the entertainment value of in-home viewing of the edited films does not equate with the advancement of medical science. Under the facts of this case, the presumed destruction of the counterclaim defendants' businesses is not a justification for denying these copyright holders — the Studios — the right to control the reproduction and distribution of the protected work in their original form. The Studios have not asked for damages for any loss of revenue to them; they have not sought to recover the counterclaim defendants' profits and they do not ask for statutory damages under 17 U.S.C. § 504. Their objective in the motion for partial summary judgment is to stop the infringement because of its irreparable injury to the creative artistic expression in the copyrighted movies. There is a public interest in providing such protection despite the injury the infringers may sustain. Their business is illegitimate.

Upon the foregoing, it is ORDERED that:

1. The Studios' motion for partial summary judgment is granted as to their claim for copyright infringement under 17 U.S.C. § 106(1), the infringement of their right to reproduce their copyrighted works, against counterclaim defendants CleanFlicks, LLC and Family Flix, USA, LLC.

2. The Studios' motion for partial summary judgment is denied as to their claim for copyright infringement under 17 U.S.C. § 106(2), the infringement of the right to create derivative works, against counterclaim defendants CleanFlicks, LLC and Family Flix, USA, LLC.

3. The Studios' motion for partial summary judgment is granted as to their claim for copyright infringement under 17 U.S.C. § 106(3), the infringement of their right to distribute their copyrighted works, against all counterclaim defendants, CleanFlicks, LLC; ASR Management Corporation d/b/a CleanFilms f/k/a MyCleanFlicks; Family Flix, USA, LLC; and Play It Clean Video, LLC.

4. The Studios' motion for partial summary judgment is granted against Play It Clean Video, LLC on its claim for declaratory relief that its actions in distributing the Studios' copyrighted works are noninfringing.

5. The Studios' motion for partial summary judgment of dismissal is granted as to the counterclaim defendants' affirmative defense of fair use under 17 U.S.C. § 107.

6. The Studios' motion for partial summary judgment of dismissal is granted as to the counterclaim defendants' affirmative defense of the first sale doctrine under 17 U.S.C. § 109(a).

7. The Studios' motion for partial summary judgment of dismissal is granted as to counterclaim defendants ASR Management Corporation d/b/a CleanFilms f/k/a MyCleanFlicks', Family Flix, USA, LLC's, and Play It Clean Video, LLC's affirmative defenses of estoppel, laches and waiver.

8. CleanFlicks, LLC and Family Flix, USA, LLC, their officers, agents, servants, and employees, and all persons in active concert or participation with any of them [1244] are permanently enjoined and restrained from:

(i) Producing, manufacturing, creating, designing, selling, renting (in any format, including VHS tape, DVD and/or DVDR), advertising, marketing (including, without limitation, on television, in print media and on the Internet), offering for sale or rent, merchandising, distributing, providing, importing, promoting, displaying, and/or publicly performing unauthorized edited, or otherwise altered, copies of any motion picture, the copyright in which is owned or controlled by any of the Studios; and

(ii) Engaging in any acts contributing to and/or assisting any of the foregoing.

9. ASR Management Corporation d/b/a CleanFilms f/k/a MyCleanFlicks and Play It Clean Video, LLC, their officers, agents, servants, and employees, and all persons in active concert or participation with any of them are permanently enjoined and restrained from:

(i) Selling, renting (in any format, including VHS tape, DVD and/or DVDR), advertising, marketing (including, without limitation, on television, in print media and on the Internet), offering for sale or rent, merchandising, distributing, providing, importing, promoting, displaying, and/or publicly performing unauthorized edited, or otherwise altered, copies of any motion picture, the copyright in which is owned or controlled by any of the Studios; and

(ii) Engaging in any acts contributing to and/or assisting any of the foregoing.

10. Within five (5) business days of the date of this Order, CleanFlicks, LLC; ASR Management Corporation d/b/a CleanFilms f/k/a MyCleanFlicks; Family Flix, USA, LLC; and Play It Clean Video, LLC, their officers, agents, servants, and employees, and all persons in active concert or participation with any of them shall deliver to counsel for the Studios for destruction all unauthorized edited, or otherwise altered, copies or versions of any motion picture in their possession, custody and control the copyright in which is owned or controlled by any of the Studios.

11. Within five (5) business days of the date of this Order, CleanFlicks, LLC; ASR Management Corporation d/b/a CleanFilms f/k/a MyCleanFlicks; Family Flix, USA, LLC; and Play It Clean Video, LLC shall each execute and deliver to counsel for the Studios an affidavit confirming that all materials set forth in Paragraph 10 have been delivered to counsel for the Studios in accordance with said paragraph and that it is no longer in possession, custody or control of any such items.

[1] The Co-Defendant Motion Picture Studios are Metro-Goldwyn-Mayer Studios Inc., Warner Bros. Entertainment, Inc. (as successor-in-interest to the copyright interests of named counterclaimant Time Warner Entertainment Company, L.P.), Sony Pictures Entertainment, Inc., Disney Enterprises, Inc., Dream-Works L.L.C., Universal City Studios LLLP, Twentieth Century Fox Film Corporation, and Paramount Pictures Corporation (collectively, together with their subsidiaries and affiliates).

[2] H.R.Rep. No. 109-33(I) at 6-7 (2005), printed in 2005 U.S.C.C.A.N. 220, 225.

[3] The Studios have not claimed that this initial copying is a violation of the Digital Millennium Copyright Act, Pub.L. No. 105-304, 112 Stat. 2860 (1998), but assert that such a claim could be made.

6.4 OIL Casebook: Framing and Linking 6.4 OIL Casebook: Framing and Linking

6.4.1 Perfect 10 v. Amazon.com 6.4.1 Perfect 10 v. Amazon.com

508 F.3d 1146

PERFECT 10, INC., a California corporation, Plaintiff-Appellant,
v.
AMAZON.COM, INC., a corporation; A9.Com Inc., a corporation, Defendants-Appellees.

Perfect 10, Inc., a California corporation, Plaintiff-Appellant,
v.
Google Inc., a corporation, Defendant-Appellee.

Perfect 10, Inc., a California corporation, Plaintiff-Appellee,
v.
Google Inc., a corporation, Defendant-Appellant.

Perfect 10, Inc., a California corporation, Plaintiff-Appellant,
v.
Google Inc., a corporation, Defendant-Appellee.

Perfect 10, Inc., a California corporation, Plaintiff-Appellee,
v.
Google Inc., a corporation, Defendant-Appellant.

Perfect 10, Inc., a California corporation, Plaintiff-Appellee,
v.
Google Inc., a corporation, Defendant-Appellant.

No. 06-55405.
No. 06-55406.
No. 06-55425.
No. 06-55759.
No. 06-55854.
No. 06-55877.
United States Court of Appeals, Ninth Circuit.
Argued and Submitted November 15, 2006.
Filed May 16, 2007.
Amended December 3, 2007.

[1153] Russell J. Frackman and Jeffrey D. Goldman, Mitchell, Silberberg & Knupp LLP, Los Angeles, CA, Jeffrey N. Mausner, Berman, Mausner & Resser, Los Angeles, CA, Daniel J. Cooper, Perfect 10, Inc., Beverly Hills, CA, for plaintiff-appellant Perfect 10, Inc.

Andrew P. Bridges and Jennifer A. Golinveaux, Winston & Strawn LLP, San Francisco, CA, Gene C. Schaerr, Winston & Strawn LLP, Washington, DC, for defendant-appellee and cross-appellant Google Inc.

Mark T. Jansen & Anthony J. Malutta, Townsend and Townsend and Crew LLP, San Francisco, CA, for defendants-appellees Amazon.com and A9.com, Inc.

Fred von Lohmann, Electronic Frontier Foundation, San Francisco, CA, for amicus curiae Electronic Frontier Foundation, American Library Association, Medical Library [1154] Association, American Association of Law Libraries, Association of Research Libraries, and Special Libraries Association in support of Google Inc.

Victor S. Perlman, of counsel, American Society of Media Photographers; Nancy E. Wolff, of counsel, Cowan, DeBaets, Abrahams & Sheppard, LLP; Robert W. Clarida and Jason D. Sanders, Cowan, Liebowitz & Latman, P.C., New York, NY, for amicus curiae American Society of Media Photographers, Inc., Picture Archive Council of America, Inc., British Association of Picture Libraries and Agencies, Inc., Stock Artists Alliance, The Graphic Artists Guild, American Society of Picture Professionals and National Press Photographers, in support of Perfect 10 on issue of Google's liability for the display of full-size images.

Eric J. Schwartz and Steven J. Metalitz, Smith & Metalitz LLP, Washington, DC, for amicus curiae Motion Picture Association of America, Inc. in support of Perfect 10.

Jonathan Band, Jonathan Band PLLC, Washington, DC, for amicus curiae Net-Coalition, Computer and Communications Industry Association, U.S. Internet Service Provider Association, Consumer Electronics Association, Home Recording Rights Coalition, Information Technology Association of America, and Internet Commerce Coalition in support of Google Inc.

Kenneth L. Doroshow and Linda J. Zirkelbach, Recording Industry Association of America, Washington, DC; Jacqueline C. Charlesworth, National Music Publishers' Association, Washington, DC; Robert W. Clarida, Richard S. Mandel and Jonathan Z. King, Cowan, Liebowitz & Latman, P.C., New York, NY, for amicus curiae Recording Industry Association of America and National Music Publishers' Association in support of neither party.

Appeal from the United States District Court for the Central District of California; A. Howard Matz, District Judge, Presiding. D.C. Nos. CV-05-04753-AHM, CV-04-09484-AHM.

Before: CYNTHIA HOLCOMB HALL, HAWKINS, and SANDRA S. IKUTA, Circuit Judges.

IKUTA, Circuit Judge:

In this appeal, we consider a copyright owner's efforts to stop an Internet search engine from facilitating access to infringing images. Perfect 10, Inc. sued Google Inc., for infringing Perfect 10's copyrighted photographs of nude models, among other claims. Perfect 10 brought a similar action against Amazon.com and its subsidiary A9.com (collectively, "Amazon.com"). The district court preliminarily enjoined Google from creating and publicly displaying thumbnail versions of Perfect 10's images, Perfect 10 v. Google, Inc., 416 F.Supp.2d 828 (C.D.Cal.2006), but did not enjoin Google from linking to third-party websites that display infringing full-size versions of Perfect 10's images. Nor did the district court preliminarily enjoin Amazon.com from giving users access to information provided by Google. Perfect 10 and Google both appeal the district court's order. We have jurisdiction pursuant to 28 U.S.C. § 1292(a)(1).[1]

[1155] The district court handled this complex case in a particularly thoughtful and skillful manner. Nonetheless, the district court erred on certain issues, as we will further explain below. We affirm in part, reverse in part, and remand.

I

Background

Google's computers, along with millions of others, are connected to networks known collectively as the "Internet." "The Internet is a world-wide network of networks ... all sharing a common communications technology." Religious Tech. Ctr. v. Netcom On-Line Commc'n Servs., Inc., 923 F.Supp. 1231, 1238 n. 1 (N.D.Cal.1995). Computer owners can provide information stored on their computers to other users connected to the Internet through a medium called a webpage. A webpage consists of text interspersed with instructions written in Hypertext Markup Language ("HTML") that is stored in a computer. No images are stored on a webpage; rather, the HTML instructions on the webpage provide an address for where the images are stored, whether in the webpage publisher's computer or some other computer. In general, webpages are publicly available and can be accessed by computers connected to the Internet through the use of a web browser.

Google operates a search engine, a software program that automatically accesses thousands of websites (collections of webpages) and indexes them within a database stored on Google's computers. When a Google user accesses the Google website and types in a search query, Google's software searches its database for websites responsive to that search query. Google then sends relevant information from its index of websites to the user's computer. Google's search engines can provide results in the form of text, images, or videos.

The Google search engine that provides responses in the form of images is called "Google Image Search." In response to a search query, Google Image Search identifies text in its database responsive to the query and then communicates to users the images associated with the relevant text. Google's software cannot recognize and index the images themselves. Google Image Search provides search results as a webpage of small images called "thumbnails," which are stored in Google's servers. The thumbnail images are reduced, lower-resolution versions of full-sized images stored on third-party computers.

When a user clicks on a thumbnail image, the user's browser program interprets HTML instructions on Google's webpage. These HTML instructions direct the user's browser to cause a rectangular area (a "window") to appear on the user's computer screen. The window has two separate areas of information. The browser fills the top section of the screen with information from the Google webpage, including the thumbnail image and text. The HTML instructions also give the user's browser the address of the website publisher's computer that stores the full-size version of the thumbnail.[2] By following [1156] the HTML instructions to access the third-party webpage, the user's browser connects to the website publisher's computer, downloads the full-size image, and makes the image appear at the bottom of the window on the user's screen. Google does not store the images that fill this lower part of the window and does not communicate the images to the user; Google simply provides HTML instructions directing a user's browser to access a third-party website. However, the top part of the window (containing the information from the Google webpage) appears to frame and comment on the bottom part of the window. Thus, the user's window appears to be filled with a single integrated presentation of the full-size image, but it is actually an image from a third-party website framed by information from Google's website. The process by which the webpage directs a user's browser to incorporate content from different computers into a single window is referred to as "in-line linking." Kelly v. Arriba Soft Corp., 336 F.3d 811, 816 (9th Cir.2003). The term "framing" refers to the process by which information from one computer appears to frame and annotate the in-line linked content from another computer. Perfect 10, 416 F.Supp.2d at 833-34.

Google also stores webpage content in its cache.[3] For each cached webpage, Google's cache contains the text of the webpage as it appeared at the time Google indexed the page, but does not store images from the webpage. Id. at 833. Google may provide a link to a cached webpage in response to a user's search query. However, Google's cache version of the webpage is not automatically updated when the webpage is revised by its owner. So if the webpage owner updates its webpage to remove the HTML instructions for finding an infringing image, a browser communicating directly with the webpage would not be able to access that image. However, Google's cache copy of the webpage would still have the old HTML instructions for the infringing image. Unless the owner of the computer changed the HTML address of the infringing image, or otherwise rendered the image unavailable, a browser accessing Google's cache copy of the website could still access the image where it is stored on the website publisher's computer. In other words, Google's cache copy could provide a user's browser with valid directions to an infringing image even though the updated webpage no longer includes that infringing image.

In addition to its search engine operations, Google generates revenue through a business program called "AdSense." Under this program, the owner of a website can register with Google to become an AdSense "partner." The website owner then places HTML instructions on its webpages that signal Google's server to place advertising on the webpages that is relevant to the webpages' content. Google's computer program selects the advertising automatically by means of an algorithm. AdSense participants agree to share the revenues that flow from such advertising with Google.

[1157] Google also generated revenues through an agreement with Amazon.com that allowed Amazon.com to in-line link to Google's search results. Amazon.com gave its users the impression that Amazon.com was providing search results, but Google communicated the search results directly to Amazon.com's users. Amazon.com routed users' search queries to Google and automatically transmitted Google's responses (i.e., HTML instructions for linking to Google's search results) back to its users.

Perfect 10 markets and sells copyrighted images of nude models. Among other enterprises, it operates a subscription website on the Internet. Subscribers pay a monthly fee to view Perfect 10 images in a "members' area" of the site. Subscribers must use a password to log into the members' area. Google does not include these password-protected images from the members' area in Google's index or database. Perfect 10 has also licensed Fonestarz Media Limited to sell and distribute Perfect 10's reduced-size copyrighted images for download and use on cell phones.

Some website publishers republish Perfect 10's images on the Internet without authorization. Once this occurs, Google's search engine may automatically index the webpages containing these images and provide thumbnail versions of images in response to user inquiries. When a user clicks on the thumbnail image returned by Google's search engine, the user's browser accesses the third-party webpage and in-line links to the full-sized infringing image stored on the website publisher's computer. This image appears, in its original context, on the lower portion of the window on the user's computer screen framed by information from Google's webpage.

Procedural History. In May 2001, Perfect 10 began notifying Google that its thumbnail images and in-line linking to the full-size images infringed Perfect 10's copyright. Perfect 10 continued to send these notices through 2005.

On November 19, 2004, Perfect 10 filed an action against Google that included copyright infringement claims. This was followed by a similar action against Amazon.com on June 29, 2005. On July 1, 2005 and August 24, 2005, Perfect 10 sought a preliminary injunction to prevent Amazon.com and Google, respectively, from "copying, reproducing, distributing, publicly displaying, adapting or otherwise infringing, or contributing to the infringement" of Perfect 10's photographs; linking to websites that provide full-size infringing versions of Perfect 10's photographs; and infringing Perfect 10's username/password combinations.

The district court consolidated the two actions and heard both preliminary injunction motions on November 7, 2005. The district court issued orders granting in part and denying in part the preliminary injunction against Google and denying the preliminary injunction against Amazon.com. Perfect 10 and Google cross-appealed the partial grant and partial denial of the preliminary injunction motion, and Perfect 10 appealed the denial of the preliminary injunction against Amazon.com. On June 15, 2006, the district court temporarily stayed the preliminary injunction.

II

Standard of Review

We review the district court's grant or denial of a preliminary injunction for an abuse of discretion. A & M Records, Inc. v. Napster, Inc., 239 F.3d 1004, 1013 (9th Cir.2001). The district court must support a preliminary injunction with findings of fact, which we review for clear error. Earth Island Inst. v. U.S. Forest Serv., 442 F.3d 1147, 1156 (9th Cir.2006). We review the district court's conclusions of law de novo. Napster, 239 F.3d at 1013.

[1158] Section 502(a) of the Copyright Act authorizes a court to grant injunctive relief "on such terms as it may deem reasonable to prevent or restrain infringement of a copyright." 17 U.S.C. § 502(a). "Preliminary injunctive relief is available to a party who demonstrates either: (1) a combination of probable success on the merits and the possibility of irreparable harm; or (2) that serious questions are raised and the balance of hardships tips in its favor. These two formulations represent two points on a sliding scale in which the required degree of irreparable harm increases as the probability of success decreases." Napster, 239 F.3d at 1013 (internal quotation and citation omitted).

Because Perfect 10 has the burden of showing a likelihood of success on the merits, the district court held that Perfect 10 also had the burden of demonstrating a likelihood of overcoming Google's fair use defense under 17 U.S.C. § 107. Perfect 10, 416 F.Supp.2d at 836-37. This ruling was erroneous. At trial, the defendant in an infringement action bears the burden of proving fair use. See Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569, 590, 114 S.Ct. 1164, 127 L.Ed.2d 500 (1994). Because "the burdens at the preliminary injunction stage track the burdens at trial," once the moving party has carried its burden of showing a likelihood of success on the merits, the burden shifts to the non-moving party to show a likelihood that its affirmative defense will succeed. Gonzales v. O Centro Espirita Beneficente Uniao do Vegetal, 546 U.S. 418, 429, 126 S.Ct. 1211, 163 L.Ed.2d 1017 (2006); see also Abbott Labs. v. Andrx Pharms., Inc., 473 F.3d 1196, 1201 (Fed. Cir.2007) (to defeat a motion for preliminary injunctive relief in a patent infringement case, the non-moving party must establish a likelihood of success in proving its defenses of invalidity or unenforceability); PHG Techs., LLC v. St. John Cos., 469 F.3d 1361, 1365 (Fed.Cir.2006). Accordingly, once Perfect 10 has shown a likelihood of success on the merits, the burden shifts to Google to show a likelihood that its affirmative defenses will succeed.

In addition to its fair use defense, Google also raises an affirmative defense under title II of the Digital Millennium Copyright Act ("DMCA"), 17 U.S.C. § 512. Congress enacted title II of the DMCA "to provide greater certainty to service providers concerning their legal exposure for infringements that may occur in the course of their activities." Ellison v. Robertson, 357 F.3d 1072, 1076 (9th Cir. 2004) (internal quotation omitted). Sections 512(a) through (d) limit liability for (respectively): "(1) transitory digital network communications; (2) system caching; (3) information residing on systems or networks at the direction of users; and (4) information location tools." Id. at 1077. A service provider that qualifies for such protection is not liable for monetary relief and may be subject only to the narrow injunctive relief set forth in section 512(j). 17 U.S.C. § 512(a). If Perfect 10 demonstrates a likelihood of success on the merits, Google must show a likelihood of succeeding in its claim that it qualifies for protection under title II of the DMCA.[4][1159]

III

Direct Infringement

Perfect 10 claims that Google's search engine program directly infringes two exclusive rights granted to copyright holders: its display rights and its distribution rights.[5] "Plaintiffs must satisfy two requirements to present a prima facie case of direct infringement: (1) they must show ownership of the allegedly infringed material and (2) they must demonstrate that the alleged infringers violate at least one exclusive right granted to copyright holders under 17 U.S.C. § 106." Napster, 239 F.3d at 1013; see 17 U.S.C. § 501(a). Even if a plaintiff satisfies these two requirements and makes a prima facie case of direct infringement, the defendant may avoid liability if it can establish that its use of the images is a "fair use" as set forth in 17 U.S.C. § 107. See Kelly, 336 F.3d at 817.

Perfect 10's ownership of at least some of the images at issue is not disputed. See Perfect 10, 416 F.Supp.2d at 836.

The district court held that Perfect 10 was likely to prevail in its claim that Google violated Perfect 10's display right with respect to the infringing thumbnails. Id. at 844. However, the district court concluded that Perfect 10 was not likely to prevail on its claim that Google violated either Perfect 10's display or distribution right with respect to its full-size infringing images. Id. at 844-45. We review these rulings for an abuse of discretion. Napster, 239 F.3d at 1013.

A. Display Right

In considering whether Perfect 10 made a prima facie case of violation of its display right, the district court reasoned that a computer owner that stores an image as electronic information and serves that electronic information directly to the user ("i.e., physically sending ones and zeroes over the [I]nternet to the user's browser," Perfect 10, 416 F.Supp.2d at 839) is displaying the electronic information in violation of a copyright holder's exclusive display right. Id. at 843-45; see 17 U.S.C. § 106(5). Conversely, the owner of a computer that does not store and serve the electronic information to a user is not displaying that information, even if such owner in-line links to or frames the electronic information. Perfect 10, 416 F.Supp.2d at 843-45. The district court referred to this test as the "server test." Id. at 838-39.

Applying the server test, the district court concluded that Perfect 10 was likely to succeed in its claim that Google's thumbnails constituted direct infringement but was unlikely to succeed in its claim that Google's in-line linking to full-size infringing images constituted a direct infringement. [1160] Id. at 843-45. As explained below, because this analysis comports with the language of the Copyright Act, we agree with the district court's resolution of both these issues.

We have not previously addressed the question when a computer displays a copyrighted work for purposes of section 106(5). Section 106(5) states that a copyright owner has the exclusive right "to display the copyrighted work publicly." The Copyright Act explains that "display" means "to show a copy of it, either directly or by means of a film, slide, television image, or any other device or process...." 17 U.S.C. § 101. Section 101 defines "copies" as "material objects, other than phonorecords, in which a work is fixed by any method now known or later developed, and from which the work can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device." Id. Finally, the Copyright Act provides that "[a] work is `fixed' in a tangible medium of expression when its embodiment in a copy or phonorecord, by or under the authority of the author, is sufficiently permanent or stable to permit it to be perceived, reproduced, or otherwise communicated for a period of more than transitory duration." Id.

We must now apply these definitions to the facts of this case. A photographic image is a work that is "`fixed' in a tangible medium of expression," for purposes of the Copyright Act, when embodied (i.e., stored) in a computer's server (or hard disk, or other storage device). The image stored in the computer is the "copy" of the work for purposes of copyright law. See MAI Sys. Corp. v. Peak Computer, Inc., 991 F.2d 511, 517-18 (9th Cir.1993) (a computer makes a "copy" of a software program when it transfers the program from a third party's computer (or other storage device) into its own memory, because the copy of the program recorded in the computer is "fixed" in a manner that is "sufficiently permanent or stable to permit it to be perceived, reproduced, or otherwise communicated for a period of more than transitory duration" (quoting 17 U.S.C. § 101)). The computer owner shows a copy "by means of a ... device or process" when the owner uses the computer to fill the computer screen with the photographic image stored on that computer, or by communicating the stored image electronically to another person's computer. 17 U.S.C. § 101. In sum, based on the plain language of the statute, a person displays a photographic image by using a computer to fill a computer screen with a copy of the photographic image fixed in the computer's memory. There is no dispute that Google's computers store thumbnail versions of Perfect 10's copyrighted images and communicate copies of those thumbnails to Google's users.[6] Therefore, Perfect 10 has made a prima facie case that Google's communication of its stored thumbnail images directly infringes Perfect 10's display right.

Google does not, however, display a copy of full-size infringing photographic images for purposes of the Copyright Act when Google frames in-line linked images that appear on a user's computer screen. Because Google's computers do not store the photographic images, Google does not have a copy of the images for purposes of the Copyright Act. In other words, Google does not have any "material objects ... in [1161] which a work is fixed ... and from which the work can be perceived, reproduced, or otherwise communicated" and thus cannot communicate a copy. 17 U.S.C. § 101.

Instead of communicating a copy of the image, Google provides HTML instructions that direct a user's browser to a website publisher's computer that stores the full-size photographic image. Providing these HTML instructions is not equivalent to showing a copy. First, the HTML instructions are lines of text, not a photographic image. Second, HTML instructions do not themselves cause infringing images to appear on the user's computer screen. The HTML merely gives the address of the image to the user's browser. The browser then interacts with the computer that stores the infringing image. It is this interaction that causes an infringing image to appear on the user's computer screen. Google may facilitate the user's access to infringing images. However, such assistance raises only contributory liability issues, see Metro-Goldwyn-Mayer Studios, Inc. v. Grokster, Ltd., 545 U.S. 913, 929-30, 125 S.Ct. 2764, 162 L.Ed.2d 781 (2005), Napster, 239 F.3d at 1019, and does not constitute direct infringement of the copyright owner's display rights.

Perfect 10 argues that Google displays a copy of the full-size images by framing the full-size images, which gives the impression that Google is showing the image within a single Google webpage. While in-line linking and framing may cause some computer users to believe they are viewing a single Google webpage, the Copyright Act, unlike the Trademark Act, does not protect a copyright holder against acts that cause consumer confusion. Cf. 15 U.S.C. § 1114(1) (providing that a person who uses a trademark in a manner likely to cause confusion shall be liable in a civil action to the trademark registrant).[7]

Nor does our ruling that a computer owner does not display a copy of an image when it communicates only the HTML address of the copy erroneously collapse the display right in section 106(5) into the reproduction right set forth in section 106(1). Nothing in the Copyright Act prevents the various rights protected in section 106 from overlapping. Indeed, under some circumstances, more than one right must be infringed in order for an infringement claim to arise. For example, a "Game Genie" device that allowed a player to alter features of a Nintendo computer game did not infringe Nintendo's right to prepare derivative works because the Game Genie did not incorporate any portion of the game itself. See Lewis Galoob Toys, Inc. v. Nintendo of Am., Inc., 964 F.2d 965, 967 (9th Cir.1992). We held that a copyright holder's right to create derivative works is not infringed unless the alleged derivative work "incorporate[s] a protected work in some concrete or permanent `form.'" Id. In other words, in some contexts, the claimant must be able to claim infringement of its reproduction right in order to claim infringement of its right to prepare derivative works.

[1162] Because Google's cache merely stores the text of webpages, our analysis of whether Google's search engine program potentially infringes Perfect 10's display and distribution rights is equally applicable to Google's cache. Perfect 10 is not likely to succeed in showing that a cached webpage that in-line links to full-size infringing images violates such rights. For purposes of this analysis, it is irrelevant whether cache copies direct a user's browser to third-party images that are no longer available on the third party's website, because it is the website publisher's computer, rather than Google's computer, that stores and displays the infringing image.

B. Distribution Right

The district court also concluded that Perfect 10 would not likely prevail on its claim that Google directly infringed Perfect 10's right to distribute its full-size images. Perfect 10, 416 F.Supp.2d at 844-45. The district court reasoned that distribution requires an "actual dissemination" of a copy. Id. at 844. Because Google did not communicate the full-size images to the user's computer, Google did not distribute these images. Id.

Again, the district court's conclusion on this point is consistent with the language of the Copyright Act. Section 106(3) provides that the copyright owner has the exclusive right "to distribute copies or phonorecords of the copyrighted work to the public by sale or other transfer of ownership, or by rental, lease, or lending." 17 U.S.C. § 106(3). As noted, "copies" means "material objects ... in which a work is fixed." 17 U.S.C. § 101. The Supreme Court has indicated that in the electronic context, copies may be distributed electronically. See N.Y. Times Co. v. Tasini, 533 U.S. 483, 498, 121 S.Ct. 2381, 150 L.Ed.2d 500 (2001) (a computer database program distributed copies of newspaper articles stored in its computerized database by selling copies of those articles through its database service). Google's search engine communicates HTML instructions that tell a user's browser where to find full-size images on a website publisher's computer, but Google does not itself distribute copies of the infringing photographs. It is the website publisher's computer that distributes copies of the images by transmitting the photographic image electronically to the user's computer. As in Tasini, the user can then obtain copies by downloading the photo or printing it.

Perfect 10 incorrectly relies on Hotaling v. Church of Jesus Christ of Latter-Day Saints and Napster for the proposition that merely making images "available" violates the copyright owner's distribution right. Hotaling v. Church of Jesus Christ of Latter-Day Saints, 118 F.3d 199 (4th Cir.1997); Napster, 239 F.3d 1004. Hotaling held that the owner of a collection of works who makes them available to the public may be deemed to have distributed copies of the works. Hotaling, 118 F.3d at 203. Similarly, the distribution rights of the plaintiff copyright owners were infringed by Napster users (private individuals with collections of music files stored on their home computers) when they used the Napster software to make their collections available to all other Napster users. Napster, 239 F.3d at 1011-14.

This "deemed distribution" rule does not apply to Google. Unlike the participants in the Napster system or the library in Hotaling, Google does not own a collection of Perfect 10's full-size images and does not communicate these images to the computers of people using Google's search engine. Though Google indexes these images, it does not have a collection of stored full-size images it makes available to the public. Google therefore cannot be deemed to distribute copies of these images under the reasoning of Napster or [1163] Hotaling. Accordingly, the district court correctly concluded that Perfect 10 does not have a likelihood of success in proving that Google violates Perfect 10's distribution rights with respect to full-size images.

C. Fair Use Defense

Because Perfect 10 has succeeded in showing it would prevail in its prima facie case that Google's thumbnail images infringe Perfect 10's display rights, the burden shifts to Google to show that it will likely succeed in establishing an affirmative defense. Google contends that its use of thumbnails is a fair use of the images and therefore does not constitute an infringement of Perfect 10's copyright. See 17 U.S.C. § 107.

The fair use defense permits the use of copyrighted works without the copyright owner's consent under certain situations. The defense encourages and allows the development of new ideas that build on earlier ones, thus providing a necessary counterbalance to the copyright law's goal of protecting creators' work product. "From the infancy of copyright protection, some opportunity for fair use of copyrighted materials has been thought necessary to fulfill copyright's very purpose...." Campbell, 510 U.S. at 575, 114 S.Ct. 1164. "The fair use doctrine thus `permits [and requires] courts to avoid rigid application of the copyright statute when, on occasion, it would stifle the very creativity which that law is designed to foster.'" Id. at 577, 114 S.Ct. 1164 (quoting Stewart v. Abend, 495 U.S. 207, 236, 110 S.Ct. 1750, 109 L.Ed.2d 184 (1990)) (alteration in original).

Congress codified the common law of fair use in 17 U.S.C. § 107, which provides:

Notwithstanding the provisions of sections 106 and 106A, the fair use of a copyrighted work, including such use by reproduction in copies or phonorecords or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright. In determining whether the use made of a work in any particular case is a fair use the factors to be considered shall include—

(1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes;

(2) the nature of the copyrighted work;

(3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and

(4) the effect of the use upon the potential market for or value of the copyrighted work.

The fact that a work is unpublished shall not itself bar a finding of fair use if such finding is made upon consideration of all the above factors.

17 U.S.C. § 107.

We must be flexible in applying a fair use analysis; it "is not to be simplified with bright-line rules, for the statute, like the doctrine it recognizes, calls for case-by-case analysis.... Nor may the four statutory factors be treated in isolation, one from another. All are to be explored, and the results weighed together, in light of the purposes of copyright." Campbell, 510 U.S. at 577-78, 114 S.Ct. 1164; see also Kelly, 336 F.3d at 817-18. The purpose of copyright law is "[t]o promote the Progress of Science and useful Arts," U.S. CONST. art. I, § 8, cl. 8, and to serve "`the welfare of the public.'" Sony Corp. of Am. v. Universal City Studios, Inc., 464 U.S. 417, 429 n. 10, 104 S.Ct. 774, 78 L.Ed.2d 574 (quoting H.R.Rep. No. 2222, 60th Cong., 2d Sess. 7 (1909)).

[1164] In applying the fair use analysis in this case, we are guided by Kelly v. Arriba Soft Corp., which considered substantially the same use of copyrighted photographic images as is at issue here. See 336 F.3d 811. In Kelly, a photographer brought a direct infringement claim against Arriba, the operator of an Internet search engine. The search engine provided thumbnail versions of the photographer's images in response to search queries. Id. at 815-16. We held that Arriba's use of thumbnail images was a fair use primarily based on the transformative nature of a search engine and its benefit to the public. Id. at 818-22. We also concluded that Arriba's use of the thumbnail images did not harm the photographer's market for his image. Id. at 821-22.

In this case, the district court determined that Google's use of thumbnails was not a fair use and distinguished Kelly. Perfect 10, 416 F.Supp.2d at 845-51. We consider these distinctions in the context of the four-factor fair use analysis.

Purpose and character of the use. The first factor, 17 U.S.C. § 107(1), requires a court to consider "the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes." The central purpose of this inquiry is to determine whether and to what extent the new work is "transformative." Campbell, 510 U.S. at 579, 114 S.Ct. 1164. A work is "transformative" when the new work does not "merely supersede the objects of the original creation" but rather "adds something new, with a further purpose or different character, altering the first with new expression, meaning, or message." Id. (internal quotation and alteration omitted). Conversely, if the new work "supersede[s] the use of the original," the use is likely not a fair use. Harper & Row Publishers, Inc. v. Nation Enters., 471 U.S. 539, 550-51, 105 S.Ct. 2218, 85 L.Ed.2d 588 (1985) (internal quotation omitted) (publishing the "heart" of an unpublished work and thus supplanting the copyright holder's first publication right was not a fair use); see also Wall Data Inc. v. L.A. County Sheriff's Dep't, 447 F.3d 769, 778-82 (9th Cir.2006) (using a copy to save the cost of buying additional copies of a computer program was not a fair use).[8]

As noted in Campbell, a "transformative work" is one that alters the original work [1165] "with new expression, meaning, or message." Campbell, 510 U.S. at 579, 114 S.Ct. 1164. "A use is considered transformative only where a defendant changes a plaintiff's copyrighted work or uses the plaintiff's copyrighted work in a different context such that the plaintiff's work is transformed into a new creation." Wall Data, 447 F.3d at 778.

Google's use of thumbnails is highly transformative. In Kelly, we concluded that Arriba's use of thumbnails was transformative because "Arriba's use of the images serve[d] a different function than Kelly's use—improving access to information on the [I]nternet versus artistic expression." Kelly, 336 F.3d at 819. Although an image may have been created originally to serve an entertainment, aesthetic, or informative function, a search engine transforms the image into a pointer directing a user to a source of information. Just as a "parody has an obvious claim to transformative value" because "it can provide social benefit, by shedding light on an earlier work, and, in the process, creating a new one," Campbell, 510 U.S. at 579, 114 S.Ct. 1164, a search engine provides social benefit by incorporating an original work into a new work, namely, an electronic reference tool. Indeed, a search engine may be more transformative than a parody because a search engine provides an entirely new use for the original work, while a parody typically has the same entertainment purpose as the original work. See, e.g., id. at 594-96, 114 S.Ct. 1164 (holding that 2 Live Crew's parody of "Oh, Pretty Woman" using the words "hairy woman" or "bald headed woman" was a transformative work, and thus constituted a fair use); Mattel, Inc. v. Walking Mountain Prods., 353 F.3d 792, 796-98, 800-06 (9th Cir.2003) (concluding that photos parodying Barbie by depicting "nude Barbie dolls juxtaposed with vintage kitchen appliances" was a fair use). In other words, a search engine puts images "in a different context" so that they are "transformed into a new creation." Wall Data, 447 F.3d at 778.

The fact that Google incorporates the entire Perfect 10 image into the search engine results does not diminish the transformative nature of Google's use. As the district court correctly noted, Perfect 10, 416 F.Supp.2d at 848-49, we determined in Kelly that even making an exact copy of a work may be transformative so long as the copy serves a different function than the original work, Kelly, 336 F.3d at 818-19. For example, the First Circuit has held that the republication of photos taken for a modeling portfolio in a newspaper was transformative because the photos served to inform, as well as entertain. See Nunez v. Caribbean Int'l News Corp., 235 F.3d 18, 22-23 (1st Cir.2000). In contrast, duplicating a church's religious book for use by a different church was not transformative. See Worldwide Church of God v. Phila. Church of God, Inc., 227 F.3d 1110, 1117 (9th Cir.2000). Nor was a broadcaster's simple retransmission of a radio broadcast over telephone lines transformative, where the original radio shows were given no "new expression, meaning, or message." Infinity Broad. Corp. v. Kirkwood, 150 F.3d 104, 108 (2d Cir.1998). Here, Google uses Perfect 10's images in a new context to serve a different purpose.

The district court nevertheless determined that Google's use of thumbnail images was less transformative than Arriba's use of thumbnails in Kelly because Google's use of thumbnails superseded Perfect 10's right to sell its reduced-size images for use on cell phones. See Perfect 10, 416 F.Supp.2d at 849. The district court stated that "mobile users can download and save the thumbnails displayed by Google Image Search onto their phones," and concluded "to the extent that users may choose to download free images to their [1166] phone rather than purchase [Perfect 10's] reduced-size images, Google's use supersedes [Perfect 10's]." Id.

Additionally, the district court determined that the commercial nature of Google's use weighed against its transformative nature. Id. Although Kelly held that the commercial use of the photographer's images by Arriba's search engine was less exploitative than typical commercial use, and thus weighed only slightly against a finding of fair use, Kelly, 336 F.3d at 818-20, the district court here distinguished Kelly on the ground that some website owners in the AdSense program had infringing Perfect 10 images on their websites, Perfect 10, 416 F.Supp.2d at 846-47. The district court held that because Google's thumbnails "lead users to sites that directly benefit Google's bottom line," the AdSense program increased the commercial nature of Google's use of Perfect 10's images. Id. at 847.

In conducting our case-specific analysis of fair use in light of the purposes of copyright, Campbell, 510 U.S. at 581, 114 S.Ct. 1164, we must weigh Google's superseding and commercial uses of thumbnail images against Google's significant transformative use, as well as the extent to which Google's search engine promotes the purposes of copyright and serves the interests of the public. Although the district court acknowledged the "truism that search engines such as Google Image Search provide great value to the public," Perfect 10, 416 F.Supp.2d at 848-49, the district court did not expressly consider whether this value outweighed the significance of Google's superseding use or the commercial nature of Google's use. Id. at 849. The Supreme Court, however, has directed us to be mindful of the extent to which a use promotes the purposes of copyright and serves the interests of the public. See Campbell, 510 U.S. at 579, 114 S.Ct. 1164; Harper & Row, 471 U.S. at 556-57, 105 S.Ct. 2218; Sony, 464 U.S. at 431-32, 104 S.Ct. 774.

We note that the superseding use in this case is not significant at present: the district court did not find that any downloads for mobile phone use had taken place. See Perfect 10, 416 F.Supp.2d at 849. Moreover, while Google's use of thumbnails to direct users to AdSense partners containing infringing content adds a commercial dimension that did not exist in Kelly, the district court did not determine that this commercial element was significant. See id. at 848-49. The district court stated that Google's AdSense programs as a whole contributed "$630 million, or 46% of total revenues" to Google's bottom line, but noted that this figure did not "break down the much smaller amount attributable to websites that contain infringing content." Id. at 847 & n. 12 (internal quotation omitted).

We conclude that the significantly transformative nature of Google's search engine, particularly in light of its public benefit, outweighs Google's superseding and commercial uses of the thumbnails in this case. In reaching this conclusion, we note the importance of analyzing fair use flexibly in light of new circumstances. Sony, 464 U.S. at 431-32, 104 S.Ct. 774; id. at 448 n. 31, 104 S.Ct. 774 ("`[Section 107] endorses the purpose and general scope of the judicial doctrine of fair use, but there is no disposition to freeze the doctrine in the statute, especially during a period of rapid technological change.'" (quoting H.R.Rep. No. 94-1476, p. 65-66 (1976), U.S.Code Cong. & Admin. News 1976, p. 5680)). We are also mindful of the Supreme Court's direction that "the more transformative the new work, the less will be the significance of other factors, like commercialism, that may weigh against a finding of fair use." Campbell, 510 U.S. at 579, 114 S.Ct. 1164.

[1167] Accordingly, we disagree with the district court's conclusion that because Google's use of the thumbnails could supersede Perfect 10's cell phone download use and because the use was more commercial than Arriba's, this fair use factor weighed "slightly" in favor of Perfect 10. Perfect 10, 416 F.Supp.2d at 849. Instead, we conclude that the transformative nature of Google's use is more significant than any incidental superseding use or the minor commercial aspects of Google's search engine and website. Therefore, this factor weighs heavily in favor of Google.

The nature of the copyrighted work. With respect to the second factor, "the nature of the copyrighted work," 17 U.S.C. § 107(2), our decision in Kelly is directly on point. There we held that the photographer's images were "creative in nature" and thus "closer to the core of intended copyright protection than are more fact-based works." Kelly, 336 F.3d at 820 (internal quotation omitted). However, because the photos appeared on the Internet before Arriba used thumbnail versions in its search engine results, this factor weighed only slightly in favor of the photographer. Id.

Here, the district court found that Perfect 10's images were creative but also previously published. Perfect 10, 416 F.Supp.2d at 850. The right of first publication is "the author's right to control the first public appearance of his expression." Harper & Row, 471 U.S. at 564, 105 S.Ct. 2218. Because this right encompasses "the choices of when, where, and in what form first to publish a work," id., an author exercises and exhausts this one-time right by publishing the work in any medium. See, e.g., Batjac Prods. Inc. v. Good-Times Home Video Corp., 160 F.3d 1223, 1235 (9th Cir.1998) (noting, in the context of the common law right of first publication, that such a right "does not entail multiple first publication rights in every available medium"). Once Perfect 10 has exploited this commercially valuable right of first publication by putting its images on the Internet for paid subscribers, Perfect 10 is no longer entitled to the enhanced protection available for an unpublished work. Accordingly the district court did not err in holding that this factor weighed only slightly in favor of Perfect 10.[9] See Perfect 10, 416 F.Supp.2d at 849-50.

The amount and substantiality of the portion used. "The third factor asks whether the amount and substantiality of the portion used in relation to the copyrighted work as a whole ... are reasonable in relation to the purpose of the copying." Campbell, 510 U.S. at 586, 114 S.Ct. 1164 (internal quotation omitted); see also 17 U.S.C. § 107(3). In Kelly, we held Arriba's use of the entire photographic image was reasonable in light of the purpose of a search engine. Kelly, 336 F.3d at 821. Specifically, we noted, "[i]t was necessary for Arriba to copy the entire image to allow users to recognize the image and decide whether to pursue more information about the image or the originating [website]. If Arriba only copied part of the image, it would be more difficult to identify it, thereby reducing the usefulness of the visual search engine." Id. Accordingly, we concluded that this factor did not weigh in favor of either [1168] party. Id. Because the same analysis applies to Google's use of Perfect 10's image, the district court did not err in finding that this factor favored neither party.

Effect of use on the market. The fourth factor is "the effect of the use upon the potential market for or value of the copyrighted work." 17 U.S.C. § 107(4). In Kelly, we concluded that Arriba's use of the thumbnail images did not harm the market for the photographer's full-size images. See Kelly, 336 F.3d at 821-22. We reasoned that because thumbnails were not a substitute for the full-sized images, they did not harm the photographer's ability to sell or license his full-sized images. Id. The district court here followed Kelly's reasoning, holding that Google's use of thumbnails did not hurt Perfect 10's market for full-size images. See Perfect 10, 416 F.Supp.2d at 850-51. We agree.

Perfect 10 argues that the district court erred because the likelihood of market harm may be presumed if the intended use of an image is for commercial gain. However, this presumption does not arise when a work is transformative because "market substitution is at least less certain, and market harm may not be so readily inferred." Campbell, 510 U.S. at 591, 114 S.Ct. 1164. As previously discussed, Google's use of thumbnails for search engine purposes is highly transformative, and so market harm cannot be presumed.

Perfect 10 also has a market for reduced-size images, an issue not considered in Kelly. The district court held that "Google's use of thumbnails likely does harm the potential market for the downloading of [Perfect 10's] reduced-size images onto cell phones." Perfect 10, 416 F.Supp.2d at 851 (emphasis omitted). The district court reasoned that persons who can obtain Perfect 10 images free of charge from Google are less likely to pay for a download, and the availability of Google's thumbnail images would harm Perfect 10's market for cell phone downloads. Id. As we discussed above, the district court did not make a finding that Google users have downloaded thumbnail images for cell phone use. This potential harm to Perfect 10's market remains hypothetical. We conclude that this factor favors neither party.

Having undertaken a case-specific analysis of all four factors, we now weigh these factors together "in light of the purposes of copyright." Campbell, 510 U.S. at 578, 114 S.Ct. 1164; see also Kelly, 336 F.3d at 818 ("We must balance[the section 107] factors in light of the objectives of copyright law, rather than view them as definitive or determinative tests."). In this case, Google has put Perfect 10's thumbnail images (along with millions of other thumbnail images) to a use fundamentally different than the use intended by Perfect 10. In doing so, Google has provided a significant benefit to the public. Weighing this significant transformative use against the unproven use of Google's thumbnails for cell phone downloads, and considering the other fair use factors, all in light of the purpose of copyright, we conclude that Google's use of Perfect 10's thumbnails is a fair use. Because the district court here "found facts sufficient to evaluate each of the statutory factors ... [we] need not remand for further factfinding." Harper & Row, 471 U.S. at 560, 105 S.Ct. 2218 (internal quotation omitted). We conclude that Google is likely to succeed in proving its fair use defense and, accordingly, we vacate the preliminary injunction regarding Google's use of thumbnail images.

IV

Secondary Liability for Copyright Infringement

We now turn to the district court's ruling that Google is unlikely to be secondarily [1169] liable for its in-line linking to infringing full-size images under the doctrines of contributory and vicarious infringement.[10] The district court ruled that Perfect 10 did not have a likelihood of proving success on the merits of either its contributory infringement or vicarious infringement claims with respect to the full-size images. See Perfect 10, 416 F.Supp.2d at 856, 858. In reviewing the district court's conclusions, we are guided by the Supreme Court's recent interpretation of secondary liability, namely: "[o]ne infringes contributorily by intentionally inducing or encouraging direct infringement, and infringes vicariously by profiting from direct infringement while declining to exercise a right to stop or limit it." Grokster, 545 U.S. at 930, 125 S.Ct. 2764 (internal citations omitted).

Direct Infringement by Third Parties. As a threshold matter, before we examine Perfect 10's claims that Google is secondarily liable, Perfect 10 must establish that there has been direct infringement by third parties. See Napster, 239 F.3d at 1013 n. 2 ("Secondary liability for copyright infringement does not exist in the absence of direct infringement by a third party.").

Perfect 10 alleges that third parties directly infringed its images in three ways. First, Perfect 10 claims that third-party websites directly infringed its copyright by reproducing, displaying, and distributing unauthorized copies of Perfect 10's images. Google does not dispute this claim on appeal.

Second, Perfect 10 claims that individual users of Google's search engine directly infringed Perfect 10's copyrights by storing full-size infringing images on their computers. We agree with the district court's conclusion that Perfect 10 failed to provide sufficient evidence to support this claim. See Perfect 10, 416 F.Supp.2d at 852. There is no evidence in the record directly establishing that users of Google's search engine have stored infringing images on their computers, and the district court did not err in declining to infer the existence of such evidence.

Finally, Perfect 10 contends that users who link to infringing websites automatically make "cache" copies of full-size images and thereby directly infringe Perfect 10's reproduction right. The district court rejected this argument, holding that any such reproduction was likely a "fair use." Id. at 852 n. 17. The district court reasoned that "[l]ocal caching by the browsers of individual users is noncommercial, transformative, and no more than necessary to achieve the objectives of decreasing network latency and minimizing unnecessary bandwidth usage (essential to the [I]nternet). It has a minimal impact on the potential market for the original work...." Id. We agree; even assuming such automatic copying could constitute direct infringement, it is a fair use in this context. The copying function performed automatically by a user's computer to assist in accessing the Internet is a transformative use. Moreover, as noted by the district court, a cache copies no more than is necessary to assist the user in Internet use. It is designed to enhance an individual's computer use, not to supersede the copyright holders' exploitation of their works. Such automatic background copying has no more than a minimal effect on Perfect 10's rights, but a considerable public benefit. Because the four fair use factors weigh in favor of concluding that [1170] cache copying constitutes a fair use, Google has established a likelihood of success on this issue. Accordingly, Perfect 10 has not carried its burden of showing that users' cache copies of Perfect 10's full-size images constitute direct infringement.

Therefore, we must assess Perfect 10's arguments that Google is secondarily liable in light of the direct infringement that is undisputed by the parties: third-party websites' reproducing, displaying, and distributing unauthorized copies of Perfect 10's images on the Internet. Id. at 852.

A. Contributory Infringement

In order for Perfect 10 to show it will likely succeed in its contributory liability claim against Google, it must establish that Google's activities meet the definition of contributory liability recently enunciated in Grokster. Within the general rule that "[o]ne infringes contributorily by intentionally inducing or encouraging direct infringement," Grokster, 545 U.S. at 930, 125 S.Ct. 2764, the Court has defined two categories of contributory liability: "Liability under our jurisprudence may be predicated on actively encouraging (or inducing) infringement through specific acts (as the Court's opinion develops) or on distributing a product distributees use to infringe copyrights, if the product is not capable of `substantial' or `commercially significant' noninfringing uses." Id. at 942, 125 S.Ct. 2764 (Ginsburg, J., concurring) (quoting Sony, 464 U.S. at 442, 104 S.Ct. 774); see also id. at 936-37, 125 S.Ct. 2764.

Looking at the second category of liability identified by the Supreme Court (distributing products), Google relies on Sony, 464 U.S. at 442, 104 S.Ct. 774, to argue that it cannot be held liable for contributory infringement because liability does not arise from the mere sale of a product (even with knowledge that consumers would use the product to infringe) if the product is capable of substantial non-infringing use. Google argues that its search engine service is such a product. Assuming the principle enunciated in Sony is applicable to the operation of Google's search engine, then Google cannot be held liable for contributory infringement solely because the design of its search engine facilitates such infringement. Grokster, 545 U.S. at 931-32, 125 S.Ct. 2764 (discussing Sony, 464 U.S. 417, 104 S.Ct. 774, 78 L.Ed.2d 574). Nor can Google be held liable solely because it did not develop technology that would enable its search engine to automatically avoid infringing images. See id. at 939 n. 12, 125 S.Ct. 2764. However, Perfect 10 has not based its claim of infringement on the design of Google's search engine and the Sony rule does not immunize Google from other sources of contributory liability. See id. at 933-34, 125 S.Ct. 2764.

We must next consider whether Google could be held liable under the first category of contributory liability identified by the Supreme Court, that is, the liability that may be imposed for intentionally encouraging infringement through specific acts.[11] Grokster tells us that contribution to infringement must be intentional for liability to arise. Grokster, 545 U.S. at 930, 125 S.Ct. 2764. However, Grokster also directs us to analyze contributory liability in light of "rules of fault-based liability derived from the common law," id. at 934-35, 125 S.Ct. 2764, and [1171] common law principles establish that intent may be imputed. "Tort law ordinarily imputes to an actor the intention to cause the natural and probable consequences of his conduct." DeVoto v. Pac. Fid. Life Ins. Co., 618 F.2d 1340, 1347 (9th Cir. 1980); RESTATEMENT (SECOND) OF TORTS § 8A cmt. b (1965) ("If the actor knows that the consequences are certain, or substantially certain, to result from his act, and still goes ahead, he is treated by the law as if he had in fact desired to produce the result."). When the Supreme Court imported patent law's "staple article of commerce doctrine" into the copyright context, it also adopted these principles of imputed intent. Grokster, 545 U.S. at 932, 125 S.Ct. 2764 ("The [staple article of commerce] doctrine was devised to identify instances in which it may be presumed from distribution of an article in commerce that the distributor intended the article to be used to infringe another's patent, and so may justly be held liable for that infringement."). Therefore, under Grokster, an actor may be contributorily liable for intentionally encouraging direct infringement if the actor knowingly takes steps that are substantially certain to result in such direct infringement.

Our tests for contributory liability are consistent with the rule set forth in Grokster. We have adopted the general rule set forth in Gershwin Publishing Corp. v. Columbia Artists Management, Inc., namely: "one who, with knowledge of the infringing activity, induces, causes or materially contributes to the infringing conduct of another, may be held liable as a `contributory' infringer," 443 F.2d 1159, 1162 (2d Cir.1971). See Ellison, 357 F.3d at 1076; Napster, 239 F.3d at 1019; Fonovisa, Inc. v. Cherry Auction, Inc., 76 F.3d 259, 264 (9th Cir.1996).

We have further refined this test in the context of cyberspace[12] to determine when contributory liability can be imposed on a provider of Internet access or services. See Napster, 239 F.3d at 1019-20. In Napster, we considered claims that the operator of an electronic file sharing system was contributorily liable for assisting individual users to swap copyrighted music files stored on their home computers with other users of the system. Napster, 239 F.3d at 1011-13, 1019-22. We stated that "if a computer system operator learns of specific infringing material available on his system and fails to purge such material from the system, the operator knows of and contributes to direct infringement." Id. at 1021. Because Napster knew of the availability of infringing music files, assisted users in accessing such files, and failed to block access to such files, we concluded that Napster materially contributed to infringement. Id. at 1022.

The Napster test for contributory liability was modeled on the influential district court decision in Religious Technology Center v. Netcom On-Line Communication Services, Inc. (Netcom), 907 F.Supp. 1361, 1365-66 (N.D.Cal.1995). See Napster, 239 F.3d at 1021. In Netcom, a disgruntled former Scientology minister posted allegedly infringing copies of Scientological works on an electronic bulletin board service. Netcom, 907 F.Supp. at 1365-66. The messages were stored on the bulletin board operator's computer, then automatically copied onto Netcom's computer, and from there copied onto other computers comprising "a worldwide community" of electronic bulletin board systems. Id. at 1366-67 & n. 4 (internal quotation omitted). Netcom held that if plaintiffs [1172] could prove that Netcom knew or should have known that the minister infringed plaintiffs' copyrights, "Netcom [would] be liable for contributory infringement since its failure to simply cancel [the former minister's] infringing message and thereby stop an infringing copy from being distributed worldwide constitute[d] substantial participation in [the former minister's] public distribution of the message." Id. at 1374.

Although neither Napster nor Netcom expressly required a finding of intent, those cases are consistent with Grokster because both decisions ruled that a service provider's knowing failure to prevent infringing actions could be the basis for imposing contributory liability. Under such circumstances, intent may be imputed. In addition, Napster and Netcom are consistent with the longstanding requirement that an actor's contribution to infringement must be material to warrant the imposition of contributory liability. Gershwin, 443 F.2d at 1162. Both Napster and Netcom acknowledge that services or products that facilitate access to websites throughout the world can significantly magnify the effects of otherwise immaterial infringing activities. See Napster, 239 F.3d at 1022; Netcom, 907 F.Supp. at 1375. The Supreme Court has acknowledged that "[t]he argument for imposing indirect liability" is particularly "powerful" when individuals using the defendant's software could make a huge number of infringing downloads every day. Grokster, 545 U.S. at 929, 125 S.Ct. 2764. Moreover, copyright holders cannot protect their rights in a meaningful way unless they can hold providers of such services or products accountable for their actions pursuant to a test such as that enunciated in Napster. See id. at 929-30, 125 S.Ct. 2764 ("When a widely shared service or product is used to commit infringement, it may be impossible to enforce rights in the protected work effectively against all direct infringers, the only practical alternative being to go against the distributor of the copying device for secondary liability on a theory of contributory or vicarious infringement."). Accordingly, we hold that a computer system operator can be held contributorily liable if it "has actual knowledge that specific infringing material is available using its system," Napster, 239 F.3d at 1022, and can "take simple measures to prevent further damage" to copyrighted works, Netcom, 907 F.Supp. at 1375, yet continues to provide access to infringing works.

Here, the district court held that even assuming Google had actual knowledge of infringing material available on its system, Google did not materially contribute to infringing conduct because it did not undertake any substantial promotional or advertising efforts to encourage visits to infringing websites, nor provide a significant revenue stream to the infringing websites. Perfect 10, 416 F.Supp.2d at 854-56. This analysis is erroneous. There is no dispute that Google substantially assists websites to distribute their infringing copies to a worldwide market and assists a worldwide audience of users to access infringing materials. We cannot discount the effect of such a service on copyright owners, even though Google's assistance is available to all websites, not just infringing ones. Applying our test, Google could be held contributorily liable if it had knowledge that infringing Perfect 10 images were available using its search engine, could take simple measures to prevent further damage to Perfect 10's copyrighted works, and failed to take such steps.

The district court did not resolve the factual disputes over the adequacy of Perfect 10's notices to Google and Google's responses to these notices. Moreover, there are factual disputes over whether there are reasonable and feasible means for Google to refrain from providing access [1173] to infringing images. Therefore, we must remand this claim to the district court for further consideration whether Perfect 10 would likely succeed in establishing that Google was contributorily liable for in-line linking to full-size infringing images under the test enunciated today.[13]

B. Vicarious Infringement

Perfect 10 also challenges the district court's conclusion that it is not likely to prevail on a theory of vicarious liability against Google. Perfect 10, 416 F.Supp.2d at 856-58. Grokster states that one "infringes vicariously by profiting from direct infringement while declining to exercise a right to stop or limit it." Grokster, 545 U.S. at 930, 125 S.Ct. 2764. As this formulation indicates, to succeed in imposing vicarious liability, a plaintiff must establish that the defendant exercises the requisite control over the direct infringer and that the defendant derives a direct financial benefit from the direct infringement. See id. Grokster further explains the "control" element of the vicarious liability test as the defendant's "right and ability to supervise the direct infringer." Id. at 930 n. 9, 125 S.Ct. 2764. Thus, under Grokster, a defendant exercises control over a direct infringer when he has both a legal right to stop or limit the directly infringing conduct, as well as the practical ability to do so.

We evaluate Perfect 10's arguments that Google is vicariously liable in light of the direct infringement that is undisputed by the parties, namely, the third-party websites' reproduction, display, and distribution of unauthorized copies of Perfect 10's images on the Internet. Perfect 10, 416 F.Supp.2d at 852; see supra Section IV.A. In order to prevail at this preliminary injunction stage, Perfect 10 must demonstrate a likelihood of success in establishing that Google has the right and ability to stop or limit the infringing activities of third party websites. In addition, Perfect 10 must establish a likelihood of proving that Google derives a direct financial benefit from such activities. Perfect 10 has not met this burden.

With respect to the "control" element set forth in Grokster, Perfect 10 has not demonstrated a likelihood of showing that Google has the legal right to stop or limit the direct infringement of third-party websites. See Grokster, 545 U.S. at 930, 125 S.Ct. 2764. Unlike Fonovisa, where by virtue of a "broad contract" with its vendors the defendant swap meet operators had the right to stop the vendors from selling counterfeit recordings on its premises, Fonovisa, 76 F.3d at 263, Perfect 10 has not shown that Google has contracts with third-party websites that empower Google to stop or limit them from reproducing, displaying, and distributing infringing copies of Perfect 10's images on the Internet. Perfect 10 does point to Google's AdSense agreement, which states that Google reserves "the right to monitor and terminate partnerships with entities that violate others' copyright[s]." Perfect 10, 416 F.Supp.2d at 858. However, Google's right to terminate an AdSense partnership does not give Google the right to [1174] stop direct infringement by third-party websites. An infringing third-party website can continue to reproduce, display, and distribute its infringing copies of Perfect 10 images after its participation in the AdSense program has ended.

Nor is Google similarly situated to Napster. Napster users infringed the plaintiffs' reproduction and distribution rights through their use of Napster's proprietary music-file sharing system. Napster, 239 F.3d at 1011-14. There, the infringing conduct was the use of Napster's "service to download and upload copyrighted music." Id. at 1014 (internal quotation omitted). Because Napster had a closed system requiring user registration, and could terminate its users' accounts and block their access to the Napster system, Napster had the right and ability to prevent its users from engaging in the infringing activity of uploading file names and downloading Napster users' music files through the Napster system.[14] Id. at 1023-24. By contrast, Google cannot stop any of the third-party websites from reproducing, displaying, and distributing unauthorized copies of Perfect 10's images because that infringing conduct takes place on the third-party websites. Google cannot terminate those third-party websites or block their ability to "host and serve infringing full-size images" on the Internet. Perfect 10, 416 F.Supp.2d at 831.

Moreover, the district court found that Google lacks the practical ability to police the third-party websites' infringing conduct. Id. at 857-58. Specifically, the court found that Google's supervisory power is limited because "Google's software lacks the ability to analyze every image on the [I]nternet, compare each image to all the other copyrighted images that exist in the world ... and determine whether a certain image on the web infringes someone's copyright." Id. at 858. The district court also concluded that Perfect 10's suggestions regarding measures Google could implement to prevent its web crawler from indexing infringing websites and to block access to infringing images were not workable. Id. at 858 n. 25. Rather, the suggestions suffered from both "imprecision and overbreadth." Id. We hold that these findings are not clearly erroneous. Without image-recognition technology, Google lacks the practical ability to police the infringing activities of third-party websites. This distinguishes Google from the defendants held liable in Napster and Fonovisa. See Napster, 239 F.3d at 1023-24 (Napster had the ability to identify and police infringing conduct by searching its index for song titles); Fonovisa, 76 F.3d at 262 (swap meet operator had the ability to identify and police infringing activity by patrolling its premises).

Perfect 10 argues that Google could manage its own operations to avoid [1175] indexing websites with infringing content and linking to third-party infringing sites. This is a claim of contributory liability, not vicarious liability. Although "the lines between direct infringement, contributory infringement, and vicarious liability are not clearly drawn," Sony, 464 U.S. at 435 n. 17, 104 S.Ct. 774 (internal quotation omitted), in general, contributory liability is based on the defendant's failure to stop its own actions which facilitate third-party infringement, while vicarious liability is based on the defendant's failure to cause a third party to stop its directly infringing activities. See, e.g., Ellison, 357 F.3d at 1077-78; Fonovisa, 76 F.3d at 261-64. Google's failure to change its operations to avoid assisting websites to distribute their infringing content may constitute contributory liability, see supra Section IV.A. However, this failure is not the same as declining to exercise a right and ability to make third-party websites stop their direct infringement. We reject Perfect 10's efforts to blur this distinction.

Because we conclude that Perfect 10 has not shown a likelihood of establishing Google's right and ability to stop or limit the directly infringing conduct of third-party websites, we agree with the district court's conclusion that Perfect 10 "has not established a likelihood of proving the [control] prong necessary for vicarious liability." Perfect 10, 416 F.Supp.2d at 858.[15]

C. Digital Millennium Copyright Act

Google claims that it qualifies for the limitations on liability set forth in title II of the DMCA, 17 U.S.C. § 512. In particular, section 512(d) limits the liability of a service provider "for infringement of copyright by reason of the provider referring or linking users to an online location containing infringing material or infringing activity, by using information location tools, including a directory, index, reference, pointer, or hypertext link" if the service provider meets certain criteria. We have held that the limitations on liability contained in 17 U.S.C. § 512 protect secondary infringers as well as direct infringers. Napster, 239 F.3d at 1025.

The parties dispute whether Google meets the specified criteria. Perfect 10 claims that it sent qualifying notices to Google and Google did not act expeditiously to remove the infringing material. Google claims that Perfect 10's notices did not comply with the notice provisions of section 512 and were not adequate to inform Google of the location of the infringing images on the Internet or identify the underlying copyrighted work. Google also claims that it responded to all notices it received by investigating the webpages identified by Perfect 10 and suppressing links to any webpages that Google confirmed were infringing.

Because the district court determined that Perfect 10 was unlikely to succeed on its contributory and vicarious liability claims, it did not reach Google's arguments under section 512. In revisiting the question of Perfect 10's likelihood of success on its contributory infringement claims, the district court should also consider whether Google would likely succeed in showing that it was entitled to the limitations on injunctive relief provided by title II of the DMCA.

V

Amazon.com

Perfect 10 claims that Amazon.com displays and distributes Perfect 10's copyrighted images and is also secondarily [1176] liable for the infringements of third-party websites and Amazon.com users. The district court concluded that Perfect 10 was unlikely to succeed in proving that Amazon.com was a direct infringer, because it merely in-line linked to the thumbnails on Google's servers and to the full-size images on third-party websites.[16] Perfect 10 v. Amazon, No. 05-4753, consolidated with 04-9484 (C.D.Cal. February 21, 2006) (order denying preliminary injunction). In addition, the district court concluded that Perfect 10's secondary infringement claims against Amazon.com were likely to fail because Amazon.com had no program analogous to AdSense, and thus did not provide any revenues to infringing sites. Id. Finally, the district court determined that Amazon.com's right and ability to control the infringing conduct of third-party websites was substantially less than Google's. Id. Therefore, the district court denied Perfect 10's motion for a preliminary injunction against Amazon.com. Id.

We agree that Perfect 10 has not shown a likelihood that it would prevail on the merits of its claim that Amazon.com directly infringed its images. Amazon.com communicates to its users only the HTML instructions that direct the users' browsers to Google's computers (for thumbnail images) or to a third party's computer (for full-size infringing images). Therefore, Amazon.com does not display or distribute a copy of the thumbnails or full-size images to its users.

We also agree with the district court's conclusion that Amazon.com does not have "the right and ability to supervise the infringing activity" of Google or third parties. The district court did not clearly err in concluding that Amazon.com lacked a direct financial interest in such activities. Therefore, Perfect 10's claim that Amazon.com is vicariously liable for third-party infringement is unlikely to succeed.

However, the district court did not consider whether Amazon.com had "actual knowledge that specific infringing material is available using its system," Napster, 239 F.3d at 1022 (emphasis in original), and could have "take[n] simple measures to prevent further damage" to copyrighted works, Netcom, 907 F.Supp. at 1375, yet continued to provide access to infringing works. Perfect 10 has presented evidence that it notified Amazon.com that it was facilitating its users' access to infringing material. It is disputed whether the notices gave Amazon.com actual knowledge of specific infringing activities available using its system, and whether Amazon.com could have taken reasonable and feasible steps to refrain from providing access to such images, but failed to do so. Nor did the district court consider whether Amazon.com is entitled to limit its liability under title II of the DMCA. On remand, the district court should consider Amazon.com's potential contributory liability, as well as possible limitations on the scope of injunctive relief, in light of our rulings today.

VI

We conclude that Google's fair use defense is likely to succeed at trial, and therefore we reverse the district court's determination that Google's thumbnail versions of Perfect 10's images likely constituted a direct infringement. The district court also erred in its secondary liability [1177] analysis because it failed to consider whether Google and Amazon.com knew of infringing activities yet failed to take reasonable and feasible steps to refrain from providing access to infringing images. Therefore we must also reverse the district court's holding that Perfect 10 was unlikely to succeed on the merits of its secondary liability claims. Due to this error, the district court did not consider whether Google and Amazon.com are entitled to the limitations on liability set forth in title II of the DMCA. The question whether Google and Amazon.com are secondarily liable, and whether they can limit that liability pursuant to title II of the DMCA, raise fact-intensive inquiries, potentially requiring further fact finding, and thus can best be resolved by the district court on remand. We therefore remand this matter to the district court for further proceedings consistent with this decision.

Because the district court will need to reconsider the appropriate scope of injunctive relief after addressing these secondary liability issues, we do not address the parties' arguments regarding the scope of the injunction issued by the district court. For the same reason, we do not address the parties' dispute over whether the district court abused its discretion in determining that Perfect 10 satisfied the irreparable harm element of a preliminary injunction.

Therefore, we reverse the district court's ruling and vacate the preliminary injunction regarding Google's use of thumbnail versions of Perfect 10's images.[17] We reverse the district court's rejection of the claims that Google and Amazon.com are secondarily liable for infringement of Perfect 10's full-size images. We otherwise affirm the rulings of the district court. We remand this matter for further proceedings consistent with this opinion. Each party shall bear its own costs on appeal. See FED. R. APP. P. 39(a)(4).

AFFIRMED IN PART; REVERSED IN PART; REMANDED.

[1] Google argues that we lack jurisdiction over the preliminary injunction to the extent it enforces unregistered copyrights. Registration is generally a jurisdictional prerequisite to a suit for copyright infringement. See 17 U.S.C. § 411. But section 411 does not limit the remedies a court can grant. Rather, the Copyright Act gives courts broad authority to issue injunctive relief. See 17 U.S.C. § 502(a). Once a court has jurisdiction over an action for copyright infringement under section 411, the court may grant injunctive relief to restrain infringement of any copyright, whether registered or unregistered. See, e.g., Olan Mills, Inc. v. Linn Photo Co., 23 F.3d 1345, 1349 (8th Cir.1994); Pac. & S. Co., Inc. v. Duncan, 744 F.2d 1490, 1499 n. 17 (11th Cir.1984). Because at least some of the Perfect 10 images at issue were registered, the district court did not err in determining that it could issue an order that covers unregistered works. Therefore, we have jurisdiction over the district court's decision and order.

[2] The website publisher may not actually store the photographic images used on its webpages in its own computer, but may provide HTML instructions directing the user's browser to some further computer that stores the image. Because this distinction does not affect our analysis, for convenience, we will assume that the website publisher stores all images used on its webpages in the website publisher's own computer.

[3] Generally, a "cache" is "a computer memory with very short access time used for storage of frequently or recently used instructions or data." United States v. Ziegler, 474 F.3d 1184, 1186 n. 3 (9th Cir.2007) (quoting MERRIAM-WEBSTER'S COLLEGIATE DICTIONARY 171 (11th ed.2003)). There are two types of caches at issue in this case. A user's personal computer has an internal cache that saves copies of webpages and images that the user has recently viewed so that the user can more rapidly revisit these webpages and images. Google's computers also have a cache which serves a variety of purposes. Among other things, Google's cache saves copies of a large number of webpages so that Google's search engine can efficiently organize and index these webpages.

[4] Perfect 10 argues that we are bound by the language and structure of title II of the DMCA in determining Google's liability for copyright infringement. We have noted that the DMCA does not change copyright law; rather, "Congress provided that [the DMCA's] limitations of liability apply if the provider is found to be liable under existing principles of law." Ellison, 357 F.3d at 1077 (emphasis and internal quotation omitted). As a result, "[c]laims against service providers for direct, contributory, or vicarious copyright infringement, therefore, are generally evaluated just as they would be in the non-online world." Id.; see also 17 U.S.C. § 512(l) ("The failure of a service provider's conduct to qualify for limitation of liability under this section shall not bear adversely upon the consideration of a defense by the service provider that the service provider's conduct is not infringing under this title or any other defense."). Therefore, we must consider Google's potential liability under the Copyright Act without reference to title II of the DMCA.

[5] 17 U.S.C. § 106 states, in pertinent part:

Subject to sections 107 through 122, the owner of copyright under this title has the exclusive rights to do and to authorize any of the following:

(1) to reproduce the copyrighted work in copies or phonorecords;

....

(3) to distribute copies or phonorecords of the copyrighted work to the public by sale or other transfer of ownership, or by rental, lease, or lending;

....

(5) in the case of literary, musical, dramatic, and choreographic works, pantomimes, and pictorial, graphic, or sculptural works, including the individual images of a motion picture or other audiovisual work, to display the copyrighted work publicly....

[6] Because Google initiates and controls the storage and communication of these thumbnail images, we do not address whether an entity that merely passively owns and manages an Internet bulletin board or similar system violates a copyright owner's display and distribution rights when the users of the bulletin board or similar system post infringing works. Cf. CoStar Group, Inc. v. LoopNet, Inc., 373 F.3d 544 (4th Cir.2004).

[7] Perfect 10 also argues that Google violates Perfect 10's right to display full-size images because Google's in-line linking meets the Copyright Act's definition of "to perform or display a work `publicly.'" 17 U.S.C. § 101. This phrase means "to transmit or otherwise communicate a performance or display of the work to ... the public, by means of any device or process, whether the members of the public capable of receiving the performance or display receive it in the same place or in separate places and at the same time or at different times." Id. Perfect 10 is mistaken. Google's activities do not meet this definition because Google transmits or communicates only an address which directs a user's browser to the location where a copy of the full-size image is displayed. Google does not communicate a display of the work itself.

[8] We reject at the outset Perfect 10's argument that providing access to infringing websites cannot be deemed transformative and is inherently not fair use. Perfect 10 relies on Video Pipeline, Inc. v. Buena Vista Home Entm't, Inc., 342 F.3d 191 (3d Cir.2003), and Atari Games Corp. v. Nintendo of Am. Inc., 975 F.2d 832, 843 (Fed.Cir.1992). But these cases, in essence, simply apply the general rule that a party claiming fair use must act in a manner generally compatible with principles of good faith and fair dealing. See Harper & Row, 471 U.S. at 562-63, 105 S.Ct. 2218. For this reason, a company whose business is based on providing scenes from copyrighted movies without authorization could not claim that it provided the same public benefit as the search engine in Kelly. See Video Pipeline, 342 F.3d at 198-200. Similarly, a company whose overriding desire to replicate a competitor's computer game led it to obtain a copy of the competitor's source code from the Copyright Office under false pretenses could not claim fair use with respect to its purloined copy. Atari Games, 975 F.2d at 843.

Unlike the alleged infringers in Video Pipeline and Atari Games, who intentionally misappropriated the copyright owners' works for the purpose of commercial exploitation, Google is operating a comprehensive search engine that only incidentally indexes infringing websites. This incidental impact does not amount to an abuse of the good faith and fair dealing underpinnings of the fair use doctrine. Accordingly, we conclude that Google's inclusion of thumbnail images derived from infringing websites in its Internet-wide search engine activities does not preclude Google from raising a fair use defense.

[9] Google contends that Perfect 10's photographic images are less creative and less deserving of protection than the images of the American West in Kelly because Perfect 10 boasts of its un-retouched photos showing the natural beauty of its models. Having reviewed the record, we conclude that the district court's finding that Perfect 10's photographs "consistently reflect professional, skillful, and sometimes tasteful artistry" is not clearly erroneous. Perfect 10, 416 F.Supp.2d at 849 n. 15. We agree with the district court that there is no basis for concluding that photos of the American West are more deserving of protection than photos of nude models. See id.

[10] Because the district court concluded that Perfect 10 was likely to prevail on its direct infringement claim with respect to Google's use of thumbnails, but not with respect to its in-line linking to full-size images, the district court considered Google's potential secondary liability only on the second issue.

[11] Google's activities do not meet the "inducement" test explained in Grokster because Google has not promoted the use of its search engine specifically to infringe copyrights. See Grokster, 545 U.S. at 935-37, 125 S.Ct. 2764. However, the Supreme Court in Grokster did not suggest that a court must find inducement in order to impose contributory liability under common law principles.

[12] "Cyberspace is a popular term for the world of electronic communications over computer networks." Religious Tech. Ctr. v. Netcom On-Line Commc'n Servs., Inc., 907 F.Supp. 1361, 1365 n. 1 (N.D.Cal.1995).

[13] Perfect 10 claims that Google materially contributed to infringement by linking to websites containing unauthorized passwords, which enabled Google users to access Perfect 10's website and make infringing copies of images. However, Perfect 10 points to no evidence that users logging onto the Perfect 10 site with unauthorized passwords infringed Perfect 10's exclusive rights under section 106. In the absence of evidence that Google's actions led to any direct infringement, this argument does not assist Perfect 10 in establishing that it would prevail on the merits of its contributory liability claim. See Napster, 239 F.3d at 1013 n. 2 ("Secondary liability for copyright infringement does not exist in the absence of direct infringement by a third party.").

[14] Napster's system included "Napster's MusicShare software, available free of charge from Napster's Internet site, and Napster's network servers and server-side software." Napster, 239 F.3d at 1011. By downloading Napster's MusicShare software to the user's personal computer, and registering with the Napster system, a user could both upload and download music files. Id. at 1011-13. If the Napster user uploaded a list of music files stored on the user's personal computer to the Napster system, such music files would be automatically available to other Napster users whenever the user was logged on to the Napster system. Id. at 1012. In addition, the Napster user could download music files directly from other users' personal computers. Id. We explained the infringing conduct as "Napster users who upload file names to the [Napster] search index for others to copy violate plaintiffs' distribution rights. Napster users who download files [through the Napster system] containing copyrighted music violate plaintiffs' reproduction rights." Id. at 1014.

[15] Having so concluded, we need not reach Perfect 10's argument that Google received a direct financial benefit.

[16] Amazon.com states that it ended its relationship with Google on April 30, 2006. Perfect 10's action for preliminary injunction against Amazon.com is not moot, however, because Amazon.com has not established "that the allegedly wrongful behavior cannot reasonably be expected to recur." F.T.C. v. Affordable Media, LLC, 179 F.3d 1228, 1238 (9th Cir.1999) (internal quotation omitted).

[17] Because we vacate the injunction, Google's motion for stay of the injunction is moot.

6.4.2 Ticketmaster Corp. v. Tickets.Com, Inc. 6.4.2 Ticketmaster Corp. v. Tickets.Com, Inc.

This edited version of the case considers copyright issues. Later versions will consider other issues

TICKETMASTER CORP. et al., Plaintiff
v.
TICKETS.COM, INC. et al., Defendants.

No. CV997654HLHVBKX.

United States District Court, C.D. California.

March 7, 2003.

Steven E. Sletten, Robert E. Cooper, Robert H. Platt and Mark S. Lee, New York, New York, for Plaintiffs.

William Taylor, New York, New York, for Defendants.

TICKETS.COM'S NOTICE OF MOTION AND MOTION FOR SUMMARY JUDGMENT ON CONTRACT, TRESPASS AND COPYRIGHT CLAIMS

HUPP, J.

ORDER

[1] This motion by defendant Tickets.com, Inc. (hereafter TX) for summary judgment on plaintiffs Ticketmaster Corporation and Ticket Online–CitySearch, Inc. (hereafter collectively TM), intellectual property issues is denied as to the contract claim of TM and granted as to the copyright and trespass to chattels claims, which are dismissed by this minute order.

At this point in the case, both parties have narrowed their claims. TM, the original plaintiff, has narrowed its intellectual property claims to a contract theory, a copyright theory, and a trespass to chattels theory. The court finds triable issues of fact on the contract theory and finds no triable issues of fact and grants summary judgment on the copyright and trespass to chattels claims.

Many of the factual items are not contested, although the legal result of applying the law to the uncontested facts is heavily contested. Among the uncontested facts are the following: Both TM and TX are in the business of selling tickets to all kinds of "events" (sports, concerts, plays, etc.) to the public. They are in heavy competition with one another, but operate in distinctive ways. TM is the largest company in the industry. It sells tickets by the four methods of ticket selling–venue box office, retail outlets, by telephone, and over the internet. Telephone and internet sales require the customer to establish credit with the ticket seller (usually by credit card). Internet sales have been the fastest growing segment of the industry. TX at the time of the events considered in this motion was primarily (but not exclusively) an internet seller. Both TM and TX maintain a web page reachable by anyone with an internet connection. Each of their web pages has many subsidiary (or interior) web pages which describe one event each and provide such basic information as to location, date, time, description of the event, and ticket prices. The TM interior web pages each have a separate electronic address or Uniform Resource Locator ("URL") which, if possessed by the internet user, allows the user to reach the web page for any particular event by by-passing the "home" web page and proceeding past the index to reach the interior web page for the event in question. The TM interior web pages provide telephone numbers for customers or allow the customer to order tickets to the event by interactive computer use. A charge is made for the TM service.

TM principally does business by exclusive contracts with the event providers or their producers, and its web pages only list the events for which TM is the exclusive ticket seller. TX also sells tickets to a number of events for which it is the ticket seller. At one point, its web pages attempted to list all events for which tickets were available whether or not TX sold the tickets. Its interior web pages also listed the event, the date, time, ticket prices, and provided for internet purchase if TX could sell the tickets. When TX could not sell the tickets, it listed ticket brokers who sold at premium prices. In early 2000, TX discontinued this practice of listing events with tickets sold by other ticket brokers. Until early 2000, in situations where TM was the only source of tickets, TX provided a "deep link" by which the customer would be transferred to the interior web page of TM's web site, where the customer could purchase the ticket from TM. This process of "deep linking" is the subject of TM's complaint in this action, of which there is now left the contract, copyright, and trespass theories.

[2] Starting in 1998 and continuing to July 2001, when it stopped the practice, TX employed an electronic program called a "spider" or "crawler" to review the internal web pages (available to the public) of TM. The "spider" "crawled" through the internal web pages to TM and electronically extracted the electronic information from which the web page is shown on the user's computer. The spider temporarily loaded this electronic information into the Random Access Memory ("RAM") of TX's computers for a period of from 10–15 seconds. TX then extracted the factual information (event, date, time, tickets prices, and URL) and discarded the rest (which consisted of TM identification, logos, ads, and other information which TX did not intend to use; much of this discarded material was protected by copyright). The factual information was then organized in the TX format to be displayed on the TX internal web page. The TX internal web page carried no TM identification and had only the factual information about the event on it which was taken from TM's interior web page but rearranged in TX format plus any information or advertisement added by TX. From March 1998, to early 2000, the TX user was provided the deep linking option described above to go directly from the TX web site to the relevant TM interior web page. This option stopped (or was stopped by TM) in early 2000. For an unknown period afterward, the TX customer was given the option of linking to the TM home page, from which the customer could work his way to the interior web page in which he was interested. (The record does not reveal whether this practice still exists or whether TM objects to it.) Thus, the intellectual property issues in this case appear to be limited to events which occurred between November 1998, when spidering started, and July 2001, when it stopped. The "deep linking" aspect of the case is relevant only from March 1998, to early 2000, when it stopped.

The contract aspect of the case derives from a notice placed on the home page of the TM web site which states that anyone going beyond that point into the interior web pages of the web site accepts certain conditions, which include, relevant to this case, that all information obtained from the website is for the personal use of the user and may not be used for commercial purposes. Earlier in this case (and at the time of the motion for preliminary injunction) the notice was placed at the bottom of the home page of the TM web site, so that a user without an especially large screen would have to scroll down the page to read the conditions of use. Since then, TM has placed in a prominent place on the home page the warning that proceeding further binds the user to the conditions of use. As one TX executive put it, it could not be missed. At the time of the preliminary injunction motion, the court commented that there was no evidence that the conditions of use were known to TX. Since then, there has been developed evidence that TX was fully familiar with the conditions TM claimed to impose on users, including a letter from TM to TX which quoted the conditions (and a reply by TX stating that it did not accept the conditions). Thus, there is sufficient evidence to defeat summary judgment on the contract theory if knowledge of the asserted conditions of use was had by TX, who nevertheless continued to send its spider into the TM interior web pages, and if it is legally concluded that doing so can lead to a binding contract. For reasons dealing with the desirability of clear unmistakable evidence of assent to the conditions on trial of such issues, the court would prefer a rule that required an unmistakable assent to the conditions easily provided by requiring clicking on an icon which says "I agree" or the equivalent. Such a rule would provide certainty in trial and make it clear that the user had called to his attention the conditions he or she accepted when using the web site. (The court notes that Professor Lemley also approves this approach, but this is treated as a legal opinion, not a fact). However, the law has not developed this way. Use of a cruise ship ticket with a venue provision printed on the back commits one to the venue provided. (Carnival Cruise Lines '91 499 U.S. 585, 113 L.Ed.2d 622.) The Carriage of Goods by Sea Act, the Carmack Act, and the Warsaw Convention provide that limitations of liability on the bill of lading, air waybill, or airplane ticket are enforceable if the services are used by the customer. The "shrinkwrap" cases find the printed conditions plainly wrapped around the cassette or CD enforceable. Even the back of your parking lot ticket may be enforceable. The principle has been applied to cases similar to this. (Register.com SDNY'00 126 FSupp2d 238; Pollstar EDCA'00 170 FSupp2d 974.) The principle has long been established that no particular form of words is necessary to indicate assent–the offeror may specify that a certain action in connection with his offer is deemed acceptance, and ripens into a contract when the action is taken. (Binder '99 75 CA4th 832, 89 CR2d 540; Penn Security Life Ins. 62 CA3d 302, 133 CR 59.) Thus, as relevant here, a contract can be formed by proceeding into the interior web pages after knowledge (or, in some cases, presumptive knowledge) of the conditions accepted when doing so. In Specht 2Cir'02 306 F.3d 17, the court found that there was no mutual assent when a notice of the existence of license terms governing the use of software was visible to internet users only if they scrolled down the screen. That case is distinguishable from the facts at hand on the grounds that in Specht, the plaintiff's terms of use were not plainly visible or known to defendants. See id. at 31. Moreover, Specht involved a different set of circumstances, that of consumers invited to download free software from an internet site that did not contain a plainly visible notice of license terms. See id. at 32. As a result, the TX motion for summary judgment on the contract issue is denied.

[3] The trespass to chattels issue requires adapting the ancient common law action to the modern age. No cases seem to have reached the appellate courts although there appears to be a number of district court cases. One case (Intel v. Hamadi '01 94 CA4th 325, 114 CR 244) is pending in the California Supreme Court since it granted a hearing which has the effect of vacating the state Court of Appeal opinion (and which has no precedent value once the hearing was granted). The court is informed that the eBayNDCA'00 100 FSupp2d 1058 preliminary injunction was not appealed. At the time of the preliminary injunction motion, only the eBaycase was before the court. Since then, there have been a number of district court cases discussing the chattel theory (some published and some not). These cases tend to support the proposition that mere invasion or use of a portion of the web site by a spider is a trespass (leading at least to nominal damages), and that there need not be an independent showing of direct harm either to the chattel (unlikely in the case of a spider) or tangible interference with the use of the computer being invaded. However, scholars and practitioners alike have criticized the extension of the trespass to chattels doctrine to the internet context, noting that this doctrinal expansion threatens basic internet functions (i.e., search engines) and exposes the flaws inherent in applying doctrines based in real and tangible property to cyberspace. See, e.g., Laura Quilter, Cyberlaw: The Continuing Expansion of Cyberspace Trespass to Chattels, 17 Berkeley Tech. L.J. 421 (2002); Clifton Merrell, Trespass to Chattels in the Age of the Internet, 80 Wash. U.L.Q. 675 (2002); Mary Anne Bendotoff and Elizabeth R. Gosse, "Stay Off My Cyberproperty!": Trespass to Chattels on the Internet (2001), 6 Intell. Prop. L. Bull. 12; Edward Lee, Rules and Standards for Cyberspace, 77 Notre Dame L.Rev. 1275, 1283–1284 (2002). Pending appellate guidance, this court comes down on the side of requiring some tangible interference with the use or operation of the computer being invaded by the spider. Restatement (Second) of Torts § 219 requires a showing that "the chattel is impaired as to its condition, quality, or value." Therefore, unless there is actual dispossession of the chattel for a substantial time (not present here), the elements of the tort have not been made out. Since the spider does not cause physical injury to the chattel, there must be some evidence that the use or utility of the computer (or computer network) being "spiderized" is adversely affected by the use of the spider. No such evidence is presented here. This court respectfully disagrees with other district courts' finding that mere use of a spider to enter a publically available web site to gather information, without more, is sufficient to fulfill the harm requirement for trespass to chattels.

TM complains that the information obtained by the use of the spider was valuable (and even that it was sold by TX), and that it spent time and money attempting to frustrate the spider, but neither of these items shows damage to the computers or their operation. One must keep in mind that we are talking about the common law tort of trespass, not damage from breach of contract or copyright infringement. The tort claim may not succeed without proof of tort-type damage. Plaintiff TM has the burden to show such damage. None is shown here. The motion for summary judgment is granted to eliminate the claim for trespass to chattels. This minute order is the order eliminating that claim. This approach to the tort of trespass to chattels should hurt no one's policy feelings; after all, what is being attempted is to apply a medieval common law concept in an entirely new situation which should be disposed of by modern law designed to protect intellectual property interests.

[4] The copyright issues are more difficult. They divide into three issues. The first is whether the momentary resting in the TX computers of all of the electronic signals which are used to form the video representation to the viewer of the interior web pages of the TX computer constitutes actionable copyright infringement. The second is whether the URLs, which were copied and used by TX, contain copyrightable material. The third is whether TX's deep-linking caused the unauthorized public display of TM event pages. In examining these questions, we must keep in mind a prime theorem of copyright law–facts, as such, are not subject to copyright protection. What is subject to copyright protection is the manner or mode of expression of those facts. Thus, addresses and telephone numbers contained in a directory do not have copyright protection (Feist Publications 499 U.S. 350, 113 L.Ed.2d 358), despite the fact that time, money, and effort went into compiling the information. Similarly, in this case, the existence of the event, its date and time, and its ticket prices, are not subject to copyright. Anyone is free to print (or show on the internet) such information. Thus, if TX had sat down a secretary at the computer screen with instructions manually to go through TM's web sites and pick out and write down purely factual information about the events, and then feed it into the TX web pages (using the TX distinctive format only), no one could complain. The objection is that the same thing was done with an electronic program. However, the difference is that the spider picks up all of the electronic symbols which, if it had been put on a monitor with the right software, would duplicate the TM web page. However, this is not the way it was done. The spider picks up the electronic symbols and loads them momentarily (for 10 to 15 seconds) into the RAM of the TX computers, where a program picks up the factual data (not protected), places same into the TX format for its web pages, and immediately discards the balance, which may consist of TM logos, TM advertisements, TM format for presentation of the material, and other material which is copyrightable. Thus, the actual copying (if it can be called that) is momentary while the non-protected material, all open to the public, is extracted. Is this momentary resting of the electronic symbols from which a TM web page could be (but is not) constructed fair use where the purpose is to obtain non-protected facts? The court thinks the answer is "yes". There is not much law in point. However, there are two Ninth Circuit cases which shed light on the problem. They are Sony Computer Entertainment 9 Cir '00 203 F3d 596 and Sega 9 Cir '92 977 F.2d 1510. In each of these cases, the alleged infringer attempted to get at non-protected source code by reverse engineering of the plaintiff's copyrighted software. In doing so, the necessary method was to copy the software and work backwards to derive the unprotected source code. The copied software was then destroyed. In each case, this was held to be fair use since it was necessary to temporarily copy the software to obtain the non-protected material. There may be a difference with this case, however, at least TM claims so. It asserts in its points and authorities that taking the temporary copy in this case was not the only way to obtain the unprotected information, and that TX was able to, and in actuality did purchase such information from certain third-parties. Both Sony and Sega stated that the fair use was justified because reverse engineering (including taking a temporary copy) was the only way the unprotected information could be obtained. Although this court recognizes that the holdings of Sony and Sega were limited to the specific context of "disassembling" copyrighted object code in order to access unprotected elements contained in the source code, this court believes that the "fair use" doctrine can be applied to the current facts.

[5] Taking the temporary copy of the electronic information for the limited purpose of extracting unprotected public facts leads to the conclusion that the temporary use of the electronic signals was "fair use" and not actionable. In determining whether a challenged use of copyrighted material is fair, a court must keep in mind the public policy underlying the Copyright Act: to secure a fair return for an author's creative labor and to stimulate artistic creativity for the general good. This court sees no public policy that would be served by restricting TX from using spiders to temporarily download TM's event pages in order to acquire the unprotected, publicly available factual event information. The rest of the event page information (which consisted of TM identification, logos, ads, and other information) was discarded and not used by TX and is not exposed to the public by TX. In temporarily downloading TM's event pages to its RAM through the use of spiders, TX was not exploiting TM's creative labors in any way: its spiders gathered copyrightable and non-copyrightable information alike but then immediately discarded the copyrighted material. It is unlikely that the spiders could have been programmed to take only the factual information from the TM web pages without initially downloading the entire page.

Consideration of the fair use factors listed in 17 USC § 106 supports this result. First, TX operates its site for commercial purposes, and this fact tends to weigh against a finding of fair use. Campbell '94 510 U.S. 569, 585, 127 L.Ed.2d 500, 519. TX's use of the data gathered from TM's event pages was only slightly transformative. As for the second factor, the nature of the copyrighted work, the copying that occurred when spiders download the event page, access the source code for each page, and extract the factual data embedded in the code, is analogous to the process of copying that the Sony court condoned (however, the Court recognizes that the fair use holding from that decision does not fit perfectly onto the facts at hand). Third, because TX's final product-the TX web site-did not contain any infringing material, the "amount and substantiality of the portion used" is of little weight. Connectix 9Cir'00 203F3d at 606 (quoting Sega 9Cir'93 977 F.2d at 1526–1537). The fourth factor (the effect on the market value of the copyrighted work) is, of course nil, and weighs towards finding fair use. TM's arguments and evidence regarding loss of advertising revenue, as well as the loss of potential business with Volt Delta, are not persuasive.

The second copyright problem is whether the URLs (Uniform Resource Locator) are subject to copyright protection. The URLs are copied by TX and, while TX was deep hyper-linking to TM interior web pages, were used by TX to allow the deep-linking (by providing the electronic address of the particular relevant TM interior web page). This electronic address is kept in TX's computer (not provided to the customer) but was used to connect the customer to the TM interior web page when the customer pushed the button to be transferred to the web page of the broker who sells the tickets. In fact, anyone who uses the TM interior web page–TM customer or not–uses the URL to get there, although sometimes through another computer which also has the URL. TM contends that, although the URLs are strictly functional, they are entitled to copyright protection because there are several ways to write the URL, and, thus, original authorship is used. The court disagrees. A URL is simply an address, open to the public, like the street address of a building, which, if known, can enable the user to reach the building. There is nothing sufficiently original to make the URL a copyrightable item, especially the way it is used. Feist Publications '91 499 U.S. 340, 345, 113 L.Ed.2d 358, 369. There appear to be no cases holding the URLs to be subject to copyright. On principle, they should not be.

[6] The third copyright problem is whether TX's deep-linking caused the unauthorized public display of TM event pages in violation of TM's exclusive rights of reproduction and display under 17 U.S.C. § 106. The Ninth Circuit in Kelly 9 Cir '02 280 F3d 934, recognized that inline linking and framing of full-sized images of plaintiff's copyrighted photographs within the defendant's web site violated the plaintiff's public display rights. In that case, defendant's web site contained links to plaintiff's photographs (which were on plaintiff's publicly available website). Users were able to view plaintiff's photographs within the context of defendant's site: Plaintiff's images were "framed" by the defendant's window, and were thus surrounded by defendant web page's text and advertising. In one short paragraph in a declaration offered on the preliminary injunction motion, TM alleges that when a user was deep-linked from the TX site to a TM event page, a smaller window was opened. The smaller window was described as containing a page from the TM web site which was "framed" by the larger window. At the time of the preliminary injunction motion, TX stated that whether "framing" occurs or not depends on the settings on the user's computer, over which TX has no control. Thus, framing occurred on some occasions but not on others. However, TX says that it "did not try to disguise a sale by use of frames occurring on the Tickets.com website." (Reply, p. 10) TX further states that when users were linked to TM web pages, the TM event pages were clearly identified as belonging to TM.

However, even if the TM interior web site page was "framed" within the TX web page, this case is distinguishable from Kelly. In Kelly, the defendant's site would display a variety of "thumbnail" images as a result of the user's search. By clicking on the desired thumbnail image, a user could view the "Images Attributes" page, which displayed the original full-size image, a description of its dimensions, a link to the originating web site, and defendant's banner and advertising. The full-size image was not technically located on defendant's web site, but was taken directly from the originating web site. However, only the image itself, and not any other part of the originating web site, was displayed on the "Images Attributes" page. The Ninth Circuit determined that by importing plaintiff's images into its own web page, and by showing them in the context of its own site, defendant infringed upon plaintiff's exclusive public display right.

In this case, a user on the TX site was taken directly to the originating TM site, containing all the elements of that particular TM event page. Each TM event page clearly identified itself as belonging to TM. Moreover, the link on the TX site to the TM event page contained the following notice: "Buy this ticket from another online ticketing company. Click here to buy tickets. These tickets are sold by another ticketing company. Although we can't sell them to you, the link above will take you directly to the other company's web site where you can purchase them." (2d Am.Compl.Ex.I) (emphasis in original) Even if the TM site may have been displayed as a smaller window that was literally "framed" by the larger TX window, it is not clear that, as matter of law, the linking to TX event pages would constitute a showing or public display in violation of 17 U.S.C. § 106(5). Accordingly, summary judgment is granted on the copyright claims of TM and it is eliminated from this action.

6.4.3 Intellectual Reserve, Inc. v. Utah Lighthouse Ministry, Inc. 6.4.3 Intellectual Reserve, Inc. v. Utah Lighthouse Ministry, Inc.

This case serves two purposes. First, it introduces the type of liability that one might face for hyperlinking, even if the content is not hosted on one's own server. Second, in doing so, it introduces the concept of secondary liability, which pervades copyright liability on the internet. Consider whether this court's view of direct liability by readers is consistent with Perfect 10's consideration of thumbnail images.

75 F.Supp.2d 1290 (1999)

INTELLECTUAL RESERVE, INC., a Utah corporation, Plaintiff,
v.
UTAH LIGHTHOUSE MINISTRY, INC., a Utah corporation, et al., Defendants.

No. 2:99-CV-808C.

United States District Court, D. Utah, Central Division.

December 6, 1999.

[1291] Mr. Todd E Zenger, Kirton & McConkie, Salt Lake City, UT, for Plaintiff.

Brian M. Barnard, Utah Legal Clinic, Salt Lake City, UT, for Defendants.

CAMPBELL, District Judge.

This matter is before the court on plaintiff's motion for preliminary injunction. Plaintiff claims that unless a preliminary injunction issues, defendants will directly infringe and contribute to the infringement of its copyright in the Church Handbook of Instructions ("Handbook"). Defendants do not oppose a preliminary injunction, but argue that the scope of the injunction should be restricted to only prohibit direct infringement of plaintiff's copyright.

Having fully considered the arguments of counsel, the submissions of the parties and applicable legal authorities, the court grants plaintiff's motion for a preliminary injunction. However, the scope of the preliminary injunction is limited.

Discussion

The United States Copyright Act allows a court to "grant temporary and final injunctions on such terms as it may deem reasonable to prevent or restrain infringement of a copyright." 17 U.S.C. § 502(a). Here, in determining whether plaintiff is now entitled to the injunctive relief, the following factors are to be considered:

(1) substantial likelihood that the movant will eventually prevail on the merits: (2) a showing that the movant will suffer irreparable injury unless the injunction issues; (3) proof that the threatened injury to the movant outweighs whatever damage the proposed injunction may cause the opposing party; and (4) a showing that the injunction, if issued, [1292] would not be adverse to the public interest.

Equifax Servs., Inc. v. Hitz, 905 F.2d 1355, 1360 (10th Cir.1990) (quoting Lundgrin v. Claytor, 619 F.2d 61, 63 (10th Cir.1980)).

I. Likelihood of Plaintiff Prevailing on the Merits

First, the court considers whether there is a substantial likelihood that plaintiff will eventually prevail on the merits. Plaintiff alleges that the defendants infringed its copyright directly by posting substantial portions of its copyrighted material on defendants' website, and also contributed to infringement of its copyright by inducing, causing or materially contributing to the infringing conduct of another. To determine the proper scope of the preliminary injunction, the court considers the likelihood that plaintiff will prevail on either or both of its claims.

A. Direct Infringement

To prevail on its claim of direct copyright infringement, "[p]laintiff must establish both: (1) that it possesses a valid copyright and (2) that [d]efendants `copied' protectable elements of the copyrighted work." Country Kids `N City Slicks, Inc. v. Sheen, 77 F.3d 1280, 1284 (10th Cir. 1996). Defendants initially conceded in a hearing, for purposes of the temporary restraining order and preliminary injunction, that plaintiff has a valid copyright in the Handbook, and that defendants directly infringed plaintiff's copyright by posting substantial portions of the copyrighted material.[1] Defendants changed their position, in a motion to dismiss, claiming that plaintiff has failed to allege facts necessary to show ownership of a valid copyright. Despite the defendants' newly-raised argument, the court finds, for purpose of this motion, that the plaintiff owns a valid copyright on the material defendants posted on their website. Plaintiff has provided evidence of a copyright registration certificate, (see Verified Compl., Ex. A), and the certificate "constitutes prima facie evidence of the validity of the copyright."[2]Gates Rubber Co. v. Bando Chem. Indus., Ltd., 9 F.3d 823, 831 (10th Cir.1993). Defendants have not advanced any additional affirmative defenses to the claim of direct infringement. Therefore, the court finds that there is a substantial likelihood that plaintiff will prevail on its claim of direct infringement.

B. Contributory Infringement

According to plaintiff, after the defendants were ordered to remove the Handbook from their website, the defendants began infringing plaintiff's copyright by inducing, causing, or materially contributing to the infringing conduct of others. It is undisputed that defendants placed a notice on their website that the Handbook was online, and gave three website addresses of websites containing the material defendants were ordered to remove from their website. Defendants also posted emails on their website that encouraged browsing[3] those websites, printing copies of the Handbook and sending the Handbook to others.

Although the copyright statute does not expressly impose liability for contributory infringement,

[t]he absence of such express language in the copyright statute does not preclude the imposition of liability for copyright infringements on certain parties [1293] who have not themselves engaged in the infringing activity. For vicarious liability is imposed in virtually all areas of the law, and the concept of contributory infringement is merely a species of the broader problem of identifying the circumstances in which it is just to hold one accountable for the actions of another.

Sony Corp. v. Universal City Studios, Inc., 464 U.S. 417, 435, 104 S.Ct. 774, 78 L.Ed.2d 574 (1984) (footnote omitted). Even though "'the lines between direct infringement, contributory infringement and vicarious liability are not clearly drawn'" distinctions can be made between them. Id. at n. 17 (quoting Universal City Studios, Inc. v. Sony Corp., 480 F.Supp. 429, 457-58 (C.D.Cal.1979)). Vicarious liability is grounded in the tort concept of respondeat superior, and contributory infringement is founded in the tort concept of enterprise liability. See Demetriades v. Kaufmann, 690 F.Supp. 289, 292 (S.D.N.Y. 1988). "[B]enefit and control are the signposts of vicarious liability, [whereas] knowledge and participation [are] the touchstones of contributory infringement." Id. at 293.

Liability for contributory infringement is imposed when "one who, with knowledge of the infringing activity, induces, causes or materially contributes to the infringing conduct of another." Gershwin Publ'g Corp. v. Columbia Artists Mgt., Inc., 443 F.2d 1159, 1162 (2d Cir.1971). Thus, to prevail on its claim of contributory infringement, plaintiff must first be able to establish that the conduct defendants allegedly aided or encouraged could amount to infringement. See Subafilms, Ltd. v. MGM-Pathe Comms. Co., 24 F.3d 1088, 1092 (9th Cir.1994). Defendants argue that they have not contributed to copyright infringement by those who posted the Handbook on websites nor by those who browsed the websites on their computers.

1. Can the Defendants Be Liable Under a Theory of Contributory Infringement for the Actions of Those Who Posted the Handbook on the Three Websites?

a. Did those who posted the Handbook on the websites infringe plaintiff's copyright?

During a hearing on the motion to vacate the temporary restraining order, defendants accepted plaintiff's proffer that the three websites contain the material which plaintiff alleges is copyrighted.[4] Therefore, plaintiff at trial is likely to establish that those who have posted the material on the three websites are directly infringing plaintiff's copyright.

b. Did the defendants induce, cause or materially contribute to the infringement?

The evidence now before the court indicates that there is no direct relationship between the defendants and the people who operate the three websites. The defendants did not provide the website operators with the plaintiff's copyrighted material, nor are the defendants receiving any kind of compensation from them. The only connection between the defendants and those who operate the three websites appears to be the information defendants have posted on their website concerning the infringing sites. Based on this scant evidence, the court concludes that plaintiff has not shown that defendants contributed to the infringing action of those who operate the infringing websites.

2. Can the Defendants Be Liable Under a Theory of Contributory Infringement for the Actions of Those Who Browse the Three Infringing Websites?

Defendants make two arguments in support of their position that the activities [1294] of those who browse the three websites do not make them liable under a theory of contributory infringement. First, defendants contend that those who browse the infringing websites are not themselves infringing plaintiff's copyright; and second, even if those who browse the websites are infringers, defendants have not materially contributed to the infringing conduct.

a. Do those who browse the websites infringe plaintiff's copyright?

The first question, then, is whether those who browse any of the three infringing websites are infringing plaintiff's copyright. Central to this inquiry is whether the persons browsing are merely viewing the Handbook (which is not a copyright infringement), or whether they are making a copy of the Handbook (which is a copyright infringement). See 17 U.S.C. § 106.

"Copy" is defined in the Copyright Act as: "material objects ... in which a work is fixed by any method now known or later developed, and from which the work can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device." 17 U.S.C. § 101. "A work is `fixed' ... when its ... sufficiently permanent or stable to permit it to be perceived, reproduced, or otherwise communicated for a period of more than transitory duration." Id.

When a person browses a website, and by so doing displays the Handbook, a copy of the Handbook is made in the computer's random access memory (RAM), to permit viewing of the material. And in making a copy, even a temporary one, the person who browsed infringes the copyright.[5]See MAI Systems Corp. v. Peak Computer, Inc., 991 F.2d 511, 518 (9th Cir.1993) (holding that when material is transferred to a computer's RAM, copying has occurred; in the absence of ownership of the copyright or express permission by licence, such an act constitutes copyright infringement); Marobie-Fl., Inc. v. National Ass'n of Fire Equip. Distrib., 983 F.Supp. 1167, 1179 (N.D.Ill.1997) (noting that liability for copyright infringement is with the persons who cause the display or distribution of the infringing material onto their computer); see also Nimmer on Copyright § 8.08(A)(1) (stating that the infringing act of copying may occur from "loading the copyrighted material ... into the computer's random access memory (RAM)"). Additionally, a person making a printout or re-posting a copy of the Handbook on another website would infringe plaintiff's copyright.

b. Did the defendants induce, cause or materially contribute to the infringement?

The court now considers whether the defendants' actions contributed to the infringement of plaintiff's copyright by those who browse the three websites.

The following evidence establishes that defendants have actively encouraged the infringement of plaintiff's copyright[6] After being ordered to remove the Handbook from their website, defendants posted on [1295] their website: "Church Handbook of Instructions is back online!" and listed the three website addresses. (See Pl.'s Reply Supp.Mot.Prelim.Inj., Ex. 1; Memo. Re: Contributory Infringement, at 9 n. 6.) Defendants also posted e-mail suggesting that the lawsuit against defendants would be affected by people logging onto one of the websites and downloading the complete handbook. (See id., Ex. 2.) One of the e-mails posted by the defendants mentioned sending a copy of the copyrighted material to the media. (See id.) In response to an e-mail stating that the sender had unsuccessfully tried to browse a website that contained the Handbook, defendants gave further instruction on how to browse the material. (See id.) At least one of the three websites encourages the copying and posting of copies of the allegedly infringing material on other websites. (See id., Ex. 4 ("Please mirror these files.... It will be a LOT quicker for you to download the compressed version ... Needless to say, we need a LOT of mirror sites, as absolutely soon as possible.").)

Based on the above, the court finds that the first element necessary for injunctive relief is satisfied.

II. Irreparable Injury

Because this is a copyright infringement case and plaintiff has demonstrated a likelihood of success on the merits, there is a presumption of injury. See Country Kids `N City Slicks, Inc. v. Sheen, 77 F.3d 1280, 1288-89 (10th Cir.1996). In addition, plaintiff will suffer additional immediate and real irreparable harm if defendants are permitted to post the copyrighted material or to knowingly induce, cause or materially contribute to the infringement of plaintiff's copyright by others.

III. Harm to Defendants

Defendants argue that their First Amendment rights will be infringed by a preliminary injunction. However, the First Amendment does not give defendants the right to infringe on legally recognized rights under the copyright law. See Cable/Home Comm. Corp. v. Network Productions, Inc., 902 F.2d 829, 849 (11th Cir.1990). "[C]opyright interests [] must be guarded under the Constitution, and injunctive relief is a common judicial response to infringement of a valid copyright." Id. The court, in fashioning the scope of injunctive relief, is aware of and will protect the defendants' First Amendment rights.

IV. The Public Interest

Finally, it is in the public's interest to protect the copyright laws and the interests of copyright holders.

Order

Therefore, for the reasons stated, the court orders the following preliminary injunction:

1. Defendants, their agents and those under their control, shall remove from and not post on defendants' website the material alleged to infringe plaintiff's copyright;

2. Defendants, their agents and those under their control, shall not reproduce or distribute verbatim, in a tangible medium, material alleged to infringe plaintiff's copyright;

3. Defendants, their agents and those under their control, shall remove from and not post on defendants' website, addresses to websites that defendants know, or have reason to know, contain the material alleged to infringe plaintiff's copyright;

Defendants have not requested that a security be obtained from plaintiff. If defendants consider a security to be appropriate in this case, defendants shall file a motion and memorandum within twenty days from this date. Plaintiff shall then have fifteen days after service to respond. [1296] A reply memorandum may be filed by defendants within seven days after service.

[1] By so doing, defendants did not admit fault or liability. (See Consent to Extension of Temporary Order and Response, at 1.)

[2] This issue will be fully explored when the court decides the motion to dismiss.

[3] The term browse, as used in this order, means to call up or open a website onto a computer screen.

[4] Defendants also have stated that they believe the three websites contain the material which plaintiff alleges is copyrighted. (See Memo. Re: Contributory Infringement, at 9 n. 6.)

[5] Although this seems harsh, the Copyright Act has provided a safeguard for innocent infringers. Where the infringer "was not aware and had no reason to believe that his or her acts constituted an infringement of copyright, the court in its discretion may reduce the award of statutory damages...." 17 U.S.C. § 504(c)(2).

[6] Plaintiff at this point has been unable to specifically identify persons who have infringed its copyright because they were induced or assisted by defendants' conduct, however, there is a substantial likelihood that plaintiff will be able to do so after conducting discovery. There is evidence that at least one of the websites has seen a great increase in "hits" recently. (See Pl.'s Reply Supp.Mot.Prelim.Inj., Ex. 5.) Also, plaintiff does not have to establish that the defendants' actions are the sole cause of another's infringement; rather plaintiff may prevail by establishing that defendants' conduct induces or materially contributes to the infringing conduct of another.

6.5 OIL Casebook: Digital Music Copyright 6.5 OIL Casebook: Digital Music Copyright

6.5.1 Digital Millenium Copyright Act: 17 U.S. Code § 114 - Scope of exclusive rights in sound recordings 6.5.1 Digital Millenium Copyright Act: 17 U.S. Code § 114 - Scope of exclusive rights in sound recordings

This statute deals with digital broadcasts of sound recordings. It sets up a complex system of licenses required, depending on the interactivity of the service

(a) The exclusive rights of the owner of copyright in a sound recording are limited to the rights specified by clauses (1), (2), (3) and (6) of section 106, and do not include any right of performance under section 106 (4).
(b) The exclusive right of the owner of copyright in a sound recording under clause (1) of section 106 is limited to the right to duplicate the sound recording in the form of phonorecords or copies that directly or indirectly recapture the actual sounds fixed in the recording. The exclusive right of the owner of copyright in a sound recording under clause (2) of section 106 is limited to the right to prepare a derivative work in which the actual sounds fixed in the sound recording are rearranged, remixed, or otherwise altered in sequence or quality. The exclusive rights of the owner of copyright in a sound recording under clauses (1) and (2) of section 106 do not extend to the making or duplication of another sound recording that consists entirely of an independent fixation of other sounds, even though such sounds imitate or simulate those in the copyrighted sound recording. The exclusive rights of the owner of copyright in a sound recording under clauses (1), (2), and (3) of section 106 do not apply to sound recordings included in educational television and radio programs (as defined in section 397 of title 47) distributed or transmitted by or through public broadcasting entities (as defined by section 118 (f)): Provided, That copies or phonorecords of said programs are not commercially distributed by or through public broadcasting entities to the general public.
(c) This section does not limit or impair the exclusive right to perform publicly, by means of a phonorecord, any of the works specified by section 106 (4).
(d) Limitations on Exclusive Right.— Notwithstanding the provisions of section 106(6)
(1) Exempt transmissions and retransmissions.— The performance of a sound recording publicly by means of a digital audio transmission, other than as a part of an interactive service, is not an infringement of section 106 (6) if the performance is part of—
(A) a nonsubscription broadcast transmission;
(B) a retransmission of a nonsubscription broadcast transmission: Provided, That, in the case of a retransmission of a radio station’s broadcast transmission—
(i) the radio station’s broadcast transmission is not willfully or repeatedly retransmitted more than a radius of 150 miles from the site of the radio broadcast transmitter, however—
(I) the 150 mile limitation under this clause shall not apply when a nonsubscription broadcast transmission by a radio station licensed by the Federal Communications Commission is retransmitted on a nonsubscription basis by a terrestrial broadcast station, terrestrial translator, or terrestrial repeater licensed by the Federal Communications Commission; and
(II) in the case of a subscription retransmission of a nonsubscription broadcast retransmission covered by subclause (I), the 150 mile radius shall be measured from the transmitter site of such broadcast retransmitter;
(ii) the retransmission is of radio station broadcast transmissions that are—
(I) obtained by the retransmitter over the air;
(II) not electronically processed by the retransmitter to deliver separate and discrete signals; and
(III) retransmitted only within the local communities served by the retransmitter;
(iii) the radio station’s broadcast transmission was being retransmitted to cable systems (as defined in section 111 (f)) by a satellite carrier on January 1, 1995, and that retransmission was being retransmitted by cable systems as a separate and discrete signal, and the satellite carrier obtains the radio station’s broadcast transmission in an analog format: Provided, That the broadcast transmission being retransmitted may embody the programming of no more than one radio station; or
(iv) the radio station’s broadcast transmission is made by a noncommercial educational broadcast station funded on or after January 1, 1995, under section 396(k) of the Communications Act of 1934 (47 U.S.C. 396 (k)), consists solely of noncommercial educational and cultural radio programs, and the retransmission, whether or not simultaneous, is a nonsubscription terrestrial broadcast retransmission; or
(C) a transmission that comes within any of the following categories—
(i) a prior or simultaneous transmission incidental to an exempt transmission, such as a feed received by and then retransmitted by an exempt transmitter: Provided, That such incidental transmissions do not include any subscription transmission directly for reception by members of the public;
(ii) a transmission within a business establishment, confined to its premises or the immediately surrounding vicinity;
(iii) a retransmission by any retransmitter, including a multichannel video programming distributor as defined in section 602(12)  [1] of the Communications Act of 1934 (47 U.S.C. 522 (12)), of a transmission by a transmitter licensed to publicly perform the sound recording as a part of that transmission, if the retransmission is simultaneous with the licensed transmission and authorized by the transmitter; or
(iv) a transmission to a business establishment for use in the ordinary course of its business: Provided, That the business recipient does not retransmit the transmission outside of its premises or the immediately surrounding vicinity, and that the transmission does not exceed the sound recording performance complement. Nothing in this clause shall limit the scope of the exemption in clause (ii).
(2) Statutory licensing of certain transmissions.— The performance of a sound recording publicly by means of a subscription digital audio transmission not exempt under paragraph (1), an eligible nonsubscription transmission, or a transmission not exempt under paragraph (1) that is made by a preexisting satellite digital audio radio service shall be subject to statutory licensing, in accordance with subsection (f) if—
(A)
(i) the transmission is not part of an interactive service;
(ii) except in the case of a transmission to a business establishment, the transmitting entity does not automatically and intentionally cause any device receiving the transmission to switch from one program channel to another; and
(iii) except as provided in section 1002 (e), the transmission of the sound recording is accompanied, if technically feasible, by the information encoded in that sound recording, if any, by or under the authority of the copyright owner of that sound recording, that identifies the title of the sound recording, the featured recording artist who performs on the sound recording, and related information, including information concerning the underlying musical work and its writer;
(B) in the case of a subscription transmission not exempt under paragraph (1) that is made by a preexisting subscription service in the same transmission medium used by such service on July 31, 1998, or in the case of a transmission not exempt under paragraph (1) that is made by a preexisting satellite digital audio radio service—
(i) the transmission does not exceed the sound recording performance complement; and
(ii) the transmitting entity does not cause to be published by means of an advance program schedule or prior announcement the titles of the specific sound recordings or phonorecords embodying such sound recordings to be transmitted; and
(C) in the case of an eligible nonsubscription transmission or a subscription transmission not exempt under paragraph (1) that is made by a new subscription service or by a preexisting subscription service other than in the same transmission medium used by such service on July 31, 1998—
(i) the transmission does not exceed the sound recording performance complement, except that this requirement shall not apply in the case of a retransmission of a broadcast transmission if the retransmission is made by a transmitting entity that does not have the right or ability to control the programming of the broadcast station making the broadcast transmission, unless—
(I) the broadcast station makes broadcast transmissions—
(aa) in digital format that regularly exceed the sound recording performance complement; or
(bb) in analog format, a substantial portion of which, on a weekly basis, exceed the sound recording performance complement; and
(II) the sound recording copyright owner or its representative has notified the transmitting entity in writing that broadcast transmissions of the copyright owner’s sound recordings exceed the sound recording performance complement as provided in this clause;
(ii) the transmitting entity does not cause to be published, or induce or facilitate the publication, by means of an advance program schedule or prior announcement, the titles of the specific sound recordings to be transmitted, the phonorecords embodying such sound recordings, or, other than for illustrative purposes, the names of the featured recording artists, except that this clause does not disqualify a transmitting entity that makes a prior announcement that a particular artist will be featured within an unspecified future time period, and in the case of a retransmission of a broadcast transmission by a transmitting entity that does not have the right or ability to control the programming of the broadcast transmission, the requirement of this clause shall not apply to a prior oral announcement by the broadcast station, or to an advance program schedule published, induced, or facilitated by the broadcast station, if the transmitting entity does not have actual knowledge and has not received written notice from the copyright owner or its representative that the broadcast station publishes or induces or facilitates the publication of such advance program schedule, or if such advance program schedule is a schedule of classical music programming published by the broadcast station in the same manner as published by that broadcast station on or before September 30, 1998;
(iii) the transmission—
(I) is not part of an archived program of less than 5 hours duration;
(II) is not part of an archived program of 5 hours or greater in duration that is made available for a period exceeding 2 weeks;
(III) is not part of a continuous program which is of less than 3 hours duration; or
(IV) is not part of an identifiable program in which performances of sound recordings are rendered in a predetermined order, other than an archived or continuous program, that is transmitted at—
(aa) more than 3 times in any 2-week period that have been publicly announced in advance, in the case of a program of less than 1 hour in duration, or
(bb) more than 4 times in any 2-week period that have been publicly announced in advance, in the case of a program of 1 hour or more in duration,
  except that the requirement of this subclause shall not apply in the case of a retransmission of a broadcast transmission by a transmitting entity that does not have the right or ability to control the programming of the broadcast transmission, unless the transmitting entity is given notice in writing by the copyright owner of the sound recording that the broadcast station makes broadcast transmissions that regularly violate such requirement;
(iv) the transmitting entity does not knowingly perform the sound recording, as part of a service that offers transmissions of visual images contemporaneously with transmissions of sound recordings, in a manner that is likely to cause confusion, to cause mistake, or to deceive, as to the affiliation, connection, or association of the copyright owner or featured recording artist with the transmitting entity or a particular product or service advertised by the transmitting entity, or as to the origin, sponsorship, or approval by the copyright owner or featured recording artist of the activities of the transmitting entity other than the performance of the sound recording itself;
(v) the transmitting entity cooperates to prevent, to the extent feasible without imposing substantial costs or burdens, a transmission recipient or any other person or entity from automatically scanning the transmitting entity’s transmissions alone or together with transmissions by other transmitting entities in order to select a particular sound recording to be transmitted to the transmission recipient, except that the requirement of this clause shall not apply to a satellite digital audio service that is in operation, or that is licensed by the Federal Communications Commission, on or before July 31, 1998;
(vi) the transmitting entity takes no affirmative steps to cause or induce the making of a phonorecord by the transmission recipient, and if the technology used by the transmitting entity enables the transmitting entity to limit the making by the transmission recipient of phonorecords of the transmission directly in a digital format, the transmitting entity sets such technology to limit such making of phonorecords to the extent permitted by such technology;
(vii) phonorecords of the sound recording have been distributed to the public under the authority of the copyright owner or the copyright owner authorizes the transmitting entity to transmit the sound recording, and the transmitting entity makes the transmission from a phonorecord lawfully made under the authority of the copyright owner, except that the requirement of this clause shall not apply to a retransmission of a broadcast transmission by a transmitting entity that does not have the right or ability to control the programming of the broadcast transmission, unless the transmitting entity is given notice in writing by the copyright owner of the sound recording that the broadcast station makes broadcast transmissions that regularly violate such requirement;
(viii) the transmitting entity accommodates and does not interfere with the transmission of technical measures that are widely used by sound recording copyright owners to identify or protect copyrighted works, and that are technically feasible of being transmitted by the transmitting entity without imposing substantial costs on the transmitting entity or resulting in perceptible aural or visual degradation of the digital signal, except that the requirement of this clause shall not apply to a satellite digital audio service that is in operation, or that is licensed under the authority of the Federal Communications Commission, on or before July 31, 1998, to the extent that such service has designed, developed, or made commitments to procure equipment or technology that is not compatible with such technical measures before such technical measures are widely adopted by sound recording copyright owners; and
(ix) the transmitting entity identifies in textual data the sound recording during, but not before, the time it is performed, including the title of the sound recording, the title of the phonorecord embodying such sound recording, if any, and the featured recording artist, in a manner to permit it to be displayed to the transmission recipient by the device or technology intended for receiving the service provided by the transmitting entity, except that the obligation in this clause shall not take effect until 1 year after the date of the enactment of the Digital Millennium Copyright Act and shall not apply in the case of a retransmission of a broadcast transmission by a transmitting entity that does not have the right or ability to control the programming of the broadcast transmission, or in the case in which devices or technology intended for receiving the service provided by the transmitting entity that have the capability to display such textual data are not common in the marketplace.
(3) Licenses for transmissions by interactive services.—
(A) No interactive service shall be granted an exclusive license under section 106 (6)for the performance of a sound recording publicly by means of digital audio transmission for a period in excess of 12 months, except that with respect to an exclusive license granted to an interactive service by a licensor that holds the copyright to 1,000 or fewer sound recordings, the period of such license shall not exceed 24 months: Provided, however, That the grantee of such exclusive license shall be ineligible to receive another exclusive license for the performance of that sound recording for a period of 13 months from the expiration of the prior exclusive license.
(B) The limitation set forth in subparagraph (A) of this paragraph shall not apply if—
(i) the licensor has granted and there remain in effect licenses under section 106 (6)for the public performance of sound recordings by means of digital audio transmission by at least 5 different interactive services: Provided, however, That each such license must be for a minimum of 10 percent of the copyrighted sound recordings owned by the licensor that have been licensed to interactive services, but in no event less than 50 sound recordings; or
(ii) the exclusive license is granted to perform publicly up to 45 seconds of a sound recording and the sole purpose of the performance is to promote the distribution or performance of that sound recording.
(C) Notwithstanding the grant of an exclusive or nonexclusive license of the right of public performance under section 106 (6), an interactive service may not publicly perform a sound recording unless a license has been granted for the public performance of any copyrighted musical work contained in the sound recording: Provided, That such license to publicly perform the copyrighted musical work may be granted either by a performing rights society representing the copyright owner or by the copyright owner.
(D) The performance of a sound recording by means of a retransmission of a digital audio transmission is not an infringement of section 106 (6) if—
(i) the retransmission is of a transmission by an interactive service licensed to publicly perform the sound recording to a particular member of the public as part of that transmission; and
(ii) the retransmission is simultaneous with the licensed transmission, authorized by the transmitter, and limited to that particular member of the public intended by the interactive service to be the recipient of the transmission.
(E) For the purposes of this paragraph—
(i) a “licensor” shall include the licensing entity and any other entity under any material degree of common ownership, management, or control that owns copyrights in sound recordings; and
(ii) a “performing rights society” is an association or corporation that licenses the public performance of nondramatic musical works on behalf of the copyright owner, such as the American Society of Composers, Authors and Publishers, Broadcast Music, Inc., and SESAC, Inc.
(4) Rights not otherwise limited.—
(A) Except as expressly provided in this section, this section does not limit or impair the exclusive right to perform a sound recording publicly by means of a digital audio transmission under section 106 (6).
(B) Nothing in this section annuls or limits in any way—
(i) the exclusive right to publicly perform a musical work, including by means of a digital audio transmission, under section 106 (4);
(ii) the exclusive rights in a sound recording or the musical work embodied therein under sections 106 (1)106 (2) and 106 (3); or
(iii) any other rights under any other clause of section 106, or remedies available under this title, as such rights or remedies exist either before or after the date of enactment of the Digital Performance Right in Sound Recordings Act of 1995.
(C) Any limitations in this section on the exclusive right under section 106 (6) apply only to the exclusive right under section 106 (6) and not to any other exclusive rights under section 106. Nothing in this section shall be construed to annul, limit, impair or otherwise affect in any way the ability of the owner of a copyright in a sound recording to exercise the rights under sections 106 (1)106 (2) and 106 (3), or to obtain the remedies available under this title pursuant to such rights, as such rights and remedies exist either before or after the date of enactment of the Digital Performance Right in Sound Recordings Act of 1995.
(e) Authority for Negotiations.—
(1) Notwithstanding any provision of the antitrust laws, in negotiating statutory licenses in accordance with subsection (f), any copyright owners of sound recordings and any entities performing sound recordings affected by this section may negotiate and agree upon the royalty rates and license terms and conditions for the performance of such sound recordings and the proportionate division of fees paid among copyright owners, and may designate common agents on a nonexclusive basis to negotiate, agree to, pay, or receive payments.
(2) For licenses granted under section 106 (6), other than statutory licenses, such as for performances by interactive services or performances that exceed the sound recording performance complement—
(A) copyright owners of sound recordings affected by this section may designate common agents to act on their behalf to grant licenses and receive and remit royalty payments: Provided, That each copyright owner shall establish the royalty rates and material license terms and conditions unilaterally, that is, not in agreement, combination, or concert with other copyright owners of sound recordings; and
(B) entities performing sound recordings affected by this section may designate common agents to act on their behalf to obtain licenses and collect and pay royalty fees: Provided, That each entity performing sound recordings shall determine the royalty rates and material license terms and conditions unilaterally, that is, not in agreement, combination, or concert with other entities performing sound recordings.
(f) Licenses for Certain Nonexempt Transmissions.—
(1)
(A) Proceedings under chapter 8 shall determine reasonable rates and terms of royalty payments for subscription transmissions by preexisting subscription services and transmissions by preexisting satellite digital audio radio services specified by subsection (d)(2) during the 5-year period beginning on January 1 of the second year following the year in which the proceedings are to be commenced, except in the case of a different transitional period provided under section 6(b)(3) of the Copyright Royalty and Distribution Reform Act of 2004, or such other period as the parties may agree. Such terms and rates shall distinguish among the different types of digital audio transmission services then in operation. Any copyright owners of sound recordings, preexisting subscription services, or preexisting satellite digital audio radio services may submit to the Copyright Royalty Judges licenses covering such subscription transmissions with respect to such sound recordings. The parties to each proceeding shall bear their own costs.
(B) The schedule of reasonable rates and terms determined by the Copyright Royalty Judges shall, subject to paragraph (3), be binding on all copyright owners of sound recordings and entities performing sound recordings affected by this paragraph during the 5-year period specified in subparagraph (A), a transitional period provided under section 6(b)(3) of the Copyright Royalty and Distribution Reform Act of 2004, or such other period as the parties may agree. In establishing rates and terms for preexisting subscription services and preexisting satellite digital audio radio services, in addition to the objectives set forth in section 801 (b)(1), the Copyright Royalty Judges may consider the rates and terms for comparable types of subscription digital audio transmission services and comparable circumstances under voluntary license agreements described in subparagraph (A).
(C) The procedures under subparagraphs (A) and (B) also shall be initiated pursuant to a petition filed by any copyright owners of sound recordings, any preexisting subscription services, or any preexisting satellite digital audio radio services indicating that a new type of subscription digital audio transmission service on which sound recordings are performed is or is about to become operational, for the purpose of determining reasonable terms and rates of royalty payments with respect to such new type of transmission service for the period beginning with the inception of such new type of service and ending on the date on which the royalty rates and terms for subscription digital audio transmission services most recently determined under subparagraph (A) or (B) and chapter 8 expire, or such other period as the parties may agree.
(2)
(A) Proceedings under chapter 8 shall determine reasonable rates and terms of royalty payments for public performances of sound recordings by means of eligible nonsubscription transmission services and new subscription services specified by subsection (d)(2) during the 5-year period beginning on January 1 of the second year following the year in which the proceedings are to be commenced, except in the case of a different transitional period provided under section 6(b)(3) of the Copyright Royalty and Distribution Reform Act of 2004, or such other period as the parties may agree. Such rates and terms shall distinguish among the different types of eligible nonsubscription transmission services and new subscription services then in operation and shall include a minimum fee for each such type of service. Any copyright owners of sound recordings or any entities performing sound recordings affected by this paragraph may submit to the Copyright Royalty Judges licenses covering such eligible nonsubscription transmissions and new subscription services with respect to such sound recordings. The parties to each proceeding shall bear their own costs.
(B) The schedule of reasonable rates and terms determined by the Copyright Royalty Judges shall, subject to paragraph (3), be binding on all copyright owners of sound recordings and entities performing sound recordings affected by this paragraph during the 5-year period specified in subparagraph (A), a transitional period provided under section 6(b)(3) of the Copyright Royalty and Distribution  [2] Act of 2004, or such other period as the parties may agree. Such rates and terms shall distinguish among the different types of eligible nonsubscription transmission services then in operation and shall include a minimum fee for each such type of service, such differences to be based on criteria including, but not limited to, the quantity and nature of the use of sound recordings and the degree to which use of the service may substitute for or may promote the purchase of phonorecords by consumers. In establishing rates and terms for transmissions by eligible nonsubscription services and new subscription services, the Copyright Royalty Judges shall establish rates and terms that most clearly represent the rates and terms that would have been negotiated in the marketplace between a willing buyer and a willing seller. In determining such rates and terms, the Copyright Royalty Judges shall base their decision on economic, competitive and programming information presented by the parties, including—
(i) whether use of the service may substitute for or may promote the sales of phonorecords or otherwise may interfere with or may enhance the sound recording copyright owner’s other streams of revenue from its sound recordings; and
(ii) the relative roles of the copyright owner and the transmitting entity in the copyrighted work and the service made available to the public with respect to relative creative contribution, technological contribution, capital investment, cost, and risk.
In establishing such rates and terms, the Copyright Royalty Judges may consider the rates and terms for comparable types of digital audio transmission services and comparable circumstances under voluntary license agreements described in subparagraph (A).
(C) The procedures under subparagraphs (A) and (B) shall also be initiated pursuant to a petition filed by any copyright owners of sound recordings or any eligible nonsubscription service or new subscription service indicating that a new type of eligible nonsubscription service or new subscription service on which sound recordings are performed is or is about to become operational, for the purpose of determining reasonable terms and rates of royalty payments with respect to such new type of service for the period beginning with the inception of such new type of service and ending on the date on which the royalty rates and terms for eligible nonsubscription services and new subscription services, as the case may be, most recently determined under subparagraph (A) or (B) and chapter 8 expire, or such other period as the parties may agree.
(3) License agreements voluntarily negotiated at any time between 1 or more copyright owners of sound recordings and 1 or more entities performing sound recordings shall be given effect in lieu of any decision by the Librarian of Congress or determination by the Copyright Royalty Judges.
(4)
(A) The Copyright Royalty Judges shall also establish requirements by which copyright owners may receive reasonable notice of the use of their sound recordings under this section, and under which records of such use shall be kept and made available by entities performing sound recordings. The notice and recordkeeping rules in effect on the day before the effective date of the Copyright Royalty and Distribution Reform Act of 2004 shall remain in effect unless and until new regulations are promulgated by the Copyright Royalty Judges. If new regulations are promulgated under this subparagraph, the Copyright Royalty Judges shall take into account the substance and effect of the rules in effect on the day before the effective date of the Copyright Royalty and Distribution Reform Act of 2004 and shall, to the extent practicable, avoid significant disruption of the functions of any designated agent authorized to collect and distribute royalty fees.
(B) Any person who wishes to perform a sound recording publicly by means of a transmission eligible for statutory licensing under this subsection may do so without infringing the exclusive right of the copyright owner of the sound recording—
(i) by complying with such notice requirements as the Copyright Royalty Judges shall prescribe by regulation and by paying royalty fees in accordance with this subsection; or
(ii) if such royalty fees have not been set, by agreeing to pay such royalty fees as shall be determined in accordance with this subsection.
(C) Any royalty payments in arrears shall be made on or before the twentieth day of the month next succeeding the month in which the royalty fees are set.
(5)
(A) Notwithstanding section 112 (e) and the other provisions of this subsection, the receiving agent may enter into agreements for the reproduction and performance of sound recordings under section 112 (e) and this section by any 1 or more commercial webcasters or noncommercial webcasters for a period of not more than 11 years beginning on January 1, 2005, that, once published in the Federal Register pursuant to subparagraph (B), shall be binding on all copyright owners of sound recordings and other persons entitled to payment under this section, in lieu of any determination by the Copyright Royalty Judges. Any such agreement for commercial webcasters may include provisions for payment of royalties on the basis of a percentage of revenue or expenses, or both, and include a minimum fee. Any such agreement may include other terms and conditions, including requirements by which copyright owners may receive notice of the use of their sound recordings and under which records of such use shall be kept and made available by commercial webcasters or noncommercial webcasters. The receiving agent shall be under no obligation to negotiate any such agreement. The receiving agent shall have no obligation to any copyright owner of sound recordings or any other person entitled to payment under this section in negotiating any such agreement, and no liability to any copyright owner of sound recordings or any other person entitled to payment under this section for having entered into such agreement.
(B) The Copyright Office shall cause to be published in the Federal Register any agreement entered into pursuant to subparagraph (A). Such publication shall include a statement containing the substance of subparagraph (C). Such agreements shall not be included in the Code of Federal Regulations. Thereafter, the terms of such agreement shall be available, as an option, to any commercial webcaster or noncommercial webcaster meeting the eligibility conditions of such agreement.
(C) Neither subparagraph (A) nor any provisions of any agreement entered into pursuant to subparagraph (A), including any rate structure, fees, terms, conditions, or notice and recordkeeping requirements set forth therein, shall be admissible as evidence or otherwise taken into account in any administrative, judicial, or other government proceeding involving the setting or adjustment of the royalties payable for the public performance or reproduction in ephemeral phonorecords or copies of sound recordings, the determination of terms or conditions related thereto, or the establishment of notice or recordkeeping requirements by the Copyright Royalty Judges under paragraph (4) or section 112 (e)(4). It is the intent of Congress that any royalty rates, rate structure, definitions, terms, conditions, or notice and recordkeeping requirements, included in such agreements shall be considered as a compromise motivated by the unique business, economic and political circumstances of webcasters, copyright owners, and performers rather than as matters that would have been negotiated in the marketplace between a willing buyer and a willing seller, or otherwise meet the objectives set forth in section 801 (b). This subparagraph shall not apply to the extent that the receiving agent and a webcaster that is party to an agreement entered into pursuant to subparagraph (A) expressly authorize the submission of the agreement in a proceeding under this subsection.
(D) Nothing in the Webcaster Settlement Act of 2008, the Webcaster Settlement Act of 2009, or any agreement entered into pursuant to subparagraph (A) shall be taken into account by the United States Court of Appeals for the District of Columbia Circuit in its review of the determination by the Copyright Royalty Judges of May 1, 2007, of rates and terms for the digital performance of sound recordings and ephemeral recordings, pursuant to sections 112 and 114.
(E) As used in this paragraph—
(i) the term “noncommercial webcaster” means a webcaster that—
(I) is exempt from taxation under section 501 of the Internal Revenue Code of 1986 (26 U.S.C. 501);
(II) has applied in good faith to the Internal Revenue Service for exemption from taxation under section 501 of the Internal Revenue Code and has a commercially reasonable expectation that such exemption shall be granted; or
(III) is operated by a State or possession or any governmental entity or subordinate thereof, or by the United States or District of Columbia, for exclusively public purposes;
(ii) the term “receiving agent” shall have the meaning given that term in section 261.2 of title 37, Code of Federal Regulations, as published in the Federal Register on July 8, 2002; and
(iii) the term “webcaster” means a person or entity that has obtained a compulsory license under section 112 or 114 and the implementing regulations therefor.
(F) The authority to make settlements pursuant to subparagraph (A) shall expire at 11:59 p.m. Eastern time on the 30th day after the date of the enactment of the Webcaster Settlement Act of 2009.
(g) Proceeds From Licensing of Transmissions.—
(1) Except in the case of a transmission licensed under a statutory license in accordance with subsection (f) of this section—
(A) a featured recording artist who performs on a sound recording that has been licensed for a transmission shall be entitled to receive payments from the copyright owner of the sound recording in accordance with the terms of the artist’s contract; and
(B) a nonfeatured recording artist who performs on a sound recording that has been licensed for a transmission shall be entitled to receive payments from the copyright owner of the sound recording in accordance with the terms of the nonfeatured recording artist’s applicable contract or other applicable agreement.
(2) An agent designated to distribute receipts from the licensing of transmissions in accordance with subsection (f) shall distribute such receipts as follows:
(A) 50 percent of the receipts shall be paid to the copyright owner of the exclusive right under section 106 (6) of this title to publicly perform a sound recording by means of a digital audio transmission.
(B) 21/2 percent of the receipts shall be deposited in an escrow account managed by an independent administrator jointly appointed by copyright owners of sound recordings and the American Federation of Musicians (or any successor entity) to be distributed to nonfeatured musicians (whether or not members of the American Federation of Musicians) who have performed on sound recordings.
(C) 21/2 percent of the receipts shall be deposited in an escrow account managed by an independent administrator jointly appointed by copyright owners of sound recordings and the American Federation of Television and Radio Artists (or any successor entity) to be distributed to nonfeatured vocalists (whether or not members of the American Federation of Television and Radio Artists) who have performed on sound recordings.
(D) 45 percent of the receipts shall be paid, on a per sound recording basis, to the recording artist or artists featured on such sound recording (or the persons conveying rights in the artists’ performance in the sound recordings).
(3) A nonprofit agent designated to distribute receipts from the licensing of transmissions in accordance with subsection (f) may deduct from any of its receipts, prior to the distribution of such receipts to any person or entity entitled thereto other than copyright owners and performers who have elected to receive royalties from another designated agent and have notified such nonprofit agent in writing of such election, the reasonable costs of such agent incurred after November 1, 1995, in—
(A) the administration of the collection, distribution, and calculation of the royalties;
(B) the settlement of disputes relating to the collection and calculation of the royalties; and
(C) the licensing and enforcement of rights with respect to the making of ephemeral recordings and performances subject to licensing under section 112 and this section, including those incurred in participating in negotiations or arbitration proceedings under section 112 and this section, except that all costs incurred relating to the section 112 ephemeral recordings right may only be deducted from the royalties received pursuant to section 112.
(4) Notwithstanding paragraph (3), any designated agent designated to distribute receipts from the licensing of transmissions in accordance with subsection (f) may deduct from any of its receipts, prior to the distribution of such receipts, the reasonable costs identified in paragraph (3) of such agent incurred after November 1, 1995, with respect to such copyright owners and performers who have entered with such agent a contractual relationship that specifies that such costs may be deducted from such royalty receipts.
(h) Licensing to Affiliates.—
(1) If the copyright owner of a sound recording licenses an affiliated entity the right to publicly perform a sound recording by means of a digital audio transmission under section 106 (6), the copyright owner shall make the licensed sound recording available under section 106 (6) on no less favorable terms and conditions to all bona fide entities that offer similar services, except that, if there are material differences in the scope of the requested license with respect to the type of service, the particular sound recordings licensed, the frequency of use, the number of subscribers served, or the duration, then the copyright owner may establish different terms and conditions for such other services.
(2) The limitation set forth in paragraph (1) of this subsection shall not apply in the case where the copyright owner of a sound recording licenses—
(A) an interactive service; or
(B) an entity to perform publicly up to 45 seconds of the sound recording and the sole purpose of the performance is to promote the distribution or performance of that sound recording.
(i) No Effect on Royalties for Underlying Works.— License fees payable for the public performance of sound recordings under section 106 (6) shall not be taken into account in any administrative, judicial, or other governmental proceeding to set or adjust the royalties payable to copyright owners of musical works for the public performance of their works. It is the intent of Congress that royalties payable to copyright owners of musical works for the public performance of their works shall not be diminished in any respect as a result of the rights granted by section 106 (6).
(j) Definitions.— As used in this section, the following terms have the following meanings:
(1) An “affiliated entity” is an entity engaging in digital audio transmissions covered by section 106 (6), other than an interactive service, in which the licensor has any direct or indirect partnership or any ownership interest amounting to 5 percent or more of the outstanding voting or non-voting stock.
(2) An “archived program” is a predetermined program that is available repeatedly on the demand of the transmission recipient and that is performed in the same order from the beginning, except that an archived program shall not include a recorded event or broadcast transmission that makes no more than an incidental use of sound recordings, as long as such recorded event or broadcast transmission does not contain an entire sound recording or feature a particular sound recording.
(3) A “broadcast” transmission is a transmission made by a terrestrial broadcast station licensed as such by the Federal Communications Commission.
(4) A “continuous program” is a predetermined program that is continuously performed in the same order and that is accessed at a point in the program that is beyond the control of the transmission recipient.
(5) A “digital audio transmission” is a digital transmission as defined in section 101, that embodies the transmission of a sound recording. This term does not include the transmission of any audiovisual work.
(6) An “eligible nonsubscription transmission” is a noninteractive nonsubscription digital audio transmission not exempt under subsection (d)(1) that is made as part of a service that provides audio programming consisting, in whole or in part, of performances of sound recordings, including retransmissions of broadcast transmissions, if the primary purpose of the service is to provide to the public such audio or other entertainment programming, and the primary purpose of the service is not to sell, advertise, or promote particular products or services other than sound recordings, live concerts, or other music-related events.
(7) An “interactive service” is one that enables a member of the public to receive a transmission of a program specially created for the recipient, or on request, a transmission of a particular sound recording, whether or not as part of a program, which is selected by or on behalf of the recipient. The ability of individuals to request that particular sound recordings be performed for reception by the public at large, or in the case of a subscription service, by all subscribers of the service, does not make a service interactive, if the programming on each channel of the service does not substantially consist of sound recordings that are performed within 1 hour of the request or at a time designated by either the transmitting entity or the individual making such request. If an entity offers both interactive and noninteractive services (either concurrently or at different times), the noninteractive component shall not be treated as part of an interactive service.
(8) A “new subscription service” is a service that performs sound recordings by means of noninteractive subscription digital audio transmissions and that is not a preexisting subscription service or a preexisting satellite digital audio radio service.
(9) A “nonsubscription” transmission is any transmission that is not a subscription transmission.
(10) A “preexisting satellite digital audio radio service” is a subscription satellite digital audio radio service provided pursuant to a satellite digital audio radio service license issued by the Federal Communications Commission on or before July 31, 1998, and any renewal of such license to the extent of the scope of the original license, and may include a limited number of sample channels representative of the subscription service that are made available on a nonsubscription basis in order to promote the subscription service.
(11) A “preexisting subscription service” is a service that performs sound recordings by means of noninteractive audio-only subscription digital audio transmissions, which was in existence and was making such transmissions to the public for a fee on or before July 31, 1998, and may include a limited number of sample channels representative of the subscription service that are made available on a nonsubscription basis in order to promote the subscription service.
(12) A “retransmission” is a further transmission of an initial transmission, and includes any further retransmission of the same transmission. Except as provided in this section, a transmission qualifies as a “retransmission” only if it is simultaneous with the initial transmission. Nothing in this definition shall be construed to exempt a transmission that fails to satisfy a separate element required to qualify for an exemption under section 114 (d)(1).
(13) The “sound recording performance complement” is the transmission during any 3-hour period, on a particular channel used by a transmitting entity, of no more than—
(A) 3 different selections of sound recordings from any one phonorecord lawfully distributed for public performance or sale in the United States, if no more than 2 such selections are transmitted consecutively; or
(B) 4 different selections of sound recordings—
(i) by the same featured recording artist; or
(ii) from any set or compilation of phonorecords lawfully distributed together as a unit for public performance or sale in the United States,
if no more than three such selections are transmitted consecutively:
Provided, That the transmission of selections in excess of the numerical limits provided for in clauses (A) and (B) from multiple phonorecords shall nonetheless qualify as a sound recording performance complement if the programming of the multiple phonorecords was not willfully intended to avoid the numerical limitations prescribed in such clauses.
(14) A “subscription” transmission is a transmission that is controlled and limited to particular recipients, and for which consideration is required to be paid or otherwise given by or on behalf of the recipient to receive the transmission or a package of transmissions including the transmission.
(15) A “transmission” is either an initial transmission or a retransmission.

6.5.3 UMG Recordings, Inc. v. MP3.Com, Inc. 6.5.3 UMG Recordings, Inc. v. MP3.Com, Inc.

92 F.Supp.2d 349

UMG RECORDINGS, INC., Sony Music Entertainment Inc., Warner Bros. Records Inc., Arista Records Inc., Atlantic Recordings Corp., BMG Music d/b/a The RCA Records Label, Capitol Records, Inc., Elektra Entertainment Group, Inc., Interscope Records, and Sire Records Group Inc., Plaintiffs,
v.
MP3.COM, INC., Defendant.

No. 00 Civ. 472(JSR).

United States District Court, S.D. New York.

May 4, 2000.

Robert A. Goodman, Arnold & Porter, New York City, Hadrian R. Katz, Jule L. Sigall, Helene T. Krasnoff, Washington, DC, Steven B. Fabrizio, Washington, DC, for UMG Recordings, Inc., Sony Music Entertainment Inc., Arista Records Inc., BMG Music.

Katherine B. Forrest, Cravath, Swaine & Moore, New York City, Robert A. Goodman, Arnold & Porter, New York City, Evan R. Chesler, Cravath Swaine & [350] Moore, New York City, Hadrian R. Katz, Jule L. Sigall, Helene T. Krasnoff, Washington, DC, Steven B. Fabrizio, Washington, DC, for Warner Bros. Records Inc., Atlantic Recording Corp.

Steven Neal and Michael Rhodes of Cooley Godward LLP, San Diego, CA, Michael B. Carlinsky, Jeffrey A. Conciatori, Orrick, Herrington & Sutcliffe, L.L.P., New York City, for MP3.Com, Inc.

OPINION

RAKOFF, District Judge.

The complex marvels of cyberspatial communication may create difficult legal issues; but not in this case. Defendant's infringement of plaintiffs' copyrights is clear. Accordingly, on April 28, 2000, the Court granted defendant's motion for partial summary judgment holding defendant liable for copyright infringement. This opinion will state the reasons why.

The pertinent facts, either undisputed or, where disputed, taken most favorably to defendant, are as follows:

The technology known as "MP3" permits rapid and efficient conversion of compact disc recordings ("CDs") to computer files easily accessed over the Internet. See generally Recording Industry Ass'n of America v. Diamond Multimedia Systems Inc., 180 F.3d 1072, 1073-74 (9th Cir. 1999). Utilizing this technology, defendant MP3.com, on or around January 12, 2000, launched its "My.MP3.com" service, which is advertised as permitting subscribers to store, customize and listen to the recordings contained on their CDs from any place where they have an Internet connection. To make good on this offer, defendant purchased tens of thousands of popular CDs in which plaintiffs held the copyrights, and, without authorization, copied their recordings onto its computer servers so as to be able to replay the recordings for its subscribers.

Specifically, in order to first access such a recording, a subscriber to MP3.com must either "prove" that he already owns the CD version of the recording by inserting his copy of the commercial CD into his computer CD-Rom drive for a few seconds (the "Beam-it Service") or must purchase the CD from one of defendant's cooperating online retailers (the "instant Listening Service"). Thereafter, however, the subscriber can access via the Internet from a computer anywhere in the world the copy of plaintiffs' recording made by defendant. Thus, although defendant seeks to portray its service as the "functional equivalent" of storing its subscribers' CDs, in actuality defendant is re-playing for the subscribers converted versions of the recordings it copied, without authorization, from plaintiffs' copyrighted CDs. On its face, this makes out a presumptive case of infringement under the Copyright Act of 1976 ("Copyright Act"), 17 U.S.C. § 101 et seq. See, e.g., Castle Rock Entertainment, Inc. v. Carol Publishing Group, Inc., 150 F.3d 132, 137 (2d Cir.1998); Hasbro Bradley, Inc. v. Sparkle Toys, Inc., 780 F.2d 189, 192 (2d Cir.1985).[1]

Defendant argues, however, that such copying is protected by the affirmative defense of "fair use." See 17 U.S.C. § 107. In analyzing such a defense, the Copyright Act specifies four factors that must be considered: "(1) the purpose and [351] character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; (2) the nature of the copyrighted work; (3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and (4) the effect of the use upon the potential market for or value of the copyrighted work." Id. Other relevant factors may also be considered, since fair use is an "equitable rule of reason" to be applied in light of the overall purposes of the Copyright Act. Sony Corporation of America v. Universal City Studios, Inc., 464 U.S. 417, 448, 454, 104 S.Ct. 774, 78 L.Ed.2d 574 (1984); see Harper & Row, Publishers, Inc. v. Nation Enterprises, 471 U.S. 539, 549, 105 S.Ct. 2218, 85 L.Ed.2d 588 (1985).

Regarding the first factor — "the purpose and character of the use" — defendant does not dispute that its purpose is commercial, for while subscribers to My. MP3.com are not currently charged a fee, defendant seeks to attract a sufficiently large subscription base to draw advertising and otherwise make a profit. Consideration of the first factor, however, also involves inquiring into whether the new use essentially repeats the old or whether, instead, it "transforms" it by infusing it with new meaning, new understandings, or the like. See, e.g., Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569, 579, 114 S.Ct. 1164, 127 L.Ed.2d 500 (1994); Castle Rock, 150 F.3d at 142; See also Pierre N. Leval, "Toward a Fair Use Standard," 103 Harv. L.Rev. 1105, 111 (1990). Here, although defendant recites that My.MP3.com provides a transformative "space shift" by which subscribers can enjoy the sound recordings contained on their CDs without lugging around the physical discs themselves, this is simply another way of saying that the unauthorized copies are being retransmitted in another medium — an insufficient basis for any legitimate claim of transformation, See, e.g., Infinity Broadcast Corp. v. Kirkwood, 150 F.3d 104, 108 (2d Cir.1998) (rejecting the fair use defense by operator of a service that retransmitted copyrighted radio broadcasts over telephone lines); Los Angeles News Serv. v. Reuters Television Int'l Ltd., 149 F.3d 987 (9th Cir.1998) (rejecting the fair use defense where television news agencies copied copyrighted news footage and retransmitted it to news organizations), cert. denied, 525 U.S. 1141, 119 S.Ct. 1032, 143 L.Ed.2d 41 (1999); see also American Geophysical Union v. Texaco Inc., 60 F.3d 913, 923 (2d Cir.), cert. dismissed, 516 U.S. 1005, 116 S.Ct. 592, 133 L.Ed.2d 486 (1995); Basic Books, Inc. v. Kinko's Graphics Corp., 758 F.Supp. 1522, 1530-31 (S.D.N.Y.1991); see generally Leval, supra, at 1111 (repetition of copyrighted material that "merely repackages or republishes the original" is unlikely to be deemed a fair use).

Here, defendant adds no new "new aesthetics, new insights and understandings" to the original music recordings it copies, see Castle Rock, 150 F.3d at 142 (internal quotation marks omitted), but simply repackages those recordings to facilitate their transmission through another medium. While such services may be innovative, they are not transformative.[2]

Regarding the second factor — "the nature of the copyrighted work" — the creative recordings here being copied are "close[ ] to the core of intended copyright protection," Campbell, 510 U.S. at 586, 114 S.Ct. 1164, and, conversely, far removed from the more factual or descriptive work more amenable to "fair use," see Nihon [352] Keizai Shimbun, Inc. v. Comline Business Data, Inc., 166 F.3d 65, 72-73 (2d Cir. 1999); see also Castle Rock, 150 F.3d at 143-44.

Regarding the third factor — "the amount and substantiality of the portion [of the copyrighted work] used [by the copier] in relation to the copyrighted work as a whole" — it is undisputed that defendant copies, and replays, the entirety of the copyrighted works here in issue, thus again negating any claim of fair use. See Infinity Broadcast, 150 F.3d at 109 ("[T]he more of a copyrighted work that is taken, the less likely the use is to be fair ...."); see generally Leval, supra, at 1122 ("[T]he larger the volume ... of what is taken, the greater the affront to the interests of the copyright owner, and the less likely that a taking will qualify as a fair use").

Regarding the fourth factor — "the effect of the use upon the potential market for or value of the copyrighted work" — defendant's activities on their face invade plaintiffs' statutory right to license their copyrighted sound recordings to others for reproduction. See 17 U.S.C. § 106. Defendant, however, argues that, so far as the derivative market here involves is concerned, plaintiffs have not shown that such licensing is "traditional, reasonable, or likely to be developed." American Geophysical, 60 F.3d at 930 & n. 17. Moreover, defendant argues, its activities can only enhance plaintiffs' sales, since subscribers cannot gain access to particular recordings made available by MP3.com unless they have already "purchased" (actually or purportedly), or agreed to purchase, their own CD copies of those recordings.

Such arguments — though dressed in the garb of an expert's "opinion" (that, on inspection, consists almost entirely of speculative and conclusory statements) — are unpersuasive. Any allegedly positive impact of defendant's activities on plaintiffs' prior market in no way frees defendant to usurp a further market that directly derives from reproduction of the plaintiffs' copyrighted works. See Infinity Broadcast, 150 F.3d at 111. This would be so even if the copyrightholder had not yet entered the new market in issue, for a copyrighterholder's "exclusive" rights, derived from the Constitution and the Copyright Act, include the right, within broad limits, to curb the development of such a derivative market by refusing to license a copyrighted work or by doing so only on terms the copyright owner finds acceptable. See Castle Rock, 150 F.3d at 145-46; Salinger v. Random House, Inc., 811 F.2d 90, 99 (2d Cir.), cert. denied, 484 U.S. 890, 108 S.Ct. 213, 98 L.Ed.2d 177 (1987). Here, moreover, plaintiffs have adduced substantial evidence that they have in fact taken steps to enter that market by entering into various licensing agreements. See, e.g., Forrest R. Aff., Ex. F., Vidich Dep. at 61-63; id., Ex. N; Goodman R. Aff., Ex. B., Silver Dep. at 64-65; id., Ex. D, Eisenberg Dep. at 130-32; id., Ex. E., Evans Dep. 145-48.

Finally, regarding defendant's purported reliance on other factors, see Campbell, 510 U.S. at 577, 114 S.Ct. 1164, this essentially reduces to the claim that My. MP3.com provides a useful service to consumers that, in its absence, will be served by "pirates." Copyright, however, is not designed to afford consumer protection or convenience but, rather, to protect the copyrightholders' property interests. Moreover, as a practical matter, plaintiffs have indicated no objection in principle to licensing their recordings to companies like MP3.com; they simply want to make sure they get the remuneration the law reserves for them as holders of copyrights on creative works. Stripped to its essence, defendant's "consumer protection" argument amounts to nothing more than a bald claim that defendant should be able to misappropriate plaintiffs' property simply because there is a consumer demand for it. This hardly appeals to the conscience of equity.

In sum, on any view, defendant's "fair use" defense is indefensible and must be denied as a matter of law. Defendant's [353] other affirmative defenses, such as copyright misuse, abandonment, unclean hands, and estoppel, are essentially frivolous and may be disposed of briefly. While defendant contends, under the rubric of copyright misuse, that plaintiffs are misusing their "dominant market position to selectively prosecute only certain online music technology companies," Def.'s Consolidated Opp. to Pls.' Motions for Summ.J. at 21, the admissible evidence of records shows only that plaintiffs have reasonably exercised their right to determine which infringers to pursue, and in which order to pursue them, cf. Broadcast Music, Inc. v. Peppermint Club, Inc., 1985 WL 6141, at *4 (N.D.Ohio Dec.16, 1985). The abandonment defense must also fall since defendant has failed to adduce any competent evidence of an overt act indicating that plaintiffs, who filed suit against MP3.com shortly after MP3.com launched its infringing My.MP3.com service, intentionally abandoned their copyrights. See Richard Feiner & Co., Inc. v. H.R. Indus., Inc., 10 F.Supp.2d 310, 313 (S.D.N.Y.1998). Similarly, defendant's estoppel defense must be rejected because defendant has failed to provide any competent evidence that it relied on any action by plaintiffs with respect to defendant's My.MP3.com service. Finally, the Court must reject defendant's unclean hands defense given defendant's failure to come forth with any admissible evidence showing bad faith or misconduct on the part of plaintiffs. See generally Dunlop-McCullen v. Local 1-S, AFL-CIO-CLC, 149 F.3d 85, 90 (2d Cir.1998); A.H. Emery Co. v. Marcan Prods. Corp., 389 F.2d 11, 18 n. 4 (2d Cir.), cert. denied, 393 U.S. 835, 89 S.Ct. 109, 21 L.Ed.2d 106 (1968).[3]

The Court has also considered defendant's other points and arguments and finds them sufficiently without merit as not to warrant any further comment.

Accordingly, the Court, for the foregoing reasons, has determined that plaintiffs are entitled to partial summary judgment holding defendant to have infringed plaintiffs' copyrights.

[1] Defendant's only challenge to plaintiffs' prima facie case of infringement is the suggestion, buried in a footnote in its opposition papers, that its music computer files are not in fact "reproductions" of plaintiffs' copyrighted works within the meaning of the Copyright Act. See, e.g., 17 U.S.C. § 114(b). Specifically, defendant claims that the simulated sounds on MP3-based music files are not physically identical to the sounds on the original CD recordings. See Def.'s Consolidated Opp. to Pls.' Motions for Partial Summ.J. at 13-14 n. 9. Defendant concedes, however, that the human ear cannot detect a difference between the two. Id. Moreover, defendant admits that a goal of its copying is to create a music file that is sonically as identical to the original CD as possible. See Goodman Reply Aff., Robertson Dep., Ex. A, at 85. In such circumstances, some slight, humanly undetectable difference between the original and the copy does not qualify for exclusion from the coverage of the Act.

[2] Defendant's reliance on the Ninth Circuit's "reverse engineering" cases, see Sony Computer Entertainment, Inc. v. Connectix Corp., 203 F.3d 596 (9th Cir.2000); Sega Enterprises Ltd. v. Accolade, Inc., 977 F.2d 1510, 1527 (9th Cir.1992), is misplaced, because, among other relevant distinctions, those cases involved the copying of software in order to develop a new product, see Sony Computer Entertainment, 203 F.3d at 606; Sega Enterprises, 977 F.2d at 1522, whereas here defendant copied CDs onto its servers not to create any new form of expression but rather to retransmit the same expression in a different medium.

[3] The Court also finds no reason to alter or postpone its determination simply because of the recent filing of the complaint in Lester Chambers et al. v. Time Warner, Inc., et al., 00 Civ. 2839 (S.D.N.Y. filed Apr. 12, 2000) (JSR), the allegations of which, according to the defendant here, call into question the exclusivity of plaintiffs' copyrights. The allegations of a complaint, having no evidentiary value, cannot defeat a motion for summary judgment.

6.5.4 A&M Records, Inc. v. Napster, Inc. 6.5.4 A&M Records, Inc. v. Napster, Inc.

239 F.3d 1004 (2001)

A&M; Records, Inc., a corporation; Geffen Records, Inc., a corporation; Interscope Records; Sony Music Entertainment, Inc.; Mca Records, Inc.; Atlantic Recording Corp.; Island Records, Inc.; Motown Record Co.; Capitol Records, Inc., Plaintiffs-Appellees,
v.
Napster, Inc., Defendant-Appellant. Jerry Leiber, individually and doing business as, Jerry Leiber Music; Mike Stoller and Frank Music Corp., on behalf of themselves and all others similarly situated, Plaintiffs-Appellees,
v.
Napster, Inc., Defendant-Appellant.

Nos. 00-16401, 00-16403.

United States Court of Appeals, Ninth Circuit.

Argued and Submitted October 2, 2000.
Filed February 12, 2001.
As Amended April 3, 2001.

[1005] [1006] [1007] [1008] [1009] David Boies, Jonathan Schiller and Robert Silver, Boies, Schiller & Flexner, Armonk, New York, Laurence F. Pulgram, David L. Hayes, Daniel Johnson, Jr. and Darryl M. Woo, Fenwick & West, Palo Alto, California, for the defendant-appellant.

Russell J. Frackman (argued), George M. Borkowski, Jeffrey D. Goldman, Roy L. Shults, and Peter B. Gelblum, Mitchell Silberberg & Knupp LLP, Los Angeles, CA, Leon P. Gold, Hank Goldsmith, Lawrence I. Weinstein, Frank P. Scibilia, Proskauer Rose LLP, New York, New York, Steven B. Fabrizio, Recording Industry Ass'n of America, Inc., Washington, DC, for A & M Records, Inc. Plaintiffs-Appellees.

Carey R. Ramos(argued), Aidan Synnott, Michael C. Keats, Lewis E. Farberman, Paul Weiss, Rifkind Wharton & Garrison, New York, New York, Jeffrey G. Knowles, Keith Evans-Orville, Julia D. Greer, Coblentz, Patch, Duffy & Bass LLP, San Francisco, California, for Leiber plaintiffs-appellees.

Hannah Bentley, San Anselmo, California, for amicus Casanova Records.

Andrew P. Bridges, Wilson, Sonsini, Goodrich & Rosati, Palo Alto, California, for amicus Digital Media Association.

Bruce G. Joseph, Thomas W. Kirby, and Scott E. Bain, Wiley, Rein & Fielding, Washington, D.C., for amici Ad Hoc Copyright Coalition; Commercial Internet Exchange; Computer & Communications Industry Association; Information Technology Association of America; Netcoalition.com; United States Internet Industry Association, and United States Telecommunications Association.

Scott R. McIntosh, Civil Division, Department of Justice, Washington, D.C., for amicus United States.

Ann Brick, San Francisco, California, for amici American Civil Liberties Union and the American Civil Liberties Union of Northern California.

Judith B. Jennison, Perkins Coie, San Francisco, California, for amicus Scour, Inc.

Ralph Oman, Dechert, Price & Rhoads, Washington, D.C., as amicus.

Christopher Tayback, Quinn, Emanuel, Urquhart, Oliver & Hedges, Los Angeles, California, for amicus National Academy of Recording Arts & Sciences.

[1010] E. Edward Bruce, Covington & Burling, Washington, D.C., for amicus Business Software Alliance.

Kevin T. Baine, Williams & Connolly, Washington, D.C., for amici Motion Picture Association of America, Inc., Software & Information Industry Association, American Film Marketing Association, Association of American Publishers, American Society of Media Photographers, Professional Photographers Association, Graphic Artists Guild, Interactive Digital Software Association, American Society of Composers, Authors and Publishers, Broadcast Music, Inc., Producers Guild of America, Directors Guild of America, Inc., Writers Guild of America, West, Inc., American Federation of Musicians of the United States and Canada, Reed Elsevier, Inc., American Federation of Television and Radio Artists, Office of the Commissioner of Baseball, Songwriters Guild of America, and AmSong, Inc.; Joel M. Litvin, New York, New York, for amicus National Basketball Association.

Salvatore A. Romano, Seyfarth, Shaw, Washington, D.C., for amici National Association of Recording Merchandisers, Inc. and Video Software Dealers Association.

Erwin Chemerinsky, University of Southern California School of Law, Los Angeles, California, for amicus Law Professors Erwin Chemerinsky, Kenneth L. Karst, Steven Shiffrin, Rodney A. Smolla and Marcy Strauss.

Barry I. Slotnick, Richards & O'Neil, New York, New York, for amicus Association for Independent Music.

Morton David Goldberg, Cowan, Liebowitz & Latman, New York, New York, for amici Alliance Entertainment Corp., Audible Inc., Blue Spike, Inc., The Clandestine Group, Inc., Digimarc Corporation, Digital Media on Demand, Inc., FullAudio Corporation, InterTrust Technologies Corporation, Oak Technology, Inc., Reciprocal, Inc., RioPort, Inc., RPK SecureMedia Inc., Verance Corporation, and VNU USA, Inc.

Richie T. Thomas, Squire, Sanders & Dempsey, Washington, D.C., for amici Consumer Electronics Association, Digital Future Coalition, and Computer & Communications Industry Association.

Karen B. Tripp, Houston, Texas, for amici Association of American Physicians & Surgeons, Inc. and Eagle Forum Education and Legal Defense Fund.

Professor Jessica Litman, Wayne State University Law School, Detroit, Michigan; Professor Keith Aoki, University of Oregon School of Law; Professor Ann Bartow, University of South Carolina School of Law; Professor Dan Burk, University of Minnesota; Professor Julie Cohen, Georgetown University School of Law; Professors Christine Haight Farley and Peter Jaszi, Washington College of Law, American University; Professor Lydia Pallas Loren, Lewis and Clark College Northwestern School of Law; Professor Pamela Samuelson, Boalt Hall School of Law, University of California Berkeley; Professor Shubha Ghosh, University at Buffalo, SUNY; Professors Paul J. Heald, Allen Post Professor of Law, L. Ray Patterson, Pope Brock Professor of Law, and Laura N. Gasaway, University of Georgia School of Law; Professor Michael Madison, University of Pittsburgh School of Law; Professor Ruth Okediji, University of Oklahoma Law School; Alfred C. Yen, Associate Dean for Academic Affairs and Professor of Law, Boston College Law School; Professor Diame Zimmerman, New York University School of Law, and Professor Dennis Karjala, Arizona State University College of Law, for amicus Copyright Law Professors.

Before: MARY M. SCHROEDER, Chief Judge, ROBERT R. BEEZER and RICHARD A. PAEZ, Circuit Judges.

Argued and Submitted October 2, 2000. — San Francisco, California

ORDER AND AMENDED OPINION

The Opinion filed February 12, 2001 in this appeal is amended as follows:

Slip opinion at 2196, lines 4-6 — delete the see generally citation to "Copyright Infringement Issues on the Internet" and insert: "see generally 3 Melville B. Nimmer & David Nimmer, Nimmer On Copyright §§ 12.04[A][2] & [A][2][b] (2000) (confining Sony to contributory infringement analysis: "Contributory infringement itself is of two types — personal conduct that forms part of or furthers the infringement and contribution of machinery or goods that provide the means to infringe")."

Slip opinion at 2203, first full paragraph, lines 1-2 — insert "not" between "Napster argues that the district court erred in" and "finding that . . ."

Slip opinion at 2204, last paragraph, line 5 — delete "911 F.2d 970 at 976-77" and insert "911 F.2d at 976-77"

BEEZER, Circuit Judge:

Plaintiffs are engaged in the commercial recording, distribution and sale of copyrighted [1011] musical compositions and sound recordings. The complaint alleges that Napster, Inc. ("Napster") is a contributory and vicarious copyright infringer. On July 26, 2000, the district court granted plaintiffs' motion for a preliminary injunction. The injunction was slightly modified by written opinion on August 10, 2000. A & M Records, Inc. v. Napster, Inc., 114 F.Supp.2d 896 (N.D.Cal.2000). The district court preliminarily enjoined Napster "from engaging in, or facilitating others in copying, downloading, uploading, transmitting, or distributing plaintiffs' copyrighted musical compositions and sound recordings, protected by either federal or state law, without express permission of the rights owner." Id. at 927. Federal Rule of Civil Procedure 65(c) requires successful plaintiffs to post a bond for damages incurred by the enjoined party in the event that the injunction was wrongfully issued. The district court set bond in this case at $5 million.

We entered a temporary stay of the preliminary injunction pending resolution of this appeal. We have jurisdiction pursuant to 28 U.S.C. § 1292(a)(1). We affirm in part, reverse in part and remand.

I

We have examined the papers submitted in support of and in response to the injunction application and it appears that Napster has designed and operates a system which permits the transmission and retention of sound recordings employing digital technology.

In 1987, the Moving Picture Experts Group set a standard file format for the storage of audio recordings in a digital format called MPEG-3, abbreviated as "MP3." Digital MP3 files are created through a process colloquially called "ripping." Ripping software allows a computer owner to copy an audio compact disk ("audio CD") directly onto a computer's hard drive by compressing the audio information on the CD into the MP3 format. The MP3's compressed format allows for rapid transmission of digital audio files from one computer to another by electronic mail or any other file transfer protocol.

Napster facilitates the transmission of MP3 files between and among its users. Through a process commonly called "peer-to-peer" file sharing, Napster allows its users to: (1) make MP3 music files stored on individual computer hard drives available for copying by other Napster users; (2) search for MP3 music files stored on other users' computers; and (3) transfer exact copies of the contents of other users' MP3 files from one computer to another via the Internet. These functions are made possible by Napster's MusicShare software, available free of charge from Napster's Internet site, and Napster's network servers and server-side software. Napster provides technical support for the indexing and searching of MP3 files, as well as for its other functions, including a "chat room," where users can meet to discuss music, and a directory where participating artists can provide information about their music.

A. Accessing the System

In order to copy MP3 files through the Napster system, a user must first access Napster's Internet site and download[1] the MusicShare software to his individual computer. See http://www.Napster.com. Once the software is installed, the user can access the Napster system. A first-time user is required to register with the Napster system by creating a "user name" and password.

B. Listing Available Files

If a registered user wants to list available files stored in his computer's hard drive on Napster for others to access, he [1012] must first create a "user library" directory on his computer's hard drive. The user then saves his MP3 files in the library directory, using self-designated file names. He next must log into the Napster system using his user name and password. His MusicShare software then searches his user library and verifies that the available files are properly formatted. If in the correct MP3 format, the names of the MP3 files will be uploaded from the user's computer to the Napster servers. The content of the MP3 files remains stored in the user's computer.

Once uploaded to the Napster servers, the user's MP3 file names are stored in a server-side "library" under the user's name and become part of a "collective directory" of files available for transfer during the time the user is logged onto the Napster system. The collective directory is fluid; it tracks users who are connected in real time, displaying only file names that are immediately accessible.

C. Searching For Available Files

Napster allows a user to locate other users' MP3 files in two ways: through Napster's search function and through its "hotlist" function.

Software located on the Napster servers maintains a "search index" of Napster's collective directory. To search the files available from Napster users currently connected to the network servers, the individual user accesses a form in the MusicShare software stored in his computer and enters either the name of a song or an artist as the object of the search. The form is then transmitted to a Napster server and automatically compared to the MP3 file names listed in the server's search index. Napster's server compiles a list of all MP3 file names pulled from the search index which include the same search terms entered on the search form and transmits the list to the searching user. The Napster server does not search the contents of any MP3 file; rather, the search is limited to "a text search of the file names indexed in a particular cluster. Those file names may contain typographical errors or otherwise inaccurate descriptions of the content of the files since they are designated by other users." Napster, 114 F.Supp.2d at 906.

To use the "hotlist" function, the Napster user creates a list of other users' names from whom he has obtained MP3 files in the past. When logged onto Napster's servers, the system alerts the user if any user on his list (a "hotlisted user") is also logged onto the system. If so, the user can access an index of all MP3 file names in a particular hotlisted user's library and request a file in the library by selecting the file name. The contents of the hotlisted user's MP3 file are not stored on the Napster system.

D. Transferring Copies of an MP3 file

To transfer a copy of the contents of a requested MP3 file, the Napster server software obtains the Internet address of the requesting user and the Internet address of the "host user" (the user with the available files). See generally Brookfield Communications, Inc. v. West Coast Entm't Corp., 174 F.3d 1036, 1044 (9th Cir.1999) (describing, in detail, the structure of the Internet). The Napster servers then communicate the host user's Internet address to the requesting user. The requesting user's computer uses this information to establish a connection with the host user and downloads a copy of the contents of the MP3 file from one computer to the other over the Internet, "peer-to-peer." A downloaded MP3 file can be played directly from the user's hard drive using Napster's MusicShare program or other software. The file may also be transferred back onto an audio CD if the user has access to equipment designed for that purpose. In both cases, the quality of the original sound recording is slightly diminished by transfer to the MP3 format.

This architecture is described in some detail to promote an understanding of transmission mechanics as opposed to the content of the transmissions. The content [1013] is the subject of our copyright infringement analysis.

II

We review a grant or denial of a preliminary injunction for abuse of discretion. Gorbach v. Reno, 219 F.3d 1087, 1091 (9th Cir.2000) (en banc). Application of erroneous legal principles represents an abuse of discretion by the district court. Rucker v. Davis, 237 F.3d 1113, 1118-19 (9th Cir.2001) (en banc). If the district court is claimed to have relied on an erroneous legal premise in reaching its decision to grant or deny a preliminary injunction, we will review the underlying issue of law de novo. Id. at 1118 (citing Does 1-5 v. Chandler, 83 F.3d 1150, 1152 (9th Cir. 1996)).

On review, we are required to determine, "whether the court employed the appropriate legal standards governing the issuance of a preliminary injunction and whether the district court correctly apprehended the law with respect to the underlying issues in the case." Id. "As long as the district court got the law right, `it will not be reversed simply because the appellate court would have arrived at a different result if it had applied the law to the facts of the case.'" Gregorio T. v. Wilson, 59 F.3d 1002, 1004 (9th Cir.1995) (quoting Sports Form, Inc. v. United Press, Int'l, 686 F.2d 750, 752 (9th Cir.1982)).

Preliminary injunctive relief is available to a party who demonstrates either: (1) a combination of probable success on the merits and the possibility of irreparable harm; or (2) that serious questions are raised and the balance of hardships tips in its favor. Prudential Real Estate Affiliates, Inc. v. PPR Realty, Inc., 204 F.3d 867, 874 (9th Cir.2000). "These two formulations represent two points on a sliding scale in which the required degree of irreparable harm increases as the probability of success decreases." Id.

III

Plaintiffs claim Napster users are engaged in the wholesale reproduction and distribution of copyrighted works, all constituting direct infringement.[2] The district court agreed. We note that the district court's conclusion that plaintiffs have presented a prima facie case of direct infringement by Napster users is not presently appealed by Napster. We only need briefly address the threshold requirements.

A. Infringement

Plaintiffs must satisfy two requirements to present a prima facie case of direct infringement: (1) they must show ownership of the allegedly infringed material and (2) they must demonstrate that the alleged infringers violate at least one exclusive right granted to copyright holders under 17 U.S.C. § 106. See 17 U.S.C. § 501(a) (infringement occurs when alleged infringer engages in activity listed in § 106); see also Baxter v. MCA, Inc., 812 F.2d 421, 423 (9th Cir.1987); see, e.g., S.O.S., Inc. v. Payday, Inc., 886 F.2d 1081, 1085 n. 3 (9th Cir.1989) ("The word `copying' is shorthand for the infringing of any of the copyright owner's five exclusive rights. . . ."). Plaintiffs have sufficiently demonstrated ownership. The record supports the district court's determination that "as much as eighty-seven percent of the files available on Napster may be copyrighted and more than seventy percent may be owned or administered by plaintiffs." Napster, 114 F.Supp.2d at 911.

The district court further determined that plaintiffs' exclusive rights under § 106 were violated: "here the evidence establishes [1014] that a majority of Napster users use the service to download and upload copyrighted music. . . . And by doing that, it constitutes — the uses constitute direct infringement of plaintiffs' musical compositions, recordings." A & M Records, Inc. v. Napster, Inc., Nos. 99-5183, 00-0074, 2000 WL 1009483, at *1 (N.D.Cal. July 26, 2000) (transcript of proceedings). The district court also noted that "it is pretty much acknowledged . . . by Napster that this is infringement." Id. We agree that plaintiffs have shown that Napster users infringe at least two of the copyright holders' exclusive rights: the rights of reproduction, § 106(1); and distribution, § 106(3). Napster users who upload file names to the search index for others to copy violate plaintiffs' distribution rights. Napster users who download files containing copyrighted music violate plaintiffs' reproduction rights.

Napster asserts an affirmative defense to the charge that its users directly infringe plaintiffs' copyrighted musical compositions and sound recordings.

B. Fair Use

Napster contends that its users do not directly infringe plaintiffs' copyrights because the users are engaged in fair use of the material. See 17 U.S.C. § 107 ("[T]he fair use of a copyrighted work . . . is not an infringement of copyright."). Napster identifies three specific alleged fair uses: sampling, where users make temporary copies of a work before purchasing; space-shifting, where users access a sound recording through the Napster system that they already own in audio CD format; and permissive distribution of recordings by both new and established artists.

The district court considered factors listed in 17 U.S.C. § 107, which guide a court's fair use determination. These factors are: (1) the purpose and character of the use; (2) the nature of the copyrighted work; (3) the "amount and substantiality of the portion used" in relation to the work as a whole; and (4) the effect of the use upon the potential market for the work or the value of the work. See 17 U.S.C. § 107. The district court first conducted a general analysis of Napster system uses under § 107, and then applied its reasoning to the alleged fair uses identified by Napster. The district court concluded that Napster users are not fair users.[3] [1015] We agree. We first address the court's overall fair use analysis.

1. Purpose and Character of the Use

This factor focuses on whether the new work merely replaces the object of the original creation or instead adds a further purpose or different character. In other words, this factor asks "whether and to what extent the new work is `transformative.'" See Campbell v. Acuff-Rose Music, Inc., 510 U.S. 569, 579, 114 S.Ct. 1164, 127 L.Ed.2d 500 (1994).

The district court first concluded that downloading MP3 files does not transform the copyrighted work. Napster, 114 F.Supp.2d at 912. This conclusion is supportable. Courts have been reluctant to find fair use when an original work is merely retransmitted in a different medium. See, e.g., Infinity Broadcast Corp. v. Kirkwood, 150 F.3d 104, 108 (2d Cir.1998) (concluding that retransmission of radio broadcast over telephone lines is not transformative); UMG Recordings, Inc. v. MP3.com, Inc., 92 F.Supp.2d 349, 351 (S.D.N.Y.) (finding that reproduction of audio CD into MP3 format does not "transform" the work), certification denied, 2000 WL 710056 (S.D.N.Y. June 1, 2000) ("Defendant's copyright infringement was clear, and the mere fact that it was clothed in the exotic webbing of the Internet does not disguise its illegality.").

This "purpose and character" element also requires the district court to determine whether the allegedly infringing use is commercial or noncommercial. See Campbell, 510 U.S. at 584-85, 114 S.Ct. 1164. A commercial use weighs against a finding of fair use but is not conclusive on the issue. Id. The district court determined that Napster users engage in commercial use of the copyrighted materials largely because (1) "a host user sending a file cannot be said to engage in a personal use when distributing that file to an anonymous requester" and (2) "Napster users get for free something they would ordinarily have to buy." Napster, 114 F.Supp.2d at 912. The district court's findings are not clearly erroneous.

Direct economic benefit is not required to demonstrate a commercial use. Rather, repeated and exploitative copying of copyrighted works, even if the copies are not offered for sale, may constitute a commercial use. See Worldwide Church of God v. Philadelphia Church of God, 227 F.3d 1110, 1118 (9th Cir.2000) (stating that church that copied religious text for its members "unquestionably profit[ed]" from the unauthorized "distribution and use of [the text] without having to account to the copyright holder"); American Geophysical Union v. Texaco, Inc., 60 F.3d 913, 922 (2d Cir.1994) (finding that researchers at for-profit laboratory gained indirect economic advantage by photocopying copyrighted scholarly articles). In the record before us, commercial use is demonstrated by a showing that repeated and exploitative unauthorized copies of copyrighted works were made to save the expense of purchasing authorized copies. See Worldwide Church, 227 F.3d at 1117-18; Sega Enters. Ltd. v. MAPHIA, 857 F.Supp. 679, 687 (N.D.Cal.1994) (finding commercial use when individuals downloaded copies of video games "to avoid having to buy video game cartridges"); see also American Geophysical, 60 F.3d at 922. Plaintiffs made such a showing before the district court.[4]

We also note that the definition of a financially motivated transaction for the purposes of criminal copyright actions includes trading infringing copies of a work for other items, "including the receipt of other copyrighted works." See No Electronic Theft Act ("NET Act"), Pub.L. No. 105-147, 18 U.S.C. § 101 (defining "Financial Gain").

[1016] 2. The Nature of the Use

Works that are creative in nature are "closer to the core of intended copyright protection" than are more fact-based works. See Campbell, 510 U.S. at 586, 114 S.Ct. 1164. The district court determined that plaintiffs' "copyrighted musical compositions and sound recordings are creative in nature . . . which cuts against a finding of fair use under the second factor." Napster, 114 F.Supp.2d at 913. We find no error in the district court's conclusion.

3. The Portion Used

"While `wholesale copying does not preclude fair use per se,' copying an entire work `militates against a finding of fair use.'" Worldwide Church, 227 F.3d at 1118 (quoting Hustler Magazine, Inc. v. Moral Majority, Inc., 796 F.2d 1148, 1155 (9th Cir.1986)). The district court determined that Napster users engage in "wholesale copying" of copyrighted work because file transfer necessarily "involves copying the entirety of the copyrighted work." Napster, 114 F.Supp.2d at 913. We agree. We note, however, that under certain circumstances, a court will conclude that a use is fair even when the protected work is copied in its entirety. See, e.g., Sony Corp. v. Universal City Studios, Inc., 464 U.S. 417, 449-50, 104 S.Ct. 774, 78 L.Ed.2d 574 (1984) (acknowledging that fair use of time-shifting necessarily involved making a full copy of a protected work).

4. Effect of Use on Market

"Fair use, when properly applied, is limited to copying by others which does not materially impair the marketability of the work which is copied." Harper & Row Publishers, Inc. v. Nation Enters., 471 U.S. 539, 566-67, 105 S.Ct. 2218, 85 L.Ed.2d 588 (1985). "[T]he importance of this [fourth] factor will vary, not only with the amount of harm, but also with the relative strength of the showing on the other factors." Campbell, 510 U.S. at 591 n. 21, 114 S.Ct. 1164. The proof required to demonstrate present or future market harm varies with the purpose and character of the use:

A challenge to a noncommercial use of a copyrighted work requires proof either that the particular use is harmful, or that if it should become widespread, it would adversely affect the potential market for the copyrighted work. . . . If the intended use is for commercial gain, that likelihood [of market harm] may be presumed. But if it is for a noncommercial purpose, the likelihood must be demonstrated.

Sony, 464 U.S. at 451, 104 S.Ct. 774 (emphases added).

Addressing this factor, the district court concluded that Napster harms the market in "at least" two ways: it reduces audio CD sales among college students and it "raises barriers to plaintiffs' entry into the market for the digital downloading of music." Napster, 114 F.Supp.2d at 913. The district court relied on evidence plaintiffs submitted to show that Napster use harms the market for their copyrighted musical compositions and sound recordings. In a separate memorandum and order regarding the parties' objections to the expert reports, the district court examined each report, finding some more appropriate and probative than others. A & M Records, Inc. v. Napster, Inc., Nos. 99-5183 & 00-0074, 2000 WL 1170106 (N.D.Cal. August 10, 2000). Notably, plaintiffs' expert, Dr. E. Deborah Jay, conducted a survey (the "Jay Report") using a random sample of college and university students to track their reasons for using Napster and the impact Napster had on their music purchases. Id. at *2. The court recognized that the Jay Report focused on just one segment of the Napster user population and found "evidence of lost sales attributable to college use to be probative of irreparable harm for purposes of the preliminary injunction motion." Id. at *3.

Plaintiffs also offered a study conducted by Michael Fine, Chief Executive Officer of Soundscan, (the "Fine Report") to determine the effect of online sharing of MP3 [1017] files in order to show irreparable harm. Fine found that online file sharing had resulted in a loss of "album" sales within college markets. After reviewing defendant's objections to the Fine Report and expressing some concerns regarding the methodology and findings, the district court refused to exclude the Fine Report insofar as plaintiffs offered it to show irreparable harm. Id. at *6.

Plaintiffs' expert Dr. David J. Teece studied several issues ("Teece Report"), including whether plaintiffs had suffered or were likely to suffer harm in their existing and planned businesses due to Napster use. Id. Napster objected that the report had not undergone peer review. The district court noted that such reports generally are not subject to such scrutiny and overruled defendant's objections. Id.

As for defendant's experts, plaintiffs objected to the report of Dr. Peter S. Fader, in which the expert concluded that Napster is beneficial to the music industry because MP3 music file-sharing stimulates more audio CD sales than it displaces. Id. at *7. The district court found problems in Dr. Fader's minimal role in overseeing the administration of the survey and the lack of objective data in his report. The court decided the generality of the report rendered it "of dubious reliability and value." The court did not exclude the report, however, but chose "not to rely on Fader's findings in determining the issues of fair use and irreparable harm." Id. at *8.

The district court cited both the Jay and Fine Reports in support of its finding that Napster use harms the market for plaintiffs' copyrighted musical compositions and sound recordings by reducing CD sales among college students. The district court cited the Teece Report to show the harm Napster use caused in raising barriers to plaintiffs' entry into the market for digital downloading of music. Napster, 114 F.Supp.2d at 910. The district court's careful consideration of defendant's objections to these reports and decision to rely on the reports for specific issues demonstrates a proper exercise of discretion in addition to a correct application of the fair use doctrine. Defendant has failed to show any basis for disturbing the district court's findings.

We, therefore, conclude that the district court made sound findings related to Napster's deleterious effect on the present and future digital download market. Moreover, lack of harm to an established market cannot deprive the copyright holder of the right to develop alternative markets for the works. See L.A. Times v. Free Republic, 54 U.S.P.Q.2d 1453, 1469-71 (C.D.Cal.2000) (stating that online market for plaintiff newspapers' articles was harmed because plaintiffs demonstrated that "[defendants] are attempting to exploit the market for viewing their articles online"); see also UMG Recordings, 92 F.Supp.2d at 352 ("Any allegedly positive impact of defendant's activities on plaintiffs' prior market in no way frees defendant to usurp a further market that directly derives from reproduction of the plaintiffs' copyrighted works."). Here, similar to L.A. Times and UMG Recordings, the record supports the district court's finding that the "record company plaintiffs have already expended considerable funds and effort to commence Internet sales and licensing for digital downloads." 114 F.Supp.2d at 915. Having digital downloads available for free on the Napster system necessarily harms the copyright holders' attempts to charge for the same downloads.

Judge Patel did not abuse her discretion in reaching the above fair use conclusions, nor were the findings of fact with respect to fair use considerations clearly erroneous. We next address Napster's identified uses of sampling and space-shifting.

5. Identified Uses

Napster maintains that its identified uses of sampling and space-shifting were wrongly excluded as fair uses by the district court.

[1018] a. Sampling

Napster contends that its users download MP3 files to "sample" the music in order to decide whether to purchase the recording. Napster argues that the district court: (1) erred in concluding that sampling is a commercial use because it conflated a noncommercial use with a personal use; (2) erred in determining that sampling adversely affects the market for plaintiffs' copyrighted music, a requirement if the use is noncommercial; and (3) erroneously concluded that sampling is not a fair use because it determined that samplers may also engage in other infringing activity.

The district court determined that sampling remains a commercial use even if some users eventually purchase the music. We find no error in the district court's determination. Plaintiffs have established that they are likely to succeed in proving that even authorized temporary downloading of individual songs for sampling purposes is commercial in nature. See Napster, 114 F.Supp.2d at 913. The record supports a finding that free promotional downloads are highly regulated by the record company plaintiffs and that the companies collect royalties for song samples available on retail Internet sites. Id. Evidence relied on by the district court demonstrates that the free downloads provided by the record companies consist of thirty-to-sixty second samples or are full songs programmed to "time out," that is, exist only for a short time on the downloader's computer. Id. at 913-14. In comparison, Napster users download a full, free and permanent copy of the recording. Id. at 914-15. The determination by the district court as to the commercial purpose and character of sampling is not clearly erroneous.

The district court further found that both the market for audio CDs and market for online distribution are adversely affected by Napster's service. As stated in our discussion of the district court's general fair use analysis: the court did not abuse its discretion when it found that, overall, Napster has an adverse impact on the audio CD and digital download markets. Contrary to Napster's assertion that the district court failed to specifically address the market impact of sampling, the district court determined that "[e]ven if the type of sampling supposedly done on Napster were a non-commercial use, plaintiffs have demonstrated a substantial likelihood that it would adversely affect the potential market for their copyrighted works if it became widespread." Napster, 114 F.Supp.2d at 914. The record supports the district court's preliminary determinations that: (1) the more music that sampling users download, the less likely they are to eventually purchase the recordings on audio CD; and (2) even if the audio CD market is not harmed, Napster has adverse effects on the developing digital download market.

Napster further argues that the district court erred in rejecting its evidence that the users' downloading of "samples" increases or tends to increase audio CD sales. The district court, however, correctly noted that "any potential enhancement of plaintiffs' sales . . . would not tip the fair use analysis conclusively in favor of defendant." Id. at 914. We agree that increased sales of copyrighted material attributable to unauthorized use should not deprive the copyright holder of the right to license the material. See Campbell, 510 U.S. at 591 n. 21, 114 S.Ct. 1164 ("Even favorable evidence, without more, is no guarantee of fairness. Judge Leval gives the example of the film producer's appropriation of a composer's previously unknown song that turns the song into a commercial success; the boon to the song does not make the film's simple copying fair."); see also L.A. Times, 54 U.S.P.Q.2d at 1471-72. Nor does positive impact in one market, here the audio CD market, deprive the copyright holder of the right to develop identified alternative markets, here the digital download market. See id. at 1469-71.

[1019] We find no error in the district court's factual findings or abuse of discretion in the court's conclusion that plaintiffs will likely prevail in establishing that sampling does not constitute a fair use.

b. Space-Shifting

Napster also maintains that space-shifting is a fair use. Space-shifting occurs when a Napster user downloads MP3 music files in order to listen to music he already owns on audio CD. See id. at 915-16. Napster asserts that we have already held that space-shifting of musical compositions and sound recordings is a fair use. See Recording Indus. Ass'n of Am. v. Diamond Multimedia Sys., Inc., 180 F.3d 1072, 1079 (9th Cir.1999) ("Rio [a portable MP3 player] merely makes copies in order to render portable, or `space-shift,' those files that already reside on a user's hard drive. . . . Such copying is a paradigmatic noncommercial personal use."). See also generally Sony, 464 U.S. at 423, 104 S.Ct. 774 (holding that "time-shifting," where a video tape recorder owner records a television show for later viewing, is a fair use).

We conclude that the district court did not err when it refused to apply the "shifting" analyses of Sony and Diamond. Both Diamond and Sony are inapposite because the methods of shifting in these cases did not also simultaneously involve distribution of the copyrighted material to the general public; the time or space-shifting of copyrighted material exposed the material only to the original user. In Diamond, for example, the copyrighted music was transferred from the user's computer hard drive to the user's portable MP3 player. So too Sony, where "the majority of VCR purchasers . . . did not distribute taped television broadcasts, but merely enjoyed them at home." Napster, 114 F.Supp.2d at 913. Conversely, it is obvious that once a user lists a copy of music he already owns on the Napster system in order to access the music from another location, the song becomes "available to millions of other individuals," not just the original CD owner. See UMG Recordings, 92 F.Supp.2d at 351-52 (finding space-shifting of MP3 files not a fair use even when previous ownership is demonstrated before a download is allowed); cf. Religious Tech. Ctr. v. Lerma, No. 95-1107A, 1996 WL 633131, at *6 (E.D.Va. Oct.4, 1996) (suggesting that storing copyrighted material on computer disk for later review is not a fair use).

c. Other Uses

Permissive reproduction by either independent or established artists is the final fair use claim made by Napster. The district court noted that plaintiffs did not seek to enjoin this and any other noninfringing use of the Napster system, including: chat rooms, message boards and Napster's New Artist Program. Napster, 114 F.Supp.2d at 917. Plaintiffs do not challenge these uses on appeal.

We find no error in the district court's determination that plaintiffs will likely succeed in establishing that Napster users do not have a fair use defense. Accordingly, we next address whether Napster is secondarily liable for the direct infringement under two doctrines of copyright law: contributory copyright infringement and vicarious copyright infringement.

IV

We first address plaintiffs' claim that Napster is liable for contributory copyright infringement. Traditionally, "one who, with knowledge of the infringing activity, induces, causes or materially contributes to the infringing conduct of another, may be held liable as a `contributory' infringer." Gershwin Publ'g Corp. v. Columbia Artists Mgmt., Inc., 443 F.2d 1159, 1162 (2d Cir.1971); see also Fonovisa, Inc. v. Cherry Auction, Inc., 76 F.3d 259, 264 (9th Cir.1996). Put differently, liability exists if the defendant engages in "personal conduct that encourages or assists the infringement." Matthew Bender & Co. v. West Publ'g Co., 158 F.3d 693, 706 (2d Cir.1998).

[1020] The district court determined that plaintiffs in all likelihood would establish Napster's liability as a contributory infringer. The district court did not err; Napster, by its conduct, knowingly encourages and assists the infringement of plaintiffs' copyrights.

A. Knowledge

Contributory liability requires that the secondary infringer "know or have reason to know" of direct infringement. Cable/Home Communication Corp. v. Network Prods., Inc., 902 F.2d 829, 845 & 846 n. 29 (11th Cir.1990); Religious Tech. Ctr. v. Netcom On-Line Communication Servs., Inc., 907 F.Supp. 1361, 1373-74 (N.D.Cal.1995) (framing issue as "whether Netcom knew or should have known of" the infringing activities). The district court found that Napster had both actual and constructive knowledge that its users exchanged copyrighted music. The district court also concluded that the law does not require knowledge of "specific acts of infringement" and rejected Napster's contention that because the company cannot distinguish infringing from noninfringing files, it does not "know" of the direct infringement. 114 F.Supp.2d at 917.

It is apparent from the record that Napster has knowledge, both actual and constructive,[5] of direct infringement. Napster claims that it is nevertheless protected from contributory liability by the teaching of Sony Corp. v. Universal City Studios, Inc., 464 U.S. 417, 104 S.Ct. 774, 78 L.Ed.2d 574 (1984). We disagree. We observe that Napster's actual, specific knowledge of direct infringement renders Sony's holding of limited assistance to Napster. We are compelled to make a clear distinction between the architecture of the Napster system and Napster's conduct in relation to the operational capacity of the system.

The Sony Court refused to hold the manufacturer and retailers of video tape recorders liable for contributory infringement despite evidence that such machines could be and were used to infringe plaintiffs' copyrighted television shows. Sony stated that if liability "is to be imposed on petitioners in this case, it must rest on the fact that they have sold equipment with constructive knowledge of the fact that their customers may use that equipment to make unauthorized copies of copyrighted material." Id. at 439, 104 S.Ct. 774 (emphasis added). The Sony Court declined to impute the requisite level of knowledge where the defendants made and sold equipment capable of both infringing and "substantial noninfringing uses." Id. at 442 (adopting a modified "staple article of commerce" doctrine from patent law). See also Universal City Studios, Inc. v. Sony Corp., 480 F.Supp. 429, 459 (C.D.Cal. 1979) ("This court agrees with defendants that their knowledge was insufficient to make them contributory infringers."), rev'd, 659 F.2d 963 (9th Cir.1981), rev'd, 464 U.S. 417, 104 S.Ct. 774, 78 L.Ed.2d 574 (1984); Alfred C. Yen, Internet Service Provider Liability for Subscriber Copyright Infringement, Enterprise Liability, and the First Amendment, 88 Geo. L.J. 1833, 1874 & 1893 n.210 (2000) (suggesting that, after Sony, most Internet service providers lack "the requisite level of knowledge" for the imposition of contributory liability).

We are bound to follow Sony, and will not impute the requisite level of knowledge to Napster merely because [1021] peer-to-peer file sharing technology may be used to infringe plaintiffs' copyrights. See 464 U.S. at 436, 104 S.Ct. 774 (rejecting argument that merely supplying the "`means' to accomplish an infringing activity" leads to imposition of liability). We depart from the reasoning of the district court that Napster failed to demonstrate that its system is capable of commercially significant noninfringing uses. See Napster, 114 F.Supp.2d at 916, 917-18. The district court improperly confined the use analysis to current uses, ignoring the system's capabilities. See generally Sony, 464 U.S. at 442-43, 104 S.Ct. 774 (framing inquiry as whether the video tape recorder is "capable of commercially significant noninfringing uses") (emphasis added). Consequently, the district court placed undue weight on the proportion of current infringing use as compared to current and future noninfringing use. See generally Vault Corp. v. Quaid Software Ltd., 847 F.2d 255, 264-67 (5th Cir.1988) (single noninfringing use implicated Sony). Nonetheless, whether we might arrive at a different result is not the issue here. See Sports Form, Inc. v. United Press Int'l, Inc., 686 F.2d 750, 752 (9th Cir.1982). The instant appeal occurs at an early point in the proceedings and "the fully developed factual record may be materially different from that initially before the district court. . . ." Id. at 753. Regardless of the number of Napster's infringing versus noninfringing uses, the evidentiary record here supported the district court's finding that plaintiffs would likely prevail in establishing that Napster knew or had reason to know of its users' infringement of plaintiffs' copyrights.

This analysis is similar to that of Religious Technology Center v. Netcom On-Line Communication Services, Inc., which suggests that in an online context, evidence of actual knowledge of specific acts of infringement is required to hold a computer system operator liable for contributory copyright infringement. 907 F.Supp. at 1371. Netcom considered the potential contributory copyright liability of a computer bulletin board operator whose system supported the posting of infringing material. Id. at 1374. The court, in denying Netcom's motion for summary judgment of noninfringement and plaintiff's motion for judgment on the pleadings, found that a disputed issue of fact existed as to whether the operator had sufficient knowledge of infringing activity. Id. at 1374-75.

The court determined that for the operator to have sufficient knowledge, the copyright holder must "provide the necessary documentation to show there is likely infringement." 907 F.Supp. at 1374; cf. Cubby, Inc. v. CompuServe, Inc., 776 F.Supp. 135, 141 (S.D.N.Y.1991) (recognizing that online service provider does not and cannot examine every hyperlink for potentially defamatory material). If such documentation was provided, the court reasoned that Netcom would be liable for contributory infringement because its failure to remove the material "and thereby stop an infringing copy from being distributed worldwide constitutes substantial participation" in distribution of copyrighted material. Id.

We agree that if a computer system operator learns of specific infringing material available on his system and fails to purge such material from the system, the operator knows of and contributes to direct infringement. See Netcom, 907 F.Supp. at 1374. Conversely, absent any specific information which identifies infringing activity, a computer system operator cannot be liable for contributory infringement merely because the structure of the system allows for the exchange of copyrighted material. See Sony, 464 U.S. at 436, 442-43, 104 S.Ct. 774. To enjoin simply because a computer network allows for infringing use would, in our opinion, violate Sony and potentially restrict activity unrelated to infringing use.

We nevertheless conclude that sufficient knowledge exists to impose contributory liability when linked to demonstrated infringing use of the Napster system. See Napster, 114 F.Supp.2d at 919 ("Religious [1022] Technology Center would not mandate a determination that Napster, Inc. lacks the knowledge requisite to contributory infringement."). The record supports the district court's finding that Napster has actual knowledge that specific infringing material is available using its system, that it could block access to the system by suppliers of the infringing material, and that it failed to remove the material. See Napster, 114 F.Supp.2d at 918, 920-21.[6]

B. Material Contribution

Under the facts as found by the district court, Napster materially contributes to the infringing activity. Relying on Fonovisa, the district court concluded that "[w]ithout the support services defendant provides, Napster users could not find and download the music they want with the ease of which defendant boasts." Napster, 114 F.Supp.2d at 919-20 ("Napster is an integrated service designed to enable users to locate and download MP3 music files."). We agree that Napster provides "the site and facilities" for direct infringement. See Fonovisa, 76 F.3d at 264; cf. Netcom, 907 F.Supp. at 1372 ("Netcom will be liable for contributory infringement since its failure to cancel [a user's] infringing message and thereby stop an infringing copy from being distributed worldwide constitutes substantial participation."). The district court correctly applied the reasoning in Fonovisa, and properly found that Napster materially contributes to direct infringement.

We affirm the district court's conclusion that plaintiffs have demonstrated a likelihood of success on the merits of the contributory copyright infringement claim. We will address the scope of the injunction in part VIII of this opinion.

V

We turn to the question whether Napster engages in vicarious copyright infringement. Vicarious copyright liability is an "outgrowth" of respondeat superior. Fonovisa, 76 F.3d at 262. In the context of copyright law, vicarious liability extends beyond an employer/employee relationship to cases in which a defendant "has the right and ability to supervise the infringing activity and also has a direct financial interest in such activities." Id. (quoting Gershwin, 443 F.2d at 1162); see also Polygram Int'l Publ'g, Inc. v. Nevada/TIG, Inc., 855 F.Supp. 1314, 1325-26 (D.Mass.1994) (describing vicarious liability as a form of risk allocation).

Before moving into this discussion, we note that Sony's "staple article of commerce" analysis has no application to Napster's potential liability for vicarious copyright infringement. See Sony, 464 U.S. at 434-435, 104 S.Ct. 774; see generally 3 Melville B. Nimmer & David Nimmer, Nimmer On Copyright §§ 12.04[A][2] & [A][2][b] (2000) (confining Sony to contributory infringement analysis: "Contributory infringement itself is of two types — personal conduct that forms part of or furthers the infringement and contribution of machinery or goods that provide the means to infringe"). 617 PLI/Pat 455, 528 (Sept. 2, 2000) (indicating that the "staple article of commerce" doctrine "provides a defense only to contributory infringement, not to vicarious infringement"). The issues of Sony's liability under the "doctrines of `direct infringement' and `vicarious liability'" were not before the Supreme Court, although the Court recognized that the "lines between direct infringement, contributory infringement, and vicarious liability are not clearly drawn." Id. at 435 n. 17, 104 S.Ct. 774. Consequently, when the Sony Court used the term "vicarious [1023] liability," it did so broadly and outside of a technical analysis of the doctrine of vicarious copyright infringement. Id. at 435 ("[V]icarious liability is imposed in virtually all areas of the law, and the concept of contributory infringement is merely a species of the broader problem of identifying the circumstances in which it is just to hold one individual accountable for the actions of another."); see also Black's Law Dictionary 927 (7th ed. 1999) (defining "vicarious liability" in a manner similar to the definition used in Sony).

A. Financial Benefit

The district court determined that plaintiffs had demonstrated they would likely succeed in establishing that Napster has a direct financial interest in the infringing activity. Napster, 114 F.Supp.2d at 921-22. We agree. Financial benefit exists where the availability of infringing material "acts as a `draw' for customers." Fonovisa, 76 F.3d at 263-64 (stating that financial benefit may be shown "where infringing performances enhance the attractiveness of a venue"). Ample evidence supports the district court's finding that Napster's future revenue is directly dependent upon "increases in userbase." More users register with the Napster system as the "quality and quantity of available music increases." 114 F.Supp.2d at 902. We conclude that the district court did not err in determining that Napster financially benefits from the availability of protected works on its system.

B. Supervision

The district court determined that Napster has the right and ability to supervise its users' conduct. Napster, 114 F.Supp.2d at 920-21 (finding that Napster's representations to the court regarding "its improved methods of blocking users about whom rights holders complain . . . is tantamount to an admission that defendant can, and sometimes does, police its service"). We agree in part.

The ability to block infringers' access to a particular environment for any reason whatsoever is evidence of the right and ability to supervise. See Fonovisa, 76 F.3d at 262 ("Cherry Auction had the right to terminate vendors for any reason whatsoever and through that right had the ability to control the activities of vendors on the premises."); cf. Netcom, 907 F.Supp. at 1375-76 (indicating that plaintiff raised a genuine issue of fact regarding ability to supervise by presenting evidence that an electronic bulletin board service can suspend subscriber's accounts). Here, plaintiffs have demonstrated that Napster retains the right to control access to its system. Napster has an express reservation of rights policy, stating on its website that it expressly reserves the "right to refuse service and terminate accounts in [its] discretion, including, but not limited to, if Napster believes that user conduct violates applicable law . . . or for any reason in Napster's sole discretion, with or without cause."

To escape imposition of vicarious liability, the reserved right to police must be exercised to its fullest extent. Turning a blind eye to detectable acts of infringement for the sake of profit gives rise to liability. See, e.g., Fonovisa, 76 F.3d at 261 ("There is no dispute for the purposes of this appeal that Cherry Auction and its operators were aware that vendors in their swap meets were selling counterfeit recordings."); see also Gershwin, 443 F.2d at 1161-62 (citing Shapiro, Bernstein & Co. v. H.L. Green Co., 316 F.2d 304 (2d Cir.1963), for the proposition that "failure to police the conduct of the primary infringer" leads to imposition of vicarious liability for copyright infringement).

The district court correctly determined that Napster had the right and ability to police its system and failed to exercise that right to prevent the exchange of copyrighted material. The district court, however, failed to recognize that the boundaries of the premises that Napster "controls and patrols" are limited. See, e.g., Fonovisa, 76 F.3d at 262-63 (in addition to having the right to exclude vendors, defendant "controlled and patrolled" the premises); see also Polygram, 855 F.Supp. at 1328-29 (in addition to having the contractual right to remove exhibitors, trade show operator reserved the right to police during the show and had its "employees walk the [1024] aisles to ensure `rules compliance'"). Put differently, Napster's reserved "right and ability" to police is cabined by the system's current architecture. As shown by the record, the Napster system does not "read" the content of indexed files, other than to check that they are in the proper MP3 format.

Napster, however, has the ability to locate infringing material listed on its search indices, and the right to terminate users' access to the system. The file name indices, therefore, are within the "premises" that Napster has the ability to police. We recognize that the files are user-named and may not match copyrighted material exactly (for example, the artist or song could be spelled wrong). For Napster to function effectively, however, file names must reasonably or roughly correspond to the material contained in the files, otherwise no user could ever locate any desired music. As a practical matter, Napster, its users and the record company plaintiffs have equal access to infringing material by employing Napster's "search function."

Our review of the record requires us to accept the district court's conclusion that plaintiffs have demonstrated a likelihood of success on the merits of the vicarious copyright infringement claim. Napster's failure to police the system's "premises," combined with a showing that Napster financially benefits from the continuing availability of infringing files on its system, leads to the imposition of vicarious liability. We address the scope of the injunction in part VIII of this opinion.

VI

We next address whether Napster has asserted defenses which would preclude the entry of a preliminary injunction.

Napster alleges that two statutes insulate it from liability. First, Napster asserts that its users engage in actions protected by § 1008 of the Audio Home Recording Act of 1992, 17 U.S.C. § 1008. Second, Napster argues that its liability for contributory and vicarious infringement is limited by the Digital Millennium Copyright Act, 17 U.S.C. § 512. We address the application of each statute in turn.

A. Audio Home Recording Act

The statute states in part:

No action may be brought under this title alleging infringement of copyright based on the manufacture, importation, or distribution of a digital audio recording device, a digital audio recording medium, an analog recording device, or an analog recording medium, or based on the noncommercial use by a consumer of such a device or medium for making digital musical recordings or analog musical recordings.

17 U.S.C. § 1008 (emphases added). Napster contends that MP3 file exchange is the type of "noncommercial use" protected from infringement actions by the statute. Napster asserts it cannot be secondarily liable for users' nonactionable exchange of copyrighted musical recordings.

The district court rejected Napster's argument, stating that the Audio Home Recording Act is "irrelevant" to the action because: (1) plaintiffs did not bring claims under the Audio Home Recording Act; and (2) the Audio Home Recording Act does not cover the downloading of MP3 files. Napster, 114 F.Supp.2d at 916 n. 19.

We agree with the district court that the Audio Home Recording Act does not cover the downloading of MP3 files to computer hard drives. First, "[u]nder the plain meaning of the Act's definition of digital audio recording devices, computers (and their hard drives) are not digital audio recording devices because their `primary purpose' is not to make digital audio copied recordings." Recording Indus. Ass'n of Am. v. Diamond Multimedia Sys., Inc., 180 F.3d 1072, 1078 (9th Cir.1999). Second, notwithstanding Napster's claim that computers are "digital audio recording devices," computers do not make "digital music recordings" as defined by the Audio Home Recording Act. Id. at 1077 (citing S. Rep. 102-294) ("There are simply no [1025] grounds in either the plain language of the definition or in the legislative history for interpreting the term `digital musical recording' to include songs fixed on computer hard drives.").

B. Digital Millennium Copyright Act

Napster also interposes a statutory limitation on liability by asserting the protections of the "safe harbor" from copyright infringement suits for "Internet service providers" contained in the Digital Millennium Copyright Act, 17 U.S.C. § 512. See Napster, 114 F.Supp.2d at 919 n. 24. The district court did not give this statutory limitation any weight favoring a denial of temporary injunctive relief. The court concluded that Napster "has failed to persuade this court that subsection 512(d) shelters contributory infringers." Id.

We need not accept a blanket conclusion that § 512 of the Digital Millennium Copyright Act will never protect secondary infringers. See S. Rep. 105-190, at 40 (1998) ("The limitations in subsections (a) through (d) protect qualifying service providers from liability for all monetary relief for direct, vicarious, and contributory infringement."), reprinted in Melville B. Nimmer & David Nimmer, Nimmer on Copyright: Congressional Committee Reports on the Digital Millennium Copyright Act and Concurrent Amendments (2000); see also Charles S. Wright, Actual Versus Legal Control: Reading Vicarious Liability for Copyright Infringement Into the Digital Millennium Copyright Act of 1998, 75 Wash. L.Rev. 1005, 1028-31 (July 2000) ("[T]he committee reports leave no doubt that Congress intended to provide some relief from vicarious liability").

We do not agree that Napster's potential liability for contributory and vicarious infringement renders the Digital Millennium Copyright Act inapplicable per se. We instead recognize that this issue will be more fully developed at trial. At this stage of the litigation, plaintiffs raise serious questions regarding Napster's ability to obtain shelter under § 512, and plaintiffs also demonstrate that the balance of hardships tips in their favor. See Prudential Real Estate, 204 F.3d at 874; see also Micro Star v. Formgen, Inc. 154 F.3d 1107, 1109 (9th Cir.1998) ("A party seeking a preliminary injunction must show . . . `that serious questions going to the merits were raised and the balance of hardships tips sharply in its favor.'").

Plaintiffs have raised and continue to raise significant questions under this statute, including: (1) whether Napster is an Internet service provider as defined by 17 U.S.C. § 512(d); (2) whether copyright owners must give a service provider "official" notice of infringing activity in order for it to have knowledge or awareness of infringing activity on its system; and (3) whether Napster complies with § 512(i), which requires a service provider to timely establish a detailed copyright compliance policy. See A & M Records, Inc. v. Napster, Inc., No. 99-05183, 2000 WL 573136 (N.D.Cal. May 12, 2000) (denying summary judgment to Napster under a different subsection of the Digital Millennium Copyright Act, § 512(a)).

The district court considered ample evidence to support its determination that the balance of hardships tips in plaintiffs' favor:

Any destruction of Napster, Inc. by a preliminary injunction is speculative compared to the statistical evidence of massive, unauthorized downloading and uploading of plaintiffs' copyrighted works-as many as 10,000 files per second by defendant's own admission. See Kessler Dec. ¶ 29. The court has every reason to believe that, without a preliminary injunction, these numbers will mushroom as Napster users, and newcomers attracted by the publicity, scramble to obtain as much free music as possible before trial.

114 F.Supp.2d at 926.

VII

Napster contends that even if the district court's preliminary determinations that it is liable for facilitating copyright infringement are correct, the district court [1026] improperly rejected valid affirmative defenses of waiver, implied license and copyright misuse. We address the defenses in turn.

A. Waiver

"Waiver is the intentional relinquishment of a known right with knowledge of its existence and the intent to relinquish it." United States v. King Features Entm't, Inc., 843 F.2d 394, 399 (9th Cir.1988). In copyright, waiver or abandonment of copyright "occurs only if there is an intent by the copyright proprietor to surrender rights in his work." 4 Melville B. Nimmer & David Nimmer, Nimmer On Copyright ¶ 13.06 (2000); see also Micro Star v. Formgen, Inc., 154 F.3d 1107, 1114 (9th Cir.1998) (discussing abandonment).

Napster argues that the district court erred in not finding that plaintiffs knowingly provided consumers with technology designed to copy and distribute MP3 files over the Internet and, thus, waived any legal authority to exercise exclusive control over creation and distribution of MP3 files. The district court, however, was not convinced "that the record companies created the monster that is now devouring their intellectual property rights." Napster, 114 F.Supp.2d at 924. We find no error in the district court's finding that "in hastening the proliferation of MP3 files, plaintiffs did [nothing] more than seek partners for their commercial downloading ventures and develop music players for files they planned to sell over the Internet." Id.[7]

B. Implied License

Napster also argues that plaintiffs granted the company an implied license by encouraging MP3 file exchange over the Internet. Courts have found implied licenses only in "narrow" circumstances where one party "created a work at [the other's] request and handed it over, intending that [the other] copy and distribute it." SmithKline Beecham Consumer Healthcare, L.P. v. Watson Pharms., Inc., 211 F.3d 21, 25 (2d Cir.2000) (quoting Effects Assocs., Inc. v. Cohen, 908 F.2d 555, 558 (9th Cir.1990)), cert. denied, ___ U.S. ___, 121 S.Ct. 173, 148 L.Ed.2d 118 (2000). The district court observed that no evidence exists to support this defense: "indeed, the RIAA gave defendant express notice that it objected to the availability of its members' copyrighted music on Napster." Napster, 114 F.Supp.2d at 924-25. The record supports this conclusion.

C. Misuse

The defense of copyright misuse forbids a copyright holder from "secur[ing] an exclusive right or limited monopoly not granted by the Copyright Office." Lasercomb Am., Inc. v. Reynolds, 911 F.2d 970, 977-79 (4th Cir.1990), quoted in Practice Mgmt. Info. Corp. v. American Med. Ass'n, 121 F.3d 516, 520 (9th Cir.), amended by 133 F.3d 1140 (9th Cir.1997). Napster alleges that online distribution is not within the copyright monopoly. According to Napster, plaintiffs have colluded to "use their copyrights to extend their control to online distributions."

We find no error in the district court's preliminary rejection of this affirmative defense. The misuse defense prevents copyright holders from leveraging their limited monopoly to allow them control of areas outside the monopoly. See Lasercomb, 911 F.2d at 976-77; see also Religious [1027] Tech. Ctr. v. Lerma, No. 95-1107A, 1996 WL 633131, at *11 (E.D.Va. Oct.4, 1996) (listing circumstances which indicate improper leverage).[8] There is no evidence here that plaintiffs seek to control areas outside of their grant of monopoly. Rather, plaintiffs seek to control reproduction and distribution of their copyrighted works, exclusive rights of copyright holders. 17 U.S.C. § 106; see also, e.g., UMG Recordings, 92 F.Supp.2d at 351 ("A [copyright holder's] `exclusive' rights, derived from the Constitution and the Copyright Act, include the right, within broad limits, to curb the development of such a derivative market by refusing to license a copyrighted work or by doing so only on terms the copyright owner finds acceptable."). That the copyrighted works are transmitted in another medium-MP3 format rather than audio CD-has no bearing on our analysis. See id. at 351 (finding that reproduction of audio CD into MP3 format does not "transform" the work).

VIII

The district court correctly recognized that a preliminary injunction against Napster's participation in copyright infringement is not only warranted but required. We believe, however, that the scope of the injunction needs modification in light of our opinion. Specifically, we reiterate that contributory liability may potentially be imposed only to the extent that Napster: (1) receives reasonable knowledge of specific infringing files with copyrighted musical compositions and sound recordings; (2) knows or should know that such files are available on the Napster system; and (3) fails to act to prevent viral distribution of the works. See Netcom, 907 F.Supp. at 1374-75. The mere existence of the Napster system, absent actual notice and Napster's demonstrated failure to remove the offending material, is insufficient to impose contributory liability. See Sony, 464 U.S. at 442-43, 104 S.Ct. 774.

Conversely, Napster may be vicariously liable when it fails to affirmatively use its ability to patrol its system and preclude access to potentially infringing files listed in its search index. Napster has both the ability to use its search function to identify infringing musical recordings and the right to bar participation of users who engage in the transmission of infringing files.

The preliminary injunction which we stayed is overbroad because it places on Napster the entire burden of ensuring that no "copying, downloading, uploading, transmitting, or distributing" of plaintiffs' works occur on the system. As stated, we place the burden on plaintiffs to provide notice to Napster of copyrighted works and files containing such works available on the Napster system before Napster has the duty to disable access to the offending content. Napster, however, also bears the burden of policing the system within the limits of the system. Here, we recognize that this is not an exact science in that the files are user named. In crafting the injunction on remand, the district court should recognize that Napster's system does not currently appear to allow Napster access to users' MP3 files.

Based on our decision to remand, Napster's additional arguments on appeal [1028] going to the scope of the injunction need not be addressed. We, however, briefly address Napster's First Amendment argument so that it is not reasserted on remand. Napster contends that the present injunction violates the First Amendment because it is broader than necessary. The company asserts two distinct free speech rights: (1) its right to publish a "directory" (here, the search index) and (2) its users' right to exchange information. We note that First Amendment concerns in copyright are allayed by the presence of the fair use doctrine. See 17 U.S.C. § 107; see generally Nihon Keizai Shimbun v. Comline Business Data, Inc., 166 F.3d 65, 74 (2d Cir.1999); Netcom, 923 F.Supp. at 1258 (stating that the Copyright Act balances First Amendment concerns with the rights of copyright holders). There was a preliminary determination here that Napster users are not fair users. Uses of copyrighted material that are not fair uses are rightfully enjoined. See Dr. Seuss Enters. v. Penguin Books USA, Inc., 109 F.3d 1394, 1403 (9th Cir.1997) (rejecting defendants' claim that injunction would constitute a prior restraint in violation of the First Amendment).

IX

We address Napster's remaining arguments: (1) that the court erred in setting a $5 million bond, and (2) that the district court should have imposed a constructive royalty payment structure in lieu of an injunction.

A. Bond

Napster argues that the $5 million bond is insufficient because the company's value is between $1.5 and $2 billion. We review objections to the amount of a bond for abuse of discretion. Walczak v. EPL Prolong, Inc., 198 F.3d 725 (9th Cir.1999).

We are reluctant to dramatically raise bond amounts on appeal. See GoTo.com, Inc. v. The Walt Disney Co., 202 F.3d 1199, 1211 (9th Cir.2000); see also Fed.R.Civ.P. 65(c). The district court considered competing evidence of Napster's value and the deleterious effect that any injunction would have upon the Napster system. We cannot say that Judge Patel abused her discretion when she fixed the penal sum required for the bond.

B. Royalties

Napster contends that the district court should have imposed a monetary penalty by way of a compulsory royalty in place of an injunction. We are asked to do what the district court refused.

Napster tells us that "where great public injury would be worked by an injunction, the courts might . . . award damages or a continuing royalty instead of an injunction in such special circumstances." Abend v. MCA, Inc., 863 F.2d 1465, 1479 (9th Cir.1988) (quoting 3 Melville B. Nimmer & David Nimmer, Nimmer On Copyright § 14.06[B] (1988)), aff'd, 495 U.S. 207, 110 S.Ct. 1750, 109 L.Ed.2d 184 (1990). We are at a total loss to find any "special circumstances" simply because this case requires us to apply well-established doctrines of copyright law to a new technology. Neither do we agree with Napster that an injunction would cause "great public injury." Further, we narrowly construe any suggestion that compulsory royalties are appropriate in this context because Congress has arguably limited the application of compulsory royalties to specific circumstances, none of which are present here. See 17 U.S.C. § 115.

The Copyright Act provides for various sanctions for infringers. See, e.g., 17 U.S.C. §§ 502 (injunctions); 504 (damages); and 506 (criminal penalties); see also 18 U.S.C. § 2319A (criminal penalties for the unauthorized fixation of and trafficking in sound recordings and music videos of live musical performances). These statutory sanctions represent a more than adequate legislative solution to the problem created by copyright infringement.

Imposing a compulsory royalty payment schedule would give Napster an "easy out" of this case. If such royalties were imposed, [1029] Napster would avoid penalties for any future violation of an injunction, statutory copyright damages and any possible criminal penalties for continuing infringement. The royalty structure would also grant Napster the luxury of either choosing to continue and pay royalties or shut down. On the other hand, the wronged parties would be forced to do business with a company that profits from the wrongful use of intellectual properties. Plaintiffs would lose the power to control their intellectual property: they could not make a business decision not to license their property to Napster, and, in the event they planned to do business with Napster, compulsory royalties would take away the copyright holders' ability to negotiate the terms of any contractual arrangement.

X

We affirm in part, reverse in part and remand.

We direct that the preliminary injunction fashioned by the district court prior to this appeal shall remain stayed until it is modified by the district court to conform to the requirements of this opinion. We order a partial remand of this case on the date of the filing of this opinion for the limited purpose of permitting the district court to proceed with the settlement and entry of the modified preliminary injunction.

Even though the preliminary injunction requires modification, appellees have substantially and primarily prevailed on appeal. Appellees shall recover their statutory costs on appeal. See Fed. R.App. P. 39(a)(4) ("[i]f a judgment is affirmed in part, reversed in part, modified, or vacated, costs are taxed only as the court orders.").

AFFIRMED IN PART, REVERSED IN PART AND REMANDED.

[1] "To download means to receive information, typically a file, from another computer to yours via your modem. . . . The opposite term is upload, which means to send a file to another computer." United States v. Mohrbacher, 182 F.3d 1041, 1048 (9th Cir.1999) (quoting Robin Williams, Jargon, An Informal Dictionary of Computer Terms 170-71 (1993)).

[2] Secondary liability for copyright infringement does not exist in the absence of direct infringement by a third party. Religious Tech. Ctr. v. Netcom On-Line Communication Servs., Inc., 907 F.Supp. 1361, 1371 (N.D.Cal. 1995) ("[T]here can be no contributory infringement by a defendant without direct infringement by another."). It follows that Napster does not facilitate infringement of the copyright laws in the absence of direct infringement by its users.

[3] Napster asserts that because plaintiffs seek injunctive relief, they have the burden of showing a likelihood that they would prevail against any affirmative defenses raised by Napster, including its fair use defense under 17 U.S.C. § 107. See Atari Games Corp. v. Nintendo, 975 F.2d 832, 837 (Fed.Cir.1992) (following Ninth Circuit law, and stating that plaintiff must show likelihood of success on prima facie copyright infringement case and likelihood that it would overcome copyright misuse defense); see also Dr. Seuss Enters. v. Penguin Books USA, 924 F.Supp. 1559, 1562 (S.D.Cal.1996) ("The plaintiff's burden of showing a likelihood of success on the merits includes the burden of showing a likelihood that it would prevail against any affirmative defenses raised by the defendant."), aff'd, 109 F.3d 1394 (9th Cir.1997); Religious Tech. Ctr. v. Netcom On-Line Communication Servs., 923 F.Supp. 1231, 1242 n. 12 (1995) (same); 2 William W. Schwarzer et al., California Practice Guide, Federal Civil Procedure Before Trial ¶ 13:47 (2000) (advising that when a preliminary injunction is sought "plaintiff must demonstrate a likelihood of prevailing on any affirmative defense as well as on plaintiff's case in chief"). But see Fair Use of Copyrighted Works, H.R. Rep. 102-836 n.3 (criticizing a Northern District of New York case in which "the district court erroneously held that where the copyright owner seeks a preliminary injunction, the copyright owner bears the burden of disproving the [fair use] defense"); see also 1 William F. Patry, Copyright Law & Practice, 725, 725 n.27 (1994) (citing cases placing burden on defendant at preliminary injunction stage).

The district court stated that "defendant bears the burden of proving. . . affirmative defenses." Napster, 114 F.Supp.2d at 912. Plaintiffs assert that the district court did not err in placing the burden on Napster. We conclude that even if plaintiffs bear the burden of establishing that they would likely prevail against Napster's affirmative defenses at the preliminary injunction stage, the record supports the district court's conclusion that Napster users do not engage in fair use of the copyrighted materials.

[4] Napster counters that even if certain users engage in commercial use by downloading instead of purchasing the music, space-shifting and sampling are nevertheless non commercial in nature. We address this contention in our discussion of these specific uses, infra.

[5] The district court found actual knowledge because: (1) a document authored by Napster co-founder Sean Parker mentioned "the need to remain ignorant of users' real names and IP addresses `since they are exchanging pirated music'"; and (2) the Recording Industry Association of America ("RIAA") informed Napster of more than 12,000 infringing files, some of which are still available. 114 F.Supp.2d at 918. The district court found constructive knowledge because: (a) Napster executives have recording industry experience; (b) they have enforced intellectual property rights in other instances; (c) Napster executives have downloaded copyrighted songs from the system; and (d) they have promoted the site with "screen shots listing infringing files." Id. at 919.

[6] As stated by the district court:

Plaintiff[s] . . . demonstrate that defendant had actual notice of direct infringement because the RIAA informed it of more than 12,000 infringing files. See Creighton 12/3/99 Dec., Exh. D. Although Napster, Inc. purportedly terminated the users offering these files, the songs are still available using the Napster service, as are the copyrighted works which the record company plaintiffs identified in Schedules A and B of their complaint. See Creighton Supp. Dec. ¶¶ 3-4.

114 F.Supp.2d at 918.

[7] Napster additionally asserts that the district court improperly refused to allow additional discovery into affirmative defenses and also erroneously failed to hold an evidentiary hearing. The denial of an evidentiary hearing is reviewed for abuse of discretion, Kenneally v. Lungren, 967 F.2d 329, 335 (9th Cir.1992), as is the court's decision to deny further discovery. See Sablan v. Dep't of Finance, 856 F.2d 1317, 1321 (9th Cir.1988) (stating that decision to deny discovery will not be disturbed except upon a clear showing "that the denial of discovery results in actual and substantial prejudice"). We conclude that the court did not abuse its discretion in denying further discovery and refusing to conduct an evidentiary hearing.

[8] The district court correctly stated that "most of the cases" that recognize the affirmative defense of copyright misuse involve unduly restrictive licensing schemes. See Napster, 114 F.Supp.2d at 923; see also Lasercomb, 911 F.2d at 973 (stating that "a misuse of copyright defense is inherent in the law of copyright"). We have also suggested, however, that a unilateral refusal to license a copyright may constitute wrongful exclusionary conduct giving rise to a claim of misuse, but assume that the "desire to exclude others . . . is a presumptively valid business justification for any immediate harm to consumers." See Image Tech. Servs. v. Eastman Kodak Co., 125 F.3d 1195, 1218 (9th Cir.1997). But see Intergraph Corp. v. Intel Corp., 195 F.3d 1346, 1362 (Fed.Cir.1999) ("[M]arket power does not `impose on the intellectual property owner an obligation to license the use of that property to others.'") (quoting United States Dep't of Justice & Fed. Trade Comm'n, Antitrust Guidelines for the Licensing of Intellectual Property 4 (1995)).

6.5.5 Sony BMG Music Entertainment v. Tenenbaum 6.5.5 Sony BMG Music Entertainment v. Tenenbaum

This short note considers copyright statutory damages for music copying

100 U.S.P.Q.2d 1161
2011 Copr.L.Dec. P 30,134
660 F.3d 487

SONY BMG MUSIC ENTERTAINMENT, et al., Plaintiffs, Appellants/Cross–Appellees,
v.
Joel TENENBAUM, Defendant, Appellee/Cross–Appellant.

Nos. 10–1883
10–1947
10–2052.
United States Court of Appeals, First Circuit.
Heard April 4, 2011. Decided Sept. 16, 2011.

[489] Paul D. Clement, with whom Jeffrey S. Bucholtz, Erin E. Murphy, King & Spalding, LLP, Timothy M. Reynolds, Eve G. Burton, Holme, Roberts & Owen, LLP, Matthew J. Oppenheim, and Jennifer L. Pariser were on brief, for plaintiffs-appellants.

Jeffrey Clair, with whom Tony West, Assistant Attorney General, Carmen Ortiz, United States Attorney, and Scott R. McIntosh were on brief, for the United States as plaintiff-appellant.

Charles R. Nesson and Jason Harrow for defendant-appellee. Julie A. Ahrens, with whom Anthony T. Falzone, Stanford Law School Center for Internet & Society, Michael Barclay, Corynne McSherry, Electronic Frontier Foundation, Jason M. Schultz, Samuelson Law, Technology & Public Policy Clinic, were on brief for Electronic Frontier Foundation, amicus curiae.

Before LYNCH, Chief Judge, TORRUELLA and THOMPSON, Circuit Judges.

LYNCH, Chief Judge.

Plaintiffs, the recording companies Sony BMG Music Entertainment, Warner Brothers Records Inc., Arista Records LLC, Atlantic Recording Corporation, and UMG Recordings, Inc. (together, “Sony”), brought this action for statutory damages and injunctive relief under the Copyright Act, 17 U.S.C. § 101 et seq. Sony argued that the defendant, Joel Tenenbaum, willfully infringed the copyrights of thirty music recordings by using file-sharing software to download and distribute those recordings without authorization from the copyright owners.

The district court entered judgment against Tenenbaum as to liability. The jury found that Tenenbaum's infringement of the copyrights at issue was willful and awarded Sony statutory damages of $22,500 for each infringed recording, an award within the statutory range of $750 to $150,000 per infringement that Congress established for willful conduct. See 17 U.S.C. § 504(c).

Upon Tenenbaum's motion for a new trial or remittitur, the district court skipped over the question of remittitur and reached a constitutional issue. It reduced the damage award by a factor of ten, reasoning that the award was excessive in violation of Tenenbaum's due process rights. See Sony BMG Music Entm't v. Tenenbaum, 721 F.Supp.2d 85 (D.Mass.2010).

The parties have cross-appealed. Sony argues the district court erred, for a number of reasons, in reducing the jury's award of damages and seeks reinstatement of the full award. It defends the liability and willfulness determinations.

Tenenbaum challenges both liability and damages. He challenges the Copyright Act's constitutionality and the applicability of the Copyright Act and its statutory damages provision to his conduct. Tenenbaum also argues that the district court committed various errors that require a new trial, and that a further reduction of the damage award is required by the due process clause.

The United States, intervening to defend the constitutionality of the Copyright Act, argues that the district court erred in bypassing the question of common law remittitur to reach a constitutional issue.

We reject all of Tenenbaum's arguments and affirm the denial of Tenenbaum's motion for a new trial or remittitur based on claims of error as to the application of the Copyright Act and error as to the jury instructions. However, the court erred [490] when it bypassed Tenenbaum's remittitur arguments based on excessiveness of the statutory damages award and reached the constitutional due process issue. We agree with the United States that the doctrine of constitutional avoidance requires consideration of common law remittitur before consideration of Tenenbaum's due process challenge to the jury's award. We reverse the reduction in damages, reinstate the original award, and remand for consideration of the common law remittitur question. We comment that this case raises concerns about application of the Copyright Act which Congress may wish to examine.

I.

Background

A. District Court Proceedings

Sony brought this action against Tenenbaum in August 2007, seeking statutory damages and injunctive relief pursuant to the Copyright Act. Sony pursued copyright claims against Tenenbaum for only thirty copyrighted works, even though it presented evidence that Tenenbaum illegally downloaded and distributed thousands of copyrighted materials.

Sony's complaint elected to seek statutory, not actual damages, pursuant to 17 U.S.C. § 504(c). For each act of infringement, § 504(c) establishes an award range of $750 to $30,000 for non-willful infringements, and a range of $750 to $150,000 for willful infringements.

Tenenbaum filed several pre-trial motions, including a motion to dismiss Sony's complaint on the ground that the Copyright Act is unconstitutional.[1] After the United States intervened to defend the constitutionality of the Act, the district court rejected Tenenbaum's motion without prejudice to allow Tenenbaum to challenge the constitutionality of any award ultimately issued by the jury. The district court also considered and rejected a fair use defense put forth by Tenenbaum.

A five-day jury trial was held from July 27 to July 31, 2009. Following the conclusion of testimony, the district court partially granted Sony's motion for judgment as a matter of law, holding that Sony owned the thirty copyrights at issue and that Tenenbaum infringed those copyrights through his downloading and distribution activities. The court left to the jury the questions of (1) whether Tenenbaum's infringement was willful and (2) the amount of statutory damages to be awarded. In instructing the jury, the court informed it of the statutory range Congress had established for willful and non-willful infringements and articulated a non-exhaustive list of factors it could consider in determining the damage award.

The jury found that Tenenbaum had willfully infringed each of Sony's thirty copyrighted works. The jury returned a damage award, within the statutory range, of $22,500 per infringement, which yielded a total award of $675,000.

Tenenbaum filed a post-trial motion seeking a new trial on various grounds[2] or [491] a reduction of the jury's award. Tenenbaum argued that although the jury's award fell within the statutory range prescribed by Congress, (1) common law remittitur was both available to the court and appropriate in this case, and (2) the award was excessive such that it violated due process. The court rejected Tenenbaum's arguments for a new trial.

Regarding the size of the award, the court declined to decide the common law remittitur issue, based on its assumption that Sony would not agree to a reduction of the award and that remittitur would only necessitate a new trial on the issue of damages, and that even after a new trial the same issue of constitutional excessiveness would arise, so, in its view decision on the issue was inevitable. The court itself then found that the award violated due process, over objections that it utilized an impermissible standard, and reduced the award from $22,500 per infringement to $2,250 per infringement for a total award of $67,500.

B. Factual Background

We recite the underlying facts in the light most favorable to the jury's verdict. Analysis Grp., Inc. v. Cent. Fl. Invs., Inc., 629 F.3d 18, 20 (1st Cir.2010).

1. The Music Recording Industry and Peer–to–Peer Networks

Plaintiffs are several of the largest recording companies in the United States, and engage in discovering, developing, and marketing music recording artists and distributing the musical works those artists record. They hold exclusive rights to copy and distribute various music recordings under United States copyright law, including the thirty recordings at issue in this case, and their primary source of revenue is the sale of those recordings.

Plaintiffs only sell copies of their copyrighted recordings for profit. They never sell licenses to their copyrighted works that include rights to upload recordings to the internet for public consumption. The value of such a blanket license would be enormous, as the grant of such a license would deprive the companies of their source of income and profits and essentially drive them out of business.[3]

In the late 1990s, copyrighted music recordings, including those held by the plaintiffs, began to appear on file-sharing software called “peer-to-peer networks” without the authorization of the copyright holders.

Peer-to-peer networks enable individuals both to make digital files stored on their own computers available to other network users and to download such files from the computers of others. Files shared between users of these networks do not pass through a central computer, but are instead exchanged directly from one user's computer to another. Through the use of these peer-to-peer networks, the unauthorized and illegal downloading and distribution of copyrighted materials—especially music recordings—became commonplace. See Metro–Goldwyn–Mayer Studios Inc. v. Grokster, Ltd., 545 U.S. 913, 919–20, 923, 125 S.Ct. 2764, 162 L.Ed.2d 781 (2005) (describing operation of peer-to-peer networks and noting that [492] their advent has likely resulted in copyright infringement on a “staggering” scale). Because music recordings are loaded onto peer-to-peer networks in digital form, recordings downloaded from peer-to-peer networks are virtually indistinguishable from recordings purchased through lawful means, making enforcement difficult.

The proliferation of these networks from 1999 onward and the piracy they enable has had a significant negative impact on the recording industry. Between 1999 and 2008, the recording industry as a whole suffered a fifty percent drop in both sales and revenues, a figure plaintiffs attribute to the rise of illegal downloading. This reduction in revenues has, in turn, diminished recording companies' capacities to pursue, develop and market new recording artists. It also affected the companies' employees. The loss in revenues has resulted in a significant loss of industry jobs. Sony BMG Music Entertainment and Warner Music Group, for example, each have suffered a fifty percent reduction in workforce since 2000.

Shortly after peer-to-peer networks first appeared, plaintiffs acknowledged the threat they posed to their industry and initiated a broad campaign to address the illegal infringement of copyrighted materials. They started educating the public that downloading and distributing copyrighted songs over peer-to-peer networks constituted illegal copyright infringement. Plaintiffs also brought legal actions as part of their campaign, and initially targeted the proprietors of peer-to-peer networks, not the individuals who actually used those networks to illegally procure and distribute copyrighted materials. See, e.g., id. at 940, 125 S.Ct. 2764 (holding network may be held liable for copyright infringement undertaken by third party network users where network promotes such infringements even if network has other, legal uses). Although these litigation efforts succeeded at shutting down particular networks, individual infringers continued to engage in illegal conduct by finding new peer-to-peer networks through which to download copyrighted songs.

Consequently, record companies began to identify and pursue legal actions against individual infringers. The industry identified Internet Protocol (IP) addresses of users known to be engaged in a high volume of downloading and distributing copyrighted materials, and initiated lawsuits against those users. See Atl. Recording Corp. v. Heslep, No. 06–CV–132, 2007 WL 1435395 at *1–3 (N.D.Tex. May 16, 2007) (detailing recording industry's litigation efforts). These suits began in 2002 and were widely-publicized.[4]

2. Tenenbaum's Conduct

Tenenbaum was an early and enthusiastic user of peer-to-peer networks to obtain and distribute copyrighted music recordings. He began downloading and distributing copyrighted works without authorization in 1999. In that year, he installed the Napster peer-to-peer network on his desktop computer at his family's home in Providence, Rhode Island. He used Napster both to download digital versions of copyrighted music recordings from other network users and to distribute to other users digital versions of copyrighted music recordings already saved on his own computer.

Because it enabled copyright infringement, see [493] A & M Records, Inc. v. Napster, Inc., 239 F.3d 1004 (9th Cir.2001), the Napster network was shut down in 2001. This did not stop Tenenbaum from downloading and distributing copyrighted works; he instead began using other peer-to-peer networks for the same illegal purposes. These networks included AudioGalaxy, iMesh, Morpheus, Kazaa, and Limewire. Tenenbaum shifted to these other networks after Napster's termination despite his knowledge that Napster was forced to close on account of a lawsuit brought against it for copyright infringement.

Tenenbaum continued to download and distribute copyrighted materials through at least 2007. During that time span he accessed a panoply of peer-to-peer networks for these illegal purposes from several computers. From 1999 until 2002, he primarily downloaded and distributed copyrighted works to and from his desktop computer at his family's home in Providence. He left home to attend Goucher College in Baltimore, Maryland, in 2002, at which point he began using a laptop to download and distribute copyrighted works. Following his graduation from Goucher in 2006, he began using a second laptop for these purposes in tandem with his other computers. Over the duration of Tenenbaum's conduct, he intentionally downloaded thousands of songs to his own computers from other network users. He also purposefully made thousands of songs available to other network users. He did this in the period after lawsuits were brought, and publicized, against individuals who downloaded and distributed music without authorization. At one point in time in 2004 alone, Tenenbaum had 1153 songs on his “shared-directory” on the Kazaa network. [5] Any of those files within Tenenbaum's shared directory could be easily downloaded by other Kazaa users. Although there was no way to determine the exact number of times other users had downloaded files from Tenenbaum's shared directory, it was frequent. Most of the networks Tenenbaum used had a “traffic tab” that informed him of the frequency with which other users were downloading his shared files. Tenenbaum regularly looked at the traffic tab, and he admitted it “definitely wasn't uncommon” for other users to be downloading materials from his computer.

Tenenbaum knew that his conduct, both his downloading and distribution, was illegal and received warnings the industry had started legal proceedings against individuals. He received several warnings regarding the potential liability his actions carried with them. While Tenenbaum was at Goucher College in 2002, his father, Dr. Arthur Tenenbaum, called him to warn him that his use of peer-to-peer networks to obtain and distribute music recordings was unlawful. Dr. Tenenbaum knew that his son was illegally downloading music because, prior to leaving for college, Tenenbaum had showed his father the array of songs that could be downloaded from the Kazaa network. After Dr. Tenenbaum became aware that lawsuits were being brought against individuals who used file-sharing programs to download and distribute music, he instructed Tenenbaum not to continue to engage in such conduct. Dr. Tenenbaum testified that, during their conversation, Tenenbaum did not appear [494] concerned about the consequences of his actions. Despite his father's request, Tenenbaum continued his illegal activity.

Tenenbaum also received direct warnings from Goucher College. Each year Tenenbaum received a Goucher student handbook warning that using the college's network to download and distribute copyrighted materials was illegal, but he did so anyway. The handbook also warned that illegally downloading and distributing music files could subject the copyright infringer to up to $150,000 of liability per infringement, alerting Tenenbaum to his potential exposure for violating the law. The Fall 2003 handbook issued to Tenenbaum at the start of his sophomore year cautioned:

To avoid the risk of potential lawsuits due to copyright infringement, the college is advising students to carefully restrict the use of file sharing applications to material that is legal to share.... Persons found to be infringed may be held liable for substantial damages and attorneys fees. The law entitles a plaintiff to seek statutory damages of $150,000 for each act of willful infringement.... In addition, if you violate copyright law by engaging in file sharing, you may be subject to discipline and other applicable college policy.

Tenenbaum received handbooks containing similar language during each of his four years at Goucher, but was unfazed and continued.

Tenenbaum also knew the college took this seriously and had itself acted to stop this illegal activity. By the end of his undergraduate studies at Goucher, the school had implemented so many technological restrictions on its network—which he knew were designed to prevent illegal downloading of music files—that peer-to-peer programs “wouldn't work at all.”

The Tenenbaums' internet service provider at home in Providence, Cox Communications, also warned against using the internet to illegally infringe copyrighted materials. In 2003, for example, the terms of service they offered to their customers prohibited customers from using the internet service “to post, copy, transmit or disseminate any content that infringes the patents, copyrights, trade secrets, trademarks or proprietary rights of any party.” It further provided that “Cox assumes no responsibility, and you assume all risks regarding the determination of whether material is in the public domain or may otherwise be used by you for such purposes.”

In a September 2005 letter, plaintiffs themselves informed Tenenbaum that he had been detected infringing copyrighted materials and notified him that his conduct was illegal. The letter stated: “We are writing in advance of filing suit against you in the event that you have an interest in resolving these claims.”[6] The letter urged Tenenbaum to consult with an attorney immediately, and explained that the recording companies were prepared to initiate a legal action against Tenenbaum because of the severe impact of his actions on the industry:

Copyright theft is not a victimless crime. People spend countless hours working hard to create music—not just recording artists and songwriters, but also session players, backup singers, sound engineers and other technicians. In addition, the music industry employ thousands of other people, such as CD-plant workers, warehouse personnel, record store clerks and developers of legitimate online music services. They all depend [495] on sale of recordings to earn a living. So do record companies, which routinely invest millions of dollars to discover and sign promising artists, and then to produce and market their recordings. In addition, piracy eats away at the investment dollars available to fund new music and, in effect, erodes the future of music.

The letter also instructed Tenenbaum to preserve any relevant evidence including “the entire library of recordings that you have made available for distribution as well as any recordings you have downloaded....”[7]

The letter from Sony resulted in a conversation between Tenenbaum and his mother regarding his use of peer-to-peer networks. During that conversation, Tenenbaum claimed that it was “impossible ... to know” who was responsible for the infringements referenced in Sony's letter.

Despite these warnings and his knowledge that he was and had been engaging in illegal activity which could subject him to liability of up to $150,000 per infringement, Tenenbaum continued the illegal downloading and distribution of copyrighted materials until at least 2007—a full two years after receiving the letter from Sony. He stopped his activity only after this lawsuit was filed against him.

[Strong evidence established that Tenenbaum lied in the course of these legal proceedings in a number of ways. In his initial responses to Sony's discovery requests, Tenenbaum represented he “had no knowledge or recollection of online media distribution systems used or any dates” of such use. He also denied creating or using the “sublimeguy 14@ kazaa” account name that he had used to access various peer-to-peer networks, and he denied any knowledge of whether a peer-to-peer network had been installed on his computer.]

At trial, however, Tenenbaum admitted that each of these statements he had made was false. He made numerous admissions in his testimony as to the scope of his conduct from 1999 until 2007. He admitted to installing peer-to-peer networks on his computer, including Kazaa, Limewire, Audio Galaxy, iMesh, and Morpheus, so that he could download and upload music with “the least amount of wasted effort.” He admitted that he created the “sublimeguy 14@ kazaa” user account, downloaded songs from the networks using that account, and placed materials in shared folders on those networks so that other users could download the materials onto their own computers. On some occasions, he believed he was the first person to upload a particular music recording onto the network. He testified that he placed between 600 and 5,000 songs on the Goucher College peer-to-peer network for others to download. He further testified that he also copied illegally downloaded songs onto CDs and USB drives, both for personal use and to give to other individuals. He also explicitly admitted liability for downloading and distributing the thirty sound recordings at issue in the case.

Before the trial, Tenenbaum also attempted to shift responsibility for his conduct to other individuals by claiming they could have used his computer in order to illegally download and distribute the copyrighted works. These individuals included a foster child living in his family's home, burglars who had broken into the home, [496] his family's house guest, and his own sisters. His sisters and others he blamed testified that they had never illegally downloaded music and had no knowledge of who installed the file sharing software on Tenenbaum's computer.

Finally, when asked at trial about his efforts to attribute the blame for his actions to others, Tenenbaum admitted his own responsibility: “I used the computer, I uploaded, I downloaded music, this is what I did, that's how it is, I did it.”

II.

Tenenbaum's Challenges to the Constitutionality and Applicability of the Copyright Act

Tenenbaum presents three arguments that he is not subject to the Copyright Act. First, Tenenbaum argues that the Copyright Act is unconstitutional under Feltner v. Columbia Pictures Television, Inc., 523 U.S. 340, 118 S.Ct. 1279, 140 L.Ed.2d 438 (1998). Feltner held that the Seventh Amendment entitles a defendant to have a jury determine the amount of statutory damages under § 504(c), although Congress had provided that judges, not juries, would render statutory damage awards. He argues that Feltner somehow renders the statutory damages provision unconstitutional until Congress chooses to amend the statute.

Second, Tenenbaum argues that Congress did not intend the Act to impose either liability or statutory damages where the copyright infringements at issue amount to what he calls “consumer copying.”

Third, Tenenbaum argues that statutory damages are unavailable to Sony because, in his view, statutory damages, as a matter of Congressional intent, cannot be awarded absent a showing of actual harm, and he claims there was no harm.

We review such legal and constitutional questions de novo. United States v. S. Union Co., 630 F.3d 17, 24 (1st Cir.2010). None of these arguments has merit.

A. Constitutionality of the Copyright Act After Feltner

Tenenbaum did not clearly make the argument that Feltner renders 504(c) unconstitutional to the district court, and so it is waived. See Dillon v. Select Portfolio Servicing, 630 F.3d 75, 82 (1st Cir.2011).

Even were the argument not waived, it is both wrong and foreclosed by our circuit precedent. In Segrets, Inc. v. Gillman Knitwear Co., 207 F.3d 56 (1st Cir.2000), we considered Feltner's impact on a claim for statutory damages under § 504(c). We held that Feltner required remand to the district court so that a jury could determine both whether the infringements at issue were willful and the proper measure of statutory damages, necessarily rejecting any notion that statutory damages under § 504(c) were no longer available after Feltner. Id. at 63. We followed the same reasoning in Venegas–Hernandez v. Sonolux Records, 370 F.3d 183, 191–94 (1st Cir.2004) (interpreting and applying § 504(c) after Feltner).

Our sister circuits have likewise concluded that Feltner did not render § 504(c) unconstitutional. See, e.g., BMG Music v. Gonzalez, 430 F.3d 888, 892–93 (7th Cir.2005) (upholding statutory damages award under § 504(c) despite claim that Feltner rendered such an award unconstitutional); Columbia Pictures Television, Inc. v. Krypton Broad. of Birmingham, Inc., 259 F.3d 1186, 1192 (9th Cir.2001) (rejecting argument that Feltner rendered “statutory damages provision of the Copyright Act ... unconstitutional in its entirety” and concluding Feltner “in no way implies that [497] copyright plaintiffs are no longer able to seek statutory damages under the Copyright Act”).

This conclusion is also required by Supreme Court precedent. Where the Court has found a particular federal statute to deprive defendants of jury rights in violation of the Seventh Amendment,[8] the Court has deemed the offending portions of the statute inoperative while leaving the statute otherwise intact. See, e.g., Tull v. United States, 481 U.S. 412, 417 n. 3, 107 S.Ct. 1831, 95 L.Ed.2d 365 (1987) (upholding enforceability of Clean Water Act even though “[n]othing in the language of the ... Act or its legislative history implies any congressional intent to grant defendants the right to a jury trial” and the Seventh Amendment required that defendants be given such a jury trial right).

B. The Copyright Act and “Consumer–Copier” and Publisher–Copier Copyright Infringement

Tenenbaum argues to us that Congress never intended for the Copyright Act to impose liability or statutory damages against what he calls “consumer copiers.” That argument was not presented to the district court and is waived.[9]

Even were the argument not waived, it must fail. We start with the inaccuracy of the labels that Tenenbaum's argument uses. Tenenbaum is not a “consumer-copier,” a term he never clearly defines. He is not a consumer whose infringement was merely that he failed to pay for copies of music recordings which he downloaded for his own personal use. Rather, he widely and repeatedly copied works belonging to Sony and then illegally distributed those works to others, who also did not pay Sony. Further, he received, in turn, other copyrighted works for which he did not pay. Nor can Tenenbaum assert that his was merely a “non-commercial” use and distribution of copyrighted works as those terms are used elsewhere in the Act.[10] His use and distribution was for private gain and involved repeated and exploitative copying.

[498] Our analysis begins with the language of the Act, which we “construe ... in its context and in light of the terms surrounding it.” Succar v. Ashcroft, 394 F.3d 8, 23 (1st Cir.2005) (quoting Leocal v. Ashcroft, 543 U.S. 1, 9, 125 S.Ct. 377, 160 L.Ed.2d 271 (2004)) (internal quotation marks omitted). “It is well established that, when the statutory language is plain, we must enforce it according to its terms.” Jimenez v. Quarterman, 555 U.S. 113, 118, 129 S.Ct. 681, 172 L.Ed.2d 475 (2009).

In addition to the factual inaccuracy of his labels, Tenenbaum's argument that the Copyright Act immunizes his conduct from liability is contradicted by the plain language of the statute. The Copyright Act does not make the distinctions he urges between “consumer” and “non-consumer” infringement of copyrighted materials by copying and distribution. Instead, the Act renders those, like Tenenbaum, who use or distribute a copyrighted work without authorization liable in copyright. Indeed, the Act does not use the term “consumer” at all, much less as a term excluded from the category of infringers. Rather, the statute refers to “anyone” as potential infringers. 17 U.S.C. § 501(a).

The Act explicitly grants owners of “works of authorship”[11] exclusive rights to, inter alia, “reproduce the copyrighted work in copies or phonorecords” and “distribute copies or phonorecords of the copyrighted work to the public by sale or other transfer of ownership, or by rental, lease, or lending.” 17 U.S.C. § 106. By the plain language of § 106, copyright owners, like Sony, have the exclusive right to reproduce copyrighted works in copies or phonorecords and to distribute those copies or phonorecords.

The Copyright Act contains no provision that could be interpreted as precluding a copyright owner from bringing an action against an infringer solely because the infringer was a consumer of the infringed products or acted with a so-called noncommercial purpose in his distribution of the works to others. Apart from the reality that the facts of record support neither characterization, 17 U.S.C. § 501(a) provides that “ anyone who violates any of the exclusive rights of the copyright owner as provided by sections 106 through 122 ... is an infringer of the copyright.” (Emphasis added). Further, under 17 U.S.C. § 501(b), “the legal or beneficial owner of an exclusive right under a copyright is entitled ... to institute an action for any infringement of that particular right committed while he or she is the owner of it.” (Emphasis added). Had Congress intended to limit copyright actions against so-called “consumer infringers” as Tenenbaum hypothesizes, it easily could have done so. See Ali v. Fed. Bureau of Prisons, 552 U.S. 214, 227–28, 128 S.Ct. 831, 169 L.Ed.2d 680 (2008). Instead, subject to exceptions not relevant here, it extended liability to “ anyone ” who violates a copyright owner's exclusive rights and allowed those owners to pursue actions against “ any infringement.” 17 U.S.C. § 501 (emphasis added).

Moving from liability to damages, Tenenbaum's argument that statutory damages [499] are not available here is also refuted by the plain statutory language. Section 504 provides that “ an infringer of copyright is liable for either ... the copyright owner's actual damages and any additional profits of the infringer ... or statutory damages.” (Emphasis added). The statute does not condition the availability of either set of damage calculations on whether the offending use was by a consumer or for commercial purposes or not.

Congress drew distinctions in the Copyright Act where it meant to do so. For example, it distinguished between willful and non-willful infringements, subjecting willful infringers to a higher cap on statutory damage awards. See 17 U.S.C. § 504(c).

Where Congress wanted the Act to draw distinctions based on the nature of the use it also did so explicitly, such as with the fair use defense. See 17 U.S.C. § 107 (providing for fair use limitation on owner's exclusive rights and identifying the “purpose and character of the use” including “whether such use is of a commercial nature or is for nonprofit educational purposes” as a factor to consider in determining applicability of fair use limitation).[12]

Further, where Congress intended to create other exceptions for solely personal or non-commercial use, it did so expressly. In two amendments which do not apply here, it drew such distinctions: (1) the Sound Recording Act of 1971, Pub. L. No. 92–140, 85 Stat. 391, which fully extended federal copyright protections to sound recordings but exempted certain reproductions of sound recordings made for personal use, and (2) the Audio Home Recording Act of 1992 (AHRA), Pub. L. No. 102–563, 106 Stat. 4237, codified at 17 U.S.C. § 1001 et seq., which provided some exemptions in other situations from copyright liability for infringements “based on the noncommercial use by a consumer.”[13] 17 U.S.C. § 1008.[14] These statutes refute Tenenbaum's argument.

Because Congress has enumerated a set of express exceptions, rules of statutory interpretation instruct that Congress intended to make no other exceptions than those specified. See Tenn. Valley Auth. v. Hill, 437 U.S. 153, 188, 98 S.Ct. 2279, 57 L.Ed.2d 117 (1978) (finding under maxim expressio unius est exclusio alterius that enumerated exceptions are the sole exceptions intended within the Endangered Species Act); see also Russello v. United States, 464 U.S. 16, 23, 104 S.Ct. 296, 78 L.Ed.2d 17 (1983) (“[W]here Congress includes particular language in one section of a statute but omits it in another section of the same Act, it is generally presumed that Congress acts intentionally and purposely in the disparate inclusion or exclusion.”) (quoting United States v. Wong Kim Bo, 472 F.2d 720, 722 (5th Cir.1972)) (internal quotation marks omitted).

[500] The clarity of the statutory text compels the rejection of Tenenbaum's arguments. When a statute speaks with clarity to an issue, “judicial inquiry into the statute's meaning, in all but the most extraordinary circumstance, is finished.” Estate of Cowart v. Nicklos Drilling Co., 505 U.S. 469, 475, 112 S.Ct. 2589, 120 L.Ed.2d 379 (1992). It is not within the province of the courts to rewrite Congressional statutes: that task is “for Congress to accomplish by further legislation.” United States v. Harriss, 347 U.S. 612, 620, 74 S.Ct. 808, 98 L.Ed. 989 (1954); see also Logan v. United States, 552 U.S. 23, 26–27, 128 S.Ct. 475, 169 L.Ed.2d 432 (2007) (refusing to stray from statutory text).

Asking us to ignore the text and the plain meaning of the statute, Tenenbaum argues Congress was unaware that suits like this could be brought and so could not have intended the statute to apply here. The argument is wrong both on the law and on the facts.

Congress did contemplate that suits like this were within the Act. Congress last amended the Copyright Act in 1999 to increase the minimum and maximum awards available under § 504(c). See Digital Theft Deterrence and Copyright Damages Improvement Act of 1999, Pub. L. No. 106–160, 113 Stat. 1774. At the time, Congress specifically acknowledged that consumer-based, noncommercial use of copyrighted materials constituted actionable copyright infringement. Congress found that “copyright piracy of intellectual property flourishes, assisted in large part by today's world of advanced technologies,” and cautioned that “the potential for this problem to worsen is great.” H.R. Rep. No. 106–216, at 3 (1999), 1999 WL 446444, at *2. Indeed, the legislative history directly addresses this concern:

By the turn of the century the Internet is projected to have more than 200 million users, and the development of new technology will create additional incentive for copyright thieves to steal protected works. The advent of digital video discs, for example, will enable individuals to store far more material than on conventional discs and, at the same time, produce perfect secondhand copies.... Many computer users are either ignorant that copyright laws apply to Internet activity, or they simply believe that they will not be caught or prosecuted for their conduct. Also, many infringers do not consider the current copyright infringement penalties a real threat and continue infringing, even after a copyright owner puts them on notice that their actions constitute infringement and that they should stop the activity or face legal action. In light of this disturbing trend, it is manifest that Congress respond appropriately with updated penalties to dissuade such conduct. H.R. 1761 increases copyright penalties to have a significant deterrent effect on copyright infringement.

Id.[15]

Even earlier, in 1997, Congress had explicitly amended the criminal component of [501] the Copyright Act to make clear that criminal liability for copyright infringement can be imposed even if an infringer's use of a copyrighted material is noncommercial. See No Electronic Theft Act (NET Act), Pub. L. No. 105–147, 111 Stat. 2678. The NET Act was enacted in response to United States v. LaMacchia, 871 F.Supp. 535 (D.Mass.1994), in which a court had barred prosecution of a student charged with wire fraud because even though he enabled others to download copyrighted software applications at no cost, he received no commercial gain from his activities and the criminal statute precluded prosecution where there was no commercial benefit conferred.

Congress made clear that it enacted the NET Act to “criminalize[ ] computer theft of copyrighted works, whether or not the defendant derives a direct financial benefit from the act(s) of misappropriation, thereby preventing such willful conduct from destroying businesses, especially small businesses, that depend on licensing agreements and royalties for survival.” H.R. Rep. 105–339, at 5 (1997), 1997 WL 664424, at *5.

Tenenbaum's argument that we may ignore the plain language of the statute and Congressional intent because relatively few lawsuits were brought against those in his position also goes nowhere. Again, both the factual and legal contentions are wrong.

Even if we assume that copyright owners have historically chosen first to litigate against the providers of new technologies of reproduction and dissemination rather than the users of those new technologies, see Tussey, Technology Matters: The Courts, Media Neutrality, and New Technologies, 12 J. Intell. Prop. L. 427 (2005), that may best be explained by the owners using a cost-benefit analysis, and says nothing about Congressional intent. Historically, the costs of prosecuting infringement actions against individual users could be thought by owners to have exceeded the benefits. That the copyright owners have turned to litigation against individual infringers only underscores that the balance of the copyright holder's cost-benefit analysis has been altered as peer-to-peer networks and digital media become more prevalent.

In any event, the argument is legally irrelevant. The Supreme Court has expressly instructed that courts apply the Copyright Act to new technologies. In Sony Corp. of America v. Universal City Studios, Inc., 464 U.S. 417, 104 S.Ct. 774, 78 L.Ed.2d 574 (1984), the Court instructed that courts must “[a]pply[ ] the copyright statute, as it now reads, to the facts as they have been developed” even though Congress might ultimately “take a fresh look at this new technology, just as it so often has examined other innovations in the past.” Id. at 456, 104 S.Ct. 774.

The Supreme Court has made clear that it is particularly important for courts to take this tack when faced with novel Copyright Act issues. “[F]rom its beginning, the law of copyright has developed in response to significant changes in technology,” and as “new developments have occurred in this country, it has been the Congress that has fashioned the new rules that new technology made necessary.” Id.at 430–31, 104 S.Ct. 774. We reject Tenenbaum's invitation to usurp Congress's legislative authority and to disregard binding Supreme Court precedent.

[502] C. Statutory Damages under 17 U.S.C. § 504 and Actual Harm

Tenenbaum next argues that the statutory damages provision is nonetheless inapplicable because, in his view, as a matter of law there can be no statutory damages where “harm caused by a particular defendant has not been proved.” Again, he is wrong both as a matter of law and on the facts of record.

The district court properly rejected Tenenbaum's proffered interpretation of § 504. Section 504 clearly sets forth two alternative damage calculations a plaintiff can elect: actual damages and statutory damages. See 17 U.S.C. § 504(a) (providing that “an infringer of copyright is liable for either ... the copyright owner's actual damages and any additional profits of the infringer ... or statutory damages”) (emphasis added).

Under § 504(b), a plaintiff may elect to receive “the actual damages suffered by him or her as a result of the infringement, and any profits of the infringer that are attributable to the infringement and are not taken into account in computing the actual damages.”

Alternatively, under § 504(c), “the copyright owner may elect, at any time before final judgment is rendered, to recover, instead of actual damages and profits, an award of statutory damages for all infringements involved in the action, with respect to any one work.” (Emphasis added). The statute makes clear that statutory damages are an independent and alternative remedy that a plaintiff may elect “instead of actual damages.”

Section 504's text reflects Congress's intent “to give the owner of a copyright some recompense for injury done him, in a case where the rules of law render difficult or impossible proof of damages or discovery of profits.” Douglas v. Cunningham, 294 U.S. 207, 209, 55 S.Ct. 365, 79 L.Ed. 862 (1935). The Supreme Court explained that before statutory damages were available, plaintiffs, “though proving infringement,” would often be able to recover only nominal damages and the “ineffectiveness of the remedy encouraged willful and deliberate infringement.” Id. The Supreme Court has since reaffirmed that “[e]ven for uninjurious and unprofitable invasions of copyright the court may, if it deems it just, impose a liability within statutory limits to sanction and vindicate the statutory policy.” F.W. Woolworth Co. v. Contemporary Arts, 344 U.S. 228, 233, 73 S.Ct. 222, 97 L.Ed. 276 (1952) (upholding statutory damage award of $5,000 for infringement even when actual damages of only $900 were demonstrated); see also L.A. Westermann Co. v. Dispatch Printing Co., 249 U.S. 100, 106, 39 S.Ct. 194, 63 L.Ed. 499 (1919) (finding the language chosen by Congress “shows that something other than actual damages is intended—that another measure is to be applied in making the assessment”).[16]

Tenenbaum's argument also rests on the faulty assertion that Sony did not offer evidence of the harm it suffered as a result of Tenenbaum's conduct. Tenenbaum downloaded the thirty copyrighted works at issue and distributed those works to innumerable network users. Sony presented extensive testimony regarding the loss in value of the copyrights at issue that resulted from Tenenbaum's conduct, and the harm of Tenenbaum's actions to itself and the recording industry, including reduced [503] income and profits, and consequent job loss to employees.

III.

Tenenbaum's Challenges to the Jury Instructions

Tenenbaum challenges the district court's jury instructions on several grounds, all but one of which were not preserved for appeal, and all of which fail.

We review preserved challenges to jury instructions de novo, and “look to the challenged instructions in relation to the charge as a whole, ‘asking whether the charge in its entirety—and in the context of the evidence—presented the relevant issues to the jury fairly and adequately.’ ” Kennedy v. Town of Billerica, 617 F.3d 520, 529 (1st Cir.2010) (quoting Goodman v. Bowdoin Coll., 380 F.3d 33, 47 (1st Cir.2004)). Even if the instructions were erroneous, we reverse only if the error “is determined to have been prejudicial based on a review of the record as a whole.” Mass. Eye & Ear Infirmary v. QLT Phototherapeutics, Inc., 552 F.3d 47, 72 (1st Cir.2009).

Absent adequate objections to the instructions, our review is for plain error, which requires that Tenenbaum show (1) that there was error, (2) that it was plain, (3) that it likely altered the outcome, and (4) that it was sufficiently fundamental to threaten the fairness, integrity or public reputation of the judicial proceedings. Gray v. Genlyte Grp., Inc., 289 F.3d 128, 134 (1st Cir.2002); Estate of Keatinge v. Biddle, 316 F.3d 7, 16 (1st Cir.2002). “The standard is high, and ‘it is rare indeed for a panel to find plain error in a civil case.’ ” Diaz–Fonseca v. Puerto Rico, 451 F.3d 13, 36 (1st Cir.2006) (quoting Chestnut v. City of Lowell, 305 F.3d 18, 20 (1st Cir.2002) (en banc) (per curiam)).

A. Tenenbaum's Preserved Challenge to the District Court's Instruction as to the Statutory Damage Range Under § 504(c)

Tenenbaum's only preserved instructional challenge is that the district court erred by instructing the jury about the range of statutory damages available to Sony under § 504(c).[17] The district court instructed the jury that “[t]he Copyright Act entitles a plaintiff to a sum of not less than $750 and not more than $30,000 per act of infringement (that is, per sound recording downloaded or distributed without license) as you consider just.” The court further instructed: “If you find that the defendant's infringement of a copyrighted work was willful, the Copyright Act entitles a plaintiff to a sum of not less than $750 and not more than $150,000 per act of infringement (that is, per sound recording downloaded or distributed without license), as you consider just.” The court then instructed as to a set of non-exhaustive factors that the jury might wish to consider in issuing its award, including:

the nature of the infringement; the defendant's purpose and intent, the profit that the defendant reaped, if any, and/or the expense that the defendant saved; the revenue lost by the plaintiff as a result of the infringement; the value of the copyright; the duration of the infringement; [504] the defendant's continuation of infringement after notice or knowledge of copyright claims; and the need to deter this defendant and other potential infringers.Tenenbaum does not object to that portion of the instructions.

Tenenbaum argues that the statutory damage range should not have been disclosed to the jury and that the instructions presented the statutory damage range “unmoored from the overall statutory scheme and the context of other cases.” Tenenbaum proposes that instead the district court should only have instructed the jury to return an award the jury deemed “just” and then the court should have adjusted the award to fall within the statutory range after the jury made its determination. This argument is, of course, at considerable tension with Tenenbaum's argument that damages within the statutory range are unconstitutional.

The instruction given as to the statutory damage range was an accurate statement of the law and clearly informed the jury of the range of damages it could award under § 504(c). As such there was no error. See United States v. Mardirosian, 602 F.3d 1, 10 (1st Cir.2010) (upholding jury instructions because they “provided a clear, accurate description of the substantive law”).

It is commonplace for courts to explicitly instruct juries of the maximum and minimum statutory damage awards permitted under § 504(c). See, e.g., In re Frye, No. 08–1055, 2008 WL 8444822, at *3 (B.A.P. 9th Cir. Aug. 19, 2008) (noting jury awarded the statutory maximum under § 504(c)); Yurman Design, Inc. v. PAJ, Inc., 93 F.Supp.2d 449, 462 (S.D.N.Y.2000) (noting plaintiff elected to seek statutory damages, “and the jury was provided instructions concerning such damages”), rev'd in part on other grounds, 262 F.3d 101 (2d Cir.2001). Several model federal jury instructions also explicitly enumerate the range of statutory damages under 504(c). See, e.g., 3B K. O'Malley, J. Grenig & W. Lee, Federal Jury Practice and Instructions—Civil § 160.93 (5th ed. 2011) (including within model the instruction that “plaintiff ... has elected to recover ‘statutory damages' instead of plaintiff's actual damages and profits” and that “[u]nder the Copyright Act, plaintiff ... is entitled to a sum of not less than $750 or more than $30,000 as you consider just”); Ninth Circuit Manual of Model Civil Jury Instructions § 17.25 (including within model the instruction that the “amount you may award as statutory damages is not less than $750, nor more than $30,000 for each work you conclude was infringed”); Holbrook & Harris, ABA Model Jury Instructions: Copyright, Trademark, and Trade Dress Litigation § 1.7.7 (2008) (same). Each set of model jury instructions also notes that the maximum statutory damage award under § 504(c) is increased if the defendant's copyright infringement is determined to be willful. Cf. Fraser v. Major League Soccer, L.L.C., 284 F.3d 47, 62 (1st Cir.2002) (noting that district court's instructions tracked ABA model jury instructions in rejecting objection to instructions).

There is no viable argument that the instruction violated Congressional intent. Where Congress has sought to prevent juries from knowing that their awards will be reduced to be within statutory caps, it has explicitly said so in the relevant statute. See, e.g., 42 U.S.C. § 1981a(c)(2) (providing that “the court shall not inform the jury of the limitations” on awards of damages in intentional employment discrimination cases under Title VII). There is no such prohibition here.

Tenenbaum nonetheless argues that because Congress initially enacted the statute on the understanding that judges, not juries, would award statutory damages, it [505] must be error to tell the jury what the limits are.[18] He also argues that the Supreme Court “failed to provide any structure for guiding the jury's use of the wide power shifted to it” within its holding in Feltner that the Seventh Amendment entitles a defendant to have a jury determine the amount of § 504(c) damages. Feltner, however, raises no objection to a jury's being informed of the statutory range. In any case, this argument is simply a variant of Tenenbaum's claim that Feltner somehow renders § 504(c) inoperable, which we have already rejected.

Moreover, after Feltner, had Congress wished to prevent juries from being informed of the bottom and top ranges of permissible statutory damages, it easily could have done so. Instead, Congress amended the statute after Feltner to expand the range of damages, and did so without placing any limitation as to how courts should instruct juries in such cases. See Digital Theft Deterrence and Copyright Damages Improvement Act of 1999, Pub. L. No. 106–160, 113 Stat. 1774.

The district court's instructions on the range of statutory damages were not erroneous, let alone prejudicial.

B. Tenenbaum's Remaining Challenges to the Jury Instructions

Tenenbaum raises a series of unpreserved additional objections to the jury instructions which we review for plain error.

1. The Unpreserved Challenge that the District Court Should Have First Determined then Instructed the Jury on the Court's Assessment of Constitutional Limits on the Award

Tenenbaum argues that the district court erred by only instructing the jury as to the statutory boundaries for the damages award and failing, sua sponte, to inform the jury of the constitutional boundaries for the award. Tenenbaum asked for no such instruction, and the argument is waived. Even had the argument not been waived, there was no error.

Inherent in his argument is the proposition that before a case goes to the jury, the trial court must make its own assessment of the constitutional limits on damages and so instruct the jury. That is exactly backwards. See St. Louis, I.M. & S. Ry. Co. v. Williams, 251 U.S. 63, 66–67, 40 S.Ct. 71, 64 L.Ed. 139 (1919) (considering constitutional limits on statutory damage award after jury issued award). Tenenbaum's proposal itself could raise Seventh Amendment concerns about judicial usurpation of the jury's function. There was no error.

2. The Unpreserved Argument that the District Court Was Required to Instruct the Jury Not to Consider Injury Suffered by Other Recording Companies or Injuries Caused by Copyright Infringers Other Than Tenenbaum

The district court properly instructed the jury on Tenenbaum's conduct and the plaintiffs' harms the jury could consider in making its determination. It specifically listed the nature of Tenenbaum's infringement, Tenenbaum's purpose and intent, the “revenue lost by the plaintiff as a result of the infringement,” the duration of the infringement, and the defendant's continuation of infringement after learning of the copyright claims.

Tenenbaum argues that the district court sua sponte should have provided additional [506] instruction to focus the jury. Again, the argument is waived. Even were it not waived, the court did not err. Tenenbaum appears to be arguing that the jury also had to be told it could not consider damages resulting from the illegal downloading and distribution of copyrighted materials suffered by other recording companies besides the named plaintiffs or from other unrelated filesharing by others.[19] This is a hypothetical concern, not a real one in this case.

Tenenbaum purports to rely on language in Philip Morris USA v. Williams, 549 U.S. 346, 357, 127 S.Ct. 1057, 166 L.Ed.2d 940 (2007), that where there is a significant risk that the jury might take into account harm caused to non-party victims by the defendant, “a court, upon request, must protect against that risk.” (Emphasis added). Tenenbaum made no such request to the trial court.[20] Nor does he point to any authority that requires a court to provide a Philip Morris-type instruction sua sponte.

Philip Morris does not help him, in any event. There was not a substantial risk of the jury's going astray. The court's entirely correct instruction foreclosed that risk. The jury was never urged to consider damages (1) caused by other copyright infringers or (2) suffered by other recording companies. Indeed, in his closing argument, Tenenbaum's counsel made clear that “it's what Joel did that is here in issue and [the question is] what's appropriate in response to what Joel did,” and Sony's counsel likewise stated that applying damages for “what Joel did” was “exactly what we want you to do.” The court's jury instructions as a whole focused exclusively on Tenenbaum's actions and the resulting harm to the plaintiffs.

3. The Unpreserved Argument that the District Court Was Sua Sponte Required to Additionally Instruct that Statutory Damages Could Not Be Awarded Unless They Were Related to Actual Damages

The district court did instruct the jury to issue an award within the statutory range that it deemed to be just, and highlighted a number of factors it could use for guidance. Tenenbaum argues that the district court erred by failing, sua sponte, to add an additional instruction that as a matter of law statutory damages cannot be awarded unless reasonably related to actual damages.

[507] Tenenbaum's argument fails the first step of the plain error analysis. His proposed instruction itself would have been error. In § 504, Congress drew a plain distinction between actual and statutory damages, making it clear that the availability of statutory damages is not contingent on the demonstration of actual damages. See 17 U.S.C. § 504. Statutory damages are available even for “uninjurious and unprofitable invasions of copyright.” F.W. Woolworth Co., 344 U.S. at 233, 73 S.Ct. 222.

We join our sister circuits, who have rejected similar objections to jury instructions. See New Form, Inc. v. Tekila Films, Inc., 357 Fed.Appx. 10, 11–12 (9th Cir.2009) (“There is no required nexus between actual and statutory damages under 17 U.S.C. § 504(c).”); Superior Form Builders, Inc. v. Dan Chase Taxidermy Supply Co., 74 F.3d 488, 496–97 (4th Cir.1996); see also Lowry's Reports, Inc. v. Legg Mason, Inc., 302 F.Supp.2d 455, 460 (D.Md.2004) (rejecting argument that court should have instructed the jury “that the amount of statutory damages should bear a reasonable relationship to actual damages”).

4. The Unpreserved Argument that the District Court Erred in Instructing the Jury that Finding Willful Infringement Under § 504 Only Requires a Finding that a Defendant Knowingly Infringed Copyrighted Materials

Finally, Tenenbaum challenges the district court's instruction that “willful infringement” “means that a defendant had knowledge that his actions constituted copyright infringement or acted with reckless disregard for the copyright holder's rights.” The argument is wrong and is based on a misreading of the statute.

Tenenbaum argues that, as used in § 504, a “willful infringement” must require more than a showing that the defendant had knowledge his actions constituted copyright infringement. He argues this must be so because non-willful infringement itself requires the defendant to have had such knowledge. As a result, merely requiring that an infringement be “knowing” to be “willful” would eliminate the distinction between non-willful and willful infringements that Congress sought to create in enacting § 504.

Tenenbaum's argument rests on the false premise that knowledge is an element of non-willful copyright infringement under the Copyright Act. To the contrary, the Act contains no requirement that a particular violation of copyright be knowing to constitute a non-willful infringement.[21] See 17 U.S.C. § 501; see also Fitzgerald Publ'g Co. v. Baylor Publ'g Co., 807 F.2d 1110, 1113 (2d Cir.1986) (“Under § 501(a) intent or knowledge is not an element of infringement.”).

We join our sister circuits who have unanimously and routinely found that an infringement is willful under § 504 if it is “knowing.” See, e.g., [508] Bridgeport Music, Inc. v. UMG Recordings, Inc., 585 F.3d 267, 278 (6th Cir.2009) (rejecting challenge to jury instruction that, under § 504(c), “[a]n infringement is willful when a defendant engaged in acts that infringed a copyright and knew that those actions may infringe the copyright”) (alteration in original); Zomba Enters., Inc. v. Panorama Records, Inc., 491 F.3d 574, 584 (6th Cir.2007); Lyons P'ship, L.P. v. Morris Costumes, Inc., 243 F.3d 789, 799–800 (4th Cir.2001). Cf. Yurman Design, Inc., 262 F.3d at 111 (finding plaintiff is “not required to show that the defendant had knowledge that its actions constitute[d] an infringement” for infringement to be willful under § 504(c) so long as defendant recklessly disregarded the risk of infringement) (citation omitted) (internal quotation marks omitted).

The district court correctly instructed the jury. There was no error as to the finding of liability against Tenenbaum.

IV.

The District Court's Bypassing of Common Law Remittitur and Reducing the Award on Disputed Constitutional Grounds

After handling the trial with great skill, the district court committed reversible error when, after the jury awarded statutory damages, it bypassed the issue of common law remittitur, and instead resolved a disputed question of whether the jury's award of $22,500 per infringement violated due process, and decided itself to reduce the award. The court declined to adhere to the doctrine of constitutional avoidance on the ground that it felt resolution of a constitutional due process question was inevitable in the case before it. A decision on a constitutional due process question was not necessary, was not inevitable, had considerable impermissible consequences, and contravened the rule of constitutional avoidance. That rule had more than its usual import in this case because there were a number of difficult constitutional issues which should have been avoided but were engaged.

Facing the constitutional question of whether the award violated due process was not inevitable. The district court should first have considered the non-constitutional issue of remittitur, which may have obviated any constitutional due process issue and attendant issues. Had the court ordered remittitur of a particular amount, Sony would have then had a choice. It could have accepted the reduced award. Or, it could have rejected the remittitur, in which case a new trial would have ensued. See 11 Wright, Miller & Kane, Federal Practice and Procedure § 2815, at 160 (2d ed. 1995).

In reaching and deciding that due process constitutional question, the district court also unnecessarily decided several related constitutional issues. The court determined that the statutory damage award was effectively a punitive damage award for due process purposes and applied the factors set forth in BMW v. Gore, 517 U.S. 559, 116 S.Ct. 1589, 134 L.Ed.2d 809 (1996), to assess its constitutionality. The court declined to apply the Williams standard the Supreme Court had previously applied to statutory damage awards. See Tenenbaum, 721 F.Supp.2d at 103. The district court's tack also led to unnecessary resolution of Seventh Amendment issues. The decision to reduce the jury's award without offering Sony a new trial implicitly presupposed that, in reducing a statutory damage award issued by a jury, a court need not offer plaintiffs the option of a new jury trial in order to comport with the Seventh Amendment.

The United States, concerned with defending the constitutionality of the Copyright Act and its statutory damage provision, [509] argues that the district court erred by unnecessarily reaching Tenenbaum's constitutional challenge to the award and bypassing the question of common law remittitur.[22] The United States alternatively argues that, if the due process issue were reached, the district court was required to apply the Williams due process standard. The United States points out an inferior federal court may not displace the Supreme Court's on point holding. The United States also raises Seventh Amendment concerns.

We agree with the position of the United States that the district court erred when it prematurely reached a constitutional question of whether the jury's award was excessive so as to violate due process. We reverse the reduction of the award, reinstate the original jury verdict and award, and remand for consideration of the common law remittitur question.

A. District Court Damages Proceedings

We provide a more detailed review of the relevant district court proceedings.

After the jury verdict awarding Sony $22,500 per infringement, Tenenbaum filed a motion for a new trial or remittitur pursuant to Federal Rule of Civil Procedure 59. Absent a grant of a new trial, he sought remittitur to the statutory minimum. Tenenbaum argued the court should use the standard that remittitur is appropriate where the result of the award is “grossly excessive, inordinate, shocking to the conscience of the court, or so high that it would be a denial of justice to permit it to stand.” Correa v. Hosp. S.F., 69 F.3d 1184, 1197 (1st Cir.1995) (quoting Segal v. Gilbert Color Sys., Inc., 746 F.2d 78, 81 (1st Cir.1984)) (internal quotation marks omitted). Tenenbaum separately argued the award was unconstitutionally excessive under the standard for reviewing punitive damage awards articulated in Gore.

Sony opposed, arguing there was no factual basis for a remittitur given both the evidence and that the evidence had to be taken in the light most favorable to the prevailing party. See E. Mountain Platform Tennis, Inc. v. Sherwin–Williams Co., 40 F.3d 492, 502 (1st Cir.1994). It also argued that the district court lacked authority to displace a jury verdict which was in the statutory range set by Congress and that to hold otherwise would violate the Seventh Amendment. With regard to Tenenbaum's due process arguments, Sony argued that Williams set forth the proper standard, and not Gore. Sony also argued that under either the Williams or Gore standards, the award was not unconstitutionally excessive.

The United States took a different approach. It took no position on whether Tenenbaum had met the standard for remittitur (or a new trial). Rather, the United States stated that the canon of constitutional avoidance required the district court to first consider the question of common law remittitur, regardless of whether the award merited remittitur or not. If the court did address the constitutional question, the United States argued that the standard set forth in Williams was appropriate [510] and that the court should reject the Gore guideposts for assessing punitive damages because punitive damages are a distinct remedy from statutory damages. The United States also took the position that an award within the Copyright Act's statutory damage range comported with due process.

At the hearing on Tenenbaum's motion, the court asked counsel for plaintiffs to hypothesize as to what his clients' position would be if the court were to order a reduction or remittitur of the award. Understandably, plaintiffs' counsel did not take a firm position; he said his clients would have to consider the amount and other factors but thought it unlikely such a remittitur would be acceptable. If there were a remittitur, then, he said, the court could not reach the due process question of an excessive award because to do so would deprive plaintiffs of their Seventh Amendment right to a jury trial. Plaintiffs also argued that on the evidence, there was no basis for remittitur.

At that hearing, the United States repeated its position that the court was required to decide the remittitur question first in order to avoid any constitutional issues and that if plaintiffs rejected remittitur, the remedy was a new trial; the court could not go on to decide a constitutional due process issue as to the award. If the court did decide a constitutional due process issue as to the excessiveness of the award, the government argued, it was required to apply Williams, which had not been overruled.

Rejecting the position of the United States, the court bypassed remittitur, reached a constitutional due process issue, and ruled the award excessive under Gore. It reduced the award from $675,000 to $67,500 and did not give plaintiffs the option of a new trial.

The court stated its reason for bypassing the decision on common law remittitur. It treated plaintiffs' statements at the hearing as foreclosing any possibility of plaintiffs accepting remittitur, regardless of what amount the court might set for the award and despite plaintiffs' stated and careful reservations on the point. See Tenenbaum, 721 F.Supp.2d at 88. From this, the court reasoned that a new trial was inevitable; it then assumed that a jury would inevitably award a damages sum which would lead Tenenbaum to again raise a constitutional excessiveness challenge, and that the court which heard the new trial would then have to consider those and other objections again.[23] Id. From these assumptions, the court reasoned it might as well decide those issues then and there.[24] Id.

B. The District Court Erred by Unnecessarily Reaching and Deciding the Question of Whether the Jury's Award Was Unconstitutionally Excessive

The principle of constitutional avoidance, rooted in Article III as well as in principles of judicial restraint, and in this case implicating the Due Process Clause and [511] the Seventh Amendment right to jury trial, governs both this court and the district court and requires that we vacate and remand.

It is bedrock that the “long-standing principle of judicial restraint requires that courts avoid reaching constitutional questions in advance of the necessity of deciding them.” Lyng v. Nw. Indian Cemetery Protective Ass'n, 485 U.S. 439, 445, 108 S.Ct. 1319, 99 L.Ed.2d 534 (1988); see also Camreta v. Greene, ––– U.S. ––––, 131 S.Ct. 2020, 2031, 179 L.Ed.2d 1118 (2011) (noting rule that courts must avoid resolving constitutional questions unnecessarily). “[P]rior to reaching any constitutional questions, federal courts must consider nonconstitutional grounds for decision.” Buchanan v. Maine, 469 F.3d 158, 172 (1st Cir.2006) (quoting Gulf Oil Co. v. Bernard, 452 U.S. 89, 99, 101 S.Ct. 2193, 68 L.Ed.2d 693 (1981)) (internal quotation marks omitted). No valid reason justified abandonment of this doctrine in this case. The abandonment of the rule instead thrust the case into a thicket of constitutional issues it was not necessary to enter.

It was not necessary for the district court to reach the constitutional question of whether the jury's award of $22,500 per infringement was so excessive as to violate due process. If the district court had ordered remittitur, there would have been a number of possible outcomes that would have eliminated the constitutional due process issue altogether, or at the very least materially reshaped that issue.

The issue of whether the award violated due process and the Seventh Amendment issue would both have been eliminated if remittitur had been ordered and Sony had accepted the remitted award. Alternatively, if remittitur had been ordered but Sony had declined the remitted award, a new trial would have ensued. The jury could have issued an award that would not have led Tenenbaum to again seek a reduction on either common law remittitur or due process grounds.

Even if Sony had declined any remitted award given and opted for a new trial, even if a different jury issued a comparable award, and even if Tenenbaum once again moved to reduce the award on constitutional grounds, it was still premature for the court to reach the constitutional question before that process had been carried out. A new trial could have materially reshaped the nature of the constitutional issue by altering the amount of the award at issue or even the evidence on which to evaluate whether a particular award was excessive.

In this way, reaching the constitutional question before ordering remittitur not only contravened the doctrine of constitutional avoidance, it also led the court to address questions that had not yet been fully developed. Federal courts do not answer such hypothetical questions. See Aetna Life Ins. Co. v. Haworth, 300 U.S. 227, 241, 57 S.Ct. 461, 81 L.Ed. 617 (1937) (Under Article III, judicial power is constrained to “real and substantial controvers[ies] admitting of specific relief through a decree of a conclusive character, as distinguished from an opinion advising what the law would be upon a hypothetical state of facts”); see also Bisbal–Ramos v. City of Mayaguez, 467 F.3d 16, 27 (1st Cir.2006) (vacating district court's reduction of compensatory damages, remanding so that court may issue remittitur, and refusing to address constitutionality of punitive damage award because, upon remand, plaintiff might opt for a new trial and “it would be premature ... to approve a punitive damages award based on the compensatory award from the first trial”).

[512] The path the court chose unnecessarily embroiled it in several issues of a constitutional dimension. The first was whether the due process standard for statutory damage awards articulated by the Supreme Court in Williams was applicable. The next was whether, if there was leeway and reason to bypass the Williams standard, the Gore standard, some combination of Williams and Gore, or some other standard should be used to evaluate whether the statutory damage award violated due process. We briefly describe the two due process standards to demonstrate the nature of the question to be avoided.

In Williams, the Supreme Court considered a challenge to an Arkansas statute that subjected railroads to penalties of “not less than fifty dollars, nor more than three hundred dollars and costs of suit,” for each offense of charging passengers fares that exceeded legal limits. See Williams, 251 U.S. at 64, 40 S.Ct. 71 (quoting Act April 4, 1887 (Laws 1887, p. 227; Kirby's Digest, 1904, § 6620); Act March 4, 1915 (Laws 1915, p. 365; Kirby & Castle's Digest, 1916, § 8094)) (internal quotation marks omitted). After the St. Louis, I.M. & S. Railroad collected a fare from two passengers of 66 cents more than the law allowed, the passengers brought suit pursuant to the statute. Id. at 63, 40 S.Ct. 71. Each passenger obtained a judgment of 75 dollars plus fees—an award, like the jury's award at issue here, well within the statutory range. Id. The railroad challenged the statutory award as unconstitutionally excessive under the Due Process Clause. Id.

The Court acknowledged that the Due Process Clause “places a limitation upon the power of the states to prescribe penalties for violations of their laws,” but noted that “States still possess a wide latitude of discretion in the matter.” Id. at 66, 40 S.Ct. 71. This is so, the court reasoned, because “the power of the State to impose fines and penalties for a violation of its statutory requirements is coeval with government; and the mode in which they shall be enforced, whether at the suit of a private party, or at the suit of the public, and what disposition shall be made of the amounts collected, are merely matters of legislative discretion.” Id. (quoting Mo. Pac. Ry. Co. v. Humes, 115 U.S. 512, 523, 6 S.Ct. 110, 29 L.Ed. 463 (1885)) (internal quotation marks omitted).

Given the latitude conferred upon legislatures to impose statutory penalties, the Court rejected the railroad's due process argument. The Court articulated that a statutory damage award violates due process only “where the penalty prescribed is so severe and oppressive as to be wholly disproportioned to the offense and obviously unreasonable.” Id. at 66–67, 40 S.Ct. 71.

Gore and its progeny address the related but distinct issue of when a jury's punitive damage award is so excessive as to violate due process. See Gore, 517 U.S. at 574, 116 S.Ct. 1589. The Court, animated by the principle that due process requires that civil defendants receive fair notice of the severity of the penalties their conduct might subject them to, id., identified three factors to guide a court's consideration of whether a punitive damage award is so excessive as to deprive a defendant of due process: (1) the degree of reprehensibility of the defendant's conduct, id. at 575–80, 116 S.Ct. 1589, (2) the ratio of the punitive award to the actual or potential harm suffered by the plaintiff, id. at 580–83, 116 S.Ct. 1589, and (3) the disparity between the punitive award issued by the jury and the civil or criminal penalties authorized in comparable cases, id. at 583–85, 116 S.Ct. 1589.

In Copyright Act award cases, there are many questions regarding the relationship [513] between Gore's guideposts for reviewing punitive damage awards and the Williams standard for reviewing statutory damage awards. One is the relationship between the purposes of statutory damages under the Copyright Act as opposed to the purpose of punitive damages. Another concerns the limits or contours of possible ranges of awards under the different standards. Further, both Williams and Gore concerned limitations on state-authorized awards of damages, and did not concern Congressionally set awards of damages, which Congress is authorized to do under its Article I powers. This fact in turn raises concerns about intrusion into Congress's power under Article 1, Section 8 of the Constitution.

We note that in Gore, the Supreme Court did not overrule Williams. See Rivers v. Roadway Express, Inc., 511 U.S. 298, 312, 114 S.Ct. 1510, 128 L.Ed.2d 274 (1994) (hierarchical relationship of Supreme Court to lower courts mandates that where “the Court has spoken, it is the duty of other courts to respect that understanding of the governing rule of law”). Nor has the Supreme Court to date suggested that the Gore guideposts should extend to constitutional review of statutory damage awards. The concerns regarding fair notice to the parties of the range of possible punitive damage awards present in Gore are simply not present in a statutory damages case where the statute itself provides notice of the scope of the potential award. And the only circuit court of which we are aware to directly address the issue declined to apply Gore in this context and instead applied the Williams test. See Zomba Enters., Inc. v. Panorama Records, Inc., 491 F.3d 574, 587 (6th Cir.2007). Cf. Parker v. Time Warner Entm't Co., 331 F.3d 13, 22 (2d Cir.2003) (suggesting, in dicta, that Gore might govern due process review of statutory damage awards).

Had the district court ordered remittitur and not reached the constitutional question, it would not have needed to consider these issues or determine the relevant standard for assessing the constitutionality of a Copyright Act statutory damage award.

A decision based on remittitur, under which a new trial must be granted if plaintiffs do not accept the remitted award, also would have avoided another complicated constitutional question, which we describe briefly.

That issue arises under the Seventh Amendment, and is whether a statutory damage award under the Copyright Act may be reduced without offering the plaintiffs a new trial.[25] Neither this court nor the Supreme Court has directly addressed the issue, but the Court's Feltner decision must be taken into account.

The usual rule for a general damage award is that a court may not reduce a jury's verdict and effectively impose a remittitur without affording a plaintiff “the option of a new trial when it enter[s] judgment for the reduced damages.” Hetzel v. Prince William Cnty., 523 U.S. 208, 211, 118 S.Ct. 1210, 140 L.Ed.2d 336 (1998); see also Dimick v. Schiedt, 293 U.S. 474, 486–87, 55 S.Ct. 296, 79 L.Ed. 603 (1935) (affirming remittitur power of courts but noting that where a verdict is set aside, the parties retain their right to have a jury determine the measure of damages); Kennon v. Gilmer, 131 U.S. 22, 29, 9 S.Ct. 696, 33 L.Ed. 110 (1889) (finding that under the [514] Seventh Amendment a court has no authority to reexamine facts determined by a jury, or to enter “according to its own estimate of the amount of damages which the plaintiff ought to have recovered ... an absolute judgment for any other sum than that assessed by the jury”). Citing Hetzel, we have held a trial court's reduction in compensatory damages must, to avoid Seventh Amendment error, allow the plaintiff a new trial. Bisbal–Ramos, 467 F.3d at 26 (reversing and remanding for consideration of remittitur where trial court had reduced compensatory damages without offering plaintiffs new trial).

By contrast, there is law indicating that a punitive damage award may be reduced on due process grounds (without offering plaintiffs a new trial) without running afoul of the Seventh Amendment. The Supreme Court's punitive damages jurisprudence suggests as much, but the question has not been directly addressed by the Court. See State Farm Mut. Auto. Ins. Co. v. Campbell, 538 U.S. 408, 123 S.Ct. 1513, 155 L.Ed.2d 585 (2003) (finding punitive damage award violated due process); Gore, 517 U.S. 559, 116 S.Ct. 1589 (same). Some circuits, including our own, have found that “a court may reduce an excessive award of punitive damages without giving the plaintiff the option of a new trial.” Bisbal–Ramos, 467 F.3d at 27 (collecting cases); see also Mendez–Matos v. Municipality of Guaynabo, 557 F.3d 36, 52 (1st Cir.2009) ( “If we find an award ‘grossly excessive,’ we may ascertain the amount of punitive award that is appropriate and order the district court to enter judgment in such amount.”). But neither Bisbal–Ramos nor Mendez–Matos decided the question as to a statutory damages award.[26]

In bypassing remittitur and reducing the jury's award without offering Sony a new trial, the district court assumed that statutory damage awards should be treated largely as punitive, not compensatory, awards for Seventh Amendment purposes. But statutory damages, unlike punitive damages, have both a compensatory and punitive element. See 17 U.S.C. § 504(c); Feltner, 523 U.S. at 352, 118 S.Ct. 1279 (“[A]n award of statutory damages [under § 504(c) ] may serve purposes traditionally associated with legal relief, such as compensation and punishment.”); F.W. Woolworth Co., 344 U.S. at 233, 73 S.Ct. 222 (“The statutory rule, formulated after long experience, not merely compels restitution of profit and reparation for injury but also is designed to discourage wrongful conduct.”).

Further, the Supreme Court's analysis of a different Seventh Amendment issue in Cooper Industries, Inc. v. Leatherman Tool Group, Inc., 532 U.S. 424, 437, 121 S.Ct. 1678, 149 L.Ed.2d 674 (2001) suggests that punitive damage awards do not implicate the Seventh Amendment for reasons that do not apply to statutory damage awards. In Cooper, the Court observed that the Seventh Amendment provides only that “no fact tried by a jury, shall be otherwise re-examined in any Court of the United States, than according to the rules of the common law,” U.S. Const. amend. VII (emphasis added), and reasoned that “the level of punitive damages is not really a ‘fact’ ‘tried’ by the jury,” Cooper Indus., 532 U.S. at 437, 121 S.Ct. 1678 (quoting Gasperini v. Ctr. for Humanities, Inc., 518 U.S. 415, 459, 116 S.Ct. 2211, 135 L.Ed.2d 659 (1996) (Scalia, J., dissenting)) (internal quotation mark omitted). But statutory damage awards are different. In Feltner, [515] the Supreme Court determined that “the Seventh Amendment provides a right to a jury trial on all issues pertinent to an award of statutory damages under § 504(c) of the Copyright Act, including the amount itself.” Feltner, 523 U.S. at 355, 118 S.Ct. 1279.

The point here is not for us to decide these issues, but merely to describe them to show the importance of adherence to the doctrine of constitutional avoidance. The courts of appeals are likewise bound by that doctrine, and we are required to apply it here.[27]

V.

Conclusion

This was a difficult and contentious case and the parties received a fair trial from an admirably patient and able district judge.

We affirm the finding of liability against Tenenbaum and in favor of plaintiffs. We affirm the injunctive relief. We have, inter alia, rejected Tenenbaum's arguments that the Copyright Act is unconstitutional under Feltner, 523 U.S. 340, 118 S.Ct. 1279, that the Act exempts so-called “consumer copying” infringement from liability and damages, that statutory damages under the Act are unavailable without a showing of actual harm, that the jury's instructions were in error, and his various trial error claims.

We vacate the district court's due process damages ruling and reverse the reduction of the jury's statutory damages award. We reinstate the jury's award of damages and remand for consideration of defendant's motion for common law remittitur based on excessiveness.[28]

If, on remand, the court allows any reduction through remittitur, then plaintiffs must be given the choice of a new trial or acceptance of remittitur.

So ordered.

Costs are awarded to plaintiffs.

[1] Tenenbaum argued that the statutory damages available under 17 U.S.C. § 504(c) are excessive so as to violate due process, and that the Copyright Act effectively creates an unconstitutional delegation of prosecutorial functions by creating a private right of action to enforce copyright protections. The second argument is not made on appeal.

[2] He argued a new trial should be granted on the grounds that the court had erred in rejecting Tenenbaum's fair use defense; that the court erred in its evidentiary ruling to exclude portions of a November 2005 letter from Tenenbaum in which he offered to destroy any illegally downloaded files as part of settlement negotiations; that the court's jury instructions were improper, primarily because they informed the jury of the statutory range for damages; and that statutory damages should not be available to Sony because Sony never offered evidence that they suffered more than nominal damages.

[3] A representative of Universal Music Group testified, “If the suggestion is that we could somehow give these [recordings] to people and tell them, do with them what you will, we lose complete control over our assets, we cannot make money off those assets, and that defeats the whole purpose of our existence.”

[4] We are aware of only one other action against an individual that has proceeded to trial. See Capitol Records, Inc. v. Thomas–Rasset, No. 06–1497, 799 F.Supp.2d 999, 2011 WL 3211362 (D.Minn. July 22, 2011).

[5] MediaSentry, the third party firm that Sony retained to identify individuals engaged in the illegal downloading and distribution of copyrighted recordings, discovered the 1153 songs in Tenenbaum's Kazaa shared-directory on August 10, 2004. MediaSentry then downloaded portions of 1148 of the 1153 files and verified that the files were the actual songs identified in each file's title, and that Tenenbaum had actually made copyrighted materials available for unauthorized copying.

[6] Tenenbaum contacted Sony as a result of the letter. While there were some settlement discussions, the parties were unable to resolve the matter.

[7] After receiving this letter, Tenenbaum nonetheless took his laptop computer for repairs and had its operating system reinstalled and its hard drive reformatted. At trial, Tenenbaum maintained that he only had work done on the computer because “the thing wouldn't run,” and that he instructed the computer repairman not to tamper with the music files stored on his computer.

[8] It is also clear that Congress continues to intend that the Copyright Act be fully operational as to statutory damages after Feltner. Congress amended § 504(c) after the Supreme Court had decided Feltner. See Digital Theft Deterrence and Copyright Damages Improvement Act of 1999, Pub. L. No. 106–160, 113 Stat. 1774 (amendment increasing the statutory damage boundaries). “Congress is presumed to be aware of ... [a] judicial interpretation of a statute and to adopt that interpretation if it re-enacts a statute without change.” Forest Grove Sch. Dist. v. T.A., 557 U.S. 230, 129 S.Ct. 2484, 2492, 174 L.Ed.2d 168 (2009) (quoting Lorillard v. Pons, 434 U.S. 575, 580, 98 S.Ct. 866, 55 L.Ed.2d 40 (1978)).

[9] Although in the district court Tenenbaum raised the argument that the Copyright Act does not extend to consumer conduct as a reason why the jury's statutory damage award should be reduced, he did not present the argument, as he does here, as a basis to exempt his actions from liability altogether.

[10] In the criminal infringement context, Congress has extended liability to, inter alia, those who infringe “for purposes of commercial advantage or private financial gain.” 17 U.S.C. § 506. Congress has made it clear, however, that this designation applies even absent direct monetary profit. See 17 U.S.C. § 101. It has defined “financial gain” to include “receipt, or expectation of receipt, of anything of value, including the receipt of other copyrighted works.” Id.

Under the “fair use” exception, which is not available to Tenenbaum, what constitutes a commercial use has also been interpreted broadly. See A & M Records, Inc. v. Napster, Inc., 239 F.3d 1004, 1015 (9th Cir.2001) ( “Direct economic benefit is not required to demonstrate a commercial use. Rather, repeated and exploitative copying of copyrighted works, even if the copies are not offered for sale, may constitute a commercial use.”).

[11] Sound recordings constitute “works of authorship” that receive copyright protection. See17 U.S.C. § 102(a)(7).

Tenenbaum implies that digital media should be treated differently than conventional music recordings. However, 17 U.S.C. § 102(a) makes no such distinction, and in fact explicitly provides that copyright protection exists “in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device.” (Emphasis added).

[12] Tenenbaum does not claim on appeal that his conduct falls under the fair use doctrine.

[13] See Sony Corp. of Am. v. Universal City Studios, Inc., 464 U.S. 417, 430 n. 11, 104 S.Ct. 774, 78 L.Ed.2d 574 (1984) (declining to express an opinion on scope of 1971 Act's exceptions for noncommercial uses).

[14] To take the point further, although the AHRA created immunity for some unauthorized, noncommercial uses of copyrighted materials, Congress explicitly declined to extend immunity to individuals who use home computers to copy copyrighted materials. See 17 U.S.C. § 1001(3); see also Recording Indus. Ass'n of Am. v. Diamond Multimedia Sys., Inc., 180 F.3d 1072, 1078 (9th Cir.1999) (“Under the plain meaning of the [AHRA's] definition of digital audio recording devices, computers (and their hard drives) are not digital audio recording devices because their ‘primary purpose’ is not to make digital audio copied recordings.”).

[15] Tenenbaum argues that the 1999 Amendment pre-dated the widespread use of peer-to-peer networking sites, and observes that the 1999 Digital Theft Deterrence Act was first introduced in May 1999, a full month before the launch of Napster's file sharing network. Again, the factual premise is wrong. The Act was not signed into law until December 1999, at which point Napster was itself operational.

Moreover, Congress had in 1997 already acknowledged the advent of “audio-compression” technologies that “permit[ ] infringers to transmit large volumes of CD-quality music over the internet” in enacting the No Electronic Theft Act, Pub. L. No. 105–147, 111 Stat. 2678. See H.R.Rep. No. 105–339, at 4 (1997), 1997 WL 664424, at *4.

[16] The statute at issue in L.A. Westermann Co. v. Dispatch Printing Co., 249 U.S. 100, 39 S.Ct. 194, 63 L.Ed. 499 (1919), contained the phrase “in lieu of actual damages.” By contrast, 17 U.S.C. § 504(c) provides that statutory damages are available “instead of actual damages and profits.” The point is the same.

[17] The statutory damage range was also set forth on the jury verdict form. “District courts have ‘considerable discretion about the formulation, nature, and scope of the issues' on a special verdict form.” Uphoff Figueroa v. Alejandro, 597 F.3d 423, 434 (1st Cir.2010) (quoting 9B Wright, Miller & Kane, Federal Practice and Procedure § 2506, at 119 (2d ed.1995)). Because we conclude that the district court did not err in instructing the jury of the statutory damage range under § 504(c), Tenenbaum's like challenge to the jury verdict form also fails.

[18] Citing psychological studies but not law, Tenenbaum argues that informing the jury of the statutory damage range was reasonably likely to have had an “anchoring effect” that erroneously skewed the jury's award determination.

[19] He argues that because Sony offered testimony regarding the harmful effects all filesharing, not just Tenenbaum's infringements, has had on the recording industry at large, and not only the named plaintiffs, the court was required to instruct the jury sua sponte to “consider only harms by the named defendant that flowed to the named plaintiffs.”

[20] Tenenbaum has twice waived this argument. First, we reject his assertion that he preserved it by offering the following proposed jury instructions: “While there may be evidence relating to other downloading and sharing, the only issue of infringement or fair use that is before you concerns these ... songs.... [Y]ou may only award damages, if any, as to those ... songs.” This did not inform the court that Tenenbaum sought an instruction regarding harm done by other infringers or suffered by other recording companies given that Tenenbaum engaged in other downloading and sharing beyond the thirty songs at issue. See Linn v. Andover Newton Theological Sch., Inc., 874 F.2d 1, 5 (1st Cir.1989) (“If there is a problem with the instructions, the judge must be told preciselywhat the problem is, and as importantly, what the attorney would consider a satisfactory cure.”)

Moreover, after the court gave the jury its instructions, Tenenbaum raised no objection on these grounds whatsoever. “[E]ven if the initial request is made in detail, the party who seeks but did not get the instruction must object again after the instructions are given but before the jury retires for deliberations.” Gray v. Genlyte Grp., Inc., 289 F.3d 128, 134 (1st Cir.2002).

[21] 17 U.S.C. § 504(c)(2)'s so-called “innocent infringement” provision does not lend support to Tenenbaum's theory that knowledge is an element for non-willful infringement under the Act. A defendant cannot prove that he or she qualifies for a reduction of damages under § 504(c)(2) merely by showing that he or she lacked knowledge that his or her actions constituted copyright infringement. Rather, a plaintiff may still recover the full measure of statutory damages available for non-willful infringement even against an unknowing infringer if the infringer had “ reason to believe that his or her acts constituted an infringement of copyright.” 17 U.S.C. § 504(c)(2) (emphasis added).

[22] On appeal, both Tenenbaum and Sony argue error, but neither challenges the district court's decision to bypass the question of common law remittitur. They instead focus on whether the court chose the correct due process standard to evaluate whether the award was so excessive as to violate the constitution. Tenenbaum argues the Gore factors provide the correct due process analysis and that even the reduced award violates due process under that standard. Sony argues that the Williams due process standard must apply, that under it the original award issued by the jury never violated due process, and that the district court erred in reducing the award.

[23] These reasons are based on assumptions, not facts. Sony could not have decided its course of action if remittitur were allowed unless it knew the amount. Further, if Sony chose a new trial on damages, no one knows what sum a new jury would award, or whether that award would be challenged as excessive.

[24] The district court also attempted to justify its decision to bypass remittitur by making certain rulings on the merits of the constitutional issue. For example, the district court reasoned that the “differences between the [Gore and Williams ] approaches are, in practice, minimal[,]” a disputed issue. Sony BMG Music Entm't v. Tenenbaum, 721 F.Supp.2d 85, 101 (D.Mass.2010).

[25] The Seventh Amendment provides that, “In Suits at common law, where the value in controversy shall exceed twenty dollars, the right of trial by jury shall be preserved, and no fact tried by a jury, shall be otherwise re-examined in any Court of the United States, than according to the rules of the common law.” U.S. Const. amend. VII.

[26] Additionally, some courts have suggested that even under Gore, a court must give plaintiff the option of a new trial when it reduces a punitive damages award on due process grounds. See S. Union Co. v. Irvin, 563 F.3d 788, 790 (9th Cir.2009); Lee v. Edwards, 101 F.3d 805, 813 (2d Cir.1996).

[27] Sony rather weakly asserts remittitur is not available where, as here, an award falls within a prescribed statutory range. We do not take as given the questionable proposition that in enacting the Copyright Act, Congress intended to eliminate the common law power of the courts to consider remittitur. Common law remittitur has roots deep in English and American jurisprudence. See Honda Motor Co. v. Oberg, 512 U.S. 415, 424–26, 114 S.Ct. 2331, 129 L.Ed.2d 336 (1994); Dimick v. Schiedt, 293 U.S. 474, 482–83, 55 S.Ct. 296, 79 L.Ed. 603 (1935) (citing Blunt v. Little,Fed.Cas. No. 1,578, 3 Mason 102 (1822) (Story, J.)). We see no reason to think Congress meant to override this aspect of the common law.

In the post-Feltner amendment of the Copyright Act, Congress said nothing evidencing an intent to eliminate remittitur. See Digital Theft Deterrence and Copyright Damages Improvement Act of 1999, Pub. L. No. 106–1060, 113 Stat. 1774. Congress is presumed to legislate incorporating background principles of common law unless it indicates to the contrary. See Bd. of Trs. of Leland Stanford Junior Univ. v. Roche Molecular Sys., Inc., ––– U.S. ––––, 131 S.Ct. 2188, 2196, 180 L.Ed.2d 1 (2011) (rejecting statutory interpretation that conflicts with “two centuries of patent law”); Astoria Fed. Sav. & Loan Ass'n v. Solimino, 501 U.S. 104, 109, 111 S.Ct. 2166, 115 L.Ed.2d 96 (1991) (“Congress is understood to legislate against a background of common-law adjudicatory principles.”). Further, the principle of remittitur is embodied in Federal Rule of Civil Procedure 59. Thus, the district court's decision not to consider remittitur as requested appears to be contrary to Congressional intent.

[28] If the district court determines that the jury's award does not merit common law remittitur, the court and the parties will have to address the relationship between the remittitur standard and the due process standard for statutory damage awards, should the issue continue to be raised.

6.5.6 Note on Tenenbaum and constitutional challenge to statutory damages 6.5.6 Note on Tenenbaum and constitutional challenge to statutory damages

In Sony BMG Entertainment v. Tenenbaum, 719 F.3d 67 (1st Cir. 2013), the court considered another appeal. On remand from the prior case, the district court held that:

1. Remittitur was not proper in this case, and

2. Copyright statutory damages did not violate constitutional due process.

Tenenbaum did not appeal the remittitur, but did appeal on constitutional grounds. The appeals court agreed with the district court (as it had hinted it would in its prior opinion) that statutory damages did not violate due process.

6.5.7 Copyright Act: 17 U.S. Code § 109 - Limitations on exclusive rights: Effect of transfer of particular copy or phonorecord 6.5.7 Copyright Act: 17 U.S. Code § 109 - Limitations on exclusive rights: Effect of transfer of particular copy or phonorecord

(a) Notwithstanding the provisions of section 106 (3), the owner of a particular copy or phonorecord lawfully made under this title, or any person authorized by such owner, is entitled, without the authority of the copyright owner, to sell or otherwise dispose of the possession of that copy or phonorecord. Notwithstanding the preceding sentence, copies or phonorecords of works subject to restored copyright under section 104A that are manufactured before the date of restoration of copyright or, with respect to reliance parties, before publication or service of notice under section 104A (e), may be sold or otherwise disposed of without the authorization of the owner of the restored copyright for purposes of direct or indirect commercial advantage only during the 12-month period beginning on—
(1) the date of the publication in the Federal Register of the notice of intent filed with the Copyright Office under section 104A (d)(2)(A), or
(2) the date of the receipt of actual notice served under section 104A (d)(2)(B),
whichever occurs first.
(b)
(1)
(A) Notwithstanding the provisions of subsection (a), unless authorized by the owners of copyright in the sound recording or the owner of copyright in a computer program (including any tape, disk, or other medium embodying such program), and in the case of a sound recording in the musical works embodied therein, neither the owner of a particular phonorecord nor any person in possession of a particular copy of a computer program (including any tape, disk, or other medium embodying such program), may, for the purposes of direct or indirect commercial advantage, dispose of, or authorize the disposal of, the possession of that phonorecord or computer program (including any tape, disk, or other medium embodying such program) by rental, lease, or lending, or by any other act or practice in the nature of rental, lease, or lending. Nothing in the preceding sentence shall apply to the rental, lease, or lending of a phonorecord for nonprofit purposes by a nonprofit library or nonprofit educational institution. The transfer of possession of a lawfully made copy of a computer program by a nonprofit educational institution to another nonprofit educational institution or to faculty, staff, and students does not constitute rental, lease, or lending for direct or indirect commercial purposes under this subsection.
(B) This subsection does not apply to—
(i) a computer program which is embodied in a machine or product and which cannot be copied during the ordinary operation or use of the machine or product; or
(ii) a computer program embodied in or used in conjunction with a limited purpose computer that is designed for playing video games and may be designed for other purposes.
(C) Nothing in this subsection affects any provision of chapter 9 of this title.
(2)
(A) Nothing in this subsection shall apply to the lending of a computer program for nonprofit purposes by a nonprofit library, if each copy of a computer program which is lent by such library has affixed to the packaging containing the program a warning of copyright in accordance with requirements that the Register of Copyrights shall prescribe by regulation.
(B) Not later than three years after the date of the enactment of the Computer Software Rental Amendments Act of 1990, and at such times thereafter as the Register of Copyrights considers appropriate, the Register of Copyrights, after consultation with representatives of copyright owners and librarians, shall submit to the Congress a report stating whether this paragraph has achieved its intended purpose of maintaining the integrity of the copyright system while providing nonprofit libraries the capability to fulfill their function. Such report shall advise the Congress as to any information or recommendations that the Register of Copyrights considers necessary to carry out the purposes of this subsection.
(3) Nothing in this subsection shall affect any provision of the antitrust laws. For purposes of the preceding sentence, “antitrust laws” has the meaning given that term in the first section of the Clayton Act and includes section 5 of the Federal Trade Commission Act to the extent that section relates to unfair methods of competition.
(4) Any person who distributes a phonorecord or a copy of a computer program (including any tape, disk, or other medium embodying such program) in violation of paragraph (1) is an infringer of copyright under section 501 of this title and is subject to the remedies set forth in sections 502503504, and 505. Such violation shall not be a criminal offense under section 506 or cause such person to be subject to the criminal penalties set forth in section 2319 of title 18.
(c) Notwithstanding the provisions of section 106 (5), the owner of a particular copy lawfully made under this title, or any person authorized by such owner, is entitled, without the authority of the copyright owner, to display that copy publicly, either directly or by the projection of no more than one image at a time, to viewers present at the place where the copy is located.
(d) The privileges prescribed by subsections (a) and (c) do not, unless authorized by the copyright owner, extend to any person who has acquired possession of the copy or phonorecord from the copyright owner, by rental, lease, loan, or otherwise, without acquiring ownership of it.
(e) Notwithstanding the provisions of sections 106 (4) and 106 (5), in the case of an electronic audiovisual game intended for use in coin-operated equipment, the owner of a particular copy of such a game lawfully made under this title, is entitled, without the authority of the copyright owner of the game, to publicly perform or display that game in coin-operated equipment, except that this subsection shall not apply to any work of authorship embodied in the audiovisual game if the copyright owner of the electronic audiovisual game is not also the copyright owner of the work of authorship.

6.5.8 Capitol Records, LLC v. ReDigi Inc. 6.5.8 Capitol Records, LLC v. ReDigi Inc.

This case shows the uphill battle companies face in the digital music market

934 F.Supp.2d 640

CAPITOL RECORDS, LLC, Plaintiff,
v.
ReDIGI INC., Defendant.

No. 12 Civ. 95(RJS).

United States District Court,
S.D. New York.

March 30, 2013.

Richard Stephen Mandel, Jonathan Zachary King, and Robert William Clarida of Cowan, Liebowitz & Latmant P.C., New York, NY, for Plaintiff.

Gary Philip Adelman of Davis Shapiro Lewit & Hayes LLP, New York, NY, for Defendant.

Memorandum and Order

RICHARD J. SULLIVAN, District Judge.

Capitol Records, LLC (Capitol), the recording label for such classic vinyls as [645] Frank Sinatra's Come Fly With Me and The Beatles' Yellow Submarine, brings this action against ReDigi Inc. (ReDigi), a twenty-first century technology company that touts itself as a virtual marketplace for pre-owned digital music. What has ensued in a fundamental clash over culture, policy, and copyright law, with Capitol alleging that ReDigi's web-based service amounts to copyright infringement in violation of the Copyright Act of 1976 (the Copyright Act), 17 U.S.C. 101 et seq. Now before the Court are Capitol's motion for partial summary judgment and ReDigi's motion for summary judgment, both filed pursuant to Federal Rule of Civil Procedure 56. Because this is a court of law and not a congressional subcommittee or technology blog, the issues are narrow, technical, and purely legal. Thus, for the reasons that follow, Capitol's motion is granted and ReDigi's motion is denied.

I. Background

A. Facts

ReDigi markets itself as the world's first and only online marketplace for digital used music. [1] (Capitol 56.1 Stmt., Doc. No. 50 (Cap. 56.1), 6.) Launched on October 13, 2011, ReDigi's website invites users to sell their legally acquired digital music files, and buy used digital music from others at a fraction of the price currently available on iTunes. ( Id. 6, 9.) Thus, much like used record stores, ReDigi permits its users to recoup value on their unwanted music. Unlike used record stores, however, ReDigi's sales take place entirely in the digital domain. ( See ReDigi Reply 56.1 Stmt., Doc. No. 83 (RD Rep. 56.1), 4 16.)

To sell music on ReDigi's website, a user must first download ReDigi's Media Manager to his computer. (ReDigi 56.1 Stmt., Doc. No. 56 (RD 56.1), 8.) Once installed, Media Manager analyzes the user's computer to build a list of digital music files eligible for sale. ( Id.) A file is eligible only if it was purchased on iTunes or from another ReDigi user; music downloaded from a CD or other file-sharing website is ineligible for sale. ( Id.) After this validation process, Media Manager continually runs on the user's computer and attached devices to ensure that the user has not retained music that has been sold or uploaded for sale. ( Id. 10.) However, Media Manager cannot detect copies stored in other locations. (Cap. 56.1 5961, 63; see Capitol Reply 56.1 Stmt., Doc. No. 78 (Cap. Rep. 56.1), 10.) If a copy is detected, Media Manager prompts the user to delete the file. (Cap. 56.1 64.) The file is not deleted automatically or involuntarily, though ReDigi's policy is to suspend the accounts of users who refuse to comply. ( Id.)

After the list is built, a user may upload any of his eligible files to ReDigi's Cloud Locker, an ethereal moniker for what is, in fact, merely a remote server in Arizona. (RD 56.1 9, 11; Cap. 56.1 22.) ReDigi's upload process is a source of contention between the parties. ( See RD 56.1 1423; Cap. Rep. 56.1 1423.) ReDigi asserts that the process involves migrating a user's file, packet by packetanalogous to a trainfrom the user's computer to the Cloud Locker so that data does not exist in two places at any one time.[2] (RD 56.1 14, 36.) Capitol asserts [646] that, semantics aside, ReDigi's upload process necessarily involves copying a file from the user's computer to the Cloud Locker. (Cap. Rep. 56.1 14.) Regardless, at the end of the process, the digital music file is located in the Cloud Locker and not on the user's computer. (RD 56.1 21.) Moreover, Media Manager deletes any additional copies of the file on the user's computer and connected devices. ( Id. 38.)

Once uploaded, a digital music file undergoes a second analysis to verify eligibility. (Cap. 56.1 3132.) If ReDigi determines that the file has not been tampered with or offered for sale by another user, the file is stored in the Cloud Locker, and the user is given the option of simply storing and streaming the file for personal use or offering it for sale in ReDigi's marketplace. ( Id. 3337.) If a user chooses to sell his digital music file, his access to the file is terminated and transferred to the new owner at the time of purchase. ( Id. 49.) Thereafter, the new owner can store the file in the Cloud Locker, stream it, sell it, or download it to her computer and other devices. ( Id. 50.) No money changes hands in these transactions. (RD Rep. 56.15 18.) Instead, users buy music with credits they either purchased from ReDigi or acquired from other sales. ( Id.) ReDigi credits, once acquired, cannot be exchanged for money. ( Id.) Instead, they can only be used to purchase additional music. ( Id.)

To encourage activity in its marketplace, ReDigi initially permitted users to preview thirty-second clips and view album cover art of songs posted for sale pursuant to a licensing agreement with a third party. ( See RD 56.1 7378.) However, shortly after its launch, ReDigi lost the licenses. ( Id.) Accordingly, ReDigi now sends users to either YouTube or iTunes to listen to and view this promotional material. ( Id. 77, 79.) ReDigi also offers its users a number of incentives. (Cap. 56.1 39.) For instance, ReDigi gives twenty-cent credits to users who post files for sale and enters active sellers into contests for prizes. ( Id. 39, 42.) ReDigi also encourages sales by advising new users via email that they can [c]ash in their music on the website, tracking and posting the titles of sought after songs on its website and in its newsletter, notifying users when they are low on credits and advising them to either purchase more credits or sell songs, and connecting users who are seeking unavailable songs with potential sellers. ( Id. 3948.)

Finally, ReDigi earns a fee for every transaction. ( Id. 54.) ReDigi's website prices digital music files at fifty-nine to seventy-nine cents each. ( Id. 55.) When users purchase a file, with credits, 20% of the sale price is allocated to the seller, 20% goes to an escrow fund for the artist, and 60% is retained by ReDigi.[3] ( Id.)

B. Procedural History

Capitol, which owns a number of the recordings sold on ReDigi's website, commenced [647] this action by filing the Complaint on January 6, 2012. ( See Complaint, dated Jan. 5, 2012, Doc. No. 1 (Compl.); Cap. 56.1 6873.) In its Complaint, Capitol alleges multiple violations of the Copyright Act, 17 U.S.C. 101, et seq., including direct copyright infringement, inducement of copyright infringement, contributory and vicarious copyright infringement, and common law copyright infringement. (Compl. 4488.) Capitol seeks preliminary and permanent injunctions of ReDigi's services, as well as damages, attorney's fees and costs, interest, and any other appropriate relief. ( Id. at 1718.) On February 6, 2012, the Court denied Capitol's motion for a preliminary injunction, finding that Capitol had failed to establish irreparable harm. (Doc. No. 26.)

On July 20, 2012, Capitol filed its motion for partial summary judgment on the claims that ReDigi directly and secondarily infringed Capitol's reproduction and distribution rights. (Doc. No. 48.) ReDigi filed its cross-motion the same day, seeking summary judgment on all grounds of liability, including ReDigi's alleged infringement of Capitol's performance and display rights.[4] (Doc. No. 54.) Both parties responded on August 14, 2012 and replied on August 24, 2012. (Doc. Nos. 76, 79, 87, 90.) The Court heard oral argument on October 5, 2012.

II. Legal Standard

Pursuant to Federal Rule of Civil Procedure 56(a), a court may not grant a motion for summary judgment unless the movant shows that there is no genuine dispute as to any material fact and the movant is entitled to judgment as a matter of law. Fed.R.Civ.P. 56(a); see Celotex Corp. v. Catrett, 477 U.S. 317, 32223, 106 S.Ct. 2548, 91 L.Ed.2d 265 (1986). The moving party bears the burden of showing that it is entitled to summary judgment. See Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 256, 106 S.Ct. 2505, 91 L.Ed.2d 202 (1986). The court is not to weigh evidence but is instead required to view the evidence in the light most favorable to the party opposing summary judgment, to draw all reasonable inferences in favor of that party, and to eschew credibility assessments. Amnesty Am. v. Town of W. Hartford, 361 F.3d 113, 122 (2d Cir.2004) (internal quotation marks omitted); accord Anderson, 477 U.S. at 249, 106 S.Ct. 2505. As such, if there is any evidence in the record from any source from which a reasonable inference in the [nonmoving party's] favor may be drawn, the moving party simply cannot obtain a summary judgment. Binder & Binder PC v. Barnhart, 481 F.3d 141, 148 (2d Cir.2007) (internal quotation marks omitted).

Inferences and burdens of proof on cross-motions for summary judgment are the same as those for a unilateral motion. See Straube v. Fla. Union Free Sch. Dist., 801 F.Supp. 1164, 1174 (S.D.N.Y.1992). That is, each cross-movant must present sufficient evidence to satisfy its burden of proof on all material facts. U.S. Underwriters Ins. Co. v. Roka LLC, No. 99 Civ. 10136(AGS), 2000 WL 1473607, at *3 (S.D.N.Y. Sept. 29, 2000); see Barhold v. Rodriguez, 863 F.2d 233, 236 (2d Cir.1988).

[648] III. Discussion

Section 106 of the Copyright Act grants the owner of copyright under this title certain exclusive rights, including the right to reproduce the copyrighted work in copies or phonorecords, to distribute copies or phonorecords of the copyrighted work to the public by sale or other transfer of ownership, and to publicly perform and display certain copyrighted works. 17 U.S.C. 106(1), (3)-(5). However, these exclusive rights are limited by several subsequent sections of the statute. Pertinently, Section 109 sets forth the first sale doctrine, which provides that the owner of a particular copy or phonorecord lawfully made under this title, or any person authorized by such owner, is entitled, without the authority of the copyright owner, to sell or otherwise dispose of the possession of that copy or phonorecord. Id. 109(a). The novel question presented in this action is whether a digital music file, lawfully made and purchased, may be resold by its owner through ReDigi under the first sale doctrine. The Court determines that it cannot.

A. Infringement of Capitol's Copyrights

To state a claim for copyright infringement, a plaintiff must establish that it owns a valid copyright in the work at issue and that the defendant violated one of the exclusive rights the plaintiff holds in the work. Twin Peaks Prods., Inc. v. Publ'ns Int'l, Ltd., 996 F.2d 1366, 1372 (2d Cir.1993) (citing Feist Publ'ns, Inc. v. Rural Tel. Serv. Co., 499 U.S. 340, 361, 111 S.Ct. 1282, 113 L.Ed.2d 358 (1991)). It is undisputed that Capitol owns copyrights in a number of the recordings sold on ReDigi's website. ( See Cap. 56.1 6873; RD Rep. 56.11819, 6873; Decl. of Richard S. Mandel, dated July 19, 2012, Doc. No. 52 (Mandel Decl.), 16, Ex. M; Decl. of Alasdair J. McMullan, dated July 19, 2012, Doc. No. 51 (McMullan Decl.), 35, Ex. 1.) It is also undisputed that Capitol did not approve the reproduction or distribution of its copyrighted recordings on ReDigi's website. Thus, if digital music files are reproduce[d] and distribute[d] on ReDigi's website within the meaning of the Copyright Act, Capitol's copyrights have been infringed.

1. Reproduction Rights

Courts have consistently held that the unauthorized duplication of digital music files over the Internet infringes a copyright owner's exclusive right to reproduce. See, e.g., A & M Records, Inc. v. Napster, Inc., 239 F.3d 1004, 1014 (9th Cir.2001). However, courts have not previously addressed whether the unauthorized transfer of a digital music file over the Internetwhere only one file exists before and after the transferconstitutes reproduction within the meaning of the Copyright Act. The Court holds that it does.

The Copyright Act provides that a copyright owner has the exclusive right to reproduce the copyrighted work in ... phonorecords. 17 U.S.C. 106(1) (emphasis added). Copyrighted works are defined to include, inter alia, sound recordings, which are works that result from the fixation of a series of musical, spoken, or other sounds. Id. 101. Such works are distinguished from their material embodiments. These include phonorecords, which are the material objects in which sounds ... are fixed by any method now known or later developed, and from which the sounds can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device. Id. 101 (emphasis added). Thus, the plain text of the Copyright Act makes clear that reproduction occurs when a copyrighted work is fixed in a new material object. [649] See Matthew Bender & Co., Inc. v. W. Pub. Co., 158 F.3d 693, 703 (2d Cir.1998).

The legislative history of the Copyright Act bolsters this reading. The House Report on the Copyright Act distinguished between sound recordings and phonorecords, stating that [t]he copyrightable work comprises the aggregation of sounds and not the tangible medium of fixation. Thus, sound recordings' as copyrightable subject matter are distinguished from phonorecords[,] the latter being physical objects in which sounds are fixed. H.R.Rep. No. 941476, at 56 (1976), 1976 U.S.C.C.A.N. 5659, 5669. Similarly, the House and Senate Reports on the Act both explained:

Read together with the relevant definitions in [S]ection 101, the right to reproduce the copyrighted work in copies or phonorecords means the right to produce a material object in which the work is duplicated, transcribed, imitated, or simulated in a fixed form from which it can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device.

Id. at 61, 1976 U.S.C.C.A.N. at 5675; S.Rep. No. 94473, at 58 (1975). Put differently, the reproduction right is the exclusive right to embody, and to prevent others from embodying, the copyrighted work (or sound recording) in a new material object (or phonorecord). See Nimmer on Copyright 8.02 (stating that in order to infringe the reproduction right, the defendant must embody the plaintiff's work in a material object ).

Courts that have dealt with infringement on peer-to-peer (P2P) file-sharing systems provide valuable guidance on the application of this right in the digital domain. For instance, in LondonSire Records, Inc. v. John Doe 1, the court addressed whether users of P2P software violated copyright owners' distribution rights. 542 F.Supp.2d 153, 166 & n. 16 (D.Mass.2008). Citing the material object requirement, the court expressly differentiated between the copyrighted workor digital music fileand the phonorecordor appropriate segment of the hard disk that the file would be embodied in following its transfer. Id. at 171. Specifically,

[w]hen a user on a [P2P] network downloads a song from another user, he receives into his computer a digital sequence representing the sound recording. That sequence is magnetically encoded on a segment of his hard disk (or likewise written on other media). With the right hardware and software, the downloader can use the magnetic sequence to reproduce the sound recording. The electronic file (or, perhaps more accurately, the appropriate segment of the hard disk) is therefore a phonorecord within the meaning of the statute.

Id. (emphasis added). Accordingly, when a user downloads a digital music file or digital sequence to his hard disk, the file is reproduce[d] on a new phonorecord within the meaning of the Copyright Act. Id.

This understanding is, of course, confirmed by the laws of physics. It is simply impossible that the same material object can be transferred over the Internet. Thus, logically, the court in LondonSire noted that the Internet transfer of a file results in a material object being created elsewhere at its finish. Id. at 173. Because the reproduction right is necessarily implicated when a copyrighted work is embodied in a new material object, and because digital music files must be embodied in a new material object following their transfer over the Internet, the Court determines that the embodiment of a digital music file on a new hard disk is a reproduction [650] within the meaning of the Copyright Act.

This finding holds regardless of whether one or multiple copies of the file exist. LondonSire, like all of the P2P cases, obviously concerned multiple copies of one digital music file. But that distinction is immaterial under the plain language of the Copyright Act. Simply put, it is the creation of a new material object and not an additional material object that defines the reproduction right. The dictionary defines reproduction to mean, inter alia, to produce again or to cause to exist again or anew. See MerriamWebster Collegiate Edition 994 (10th ed. 1998) (emphasis added). Significantly, it is not defined as to produce again while the original exists. Thus, the right to reproduce the copyrighted work in ... phonorecords is implicated whenever a sound recording is fixed in a new material object, regardless of whether the sound recording remains fixed in the original material object.

Given this finding, the Court concludes that ReDigi's service infringes Capitol's reproduction rights under any description of the technology. ReDigi stresses that it migrates a file from a user's computer to its Cloud Locker, so that the same file is transferred to the ReDigi server and no copying occurs.[5] However, even if that were the case, the fact that a file has moved from one material objectthe user's computerto anotherthe ReDigi servermeans that a reproduction has occurred. Similarly, when a ReDigi user downloads a new purchase from the ReDigi website to her computer, yet another reproduction is created. It is beside the point that the original phonorecord no longer exists. It matters only that a new phonorecord has been created.

ReDigi struggles to avoid this conclusion by pointing to C.M. Paula Co. v. Logan, a 1973 case from the Northern District of Texas where the defendant used chemicals to lift images off of greeting cards and place them on plaques for resale. 355 F.Supp. 189, 190 (N.D.Tex.1973); ( see ReDigi Mem. of Law, dated July 20, 2012, Doc. No. 55 (ReDigi Mem.), at 13). The court determined that infringement did not occur because should defendant desire to make one hundred ceramic plaques ..., defendant would be required to purchase one hundred separate ... prints. C.M. Paula, 355 F.Supp. at 191. ReDigi argues that, like the defendant in C.M. Paula, its users must purchase a song on iTunes in order to sell a song on ReDigi. (ReDigi Mem. 13.) Therefore, no duplication occurs. See C.M. Paula, 355 F.Supp. at 191 (internal quotation marks omitted). ReDigi's argument is unavailing. Ignoring the questionable merits of the court's holding in C.M. Paula, ReDigi's service is distinguishable from the process in that case. There, the copyrighted print, or material object, was lifted from the greeting card [651] and transferred in toto to the ceramic tile; no new material object was created. By contrast, ReDigi's service by necessity creates a new material object when a digital music file is either uploaded to or downloaded from the Cloud Locker.

ReDigi also argues that the Court's conclusion would lead to irrational outcomes, as it would render illegal any movement of copyrighted files on a hard drive, including relocating files between directories and defragmenting. (ReDigi Opp'n, dated Aug. 14, 2012, Doc. No. 79 (ReDigi Opp'n), at 8.) However, this argument is nothing more than a red herring. As Capitol has conceded, such reproduction is almost certainly protected under other doctrines or defenses, and is not relevant to the instant motion. (Cap. Reply, dated Aug. 24, 2012, Doc. No. 87 (Cap. Reply), at 5 n. 1.)

Accordingly, the Court finds that, absent the existence of an affirmative defense, the sale of digital music files on ReDigi's website infringes Capitol's exclusive right of reproduction.

2. Distribution Rights

In addition to the reproduction right, a copyright owner also has the exclusive right to distribute copies or phonorecords of the copyrighted work to the public by sale or other transfer of ownership. 17 U.S.C. 106(3). Like the court in LondonSire, the Court agrees that [a]n electronic file transfer is plainly within the sort of transaction that 106(3) was intended to reach [and] ... fit[s] within the definition of distribution of a phonorecord. LondonSire, 542 F.Supp.2d at 17374. For that reason, courts have not hesitated to find copyright infringement by distribution in cases of file-sharing or electronic transmission of copyrighted works. Arista Records LLC v. Greubel, 453 F.Supp.2d 961, 968 (N.D.Tex.2006) (collecting cases); see, e.g., Napster, 239 F.3d at 1014. Indeed, in New York Times Co., Inc. v. Tasini, the Supreme Court stated it was clear that an online news database violated authors' distribution rights by selling electronic copies of their articles for download. 533 U.S. 483, 498, 121 S.Ct. 2381, 150 L.Ed.2d 500 (2001).

There is no dispute that sales occurred on ReDigi's website. Capitol has established that it was able to buy more than one-hundred of its own recordings on ReDigi's webite, and ReDigi itself compiled a list of its completed sales of Capitol's recordings. (Cap. 56.1 6873; RD Rep. 56.1 6873.) ReDigi, in fact, does not contest that distribution occurs on its websiteit only asserts that the distribution is protected by the fair use and first sale defenses. ( See, e.g., ReDigi Opp'n 15 (noting that any distributions ... which occur on the ReDigi marketplace are protected).)

Accordingly, the Court concludes that, absent the existence of an affirmative defense, the sale of digital music files on ReDigi's website infringes Capitol's exclusive right of distribution.[6]

[652] 3. Performance and Display Rights

Finally, a copyright owner has the exclusive right, in the case of ... musical ... works, to perform the copyrighted work publicly. 17 U.S.C. 106(4). Public performance includes transmission to the public regardless of whether the members of the public ... receive it in the same place or in separate places and at the same time or at different times. Id. 101. Accordingly, audio streams are performances because a stream is an electronic transmission that renders the musical work audible as it is received by the client-computer's temporary memory. This transmission, like a television or radio broadcast, is a performance because there is a playing of the song that is perceived simultaneously with the transmission. United States v. Am. Soc. Of Composers, Authors, & Publishers, 627 F.3d 64, 74 (2d Cir.2010). To state a claim for infringement of the performance right, a plaintiff must establish that (1) the public performance or display of the copyrighted work was for profit, and (2) the defendant lacked authorization from the plaintiff or the plaintiff's representative. See Broad. Music, Inc. v., 315 W. 44th St. Rest. Corp., No. 93 Civ. 8082(MBM), 1995 WL 408399, at *2 (S.D.N.Y. July 11, 1995).

The copyright owner also has the exclusive right, in the case of ... pictorial [and] graphic ... works[,] ... to display the copyrighted work publicly. 17 U.S.C. 106(5). Public display includes show[ing] a copy of [a work], either directly or by means of a film, slide, television image, or any other device or process. Id. 101. The Ninth Circuit has held that the display of a photographic image on a computer may implicate the display right, though infringement hinges, in part, on where the image was hosted. Perfect 10, Inc. v. Amazon.com, Inc., 508 F.3d 1146, 1160 (9th Cir.2007).

Capitol alleges that ReDigi infringed its copyrights by streaming thirty-second song clips and exhibiting album cover art to potential buyers. (Compl. 2526.) ReDigi counters that it only posted such content pursuant to a licensing agreement and within the terms of that agreement. (ReDigi Mem. 2425.) ReDigi also asserts that it promptly removed the content when its licenses were terminated, and instead sent users to YouTube or iTunes for previews. ( Id.) Capitol, in response, claims that ReDigi's use violated the terms of those licenses and did not cease at the time the licenses were terminated. ( Compare RD 56.1 7379, with Cap. Rep. 56.1 7379.) As such, there are material disputes as to the source of the content, whether ReDigi was authorized to transmit the content, when authorization was or was not revoked, and when ReDigi ceased providing the content. Because the Court cannot determine whether ReDigi infringed Capitol's display and performance rights on the present record, ReDigi's motion for summary judgment on its alleged infringement of these exclusive rights is denied.

B. Affirmative Defenses

Having concluded that sales on ReDigi's website infringe Capitol's exclusive rights of reproduction and distribution, the Court turns to whether the fair use or first sale defenses excuse that infringement. For the reasons set forth below, the Court determines that they do not.

1. Fair Use

The ultimate test of fair use ... is whether the copyright law's goal of promot[ing] the Progress of Science and useful Arts' would be better served by allowing [653] the use than by preventing it. Castle Rock Entm't, Inc. v. Carol Publ'g Grp., Inc., 150 F.3d 132, 141 (2d Cir.1998) (quoting U.S. Const., art. I, 8, cl. 8). Accordingly, fair use permits reproduction of copyrighted work without the copyright owner's consent for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research. 17 U.S.C. 107. The list is not exhaustive but merely illustrates the types of copying typically embraced by fair use. Castle Rock Entm't, Inc., 150 F.3d at 141. In addition, four statutory factors guide courts' application of the doctrine. Specifically, courts look to:

(1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; (2) the nature of the copyrighted work; (3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and (4) the effect of the use upon the potential market for or value of the copyrighted work.

17 U.S.C. 107. Because fair use is an equitable rule of reason, courts are free to adapt the doctrine to particular situations on a case-by-case basis. Sony Corp. of Am. v. Universal City Studios, Inc., 464 U.S. 417, 448 n. 31, 104 S.Ct. 774, 78 L.Ed.2d 574 (1984) (quoting H. Rep. No. 941476, at 6566, 1976 U.S.C.C.A.N. at 56795680); see Iowa State Univ. Research Found., Inc. v. Am. Broad. Cos., 621 F.2d 57, 60 (2d Cir.1980).

On the record before it, the Court has little difficulty concluding that ReDigi's reproduction and distribution of Capitol's copyrighted works falls well outside the fair use defense. ReDigi obliquely argues that uploading to and downloading from the Cloud Locker for storage and personal use are protected fair use.[7] ( See ReDigi Mem. 15.) Significantly, Capitol does not contest that claim. ( See Tr. 12:823.) Instead, Capitol asserts only that uploading to and downloading from the Cloud Locker incident to sale fall outside the ambit of fair use. The Court agrees. See Arista Records, LLC v. Doe 3, 604 F.3d 110, 124 (2d Cir.2010) (rejecting application of fair use to user uploads and downloads on P2P file-sharing network).

Each of the statutory factors counsels against a finding of fair use. The first factor requires the Court to determine whether ReDigi's use transforms the copyrighted work and whether it is commercial. Campbell v. AcuffRose Music, Inc., 510 U.S. 569, 57879, 114 S.Ct. 1164, 127 L.Ed.2d 500 (1994). Both inquiries disfavor ReDigi's claim. Plainly, the upload, sale, and download of digital music files on ReDigi's website does nothing to add [ ] something new, with a further purpose or different character to the copyrighted works. Id.; see, e.g., Napster, 239 F.3d at 1015 (endorsing district court finding that downloading MP3 files does not transform the copyrighted work). ReDigi's use is also undoubtedly commercial. ReDigi and the uploading user directly profit from the sale of a digital music file, and the downloading user saves significantly on the price of the song in the primary market. See Harper & Row Publishers, Inc. v. Nation Enters., 471 U.S. 539, 562, 105 S.Ct. 2218, 85 L.Ed.2d 588 (1985) (The crux of the profit/nonprofit distinction is not whether the sole motive of the use is monetary gain but whether the user stands to profit from exploitation of the copyrighted material without paying [654] the customary price.). ReDigi asserts that downloads for personal, and not public or commercial, use must be characterized as ... noncommercial, nonprofit activity. (ReDigi Mem. 16 (quoting Sony, 464 U.S. at 449, 104 S.Ct. 774).) However, ReDigi twists the law to fit its facts. When a user downloads purchased files from the Cloud Locker, the resultant reproduction is an essential component of ReDigi's commercial enterprise. Thus, ReDigi's argument is unavailing.

The second factorthe nature of the copyrighted workalso weighs against application of the fair use defense, as creative works like sound recordings are close to the core of the intended copyright protection and far removed from the ... factual or descriptive work more amenable to fair use. UMG Recordings, Inc. v. MP3.Com, Inc., 92 F.Supp.2d 349, 351 (S.D.N.Y.2000) (alteration and internal quotation marks omitted) (citing Campbell, 510 U.S. at 586, 114 S.Ct. 1164). The third factorthe portion of the work copiedsuggests a similar outcome because ReDigi transmits the works in their entirety, negating any claim of fair use. Id. at 352, 114 S.Ct. 1164. Finally, ReDigi's sales are likely to undercut the market for or value of the copyrighted work and, accordingly, the fourth factor cuts against a finding of fair use. Cf. Arista Records, LLC v. Doe 3, 604 F.3d at 124 (rejecting application of fair use to P2P file sharing, in part, because the likely detrimental effect of file-sharing on the value of copyrighted compositions is well documented. (citing MetroGoldwynMayer Studios Inc. v. Grokster, Ltd., 545 U.S. 913, 923, 125 S.Ct. 2764, 162 L.Ed.2d 781 (2005))). The product sold in ReDigi's secondary market is indistinguishable from that sold in the legitimate primary market save for its lower price. The clear inference is that ReDigi will divert buyers away from that primary market. ReDigi incredibly argues that Capitol is preempted from making a market-based argument because Capitol itself condones downloading of its works on iTunes. (ReDigi Mem. 18.) Of course, Capitol, as copyright owner, does not forfeit its right to claim copyright infringement merely because it permits certain uses of its works. This argument, too, is therefore unavailing.

In sum, ReDigi facilitates and profits from the sale of copyrighted commercial recordings, transferred in their entirety, with a likely detrimental impact on the primary market for these goods. Accordingly, the Court concludes that the fair use defense does not permit ReDigi's users to upload and download files to and from the Cloud Locker incident to sale.

2. First Sale

The first sale defense, a common law principle recognized in BobbsMerrill Co. v. Straus, 210 U.S. 339, 350, 28 S.Ct. 722, 52 L.Ed. 1086 (1908) and now codified at Section 109(a) of the Copyright Act, provides that:

Notwithstanding the provisions of section 106(3), the owner of a particular copy or phonorecord lawfully made under this title, or any person authorized by such owner, is entitled, without the authority of the copyright owner, to sell or otherwise dispose of the possession of that copy or phonorecord.

17 U.S.C. 109. Under the first sale defense, once the copyright owner places a copyrighted item [here, a phonorecord] in the stream of commerce by selling it, he has exhausted his exclusive statutory right to control its distribution. Quality King Distribs., Inc. v. L'anza Research Int'l, Inc., 523 U.S. 135, 152, 118 S.Ct. 1125, 140 L.Ed.2d 254 (1998); see Kirtsaeng v. John Wiley & Sons, Inc., U.S. , 133 S.Ct. 1351, 135455, 185 L.Ed.2d 392 (2013).

[655] ReDigi asserts that its service, which involves the resale of digital music files lawfully purchased on iTunes, is protected by the first sale defense. (ReDigi Mem. 19.) The Court disagrees.

As an initial matter, it should be noted that the fair use defense is, by its own terms, limited to assertions of the distribution right.17 U.S.C. 109 (referencing Section 106(3)); see Nimmer on Copyright 8.12. Because the Court has concluded that ReDigi's service violates Capitol's reproduction right, the first sale defense does not apply to ReDigi's infringement of those rights. See Design Options v. BellePointe, Inc., 940 F.Supp. 86, 91 (S.D.N.Y.1996).

In addition, the first sale doctrine does not protect ReDigi's distribution of Capitol's copyrighted works. This is because, as an unlawful reproduction, a digital music file sold on ReDigi is not lawfully made under this title. 17 U.S.C. 109(a). Moreover, the statute protects only distribution by the owner of a particular copy or phonorecord ... of that copy or phonorecord. Id. Here, a ReDigi user owns the phonorecord that was created when she purchased and downloaded a song from iTunes to her hard disk. But to sell that song on ReDigi, she must produce a new phonorecord on the ReDigi server. Because it is therefore impossible for the user to sell her particular phonorecord on ReDigi, the first sale statute cannot provide a defense. Put another way, the first sale defense is limited to material items, like records, that the copyright owner put into the stream of commerce. Here, ReDigi is not distributing such material items; rather, it is distributing reproductions of the copyrighted code embedded in new material objects, namely, the ReDigi server in Arizona and its users' hard drives. The first sale defense does not cover this any more than it covered the sale of cassette recordings of vinyl records in a bygone era.

Rejecting such a conclusion, ReDigi argues that, because technological change has rendered its literal terms ambiguous, the Copyright Act must be construed in light of [its] basic purpose, namely, to incentivize creative work for the ultimate[ ] ... cause of promoting broad public availability of literature, music, and the other arts. Sony, 464 U.S. at 432, 104 S.Ct. 774 (quoting Twentieth Century Music Corp. v. Aiken, 422 U.S. 151, 156, 95 S.Ct. 2040, 45 L.Ed.2d 84 (1975)). Thus, ReDigi asserts that refusal to apply the first sale doctrine to its service would grant Capitol a Court sanctioned extension of rights under the [C]opyright [A]ct ... which is against policy, and should not be endorsed by this Court. (ReDigi Mem. 24.)

The Court disagrees. ReDigi effectively requests that the Court amend the statute to achieve ReDigi's broader policy goalsgoals that happen to advance ReDigi's economic interests. However, ReDigi's argument fails for two reasons. First, while technological change may have rendered Section 109(a) unsatisfactory to many contemporary observers and consumers, it has not rendered it ambiguous. The statute plainly applies to the lawful owner's particular phonorecord, a phonorecord that by definition cannot be uploaded and sold on ReDigi's website. Second, amendment of the Copyright Act in line with ReDigi's proposal is a legislative prerogative that courts are unauthorized and ill suited to attempt.

Nor are the policy arguments as straightforward or uncontested as ReDigi suggests. Indeed, when confronting this precise subject in its report on the Digital Millenium Copyright Act, 17 U.S.C. 512, the United States Copyright Office (the USCO) rejected extension of the first [656] sale doctrine to the distribution of digital works, noting that the justifications for the first sale doctrine in the physical world could not be imported into the digital domain. See USCO, Library of Cong., DMCA Section 104 Report (2001) (DMCA Report); see also Cartoon Network LP v. CSC Holdings, Inc., 536 F.3d 121, 129 (2d Cir.2008) (finding that the DMCA report is entitled to deference under Skidmore v. Swift & Co., 323 U.S. 134, 140, 65 S.Ct. 161, 89 L.Ed. 124 (1944)). For instance, the USCO stated that the impact of the [first sale] doctrine on copyright owners [is] limited in the off-line world by a number of factors, including geography and the gradual degradation of books and analog works. DMCA Report at xi. Specifically,

[p]hysical copies of works degrade with time and use, making used copies less desirable than new ones. Digital information does not degrade, and can be reproduced perfectly on a recipient's computer. The used copy is just as desirable as (in fact, is indistinguishable from) a new copy of the same work. Time, space, effort and cost no longer act as barriers to the movement of copies, since digital copies can be transmitted nearly instantaneously anywhere in the world with minimal effort and negligible cost. The need to transport physical copies of works, which acts as a natural brake on the effect of resales on the copyright owner's market, no longer exists in the realm of digital transmissions. The ability of such used copies to compete for market share with new copies is thus far greater in the digital world.

Id. at 8283 (footnotes omitted). Thus, while ReDigi mounts attractive policy arguments, they are not as one-sided as it contends.

Finally, ReDigi feebly argues that the Court's reading of Section 109(a) would in effect exclude digital works from the meaning of the statute. (ReDigi Mem. 21.) That is not the case. Section 109(a) still protects a lawful owner's sale of her particular phonorecord, be it a computer hard disk, iPod, or other memory device onto which the file was originally downloaded. While this limitation clearly presents obstacles to resale that are different from, and perhaps even more onerous than, those involved in the resale of CDs and cassettes, the limitation is hardly absurdthe first sale doctrine was enacted in a world where the ease and speed of data transfer could not have been imagined. There are many reasons, some discussed herein, for why such physical limitations may be desirable. It is left to Congress, and not this Court, to deem them outmoded.

Accordingly, the Court concludes that the first sale defense does not permit sales of digital music files on ReDigi's website.

C. Liability

Having determined that sales on ReDigi's website infringe Capitol's copyrights, the Court turns to whether ReDigi is directly and/or secondarily liable for that infringement. Direct liability requires volitional conduct that causes the reproduction or distribution to be made. See Cartoon Network, 536 F.3d at 131. Secondary infringement occurs when a defendant contributed to or benefitted from a third party's infringement such that it is just to hold the defendant accountable for the infringing activity. Sony, 464 U.S. at 435, 104 S.Ct. 774. For the reasons stated below, the Court finds that ReDigi directly and secondarily infringed Capitol's copyrights.

1. Direct Infringement

To be liable for direct infringement, a defendant must have engaged in [657] some volitional conduct sufficient to show that [it] actively violated one of the plaintiff's exclusive rights. Arista Records LLC v. Usenet.com, Inc., 633 F.Supp.2d 124, 148 (S.D.N.Y.2009). In other words, to establish direct liability under ... the Act, something more must be shown than mere ownership of a machine used by others to make illegal copies. There must be actual infringing conduct with a nexus sufficiently close and causal to the illegal copying that one could conclude that the machine owner himself trespassed on the exclusive domain of the copyright owner. Cartoon Network, 536 F.3d at 130 (quoting CoStar Group, Inc. v. LoopNet, Inc., 373 F.3d 544, 550 (4th Cir.2004)) (citing Religious Tech. Ctr. v. Netcom OnLine Commc'n Servs., Inc., 907 F.Supp. 1361, 1370 (N.D.Cal.1995)).

In Cartoon Network, the Second Circuit addressed whether the cable television provider Cablevision had directly infringed the plaintiff's copyrights by providing digital video recording devices to its customers. 536 F.3d 121. The court determined that it had not. Though Cablevision had design[ed], hous[ed], and maintain[ed] the recording devices, it was Cablevision's customers who made the copies and therefore directly infringed the plaintiff's reproduction rights. Id. at 13132. The court reasoned that, [i]n determining who actually makes' a copy, a significant difference exists between making a request to a human employee, who then volitionally operates the copying system to make the copy, and issuing a command directly to a system, which automatically obeys commands and engages in no volitional conduct. Id. at 131. However, the court allowed that a case may exist where one's contribution to the creation of an infringing copy [is] so great that it warrants holding that party directly liable for the infringement, even though another party has actually made the copy. Cartoon Network, 536 F.3d at 133.

On the record before it, the Court concludes that, if such a case could ever occur, it has occurred with ReDigi. ReDigi's founders built a service where only copyrighted work could be sold. Unlike Cablevision's programming, which offered a mix of protected and public television, ReDigi's Media Manager scans a user's computer to build a list of eligible files that consists solely of protected music purchased on iTunes. While that process is itself automated, absolving ReDigi of direct liability on that ground alone would be a distinction without a difference. The fact that ReDigi's founders programmed their software to choose copyrighted content satisfies the volitional conduct requirement and renders ReDigi's case indistinguishable from those where human review of content gave rise to direct liability. See Usenet.com, 633 F.Supp.2d at 148;Playboy Enters., Inc. v. Russ Hardenburgh, Inc., 982 F.Supp. 503, 51213 (N.D.Ohio 1997). Moreover, unlike Cablevision, ReDigi infringed both Capitol's reproduction and distribution rights. ReDigi provided the infrastructure for its users' infringing sales and affirmatively brokered sales by connecting users who are seeking unavailable songs with potential sellers. Given this fundamental and deliberate role, the Court concludes that ReDigi's conduct transform[ed] [it] from [a] passive provider[ ] of a space in which infringing activities happened to occur to [an] active participant[ ] in the process of copyright infringement. Usenet.com, 633 F.Supp.2d at 148. Accordingly, the Court grants Capitol's motion for summary judgment on its claims for ReDigi's direct infringement of its distribution and reproduction rights.[8]

[658] 2. Secondary Infringement

The Copyright Act does not expressly render anyone liable for infringement committed by another. Sony, 464 U.S. at 434, 104 S.Ct. 774. However, common law doctrines permit a court to impose secondary liability where just and appropriate. Id. at 435, 104 S.Ct. 774. Capitol asserts that ReDigi is secondarily liable for its users' direct infringement under three such doctrines: contributory infringement, inducement of infringement, and vicarious infringement. (Cap. Mem. 1316.) The Court agrees with respect to contributory and vicarious infringement, and therefore does not reach the inducement claim.

a. Contributory Infringement

Contributory infringement occurs where one ... with knowledge of the infringing activity, induces, causes or materially contributes to the infringing conduct of another. Arista Records, LLC v. Doe 3, 604 F.3d at 118 (quoting Gershwin Publ'g Corp. v. Columbia Artists Mgmt., Inc., 443 F.2d 1159, 1162 (2d Cir.1971)); see, e.g., Grokster, 545 U.S. at 930, 125 S.Ct. 2764. The knowledge requirement is objective and satisfied where the defendant knew or had reason to know of the infringing activity. See Arista Records, LLC v. Doe 3, 604 F.3d at 118. Further, the support must be more than a mere quantitative contribution to the primary infringement ... [, it] must be substantial. Usenet.com, 633 F.Supp.2d 124, 155 (S.D.N.Y.2009). However, even where a defendant's contribution is material, it may evade liability if its product is capable of substantial noninfringing uses. Sony, 464 U.S. at 442, 104 S.Ct. 774 (the SonyBetamax rule).

In weighing the knowledge requirement, courts consider evidence of actual and constructive knowledge, including cease-and-desist letters, officer and employee statements, promotional materials, and industry experience. See, e.g., Napster, 239 F.3d at 102021, 1027;Arista Records LLC v. Lime Grp. LLC, 784 F.Supp.2d at 432;Usenet.com, 633 F.Supp.2d at 155. In addition, courts have consistently found that material support existed where file-sharing systems provided the site and facilities for their users' infringement. Napster, 239 F.3d at 1022;see, e.g., Usenet.com, 633 F.Supp.2d at 155.

The Court has little difficulty concluding that ReDigi knew or should have known that its service would encourage infringement. Despite the fact that ReDigi boasted on its website that it was The Legal Alternative and insisted YES, ReDigi is LEGAL, ReDigi warned investors in its subscription agreements that the law cannot be said to be well-settled in this area and that it could not guarantee ReDigi would prevail on its copyright defenses. (Cap. 56.1 6566.) The Recording Industry Association of America (RIAA) sent ReDigi a cease-and-desist [659] letter in November 2011, advising ReDigi that its website violated Capitol's and other RIAA members' copyrights. (Compl. 41.) Further, ReDigi was ensnared in a licensing dispute over song clips and cover art shortly after its launch, plainly indicating that infringement could be afoot. (RD 56.1 7475, 77.) ReDigi was also, of course, aware that copyright protected content was being sold on its websitea fact central to its business model and promotional campaigns. (Cap. 56.1 7073). Finally, ReDigi's officers claim to have researched copyright law [and] consulted with attorneys concerning their service, and also to have met with record companies to get input, get marketing support[,] and enter into deals with the labels. (RD Rep. 56.12 5, 5 20.) By educating themselves, the officers presumably understood the likelihood that use of ReDigi's service would result in infringement. Indeed, though ReDigi attempts to use its consultations with counsel as a shield, it is telling that ReDigi declined to reveal any of the advice it received on the subject. ( See Cap. Reply 9). ReDigi's lone rebuttal to this surfeit of evidence could only be that it sincerely believed in the legality of its service. However, the Court has not found and will not create a subjective, good faith defense to contributory liability's objective knowledge requirement, and therefore concludes that, based on the objective facts, ReDigi was aware of its users' infringement.

The Court also finds that ReDigi materially contributed to its users' infringement. As ReDigi has admitted, more than any other website that permits the sale of music, ReDigi is intimately involved in examining the content that will be sold and supervising the steps involved in making the music available for sale and selling it. (Cap. 56.1 35; RD Rep. 56.115 35.) ReDigi thus provided the site and facilities for the direct infringement. See, e.g., Napster, 239 F.3d at 1022;Usenet.com, 633 F.Supp.2d at 155;Lime Grp., 784 F.Supp.2d at 434. Without ReDigi's Cloud Locker, no infringement could have occurred. Indeed, Media Manager ensured that only infringement occurred by limiting eligible files to iTunes tracks. Contrary to any conception of remote conduct, ReDigi's service was the hub and heart of its users' infringing activity.

The Court finally concludes that ReDigi's service is not capable of substantial noninfringing uses. The SonyBetamax rule requires a court to determine whether a product or service is capable of substantial noninfringing uses, not whether it is currently used in a non-infringing manner. Napster, 239 F.3d at 1021 (discussing Sony, 464 U.S. at 44243, 104 S.Ct. 774). But, put simply, ReDigi, by virtue of its design, is incapable of compliance with the law. ReDigi's business is built on the erroneous notion that the first sale defense permits the electronic resale of digital music. As such, ReDigi is built to trade only in copyright protected iTunes files. However, as determined above, ReDigi's legal argumentand therefore business modelis fundamentally flawed. Accordingly, to comply with the law, either the law or ReDigi must change. While ReDigi 2.0, 3.0, or 4.0 may ultimately be deemed to comply with copyright lawa finding the Court need not and does not now makeit is clear that ReDigi 1.0 does not. Given the fundamental disconnect between ReDigi and the Copyright Act, and ReDigi's failure to provide any evidence of present or potential noninfringing uses, the Court concludes that the SonyBetamax rule cannot save ReDigi from contributory liability.

Accordingly, the Court grants Capitol's motion for summary judgment on its claim [660] for ReDigi's contributory infringement of its distribution and reproduction rights.[9]

b. Vicarious Infringement

Vicarious liability for copyright infringement exists where the defendant has the right and ability to supervise the infringing activity and also has a direct financial interest in such activities. Napster, 239 F.3d at 1022 (quoting Gershwin Pub. Corp., 443 F.2d at 1162);see Grokster, 545 U.S. at 930, 125 S.Ct. 2764. Unlike contributory infringement, knowledge is not an element of vicarious liability. Gershwin, 443, F.2d at 1162;see Fonovisa, Inc. v. Cherry Auction Inc., 76 F.3d 259, 26263 (9th Cir.1996).

Clearly, ReDigi Vicariously infringed Capitol's copyrights. As discussed, ReDigi exercised complete control over its website's content, user access, and sales. Indeed, ReDigi admits that it is intimately involved in ... supervising the steps involved in making the music available for sale and selling it on the website. (Cap. 56.1 35; RD Rep. 56.1 35); see e.g., Lime Grp., 784 F.Supp.2d at 435 (finding right to supervise where P2P file sharing system could filter content and regulate users). In addition, ReDigi financially benefitted from every infringing sale when it collected 60% of each transaction fee. See e.g., Shapiro, Bernstein & Co. v. H.L. Green Co., 316 F.2d 304, 308 (2d Cir.1963) (finding a direct financial benefit where the defendant received a share of the gross receipts on every infringing sale). Notably, ReDigi failed to address any of these arguments in its opposition brief, instead insisting that it was not vicariously liable for infringement that occurred outside the ReDigi service, for instance, when a user Impermissibly retained files on his computer. ( See ReDigi Opp'n 2223.) However, this argument is inapposite to the instant motions. Accordingly, the Court grants Capitol's motion for summary judgment on its claim for ReDigi's vicarious infringement of its distribution and reproduction rights.

IV. Conclusion

At base, ReDigi seeks judicial amendment of the Copyright Act to reach its desired policy outcome. However, [s]ound policy, as well as history, supports [the Court's] consistent deference to Congress when major technological innovations alter the market for copyrighted materials. Congress has the constitutional authority and the institutional ability to accommodate fully the varied permutations of competing interests that are inevitably implicated by such new technology. Sony, 464 U.S. at 431, 104 S.Ct. 774. Such defence often counsels for a limited interpretation of copyright protection. However, here, the Court cannot of its own accord condone the wholesale application of the first sale defense to the digital sphere, particularly when Congress itself has declined to take that step. Accordingly, and for the reasons stated above, the Court GRANTS Capitol's motion for summary judgment on its claims for ReDigi's direct, [661] contributory, and vicarious infringement of its distribution and reproduction rights. The Court also DENIES ReDigi's motion in its entirety.

Because issues remain with respect to Capitol's performance and display rights, and ReDigi's secondary infringement of Capitol's common law copyrights, as well as damages, injunctive relief, and attorney's fees, IT IS HEREBY ORDERED THAT the parties shall submit a joint letter to the Court no later than April 12, 2013 concerning the next contemplated steps in this case.

The Clerk of Court is respectfully directed to terminate the motions pending at Doc. Nos. 48 and 54.

SO ORDERED.

[1] The facts are taken from the pleadings, the parties' Local Civil Rule 56.1 Statements, the affidavits submitted in connection with the instant motions, and the exhibits attached thereto. The facts are undisputed unless otherwise noted. Where one party's 56.1 Statement is cited, the other party does not dispute the fact asserted, has offered no admissible evidence to refute that fact, or merely objects to inferences drawn from that fact.

[2] A train was only one of many analogies used to describe ReDigi's service. At oral argument, the device was likened to the Star Trek transporterBeam me up, Scottyand Willy Wonka's teleportation device, Wonkavision. (Tr., dated Oct. 5, 2012 (Tr.), 10:212; 28:1520.)

[3] On June 11, 2012, ReDigi launched ReDigi 2.0, new software that, when installed on a user's computer, purportedly directs the user's new iTunes purchases to upload from iTunes directly to the Cloud Locker. (RD 56.1 4041.) Accordingly, while access may transfer from user to user upon resale, the file is never moved from its initial location in the Cloud Locker. ( Id. 4452.) However, because ReDigi 2.0 launched after Capitol filed the Complaint and mere days before the close of discovery, the Court will not consider it in this action. ( See Tr. 19:220:3.)

[4] ReDigi's arguments in this round of briefing differ markedly from those it asserted in opposition to Capitol's motion for a preliminary injunction. ( See ReDigi Opp'n to Prelim. Inj., dated Jan. 27, 2012, Doc. No. 14 (ReDigi Opp'n to PI).) For instance, ReDigi no longer asserts an essential step defense, nor does it argue that copying to the Cloud Locker for storage is protected by the fair use defense. ( Id. at 914.) ReDigi has also abandoned its argument that the Digital Millennium Copyright Act, 17 U.S.C. 512, bars Capitol's claim. ( Id. at 22.) As such, the Court will consider only those arguments made in the instant motions.

[5] It bears noting that ReDigi made numerous admissions to the contrary at the preliminary injunction stage. For instance, in its opposition to Capitol's motion, ReDigi stated that, The only copying which takes place in the ReDigi service occurs when a user uploads music files to the ReDigi Cloud, ... or downloads music files from the user's Cloud Locker. ( See ReDigi Opp'n to PI at 9 (emphasis added).) ReDigi also stated that, after a digital music file was uploaded to the Cloud Locker, the copy from which it was made was actually deleted from the user's machine. ( Id. at 14 (emphasis added).) ReDigi's officers made similar statements in their depositions, and ReDigi's patent application for its upload technology states that to be offered for sale, [a music file] is first copied to the remote server and stored on the disc. ( See Capitol Mem. of Law, dated July 20, 2012, Doc. No. 49 (Cap. Mem.), at 89, n. 6 (emphasis added).) But, as earlier stated, these semantic distinctions are immaterial as even ReDigi's most recent description of its service runs afoul of the Copyright Act.

[6] Capitol argues that ReDigi also violated its distribution rights simply by making Capitol's recordings available for sale to the public, regardless of whether a sale occurred. ( See Cap. Mem. 11 n. 8 (citing Hotaling v. Church of Jesus Christ of LatterDay Saints, 118 F.3d 199, 201 (4th Cir.1997))). However, a number of courts, including one in this district, have cast significant doubt on this make available theory of distribution. See, e.g., Elektra Entm't Grp., Inc. v. Barker, 551 F.Supp.2d 234, 243 (S.D.N.Y.2008) ([T]he support in the case law for the make available theory of liability is quite limited.); LondonSire, 542 F.Supp.2d at 169 ([T]he defendants cannot be liable for violating the plaintiffs' distribution right unless a distribution actually occurred.). In any event, because the Court concludes that actual sales on ReDigi's website infringed Capitol's distribution right, it does not reach this additional theory of liability.

[7] ReDigi's argument is, perhaps, a relic of the argument it previously levied that copying to the Cloud Locker is protected as space shifting under the fair use doctrine. ( See ReDigi Opp'n to PI at 10.)

[8] Capitol also asserts a claim for common law copyright infringement arising from sales of its pre1972 recordings on ReDigi's website. (Compl. 8288.) Capitol correctly argues in its memorandum that the elements for a direct infringement claim under federal law mirror those for infringement of common law copyright under state law. See Capitol Records, Inc. v. Naxos of Am., Inc., 4 N.Y.3d 540, 563, 797 N.Y.S.2d 352, 830 N.E.2d 250 (2005); (Cap. Mem. 4.) Accordingly, the Court also Court grants Capitol's motion for summary judgment with respect to ReDigi's direct infringement of Capitol's distribution and reproduction rights in its pre1972 recordings. However, because neither Capitol nor ReDigi addressed the question of secondary infringement of common law copyrights, the Court does not reach that claim.

[9] As noted above, Capitol has alleged a separate cause of action for inducement of infringement. (Compl. 5160.) Disagreement exists over whether inducement of infringement is a separate theory of liability for copyright infringement or merely a subset of contributory liability. Compare Flava Works, Inc. v. Gunter, 689 F.3d 754, 758 (7th Cir.2012) (describing inducement as a form of contributory infringement), with Lime Grp., 784 F.Supp.2d at 424 (In Grokster, the Supreme Court confirmed that inducement of copyright infringement constitutes a distinct cause of action.). Regardless, because the Court concludes that ReDigi is liable for contributing to its users' direct infringement of Capitol's copyrights, it does not reach Capitol's inducement claim.

6.6 OIL Casebook: Copyright Secondary Liability I 6.6 OIL Casebook: Copyright Secondary Liability I

6.6.1 Religious Technology Center v. Netcom On-line Communication Services, Inc. 6.6.1 Religious Technology Center v. Netcom On-line Communication Services, Inc.

This is a foundational case in secondary liability

907 F.Supp. 1361 (1995)

RELIGIOUS TECHNOLOGY CENTER, a California non-profit corporation; and Bridge Publications, Inc., a California non-profit corporation, Plaintiffs,
v.
NETCOM ON-LINE COMMUNICATION SERVICES, INC., a Delaware corporation; Dennis Erlich, an individual; and Tom Klemesrud, an individual, dba Clearwood Data Services, Defendants.

No. C-95-20091 RMW.

United States District Court, N.D. California.

November 21, 1995.

[1362] [1363] [1364] Helena K. Kobrin, North Hollywood, CA, Andrew H. Wilson, Wilson, Ryan & Campilongo, San Francisco, CA, Thomas M. Small, Janet A. Kobrin, Small, Larkin & Kiddé, Los Angeles, CA, Elliot J. Abelson, Los Angeles, CA, for Plaintiffs.

[1365] Randolf J. Rice, Pillsbury, Madison & Sutro, San Jose, CA, for Defendant Netcom On-Line Communication Services.

Harold J. McElhinny, Carla Oakley, Morrison & Foerster, San Francisco, CA, for Defendant Dennis Erlich.

Daniel Leipold, Hagenbaugh & Murphy, Orange, CA, for Defendant Tom Klemesrud.

ORDER DENYING DEFENDANT NETCOM'S MOTION FOR SUMMARY JUDGMENT; DENYING DEFENDANT KLEMESRUD'S MOTION FOR JUDGMENT ON THE PLEADINGS; AND DENYING PLAINTIFFS' MOTION FOR PRELIMINARY INJUNCTION AGAINST NETCOM AND KLEMESRUD

WHYTE, District Judge.

This case concerns an issue of first impression regarding intellectual property rights in cyberspace.[1] Specifically, this order addresses whether the operator of a computer bulletin board service ("BBS"), and the large Internet[2] access provider that allows that BBS to reach the Internet, should be liable for copyright infringement committed by a subscriber of the BBS.

Plaintiffs Religious Technology Center ("RTC") and Bridge Publications, Inc. ("BPI") hold copyrights in the unpublished and published works of L. Ron Hubbard, the late founder of the Church of Scientology ("the Church"). Defendant Dennis Erlich ("Erlich")[3] is a former minister of Scientology turned vocal critic of the Church, whose pulpit is now the Usenet newsgroup[4] alt.religion.scientology ("a.r.s."), an on-line forum for discussion and criticism of Scientology. Plaintiffs maintain that Erlich infringed their copyrights when he posted portions of their [1366] works on a.r.s. Erlich gained his access to the Internet through defendant Thomas Klemesrud's ("Klemesrud's") BBS "support.com." Klemesrud is the operator of the BBS, which is run out of his home and has approximately 500 paying users. Klemesrud's BBS is not directly linked to the Internet, but gains its connection through the facilities of defendant Netcom On-Line Communications, Inc. ("Netcom"), one of the largest providers of Internet access in the United States.

After failing to convince Erlich to stop his postings, plaintiffs contacted defendants Klemesrud and Netcom. Klemesrud responded to plaintiffs' demands that Erlich be kept off his system by asking plaintiffs to prove that they owned the copyrights to the works posted by Erlich. However, plaintiffs refused Klemesrud's request as unreasonable. Netcom similarly refused plaintiffs' request that Erlich not be allowed to gain access to the Internet through its system. Netcom contended that it would be impossible to prescreen Erlich's postings and that to kick Erlich off the Internet meant kicking off the hundreds of users of Klemesrud's BBS. Consequently, plaintiffs named Klemesrud and Netcom in their suit against Erlich, although only on the copyright infringement claims.[5]

On June 23, 1995, this court heard the parties' arguments on eight motions, three of which relate to Netcom and Klemesrud and are discussed in this order: (1) Netcom's motion for summary judgment; (2) Klemesrud's motion for judgment on the pleadings;[6] and (3) plaintiffs' motion for a preliminary injunction against Netcom and Klemesrud. For the reasons set forth below, the court grants in part and denies in part Netcom's motion for summary judgment and Klemesrud's motion for judgment on the pleadings and denies plaintiffs' motion for a preliminary injunction.

I. NETCOM'S MOTION FOR SUMMARY JUDGMENT OF NONINFRINGEMENT

A. Summary Judgment Standards

Because the court is looking beyond the pleadings in examining this motion, it will be treated as a motion for summary judgment rather than a motion to dismiss. Grove v. Mead School District, 753 F.2d 1528, 1532 (9th Cir.1985). Summary judgment is proper when "the pleadings, depositions, answers to interrogatories, and admissions on file, together with the affidavits, if any, show that there is no genuine issue as to any material fact and that the moving party is entitled to judgment as a matter of law." Fed.R.Civ.P. 56(c). There is a "genuine" issue of material fact only when there is sufficient evidence such that a reasonable juror could find for the party opposing the motion. Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 251-52, 106 S.Ct. 2505, 2511-12, 91 L.Ed.2d 202 (1986). Entry of summary judgment is mandated against a party if, after adequate time for discovery and upon motion, the party fails to make a showing sufficient to establish the existence of an element essential to that party's case, and on which that party will bear the burden of proof at trial. Celotex Corp. v. Catrett, 477 U.S. 317, 322, 106 S.Ct. 2548, 2552, 91 L.Ed.2d 265 (1986). The court, however, must draw all justifiable inferences in favor of the nonmoving parties, including questions of credibility and of the weight to be accorded particular evidence. Masson v. New Yorker Magazine, Inc., 501 U.S. 496, 520, 111 S.Ct. 2419, 2434-35, 115 L.Ed.2d 447 (1991).

B. Copyright Infringement

To establish a claim of copyright infringement, a plaintiff must demonstrate (1) ownership of a valid copyright and (2) "copying"[7] [1367] of protectable expression by the defendant. Baxter v. MCA, Inc., 812 F.2d 421, 423 (9th Cir.), cert. denied, 484 U.S. 954, 108 S.Ct. 346, 98 L.Ed.2d 372 (1987). Infringement occurs when a defendant violates one of the exclusive rights of the copyright holder. 17 U.S.C. § 501(a). These rights include the right to reproduce the copyrighted work, the right to prepare derivative works, the right to distribute copies to the public, and the right to publicly display the work. 17 U.S.C. §§ 106(1)-(3) & (5). The court has already determined that plaintiffs have established that they own the copyrights to all of the Exhibit A and B works, except item 4 of Exhibit A.[8] The court also found plaintiffs likely to succeed on their claim that defendant Erlich copied the Exhibit A and B works and was not entitled to a fair use defense. Plaintiffs argue that, although Netcom was not itself the source of any of the infringing materials on its system, it nonetheless should be liable for infringement, either directly, contributorily, or vicariously.[9] Netcom disputes these theories of infringement and further argues that it is entitled to its own fair use defense.

1. Direct Infringement

Infringement consists of the unauthorized exercise of one of the exclusive rights of the copyright holder delineated in section 106. 17 U.S.C. § 501. Direct infringement does not require intent or any particular state of mind,[10] although willfulness is relevant to the award of statutory damages. 17 U.S.C. § 504(c).

Many of the facts pertaining to this motion are undisputed. The court will address the relevant facts to determine whether a theory of direct infringement can be supported based on Netcom's alleged reproduction of plaintiffs' works. The court will look at one controlling Ninth Circuit decision addressing copying in the context of computers and two district court opinions addressing the liability of BBS operators for the infringing activities of subscribers. The court will additionally examine whether Netcom is liable for infringing plaintiffs' exclusive rights to publicly distribute and display their works.

a. Undisputed Facts

The parties do not dispute the basic processes that occur when Erlich posts his allegedly infringing messages to a.r.s. Erlich connects to Klemesrud's BBS using a telephone and a modem. Erlich then transmits his messages to Klemesrud's computer, where they are automatically briefly stored. According to a prearranged pattern established by Netcom's software, Erlich's initial act of posting a message to the Usenet results in the automatic copying of Erlich's message from Klemesrud's computer onto Netcom's computer and onto other computers on the Usenet. In order to ease transmission and for the convenience of Usenet users, Usenet servers maintain postings from newsgroups for a short period of time — eleven days for Netcom's system and three days for Klemesrud's system. Once on Netcom's computers, messages are available to Netcom's customers and Usenet neighbors, who may then download the messages to their [1368] own computers. Netcom's local server makes available its postings to a group of Usenet servers, which do the same for other servers until all Usenet sites worldwide have obtained access to the postings, which takes a matter of hours. Francis Decl. ¶ 5.

Unlike some other large on-line service providers, such as CompuServe, America Online, and Prodigy, Netcom does not create or control the content of the information available to its subscribers. It also does not monitor messages as they are posted. It has, however, suspended the accounts of subscribers who violated its terms and conditions, such as where they had commercial software in their posted files. Netcom admits that, although not currently configured to do this, it may be possible to reprogram its system to screen postings containing particular words or coming from particular individuals. Netcom, however, took no action after it was told by plaintiffs that Erlich had posted messages through Netcom's system that violated plaintiffs' copyrights, instead claiming that it could not shut out Erlich without shutting out all of the users of Klemesrud's BBS.

b. Creation of Fixed Copies

The Ninth Circuit addressed the question of what constitutes infringement in the context of storage of digital information in a computer's random access memory ("RAM"). MAI Systems Corp. v. Peak Computer, Inc., 991 F.2d 511, 518 (9th Cir.1993). In MAI, the Ninth Circuit upheld a finding of copyright infringement where a repair person, who was not authorized to use the computer owner's licensed operating system software, turned on the computer, thus loading the operating system into RAM for long enough to check an "error log." Id. at 518-19. Copyright protection subsists in original works of authorship "fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device." 17 U.S.C. § 102 (emphasis added). A work is "fixed" when its "embodiment in a copy ... is sufficiently permanent or stable to permit it to be perceived, reproduced, or otherwise communicated for a period of more than transitory duration." Id. § 101. MAI established that the loading of data from a storage device into RAM constitutes copying because that data stays in RAM long enough for it to be perceived. MAI Systems, 991 F.2d at 518.

In the present case, there is no question after MAI that "copies" were created, as Erlich's act of sending a message to a.r.s. caused reproductions of portions of plaintiffs' works on both Klemesrud's and Netcom's storage devices. Even though the messages remained on their systems for at most eleven days, they were sufficiently "fixed" to constitute recognizable copies under the Copyright Act. See Information Infrastructure Task Force, Intellectual Property and the National Information Infrastructure: The Report of the Working Group on Intellectual Property Rights 66 (1995) ("IITF Report").

c. Is Netcom Directly Liable for Making the Copies?

Accepting that copies were made, Netcom argues that Erlich, and not Netcom, is directly liable for the copying. MAI did not address the question raised in this case: whether possessors of computers are liable for incidental copies automatically made on their computers using their software as part of a process initiated by a third party. Netcom correctly distinguishes MAI on the ground that Netcom did not take any affirmative action that directly resulted in copying plaintiffs' works other than by installing and maintaining a system whereby software automatically forwards messages received from subscribers onto the Usenet, and temporarily stores copies on its system. Netcom's actions, to the extent that they created a copy of plaintiffs' works, were necessary to having a working system for transmitting Usenet postings to and from the Internet. Unlike the defendants in MAI, neither Netcom nor Klemesrud initiated the copying. The defendants in MAI turned on their customers' computers thereby creating temporary copies of the operating system, whereas Netcom's and Klemesrud's systems can operate without any human intervention. Thus, unlike MAI, the mere fact that Netcom's system incidentally makes temporary copies [1369] of plaintiffs' works does not mean Netcom has caused the copying.[11] The court believes that Netcom's act of designing or implementing a system that automatically and uniformly creates temporary copies of all data sent through it is not unlike that of the owner of a copying machine who lets the public make copies with it.[12] Although some of the people using the machine may directly infringe copyrights, courts analyze the machine owner's liability under the rubric of contributory infringement, not direct infringement. See, e.g., RCA Records v. All-Fast Systems, Inc., 594 F.Supp. 335 (S.D.N.Y.1984); 3 Melville B. Nimmer & David Nimmer, NIMMER ON COPYRIGHT § 12.04[A][2][b], at 12-78 to -79 (1995) ("NIMMER ON COPYRIGHT"); Elkin-Koren, supra, at 363 (arguing that "contributory infringement is more appropriate for dealing with BBS liability, first, because it focuses attention on the BBS-users relationship and the way imposing liability on BBS operators may shape this relationship, and second because it better addresses the complexity of the relationship between BBS operators and subscribers"). Plaintiffs' theory would create many separate acts of infringement and, carried to its natural extreme, would lead to unreasonable liability. It is not difficult to conclude that Erlich infringes by copying a protected work onto his computer and by posting a message to a newsgroup. However, plaintiffs' theory further implicates a Usenet server that carries Erlich's message to other servers regardless of whether that server acts without any human intervention beyond the initial setting up of the system. It would also result in liability for every single Usenet server in the worldwide link of computers transmitting Erlich's message to every other computer. These parties, who are liable under plaintiffs' theory, do no more [1370] than operate or implement a system that is essential if Usenet messages are to be widely distributed. There is no need to construe the Act to make all of these parties infringers. Although copyright is a strict liability statute, there should still be some element of volition or causation which is lacking where a defendant's system is merely used to create a copy by a third party.

Plaintiffs point out that the infringing copies resided for eleven days on Netcom's computer and were sent out from it onto the "Information Superhighway." However, under plaintiffs' theory, any storage of a copy that occurs in the process of sending a message to the Usenet is an infringement. While it is possible that less "damage" would have been done if Netcom had heeded plaintiffs' warnings and acted to prevent Erlich's message from being forwarded,[13] this is not relevant to its direct liability for copying. The same argument is true of Klemesrud and any Usenet server. Whether a defendant makes a direct copy that constitutes infringement cannot depend on whether it received a warning to delete the message. See D.C. Comics, Inc. v. Mini Gift, 912 F.2d 29, 35 (2d Cir.1990). This distinction may be relevant to contributory infringement, however, where knowledge is an element. See infra part I.B.2.a.

The court will now consider two district court opinions that have addressed the liability of BBS operators for infringing files uploaded by subscribers.

d. Playboy Case

Playboy Enterprises, Inc. v. Frena involved a suit against the operator of a small BBS whose system contained files of erotic pictures. 839 F.Supp. 1552, 1554 (M.D.Fla. 1993). A subscriber of the defendant's BBS had uploaded files containing digitized pictures copied from the plaintiff's copyrighted magazine, which files remained on the BBS for other subscribers to download. Id. The court did not conclude, as plaintiffs suggest in this case, that the BBS is itself liable for the unauthorized reproduction of plaintiffs' work; instead, the court concluded that the BBS operator was liable for violating the plaintiff's right to publicly distribute and display copies of its work. Id. at 1556-57.

In support of their argument that Netcom is directly liable for copying plaintiffs' works, plaintiffs cite to the court's conclusion that "[t]here is no dispute that [the BBS operator] supplied a product containing unauthorized copies of a copyrighted work. It does not matter that [the BBS operator] claims he did not make the copies [him]self." Id. at 1556. It is clear from the context of this discussion[14] that the Playboy court was looking only at the exclusive right to distribute copies to the public, where liability exists regardless of whether the defendant makes copies. Here, however, plaintiffs do not argue that Netcom is liable for its public distribution of copies. Instead, they claim that Netcom is liable because its computers in fact made copies. Therefore, the above-quoted language has no bearing on the issue of direct liability for unauthorized reproductions. Notwithstanding Playboy's holding that a BBS operator may be directly liable for distributing or displaying to the public copies of protected works,[15] this court holds [1371] that the storage on a defendant's system of infringing copies and retransmission to other servers is not a direct infringement by the BBS operator of the exclusive right to reproduce the work where such copies are uploaded by an infringing user. Playboy does not hold otherwise.[16]

e. Sega Case

A court in this district addressed the issue of whether a BBS operator is liable for copyright infringement where it solicited subscribers to upload files containing copyrighted materials to the BBS that were available for others to download. Sega Enterprises Ltd. v. MAPHIA, 857 F.Supp. 679, 683 (N.D.Cal.1994). The defendant's "MAPHIA" BBS contained copies of plaintiff Sega's video game programs that were uploaded by users. Id. at 683. The defendant solicited the uploading of such programs and received consideration for the right to download files. Id. Access was given for a fee or to those purchasing the defendant's hardware device that allowed Sega video game cartridges to be copied. Id. at 683-84. The court granted a preliminary injunction against the defendant, finding that plaintiffs had shown a prima facie case of direct and contributory infringement. Id. at 687. The court found that copies were made by unknown users of the BBS when files were uploaded and downloaded. Id. Further, the court found that the defendant's knowledge of the infringing activities, encouragement, direction and provision of the facilities through his operation of the BBS constituted contributory infringement, even though the defendant did not know exactly when files were uploaded or downloaded. Id. at 686-87.

This court is not convinced that Sega provides support for a finding of direct infringement where copies are made on a defendant's BBS by users who upload files. Although there is some language in Sega regarding direct infringement, it is entirely conclusory:

Sega has established a prima facie case of direct copyright infringement under 17 U.S.C. § 501. Sega has established that unauthorized copies of its games are made when such games are uploaded to the MAPHIA bulletin board, here with the knowledge of Defendant Scherman. These games are thereby placed on the storage media of the electronic bulletin board by unknown users.

Id. at 686 (emphasis added). The court's reference to the "knowledge of Defendant" indicates that the court was focusing on contributory infringement, as knowledge is not an element of direct infringement. Perhaps, Sega's references to direct infringement and that "copies ... are made" are to the direct liability of the "unknown users," as there can be no contributory infringement by a defendant without direct infringement by another. See 3 NIMMER ON COPYRIGHT § 12.04[A][3][a], at 12-89. Thus, the court finds that neither Playboy nor Sega requires finding Netcom liable for direct infringement of plaintiffs' exclusive right to reproduce their works.[17]

f. Public Distribution and Display?

Plaintiffs allege that Netcom is directly liable for making copies of their works. See FAC ¶ 25. They also allege that Netcom violated their exclusive rights to publicly display copies of their works. FAC ¶¶ 44, 51. There are no allegations that Netcom violated plaintiffs' exclusive right to publicly distribute their works. However, in their discussion of direct infringement, plaintiffs insist that Netcom is liable for "maintain[ing] copies of [Erlich's] messages on its server for eleven days for access by its subscribers and `USENET neighbors'" and they compare this case to the Playboy case, which discussed [1372] the right of public distribution. Opp'n at 7. Plaintiffs also argued this theory of infringement at oral argument. Tr.[18] 5:22. Because this could be an attempt to argue that Netcom has infringed plaintiffs' rights of public distribution and display, the court will address these arguments.

Playboy concluded that the defendant infringed the plaintiff's exclusive rights to publicly distribute and display copies of its works. 839 F.Supp. at 1556-57. The court is not entirely convinced that the mere possession of a digital copy on a BBS that is accessible to some members of the public constitutes direct infringement by the BBS operator. Such a holding suffers from the same problem of causation as the reproduction argument. Only the subscriber should be liable for causing the distribution of plaintiffs' work, as the contributing actions of the BBS provider are automatic and indiscriminate. Erlich could have posted his messages through countless access providers and the outcome would be the same: anyone with access to Usenet newsgroups would be able to read his messages. There is no logical reason to draw a line around Netcom and Klemesrud and say that they are uniquely responsible for distributing Erlich's messages. Netcom is not even the first link in the chain of distribution — Erlich had no direct relationship with Netcom but dealt solely with Klemesrud's BBS, which used Netcom to gain its Internet access. Every Usenet server has a role in the distribution, so plaintiffs' argument would create unreasonable liability. Where the BBS merely stores and passes along all messages sent by its subscribers and others, the BBS should not be seen as causing these works to be publicly distributed or displayed.

Even accepting the Playboy court's holding, the case is factually distinguishable. Unlike the BBS in that case, Netcom does not maintain an archive of files for its users. Thus, it cannot be said to be "suppl[ying] a product." In contrast to some of its larger competitors, Netcom does not create or control the content of the information available to its subscribers; it merely provides access to the Internet, whose content is controlled by no single entity. Although the Internet consists of many different computers networked together, some of which may contain infringing files, it does not make sense to hold the operator of each computer liable as an infringer merely because his or her computer is linked to a computer with an infringing file. It would be especially inappropriate to hold liable a service that acts more like a conduit, in other words, one that does not itself keep an archive of files for more than a short duration. Finding such a service liable would involve an unreasonably broad construction of public distribution and display rights. No purpose would be served by holding liable those who have no ability to control the information to which their subscribers have access, even though they might be in some sense helping to achieve the Internet's automatic "public distribution" and the users' "public" display of files.

g. Conclusion

The court is not persuaded by plaintiffs' argument that Netcom is directly liable for the copies that are made and stored on its computer. Where the infringing subscriber is clearly directly liable for the same act, it does not make sense to adopt a rule that could lead to the liability of countless parties whose role in the infringement is nothing more than setting up and operating a system that is necessary for the functioning of the Internet. Such a result is unnecessary as there is already a party directly liable for causing the copies to be made. Plaintiffs occasionally claim that they only seek to hold liable a party that refuses to delete infringing files after they have been warned. However, such liability cannot be based on a theory of direct infringement, where knowledge is irrelevant. The court does not find workable a theory of infringement that would hold the entire Internet liable for activities that cannot reasonably be deterred. Billions of bits of data flow through the Internet and are necessarily stored on servers throughout the network and it is thus practically impossible [1373] to screen out infringing bits from noninfringing bits. Because the court cannot see any meaningful distinction (without regard to knowledge) between what Netcom did and what every other Usenet server does, the court finds that Netcom cannot be held liable for direct infringement. Cf. IITF Report at 69 (noting uncertainty regarding whether BBS operator should be directly liable for reproduction or distribution of files uploaded by a subscriber).[19]

2. Contributory Infringement

Netcom is not free from liability just because it did not directly infringe plaintiffs' works; it may still be liable as a contributory infringer. Although there is no statutory rule of liability for infringement committed by others,

[t]he absence of such express language in the copyright statute does not preclude the imposition of liability for copyright infringement on certain parties who have not themselves engaged in the infringing activity. For vicarious liability is imposed in virtually all areas of the law, and the concept of contributory infringement is merely a species of the broader problem of identifying the circumstances in which it is just to hold one individual accountable for the actions of another.

Sony Corp. v. Universal City Studios, Inc., 464 U.S. 417, 435, 104 S.Ct. 774, 785, 78 L.Ed.2d 574 (1984) (footnote omitted). Liability for participation in the infringement will be established where the defendant, "with knowledge of the infringing activity, induces, causes or materially contributes to the infringing conduct of another." Gershwin Publishing Corp. v. Columbia Artists Management, Inc., 443 F.2d 1159, 1162 (2d Cir.1971).

a. Knowledge of Infringing Activity

Plaintiffs insist that Netcom knew that Erlich was infringing their copyrights at least after receiving notice from plaintiffs' counsel indicating that Erlich had posted copies of their works onto a.r.s. through Netcom's system. Despite this knowledge, Netcom continued to allow Erlich to post messages to a.r.s. and left the allegedly infringing messages on its system so that Netcom's subscribers and other Usenet servers could access them. Netcom argues that it did not possess the necessary type of knowledge because (1) it did not know of Erlich's planned infringing activities when it agreed to lease its facilities to Klemesrud, (2) it did not know that Erlich would infringe prior to any of his postings, (3) it is unable to screen out infringing postings before they are made, and (4) its knowledge of the infringing nature of Erlich's postings was too equivocal given the difficulty in assessing whether the registrations were valid and whether Erlich's use was fair. The court will address these arguments in turn.

Netcom cites cases holding that there is no contributory infringement by the lessors of premises that are later used for infringement unless the lessor had knowledge of the intended use at the time of the signing of the lease. See, e.g. Deutsch v. Arnold, 98 F.2d 686, 688 (2d Cir.1938).[20] The contribution to the infringement by the defendant in Deutsch was merely to lease use of the premises to the infringer. Here, Netcom not only leases space but also serves as an access provider, which includes the storage and transmission of information necessary to facilitate [1374] Erlich's postings to a.r.s. Unlike a landlord, Netcom retains some control over the use of its system. See infra part I.B.3.a. Thus, the relevant time frame for knowledge is not when Netcom entered into an agreement with Klemesrud. It should be when Netcom provided its services to allow Erlich to infringe plaintiffs' copyrights. Cf. Screen Gems-Columbia Music, Inc. v. Mark-Fi Records, Inc., 256 F.Supp. 399, 403 (S.D.N.Y. 1966) (analyzing knowledge at time that defendant rendered its particular service). It is undisputed that Netcom did not know that Erlich was infringing before it received notice from plaintiffs. Netcom points out that the alleged instances of infringement occurring on Netcom's system all happened prior to December 29, 1994, the date on which Netcom first received notice of plaintiffs' infringement claim against Erlich. See Pisani Feb. 8, 1995 Decl., ¶ 6 & Exs. (showing latest posting made on December 29, 1994); McShane Feb. 8, 1995 Decl.; FAC ¶¶ 36-38 & Ex. I. Thus, there is no question of fact as to whether Netcom knew or should have known of Erlich's infringing activities that occurred more than 11 days before receipt of the December 28, 1994 letter.

However, the evidence reveals a question of fact as to whether Netcom knew or should have known that Erlich had infringed plaintiffs' copyrights following receipt of plaintiffs' letter. Because Netcom was arguably participating in Erlich's public distribution of plaintiffs' works, there is a genuine issue as to whether Netcom knew of any infringement by Erlich before it was too late to do anything about it. If plaintiffs can prove the knowledge element, Netcom will be liable for contributory infringement since its failure to simply cancel Erlich's infringing message and thereby stop an infringing copy from being distributed worldwide constitutes substantial participation in Erlich's public distribution of the message. Cf. R.T. Nimmer, THE LAW OF COMPUTER TECHNOLOGY ¶ 15.11B, at S15-42 (2d ed. 1994) (opining that "where information service is less directly involved in the enterprise of creating unauthorized copies, a finding of contributory infringement is not likely").

Netcom argues that its knowledge after receiving notice of Erlich's alleged infringing activities was too equivocal given the difficulty in assessing whether registrations are valid and whether use is fair. Although a mere unsupported allegation of infringement by a copyright owner may not automatically put a defendant on notice of infringing activity, Netcom's position that liability must be unequivocal is unsupportable. While perhaps the typical infringing activities of BBSs will involve copying software, where BBS operators are better equipped to judge infringement, the fact that this involves written works should not distinguish it. Where works contain copyright notices within them, as here, it is difficult to argue that a defendant did not know that the works were copyrighted. To require proof of valid registrations would be impractical and would perhaps take too long to verify, making it impossible for a copyright holder to protect his or her works in some cases, as works are automatically deleted less than two weeks after they are posted. The court is more persuaded by the argument that it is beyond the ability of a BBS operator to quickly and fairly determine when a use is not infringement where there is at least a colorable claim of fair use. Where a BBS operator cannot reasonably verify a claim of infringement, either because of a possible fair use defense, the lack of copyright notices on the copies, or the copyright holder's failure to provide the necessary documentation to show that there is a likely infringement, the operator's lack of knowledge will be found reasonable and there will be no liability for contributory infringement for allowing the continued distribution of the works on its system.

Since Netcom was given notice of an infringement claim before Erlich had completed his infringing activity, there may be a question of fact as to whether Netcom knew or should have known that such activities were infringing. Given the context of a dispute between a former minister and a church he is criticizing, Netcom may be able to show that its lack of knowledge that Erlich was infringing was reasonable. However, Netcom admits that it did not even look at the postings once given notice and that had it looked at the copyright notice and statements [1375] regarding authorship, it would have triggered an investigation into whether there was infringement. Kobrin June 7, 1995 Decl., Ex. H, Hoffman Depo. At 125-128. These facts are sufficient to raise a question as to Netcom's knowledge once it received a letter from plaintiffs on December 29, 1994.[21]

b. Substantial Participation

Where a defendant has knowledge of the primary infringer's infringing activities, it will be liable if it "induces, causes or materially contributes to the infringing conduct of" the primary infringer. Gershwin Publishing, 443 F.2d at 1162. Such participation must be substantial. Apple Computer, Inc. v. Microsoft Corp., 821 F.Supp. 616, 625 (N.D.Cal.1993), aff'd, 35 F.3d 1435 (9th Cir. 1994); Demetriades v. Kaufmann, 690 F.Supp. 289, 294 (S.D.N.Y.1988).

Providing a service that allows for the automatic distribution of all Usenet postings, infringing and noninfringing, goes well beyond renting a premises to an infringer. See Fonovisa, Inc. v. Cherry Auction, Inc., 847 F.Supp. 1492, 1496 (E.D.Cal.1994) (finding that renting space at swap meet to known bootleggers not "substantial participation" in the infringers' activities). It is more akin to the radio stations that were found liable for rebroadcasting an infringing broadcast. See, e.g., Select Theatres Corp. v. Ronzoni Macaroni Corp., 59 U.S.P.Q. 288, 291 (S.D.N.Y.1943). Netcom allows Erlich's infringing messages to remain on its system and be further distributed to other Usenet servers worldwide. It does not completely relinquish control over how its system is used, unlike a landlord. Thus, it is fair, assuming Netcom is able to take simple measures to prevent further damage to plaintiffs' copyrighted works, to hold Netcom liable for contributory infringement where Netcom has knowledge of Erlich's infringing postings yet continues to aid in the accomplishment of Erlich's purpose of publicly distributing the postings. Accordingly, plaintiffs do raise a genuine issue of material fact as to their theory of contributory infringement as to the postings made after Netcom was on notice of plaintiffs' infringement claim.

3. Vicarious Liability

Even if plaintiffs cannot prove that Netcom is contributorily liable for its participation in the infringing activity, it may still seek to prove vicarious infringement based on Netcom's relationship to Erlich. A defendant is liable for vicarious liability for the actions of a primary infringer where the defendant (1) has the right and ability to control the infringer's acts and (2) receives a direct financial benefit from the infringement. See Shapiro, Bernstein & Co. v. H.L. Green Co., 316 F.2d 304, 306 (2d Cir.1963). Unlike contributory infringement, knowledge is not an element of vicarious liability. 3 NIMMER ON COPYRIGHT § 12.04[A][1], at 12-70.

a. Right and Ability To Control

The first element of vicarious liability will be met if plaintiffs can show that Netcom has the right and ability to supervise the conduct of its subscribers. Netcom argues that it does not have the right to control its users' postings before they occur. Plaintiffs dispute this and argue that Netcom's terms and conditions, to which its subscribers[22] must agree, specify that Netcom reserves the right to take remedial action against subscribers. See, e.g., Francis Depo. at 124-126. Plaintiffs argue that under "netiquette," the informal rules and customs that have developed on the Internet, violation of copyrights by a user is unacceptable and the access provider has a duty take measures to prevent this; where the immediate service [1376] provider fails, the next service provider up the transmission stream must act. See Castleman Decl. ¶¶ 32-43. Further evidence of Netcom's right to restrict infringing activity is its prohibition of copyright infringement and its requirement that its subscribers indemnify it for any damage to third parties. See Kobrin May 5, 1995 Decl., Ex. G. Plaintiffs have thus raised a question of fact as to Netcom's right to control Erlich's use of its services.

Netcom argues that it could not possibly screen messages before they are posted given the speed and volume of the data that goes through its system. Netcom further argues that it has never exercised control over the content of its users' postings. Plaintiffs' expert opines otherwise, stating that with an easy software modification Netcom could identify postings that contain particular words or come from particular individuals. Castleman Decl. ¶¶ 39-43; see also Francis Depo. at 262-63; Hoffman Depo. at 173-74, 178.[23] Plaintiffs further dispute Netcom's claim that it could not limit Erlich's access to Usenet without kicking off all 500 subscribers of Klemesrud's BBS. As evidence that Netcom has in fact exercised its ability to police its users' conduct, plaintiffs cite evidence that Netcom has acted to suspend subscribers' accounts on over one thousand occasions. See Ex. J (listing suspensions of subscribers by Netcom for commercial advertising, posting obscene materials, and off-topic postings). Further evidence shows that Netcom can delete specific postings. See Tr. 9:16. Whether such sanctions occurred before or after the abusive conduct is not material to whether Netcom can exercise control. The court thus finds that plaintiffs have raised a genuine issue of fact as to whether Netcom has the right and ability to exercise control over the activities of its subscribers, and of Erlich in particular.

b. Direct Financial Benefit

Plaintiffs must further prove that Netcom receives a direct financial benefit from the infringing activities of its users. For example, a landlord who has the right and ability to supervise the tenant's activities is vicariously liable for the infringements of the tenant where the rental amount is proportional to the proceeds of the tenant's sales. Shapiro, Bernstein, 316 F.2d at 306. However, where a defendant rents space or services on a fixed rental fee that does not depend on the nature of the activity of the lessee, courts usually find no vicarious liability because there is no direct financial benefit from the infringement. See, e.g., Roy Export Co. v. Trustees of Columbia University, 344 F.Supp. 1350, 1353 (S.D.N.Y.1972) (finding no vicarious liability of university because no financial benefit from allowing screening of bootlegged films); Fonovisa, 847 F.Supp. at 1496 (finding swap meet operators did not financially benefit from fixed fee); see also Kelly Tickle, Comment, The Vicarious Liability of Electronic Bulletin Board Operators for the Copyright Infringement Occurring on Their Bulletin Boards, 80 IOWA L.REV. 391, 415 (1995) (arguing that BBS operators "lease cyberspace" and should thus be treated like landlords, who are not liable for infringement that occurs on their premises).

Plaintiffs argue that courts will find a financial benefit despite fixed fees. In Polygram International Publishing, Inc. v. Nevada/TIG, Inc., 855 F.Supp. 1314, 1330-33 (D.Mass.1994), the court found a trade show organizer vicariously liable for the infringing performance of an exhibitor because, although the infringement did not affect the fixed rental fee received by the organizers, the organizers benefitted from the performances, which helped make the show a financial success. But see Artists Music, Inc. v. Reed Publishing, Inc., 31 U.S.P.Q.2d 1623, 1994 WL 191643, at *6 (S.D.N.Y.1994) (finding no vicarious liability for trade show organizers where revenues not increased because of infringing music performed by exhibitors). Plaintiffs cite two other cases where, despite fixed fees, defendants received financial benefits from allowing groups to perform infringing works over the radio without having to get an ASCAP license, which minimized the defendants' expenses. See Boz Scaggs Music v. KND Corp, 491 F.Supp. 908, 913 (D.Conn.1980); Realsongs v. Gulf Broadcasting [1377] Corp., 824 F.Supp. 89, 92 (M.D.La.1993). Plaintiffs' cases are factually distinguishable. Plaintiffs cannot provide any evidence of a direct financial benefit received by Netcom from Erlich's infringing postings. Unlike Shapiro, Bernstein, and like Fonovisa, Netcom receives a fixed fee. There is no evidence that infringement by Erlich, or any other user of Netcom's services, in any way enhances the value of Netcom's services to subscribers or attracts new subscribers. Plaintiffs argue, however, that Netcom somehow derives a benefit from its purported "policy of refusing to take enforcement actions against its subscribers and others who transmit infringing messages over its computer networks." Opp'n at 18. Plaintiffs point to Netcom's advertisements that, compared to competitors like CompuServe and America Online, Netcom provides easy, regulation-free Internet access. Plaintiffs assert that Netcom's policy attracts copyright infringers to its system, resulting in a direct financial benefit. The court is not convinced that such an argument, if true, would constitute a direct financial benefit to Netcom from Erlich's infringing activities. See Fonovisa, 847 F.Supp. at 1496 (finding no direct financial benefit despite argument that lessees included many vendors selling counterfeit goods and that clientele sought "bargain basement prices"). Further, plaintiffs' argument is not supported by probative evidence. The only "evidence" plaintiffs cite for their supposition is the declaration of their counsel, Elliot Abelson, who states that

[o]n April 7, 1995, in a conversation regarding Netcom's position related to this case, Randolf Rice, attorney for Netcom, informed me that Netcom's executives are happy about the publicity it is receiving in the press as a result of this case. Mr. Rice also told me that Netcom was concerned that it would lose business if it took action against Erlich or Klemesrud in connection with Erlich's infringements.

Abelson Decl. ¶ 2. Netcom objects to this declaration as hearsay and as inadmissible evidence of statements made in compromise negotiations. Fed.R.Ev. 801, 408. Whether or not this declaration is admissible, it does not support plaintiffs' argument that Netcom either has a policy of not enforcing violations of copyright laws by its subscribers or, assuming such a policy exists, that Netcom's policy directly financially benefits Netcom, such as by attracting new subscribers. Because plaintiffs have failed to raise a question of fact on this vital element, their claim of vicarious liability fails. See Roy Export, 344 F.Supp. at 1353.

4. First Amendment Argument

Netcom argues that plaintiffs' theory of liability contravenes the first amendment, as it would chill the use of the Internet because every access provider or user would be subject to liability when a user posts an infringing work to a Usenet newsgroup. While the court agrees that an overbroad injunction might implicate the First Amendment, see In re Capital Cities/ABC, Inc., 918 F.2d 140, 144 (11th Cir.1990),[24] imposing liability for infringement where it is otherwise appropriate does not necessarily raise a First Amendment issue. The copyright concepts of the idea/expression dichotomy and the fair use defense balance the important First Amendment rights with the constitutional authority for "promot[ing] the progress of science and useful arts," U.S. CONST. art. I, § 8, cl. 8; 1 NIMMER ON COPYRIGHT § 1.10[B], at 1-71 to -83. Netcom argues that liability here would force Usenet servers to perform the impossible — screening all the information that comes through their systems. However, the court is not convinced that Usenet servers are directly liable for causing a copy to be made, and absent evidence of knowledge and participation or control and direct profit, they will not be contributorily or vicariously liable. If Usenet servers were responsible for screening all messages coming through their systems, this could have a serious chilling effect on what some say may turn out to be the best public forum for free speech yet [1378] devised. See Jerry Berman & Daniel J. Weitzner, Abundance and User Control: Renewing the Democratic Heart of the First Amendment in the Age of Interactive Media, 104 YALE L.J. 1619, 1624 (1995) (praising decentralized networks for opening access to all with no entity stifling independent sources of speech); Rose, supra, at 4.[25] Finally, Netcom admits that its First Amendment argument is merely a consideration in the fair use argument, which the court will now address. See Reply at 24.

5. Fair Use Defense

Assuming plaintiffs can prove a violation of one of the exclusive rights guaranteed in section 106, there is no infringement if the defendant's use is fair under section 108. The proper focus here is on whether Netcom's actions qualify as fair use, not on whether Erlich himself engaged in fair use; the court has already found that Erlich was not likely entitled to his own fair use defense, as his postings contained large portions of plaintiffs' published and unpublished works quoted verbatim with little added commentary.

Although the author has the exclusive rights to reproduce, publicly distribute, and publicly display a copyrighted work under section 106, these rights are limited by the defense of "fair use." 17 U.S.C. § 107. The defense "permits and requires courts to avoid rigid application of the copyright statute when, on occasion, it would stifle the very creativity which that law is designed to foster." Campbell v. Acuff-Rose Music, Inc., ___ U.S. ___, ___, 114 S.Ct. 1164, 1170, 127 L.Ed.2d 500 (1994) (citation omitted). Congress has set out four nonexclusive factors to be considered in determining the availability of the fair use defense:

(1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes;

(2) the nature of the copyrighted work;

(3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and

(4) the effect of the use upon the potential market for or value of the copyrighted work.

17 U.S.C. § 107. The fair use doctrine calls for a case-by-case analysis. Campbell, ___ U.S. at ___, 114 S.Ct. at 1170. All of the factors "are to be explored, and the results weighed together, in light of the purposes of copyright." Id. at ___ _ ___, 114 S.Ct. at 1170-71.

a. First Factor: Purpose and Character of the Use

The first statutory factor looks to the purpose and character of the defendant's use. Netcom's use of plaintiffs' works is to carry out its commercial function as an Internet access provider. Such a use, regardless of [1379] the underlying uses made by Netcom's subscribers, is clearly commercial. Netcom's use, though commercial, also benefits the public in allowing for the functioning of the Internet and the dissemination of other creative works, a goal of the Copyright Act. See Sega v. Accolade, 977 F.2d 1510, 1523 (9th Cir.1992) (holding that intermediate copying to accomplish reverse engineering of software fair use despite commercial nature of activity; considering public benefit of use). The Campbell Court emphasized that a commercial use does not dictate against a finding of fair use, as most of the uses listed in the statute are "generally conducted for profit in this country." ___ U.S. at ___, 114 S.Ct. at 1174. Although Netcom gains financially from its distribution of messages to the Internet, its financial incentive is unrelated to the infringing activity and the defendant receives no direct financial benefit from the acts of infringement. Therefore, the commercial nature of the defendant's activity should not be dispositive. Moreover, there is no easy way for a defendant like Netcom to secure a license for carrying every possible type of copyrighted work onto the Internet. Thus, it should not be seen as "profit[ing] from the exploitation of the copyrighted work without paying the customary prices." Harper & Row, Publishers, Inc. v. Nation Enterprises, 471 U.S. 539, 562, 105 S.Ct. 2218, 2231, 85 L.Ed.2d 588 (1985). It is undisputed that, unlike the defendants in Playboy and Sega, Netcom does not directly gain anything from the content of the information available to its subscribers on the Internet. See supra part I.B.3.b. Because it does not itself provide the files or solicit infringing works, its purpose is different from that of the defendants in Playboy and Sega. Because Netcom's use of copyrighted materials served a completely different function than that of the plaintiffs, this factor weighs in Netcom's favor, see Hustler Magazine, Inc. v. Moral Majority, Inc., 606 F.Supp. 1526, 1535 (C.D.Cal.1985), aff'd, 796 F.2d 1148 (9th Cir. 1986), notwithstanding the otherwise commercial nature of Netcom's use.

b. Second Factor: Nature of the Copyrighted Work

The second factor focuses on two different aspects of the copyrighted work: whether it is published or unpublished and whether it is informational or creative.[26] Plaintiffs rely on the fact that some of the works transmitted by Netcom were unpublished and some were arguably highly creative and original. However, because Netcom's use of the works was merely to facilitate their posting to the Usenet, which is an entirely different purpose than plaintiffs' use (or, for that matter, Erlich's use), the precise nature of those works is not important to the fair use determination. See Campbell, ___ U.S. at ___, 114 S.Ct. at 1175 (finding creative nature of work copied irrelevant where copying for purposes of parody); Hustler Magazine, 606 F.Supp. at 1537; 3 NIMMER ON COPYRIGHT § 13.05[A][2][a], at 13-177 ("It is sometimes necessary, in calibrating the fair use defense, to advert to the defendant's usage simultaneously with the nature of the plaintiff's work.").

c. Third Factor: Amount and Substantiality of the Portion Used

The third factor concerns both the percentage of the original work that was copied and whether that portion constitutes the "heart" of the copyrighted work. Harper & Row, 471 U.S. at 564-65, 105 S.Ct. at 2232-33. Generally, no more of a work may be copied than is necessary for the particular use. See Supermarket of Homes v. San Fernando Valley Board of Realtors, 786 F.2d 1400, 1409 (9th Cir.1986). The copying of an entire work will ordinarily militate against a finding of fair use, although this is not a per se rule. Sony, 464 U.S. at 449-450, 104 S.Ct. at 792-793.

Plaintiffs have shown that Erlich's postings copied substantial amounts of the originals or, in some cases, the entire works. Netcom, of course, made available to the [1380] Usenet exactly what was posted by Erlich. As the court found in Sony, the mere fact that all of a work is copied is not determinative of the fair use question, where such total copying is essential given the purpose of the copying. Id. (allowing total copying in context of time-shifting copyrighted television shows by home viewers). For example, where total copying was necessary to carry out the defendants' beneficial purpose of reverse engineering software to get at the ideas found in the source code, the court found fair use. Sega v. Accolade, 977 F.2d at 1526-27. Here, Netcom copied no more of plaintiffs' works than necessary to function as a Usenet server. Like the defendant in Sega v. Accolade, Netcom had no practical alternative way to carry out its socially useful purpose; a Usenet server must copy all files, since the prescreening of postings for potential copyright infringement is not feasible. 977 F.2d at 1526. Accordingly, this factor should not defeat an otherwise valid defense.

d. Fourth Factor: Effect of the Use upon the Potential Market for the Work

The fourth and final statutory factor concerns "the extent of market harm caused by the particular actions of the alleged infringer" and "`whether unrestricted and widespread conduct of the sort engaged in by the defendant ... would result in a substantially adverse impact on the potential market' for the original." Campbell, ___ U.S. at ___, 114 S.Ct. at 1177 (quoting 3 NIMMER ON COPYRIGHT § 13.05[A][4]) (remanding for consideration of this factor). Although the results of all four factors must be weighed together, id. at ___, 114 S.Ct. at 1171, the fourth factor is the most important consideration, 3 NIMMER ON COPYRIGHT § 13.05[A][4], at 13-188 to -189 (citing Harper & Row, 471 U.S. at 566, 105 S.Ct. at 2233), 13-207 (observing that fourth factor explains results in recent Supreme Court cases).

Netcom argues that there is no evidence that making accessible plaintiffs' works, which consist of religious scriptures and policy letters, will harm the market for these works by preventing someone from participating in the Scientology religion because they can view the works on the Internet instead. Further, Netcom notes that the relevant question is whether the postings fulfill the demand of an individual who seeks to follow the religion's teachings, and not whether they suppress the desire of an individual who is affected by the criticism posted by Erlich. Netcom argues that the court must focus on the "normal market" for the copyrighted work, which in this case is through a Scientology-based organization. Plaintiffs respond that the Internet's extremely widespread distribution — where more than 25 million people worldwide have access — multiplies the effects of market substitution. In support of its motion for a preliminary injunction against Erlich, plaintiffs submitted declarations regarding the potential effect of making the Church's secret scriptures available over the Internet. Plaintiffs point out that, although the Church currently faces no competition, groups in the past have used stolen copies of the Church's scriptures in charging for Scientology-like religious training. See, e.g., Bridge Publications, Inc. v. Vien, 827 F.Supp. 629, 633-34 (S.D.Cal.1993); Religious Technology Center v. Wollersheim, 796 F.2d 1076, 1078-79 (9th Cir.1986), cert. denied, 479 U.S. 1103, 107 S.Ct. 1336, 94 L.Ed.2d 187 (1987). This evidence raises a genuine issue as to the possibility that Erlich's postings, made available over the Internet by Netcom, could hurt the market for plaintiffs' works.

e. Equitable Balancing

In balancing the various factors, the court finds that there is a question of fact as to whether there is a valid fair use defense. Netcom has not justified its copying plaintiffs' works to the extent necessary to establish entitlement to summary judgment in light of evidence that it knew that Erlich's use was infringing and had the ability to prevent its further distribution. While copying all or most of a work will often preclude fair use, courts have recognized the fair use defense where the purpose of the use is beneficial to society, complete copying is necessary given the type of use, the purpose of the use is completely different than the purpose of the original, and there is no evidence that the use will significantly harm the market for the original. This case is distinguishable from those cases recognizing fair use [1381] despite total copying. In Sony, the home viewers' use was not commercial and the viewers were allowed to watch the entire shows for free. In Sega v. Accolade, the complete copying was necessitated to access the unprotectable idea in the original. Here, plaintiffs never gave either Erlich or Netcom permission to view or copy their works. Netcom's use has some commercial aspects. Further, Netcom's copying is not for the purpose of getting to the unprotected idea behind plaintiffs' works. Although plaintiffs may ultimately lose on their infringement claims if, among other things, they cannot prove that posting their copyrighted works will harm the market for these works, see Religious Technology Center v. Lerma, 897 F.Supp. 260, 263 (E.D.Va.1995) (finding fair use defense exists where no separate market for works because Scientologists cannot effectively use them without the Church's supervision); Religious Technology Center v. F.A.C.T.NET, Inc., 901 F.Supp. 1519, 1522-26 (D.Colo. September 15, 1995) (finding no showing of a potential effect on the market for plaintiffs' works), fair use presents a factual question on which plaintiffs have at least raised a genuine issue of fact. Accordingly, the court does not find that Netcom's use was fair as a matter of law.

C. Conclusion

The court finds that plaintiffs have raised a genuine issue of fact regarding whether Netcom should have known that Erlich was infringing their copyrights after receiving a letter from plaintiffs, whether Netcom substantially participated in the infringement, and whether Netcom has a valid fair use defense. Accordingly, Netcom is not entitled to summary judgment on plaintiffs' claim of contributory copyright infringement. However, plaintiffs' claims of direct and vicarious infringement fail.

II. KLEMESRUD'S MOTION FOR JUDGMENT ON THE PLEADINGS

A. Standards for Judgment on the Pleadings

A motion for judgment on the pleadings pursuant to Federal Rule of Civil Procedure 12(c) is directed at the legal sufficiency of a party's allegations. A judgment on the pleadings is proper when there are no issues of material fact, and the moving party is entitled to judgment as a matter of law. General Conference Corp. v. Seventh Day Adventist Church, 887 F.2d 228, 230 (9th Cir.1989), cert. denied, 493 U.S. 1079, 110 S.Ct. 1134, 107 L.Ed.2d 1039 (1990); Hal Roach Studios v. Richard Feiner & Co., 896 F.2d 1542, 1550 (9th Cir.1989). In ruling on a motion for judgment on the pleadings, district courts must accept all material allegations of fact alleged in the complaint as true, and resolve all doubts in favor of the nonmoving party. Id. The court need not accept as true conclusory allegations or legal characterizations. Western Mining Council v. Watt, 643 F.2d 618, 624 (9th Cir.1981). Materials submitted with the complaint may be considered. Hal Roach Studios, 896 F.2d at 1555. All affirmative defenses must clearly appear on the face of the complaint. McCalden v. California Library Ass'n, 955 F.2d 1214, 1219 (9th Cir.1990).

B. Copyright Infringement

1. Direct Infringement

First, plaintiffs allege that Klemesrud directly infringed their copyrights by "reproduc[ing] and publish[ing] plaintiffs' works." FAC ¶ 35. The complaint alleges that "Erlich ... caused copies of [plaintiffs' works] to be published, without authorization, on the BBS computer maintained by Klemesrud" and that "Klemesrud's BBS computer, after receiving and storing for some period of time the copies of the Works sent to it from Erlich, created additional copies of the works and sent these copies to Netcom's computer." FAC ¶ 34. The allegations against Klemesrud fail for the same reason the court found that Netcom was entitled to judgment as a matter of law on the direct infringement claim. There are no allegations that Klemesrud took any affirmative steps to cause the copies to be made. The allegations, in fact, merely say that "Erlich ... caused" the copies to be made and that Klemesrud's computer, not Klemesrud himself, created additional copies. There are [1382] no allegations in the complaint to overcome the missing volitional or causal elements necessary to hold a BBS operator directly liable for copying that is automatic and caused by a subscriber. See supra part I.B.1.

2. Contributory Infringement

Second, the complaint alleges that Klemesrud is contributorily liable. FAC ¶ 35. It further alleges that plaintiffs repeatedly objected to Klemesrud's actions and informed him that Erlich's (and his) actions constituted infringement. FAC ¶ 36. A letter attached to the complaint indicates that such notice was first sent to Klemesrud on December 30, 1994. FAC, Ex. I. Despite the warnings, Klemesrud allegedly refused to assist plaintiffs in compelling Erlich to stop his postings and refused to stop receiving, copying, transmitting and publishing the postings. FAC ¶ 38. To state a claim for contributory infringement, plaintiffs must allege that Klemesrud knew or should have known of Erlich's infringing actions at the time they occurred and yet substantially participated by "induc[ing], caus[ing] or materially contribut[ing] to the infringing conduct" of Erlich. Gershwin, 443 F.2d at 1162. For the reasons discussed in connection with Netcom's motion, the court finds plaintiffs' pleadings sufficient to raise an issue of contributory infringement.

3. Vicarious Liability

The third theory of liability argued by plaintiffs, vicarious liability, is not specifically mentioned in the complaint. Nonetheless, this theory fails as a matter of law because there are insufficient factual allegations to support it. Plaintiffs must show that Klemesrud had the right and ability to control Erlich's activities and that Klemesrud had a direct financial interest in Erlich's infringement. Shapiro, Bernstein, 316 F.2d at 306. A letter from Klemesrud to plaintiffs' counsel states that Klemesrud would comply with plaintiffs' request to take actions against Erlich by deleting the infringing postings from his BBS if plaintiffs mailed him the original copyrighted work and he found that they matched the allegedly infringing posting. FAC, Ex. J. Plaintiffs argue that this letter indicates Klemesrud's ability and right to control Erlich's activities on his BBS. The court finds that this letter, construed in the light most favorable to plaintiffs, raises a question as to whether plaintiffs can show that Klemesrud, in the operation of his BBS, could control Erlich's activities, such as by deleting infringing postings. However, plaintiffs' failure to allege a financial benefit is fatal to their claim for vicarious liability.

The complaint alleges that Klemesrud is in the business of operating a BBS for subscribers for a fee. The complaint does not say how the fee is collected, but there are no allegations that Klemesrud's fee, or any other direct financial benefit received by Klemesrud, varies in any way with the content of Erlich's postings. Nothing in or attached to the complaint states that Klemesrud in any way profits from allowing Erlich to infringe copyrights. Plaintiffs are given 30 days leave in which to amend to cure this pleadings deficiency if they can do so in good faith.

III. PRELIMINARY INJUNCTION AGAINST NETCOM AND KLEMESRUD

A. Legal Standards for a Preliminary Injunction

A party seeking a preliminary injunction may establish its entitlement to equitable relief by showing either (1) a combination of probable success on the merits and the possibility of irreparable injury, or (2) serious questions as to these matters and the balance of hardships tipping sharply in the movant's favor. First Brands Corp. v. Fred Meyer, Inc., 809 F.2d 1378, 1381 (9th Cir.1987). These two tests are not separate, but represent a "continuum" of equitable discretion whereby the greater the relative hardship to the moving party, the less probability of success need be shown. Regents of University of California v. American Broadcasting Cos., 747 F.2d 511, 515 (9th Cir.1984). The primary purpose of a preliminary injunction is to preserve the status quo pending a trial on the merits. Los Angeles Memorial Coliseum Commission v. National Football League, 634 F.2d 1197, 1200 (9th Cir.1980).

[1383] B. Likelihood of Success

The court finds that plaintiffs have not met their burden of showing a likelihood of success on the merits as to either Netcom or Klemesrud. The only viable theory of infringement is contributory infringement, and there is little evidence that Netcom or Klemesrud knew or should have known that Erlich was engaged in copyright infringement of plaintiffs' works and was not entitled to a fair use defense, especially as they did not receive notice of the alleged infringement until after all but one of the postings were completed. Further, their participation in the infringement was not substantial. Accordingly, plaintiffs will not likely prevail on their claims.

C. Irreparable Injury

The court will presume irreparable harm for the copyright claim where plaintiffs have shown a likelihood of success on their claims of infringement. Johnson Controls, Inc. v. Phoenix Control Systems, Inc., 886 F.2d 1173, 1174 (9th Cir.1989). Here, however, plaintiffs have not made an adequate showing of likelihood of success. More importantly, plaintiffs have not shown that the current preliminary injunction prohibiting Erlich from infringing plaintiffs' copyrights will not be sufficient to avoid any harm to plaintiffs' intellectual property rights.

D. First Amendment Concerns

There is a strong presumption against any injunction that could act as a "prior restraint" on free speech, citing CBS, Inc. v. Davis, ___ U.S. ___, ___ _ ___, 114 S.Ct. 912, 913-14, 127 L.Ed.2d 358 (1994) (Justice Blackmun, as Circuit Justice, staying a preliminary injunction prohibiting CBS from airing footage of inside of meat packing plant). Because plaintiffs seek injunctive relief that is broader than necessary to prevent Erlich from committing copyright infringement, there is a valid First Amendment question raised here. Netcom and Klemesrud play a vital role in the speech of their users. Requiring them to prescreen postings for possible infringement would chill their users' speech. Cf. In re Capital Cities/ABC, Inc, 918 F.2d at 144.

E. Conclusion

Plaintiffs have not shown a likelihood of success on the merits of their copyright claims nor irreparable harm absent an injunction against defendants Netcom and Klemesrud. Accordingly, plaintiffs are not entitled to a preliminary injunction.

IV. ORDER

The court denies Netcom's motion for summary judgment and Klemesrud's motion for judgment on the pleadings, as a triable issue of fact exists on the claim of contributory infringement. The court also gives plaintiffs 30 days leave in which to amend to state a claim for vicarious liability against defendant Klemesrud, if they can do so in good faith. Plaintiffs' application for a preliminary injunction against defendants Netcom and Klemesrud is denied.

The parties shall appear for a case management conference at 10:30 a.m. on Friday, January 19, 1996. The deadline for completing required disclosures is January 5, 1996. The joint case management conference statement must be filed by January 12, 1996.

[1] Cyberspace is a popular term for the world of electronic communications over computer networks. See Trotter Hardy, The Proper Legal Regime for "Cyberspace," 55 U.PITT.L.REV. 993, 994 (1994).

[2] "The Internet today is a worldwide entity whose nature cannot be easily or simply defined. From a technical definition, the Internet is the `set of all interconnected IP networks' — the collection of several thousand local, regional, and global computer networks interconnected in real time via the TCP/IP Internetworking Protocol suite...." Daniel P. Dern, THE INTERNET GUIDE FOR NEW USERS 16 (1994).

One article described the Internet as a collection of thousands of local, regional, and global Internet Protocol networks. What it means in practical terms is that millions of computers in schools, universities, corporations, and other organizations are tied together via telephone lines. The Internet enables users to share files, search for information, send electronic mail, and log onto remote computers. But it isn't a program or even a particular computer resource. It remains only a means to link computer users together.

Unlike on-line computer services such as CompuServe and America On Line, no one runs the Internet....

No one pays for the Internet because the network itself doesn't exist as a separate entity. Instead various universities and organizations pay for the dedicated lines linking their computers. Individual users may pay an Internet provider for access to the Internet via its server.

David Bruning, Along the InfoBahn, ASTRONOMY, Vol. 23, No. 6, p. 76 (June 1995).

[3] Issues of Erlich's liability were addressed in this court's order of September 22, 1995. That order concludes in part that a preliminary injunction against Erlich is warranted because plaintiffs have shown a likelihood of success on their copyright infringement claims against him. Plaintiffs likely own valid copyrights in Hubbard's published and unpublished works and Erlich's near-verbatim copying of substantial portions of plaintiffs' works was not likely a fair use. To the extent that Netcom and Klemesrud argue that plaintiffs' copyrights are invalid and that Netcom and Klemesrud are not liable because Erlich had a valid fair use defense, the court previously rejected these arguments and will not reconsider them here.

[4] The Usenet has been described as

a worldwide community of electronic BBSs that is closely associated with the Internet and with the Internet community. ¶ The messages in Usenet are organized into thousands of topical groups, or "Newsgroups".... ¶ As a Usenet user, you read and contribute ("post") to your local Usenet site. Each Usenet site distributes its users' postings to other Usenet sites based on various implicit and explicit configuration settings, and in turn receives postings from other sites. Usenet traffic typically consists of as much as 30 to 50 Mbytes of messages per day. ¶ Usenet is read and contributed to on a daily basis by a total population of millions of people.... ¶ There is no specific network that is the Usenet. Usenet traffic flows over a wide range of networks, including the Internet and dial-up phone links.

Dern, supra, at 196-97.

[5] The First Amended Complaint ("FAC") contains three claims: (1) copyright infringement of BPI's published literary works against all defendants; (2) copyright infringement of RTC's unpublished confidential works against all defendants; and (3) misappropriation of RTC's trade secrets against defendant Erlich only.

[6] Klemesrud alternatively filed a motion for summary judgment, which will not be considered at this time because Klemesrud was unavailable to be deposed in time for plaintiffs' opposition. In a previous order, the court struck those portions of the motion that referred to matters outside of the pleadings.

[7] In this context, "copying" is "shorthand for the infringing of any of the copyright owner's five exclusive rights." S.O.S., Inc. v. Payday, Inc., 886 F.2d 1081, 1085 n. 3 (9th Cir.1989).

[8] The court has under submission plaintiffs' request to expand the preliminary injunction against Erlich.

[9] Plaintiffs have argued at times during this litigation that Netcom should only be required to respond after being given notice, which is only relevant to contributory infringement. Nevertheless, the court will address all three theories of infringement liability.

[10] The strict liability for copyright infringement is in contrast to another area of liability affecting online service providers: defamation. Recent decisions have held that where a BBS exercised little control over the content of the material on its service, it was more like a "distributor" than a "republisher" and was thus only liable for defamation on its system where it knew or should have known of the defamatory statements. Cubby, Inc. v. CompuServe, Inc., 776 F.Supp. 135 (S.D.N.Y.1991). By contrast, a New York state court judge found that Prodigy was a publisher because it held itself out to be controlling the content of its services and because it used software to automatically prescreen messages that were offensive or in bad taste. Stratton Oakmont, Inc. v. Prodigy Services Co., 1995 WL 323710, THE RECORDER, June 1, 1995, at 7 (excerpting May 24, 1995 Order Granting Partial Summary Judgment to Plaintiffs).

[11] One commentator addressed the difficulty in translating copyright concepts, including the public/private dichotomy, to the digitized environment. See Niva Elkin-Koren, Copyright Law and Social Dialogue on the Information Superhighway: The Case Against Copyright Liability of Bulletin Board Operators, 13 CARDOZO ARTS & ENT. L.J. 346, 390 (1993). This commentator noted that one way to characterize a BBS operation is that it "provides subscribers with access and services. As such, BBS operators do not create copies, and do not transfer them in any way. Users post the copies on the BBS, which other users can then read or download." Id. at 356.

[12] Netcom compares itself to a common carrier that merely acts as a passive conduit for information. In a sense, a Usenet server that forwards all messages acts like a common carrier, passively retransmitting every message that gets sent through it. Netcom would seem no more liable than the phone company for carrying an infringing facsimile transmission or storing an infringing audio recording on its voice mail. As Netcom's counsel argued, holding such a server liable would be like holding the owner of the highway, or at least the operator of a toll booth, liable for the criminal activities that occur on its roads. Since other similar carriers of information are not liable for infringement, there is some basis for exempting Internet access providers from liability for infringement by their users. The IITF Report concluded that "[i]f an entity provided only the wires and conduits — such as the telephone company, it would have a good argument for an exemption if it was truly in the same position as a common carrier and could not control who or what was on its system." IITF Report at 122. Here, perhaps, the analogy is not completely appropriate as Netcom does more than just "provide the wire and conduits." Further, Internet providers are not natural monopolies that are bound to carry all the traffic that one wishes to pass through them, as with the usual common carrier. See id. at 122 n. 392 (citing Federal Communications Commission v. Midwest Video Corp., 440 U.S. 689, 701, 99 S.Ct. 1435, 1442, 59 L.Ed.2d 692 (1979)). Section 111 of the Copyright Act codifies the exemption for passive carriers who are otherwise liable for a secondary transmission. 3 Melville B. Nimmer & David Nimmer, NIMMER ON COPYRIGHT § 12.04[B][3], at 12-99 (1995). However, the carrier must not have any direct or indirect control over the content or selection of the primary transmission. Id.; 17 U.S.C. § 111(a)(3). Cf. infra part I.B.3.a. In any event, common carriers are granted statutory exemptions for liability that might otherwise exist. Here, Netcom does not fall under this statutory exemption, and thus faces the usual strict liability scheme that exists for copyright. Whether a new exemption should be carved out for online service providers is to be resolved by Congress, not the courts. Compare Comment, "Online Service Providers and Copyright Law: The Need for Change," 1 SYRACUSE J.LEGIS. & POL'Y 197, 202 (1995) (citing recommendations of online service providers for amending the Copyright Act to create liability only where a "provider has `actual knowledge that a work that is being or has been transmitted onto, or stored on, its system is infringing,' and has the `ability and authority' to stop the transmission, and has, after a reasonable amount of time, allowed the infringing activity to continue'") with IITF Report at 122 (recommending that Congress not exempt service providers from strict liability for direct infringements).

[13] The court notes, however, that stopping the distribution of information once it is on the Internet is not easy. The decentralized network was designed so that if one link in the chain be closed off, the information will be dynamically rerouted through another link. This was meant to allow the system to be used for communication after a catastrophic event that shuts down part of it. Francis Decl. ¶ 4.

[14] The paragraph in Playboy containing the quotation begins with a description of the right of public distribution. Id. Further, the above quoted language is followed by a citation to a discussion of the right of public distribution in Jay Dratler, Jr., INTELLECTUAL PROPERTY LAW: COMMERCIAL, CREATIVE AND INDUSTRIAL PROPERTY § 6.01[3], at 6-15 (1991). This treatise states that "the distribution right may be decisive, if, for example, a distributor supplies products containing unauthorized copies of a copyrighted work but has not made the copies itself." Id. (citing to Williams Electronics, Inc. v. Artic International, Inc., 685 F.2d 870, 876 (3d Cir.1982)). In any event, the Williams holding regarding public distribution was dicta, as the court found that the defendant had also made copies. Id.

[15] Given the ambiguity in plaintiffs' reference to a violation of the right to "publish" and to Playboy, it is possible that plaintiffs are also claiming that Netcom infringed their exclusive right to publicly distribute their works. The court will address this argument infra.

[16] The court further notes that Playboy has been much criticized. See, e.g., L. Rose, NETLAW 91-92 (1995). The finding of direct infringement was perhaps influenced by the fact that there was some evidence that defendants in fact knew of the infringing nature of the works, which were digitized photographs labeled "Playboy" and "Playmate."

[17] To the extent that Sega holds that BBS operators are directly liable for copyright infringement when users upload infringing works to their systems, this court respectfully disagrees with the court's holding for the reasons discussed above. Further, such a holding was dicta, as there was evidence that the defendant knew of the infringing uploads by users and, in fact, actively encouraged such activity, thus supporting the contributory infringement theory. Id. at 683.

[18] References to "Tr." are to the reporter's transcript of the June 23, 1995 hearing on these motions.

[19] Despite that uncertainty, the IITF Report recommends a strict liability paradigm for BBS operators. See IITF Report at 122-24. It recommends that Congress not exempt on-line service providers from strict liability because this would prematurely deprive the system of an incentive to get providers to reduce the damage to copyright holders by reducing the chances that users will infringe by educating them, requiring indemnification, purchasing insurance, and, where efficient, developing technological solutions to screening out infringement. Denying strict liability in many cases would leave copyright owners without an adequate remedy since direct infringers may act anonymously or pseudonymously or may not have the resources to pay a judgment. Id.; see also Hardy, supra.

[20] Adopting such a rule would relieve a BBS of liability for failing to take steps to remove infringing works from its system even after being handed a court's order finding infringement. This would be undesirable and is inconsistent with Netcom's counsel's admission that Netcom would have an obligation to act in such circumstances. Tr. 35:25; see also Tr. 42:18-42:20.

[21] The court does not see the relevance of plaintiffs' argument that Netcom's failure to investigate their claims of infringement or take actions against Erlich was a departure from Netcom's normal procedure. A policy and practice of acting to stop postings where there is inadequate knowledge of infringement in no way creates a higher standard of care under the Copyright Act as to subsequent claims of user infringement.

[22] In this case, Netcom is even further removed from Erlich's activities. Erlich was in a contractual relationship only with Klemesrud. Netcom thus dealt directly only with Klemesrud. However, it is not crucial that Erlich does not obtain access directly through Netcom. The issue is Netcom's right and ability to control the use of its system, which it can do indirectly by controlling Klemesrud's use.

[23] However, plaintiffs submit no evidence indicating Netcom, or anyone, could design software that could determine whether a posting is infringing.

[24] For example, plaintiffs' demand that the court order Netcom to terminate Klemesrud's BBS's access to the Internet, thus depriving all 500 of his subscribers, would be overbroad, as it would unnecessarily keep hundreds of users, against whom there are no allegations of copyright infringement, from accessing a means of speech. The overbroadness is even more evident if, as plaintiffs contend, there is a way to restrict only Erlich's access to a.r.s.

[25] Netcom additionally argues that plaintiffs' theory of liability would have a chilling effect on users, who would be liable for merely browsing infringing works. Browsing technically causes an infringing copy of the digital information to be made in the screen memory. MAI holds that such a copy is fixed even when information is temporarily placed in RAM, such as the screen RAM. The temporary copying involved in browsing is only necessary because humans cannot otherwise perceive digital information. It is the functional equivalent of reading, which does not implicate the copyright laws and may be done by anyone in a library without the permission of the copyright owner. However, it can be argued that the effects of digital browsing are different because millions can browse a single copy of a work in cyberspace, while only one can read a library's copy at a time.

Absent a commercial or profit-depriving use, digital browsing is probably a fair use; there could hardly be a market for licensing the temporary copying of digital works onto computer screens to allow browsing. Unless such a use is commercial, such as where someone reads a copyrighted work online and therefore decides not to purchase a copy from the copyright owner, fair use is likely. Until reading a work online becomes as easy and convenient as reading a paperback, copyright owners do not have much to fear from digital browsing and there will not likely be much market effect.

Additionally, unless a user has reason to know, such as from the title of a message, that the message contains copyrighted materials, the browser will be protected by the innocent infringer doctrine, which allows the court to award no damages in appropriate circumstances. In any event, users should hardly worry about a finding of direct infringement; it seems highly unlikely from a practical matter that a copyright owner could prove such infringement or would want to sue such an individual.

[26] A recent report noted that a third aspect of the nature of the work may be relevant: whether it is in digital or analog form. IITF Report at 78. Although the copyright laws were developed before digital works existed, they have certainly evolved to include such works, and this court can see no reason why works should deserve less protection because they are in digital form, especially where, as here, they were not put in such form by plaintiffs.

6.6.2 Digital Millenium Copyright Act: 17 U.S. Code § 512 - Limitations on liability relating to material online 6.6.2 Digital Millenium Copyright Act: 17 U.S. Code § 512 - Limitations on liability relating to material online

(a) Transitory Digital Network Communications.— A service provider shall not be liable for monetary relief, or, except as provided in subsection (j), for injunctive or other equitable relief, for infringement of copyright by reason of the provider’s transmitting, routing, or providing connections for, material through a system or network controlled or operated by or for the service provider, or by reason of the intermediate and transient storage of that material in the course of such transmitting, routing, or providing connections, if—
(1) the transmission of the material was initiated by or at the direction of a person other than the service provider;
(2) the transmission, routing, provision of connections, or storage is carried out through an automatic technical process without selection of the material by the service provider;
(3) the service provider does not select the recipients of the material except as an automatic response to the request of another person;
(4) no copy of the material made by the service provider in the course of such intermediate or transient storage is maintained on the system or network in a manner ordinarily accessible to anyone other than anticipated recipients, and no such copy is maintained on the system or network in a manner ordinarily accessible to such anticipated recipients for a longer period than is reasonably necessary for the transmission, routing, or provision of connections; and
(5) the material is transmitted through the system or network without modification of its content.
(b) System Caching.—
(1) Limitation on liability.— A service provider shall not be liable for monetary relief, or, except as provided in subsection (j), for injunctive or other equitable relief, for infringement of copyright by reason of the intermediate and temporary storage of material on a system or network controlled or operated by or for the service provider in a case in which—
(A) the material is made available online by a person other than the service provider;
(B) the material is transmitted from the person described in subparagraph (A) through the system or network to a person other than the person described in subparagraph (A) at the direction of that other person; and
(C) the storage is carried out through an automatic technical process for the purpose of making the material available to users of the system or network who, after the material is transmitted as described in subparagraph (B), request access to the material from the person described in subparagraph (A),
if the conditions set forth in paragraph (2) are met.
(2) Conditions.— The conditions referred to in paragraph (1) are that—
(A) the material described in paragraph (1) is transmitted to the subsequent users described in paragraph (1)(C) without modification to its content from the manner in which the material was transmitted from the person described in paragraph (1)(A);
(B) the service provider described in paragraph (1) complies with rules concerning the refreshing, reloading, or other updating of the material when specified by the person making the material available online in accordance with a generally accepted industry standard data communications protocol for the system or network through which that person makes the material available, except that this subparagraph applies only if those rules are not used by the person described in paragraph (1)(A) to prevent or unreasonably impair the intermediate storage to which this subsection applies;
(C) the service provider does not interfere with the ability of technology associated with the material to return to the person described in paragraph (1)(A) the information that would have been available to that person if the material had been obtained by the subsequent users described in paragraph (1)(C) directly from that person, except that this subparagraph applies only if that technology—
(i) does not significantly interfere with the performance of the provider’s system or network or with the intermediate storage of the material;
(ii) is consistent with generally accepted industry standard communications protocols; and
(iii) does not extract information from the provider’s system or network other than the information that would have been available to the person described in paragraph (1)(A) if the subsequent users had gained access to the material directly from that person;
(D) if the person described in paragraph (1)(A) has in effect a condition that a person must meet prior to having access to the material, such as a condition based on payment of a fee or provision of a password or other information, the service provider permits access to the stored material in significant part only to users of its system or network that have met those conditions and only in accordance with those conditions; and
(E) if the person described in paragraph (1)(A) makes that material available online without the authorization of the copyright owner of the material, the service provider responds expeditiously to remove, or disable access to, the material that is claimed to be infringing upon notification of claimed infringement as described in subsection (c)(3), except that this subparagraph applies only if—
(i) the material has previously been removed from the originating site or access to it has been disabled, or a court has ordered that the material be removed from the originating site or that access to the material on the originating site be disabled; and
(ii) the party giving the notification includes in the notification a statement confirming that the material has been removed from the originating site or access to it has been disabled or that a court has ordered that the material be removed from the originating site or that access to the material on the originating site be disabled.
(c) Information Residing on Systems or Networks At Direction of Users.—
(1) In general.— A service provider shall not be liable for monetary relief, or, except as provided in subsection (j), for injunctive or other equitable relief, for infringement of copyright by reason of the storage at the direction of a user of material that resides on a system or network controlled or operated by or for the service provider, if the service provider—
(A)
(i) does not have actual knowledge that the material or an activity using the material on the system or network is infringing;
(ii) in the absence of such actual knowledge, is not aware of facts or circumstances from which infringing activity is apparent; or
(iii) upon obtaining such knowledge or awareness, acts expeditiously to remove, or disable access to, the material;
(B) does not receive a financial benefit directly attributable to the infringing activity, in a case in which the service provider has the right and ability to control such activity; and
(C) upon notification of claimed infringement as described in paragraph (3), responds expeditiously to remove, or disable access to, the material that is claimed to be infringing or to be the subject of infringing activity.
(2) Designated agent.— The limitations on liability established in this subsection apply to a service provider only if the service provider has designated an agent to receive notifications of claimed infringement described in paragraph (3), by making available through its service, including on its website in a location accessible to the public, and by providing to the Copyright Office, substantially the following information:
(A) the name, address, phone number, and electronic mail address of the agent.
(B) other contact information which the Register of Copyrights may deem appropriate.
The Register of Copyrights shall maintain a current directory of agents available to the public for inspection, including through the Internet, and may require payment of a fee by service providers to cover the costs of maintaining the directory.
(3) Elements of notification.—
(A) To be effective under this subsection, a notification of claimed infringement must be a written communication provided to the designated agent of a service provider that includes substantially the following:
(i) A physical or electronic signature of a person authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.
(ii) Identification of the copyrighted work claimed to have been infringed, or, if multiple copyrighted works at a single online site are covered by a single notification, a representative list of such works at that site.
(iii) Identification of the material that is claimed to be infringing or to be the subject of infringing activity and that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit the service provider to locate the material.
(iv) Information reasonably sufficient to permit the service provider to contact the complaining party, such as an address, telephone number, and, if available, an electronic mail address at which the complaining party may be contacted.
(v) A statement that the complaining party has a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, its agent, or the law.
(vi) A statement that the information in the notification is accurate, and under penalty of perjury, that the complaining party is authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.
(B)
(i) Subject to clause (ii), a notification from a copyright owner or from a person authorized to act on behalf of the copyright owner that fails to comply substantially with the provisions of subparagraph (A) shall not be considered under paragraph (1)(A) in determining whether a service provider has actual knowledge or is aware of facts or circumstances from which infringing activity is apparent.
(ii) In a case in which the notification that is provided to the service provider’s designated agent fails to comply substantially with all the provisions of subparagraph (A) but substantially complies with clauses (ii), (iii), and (iv) of subparagraph (A), clause (i) of this subparagraph applies only if the service provider promptly attempts to contact the person making the notification or takes other reasonable steps to assist in the receipt of notification that substantially complies with all the provisions of subparagraph (A).
(d) Information Location Tools.— A service provider shall not be liable for monetary relief, or, except as provided in subsection (j), for injunctive or other equitable relief, for infringement of copyright by reason of the provider referring or linking users to an online location containing infringing material or infringing activity, by using information location tools, including a directory, index, reference, pointer, or hypertext link, if the service provider—
(1)
(A) does not have actual knowledge that the material or activity is infringing;
(B) in the absence of such actual knowledge, is not aware of facts or circumstances from which infringing activity is apparent; or
(C) upon obtaining such knowledge or awareness, acts expeditiously to remove, or disable access to, the material;
(2) does not receive a financial benefit directly attributable to the infringing activity, in a case in which the service provider has the right and ability to control such activity; and
(3) upon notification of claimed infringement as described in subsection (c)(3), responds expeditiously to remove, or disable access to, the material that is claimed to be infringing or to be the subject of infringing activity, except that, for purposes of this paragraph, the information described in subsection (c)(3)(A)(iii) shall be identification of the reference or link, to material or activity claimed to be infringing, that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit the service provider to locate that reference or link.
(e) Limitation on Liability of Nonprofit Educational Institutions.—
(1) When a public or other nonprofit institution of higher education is a service provider, and when a faculty member or graduate student who is an employee of such institution is performing a teaching or research function, for the purposes of subsections (a) and (b) such faculty member or graduate student shall be considered to be a person other than the institution, and for the purposes of subsections (c) and (d) such faculty member’s or graduate student’s knowledge or awareness of his or her infringing activities shall not be attributed to the institution, if—
(A) such faculty member’s or graduate student’s infringing activities do not involve the provision of online access to instructional materials that are or were required or recommended, within the preceding 3-year period, for a course taught at the institution by such faculty member or graduate student;
(B) the institution has not, within the preceding 3-year period, received more than two notifications described in subsection (c)(3) of claimed infringement by such faculty member or graduate student, and such notifications of claimed infringement were not actionable under subsection (f); and
(C) the institution provides to all users of its system or network informational materials that accurately describe, and promote compliance with, the laws of the United States relating to copyright.
(2) For the purposes of this subsection, the limitations on injunctive relief contained in subsections (j)(2) and (j)(3), but not those in (j)(1), shall apply.
(f) Misrepresentations.— Any person who knowingly materially misrepresents under this section—
(1) that material or activity is infringing, or
(2) that material or activity was removed or disabled by mistake or misidentification,
shall be liable for any damages, including costs and attorneys’ fees, incurred by the alleged infringer, by any copyright owner or copyright owner’s authorized licensee, or by a service provider, who is injured by such misrepresentation, as the result of the service provider relying upon such misrepresentation in removing or disabling access to the material or activity claimed to be infringing, or in replacing the removed material or ceasing to disable access to it.
(g) Replacement of Removed or Disabled Material and Limitation on Other Liability.—
(1) No liability for taking down generally.— Subject to paragraph (2), a service provider shall not be liable to any person for any claim based on the service provider’s good faith disabling of access to, or removal of, material or activity claimed to be infringing or based on facts or circumstances from which infringing activity is apparent, regardless of whether the material or activity is ultimately determined to be infringing.
(2) Exception.— Paragraph (1) shall not apply with respect to material residing at the direction of a subscriber of the service provider on a system or network controlled or operated by or for the service provider that is removed, or to which access is disabled by the service provider, pursuant to a notice provided under subsection (c)(1)(C), unless the service provider—
(A) takes reasonable steps promptly to notify the subscriber that it has removed or disabled access to the material;
(B) upon receipt of a counter notification described in paragraph (3), promptly provides the person who provided the notification under subsection (c)(1)(C) with a copy of the counter notification, and informs that person that it will replace the removed material or cease disabling access to it in 10 business days; and
(C) replaces the removed material and ceases disabling access to it not less than 10, nor more than 14, business days following receipt of the counter notice, unless its designated agent first receives notice from the person who submitted the notification under subsection (c)(1)(C) that such person has filed an action seeking a court order to restrain the subscriber from engaging in infringing activity relating to the material on the service provider’s system or network.
(3) Contents of counter notification.— To be effective under this subsection, a counter notification must be a written communication provided to the service provider’s designated agent that includes substantially the following:
(A) A physical or electronic signature of the subscriber.
(B) Identification of the material that has been removed or to which access has been disabled and the location at which the material appeared before it was removed or access to it was disabled.
(C) A statement under penalty of perjury that the subscriber has a good faith belief that the material was removed or disabled as a result of mistake or misidentification of the material to be removed or disabled.
(D) The subscriber’s name, address, and telephone number, and a statement that the subscriber consents to the jurisdiction of Federal District Court for the judicial district in which the address is located, or if the subscriber’s address is outside of the United States, for any judicial district in which the service provider may be found, and that the subscriber will accept service of process from the person who provided notification under subsection (c)(1)(C) or an agent of such person.
(4) Limitation on other liability.— A service provider’s compliance with paragraph (2) shall not subject the service provider to liability for copyright infringement with respect to the material identified in the notice provided under subsection (c)(1)(C).
(h) Subpoena To Identify Infringer.—
(1) Request.— A copyright owner or a person authorized to act on the owner’s behalf may request the clerk of any United States district court to issue a subpoena to a service provider for identification of an alleged infringer in accordance with this subsection.
(2) Contents of request.— The request may be made by filing with the clerk—
(A) a copy of a notification described in subsection (c)(3)(A);
(B) a proposed subpoena; and
(C) a sworn declaration to the effect that the purpose for which the subpoena is sought is to obtain the identity of an alleged infringer and that such information will only be used for the purpose of protecting rights under this title.
(3) Contents of subpoena.— The subpoena shall authorize and order the service provider receiving the notification and the subpoena to expeditiously disclose to the copyright owner or person authorized by the copyright owner information sufficient to identify the alleged infringer of the material described in the notification to the extent such information is available to the service provider.
(4) Basis for granting subpoena.— If the notification filed satisfies the provisions of subsection (c)(3)(A), the proposed subpoena is in proper form, and the accompanying declaration is properly executed, the clerk shall expeditiously issue and sign the proposed subpoena and return it to the requester for delivery to the service provider.
(5) Actions of service provider receiving subpoena.— Upon receipt of the issued subpoena, either accompanying or subsequent to the receipt of a notification described in subsection (c)(3)(A), the service provider shall expeditiously disclose to the copyright owner or person authorized by the copyright owner the information required by the subpoena, notwithstanding any other provision of law and regardless of whether the service provider responds to the notification.
(6) Rules applicable to subpoena.— Unless otherwise provided by this section or by applicable rules of the court, the procedure for issuance and delivery of the subpoena, and the remedies for noncompliance with the subpoena, shall be governed to the greatest extent practicable by those provisions of the Federal Rules of Civil Procedure governing the issuance, service, and enforcement of a subpoena duces tecum.
(i) Conditions for Eligibility.—
(1) Accommodation of technology.— The limitations on liability established by this section shall apply to a service provider only if the service provider—
(A) has adopted and reasonably implemented, and informs subscribers and account holders of the service provider’s system or network of, a policy that provides for the termination in appropriate circumstances of subscribers and account holders of the service provider’s system or network who are repeat infringers; and
(B) accommodates and does not interfere with standard technical measures.
(2) Definition.— As used in this subsection, the term “standard technical measures” means technical measures that are used by copyright owners to identify or protect copyrighted works and—
(A) have been developed pursuant to a broad consensus of copyright owners and service providers in an open, fair, voluntary, multi-industry standards process;
(B) are available to any person on reasonable and nondiscriminatory terms; and
(C) do not impose substantial costs on service providers or substantial burdens on their systems or networks.
(j) Injunctions.— The following rules shall apply in the case of any application for an injunction under section 502 against a service provider that is not subject to monetary remedies under this section:
(1) Scope of relief.—
(A) With respect to conduct other than that which qualifies for the limitation on remedies set forth in subsection (a), the court may grant injunctive relief with respect to a service provider only in one or more of the following forms:
(i) An order restraining the service provider from providing access to infringing material or activity residing at a particular online site on the provider’s system or network.
(ii) An order restraining the service provider from providing access to a subscriber or account holder of the service provider’s system or network who is engaging in infringing activity and is identified in the order, by terminating the accounts of the subscriber or account holder that are specified in the order.
(iii) Such other injunctive relief as the court may consider necessary to prevent or restrain infringement of copyrighted material specified in the order of the court at a particular online location, if such relief is the least burdensome to the service provider among the forms of relief comparably effective for that purpose.
(B) If the service provider qualifies for the limitation on remedies described in subsection (a), the court may only grant injunctive relief in one or both of the following forms:
(i) An order restraining the service provider from providing access to a subscriber or account holder of the service provider’s system or network who is using the provider’s service to engage in infringing activity and is identified in the order, by terminating the accounts of the subscriber or account holder that are specified in the order.
(ii) An order restraining the service provider from providing access, by taking reasonable steps specified in the order to block access, to a specific, identified, online location outside the United States.
(2) Considerations.— The court, in considering the relevant criteria for injunctive relief under applicable law, shall consider—
(A) whether such an injunction, either alone or in combination with other such injunctions issued against the same service provider under this subsection, would significantly burden either the provider or the operation of the provider’s system or network;
(B) the magnitude of the harm likely to be suffered by the copyright owner in the digital network environment if steps are not taken to prevent or restrain the infringement;
(C) whether implementation of such an injunction would be technically feasible and effective, and would not interfere with access to noninfringing material at other online locations; and
(D) whether other less burdensome and comparably effective means of preventing or restraining access to the infringing material are available.
(3) Notice and ex parte orders.— Injunctive relief under this subsection shall be available only after notice to the service provider and an opportunity for the service provider to appear are provided, except for orders ensuring the preservation of evidence or other orders having no material adverse effect on the operation of the service provider’s communications network.
(k) Definitions.—
(1) Service provider.—
(A) As used in subsection (a), the term “service provider” means an entity offering the transmission, routing, or providing of connections for digital online communications, between or among points specified by a user, of material of the user’s choosing, without modification to the content of the material as sent or received.
(B) As used in this section, other than subsection (a), the term “service provider” means a provider of online services or network access, or the operator of facilities therefor, and includes an entity described in subparagraph (A).
(2) Monetary relief.— As used in this section, the term “monetary relief” means damages, costs, attorneys’ fees, and any other form of monetary payment.
(l) Other Defenses Not Affected.— The failure of a service provider’s conduct to qualify for limitation of liability under this section shall not bear adversely upon the consideration of a defense by the service provider that the service provider’s conduct is not infringing under this title or any other defense.
(m) Protection of Privacy.— Nothing in this section shall be construed to condition the applicability of subsections (a) through (d) on—
(1) a service provider monitoring its service or affirmatively seeking facts indicating infringing activity, except to the extent consistent with a standard technical measure complying with the provisions of subsection (i); or
(2) a service provider gaining access to, removing, or disabling access to material in cases in which such conduct is prohibited by law.
(n) Construction.— Subsections (a), (b), (c), and (d) describe separate and distinct functions for purposes of applying this section. Whether a service provider qualifies for the limitation on liability in any one of those subsections shall be based solely on the criteria in that subsection, and shall not affect a determination of whether that service provider qualifies for the limitations on liability under any other such subsection.

6.6.3 Ellison v. Robertson 6.6.3 Ellison v. Robertson

This case applies Section 512 to a system similar to that at issue in Netcom. How does the DMCA change the analysis?

357 F.3d 1072 (2004)

Harlan ELLISON, Plaintiff-Appellant,
v.
Stephen ROBERTSON, an individual a/k/a Steven Robertson a/k/a Shaker@tco.net, Defendant, and
America Online Inc., a Corporation, Defendant-Appellee.

No. 02-55797.

United States Court of Appeals, Ninth Circuit.

Argued and Submitted March 6, 2003.
Filed February 10, 2004.

[1073] Glen L. Kulik, John H. Carmichael (brief), and Brigit K. Connelly, of Kulik, Gottesman, and Mouton, LLP, Sherman Oaks, CA, and Charles E. Petit (argued), Law Office of Charles E. Petit, Urbana, IL, for the plaintiff-appellant.

Daniel Scott Schecter (argued) and Belinda S. Lee, Latham & Watkins, Los Angeles, CA, for the defendant-appellee.

Donald B. Verilli, Jr. (argued), Thomas J. Perilli, Kali N. Bracey, and Younjae Lee, Jenner & Block, LLC, Washington, D.C., for amici curiae BMG Music, EMI Recorded Music, Sony Music Entertainment, and Universal Music Group.

Sonya D. Winner, Evan Cox, Daniel Hirsch, Covington & Burling, San Francisco, CA, for amicus curiae Business Software Alliance.

Daniel Schultz, James J. Halpert, and Arthur F. Fergenson, Piper Rudnick, LLP, Los Angeles, CA, for amicus curiae Internet Commerce Coalition and Stewart A. Baker and Alice E. Loughran, Steptoe & Johnson, LLP, Washington, D.C., for amicus curiae U.S. Internet Service Provider Association.

[1074] Laura A. Kaster, Frank L. Politano, and Michele A. Farber, AT & T Corp., Bedminster, NJ, for amicus curiae AT & T Corporation.

Bruce G. Joseph and Scott E. Bain, Wiley, Rein, & Fielding, Washington, D.C., for amici curiae Association of American Universities, American Council on Education, and National Association of State Universities and Land-Grant Colleges.

Before PREGERSON, THOMAS, Circuit Judges, and OBERDORFER,[1] Senior District Judge.

PREGERSON, Circuit Judge:

Harlan Ellison appeals the district court's summary judgment dismissal of his copyright infringement action against America Online, Inc. (AOL). The copyright infringement action arose when, without Ellison's authorization, Stephen Robertson posted copies of some of Ellison's copyrighted short stories on a peer-to-peer file sharing network, the USENET.[2] Because AOL provides its subscribers access to the USENET news-group[3] at issue, Ellison brought claims for vicarious and contributory copyright infringement against AOL. AOL moved for summary judgment. It asserted defenses to Ellison's infringement claims and alternatively argued that it qualified for one of the four safe harbor limitations of liability under Title II of the Digital Millennium Copyright Act (DMCA).[4] The district court concluded that AOL was not liable for vicarious infringement. Although the court found there to be triable issues of material fact concerning Ellison's contributory infringement claim, it nonetheless granted summary judgment because it held that AOL qualified for the DMCA safe harbor limitation of liability under 17 U.S.C. § 512(a).

We hold that the district court erred in granting AOL's motion for summary judgment. We affirm the district court's holdings as to vicarious and contributory infringement, but we reverse the district court's application of the safe harbor limitation from liability. There are triable issues of material fact concerning whether AOL meets the threshold requirements, set forth in § 512(i), to assert the safe harbor limitations of liability of §§ 512(a-d). If after remand a jury finds AOL to be eligible under § 512(i) to assert the safe harbor limitations of §§ 512(a-d), the parties need not relitigate whether AOL qualifies for the limitation of liability provided by § 512(a); the district court's resolution of that issue at the summary judgment stage is sound. We affirm in part, reverse in part, and remand.

Facts and Procedural Background

Harlan Ellison is the author of numerous science fiction novels and short stories, [1075] and he owns valid copyrights to those works. In the spring of 2000, Stephen Robertson electronically scanned and copied a number of Ellison's fictional works to convert them to digital files. Robertson subsequently uploaded the files onto the USENET news-group "alt.binaries.e-book." Robertson accessed the Internet through his local Internet service provider, Tehama County Online, and his USENET service was provided by RemarQ Communities, Inc. The USENET news-group at issue in this case was used primarily to exchange unauthorized digital copies of works by famous authors, including Ellison.

After Robertson made the infringing copies of Ellison's works accessible to the news-group, the works were forwarded and copied throughout the USENET to servers all over the world, including those belonging to AOL. As a result, AOL's subscribers had access to the news-group containing the infringing copies of Ellison's works. At the time Robertson posted the infringing copies of Ellison's works, AOL's policy was to store and retain files attached to USENET postings on the company's servers for fourteen days.

On or about April 13, 2000, Ellison learned of the infringing activity and contacted legal counsel. On April 17, 2000, in compliance with the notification procedures the DMCA requires, Ellison's counsel sent an e-mail message to agents of Tehama County Online and AOL to notify the service providers of the infringing activity. Ellison received an acknowledgment of receipt from Tehama County Online but received nothing from AOL, which claims never to have received the e-mail.

On April 24, 2000, Ellison filed an action against AOL and others in the United States District Court for the Central District of California. Upon receipt of Ellison's complaint, AOL blocked its subscribers' access to the news-group at issue. AOL thereafter moved for summary judgment, arguing that the undisputed facts did not prove Ellison's copyright infringement claims. AOL alternatively asserted the safe harbor limitations to liability under Title II of the DMCA. On November 27, 2001, Ellison moved for summary judgment of his contributory and vicarious copyright infringement claims against AOL. On March 13, 2002, the district court granted AOL's summary judgment motion and denied Ellison's summary judgment motion. The court found that: (1) the evidence failed to establish Ellison's claims of direct and vicarious copyright infringement; (2) whether AOL was liable for contributory copyright infringement presented a triable issue of fact; (3) the evidence showed that AOL met the threshold eligibility requirements of 17 U.S.C. § 512(i) for the safe harbor limitations from liability under OCILLA (Title II of the DMCA); and (4) AOL qualified for the safe harbor limitation on liability under 17 U.S.C. § 512(a). Ellison now appeals.

Discussion

I. Jurisdiction and Standard of Review

We have jurisdiction to hear this appeal under 28 U.S.C. § 1291. We review an order granting summary judgment de novo. Clicks Billiards, Inc. v. Sixshooters, Inc., 251 F.3d 1252, 1257 (9th Cir.2001). For the purposes of summary judgment, the moving party bears the burden of proving the absence of a genuine issue of a material fact for trial. Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 256, 106 S.Ct. 2505, 91 L.Ed.2d 202 (1986); Fed.R.Civ.P. 56. A genuine issue of fact is one that could reasonably be resolved in favor of either party. Anderson, 477 U.S. at 250-51, 106 S.Ct. 2505. Moreover, in the summary judgment context, we construe all facts in the light most favorable to the non-moving party. Clicks, 251 F.3d [1076] at 1257. We review de novo the district court's interpretations of the Copyright Act, 17 U.S.C. § 101, et seq. Ets-Hokin v. Skyy Spirits, Inc., 225 F.3d 1068, 1073 (9th Cir.2000).

II. The Law of Copyright Infringement and the DMCA

Ellison alleges that AOL infringed his copyrighted works. As a threshold question, a plaintiff who claims copyright infringement must show: (1) ownership of a valid copyright; and (2) that the defendant violated the copyright owner's exclusive rights under the Copyright Act. 17 U.S.C. § 501(a) (2003); Ets-Hokin, 225 F.3d at 1073. We recognize three doctrines of copyright liability: direct copyright infringement, contributory copyright infringement, and vicarious copyright infringement. To prove a claim of direct copyright infringement, a plaintiff must show that he owns the copyright and that the defendant himself violated one or more of the plaintiff's exclusive rights under the Copyright Act.[5]A & M Records v. Napster, Inc., 239 F.3d 1004, 1013 (9th Cir. 2001) (Napster II). "One who, with knowledge of the infringing activity, induces, causes or materially contributes to the infringing conduct of another may be liable as a `contributory' [copyright] infringer." Gershwin Publ'g Corp. v. Columbia Artists Mgmt., Inc., 443 F.2d 1159, 1162 (2d Cir.1971) (footnote omitted and emphasis added). We have interpreted the knowledge requirement for contributory copyright infringement to include both those with actual knowledge and those who have reason to know of direct infringement. Napster II, 239 F.3d at 1020. A defendant is vicariously liable for copyright infringement if he enjoys a direct financial benefit from another's infringing activity and "has the right and ability to supervise" the infringing activity. Napster II, 239 F.3d at 1022 (quoting Gershwin Publ'g Corp., 443 F.2d at 1162); Fonovisa, Inc. v. Cherry Auction, Inc., 76 F.3d 259, 262 (9th Cir.1996); 3 Melville B. Nimmer & David Nimmer, Nimmer on Copyright § 12.04[A][1] (perm.ed., rev.vol.2003).

Congress enacted the DMCA in 1998 to comply with international copyright treaties and to update domestic copyright law for the online world. See Digital Millennium Copyright Act, Pub.L. No. 105-304, 112 Stat. 2860 (1998); 3 Nimmer on Copyright § 12A.02[A]; David W. Quinto, Law of Internet Disputes § 6.02 (2002). Difficult and controversial questions of copyright liability in the online world prompted Congress to enact Title II of the DMCA, the Online Copyright Infringement Liability Limitation Act (OCILLA). 17 U.S.C. § 512 (2003). OCILLA endeavors to facilitate cooperation among Internet service providers and copyright owners "to detect and deal with copyright infringements that take place in the digital networked environment." S. Rep. 105-190, at 20 (1998); H.R. Rep. 105-551, pt. 2, at 49 (1998). Congress hoped to provide "greater certainty to service providers concerning their legal exposure for infringements that may occur in the course of their activities." Id.

But "[r]ather than embarking on a wholesale clarification of" the various doctrines of copyright liability, Congress opted "to leave current law in its evolving state and, instead, to create a series of `safe harbors,' for certain common activities of service providers." S. Rep. 105-190, at 19. Under OCILLA's four safe harbors, service providers may limit their liability for claims of copyright infringement. 17 U.S.C. § 512(a-d). These safe [1077] harbors provide protection from liability for: (1) transitory digital network communications;[6] (2) system caching;[7] (3) information residing on systems or networks at the direction of users;[8] and (4) information location tools.[9] Far short of adopting enhanced or wholly new standards to evaluate claims of copyright infringement against online service providers, Congress provided that OCILLA's "limitations of liability apply if the provider is found to be liable under existing principles of law." S. Rep. 105-190, at 19 (emphasis added).

We thus agree with the district court that "[t]he DMCA did not simply rewrite copyright law for the on-line world." Ellison, 189 F.Supp.2d at 1061. Congress would have done so if it so desired. Claims against service providers for direct, contributory, or vicarious copyright infringement, therefore, are generally evaluated just as they would be in the non-online world.

III. Ellison's Claims Against AOL

A. Contributory Copyright Infringement

Ellison alleged in his complaint that AOL was contributorily liable for copyright infringement. To substantiate his claim, he must show that AOL knew or had reason to know of the infringing activity taking place on its USENET servers and that AOL materially contributed to the infringing activity.

1. Knowledge

We first consider whether AOL knew or had reason to know of the infringing activity. The district court found that AOL did not have actual knowledge of the infringement before Ellison filed his copyright infringement action, but concluded that "a reasonable trier of fact could certainly find that AOL had reason to know that infringing copies of Ellison's works were stored on their Usenet servers." Ellison, 189 F.Supp.2d at 1058. We agree.

AOL changed its contact e-mail address from "copyright@aol.com" to "aolcopyright@aol.com" in the fall of 1999, but waited until April 2000 to register the change with the U.S. Copyright Office. Moreover, AOL failed to configure the old e-mail address so that it would either forward messages to the new address or return new messages to their senders. In the meantime, complaints such as Ellison's went unheeded, and complainants were not notified that their messages had not been delivered. Furthermore, there is evidence in the record suggesting that a phone call from AOL subscriber John J. Miller to AOL should have put AOL on notice of the infringing activity on the particular USENET group at issue in this case, "alt.binaries.e-book." Miller contacted AOL to report the existence of unauthorized copies of works by various authors. Because there is evidence indicating that AOL changed its e-mail address in an unreasonable manner and that AOL should have been on notice of infringing activity we conclude that a reasonable trier of fact could find that AOL had reason to know of potentially infringing activity occurring within its USENET network.

2. Material Contribution

The second element a plaintiff must prove to succeed on a claim of contributory copyright infringement is that the defendant materially contributed to another's infringement. Napster II, 239 F.3d at 1022. The district court found that Ellison demonstrated a triable issue regarding [1078] whether AOL materially contributed to the copyright infringement:

The Court agrees with the findings of the court in Netcom that "[p]roviding a service that allows for the automatic distribution of all Usenet postings, infringing and noninfringing" can constitute a material contribution when the [Internet service provider] knows or should know of infringing activity on its system "yet continues to aid in the accomplishment of ... [the direct infringer's] purpose of publicly distributing the postings."

Ellison, 189 F.Supp.2d at 1059 (quoting Religious Tech. Ctr. v. Netcom Online Communication Servs., Inc., 907 F.Supp. 1361, 1375 (N.D.Cal.1995)); see also 3 Nimmer on Copyright § 12B.01[A][1] n. 50 (indicating that Netcom's inaction constituted material contribution). In Netcom, the copyright holders of certain works of L. Ron Hubbard sued the operator of a news-group and a large Internet service provider, Netcom, for copyright infringement. The Netcom court held that the fact that the USENET service allowed Netcom's subscribers access to copyrighted works was sufficient to raise a triable issue regarding material contribution. Netcom, 907 F.Supp. at 1375. We conclude that this reasoning applies to Ellison's claim of contributory copyright infringement. Because a reasonable trier of fact could conclude that AOL materially contributed to the copyright infringement by storing infringing copies of Ellison's works on its USENET groups and providing the groups' users with access to those copies, we agree with the district court's finding that this constituted a triable issue.

B. Vicarious Copyright Infringement

Ellison alleges that AOL is vicariously liable for copyright infringement. Thus, Ellison must show that AOL derived a direct financial benefit from the infringement and had the right and ability to supervise the infringing activity.

"Financial benefit exists where the availability of infringing material `acts as a "draw" for customers.'" Napster II, 239 F.3d at 1023 (quoting Fonovisa, 76 F.3d at 263-64). In Napster II, we found that Napster increased its userbase by providing its customers with access to pirated copies of protected works and that "[a]mple evidence support[ed] the district court's finding that Napster's future revenue[was] directly dependent upon increases in userbase." Id. (quotations omitted). But in this case, the district court sought to distinguish Napster II. The district court emphasized that virtually all of Napster's "draw" of customers resulted from Napster's providing access to infringing material. Because AOL's USENET group access constituted a relatively insignificant draw when cast against AOL's vast array of products and services, the district court reasoned, AOL did not receive a direct financial benefit from the infringing activity.[10]

The district court interprets Fonovisa and "direct financial benefit" to require a "substantial" proportion of a defendant's income to be directly linked to infringing activities for the purpose of vicarious liability analysis. Ellison, 189 F.Supp.2d at 1062-64. We disagree with the addition of this quantification requirement. We concluded in Fonovisa that "the sale of pirated recordings at the Cherry Auction swap meet is a `draw' for customers," which we held sufficient to state the financial benefit element of the claim for vicarious liability. Fonovisa, 76 [1079] F.3d at 263-64. There is no requirement that the draw be "substantial."

AOL offers access to USENET groups as part of its service for a reason: it helps to encourage overall subscription to its services. Here, AOL's future revenue is directly dependent upon increases in its userbase. Certainly, the fact that AOL provides its subscribers access to certain USENET groups constitutes a small "draw" in proportion to its overall profits, but AOL's status as a behemoth online service provider, by itself, does not insulate it categorically from vicarious liability. Regardless of what fraction of AOL's earnings are considered a direct result of providing its subscribers access to the USENET groups that contained infringing material — indeed, almost any aspect of AOL's services would appear relatively minuscule because of its sheer size — they would be earnings nonetheless. The essential aspect of the "direct financial benefit" inquiry is whether there is a causal relationship between the infringing activity and any financial benefit a defendant reaps, regardless of how substantial the benefit is in proportion to a defendant's overall profits.

Given this framework, the question before us is whether there is a triable issue of a material fact regarding whether AOL received a direct financial benefit from the copyright infringement. Ellison proffers the following evidence to support his contention that AOL received a direct financial benefit from the infringement: (1) an AOL securities filing that reflects the central importance of attracting and retaining subscribers for its business and revenue generation and (2) evidence indicating that many subscribers inquired about AOL blocking access to the USENET group at issue. This evidence is hardly compelling. We note that there is no evidence that indicates that AOL customers either subscribed because of the available infringing material or canceled subscriptions because it was no longer available. While a causal relationship might exist between AOL's profits from subscriptions and the infringing activity taking place on its USENET servers, Ellison has not offered enough evidence for a reasonable juror so to conclude.

We recognize, of course, that there is usually substantial overlap between aspects of goods or services that customers value and aspects of goods or services that ultimately draw the customers. There are, however, cases in which customers value a service that does not "act as a draw." Accordingly, Congress cautions courts that "receiving a one-time set-up fee and flat periodic payments for service ... [ordinarily] would not constitute receiving a `financial benefit directly attributable to the infringing activity.'" S. Rep. 105-190, at 44. But "where the value of the service lies in providing access to infringing material," courts might find such "one-time set-up and flat periodic" fees to constitute a direct financial benefit. Id. at 44-45. Thus, the central question of the "direct financial benefit" inquiry in this case is whether the infringing activity constitutes a draw for subscribers, not just an added benefit.

The record lacks evidence that AOL attracted or retained subscriptions because of the infringement or lost subscriptions because of AOL's eventual obstruction of the infringement. Accordingly, no jury could reasonably conclude that AOL received a direct financial benefit from providing access to the infringing material. Therefore, Ellison's claim of vicarious copyright infringement fails.[11]

[1080] IV. AOL and the Safe Harbors from Liability Under the DMCA

A. Threshold Eligibility Under § 512(i) for OCILLA's Safe Harbors

To be eligible for any of the four safe harbor limitations of liability, a service provider must meet the conditions for eligibility set forth in OCILLA. 17 U.S.C. § 512(i). The safe harbor limitations of liability only apply to a service provider that:

(A) has adopted and reasonably implemented, and informs subscribers and account holders of the service provider's system or network of, a policy that provides for the termination in appropriate circumstances of subscribers and account holders of the service provider's system or network who are repeat infringers; and

(B) accommodates and does not interfere with standard technical measures.[12]

17 U.S.C. § 512(i)(1). If a service provider does not meet these threshold requirements, it is not entitled to invoke OCILLA's safe harbor limitations on liability. 17 U.S.C. § 512(i)(1).

We hold that the district court erred in concluding on summary judgment that AOL satisfied the requirements of § 512(i). There is at least a triable issue of material fact regarding AOL's eligibility for the safe harbor limitations of liability in this case. Section 512(i)(1)(A) requires service providers to: (1) adopt a policy that provides for the termination of service access for repeat copyright infringers in appropriate circumstances; (2) implement that policy in a reasonable manner; and (3) inform its subscribers of the policy. It is difficult to conclude as a matter of law, as the district court did, that AOL had "reasonably implemented" a policy against repeat infringers. There is ample evidence in the record that suggests that AOL did not have an effective notification procedure in place at the time the alleged infringing activities were taking place. Although AOL did notify the Copyright Office of its correct e-mail address before Ellison's attorney attempted to contact AOL and did post its correct e-mail address on the AOL website with a brief summary of its policy as to repeat infringers, AOL also: (1) changed the e-mail address to which infringement notifications were supposed to have been sent; and (2) failed to provide for forwarding of messages sent to the old address or notification that the e-mail address was inactive. See Ellison, 189 F.Supp.2d at 1057-58. AOL should have closed the old e-mail account or forwarded the e-mails sent to the old account to the new one. Instead, AOL allowed notices of potential copyright infringement to fall into a vacuum and to go unheeded; that fact is sufficient for a reasonable jury to conclude that AOL had not reasonably implemented its policy against repeat infringers.

B. AOL and the Limitation of Liability Under § 512(a)

If after remand a jury finds AOL eligible under § 512(i) to assert OCILLA's safe harbor limitations of liability, the court need not revisit whether AOL qualifies for the limitation of liability provided by § 512(a).

The first safe harbor in OCILLA pertains to "transitory digital network communications." [1081] 17 U.S.C. § 512(a). Under this section, a service provider would not be liable for copyright infringement:

by reason of the provider's transmitting, routing, or providing connections for, material through a system or network controlled or operated by or for the service provider, or by reason of the intermediate and transient storage of that material in the course of such transmitting, routing, or providing connections, if —

(1) the transmission of the material was initiated by or at the direction of a person other than the service provider;

(2) the transmission, routing, provision of connections, or storage is carried out through an automatic technical process without selection of the material by the service provider;

(3) the service provider does not select the recipients of the material except as an automatic response to the request of another person;

(4) no copy of the material made by the service provider in the course of such intermediate or transient storage is maintained on the system or network in a manner ordinarily accessible to anyone other than anticipated recipients, and no such copy is maintained on the system or network in a manner ordinarily accessible to such anticipated recipients for a longer period than is reasonably necessary for the transmission, routing, or provision of connections; and

(5) the material is transmitted through the system or network without modification of its content.

Id. The definition of "service provider" for the purposes of the § 512(a) safe harbor limitation of liability is "an entity offering the transmission, routing, or providing of connections for digital online communications, between or among points specified by a user, of material of the user's choosing, without modification to the content of the material as sent or received." 17 U.S.C. § 512(k)(1)(A).

Whether AOL functioned as a conduit service provider in this case presents pure questions of law: was the fourteen day period during which AOL stored and retained the infringing material "transient" and "intermediate" within the meaning of § 512(a)?; was "no ... copy ... maintained on the system or network ... for a longer period than is reasonably necessary for the transmission, routing, or provision of connections?" The district court appropriately answered these questions in the affirmative. In doing so, the court relied upon on the legislative history indicating that Congress intended the relevant language of § 512(a) to codify the result of Netcom, 907 F.Supp. at 1361 (provider that stored Usenet messages for 11 days not liable for direct infringement merely for "installing and maintaining a system whereby software automatically forwards messages received from subscribers onto the Usenet, and temporarily stores copies on its system"), and to extend it to claims for secondary liability. We affirm the district court's ruling that AOL is eligible for the safe harbor limitation of liability of § 512(a).[13]

Conclusion

We conclude that the district court correctly identified triable issues of fact with respect to Ellison's claim against AOL for contributory copyright infringement. We also agree with the district court that Ellison's claim for vicarious copyright infringement fails; Ellison did not offer sufficient evidence that AOL received a direct [1082] financial benefit from the infringement to survive summary judgment. Further, because we conclude that the district court failed to discern triable issues of fact concerning AOL's threshold eligibility under § 512(i) for the DMCA's safe harbor limitations of liability, we reverse the district court's judgment on this matter. If a jury determines that AOL is eligible for the DMCA's safe harbor limitations of liability under § 512(i), the parties do not need to relitigate whether AOL satisfies the requirements of § 512(a) in this case; we agree with the district court that it does.

In sum, we AFFIRM in part and REVERSE in part the district court's summary judgment in favor of AOL. We REMAND for trial on Ellison's claim of contributory copyright liability, and, if necessary, on AOL's eligibility under § 512(i) to assert the DMCA's safe harbor limitations of liability. Each party to bear its own costs.

AFFIRMED in part, REVERSED in part, and REMANDED.

[1] The Honorable Louis F. Oberdorfer, Senior Judge, United States District Court for the District of Columbia, sitting by designation.

[2] USENET is an abbreviation of "user network." This term refers to an international collection of organizations and individuals (known as "peers") whose computers connect to one another and exchange messages posted by USENET users. See Ellison v. Robertson, 189 F.Supp.2d 1051, 1053 (C.D.Cal.2002).

[3] A news-group is an online forum for USENET users to discuss, read about, or post messages on a particular topic. News-groups are commonly organized around a particular shared interest, such as science fiction or politics. See Religious Tech. Ctr. v. Netcom Online Communication Servs., Inc., 923 F.Supp. 1231, 1239 n. 5 (N.D.Cal.1995).

[4] Title II of the DMCA, 17 U.S.C. § 512, is also known as the Online Copyright Infringement Liability Limitation Act (OCILLA).

[5] The district court granted AOL's motion for summary judgment with respect to Ellison's claim of direct copyright infringement. See Ellison, 189 F.Supp.2d at 1056-57. Ellison abandoned his claim for direct infringement on appeal.

[6] 17 U.S.C. § 512(a).

[7] 17 U.S.C. § 512(b).

[8] 17 U.S.C. § 512(c).

[9] 17 U.S.C. § 512(d).

[10] Ellison, 189 F.Supp.2d at 1062-64 ("Making it easier to exchange infringing copies of music files was Napster's main draw.... By contrast, only a tiny fraction of AOL usage has anything to do with USENET, and only a substantially smaller subset of that usage appears to have anything to do with infringing copyrights.").

[11] Because Ellison's argument that AOL received a direct financial benefit from the infringement in this case fails, we need not address whether AOL had the right and ability to supervise the infringing activity.

[12] "Standard technical measures" refers to technical measures that copyright owners use to identify or to protect copyrighted works and: (1) have been developed pursuant to a broad consensus of copyright owners and service providers in an open, fair, voluntary, multi-industry standards process; (2) are available to any person on reasonable and nondiscriminatory terms; and (3) do not impose substantial costs on service providers or substantial burdens on their systems or networks. 17 U.S.C. § 512(i)(2).

[13] Because a jury has not found AOL liable for copyright infringement and eligible under § 512(i) for the safe harbor limitations of liability, we do not address (nor did the district court) whether AOL could successfully assert the safe harbor under § 512(c).

6.6.4 Ellison v. Robertson 6.6.4 Ellison v. Robertson

This district court case examines the usenet posting discussed in the appellate case

189 F.Supp.2d 1051 (2002)

Harlan ELLISON, an individual Plaintiff(s),
v.
Stephen ROBERTSON, an individual; America Online, Inc., a corporation; Remarq Communities, Inc., a corporation; Critical Path, Inc., a corporation; "Citizen 513," an individual; and Does 1 through 10, Defendant(s).

No. CV 00-04321 FMC.

United States District Court, C.D. California.

March 13, 2002.

[1052] Glen L. Kulik, Gottesman & Mouton, Sherman Oaks, CA, Charles E. Petit, Charles E. Petit Law Offices, Urbana, IL, for Plaintiff.

[1053] Daniel Scott Schecter, Catherine S. Lee, Cristian Stauffer Torres, Latham & Watkins, Los Angeles, CA, for Defendant.

ORDER GRANTING DEFENDANT AOL'S MOTION FOR SUMMARY JUDGMENT

COOPER, District Judge.

Introduction

When an overenthusiastic fan uploads his favorite author's novels to a newsgroup on the internet, what is the liability of an internet service provider, such as AOL, for allowing the books to reside for two weeks on their USENET server? The impact of the Digital Millenium Copyright Act on this issue presents a question of first impression in the Ninth Circuit

I. Procedural Posture

This matter is before the Court on (1) Defendant AOL's Motion for Summary Adjudication, filed June 4, 2001; (2) Defendant AOL's Motion for Summary Judgment, filed November 26, 2001; and (3) Plaintiff's Motion for Summary Adjudication, filed November 27, 2001. This matter came on for hearing on February 4, 2002. The parties were in possession of the Court's tentative decision to grant Summary Judgment to Defendant AOL. Following oral argument, the matter was taken under submission. For the reasons set forth below, the Court hereby GRANTS summary judgment in favor of AOL.[1]

II. Background

A. Factual History

Plaintiff Harlan Ellison is the author of many works of fact and fiction, particularly science fiction. He is the owner of the valid copyrights to most if not all of those works and has registered his copyrights in accordance with all applicable laws. Some of his fictional works, however, have been copied and distributed on the internet without his permission.

Some time in late March or early April 2000, Stephen Robertson scanned a number of Ellison's fictional works in order to convert them to digital files. Thereafter, Robertson uploaded and copied the files onto the USENET newsgroup "alt.binaries.e-book." Robertson accessed the internet through his local internet services provider, Tehama County Online ("TCO"); his USENET service was provided by RemarQ Communities, Inc. ("RemarQ"). The USENET, an abbreviation of "User Network," is an international collection of organizations and individuals (known as `peers') whose computers connect to each other and exchange messages posted by USENET users.[2] Messages are organized into "newsgroups," which are topic-based discussion forums where individuals exchange ideas and information.[3] Users' messages may contain the users' analyses and opinions, copies of newspaper or magazine articles, and even binary files containing binary copies of musical and literary works. "Alt.binaries.e-book", the newsgroup at issue in this case, seems to have been used primarily to exchange pirated [1054] and unauthorized digital copies of text material, primarily works of fiction by famous authors, including Ellison.

Peers in USENET enter into peer agreements, whereby one peer's servers automatically transmit and receive newsgroup messages from another peer's servers. As most peers are parties to a large number of peer agreements, messages posted on one USENET peer's server are quickly transmitted around the world. The result is a huge informational exchange system whereby millions of users can exchange millions of messages every day.

AOL has been a USENET peer since 1994, and its USENET servers automatically transmit and receive newsgroup messages from at least 41 other peers. AOL estimates that its peer servers receive 4.5 terabytes of data in more than twenty-four million messages each week from AOL's peers. This data is automatically transmitted to and received by AOL's USENET servers, which are computers that are accessed by AOL's users when they reach the USENET system through AOL's newsgroup service. In late March and early April 2000, when Robertson posted the infringing copies of Ellison's works, AOL's retention policy provided for USENET messages containing binary files to remain on the company's servers for fourteen days.

After Robertson uploaded the infringing copies of Ellison's works to the alt.binaries.e-book newsgroup, they were then forwarded and copied throughout USENET onto servers all over the world, including those belonging to AOL. As a result, AOL users had access to the alt.binaries.e-book newsgroup containing the infringing copies of Ellison's works. As these infringing copies were in binary file form, they would have remained on AOL's servers for approximately fourteen days.

On or about April 13, 2000, Plaintiff learned of the infringing activity and contacted counsel. After researching the notification procedures of 17 U.S.C. § 512, the Digital Millennium Copyright Act ("DMCA"), Plaintiff's counsel sent an e-mail on April 17, 2000, to TCO's and AOL's agents for notice of copyright infringement. Plaintiff received an acknowledgment of receipt from TCO, but no response from AOL, which claims never to have received that e-mail.

On April 24, 2000, Plaintiff filed suit against AOL and other Defendants. After having been served by Plaintiff on April 26, 2000, AOL blocked its users' access to alt.binaries.e-book.

B. Procedural History

On April 24, 2000, Plaintiff filed his original complaint with this Court. Shortly thereafter, on May 30, 2000, Plaintiff filed a First Amended Complaint. On June 1, 2000, a consent judgment was entered in which one of the Defendants, Stephen Robertson, agreed to pay Plaintiff the sum of $3,648.96. Plaintiff in turn dismissed Robertson from the lawsuit. On July 27, 2000, the Court issued an Order granting in part and denying in part Defendant AOL's Motion to dismiss.

On September 26, 2000, Plaintiff filed a second amended complaint ("SAC") against America Online, Inc. ("AOL"), RemarQ Communities, Inc. (RemarQ), Critical Path, Inc. ("CP") (RemarQ's parent company), Citizen 513, and Does on October 27, 2000, alleging the following causes of action:

(1) Direct Copyright Infringement against all Defendants;

(2) Contributory Infringement against all Defendants;

(3) Vicarious Infringement against RemarQ, CP, and AOL;

[1055] (4) Unfair Competition in Violation of Section 43(a) of the Lanham Act against all Defendants; and

(5) Trademark Dilution under Section 43(c) of the Lanham Act against all Defendants except Robertson and AOL.

On November 28, 2001, Plaintiff dismissed his Lanham Act claims as against AOL. On January 18, 2002, Plaintiff dismissed Defendant RemarQ from the case, the two parties having reached a settlement agreement. And on January 25, 2002, Plaintiff similarly dismissed his action against Defendant Critical Path.

On November 26, 2001, AOL filed a Motion for summary judgment, alleging that Plaintiff had failed to set forth prima facie cases of copyright infringement, and also claiming various defenses under the DMCA. On November 27, 2001, Plaintiff filed his own Motion for summary adjudication of his contributory and vicarious copyright infringement claims against AOL. This Order addresses all three of those Motions.[4]

III. Standard

Summary judgment is proper only where "the pleadings, depositions, answers to interrogatories, and admissions on file, together with the affidavits, if any, show that there is no genuine issue as to any material fact and that the moving party is entitled to judgment as a matter of law." Fed. Rule Civ. Pro. 56(c); see also Matsushita Elec. Indus. Co. v. Zenith Radio Corp., 475 U.S. 574, 106 S.Ct. 1348, 89 L.Ed.2d 538 (1986).

The moving party bears the initial burden of demonstrating the absence of a genuine issue of material fact. Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 256, 106 S.Ct. 2505, 91 L.Ed.2d 202 (1986). Whether a fact is material is determined by looking to the governing substantive law; if the fact may affect the outcome, it is material. Id. at 248, 477 U.S. 242, 106 S.Ct. 2505, 91 L.Ed.2d 202.

If the moving party meets its initial burden, the "adverse party may not rest upon the mere allegations or denials of the adverse party's pleading, but the adverse party's response, by affidavits or as otherwise provided in this rule, must set forth specific facts showing that there is a genuine issue for trial." Fed.R.Civ.P. 56(e). Mere disagreement or the bald assertion that a genuine issue of material fact exists does not preclude the use of summary judgment. Harper v. Wallingford, 877 F.2d 728 (9th Cir.1989).

The Court construes all evidence and reasonable inferences drawn therefrom in favor of the non-moving party. Anderson, 477 U.S. at 255, 106 S.Ct. 2505; Brookside Assocs. v. Rifkin, 49 F.3d 490, 492-93 (9th Cir.1995).

[1056] IV. Discussion

A. Plaintiff's case against AOL for copyright infringement

AOL contends that Plaintiff cannot establish the prima facie elements of his direct, contributory, and vicarious copyright infringement claims against it, and therefore summary adjudication is appropriate. Plaintiff disputes AOL's contentions and asserts that he is entitled to summary adjudication of his contributory and vicarious copyright infringement claims.

1. Direct copyright infringement

"Plaintiffs must satisfy two requirements to present a prima facie case of direct infringement: (1) they must show ownership of the allegedly infringed material and (2) they must demonstrate that the alleged infringers violated at least one exclusive right granted to copyright holders under 17 U.S.C. § 106." A & M Records, Inc. v. Napster, Inc., 239 F.3d 1004, 1013 (2001).

It is undisputed that Plaintiff owns valid copyrights for most, if not all, of the allegedly infringed works identified in his Complaint.[5] And if AOL were found to have copied any of Ellison's works then it might have violated, for example, his exclusive rights to reproduction and distribution. See 17 U.S.C. § 106(1), (3). AOL contends, however, that it has not in any way copied Ellison's works. In his second amended complaint Plaintiff alleges that AOL made copies of his works on its USENET servers after receiving the USENET messages posted by Robertson, and that one binary file containing a copied work remained on AOL's servers for ten days after Plaintiff's counsel sent the company a Notification of Infringement e-mail.[6]

In his Opposition to AOL's Motion for summary judgment, however, Ellison does not respond to AOL's argument that there was no direct copyright infringement. Accordingly, it appears that he has abandoned his direct infringement claim against AOL. Regardless, AOL's role in the infringement as a passive provider of USENET access to AOL users cannot support direct copyright infringement liability. See Religious Technology Center v. Netcom On-Line Communication Services, Inc., 907 F.Supp. 1361, 1372-73 (N.D.Cal.1995). In Netcom, the court held that the defendant, an internet services [1057] provider like AOL, could not be found guilty of direct copyright infringement based on copies of works that were made and stored on its USENET servers. See id; accord ALS Scan, Inc. v. RemarQ Communities, Inc., 239 F.3d 619, 622 (4th Cir.2001); Costar Group, Inc. v. Loopnet, Inc., 164 F.Supp.2d 688, 696 (D.Md.2001). The Netcom Court stated that assigning direct copyright infringement liability to ISPs would be pointless:

These parties [the ISPs], who are liable under plaintiff's theory, do no more than operate or implement a system that is essential if Usenet messages are to be widely distributed. There is no need to construe the [Copyright] Act to make all of these parties infringers.

Id. at 1369-70. The court based this decision on its conclusion that "[t]he court does not find workable a theory of direct infringement that would hold the entire Internet liable for activities that cannot reasonably be deterred." Id. at 1372. While the Netcom court left open the possibility that an ISP with USENET messages on its servers might be guilty of contributory infringement under certain circumstances, it held that direct infringement liability should be limited to those users, like Robertson, who are responsible for the actual copying. See id. at 1372-73;

The Court agrees with the analysis of the court in Netcom. Accordingly, summary adjudication of Plaintiff's direct copyright infringement claim against AOL is granted.

2. Contributory copyright infringement

"[O]ne who, with knowledge of the infringing activity, induces, causes or materially contributes to the infringing conduct of another, may be liable as a `contributory' infringer ... Put differently, liability exists if the defendant engages in personal conduct that encourages or assists the infringement." A & M Records, Inc. v. Napster, Inc., 239 F.3d 1004, 1019 (2001) (internal quotations and citations omitted). "The absence of such language in the copyright statute does not preclude the imposition of liability for copyright infringement on certain parties who have not themselves engaged in the infringing activity. For vicarious liability is imposed in virtually all areas of the law, and the concept of contributory infringement is merely a species of the broader problem of identifying the circumstances in which it is just to hold one individual accountable for the actions of another." Sony Corp. v. Universal City Studios, Inc., 464 U.S. 417, 435, 104 S.Ct. 774, 78 L.Ed.2d 574 (1984).

(i) Knowledge

The knowledge requirement means that the contributory infringer must "know or have reason to know of direct infringement." Id. at 1020 (internal quotations omitted). Plaintiff argues that AOL actually knew about the infringing copies of his works on their USENET servers based on the email that his attorney sent to AOL on April 17, 2000. But AOL claims never to have received that e-mail and asserts that it was first put on notice of infringement when it was served with a copy of Plaintiff's initial complaint. The Court accepts AOL employees' assurances that they never received the e-mail,[7] and finds Plaintiff's argument somewhat puzzling given his professed belief, supported in detail in his briefs, that his attorney's e-mail was not received because AOL had provided the Copyright Office with an incorrect e-mail contact address, and his attorney had relied on that address when trying to contact [1058] AOL. Accordingly, the Court finds that AOL did not have actual knowledge of the infringement before being served by Ellison.

On the other hand, Ellison presents substantial evidence suggesting that AOL should have known about the infringement prior to being served. First, AOL's failure to receive the April 17, 2000, e-mail is its own fault. Inexplicably, AOL had changed its contact e-mail address from "copyright@aol.com" to "aolcopyright@aol.com" in fall 1999, but waited until April 2000 to notify the Copyright Office of this change. As a result, the complaints of individuals such as Ellison's attorney, who obtained AOL's e-mail address from the Copyright Office and attempted to notify AOL of infringement occurring on its servers were routed to the defunct account. Nor did AOL make provision for forwarding to the new address e-mails sent to the defunct account. AOL has declined to explain why it delayed months before notifying the Copyright Office of its change in e-mail addresses. If AOL could avoid the knowledge requirement through this oversight or deliberate action, then it would encourage other ISPs to remain willfully ignorant in order to avoid contributory copyright infringement liability. Based upon the record before the Court, a reasonable trier of fact could certainly find that AOL had reason to know that infringing copies of Ellison's works were stored on their Usenet servers.

In addition, AOL received further information about the infringement occurring on the USENET newsgroup accessible to AOL users from John J. Miller. Miller noticed a number of apparently unauthorized copies of various authors' works on the newsgroup and called AOL to report the suspicious activity, although he probably mentioned only works by authors other than Ellison. Even though it is not clear that Miller's phone call can be fairly said to have put AOL on notice of the infringing activity (he spoke only with low-level customer service representatives, it's not clear whether he expressly mentioned the alt.binaries.e-book newsgroup, and he did not follow up on the customer service representative's advice by sending AOL an e-mail setting forth the details of his complaint), it is another piece of evidence which might lead a reasonable trier of fact to conclude that AOL should have known about the infringement of Ellison's copyrights occurring in its newsgroup. For example, a reasonable trier of fact might conclude that AOL should have transferred Miller to speak with an employee with knowledge of AOL's copyright infringement policies instead of directing him to an e-mail address.[8]

(ii) Material contribution to the infringement

AOL correctly points out that it did not induce or encourage Robertson to directly infringe Ellison's copyrights. Plaintiff, however, maintains that AOL materially contributed to infringement by participating in USENET peering agreements which resulted in making the infringing copies of Ellison's works available to millions of AOL users. Plaintiff analogizes AOL's conduct to that of Napster, which was held to constitute a material contribution to infringement. See Napster, 239 F.3d at 1022. The Court of Appeals in Napster based its holding on the district court's finding that "[w]ithout the support services defendant provides, Napster users could not find and download the music [1059] they want with the ease of which defendant boasts." Id. (quoting A & M Records, Inc. v. Napster, Inc., 114 F.Supp.2d 896, 919-920 (N.D.Cal.2000)). As such, Napster was providing the "`site and facilities' for direct infringement." Napster, 239 F.3d at 1022. By analogy, Plaintiff alleges that AOL provided the site and facilities for direct infringement by storing infringing copies of Ellison's works on its USENET servers and providing its users with access to those copies.

In response, AOL contends that its mere provision of USENET access to its users, as a matter of law, is far too attenuated from the actual infringing activity to constitute a material contribution. In support it points to section 512(m) of the DMCA, which provides that an ISP does not have to monitor its service or affirmatively search for infringing activity on its network in order to qualify for any of the limitation-on-liability safe harbors.

The Court agrees with the findings of the court in Netcom that "[p]roviding a service that allows for the automatic distribution of all Usenet postings, infringing and noninfringing" can constitute a material contribution when the ISP knows or should know of infringing activity on its system "yet continues to aid in the accomplishment of Erlich's [the direct infringer's] purpose of publicly distributing the postings." Netcom, 907 F.Supp. at 1375. The court noted that "Netcom allows Erlich's infringing messages to remain on its system and be further distributed to other Usenet servers worldwide." Id.; see also Napster, 239 F.3d at 1021 (approving the Netcom Court's conclusion regarding Netcom's potential liability for contributory infringement); 3 NIMMER ON COPYRIGHT § 12B.01[A], at 12B-9 n. 50 ("Given that Netcom declined to cancel Erlich's messages, if plaintiffs could show that it had knowledge of their infringing character, it would make a strong showing for contributory infringement.").

In Netcom the court dealt with a situation in which the ISP had actual knowledge of the presence of infringing material on its USENET servers. Here, by contrast, there is a triable issue of fact as to whether AOL should have known of the infringing material on the alt.binaries.e-books newsgroup based on the e-mail sent to it by Plaintiff's counsel and the Miller phone call. Although there is some difference between an ISP actually knowing of infringement and ignoring requests to remedy the situation and an ISP remaining ignorant of infringement through its own fault and taking no action, the Netcom decision cannot be distinguished on that basis. To do so would invite ISPs to remain willfully ignorant of infringement on their servers (through the creation of unchecked notification e-mail addresses and other means), and would frustrate the careful balance struck by Congress when it enacted the DMCA.

In addition, Netcom is not legally distinguishable on the basis that AOL had no real connection with Robertson, whereas Netcom played a significant role in connecting Erlich, the direct infringer, to the Internet. Although a trier of fact might consider this difference in reaching the conclusion that AOL did not make a material contribution to Robertson's underlying infringement, that difference cannot alone transform a triable issue of fact into a determination suitable for summary adjudication. Netcom analyzed the ISP's behavior after the infringement had already occurred, and with regard to contributory infringement, the court's central concern was the ISP's decision to leave the infringing messages on its system even after receiving the plaintiff's infringement complaint. Similar concerns provide the basis [1060] for plaintiff's contributory infringement claim against AOL.

Accordingly, the Court finds that Plaintiff has demonstrated a triable issue of fact as to whether AOL materially contributed to the direct infringement of Ellison's copyrights by others.

3. Vicarious copyright infringement

"In the context of copyright law, vicarious liability extends beyond an employer/employee relationship to cases in which a defendant `has the right and ability to supervise the infringing activity and also has a direct financial interest in such activities.'" Napster, 239 F.3d at 1022 (quoting Gershwin Publ'g Corp. v. Columbia Artists Mgmt., Inc., 443 F.2d 1159, 1162 (2d. Cir.1971)). "Unlike contributory infringement, knowledge is not an element of vicarious liability." Netcom, 907 F.Supp. at 1375 (citing to 3 NIMMER ON COPYRIGHT § 12.04[A][1], at 12-70).

1. Right and ability to supervise the infringing activity

AOL maintains that it did not possess the right or ability to supervise Robertson's infringing acts because of the automated nature of its participation in the USENET system. Robertson never used the AOL system to upload the infringing copies of Plaintiff's works, and his posting was just one of millions of USENET postings that AOL servers automatically receive from peers each week.

Plaintiff, on the other hand, contends that the Ninth Circuit's recent decision in Napster defeats AOL's position. In Napster, the Court found that Napster's "ability to block infringers' access to a particular environment for any reason whatsoever is evidence of the right and ability to supervise." Id. at 1023. AOL had the same capacity to block infringers' access to its USENET servers, Plaintiff argues, as demonstrated by AOL's successful blocking of the alt.binaries.e-book newsgroup from access by AOL users upon receiving notice of Plaintiff's lawsuit. Further support comes from Netcom. In Netcom, the court found there was a triable issue of fact as to an ISP's right and ability to control and supervise infringement on its system. The court also stated that whether the ISP's ability to terminate the accounts of infringers and to block access to or delete infringing material "occurred before or after the abusive conduct is not material to whether Netcom can exercise control." Id. at 1376.

AOL disputes the Napster analogy. The Napster system, AOL argues, was closed and afforded Napster the right and ability to control infringing parties because only Napster members could access and commit infringement on the system. By contrast, AOL's after-the-fact ability to remove or block access to infringing activities by non-AOL users such as Robertson does not constitute an ability to control or supervise. Robertson accessed USENET from outside of AOL, and AOL had no ability to effectively control his infringement.

AOL also points to the recent decision in Hendrickson v. Ebay in support of its contention that it did not possess the right and ability to control the infringing activity. See Hendrickson v. Ebay, 165 F.Supp.2d 1082 (C.D.Cal.2001). In Ebay, the district court held that "the `right and ability to control' the infringing activity, as the concept is used in the DMCA, cannot simply mean the ability of a service provider to remove or block access to materials posted on its website or stored on its system." Id. at 1093. The court reasoned that because the DMCA specifically requires ISPs to remove or block access to infringing materials in order to avail themselves of the limitation on liability found in subsection 512(c), the "right and ability to [1061] control" must mean something more than the ability to delete or block access to infringing materials after the fact. See id. Otherwise, "a service provider loses immunity under the safe-harbor provision of the DMCA because it engages in acts that are specifically required by the DMCA." Id. at 1094.

The Ebay court's analysis somewhat overstates the predicament (ISPs not receiving a financial benefit directly attributable to the infringing activity would not face this "catch-22"), but it does raise an interesting point, namely: ISPs that do receive a financial benefit directly attributable to the infringing activity and that wish to avail themselves of subsection (c)'s safe harbor are required by 512(c)(1)(C) to delete or block access to infringing material. Yet in taking such action they would, in Plaintiff's analysis, be admitting that they have the "right and ability to control" infringing activity, which under 512(c)(1)(B) would prevent them from qualifying for the subsection (c) safe harbor. It is conceivable that Congress intended that ISPs which receive a financial benefit directly attributable to the infringing activity would not, under any circumstances, be able to qualify for the subsection (c) safe harbor. But if that was indeed their intention, it would have been far simpler and much more straightforward to simply say as much. The Court does not accept that Congress would express its desire to do so by creating a confusing, self-contradictory catch-22 situation that pits 512(c)(1)(B) and 512(c)(1)(C) directly at odds with one another, particularly when there is a much simpler explanation: the DMCA requires more than the mere ability to delete and block access to infringing material after that material has been posted in order for the ISP to be said to have "the right and ability to control such activity."

The DMCA did not simply rewrite copyright law for the on-line world. Rather it crafted a number of safe harbors which insulate ISPs from most liability should they be accused of violating traditional copyright law.[9] And the legislative history expressly states that "new Section 512 does not define what is actionable copyright infringement in the on-line environment ... [t]he rest of the Copyright Act sets those rules." H.R. Rep. 105-551(II), at p. 64 (July 22, 1998). Nonetheless, there is much to be gained from defining and analyzing certain terms and concepts consistently throughout copyright law, including the DMCA. And when Congress chooses to utilize exact phrases that have a specialized legal meaning under copyright law (i.e. "the right and ability to control infringing activity"),[10] and gives those phrases a certain meaning in one context (i.e. under the DMCA, the ability to delete or block access to infringing materials after the infringement has occurred is not enough to constitute "the right and ability to control"), Congress's choice provides at least persuasive support in favor of giving that phrase a similar meaning when used elsewhere in copyright law.

Moreover, the right and ability to control the infringing behavior in AOL's case [1062] was substantially less than that enjoyed by the ISP in Netcom. There, the ISP was one of two entities responsible for providing the direct infringer with access to the Internet. See Netcom, 907 F.Supp. at 1365-66. As a result, by taking affirmative steps against the other entity involved, the ISP had the ability to target the infringer himself and deny him access to the Internet. By contrast, AOL had no such ability to go after Robertson personally here. Rather, it found itself in the same situation as every other ISP in the world that had entered into peer agreements which included the alt.binaries.e-book newsgroup. It could delete or block users' access to the infringing postings, but it could not do anything to restrict the infringing activity at the root level.

The Court holds that AOL's ability to delete or block access to Robertson's postings of infringing material after those postings had already found their way onto AOL's USENET servers was insufficient to constitute "the right and ability to control the infringing activity" as that term is used in the context of vicarious copyright infringement.

2. Direct financial benefit

Even if AOL had the right and ability to control Robertson's infringing activity, it would not be liable for vicarious copyright infringement because it did not derive a direct financial benefit from that activity. "Financial benefit exists where the availability of infringing material `acts as a "draw" for customers.'" Napster, 239 F.3d at 1023 (quoting Fonovisa, Inc. v. Cherry Auction, Inc., 76 F.3d 259 (9th Cir.1996)).

Ellison maintains that AOL's provision of access to USENET newsgroups does act as a draw for customers. Like e-mail or instant massaging, USENET access is one of the many services AOL provides in order to lure new customers and retain old ones, Ellison urges. According to Plaintiff, AOL's situation is indistinguishable from that in Napster, where the Court of Appeals held that "[a]mple evidence supports the district court's finding that Napster's future revenue is directly dependent upon `increases in userbase.'" Id. at 1023.

Plaintiff's argument ignores the requirement that any alleged financial benefit must be direct. AOL did not receive any financial compensation from its peering agreements and participation in USENET. And USENET usage constitutes a very small percentage, 0.25%, of AOL's total member usage; any "draw" to one particular newsgroup, such as alt.binaries.e-book, is minuscule and remote, as the pro rata "draw" of any single newsgroup (AOL carries more than 43,000 total) constitutes approximately 0.00000596% of AOL's total usage. Moreover, the relevant subset of activity is not simply USENET newsgroup usage, but that portion of USENET usage which is related to copyright infringement. By way of example, only ten of AOL's more than 20 million users inquired when AOL blocked all access to alt.binaries.e-book on April 28, 2000.

USENET postings containing infringing copies of copyrighted works cannot be characterized as a significant "draw" for customers. USENET usage constitutes a very small percentage of total AOL usage, and Plaintiff has failed to produce any evidence suggesting that a significant portion of even that minimal usage entails the illegal exchange of files containing copyrighted material. In this way AOL's situation is radically different from that of Napster, whose service was devoted to the exchange of mp.3 music files which usually contained unauthorized copies of copyrighted material. Making it easier to exchange infringing copies of music files was Napster's main draw:

[1063] And here the evidence establishes that a majority of Napster users use the service to download and upload copyrighted music. This, in fact, should come as no surprise to Napster since that really, it's clear from the evidence in this case and the early records that were divulged in discovery, was the purpose of it.

A&M; Records, Inc. v. Napster, Inc., 2000 WL 1009483, at *1 (N.D.Cal. July 26, 2000) (transcript of the proceedings). By contrast, only a tiny fraction of AOL usage has anything to do with USENET, and only a substantially smaller subset of that usage appears to have anything to do with infringing copyrights.

Fonovisa presents another case in which courts have required that the sale or distribution of infringing materials must be a significant draw to customers in order for vicarious copyright liability to apply. In Fonovisa, the defendant operated a swap meet at which third-party vendors routinely sold counterfeit recordings that infringed on the plaintiff's copyrights. Id. at 260. For example, a single 1991 Sheriff's department raid had netted more than 38,000 pirated recordings. "The facts alleged by Fonovisa ... reflect that the defendants reap substantial financial benefits from admission fees, concession stand sales and parking fees, all of which flow directly from customers who want to buy the counterfeit recordings at bargain basement prices." Id. at 263. "In short, in Fonovisa, a symbiotic relationship existed between the infringing vendors and the landlord." Adobe Systems Incorporated v. Canus Productions, Inc., 173 F.Supp.2d 1044 (C.D.Cal.2001) (discussing Fonovisa).[11]

By contrast, the record before the Court demonstrates that USENET usage related to copyright infringement constitutes a minuscule portion of AOL usage. The financial benefit accruing to AOL from such infringing usage, if any benefit exists at all, is too indirect and constitutes far too small a "draw" to fairly support the imposition of vicarious copyright liability on AOL. Moreover, as with the discussion of AOL's "right and ability to control,", the DMCA provides at least persuasive support for interpreting "direct financial benefit" to require something more than the indirect, insignificant financial benefits that may have accrued to AOL as a result of copyright infringement on its USENET servers. The legislative history of the DMCA provides:

In determining whether the financial benefit criterion [of section 512(c)(1)(B)] is satisfied, courts should take a common-sense, fact-based approach, not a formalistic one. In general, a service provider conducting a legitimate business would not be considered to receive a `financial benefit directly attributable to the infringing activity' where the infringer makes the same kind of payment [1064] as non-infringing users of the provider's service.

H.R. Rep. 105-51(II), at p. 54 (July 22, 1998). Accordingly, summary adjudication for AOL of Plaintiff's claim for vicarious copyright infringement is granted.

B. DMCA Limitations on Liability

AOL claims to qualify for two of the DMCA's "safe-harbor" provisions, subsection (a), Transitory digital network communications, and subsection (c), Information residing on systems or networks at direction of users. See 17 U.S.C. § 512(a), (c). These safe harbors do not confer absolute immunity upon ISPs, but do drastically limit their potential liability based on specific functions they perform (e.g. user-directed information storage). See generally 17 U.S.C. § 512. A party satisfying the requirements for one of the safe harbors cannot be liable for monetary relief, or, with the exception of the rather narrow relief available under subsection (j), for injunctive or other equitable relief for copyright infringement. See id.

1. Section 512(i)

In order to avail itself of any of section 512's limitation-onliability safe harbors, AOL must also satisfy the two requirements laid out in section 512(i). Section 512(i) provides that all safe-harbor provisions established by the DMCA shall apply to a service provider only if the service provider:

(A) has adopted and reasonably implemented, and informs subscribers and account holders of the service provider's system or network of, a policy that provides for the termination in appropriate circumstances of subscribers and account holders of the service provider's system or network who are repeat infringers; and

(B) accommodates and does not interfere with standard technical measures.

17 U.S.C. § 512(i)(1).

Furthermore, in order for an ISP to comply with subsection (i) and avail itself of one of the DMCA's safe harbors, the ISP must have adopted, reasonably implemented, and notified its members of the repeat infringer termination policy at the time the allegedly infringing activity occurred. Doing so after the infringing activity has already occurred is insufficient if the ISP seeks a limitation of liability in connection with that infringing activity. As explained by the district court in Napster, to hold otherwise would be defeat the whole purpose of subsection (i):

Napster attempts to refute plaintiffs' argument by noting that subsection (i) does not specify when the copyright compliance policy must be in place. Although this characterization of subsection (i) is factually accurate, it defies the logic of making formal notification to users or subscribers a prerequisite to exemption from monetary liability. The fact that Napster developed and notified its users of a formal policy after the onset of this action should not moot plaintiffs' claim to monetary relief for past harms.

Napster, 2000 WL 573136 at * 9 (original emphasis).

On its face, subsection (i) is only concerned with repeat-infringer termination policies, and not with copyright infringement in general. Nonetheless, Plaintiff urges that any reasonable policy whose goal is to put repeat infringers on notice that they face possible termination must necessarily include some procedures for actually identifying such individuals in the first place, such as a mechanism whereby the public can notify an ISP of copyright infringement occurring on its system. A termination policy could not be [1065] considered "reasonably implemented" if the ISP remained willfully ignorant of users on its system who infringe copyrights repeatedly. Although the text of section 512(i) could conceivably support such an interpretation, the legislative history demonstrates that Congress's intent was far more limited regarding subsection (i)[12]:

the Committee does not intend this provision to undermine the principles of new subsection (l)[13] or the knowledge standard of new subsection (c) by suggesting that a provider must investigate possible infringements, monitor its service, or make difficult judgments as to whether conduct is or is not infringing. However, those who repeatedly or flagrantly abuse their access to the Internet through disrespect for the intellectual property rights of others should know that there is a realistic threat of losing that access.

H.R. Rep. 105-551(II), at p. 61 (July 22, 1998) (emphasis added); see also S.Rep. 105-190, at p. 51-52 (May 11, 1998) (providing verbatim the same explanation of subsection(i)). In the face of such clear guidance from the legislative history of the DMCA, subsection (i) cannot be interpreted to require ISPs to take affirmative steps to investigate potential infringement and set up notification procedures in an attempt to identify the responsible individuals. Accordingly, many of Plaintiff's argument regarding subsection (i) are irrelevant to determining whether AOL had reasonably implemented a policy for termination of repeat infringers.[14]

It is undisputed that AOL satisfies prong (B) based on its accommodation and non-interference with standard technical measures. And AOL presents evidence to support the conclusion that is has also met the requirements of prong (A). AOL's Terms of Service, to which every AOL member must agree before becoming a member, includes a notice that AOL members may not make unauthorized copies of content protected by copyrights, trademarks, or any other intellectual property rights. They also notify members that their AOL accounts could be terminated for making such unauthorized copies.

Plaintiff contends, however, that AOL cannot satisfy prong (A) of subsection 512(i)(1) because although the ISP has presented substantial evidence of compliance, most of that evidence comes from March 2001, nearly a year after the infringing conduct occurred. AOL's percipient witness, Elizabeth Compton, testified that AOL's procedures for notifying its users that their access could be terminated if they were to infringe others' copyrights has not changed substantively since April 2000. However, Plaintiff challenges the credibility and competency of Ms. Compton, whose grasp of the technical side of AOL's copyright infringement procedures was decidedly less than expert.

In addition, Plaintiff notes that although AOL claims to have complied with subsection (i) and adopted and reasonably implemented [1066] polices aimed at terminating repeat infringers, Compton testified that no individual has ever been terminated for being a repeat infringer. Given the millions of AOL users, Plaintiff argues, this lack of even a single termination for repeat infringement is evidence that AOL has failed to fulfill its obligation to reasonably implement its subsection(i) termination policy. Moreover, Compton testified at her deposition that at the time of the infringement, AOL had not precisely defined how many times a user had to be guilty of infringement before that user could be classified as a "repeat infringer." Plaintiff claims this is further evidence that AOL had failed to comply with the reasonable-implementation requirement of subsection (i).

As noted above in the discussion of the legislative history of the DMCA, however, subsection (i) does not require AOL to actually terminate repeat infringers, or even to investigate infringement in order to determine if AOL users are behind it.[15] That is the province of subsection (c), which provides detailed requirements related to notification of infringement and the ISPs' responsibility to investigate and, in some instances, delete or block access to infringing material on their systems. Subsection (i) only requires AOL to put its users on notice that they face a realistic threat of having their Internet access terminated if they repeatedly violate intellectual property rights.

Plaintiff has attacked the credibility and competence of Elizabeth Compton, and in particular challenges her assertion that the AOL's procedures for compliance with subsection (i) have not changed substantively since April 2000. But most of Plaintiff's "attacks" only demonstrate that Ms. Compton did not understand the technical means by which access to infringing material on AOL's servers may be blocked or by which an AOL user's Internet access could be terminated. While such shortcomings might be relevant when weighing her testimony regarding AOL's compliance with subsection (c), they are not relevant when considering the much less stringent (and less technical) requirements of subsection (i). And although Plaintiff disputes Compton's claim that AOL's notification policy has not changed, he has not produced any evidence to the contrary. "When a motion for summary judgment is made and supported as provided in this rule, an adverse party may not rest upon the mere allegations or denials of the adverse party's pleading, but the adverse party's response, by affidavits or as otherwise provided in this rule, must set forth specific facts showing that there is a genuine issue for trial." Fed. R. Civ. Proc. 56(e).

Accordingly, the Court holds that AOL had satisfied the requirements of 17 U.S.C. § 512(i) at the time of the alleged infringement of Ellison's copyrights.

2. Section 512's limitations on liability (a) through (d)

Section 512(n) explicitly provides that each of the four limitation-on-liability safe [1067] harbors found in subsections (a) through (d) "describe separate and distinct functions for purposes of applying this section." Id. As a result, "[w]hether a service provider qualifies for the limitation of liability in any one of the subsections shall be based solely on the criteria in that subsection, and shall not affect a determination of whether the service provider qualifies for the limitations on liability under any other such subsection." Id. The DMCA's legislative history provides the following instructional example:

Section 512's limitations on liability are based on functions, and each limitation is intended to describe a separate and distinct function. Consider, for example, a service provider that provides a hyperlink to a site containing infringing material which it then caches on its system in order to facilitate access to it by its users. This service provider is engaging in at least three functions that may be subject to the limitation on liability: transitory digital network communications under subsection (a), system caching under subsection (b), and information locating tools under subsection (d).

H.R. Rep. 105-551(II), at p. 65 (July 22, 1998). In this example, if the service provider met the threshold requirements of subsection (i), "then for its acts of system caching it is eligible for that limitation on liability with corresponding narrow injunctive relief. But if the same company is committing an infringement by using information locating tools to link its users to infringing material, then its fulfillment of the requirements to claim the system caching liability limitation does not affect whether it qualifies for the liability limitation for information location tools." 3 NIMMER ON COPYRIGHT § 12B.06[A], at 12B-53, 54.

Although AOL performs many Internet-service-provider-related functions, Plaintiff's claims against AOL are based solely on its storage of USENET messages on its servers and provision of access to those USENET messages to AOL users and others accessing the AOL system from outside.

AOL claims that it is eligible under both subsections (a) and (c) for a limitation on liability regarding Plaintiff's claims against it.

3. Subsection (a)'s limitation on liability

AOL contends that it meets all the criteria for the limitation-on-liability safe harbor found in subsection (a), which provides:

(a) Transitory digital network communications.—A service provider shall not be liable for monetary relief, or, except as provided in subsection (j), for injunctive or other equitable relief, for the infringement of copyright by reason of the provider's transmitting, routing, or providing connections for, material through a system or network controlled or operated by or for the service provider, or by reason of the intermediate and transient storage of that material in the course of transmitting, routing, or providing connections, if -

(1) the transmission of the material was initiated by or at the direction of a person other than the service provider;

(2) the transmission, routing, provision of connections, or storage is carried out through an automatic technical process without selection of the material by the service provider;

(3) the service provider does not select the recipients of the material except as an automatic response to the request of another person;

(4) no copy of the material made by the service provider in the course of such intermediate or transient storage is maintained on the system or network in a manner ordinarily accessible to anyone [1068] other than anticipated recipients, and no such copy is maintained on the system or network in a manner ordinarily accessible to such anticipated recipients for a longer period than is reasonably necessary for the transmission, routing, or provision of connections; and

(5) the material is transmitted through the system without modification of its content.

Subsection (a) does not require ISPs to remove or block access to infringing materials upon receiving notification of infringement, as is the case with subsections (c) and (d).

On the other hand, the term "service provider" is defined more restrictively for subsection (a) than it is throughout the rest of section 512. See 17 U.S.C. § 512(k). "As used in subsection (a), the term `service provider' means an entity offering the transmission, routing, or providing of connections for digital online communication, between or among points specified by a user, of material of the user's choosing, without modification to the content of the material as sent or received."[16]Id. In effect, this definition merely restates a number of the requirements that are already set forth in subsection (a). Therefore, Plaintiff's contention that AOL does not meet the restrictive definition of a "service provider" as subsection (k) defines that term for subsection (a) does not need to be addressed separately from Plaintiff's arguments that AOL cannot satisfy the requirements of subsection (a). The Court addresses each of those requirements in turn.

Plaintiff argues that AOL's USENET servers do not engage in "intermediate and transient storage" of USENET messages such as the one posted by Robertson. Instead, AOL stores USENET messages containing binary files on its servers for up to fourteen days.[17] AOL, however, claims that the USENET message copies are "intermediate." AOL's role is as an intermediary between the original USENET user who posts a message, such as Robertson, and the recipient USENET users who later choose to view the message.

By itself, the term "intermediate and transient storage" is rather ambiguous. And it is unclear from reading the DMCA whether AOL's storage of USENET messages containing binary files on its servers for fourteen days in order to make those messages accessible to AOL users constitutes "intermediate and transient storage." Certain functions such as the provision of e-mail service or Internet connectivity clearly fall under the purview of subsection (a); other functions such as hosting a web site or chatroom fall under the scope of subsection (c). The question presented by this case is which subsection applies to the function performed by AOL when it stores USENET messages in order to provide USENET access to users. Faced with the ambiguous language in the statute itself, the Court looks to the DMCA's legislative history for guidance in interpretation. The only real guidance is provided in the House Judiciary Committee Report. See H.R. Rep. 105-551 (May 22, 1998).

[1069] The Court is mindful that reliance on the Report issued by the House Judiciary Committee, "the body that traditionally vets copyright legislation",[18] is somewhat problematic. The Report's section-by-section analysis was based on an early version of the DMCA which differs in a number of ways from the final version that was eventually enacted by Congress. And the Court recognizes that "even if the language of a given feature [in the earlier version of the bill] does ultimately follow through to the Digital Millennium Copyright Act, the meaning may be different in the context of a law containing vastly more provisions than the [earlier version]." 3 NIMMER ON COPYRIGHT § 12B.01[C], at 12B-19. Nonetheless, the Court believes that the analysis in the House Judiciary Committee Report provides the clearest guidance concerning Congress' intent.

At the time the first House Report was issued, the Committee was considering a version of the bill that differs in many ways from the final version that was eventually enacted into law as the DMCA. However, the previous version's language regarding "the intermediate storage and transmission of material" is very similar to the "intermediate and transient storage of that material" language that is found in the final version of the DMCA. Moreover, the portion of subsection (a) in the previous version, having to do with maintaining material on the system, is also extremely similar to the corresponding language found in the enacted version of the DMCA at 512(a)(4).[19] Although other aspects of the bill changed substantially before the final version was enacted into law, the language dealing with the "intermediate storage" did not. Accordingly, the section-by-section analysis found in the First House Report is relevant to interpreting whether AOL's storage of USENET messages in order to provide USENET access to AOL users constitutes (1) "intermediate and transient storage" of (2) copies that are not "maintained on the system or network ... for a longer period than is reasonably necessary for the transmission, routing, or provision of connections." 17 U.S.C. § 512(a), (a)(4).

The First House Report answers both of those questions with a resounding yes:

The exempted storage and transmissions are those carried out through an automatic technological process that is indiscriminate—i.e., the provider takes no part in the selection of the particular material transmitted—where the copies are retained no longer than necessary for the purpose of carrying out the transmission. This conduct would ordinarily include forwarding of customers' Usenet postings to other Internet sites [1070] in accordance with configuration settings that apply to all such postings...

This exemption codifies the result of Religious Technology Center v. Netcom On-Line Communication Services, Inc., 907 F.Supp. 1361 (N.D.Cal.1995) ("Netcom"), with respect to liability of providers for direct copyright infrigement.[20] See id. at 1368-70. In Netcom the court held that a provider is not liable for direct infringement where it takes no `affirmative action that [directly results] in copying ... works other than by installing and maintaining a system whereby software automatically forwards messages received from subscribers ... and temporarily stores copies on its system.' By referring to temporary storage of copies, Netcom recognizes implicitly that intermediate copies may be retained without liability for only a limited period of time. The requirement in 512(a)(1) that "no copy be maintained on the system or network ... for a longer period than reasonably necessary for the transmission" is drawn from the facts of the Netcom case, and is intended to codify this implicit limitation in the Netcom holding.

H.R. Rep. 105-551(I), at p. 24. (emphasis added).

In Netcom, infringing USENET postings were stored on Netcom's servers for up to eleven days, during which those postings were accessible to Netcom users. See Netcom, 907 F.Supp. at 1368. In AOL's case, messages containing binary files, such as the message posted by Robertson, were stored on AOL's servers for up to fourteen days. While "intermediate copies may be retained without liability for only a limited period of time," the three-day difference between AOL's USENET storage and that of Netcom is insufficient to distinguish the two cases.

Accordingly, the Court finds that AOL's storage of Robertson's posts on its USENET servers constitutes "intermediate and transient storage" that was not "maintained on the system or network ... for a longer period than is reasonably necessary for the transmission, routing, or provision of connections."

While this issue presented the central disagreement regarding AOL's qualifications for subsection(a)'s limitation-onliability safe harbor, the parties also dispute whether AOL satisfies other requirements set forth in subsection (a).

[1071] (1) the transmission of the material was initiated by or at the direction of a person other than the service provider

It is clear that the transmission of Robertson's newsgroup message was not initiated by or at the direction of AOL. In fact, Plaintiff does not appear to even dispute this conclusion. (Plaintiff's Separate Statement of Genuine Issues at II(3), 6/4/2001 Motion for summary judgment).

(2) the transmission, routing, provision of connections, or storage is carried out through an automatic technical process without selection of the material by the service provider

Plaintiff claims that AOL selects the material that is transmitted, routed, and stored in its USENET groups. Namely, AOL decides which newsgroups its subscribers may access through its newsgroup service.

AOL did not select the individual postings on the alt.binaries.e-book newsgroup, let alone the handful of infringing Robertson posts. 512(a)(2) is concerned with "selection of the material," meaning the allegedly infringing material, not material generally. By focusing on AOL's decision to not carry every single newsgroup conceivably available, Plaintiff is attempting to slip from the specific to the general, despite the fact that subsection (a) is concerned with the specific material giving rise to the Plaintiff's claims against AOL.

Even if Plaintiff were right, and AOL's treatment of USENET messages in general was the relevant inquiry, AOL's failure to carry every newsgroup available would not disqualify it from subsection (a)(2). Although this would present a closer call, the Court thinks that an ISP would need to take a greater editorial role than merely choosing not to carry certain newsgroups. Although the legislative history states that "subsection (a)(2) means the editorial function of determining what material to send, or the specific sources of material to place on-line," H.R. Rep. 105-551(II) (July 22, 1998), the better interpretation of (a)(2) is that the ISP would have to choose specific postings, or perhaps block messages sent by users expressing opinions with which the ISP disagrees. If an ISP forfeits its ability to qualify for subsection (a)'s safe harbor by deciding not to carry every USENET newsgroup or web site possible, then the DMCA would have the odd effect of punishing ISPs that choose not to carry, for example, newsgroups devoted to child pornography and prostitution, or web sites devoted to ritual torture.[21] Given the concern Congress has shown in other bills for children's access to obscene materials online, it would be absurd to conclude that Congress intended such a result with regard to the DMCA.

(3) the service provider does not select the recipients of the material except as an automatic response to the request of another person

Plaintiff argues that AOL selects the recipients of the material because it chooses to engage in USENET peering agreements with some entities but not with others. First, as with (a)(2), Plaintiff's argument fails because section 512(a) is concerned with AOL's selection of the recipients of the material in question in this lawsuit, i.e. Robertson's infringing posts. It is clear that AOL did not select certain recipients for that material. Rather, it was accessible to any AOL user through AOL's USENET newsgroup server. Second, and also analogous to (a)(2), the better interpretation is that AOL would have to direct material to certain recipients (e.g. all AOL members whose names start with "G") but not others. If [1072] AOL were to lose its ability to qualify for subsection(a)'s safe harbor because it has peer agreements with some entities but not with others, then the DMCA would appear to place an affirmative obligation on AOL to enter into peering arrangements with every conceivable peering entity in the world. This could not have been what Congress' intent.

(5) the material is transmitted through the system without modification of its content

Plaintiff does not seriously contest that AOL does not modify the content of newsgroup messages stored on its servers and transmitted through its system. Moreover, Plaintiff has presented no evidence that AOL in any way modified the content of Robertson's infringing posts.

The Court hereby finds that AOL qualifies for the limitation-on-liability provided under subsection 512(a).[22]

V. Conclusion

The Court hereby GRANTS Defendant AOL's Motion for summary judgment. This Order disposes of Motions # 109, 152, and 156 on the Court's Docket for this Matter.

[1] AOL also filed a fourth Motion for summary judgment or adjudication focusing on the extent of damages that would be available to Ellison if he were to prevail on his copyright infringement claims against AOL. Because the Court grants AOL's Motion for summary judgment on the merits, we need not reach the issue of damages.

[2] Although the USENET is closely affiliated to the internet, the two are distinct. There is no specific network that is the USENET. Instead, Usenet traffic flows over a wide range of networks, including the internet.

[3] There are newsgroups devoted to such diverse topics as "science fiction writers" and "New York Mets baseball."

[4] Plaintiff claims that AOL's Motion for summary judgment is improper because its arguments regarding its compliance with subsections 512(a) and (i) were raised for the first time in its first summary judgment Motion's Reply brief, which was filed on September 5, 2001. Even assuming arguendo that AOL raised certain issues for the first time in its Reply brief, Plaintiff cannot claim that he was prejudiced in any way. First, Plaintiff had ample opportunity to respond in connection with AOL's second Motion for summary judgment (filed November 26, 2001) and with Plaintiff's own Motion for summary adjudication (filed November 27, 2001). And second, the Court granted Plaintiff permission to file a supplemental brief specifically in response to AOL's September 5, 2001 Reply, and Plaintiff did so, filing its supplemental brief on December 10, 2001. At this point, all the issues before the Court have been fully briefed, and no party can claim surprise, prejudice, or unfair treatment. Moreover, if the Court were to reject AOL's Motion for summary judgment on the grounds that certain matters were raised for the first time in its September 5, 2001, Reply brief, that would merely delay the inevitable and force the parties to file the same boxes of papers with the Court yet again.

[5] AOL claims that Ellison does not own a valid registered copyright for the audiowork "The Voice From the Edge," and that Ellison only registered his copyright for "Count the Clock That Tells the Time" two months after AOL blocked access to the alt.binaries.e-book site in late April 2000, but makes no similar allegations relating to any of the other works cited by Plaintiff.

[6] In its Opposition to Ellison's Motion for summary judgment and its Reply brief to its own Motion for summary judgment, AOL for the first time contends that Ellison has produced no evidence indicating that infringing copies of his works were located on AOL's USENET servers. In particular, AOL argues that the consent decree entered into by Ellison and co-Defendant Robertson cannot be asserted against AOL as evidence of Robertson's placing of infringing materials onto the alt.binaries.e-book newsgroup where, per AOL's USENET peer agreements' protocol, they were transferred and copied onto AOL's servers. Even assuming arguendo that the consent decree does not have any preclusive effect as against AOL, it does constitute evidence that a reasonable trier of fact could rely on. And although AOL labels the consent decree inadmissible hearsay, it is an order entered and signed by the Court, and therefore qualifies as a hearsay exception under, at least, Fed.R.Evid. Rule 803(8).

In addition, the deposition testimony of Susan Paris presents extremely strong circumstantial evidence that infringing copies of works (including some of Ellison's works) were, in fact, posted on and downloaded from the alt.binaries.e-book newsgroup.

[7] Plaintiff has provided no evidence that AOL actually did receive the email. To the contrary, Plaintiff's former counsel states that while she received an acknowledgment of receipt for her April 17, 2000, email from TCO, no such acknowledgment came from AOL.

[8] It is not clear if Miller was directed by AOL customer service representatives to the correct e-mail address or the same defunct address where Ellision's attorney sent her e-mail.

[9] The DMCA provides that "[t]he failure of a service provider's conduct to qualify for limitation of liability under this section shall not bear adversely upon the consideration of a defense by the service provider that the service provider's conduct is not infringing under this title or any other defense." 17 U.S.C. § 512(l); see also 3 NIMMER ON COPYRIGHT § 12B.06[B].

[10] See 3 NIMMER ON COPYRIGHT § 12B.04[A][2] ("The combination of each of these twin factors of financial benefit and ability to control [found in section 512(c)(1)(B)] codifies both elements of vicarious liability").

[11] In Adobe, the district court reasoned that although some of the language in Fonovisa is quite broad, the Ninth Circuit had implicitly recognized that vicarious copyright liability was only appropriate where the infringing activity was a substantial draw, i.e. "substantial numbers of customers are drawn to a venue with the explicit purpose of [obtaining] counterfeit goods." Adobe, 173 F.Supp.2d at 1050. The Adobe Court noted that unless the counterfeit goods constituted "the main customer `draw' to the venue, Fonovisa would provide essentially for the limitless expansion of vicarious liability into spheres wholly unintended by the court." Id. at 1051. While the provision of unauthorized copies of copyrighted material need not necessarily be the main customer draw, the infringing activity must be at least a substantial draw. As the Adobe decision points out, to hold otherwise would provide essentially for the limitless expansion of vicarious liability. For ISPs, the vicarious copyright infringement doctrine might start to resemble strict liability for any material that somehow finds its way onto the ISP's servers.

[12] The House Report was analyzing a version of the DMCA that was slightly different from the version finally enacted by Congress and signed by President Clinton in late 1998. Accordingly, what is now subsection (i) was then subsection (h). However, subsection (i) is not substantively different from subsection (h), and both contain the same requirement that ISPs adopt, implement, and inform subscribers of a termination policy for repeat infringers. Therefore, the legislative history analyzing subsection (h) is equally relevant to subsection (i).

[13] In the version of the DMCA actually enacted, subsection (l)'s equivalent is now found at subsection (m).

[14] These arguments are, however, relevant to determining whether AOL complied with the requirements of subsection (c).

[15] As such, the "realistic threat of losing [Internet] access" that Congress wishes ISPs to impress upon would-be infringers remains just that—a mere threat—unless the ISP decides to implement procedures aimed at identifying, investigating, and remedying infringement in hopes of meeting the requirements of subsection (c)'s safe harbor. Such an arrangement makes a certain amount of sense. If subsection (i) obligated ISPs to affirmatively seek out information regarding infringement and then investigate, eradicate, and punish infringement on their networks, then most if not all of the notice and takedown requirements of the subsection (c) safe harbor would be indirectly imported and applied to subsections (a) and (b) as well. This would upset the carefully balanced, "separate function—separate safe harbor—separate requirements" architecture of the DMCA.

[16] By contrast, for the purposes of the rest of section 512, the term `service provider' is defined more broadly as "a provider of online services or network access, or the operator of facilities therefor." 17 U.S.C. § 512(k)(2)

[17] Plaintiff has presented evidence suggesting that despite AOL's 14-day storage protocol, certain USENET messages containing binary files might have resided on AOL's servers for up to thirty-one days, but he makes no claim that such was the case with the messages containing infringing copies of his works (nor with any other infringing messages in the alt.binaries.e-book newsgroup). When deciding whether AOL qualifies for subsection (a)'s limitations on liability, the Court considers only the allegedly infringing postings.

[18] 3 NIMMER ON COPYRIGHT § 12B.01[C], at 12B-18.

[19] The version considered by the House Judiciary Committee, at 512(a)(C) states that "(C) no copy of the material thereby made by the provider is maintained on the provider's system or network in a manner ordinarily accessible to anyone other than the recipients anticipated by the person who initiated the transmission, and no such copy is maintained on the system or network in a manner ordinarily accessible to such recipients for a longer period than is reasonably necessary for the transmission."

The final version of the DMCA provides, at subsection 512(a)(4), that "(4) no copy of the material made by the service provider in the course of such intermediate and transient storage is maintained on the system or network in a manner ordinarily accessible to anyone other than anticipated recipients, and no such copy is maintained on the system or network in a manner ordinarily accessible to such anticipated recipients for a longer period than is reasonably necessary for the transmission, routing, or provision of connections."

[20] Any argument that this codification of Netcom's facts regarding intermediate storage was only meant to apply to direct infringement, and not to vicarious or contributory infringement, is forestalled by subsection (2) of the version of the bill then under consideration by the Judiciary Committee. For subsection (2) makes it clear that the same limitations on liability that apply under subsection (1) for direct infringement also apply to "contributory infringement or vicarious liability, based solely on conduct described in paragraph (1)." See H.R. Rep. 105-551(I), at p. 8. In effect, subsection (2) provided that regardless of a plaintiff's theory of infringement— direct, contributory, or vicarious—it was the underlying conduct of the ISP, i.e. the function it was performing, that is central to determining whether the ISP qualifies for a limitation on liability. The section-by-section analysis said this of subsection (2): "Paragraph 512(a)(2) exempts a provider from any type of monetary relief under theories of contributory infringement or vicarious liability for the same activities for which providers are exempt from liability for direct infringement under paragraph 512(a)(1). This provision extends the Netcom holding with respect to direct infringement to remove monetary exposure for such limited activities for claims arising under doctrines of secondary liability. Taken together, paragraphs (1) and (2) mean that providers will never be liable for any monetary damages for this type of transmission of material at the request of third parties or for intermediate storage of such material in the course of the transmission." H.R. Rep. 105-551(I), at p. 25.

[21] ISPs would also be punished for making the economic decision not to provide access to newsgroups and other sites for which there was no user demand.

[22] Accordingly, we need not reach the arguments presented by the parties regarding AOL's satisfaction of the requirements of subsection 512(c).

6.6.5 A&M Records, Inc. v. Napster, Inc. 6.6.5 A&M Records, Inc. v. Napster, Inc.

Recall that Napster's peer-to-peer file sharing system involved a database managed by Napster that each user could connect to in order to search music and other file names. This excerpt considers a DMCA defense for such a system.

54 U.S.P.Q.2d 1746 (2000)

A & M RECORDS, INC., a corporation; Geffen Records, Inc., a corporation; Interscope Records, a general partnership; Sony Music Entertainment Inc., a corporation; MCA Records, a corporation; Atlantic Recording Corporation, a corporation; Island Records, Inc., a corporation; Motown Record Company L.P., a limited partnership; Capitol Records Inc., a corporation; La Face Records, a joint venture; BMG Music d/b/a the RCA Records Label, a general partnership; Universal Records Inc., a corporation; Elektra Entertainment Group Inc., a corporation; Arista Records, Inc., a corporation; Sire Records Group Inc., a corporation; Virgin Records America Inc., a corporation; and Warner Bros. Records Inc., a corporation, Plaintiff(s),
v.
NAPSTER, INC., Defendant(s).

No. C 99–05183 MHP.

United States District Court, N.D. California.

May 12, 2000.

PATEL, Chief J.

On December 6, 1999, plaintiff record companies filed suit alleging contributory and vicarious federal copyright infringement and related state law violations by defendant Napster, Inc. ("Napster"). Now before this court is defendant's motion for summary adjudication of the applicability of a safe harbor provision of the Digital Millennium Copyright Act ("DMCA"), 17 U.S.C. section 512(a), to its business activities. Defendant argues that the entire Napster system falls within the safe harbor and, hence, that plaintiffs may not obtain monetary damages or injunctive relief, except as narrowly specified by subparagraph 512(j)(1)(B). In the altemative, Napster asks the court to find subsection 512(a) applicable to its role in downloading MP3 music files,[1] as opposed to searching for or indexing such files. Having considered the parties' arguments and for the reasons set forth below, the court enters the following memorandum and order.

BACKGROUND

______ Napster—a small Internet start-up based in San Mateo, California–makes its proprietary MusicShare software freely available for Internet users to download. Users who obtain Napster's software can then share MP3 music files with others logged-on to the Napster system. MP3 files, which reproduce nearly CD-quality sound in a compressed format, are available on a variety of websites either for a fee or free-of-charge. Napster allows users to exchange MP3 files stored on their own computer hard-drives directly, without payment, and boasts that it "takes the frustration out of locating servers with MP3 files." Def. Br. at 4.

Although the parties dispute the precise nature of the service Napster provides, they agree that using Napster typically involves the following basic steps: After downloading MusicShare software from the Napster website, a user can access the Napster system from her computer. The MusicShare software interacts with Napster's server-side software when the user logs on, automatically connecting her to one of some 150 servers that Napster operates. The MusicShare software reads a list of names of MP3 files that the user has elected to make available. This list is then added to a directory and index, on the Napster server, of MP3 files that users who are logged-on wish to share. If the user wants to locate a song, she enters its name or the name of the recording artist on the search page of the MusicShare program and clicks the "Find It" button. The Napster software then searches the current directory and generates a list of files responsive to the search request. To download a desired file, the user highlights it on the list and clicks the "Get Selected Song(s)" button. The user may also view a list of files that exist on another user's hard drive and select a file from that list. When the requesting user clicks on the name of a file, the Napster server communicates with the requesting user's and host user's[2] MusicShare browser software to facilitate a connection between the two users and initiate the downloading of the file without any further action on either user's part.

According to Napster, when the requesting user clicks on the name of the desired MP3 file, the Napster server routes this request to the host user's browser. The host user's browser responds that it either can or cannot supply the file. If the host user can supply the file, the Napster server communicates the host's address and routing information to the requesting user's browser, allowing the requesting user to make a connection with the host and receive the desired MP3 file. See Declaration of Edward Kessler ("Kessler Dec."), Exh. B; Reply Declaration of Edward Kessler ("Kessler Reply Dec.") ¶ 22. The parties disagree about whether this process involves a hypertext link that the Napster server-side software provides. Compare Pl. Br. at 9 with Def. Reply Br. at 10 n.12. However, plaintiffs admit that the Napster server gets the necessary IP address information from the host user, enabling the requesting user to connect to the host.See Declaration of Daniel Farmer ("Farmer Dec.") ¶ 17; Declaration of Russell. J. Frackman ("Frackman Dec."), Exh. 1 (Kessler Dep.) at 103–05. The MP3 file is actually transmitted over the Internet, see, e.g., Def. Reply Br. at 3, but the steps necessary to make that connection could not take place without the Napster server.

The Napster system has other functions besides allowing users to search for, request, and download MP3 files. For example, a requesting user can play a downloaded song using the MusicShare software. Napster also hosts a chat room.

Napster has developed a policy that makes compliance with all copyright laws one of the "terms of use" of its service and warns users that:

Napster will terminate the accounts of users who are repeat infringers of the copyrights, or other intellectual property rights, of others. In addition, Napster reserves the right to terminate the account of a user upon any single infringement of the rights of others in conjunction with use of the Napster service.

Kessler Dec. ¶ 19. However, the parties disagree over when this policy was instituted and how effectively it bars infringers from using the Napster service. Napster claims that it had a copyright compliance policy as early as October 1999, but admits that it did not document or notify users of the existence of this policy until February 7, 2000.

LEGAL STANDARD

The court may grant summary adjudication of a particular claim or defense under the same standards used to consider a summary judgment motion. See Fed.R.Civ.P. 56(a), (b); Pacific Fruit Express Co. v. Akron, Canton & Youngstown R.R. Co., 524 F.2d 1025, 1029–30 (9th Cir.1975). Summary judgment shall be granted when there is no genuine issue of material fact and the movant is entitled to judgment as a matter of law. See Fed. R. Civ. 56(c).

The moving party bears the initial burden of identifying those portions of the record that demonstrate the absence of a genuine issue of material fact. The burden then shifts to the nonmoving party to "go beyond the pleadings, and by [its] own affidavits, or by the "depositions, answers to interrogatories, or admissions on file," designate "specific facts showing that there is a genuine issue for trial." "Celotex Corp. v. Catrett, 477 U.S. 317, 324 (1986) (citations omitted). A dispute about a material fact is genuine "if the evidence is such that a reasonable jury could return a verdict for the nonmoving party." Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 248 (1986). The moving party discharges its burden by showing that the nonmoving party has not disclosed the existence of any "significant probative evidence tending to support the complaint." First Nat'l Bank v. Cities Serv. Co., 391 U.S. 253, 290 (1968). The court does not make credibility determinations in considering a motion for summary judgment. See Anderson, 477 U.S. at 249. Rather, it views the inferences drawn from the facts in the light most favorable to the party opposing the motion. See T.W. Elec. Serv., Inc. v. Pacific Elec. Contractor's Ass'n, 809 F.2d 626, 631 (9th Cir.1987).

DISCUSSION

Section 512 of the DMCA addresses the liability of online service and Internet access providers for copyright infringements occurring online. Subsection 512(a) exempts qualifying service providers from monetary liability for direct, vicarious, and contributory infringement and limits injunctive relief to the degree specified in subparagraph 512(j)(1)(B). Interpretation of subsection 512(a), or indeed any of the section 512 safe harbors, appears to be an issue of first impression.[3]

Napster claims that its business activities fall within the safe harbor provided by subsection 512(a). This subsection limits liability "for infringement of copyright by reason of the [service] provider's transmitting, routing, or providing connections for, material through a system or network controlled or operated by or for the service provider, or by reason of the intermediate and transient storage of that material in the course of such transmitting, routing, or providing connections," if five conditions are satisfied:

(1) the transmission of the material was initiated by or at the direction of a person other than the service provider;

(2) the transmission, routing, provision of connections, or storage is carried out through an automatic technical process without selection of the material by the service provider;

(3) the service provider does not select the recipients of the material except as an automatic response to the request of another person;

(4) no copy of the material made by the service provider in the course of such intermediate or transient storage is maintained on the system or network in a manner ordinarily accessible to anyone other than the anticipated recipients, and no such copy is maintained on the system or network in a manner ordinarily accessible to such anticipated recipients for a longer period than is reasonably necessary for the transmission, routing, or provision of connections; and

(5) the material is transmitted through the system or network without modification of its content.

17 U.S.C. § 512(a).

Citing the "definitions" subsection of the statute, Napster argues that it is a "service provider" for the purposes of the 512(a) safe harbor.See 17 U.S.C. § 512(k)(1)(A).[4] First, it claims to offer the "transmission, routing, or providing of connections for digital online communications" by enabling the connection of users' hard-drives and the transmission of MP3 files "directly from the Host hard drive and Napster browser through the Internet to the user's Napster browser and hard drive." Def. Reply Br. at 3. Second, Napster states that users choose the online communication points and the MP3 files to be transmitted with no direction from Napster. Finally, the Napster system does not modify the content of the transferred files. Defendant contends that, because it meets the definition of "service provider,"[5] it need only satisfy the five remaining requirements of the safe harbor to prevail in its motion for summary adjudication.

Defendant then seeks to show compliance with these requirements by arguing: (1) a Napster user, and never Napster itself, initiates the transmission of MP3 files; (2) the transmission occurs through an automatic, technical process without any editorial input from Napster; (3) Napster does not choose the recipients of the MP3 files; (4) Napster does not make a copy of the material during transmission; and (5) the content of the material is not modified during transmission. Napster maintains that the 512(a) safe harbor thus protects its core function– "transmitting, routing and providing connections for sharing of the files its users choose." Def. Reply Br. at 2.

Plaintiffs disagree. They first argue that subsection 512(n) requires the court to analyze each of Napster's functions independently and that not all of these functions fall under the 512(a) safe harbor. In their view, Napster provides information location tools–such as a search engine, directory, index, and links–that are covered by the more stringent eligibility requirements of subsection 512(d), rather than subsection 512(a).

Plaintiffs also contend that Napster does not perform the function which the 512(a) safe harbor protects because the infringing material is not transmitted or routed through the Napster system, as required by subsection 512(a). They correctly note that the definition of "service provider" under subparagraph 512(k)(1)(A) is not identical to the prefatory language of subsection 512(a). The latter imposes the additional requirement that transmitting, routing, or providing connections must occur "through the system or network." Plaintiffs argue in the alternative that, if users' computers are part of the Napster system, copies of MP3 files are stored on the system longer than reasonably necessary for transmission, and thus subparagraph 512(a)(4) is not satisfied.

Finally, plaintiffs note that, under the general eligibility requirements established in subsection 512(i), a service provider must have adopted, reasonably implemented, and informed its users of a policy for terminating repeat infringers. Plaintiffs contend that Napster only adopted its copyright compliance policy after the onset of this litigation and even now does not discipline infringers in any meaningful way. Therefore, in plaintiffs' view, Napster fails to satisfy the DMCA's threshold eligibility requirements or show that the 512(a) safe harbor covers any of its functions.

I. Independent Analysis of Functions

Subsection 512(n) of the DMCA states:

Subsections (a), (b), (c), and (d) describe separate and distinct functions for purposes of applying this section. Whether a service provider qualifies for the limitation on liability in any one of those subsections shall be based solely on the criteria in that subsection and shall not affect a determination of whether that service provider qualifies for the limitations on liability under any other such subsections.

Citing subsection 512(n), plaintiffs argue that the 512(a) safe harbor does not offer blanket protection to Napster's entire system. Plaintiffs consider the focus of the litigation to be Napster's function as an information location tool–eligible for protection, if at all, under the more rigorous subsection 512(d). They contend that the system does not operate as a passive conduit within the meaning subsection 512(a). In this view, Napster's only possible safe harbor is subsection 512(d), which applies to service providers "referring or linking users to an online location containing infringing material or infringing activity, by using information location tools, including a directory, index, reference, pointer, or hypertext link...." Subsection 512(d) imposes more demanding eligibility requirements because it covers active assistance to users.

Defendant responds in two ways. First, it argues that subsection 512(a), rather than 512(d), applies because the information location tools it provides are incidental to its core function of automatically transmitting, routing, or providing connections for the MP3 files users select. In the alternative, defendant maintains that, even if the court decides to analyze the information location functions under 512(d), it should hold that the 512(a) safe harbor protects other aspects of the Napster service.

Napster undisputedly performs some information location functions. The Napster server stores a transient list of the files that each user currently logged-on to that server wants to share. See, e .g., Kessler Dec. ¶ 12. This data is maintained until the user logs off, but the structure of the index itself continues to exist. See Frackman Dec., Exh. 1 (Kessler Dep.), at 71:3–4, 16–21; 77:8. If a user wants to find a particular song or recording artist, she enters a search, and Napster looks for the search terms in the index. See id. at 76:17–25, 77:1–2. Edward Kessler, Napster's Vice President of Engineering, admitted in his deposition that, at least in this context, Napster functions as a free information location tool. See id. at 21:12–19; cf. Farmer Dec. ¶ 16 (stating that "Napster operates exactly like a search engine or information location tool to the user"). Napster software also has a "hot list" function that allows users to search for other users' log-in names and receive notification when users with whom they might want to communicate have connected to the service. See Frackman Dec., Exh. 1 (Kessler Dep.), at 59:16–18. In short, the parties agree on the existence of a searchable directory and index, and Napster representatives have used the phrase "information location tool," which appears in the heading for subsection 512(d), to characterize some Napster functions.

There the agreement ends. According to Napster, the information location tools upon which plaintiffs base their argument are incidental to the system's core function of transmitting MP3 music files, and for this reason, the court should apply subsection 512(a). Napster also disputes the contention that it organizes files or provides links to other Internet sites in the same manner as a search engine like Yahoo!. See Kessler Reply Dec. ¶¶ 16–20 (discussing differences between Napster and other search engines). Consequently, it deems subsection 512(d) inapplicable to its activities. Cf. H.R.Rep. No. 105–551(II), 105th Cong., 2d Sess. (1998), 1998 WL 414916, at *147 (using Yahoo! as an example of an information location tool covered by 512(d)). Napster contrasts its operations, which proceed automatically after initial stimuli from users, with search engines like Yahoo! that depend upon the "human judgment and editorial discretion" of the service provider's staff. Id.

Napster's final and most compelling argument regarding subsection 512(d) is that the DMCA safe harbors are not mutually exclusive.According to subsection 512(n), a service provider could enjoy the 512(a) safe harbor even if its information location tools were also protected by (or failed to satisfy) subsection 512(d). See 17 U.S.C. § 512(n) ("Whether a service provider qualifies for the limitation on liability in any one of those subsections ... shall not affect a determination of whether that service provider qualifies for the limitations on liability under any other such subsections.") Similarly, finding some aspects of the system outside the scope of subsection 512(a) would not preclude a ruling that other aspects do meet 512(a) criteria.

Because the parties dispute material issues regarding the operation of Napster's index, directory, and search engine, the court declines to hold that these functions are peripheral to the alleged infringement, or that they should not be analyzed separately under subsection 512(d).[6] Indeed, despite its contention that its search engine and indexing functions are incidental to the provision of connections and transmission of MP3 files, Napster has advertised the ease with which its users can locate "millions of songs" online without "wading through page after page of unknown artists." Frackman Dec., Exh. 5, 4. Such statements by Napster to promote its service are tantamount to an admission that its search and indexing functions are essential to its marketability. Some of these essential functions–including but not limited to the search engine and index–should be analyzed under subsection 512(d).

However, the potential applicability of subsection 512(d) does not completely foreclose use of the 512(a) safe harbor as an affirmative defense. See 17 U.S.C. § 512(n). The court will now turn to Napster's eligibility for protection under subsection 512(a). It notes at the outset, though, that a ruling that subsection 512(a) applies to a given function would not mean that the DMCA affords the service provider blanket protection.

II. Subsection 512(a)

Plaintiffs' principal argument against application of the 512(a) safe harbor is that Napster does not perform the passive conduit function eligible for protection under this subsection. As defendant correctly notes, the words "conduit" or "passive conduit" appear nowhere in 512(a), but are found only in the legislative history and summaries of the DMCA. The court must look first to the plain language of the statute, "construing the provisions of the entire law, including its object and policy, to ascertain the intent of Congress." United States v. Hockings, 129 F.3d 1069, 1071 (9th Cir.1997) (quoting Northwest Forest Resource Council v. Glickman, 82 F.3d 825, 830 (9th Cir.1996)) (internal quotation marks omitted). If the statute is unclear, however, the court may rely on the legislative history. SeeHockings, 129 F.3d at 1071. The language of subsection 512(a) makes the safe harbor applicable, as a threshold matter, to service providers "transmitting, routing or providing connections for, material through a system or network controlled or operated by or for the service provider...." 17 U.S.C. § 512(a) (emphasis added). According to plaintiffs, the use of the word "conduit" in the legislative history explains the meaning of "through a system."

Napster has expressly denied that the transmission of MP3 files ever passes through its servers. See Kessler Dec. ¶ 14. Indeed, Kessler declared that "files reside on the computers of Napster users, and are transmitted directly between those computers." Id. MP3 files are transmitted "from the Host user's hard drive and Napster browser, through the Internet to the recipient's Napster browser and hard drive." Def. Reply Br. at 3 (citing Kessler Dec. ¶ 12–13) (emphasis added). The Internet cannot be considered "a system or network controlled or operated by or for the service provider," however. 17 U.S.C. § 512(a). To get around this problem, Napster avers (and plaintiffs seem willing to concede) that "Napster's servers and Napster's MusicShare browsers on its users' computers are all part of Napster's overall system." Def. Reply Br. at 5. Defendant narrowly defines its system to include the browsers on users' computers.See Kessler Dec. ¶ 13. In contrast, plaintiffs argue that either (1) the system does not include the browsers, or (2) it includes not only the browsers, but also the users' computers themselves. See Farmer Dec. ¶ 17.

Even assuming that the system includes the browser on each user's computer, the MP3 files are not transmitted "through" the system within the meaning of subsection 512(a). Napster emphasizes the passivity of its role–stating that "[a]ll files transfer directly from the computer of one Napster user through the Internet to the computer of the requesting user." Def. Br. at 5 (emphasis added); see also id.at 12 (citing Kessler Dec. ¶ 13–15). It admits that the transmission bypasses the Napster server. See Kessler Dec. ¶ 14; Def. Reply Br. at 6. This means that, even if each user's Napster browser is part of the system, the transmission goes from one part of the system toanother, or between parts of the system, but not "through" the system. The court finds that subsection 512(a) does not protect the transmission of MP3 files.

The prefatory language of subsection 512(a) is disjunctive, however. The subsection applies to "infringement of copyright by reason of the provider's transmitting, routing, or providing connections through a system or network controlled or operated by or for the service provider." 17 U.S.C. § 512(a) (emphasis added). The court's finding that transmission does not occur "through" the system or network does not foreclose the possibility that subsection 512(a) applies to "routing" or "providing connections." Rather, each of these functions must be analyzed independently.

Napster contends that providing connections between users' addresses "constitutes the value of the system to the users and the public." Def. Br. at 15. This connection cannot be established without the provision of the host's address to the Napster browser software installed on the requesting user's computer. See Kessler Dec. ¶ 10–13. The central Napster server delivers the host's address.See id. While plaintiffs contend that the infringing material is not transmitted through the Napster system, they provide no evidence to rebut the assertion that Napster supplies the requesting user's computer with information necessary to facilitate a connection with the host.

Nevertheless, the court finds that Napster does not provide connections "through" its system. Although the Napster server conveys address information to establish a connection between the requesting and host users, the connection itself occurs through the Internet. The legislative history of section 512 demonstrates that Congress intended the 512(a) safe harbor to apply only to activities "in which a service provider plays the role of a "conduit" for the communications of others." H.R.Rep. No. 105–551(II), 105th Cong., 2d Sess.(1998), 1998 WL 414916, at *130. Drawing inferences in the light most favorable to the non-moving party, this court cannot say that Napster serves as a conduit for the connection itself, as opposed to the address information that makes the connection possible. Napster enables or facilitates the initiation of connections, but these connections do not pass through the system within the meaning of subsection 512(a).

Neither party has adequately briefed the meaning of "routing" in subsection 512(a), nor does the legislative history shed light on this issue. Defendant tries to make "routing" and "providing connections" appear synonymous–stating, for example, that "the central Napster server routes the transmission by providing the Host's address to the Napster browser that is installed on and in use by Userl's computer." Def. Br. at 16. However, the court doubts that Congress would have used the terms "routing" and "providing connections" disjunctively if they had the same meaning.[7] It is clear from both parties' submissions that the route of the allegedly infringing material goes through the Internet from the host to the requesting user, not through the Napster server. See, e.g., Def. Br. at 13 ("Indeed, the content of the MP3 files are routed without even passing through Napster's Servers."). The court holds that routing does not occur through the Napster system.

Because Napster does not transmit, route, or provide connections through its system, it has failed to demonstrate that it qualifies for the 512(a) safe harbor. The court thus declines to grant summary adjudication in its favor.

III. Copyright Compliance Policy

Even if the court had determined that Napster meets the criteria outlined in subsection 512(a), subsection 512(i) imposes additional requirements on eligibility for any DMCA safe harbor. This provision states:

The limitations established by this section shall apply to a service provider only if the service provider–

(A) has adopted and reasonably implemented, and informs subscribers and account holders of the service provider's system or network of, a policy that provides for the termination in appropriate circumstances of subscribers and account holders of the service provider's system or network who are repeat infringers; and

(B) accommodates and does not interfere with standard technical measures.

17 U.S.C. § 512(i).

Plaintiffs challenge Napster's compliance with these threshold eligibility requirements on two grounds. First, they point to evidence from Kessler's deposition that Napster did not adopt a written policy of which its users had notice until on or around February 7, 2000–two months after the filing of this lawsuit. See Frackman Dec., Exh. 1 (Kessler Dep.) at 189:17–25, 190:1–25, 191:1–12. Kessler testified that, although Napster had a copyright compliance policy as early as October 1999, he is not aware that this policy was reflected in any document, see id. at 191:22–24, 192:9–11, or communicated to any user. See id. at 192:15–16. Congress did not intend to require a service provider to "investigate possible infringements, monitor its service or make difficult judgments as to whether conduct is or is not infringing," but the notice requirement is designed to insure that flagrant or repeat infringers "know that there is a realistic threat of losing [their] access." H.R. Rep. 105–551(II), 1998 WL 414916, at *154.

Napster attempts to refute plaintiffs' argument by noting that subsection 512(i) does not specify when the copyright compliance policy must be in place. Although this characterization of subsection 512(i) is facially accurate, it defies the logic of making formal notification to users or subscribers a prerequisite to exemption from monetary liability. The fact that Napster developed and notified its users of a formal policy after the onset of this action should not moot plaintiffs' claim to monetary relief for past harms. Without further documentation, defendant's argument that it has satisfied subsection 512(i) is merely conclusory and does not support summary adjudication in its favor.

Summary adjudication is also inappropriate because Napster has not shown that it reasonably implemented a policy for terminating repeat infringers. See 17 U.S.C. § 512(i)(A) (requiring "reasonable" implementation of such a policy). If Napster is formally notified of infringing activity, it blocks the infringer's password so she cannot log on to the Napster service using that password. See Kessler Dec. ¶ 23. Napster does not block the IP addresses of infringing users, however, and the parties dispute whether it would be feasible or effective to do so. See Frackman Dec., Exh. 1 (Kessler Dep.), at 205:4–7.

Plaintiffs aver that Napster willfully turns a blind eye to the identity of its users—that is, their real names and physical addresses—because their anonymity allows Napster to disclaim responsibility for copyright infringement. Hence, plaintiffs contend, "infringers may readily reapply to the Napster system to recommence their infringing downloading and uploading of MP3 music files." Pl. Br. at 24. Plaintiffs' expert, computer security researcher Daniel Farmer, declared that he conducted tests in which he easily deleted all traces of his former Napster identity, convincing Napster that "it had never seen me or my computer before ." Farmer Dec. ¶ 29. Farmer also cast doubt on Napster's contention that blocking IP addresses is not a reasonable means of terminating infringers. He noted that Napster bans the IP addresses of users who runs "bots"[8] on the service. See id. ¶ 27.

Hence, plaintiffs raise genuine issues of material fact about whether Napster has reasonably implemented a policy of terminating repeat infringers. They have produced evidence that Napster's copyright compliance policy is neither timely nor reasonable within the meaning of subparagraph 512(i)(A).

CONCLUSION

This court has determined above that Napster does not meet the requirements of subsection 512(a) because it does not transmit, route, or provide connections for allegedly infringing material through its system. The court also finds summary adjudication inappropriate due to the existence of genuine issues of material fact about Napster's compliance with subparagraph 512(i)(A), which a service provider must satisfy to enjoy the protection of any section 512 safe harbor. Defendant's motion for summary adjudication is DENIED.

IT IS SO ORDERED.

[1] The Motion Picture Experts Group first created MP3 in the early 1980s as the audio layer 3 of the MPEG–1 audiovisual format. MP3 technology allows for the fast and efficient conversion of compact disc recordings into computer files that may be downloaded over the Internet. See generally Recording Industry Ass'n of America v. Diamond Multimedia Systems Inc., 180 F.3d 1072, 1073–74 (9th Cir.1999) (discussing MP3 technology).

[2] Napster uses the term "host user" to refer to the user who makes the desired MP3 file available for downloading.

[3] In Universal City Studios, Inc. v. Reimerdes, 82 F.Supp.2d 211, 217 & n.17 (S.D.N.Y 2000), one defendant sought protection under subsection 512(c). Although the court noted in passing that the defendant offered no evidence that he was a service provider under subsection 512(c), it held that he could not invoke the safe harbor because plaintiffs claimed violations of 17 U.S.C. section 1201(a), which applies to circumvention products and technologies, rather than copyright infringement.

[4] Subparagraph 512(k)(1)(A) provides:

As used in subsection (a), the term "service provider" means an entity offering the transmission, routing, or providing of connections for digital online communications, between or among points specified by a user, of material of the user's choosing, without modification to the content of the material sent or received.

Subparagraph 512(k)(1)(B) states:

As used in this section, other than subsection (a), the term "service provider" means a provider of online services or network access, or the operator of facilities therefor, and includes an entity described in subparagraph (A).

[5] It is not entirely clear to the court that Napster qualifies under the narrower subparagraph 512(k)(1)(A). However, plaintiffs appear to concede that Napster is a "service provider" within the meaning of subparagraph 512(k)(1)(A), arguing instead that Napster does not satisfy the additional limitations that the prefatory language of subsection 512(a) imposes. The court assumes, but does not hold, that Napster is a "service provider" under subparagraph 512(k)(1)(A).

[6] The court need not rule on the applicability of subsection 512(d) to the functions plaintiffs characterize as information location tools because defendant does not rely on subsection 512(d) as grounds for its motion for summary adjudication.

[7] Napster sometimes appears to recognize a distinction between the two terms. For example, it states that "the system provides remote users with connection to each other and allows them to transmit and route the information as they choose." Def. Reply Br. at 2.

[8] Farmer informed that court that "A "bot" is a robot, or program, that performs actions continuously, in a sort of manic or robotic fashion." Farmer Dec. ¶ 27.

6.7 OIL Casebook: Copyright Secondary Liability II 6.7 OIL Casebook: Copyright Secondary Liability II

6.7.1 Viacom Intern., Inc. v. YouTube, Inc. 6.7.1 Viacom Intern., Inc. v. YouTube, Inc.

102 U.S.P.Q.2d 1283
2012 Copr.L.Dec. P 30,231
676 F.3d 19

VIACOM INTERNATIONAL, INC., Comedy Partners, Country Music Television, Inc., Paramount Pictures Corporation, Black Entertainment Television, LLC, Plaintiffs–Appellants,
v.
YOUTUBE, INC., YouTube, LLC, Google, Inc., Defendants–Appellees.The Football Association Premier League Limited, on behalf of themselves and all others similarly situated, Bourne Co., Cal IV Entertainment, LLC, Cherry Lane Music Publishing Company, Inc., X–Ray Dog Music, Inc., Fédération Française De Tennis, Murbo Music Publishing, Inc., Stage Three Music (US), Inc., Plaintiffs–Appellants,Robert Tur, d/b/a Los Angeles News Service, The Scottish Premier League Limited, The Music Force Media Group LLC, The Music Force, LLC, Sin–Drome Records, Ltd., on behalf of themselves and all others similarly situated, National Music Publishers' Association, The Rodgers & Hammerstein Organization, Edward B. Marks Music Company, Freddy Bienstock Music Company, d/b/a Bienstock Publishing Company, Alley Music Corporation, Plaintiffs,
v.
YouTube, Inc., YouTube, LLC, Google, Inc., Defendants–Appellees.

Docket Nos. 10–3270–cv

10–3342–cv.

United States Court of Appeals, Second Circuit.

Argued: Oct. 18, 2011. Decided: April 5, 2012.

[676 F.3d 22] Paul M. Smith, Jenner & Block LLP, Washington, DC (William M. Hohengarten, Scott B. Wilkens, Matthew S. Hellman, and Susan J. Kohlmann, Jenner & Block LLP, New York, NY, and Washington, DC; Theodore B. Olson and Matthew D. McGill, Gibson, Dunn & Crutcher LLP, Washington, DC; Stuart J. Baskin, Shearman & Sterling LLP, New York, NY, on the brief), for Plaintiffs–Appellants Viacom International, Inc., et al.

Charles S. Sims, Proskauer Rose LLP, New York, N.Y. (William M. Hart, Noah Siskind Gitterman, and Elizabeth A. Figueira, Proskauer Rose LLP, New York, NY, on the brief), for Plaintiffs–Appellants Football Association Premier League Ltd., et al.; Max W. Berger and John C. Browne, Bernstein Litowitz Berger & Grossmann LLP, New York, NY, on the brief, for Plaintiffs–Appellants Football Association Premier League Ltd., Bourne Co., Murbo Music Publishing, Inc., Cherry Lane Music Publishing Co., Inc., X–Ray Dog Music, Inc., and Fédération Française de Tennis; Louis M. Solomon and Hal S. Shaftel, Cadwalader, Wickersham & Taft, LLP, New York, NY, on the brief, for Plaintiff–Appellant Football Association Premier League Ltd.; Jacqueline C. Charlesworth and Cindy P. Abramson, Morrison & Foerster, New York, NY, and David S. Stellings and Annika K. Martin, Lieff Cabraser Heimann & Bernstein, LLP, New York, NY, on the brief, for Plaintiff–Appellant Stage Three Music (US), Inc., and Plaintiffs–Appellants National Music Publishers' Association, Rodgers & Hammerstein Organization, Edward B. Marks Music Co., Freddy Bienstock Music Co. d/b/a Bienstock Publishing Co., [676 F.3d 23] and Alley Music Corporation; Daniel Girard and Christina Connolly Sharp, Girard Gibbs LLP, San Francisco, CA, David Garrison, Barrett Johnston & Parsley, Nashville, TN, and Kevin Doherty, Burr & Forman LLP, Nashville, TN, on the brief, for Plaintiff–Appellant Cal IV Entertainment LLC; Christopher Lovell and Christopher M. McGrath, Lovell Stewart Halebian LLP, New York, NY, Jeffrey L. Graubart, Pasadena, CA, and Steve D'Onofrio, Washington, DC, for Plaintiffs The Music Force Media Group LLC, The Music Force, LLC, and Sin–Drome Records, Ltd.

Andrew H. Schapiro, Mayer Brown LLP, New York, N.Y. (A. John P. Mancini and Brian M. Willen, Mayer Brown LLP, New York, NY; David H. Kramer, Michael H. Rubin, and Bart E. Volkmer, Wilson Sonsini Goodrich & Rosati, Palo Alto, CA, on the brief), for Defendants–Appellees.Clifford M. Sloan (Christopher G. Clark and Mary E. Rasenberger, on the brief), Skadden, Arps, Slate, Meagher & Flom LLP, New York, NY, and Washington, DC, for amici curiae Advance Publications, Inc., Association of American Publishers, Association of American University Presses, The Associated Press, The Center for the Rule of Law, Gannett Co., Inc., ICBC Broadcast Holdings, Inc., Institute for Policy Innovation, The Ladies Professional Golf Association, The McClatchy Co., The Media Institute, Minority Media & Telecommunications Council, Inc., National Association of Black Owned Broadcasters, The National Football League, Newspaper Association of America, Picture Archive Council of America, Professional Photographers of America, Radio Television Digital News Association, Rosetta Stone Ltd., The E.W. Scripps Co., Sports Rights Owners Coalition, The Washington Post, and Zuffa LLC, in support of Plaintiffs–Appellants.Peter D. DeChiara, Cohen, Weiss & Simon LLP, New York, NY, for amici curiae American Federation of Musicians, American Federation of Television & Radio Artists, Directors Guild of America, Inc., International Alliance of Theatrical Stage Employees, Screen Actors Guild, Inc., and Studio Transportation Drivers, Local 399, International Brotherhood of Teamsters, in support of Plaintiffs–Appellants.Russell J. Frackman, Mitchell Silberberg & Knupp LLP, Los Angeles, CA, for amici curiae Broadcast Music, Inc., American Society of Composers, Authors and Publishers, SESAC, Inc., The Society of Composers and Lyricists, The Association of Independent Music Publishers, Songwriters Guild of America, The Recording Academy, The Nashville Songwriters Association International, American Association of Independent Music, Music Publishers' Association of the United States, Lisa Thomas Music Services, LLC, Garth Brooks, Bruce Hornsby, Boz Scaggs, Sting, Roger Waters, Glenn Frey, Don Henley, Timothy B. Schmit, and Joe Walsh (The Eagles), in support of Plaintiffs–Appellants.Carey R. Ramos (Lynn B. Bayard and Darren W. Johnson, on the brief), Paul, Weiss, Rifkind, Wharton & Garrison LLP, New York, NY, for amici curiae Stuart N. Brotman, Ronald A. Cass, and Raymond T. Nimmer, in support of Plaintiffs–Appellants.Jonathan L. Marcus (Martin F. Hansen, Matthew Berns, Brian D. Ginsberg & Evan R. Cox, on the brief), Covington & Burling LLP, New York, NY, San Francisco, CA, and Washington, DC, for amicus curiae Business Software Alliance, in support of Plaintiffs–Appellants.Robert Penchina, Levine Sullivan Koch & Schulz, L.L.P., New York, NY, for amicus [676 F.3d 24] curiae CBS Corp., in support of Plaintiffs–Appellants.Bruce A. Lehman (Jason D. Koch and Cameron Coffey, on the brief), Washington, DC, for amicus curiae International Intellectual Property Institute, in support of Plaintiffs–Appellants.Bruce E. Boyden, Marquette University Law School, Milwaukee, WI, for amici curiae Intellectual Property Law Professors, in support of Plaintiffs–Appellants.Gregory G. Garre, Latham & Watkins LLP, Washington, DC (Lori Alvino McGill, Latham & Watkins LLP, Washington, DC, Thomas W. Burt, Microsoft Corp., Redmond, WA, and Jacob Schatz, Electronic Arts Inc., Redwood City, CA, on the brief), for amicus curiae Microsoft Corp. & Electronic Arts Inc., in support of Plaintiffs–Appellants.Kelly M. Klaus, Munger, Tolles & Olson LLP, Los Angeles, CA (Susan Cleary, Independent Film & Television Alliance, on the brief) for amicus curiae Motion Picture Association of America, Independent Film & Television Alliance, in support of Plaintiffs–Appellants.Richard B. Kendall (Laura W. Brill and Joshua Y. Karp, on the brief), Kendall Brill & Klieger LLP, Los Angeles, CA, for amici curiae Matthew L. Spitzer, John R. Allison, Robert G. Bone, Hugh C. Hansen, Michael S. Knoll, Reinier H. Kraakman, Alan Schwartz, and Robert E. Scott, in support of Plaintiffs–Appellants.Andrew M. Riddles, Crowell & Moring LLP, New York, N.Y. (Michael J. Songer, Crowell & Moring LLP, Washington, DC, and Daniel J. Popeo and Cory L. Andrews, Washington Legal Foundation, Washington, DC, on the brief), for amicus curiae Washington Legal Foundation, in support of Plaintiffs–Appellants.Ron Lazebnik, Lincoln Square Legal Services, Inc., New York, NY, for amici curiae Anaheim Ballet, Michael Moore, Khan Academy Inc., Adam Bahner, Michael Bassik, Dane Boedigheimer, Matthew Brown, Michael Buckley, Shay Butler, Charles Como, Iman Crosson, Philip De Vellis, Rawn Erickson, Hank Green, John Green, Kassem Gharaibeh, William Louis Hyde, Kevin Nalty, Allison Speed, Charles Todd, Charles Trippy, and Barnett Zitron, in support of Defendants–Appellees.Seth D. Greenstein, Constantine Cannon LLP, Washington, DC, for amicus curiae Professor Michael Carrier, in support of Defendants–Appellees.Jonathan Band, Washington, DC (Markham C. Erickson, Holch & Erickson LLP, Washington, DC, and Matthew Schruers, Computer & Communications Industry Association, Washington, DC, on the brief), for amici curiae Computer & Communications Industry Association, and Netcoalition, in support of Defendants–Appellees.Michael Barclay, Menlo Park, CA; Deborah R. Gerhardt, UNC School of Law, Chapel Hill, NC, for amicus curiae Consumer Electronics Association, in support of Defendants–Appellees.Andrew P. Bridges, Winston & Strawn LLP, San Francisco, CA, for amici curiae eBay Inc., Facebook, Inc., IAC/Interactivecorp., and Yahoo! Inc., in support of Defendants–Appellees.Corynne M. McSherry (Abigail Phillips, on the brief), Electronic Frontier Foundation, San Francisco, CA, for amici curiae Electronic Frontier Foundation, Center for Democracy & Technology, International Federation of Library Associations & Institutions, American Library Association, Association of College & Research Libraries, and Association of Research Libraries, in support of Defendants–Appellees.

[676 F.3d 25] David T. Goldberg (Sean H. Donahue, on the brief), Donahue & Goldberg, LLP, New York, NY, and Washington, DC, for amici curiae Human Rights Watch, Freedom House, Reporters Without Borders, and Access, in support of Defendants–Appellees.Rebecca S. Engrav, Perkins Coie LLP, Seattle, WA, for amici curiae Intellectual Property and Internet Law Professors, in support of Defendants–Appellees.Gregory P. Gulia (Vanessa C. Hew and R. Terry Parker, on the brief), Duane Morris LLP, New York, NY, for amicus curiae MP3Tunes, Inc., in support of Defendants–Appellees.Jennifer M. Urban, Samuelson Law, Technology & Public Policy Clinic, University of California, Berkeley School of Law, Berkeley, CA, for amici curiae National Alliance for Media Art and Culture and The Alliance for Community Media, in support of Defendants–Appellees.Anthony P. Schoenberg (Stephanie P. Skaff, Deepak Gupta, and David K. Ismay, on the brief), Farella Braun & Martel LLP, San Francisco, CA, for amici curiae National Consumers League, Consumers Union of United States, Inc., Consumer Action, and United States Student Association, in support of Defendants–Appellees.Joseph C. Gratz (Michael H. Page and Ragesh K. Tangri, on the brief), Durie Tangri LLP, San Francisco, CA, for amici curiae National Venture Capital Association, in support of Defendants–Appellees.Benjamin J. Kallos, New York, N.Y. (Sherwin Siy and Michael Weinberg, Public Knowledge, Washington, DC, on the brief), for amicus curiae Public Knowledge, in support of Defendants–Appellees.Patrick J. Coyne, Finnegan Henderson Farabow Garrett & Dunner, LLP, Washington, DC (David W. Hill, American Intellectual Property Law Association, Arlington, VA, on the brief), for amicus curiae American Intellectual Property Law Association, in support of neither party.Jeremy H. Stern, Stern Digital Strategies, Manhattan Beach, CA (Partha P. Chattoraj, Markowitz & Chattoraj LLP, New York, NY, on the brief), for amicus curiae Audible Magic Corp., in support of neither party.Stephen M. Wurzburg, Pillsbury Winthrop Shaw Pittman LLP, Palo Alto, CA, for amicus curiae Vobile, Inc., in support of neither party.

Before: CABRANES and LIVINGSTON, Circuit Judges.[*]

JOSÉ A. CABRANES, Circuit Judge:

This appeal requires us to clarify the contours of the “safe harbor” provision of the Digital Millennium Copyright Act (DMCA) that limits the liability of online service providers for copyright infringement that occurs “by reason of the storage at the direction of a user of material that resides on a system or network controlled or operated by or for the service provider.” 17 U.S.C. § 512(c).[1]

The plaintiffs-appellants in these related actions—Viacom International, Inc. (“Viacom”), The Football Association Premier League Ltd. (“Premier League”), and various film studios, television networks, music publishers, and sports leagues (jointly, [676 F.3d 26] the “plaintiffs”)[2] —appeal from an August 10, 2010 judgment of the United States District Court for the Southern District of New York (Louis L. Stanton, Judge), which granted summary judgment to defendants-appellees YouTube, Inc., YouTube, LLC, and Google Inc. (jointly, “YouTube” or the “defendants”). The plaintiffs alleged direct and secondary copyright infringement based on the public performance, display, and reproduction of approximately 79,000 audiovisual “clips” that appeared on the YouTube website between 2005 and 2008. They demanded, inter alia, statutory damages pursuant to 17 U.S.C. § 504(c) or, in the alternative, actual damages from the alleged infringement, as well as declaratory and injunctive relief.[3]

In a June 23, 2010 Opinion and Order (the “June 23 Opinion”), the District Court held that the defendants were entitled to DMCA safe harbor protection primarily because they had insufficient notice of the particular infringements in suit. Viacom Int'l, Inc. v. YouTube, Inc., 718 F.Supp.2d 514, 529 (S.D.N.Y.2010). In construing the statutory safe harbor, the District Court concluded that the “actual knowledge” or “aware[ness] of facts or circumstances” that would disqualify an online service provider from safe harbor protection under § 512(c)(1)(A) refer to “knowledge of specific and identifiable infringements.” Id. at 523. The District Court further held that item-specific knowledge of infringing activity is required for a service provider to have the “right and ability to control” infringing activity under § 512(c)(1)(B). Id. at 527. Finally, the District Court held that the replication, transmittal, and display of videos on YouTube constituted activity “by reason of the storage at the direction of a user” within the meaning of § 512(c)(1). Id. at 526–27.

These related cases present a series of significant questions of statutory construction. We conclude that the District Court correctly held that the § 512(c) safe harbor requires knowledge or awareness of specific infringing activity, but we vacate the order granting summary judgment because a reasonable jury could find that YouTube had actual knowledge or awareness of specific infringing activity on its website. We further hold that the District Court erred by interpreting the “right and ability to control” provision to require “item-specific” knowledge. Finally, we affirm the District Court's holding that three of the challenged YouTube software functions fall within the safe harbor for infringement that occurs “by reason of” user storage; we remand for further fact-finding with respect to a fourth software function.

BACKGROUND

A. The DMCA Safe Harbors

“The DMCA was enacted in 1998 to implement the World Intellectual Property Organization Copyright Treaty,” Universal City Studios, Inc. v. Corley, 273 F.3d 429, 440 (2d Cir.2001), and to update domestic copyright law for the digital age, [676 F.3d 27] see Ellison v. Robertson, 357 F.3d 1072, 1076 (9th Cir.2004). Title II of the DMCA, separately titled the “Online Copyright Infringement Liability Limitation Act” (OCILLA), was designed to “clarif[y] the liability faced by service providers who transmit potentially infringing material over their networks.” S.Rep. No. 105–190 at 2 (1998). But “[r]ather than embarking upon a wholesale clarification” of various copyright doctrines, Congress elected “to leave current law in its evolving state and, instead, to create a series of ‘safe harbors[ ]’ for certain common activities of service providers.” Id. at 19. To that end, OCILLA established a series of four “safe harbors” that allow qualifying service providers to limit their liability for claims of copyright infringement based on (a) “transitory digital network communications,” (b) “system caching,” (c) “information residing on systems or networks at [the] direction of users,” and (d) “information location tools.” 17 U.S.C. § 512(a)-(d).

To qualify for protection under any of the safe harbors, a party must meet a set of threshold criteria. First, the party must in fact be a “service provider,” defined, in pertinent part, as “a provider of online services or network access, or the operator of facilities therefor.” 17 U.S.C. § 512(k)(1)(B). A party that qualifies as a service provider must also satisfy certain “conditions of eligibility,” including the adoption and reasonable implementation of a “repeat infringer” policy that “provides for the termination in appropriate circumstances of subscribers and account holders of the service provider's system or network.” Id. § 512(i)(1)(A). In addition, a qualifying service provider must accommodate “standard technical measures” that are “used by copyright owners to identify or protect copyrighted works.” Id. § 512(i)(1)(B), (i)(2).

Beyond the threshold criteria, a service provider must satisfy the requirements of a particular safe harbor. In this case, the safe harbor at issue is § 512(c), which covers infringement claims that arise “by reason of the storage at the direction of a user of material that resides on a system or network controlled or operated by or for the service provider.” Id. § 512(c)(1). The § 512(c) safe harbor will apply only if the service provider:

(A) (i) does not have actual knowledge that the material or an activity using the material on the system or network is infringing;

(ii) in the absence of such actual knowledge, is not aware of facts or circumstances from which infringing activity is apparent; or

(iii) upon obtaining such knowledge or awareness, acts expeditiously to remove, or disable access to, the material;

(B) does not receive a financial benefit directly attributable to the infringing activity, in a case in which the service provider has the right and ability to control such activity; and

(C) upon notification of claimed infringement as described in paragraph (3), responds expeditiously to remove, or disable access to, the material that is claimed to be infringing or to be the subject of infringing activity.

Id. § 512(c)(1)(A)-(C). Section 512(c) also sets forth a detailed notification scheme that requires service providers to “designate[ ] an agent to receive notifications of claimed infringement,” id. § 512(c)(2), and specifies the components of a proper notification, commonly known as a “takedown notice,” to that agent, see id. § 512(c)(3). Thus, actual knowledge of infringing material, awareness of facts or circumstances that make infringing activity apparent, or [676 F.3d 28] receipt of a takedown notice will each trigger an obligation to expeditiously remove the infringing material.

With the statutory context in mind, we now turn to the facts of this case.

B. Factual Background

YouTube was founded in February 2005 by Chad Hurley (“Hurley”), Steve Chen (“Chen”), and Jawed Karim (“Karim”), three former employees of the internet company Paypal. When YouTube announced the “official launch” of the website in December 2005, a press release described YouTube as a “consumer media company” that “allows people to watch, upload, and share personal video clips at www. You Tube. com.” Under the slogan “Broadcast yourself,” YouTube achieved rapid prominence and profitability, eclipsing competitors such as Google Video and Yahoo Video by wide margins. In November 2006, Google acquired YouTube in a stock-for-stock transaction valued at $1.65 billion. By March 2010, at the time of summary judgment briefing in this litigation, site traffic on YouTube had soared to more than 1 billion daily video views, with more than 24 hours of new video uploaded to the site every minute.

The basic function of the YouTube website permits users to “upload” and view video clips free of charge. Before uploading a video to YouTube, a user must register and create an account with the website. The registration process requires the user to accept YouTube's Terms of Use agreement, which provides, inter alia, that the user “will not submit material that is copyrighted ... unless [he is] the owner of such rights or ha[s] permission from their rightful owner to post the material and to grant YouTube all of the license rights granted herein.” When the registration process is complete, the user can sign in to his account, select a video to upload from the user's personal computer, mobile phone, or other device, and instruct the YouTube system to upload the video by clicking on a virtual upload “button.”

Uploading a video to the YouTube website triggers a series of automated software functions. During the upload process, YouTube makes one or more exact copies of the video in its original file format. YouTube also makes one or more additional copies of the video in “Flash” format,[4] a process known as “transcoding.” The transcoding process ensures that YouTube videos are available for viewing by most users at their request. The YouTube system allows users to gain access to video content by “streaming” the video to the user's computer in response to a playback request. YouTube uses a computer algorithm to identify clips that are “related” to a video the user watches and display links to the “related” clips.

C. Procedural History

Plaintiff Viacom, an American media conglomerate, and various Viacom affiliates filed suit against YouTube on March 13, 2007, alleging direct and secondary copyright infringement[5] based on the public performance, display, and reproduction of their audiovisual works on the YouTube website. Plaintiff Premier League, an English soccer league, and Plaintiff Bourne Co. filed a putative class action against [676 F.3d 29] YouTube on May 4, 2007, alleging direct and secondary copyright infringement on behalf of all copyright owners whose material was copied, stored, displayed, or performed on YouTube without authorization. Specifically at issue were some 63,497 video clips identified by Viacom, as well as 13,500 additional clips (jointly, the “clips-in-suit”) identified by the putative class plaintiffs.

The plaintiffs in both actions principally demanded statutory damages pursuant to 17 U.S.C. § 504(c) or, in the alternative, actual damages plus the defendants' profits from the alleged infringement, as well as declaratory and injunctive relief.[6] Judge Stanton, to whom the Viacom action was assigned, accepted the Premier League class action as related. At the close of discovery, the parties in both actions cross-moved for partial summary judgment with respect to the applicability of the DMCA safe harbor defense.[7]

In the dual-captioned June 23 Opinion, the District Court denied the plaintiffs' motions and granted summary judgment to the defendants, finding that YouTube qualified for DMCA safe harbor protection with respect to all claims of direct and secondary copyright infringement. Viacom Int'l, 718 F.Supp.2d at 529. The District Court prefaced its analysis of the DMCA safe harbor by holding that, based on the plaintiffs' summary judgment submissions, “a jury could find that the defendants not only were generally aware of, but welcomed, copyright-infringing material being placed on their website.” Id. at 518. However, the District Court also noted that the defendants had properly designated an agent pursuant to § 512(c)(2), and “when they received specific notice that a particular item infringed a copyright, they swiftly removed it.” Id. at 519. Accordingly, the District Court identified the crux of the inquiry with respect to YouTube's copyright liability as follows:

[T]he critical question is whether the statutory phrases “actual knowledge that the material or an activity using the material on the system or network is infringing,” and “facts or circumstances from which infringing activity is apparent” in § 512(c)(1)(A)(i) and (ii) mean a general awareness that there are infringements (here, claimed to be widespread and common), or rather mean actual or constructive knowledge of specific and identifiable infringements of individual items.

Id. After quoting at length from the legislative history of the DMCA, the District Court held that “the phrases ‘actual knowledge that the material or an activity’ is infringing, and ‘facts or circumstances' indicating infringing activity, describe knowledge of specific and identifiable infringements of particular individual items.” Id. at 523. “Mere knowledge of [the] prevalence of such activity in general,” the District Court concluded, “is not enough.” Id.

In a final section labeled “Other Points,” the District Court rejected two additional claims. First, it rejected the plaintiffs' argument that the replication, transmittal and display of YouTube videos are functions that fall outside the protection § 512(c)(1) affords for “infringement of copyright by reason of ... storage at the direction of the user.” Id. at 526–27. Second, it rejected the plaintiffs' argument [676 F.3d 30] that YouTube was ineligible for safe harbor protection under the control provision, holding that the “right and ability to control” infringing activity under § 512(c)(1)(B) requires “item-specific” knowledge thereof, because “the provider must know of the particular case before he can control it.” Id. at 527.

Following the June 23 Opinion, final judgment in favor of YouTube was entered on August 10, 2010. These appeals followed.

DISCUSSION

We review an order granting summary judgment de novo, drawing all factual inferences in favor of the non-moving party. See, e.g., Paneccasio v. Unisource Worldwide, Inc., 532 F.3d 101, 107 (2d Cir.2008). “Summary judgment is proper only when, construing the evidence in the light most favorable to the non-movant, ‘there is no genuine dispute as to any material fact and the movant is entitled to judgment as a matter of law.’ ” Doninger v. Niehoff, 642 F.3d 334, 344 (2d Cir.2011) (quoting Fed.R.Civ.P. 56(a)).

A. Actual and “Red Flag” Knowledge: § 512(c)(1)(A)

 The first and most important question on appeal is whether the DMCA safe harbor at issue requires “actual knowledge” or “aware[ness]” of facts or circumstances indicating “specific and identifiable infringements,” Viacom, 718 F.Supp.2d at 523. We consider first the scope of the statutory provision and then its application to the record in this case.

1. The Specificity Requirement

“As in all statutory construction cases, we begin with the language of the statute,” Barnhart v. Sigmon Coal Co., 534 U.S. 438, 450, 122 S.Ct. 941, 151 L.Ed.2d 908 (2002). Under § 512(c)(1)(A), safe harbor protection is available only if the service provider:

(i) does not have actual knowledge that the material or an activity using the material on the system or network is infringing;

(ii) in the absence of such actual knowledge, is not aware of facts or circumstances from which infringing activity is apparent; or

(iii) upon obtaining such knowledge or awareness, acts expeditiously to remove, or disable access to, the material....

17 U.S.C. § 512(c)(1)(A). As previously noted, the District Court held that the statutory phrases “actual knowledge that the material ... is infringing” and “facts or circumstances from which infringing activity is apparent” refer to “knowledge of specific and identifiable infringements.” Viacom, 718 F.Supp.2d at 523. For the reasons that follow, we substantially affirm that holding.

Although the parties marshal a battery of other arguments on appeal, it is the text of the statute that compels our conclusion. In particular, we are persuaded that the basic operation of § 512(c) requires knowledge or awareness of specific infringing activity. Under § 512(c)(1)(A), knowledge or awareness alone does not disqualify the service provider; rather, the provider that gains knowledge or awareness of infringing activity retains safe-harbor protection if it “acts expeditiously to remove, or disable access to, the material.” 17 U.S.C. § 512(c)(1)(A)(iii). Thus, the nature of the removal obligation itself contemplates knowledge or awareness of specific infringing material, because expeditious removal is possible only if the service provider knows with particularity which items to remove. Indeed, to require expeditious removal in the absence of specific knowledge [676 F.3d 31] or awareness would be to mandate an amorphous obligation to “take commercially reasonable steps” in response to a generalized awareness of infringement. Viacom Br. 33. Such a view cannot be reconciled with the language of the statute, which requires “expeditious[ ]” action to remove or disable “ the material ” at issue. 17 U.S.C. § 512(c)(1)(A)(iii) (emphasis added).

On appeal, the plaintiffs dispute this conclusion by drawing our attention to § 512(c)(1)(A)(ii), the so-called “red flag” knowledge provision. See id. § 512(c)(1)(A)(ii) (limiting liability where, “in the absence of such actual knowledge, [the service provider] is not aware of facts or circumstances from which infringing activity is apparent”). In their view, the use of the phrase “facts or circumstances” demonstrates that Congress did not intend to limit the red flag provision to a particular type of knowledge. The plaintiffs contend that requiring awareness of specific infringements in order to establish “aware[ness] of facts or circumstances from which infringing activity is apparent,” 17 U.S.C. § 512(c)(1)(A)(ii), renders the red flag provision superfluous, because that provision would be satisfied only when the “actual knowledge” provision is also satisfied. For that reason, the plaintiffs urge the Court to hold that the red flag provision “requires less specificity” than the actual knowledge provision. Pls.' Supp. Br. 1.

This argument misconstrues the relationship between “actual” knowledge and “red flag” knowledge. It is true that “we are required to ‘disfavor interpretations of statutes that render language superfluous.’ ” Conn. ex rel. Blumenthal v. U.S. Dep't of the Interior, 228 F.3d 82, 88 (2d Cir.2000) (quoting Conn. Nat'l Bank v. Germain, 503 U.S. 249, 253, 112 S.Ct. 1146, 117 L.Ed.2d 391 (1992)). But contrary to the plaintiffs' assertions, construing § 512(c)(1)(A) to require actual knowledge or awareness of specific instances of infringement does not render the red flag provision superfluous. The phrase “actual knowledge,” which appears in § 512(c)(1)(A)(i), is frequently used to denote subjective belief. See, e.g., United States v. Quinones, 635 F.3d 590, 602 (2d Cir.2011) (“[T]he belief held by the defendant need not be reasonable in order for it to defeat ... actual knowledge.”). By contrast, courts often invoke the language of “facts or circumstances,” which appears in § 512(c)(1)(A)(ii), in discussing an objective reasonableness standard. See, e.g., Maxwell v. City of New York, 380 F.3d 106, 108 (2d Cir.2004) (“Police officers' application of force is excessive ... if it is objectively unreasonable in light of the facts and circumstances confronting them, without regard to their underlying intent or motivation.” (internal quotation marks omitted)).

The difference between actual and red flag knowledge is thus not between specific and generalized knowledge, but instead between a subjective and an objective standard. In other words, the actual knowledge provision turns on whether the provider actually or “subjectively” knew of specific infringement, while the red flag provision turns on whether the provider was subjectively aware of facts that would have made the specific infringement “objectively” obvious to a reasonable person. The red flag provision, because it incorporates an objective standard, is not swallowed up by the actual knowledge provision under our construction of the § 512(c) safe harbor. Both provisions do independent work, and both apply only to specific instances of infringement.

The limited body of case law interpreting the knowledge provisions of the § 512(c) safe harbor comports with our view of the specificity requirement. Most [676 F.3d 32] recently, a panel of the Ninth Circuit addressed the scope of § 512(c) in UMG Recordings, Inc. v. Shelter Capital Partners LLC, 667 F.3d 1022 (9th Cir.2011), a copyright infringement case against Veoh Networks, a video-hosting service similar to YouTube.[8] As in this case, various music publishers brought suit against the service provider, claiming direct and secondary copyright infringement based on the presence of unauthorized content on the website, and the website operator sought refuge in the § 512(c) safe harbor. The Court of Appeals affirmed the district court's determination on summary judgment that the website operator was entitled to safe harbor protection. With respect to the actual knowledge provision, the panel declined to “adopt[ ] a broad conception of the knowledge requirement,” id. at 1038, holding instead that the safe harbor “[r]equir [es] specific knowledge of particular infringing activity,” id. at 1037. The Court of Appeals “reach[ed] the same conclusion” with respect to the red flag provision, noting that “[w]e do not place the burden of determining whether [materials] are actually illegal on a service provider.” Id. at 1038 (alterations in original) (quoting Perfect 10, Inc. v. CCBill LLC, 488 F.3d 1102, 1114 (9th Cir.2007)).

Although Shelter Capital contains the most explicit discussion of the § 512(c) knowledge provisions, other cases are generally in accord. See, e.g., Capitol Records, Inc. v. MP3tunes, LLC, 821 F.Supp.2d 627, 635, 2011 WL 5104616, at *14 (S.D.N.Y. Oct. 25, 2011) (“Undoubtedly, MP3tunes is aware that some level of infringement occurs. But, there is no genuine dispute that MP3tunes did not have specific ‘red flag’ knowledge with respect to any particular link....”); UMG Recordings, Inc. v. Veoh Networks, Inc., 665 F.Supp.2d 1099, 1108 (C.D.Cal.2009) (“ UMG II ”) (“[I]f investigation of ‘facts and circumstances' is required to identify material as infringing, then those facts and circumstances are not ‘red flags.’ ”). While we decline to adopt the reasoning of those decisions in toto, we note that no court has embraced the contrary proposition—urged by the plaintiffs—that the red flag provision “requires less specificity” than the actual knowledge provision.

Based on the text of § 512(c)(1)(A), as well as the limited case law on point, we affirm the District Court's holding that actual knowledge or awareness of facts or circumstances that indicate specific and identifiable instances of infringement will disqualify a service provider from the safe harbor.

2. The Grant of Summary Judgment

The corollary question on appeal is whether, under the foregoing construction of § 512(c)(1)(A), the District Court erred in granting summary judgment to YouTube on the record presented. For the reasons that follow, we hold that although the District Court correctly interpreted § 512(c)(1)(A), summary judgment for the defendants was premature.

i. Specific Knowledge or Awareness

The plaintiffs argue that, even under the District Court's construction of the safe harbor, the record raises material issues of fact regarding YouTube's actual knowledge or “red flag” awareness of specific instances of infringement. To that end, the plaintiffs draw our attention to various estimates regarding the percentage of infringing content on the YouTube website. For example, Viacom cites evidence [676 F.3d 33] that YouTube employees conducted website surveys and estimated that 75–80% of all YouTube streams contained copyrighted material. The class plaintiffs similarly claim that Credit Suisse, acting as financial advisor to Google, estimated that more than 60% of YouTube's content was “premium” copyrighted content—and that only 10% of the premium content was authorized. These approximations suggest that the defendants were conscious that significant quantities of material on the YouTube website were infringing. See Viacom Int'l, 718 F.Supp.2d at 518 (“[A] jury could find that the defendants not only were generally aware of, but welcomed, copyright-infringing material being placed on their website.”). But such estimates are insufficient, standing alone, to create a triable issue of fact as to whether YouTube actually knew, or was aware of facts or circumstances that would indicate, the existence of particular instances of infringement.

Beyond the survey results, the plaintiffs rely upon internal YouTube communications that do refer to particular clips or groups of clips. The class plaintiffs argue that YouTube was aware of specific infringing material because, inter alia, YouTube attempted to search for specific Premier League videos on the site in order to gauge their “value based on video usage.” In particular, the class plaintiffs cite a February 7, 2007 e-mail from Patrick Walker, director of video partnerships for Google and YouTube, requesting that his colleagues calculate the number of daily searches for the terms “soccer,” “football,” and “Premier League” in preparation for a bid on the global rights to Premier League content. On another occasion, Walker requested that any “clearly infringing, official broadcast footage” from a list of top Premier League clubs—including Liverpool Football Club, Chelsea Football Club, Manchester United Football Club, and Arsenal Football Club—be taken down in advance of a meeting with the heads of “several major sports teams and leagues.” YouTube ultimately decided not to make a bid for the Premier League rights—but the infringing content allegedly remained on the website.

The record in the Viacom action includes additional examples. For instance, YouTube founder Jawed Karim prepared a report in March 2006 which stated that, “[a]s of today[,] episodes and clips of the following well-known shows can still be found [on YouTube]: Family Guy, South Park, MTV Cribs, Daily Show, Reno 911, [and] Dave Chapelle [sic].” Karim further opined that, “although YouTube is not legally required to monitor content ... and complies with DMCA takedown requests, we would benefit from preemptively removing content that is blatantly illegal and likely to attract criticism.” He also noted that “a more thorough analysis” of the issue would be required. At least some of the TV shows to which Karim referred are owned by Viacom. A reasonable juror could conclude from the March 2006 report that Karim knew of the presence of Viacom-owned material on YouTube, since he presumably located specific clips of the shows in question before he could announce that YouTube hosted the content “[a]s of today.” A reasonable juror could also conclude that Karim believed the clips he located to be infringing (since he refers to them as “blatantly illegal”), and that YouTube did not remove the content from the website until conducting “a more thorough analysis,” thus exposing the company to liability in the interim.

Furthermore, in a July 4, 2005 e-mail exchange, YouTube founder Chad Hurley sent an e-mail to his co-founders with the subject line “budlight commercials,” and stated, “we need to reject these too.” Steve Chen responded, “can we please [676 F.3d 34] leave these in a bit longer? another week or two can't hurt.” Karim also replied, indicating that he “added back in all 28 bud videos.” Similarly, in an August 9, 2005 e-mail exchange, Hurley urged his colleagues “to start being diligent about rejecting copyrighted / inappropriate content,” noting that “there is a cnn clip of the shuttle clip on the site today, if the boys from Turner would come to the site, they might be pissed?” Again, Chen resisted:

but we should just keep that stuff on the site. i really don't see what will happen. what? someone from cnn sees it? he happens to be someone with power? he happens to want to take it down right away. he gets in touch with cnn legal. 2 weeks later, we get a cease & desist letter. we take the video down.

And again, Karim agreed, indicating that “the CNN space shuttle clip, I like. we can remove it once we're bigger and better known, but for now that clip is fine.”

Upon a review of the record, we are persuaded that the plaintiffs may have raised a material issue of fact regarding YouTube's knowledge or awareness of specific instances of infringement. The foregoing Premier League e-mails request the identification and removal of “clearly infringing, official broadcast footage.” The March 2006 report indicates Karim's awareness of specific clips that he perceived to be “blatantly illegal.” Similarly, the Bud Light and space shuttle e-mails refer to particular clips in the context of correspondence about whether to remove infringing material from the website. On these facts, a reasonable juror could conclude that YouTube had actual knowledge of specific infringing activity, or was at least aware of facts or circumstances from which specific infringing activity was apparent. See § 512(c)(1)(A)(i)-(ii). Accordingly, we hold that summary judgment to YouTube on all clips-in-suit, especially in the absence of any detailed examination of the extensive record on summary judgment, was premature.[9]

We hasten to note, however, that although the foregoing e-mails were annexed as exhibits to the summary judgment papers, it is unclear whether the clips referenced therein are among the current clips-in-suit. By definition, only the current clips-in-suit are at issue in this litigation. Accordingly, we vacate the order granting summary judgment and instruct the District Court to determine on remand whether any specific infringements of which YouTube had knowledge or awareness correspond to the clips-in-suit in these actions.

ii. “Willful Blindness”

The plaintiffs further argue that the District Court erred in granting summary judgment to the defendants despite evidence that YouTube was “willfully blind” to specific infringing activity. On this issue of first impression, we consider the application of the common law willful blindness doctrine in the DMCA context.

 “The principle that willful blindness is tantamount to knowledge is hardly novel.” Tiffany (NJ) Inc. v. eBay, Inc., 600 F.3d 93, 110 n. 16 (2d Cir.2010) (collecting [676 F.3d 35] cases); see In re Aimster Copyright Litig., 33,4 F.3d 643 (7th Cir.2003) (“Willful blindness is knowledge, in copyright law ... as it is in the law generally.”). A person is “willfully blind” or engages in “conscious avoidance” amounting to knowledge where the person “ ‘was aware of a high probability of the fact in dispute and consciously avoided confirming that fact.’ ” United States v. Aina-Marshall, 336 F.3d 167, 170 (2d Cir.2003) (quoting United States v. Rodriguez, 983 F.2d 455, 458 (2d Cir.1993)); cf. Global–Tech Appliances, Inc. v. SEB S.A., ––– U.S. ––––, 131 S.Ct. 2060, 2070–71, 179 L.Ed.2d 1167 (2011) (applying the willful blindness doctrine in a patent infringement case). Writing in the trademark infringement context, we have held that “[a] service provider is not ... permitted willful blindness. When it has reason to suspect that users of its service are infringing a protected mark, it may not shield itself from learning of the particular infringing transactions by looking the other way.” Tiffany, 600 F.3d at 109.

The DMCA does not mention willful blindness. As a general matter, we interpret a statute to abrogate a common law principle only if the statute “speak[s] directly to the question addressed by the common law.” Matar v. Dichter, 563 F.3d 9, 14 (2d Cir.2009) (internal quotation marks omitted). The relevant question, therefore, is whether the DMCA “speak[s] directly” to the principle of willful blindness. Id. (internal quotation marks omitted). The DMCA provision most relevant to the abrogation inquiry is § 512(m), which provides that safe harbor protection shall not be conditioned on “a service provider monitoring its service or affirmatively seeking facts indicating infringing activity, except to the extent consistent with a standard technical measure complying with the provisions of subsection (i).” 17 U.S.C. § 512(m)(1). Section 512(m) is explicit: DMCA safe harbor protection cannot be conditioned on affirmative monitoring by a service provider. For that reason, § 512(m) is incompatible with a broad common law duty to monitor or otherwise seek out infringing activity based on general awareness that infringement may be occurring. That fact does not, however, dispose of the abrogation inquiry; as previously noted, willful blindness cannot be defined as an affirmative duty to monitor. See Aina–Marshall, 336 F.3d at 170 (holding that a person is “willfully blind” where he “was aware of a high probability of the fact in dispute and consciously avoided confirming that fact”). Because the statute does not “speak[ ] directly” to the willful blindness doctrine, § 512(m) limits—but does not abrogate—the doctrine. Accordingly, we hold that the willful blindness doctrine may be applied, in appropriate circumstances, to demonstrate knowledge or awareness of specific instances of infringement under the DMCA.

The District Court cited § 512(m) for the proposition that safe harbor protection does not require affirmative monitoring, Viacom, 718 F.Supp.2d at 524, but did not expressly address the principle of willful blindness or its relationship to the DMCA safe harbors. As a result, whether the defendants made a “deliberate effort to avoid guilty knowledge,” In re Aimster, 33,4 F.3d at 650, remains a fact question for the District Court to consider in the first instance on remand.[10]

[676 F.3d 36] B. Control and Benefit: § 512(c)(1)(B)

 Apart from the foregoing knowledge provisions, the § 512(c) safe harbor provides that an eligible service provider must “not receive a financial benefit directly attributable to the infringing activity, in a case in which the service provider has the right and ability to control such activity.” 17 U.S.C. § 512(c)(1)(B). The District Court addressed this issue in a single paragraph, quoting from § 512(c)(1)(B), the so-called “control and benefit” provision, and concluding that “[t]he ‘right and ability to control’ the activity requires knowledge of it, which must be item-specific.” Viacom, 718 F.Supp.2d at 527. For the reasons that follow, we hold that the District Court erred by importing a specific knowledge requirement into the control and benefit provision, and we therefore remand for further fact-finding on the issue of control.

1. “Right and Ability to Control” Infringing Activity

On appeal, the parties advocate two competing constructions of the “right and ability to control” infringing activity. 17 U.S.C. § 512(c)(1)(B). Because each is fatally flawed, we reject both proposed constructions in favor of a fact-based inquiry to be conducted in the first instance by the District Court.

The first construction, pressed by the defendants, is the one adopted by the District Court, which held that “the provider must know of the particular case before he can control it.” Viacom, 718 F.Supp.2d at 527. The Ninth Circuit recently agreed, holding that “until [the service provider] becomes aware of specific unauthorized material, it cannot exercise its ‘power or authority’ over the specific infringing item. In practical terms, it does not have the kind of ability to control infringing activity the statute contemplates.” UMG Recordings, Inc. v. Shelter Capital Partners LLC, 667 F.3d 1022, 1041 (9th Cir.2011). The trouble with this construction is that importing a specific knowledge requirement into § 512(c)(1)(B) renders the control provision duplicative of § 512(c)(1)(A). Any service provider that has item-specific knowledge of infringing activity and thereby obtains financial benefit would already be excluded from the safe harbor under § 512(c)(1)(A) for having specific knowledge of infringing material and failing to effect expeditious removal. No additional service provider would be excluded by § 512(c)(1)(B) that was not already excluded by § 512(c)(1)(A). Because statutory interpretations that render language superfluous are disfavored, Conn. ex rel. Blumenthal, 228 F.3d at 88, we reject the District Court's interpretation of the control provision.

The second construction, urged by the plaintiffs, is that the control provision codifies the common law doctrine of vicarious copyright liability. The common law imposes liability for vicarious copyright infringement “[w]hen the right and ability to supervise coalesce with an obvious and direct financial interest in the exploitation of copyrighted materials—even in the absence of actual knowledge that the copyright mono [poly] is being impaired.” Shapiro, Bernstein & Co. v. H.L. Green Co., 316 F.2d 304, 307 (2d Cir.1963); cf. Metro–Goldwyn–Mayer Studios Inc. v. Grokster, Ltd., 545 U.S. 913, 930 n. 9, 125 S.Ct. 2764, 162 L.Ed.2d 781 (2005). To support their codification argument, the plaintiffs rely [676 F.3d 37] on a House Report relating to a preliminary version of the DMCA: “The ‘right and ability to control’ language ... codifies the second element of vicarious liability.... Subparagraph (B) is intended to preserve existing case law that examines all relevant aspects of the relationship between the primary and secondary infringer.” H.R.Rep. No. 105–551(I), at 26 (1998). In response, YouTube notes that the codification reference was omitted from the committee reports describing the final legislation, and that Congress ultimately abandoned any attempt to “embark[ ] upon a wholesale clarification” of vicarious liability, electing instead “to create a series of ‘safe harbors' for certain common activities of service providers.” S.Rep. No. 105–190, at 19.

Happily, the future of digital copyright law does not turn on the confused legislative history of the control provision. The general rule with respect to common law codification is that when “Congress uses terms that have accumulated settled meaning under the common law, a court must infer, unless the statute otherwise dictates, that Congress means to incorporate the established meaning of those terms.” Neder v. United States, 527 U.S. 1, 21, 119 S.Ct. 1827, 144 L.Ed.2d 35 (1999) (ellipsis and internal quotation marks omitted). Under the common law vicarious liability standard, “ ‘[t]he ability to block infringers' access to a particular environment for any reason whatsoever is evidence of the right and ability to supervise.’ ” Arista Records LLC v. Usenet.com, Inc., 633 F.Supp.2d 124, 157 (S.D.N.Y.2009) (alteration in original) (quoting A & M Records, Inc. v. Napster, Inc., 239 F.3d 1004, 1023 (9th Cir.2001)). To adopt that principle in the DMCA context, however, would render the statute internally inconsistent. Section 512(c) actually presumes that service providers have the ability to “block ... access” to infringing material. Id. at 157; see Shelter Capital, 667 F.3d at 1042–43. Indeed, a service provider who has knowledge or awareness of infringing material or who receives a takedown notice from a copyright holder is required to “remove, or disable access to, the material” in order to claim the benefit of the safe harbor. 17 U.S.C. § 512(c)(1)(A)(iii) & (C). But in taking such action, the service provider would—in the plaintiffs' analysis—be admitting the “right and ability to control” the infringing material. Thus, the prerequisite to safe harbor protection under § 512(c)(1)(A)(iii) & (C) would at the same time be a disqualifier under § 512(c)(1)(B).

Moreover, if Congress had intended § 512(c)(1)(B) to be coextensive with vicarious liability, “the statute could have accomplished that result in a more direct manner.” Shelter Capital, 667 F.3d at 1045.

It is conceivable that Congress ... intended that [service providers] which receive a financial benefit directly attributable to the infringing activity would not, under any circumstances, be able to qualify for the subsection (c) safe harbor. But if that was indeed their intention, it would have been far simpler and much more straightforward to simply say as much. Id. (alteration in original) (quoting Ellison v. Robertson, 189 F.Supp.2d 1051, 1061 (C.D.Cal.2002), aff'd in part and rev'd in part on different grounds, 357 F.3d 1072 (9th Cir.2004)).

In any event, the foregoing tension—elsewhere described as a “predicament”[11] and a “catch22”[12]—is sufficient to establish that the control provision “dictates” [676 F.3d 38] a departure from the common law vicarious liability standard, Neder, 527 U.S. at 21, 119 S.Ct. 1827. Accordingly, we conclude that the “right and ability to control” infringing activity under § 512(c)(1)(B) “requires something more than the ability to remove or block access to materials posted on a service provider's website.” MP3tunes, LLC, 821 F.Supp.2d at 645, 2011 WL 5104616, at *14; accord Wolk v. Kodak Imaging Network, Inc., ––– F.Supp.2d ––––, ––––, 2012 WL 11270, at *21 (S.D.N.Y. Jan. 3, 2012); UMG II, 665 F.Supp.2d at 1114–15; Io Grp., Inc. v. Veoh Networks, Inc., 586 F.Supp.2d 1132, 1151 (N.D.Cal.2008); Corbis Corp. v. Amazon.com, Inc., 351 F.Supp.2d 1090, 1110 (W.D.Wash.2004), overruled on other grounds by Cosmetic Ideas, Inc. v. IAC/Interactivecorp., 606 F.3d 612 (9th Cir.2010). The remaining—and more difficult—question is how to define the “something more” that is required.

To date, only one court has found that a service provider had the right and ability to control infringing activity under § 512(c)(1)(B).[13] In Perfect 10, Inc. v. Cybernet Ventures, Inc., 213 F.Supp.2d 1146 (C.D.Cal.2002), the court found control where the service provider instituted a monitoring program by which user websites received “detailed instructions regard[ing] issues of layout, appearance, and content.” Id. at 1173. The service provider also forbade certain types of content and refused access to users who failed to comply with its instructions. Id. Similarly, inducement of copyright infringement under Metro–Goldwyn–Mayer Studios Inc. v. Grokster, Ltd., 545 U.S. 913, 125 S.Ct. 2764, 162 L.Ed.2d 781 (2005), which “premises liability on purposeful, culpable expression and conduct,” id. at 937, 125 S.Ct. 2764, might also rise to the level of control under § 512(c)(1)(B). Both of these examples involve a service provider exerting substantial influence on the activities of users, without necessarily—or even frequently—acquiring knowledge of specific infringing activity.

In light of our holding that § 512(c)(1)(B) does not include a specific knowledge requirement, we think it prudent to remand to the District Court to consider in the first instance whether the plaintiffs have adduced sufficient evidence to allow a reasonable jury to conclude that YouTube had the right and ability to control the infringing activity and received a financial benefit directly attributable to that activity.

C. “By Reason of” Storage: § 512(c)(1)

 The § 512(c) safe harbor is only available when the infringement occurs “by reason of the storage at the direction of a user of material that resides on a system or network controlled or operated by or for the service provider.” 17 U.S.C. § 512(c)(1). In this case, the District Court held that YouTube's software functions fell within the safe harbor for infringements that occur “by reason of” user storage. Viacom, 718 F.Supp.2d at 526 (noting that a contrary holding would “confine[ ] the word ‘storage’ too narrowly to meet the statute's purpose”). For the reasons that follow, we affirm that holding [676 F.3d 39] with respect to three of the challenged software functions—the conversion (or “transcoding”) of videos into a standard display format, the playback of videos on “watch” pages, and the “related videos” function. We remand for further fact-finding with respect to a fourth software function, involving the third-party syndication of videos uploaded to YouTube.

As a preliminary matter, we note that “the structure and language of OCILLA indicate that service providers seeking safe harbor under [§ ] 512(c) are not limited to merely storing material.” Io Grp., 586 F.Supp.2d at 1147. The structure of the statute distinguishes between so-called “conduit only” functions under § 512(a) and the functions addressed by § 512(c) and the other subsections. See 17 U.S.C. § 512(n) (“Subsections (a), (b), (c), and (d) describe separate and distinct functions for purposes of applying this section.”). Most notably, OCILLA contains two definitions of “service provider.” 17 U.S.C. § 512(k)(1)(A)-(B). The narrower definition, which applies only to service providers falling under § 512(a), is limited to entities that “offer[ ] the transmission, routing or providing of connections for digital online communications, between or among points specified by a user, of material of the user's choosing, without modification to the content of the material as sent or received.” Id. § 512(k)(1)(A) (emphasis added). No such limitation appears in the broader definition, which applies to service providers—including YouTube—falling under § 512(c). Under the broader definition, “the term ‘service provider’ means a provider of online services or network access, or the operator of facilities therefor, and includes an entity described in subparagraph (A).” Id. § 512(k)(1)(B). In the absence of a parallel limitation on the ability of a service provider to modify user-submitted material, we conclude that § 512(c) “is clearly meant to cover more than mere electronic storage lockers.” UMG Recordings, Inc. v. Veoh Networks, Inc., 620 F.Supp.2d 1081, 1088 (C.D.Cal.2008) (“UMG I”).

The relevant case law makes clear that the § 512(c) safe harbor extends to software functions performed “for the purpose of facilitating access to user-stored material.” Id.; see Shelter Capital, 667 F.3d at 1031–35. Two of the software functions challenged here—transcoding and playback—were expressly considered by our sister Circuit in Shelter Capital, which held that liability arising from these functions occurred “by reason of the storage at the direction of a user.” 17 U.S.C. § 512(c); see Shelter Capital, 667 F.3d at 1027–28, 1031; see also UMG I, 620 F.Supp.2d at 1089–91; Io Group, 586 F.Supp.2d at 1146–48. Transcoding involves “[m]aking copies of a video in a different encoding scheme” in order to render the video “viewable over the Internet to most users.” Supp. Joint App'x I:236. The playback process involves “deliver[ing] copies of YouTube videos to a user's browser cache” in response to a user request. Id. at 239. The District Court correctly found that to exclude these automated functions from the safe harbor would eviscerate the protection afforded to service providers by § 512(c). Viacom, 718 F.Supp.2d at 526–27.

A similar analysis applies to the “related videos” function, by which a YouTube computer algorithm identifies and displays “thumbnails” of clips that are “related” to the video selected by the user. The plaintiffs claim that this practice constitutes content promotion, not “access” to stored content, and therefore falls beyond the scope of the safe harbor. Citing similar language in the Racketeer Influenced and Corrupt Organizations Act (“RICO”), 18 U.S.C. §§ 1961–68, and the Clayton [676 F.3d 40] Act, 15 U.S.C. §§ 12 et seq., the plaintiffs argue that the statutory phrase “by reason of” requires a finding of proximate causation between the act of storage and the infringing activity. See, e.g., Holmes v. Sec. Investor Prot. Corp., 503 U.S. 258, 267–68, 112 S.Ct. 1311, 117 L.Ed.2d 532 (1992) (holding that the “by reason of” language in the RICO statute requires proximate causation). But even if the plaintiffs are correct that § 512(c) incorporates a principle of proximate causation—a question we need not resolve here—the indexing and display of related videos retain a sufficient causal link to the prior storage of those videos. The record makes clear that the related videos algorithm “is fully automated and operates solely in response to user input without the active involvement of YouTube employees.” Supp. Joint App'x I:237. Furthermore, the related videos function serves to help YouTube users locate and gain access to material stored at the direction of other users. Because the algorithm “is closely related to, and follows from, the storage itself,” and is “narrowly directed toward providing access to material stored at the direction of users,” UMG I, 620 F.Supp.2d at 1092, we conclude that the related videos function is also protected by the § 512(c) safe harbor.

The final software function at issue here—third-party syndication—is the closest case. In or around March 2007, YouTube transcoded a select number of videos into a format compatible with mobile devices and “syndicated” or licensed the videos to Verizon Wireless and other companies. The plaintiffs argue—with some force—that business transactions do not occur at the “direction of a user” within the meaning of § 512(c)(1) when they involve the manual selection of copyrighted material for licensing to a third party. The parties do not dispute, however, that none of the clips-in-suit were among the approximately 2,000 videos provided to Verizon Wireless. In order to avoid rendering an advisory opinion on the outer boundaries of the storage provision, we remand for fact-finding on the question of whether any of the clips-in-suit were in fact syndicated to any other third party.

D. Other Arguments

1. Repeat Infringer Policy

The class plaintiffs briefly argue that YouTube failed to comply with the requirements of § 512(i), which conditions safe harbor eligibility on the service provider having “adopted and reasonably implemented ... a policy that provides for the termination in appropriate circumstances of subscribers and account holders of the service provider's system or network who are repeat infringers.” 17 U.S.C. § 512(i)(1)(A). Specifically, the class plaintiffs allege that YouTube “deliberately set up its identification tools to try to avoid identifying infringements of class plaintiffs' works.” This allegation rests primarily on the assertion that YouTube permitted only designated “partners” to gain access to content identification tools by which YouTube would conduct network searches and identify infringing material.[14]

Because the class plaintiffs challenge YouTube's deployment of search technology, [676 F.3d 41] we must consider their § 512(i) argument in conjunction with § 512(m). As previously noted, § 512(m) provides that safe harbor protection cannot be conditioned on “a service provider monitoring its service or affirmatively seeking facts indicating infringing activity, except to the extent consistent with a standard technical measure complying with the provisions of subsection (i).” 17 U.S.C. § 512(m)(1) (emphasis added). In other words, the safe harbor expressly disclaims any affirmative monitoring requirement—except to the extent that such monitoring comprises a “standard technical measure” within the meaning of § 512(i). Refusing to accommodate or implement a “standard technical measure” exposes a service provider to liability; refusing to provide access to mechanisms by which a service provider affirmatively monitors its own network has no such result. In this case, the class plaintiffs make no argument that the content identification tools implemented by YouTube constitute “standard technical measures,” such that YouTube would be exposed to liability under § 512(i). For that reason, YouTube cannot be excluded from the safe harbor by dint of a decision to restrict access to its proprietary search mechanisms.

2. Affirmative Claims

Finally, the plaintiffs argue that the District Court erred in denying summary judgment to the plaintiffs on their claims of direct infringement, vicarious liability, and contributory liability under Metro–Goldwyn–Mayer Studios Inc. v. Grokster, Ltd., 545 U.S. 913, 125 S.Ct. 2764, 162 L.Ed.2d 781 (2005). In granting summary judgment to the defendants, the District Court held that YouTube “qualif[ied] for the protection of ... § 512(c),” and therefore denied the plaintiffs' cross-motion for summary judgment without comment. Viacom, 718 F.Supp.2d at 529.

The District Court correctly determined that a finding of safe harbor application necessarily protects a defendant from all affirmative claims for monetary relief. 17 U.S.C. § 512(c)(1); see H.R.Rep. No. 105–551(II), at 50; S.Rep. No. 105–190, at 20; cf. 17 U.S.C. § 512(j) (setting forth the scope of injunctive relief available under § 512). For the reasons previously stated, further fact-finding is required to determine whether YouTube is ultimately entitled to safe harbor protection in this case. Accordingly, we vacate the order denying summary judgment to the plaintiffs and remand the cause without expressing a view on the merits of the plaintiffs' affirmative claims.

CONCLUSION

To summarize, we hold that:

(1) The District Court correctly held that 17 U.S.C. § 512(c)(1)(A) requires knowledge or awareness of facts or circumstances that indicate specific and identifiable instances of infringement;

(2) However, the June 23, 2010 order granting summary judgment to YouTube is VACATED because a reasonable jury could conclude that YouTube had knowledge or awareness under § 512(c)(1)(A) at least with respect to a handful of specific clips; the cause is REMANDED for the District Court to determine whether YouTube had knowledge or awareness of any specific instances of infringement corresponding to the clips-in-suit;

(3) The willful blindness doctrine may be applied, in appropriate circumstances, to demonstrate knowledge or awareness of specific instances of infringement under § 512(c)(1)(A); the cause is REMANDED for the [676 F.3d 42] District Court to consider the application of the willful blindness doctrine in the first instance;

(4) The District Court erred by requiring “item-specific” knowledge of infringement in its interpretation of the “right and ability to control” infringing activity under 17 U.S.C. § 512(c)(1)(B), and the judgment is REVERSED insofar as it rests on that erroneous construction of the statute; the cause is REMANDED for further fact-finding by the District Court on the issues of control and financial benefit;

(5) The District Court correctly held that three of the challenged YouTube software functions—replication, playback, and the related videos feature—occur “by reason of the storage at the direction of a user” within the meaning of 17 U.S.C. § 512(c)(1), and the judgment is AFFIRMED insofar as it so held; the cause is REMANDED for further fact-finding regarding a fourth software function, involving the syndication of YouTube videos to third parties.

On remand, the District Court shall allow the parties to brief the following issues, with a view to permitting renewed motions for summary judgment as soon as practicable:

(A) Whether, on the current record, YouTube had knowledge or awareness of any specific infringements (including any clips-in-suit not expressly noted in this opinion);

(B) Whether, on the current record, YouTube willfully blinded itself to specific infringements;

(C) Whether YouTube had the “right and ability to control” infringing activity within the meaning of § 512(c)(1)(B); and

(D) Whether any clips-in-suit were syndicated to a third party and, if so, whether such syndication occurred “by reason of the storage at the direction of the user” within the meaning of § 512(c)(1), so that YouTube may claim the protection of the § 512(c) safe harbor.

We leave to the sound discretion of the District Court the question of whether some additional, guided discovery is appropriate in order to resolve “(C)” (“[w]hether YouTube had ‘the right and ability to control’ infringing activity”), and “(D)” (“[w]hether any clips-in-suit were syndicated to a third party”). As noted above, for purposes of this case, the record with respect to “(A)” (“[w]hether ... YouTube had knowledge or awareness of any specific infringements”) and “(B)” (“[w]hether. YouTube willfully blinded itself to specific infringements”) is now complete.

Each party shall bear its own costs.

APPENDIX ARELEVANT PROVISIONS OF THE DIGITAL MILLENNIUM COPYRIGHT ACT 17 U.S.C. § 512

(c) Information residing on systems or networks at direction of users.

(1) In general.—A service provider shall not be liable for monetary relief, or, except as provided in subsection (j), for injunctive or other equitable relief, for infringement of copyright by reason of the storage at the direction of a user of material that resides on a system or network controlled or operated by or for the service provider, if the service provider—

(A) (i) does not have actual knowledge that the material or an activity using the material on the system or network is infringing;

[676 F.3d 43] (ii) in the absence of such actual knowledge, is not aware of facts or circumstances from which infringing activity is apparent; or

(iii) upon obtaining such knowledge or awareness, acts expeditiously to remove, or disable access to, the material;

(B) does not receive a financial benefit directly attributable to the infringing activity, in a case in which the service provider has the right and ability to control such activity; and

(C) upon notification of claimed infringement as described in paragraph (3), responds expeditiously to remove, or disable access to, the material that is claimed to be infringing or to be the subject of infringing activity.

(2) Designated agent.—The limitations on liability established in this subsection apply to a service provider only if the service provider has designated an agent to receive notifications of claimed infringement described in paragraph (3), by making available through its service, including on its website in a location accessible to the public, and by providing to the Copyright Office, substantially the following information:

(A) the name, address, phone number, and electronic mail address of the agent.

(B) other contact information which the Register of Copyrights may deem appropriate.

The Register of Copyrights shall maintain a current directory of agents available to the public for inspection, including through the Internet, and may require payment of a fee by service providers to cover the costs of maintaining the directory.

(3) Elements of notification.—

(A) To be effective under this subsection, a notification of claimed infringement must be a written communication provided to the designated agent of a service provider that includes substantially the following:

(i) A physical or electronic signature of a person authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.

(ii) Identification of the copyrighted work claimed to have been infringed, or, if multiple copyrighted works at a single online site are covered by a single notification, a representative list of such works at that site.

(iii) Identification of the material that is claimed to be infringing or to be the subject of infringing activity and that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit the service provider to locate the material.

(vi) Information reasonably sufficient to permit the service provider to contact the complaining party, such as an address, telephone number, and, if available, an electronic mail address at which the complaining party may be contacted.

(iv) A statement that the complaining party has a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, its agent, or the law.

(v) A statement that the information in the notification is accurate, and under penalty of perjury, that the complaining party is authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.

(B)(i) Subject to clause (ii), a notification from a copyright owner or from a person authorized to act on behalf of the copyright owner that fails to comply substantially with the provisions of subparagraph

[676 F.3d 44] (A) shall not be considered under paragraph (1)(A) in determining whether a service provider has actual knowledge or is aware of facts or circumstances from which infringing activity is apparent.

(ii) In a case in which the notification that is provided to the service provider's designated agent fails to comply substantially with all the provisions of subparagraph (A) but substantially complies with clauses (ii), (iii), and (iv) of subparagraph (A), clause (i) of this subparagraph applies only if the service provider promptly attempts to contact the person making the notification or takes other reasonable steps to assist in the receipt of notification that substantially complies with all the provisions of subparagraph (A).

(i) Conditions for Eligibility.

(1) Accommodation of technology.—The limitations on liability established by this section shall apply to a service provider only if the service provider—

(A) has adopted and reasonably implemented, and informs subscribers and account holders of the service provider's system or network of, a policy that provides for the termination in appropriate circumstances of subscribers and account holders of the service provider's system or network who are repeat infringers; and

(B) accommodates and does not interfere with standard technical measures.

(2) Definition.—As used in this subsection, the term “standard technical measures” means technical measures that are used by copyright owners to identify or protect copyrighted works and—

(A) have been developed pursuant to a broad consensus of copyright owners and service providers in an open, fair, voluntary, multi-industry standards process;

(B) are available to any person on reasonable and nondiscriminatory terms; and

(C) do not impose substantial costs on service providers or substantial burdens on their systems or networks.

(k) Definitions.

(1) Service provider.—

(A) As used in subsection (a), the term “service provider” means an entity offering the transmission, routing, or providing of connections for digital online communications, between or among points specified by a user, of material of the user's choosing, without modification to the content of the material as sent or received.

(B) As used in this section, other than subsection (a), the term “service provider” means a provider of online services or network access, or the operator of facilities therefor, and includes an entity described in subparagraph (A).

(2) Monetary relief.—As used in this section, the term “monetary relief” means damages, costs, attorneys' fees, and any other form of monetary payment.

(m) Protection of privacy.—Nothing in this section shall be construed to condition the applicability of subsections (a) through (d) on—

(1) a service provider monitoring its service or affirmatively seeking facts indicating infringing activity, except to the extent consistent with a standard technical measure complying with the provisions of subsection (i); or

(2) a service provider gaining access to, removing, or disabling access to material [676 F.3d 45] in cases in which such conduct is prohibited by law.

(n) Construction.

Subsections (a), (b), (c), and (d) describe separate and distinct functions for purposes of applying this section. Whether a service provider qualifies for the limitation on liability in any one of those subsections shall be based solely on the criteria in that subsection, and shall not affect a determination of whether that service provider qualifies for the limitations on liability under any other such subsection.

[*] The Honorable Roger J. Miner, who was originally assigned to the panel, died prior to the resolution of this case. The remaining two members of the panel, who are in agreement, have determined the matter. See 28 U.S.C. § 46(d); 2d Cir. IOP E(b); United States v. Desimone, 140 F.3d 457, 458–59 (2d Cir.1998).

[1] The relevant provisions of 17 U.S.C. § 512(c) appear in Appendix A.

[2] The plaintiffs-appellants in Viacom Int'l, Inc. v. YouTube, Inc., No. 10–3270–cv, are Viacom, Comedy Partners, Country Music Television, Inc., Paramount Pictures Corporation, and Black Entertainment Television, LLC (jointly, the “Viacom plaintiffs”). The plaintiffs-appellants in Football Ass'n Premier League Ltd. v. YouTube, Inc., No. 10–3342–cv, are Premier League, Bourne Co., Cal IV Entertainment, LLC, Cherry Lane Music Publishing Company, Inc., X–Ray Dog Music, Inc., Fédération Française de Tennis, Murbo Music Publishing, Inc., and Stage Three Music (US), Inc. (jointly, the “class plaintiffs”).

[3] The class plaintiffs also sought class certification pursuant to Rule 23 of the Federal Rules of Civil Procedure.

[4] The “Flash” format “is a highly compressed streaming format that begins to play instantly. Unlike other delivery methods, it does not require the viewer to download the entire video file before viewing.” Joint App'x IV:73.

[5] Doctrines of secondary copyright infringement include contributory, vicarious, and inducement liability. See Metro–Goldwyn–Mayer Studios Inc. v. Grokster, Ltd., 545 U.S. 913, 930–31, 936–37, 125 S.Ct. 2764, 162 L.Ed.2d 781 (2005).

[6] National Music Publishers' Association, one of the named plaintiffs in the putative class action, seeks only equitable relief.

[7] It is undisputed that all clips-in-suit had been removed from the YouTube website by the time of summary judgment, mostly in response to DMCA takedown notices. Viacom Int'l, 718 F.Supp.2d at 519.

[8] Veoh Networks operates a website that “allows people to share video content over the Internet.” Shelter Capital, 667 F.3d at 1026.

[9] We express no opinion as to whether the evidence discussed above will prove sufficient to withstand a renewed motion for summary judgment by YouTube on remand. In particular, we note that there is at least some evidence that the search requested by Walker in his February 7, 2007 e-mail was never carried out. See Joint App'x III:256. We also note that the class plaintiffs have failed to identify evidence indicating that any infringing content discovered as a result of Walker's request in fact remained on the YouTube website. The class plaintiffs, drawing on the voluminous record in this case, may be able to remedy these deficiencies in their briefing to the District Court on remand.

[10] Our recent decision in Tiffany (NJ) Inc. v. eBay Inc., 600 F.3d 93 (2d Cir.2010), lends support to this result. In Tiffany, we rejected a willful blindness challenge, holding that although eBay “knew as a general matter that counterfeit Tiffany products were listed and sold through its website,” such knowledge “is insufficient to trigger liability.” Id. at 110. In so holding, however, we rested on the extensive findings of the district court with respect to willful blindness. Id. (citing Tiffany (NJ) Inc. v. eBay, Inc., 576 F.Supp.2d 463, 513 (S.D.N.Y.2008)). Thus, the Tiffany holding counsels in favor of explicit fact-finding on the issue of willful blindness.

[11] Ellison, 189 F.Supp.2d at 1061.

[12] UMG II, 665 F.Supp.2d at 1112.

[13] Other courts have suggested that control may exist where the service provider is “actively involved in the listing, bidding, sale and delivery” of items offered for sale, Hendrickson v. eBay, Inc., 165 F.Supp.2d 1082, 1094 (C.D.Cal.2001), or otherwise controls vendor sales by previewing products prior to their listing, editing product descriptions, or suggesting prices, Corbis Corp., 351 F.Supp.2d at 1110. Because these cases held that control did not exist, however, it is not clear that the practices cited therein are individually sufficient to support a finding of control.

[14] The class plaintiffs also assert, in a single sentence, that YouTube failed to implement any repeat infringer policy prior to March 2006, and that the defendants are therefore excluded from the safe harbor for any infringing activity before that date. This one-sentence argument is insufficient to raise the issue for review before this Court. Accordingly, we deem the issue waived on appeal. See, e.g., Norton v. Sam's Club, 145 F.3d 114, 117 (2d Cir.1998) (“Issues not sufficiently argued in the briefs are considered waived and normally will not be addressed on appeal.”).

6.7.2 Perfect 10, Inc. v. CCBILL, LLC 6.7.2 Perfect 10, Inc. v. CCBILL, LLC

This case is an example of the safe harbor under Section 512(d) for linking

340 F.Supp.2d 1077 (2004)

PERFECT 10, INC., Plaintiff,
v.
CCBILL, LLC, et al., Defendants.

No. CV 02-7624 LBG(SHx).

United States District Court, C.D. California.

June 22, 2004.

[1081] Daniel J. Cooper, General Counsel, Randall B. Lewis, Associate General Counsel, Perfect 10, Inc., Beverly Hills, CA, Jeffrey N. Mausner, Berman, Mausner & Resser, Los Angeles, CA, for Plaintiff Perfect 10, Inc.

John P.. Flynn, Tiffany & Bosco, P.A., Third Floor Camelback Esplanade II, [1082] Phoenix, AZ, Jay M. Spillane, Fox & Spillane LLP, Los Angeles, CA, for Defendants CCBill and CWIE.

Brandon Baum, Cooley Godward LLP, Palo Alto, CA, for Defendant Internet Billing Company.

Dennis T. Kearney, Helen Nau, Pitney, Hardin, Kipp & Szuch LLP, Park Avenue at Morris County, Morristown, NJ, Bruce Wessel, Irell & Manella, Los Angeles, CA, for Defendant Internet Key.

ORDER GRANTING, IN PART, AND DENYING, IN PART, DEFENDANTS' MOTIONS FOR SUMMARY JUDGMENT

BAIRD, District Judge.

I. INTRODUCTION

Defendants Internet Billing Co., LLC ("IBill"), Internet Key, Inc. ("Internet Key"), Cavecreek Wholesale Internet Exchange ("CWIE"), and CCBill, LLC ("CCBill") have filed the instant motions for partial summary judgment of Perfect 10, Inc.'s ("Perfect 10") copyright, RICO, and state law claims based on safe harbors provided by the Digital Millennium Copyright Act ("DMCA") and immunity provided by the Communications Decency Act ("CDA"). By this Order, the Court addresses the four motions for partial summary judgment.[1]

II. FACTUAL AND PROCEDURAL HISTORY

A. Factual History

The facts are undisputed unless otherwise noted.

1. Perfect 10

Perfect 10 is the publisher of the adult entertainment magazine Perfect 10 and the owner of the website perfect10.com. See II Zadeh Decl. at ¶ 2. Perfect 10 has created approximately 5,000 photographic images for display in its magazine and on its website. See id. at ¶ 17. Perfect 10 holds registered U.S. copyrights for these images. See id.; see also Compl. Exh. O (containing copies of the copyright registrations owned when the complaint was filed). In addition, Perfect 10 has several registered trademark/service marks. See II Zadeh Decl. at ¶ 18; see also Compl. Exh. P (containing copies of trademark registrations owned when the complaint was filed). Finally, Perfect 10 is the assignee of the rights of publicity of many models. See II Zadeh Decl. at ¶ 19-21.

2. IBill

IBill is a company that processes payments for online merchants. II Zadeh Decl. at ¶ 22. IBill has nearly 5,000 clients with over 70,000 websites. II Smith Decl. at ¶ 4. All material selected and posted by IBill's clients' websites is selected and posted by IBill's clients. Id., ¶ 7. IBill can suspend or terminate its relationship with websites if it becomes aware that the website is violating IBill's policies or state or federal law. Id., ¶ 8. When IBill suspends or terminates a client, the contents of the clients' website remains intact and unchanged. Id., ¶ 9 In addition, suspension or termination does not affect the ability of the website's existing customers (those who have already paid) to obtain access to the website. Id. Suspension or termination does, however, prevent the owner of [1083] the website from receiving new payments using IBill's payment processing services. Id.

3. Internet Key

Hank Freeman is the President of Internet Key. I Freeman Decl., ¶ 1; I Cooper Decl., Exh. 1 (Freeman Depo.), at 15:10-20.[2] Internet Key is an age verification system for adult content websites. I Freeman Decl., ¶ 2. Starting in 1997, Internet Key has provided adult verification services, including providing links, to third-party adult content websites. Id. Currently, Internet Key verifies age and provides a link to approximately 30,000 third-party adult content websites that participate in the SexKey system ("Affiliated Websites"). Id. The Affiliated Websites are not owned by Internet Key although some are owned by employees of WCD Enterprises, another company that Freeman owns. Id., ¶ 4; I Cooper Decl., Exh. 1 (Freeman Depo.), at 119:1-5. A user (consumer) cannot access an Affiliated Website without proving he or she is of legal age. I Freeman Decl., ¶ 5. Internet Key provides each Affiliated Website with a site ID and an HTML code to place on their site. Id. When a new user clicks onto an Affiliated Website, a link that tracks the site ID automatically directs the user to sexkey.com for age verification. Id. The user is directed to Internet Key's registration page, which contains Internet Key's User Agreement. Id., ¶ 6. The User Agreement sets forth terms and conditions that a user must certify and agree in order to subscribe to a SexKey membership. Id. Once the user agrees to all the terms of the User Agreement by checking on a box that the user agrees, the user is provided a user password to access all of the Affiliated Websites in the SexKey system. Id., ¶ 8. Internet Key does not store the content of the Affiliated Websites on its computer system. Id., ¶ 13. It only stores information related to the Affiliated Websites' URLs, site descriptions and webmaster information. Id.

Prior to January 22, 2004, the only website Internet Key owned was sexkey.com. Id., ¶ 12. On January 22, 2004, Internet Key started a new website called sksignature.com, which is part of the SexKey system. Id. Internet Key owns or leases all the content contained on sksignature.com. Id.[3]

Internet Key also acts as a search engine (similar to Yahoo or Google) for free adult content on the Internet. I Freeman Decl., ¶ 4. Sometimes, when an Affiliated Website is accessed through SexKey, the words "sexkey.com" appear in the URL. I Zadeh Decl., ¶ 65, Exh. 51. Internet Key did not adopt a DMCA policy until August 21, 2002. I Cooper Decl., ¶ 4, Exh. 2 at 27.

4. CWIE

Thomas Fisher is the Executive Vice-President of CWIE. III CWIE Fisher Decl., ¶ 1.[4] CWIE is a provider of web hosting and related Internet connectivity services. Id., ¶ 3. CWIE provides what is referenced within the industry as "ping, power, and pipe." Id. As a provider of Internet access, website hosting, and other [1084] Internet-related services, CWIE offers its clients, and their customers and users, the means to acquire and disseminate public, private, commercial, and non-commercial information. Id. "Ping, power, and pipe" refers respectively to ensuring the "box" or server is on, ensuring power is provided to the server, and connecting the client's server or website to the Internet backbone via a data center connection. Id.

CWIE's clients are the creators and/or owners of the content they seek to present to consumers via their website. Id., ¶ 4. CWIE is not in the business of producing, designing, supervising or editing the content that appears on CWIE's clients' websites. Id. CWIE adopted its repeat infringer policy in 1999. Id., ¶ 11. CWIE's termination policy states that:

Engaging in any activity that infringes or misappropriates the intellectual property rights of others is prohibited. This includes copyrights, trademarks, service marks, trade secrets, software piracy, and patents held by individuals, corporations, or other entities. Engaging in activity that violates privacy, publicity, and other personal rights of others is likewise prohibited. CWIE is required by law to remove or block access to client content upon receipt of a proper notice of copyright infringement or other violations of the law. It is also CWIE's policy to terminate the privileges of clients who commit repeat violations of copyright laws.

III CWIE Fisher Decl., ¶ 9, Exh. A, at 1-2.

5. CCBill

Thomas Fisher is the Executive Vice-President of CCBill. III CCBill Fisher Deck, ¶ 1. CCBill's clients are the creators and/or owners of the content they seek to present to consumers via the Internet. Id., ¶ 3. CCBill is not in the business of producing, designing, supervising or editing the content that appears on CCBill's clients' websites. Id. CCBill provides a fully automated Internet service that enables consumers to use credit cards or checks to pay for subscriptions or memberships to e-commerce venues created and offered by CCBill's clients. Id. CCBill does not own or operate any site for which a subscription or membership is required. Id. As part of its services to its clients, CCBill provides an automated on-line accounting mechanism that clients may use to verify statistical and financial activities processed for them through CCBill's online Internet automated transaction processing system. Id. Consumers who have joined a client's venue may cancel their subscription via an email or telephone call directed to CCBill. Id.

CCBill has a repeat infringer policy, adopted in 1999, which states:

As an ISP, CCBill follows the procedures prescribed by the Digital Millenium Copyright Act (DMCA) for notification, takedown, and counter-notification. If you believe that a CCBill client has something on a website that constitutes a [violation] of your copyrights, or if any of your other intellectual property rights [have been] violated, please provide the following information to CCBill's Registered [DMCA Agent].

1. Your electronic or physical signature.

2. A description of the copyrighted work and where the original work [is located].

3. A description of where the infringement is located.

4. Your address, telephone number, and email address.

5. A statement by you that you have a good faith belief that the use is not authorized by the copyright owner, agent, or the law.

6. A statement by you, that under penalty of perjury, that the [above] is [1085] accurate and that you are the copyright owner or authorized [to act] on the owner's behalf.

Please send all legal notices to ...

Id, ¶ 9, Exh. D.

B. Procedural History

Plaintiff Perfect 10 filed its Complaint against Defendants CCBill, IBill, Paycom Billing Services, Inc., IMA Enterprises, Inc., Clarence Coogan, U. Berger, Cybertech Communications, NV, Celebskank, Network Authentication Systems Corporation, CWIE, Netpass Systems, Inc., and Internet Key on September 30, 2002. The Complaint alleges the following claims against all of the Defendants:

Claim 1: federal copyright infringement;

Claim 2: federal trademark infringement;

Claim 3: federal trademark disparagement;

Claim 4: wrongful use of registered mark under California state law;

Claim 5: violation of right of publicity under California state law;

Claim 6: unfair competition under California Business & Professions Code §§ 17200 and under the Lanham Act § 43(a);

Claim 7: false and misleading advertising pursuant to California Business & Professions Code §§ 17500 and the common law;

Claim 8: RICO (investment of proceeds); and

Claim 9: RICO (participation in criminal enterprise).

See Compl.

On October 16, 2003, the Court ordered the bifurcation of discovery in this case. See October 16, 2003 Minute Order. The first phase of discovery was to relate solely to the Defendants' defenses to the claims under the CDA and the DMCA. Id. Phase I discovery was closed on January 16, 2003. See November 17, 2003 Minute Order, at 2.

The parties have filed evidentiary objections in connection with the motions for summary judgment. The Court will only address the objections to the evidence that is relevant to the Court's analysis.

III. LEGAL STANDARD

Rule 56 of the Federal Rules of Civil Procedure provides that a court shall grant a motion for summary judgment if "the pleadings, depositions, answers to interrogatories, and admissions on file, together with the affidavits, if any, show that there is no genuine issue as to any material fact and that the moving party is entitled to judgment as a matter of law." Fed.R.Civ.P. 56(c). Material facts are those that may affect the outcome of the case. Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 248, 106 S.Ct. 2505, 91 L.Ed.2d 202 (1986). A dispute as to a material fact is genuine if there is sufficient evidence for a reasonable jury to return a verdict for the nonmoving party. Id.

The party moving for summary judgment bears the initial burden of informing the district court of the basis of the summary judgment motion and of demonstrating the absence of a genuine issue of material fact for trial. Celotex Corp. v. Catrett, 477 U.S. 317, 323, 106 S.Ct. 2548, 91 L.Ed.2d 265 (1986); Katz v. Children's Hosp. of Orange County, 28 F.3d 1520, 1534 (9th Cir.1994). On an issue for which the nonmoving party has the burden of proof at trial, the moving party need only point out "that there is an absence of evidence to support the nonmoving party's case." Celotex, 477 U.S. at 325, 106 S.Ct. 2548.

Once this initial burden is satisfied, the non-moving party is required to "go beyond the pleadings and by her own affidavits, [1086] or by the depositions, answers to interrogatories, and admissions on file, designate `specific facts' showing that there is a genuine issue for trial." Celotex, 477 U.S. at 324, 106 S.Ct. 2548 (internal quotations omitted); see also Nilsson, Robbins, Dalgarn, Berliner, Carson & Wurst v. Louisiana Hydrolec, 854 F.2d 1538, 1544 (9th Cir.1988). Where the standard of proof at trial is preponderance of the evidence, the non-moving party's evidence must be such that a "fair-minded jury could return a verdict for the [non-moving party] on the evidence presented." Anderson, All U.S. at 252, 106 S.Ct. 2505.

The court views all facts and draws all inferences therefrom in the light most favorable to the nonmoving party. United States v. Diebold, Inc., 369 U.S. 654, 655, 82 S.Ct. 993, 8 L.Ed.2d 176(1962). The Court must accept the plaintiffs view of all material disputed facts. LaLonde v. County of Riverside, 204 F.3d 947, 954 (2000). If, however, the nonmoving party's evidence is "merely colorable" or "not significantly probative," summary judgment may be granted. Anderson, 477 U.S. at 249-50, 106 S.Ct. 2505.

IV. ANALYSIS

A. Digital Millennium Copyright Act

"The DMCA was enacted both to preserve copyright enforcement on the Internet and to provide immunity to service providers from copyright infringement liability" for "passive," "automatic" actions in which a service provider's system engages through a technological process initiated by another without the knowledge of the service provider. H.R. Conf. Rep. No. 105-796, at 72 (1998), reprinted in 1998 U.S.C.C.A.N. 649; H.R.Rep. No. 105-551(1), at 11 (1998)." ALS Scan. Inc. v. RemarQ Cmtys., Inc., 239 F.3d 619, 625 (4th Cir.2001). This immunity, however, is not presumptive, but granted only to "innocent" service providers who can prove they do not have actual or constructive knowledge of the infringement, as defined under any of the three prongs of 17 U.S.C. § 512(c)(1). Id. The DMCA's protection of an innocent service provider disappears at the moment the service provider loses its innocence, i.e., at the moment it becomes aware that a third party is using its system to infringe. Id. At that point, the Act shifts responsibility to the service provider to disable the infringing matter, preserving the strong incentives for service providers and copyright owners to cooperate to detect and deal with copyright infringements that take place in the digital network environment. Id. (citations omitted). In the spirit of achieving a balance between the responsibilities of the service provider and the copyright owner, the DMCA requires that a copyright owner put the service provider on notice in a detailed manner but allows notice by means that comport with the prescribed format only "substantially," rather than perfectly. Id.

The Digital Millenium Copyright Act ("DMCA") creates a "safe harbor" for internet service providers who satisfy the requirements of the statute—protecting them against suits for damages and most injunctive relief. See generally, 17 U.S.C. § 512. There are four separate safe harbors within § 512, each with its own separate requirements. See 17 U.S.C. § 512(a),(b),(c)(1),(d). However, a threshold requirement for any protection by the DMCA is satisfaction of the requirements in § 512(i). The section reads as follows:

The limitations on liability established by this section shall apply to a service provider only if the service provider(A) has adopted and reasonably implemented, and informs subscribers and account holders of the service provider's system or network of, a policy that provides for the termination in appropriate circumstances [1087] of subscribers and account holders of the service provider's system or network who are repeat infringers; and (B) accommodates and does not interfere with standard technical measures.

17 U.S.C. § 512(i)(1).[5] Unless this threshold requirement is met, further analysis of the specific safe harbors is not required.

The Ninth Circuit has held that § 512(i)(1)(A) has three separate requirements. See Ellison v. Robertson, 357 F.3d 1072, 1080 (9th Cir.2004). Service providers must: (1) adopt a policy that provides for the termination of service access for repeat copyright infringers in appropriate circumstances; (2) implement that policy in a reasonable manner; and (3) inform their clients of the policy. Id.

The courts have not defined what reasonable implementation of a repeat infringer policy entails. Since the purpose of the DMCA is to relieve internet service providers of the duty of patrolling the Internet for copyright infringements that are not immediately apparent or of which they have no actual knowledge, the DMCA requires that copyright owners inform internet service providers of infringements on the client websites of the internet service providers. See § 512(c)(1)(A) and § 512(c)(3). General or vague allegations of copyright infringements are not sufficient to place internet service providers on "notice" of potential copyright infringements. The DMCA provides requirements for proper notification of possible copyright infringements in § 512(c)(3)(A). See § 512(c)(3)(A).[6] The purpose behind the notice requirement under the DMCA is to provide the internet service provider with adequate information to find and examine the allegedly infringing material expeditiously. Hendrickson v. Amazon.Com. Inc., 298 F.Supp.2d 914, 917 (C.D.Cal.2003). "Under the DMCA, a notification from a copyright owner that fails to comply substantially with § 512(c)(3) 'shall not be considered ... in determining whether a service provider has actual knowledge or is aware of the facts or circumstances from which infringing activity is apparent.'" Hendrickson v. Amazon.Com. Inc., 298 F.Supp.2d 914, 917-18 (C.D.Cal.2003). In order for a notification to be "DMCA-compliant," it should substantially fulfill the requirements of [1088] § 512(c)(3)(A). ALS Scan, Inc. v. RemarQ Communities, Inc., 239 F.3d 619, 625 (4th Cir.2001).[7] Absolute compliance is not required. Id.

Therefore, an internet service provider who receives repeat notifications that substantially comply with the requirements of § 512(c)(3)(A) about one of its clients, but does not terminate its relationship with the client, has not reasonably implemented a repeat infringer policy.

1. I Bill's Motion for Summary Judgment on Perfect 10's Copyright Claim

IBill argues that Perfect 10's Claim 1 for copyright infringement is barred by § 512(a) of the DMCA. Perfect 10 opposes summary judgment because, among other reasons, it contends that IBill has not met the requirements for terminating repeat infringers as required by § 512(i).

a. Threshold Requirements Under § 512(i)

The crux of the dispute between Perfect 10 and IBill is whether the policy adopted by IBill provided for termination of repeat infringers in appropriate circumstances and whether that policy was reasonably implemented.[8]

i. Policy for Termination of Repeat Infringers

IBill argues that its policy terminated repeat infringers in appropriate circumstances. IBill states that its policy is that when it receives a notice of copyright infringement that substantially complies with the requirements of the DMCA, IBill suspends payment processing services to that client. See II De Vito Decl. at ¶ 26. If IBill determines that it has received previous complaints about that client or the website, IBill terminates the account permanently. See id. Perfect 10 argues that IBill's policy does not terminate repeat infringers in appropriate circumstances because it suspends services for particular websites without terminating the webmasters responsible for that material. Therefore, Perfect 10 argues that IBill's policy does not provide for the termination of service access for repeat copyright infringers. Perfect 10 also argues that IBill has not reasonably implemented its policy because repeat infringers known to IBill were not terminated.

The focus of § 512(i) is on infringing users rather than on content. See Perfect 10 v. Cybernet Ventures, Inc., 213 F.Supp 2d 1146, 1177 (C.D.Cal.2002); see also Costar Group, Inc. v. LoopNet, Inc., 164 F.Supp.2d 688, 704 (D.Md.2001). Therefore, an internet service provider that seeks to fall within the safe harbors provided by the DMCA, must adopt a policy that terminates the infringing user, not just the content. IBill has submitted several versions of its infringement policy, the most recent of which states:

[1089] IBill may, its discretion (sic), disable and/or terminate the accounts of any IBill client who is accused of infringing the rights of others. If you believe that your work has been copied in a way that constitutes copyright infringement, or your intellectual property rights have been otherwise violated, please provide IBill's Copyright Agent the following information:

1. an electronic or physical signature of the person authorized to act on behalf of the owner of the copyright;

2. a description of the copyrighted work, and a description of where the work is located;

3. your address, telephone number, and email address;

4. a statement by you that you have a good faith belief that the use of the work is not authorized by the copyright owner, agent, or the law;

5. a statement by you, that under penalty of perjury, that the above information is accurate and that you are the copyright owner or authorized to act on the owners's behalf.

Please send such notice to ...

II Devito Decl., Exh. B, at 40 (Copyright Policy, 12/9/03). The Court notes that this policy states that it will terminate or disable the accounts of IBill clients who are accused of infringing third-party copyrights. Therefore, there is no genuine issue of material fact that IBill has adopted a policy that terminates repeat infringers in appropriate circumstances.

ii. Reasonable Policy Implementation

Perfect 10 contends that IBill has not reasonably implemented its policy. IBill replies that its DMCA immunity cannot be defeated by individual instances of nonenforcement because Congress requires reasonable implementation of the policy rather than perfect implementation. IBill also argues that it had no legal obligation under § 512(i) unless the notices of infringement were substantially DMCA compliant. IBill is correct that Congress requires reasonable implementation of a repeat infringer policy rather than perfect implementation. See 17 U.S.C. § 512(i)(1)(A). During oral argument, Perfect 10 argued that there is a genuine issue of material fact that IBill does not reasonably implement its repeat infringer policy because IBill has failed to produce its DMCA-notice log. However, the DMCA does not require the internet service provider to keep a log of its notifications. IBill has submitted the actual DMCA-notifications it has received which are sufficient to demonstrate that IBill tracks its notifications. II DeVito Decl., Exhs. P-T.

Perfect 10 has submitted notifications that Perfect 10 or its counsel sent to IBill of infringements of Perfect 10's copyrights. II Zadeh Decl., ¶ 29, Exhs. 19-33. Exhibit 19 is an email dated August 24, 2001, sent from Perfect 10's counsel to IBill, which identifies 12 websites that are IBill clients which Perfect 10 states have infringements of Perfect 10's and third-party copyrights. II Zadeh Decl., Exh. 19 at 204. The email only identifies the websites that contain the allegedly infringing material, it does not identify the URLs of the images nor does it identify which of Perfect 10's images are being infringed. Under § 512(c)(3)(A)(ii) and (iii), DMCA-compliant notification must identify the copyrighted work claimed to have been infringed and the material that is claimed to be infringing with "information reasonably sufficient to permit the service provider to locate the material." This notification does not fulfill either of those requirements because it does not identify Perfect 10's images or give IBill sufficient information to locate the infringing material. These websites may contain more than one hundred images at different URLs; it is Perfect 10's responsibility, under the [1090] DMCA, to provide IBill with enough information to allow IBill to locate the infringing material. The Court finds that the August 21, 2001 email does not substantially comply with the requirements of the DMCA and therefore, does not constitute proper notification under § 512(c)(3)(A).

The next notification is an email from Norman Zadeh, the President of Perfect 10, dated August 28, 2001 which identifies a Perfect 10 copyrighted image that appeared on celebclub.com on August 19, 2001 by its URL, celebclub.com/parto/New/080301/Kovari-Kristina/nif.gif. II Zadeh Decl., Exh. 21 at 209. This email identifies one image by its URL in a manner that allows IBill to locate the infringing image. Although it does not comply with any of the other requirements of § 512(c)(3)(A), it does provide IBill with sufficient information to locate the allegedly infringing material and, as such, substantially fulfills the requirements of § 512(c)(3)(A).

Exhibits 20 and 22-33 all suffer from the same deficiencies as Exhibit 19. They contain emails from Norman Zadeh to IBill that make general allegations of copyright infringement and do not provide the exact location of the infringing images and do not identify the Perfect 10 images that are being infringed. II Zadeh Decl., Exh. 20, 22-33. IBill notes this problem in one of its emails to Norman Zadeh which states: "The point I am trying to make is that without an URL (www.* * *.com) I cannot attempt to figure out each URL." II Zadeh Decl, Exh. 29 at 220.[9]

Perfect 10 also argues that "[d]espite the fact that Perfect 10 complained to IBill about the website femalecelebrities.com on at least 7 separate occasions", a Concordance electronic search of IBILL's document production revealed only two documents containing the term "femalecelebrities.com." II Zadeh Deck, ¶ 89. However, Perfect 10 has not identified the DMCA-compliant notification that Perfect 10 sent to IBill notifying IBill of infringements on femalecelebrities.com. Therefore, the Court finds that this evidence is not probative of IBill's failure to reasonably implement its repeat infringer policy.

Therefore, Perfect 10 has only identified a single notification, the email dated August 28, 2001, that provides IBill with sufficient notification to locate an allegedly infringing image on the website celebclub.com. On August 27, 2001, IBill sent Perfect 10 an email stating that celebclub.com's IBill account was suspended. II DeVito Decl., Exh. T at 186. In IBill's interrogatory responses, IBill admitted that celebclub was a client of IBill as of September 30, 2003. II Zadeh Decl., Exh. 16 at 169. Perfect 10 has not presented the Court with any evidence to demonstrate that the infringing image remained on celebclub.com after IBill received the August 28, 2001 notification.

The Court finds that, as to Perfect 10's copyrights, Perfect 10 has not raised a genuine issue of material fact that IBill did not reasonably implement its repeat infringer policy or that IBill has not met the threshold requirements in § 512(i).[10]

[1091] b. Safe Harbor Under § 512(a)

IBill argues that it falls within the safe harbor in § 512(a) which provides:

a) Transitory digital network communications. A service provider shall not be liable for monetary relief, or, except as provided in subsection (j), for injunctive or other equitable relief, for infringement of copyright by reason of the provider's transmitting, routing, or providing connections for, material through a system or network controlled or operated by or for the service provider, or by reason of the intermediate and transient storage of that material in the course of such transmitting, routing, or providing connections, if—

(1) the transmission of the material was initiated by or at the direction of a person other than the service provider;

(2) the transmission, routing, provision of connections, or storage is carried out through an automatic technical process without selection of the material by the service provider;

(3) the service provider does not select the recipients of the material except as an automatic response to the request of another person;

(4) no copy of the material made by the service provider in the course of such intermediate or transient storage is maintained on the system or network in a manner ordinarily accessible to anyone other than anticipated recipients, and no such copy is maintained on the system or network in a manner ordinarily accessible to such anticipated recipients for a longer period than is reasonably necessary for the transmission, routing, or provision of connections; and

(5) the material is transmitted through the system or network without modification of its content.

17 U.S.C. § 512(a).

Perfect 10 argues that IBill does not fall within the safe harbor provided in § 512(a) because it does not transmit the infringing material at issue in this case. Perfect 10 argues that § 512(a) only provides protection for internet service providers that transmit the allegedly infringing material, not other material, such as credit card information. Perfect 10 relies on In re Aimster Copyright Litigation, 252 F.Supp.2d 634, 659-660 (N.D.Ill.2002), to support its argument.

Perfect 10 relies on the section of § 512(a) that refers to the transmission of the material; it has failed, however, to address the section of § 512(a) which refers to the provision of a connection to the material. The section provides that "an internet service provider shall not be liable... for infringement of copyright by reason of the provider's ... providing connections for material through a system or network controlled or operated by or for the service provider, or ..." § 512(a). IBill provides a connection to the material on its clients' websites through a system which it operates in order to provide its clients with billing services.

Perfect 10's reliance on In re Aimster Litigation is misplaced because that case [1092] dealt with the transmission of material, not the provision of a connection to the material. See In re Aimster Litigation, 252 F.Supp.2d at 659-660. The Court finds that there is no genuine issue of material fact that IBill has met the requirements of § 512(i) and § 512(a).

Therefore, the Court grants IBill's motion for summary judgment and finds that IBill is entitled to protection under the safe harbor provided in § 512(a).

2. Internet Key's Motion for Summary Judgment on Perfect 10's Copyright Claim

Internet Key contends that it is entitled to summary judgment on Perfect 10's Claim 1 for copyright infringement because the claim falls within the safe harbor provided by the DMCA under § 512(d). Perfect 10 counters that Internet Key does not fall within the safe harbors provided by the DMCA because Internet Key has not adopted and implemented a reasonable repeat infringer policy.

As a preliminary matter, the Court notes that Perfect 10 has submitted evidence of infringements on Internet Key's Affiliate Websites that were displayed on the Internet prior to August 21, 2002 when Internet Key implemented its DMCA policy. See, e.g., I Zadeh Decl., ¶ 43, Exh. 33. Internet Key has not submitted a DMCA policy that was provided to its clients prior to August 2002 as required under § 512(i). Therefore, Internet Key has not met the threshold requirements of § 512(i) for the period before August 2002 and Perfect 10 may maintain its claim for copyright infringement that occurred prior to August 21, 2002.

a. Direct Infringement

Perfect 10 argues that Internet Key is not entitled to protection under the DMCA because it is a direct copyright infringer and therefore, not merely an internet service provider. Perfect 10's basis for this argument is that since some of the employees of WCD Enterprises, which is also owned by Freeman, own some of the Affiliate Websites, Internet Key is liable for the infringements on those websites. Perfect 10 relies on H.A.S. Loan Serv., Inc. v. McColgan, 21 Cal.2d 518, 523, 133 P.2d 391 (1943), to support its argument that a corporate entity cannot avoid liability when it splits its business functions with another related corporation and that Internet Key should be considered the alter ego of WCD Enterprises. An alter ego theory of liability would require Perfect 10 to demonstrate, as its prima facie case (1) that there is such unity of interest and ownership that the separate personalities of [two entities] no longer exist and (2) that failure to disregard [their separate identities] would result in fraud or injustice." American Tel. & Telegraph Co. v. Compagnie Bruxelles Lambert, 94 F.3d 586, 591 (9th Cir.1996). The fact that some of the Affiliate Websites are owned by the employees of a separate company which is owned by the President of Internet Key does not raise a genuine issue of material fact that there is such unity of interest and ownership that the separate personalities of Internet Key and WCD Enterprises no longer exist. Furthermore, Perfect 10 has not presented evidence that WCD Enterprises owns the Affiliate Websites, but that certain employees of WCD Enterprises own the Affiliate Websites. Even if Perfect 10 had raised a genuine issue of material fact that WCD Enterprises was the alter ego of Internet Key, Perfect 10 has not provided evidence that there is a unity of interest between WCD Enterprises' employees and the company WCD Enterprises. Therefore, the Court finds this argument without merit.

Perfect 10 also notes that sometimes, when an Affiliated Website is accessed [1093] through SexKey, the words "sexkey.com" appear in the URL. I Zadeh Deck, ¶ 65, Exh. 51. However, Perfect 10 has not provided the Court with any precedent that this fact alone imparts direct infringer liability onto Internet Key without demonstrating that Internet Key or its employees actually engaged in the infringing conduct. Infringement occurs when a defendant violates one of the exclusive rights of the copyright holder. 17 U.S.C. § 501(a). A plaintiff can establish direct infringement by demonstrating that a defendant used the copies in any of the ways described under 17 U.S.C. § 106, which include: (1) reproduction of the copyrighted work, (2) preparation of derivative works based upon the copyrighted work, (3) distribution of copies of the copyrighted work to the public by sale or other transfer of ownership, or (4) display of the copyrighted work publicly. 17 U.S.C. § 106. In order to prevail, defendants must "actively engage in" and "directly cause" one of the activities recognized in the Copyright Act. See Perfect 10 v. Cybernet, 213 F.Supp.2d 1146, 1168 (C.D.Cal. 2002) (citing Religious Tech. Ctr. v. Netcom On-Line Communication Servs., Inc., 907 F.Supp. 1361 (N.D.Cal.1995); Sega Enters., Ltd. v. MAPHIA, 948 F.Supp. 923, 931 (N.D.Cal.1996); Playboy Enters., Inc. v. Russ Hardenburgh, Inc., 982 F.Supp. 503 (N.D.Ohio)). Without evidence that Internet Key actively engaged in or directly caused the alleged infringements, this argument is equally unavailing.[11]

b. Threshold Requirements Under § 512(i)

Perfect 10 contends that Internet Key does not satisfy the threshold requirements under § 512(i). To reiterate, § 512(i) requires service providers to: (1) adopt a policy that provides for the termination of service access for repeat copyright infringers in appropriate circumstances; (2) implement that policy in a reasonable manner; and (3) inform their clients of the policy. See Ellison v. Robertson, 357 F.3d 1072, 1080 (9th Cir.2004). Perfect 10 does not dispute that Internet Key informs the webmasters of its Affiliate Websites ("Affiliate Webmasters") of its policy. Therefore, the two remaining issues before the Court are whether Internet Key has adopted a policy that provides for the termination of repeat infringers in appropriate circumstances and whether Internet Key implements that policy in a reasonable manner.

i. Policy for Termination of Repeat Infringers

Internet Key has submitted its copyright infringement policy. Dykeman Deck, ¶ 14, Exh. A. Perfect 10 argues that the policy fails on its face because "it is entirely possible for a website owned by a given webmaster to receive copyright infringement complaints week after week and nonetheless to remain part of SexKey, provided that Internet Key does not receive complaints about ... three different websites owned by the same webmaster." II Opp. at 10:17-21. Perfect 10 bases its argument on the section of Internet Key's policy which refers to webmasters, which states:

Banned Webmaster

If a webmaster, identified by either the webmaster's name, vendor ID or common [1094] ownership entity, has had three (3) websites which have been denied participation in the SexKey program in accordance with this policy, that webmaster will be denied participation in its program of any webmaster or website in its discretion.

II Dykeman Decl., Exh. A at 11. However, the policy also states that for websites, if Internet Key receives DMCA-compliant notification, Internet Key will:

• Act expeditiously to remove links to, or disable access, to the allegedly infringing material

• Take reasonable steps to promptly notify the accused subscriber that the Company has removed or disabled access to the allegedly infringing material.

• Forward a copy of the written notification to the accused subscriber, and inform the accused subscriber of counter notification procedures.

. . . . .

Repeat Offenders

The participation of any website deemed to be a repeat offender will be terminated.

Banned Websites

Pending receipt of a Counter Notification, participation of the website subject to a Notification will be suspended. A website will be permanently prohibited from participating in the SexKey program upon receipt by the Company of a second Notification.

Id. The policy provides that Internet Key will disable access to an Affiliate Website after it receives a single notification of an infringement. It also provides that it will permanently ban a webmaster from Internet Key after it has received three notifications regarding websites of any particular webmaster. Therefore, Perfect 10's characterization of Internet Key's policy is incorrect.

Perfect 10 also argues that Internet Key has not adopted a reasonable termination policy because there is a discrepancy in the evidence regarding the identity of Internet Key's copyright agent. Internet Key's termination policy, which is located on its website, sexkey.com, states that Lawrence Walters is Internet Key's copyright agent. I Dykeman Decl., Exh. A at 8-9. During his deposition, Freeman stated that Internet Key's copyright agent is the company CSC in Delaware. I Cooper Decl., Exh. 1 at 121. Perfect 10 argues that Internet Key changed its copyright agent and did not inform its subscribers of the change. However, Perfect 10 has not submitted any evidence that the copyright agent has changed or that notifications sent to Walters were not responded to by Internet Key. Internet Key may have more than one copyright agent or the company CSC may have hired Walters to be the individual copyright agent. Furthermore, every notification submitted as evidence in this case was addressed to Freeman, not Walters or CSC. Therefore, Internet Key likely has more than one individual who responds to notifications of copyright infringement.

The Court finds, therefore, that Perfect 10 has failed to raise a genuine issue of material fact that Internet Key has not adopted a policy that terminates repeat infringers in appropriate circumstances.[12]

[1095] ii. Reasonable Policy Implementation

Perfect 10 contends that Internet Key received substantially-compliant DMCA notifications and that Internet Key did not disable access to the infringing websites.[13] The parties dispute whether Perfect 10 provided Internet Key with DMCA-compliant notification of infringements. Since Internet Key's DMCA policy was not adopted until August 21, 2002, the Court will only look at notifications that were received by Internet Key after August 21, 2002.

Perfect 10 states that in its October 17, 2002 document production to Internet Key, Perfect 10 provided Internet Key with thousands of pages of printouts from Sex-Key affiliated websites which infringed either Perfect 10's or celebrities' rights. I Zadeh Deck, ¶ 24, Exh. 14 (representative examples of the print-outs). Some of the print-outs contain the names of Perfect 10 models in the URLs. Id. On March 13, 2002, Internet Key received a list of names of Perfect 10 models. I Freeman Deck, ¶ 35, Exh. D, at 29-34. Internet Key states that the October 17, 2002 document production contained 22, 185 pages of documents. I Reply, at 7:3-11; see also I Zadeh Deck, ¶ 25, Exh. 15. Accompanying the production was a letter from Sean Morris of Arnold & Porter which states:

With this letter I am sending you several boxes of documents that contain examples of the voluminous infringements on websites affiliated with Internet Key, Inc. ("SexKey") and other defendants in this case. These documents should assist you in assessing the scope of the infringements at issue in the above-referenced lawsuit and the potential damages SexKey.

• The documents that accompany this letter represent examples of the infringements at issue in this case; these documents are not the only instances of wrongful conduct by the defendants.

• The documents that accompany this letter contain examples of both (i) infringements of Perfect 10 material; and (ii) infringements of third-party copyrights and rights of publicity. These documents were collected from so-called "celebrity" sites, which are easily locatable and are comprised of images that clearly infringe the copyrights and publicity rights of Perfect 10 and others.

• The infringements of Perfect 10 material are readily identifiable, especially in connection with the information contained in the complaint, and all come from celebrity sites.

• To further aid you in your assessment of the potential damages your company faces in this case, we have often included a full-sized printout of the image that constitutes infringement of Perfect 10's material ...

I Zadeh Deck, Exh. 15. Perfect 10 has also submitted evidence that despite its notification of these infringements, the websites that contained the images were still active in October 2003. I Zadeh Deck, ¶ 46, Exh. 35.[14] For example, in October 2002, Perfect 10 produced an image of Perfect 10 model Genevieve Maylam printed from the website cpics.adultmasters.net. I Zadeh Deck, ¶ 14, Exh. 14, at [1096] 40. In October 2003, the same image was still available on the same website. I Zadeh Decl., ¶ 46, Exh. 35, at 1041.

The issue before the Court, therefore, is whether the notice provided by Perfect 10 is substantially DMCA-compliant. If the notice is substantially DMCA-compliant, then Perfect 10 has raised a genuine issue of material fact that Internet Key has not reasonably implemented its termination policy.

First, Internet Key objects to this evidence because it argues that post-litigation notices cannot be considered for purposes of the DMCA. To support its argument, Internet Key relies on Hendrickson v. Ebay, Inc., 165 F.Supp.2d 1082, 1092 n. 12(C.D.Cal.2001). However, in that case, the Court found that a discovery response by the plaintiff in that case was not DMCA-compliant because it was not under oath, did not attest to a good faith belief of the alleged infringements, and did not attest to the accuracy of the allegations. Id. The Court did not state that the discovery response was insufficient because it was provided after the complaint was filed. Id. Therefore, Internet Key's reading of the case is incorrect.

Under § 512(c)(3)(A)(ii), DMCA-compliant notification requires that the accusing party identify the copyrighted work claimed to have been infringed, or, if multiple copyrighted works at a single online site are covered by a single notification, provide a representative list of such works at that site. The notification requirements also require that the notification contain a statement that the information in the notification is accurate, under penalty of perjury, that the complaining party is authorized to act on behalf of the owner of an exclusive right that is allegedly infringed. § 512(c)(3)(A)(vi). Perfect 10's letter states that the document production contains infringements by Internet Key and the other defendants in this case of Perfect 10's copyrights and the copyrights of third parties. However, the letter accompanying the document production does not identify which documents were found on Internet Key's Affiliate Websites. The letter also does not contain a statement that the information in the notification is accurate. The letter also does not state that the author has a good faith belief that the information in the letter is accurate nor is there a declaration under penalty of perjury. The letter does state that the enlarged images are Perfect 10's images and include the specific URLs of the images. Therefore the letter identifies which images are infringements of Perfect 10's copyrights; however, the letter does not identify Perfect 10's copyrights themselves, only the infringing images.[15] Under § 512(c)(3)(A)(ii) & (iii), the notification is required to identify both the.copyrighted image and the infringing image. The purpose behind the notice requirement under the DMCA is to provide the internet service provider with adequate information to find and examine the allegedly infringing material expeditiously. Hendrickson v. Amazon.Com, Inc., 298 F.Supp.2d 914, 917 (C.D.Cal.2003). Congress' intent was that both the copyright owner and the [internet service provider] cooperate with each other to detect and deal with copyright infringement that takes place on the Internet. Id. at 916-17.

The Court finds that Perfect 10's blanket statement that infringements of Perfect 10's copyrights are contained within 22,000 pages of documents without identification [1097] of Perfect 10's copyrights, without an identification of which documents were printed off of Internet Key's Affiliate Websites, and without a statement that the notification is accurate does not constitute notice that is substantially compliant with the requirements of § 512(c)(3)(A). Perfect 10 has not identified any other DMCA-compliant notices sent to Internet Key after Internet Key instituted its repeat infringer policy to trigger the implementation of Internet Key's policy. In the absence of evidence of DMCA-compliant notice, the Court finds that Perfect 10 has failed to raise a genuine issue of material fact that Internet Key failed to implement its termination policy in a reasonable manner. Therefore, there is no genuine issue of material fact that Internet Key has met the threshold requirements under § 512(i).

c. Safe Harbor Under §§ 512(d) and 512(a)[16]

Section 512(d) states:

(d) Information location tools. A service provider shall not be liable for monetary relief, or, except as provided in subsection (j), for injunctive or other equitable relief, for infringement of copyright by reason of the provider referring or linking users to an online location containing infringing material or infringing activity, by using information location tools, including a directory, index, reference, pointer, or hypertext link, if the service provider—

(1) (A) does not have actual knowledge that the material or activity is infringing;

(B) in the absence of such actual knowledge, is not aware of facts or circumstances from which infringing activity is apparent; or

(C) upon obtaining such knowledge or awareness, acts expeditiously to remove, or disable access to, the material;

(2) does not receive a financial benefit directly attributable to the infringing activity, in a case in which the service provider has the right and ability to control such activity; and

(3) upon notification of claimed infringement as described in subsection (c)(3), responds expeditiously to remove, or disable access to, the material that is claimed to be infringing or to be the subject of infringing activity, except that, for purposes of this paragraph, the information described in subsection (c)(3)(A)(iii) shall be identification of the reference or link, to material or activity claimed to be infringing, that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit the service provider to locate that reference or link.

17 U.S.C. § 512(d).

Perfect 10 contends that Internet Key does not fall within the safe harbor provided by § 512(d) because Internet Key (1) does not use an information location tool, (2) has actual knowledge of infringements, (2) is aware of facts or circumstances from which infringing activity is apparent.

Perfect 10 argues that Internet Key does not use an information location tool as defined in § 512(d) because Internet Key is not like Yahoo! or Google which provide links to millions of websites with whom it has no relationship. Perfect 10 reasons that because Internet Key merely links to a relatively small universe of websites with whom it has in place contractual relationships and established review procedures, it is not entitled to protection under [1098] § 512(d). Section 512(d) does not state that the safe harbor is limited to internet service providers that provide links to millions of websites. Nor does § 512(d) state that the use of an information location tool is limited to internet service providers that do not have contractual relationships with their affiliate websites. Therefore, these arguments are without merit.

Section 512(d) refers to service providers who refer or link users to an online location containing infringing material or infringing activity, by using information location tools, including a directory, index, reference, pointer, or hypertext link. § 512(d). Internet Key's sexkey.com website provides that function and is therefore covered by § 512(d).

Pursuant to § 512(d), the internet service provider must also (1) not be aware of facts or circumstances from which infringing activity is apparent and (2) not receive a financial benefit directly attributable to the infringing activity, in a case in which the service provider has the right and ability to control such activity. Perfect 10 argues that Internet Key fails both of these requirements. Perfect 10 argues that Internet Key should have known there were copyright infringements on its clients' websites because of the disclaimers on some of those websites. The disclaimers generally claim that the copyrighted images are in the public domain or that the webmaster is posting the images for newsworthy purposes. I Zadeh Decl., Exh. 22. These disclaimers are not sufficient to raise a red flag of copyright infringement. Therefore, Perfect 10 has not demonstrated that Internet Key was aware of facts or circumstances from which infringing was apparent.

The second requirement is that the internet service provider not receive a direct financial benefit directly attributable to the infringing activity when it has the right and ability to control such activity. A right and ability to control infringing activity, "as the concept is used in the DMCA, cannot simply mean the ability of a service provider to remove or block access to materials posted on its website or stored in its system." Costar Group, Inc. v. Loopnet, Inc., 164 F.Supp.2d 688, 704 (D.Md. 2001). Internet Key's right and ability to control infringing activity is limited to disconnecting the webmasters' access to Internet Key's service. That type of control is not sufficient, under the DMCA, to demonstrate a "right and ability to control" the infringing activity. As recognized in Perfect 10 v. Cybernet Ventures, Inc., 213 F.Supp.2d 1146, 1181 (C.D.Cal.2002), "closing the safe harbor based on the mere ability to exclude users from the system is inconsistent with the statutory scheme." Id. Since Internet Key does not have a right and ability to control the infringing activity, the Court need not address whether Internet Key receives a direct financial benefit from the infringing conduct.

Additionally, Internet Key serves another function. Namely, when a user goes to one of Internet Key's Affiliate Websites, the user is directed to the Internet Key sign-up page for age verification purposes. I Freeman Decl., ¶¶ 5-8. This function falls outside of the parameters of § 512(d) because Internet Key is not referring users to other websites through a directory, index, reference, pointer, or hypertext link. However, this function falls within the purview of § 512(a) which provides:

a) Transitory digital network communications. A service provider shall not be liable for monetary relief, or, except as provided in subsection (j), for injunctive or other equitable relief, for infringement of copyright by reason of the provider's transmitting, routing, or providing connections for, material through a [1099] system or network controlled or operated by or for the service provider, or by reason of the intermediate and transient storage of that material in the course of such transmitting, routing, or providing connections, if—

(1) the transmission of the material was initiated by or at the direction of a person other than the service provider;

(2) the transmission, routing, provision of connections, or storage is carried out through an automatic technical process without selection of the material by the service provider;

(3) the service provider does not select the recipients of the material except as an automatic response to the request of another person;

(4) no copy of the material made by the service provider in the course of such intermediate or transient storage is maintained on the system or network in a manner ordinarily accessible to anyone other than anticipated recipients, and no such copy is maintained on the system or network in a manner ordinarily accessible to such anticipated recipients for a longer period than is reasonably necessary for the transmission, routing, or provision of connections; and

(5) the material is transmitted through the system or network without modification of its content.

17 U.S.C. § 512(a). The section provides that "an internet service provider shall not be liable ... for infringement of copyright by reason of the provider's ... providing connections for material through a system or network controlled or operated by or for the service provider, or ..." § 512(a). Internet Key provides a connection to the material on its clients' websites through a system which it operates in order to provide its clients with adult verification services. Therefore, Internet Key's services fall within the purview of both §§ 512(a) and 512(d).

The Court finds that there is no genuine issue of material fact that Internet Key is entitled to the safe harbors pursuant to §§ 512(a) and 512(d). Based on the foregoing, Internet Key's motion for summary judgment for infringements after August 21, 2002 based on the safe harbors under § 512(d) and § 512(a) is granted. However, Internet Key's motion for summary judgment on Perfect 10's copyright infringement claim for infringements before August 21, 2002 is denied.

3. CWIE's and CCBill's Motions for Summary Judgment on Perfect 10's Copyright Claim

Since the parties address many of the issues regarding CWIE and CCBill together, the Court will address these Defendants together for issues where the evidence overlaps. CWIE and CCBill assert that they are entitled to summary judgment on Perfect 10's Claim 1 for copyright infringement because they fall within the safe harbors provided by the DMCA under § 512.

a. Threshold Requirements Under § 512(i)

Perfect 10 argues that CWIE and CCBill do not reasonably implement their repeat infringer policies under § 512(i).[17] Perfect 10 cites to CWIE and CCBill's DMCA notice spreadsheet and argues that many of the webmaster names are not included in the spreadsheet. Ill Fisher Deck, Exh. C. Perfect 10 contends that CWIE and CCBill do not track the actual [1100] webmasters of the websites for which they receive notifications. The Court has reviewed the spreadsheet and finds that a few of the webmaster names are missing from notifications that were either resolved by the copyright owner and the webmaster or were not DMCA-compliant. The Court finds that the fact that a few of the webmaster names are missing from the spreadsheet in instances where the notice was deficient or the issue was resolved is not sufficient to raise a genuine issue of material fact that CWIE and CCBill do not reasonably implement their repeat infringer policies.

Perfect 10 has submitted notifications of infringement of Perfect 10's copyrights that it sent to CCBill and CWIE which it claims are DMCA-compliant. The first is a letter from Perfect 10's counsel to Fisher dated August 10, 2001. Ill Zadeh Decl., Exh. 14. The letter identifies several websites which Perfect 10 claims contain infringements of Perfect 10's copyrights. Id. at 144. The letter only identifies the websites that contain the allegedly infringing material, it does not identify the URLs of the images nor does it identify which of Perfect 10's images are being infringed. Under § 512(c)(3)(A)(ii) and (iii), DMCA-compliant notification must identify the copyrighted work claimed to have been infringed and the material that is claimed to be infringing with "information reasonably sufficient to permit the service provider to locate the material." This notification does not fulfill either of those requirements because it does not identify Perfect 10's images or give CCBill and CWIE sufficient information to locate the infringing material. These websites may contain more than one hundred images at different URLs; it is Perfect 10's responsibility, under the DMCA, to provide these Defendants with enough information to allow them to locate the infringing material. The Court finds that the August 10, 2001 letter does not substantially comply with the requirements of the DMCA and therefore, does not constitute proper notification under § 512(c)(3)(A).[18]

The next notification is an email Norman Zadeh sent to Fisher on February 6, 2002 which identifies websites which contain images of celebrities but does not identify websites which contain Perfect 10's copyrighted images. Ill Zadeh Decl., Exh. 17. Therefore, this email does not comply.

The next notification is a letter from Perfect 10's counsel dated March 12, 2002 which suffers from the same deficiency as Exhibit 14 above. Ill Zadeh Decl., Exh. 18. It does not identify the allegedly infringing material with enough specificity to allow CCBill and CWIE to locate the information. Exhibit 20 (email dated March 28, 2002) also suffers from the same lack of specificity.

Perfect 10 also identifies Exhibit I to the Complaint as notification of violations of Perfect 10's copyrights. Exhibit I to the Complaint lists websites that Perfect 10 contends contain Perfect 10 infringements. See Compl., Exh. I. The Court finds that Exhibit I is not DMCA-compliant because it does not give the Defendants sufficient notification to allow them to locate the allegedly infringing material.[19] Perfect 10 has also submitted its RICO Case Statement which Perfect 10 produced to Defendent [1101] on December 19, 2002. Ill Zadeh Decl., Exh. 26 at 317-321. The RICO Case Statement does not identify the URLs of the allegedly infringing material or identify Perfect 10's copyrighted images. Id. Therefore, this notification does not substantially comply with the requirements of § 512(c)(3)(A).

Perfect 10 also identifies a July 14, 2003 email sent to Fisher which had attached to it an Excel spreadsheet which identifies websites and the names of Perfect 10 models who appear on those websites. Ill Zadeh Decl., Exh. 29. Perfect 10 argues that this spreadsheet contains the URLs of the infringing images, however, the Court is unable to locate a single URL that is the URL for the actual infringing image. Id. Most of the URLs provided refer to the "members only" area of the website, not the URL of the specific image within the "members only" area of the website. Id. Again, this is not the type of notification contemplated by § 512(c)(3)(A).[20]

Perfect 10 has also submitted several emails from Perfect 10 to CWIE regarding password hacking websites that provide passwords to Perfect 10's website, perfect10.com, hosted by CWIE. III Zadeh Deck, Exhs. 72, 75, 76, 77 & 78. Password hacking websites are free websites which post passwords to subscription websites. Perfect 10 argues that it provided DMCAcompliant notification regarding these websites and CWIE did not discontinue its hosting of these websites. However, Perfect 10 has not submitted any evidence that the use of the passwords on these websites actually resulted in the infringement of Perfect 10's copyrights. Perfect 10 has submitted a print-out of its server log and Zadeh's declaration which states that there were attempted accesses from crazypasses.com on September 18, 2002. Ill Zadeh Deck, ¶101, Exh. 88. However, attempted access to Perfect 10's website is not sufficient to demonstrate copyright infringement which requires that the images on Perfect 10's website were actually copied onto the user's computer when the user accessed the website. See 17 U.S.C. § 106. Therefore, Perfect 10's has not demonstrated that CWIE's hosting of these password hacking websites resulted in copyright infringement.

Perfect 10 has not provided the Court with any substantially compliant DMCA-notifications that were sent to CCBill and CWIE. Perfect 10 may not make an end-run around the requirements of the DMCA by providing the Defendants with notification that does not substantially comply with the requirements of § 512(c)(3)(A). The Court finds that Perfect 10 has not raised a genuine issue of material fact that CCBill and CWIE did not reasonably implement their repeat infringer policies.[21]

b. Safe Harbor Under § 512(a) and CCBill

CCBill argues that it falls within the safe harbor in § 512(a) which provides: [1102] a) Transitory digital network communications. A service provider shall not be liable for monetary relief, or, except as provided in subsection (j), for injunctive or other equitable relief, for infringement of copyright by reason of the provider's transmitting, routing, or providing connections for, material through a system or network controlled or operated by or for the service provider, or by reason of the intermediate and transient storage of that material in the course of such transmitting, routing, or providing connections, if—

(1) the transmission of the material was initiated by or at the direction of a person other than the service provider;

(2) the transmission, routing, provision of connections, or storage is carried out through an automatic technical process without selection of the material by the service provider;

(3) the service provider does not select the recipients of the material except as an automatic response to the request of another person;

(4) no copy of the material made by the service provider in the course of such intermediate or transient storage is maintained on the system or network in a manner ordinarily accessible to anyone other than anticipated recipients, and no such copy is maintained on the system or network in a manner ordinarily accessible to such anticipated recipients for a longer period than is reasonably necessary for the transmission, routing, or provision of connections; and

(5) the material is transmitted through the system or network without modification of its content.

17 U.S.C. § 512(a). Perfect 10 argues that CCBill does not fall within the safe harbor provided in § 512(a) because it does not transmit the infringing material at issue in this case. Perfect 10 argues that § 512(a) only provides protection for internet service providers that transmit the allegedly infringing material, not other material, such as credit card information. Perfect 10 relies on In re Aimster Copyright Litigation, 252 F.Supp.2d 634, 659-660 (N.D.Ill.2002), to support its argument.

Perfect 10 relies on the section of § 512(a) that refers to the transmission of the material; it has failed, however, to address the section of § 512(a) which refers to the provision of a connection to the material. The section provides that "an internet service provider shall not be liable... for infringement of copyright by reason of the provider's ... providing connections for material through a system or network controlled or operated by or for the service provider, or ..." § 512(a). CCBill provides a connection to the material on its clients' websites through a system which it operates in order to provide its clients with billing services. Perfect 10 argues that CCBill "blocks" access to these websites and does not provide a connection to the websites because it prevents consumers from accessing the websites if they have not first paid a fee to CCBill. CCBill does not block access to these websites; the webmasters of the websites block consumers from accessing the websites unless those consumers pay for access through CCBill. Therefore, the Court finds this argument without merit.

Perfect 10's reliance on In re Aimster Litigation is misplaced because that case dealt with the transmission of material, not the provision of a connection to the material. See In re Aimster Copyright Litigation, 252 F.Supp.2d 634, 659-660 (N.D.Ill. 2002). The Court finds that there is no genuine issue of material fact that CCBill is entitled to protection under the safe harbor provided by § 512(a).

Therefore, the Court grants CCBill's motion for summary judgment and finds [1103] that CCBill is protected by the safe harbor under § 512(a).

c. Safe Harbor Under § 512(c) and CWIE

CWIE argues that it is entitled to protection under the safe harbor provided in § 512(c)(1). Sections 512(c)(1) states:

(1) In general. A service provider shall not be liable for monetary relief, or, except as provided in subsection (j), for injunctive or other equitable relief, for infringement of copyright by reason of the storage at the direction of a user of material that resides on a system or network controlled or operated by or for the service provider, if the service provider—

(A) (i) does not have actual knowledge that the material or an activity using the material on the system or network is infringing;

(ii) in the absence of such actual knowledge, is not aware of facts or circumstances from which infringing activity is apparent; or

(iii) upon obtaining such knowledge or awareness, acts expeditiously to remove, or disable access to, the material;

(B) does not receive a financial benefit directly attributable to the infringing activity, in a case in which the service provider has the right and ability to control such activity; and

(C) upon notification of claimed infringement as described in paragraph (3), responds expeditiously to remove, or disable access to, the material that is claimed to be infringing or to be the subject of infringing activity.

17 U.S.C. § 512(c).[22] Perfect 10 argues that CWIE does not fulfill the requirements of § 512(c)(1) because (1) it has actual knowledge of Perfect 10's infringements on its clients' websites; (2) is aware of facts or circumstances from which infringing activity is apparent; (3) it has failed to expeditiously remove or disable access to infringing material of which it had knowledge; and (4) it receives a financial benefit directly attributable to the infringing activity and has the right and ability to control such activity.

i. Knowledge

Perfect 10 argues that CWIE cannot assert the safe harbor under § 512(c)(1) because it had knowledge of copyright infringements on its clients' websites. Perfect 10 relies on the notifications Perfect 10 sent to CWIE to support its argument. However, the Court has already found that those notifications did not comply with the requirements of § 512(c)(3)(A). Therefore, Perfect 10 cannot argue that CWIE had knowledge of infringements based on these notices. Hendrickson v. Ebay, 165 F.Supp.2d 1082, 1093 (C.D.Cal.2001) ("the court does not consider [those] defective notices when evaluating the actual or constructive knowledge prong of the safe harbor test.").

Perfect 10 also argues that CWIE was aware of facts or circumstances from which infringing activity was apparent. In including § 512(c)(1)(A)(ii), Congress contemplated obvious "pirate sites" where "sound recordings, software, movies, or books were available for unauthorized downloading, public performance"-in other words, "red flag" websites from which infringements would be apparent based on a cursory review of the website. H.R. Rep. 105-551(11) at 57. Congress described such websites as obviously infringing because they typically use words such as "pirate" or "bootleg" or slang terms in [1104] their URL, and header information to make their illegal purpose obvious, in the first place, to the pirate directories as well as other Internet users. Id. at 58. "Because the infringing nature of such sites would be apparent from even a brief and casual viewing, safe harbor status for a provider that views such a site and then establishes a link to it would not be appropriate." Id.

Perfect 10 argues that CWIE hosted websites that obviously contained images of celebrities to which the webmasters did not own the copyrights. Ill Zadeh Decl., ¶ 76, Exh. 61. Perfect 10 has submitted print-outs from the websites that advertise images of celebrities. See id. The websites advertise images of celebrities; however, the Court does not find that the websites contain obvious infringements because the websites do not advertise themselves as pirate websites. See id. Furthermore, the Court finds that Perfect 10's argument that most celebrity websites contain stolen material and therefore CWIE should have known there were infringements on these websites without merit. As noted by Congress, "a directory provider would not be similarly aware because it saw one or more well known photographs of a celebrity at a site devoted to that person. The provider could not be expected, during the course of its brief cataloguing visit, to determine whether the photograph was still protected by copyright or was in the public domain; if the photograph was still protected by copyright, whether the use was licensed; and if the use was not licensed, whether it was permitted under the fair use doctrine." The Court finds that the advertisement of celebrity photos is not sufficient to raise a "red flag" that these websites were obviously pirate websites with infringing content.[23] Based on the foregoing, the Court finds that Perfect 10 has not raised a genuine issue of material fact that CWIE had actual or constructive knowledge of infringements on its clients' websites. The Court also finds that there is no genuine issue of material fact that CWIE failed to expeditiously remove or disable access to infringing material of which it had knowledge.

ii. Financial Benefit and Right and Ability to Control

Perfect 10 argues that CWIE cannot assert safe harbor protection because it receives a direct financial benefit from the infringing activity on its clients' websites and has the right and ability to control the infringing activity on its clients' websites. 17 U.S.C. § 512(c)(B). A right and ability to control infringing activity, "as the concept is used in the DMCA, cannot simply mean the ability of a service provider to remove or block access to materials posted on its website or stored in its system". Costar Group, Inc. v. Loopnet, Inc., 164 F.Supp.2d 688, 704 (D.Md.2001). CWIE's right and ability to control infringing activity is limited to disconnecting the webmasters' access to CWIE's service. That type of control is not sufficient, under the DMCA, to demonstrate a "right and ability to control" the infringing activity. As recognized in Perfect 10 v. Cybernet Ventures, Inc., 213 F.Supp.2d 1146, 1181 (C.D.Cal. 2002), "closing the safe harbor based on the mere ability to exclude users from the system is inconsistent with the statutory scheme." Id. Perfect 10 argues that the fact that CWIE reviews its websites for [1105] illegal material, such as child pornography and obscenity, takes CWIE out of the safe harbor provision because CWIE has the right and ability to do more than merely exclude users from its system. In Cybernet, the Court found that the fact that the defendant "prescreens sites, gives them extensive advice, [and] prohibits the proliferation of identical sites" was sufficient additional control to fall outside of the safe harbor. However, the Court did not find that merely prescreening sites was enough. In this case, the Court finds that merely because CWIE reviews its sites to look for blatantly illegal and criminal conduct is not sufficient to close the safe harbor to CWIE. Such a reading of the statute would not be in line with the purpose of the DMCA to encourage internet service providers to work with copyright owners to locate and stop infringing conduct.

Since the Court finds that CWIE does not have a right and ability to control the infringing activity on its clients' websites, it need not reach the issue of whether CWIE receives a direct financial benefit from the allegedly infringing conduct.

Based on the foregoing, the Court finds that Perfect 10 has not raised a genuine issue of material fact that CWIE does not fall within the safe harbor under § 512(c). Therefore, the Court grants CWIE's motion for summary judgment and finds that CWIE is entitled to the protection provided in § 512(c).

4. Perfect 10's RICO Claims

Defendants argue that since they fall within the safe harbors provided by § 512 which limit liability for copyright infringement, their liability for Perfect 10's RICO violations should similarly be limited.[24] Perfect 10 argues that the Defendants cannot assert the safe harbors under § 512 against its RICO claims because its RICO claims are predicated on (1) infringements of Perfect 10's copyrights and (2) infringements of third-party copyrights. The Defendants do not dispute that Perfect 10 has standing to maintain its RICO claims based on infringements of Perfect 10's copyrights. However, since the Court has already found that Defendants IBill, CCBill, CWIE, and Internet Key[25] are entitled to safe harbor protections under § 512 against Perfect 10's copyright claims, those safe harbors also provide these Defendants with protection against Perfect 10's RICO claims based on the infringements of Perfect 10's copyrights. The issue before the Court, therefore, is whether Perfect 10 has standing to allege RICO claims based on predicate acts of infringements of third-party copyrights.

The Ninth Circuit addressed the issue of statutory standing in Mendoza v. Zirkle Fruit Co., 301 F.3d 1163, 1168-69 (9th Cir.2002). The Ninth Circuit first examined the RICO statute which states that "any person injured in his business or property by reason of a violation of section 1962 of this chapter may sue therefor in any appropriate United States district court for civil damages." Id. at 1168. The Ninth Circuit identified the key issue in its analysis as determining whether the injury suffered by the plaintiffs "was by reason of the defendants' conduct. Id. The Ninth Circuit referred to several cases, decided by the U.S. Supreme Court in the context of antitrust and RICO, which hold that "potential plaintiffs who have suffered a `passed-on' injury-that is, injury derived [1106] from a third party's direct injury-lack statutory standing." Id. In the Ninth Circuit, there are three factors that courts consider in determining whether an injury is too remote to allow the plaintiff statutory standing:

(1) whether there are more direct victims of the alleged wrongful conduct who can be counted on to vindicate the law as private attorneys general; (2) whether it will be difficult to ascertain the amount of the plaintiffs damages attributable to defendant's wrongful conduct; and (3) whether the courts will have to adopt complicated rules apportioning damages to obviate the risk of multiple recoveries.

Id. at 1169. Perfect 10 is asserting that it has suffered an injury based on the Defendants' alleged infringements of third-party copyrights. Under the first factor, it is clear that the owners of the copyrights themselves are the more direct victims of the alleged wrongful conduct. Furthermore, Perfect 10 has not presented any evidence that those direct victims cannot assert their own rights on their own behalf. Under the second factor, the Court finds that it would be difficult to ascertain the amount of damages to Perfect 10 based on the Defendants' alleged infringements of third parties' copyrights. Perfect 10's injury is stated as a competitive injuryhowever, proving that violations of another party's copyrights have caused a competitive injury is too speculative to allow for the ascertainment of a damages amount. And finally, under the third consideration, it is also clear that the copyright holders themselves are entitled to damages if they demonstrate that the Defendants have violated their copyrights. Therefore, the Court would have to apportion damages as to prevent double recovery by the copyright owners and Perfect 10.

During oral argument, Perfect 10 argued that the Second Circuit's opinion in Commercial Cleaning Services, LLC v. Colin Service Systems, Inc., 271 F.3d 374 (2d Cir.2001), supports its argument that it may assert the violations of third parties' copyrights as the predicate acts of its RICO claim. In Commercial Cleaning, the Second Circuit found that the competitor of a cleaning agency that was hiring illegal immigrants to underbid the competitor had standing to bring a RICO claim based on its competitive injury. Id. at 385. However, the Second Circuit also found that there were not more direct victims of the illegal activity who had standing to sue. "There is no class of potential plaintiffs who have been more directly injured by the alleged RICO conspiracy than the defendant's business competitors ..." Id. In the case before this Court, the thirdparty copyright owners are the direct victims of the alleged infringement and may bring suit on their own behalf. Therefore, this case is distinguishable from the case at bar and does not support Perfect 10's argument that it has standing to assert the violations of third-parties' copyrights.

The Court finds that in consideration of these factors, Perfect 10 has not demonstrated that it has statutory standing to assert the violations of third parties' copyrights as the predicate acts of its RICO claim.

Therefore, IBill, CCBill, CWIE and Internet Key (limited to post-August 21, 2002 infringements) are entitled to the safe harbor provisions of § 512 against Perfect 10's RICO claims.

B. Communications Decency Act

The CDA provides immunity to providers and users of interactive computer services. It states that "[n]o provider or user of interactive computer service shall be treated as a publisher or speaker of any information provided by another content provider." 47 U.S.C. § 230(c)(1). In addition, the CDA states that "[n]o cause of [1107] action may be brought and no liability may be imposed under any State or local law that is inconsistent with this section." 47 U.S.C. § 230(e)(3). Congress placed two limitations on the grant of this broad immunity. The first is § 230(e)(2) which states that the CDA shall not be construed to limit or expand any law pertaining to intellectual property. 47 U.S.C. § 230(e)(2). The second is that immunity is not available for violations of federal criminal statutes. 47 U.S.C. § 230(e)(1).

Defendants assert that they are entitled to summary judgment on Perfect 10's state law claims because they are immune from prosecution for these claims under the CDA.

All of the Defendants seek summary judgment on the bases that they are immune from Perfect 10's Fifth Cause of Action for violation of rights of publicity, Sixth Cause of Action for unfair competition under the California Business & Professions Code §§ 17200, and Seventh Cause of Action for false and misleading advertising pursuant to California Business & Professions Code § 17500 and California common law.[26] Defendants IBill, CWIE, and CCBill also assert that they are immune from prosecution for Perfect 10's Fourth Cause of Action for wrongful use of a registered trademark under California law.

Perfect 10 opposes summary judgment on the following grounds: 1) the CDA does not apply to intellectual property claims, 2) the Defendants' knowledge of infringements negates the CDA's protection, 3) the CDA does not protect the Defendants' alleged roles as distributors, and 4) the Defendants' roles in the promotion of obscenity and child pornography bar them from taking advantage of the CDA. Perfect 10 does not argue that the Defendants do not fulfill any of the other requirements of the CDA; for example, there is no genuine issue of material fact that all of the Defendants are providers and users of interactive computer services. Therefore, the Court does not address these additional requirements.

Since these arguments apply equally to all of the Defendants because they are legal arguments regarding the scope of the CDA and are not fact dependent, the Court addresses the Defendants collectively.

1. Intellectual Property

The CDA does not "limit or expand any law pertaining to intellectual property." 47 U.S.C. § 230(e)(2). Perfect 10 asserts that all four of its state law claims are based on intellectual property law and thus the CDA does not provide immunity for them. The Defendants argue that these claims are not intellectual property claims but state law tort claims. The Court will address each claim in turn.

a. Wrongful Use of a Mark

Perfect 10's Fourth Cause of Action alleges wrongful use of a registered mark in violation of Cal. Bus. & Prof.Code § 14335. It is generally understood that trademarks are intellectual property. See, e.g., Allison v. Vintage Sports Plaques, 136 F.3d 1443, 1448 (11th Cir.1998) (holding that the three principal forms of intellectual property are copyright, patent, and trademark); Shakespeare Co. v. Silstar Corp. of Am., Inc., 9 F.3d 1091, 1103-04 (4th Cir.1993) (listing the areas of intellectual property as trademark, copyright, and patents); White v. Samsung Elecs. Am., [1108] Inc., 989 F.2d 1512, 1516 (9th Cir.1993) (discussing the different balances of public interest in patents, copyright, and trademark). Several cases have held that immunity under the CDA does not apply to federal trademark claims. See Gucci Am., Inc. v. Hall & Assocs., 135 F.Supp.2d 409, 413 (S.D.N.Y.2001) (holding that to immunize defendant from trademark claims would limit laws pertaining to intellectual property); Ford Motor Co. v. GreatDomains. com, Inc., No. 00-CV-71544-DT, 2001 WL 1176319, at *1 (E.D.Mich. Sept.25, 2001) (holding that if defendant violated federal trademark laws the CDA would not provide immunity). Consequently, California's wrongful use of registered mark law also pertains to intellectual property because the law provides the same type of relief as the federal trademark laws under the Lanham Act, namely, protection for trademarks. Since the CDA does not extend immunity for Perfect 10's Claim 4 for wrongful use of a registered mark because such immunity would limit laws pertaining to intellectual property, Defendants IBill's, CCBill's, and CWIE's motions for summary judgment on this claim are denied.

b. Unfair Competition under California Business & Professions Code § 17200

Perfect 10 also points out that its Claim 6 for unfair competition arises from Defendants' trademark infringement, a violation of law pertaining to intellectual property. As discussed above, the CDA does not limit any law pertaining to intellectual property. See 47 U.S.C. § 230(e)(2). The issue here is whether the UCL based on alleged infringement of trademarks is a "law pertaining to intellectual property." The unfair competition law (the "UCL") itself makes no mention of intellectual property. See Cal. Bus. & Prof.Code § 17200 ("As used in this chapter, unfair competition shall mean and include any unlawful, unfair or fraudulent business act or practice and unfair, deceptive, untrue or misleading advertising and any act prohibited by Chapter 1 ... of the Business and Professions Code"). While intellectual property law generally seeks to encourage creativity and invention, the purpose of the UCL is to preserve fair business competition. See Cel-Tech Communications, Inc. v. Los Angeles Cellular Tel. Co., 20 Cal.4th 163, 180, 83 Cal. Rptr.2d 548, 560-61, 973 P.2d 527 (1999).

Infringing on a trademark is an unlawful business practice which may establish a violation of the UCL. See Century 21 Real Estate Corp. v. Sandlin, 846 F.2d 1175, 1178 (9th Cir.1988) (holding that likelihood of confusion was the crucial issue for both trademark infringement and unfair competition). Perfect 10 argues that this makes the unfair competition statute a law pertaining to intellectual property. However, a violation of the UCL includes any business practice which may be unlawful, unfair, or fraudulent. People v. McKale, 25 Cal.3d 626, 631-32, 159 Cal.Rptr. 811, 813-14, 602 P.2d 731 (1979); Wilkinson v. Times Mirror Corp., 215 Cal.App.3d 1034, 1052, 264 Cal.Rptr. 194, 206 (Cal.Ct.App. 1989). Accordingly, unfair competition encompasses anything that can properly called a business practice which at the same time is forbidden by law. Wilkinson, 215 Cal.App.3d at 1052, 264 Cal.Rptr. at 206. The fact that violations of intellectual property laws may create the underlying unfair or unlawful act for the UCL does not transform the statute into a law pertaining to intellectual property. Therefore, the immunity provided by the CDA does apply to Perfect 10's Claim 6 for unfair competition under the UCL.

c. Right of Publicity

The parties also dispute whether Perfect 10's Claim 5 for violations of the right of publicity pursuant to California [1109] Civil Code section 3344 and common law rights of publicity bring § 230(e)(2) into play. The California Supreme Court has held that the right of publicity is a form of intellectual property. See Comedy III Productions. Inc. v. Gary Saderup, Inc., 25 Cal.4th 387, 399, 106 Cal.Rptr.2d 126, 135, 21 P.3d 797 (2001). This conclusion is buttressed by other courts and commentators. See, e.g., ETW Corp. v. Jireh Pub., Inc., 332 F.3d 915, 928 (6th Cir.2003) ("The right of publicity is an intellectual property right of recent origin which has been defined as the inherent right of every human being to control the commercial use of his or her identity."); 4 J. Thomas McCarthy, McCarthy on Trademarks and Unfair Competition, § 28.1 (4th ed. 2003) ("The right of publicity is property, and is properly categorized as a form of intellectual property."). In Carafano v. Metrosplash. Com, Inc., 339 F.3d 1119, 1125 (9th Cir.2003), the Ninth Circuit dismissed a right of publicity claim based on immunity granted under § 230(c)(1) of the CDA without any discussion of § 230(e)(2). However, since neither the Ninth Circuit nor the trial court, 207 F.Supp.2d 1055 (C.D.Cal.2002), performed any analysis as to whether the exclusion in § 230(e)(2) applied, it is unclear whether this issue was properly before the Ninth Circuit in that case. Since the weight of authority supports a finding that the right of publicity is an intellectual property right, the Court finds that claims under California's right of publicity statute and the common law are excluded from immunity under the CDA.

Therefore, the Court denies the Defendants' motions for summary judgment on Perfect 10's Claim 5 for violations of the right of publicity.

d. False Advertising Pursuant to California Business & Professions Code §§ 17500 and the Common Law

Finally, Perfect 10 contends that Claim 7 for false advertising pursuant to California Business & Professions Code § 17500 and California common law is an intellectual property claim and, as such, is excluded under § 230(e)(2) of the CDA. Perfect 10 argues that since it is alleging that the Defendants' affiliate webmasters have engaged in false advertising by misrepresenting the nature and source of the content on their websites and that such conduct constitutes violations of Perfect 10's intellectual property rights, the false advertising claims are also excluded from the immunities provided by § 230(e)(2) of the CDA. Perfect 10 does not cite to any authority to support its argument. Neither § 17500 nor California common law false advertising refer to intellectual property rights. See Cal. Bus. & Prof.Code § 17500;[27]Chronicle Pub. Co. v. Chronicle [1110] Publications, Inc., 733 F.Supp. 1371, 1380-81 (N.D.Cal.1989) (claim under § 17500 and California common law false advertising require analysis of the same factors). Since false advertising under § 17500 and California common law does not pertain to intellectual property rights, the Court finds that the immunity provided under the CDA for Perfect 10's false advertising claim is not excluded under § 230(e)(2).

2. Knowledge

Perfect 10 argues that the CDA does not apply to its claims against the Defendants because the Defendants knew or should have known of the infringements on their affiliate websites. Accordingly, Perfect 10 argues that under Batzel v. Smith, 333 F.3d 1018 (9th Cir.2003), the Defendants are not entitled to CDA immunity. Batzel, however, creates no such knowledge exception. Batzel stands for the unrelated proposition that internet service providers are not provided immunity if they know or should have known that the content was not meant for publication.

In Batzel, one defendant, Cremers, published listserve newsletters about museum security and stolen art based partly on emails from third parties. See id. at 1021. Defendant Smith sent Cremers an e-mail alleging that Batzel was in possession of stolen art. See id. Cremers published Smith's e-mail on his listserve newsletter. See id. at 1022. In considering whether Cremers was protected by the CDA, the Court looked at whether Smith had "provided" Cremers with the e-mail as required by section 230(c)(1). "If the defamatory information is not '-provided by another information content provider,' then § 230(c) does not confer immunity on the publisher of the information." Id. at 1032 (emphasis in original). The Court found that it was not the intent of Congress to create immunity for the intentional posting of material never meant to be put on the Internet. See id. at 1033. It was in this context that the Court stated that immunity only applies when the "third person or entity that created or developed the information in question furnished it to the provider or user under circumstances in which a reasonable person in the position of the service provider or user would conclude that the information was provided for publication on the Internet or other `interactive computer service.'" Id. at 1034. In other words, in Batzel, the focus on the applicability of immunity under § 230(c)(1) is on the service provider's or user's reasonable perception that the information was provided for publication on an interactive computer service. See id. at 1032-34.

In this case, it is clear that any content on the Defendants' affiliate websites was provided for publication on the Internet. Perfect 10 contends that the focus should be on whether Perfect 10 provided the material for publication by the affiliate webmasters. Based on this argument, an interactive computer service would be required to determine whether the information content provider intended the content to be published in a particular forum. This was not the focus of the Ninth Circuit in Batzel. Rather the Court withdrew protection only for those internet service providers who would publish on the Internet private communications the provider knew or had reason to know were never intended to be published at all. All of the images owned by Perfect 10 were intended [1111] to be published and they are indeed published on Perfect 10's own website. See, e.g., I Zadeh Decl. at ¶ 17. None of the evidence provided by Perfect 10 creates a genuine issue of material fact as to whether the images on the Defendants' affiliate websites were intended to be private and unpublished. Therefore Batzel is inapposite and does not preclude the application of CDA immunities to Perfect 10's Claim 6 for unfair competition under the UCL and Claim 7 for false advertising.

3. Distributor

Perfect 10 also contends that the CDA's immunity cannot protect the Defendants because the CDA does not cover distributors. Every published case that has considered the issue has held that the CDA immunizes distributor liability as well as publisher liability. See, e.g., Zeran v. America Online, Inc., 129 F.3d 327, 331-32 (4th Cir.1997); Ben Ezra, Weinstein & Co. v. America Online, Inc., 206 F.3d 980, 986 (10th Cir.2000).[28] Therefore, even if the Defendants are considered distributors rather than publishers, the CDA immunities would still apply to Perfect 10's Claim 6 for unfair competition under the UCL and Claim 7 for false advertising.

4. Legislative Purpose

Perfect 10's final contention is that the legislative purpose of the CDA is to protect minors from harmful material on the Internet and the Defendants aid in the distribution of offensive and obscene content and should therefore not be able to shield themselves from liability based on the CDA. However, the immunity conferred by the CDA does not depend on the content of the information provided. Furthermore, the portion of the CDA that attempted to regulate indecency on the Internet based on content was deemed unconstitutional. See Reno v. American Civil Liberties Union, 521 U.S. 844, 885, 117 S.Ct. 2329, 138 L.Ed.2d 874 (1997). Therefore, this argument is without merit.

Based on the foregoing, the Court finds that Perfect 10 has not raised a genuine issue of material fact that Perfect 10's claims against the Defendants for 1) unfair competition under the UCL and 2) false advertising pursuant to California Business & Professions Code §§ 17200 and the common law are not barred by the CDA. Therefore, the Court GRANTS the Defendants summary judgment on Claim 6 for unfair competition under the UCL and Claim 7 for false and misleading advertising.[29]

V. CONCLUSION

Based on the foregoing, the Court hereby ORDERS as follows:

A. Defendant IBill's Motion for Summary Judgment

Defendant IBill's motion for summary judgment is GRANTED, in part, and DNIED, in part. The Court:

1) GRANTS IBill's motion for summary judgment and finds that IBill is entitled to the safe harbor provision under § 512(a) on Claim 1 for copyright infringement and Claims 8 and 9 for RICO violations;

[1112] 2) DENIES IBill's motion for summary judgment on Claim Four for wrongful use of a registered mark;

3) DENIES IBill's motion for summary judgment on Claim Five for violation of rights of publicity;

4) GRANTS IBill's motion for summary judgment on Claim Six for unfair competition under the UCL; and

5) GRANTS IBill's motion for summary judgment on Claim Seven for false and misleading advertising.

B. Defendant Internet Key's Motion for Summary Judgment

Defendant Internet Key's Motion for summary judgment is GRANTED, in part, and DENIED, in part. The Court:

1) GRANTS Internet Key's motion for summary judgment and finds that Internet Key is entitled to the safe harbor provision under §§ 512(a) and 512(d) on Claim 1 for copyright infringement and Claims 8 and 9 for RICO violations for infringements after August 21, 2002;

2) DENIES Internet Key's motion for summary judgment and finds that Internet Key is not entitled to the safe harbor provisions under §§ 512(a) and 512(d) on Claim 1 for copyright infringement and Claims 8 and 9 for RICO violations for infringements before August 21, 2002;

2) DENIES Internet Key's motion for summary judgment on Claim Five for violation of rights of publicity;

3) GRANTS Internet Key's motion for summary judgment on Claim Six for unfair competition under the UCL; and

4) GRANTS Internet Key's motion for summary judgment on Claim Seven for false and misleading advertising.

C. Defendant CWIE's Motion for Summary Judgment

Defendant CWIE's motion for summary judgment is GRANTED, in part, and DNIED, in part. The Court:

1) GRANTS CWIE's motion for summary judgment and finds that CWIE is entitled to the safe harbor provision under § 512(c) on Claim 1 for copyright infringement and Claims 8 and 9 for RICO violations;

2) DENIES CWIE's motion for summary judgment on Claim Four for wrongful use of a registered mark;

3) DENIES CWIE's motion for summary judgment on Claim Five for violation of rights of publicity;

4) GRANTS CWIE's motion for summary judgment on Claim Six for unfair competition under the UCL; and

5) GRANTS CWIE's motion for summary judgment on Claim Seven for false and misleading advertising.

D. CCBill's Motion for Summary Judgment

Defendant CCBill's motion for summary judgment is GRANTED, in part, and DNIED, in part. The Court:

1) GRANTS CCBill's motion for summary judgment and finds that CCBill is entitled to the safe harbor provision under § 512(a) against Perfect 10's Claim 1 for copyright infringement and Claims 8 and 9 for RICO violations;

2) DENIES CCBill's motion for summary judgment of Claim Four for wrongful use of a registered mark;

3) DENIES CCBill's motion for summary judgment of Claim Five for violation of rights of publicity;

4) GRANTS CCBill's motion for summary judgment of Claim Six for unfair competition under the UCL; and

[1113] 5) GRANTS CCBill's motion for summary judgment of Claim Seven for false and misleading advertising.

IT IS SO ORDERED.

[1] The Court has devised the following citation nomenclature to distinguish the pleadings filed in support of the different motions: (1) all pleadings filed in support of Internet Key's motion against Perfect 10 shall be preceded by an "I"; (2) all pleadings filed in support of IBill's motion against Perfect 10 shall be preceded by an "II"; (3) all pleadings filed in support of CCBill's and CWIE's motions against Perfect 10 shall be preceded by an "III."

[2] The deposition contains two different sets of page numbers. The Court will refer to the original deposition pages found on the bottom right-hand side of the pages, not the exhibit page numbers found at the bottom middle of the pages.

[3] Perfect 10 has not alleged any infringements on www.sksignature.com. Id.

[4] Perfect 10 contends that CWIE and CCBill are both owned by CWIE Holdings, LLC. III Zadeh Decl, ¶ 233, Exh. 202. Perfect 10 has submitted a chart that it received from CCBill or CWIE that does not identify, in any manner, common corporate ownership. Therefore, this contention is not supported by the evidence presented.

[5] There is no dispute between the parties that the Defendants fulfill the requirements of subsection (B).

[6] § 512(c)(3) states:

(3) Elements of notification.

(A) To be effective under this subsection, a notification of claimed infringement must be a written communication provided to the designated agent of a service provider that includes substantially the following:

(i) A physical or electronic signature of a person authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.

(ii) Identification of the copyrighted work claimed to have been infringed, or, if multiple copyrighted works at a single online site are covered by a single notification, a representative list of such works at that site.

(iii) Identification of the material that is claimed to be infringing or to be the subject of infringing activity and that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit the service provider to locate the material.

(iv) Information reasonably sufficient to permit the service provider to contact the complaining party, such as an address, telephone number, and, if available, an electronic mail address at which the complaining party may be contacted.

(v) A statement that the complaining party has a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, its agent, or the law.

(vi) A statement that the information in the notification is accurate, and under penalty of perjury, that the complaining party is authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.

[7] During oral argument, Perfect 10 argued that notifications of repeat infringers under § 512(i) did not have to meet the requirements of § 512(c)(3)(A) based on In re Aimster Copyright Litigation, 252 F.Supp.2d 634, 659 (N.D.Ill.2002). In Aimster, the district court found that the DMCA did not require that a copyright holder provide Aimster with the internet protocol address of the infringement on the Aimster system. Id. An internet protocol address is the numeric address given to servers and users connected to the Internet. The district court did not, however, hold that DMCA notifications under § 512(f) do not need to meet the requirements of § 512(c)(3)(A). Therefore, Perfect 10's reliance Aimster to support its argument is misplaced.

[8] There is no dispute between the parties that IBill is an internet service provider under the DMCA. There is also no dispute between the parties that IBill adopted its termination policy before the alleged infringements occurred.

[9] Perfect 10 has also submitted a letter to IBll that accompanied a 22,000 page document production to IBill as notification. The letter is almost identical to the letters sent to Internet Key, CCBill, and CWIE. The letter is discussed in Sections III.A.2.b.ii, infra.

[10] Perfect 10 has also submitted documents referring to alleged violations of the rights of publicity of celebrities on IBill's clients' websites and violations of third-party copyrights. IBill is asserting the safe harbor provision under § 512(a) as a defense to Perfect 10's Claim 1 for copyright infringement. Perfect 10's Claim 1 for copyright infringement alleges violations of Perfect 10's copyrights. Evidence of infringements of third-party copyrights and violations of the right of publicity are not relevant to Perfect 10's claim for copyright infringement.

During oral argument, Perfect 10 argued that notices of third-party copyrights should be considered by the Court in determining whether IBill reasonably implements its termination policy. To support its argument, Perfect 10 relies on Ellison v. Robertson, 357 F.3d 1072, 1080 (9th Cir.2004), which held that AOL had not reasonably implemented its termination policy because the email address of AOL's copyright agent was inactive and therefore, notifications of copyright infringement went unheeded. Ellison did not hold that notifications of third-party infringements should be considered in determining whether AOL had reasonably implemented its termination policy. Therefore, Perfect 10's reliance on Ellison is misplaced.

[11] Perfect 10 also argues that Internet Key's website, sexkey.com, contains "infringements of celebrities." I Zadeh Decl., ¶ 13, Exh. 4. However, the printouts of sexkey.com do not contain a single image of a celebrity but merely list their names. Id. The Court fails to see how a list of names can constitute a copyright violation pursuant to 17 U.S.C. § 501(a). Therefore, the Court finds this argument without merit.

[12] Perfect 10 may argue that the fact that it takes three notifications to terminate a webmaster is not sufficient under § 512(i). However, § 512(i) specifically states that the internet service provider must adopt a policy that terminates "repeat infringers." In order for an infringer to be a "repeat" infringer, he or she must infringe at least twice. Therefore, the Court finds that Internet Key's policy of terminating a webmaster after 3 notifications is reasonable.

[13] The Court notes that Internet Key is asserting the safe harbor provided under § 512(d) which adopts the notification and take down procedures identified in § 512(c)(3)(A). H.R. Rep. 105-551(11), WL at *57.

[14] Internet Key objects to portions of Exhibit 35 of Zadeh's declaration because some of the pages were not produced until after January 16, 2004, the deadline for the completion of Phase I discovery in this matter. See II Kearney Decl., ¶¶ 11-12. This objection is overruled.

[15] The Court also notes that many Perfect 10 models have appeared in a variety of non-Perfect 10 venues such as Playboy, Penthouse, and other websites. Ill Spillane Reply Decl., Exh. 1 at 4.

[16] Internet Key did not raise the safe harbor under § 512(a) in its summary judgment motion. During oral argument, the Court invited Internet Key to submit supplemental briefing regarding § 512(a). Internet Key filed a supplemental brief on May 20, 2004. Perfect 10 filed an opposition on May 27, 2004.

[17] Perfect 10 does not assert other violations of § 512(i) against these Defendants.

CWIE and CCBill adopted their policies in 1999. Since Perfect 10 does not allege any infringements that pre-date 1999, the Court finds that CWIE's and CCBill's repeat infringer policies were in place during the entire period of alleged infringements.

[18] Perfect 10 also cites to Exhibit 16 of the Zadeh Declaration but it has failed to include it in the declaration.

[19] Perfect 10 has also submitted a letter dated October 16, 2002 that is nearly identical to the letter sent to Internet Key that accompanied the same 22,000 page document production to all of the Defendants. Ill Zadeh Decl., Exh. 25. See Section IV.2.b.ii, supra, for a discussion of this letter.

[20] During his deposition, Fisher was asked whether he could act on the information that was provided in the spreadsheet and responded "yes." Ill Cooper Decl., Exh. 2 at 30:16-21. Perfect 10 argues that Fisher admitted that he had received DMCA-compliant notification based on this deposition testimony. However, Fisher did not state that the notification was DMCA-compliant or that the information allowed CCBill and CWIE to expeditiously locate the infringing material. Therefore, the Court finds Perfect 10's argument without merit.

[21] Perfect 10 has also submitted notifications by third-party copyright holders. However, as the Court has already stated, supra, notifications of third-party copyright infringements are not relevant to Perfect 10's claim for copyright infringement and the Defendants DMCA defense to that claim.

[22] Section 512(c)(2) also requires that the internet service provider have a designated copyright agent to receive notification under § 512(c)(3). Perfect 10 does not contend that CWIE does not have such an agent.

[23] During oral argument, Perfect 10 also cited to several disclaimers on websites affiliated with CCBill to support its argument that CWIE had "red flag" knowledge of copyright infringement. Ill Zadeh Decl., Exhs. 63 & 64. However, Perfect 10 has not provided any disclaimers on websites associated with CWIE. Therefore, this evidence is irrelevant to the Court's analysis of CWIE's knowledge.

[24] Perfect 10's RICO claims are based solely on predicate acts of criminal copyright infringement.

[25] Internet Key is entitled to the safe harbor provisions of § 512 against Perfect 10's RICO claims for copyright infringements after August 21, 2002.

[26] Claim 6 also contains allegations of unfair competition under the Lanham Act. The Defendants have not asserted that they are immune from prosecution for this claim, therefore, the Court limits its discussion of Claim 6 to the alleged violations of California Business & Professions Code §§ 17200.

[27] Section 17500 provides:

It is unlawful for any person, firm, corporation or association, or any employee thereof with intent directly or indirectly to dispose of real or personal property or to perform services, professional or otherwise, or anything of any nature whatsoever or to induce the public to enter into any obligation relating thereto, to make or disseminate or cause to be made or disseminated before the public in this state, or to make or disseminate or cause to be made or disseminated from this state before the public in any state, in any newspaper or other publication, or any advertising device, or by public outcry or proclamation, or in any other manner or means whatever, including over the Internet, any statement, concerning that real or personal property or those services, professional or otherwise, or concerning any circumstance or matter of fact connected with the proposed performance or disposition thereof, which is untrue or misleading, and which is known, or which by the exercise of reasonable care should be known, to be untrue or misleading, or for any person, firm, or corporation to so make or disseminate or cause to be so made or disseminated any such statement as part of a plan or scheme with the intent not to sell that personal property or those services, professional or otherwise, so advertised at the price stated therein, or as so advertised. Any violation of the provisions of this section is a misdemeanor punishable by imprisonment in the county jail not exceeding six months, or by a fine not exceeding two thousand five hundred dollars ($ 2,500), or by both that imprisonment and fine.

[28] Perfect 10 relies heavily on Barrett v. Rosenthal, formerly published as 114 Cal. App.4th 1379, 9 Cal.Rptr.3d 142 (2004), review granted April 14, 2004, S122953. Since the California Supreme Court has granted review of this case, Barrett may not be relied on as precedent. Cal. State Rules of Court 976(d) & 977(a).

[29] The Court notes that Perfect 10's Claim 6 for unfair competition under § 15 U.S.C. § 1125(a) of the Lanham Act is not affected by this ruling.

6.7.3 Metro-Goldwyn-Mayer, Inc. v. Grokster 6.7.3 Metro-Goldwyn-Mayer, Inc. v. Grokster

545 U.S. 913
125 S. Ct. 2764
162 L. Ed. 2d 781

METRO-GOLDWYN-MAYER STUDIOS INC. ET AL.
v.
GROKSTER, LTD., ET AL.

No. 04-480.
Supreme Court of United States.
Argued March 29, 2005.
Decided June 27, 2005.

Respondent companies distribute free software that allows computer users to share electronic files through peer-to-peer networks, so called because the computers communicate directly with each other, not through central servers. Although such networks can be used to share any type of digital file, recipients of respondents' software have mostly used them to share copyrighted music and video files without authorization. Seeking damages and an injunction, a group of movie studios and other copyright holders (hereinafter MGM) sued respondents for their users' copyright infringements, alleging that respondents knowingly and intentionally distributed their software to enable users to infringe copyrighted works in violation of the Copyright Act.

Discovery revealed that billions of files are shared across peer-to-peer networks each month. Respondents are aware that users employ their software primarily to download copyrighted files, although the decentralized networks do not reveal which files are copied, and when. Respondents have sometimes learned about the infringement directly when users have e-mailed questions regarding copyrighted works, and respondents have replied with guidance. Respondents are not merely passive recipients of information about infringement. The record is replete with evidence that when they began to distribute their free software, each of them clearly voiced the objective that recipients use the software to download copyrighted works and took active steps to encourage infringement. After the notorious file-sharing service, Napster, was sued by copyright holders for facilitating copyright infringement, both respondents promoted and marketed themselves as Napster alternatives. They receive no revenue from users, but, instead, generate income by selling advertising space, then streaming the advertising to their users. As the number of users increases, advertising opportunities are worth more. There is no evidence that either respondent made an effort to filter copyrighted material from users' downloads or otherwise to impede the sharing of copyrighted files.

While acknowledging that respondents' users had directly infringed MGM's copyrights, the District Court nonetheless granted respondents summary judgment as to liability arising from distribution of their software. [545 U.S. 914] The Ninth Circuit affirmed. It read Sony Corp. of America v. Universal City Studios, Inc., 464 U. S. 417, as holding that the distribution of a commercial product capable of substantial noninfringing uses could not give rise to contributory liability for infringement unless the distributor had actual knowledge of specific instances of infringement and failed to act on that knowledge. Because the appeals court found respondents' software to be capable of substantial noninfringing uses and because respondents had no actual knowledge of infringement owing to the software's decentralized architecture, the court held that they were not liable. It also held that they did not materially contribute to their users' infringement because the users themselves searched for, retrieved, and stored the infringing files, with no involvement by respondents beyond providing the software in the first place. Finally, the court held that respondents could not be held liable under a vicarious infringement theory because they did not monitor or control the software's use, had no agreed-upon right or current ability to supervise its use, and had no independent duty to police infringement.

Held: One who distributes a device with the object of promoting its use to infringe copyright, as shown by clear expression or other affirmative steps taken to foster infringement, going beyond mere distribution with knowledge of third-party action, is liable for the resulting acts of infringement by third parties using the device, regardless of the device's lawful uses. Pp. 928-941.

(a) The tension between the competing values of supporting creativity through copyright protection and promoting technological innovation by limiting infringement liability is the subject of this case. Despite offsetting considerations, the argument for imposing indirect liability here is powerful, given the number of infringing downloads that occur daily using respondents' software. When a widely shared product is used to commit infringement, it may be impossible to enforce rights in the protected work effectively against all direct infringers, so that the only practical alternative is to go against the device's distributor for secondary liability on a theory of contributory or vicarious infringement. One infringes contributorily by intentionally inducing or encouraging direct infringement, and infringes vicariously by profiting from direct infringement while declining to exercise the right to stop or limit it. Although "[t]he Copyright Act does not expressly render anyone liable for [another's] infringement," Sony, 464 U. S., at 434, these secondary liability doctrines emerged from common law principles and are well established in the law, e. g., id., at 486. Pp. 928-931.

(b) Sony addressed a claim that secondary liability for infringement can arise from the very distribution of a commercial product. There, [545 U.S. 915] copyright holders sued Sony, the manufacturer of videocassette recorders, claiming that it was contributorily liable for the infringement that occurred when VCR owners taped copyrighted programs. The evidence showed that the VCR's principal use was "time-shifting," i. e., taping a program for later viewing at a more convenient time, which the Court found to be a fair, noninfringing use. 464 U. S., at 423-424. Moreover, there was no evidence that Sony had desired to bring about taping in violation of copyright or taken active steps to increase its profits from unlawful taping. Id., at 438. On those facts, the only conceivable basis for liability was on a theory of contributory infringement through distribution of a product. Id., at 439. Because the VCR was "capable of commercially significant noninfringing uses," the Court held that Sony was not liable. Id., at 442. This theory reflected patent law's traditional staple article of commerce doctrine that distribution of a component of a patented device will not violate the patent if it is suitable for use in other ways. 35 U. S. C. § 271(c). The doctrine absolves the equivocal conduct of selling an item with lawful and unlawful uses and limits liability to instances of more acute fault. In this case, the Ninth Circuit misread Sony to mean that when a product is capable of substantial lawful use, the producer cannot be held contributorily liable for third parties' infringing use of it, even when an actual purpose to cause infringing use is shown, unless the distributors had specific knowledge of infringement at a time when they contributed to the infringement and failed to act upon that information. Sony did not displace other secondary liability theories. Pp. 931-934.

(c) Nothing in Sony requires courts to ignore evidence of intent to promote infringement if such evidence exists. It was never meant to foreclose rules of fault-based liability derived from the common law. 464 U. S., at 439. Where evidence goes beyond a product's characteristics or the knowledge that it may be put to infringing uses, and shows statements or actions directed to promoting infringement, Sony's staple-article rule will not preclude liability. At common law a copyright or patent defendant who "not only expected but invoked [infringing use] by advertisement" was liable for infringement. Kalem Co. v. Harper Brothers, 222 U. S. 55, 62-63. The rule on inducement of infringement as developed in the early cases is no different today. Evidence of active steps taken to encourage direct infringement, such as advertising an infringing use or instructing how to engage in an infringing use, shows an affirmative intent that the product be used to infringe, and overcomes the law's reluctance to find liability when a defendant merely sells a commercial product suitable for some lawful use. A rule that premises liability on purposeful, culpable expression and conduct [545 U.S. 916] does nothing to compromise legitimate commerce or discourage innovation having a lawful promise. Pp. 934-937.

(d) On the record presented, respondents' unlawful objective is unmistakable. The classic instance of inducement is by advertisement or solicitation that broadcasts a message designed to stimulate others to commit violations. MGM argues persuasively that such a message is shown here. Three features of the evidence of intent are particularly notable. First, each of the respondents showed itself to be aiming to satisfy a known source of demand for copyright infringement, the market comprising former Napster users. Respondents' efforts to supply services to former Napster users indicate a principal, if not exclusive, intent to bring about infringement. Second, neither respondent attempted to develop filtering tools or other mechanisms to diminish the infringing activity using their software. While the Ninth Circuit treated that failure as irrelevant because respondents lacked an independent duty to monitor their users' activity, this evidence underscores their intentional facilitation of their users' infringement. Third, respondents make money by selling advertising space, then by directing ads to the screens of computers employing their software. The more their software is used, the more ads are sent out and the greater the advertising revenue. Since the extent of the software's use determines the gain to the distributors, the commercial sense of their enterprise turns on high-volume use, which the record shows is infringing. This evidence alone would not justify an inference of unlawful intent, but its import is clear in the entire record's context. Pp. 937-940.

(e) In addition to intent to bring about infringement and distribution of a device suitable for infringing use, the inducement theory requires evidence of actual infringement by recipients of the device, the software in this case. There is evidence of such infringement on a gigantic scale. Because substantial evidence supports MGM on all elements, summary judgment for respondents was error. On remand, reconsideration of MGM's summary judgment motion will be in order. Pp. 940-941.

380 F. 3d 1154, vacated and remanded.

SOUTER, J., delivered the opinion for a unanimous Court. GINSBURG, J., filed a concurring opinion, in which REHNQUIST, C. J., and KENNEDY, J., joined, post, p. 942. BREYER, J., filed a concurring opinion, in which STEVENS and O'CONNOR, JJ., joined, post, p. 949.

CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE NINTH CIRCUIT

Donald B. Verrilli, Jr., argued the cause for petitioners. With him on the briefs for the motion picture studio and recording company petitioners were Ian Heath Gershengorn, [545 U.S. 917] William M. Hohengarten, Steven B. Fabrizio, Thomas J. Perrelli, Matthew J. Oppenheim, David E. Kendall, Thomas G. Hentoff, Kenneth W. Starr, Russell J. Frackman, George M. Borkowski, Robert M. Schwartz, Gregory P. Goeckner, Dean C. Garfield, Elaine J. Goldenberg, Matthew Hersh, Steven M. Marks, and Stanley Pierre-Louis. Carey R. Ramos, Peter L. Felcher, Aidan Synnott, Theodore K. Cheng, Kelli L. Sager, Andrew J. Thomas, Jeffrey H. Blum, and Jeffrey L. Fisher filed briefs for the songwriter and music publisher petitioners.

Acting Solicitor General Clement argued the cause for the United States as amicus curiae urging reversal. With him on the brief were Assistant Attorney General Keisler, Deputy Solicitor General Hungar, Douglas H. Hallward-Driemeier, Anthony A. Yang, David O. Carson, and John M. Whealan.

Richard G. Taranto argued the cause for respondents. With him on the brief were H. Bartow Farr III, Cindy A. Cohn, Fred Von Lohmann, Michael H. Page, Mark A. Lemley, Charles S. Baker, and Matthew A. Neco.[*]

[545 U.S. 918] JUSTICE SOUTER delivered the opinion of the Court.

The question is under what circumstances the distributor of a product capable of both lawful and unlawful use is liable [545 U.S. 919] for acts of copyright infringement by third parties using the product. We hold that one who distributes a device with the object of promoting its use to infringe copyright, as shown by clear expression or other affirmative steps taken to foster infringement, is liable for the resulting acts of infringement by third parties.

I

A

Respondents, Grokster, Ltd., and StreamCast Networks, Inc., defendants in the trial court, distribute free software products that allow computer users to share electronic files through peer-to-peer networks, so called because users' computers communicate directly with each other, not through [545 U.S. 920] central servers. The advantage of peer-to-peer networks over information networks of other types shows up in their substantial and growing popularity. Because they need no central computer server to mediate the exchange of information or files among users, the high-bandwidth communications capacity for a server may be dispensed with, and the need for costly server storage space is eliminated. Since copies of a file (particularly a popular one) are available on many users' computers, file requests and retrievals may be faster than on other types of networks, and since file exchanges do not travel through a server, communications can take place between any computers that remain connected to the network without risk that a glitch in the server will disable the network in its entirety. Given these benefits in security, cost, and efficiency, peer-to-peer networks are employed to store and distribute electronic files by universities, government agencies, corporations, and libraries, among others.[1]

Other users of peer-to-peer networks include individual recipients of Grokster's and StreamCast's software, and although the networks that they enjoy through using the software can be used to share any type of digital file, they have prominently employed those networks in sharing copyrighted music and video files without authorization. A group of copyright holders (MGM for short, but including motion picture studios, recording companies, songwriters, and music publishers) sued Grokster and StreamCast for their users' copyright infringements, alleging that they [545 U.S. 921] knowingly and intentionally distributed their software to enable users to reproduce and distribute the copyrighted works in violation of the Copyright Act, 17 U. S. C. § 101 et seq. (2000 ed. and Supp. II).[2] MGM sought damages and an injunction.

Discovery during the litigation revealed the way the software worked, the business aims of each defendant company, and the predilections of the users. Grokster's eponymous software employs what is known as FastTrack technology, a protocol developed by others and licensed to Grokster. StreamCast distributes a very similar product except that its software, called Morpheus, relies on what is known as Gnutella technology.[3] A user who downloads and installs either software possesses the protocol to send requests for files directly to the computers of others using software compatible with FastTrack or Gnutella. On the FastTrack network opened by the Grokster software, the user's request goes to a computer given an indexing capacity by the software and designated a supernode, or to some other computer with comparable power and capacity to collect temporary indexes of the files available on the computers of users connected to it. The supernode (or indexing computer) searches its own index and may communicate the search request to other supernodes. If the file is found, the supernode discloses its location to the computer requesting it, and the requesting user can download the file directly from the computer located. The copied file is placed in a designated sharing folder on the requesting user's computer, where it is available for other users to download in turn, along with any other file in that folder.[545 U.S. 922] In the Gnutella network made available by Morpheus, the process is mostly the same, except that in some versions of the Gnutella protocol there are no supernodes. In these versions, peer computers using the protocol communicate directly with each other. When a user enters a search request into the Morpheus software, it sends the request to computers connected with it, which in turn pass the request along to other connected peers. The search results are communicated to the requesting computer, and the user can download desired files directly from peers' computers. As this description indicates, Grokster and StreamCast use no servers to intercept the content of the search requests or to mediate the file transfers conducted by users of the software, there being no central point through which the substance of the communications passes in either direction.[4]

Although Grokster and StreamCast do not therefore know when particular files are copied, a few searches using their software would show what is available on the networks the software reaches. MGM commissioned a statistician to conduct a systematic search, and his study showed that nearly 90% of the files available for download on the FastTrack system were copyrighted works.[5] Grokster and StreamCast dispute this figure, raising methodological problems and arguing that free copying even of copyrighted works may be authorized by the rightholders. They also argue that potential noninfringing uses of their software are significant in kind, even if infrequent in practice. Some musical performers, for example, have gained new audiences by distributing [545 U.S. 923] their copyrighted works for free across peer-to-peer networks, and some distributors of unprotected content have used peer-to-peer networks to disseminate files, Shakespeare being an example. Indeed, StreamCast has given Morpheus users the opportunity to download the briefs in this very case, though their popularity has not been quantified.

As for quantification, the parties' anecdotal and statistical evidence entered thus far to show the content available on the FastTrack and Gnutella networks does not say much about which files are actually downloaded by users, and no one can say how often the software is used to obtain copies of unprotected material. But MGM's evidence gives reason to think that the vast majority of users' downloads are acts of infringement, and because well over 100 million copies of the software in question are known to have been downloaded, and billions of files are shared across the FastTrack and Gnutella networks each month, the probable scope of copyright infringement is staggering.

Grokster and StreamCast concede the infringement in most downloads, Brief for Respondents 10, n. 6, and it is uncontested that they are aware that users employ their software primarily to download copyrighted files, even if the decentralized FastTrack and Gnutella networks fail to reveal which files are being copied, and when. From time to time, moreover, the companies have learned about their users' infringement directly, as from users who have sent e-mail to each company with questions about playing copyrighted movies they had downloaded, to whom the companies have responded with guidance.[6] App. 559-563, 808-816, 939-954. And MGM notified the companies of 8 million copyrighted files that could be obtained using their software.

Grokster and StreamCast are not, however, merely passive recipients of information about infringing use. The record is replete with evidence that from the moment Grokster [545 U.S. 924] and StreamCast began to distribute their free software, each one clearly voiced the objective that recipients use it to download copyrighted works, and each took active steps to encourage infringement.

After the notorious file-sharing service, Napster, was sued by copyright holders for facilitation of copyright infringement, A&M Records, Inc. v. Napster, Inc., 114 F. Supp. 2d 896 (ND Cal. 2000), aff'd in part, rev'd in part, 239 F. 3d 1004 (CA9 2001), StreamCast gave away a software program of a kind known as OpenNap, designed as compatible with the Napster program and open to Napster users for downloading files from other Napster and OpenNap users' computers. Evidence indicates that "[i]t was always [StreamCast's] intent to use [its OpenNap network] to be able to capture email addresses of [its] initial target market so that [it] could promote [its] StreamCast Morpheus interface to them," App. 861; indeed, the OpenNap program was engineered "`to leverage Napster's 50 million user base,'" id., at 746.

StreamCast monitored both the number of users downloading its OpenNap program and the number of music files they downloaded. Id., at 859, 863, 866. It also used the resulting OpenNap network to distribute copies of the Morpheus software and to encourage users to adopt it. Id., at 861, 867, 1039. Internal company documents indicate that StreamCast hoped to attract large numbers of former Napster users if that company was shut down by court order or otherwise, and that StreamCast planned to be the next Napster. Id., at 861. A kit developed by StreamCast to be delivered to advertisers, for example, contained press articles about StreamCast's potential to capture former Napster users, id., at 568-572, and it introduced itself to some potential advertisers as a company "which is similar to what Napster was," id., at 884. It broadcast banner advertisements to users of other Napster-compatible software, urging them to adopt its OpenNap. Id., at 586. An internal e-mail from a company executive stated: "`We have put this network in [545 U.S. 925] place so that when Napster pulls the plug on their free service . . . or if the Court orders them shut down prior to that . . . we will be positioned to capture the flood of their 32 million users that will be actively looking for an alternative.'" Id., at 588-589, 861.

Thus, StreamCast developed promotional materials to market its service as the best Napster alternative. One proposed advertisement read: "Napster Inc. has announced that it will soon begin charging you a fee. That's if the courts don't order it shut down first. What will you do to get around it?" Id., at 897. Another proposed ad touted StreamCast's software as the "#1 alternative to Napster" and asked "[w]hen the lights went off at Napster . . . where did the users go?" Id., at 836 (ellipsis in original).[7] StreamCast even planned to flaunt the illegal uses of its software; when it launched the OpenNap network, the chief technology officer of the company averred that "[t]he goal is to get in trouble with the law and get sued. It's the best way to get in the new[s]." Id., at 916.

The evidence that Grokster sought to capture the market of former Napster users is sparser but revealing, for Grokster launched its own OpenNap system called Swaptor and inserted digital codes into its Web site so that computer users using Web search engines to look for "Napster" or "[f]ree file sharing" would be directed to the Grokster Web site, where they could download the Grokster software. Id., at 992-993. And Grokster's name is an apparent derivative of Napster.

StreamCast's executives monitored the number of songs by certain commercial artists available on their networks, and an internal communication indicates they aimed to have a larger number of copyrighted songs available on their networks [545 U.S. 926] than other file-sharing networks. Id., at 868. The point, of course, would be to attract users of a mind to infringe, just as it would be with their promotional materials developed showing copyrighted songs as examples of the kinds of files available through Morpheus. Id., at 848. Morpheus in fact allowed users to search specifically for "Top 40" songs, id., at 735, which were inevitably copyrighted. Similarly, Grokster sent users a newsletter promoting its ability to provide particular, popular copyrighted materials. Brief for Motion Picture Studio and Recording Company Petitioners 7-8.

In addition to this evidence of express promotion, marketing, and intent to promote further, the business models employed by Grokster and StreamCast confirm that their principal object was use of their software to download copyrighted works. Grokster and StreamCast receive no revenue from users, who obtain the software itself for nothing. Instead, both companies generate income by selling advertising space, and they stream the advertising to Grokster and Morpheus users while they are employing the programs. As the number of users of each program increases, advertising opportunities become worth more. Cf. App. 539, 804. While there is doubtless some demand for free Shakespeare, the evidence shows that substantive volume is a function of free access to copyrighted work. Users seeking Top 40 songs, for example, or the latest release by Modest Mouse, are certain to be far more numerous than those seeking a free Decameron, and Grokster and StreamCast translated that demand into dollars.

Finally, there is no evidence that either company made an effort to filter copyrighted material from users' downloads or otherwise impede the sharing of copyrighted files. Although Grokster appears to have sent e-mails warning users about infringing content when it received threatening notice from the copyright holders, it never blocked anyone from continuing to use its software to share copyrighted files. [545 U.S. 927] Id., at 75-76. StreamCast not only rejected another company's offer of help to monitor infringement, id., at 928-929, but blocked the Internet Protocol addresses of entities it believed were trying to engage in such monitoring on its networks, id., at 917-922.

B

After discovery, the parties on each side of the case crossmoved for summary judgment. The District Court limited its consideration to the asserted liability of Grokster and StreamCast for distributing the current versions of their software, leaving aside whether either was liable "for damages arising from past versions of their software, or from other past activities." 259 F. Supp. 2d 1029, 1033 (CD Cal. 2003). The District Court held that those who used the Grokster and Morpheus software to download copyrighted media files directly infringed MGM's copyrights, a conclusion not contested on appeal, but the court nonetheless granted summary judgment in favor of Grokster and StreamCast as to any liability arising from distribution of the then-current versions of their software. Distributing that software gave rise to no liability in the court's view, because its use did not provide the distributors with actual knowledge of specific acts of infringement. Case No. CV 01 08541 SVW (PJWx) (CD Cal., June 18, 2003), App. 1213.

The Court of Appeals affirmed. 380 F. 3d 1154 (CA9 2004). In the court's analysis, a defendant was liable as a contributory infringer when it had knowledge of direct infringement and materially contributed to the infringement. But the court read Sony Corp. of America v. Universal City Studios, Inc., 464 U. S. 417 (1984), as holding that distribution of a commercial product capable of substantial noninfringing uses could not give rise to contributory liability for infringement unless the distributor had actual knowledge of specific instances of infringement and failed to act on that knowledge. The fact that the software was capable of substantial noninfringing uses in the Ninth Circuit's view meant [545 U.S. 928] that Grokster and StreamCast were not liable, because they had no such actual knowledge, owing to the decentralized architecture of their software. The court also held that Grokster and StreamCast did not materially contribute to their users' infringement because it was the users themselves who searched for, retrieved, and stored the infringing files, with no involvement by the defendants beyond providing the software in the first place.

The Ninth Circuit also considered whether Grokster and StreamCast could be liable under a theory of vicarious infringement. The court held against liability because the defendants did not monitor or control the use of the software, had no agreed-upon right or current ability to supervise its use, and had no independent duty to police infringement. We granted certiorari. 543 U. S. 1032 (2004).

II

A

MGM and many of the amici fault the Court of Appeals's holding for upsetting a sound balance between the respective values of supporting creative pursuits through copyright protection and promoting innovation in new communication technologies by limiting the incidence of liability for copyright infringement. The more artistic protection is favored, the more technological innovation may be discouraged; the administration of copyright law is an exercise in managing the tradeoff. See Sony Corp. v. Universal City Studios, supra, at 442; see generally Ginsburg, Copyright and Control Over New Technologies of Dissemination, 101 Colum. L. Rev. 1613 (2001); Lichtman & Landes, Indirect Liability for Copyright Infringement: An Economic Perspective, 16 Harv. J. L. & Tech. 395 (2003).

The tension between the two values is the subject of this case, with its claim that digital distribution of copyrighted material threatens copyright holders as never before, because every copy is identical to the original, copying is easy, [545 U.S. 929] and many people (especially the young) use file-sharing software to download copyrighted works. This very breadth of the software's use may well draw the public directly into the debate over copyright policy, Peters, Brace Memorial Lecture: Copyright Enters the Public Domain, 51 J. Copyright Soc. 701, 705-717 (2004) (address by Register of Copyrights), and the indications are that the ease of copying songs or movies using software like Grokster's and Napster's is fostering disdain for copyright protection, Wu, When Code Isn't Law, 89 Va. L. Rev. 679, 724-726 (2003). As the case has been presented to us, these fears are said to be offset by the different concern that imposing liability, not only on infringers but on distributors of software based on its potential for unlawful use, could limit further development of beneficial technologies. See, e. g., Lemley & Reese, Reducing Digital Copyright Infringement Without Restricting Innovation, 56 Stan. L. Rev. 1345, 1386-1390 (2004); Brief for Innovation Scholars and Economists as Amici Curiae 15-20; Brief for Emerging Technology Companies as Amici Curiae 19-25; Brief for Intel Corporation as Amicus Curiae 20-22.[8]

The argument for imposing indirect liability in this case is, however, a powerful one, given the number of infringing downloads that occur every day using StreamCast's and Grokster's software. When a widely shared service or product is used to commit infringement, it may be impossible to [545 U.S. 930] enforce rights in the protected work effectively against all direct infringers, the only practical alternative being to go against the distributor of the copying device for secondary liability on a theory of contributory or vicarious infringement. See In re Aimster Copyright Litigation, 334 F. 3d 643, 645-646 (CA7 2003).

One infringes contributorily by intentionally inducing or encouraging direct infringement, see Gershwin Pub. Corp. v. Columbia Artists Management, Inc., 443 F. 2d 1159, 1162 (CA2 1971), and infringes vicariously by profiting from direct infringement while declining to exercise a right to stop or limit it, Shapiro, Bernstein & Co. v. H. L. Green Co., 316 F. 2d 304, 307 (CA2 1963).[9] Although "[t]he Copyright Act does not expressly render anyone liable for infringement committed by another," Sony Corp. v. Universal City Studios, 464 U. S., at 434, these doctrines of secondary liability emerged from common law principles and are well established in the law, id., at 486 (Blackmun, J., dissenting); Kalem Co. v. Harper Brothers, 222 U. S. 55, 62-63 (1911); Gershwin Pub. Corp. v. Columbia Artists Management, [545 U.S. 931] supra, at 1162; 3 M. Nimmer & D. Nimmer, Copyright § 12.04[A] (2005).

B

Despite the currency of these principles of secondary liability, this Court has dealt with secondary copyright infringement in only one recent case, and because MGM has tailored its principal claim to our opinion there, a look at our earlier holding is in order. In Sony Corp. v. Universal City Studios, supra, this Court addressed a claim that secondary liability for infringement can arise from the very distribution of a commercial product. There, the product, novel at the time, was what we know today as the videocassette recorder or VCR. Copyright holders sued Sony as the manufacturer, claiming it was contributorily liable for infringement that occurred when VCR owners taped copyrighted programs because it supplied the means used to infringe, and it had constructive knowledge that infringement would occur. At the trial on the merits, the evidence showed that the principal use of the VCR was for "`time-shifting,'" or taping a program for later viewing at a more convenient time, which the Court found to be a fair, not an infringing, use. Id., at 423-424. There was no evidence that Sony had expressed an object of bringing about taping in violation of copyright or had taken active steps to increase its profits from unlawful taping. Id., at 438. Although Sony's advertisements urged consumers to buy the VCR to "`record favorite shows'" or "`build a library'" of recorded programs, id., at 459 (Blackmun, J., dissenting), neither of these uses was necessarily infringing, id., at 424, 454-455.

On those facts, with no evidence of stated or indicated intent to promote infringing uses, the only conceivable basis for imposing liability was on a theory of contributory infringement arising from its sale of VCRs to consumers with knowledge that some would use them to infringe. Id., at 439. But because the VCR was "capable of commercially significant noninfringing uses," we held the manufacturer [545 U.S. 932] could not be faulted solely on the basis of its distribution. Id., at 442.

This analysis reflected patent law's traditional staple article of commerce doctrine, now codified, that distribution of a component of a patented device will not violate the patent if it is suitable for use in other ways. 35 U. S. C. § 271(c); Aro Mfg. Co. v. Convertible Top Replacement Co., 377 U. S. 476, 485 (1964) (noting codification of cases); id., at 486, n. 6 (same). The doctrine was devised to identify instances in which it may be presumed from distribution of an article in commerce that the distributor intended the article to be used to infringe another's patent, and so may justly be held liable for that infringement. "One who makes and sells articles which are only adapted to be used in a patented combination will be presumed to intend the natural consequences of his acts; he will be presumed to intend that they shall be used in the combination of the patent." New York Scaffolding Co. v. Whitney, 224 F. 452, 459 (CA8 1915); see also James Heekin Co. v. Baker, 138 F. 63, 66 (CA8 1905); Canda v. Michigan Malleable Iron Co., 124 F. 486, 489 (CA6 1903); Thomson-Houston Electric Co. v. Ohio Brass Co., 80 F. 712, 720-721 (CA6 1897); Red Jacket Mfg. Co. v. Davis, 82 F. 432, 439 (CA7 1897); Holly v. Vergennes Machine Co., 4 F. 74, 82 (CC Vt. 1880); Renwick v. Pond, 20 F. Cas. 536, 541 (No. 11,702) (CC SDNY 1872).

In sum, where an article is "good for nothing else" but infringement, Canda v. Michigan Malleable Iron Co., supra, at 489, there is no legitimate public interest in its unlicensed availability, and there is no injustice in presuming or imputing an intent to infringe, see Henry v. A. B. Dick Co., 224 U. S. 1, 48 (1912), overruled on other grounds, Motion Picture Patents Co. v. Universal Film Mfg. Co., 243 U. S. 502 (1917). Conversely, the doctrine absolves the equivocal conduct of selling an item with substantial lawful as well as unlawful uses, and limits liability to instances of more acute [545 U.S. 933] fault than the mere understanding that some of one's products will be misused. It leaves breathing room for innovation and a vigorous commerce. See Sony Corp. v. Universal City Studios, 464 U. S., at 442; Dawson Chemical Co. v. Rohm & Haas Co., 448 U. S. 176, 221 (1980); Henry v. A. B. Dick Co., supra, at 48.

The parties and many of the amici in this case think the key to resolving it is the Sony rule and, in particular, what it means for a product to be "capable of commercially significant noninfringing uses." Sony Corp. v. Universal City Studios, supra, at 442. MGM advances the argument that granting summary judgment to Grokster and StreamCast as to their current activities gave too much weight to the value of innovative technology, and too little to the copyrights infringed by users of their software, given that 90% of works available on one of the networks was shown to be copyrighted. Assuming the remaining 10% to be its noninfringing use, MGM says this should not qualify as "substantial," and the Court should quantify Sony to the extent of holding that a product used "principally" for infringement does not qualify. See Brief for Motion Picture Studio and Recording Company Petitioners 31. As mentioned before, Grokster and StreamCast reply by citing evidence that their software can be used to reproduce public domain works, and they point to copyright holders who actually encourage copying. Even if infringement is the principal practice with their software today, they argue, the noninfringing uses are significant and will grow.

We agree with MGM that the Court of Appeals misapplied Sony, which it read as limiting secondary liability quite beyond the circumstances to which the case applied. Sony barred secondary liability based on presuming or imputing intent to cause infringement solely from the design or distribution of a product capable of substantial lawful use, which the distributor knows is in fact used for infringement. The [545 U.S. 934] Ninth Circuit has read Sony's limitation to mean that whenever a product is capable of substantial lawful use, the producer can never be held contributorily liable for third parties' infringing use of it; it read the rule as being this broad, even when an actual purpose to cause infringing use is shown by evidence independent of design and distribution of the product, unless the distributors had "specific knowledge of infringement at a time at which they contributed to the infringement, and failed to act upon that information." 380 F. 3d, at 1162 (internal quotation marks and brackets omitted). Because the Circuit found the StreamCast and Grokster software capable of substantial lawful use, it concluded on the basis of its reading of Sony that neither company could be held liable, since there was no showing that their software, being without any central server, afforded them knowledge of specific unlawful uses.

This view of Sony, however, was error, converting the case from one about liability resting on imputed intent to one about liability on any theory. Because Sony did not displace other theories of secondary liability, and because we find below that it was error to grant summary judgment to the companies on MGM's inducement claim, we do not revisit Sony further, as MGM requests, to add a more quantified description of the point of balance between protection and commerce when liability rests solely on distribution with knowledge that unlawful use will occur. It is enough to note that the Ninth Circuit's judgment rested on an erroneous understanding of Sony and to leave further consideration of the Sony rule for a day when that may be required.

C

Sony's rule limits imputing culpable intent as a matter of law from the characteristics or uses of a distributed product. But nothing in Sony requires courts to ignore evidence of intent if there is such evidence, and the case was never meant to foreclose rules of fault-based liability derived from [545 U.S. 935] the common law.[10] Sony Corp. v. Universal City Studios, supra, at 439 ("If vicarious liability is to be imposed on Sony in this case, it must rest on the fact that it has sold equipment with constructive knowledge" of the potential for infringement). Thus, where evidence goes beyond a product's characteristics or the knowledge that it may be put to infringing uses, and shows statements or actions directed to promoting infringement, Sony's staple-article rule will not preclude liability.

The classic case of direct evidence of unlawful purpose occurs when one induces commission of infringement by another, or "entic[es] or persuad[es] another" to infringe, Black's Law Dictionary 790 (8th ed. 2004), as by advertising. Thus at common law a copyright or patent defendant who "not only expected but invoked [infringing use] by advertisement" was liable for infringement "on principles recognized in every part of the law." Kalem Co. v. Harper Brothers, 222 U. S., at 62-63 (copyright infringement). See also Henry v. A. B. Dick Co., 224 U. S., at 48-49 (contributory liability for patent infringement may be found where a good's "most conspicuous use is one which will coöperate in an infringement when sale to such user is invoked by advertisement" of the infringing use); Thomson-Houston Electric Co. v. Kelsey Electric R. Specialty Co., 75 F. 1005, 1007-1008 (CA2 1896) (relying on advertisements and displays to find defendant's "willingness . . . to aid other persons in any attempts which they may be disposed to make towards [patent] infringement"); Rumford Chemical Works v. Hecker, 20 F. Cas. 1342, 1346 (No. 12,133) (CC NJ 1876) (demonstrations of infringing activity along with "avowals of the [infringing] purpose and use for which it was made" supported liability for patent infringement).

[545 U.S. 936] The rule on inducement of infringement as developed in the early cases is no different today.[11] Evidence of "active steps . . . taken to encourage direct infringement," Oak Industries, Inc. v. Zenith Electronics Corp., 697 F. Supp. 988, 992 (ND Ill. 1988), such as advertising an infringing use or instructing how to engage in an infringing use, show an affirmative intent that the product be used to infringe, and a showing that infringement was encouraged overcomes the law's reluctance to find liability when a defendant merely sells a commercial product suitable for some lawful use, see, e. g., Water Technologies Corp. v. Calco, Ltd., 850 F. 2d 660, 668 (CA Fed. 1988) (liability for inducement where one "actively and knowingly aid[s] and abet[s] another's direct infringement" (emphasis deleted)); Fromberg, Inc. v. Thornhill, 315 F. 2d 407, 412-413 (CA5 1963) (demonstrations by sales staff of infringing uses supported liability for inducement); Haworth Inc. v. Herman Miller Inc., 37 USPQ 2d 1080, 1090 (WD Mich. 1994) (evidence that defendant "demonstrate[d] and recommend[ed] infringing configurations" of its product could support inducement liability); Sims v. Mack Trucks, Inc., 459 F. Supp. 1198, 1215 (ED Pa. 1978) (finding inducement where the use "depicted by the defendant in its promotional film and brochures infringes the . . . patent"), overruled on other grounds, 608 F. 2d 87 (CA3 1979). Cf. W. Keeton, D. Dobbs, R. Keeton, & D. Owen, Prosser and Keeton on Law of Torts 37 (5th ed. 1984) ("There is a definite tendency to impose greater responsibility upon a defendant whose conduct was intended to do harm, or was morally wrong").

For the same reasons that Sony took the staple-article doctrine of patent law as a model for its copyright safe-harbor rule, the inducement rule, too, is a sensible one for copyright. We adopt it here, holding that one who distributes a device with the object of promoting its use to infringe copyright, as [545 U.S. 937] shown by clear expression or other affirmative steps taken to foster infringement, is liable for the resulting acts of infringement by third parties. We are, of course, mindful of the need to keep from trenching on regular commerce or discouraging the development of technologies with lawful and unlawful potential. Accordingly, just as Sony did not find intentional inducement despite the knowledge of the VCR manufacturer that its device could be used to infringe, 464 U. S., at 439, n. 19, mere knowledge of infringing potential or of actual infringing uses would not be enough here to subject a distributor to liability. Nor would ordinary acts incident to product distribution, such as offering customers technical support or product updates, support liability in themselves. The inducement rule, instead, premises liability on purposeful, culpable expression and conduct, and thus does nothing to compromise legitimate commerce or discourage innovation having a lawful promise.

III

A

The only apparent question about treating MGM's evidence as sufficient to withstand summary judgment under the theory of inducement goes to the need on MGM's part to adduce evidence that StreamCast and Grokster communicated an inducing message to their software users. The classic instance of inducement is by advertisement or solicitation that broadcasts a message designed to stimulate others to commit violations. MGM claims that such a message is shown here. It is undisputed that StreamCast beamed onto the computer screens of users of Napster-compatible programs ads urging the adoption of its OpenNap program, which was designed, as its name implied, to invite the custom of patrons of Napster, then under attack in the courts for facilitating massive infringement. Those who accepted StreamCast's OpenNap program were offered software to perform the same services, which a factfinder could conclude [545 U.S. 938] would readily have been understood in the Napster market as the ability to download copyrighted music files. Grokster distributed an electronic newsletter containing links to articles promoting its software's ability to access popular copyrighted music. And anyone whose Napster or free file-sharing searches turned up a link to Grokster would have understood Grokster to be offering the same file-sharing ability as Napster, and to the same people who probably used Napster for infringing downloads; that would also have been the understanding of anyone offered Grokster's suggestively named Swaptor software, its version of OpenNap. And both companies communicated a clear message by responding affirmatively to requests for help in locating and playing copyrighted materials.

In StreamCast's case, of course, the evidence just described was supplemented by other unequivocal indications of unlawful purpose in the internal communications and advertising designs aimed at Napster users ("When the lights went off at Napster . . . where did the users go?" App. 836 (ellipsis in original)). Whether the messages were communicated is not to the point on this record. The function of the message in the theory of inducement is to prove by a defendant's own statements that his unlawful purpose disqualifies him from claiming protection (and incidentally to point to actual violators likely to be found among those who hear or read the message). See supra, at 935-937. Proving that a message was sent out, then, is the preeminent but not exclusive way of showing that active steps were taken with the purpose of bringing about infringing acts, and of showing that infringing acts took place by using the device distributed. Here, the summary judgment record is replete with other evidence that Grokster and StreamCast, unlike the manufacturer and distributor in Sony, acted with a purpose to cause copyright violations by use of software suitable for illegal use. See supra, at 924-927.

[545 U.S. 939] Three features of this evidence of intent are particularly notable. First, each company showed itself to be aiming to satisfy a known source of demand for copyright infringement, the market comprising former Napster users. StreamCast's internal documents made constant reference to Napster, it initially distributed its Morpheus software through an OpenNap program compatible with Napster, it advertised its OpenNap program to Napster users, and its Morpheus software functions as Napster did except that it could be used to distribute more kinds of files, including copyrighted movies and software programs. Grokster's name is apparently derived from Napster, it too initially offered an OpenNap program, its software's function is likewise comparable to Napster's, and it attempted to divert queries for Napster onto its own Web site. Grokster and StreamCast's efforts to supply services to former Napster users, deprived of a mechanism to copy and distribute what were overwhelmingly infringing files, indicate a principal, if not exclusive, intent on the part of each to bring about infringement.

Second, this evidence of unlawful objective is given added significance by MGM's showing that neither company attempted to develop filtering tools or other mechanisms to diminish the infringing activity using their software. While the Ninth Circuit treated the defendants' failure to develop such tools as irrelevant because they lacked an independent duty to monitor their users' activity, we think this evidence underscores Grokster's and StreamCast's intentional facilitation of their users' infringement.[12]

Third, there is a further complement to the direct evidence of unlawful objective. It is useful to recall that StreamCast [545 U.S. 940] and Grokster make money by selling advertising space, by directing ads to the screens of computers employing their software. As the record shows, the more the software is used, the more ads are sent out and the greater the advertising revenue becomes. Since the extent of the software's use determines the gain to the distributors, the commercial sense of their enterprise turns on high-volume use, which the record shows is infringing.[13] This evidence alone would not justify an inference of unlawful intent, but viewed in the context of the entire record its import is clear.

The unlawful objective is unmistakable.

B

In addition to intent to bring about infringement and distribution of a device suitable for infringing use, the inducement theory of course requires evidence of actual infringement by recipients of the device, the software in this case. As the account of the facts indicates, there is evidence of infringement on a gigantic scale, and there is no serious issue of the adequacy of MGM's showing on this point in order to survive the companies' summary judgment requests. Although [545 U.S. 941] an exact calculation of infringing use, as a basis for a claim of damages, is subject to dispute, there is no question that the summary judgment evidence is at least adequate to entitle MGM to go forward with claims for damages and equitable relief.

* * *

In sum, this case is significantly different from Sony and reliance on that case to rule in favor of StreamCast and Grokster was error. Sony dealt with a claim of liability based solely on distributing a product with alternative lawful and unlawful uses, with knowledge that some users would follow the unlawful course. The case struck a balance between the interests of protection and innovation by holding that the product's capability of substantial lawful employment should bar the imputation of fault and consequent secondary liability for the unlawful acts of others.

MGM's evidence in this case most obviously addresses a different basis of liability for distributing a product open to alternative uses. Here, evidence of the distributors' words and deeds going beyond distribution as such shows a purpose to cause and profit from third-party acts of copyright infringement. If liability for inducing infringement is ultimately found, it will not be on the basis of presuming or imputing fault, but from inferring a patently illegal objective from statements and actions showing what that objective was.

There is substantial evidence in MGM's favor on all elements of inducement, and summary judgment in favor of Grokster and StreamCast was error. On remand, reconsideration of MGM's motion for summary judgment will be in order.

The judgment of the Court of Appeals is vacated, and the case is remanded for further proceedings consistent with this opinion.

It is so ordered.

[545 U.S. 942] JUSTICE GINSBURG, with whom THE CHIEF JUSTICE and JUSTICE KENNEDY join, concurring.

I concur in the Court's decision, which vacates in full the judgment of the Court of Appeals for the Ninth Circuit, ante, at 941, and write separately to clarify why I conclude that the Court of Appeals misperceived, and hence misapplied, our holding in Sony Corp. of America v. Universal City Studios, Inc., 464 U. S. 417 (1984). There is here at least a "genuine issue as to [a] material fact," Fed. Rule Civ. Proc. 56(c), on the liability of Grokster or StreamCast, not only for actively inducing copyright infringement, but also, or alternatively, based on the distribution of their software products, for contributory copyright infringement. On neither score was summary judgment for Grokster and StreamCast warranted.

At bottom, however labeled, the question in this case is whether Grokster and StreamCast are liable for the direct infringing acts of others. Liability under our jurisprudence may be predicated on actively encouraging (or inducing) infringement through specific acts (as the Court's opinion develops) or on distributing a product distributees use to infringe copyrights, if the product is not capable of "substantial" or "commercially significant" noninfringing uses. Sony, 464 U. S., at 442; see also 3 M. Nimmer & D. Nimmer, Nimmer on Copyright § 12.04[A][2] (2005). While the two categories overlap, they capture different culpable behavior. Long coexisting, both are now codified in patent law. Compare 35 U. S. C. § 271(b) (active inducement liability) with § 271(c) (contributory liability for distribution of a product not "suitable for substantial noninfringing use").

In Sony, 464 U. S. 417, the Court considered Sony's liability for selling the Betamax videocassette recorder. It did so enlightened by a full trial record. Drawing an analogy to the staple article of commerce doctrine from patent law, [545 U.S. 943] the Sony Court observed that the "sale of an article . . . adapted to [a patent] infringing use" does not suffice "to make the seller a contributory infringer" if the article "is also adapted to other and lawful uses." Id., at 441 (quoting Henry v. A. B. Dick Co., 224 U. S. 1, 48 (1912), overruled on other grounds, Motion Picture Patents Co. v. Universal Film Mfg. Co., 243 U. S. 502, 517 (1917)).

"The staple article of commerce doctrine" applied to copyright, the Court stated, "must strike a balance between a copyright holder's legitimate demand for effective—not merely symbolic—protection of the statutory monopoly, and the rights of others freely to engage in substantially unrelated areas of commerce." Sony, 464 U. S., at 442. "Accordingly," the Court held, "the sale of copying equipment, like the sale of other articles of commerce, does not constitute contributory infringement if the product is widely used for legitimate, unobjectionable purposes. Indeed, it need merely be capable of substantial noninfringing uses." Ibid. Thus, to resolve the Sony case, the Court explained, it had to determine "whether the Betamax is capable of commercially significant noninfringing uses." Ibid.

To answer that question, the Court considered whether "a significant number of [potential uses of the Betamax were] noninfringing." Ibid. The Court homed in on one potential use—private, noncommercial time-shifting of television programs in the home (i. e., recording a broadcast TV program for later personal viewing). Time-shifting was noninfringing, the Court concluded, because in some cases trial testimony showed it was authorized by the copyright holder, id., at 443-447, and in others it qualified as legitimate fair use, id., at 447-455. Most purchasers used the Betamax principally to engage in time-shifting, id., at 421, 423, a use that "plainly satisfie[d]" the Court's standard, id., at 442. Thus, there was no need in Sony to "give precise content to the question of how much [actual or potential] use is commercially [545 U.S. 944] significant." Ibid.[14] Further development was left for later days and cases.

The Ninth Circuit went astray, I will endeavor to explain, when that court granted summary judgment to Grokster and StreamCast on the charge of contributory liability based on distribution of their software products. Relying on its earlier opinion in A&M Records, Inc. v. Napster, Inc., 239 F. 3d 1004 (CA9 2001), the Court of Appeals held that "if substantial noninfringing use was shown, the copyright owner would be required to show that the defendant had reasonable knowledge of specific infringing files." 380 F. 3d 1154, 1161 (CA9 2004). "A careful examination of the record," the [545 U.S. 945] court concluded, "indicates that there is no genuine issue of material fact as to noninfringing use." Ibid. The appeals court pointed to the band Wilco, which made one of its albums available for free downloading, to other recording artists who may have authorized free distribution of their music through the Internet, and to public domain literary works and films available through Grokster's and StreamCast's software. Ibid. Although it acknowledged petitioners' (hereinafter MGM) assertion that "the vast majority of the software use is for copyright infringement," the court concluded that Grokster's and StreamCast's proffered evidence met Sony's requirement that "a product need only be capable of substantial noninfringing uses." 380 F. 3d, at 1162.[15]

This case differs markedly from Sony. Cf. Peters, Brace Memorial Lecture: Copyright Enters the Public Domain, 51 J. Copyright Soc. 701, 724 (2004) ("The Grokster panel's reading of Sony is the broadest that any court has given it . . . ."). Here, there has been no finding of any fair use and little beyond anecdotal evidence of noninfringing uses. In finding the Grokster and StreamCast software products capable of substantial noninfringing uses, the District Court and the Court of Appeals appear to have relied largely on declarations submitted by the defendants. These declarations include assertions (some of them hearsay) that a number of copyright owners authorize distribution of their works on the Internet and that some public domain material is available through peer-to-peer networks including those accessed through Grokster's and StreamCast's software. 380 F. 3d, at 1161; 259 F. Supp. 2d 1029, 1035-1036 (CD Cal. 2003); App. 125-171.

[545 U.S. 946] The District Court declared it "undisputed that there are substantial noninfringing uses for Defendants' software," thus obviating the need for further proceedings. 259 F. Supp. 2d, at 1035. This conclusion appears to rest almost entirely on the collection of declarations submitted by Grokster and StreamCast. Ibid. Review of these declarations reveals mostly anecdotal evidence, sometimes obtained secondhand, of authorized copyrighted works or public domain works available online and shared through peer-to-peer networks, and general statements about the benefits of peer-to-peer technology. See, e. g., Decl. of Janis Ian ¶ 13, App. 128 ("P2P technologies offer musicians an alternative channel for promotion and distribution."); Decl. of Gregory Newby ¶ 12, id., at 136 ("Numerous authorized and public domain Project Gutenberg eBooks are made available on Morpheus, Kazaa, Gnutella, Grokster, and similar software products."); Decl. of Aram Sinnreich ¶ 6, id., at 151 ("file sharing seems to have a net positive impact on music sales"); Decl. of John Busher ¶ 8, id., at 166 ("I estimate that Acoustica generates sales of between $1,000 and $10,000 per month as a result of the distribution of its trialware software through the Gnutella and FastTrack Networks."); Decl. of Patricia D. Hoekman ¶¶ 3-4, id., at 169-170 (search on Morpheus for "President Bush speeches" found several video recordings, searches for "Declaration of Independence" and "Bible" found various documents and declarant was able to download a copy of the Declaration); Decl. of Sean L. Mayers ¶ 11, id., at 67 ("Existing open, decentralized peer-to-peer file-sharing networks . . . offer content owners distinct business advantages over alternate online distribution technologies."). Compare Decl. of Brewster Kahle ¶ 20, id., at 142 ("Those who download the Prelinger films . . . are entitled to redistribute those files, and the Archive welcomes their redistribution by the Morpheus-Grokster-KaZaa community of users."), with Deposition of Brewster Kahle (Sept. 18, [545 U.S. 947] 2002), id., at 396-403 (testifying that he has no knowledge of any person downloading a Prelinger film using Morpheus, Grokster, or KaZaA). Compare also Decl. of Richard Prelinger ¶ 17, id., at 147 ("[W]e welcome further redistribution of the Prelinger films . . . by individuals using peer-to-peer software products like Morpheus, KaZaA and Grokster."), with Deposition of Richard Prelinger (Oct. 1, 2002), id., at 410-411 ("Q. What is your understanding of Grokster? A. I have no understanding of Grokster. . . . Q. Do you know whether any user of the Grokster software has made available to share any Prelinger film? A. No."). See also Deposition of Aram Sinnreich (Sept. 25, 2002), id., at 390 (testimony about the band Wilco based on "[t]he press and industry news groups and scuttlebutt."). These declarations do not support summary judgment in the face of evidence, proffered by MGM, of overwhelming use of Grokster's and StreamCast's software for infringement.[16]

[545 U.S. 948] Even if the absolute number of noninfringing files copied using the Grokster and StreamCast software is large, it does not follow that the products are therefore put to substantial noninfringing uses and are thus immune from liability. The number of noninfringing copies may be reflective of, and dwarfed by, the huge total volume of files shared. Further, the District Court and the Court of Appeals did not sharply distinguish between uses of Grokster's and StreamCast's software products (which this case is about) and uses of peer-to-peer technology generally (which this case is not about).

In sum, when the record in this case was developed, there was evidence that Grokster's and StreamCast's products were, and had been for some time, overwhelmingly used to infringe, ante, at 922-924; App. 434-439, 476-481, and that this infringement was the overwhelming source of revenue from the products, ante, at 925-926; 259 F. Supp. 2d, at 1043-1044. Fairly appraised, the evidence was insufficient to demonstrate, beyond genuine debate, a reasonable prospect that substantial or commercially significant noninfringing uses were likely to develop over time. On this record, the District Court should not have ruled dispositively on the contributory infringement charge by granting summary judgment to Grokster and StreamCast.[17]

If, on remand, the case is not resolved on summary judgment in favor of MGM based on Grokster and StreamCast actively inducing infringement, the Court of Appeals, I [545 U.S. 949] would emphasize, should reconsider, on a fuller record, its interpretation of Sony's product distribution holding.

---------------

JUSTICE BREYER, with whom JUSTICE STEVENS and JUSTICE O'CONNOR join, concurring.

I agree with the Court that the distributor of a dual-use technology may be liable for the infringing activities of third parties where he or she actively seeks to advance the infringement. Ante, at 919. I further agree that, in light of our holding today, we need not now "revisit" Sony Corp. of America v. Universal City Studios, Inc., 464 U. S. 417 (1984). Ante, at 934. Other Members of the Court, however, take up the Sony question: whether Grokster's product is "capable of `substantial' or `commercially significant' noninfringing uses." Ante, at 942 (GINSBURG, J., concurring) (quoting Sony, supra, at 442). And they answer that question by stating that the Court of Appeals was wrong when it granted summary judgment on the issue in Grokster's favor. Ante, at 944. I write to explain why I disagree with them on this matter.

I

The Court's opinion in Sony and the record evidence (as described and analyzed in the many briefs before us) together convince me that the Court of Appeals' conclusion has adequate legal support.

A

I begin with Sony's standard. In Sony, the Court considered the potential copyright liability of a company that did not itself illegally copy protected material, but rather sold a machine—a videocassette recorder (VCR)—that could be used to do so. A buyer could use that machine for non-infringing purposes, such as recording for later viewing (sometimes called "`time-shifting,'" Sony, 464 U. S., at 421) uncopyrighted television programs or copyrighted programs with a copyright holder's permission. The buyer could use [545 U.S. 950] the machine for infringing purposes as well, such as building libraries of taped copyrighted programs. Or, the buyer might use the machine to record copyrighted programs under circumstances in which the legal status of the act of recording was uncertain (i. e., where the copying may, or may not, have constituted a "fair use," id., at 425-426). Sony knew many customers would use its VCRs to engage in unauthorized copying and "`library-building.'" Id., at 458-459 (Blackmun, J., dissenting). But that fact, said the Court, was insufficient to make Sony itself an infringer. And the Court ultimately held that Sony was not liable for its customers' acts of infringement.

In reaching this conclusion, the Court recognized the need for the law, in fixing secondary copyright liability, to "strike a balance between a copyright holder's legitimate demand for effective—not merely symbolic—protection of the statutory monopoly, and the rights of others freely to engage in substantially unrelated areas of commerce." Id., at 442. It pointed to patent law's "staple article of commerce" doctrine, ibid., under which a distributor of a product is not liable for patent infringement by its customers unless that product is "unsuited for any commercial noninfringing use." Dawson Chemical Co. v. Rohm & Haas Co., 448 U. S. 176, 198 (1980). The Court wrote that the sale of copying equipment, "like the sale of other articles of commerce, does not constitute contributory infringement if the product is widely used for legitimate, unobjectionable purposes. Indeed, it need merely be capable of substantial noninfringing uses." Sony, 464 U. S., at 442 (emphasis added). The Court ultimately characterized the legal "question" in the particular case as "whether [Sony's VCR] is capable of commercially significant noninfringing uses" (while declining to give "precise content" to these terms). Ibid. (emphasis added).

It then applied this standard. The Court had before it a survey (commissioned by the District Court and then prepared by the respondents) showing that roughly 9% of all [545 U.S. 951] VCR recordings were of the type—namely, religious, educational, and sports programming—owned by producers and distributors testifying on Sony's behalf who did not object to time-shifting. See Brief for Respondents, O. T. 1983, No. 81-1687, pp. 52-53; see also Sony, supra, at 424 (7.3% of all Sony VCR use is to record sports programs; representatives of the sports leagues do not object). A much higher percentage of VCR users had at one point taped an authorized program, in addition to taping unauthorized programs. And the plaintiffs—not a large class of content providers as in this case—owned only a small percentage of the total available unauthorized programming. See ante, at 947, n. 3 (GINSBURG, J., concurring). But of all the taping actually done by Sony's customers, only around 9% was of the sort the Court referred to as authorized.

The Court found that the magnitude of authorized programming was "significant," and it also noted the "significant potential for future authorized copying." 464 U. S., at 444. The Court supported this conclusion by referencing the trial testimony of professional sports league officials and a religious broadcasting representative. Id., at 444, and n. 24. It also discussed (1) a Los Angeles educational station affiliated with the Public Broadcasting Service that made many of its programs available for home taping, and (2) Mr. Rogers' Neighborhood, a widely watched children's program. Id., at 445. On the basis of this testimony and other similar evidence, the Court determined that producers of this kind had authorized duplication of their copyrighted programs "in significant enough numbers to create a substantial market for a noninfringing use of the" VCR. Id., at 447, n. 28 (emphasis added).

The Court, in using the key word "substantial," indicated that these circumstances alone constituted a sufficient basis for rejecting the imposition of secondary liability. See id., at 456 ("Sony demonstrated a significant likelihood that substantial numbers of copyright holders" would not object [545 U.S. 952] to time-shifting (emphasis added)). Nonetheless, the Court buttressed its conclusion by finding separately that, in any event, un-authorized time-shifting often constituted not infringement, but "fair use." Id., at 447-456.

B

When measured against Sony's underlying evidence and analysis, the evidence now before us shows that Grokster passes Sony's test—that is, whether the company's product is capable of substantial or commercially significant noninfringing uses. Id., at 442. For one thing, petitioners' (hereinafter MGM) own expert declared that 75% of current files available on Grokster are infringing and 15% are "likely infringing." See App. 436-439, ¶¶ 6-17 (Decl. of Dr. Ingram Olkin); cf. ante, at 922 (opinion of the Court). That leaves some number of files near 10% that apparently are noninfringing, a figure very similar to the 9% or so of authorized time-shifting uses of the VCR that the Court faced in Sony.

As in Sony, witnesses here explained the nature of the noninfringing files on Grokster's network without detailed quantification. Those files include:

—Authorized copies of music by artists such as Wilco, Janis Ian, Pearl Jam, Dave Matthews, John Mayer, and others. See App. 152-153, ¶¶ 9-13 (Decl. of Aram Sinnreich) (Wilco's "lesson has already been adopted by artists still signed to their major labels"); id., at 170, ¶¶ 5-7 (Decl. of Patricia D. Hoekman) (locating "numerous audio recordings" that were authorized for swapping); id., at 74, ¶ 10 (Decl. of Daniel B. Rung) (describing Grokster's partnership with a company that hosts music from thousands of independent artists)

—Free electronic books and other works from various online publishers, including Project Gutenberg. See id., at 136, ¶ 12 (Decl. of Gregory Newby) ("Numerous authorized and public domain Project Gutenberg eBooks are made available" on Grokster. Project Gutenberg "welcomes this widespread [545 U.S. 953] sharing . . . using these software products[,] since they assist us in meeting our objectives"); id., at 159-160, ¶ 32 (Decl. of Sinnreich)

—Public domain and authorized software, such as WinZip 8.1. Id., at 170, ¶ 8 (Decl. of Hoekman); id., at 165, ¶¶ 4-7 (Decl. of John Busher)

—Licensed music videos and television and movie segments distributed via digital video packaging with the permission of the copyright holder. Id., at 70, ¶ 24 (Decl. of Sean L. Mayers).

The nature of these and other lawfully swapped files is such that it is reasonable to infer quantities of current lawful use roughly approximate to those at issue in Sony. At least, MGM has offered no evidence sufficient to survive summary judgment that could plausibly demonstrate a significant quantitative difference. See ante, at 922 (opinion of the Court); see also Brief for Motion Picture Studio and Recording Company Petitioners i (referring to "at least 90% of the total use of the services"); but see ante, at 947, n. 3 (GINSBURG, J., concurring). To be sure, in quantitative terms these uses account for only a small percentage of the total number of uses of Grokster's product. But the same was true in Sony, which characterized the relatively limited authorized copying market as "substantial." (The Court made clear as well in Sony that the amount of material then presently available for lawful copying—if not actually copied— was significant, see 464 U. S., at 444, and the same is certainly true in this case.)

Importantly, Sony also used the word "capable," asking whether the product is "capable of" substantial noninfringing uses. Its language and analysis suggest that a figure like 10%, if fixed for all time, might well prove insufficient, but that such a figure serves as an adequate foundation where there is a reasonable prospect of expanded legitimate uses over time. See ibid. (noting a "significant potential for future authorized copying"). And its language also indicates [545 U.S. 954] the appropriateness of looking to potential future uses of the product to determine its "capability."

Here the record reveals a significant future market for noninfringing uses of Grokster-type peer-to-peer software. Such software permits the exchange of any sort of digital file—whether that file does, or does not, contain copyrighted material. As more and more uncopyrighted information is stored in swappable form, it seems a likely inference that lawful peer-to-peer sharing will become increasingly prevalent. See, e. g., App. 142, ¶ 20 (Decl. of Brewster Kahle) ("[T]he [Internet Archive] welcomes [the] redistribution [of authorized films] by the Morpheus-Grokster-KaZaa community of users"); id., at 166, ¶ 8 (Decl. of Busher) (sales figures of $1,000 to $10,000 per month through peer-to-peer networks "will increase in the future as Acoustica's trialware is more widely distributed through these networks"); id., at 156-163, ¶¶ 21-40 (Decl. of Sinnreich).

And that is just what is happening. Such legitimate noninfringing uses are coming to include the swapping of: research information (the initial purpose of many peer-to-peer networks); public domain films (e. g., those owned by the Prelinger Archive); historical recordings and digital educational materials (e. g., those stored on the Internet Archive); digital photos (OurPictures, for example, is starting a P2P photo-swapping service); "shareware" and "freeware" (e. g., Linux and certain Windows software); secure licensed music and movie files (Intent MediaWorks, for example, protects licensed content sent across P2P networks); news broadcasts past and present (the BBC Creative Archive lets users "rip, mix and share the BBC"); user-created audio and video files (including "podcasts" that may be distributed through P2P software); and all manner of free "open content" works collected by Creative Commons (one can search for Creative Commons material on StreamCast). See Brief for Distributed Computing Industry Association as Amicus Curiae 15-26; Merges, A New Dynamism in the Public Domain, 71 [545 U.S. 955] U. Chi. L. Rev. 183 (2004). I can find nothing in the record that suggests that this course of events will not continue to flow naturally as a consequence of the character of the software taken together with the foreseeable development of the Internet and of information technology. Cf. ante, at 920 (opinion of the Court) (discussing the significant benefits of peer-to-peer technology).

There may be other now-unforeseen noninfringing uses that develop for peer-to-peer software, just as the homevideo rental industry (unmentioned in Sony) developed for the VCR. But the foreseeable development of such uses, when taken together with an estimated 10% noninfringing material, is sufficient to meet Sony's standard. And while Sony considered the record following a trial, there are no facts asserted by MGM in its summary judgment filings that lead me to believe the outcome after a trial here could be any different. The lower courts reached the same conclusion.

Of course, Grokster itself may not want to develop these other noninfringing uses. But Sony's standard seeks to protect not the Groksters of this world (which in any event may well be liable under today's holding), but the development of technology more generally. And Grokster's desires in this respect are beside the point.

II

The real question here, I believe, is not whether the record evidence satisfies Sony. As I have interpreted the standard set forth in that case, it does. And of the Courts of Appeals that have considered the matter, only one has proposed interpreting Sony more strictly than I would do—in a case where the product might have failed under any standard. In re Aimster Copyright Litigation, 334 F. 3d 643, 653 (CA7 2003) (defendant "failed to show that its service is ever used for any purpose other than to infringe" copyrights (emphasis added)); see Matthew Bender & Co. v. West Pub. Co., 158 [545 U.S. 956] F. 3d 693, 706-707 (CA2 1998) (court did not require that noninfringing uses be "predominant," it merely found that they were predominant, and therefore provided no analysis of Sony's boundaries); but see ante, at 944, n. 1 (GINSBURG, J., concurring); see also A&M Records, Inc. v. Napster, Inc., 239 F. 3d 1004, 1020 (CA9 2001) (discussing Sony); Cable/Home Communication Corp. v. Network Productions, Inc., 902 F. 2d 829, 842-847 (CA11 1990) (same); Vault Corp. v. Quaid Software, Ltd., 847 F. 2d 255, 262 (CA5 1988) (same); cf. Dynacore Holdings Corp. v. U. S. Philips Corp., 363 F. 3d 1263, 1275 (CA Fed. 2004) (same); see also Doe v. GTE Corp., 347 F. 3d 655, 661 (CA7 2003) ("A person may be liable as a contributory infringer if the product or service it sells has no (or only slight) legal use").

Instead, the real question is whether we should modify the Sony standard, as MGM requests, or interpret Sony more strictly, as I believe JUSTICE GINSBURG'S approach would do in practice. Compare ante, at 944-948 (concurring opinion) (insufficient evidence in this case of both present lawful uses and of a reasonable prospect that substantial noninfringing uses would develop over time), with Sony, 464 U. S., at 442-447 (basing conclusion as to the likely existence of a substantial market for authorized copying upon general declarations, some survey data, and common sense).

As I have said, Sony itself sought to "strike a balance between a copyright holder's legitimate demand for effective— not merely symbolic—protection of the statutory monopoly, and the rights of others freely to engage in substantially unrelated areas of commerce." Id., at 442. Thus, to determine whether modification, or a strict interpretation, of Sony is needed, I would ask whether MGM has shown that Sony incorrectly balanced copyright and new-technology interests. In particular: (1) Has Sony (as I interpret it) worked to protect new technology? (2) If so, would modification or strict interpretation significantly weaken that protection? (3) If [545 U.S. 957] so, would new or necessary copyright-related benefits outweigh any such weakening?

A

The first question is the easiest to answer. Sony's rule, as I interpret it, has provided entrepreneurs with needed assurance that they will be shielded from copyright liability as they bring valuable new technologies to market.

Sony's rule is clear. That clarity allows those who develop new products that are capable of substantial noninfringing uses to know, ex ante, that distribution of their product will not yield massive monetary liability. At the same time, it helps deter them from distributing products that have no other real function than—or that are specifically intended for—copyright infringement, deterrence that the Court's holding today reinforces (by adding a weapon to the copyright holder's legal arsenal).

Sony's rule is strongly technology protecting. The rule deliberately makes it difficult for courts to find secondary liability where new technology is at issue. It establishes that the law will not impose copyright liability upon the distributors of dual-use technologies (who do not themselves engage in unauthorized copying) unless the product in question will be used almost exclusively to infringe copyrights (or unless they actively induce infringements as we today describe). Sony thereby recognizes that the copyright laws are not intended to discourage or to control the emergence of new technologies, including (perhaps especially) those that help disseminate information and ideas more broadly or more efficiently. Thus Sony's rule shelters VCRs, typewriters, tape recorders, photocopiers, computers, cassette players, compact disc burners, digital video recorders, MP3 players, Internet search engines, and peer-to-peer software. But Sony's rule does not shelter descramblers, even if one could theoretically use a descrambler in a noninfringing way. 464 [545 U.S. 958] U. S., at 441-442. Compare Cable/Home Communication Corp., supra, at 837-850 (developer liable for advertising television signal descrambler), with Vault Corp., supra, at 262 (primary use infringing but a substantial noninfringing use).

Sony's rule is forward looking. It does not confine its scope to a static snapshot of a product's current uses (thereby threatening technologies that have undeveloped future markets). Rather, as the VCR example makes clear, a product's market can evolve dramatically over time. And Sony—by referring to a capacity for substantial noninfringing uses—recognizes that fact. Sony's word "capable" refers to a plausible, not simply a theoretical, likelihood that such uses will come to pass, and that fact anchors Sony in practical reality. Cf. Aimster, 334 F. 3d, at 651.

Sony's rule is mindful of the limitations facing judges where matters of technology are concerned. Judges have no specialized technical ability to answer questions about present or future technological feasibilility or commercial viability where technology professionals, engineers, and venture capitalists themselves may radically disagree and where answers may differ depending upon whether one focuses upon the time of product development or the time of distribution. Consider, for example, the question whether devices can be added to Grokster's software that will filter out infringing files. MGM tells us this is easy enough to do, as do several amici that produce and sell the filtering technology. See, e. g., Brief for Motion Picture Studio and Recording Company Petitioners 11; Brief for Audible Magic Corp. et al. as Amici Curiae 3-10. Grokster says it is not at all easy to do, and not an efficient solution in any event, and several apparently disinterested computer science professors agree. See Brief for Respondents 31; Brief for Computer Science Professor Harold Abelson et al. as Amici Curiae 6-10, 14-18. Which account should a judge credit? Sony says that the judge will not necessarily have to decide.

[545 U.S. 959] Given the nature of the Sony rule, it is not surprising that in the last 20 years, there have been relatively few contributory infringement suits—based on a product distribution theory—brought against technology providers (a small handful of federal appellate court cases and perhaps fewer than two dozen District Court cases in the last 20 years). I have found nothing in the briefs or the record that shows that Sony has failed to achieve its innovation-protecting objective.

B

The second, more difficult, question is whether a modified Sony rule (or a strict interpretation) would significantly weaken the law's ability to protect new technology. JUSTICE GINSBURG'S approach would require defendants to produce considerably more concrete evidence—more than was presented here—to earn Sony's shelter. That heavier evidentiary demand, and especially the more dramatic (case-by-case balancing) modifications that MGM and the Government seek, would, I believe, undercut the protection that Sony now offers.

To require defendants to provide, for example, detailed evidence—say, business plans, profitability estimates, projected technological modifications, and so forth—would doubtless make life easier for copyright holder plaintiffs. But it would simultaneously increase the legal uncertainty that surrounds the creation or development of a new technology capable of being put to infringing uses. Inventors and entrepreneurs (in the garage, the dorm room, the corporate lab, or the boardroom) would have to fear (and in many cases endure) costly and extensive trials when they create, produce, or distribute the sort of information technology that can be used for copyright infringement. They would often be left guessing as to how a court, upon later review of the product and its uses, would decide when necessarily rough estimates amounted to sufficient evidence. They would have no way to predict how courts would weigh the respective [545 U.S. 960] values of infringing and noninfringing uses; determine the efficiency and advisability of technological changes; or assess a product's potential future markets. The price of a wrong guess—even if it involves a good-faith effort to assess technical and commercial viability—could be large statutory damages (not less than $750 and up to $30,000 per infringed work). 17 U. S. C. § 504(c)(1). The additional risk and uncertainty would mean a consequent additional chill of technological development.

C

The third question—whether a positive copyright impact would outweigh any technology-related loss—I find the most difficult of the three. I do not doubt that a more intrusive Sony test would generally provide greater revenue security for copyright holders. But it is harder to conclude that the gains on the copyright swings would exceed the losses on the technology roundabouts.

For one thing, the law disfavors equating the two different kinds of gain and loss; rather, it leans in favor of protecting technology. As Sony itself makes clear, the producer of a technology which permits unlawful copying does not himself engage in unlawful copying—a fact that makes the attachment of copyright liability to the creation, production, or distribution of the technology an exceptional thing. See 464 U. S., at 431 (courts "must be circumspect" in construing the copyright laws to preclude distribution of new technologies). Moreover, Sony has been the law for some time. And that fact imposes a serious burden upon copyright holders like MGM to show a need for change in the current rules of the game, including a more strict interpretation of the test. See, e. g., Brief for Motion Picture Studio and Recording Company Petitioners 31 (Sony should not protect products when the "primary or principal" use is infringing).

In any event, the evidence now available does not, in my view, make out a sufficiently strong case for change. To say [545 U.S. 961] this is not to doubt the basic need to protect copyrighted material from infringement. The Constitution itself stresses the vital role that copyright plays in advancing the "useful Arts." Art. I, § 8, cl. 8. No one disputes that "reward to the author or artist serves to induce release to the public of the products of his creative genius." United States v. Paramount Pictures, Inc., 334 U. S. 131, 158 (1948). And deliberate unlawful copying is no less an unlawful taking of property than garden-variety theft. See, e. g., 18 U. S. C. § 2319 (2000 ed. and Supp. II) (criminal copyright infringement); § 1961(1)(B) (2000 ed., Supp. II) (copyright infringement can be a predicate act under the Racketeer Influenced and Corrupt Organizations Act); § 1956(c)(7)(D) (2000 ed., Supp. II) (money laundering includes the receipt of proceeds from copyright infringement). But these highly general principles cannot by themselves tell us how to balance the interests at issue in Sony or whether Sony's standard needs modification. And at certain key points, information is lacking.

Will an unmodified Sony lead to a significant diminution in the amount or quality of creative work produced? Since copyright's basic objective is creation and its revenue objectives but a means to that end, this is the underlying copyright question. See Twentieth Century Music Corp. v. Aiken, 422 U. S. 151, 156 (1975) ("Creative work is to be encouraged and rewarded, but private motivation must ultimately serve the cause of promoting broad public availability of literature, music, and the other arts"). And its answer is far from clear.

Unauthorized copying likely diminishes industry revenue, though it is not clear by how much. Compare S. Liebowitz, Will MP3 Downloads Annihilate the Record Industry? The Evidence So Far 2 (June 2003), http://www.utdallas.edu/~liebowit/intprop/records.pdf (all Internet materials as visited June 24, 2005, and available in Clerk of Court's case file)

[545 U.S. 962] (file sharing has caused a decline in music sales), and Press Release, Informa Telecoms & Media, Steady Download Growth Defies P2P (Dec. 6, 2004), http://www.informatm.com (citing Informa Media Group Report, Music on the Internet (5th ed. 2004)) (estimating total lost sales to the music industry in the range of $2 billion annually), with F. Oberholzer & K. Strumpf, The Effect of File Sharing on Record Sales: An Empirical Analysis 24 (Mar. 2004), www.unc.edu/~cigar/papers/FileSharing_March2004.pdf (academic study concluding that "file sharing has no statistically significant effect on purchases of the average album"), and D. McGuire, Study: File-Sharing No Threat to Music Sales (Mar. 29, 2004), http://www.washingtonpost.com/ac2/wp-dyn/A34300-2004Mar29?language=printer (discussing mixed evidence).

The extent to which related production has actually and resultingly declined remains uncertain, though there is good reason to believe that the decline, if any, is not substantial. See, e. g., M. Madden, Pew Internet & American Life Project, Artists, Musicians, and the Internet 21 (Dec. 5, 2004), http://www.pewinternet.org/pdfs/PIP_Artists. Musicians_Report.pdf (nearly 70% of musicians believe that file sharing is a minor threat or no threat at all to creative industries); Benkler, Sharing Nicely: On Shareable Goods and the Emergence of Sharing as a Modality of Economic Production, 114 Yale L. J. 273, 351-352 (2004) ("Much of the actual flow of revenue to artists—from performances and other sources—is stable even assuming a complete displacement of the CD market by peer-to-peer distribution . . . . [I]t would be silly to think that music, a cultural form without which no human society has existed, will cease to be in our world [because of illegal file swapping]").

More importantly, copyright holders at least potentially have other tools available to reduce piracy and to abate whatever threat it poses to creative production. As today's opinion makes clear, a copyright holder may proceed against [545 U.S. 963] a technology provider where a provable specific intent to infringe (of the kind the Court describes) is present. Ante, at 941. Services like Grokster may well be liable under an inducement theory.

In addition, a copyright holder has always had the legal authority to bring a traditional infringement suit against one who wrongfully copies. Indeed, since September 2003, the Recording Industry Association of America (RIAA) has filed "thousands of suits against people for sharing copyrighted material." Walker, New Movement Hits Universities: Get Legal Music, Washington Post, Mar. 17, 2005, p. E1. These suits have provided copyright holders with damages; have served as a teaching tool, making clear that much file sharing, if done without permission, is unlawful; and apparently have had a real and significant deterrent effect. See, e. g., L. Rainie, M. Madden, D. Hess, & G. Mudd, Pew Internet Project and comScore Media Metrix Data Memo: The state of music downloading and file-sharing online 2, 4, 6, 10 (Apr. 2004), http://www.pewinternet.org/pdfs/PIP_Filesharing_April_04.pdf (number of people downloading files fell from a peak of roughly 35 million to roughly 23 million in the year following the first suits; 38% of current downloaders report downloading fewer files because of the suits); M. Madden & L. Rainie, Pew Internet Project Data Memo: Music and video downloading moves beyond P2P, p. 7 (Mar. 2005), http://www. pewinternet.org/pdfs/PIP_Filesharing_March05.pdf (number of downloaders has "inched up" but "continues to rest well below the peak level"); Note, Costs and Benefits of the Recording Industry's Litigation Against Individuals, 20 Berkeley Tech. L. J. 571 (2005); but see Evangelista, File Sharing; Downloading Music and Movie Files is as Popular as Ever, San Francisco Chronicle, Mar. 28, 2005, p. E1 (referring to the continuing "tide of rampant copyright infringement," while noting that the RIAA says it believes the "campaign of lawsuits and public education has at least contained the problem").

[545 U.S. 964] Further, copyright holders may develop new technological devices that will help curb unlawful infringement. Some new technology, called "digital `watermarking'" and "digital fingerprint[ing]," can encode within the file information about the author and the copyright scope and date, which "fingerprints" can help to expose infringers. RIAA Reveals Method to Madness, Wired News (Aug. 28, 2003), http:// www.wired.com/news/digiwood/0,1412,60222,00.html; Besek, Anti-Circumvention Laws and Copyright: A Report from the Kernochan Center for Law, Media and the Arts, 27 Colum. J. L. & Arts 385, 391, 451 (2004). Other technology can, through encryption, potentially restrict users' ability to make a digital copy. See J. Borland, Tripping the Rippers, C/net News.com (Sept. 28, 2001), http://news.com.com/ Tripping+the+rippers/2009-1023_3-273619.html; but see Brief for Bridgemar Services, Ltd. d/b/a iMesh.com as Amicus Curiae 5-8 (arguing that peer-to-peer service providers can more easily block unlawful swapping).

At the same time, advances in technology have discouraged unlawful copying by making lawful copying (e. g., downloading music with the copyright holder's permission) cheaper and easier to achieve. Several services now sell music for less than $1 per song. (Walmart.com, for example, charges $0.88 each.) Consequently, many consumers initially attracted to the convenience and flexibility of services like Grokster are now migrating to lawful paid services (services with copying permission) where they can enjoy at little cost even greater convenience and flexibility without engaging in unlawful swapping. See Wu, When Code Isn't Law, 89 Va. L. Rev. 679, 731-735 (2003) (noting the prevalence of technological problems on unpaid swapping sites); K. Dean, P2P Tilts Toward Legitimacy, Wired News (Nov. 24, 2004), http://www.wired.com/news/ digiwood/0,1412,65836,00.html; Madden & Rainie, March 2005 Data Memo, supra, at 6-8 (percentage of current downloaders who have used paid services rose from 24% to 43% in a year; number using free services fell from 58% to 41%).

[545 U.S. 965] Thus, lawful music downloading services—those that charge the customer for downloading music and pay royalties to the copyright holder—have continued to grow and to produce substantial revenue. See Brief for Internet Law Faculty as Amicus Curiae 5-20; Bruno, Digital Entertainment: Piracy Fight Shows Encouraging Signs (Mar. 5, 2005), available at LEXIS, News Library, Billboard File (in 2004, consumers worldwide purchased more than 10 times the number of digital tracks purchased in 2003; global digital music market of $330 million in 2004 expected to double in 2005); Press Release, Informa Telecoms & Media, Steady Download Growth Defies P2P (global digital revenues will likely exceed $3 billion in 2010); Ashton, [International Federation of the Phonographic Industry] Predicts Downloads Will Hit the Mainstream, Music Week, Jan. 29, 2005, p. 6 (legal music sites and portable MP3 players "are helping to transform the digital music market" into "an everyday consumer experience"). And more advanced types of non-music-oriented peer-to-peer networks have also started to develop, drawing in part on the lessons of Grokster.

Finally, as Sony recognized, the legislative option remains available. Courts are less well suited than Congress to the task of "accommodat[ing] fully the varied permutations of competing interests that are inevitably implicated by such new technology." Sony, 464 U. S., at 431; see, e. g., Audio Home Recording Act of 1992, 106 Stat. 4237 (adding 17 U. S. C., ch. 10); Protecting Innovation and Art While Preventing Piracy: Hearing before the Senate Committee on the Judiciary, 108th Cong., 2d Sess. (2004).

I do not know whether these developments and similar alternatives will prove sufficient, but I am reasonably certain that, given their existence, a strong demonstrated need for modifying Sony (or for interpreting Sony's standard more strictly) has not yet been shown. That fact, along with the added risks that modification (or strict interpretation) would impose upon technological innovation, leads me to the conclusion that we should maintain Sony, reading its standard as I [545 U.S. 966] have read it. As so read, it requires affirmance of the Ninth Circuit's determination of the relevant aspects of the Sony question.

* * *

For these reasons, I disagree with JUSTICE GINSBURG, but I agree with the Court and join its opinion.

Notes:

[*] Briefs of amici curiae urging reversal were filed for the State of Utah et al. by Mark Shurtleff, Attorney General of Utah, and by the Attorneys General for their respective jurisdictions as follows: Troy King of Alabama, Gregg Renkes of Alaska, Terry Goddard of Arizona, Mike Beebe of Arkansas, M. Jane Brady of Delaware, Charles J. Crist, Jr., of Florida, Thurbert E. Baker of Georgia, Douglas B. Moylan of Guam, Mark J. Bennett of Hawaii, Lawrence G. Wasden of Idaho, Lisa Madigan of Illinois, Steve Carter of Indiana, Phill Kline of Kansas, Gregory D. Stumbo of Kentucky, Charles C. Foti, Jr., of Louisiana, Thomas F. Reilly of Massachusetts, Michael A. Cox of Michigan, Mike Hatch of Minnesota, Jim Hood of Mississippi, Jeremiah W. (Jay) Nixon of Missouri, Mike McGrath of Montana, Jon Bruning of Nebraska, Brian Sandoval of Nevada, Peter C. Harvey of New Jersey, Patricia A. Madrid of New Mexico, Roy Cooper of North Carolina, Wayne Stenehjem of North Dakota, Jim Petro of Ohio, W. A. Drew Edmondson of Oklahoma, Thomas W. Corbett, Jr., of Pennsylvania, Patrick Lynch of Rhode Island, Henry McMaster of South Carolina, Lawrence E. Long of South Dakota, Paul G. Summers of Tennessee, Greg Abbott of Texas, William H. Sorrell of Vermont, Jerry Kilgore of Virginia, Darrell V. McGraw, Jr., of West Virginia, and Peg Lautenschlager of Wisconsin; for the American Federation of Musicians of the United States and Canada et al. by George H. Cohen, Patricia Polach, and Laurence Gold; for the American Society of Composers, Authors and Publishers et al. by I. Fred Koenigsberg, Michael E. Salzman, and Marvin L. Berenson; for Americans for Tax Reform by Carter G. Phillips, Alan Charles Raul, Jay T. Jorgensen, and Eric A. Shumsky; for the Commissioner of Baseball et al. by Robert Alan Garrett and Hadrian R. Katz; for Defenders of Property Rights by Theodore B. Olson, Thomas H. Dupree, Jr., Matthew D. McGill, Nancie G. Marzulla, and Roger Marzulla; for International Rights Owners by Christopher Wolf; for Kids First Coalition et al. by Viet D. Dinh; for Law Professors et al. by James Gibson; for Macrovision Corp. by Geoffrey L. Beauchamp, Kelly G. Huller, and James H. Salter; for Napster, LLC, et al. by Barry I. Slotnick; for the National Academy of Recording Arts & Sciences, Inc., et al. by Jon A. Baumgarten and Jay L. Cooper; for the National Association of Broadcasters by Marsha J. MacBride, Jane E. Mago, Benjamin F. P. Ivins, and Jerianne Timmerman; for the National Association of Recording Merchandisers by Alan R. Malasky and Melanie Martin-Jones; for the Progress & Freedom Foundation by James V. DeLong; for the Video Software Dealers Association by John T. Mitchell; and for Professor Peter S. Menell et al. by Mr. Menell, pro se.

Briefs of amici curiae urging affirmance were filed for Altnet, Inc., by Roderick G. Dorman; for the American Civil Liberties Union et al. by Christopher A. Hansen, Steven R. Shapiro, Sharon M. McGowan, Ann Brick, and Jordan C. Budd; for the American Conservative Union et al. by David Post; for the Cellular Telecommunications & Internet Association et al. by Andrew G. McBride, Joshua S. Turner, Michael Altschul, James W. Olson, Frank L. Politano, Laura Kaster, Jeffrey A. Rackow, Grier C. Raclin, Michael Standard, John Thorne, Sarah B. Deutsch, and Paul J. Larkin, Jr.; for the Consumer Electronics Association et al. by Bruce G. Joseph and Scott E. Bain; for the Consumer Federation of America et al. by Peter Jaszi; for the Distributed Computing Industry Association by Mr. Dorman; for the Eagle Forum Education & Legal Defense Fund by Andrew L. Schlafly and Karen B. Tripp; for the Free Software Foundation et al. by Eben Moglen; for Intel Corp. by James M. Burger and Jonathan D. Hart; for Internet Law Faculty by William W. Fisher III and Jonathan Zittrain; for Law Professors by J. Glynn Lunney, Jr.; for the National Association of Shareholder and Consumer Attorneys by Kevin P. Roddy and Matthew E. Van Tine; for Sixty Intellectual Property and Technology Law Professors et al. by Deirdre K. Mulligan and Pamela Samuelson; for Sovereign Artists et al. by James R. Wheaton; for Computer Science Professor Harold Abelson et al. by James S. Tyre; for Professor Edward Lee et al. by Mr. Lee, pro se; for Charles Nesson by Mr. Nesson, pro se; and for Malla Pollack et al. by Ms. Pollack, pro se.

Briefs of amici curiae were filed for the American Intellectual Property Law Association by Rick D. Nydegger and Melvin C. Garner; for Audible Magic Corp. et al. by Bruce V. Spiva and Jeremy H. Stern; for Bridgemar Services, Ltd. d/b/a iMesh.com by Jeffrey A. Kimmel; for the Business Software Alliance by E. Edward Bruce and Robert A. Long, Jr.; for Creative Commons by Lawrence Lessig; for the Digital Media Association et al. by Lawrence Robbins, Alan Untereiner, Markham C. Erickson, and Jerry Berman; for Emerging Technology Companies by Michael Traynor and Matthew D. Brown; for IEEE-USA by Matthew J. Conigliaro, Andrew C. Greenberg, Joseph H. Lang, Jr., and Daniel E. Fisher; for Innovation Scholars and Economists by Laurence F. Pulgram; for the Intellectual Property Owners Association by James H. Pooley; for Media Studies Professors by Roy I. Liebman; for the National Venture Capital Association by Michael K. Kellogg, Mark L. Evans, and David L. Schwarz; for Sharman Networks Limited by Mr. Dorman; for SNOCAP, Inc., by Joel W. Nomkin; for Kenneth J. Arrow et al. by David A. Strauss; for Lee A. Hollaar by Lloyd W. Sadler; for U. S. Senator Patrick Leahy et al. by Mr. Leahy, pro se, and Senator Orrin G. Hatch, pro se; and for Felix Oberholzer-Gee et al. by Carl H. Settlemyer III and Arnold P. Lutzker.

[1] Peer-to-peer networks have disadvantages as well. Searches on peer-to-peer networks may not reach and uncover all available files because search requests may not be transmitted to every computer on the network. There may be redundant copies of popular files. The creator of the software has no incentive to minimize storage or bandwidth consumption, the costs of which are borne by every user of the network. Most relevant here, it is more difficult to control the content of files available for retrieval and the behavior of users.

[2] The studios and recording companies and the songwriters and music publishers filed separate suits against the defendants that were consolidated by the District Court.

[3] Subsequent versions of Morpheus, released after the record was made in this case, apparently rely not on Gnutella but on a technology called Neonet. These developments are not before us.

[4] There is some evidence that both Grokster and StreamCast previously operated supernodes, which compiled indexes of files available on all of the nodes connected to them. This evidence, pertaining to previous versions of the defendants' software, is not before us and would not affect our conclusions in any event.

[5] By comparison, evidence introduced by the plaintiffs in A&M Records, Inc. v. Napster, Inc., 239 F. 3d 1004 (CA9 2001), showed that 87% of files available on the Napster file-sharing network were copyrighted, id., at 1013.

[6] The Grokster founder contends that in answering these e-mails he often did not read them fully. App. 77, 769.

[7] The record makes clear that StreamCast developed these promotional materials but not whether it released them to the public. Even if these advertisements were not released to the public and do not show encouragement to infringe, they illuminate StreamCast's purposes.

[8] The mutual exclusivity of these values should not be overstated, however. On the one hand technological innovators, including those writing file-sharing computer programs, may wish for effective copyright protections for their work. See, e. g., Wu, When Code Isn't Law, 89 Va. L. Rev. 679, 750 (2003). (StreamCast itself was urged by an associate to "get [its] technology written down and [its intellectual property] protected." App. 866.) On the other hand the widespread distribution of creative works through improved technologies may enable the synthesis of new works or generate audiences for emerging artists. See Eldred v. Ashcroft, 537 U. S. 186, 223-226 (2003) (Stevens, J., dissenting); Van Houweling, Distributive Values in Copyright, 83 Texas L. Rev. 1535, 1539-1540, 1562-1564 (2005); Brief for Sovereign Artists et al. as Amici Curiae 11.

[9] We stated in Sony Corp. of America v. Universal City Studios, Inc., 464 U. S. 417 (1984), that "`the lines between direct infringement, contributory infringement and vicarious liability are not clearly drawn' . . . . [R]easoned analysis of [the Sony plaintiffs' contributory infringement claim] necessarily entails consideration of arguments and case law which may also be forwarded under the other labels, and indeed the parties . . . rely upon such arguments and authority in support of their respective positions on the issue of contributory infringement," id., at 435, n. 17 (quoting Universal City Studios, Inc. v. Sony Corp. of America, 480 F. Supp. 429, 457-458 (CD Cal. 1979)). In the present case MGM has argued a vicarious liability theory, which allows imposition of liability when the defendant profits directly from the infringement and has a right and ability to supervise the direct infringer, even if the defendant initially lacks knowledge of the infringement. See, e. g., Shapiro, Bernstein & Co. v. H. L. Green Co., 316 F. 2d 304, 308 (CA2 1963); Dreamland Ball Room, Inc. v. Shapiro, Bernstein & Co., 36 F. 2d 354, 355 (CA7 1929). Because we resolve the case based on an inducement theory, there is no need to analyze separately MGM's vicarious liability theory.

[10] Nor does the Patent Act's exemption from liability for those who distribute a staple article of commerce, 35 U. S. C. § 271(c), extend to those who induce patent infringement, § 271(b).

[11] Inducement has been codified in patent law. Ibid.

[12] Of course, in the absence of other evidence of intent, a court would be unable to find contributory infringement liability merely based on a failure to take affirmative steps to prevent infringement, if the device otherwise was capable of substantial noninfringing uses. Such a holding would tread too close to the Sony safe harbor.

[13] Grokster and StreamCast contend that any theory of liability based on their conduct is not properly before this Court because the rulings in the trial and appellate courts dealt only with the present versions of their software, not "past acts . . . that allegedly encouraged infringement or assisted . . . known acts of infringement." Brief for Respondents 14; see also id., at 34. This contention misapprehends the basis for their potential liability. It is not only that encouraging a particular consumer to infringe a copyright can give rise to secondary liability for the infringement that results. Inducement liability goes beyond that, and the distribution of a product can itself give rise to liability where evidence shows that the distributor intended and encouraged the product to be used to infringe. In such a case, the culpable act is not merely the encouragement of infringement but also the distribution of the tool intended for infringing use. See Kalem Co. v. Harper Brothers, 222 U. S. 55, 62-63 (1911); Cable/Home Communication Corp. v. Network Productions, Inc., 902 F. 2d 829, 846 (CA11 1990); A&M Records, Inc. v. Abdallah, 948 F. Supp. 1449, 1456 (CD Cal. 1996).

---------------

[14] JUSTICE BREYER finds in Sony Corp. of America v. Universal City Studios, Inc., 464 U. S. 417 (1984), a "clear" rule permitting contributory liability for copyright infringement based on distribution of a product only when the product "will be used almost exclusively to infringe copyrights." Post, at 957. But cf. Sony, 464 U. S., at 442 (recognizing "copyright holder's legitimate demand for effective—not merely symbolic—protection"). Sony, as I read it, contains no clear, near-exclusivity test. Nor have Courts of Appeals unanimously recognized JUSTICE BREYER'S clear rule. Compare A&M Records, Inc. v. Napster, Inc., 239 F. 3d 1004, 1021 (CA9 2001) ("[E]vidence of actual knowledge of specific acts of infringement is required to hold a computer system operator liable for contributory copyright infringement."), with In re Aimster Copyright Litigation, 334 F. 3d 643, 649-650 (CA7 2003) ("[W]hen a supplier is offering a product or service that has noninfringing as well as infringing uses, some estimate of the respective magnitudes of these uses is necessary for a finding of contributory infringement. . . . But the balancing of costs and benefits is necessary only in a case in which substantial noninfringing uses, present or prospective, are demonstrated."). See also Matthew Bender & Co. v. West Pub. Co., 158 F. 3d 693, 707 (CA2 1998) ("The Supreme Court applied [the Sony] test to prevent copyright holders from leveraging the copyrights in their original work to control distribution of . . . products that might be used incidentally for infringement, but that had substantial noninfringing uses. . . . The same rationale applies here [to products] that have substantial, predominant and noninfringing uses as tools for research and citation."). All Members of the Court agree, moreover, that "the Court of Appeals misapplied Sony," at least to the extent it read that decision to limit "secondary liability" to a hardly ever category, "quite beyond the circumstances to which the case applied." Ante, at 933.

[15] Grokster and StreamCast, in the Court of Appeals' view, would be entitled to summary judgment unless MGM could show that the software companies had knowledge of specific acts of infringement and failed to act on that knowledge—a standard the court held MGM could not meet. 380 F. 3d, at 1162-1163.

[16] JUSTICE BREYER finds support for summary judgment in this motley collection of declarations and in a survey conducted by an expert retained by MGM. Post, at 952-955. That survey identified 75% of the files available through Grokster as copyrighted works owned or controlled by the plaintiffs, and 15% of the files as works likely copyrighted. App. 439. As to the remaining 10% of the files, "there was not enough information to form reasonable conclusions either as to what those files even consisted of, and/or whether they were infringing or non-infringing." Id., at 479. Even assuming, as JUSTICE BREYER does, that the Sony Court would have absolved Sony of contributory liability solely on the basis of the use of the Betamax for authorized time-shifting, post, at 950-951, summary judgment is not inevitably appropriate here. Sony stressed that the plaintiffs there owned "well below 10%" of copyrighted television programming, 464 U. S., at 443, and found, based on trial testimony from representatives of the four major sports leagues and other individuals authorized to consent to home recording of their copyrighted broadcasts, that a similar percentage of program copying was authorized, id., at 424. Here, the plaintiffs allegedly control copyrights for 70% or 75% of the material exchanged through the Grokster and StreamCast software, 380 F. 3d 1154, 1158 (CA9 2004); App. 439, and the District Court does not appear to have relied on comparable testimony about authorized copying from copyright holders.

[17] The District Court's conclusion that "[p]laintiffs do not dispute that [d]efendants' software is being used, and could be used, for substantial noninfringing purposes," 259 F. Supp. 2d 1029, 1036 (CD Cal. 2003); accord 380 F. 3d, at 1161, is, to say the least, dubious. In the courts below and in this Court, MGM has continuously disputed any such conclusion. Brief for Motion Picture Studio and Recording Company Petitioners 30-38; Brief for MGM Plaintiffs-Appellants in No. 03-55894 etc. (CA9), p. 41; App. 356-357, 361-365.

6.7.4 Perfect 10, Inc. v. Visa Int'l Service Ass'n 6.7.4 Perfect 10, Inc. v. Visa Int'l Service Ass'n

494 F.3d 788 (2007)

PERFECT 10, INC., Plaintiff-Appellant,
v.
VISA INTERNATIONAL SERVICE, ASSOCIATION; First Data Corporation; Cardservice International, Inc.; Humboldt Bank; Mastercard International, Inc., Defendants-Appellees.

No. 05-15170.

United States Court of Appeals, Ninth Circuit.

Argued and Submitted December 4, 2006.
Filed July 3, 2007.

[789] [790] [791] [792] Howard E. King (argued) and Stephen D. Rothschild, King, Holmes, Paterno & Berliner, LLP, Los Angeles, California, for the plaintiff-appellant.

Jeffrey N. Mausner, Berman, Mausner & Resser, Los Angeles, California, for the plaintiff-appellant.

Daniel J. Cooper, Los Angeles, California, for the plaintiff-appellant.

Andrew P. Bridges (argued), John C. Nishi, Winston & Strawn LLP, San Francisco, California, for defendant-appellee Mastercard International Incorporated.

Mark T. Jansen, Nancy L. Tompkins, Anthony J. Malutta, Townsend and Townsend and Crew LLP, San Francisco, California, for defendant-appellee Visa International Service Association.

Robert A. Van Nest, Michael H. Page, R. James Slaughter, Keker & Van Nest, LLP, San Francisco, California, for defendants-appellees First Data Corp., Cardservice International, Inc., and Humboldt Bank.

Before: STEPHEN REINHARDT, ALEX KOZINSKI, and MILAN D. SMITH, JR., Circuit Judges.

Opinion by Judge MILAN D. SMITH, JR.; Dissent by Judge KOZINSKI.

MILAN D. SMITH, JR., Circuit Judge:

Perfect 10, Inc. (Perfect 10) sued Visa International Service Association, Master-Card International Inc., and several affiliated banks and data processing services (collectively, the Defendants), alleging secondary liability under federal copyright and trademark law and liability under California statutory and common law. It sued because Defendants continue to process credit card payments to websites that infringe Perfect 10's intellectual property rights after being notified by Perfect 10 of infringement by those websites. The district court dismissed all causes of action under Federal Rule of Civil Procedure 12(b)(6) for failure to state a claim upon [793] which relief can be granted. We affirm the decision of the district court.

FACTS AND PRIOR PROCEEDINGS

Perfect 10 publishes the magazine "PERFECT10" and operates the subscription website www.perfect10.com., both of which "feature tasteful copyrighted images of the world's most beautiful natural models." Appellant's Opening Brief at 1. Perfect 10 claims copyrights in the photographs published in its magazine and on its website, federal registration of the "PERFECT 10" trademark and blanket publicity rights for many of the models appearing in the photographs. Perfect 10 alleges that numerous websites based in several countries have stolen its proprietary images, altered them, and illegally offered them for sale online.

Instead of suing the direct infringers in this case, Perfect 10 sued Defendants, financial institutions that process certain credit card payments to the allegedly infringing websites. The Visa and Master-Card entities are associations of member banks that issue credit cards to consumers, automatically process payments to merchants authorized to accept their cards, and provide information to the interested parties necessary to settle the resulting debits and credits. Defendants collect fees for their services in these transactions. Perfect 10 alleges that it sent Defendants repeated notices specifically identifying infringing websites and informing Defendants that some of their consumers use their payment cards to purchase infringing images. Defendants admit receiving some of these notices, but they took no action in response to the notices after receiving them.

Perfect 10 separately alleges that it formerly had a merchant account with defendant First Data Corporation (FDC) but that in the Spring of 2001 FDC terminated the account. FDC's stated reason for the termination is that the percentage of Perfect 10's customers who later disputed the charges attributed to them (the chargeback rate) exceeded contractual limits. Perfect 10 claims these chargeback rates were temporarily and substantially inflated because Perfect 10 was the "victim of hackers who were subsequently investigated by the Secret Service." Appellant's Opening Brief at 13. Perfect 10 claims that FDC was aware of this and was also aware that Perfect 10's chargeback rate dropped to within association limits once the hacking ceased, but that FDC nevertheless placed Perfect 10 on an industry-wide "black list" of terminated accounts.

Perfect 10 filed suit against Defendants on January 28, 2004 alleging contributory and vicarious copyright and trademark infringement as well as violations of California laws proscribing unfair competition and false advertising, violation of the statutory and common law right of publicity, libel, and intentional interference with prospective economic advantage. Defendants moved to dismiss the initial complaint under FRCP 12(b)(6). The district court granted the motion, dismissing the libel and intentional interference claims with prejudice but granting leave to amend the remaining claims. In its first amended complaint, Perfect 10 essentially repeated the allegations in its original complaint concerning the surviving causes of action and Defendants again moved to dismiss under FRCP 12(b)(6). The district court granted the Defendants' second motion in full, dismissing all remaining causes of action with prejudice. Perfect 10 appealed to this court.

JURISDICTION

The district court had original jurisdiction over the copyright and trademark claims pursuant to 28 U.S.C. §§ 1331 and [794] 1338 and supplemental jurisdiction over the related state law claims pursuant to 28 U.S.C. § 1367. This court has appellate jurisdiction pursuant to 28 U.S.C. § 1291.

STANDARDS OF REVIEW

We review de novo the district court's dismissal for failure to state a claim upon which relief can be granted pursuant to FRCP 12(b)(6). Rodriguez v. Panayiotou, 314 F.3d 979, 983 (9th Cir.2002). On appeal, "we take all of the allegations of material fact stated in the complaint as true and construe them in the light most favorable to the nonmoving party. A complaint should not be dismissed unless it appears beyond doubt that plaintiff can prove no set of facts in support of his claim which would entitle him to relief." Id. (internal citations omitted).

Although a plaintiff's allegations are generally taken as true, the court need not accept conclusory allegations of law or unwarranted inferences, and dismissal is required if the facts are insufficient to support a cognizable claim. City of Arcadia v. U.S. Envtl. Prot. Agency, 411 F.3d 1103, 1106 n. 3 (9th Cir.2005); see also Pena v. Gardner, 976 F.2d 469, 471-72 (9th Cir.1992). The court may also affirm on any ground supported by the record even if the district court did not consider the issue. Fields v. Legacy Health Sys., 413 F.3d 943, 958 n. 13 (9th Cir.2005); ARC Ecology v. United States Dep't of the Air Force, 411 F.3d 1092, 1096 (9th Cir. 2005).

We review de novo the district court's interpretation of state law. Rodriguez, 314 F.3d at 983.

DISCUSSION

SECONDARY LIABILITY UNDER FEDERAL COPYRIGHT AND TRADEMARK LAW

A. Secondary Liability for Copyright Infringement

Perfect 10 alleges that numerous websites based in several countries—and their paying customers—have directly infringed its rights under the Copyright Act, 17 U.S.C. § 101, et seq.[1] In the present suit, however, Perfect 10 has sued Defendants, not the direct infringers, claiming contributory and vicarious copyright infringement because Defendants process credit card charges incurred by customers to acquire the infringing images.

We evaluate Perfect 10's claims with an awareness that credit cards serve as the primary engine of electronic commerce and that Congress has determined it to be the "policy of the United States—(1) to promote the continued development of the Internet and other interactive computer services and other interactive media [and] (2) to preserve the vibrant and competitive free market that presently exists for the Internet and other interactive computer services, unfettered by Federal or State regulation." 47 U.S.C. §§ 230(b)(1), (2).[2]

1. Contributory Copyright Infringement

Contributory copyright infringement is a form of secondary liability with [795] roots in the tort-law concepts of enterprise liability and imputed intent. See Fonovisa, Inc. v. Cherry Auction, Inc., 76 F.3d 259, 264 (9th Cir.1996); Perfect 10, Inc. v. Amazon.com, Inc. et al., 487 F.3d 701 (9th Cir.2007). This court and the United States Supreme Court (Supreme Court) have announced various formulations of the same basic test for such liability. We have found that a defendant is a contributory infringer if it (1) has knowledge of a third party's infringing activity, and (2) "induces, causes, or materially contributes to the infringing conduct." Ellison v. Robertson, 357 F.3d 1072, 1076 (9th Cir.2004) (citing Gershwin Publ'g Corp. v. Columbia Artists Mgmt., Inc., 443 F.2d 1159, 1162 (2d Cir.1971)). In an Internet context, we have found contributory liability when the defendant "engages in personal conduct that encourages or assists the infringement." A & M Records, Inc. v. Napster, Inc., 239 F.3d 1004, 1019 (9th Cir.2001) (internal citations omitted). In Metro-Goldwyn-Mayer Studios, Inc. v. Grokster, Ltd., the Supreme Court adopted from patent law the concept of "inducement" and found that "[o]ne infringes contributorily by intentionally inducing or encouraging direct infringement." 545 U.S. 913, 930, 125 S.Ct. 2764, 162 L.Ed.2d 781 (2005).[3] Most recently, in a case also brought by Perfect 10, we found that "an actor may be contributorily liable [under Grokster] for intentionally encouraging direct infringement if the actor knowingly takes steps that are substantially certain to result in such direct infringement." Amazon.com, 487 F.3d at 727.

We understand these several criteria to be non-contradictory variations on the same basic test, i.e., that one contributorily infringes when he (1) has knowledge of another's infringement and (2) either (a) materially contributes to or (b) induces that infringement. Viewed in isolation, the language of the tests described is quite broad, but when one reviews the details of the actual "cases and controversies" before the relevant court in each of the testdefining cases and the actual holdings in those cases, it is clear that the factual circumstances in this case are not analogous. To find that Defendants' activities fall within the scope of such tests would require a radical and inappropriate expansion of existing principles of secondary liability and would violate the public policy of the United States.

a. Knowledge of the Infringing Activity

Because we find that Perfect 10 has not pled facts sufficient to establish that Defendants induce or materially contribute to the infringing activity, Perfect 10's contributory copyright infringement claim fails and we need not address the Defendants' knowledge of the infringing activity.[4]

[796] b. Material Contribution, Inducement, or Causation

To state a claim of contributory infringement, Perfect 10 must allege facts showing that Defendants induce, cause, or materially contribute to the infringing conduct. See, e.g., Ellison, 357 F.3d at 1076. Three key cases found defendants contributorily liable under this standard: Fonovisa, 76 F.3d 259; Napster, 239 F.3d 1004; and Grokster, 545 U.S. 913, 125 S.Ct. 2764, 162 L.Ed.2d 781. In Fonovisa, we held a swap meet operator contributorily liable for the sale of pirated works at the swap meet. In Napster, we held the operator of an electronic file sharing system liable when users of that system employed it to exchange massive quantities of copyrighted music. In Grokster, the Supreme Court found liability for the substantially similar act of distributing software that enabled exchange of copyrighted music on a peer-to-peer, rather than a centralized basis.[5] Perfect 10 argues that by continuing to process credit card payments to the infringing websites despite having knowledge of ongoing infringement, Defendants induce, enable and contribute to the infringing activity in the same way the defendants did in Fonovisa, Napster and Grokster. We disagree.

1. Material Contribution

The credit card companies cannot be said to materially contribute to the infringement in this case because they have no direct connection to that infringement. Here, the infringement rests on the reproduction, alteration, display and distribution of Perfect 10's images over the Internet. Perfect 10 has not alleged that any infringing material passes over Defendants' payment networks or through their payment processing systems, or that Defendants' systems are used to alter or display the infringing images. In Fonovisa, the infringing material was physically located in and traded at the defendant's market. Here, it is not. Nor are Defendants' systems used to locate the infringing images. The search engines in Amazon.com provided links to specific infringing images, and the services in Napster and Grokster allowed users to locate and obtain infringing material. Here, in contrast, the services provided by the credit card companies do not help locate and are not used to distribute the infringing images. While Perfect 10 has alleged that Defendants make it easier for websites to profit from this infringing activity, the issue here is reproduction, alteration, display and distribution, which can occur without payment. Even if infringing images were not paid for, there would still be infringement. See Napster, 239 F.3d at 1014 (Napster users infringed the distribution right by uploading file names to the search index for others to copy, despite the fact that [797] no money changed hands in the transaction).

Our analysis is fully consistent with this court's recent decision in Perfect 10 v. Amazon.com, where we found that "Google could be held contributorily liable if it had knowledge that infringing Perfect 10 images were available using its search engine, could take simple measures to prevent further damage to Perfect 10's copyrighted works, and failed to take such steps." 487 F.3d at 729. The dissent claims this statement applies squarely to Defendants if we just substitute "payment systems" for "search engine." Dissent at 811. But this is only true if search engines and payment systems are equivalents for these purposes, and they are not. The salient distinction is that Google's search engine itself assists in the distribution of infringing content to Internet users, while Defendants' payment systems do not. The Amazon.com court noted that "Google substantially assists websites to distribute their infringing copies to a worldwide market and assists a worldwide audience of users to access infringing materials." Id. Defendants do not provide such a service. They in no way assist or enable Internet users to locate infringing material, and they do not distribute it. They do, as alleged, make infringement more profitable, and people are generally more inclined to engage in an activity when it is financially profitable. However, there is an additional step in the causal chain: Google may materially contribute to infringement by making it fast and easy for third parties to locate and distribute infringing material, whereas Defendants make it easier for infringement to be profitable, which tends to increase financial incentives to infringe, which in turn tends to increase infringement.[6]

The dissent disagrees with our reading of Amazon.com and charges us with wishful thinking, dissent at 811, and with "draw[ing] a series of ephemeral distinctions," dissent at 825. We respectfully disagree and assert that our construction of the relevant statutes and case law is completely consistent with existing federal law, is firmly grounded in both commercial and technical reality and conforms to the public policy of the United States. Helping users to locate an image might substantially assist users to download infringing images, but processing payments does not. If users couldn't pay for images with credit cards, infringement could continue on a large scale because other viable funding mechanisms are available. For example, a website might decide to allow users to download some images for free and to make its profits from advertising, or it might develop other payment mechanisms that do not depend on the credit card companies.[7] In either case, the unlicensed use of Perfect 10's copyrighted images would still be infringement.[8] We acknowledge that Defendants' [798] payment systems make it easier for such an infringement to be profitable, and that they therefore have the effect of increasing such infringement, but because infringement of Perfect 10's copyrights can occur without using Defendants' payment system, we hold that payment processing by the Defendants as alleged in Perfect 10's First Amended Complaint does not constitute a "material contribution" under the test for contributory infringement of copyrights.[9]

Our holding is also fully consistent with and supported by this court's previous holdings in Fonovisa and Napster. While there are some limited similarities between the factual scenarios in Fonovisa and Napster and the facts in this case, the differences in those scenarios are substantial, and, in our view, dispositive. In Fonovisa, we held a flea market proprietor liable as a contributory infringer when it provided the facilities for and benefitted from the sale of pirated works. 76 F.3d 259. The court found that the primary infringers and the swap meet were engaged in a mutual enterprise of infringement and observed that "it would be difficult for the infringing activity to take place in the massive quantities alleged without the support services provided by the swap meet. These services include, among other things, the provision of space, utilities, parking, advertising, plumbing, and customers." 76 F.3d at 264. But the swap meet owner did more to encourage the enterprise. In 1991, the Fresno County Sheriff raided the swap meet and seized 38,000 counterfeit recordings. Id. at 261. The Sheriff sent a letter to the swap meet operator the following year notifying it that counterfeit sales continued and reminding it that it had agreed to provide the Sheriff with identifying information from each vendor, but had failed to do so. Id. The Fonovisa court found liability because the swap meet operator knowingly provided the "site and facilities" for the infringing activity. Id. at 264.

In Napster, this court found the designer and distributor of a software program liable for contributory infringement. 239 F.3d 1004. Napster was a file-sharing [799] program which, while capable of non-infringing use, was expressly engineered to enable the easy exchange of pirated music and was widely so used. See Napster, 239 F.3d at 1020 n. 5 (quoting document authored by Napster co-founder which mentioned "the need to remain ignorant of users' real names and IP addresses `since they are exchanging pirated music'"). Citing the Fonovisa standard, the Napster court found that Napster materially contributes to the users' direct infringement by knowingly providing the "site and facilities" for that infringement. 239 F.3d at 1022.

Seeking to draw an analogy to Fonovisa and, by extension, Napster, Perfect 10 pleads that Defendants materially contribute to the infringement by offering services that allow it to happen on a larger scale than would otherwise be possible. Specifically, because the swap meet in Fonovisa created a commercial environment which allowed the frequency of that infringement to increase, and the Napster program increased the frequency of infringement by making it easy, Perfect 10 argues that the Defendants have made available a payment system that allows third-party infringement to be profitable, and, consequently, more widespread than it otherwise might be. This analogy fails.

The swap meet operator in Fonovisa and the administrators of the Napster and Grokster programs increased the level of infringement by providing a centralized place, whether physical or virtual, where infringing works could be collected, sorted, found, and bought, sold, or exchanged.[10] The provision of parking lots, plumbing and other accoutrements in Fonovisa was significant only because this was part of providing the environment and market for counterfeit recording sales to thrive.

Defendants, in contrast, do no such thing. While Perfect 10 has alleged that it is easy to locate images that infringe its copyrights, the Defendants' payment systems do not cause this. Perfect 10's images are easy to locate because of the very nature of the Internet—the website format, software allowing for the easy alteration of images, high-speed connections allowing for the rapid transfer of high-resolution image files, and perhaps most importantly, powerful search engines that can aggregate and display those images in a useful and efficient manner, without charge, and with astounding speed. Defendants play no role in any of these functions.

Perfect 10 asserts otherwise by arguing for an extremely broad conception of the term "site and facilities" that bears no relationship to the holdings in the actual "cases and controversies" decided in Fonovisa and Napster. Taken literally, Perfect 10's theory appears to include any tangible or intangible component related to any transaction in which infringing material is bought and sold. But Fonovisa and Napster do not require or lend themselves to such a construction. The actual display, location, and distribution of infringing images in this case occurs on websites that organize, display, and transmit information over the wires and wireless instruments that make up the Internet. The websites are the "site" of the infringement, not Defendants' payment networks. Defendants do not create, operate, [800] advertise, or otherwise promote these websites. They do not operate the servers on which they reside. Unlike the Napster (and Grokster) defendants, they do not provide users the tools to locate infringing material, nor does any infringing material ever reside on or pass through any network or computer Defendants operate.[11] Defendants merely provide a method of payment, not a "site" or "facility" of infringement. Any conception of "site and facilities" that encompasses Defendants would also include a number of peripherally-involved third parties, such as computer display companies, storage device companies, and software companies that make the software necessary to alter and view the pictures and even utility companies that provide electricity to the Internet.

Perfect 10 seeks to side-step this reality by alleging that Defendants are still contributory infringers because they could refuse to process payments to the infringing websites and thereby undermine their commercial viability.[12] Even though we must take this factual allegation as true, that Defendants have the power to undermine the commercial viability of infringement does not demonstrate that the Defendants materially contribute to that infringement. As previously noted, the direct infringement here is the reproduction, alteration, display and distribution of Perfect 10's images over the Internet. Perfect 10 has not alleged that any infringing material passes over Defendants' payment networks or through their payment processing systems, or that Defendants designed or promoted their payment systems as a means to infringe. While Perfect 10 has alleged that Defendants make it easier for websites to profit from this infringing activity, the infringement stems from the failure to obtain a license to distribute, not the processing of payments.

2. Inducement

In Grokster, the Supreme Court applied the patent law concept of "inducement" to a claim of contributory infringement against a file-sharing program. 545 U.S. 913, 125 S.Ct. 2764, 162 L.Ed.2d 781. The court found that "one who distributes a device with the object of promoting its use to infringe copyright, as shown by clear expression or other affirmative steps taken to foster infringement, is liable for the resulting acts of infringement by third parties." Id. at 936-37, 125 S.Ct. 2764. Perfect 10 claims that Grokster is analogous because Defendants induce customers to use their cards to purchase goods and services, and are therefore guilty of specifically inducing infringement if the cards are used to purchase images from sites that have content stolen from Perfect 10. This is mistaken. Because Perfect 10 alleges no "affirmative steps taken to foster infringement" and no facts suggesting that Defendants promoted their payment system as a means to infringe, its claim is premised on a fundamental misreading of [801] Grokster that would render the concept of "inducement" virtually meaningless.

The Grokster court announced that the standard for inducement liability is providing a service "with the object of promoting its use to infringe copyright." Id. "[M]ere knowledge of infringing potential or actual infringing uses would not be enough here to subject [a defendant] to liability." Id. at 937, 125 S.Ct. 2764. Instead, inducement "premises liability on purposeful, culpable expression and conduct, and thus does nothing to compromise legitimate commerce or discourage innovation having a lawful promise." Id. Moreover, to establish inducement liability, it is crucial to establish that the distributors "communicated an inducing message to their . . . users," the classic example of which is an "advertisement or solicitation that broadcasts a message designed to stimulate others to commit violations." Id. The Grokster court summarized the "inducement" rule as follows:

In sum, where an article is good for nothing else but infringement, there is no legitimate public interest in its unlicensed availability, and there is no injustice in presuming or imputing an intent to infringe. Conversely, the doctrine absolves the equivocal conduct of selling an item with substantial lawful as well as unlawful uses, and limits liability to instances of more acute fault than the mere understanding that some of one's products will be misused. It leaves breathing room for innovation and a vigorous commerce.

545 U.S. at 932-33, 125 S.Ct. 2764 (internal citations and quotation marks omitted).

Perfect 10 has not alleged that any of these standards are met or that any of these considerations are present here. Defendants do, of course, market their credit cards as a means to pay for goods and services, online and elsewhere. But it does not follow that Defendants affirmatively promote each product that their cards are used to purchase. The software systems in Napster and Grokster were engineered, disseminated, and promoted explicitly for the purpose of facilitating piracy of copyrighted music and reducing legitimate sales of such music to that extent. Most Napster and Grokster users understood this and primarily used those systems to purloin copyrighted music. Further, the Grokster operators explicitly targeted then-current users of the Napster program by sending them ads for its OpenNap program. Id. at 925-26, 125 S.Ct. 2764. In contrast, Perfect 10 does not allege that Defendants created or promote their payment systems as a means to break laws. Perfect 10 simply alleges that Defendants generally promote their cards and payment systems but points to no "clear expression" or "affirmative acts" with any specific intent to foster infringement.

The Amazon.com court recognized this distinction and applied it in a matter fully consistent with our analysis in this case. While the Amazon.com court did not bifurcate its analysis of contributory liability into "material contribution" liability and "inducement" liability, it did recognize that contributory liability "may be predicated on actively encouraging (or inducing) infringement through specific acts." Amazon.com, 487 F.3d at 726 (quoting Grokster, 545 U.S. at 942, 125 S.Ct. 2764 (Ginsburg, J., concurring)). It also found that Google could be held contributorily liable if it has "actual knowledge that specific infringing material is available using its system, and can take simple measures to prevent further damage," but does not. Id. at 728 (internal citations and quotation marks omitted). While this test is read more naturally as a test for "material contribution" than as a test for "inducement," [802] under an "inducement" analysis Defendants are not within its scope. As discussed above, Perfect 10 has not alleged any "specific acts" intended to encourage or induce infringement. And moreover, Defendants are distinguishable under the Amazon.com test because, unlike Google, infringing material is not "available using [their] system" of payment processing. Id. That system does not "facilitate access to websites," id.; infringers do not use it to copy, alter, distribute or display infringing material; and consumers do not use it to locate, view or download the infringing images. Rather, all parties involved simply use Defendants' system to process payments for that infringing material.

Finally, we must take as true the allegations that Defendants lend their names and logos to the offending websites and continue to allow their cards to be used to purchase infringing images despite actual knowledge of the infringement—and perhaps even bending their association rules to do so. But we do not and need not, on this factual basis, take as true that Defendants "induce" consumers to buy pirated content with their cards. "Inducement" is a legal determination, and dismissal may not be avoided by characterizing a legal determination as a factual one. We must determine whether the facts as pled constitute a "clear expression" of a specific intent to foster infringement, and, for the reasons above noted, we hold that they do not.

2. Vicarious Copyright Infringement

Vicarious infringement is a concept related to, but distinct from, contributory infringement. Whereas contributory infringement is based on tort-law principles of enterprise liability and imputed intent, vicarious infringement's roots lie in the agency principles of respondeat superior. See Fonovisa, 76 F.3d at 261-62. To state a claim for vicarious copyright infringement, a plaintiff must allege that the defendant has (1) the right and ability to supervise[13] the infringing conduct and (2) a direct financial interest in the infringing activity. Ellison, 357 F.3d at 1078; Napster, 239 F.3d at 1022 (citations omitted). The Supreme Court has recently offered (in dictum) an alternate formulation of the test: "One . . . infringes vicariously by profiting from direct infringement while declining to exercise a right to stop or limit it." Grokster, 545 U.S. at 930, 125 S.Ct. 2764 (internal citations omitted). Perfect 10 alleges that Defendants have the right and ability to control the content of the infringing websites by refusing to process credit card payments to the websites, enforcing their own rules and regulations, or both. We hold that Defendants' conduct alleged in Perfect 10's first amended complaint fails to state a claim for vicarious copyright infringement.

a. Right and Ability to Supervise the Infringing Activity

In order to join a Defendant's payment network, merchants and member banks must agree to follow that Defendant's rules and regulations. These rules, among other things, prohibit member banks from providing services to merchants engaging in certain illegal activities and require the members and member banks to investigate merchants suspected of engaging in such illegal activity and to terminate their participation in the payment network if certain illegal activity is [803] found. Perfect 10 has alleged that certain websites are infringing Perfect 10's copyrights and that Perfect 10 sent notices of this alleged infringement to Defendants. Accordingly, Perfect 10 has adequately pled that (1) infringement of Perfect 10's copyrights was occurring, (2) Defendants were aware of the infringement, and (3) on this basis, Defendants could have stopped processing credit card payments to the infringing websites. These allegations are not, however, sufficient to establish vicarious liability because even with all reasonable inferences drawn in Perfect 10's favor, Perfect 10's allegations of fact cannot support a finding that Defendants have the right and ability to control the infringing activity.

In reasoning closely analogous to the present case, the Amazon.com court held that Google was not vicariously liable for third-party infringement that its search engine facilitates. In so holding, the court found that Google's ability to control its own index, search results, and webpages does not give Google the right to control the infringing acts of third parties even though that ability would allow Google to affect those infringing acts to some degree. Amazon.com, 487 F.3d at 730-32. Moreover, and even more importantly, the Amazon.com court rejected a vicarious liability claim based on Google's policies with sponsored advertisers, which state that it reserves "the right to monitor and terminate partnerships with entities that violate others' copyright[s]." Id. at 730 (alteration in original). The court found that

Google's right to terminate an AdSense partnership does not give Google the right to stop direct infringement by third-party websites. An infringing third-party website can continue to reproduce, display, and distribute its infringing copies of Perfect 10 images after its participation in the AdSense program has ended.

Id. This reasoning is equally applicable to the Defendants in this case. Just like Google, Defendants could likely take certain steps that may have the indirect effect of reducing infringing activity on the Internet at large. However, neither Google nor Defendants has any ability to directly control that activity, and the mere ability to withdraw a financial "carrot" does not create the "stick" of "right and ability to control" that vicarious infringement requires. A finding of vicarious liability here, under the theories advocated by the dissent, would also require a finding that Google is vicariously liable for infringement—a conflict we need not create, and radical step we do not take.

Perfect 10 argues that this court's decision in Napster compels a contrary result. The Napster court found a likelihood of vicarious liability because Napster "had the right and ability to police its system and failed to exercise that right to prevent the exchange of copyrighted material." 239 F.3d at 1023. The Napster program created a forum for the exchange of digital music files and the program administrators had the ability to block certain users from accessing that forum to upload or download such files. As pled by Perfect 10, Defendants also provide a system that allows the business of infringement for profit to operate on a larger scale than it otherwise might, and Defendants have the ability to deny users access to that payment system.

This argument fails. The Napster program's involvement with—and hence its "policing" power over—the infringement was much more intimate and directly intertwined with it than Defendants' payment systems are. Napster provided users with the tools to enable the easy reproduction and distribution of the actual infringing content and to readily search [804] out and identify infringing material. Defendants' payment systems do not. Napster also had the right and ability to block user access to its program and thereby deprive particular users of access to their forum and use of their location and distribution tools. Defendants can block access to their payment system, but they cannot themselves block access to the Internet, to any particular websites, or to search engines enabling the location of such websites. Defendants are involved with the payment resulting from violations of the distribution right, but have no direct role in the actual reproduction, alteration, or distribution of the infringing images.[14] They cannot take away the tools the offending websites use to reproduce, alter, and distribute the infringing images over the Internet. They can only take away the means the websites currently use to sell them.[15]

Perfect 10 offers two counter-arguments. Perfect 10 first claims that Defendants' rules and regulations permit them to require member merchants to cease illegal activity—presumably including copyright infringement—as a condition to their continuing right to receive credit card payments from the relevant Defendant entities. Perfect 10 argues that these contractual terms effectively give Defendants contractual control over the content of their merchants' websites, and that contractual control over content is sufficient to establish the "right and ability" to control that content for purposes of vicarious liability. In the sense that economic considerations can influence behavior, these contractual rules and regulations do give Defendants some measure of control over the offending websites since it is reasonable to believe that fear of losing access to credit card payment processing services would be a sufficient incentive for at least some website operators to comply with a content-based suggestion from Defendants. But the ability to exert financial pressure does not give Defendants the right or ability to control the actual infringing activity at issue in this case. Defendants have no absolute right[16] to stop that activity—they cannot stop websites [805] from reproducing, altering, or distributing infringing images. Rather, the credit card companies are analogous to Google, which we held was not liable for vicarious copyright infringement even though search engines could effectively cause a website to disappear by removing it from their search results, and reserve the right to do so. Like Google, the credit card companies "cannot stop any of the third-party websites from reproducing, displaying, and distributing unauthorized copies of Perfect 10's images because that infringing conduct takes place on the third-party websites." Amazon.com, 487 F.3d at 731. Defendants can only refuse to process credit card payments to the offending merchant within their payment network, or they can threaten to do so if the merchant does not comply with a request to alter content. While either option would likely have some indirect effect on the infringing activity, as we discuss at greater length in our analysis of the Grokster "stop or limit" standard below, so might any number of actions by any number of actors. For vicarious liability to attach, however, the defendant must have the right and ability to supervise and control the infringement, not just affect it, and Defendants do not have this right or ability.

Perfect 10 relies heavily on the reasoning of Fonovisa and Napster to support this argument, but that reliance is misplaced. The swap meet operator in Fonovisa and the software operator in Napster both had the right to remove individual infringers from the very place the infringement was happening. Defendants, like the defendants in Amazon.com, have no such right. As already discussed, Defendants cannot take away the software the offending websites use to copy, alter, and distribute the infringing images, cannot remove those websites from the Internet, and cannot themselves block the distribution of those images over the Internet. Defendants can refuse to process credit card payments for those images, but while this refusal would reduce the number of those sales, that reduction is the result of indirect economic pressure rather than an affirmative exercise of contractual rights.[17]

Perfect 10 also argues that were infringing websites barred from accepting the Defendants' credit cards, it would be impossible for an online website selling adult images to compete and operate at a profit.[18] While we must take this allegation as [806] true, it still fails to state a claim because it conflates the power to stop profiteering with the right and ability to control infringement. Perfect 10's allegations do not establish that Defendants have the authority to prevent theft or alteration of the copyrighted images, remove infringing material from these websites or prevent its distribution over the Internet. Rather, they merely state that this infringing activity could not be profitable without access to Defendants' credit card payment systems. The alleged infringement does not turn on the payment; it turns on the reproduction, alteration and distribution of the images, which Defendants do not do, and which occurs over networks Defendants do not control.

The Supreme Court's recent decision in Grokster does not undermine the validity of this distinction. As we held in Amazon.com, 487 F.3d at 728-31, Grokster does not stand for the proposition that just because the services provided by a company help an infringing enterprise generate revenue, that company is necessarily vicariously liable for that infringement. Numerous services are required for the third party infringers referred to by Perfect 10 to operate. In addition to the necessity of creating and maintaining a website, numerous hardware manufacturers must produce the computer on which the website physically sits; a software engineer must create the program that copies and alters the stolen images; technical support companies must fix any hardware and software problems; utility companies must provide the electricity that makes all these different related operations run, etc. All these services are essential to make the businesses described viable, they all profit to some degree from those businesses, and by withholding their services, they could impair—perhaps even destroy—the commercial viability of those business. But that does not mean, and Grokster by no means holds, that they are all potentially liable as vicarious infringers. Even though they have the "right" to refuse their services, and hence the literal power to "stop or limit" the infringement, they, like Defendants, do not exercise sufficient control over the actual infringing activity for vicarious liability to attach.

b. Obvious and Direct Financial Interest in the Infringing Activity

Because Perfect 10 has failed to show that Defendants have the right and ability to control the alleged infringing conduct, it has not pled a viable claim of vicarious liability. Accordingly, we need not reach the issue of direct financial interest.

B. Secondary Liability for Trademark Infringement

The tests for secondary trademark infringement are even more difficult to satisfy than those required to find secondary copyright infringement. See Sony Corp. v. Universal City Studios, 464 U.S. 417, 439 n. 19, 104 S.Ct. 774, 78 L.Ed.2d 574 (1984); Fonovisa, 76 F.3d at 265 (noting that "trademark infringement liability is more narrowly circumscribed than copyright infringement"). While the tests for such infringement are somewhat different in the trademark context, Perfect 10's factual allegations in support of these claims are essentially identical to those alleged in Perfect 10's copyright claims, and they fail to state a claim for similar reasons.

[807] 1. Contributory Trademark Infringement

To be liable for contributory trademark infringement, a defendant must have (1) "intentionally induced" the primary infringer to infringe, or (2) continued to supply an infringing product to an infringer with knowledge that the infringer is mislabeling the particular product supplied. Inwood Labs., Inc. v. Ives Labs., Inc., 456 U.S. 844, 855, 102 S.Ct. 2182, 72 L.Ed.2d 606 (1982). When the alleged direct infringer supplies a service rather than a product, under the second prong of this test, the court must "consider the extent of control exercised by the defendant over the third party's means of infringement." Lockheed Martin Corp. v. Network Solutions, Inc., 194 F.3d 980, 984 (9th Cir.1999). For liability to attach, there must be "[d]irect control and monitoring of the instrumentality used by a third party to infringe the plaintiff's mark." Id.

Perfect 10 has failed to plead a viable claim under either prong of Inwood Labs — and, by extension, Lockheed Martin. First, it has not pled facts showing that Defendants "intentionally induced" infringement of Perfect 10's mark. Perfect 10 has alleged that Defendants are providing critical support to websites that are using the PERFECT 10 mark in a manner that is likely to cause the public to believe that they are authorized by Perfect 10. Its factual allegations in support of this claim are identical to those it made in support of its copyright claims. These allegations, however, cite no affirmative acts by Defendants suggesting that third parties infringe Perfect 10's mark, much less induce them to do so.

Second, Perfect 10 has failed to allege facts sufficient to show "[d]irect control and monitoring of the instrumentality used by a third party to infringe the plaintiff's mark." Lockheed Martin, 194 F.3d at 984. Perfect 10 claims that the "product" or "instrumentality" at issue here is the credit card payment network through which Defendants process payments for infringing material. Appellant's Opening Brief at 39. As discussed at length above, this network is not the instrument used to infringe Perfect 10's trademarks; that infringement occurs without any involvement of Defendants and their payment systems. Perfect 10 has not alleged that Defendants have the power to remove infringing material from these websites or directly stop their distribution over the Internet. At most, Perfect 10 alleges that Defendants can choose to stop processing payments to these websites, and that this refusal might have the practical effect of stopping or reducing the infringing activity. This, without more, does not constitute "direct control." See Lockheed Martin, 194 F.3d at 985 ("While the landlord of a flea market might reasonably be expected to monitor the merchandise sold on his premises, [defendant] NSI cannot reasonably be expected to monitor the Internet.") (citation omitted).

2. Vicarious Trademark Infringement

Vicarious liability for trademark infringement requires "a finding that the defendant and the infringer have an apparent or actual partnership, have authority to bind one another in transactions with third parties or exercise joint ownership or control over the infringing product." Hard Rock Café Licensing Corp. v. Concession Servs., Inc., 955 F.2d 1143, 1150 (7th Cir.1992) (internal quotations omitted), followed by Symantec Corp. v. CD Micro, Inc., 286 F.Supp.2d 1265, 1275 (D.Or.2003).

Perfect 10 argues that Defendants are liable as follows: "Defendants and the [808] Stolen Content Websites are in a symbiotic financial partnership pursuant to which the websites operate their businesses according to defendants' rules and regulations and defendants share the profits, transaction by transaction." Appellant's Opening Brief at 40. For the same reasons that this relationship does not establish "right and ability to control" for copyright purposes, neither does it establish such a "symbiotic" relationship or "joint ownership or control" for trademark purposes. Defendants process payments to these websites and collect their usual processing fees, nothing more.

Perfect 10 further argues that "Defendants' acceptance of a charge binds the Stolen Content Website to provide the infringing images to third parties." Appellant's Opening Brief at 40. Even if legally relevant, Perfect 10's allegation is legally incorrect. It is the websites' contracts with the consumers that bind the websites to provide the infringing images, not the websites' relationship with Defendants.[19] The websites' contracts with Defendants are merely a means of settling the resulting debits and credits among the websites and the relevant consumers. We hold that Perfect 10 fails to state a claim for vicarious trademark infringement.

CALIFORNIA STATUTORY AND COMMON LAW CLAIMS

In addition to its federal copyright and trademark claims, Perfect 10 pled causes of action for unfair competition, false advertising, violation of the right of publicity, libel, and intentional interference with economic relations. We hold that the district court properly dismissed all these claims with prejudice.

A. California State Law Claims of Unfair Competition hand False Advertising

Defendants do not dispute Perfect 10's claims that the websites themselves are potentially violating California state and common law prohibiting unfair competition and false advertising. See Cal. Bus. & Prof.Code §§ 17200, et seq., and 17500, et seq. Defendants do, however, argue that Emery v. Visa International Service Association, 95 Cal.App.4th 952, 116 Cal. Rptr.2d 25 (2002), precludes liability for Defendants in this case, both under secondary liability and aiding and abetting theories. Defendants are correct on both counts.

In Emery, a California appellate court affirmed a grant of summary judgment in favor of Visa, finding that Visa did not exercise the requisite control over merchants marketing foreign lottery tickets to impose secondary liability under the state's unfair competition or false advertising laws. Id. at 959-964, 116 Cal.Rptr.2d 25. Emery found that an "unfair practices claim under section 17200 cannot be predicated on vicarious liability. . . . A defendant's liability must be based on his personal participation in the unlawful practices and unbridled control over the practices that are found to violate section 17200 or 17500." Id. at 960, 116 Cal. Rptr.2d 25 (internal citations omitted). Because "Visa itself played no part in preparing or sending any `statement' that might be construed as untrue or misleading under the unfair business practices [809] statutes," it could not be liable for unfair competition. Id. at 964, 116 Cal.Rptr.2d 25. The false advertising claim also necessarily failed because "even if Visa allowed the merchants to use its logo, trade name, or trademark, it would not be liable for false advertising. There is no duty to investigate the truth of statements made by others." Id. (citations omitted). Emery is dispositive of Perfect 10's claims that the Defendants are secondarily liable under California unfair competition and false advertising laws and the district court properly dismissed them.[20]

In an attempt to avoid the impact of Emery, Perfect 10 argues on appeal that it alleged aiding and abetting theories of liability in its complaints, and further, that the district court improperly dismissed these civil claims under a criminal standard of aiding and abetting. Perfect 10 fails to establish a viable claim on these theories as well. The only authority offered by Perfect 10 in support of such liability is an opinion which is now uncitable in California: Schulz v. Neovi Data Corporation, 28 Cal.Rptr.3d 46 (Cal. App.4th Dist.2005), superceded by 32 Cal. Rptr.3d 758, 117 P.3d 475 (Cal.2005), cause transferred by 56 Cal.Rptr.3d 471, 154 P.3d 998 (Cal.2007), transferred to, 152 Cal.App.4th 86, 60 Cal.Rptr.3d 810 (4th Dist. Jun 15, 2007).

Furthermore, even under the standards announced in the superceding Schulz opinion, Defendants would not be liable. The Schulz court found a credit card company potentially liable for its role in facilitating an illegal online lottery because that company "went far beyond merely processing credit cards." 152 Cal.App.4th at 95, 60 Cal.Rptr.3d 810. In support, the court cited specific statements from a company representative in which he "personally assured" an agent of the website that the defendant company "did not have any problem with the operation of the [illegal] lottery site" and had a "stronger stomach" than other payment processors. Id. Perfect 10 alleges no similar conduct here— Defendants merely process credit card payments.

B. Aiding and Abetting the Websites' Violations of Perfect 10's Right of Publicity

Perfect 10 alleges that Defendants aided and abetted the websites' violations of Perfect 10's rights of publicity, acquired by assignment from its models, in violation of Cal. Civil Code § 3344 and the common law right of publicity. This aiding and abetting claim fails for the same reasons as the aiding and abetting claims under unfair competition and false advertising. Even if such liability is possible under California law—a proposition for which Perfect 10 has provided no clear authority—Defendants lack sufficient control or personal involvement in the infringing activities to be so liable. See Schulz, 152 Cal.App.4th at 93-94, 60 Cal.Rptr.3d 810; Emery, 95 Cal.App.4th at 962-63, 116 Cal. Rptr.2d 25.

C. Libel and Intentional Interference with Prospective Economic Advantage

The district court dismissed Perfect 10's claims of libel and intentional [810] interference with prospective economic advantage with prejudice on multiple grounds. We affirm on the ground that both are time-barred. Under California law, a libel claim must be filed within one year of publication of the allegedly libelous statement, Cal. Civ. Proc. § 340(c), and an intentional interference claim must be filed within two years of the underlying harmful act, Cal. Civ. Proc. § 339. Perfect 10 claims the same underlying wrongful act as the basis for both claims: its placement on the industry "black list" in the Spring of 2001. However, Perfect 10 failed to file suit until January 2004—well beyond the statute of limitations applicable to each claim—and has failed to show any possible exception under either statute. Those claims are time-barred.

CONCLUSION

We decline to create any of the radical new theories of liability advocated by Perfect 10 and the dissent and we affirm the district court's dismissal with prejudice of all causes of action in Perfect 10's complaint for failure to state a claim upon which relief can be granted.

AFFIRMED.

KOZINSKI, Circuit Judge, dissenting for the most part:[21]

Federal law gives copyright owners the exclusive right to "distribute copies [of their works] . . . to the public by sale." 17 U.S.C. § 106(3). Plaintiff alleges that certain third parties it refers to as the "Stolen Content Websites" unlawfully copy its protected images and sell them to the public, using defendants' payment systems as financial intermediaries. According to plaintiff, the Stolen Content Websites "maintain no physical presence in the United States in order to evade criminal and civil liability for their illegal conduct." First Am. Compl. at 8 ¶ 26. Plaintiff also claims that "Defendants do not enforce their own rules against [the] Stolen Content Websites because Defendants do not want to lose the substantial revenues and profits they receive from the websites." Id. at 10 ¶ 35. Plaintiff has repeatedly notified defendants that they are abetting the sale of stolen merchandise by "knowingly providing crucial transactional support services for the sale of millions of stolen photos and film clips worth billions of dollars," id. at 1 ¶ 5, but to no avail. Frustrated in its effort to protect the rights Congress has given it, plaintiff turns to the federal courts for redress. We should not slam the courthouse door in its face.

Accepting the truth of plaintiff's allegations, as we must on a motion to dismiss, the credit cards[22] are easily liable for indirect copyright infringement: They knowingly provide a financial bridge between buyers and sellers of pirated works, enabling them to consummate infringing [811] transactions, while making a profit on every sale. If such active participation in infringing conduct does not amount to indirect infringement, it's hard to imagine what would.[23] By straining to absolve defendants of liability, the majority leaves our law in disarray.

Contributory Infringement

We have long held that a defendant is liable for contributory infringement if it "materially contributes to the infringing conduct." A & M Records, Inc. v. Napster, Inc., 239 F.3d 1004, 1019 (9th Cir. 2001) (internal quotations omitted) (citing Gershwin Publ'g Corp. v. Columbia Artists Mgmt., Inc., 443 F.2d 1159, 1162 (2d Cir.1971)). Our recent opinion in Perfect 10, Inc. v. Amazon.com, Inc., 487 F.3d 701 (9th Cir.2007), canvasses the caselaw in this area and concludes that Google "could be held contributorily liable if it had knowledge that infringing Perfect 10 images were available using its search engine, could take simple measures to prevent further damage to Perfect 10's copyrighted works, and failed to take such steps." Amazon, 487 F.3d at 729. Substitute "payment systems" for "search engine" in this sentence, and it describes defendants here: If a consumer wishes to buy an infringing image from one of the Stolen Content Websites, he can do so by using Visa or MasterCard, just as he can use Google to find the infringing images in the first place. My colleagues engage in wishful thinking when they claim that "Google's search engine itself assists in the distribution of infringing content to Internet users, while Defendants' payment systems do not" and that "[h]elping users to locate an image might substantially assist users to download infringing images, but processing payments does not." Maj. op. at 797, 797.[24]

The majority struggles to distinguish Amazon by positing an "additional step in the causal chain" between defendants' activities and the infringing conduct. Id. at 797. According to the majority, "Google may materially contribute to infringement by making it fast and easy for third parties to locate and distribute infringing material, whereas Defendants make it easier for infringement to be profitable, which tends to increase financial incentives to infringe, which in turn tends to increase infringement." Id. The majority is mistaken; there is no "additional step." Defendants participate in every credit card sale of pirated images; the images are delivered to the buyer only after defendants approve the transaction and process the payment. [812] This is not just an economic incentive for infringement; it's an essential step in the infringement process.

In any event, I don't see why it matters whether there is an "additional step." Materiality turns on how significantly the activity helps infringement, not on whether it's characterized as one step or two steps removed from it. The majority recognizes that "Defendants make it easier for websites to profit from this infringing activity," maj. op. at 796; that defendants' conduct "tends to increase infringement," id. at 797; that defendants "have the effect of increasing . . . infringement," id. at 798; that "Defendants have the power to undermine the commercial viability of" the Stolen Content Websites and that they "make it easier for websites to profit from this infringing activity," id. at 800; that "Defendants could likely take certain steps that may have the indirect effect of reducing infringing activity on the Internet," id. at 803-04; and that defendants could "reduce the number of those [infringing] sales," id. at 805. Taking the majority at its word, it sounds like defendants are providing very significant help to the direct infringers.

My colleagues recognize, as they must, that helping consumers locate infringing content can constitute contributory infringement,[25] but they consign the means of payment to secondary status. Maj. op. at 799 ("Defendants merely provide a method of payment. . . ."); id. at 802 ("[A]ll parties involved simply use Defendants' system to process payments for that infringing material."); id. at 804 ("They can only take away the means the websites currently use to sell [the infringing images]."); id. at 805 ("Defendants can only refuse to process credit card payments to the offending merchant within their payment network. . . ."). But why is locating infringing images more central to infringement than paying for them? If infringing images can't be found, there can be no infringement; but if infringing images can't be paid for, there can be no infringement either. Location services and payment services are equally central to infringement; the majority's contrary assertion is supported largely by disparaging use of "merely," "simply" and "only." See also id. at 803 ("[M]ere ability to withdraw a financial'carrot' does not create the `stick' of `right and ability to control'. . . . ").[26]

The majority dismisses the significance of credit cards by arguing that "infringement could continue on a large scale [without them] because other viable funding mechanisms are available." Maj. op. at 797.[27] Of course, the same could be said [813] about Google. As the majority admits, if Google were unwilling or unable to serve up infringing images, consumers could use Yahoo!, Ask.com, Microsoft Live Search, A9.com or AltaVista instead. Id. at 797-98 n. 8. Even if none of these were available, consumers could still locate websites with infringing images through e-mails from friends, messages on discussion forums, tips via online chat, "typo-squatting," peer-to-peer networking using BitTorrent or eDonkey, offline and online advertisements (see p. 820 infra), disreputable search engines hosted on servers in far-off jurisdictions or even old-fashioned word of mouth. The majority's claim that search engines "could effectively cause a website to disappear by removing it from their search results," maj. op. at 805, is quite a stretch.

If the test for contributory infringement really were whether "infringement could continue on a large scale[without the aid of the defendant] because other viable . . . mechanisms are available," Amazon should have absolved Google of liability because of the availability of such obvious alternatives. But Amazon held that Google could be liable for contributory infringement because it "substantially assists" users in finding infringing materials; the existence of other means of infringement was not even considered because no case has suggested this to be a relevant consideration. The majority's "other viable . . . mechanisms" test conflicts with Amazon, Napster, Grokster and every other material assistance case that I know of.

The majority does even worse when it tries to describe the "other viable funding mechanisms" that could serve as alternatives to credit cards: According to the majority, the Stolen Content Websites "might . . . make [their] profits from advertising" or "might develop other payment mechanisms that do not depend on the credit card companies." Maj. op. at 797 (emphasis added). This shows that my colleagues have a healthy imagination but contravenes our responsibilities, the most fundamental of which is that we must work with the facts the parties presented below, not invent new facts on appeal. Defendants have presented no evidence that the pirates could survive without credit cards, nor could they, as the case is still at the motion to dismiss stage. Even if speculation as to what the Stolen Content Websites "might" do were admissible evidence, which I seriously doubt, we must still wait for one of the parties to present it, not conjure it up ourselves.[28] At the pleadings stage, we must accept plaintiff's allegations that credit cards are indispensable to the operation of the Stolen Content Websites, and that these websites would be forced out of business without them. See First Am. Compl. at 2 ¶ 7 ("Stolen Content Websites cannot exist without the knowledge and direct participation of [defendants]."); id. at 10 ¶ 35 ("[T]he Stolen Content Websites would be eradicated."). If my colleagues can't justify their result without contradicting plaintiff's allegations, this is a pretty good hint that they're [814] wrong. See also p. 812-13 n. 7 supra; pp. 818 n. 15, 800-02 infra.

The majority's attempt to distinguish location services from payment services by trying to show that there are viable alternatives for the latter but not the former cuts entirely against them. As plaintiff alleges, and experience tells us, there are numerous ways of locating infringing images on the Internet, but there are no adequate substitutes for credit cards when it comes to paying for them. A few consumers might use checks or money orders to pay for infringing images, but this would be far more cumbersome, time-consuming and risky than using credit cards. See pp. 799-800 & n. 14 infra. If it mattered whether search engines or credit cards are more important to peddling infringing content on the Internet, the cards would win hands down.

But it doesn't matter. Material assistance turns on whether the activity in question "substantially assists" infringement. Amazon, 487 F.3d at 729. It makes no difference whether the primary infringers might do without it by finding a workaround, which is why the majority can cite no case supporting its analysis. We presume that primary infringers have good reasons for selecting a particular means to infringe, and that other ways to do so will be more costly, more cumbersome and less efficient. Moreover, infringement can always be carried out by other means; if the existence of alternatives were a defense to contributory infringement then there could never be a case of contributory infringement based on material assistance. The majority makes some very new—and very bad—law here.

The majority also makes a slightly different argument: "While Perfect 10 has alleged that Defendants make it easier for websites to profit from this infringing activity, the issue here is reproduction, alteration, display and distribution, which can occur without payment. Even if infringing images were not paid for, there would still be infringement." Maj. op. at 796-97. What the majority seems to be arguing here is that helping an infringer get paid cannot materially assist infringement because the actual process of infringement— "reproduction, alteration, display and distribution"—does not include payment. There are two problems with this argument. The first is that the Stolen Content Websites are alleged to infringe plaintiff's right of distribution "by sale." 17 U.S.C. § 106(3). It's not possible to distribute by sale without receiving compensation, so payment is in fact part of the infringement process. Second, this argument runs head-on into Amazon, where we held that helping to find infringing images materially assists infringement, even though locating infringing images also isn't "reproduction, alteration, display [or] distribution." To be sure, locating images, like paying for them, makes it a lot easier to infringe, but neither is intrinsic to the infringement process, as the majority conceives it.

Nor can today's opinion be squared with Fonovisa, Inc. v. Cherry Auction, Inc., 76 F.3d 259 (9th Cir.1996). In Fonovisa, defendant allowed known infringers to sell pirated works from stalls at its swap meet. We found material assistance based on the fact that "it would [have been] difficult for the infringing activity to take place in the massive quantities alleged without the support services provided by the swap meet." 76 F.3d at 264. The pivotal role played by the swap meet in Fonovisa is played by the credit cards in cyberspace, in that they make "massive quantities" of infringement possible that would otherwise be impossible. Indeed, the assistance provided here is far more material than in Fonovisa. A pirate kicked out of a swap meet could still peddle his illicit wares through newspaper [815] ads or by word of mouth, but you can't do business at all on the Internet without credit cards. Plaintiff thus plausibly alleges that the "Stolen Content Websites would be eradicated" if defendants withdrew their support. First Am. Compl. at 10 ¶ 35.

The majority rejects Fonovisa by pointing out that the swap meet there provided a "centralized place" for the infringement to take place, maj. op. at 799, whereas defendants here "have no direct connection to [the] infringement," id. at 796.[29] But material assistance does not depend on physical contact with the infringing activity. If you lend money to a drug dealer knowing he will use it to finance a drug deal, you materially assist the transaction, even if you never see the drugs. Or, if you knowingly drive a principal to the scene of the crime, you provide material assistance, even if nothing happens during the ride. See United States v. Lopez, 482 F.3d 1067, 1076-79 (9th Cir.2007). Material assistance turns on whether the conduct assists infringement in a significant way, not on pedantic factual distinctions unrelated to how much the activity facilitates infringement.

Sure, a marketplace for pirated works (as in Fonovisa) or an index for such works (as in Napster and Grokster) is important to infringement, but so is a means of getting paid. Defendants are directly involved in every infringing transaction where payment is made by credit card, which (according to plaintiff) amounts to virtually every sale of pirated works. First Am. Compl. at 9 ¶ 35. Credit cards don't provide some tangential service that marginally affects sales; they are the financial lifeblood of the Stolen Content Websites.

The majority's concern that imposing liability on defendants here would implicate vast numbers of other actors who provide incidental services to infringers, maj. op. at 800, is unfounded. Line-drawing is always a bit tricky, but courts have shown themselves adept at dealing with it from time out of mind, in resolving such issues as proximate causation and reasonable suspicion. Contributory infringement requires material assistance to the infringing activity, and those the majority worries about would doubtless be absolved of liability because their contribution to the infringing activity is insufficiently material.

Courts have, in fact, had no difficulty in distinguishing those who are materially involved in copyright infringement from those who are not. As Fonovisa explains, two lines of cases developed in the first part of the last century: the absentee landlord cases and the dance hall cases. The first line involved landlords who "lacked knowledge of the infringing acts of [their] tenant[s] and who exercised no control over the leased premises." Fonovisa, 76 F.3d at 262. These were held not liable for the infringement committed by tenants on the premises. See, e.g., Deutsch v. Arnold, 98 F.2d 686, 688 (2d Cir.1938). In the second line of cases, "the operator of an entertainment venue was held liable for infringing performances when the operator (1) could control the premises and (2) obtained a direct financial benefit from the audience, who paid to enjoy the infringing performance." 76 F.3d at 262 (citing Buck [816] v. Jewell-LaSalle Realty Co., 283 U.S. 191, 51 S.Ct. 410, 75 L.Ed. 971 (1931), and Dreamland Ball Room, Inc. v. Shapiro, Bernstein & Co., 36 F.2d 354 (7th Cir. 1929)).[30]

These cases show that courts are able to forestall the majority's parade of horribles. But our case does not present a close or difficult question: Defendants here are alleged to provide an essential service to infringers, a service that enables infringement on a massive scale. Defendants know about the infringements; they profit from them; they are intimately and causally involved in a vast number of infringing transactions that could not be consummated if they refused to process the payments; they have ready means to stop the infringements. Were we to rule for plaintiff, as we should, I have every confidence that future courts would be able to distinguish this case when and if they are confronted with lawsuits against utility companies, software vendors and others who provide incidental services to infringers.

Vicarious Infringement

A party "infringes vicariously by profiting from direct infringement while declining to exercise a right to stop or limit it." Amazon, 487 F.3d at 729 (quoting Grokster, 545 U.S. at 930, 125 S.Ct. 2764) (internal quotation marks omitted).[31] There is no doubt that defendants profit from the infringing activity of the Stolen Content Websites; after all, they take a cut of virtually every sale of pirated material. First Am. Compl. at 4 ¶ 13, 7 ¶ 25. The majority does not dispute this point so I need not belabor it. Maj. op. at 806-07.

Defendants here also have a right to stop or limit the infringing activity, a right they have refused to exercise. As the majority recognizes, "Perfect 10 . . . claims that Defendants' rules and regulations permit them to require member merchants to cease illegal activity—presumably including copyright infringement—as a condition to their continuing right to receive credit card payments from the relevant Defendant entities." Maj. op. at 804.[32] Assuming [817] the truth of this allegation,[33] the cards have the authority, given to them by contract, to force the Stolen Content Websites to remove infringing images from their inventory as a condition for using defendants' payment systems. If the merchants comply, their websites stop peddling stolen content and so infringement is stopped or limited. If they don't comply, defendants have the right—and under copyright law the duty—to kick the pirates off their payment networks, forcing them to find other means of getting paid or go out of business. In that case, too, infringement is stopped or limited. The swap meet in Fonovisa was held vicariously liable precisely because it did not force the pirates to stop infringing or leave; there is no reason to treat defendants here differently.

That the pirates might find some other way of doing business is of no consequence; our cases make this perfectly clear. It didn't matter in Fonovisa that the infringers there could have continued their illegal sales by mail order or by hawking their unlawful merchandise on street corners. Nor did it matter in Napster or Grokster that the direct infringers might find some other means of illegally sharing their protected content with others. Indeed, there is no case involving secondary infringement, going back to the dance hall cases of the last century, where the secondary infringer's refusal to do business with the direct infringer could have stopped infringement altogether and forever. Yet, courts have presumed that removing the particular means of infringement challenged in each case would make direct infringement more difficult and thereby diminish the scale of infringing activity.

Here, the Stolen Content Websites have chosen credit cards as a form of payment, and for good reason. Credit cards are ubiquitous and permit the transfer of funds electronically in a matter of seconds. Consumers need not wait days or weeks for a check to reach its destination and clear before gaining access to the salacious pictures they crave. Consumers also know that, if goods bought by credit card are not delivered, the cards will likely reverse the transaction.[34] Credit cards thus act as informal escrow agents, effectively guaranteeing that their merchants will deliver the goods. Blocking the ability to accept credit cards would be a heavy blow to the Stolen Content Websites because cards are "overwhelmingly the primary way by which customers pay to view Stolen Content Websites." First Am. Compl. at 9 ¶ 35. Even if the pirates could find an alternative way of plying their illegal trade, being denied their preferred means of doing business [818] would sharply curtail their unlawful activities.

The majority toils to resist this obvious conclusion but its arguments are not persuasive. For example, it makes no difference that defendants control only the means of payment, not the mechanics of transferring the material. Maj. op. at 802, 805, 806. In a commercial environment, distribution and payment are (to use a quaint anachronism) like love and marriage—you can't have one without the other. If cards don't process payment, pirates don't deliver booty. The credit cards, in fact, control distribution of the infringing material.

The majority also disparages defendants' ability to control the Stolen Content Websites as just "financial pressure" which doesn't give them an "absolute right to stop [the infringing] activity—they cannot stop websites from reproducing, altering, or distributing infringing images." Id. at 805 (footnote omitted).[35] But we have never required an "absolute right to stop [the infringing] activity" as a predicate for vicarious liability; it's enough if defendants have the "practical ability" to do so. Amazon, 487 F.3d at 729, 731. While proclaiming its fidelity to Amazon, maj. op. at 796, 803, the majority jettisons Amazon's "practical ability" standard and substitutes its own "absolute right to stop" standard. Id. at 804.[36]

It's perfectly clear that the cards do have the "practical ability" to force websites that display their logos and use their payment systems to remove unlawful merchandise. As the majority admits, "Defendants can . . . refuse to process credit card payments to the offending merchant within their payment network, or they can threaten to do so if the merchant does not comply with a request to alter content." Maj. op. at 805 (disparaging "only" omitted). Commercial websites are dependent on credit cards as a form of payment, and the Stolen Content Websites are uniquely so, as virtually all of their illicit sales are paid for by card. First Am. Compl. at 9 ¶ 35. A threat by credit card companies to withdraw use of their payment systems couldn't be ignored. After all, how many consumers would be willing to send a check or money order to a far-off jurisdiction in the hope that days or weeks later they will be allowed to download some saucy pictures? If the Stolen Content Websites cannot get paid for their unlawful [819] products, or if payment is made more difficult or cumbersome, this will dramatically affect their operations. Some may lose customers who are unwilling to use alternative forms of payment;[37] others may go out of business; still others may remove the infringing content from their websites. Even the majority admits that "fear of losing access to credit card payment processing services would be a sufficient incentive for at least some website operators to comply with a content-based suggestion from Defendants." Maj. op. at 804-05.[38] As a consequence, infringing activity would be "stop[ped] or limit[ed]." See Amazon, 487 F.3d at 729.

The majority also reads the complaint for less than it's worth by "understand[ing]" plaintiff to allege "that the `Stolen Content Websites' could not continue to exist as websites offering images for sale online should defendants withdraw their services, not [to allege] that the websites would completely vanish or that infringement by these sites in all its forms would necessarily cease." Maj. op. at 805-06 n. 18. But plaintiff expressly alleges what the majority "understand[s]" it not to allege, namely that the sites "cannot exist" without defendants, First Am. Compl. at 2 ¶ 7, and that "the Stolen Content Websites would be eradicated" if they could not use credit cards, id. at 9-10 ¶ 35. It is horn-book law that we must construe complaints liberally on a motion to dismiss. See Glus v. Brooklyn Eastern Dist. Terminal, 359 U.S. 231, 235, 79 S.Ct. 760, 3 L.Ed.2d 770 (1959); Conley v. Gibson, 355 U.S. 41, 47-48, 78 S.Ct. 99, 2 L.Ed.2d 80 (1957). A liberal construction means reading ambiguous provisions in a way that would save the complaint from dismissal, and sometimes even reading between the lines to give plaintiff the benefit of every reasonable inference. I have never heard of reading a complaint liberally by ignoring allegations that are clearly present.

But let's say the majority "understand[s]" plaintiff's allegations correctly: So what? To sustain a vicarious infringement claim, plaintiff need not allege that the Stolen Content Websites "would completely vanish or that infringement by these sites in all its forms would necessarily cease." Maj. op. at 805-06 n. 18. The standard is "stop or limit" the infringing conduct. Amazon, 487 F.3d at 725 (emphasis added) (quoting Grokster, 545 U.S. at 930, 125 S.Ct. 2764). And my colleagues admit that plaintiff has alleged that "at least some website operators [would] comply with a content-based suggestion from Defendants." Maj. op. at 804-05. Q.E.D.

To resolve this case, however, we need not adopt a rule holding all credit cards responsible for all infringing Internet sales because plaintiff has alleged far more than the ordinary credit card/merchant relationship. [820] According to plaintiff, defendants have adopted special rules and practices that apply only to the Stolen Content Websites, and that are designed to make it easier for these websites to ply their illegal trade. First Am. Compl. at 9-11 ¶¶ 33-37. Plaintiff claims that the credit cards have singled out the Stolen Content Websites for preferential treatment because of the unusual and substantial profits they make on such transactions. Read fully and fairly, the complaint alleges that defendants are not merely passive providers of services available on equal terms to legal and illegal businesses alike; they are actually in cahoots with the pirates to prop up their illegal businesses and share their ill-gotten gains. If this is not vicarious infringement, nothing is.

The majority claims that Amazon employs "reasoning closely analogous" to its own, maj. op. at 803, but it is mistaken. Amazon addressed two questions of vicarious infringement, one involving third-party websites whose images are picked up by Google's search engine, the other involving websites that participate in its AdSense program. As to the first, Google could not be vicariously liable because "Perfect 10 ha[d] not shown that Google has contracts with third-party websites that empower Google to stop or limit them from reproducing, displaying, and distributing infringing copies of Perfect 10's images on the Internet." 487 F.3d at 730.[39] In the absence of such a contractual relationship, there could be no vicarious infringement, because Google lacked "the legal right to stop or limit the direct infringement of third-party websites." Id. at 730. Why the majority believes this is in any way analogous, or even remotely instructive, to our situation, where the credit cards do have contracts giving them a right to control what merchants sell on their websites, is a mystery.

Google's relationship with websites that participate in its AdSense program presents a somewhat closer analogy because Google did have contracts that would have allowed it to kick websites out of AdSense for displaying infringing images. But that's as far as the similarity goes: AdSense is an advertising program; Google pays participating merchants to host third-party ads on their websites. This is the cyberspace analogue of renting out space on your land for a billboard. The ads have no effect on the operation of the host websites; users can download infringing content whether or not ads are present. Being excluded from AdSense would thus mean some loss of revenue, but would have no effect on the operation of the business itself. It is therefore far from certain that merchants would be induced to modify their businesses to avoid being excluded from AdSense.[40]

Because plaintiff had not presented proof that any third-party websites would stop infringing if they were threatened [821] with exclusion from AdSense, Amazon concluded that plaintiff there had not met its burden for a preliminary injunction. Our case is presented on a motion to dismiss and plaintiff here need only make allegations. And plaintiff alleges that the infringing websites could not continue doing business at all without the use of credit cards. Amazon's reasoning on this point gives the majority no help.

The majority's attempt to distinguish Napster is equally thin. My colleagues argue that "[t]he Napster program's involvement with . . . the infringement was much more intimate and directly intertwined with it than Defendants' payment systems are." Maj. op. at 803-04. But I don't see how much more "directly intertwined" you can get in a purchase transaction than carrying the payment from buyer to seller. If this were a drug deal, for example, we would never say that the guy entrusted with delivery of the purchase money is less involved in the transaction than the guy who helps find the seller. Both would be held equally culpable.

Thus, the majority's insistence that defendants "cannot themselves block access to the Internet, to any particular websites, or to search engines enabling the location of such websites," maj. op. at 804, is beside the point. Physical control over the infringing activity is one way to stop infringers, but it's certainly not the only way. Withdrawing crucial services, such as financial support, can be just as effective, and sometimes more effective, than technical measures that can often be circumvented.[41]

Finally, the majority dismisses the Supreme Court's opinion in Grokster by suggesting that the Court could not have meant what it said because the standard it announced (and which we adopted in Amazon) would sweep in too many goods and services that contribute to infringing activity. See maj. op. at 806 (listing hardware manufacturers, software engineers, technical support companies and utilities). The majority misreads the Court's opinion. Providing a crucial service to an infringer may give someone the practical ability to stop infringement, but that's only half of what it takes to be a vicarious infringer. The other half is a right, found in contract, to control the infringer's actions. See Amazon, 487 F.3d at 730 (requiring "contracts with [direct infringers] that empower [defendant] to stop or limit them from reproducing, displaying, and distributing infringing copies"). Those third parties the majority worries about could not be held vicariously liable because they lack the legal right to stop the infringement. So far as I know, utilities are provided by public franchise, not by contract, and a utility has no right to stop providing electricity or phone service because it learns that its electrons are being put to illegal use.[42] Computer manufacturers don't usually [822] retain the right to reclaim computers they have sold because they are being used unlawfully. Ditto for software producers and repairmen. Having no contract that authorizes them to stop providing services on account of illegality, these actors do not meet the first prong of the test for vicarious infringement. See p. 799 n. 10 supra.[43]

Trademark Infringement

For precisely the same reasons, I disagree with the majority when it claims that defendants do not contributorily infringe on Perfect 10's trademark because they lack "[d]irect control and monitoring of the instrumentality used by a third party to infringe the plaintiff's mark." Maj. op. at 807 (internal quotation marks omitted). The Lanham Act forbids "use in commerce . . . of a registered mark in connection with the sale, offering for sale, distribution, or advertising of any goods or services on or in connection with which such use is likely to cause confusion." 15 U.S.C. § 1114(1)(a). Plaintiff alleges that the Stolen Content Websites sell images marked with Perfect 10's trademark. First Am. Compl. at 17 ¶ 65. Without defendants' payment systems, the infringers would find it much harder to peddle their infringing goods. Plaintiff thus pled facts sufficient to state a claim for contributory trademark infringement.

The cases on which the majority relies are not to the contrary. Inwood Laboratories, Inc. v. Ives Laboratories, Inc., 456 U.S. 844, 102 S.Ct. 2182, 72 L.Ed.2d 606 (1982), involved a manufacturer and says nothing of consequence bearing on our situation. Lockheed Martin Corp. v. Network Solutions, Inc., 194 F.3d 980, 984 (9th Cir.1999), turned on the fact that the defendant there, a registrar of Internet domain names, lacked sufficient control "over the third party's means of infringement," because it lacked "control and monitoring of the instrumentality used by a third party to infringe the plaintiff's marks." Id. By contrast, credit cards are directly involved in every infringing transaction; not only do they process the payment for virtually every sale of pirated images by the Stolen Content Websites, they control whether such transactions will go forward. This is more than enough to establish the "control and monitoring" that Lockheed Martin requires for contributory trademark infringement.

As to vicarious trademark infringement, the majority claims that there is neither a symbiotic partnership between the direct infringers and defendants, nor authority to bind one another in transactions with third parties. Maj. op. at 807 (citing Hard Rock Cafe Licensing Corp. v. Concession Servs., Inc., 955 F.2d 1143 (7th Cir.1992)). But plaintiff alleges that the Stolen Content [823] Websites cannot operate without the use of credit cards, First Am. Compl. at 2 ¶ 7, while defendants make huge profits by processing these illegal transactions. See also p. 820 supra. If this is not symbiosis, what is? Likewise, while "the websites' contracts with the consumers . . . bind the websites to provide the infringing images," maj. op. at 808 (emphasis removed), it is defendants' actions that bind the websites to that contract. Only after the credit cards approve and process the payment does the obligation to deliver the stolen content come into existence. The majority thus errs in absolving defendants of vicarious trademark infringement.

State Law Claims

The majority disposes of the state law claims on the same theory as the copyright claims, namely, that defendants are not directly involved in the infringing activity. Maj. op. at 808-09. But defendants are involved, because they provide the means to pay for the infringing content and thus make "massive quantities" of infringement possible. First Am. Compl. at 18 ¶ 73.

The case on which the majority relies, Emery v. Visa International Service Association, 95 Cal.App.4th 952, 116 Cal. Rptr.2d 25 (2002), is not on point because, in that case, plaintiff sued only Visa, not the merchant banks that had a direct relationship with the alleged wrongdoer or the consumers. Id. at 956, 962, 116 Cal. Rptr.2d 25. Plaintiff there also based his theory of liability on advertising letters bearing the credit card logo. Emery held that plaintiff hadn't proven Visa could police the use of its logo in letters peddling an illegal lottery sent by merchants directly to consumers. By contrast, plaintiff here alleges that defendants are knowing participants in thousands of transactions that amount to unfair trade practices and infringe on the right of publicity of the women depicted in the stolen images. I see nothing in Emery that would preclude plaintiff's state law claims, as alleged in the complaint.

* * *

It would certainly be much easier for us if plaintiff were suing the Stolen Content Websites rather than the credit cards. No doubt, they would if they could.[44] But direct infringers are sometimes too ubiquitous, too small or too difficult to find. That's why we have cases such as Fonovisa, Napster, Aimster, Grokster and Amazon. Here, plaintiff alleges that many direct infringers have no physical presence in the United States. They operate from far-off jurisdictions, where lawsuits are difficult to bring and remedies impossible to enforce because the infringers can easily move their operations to servers in other remote jurisdictions.

The weak link in the pirates' nefarious scheme is their need to get paid; for this they must use the services of legitimate financial institutions. If plaintiff's allegations are to be believed, the financial institutions (defendants here) collect billions for sellers of stolen merchandise; in a very real sense, they profit from making piracy possible. I can see no reason they should not be held responsible.

The majority's refrain that imposing liability on defendants here would violate "the public policy of the United States," maj. op. at 795, 798, is equally off base. While the majority correctly identifies that [824] policy as facilitating the development of electronic commerce, id. at 794 n. 2, that solicitude does not extend to commerce in illegal merchandise. I am aware of no policy of the United States to encourage electronic commerce in stolen goods, illegal drugs or child pornography. When it comes to traffic in material that violates the Copyright Act, the policy of the United States is embedded in the FBI warning we see at the start of every lawfully purchased or rented video: Infringers are to be stopped and prosecuted. Preventing financial intermediaries from servicing such shady transactions is entirely consistent with that policy. If Congress believes that this places too heavy a burden on credit cards, it can grant the cards immunity (along with corresponding responsibilities), as it did for ISPs in passing the DMCA.[45]

The majority's solicitude for "credit cards . . . as the primary engine of electronic commerce," and for preserving "the vibrant and competitive free market that presently exists for the Internet," maj. op. at 794, is understandable but misguided. It does not serve the interests of a free market, or a free society, to abet marauders who pilfer the property of law-abiding, tax-paying rights holders, and who turn consumers into recipients of stolen property. Requiring defendants to abide by their own rules, which "strictly prohibit members from servicing illegal businesses," First Am. Compl. at 6 ¶ 20, will hardly impair the operation of a "vibrant and competitive free market," any more than did the recent law prohibiting the use of credit cards for Internet gambling. See 31 U.S.C. § 5364.

Nor does plaintiff seek to hold the credit cards responsible for illegal activities of which they are unaware. Plaintiff claims that it has repeatedly written to defendants, "putting them on notice of more than 240 specifically identified Celebrity Porn Websites with obvious stolen content that they were supporting." First Am. Compl. at 19 ¶ 75. Plaintiff has also sent defendants "[d]eclarations from celebrities [such as Britney Spears, Christina Aguilera, Anna Kournikova and Yasmine Bleeth] stating that they have not authorized the use of their name, likeness, or identity on pornographic websites and that they do not want their images and names so used. . . ." Id. at 19 ¶ 77. Credit cards already have the tools to police the activities of their merchants, which is why we don't see credit card sales of illegal drugs or child pornography. According to plaintiff, "defendants inspect websites and business premises, and obtain and review merchants' bank statements, tax returns, credit reports, and a merchant's other financial information. . . ." Id. at 7 ¶ 26. Plaintiff is not asking for a huge change in the way credit cards do business; they ask only that defendants abide by their own rules and stop doing business with crooks. Granting plaintiff the relief it seeks would not, I am confident, be the end of Capitalism as we know it.

This is an easy case, squarely controlled by our precedent in all material respects. Fairly applying our cases to the facts alleged by Perfect 10, we should reverse the district court and give plaintiff an opportunity to prove its case through discovery and trial. In straining to escape the strictures [825] of our caselaw, the majority draws a series of ephemeral distinctions that are neither required nor permitted; the opinion will prove to be no end of trouble.

[1] While Perfect 10's complaint does not clearly specify which of Perfect 10's rights are being infringed, it appears that at least four such rights are potentially at issue: reproduction (17 U.S.C. § 106(1)); derivative works (17 U.S.C. § 106(2)); distribution of copies (17 U.S.C. § 106(3)); and public display (17 U.S.C. § 106(5)).

[2] Congress expressed similar sentiments when it enacted the Digital Millennium Copyright Act (DMCA), 17 U.S.C. § 512, one of the stated purposes of which was to "facilitate the robust development and worldwide expansion of electronic commerce, communications, research, development, and education in the digital age." S. Rep. 105-190, at 1-2 (1998).

[3] In her concurring opinion in Grokster, Justice Ginsburg identified another strand of contributory liability in the Supreme Court's jurisprudence, i.e., liability based on "distributing a product distributees use to infringe copyrights, if the product is not capable of `substantial' or `commercially significant' noninfringing uses." Grokster, 545 U.S. at 942, 125 S.Ct. 2764 (citing Sony Corp. of America v. Universal City Studios, Inc., 464 U.S. 417, 442, 104 S.Ct. 774, 78 L.Ed.2d 574 (1984)). Even assuming Defendants offer a "product" for these purposes, Perfect 10 does not claim that the "product" of credit card services is incapable of substantial and commercially significant noninfringing uses.

[4] We note that an anomaly exists regarding the concept of notice in secondary copyright infringement cases outside a FRCP 12(b)(6) context. Congress addressed the issue of notice in the DMCA, which grants a safe harbor against liability to certain Internet service providers, even those with actual knowledge of infringement, if they have not received statutorily-compliant notice. See Perfect 10 v. CCBill LLC, 481 F.3d 751 (9th Cir.2007), amended and superceded, 488 F.3d 1102 (9th Cir.2007); 17 U.S.C. § 512(c)(3). Because Defendants are not "service providers" within the scope of the DMCA, they are not eligible for these safe harbors. The result, under Perfect 10's theories, would therefore be that a service provider with actual knowledge of infringement and the actual ability to remove the infringing material, but which has not received a statutorily compliant notice, is entitled to a safe harbor from liability, while credit card companies with actual knowledge but without the actual ability to remove infringing material, would benefit from no safe harbor. We recognize that the DMCA was not intended to displace the development of secondary liability in the courts; rather, we simply take note of the anomalous result Perfect 10 seeks.

[5] Because the Grokster court focused primarily on an "inducement" theory rather than a "material contribution" theory, our primary discussion of Grokster is located below in the "inducement" section of this opinion.

[6] As discussed in note 11, infra, the dissent's claims that payment processing is "an essential step in the infringement process," dissent at 812, and that "Defendants are directly involved in every infringing transaction where payment is made by credit card," dissent at 815, suggests that the dissent believes that the Defendants are directly infringing when they process these payments.

[7] As discussed more fully in the vicarious infringement section, infra, Perfect 10's factual allegations are not to the contrary.

[8] We recognize that Google is not the only search engine available to Internet users, and that users do not necessarily need Google to locate infringing images. The distinction we draw, however, is not specific to Google; it is between location services and payment services. Because location services lead Internet users directly to infringing images and often display them on the website of the service itself, we find that location services are more important and more essential—indeed, more "material"—to infringement than payment services are.

[9] Our dissenting colleague assures us that we would not jeopardize Internet commerce by finding Defendants liable because he has "every confidence" that this court will simply find that other providers of essential services may contribute to infringement, but not materially so. Dissent at 816. We take little comfort in his assurances because the predicate of our colleague's optimistic view of future judicial refinement of his new world of secondary liability is a large number of expensive and drawn-out pieces of litigation that may, or may not, ever be filed. Meanwhile, what would stop a competitor of a web-site from sending bogus notices to a credit card company claiming infringement by its competitor in the hope of putting a competitor out of business, or, at least, requiring it to spend a great deal of money to clear its name? Threatened with significant potential secondary liability on a variety of fronts under the dissent's proposed expansion of existing secondary liability law, perhaps the credit card companies would soon decline to finance purchases that are more legally risky. They, after all, are as moved by Adam Smith's "invisible hand" as the next set of merchants. If that happened, would First Amendment rights of consumers be trampled? Would Perfect 10 itself be adversely impacted because no credit card company would want to take a chance on becoming secondarily liable?

We similarly take little comfort in the dissent's resurrection of the "dance-hall-owner/absentee-landlord" cases as a source of any principled distinction in this area. Dissent at 815-16. Those tests were developed for a brick-and-mortar world, and, as the Napster and Grokster courts implicitly recognized by paying little attention to them, they do not lend themselves well to application in an electronic commerce context. In deciding this case, we are well-advised to follow the lead of the Supreme Court's and our own court's cases confronting online commerce issues.

[10] In fact, as virtually every interested college student knew—and as the program's creator expressly admitted-the sole purpose of the Napster program was to provide a forum for easy copyright infringement. See Napster, 239 F.3d at 1020 n. 5. Perfect 10 does not contend that Defendants' payment systems were engineered for infringement in this way, and we decline to radically expand Napster's cursory treatment of "material contribution" to cover a credit card payment system that was not so designed.

[11] Moreover, if the processing of payment for an infringing transaction were as central to the infringement as the dissent believes it to be—see, e.g., dissent at 811 (payment processing is "an essential step in the infringement process"), dissent at 815 ("Defendants are directly involved in every infringing transaction where payment is made by credit card")—it is difficult to see why Defendants would be not be direct infringers of the distribution right. Not even Perfect 10 has gone so far as to allege that theory here—Perfect 10 would undoubtedly be quite surprised to learn, after years of litigation attempting to expand the scope of secondary liability, that Defendants are direct infringers after all.

[12] This allegation is considered below under vicarious infringement, but we also address it here in terms of contributory infringement.

[13] Fonovisa essentially viewed "supervision" in this context in terms of the swap meet operator's ability to control the activities of the vendors, 76 F.3d at 262, and Napster essentially viewed it in terms of Napster's ability to police activities of its users, 239 F.3d at 1023.

[14] The same analysis of Defendants' role in any violation of the distribution right under 17 U.S.C. § 106(3), discussed in note 11, supra, is equally applicable here. While the Napster program allowed its operators to block users from violation of the distribution right, Defendants' "policing" power is limited to refusing to process payments resulting from such violations and does not extend to directly stopping the violations themselves.

[15] The conclusion that the Defendants operate outside the scope of the Napster rule is further bolstered by consideration—though as persuasive authority only—of this court's opinion in Metro-Goldwyn-Mayer Studios, Inc. v. Grokster Ltd., 380 F.3d 1154 (9th Cir. 2004), which the Supreme Court vacated on other grounds, 545 U.S. 913, 125 S.Ct. 2764, 162 L.Ed.2d 781 (2005). In Grokster, we found the defendants not vicariously liable in part because they could not block individual users or remove copyrighted material from the network. Id. at 1165. Similarly, because none of the infringing images resides on or passes through present Defendants' own systems or any systems over which Defendants exercise direct control, Defendants have no ability to actually remove infringing material from the Internet or directly block its distribution. This distinguishes credit card companies from Napster, which could block access to the tools needed for the easy reproduction and distribution of the actual infringing content.

[16] We do not, as the dissent suggests, hold that an absolute right to stop the infringement is a prerequisite for vicarious liability. Dissent at 818-19. Rather, we consider the Defendants' inability to directly control the actual infringing activities of third-party websites—reproduction, alteration, display, and distribution over the Internet, not over Defendants' payment systems—as evidence that they, much like Google, lack the right and ability to control those activities.

[17] We do not hold, as the dissent suggests, that the ability to exert financial pressure is categorically insufficient to establish sufficient control for vicarious liability. We recognize that financial pressure is often very powerful, but it is precisely for this reason that we hesitate to expand the law of vicarious liability to encompass the sort of financial pressure Defendants may exert. The dissent believes that the gravamen of "right and ability to control" is the "practical ability" to limit infringement. Dissent at 818-19. But if this were true, despite the dissent's protestations to the contrary, there are many providers of essential services who could limit infringement by refusing to offer those services. If "practical ability" is the test, it does not matter if software operators, network technicians, or even utility companies do not have a contractual right to affect the websites' content. It is an article of faith of the free market that, subject to certain limited exceptions, one can refuse to deal with anyone for any reason, and by refusing to deal with the offending websites, these providers could limit infringement.

[18] Specifically, Perfect 10 defines "Stolen Content Websites" as "websites . . . that routinely offer for sale to the public stolen [images]," First Am. Compl. at 2, ¶ 6 (emphasis added), and alleges that "Stolen Content Websites cannot exist without the knowledge and direct participation of the financial institutions that process the credit card transactions for such unlawful material," id. at 2, ¶ 7. We do acknowledge that at this procedural stage, Perfect 10 is entitled to all reasonable inferences, but we understand this to be a factual allegation that the "Stolen Content Websites" could not continue to exist as websites offering images for sale online should defendants withdraw their services, not an allegation that the websites would completely vanish or that infringement by these sites in all its forms would necessarily cease.

[19] The dissent claims that no contractual relationship arises between the infringers and consumers until Defendants process a payment. Dissent at 822-23. Even if true as a factual and legal matter—and given the absence of any citation, it is difficult to know whether this is true—this results from a decision of the websites to delay formation of the relationship, not from any requirement Defendants impose on the transaction.

[20] The dissent argues that Emery does not preclude Perfect 10's claims because the only defendant in Emery was Visa International Service Association, whereas Perfect 10 has also sued the member merchant banks who issue cards and process payments from merchants. Dissent at 822-23. This distinction is only relevant if the activities of the member banks constitute personal participation in the infringing activity, and for all the reasons discussed above, those banks are not personally involved in the reproduction, alteration, or distribution of the infringing images. Rather, they merely process payments related to those activities.

[21] I join part C of the "California Statutory and Common Law Claims" section of the opinion, dealing with plaintiff's libel and prospective economic advantage claims.

[22] Throughout this dissent, I refer to defendants collectively as credit card companies or credit cards. In so doing, I am adopting the same simplifying assumptions as the majority. I am aware that Visa and MasterCard don't deal directly with merchants; rather, merchants obtain credit card accounts from banks, which are in turn authorized by Visa or MasterCard to use their respective payment systems. Some of the other defendants are involved in clearing these transactions. For a description of how the system works, see Emery v. Visa Int'l Serv. Ass'n, 95 Cal. App.4th 952, 956, 116 Cal.Rptr.2d 25 (2002). It may well be that some of the defendants will be absolved of liability because they have no direct contact with merchants or consumers, but that is a matter to be sorted out after discovery.

[23] As the majority points out, maj. op. at 797 n. 6, 800 n. 11, plaintiff's allegations might also support a theory of direct infringement. See First Am. Compl. at 8 ¶ 30 ("Defendants, jointly with the Stolen Content Websites, are engaged in . . . the willful and systematic infringement of the intellectual property rights of" plaintiff and others). Because plaintiff has not argued this theory on appeal, we have no occasion to address it. But the fact that defendants may also be committing direct infringement does not diminish their responsibility as indirect infringers for providing essential services to buyers and sellers of stolen merchandise. A defendant can be liable for both direct and indirect infringement based on the same conduct. See, e.g., Alcatel USA, Inc. v. DGI Technologies, Inc., 166 F.3d 772, 791 (5th Cir.1999).

[24] Neither Google nor the credit cards here were designed for infringement. The majority tries to distinguish this case from Napster and Metro-Goldwyn-Mayer Studios, Inc. v. Grokster, Ltd., 545 U.S. 913, 125 S.Ct. 2764, 162 L.Ed.2d 781 (2005), where defendants' services were designed for no other purpose. Maj. op. at 799 n. 10, 801. But Napster and Grokster are not the endpoint of this court's caselaw: Even though Google has many legitimate, noninfringing uses, Amazon held that it would be guilty of contributory infringement if it could modify its service to avoid helping infringers.

[25] Amazon, as well as Napster and Grokster, hold as much.

[26] The majority argues that "[b]ecause location services lead Internet users directly to infringing images, and often display them on the website of the service itself, we find that location services are more important and more essential—indeed, more `material'—to infringement than payment services are." Maj. op. at 797-98 n. 8. Skipping lightly over the fact that we lack the power to "find" anything, the majority admits that payment services are important, essential and material. That location services may — or may not — be more so, is of no consequence; this is not a race where there can be only one winner.

[27] The majority's claim that "Perfect 10's factual allegations are not to the contrary," maj. op. at 797 n. 7, is simply not accurate. Indeed, elsewhere in the opinion, the majority concedes that plaintiff has made "a factual allegation" that the Stolen Content Websites "could not continue to exist as websites offering images for sale online." Id. at 805-06 n. 18. How then can the majority hold here, apparently as a matter of law, that defendants are absolved of liability because "other viable funding mechanisms are available"? Maj. op. at 797. If we accept as true, as the majority says it does, that the Stolen Content Websites will no longer be able to sell their images, how can we hold that they could still do so by developing other (unknown and unsuspected) ways to get paid?

[28] I note in passing that, even if we were to accept the majority's speculations, they would be insufficient. That the Stolen Content Websites "might" change the way they do business or develop alternative payment mechanisms hardly proves that "other viable funding mechanisms are available." Maj. op. at 797 (emphasis added). The majority's prognostication as to what "might" happen in the future leaves open the likelihood that it will not happen, and positively admits that there are no viable alternative payment mechanisms today.

[29] The majority seeks to distinguish Napster and Grokster on similar grounds by arguing that the defendants do not provide the "tools to locate infringing material," id. at 800, and that the infringing material "[n]ever reside[s] on or pass[es] through any network or computer Defendants operate," id.

[30] The majority consigns the dance hall/absentee landlord cases to oblivion by holding that they have no relevance to the Internet. Maj. op. at 798 n. 9. It is true that these cases were developed in a brick and mortar world, but the distinction they draw between those who materially assist infringement (and are therefore liable) and those who are more remotely involved (and are therefore not liable) is equally important—perhaps even more important—in cyberspace than in real space. That Napster and Grokster did not consider these cases is hardly significant. The defendants there were centrally involved in the infringing transactions—indeed, as the majority reminds us, their systems were created solely to promote infringement, maj. op. at 799 n. 10, 801 — and thus there could be no argument that their involvement in the infringing transactions was too peripheral to give rise to a claim of secondary infringement. The Seventh Circuit managed to apply the dance hall cases to the Internet, see In re Aimster Copyright Litig., 334 F.3d 643, 654 (7th Cir.2003), and I'm confident that federal judges west of the Rockies could have figured out how to do the same.

[31] Amazon interprets the "stop or limit" language as requiring "a legal right to stop or limit the allegedly infringing conduct, as well as the practical ability to do so." Amazon, 487 F.3d at 730.

[32] Plaintiff's allegation on this point, as on many others, is very specific:

When MasterCard or Visa learns of a merchant engaged in illegal, fraudulent, or otherwise improper business practices, their own regulations require them to cause member banks to investigate and, depending on the nature of the misconduct, terminate the merchants from the Visa and MasterCard systems. The rules of both associations strictly prohibit members from servicing illegal businesses.

First Am. Compl. at 6 ¶ 20.

[33] In fact, there can be no doubt that it's true. For example, the MasterCard Merchant Rules Manual provides that "[a] Payment Transaction may not be effected for any of the following reasons: . . . to transfer gambling winnings or funds related to chips, currency, or other value usable for gambling that were purchased in connection with gambling; for any illegal purpose or any other purpose deemed by MasterCard to be impermissible." MasterCard International, Merchant Rules Manual § 2.1.11.3(6) (2006) (emphasis added), available at http://www.mastercard.com/ us/wce/PDF/12999—MERC-Entire—Manual. pdf.

[34] Visa's website, for example, explains that "Visa and its card issuers and acquirers have in place an efficient dispute resolution process." Visa USA, Chargebacks & Dispute Resolution, http://www.usa.visa.com/ merchants/operations/chargebacks—dispute— resolution/index.html (last visited March 24, 2007). It also notes that "[c]hargebacks arise for many reasons, primary among which are customer disputes, fraud, processing errors, authorization issues, and non-fulfillment of copy requests." Id. (emphasis added).

[35] The majority tries to take back in a footnote what it says in text by claiming that an "absolute right to stop" is not "a prerequisite" to vicarious liability, but that its absence is "evidence that[defendants], much like Google, lack the right and ability to control those [infringing] activities." Maj. op. at 804 n. 16. Alas, it won't work. If not having an "absolute right to stop" is merely "evidence" that defendants lack sufficient control for vicarious infringement, then this can be offset by other evidence that they do have such control. Conflicts in the evidence must be resolved after discovery and trial, not on a motion to dismiss.

"Practical ability," the standard announced in Amazon, is a capacious concept, far broader than "absolute right to stop." Even if the majority were right that defendants lack the "absolute right to stop" the infringements, plaintiff would be entitled to show that defendants have the "practical ability" to do so. If the majority means what it says in its footnote, then what it says in text is beside the point. In fact, there can be no doubt that the majority means what it says in text, because it upholds dismissal of the complaint on the ground that defendants lack the "absolute right to stop" the infringers; the footnote is merely an unpersuasive attempt to sweep the conflict with Amazon under the rug.

[36] The conflict with Amazon is clearly drawn in footnote 17, where the majority explicitly disavows "practical ability" as the standard for vicarious infringement. Maj. op. at 805 n. 17. The majority is free to disagree with the standard adopted by our caselaw, but it is not free to reject it.

[37] Those customers may take their patronage to plaintiff's website.

[38] The majority disparages this as mere "financial pressure," but I am aware of no prior case holding that the legal right to exercise "financial pressure" over infringing activity is insufficient to support a finding of vicarious infringement. This is a dangerous precedent. We live in a commercial world and economic incentives are often the strongest possible motivators — far stronger than the often empty threat of litigation. As this case demonstrates, litigation can be costly and protracted, and its results uncertain. By contrast, the threat of stopping an essential service can be implemented at once, without hiring an army of lawyers or persuading judges and juries of the rightness of one's cause. In an economy marked by competition, financial pressure which raises costs or diminishes patronage can be a powerful weapon. By holding that the legal right to exercise financial pressure is an insufficient basis for establishing vicarious infringement, my colleagues take a hasty and unwise step in the development of the law.

[39] Amazon also relied on the district court's finding that Google "lacks the practical ability to police the third-party websites' infringing conduct" because the technical means for doing so suggested by plaintiff "were not workable." Id. at 731 (citing district court's opinion, Perfect 10 v. Google, Inc., 416 F.Supp.2d 828, 857-58 & n. 25 (C.D.Cal.2006)). There is not, and cannot be, such a finding here as the case is presented on a 12(b)(6) motion.

[40] Anecdotal evidence suggests that the AdSense program produces vastly less revenue for most program members than what they earn through their businesses. One poll found that 45% of AdSense members surveyed earned less than $30 per month from the program, and only a small percentage earned a substantial amount. Darren Rowse, AdSense Earnings for November-Poll Results, Problogger (Dec. 19, 2005), http://www. problogger.net/archives/ 2005/12/19/adsense-earnings-for-november-poll-results/.

[41] Providing financial support has long been held to be a basis for vicarious infringement, where that financial support carries with it the contractual right to approve the infringing activity. See Davis v. E.I. DuPont de Nemours & Co., 240 F.Supp. 612 (S.D.N.Y.1965). In Davis, DuPont sponsored a dramatization of "Ethan Frome," which was alleged to infringe several copyrights. DuPont was held vicariously liable, even though it did not own the studio or the broadcast facilities, and could not have prevented airing of the show with another sponsor.

[42] See, e.g., Rules and General Orders of the Vermont Public Service Board § 3.302, available at http://www.state.vt.us/psb/rules/Official AdoptedRules/RulesComplete.pdf (last visited May 14, 2007) ("[N]o utility shall disconnect residential service of gas, electric, or water unless payment of a valid bill or charge is delinquent."); State of New Hampshire, Consumer Rights and Responsibilities, at 5 (1996), available at http://services.unitil.com/ content/info/consumer—rights.html.

[43] The majority is also mistaken when it suggests that parties would be held vicariously liable for infringement simply because, in a market economy, they are free not to deal with one another. Maj. op. at 805 n. 17. Our cases have been very clear that more is required for vicarious infringement; defendant must have a formal contractual or principal-agent relationship with the infringer. It is that contract or relationship that forms the predicate for vicarious liability, and plaintiff must point to some term in the contract or formal relationship that gives defendant a right to stop the infringing activity. See, e.g., Aimster, 334 F.3d at 654; Fonovisa, 76 F.3d at 262; Amazon, 487 F.3d at 729-31. Responding to a service call, in the absence of a contract which provides that the service may be discontinued in the event of illegal conduct, cannot form the basis of vicarious liability and thus the fact that the technician is free to leave can't render him vicariously liable. The requirement that plaintiffs point to a relationship explicitly spelled out in a contract or other legal arrangement is an important limitation on who may be held to answer for vicarious infringement. It should not be casually discarded.

[44] In fact, Perfect 10 has brought suit against some direct infringers. See Perfect 10, Inc. v. CCBill, LLC, 481 F.3d 751 (9th Cir.2007) (reversing summary judgment on direct infringement claim); Perfect 10, Inc. v. Talisman Commc'ns Inc., No. CV99-10450, 2000 WL 364813 (C.D.Cal. Mar.27, 2000).

[45] The majority finds it "anomalous" to hold credit cards liable without DMCA-compliant notice, while ISPs are immune unless they receive such a notice. Maj. op. at 795-96 n. 4. But there is no anomaly in treating parties that are covered by the statute differently from those that are not. Plaintiff here did give ample notice to the credit cards, see p. 824 infra, and should not have its claim dismissed for failing to allege compliance with a statute that does not apply to them.

6.8 Copyright Statutes 6.8 Copyright Statutes

6.8.1 Copyright Act: 17 U.S. Code § 101 - Definitions 6.8.1 Copyright Act: 17 U.S. Code § 101 - Definitions

Except as otherwise provided in this title, as used in this title, the following terms and their variant forms mean the following:
An “anonymous work” is a work on the copies or phonorecords of which no natural person is identified as author.
An “architectural work” is the design of a building as embodied in any tangible medium of expression, including a building, architectural plans, or drawings. The work includes the overall form as well as the arrangement and composition of spaces and elements in the design, but does not include individual standard features.
“Audiovisual works” are works that consist of a series of related images which are intrinsically intended to be shown by the use of machines, or devices such as projectors, viewers, or electronic equipment, together with accompanying sounds, if any, regardless of the nature of the material objects, such as films or tapes, in which the works are embodied.
The “Berne Convention” is the Convention for the Protection of Literary and Artistic Works, signed at Berne, Switzerland, on September 9, 1886, and all acts, protocols, and revisions thereto.
The “best edition” of a work is the edition, published in the United States at any time before the date of deposit, that the Library of Congress determines to be most suitable for its purposes.
A person’s “children” are that person’s immediate offspring, whether legitimate or not, and any children legally adopted by that person.
A “collective work” is a work, such as a periodical issue, anthology, or encyclopedia, in which a number of contributions, constituting separate and independent works in themselves, are assembled into a collective whole.
A “compilation” is a work formed by the collection and assembling of preexisting materials or of data that are selected, coordinated, or arranged in such a way that the resulting work as a whole constitutes an original work of authorship. The term “compilation” includes collective works.
A “computer program” is a set of statements or instructions to be used directly or indirectly in a computer in order to bring about a certain result.
“Copies” are material objects, other than phonorecords, in which a work is fixed by any method now known or later developed, and from which the work can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device. The term “copies” includes the material object, other than a phonorecord, in which the work is first fixed.
“Copyright owner”, with respect to any one of the exclusive rights comprised in a copyright, refers to the owner of that particular right.
A “Copyright Royalty Judge” is a Copyright Royalty Judge appointed under section 802 of this title, and includes any individual serving as an interim Copyright Royalty Judge under such section.
A work is “created” when it is fixed in a copy or phonorecord for the first time; where a work is prepared over a period of time, the portion of it that has been fixed at any particular time constitutes the work as of that time, and where the work has been prepared in different versions, each version constitutes a separate work.
A “derivative work” is a work based upon one or more preexisting works, such as a translation, musical arrangement, dramatization, fictionalization, motion picture version, sound recording, art reproduction, abridgment, condensation, or any other form in which a work may be recast, transformed, or adapted. A work consisting of editorial revisions, annotations, elaborations, or other modifications which, as a whole, represent an original work of authorship, is a “derivative work”.
A “device”, “machine”, or “process” is one now known or later developed.
A “digital transmission” is a transmission in whole or in part in a digital or other non-analog format.
To “display” a work means to show a copy of it, either directly or by means of a film, slide, television image, or any other device or process or, in the case of a motion picture or other audiovisual work, to show individual images nonsequentially.
An “establishment” is a store, shop, or any similar place of business open to the general public for the primary purpose of selling goods or services in which the majority of the gross square feet of space that is nonresidential is used for that purpose, and in which nondramatic musical works are performed publicly.
The term “financial gain” includes receipt, or expectation of receipt, of anything of value, including the receipt of other copyrighted works.
A work is “fixed” in a tangible medium of expression when its embodiment in a copy or phonorecord, by or under the authority of the author, is sufficiently permanent or stable to permit it to be perceived, reproduced, or otherwise communicated for a period of more than transitory duration. A work consisting of sounds, images, or both, that are being transmitted, is “fixed” for purposes of this title if a fixation of the work is being made simultaneously with its transmission.
A “food service or drinking establishment” is a restaurant, inn, bar, tavern, or any other similar place of business in which the public or patrons assemble for the primary purpose of being served food or drink, in which the majority of the gross square feet of space that is nonresidential is used for that purpose, and in which nondramatic musical works are performed publicly.
The “Geneva Phonograms Convention” is the Convention for the Protection of Producers of Phonograms Against Unauthorized Duplication of Their Phonograms, concluded at Geneva, Switzerland, on October 29, 1971.
The “gross square feet of space” of an establishment means the entire interior space of that establishment, and any adjoining outdoor space used to serve patrons, whether on a seasonal basis or otherwise.
The terms “including” and “such as” are illustrative and not limitative.
An “international agreement” is—
(1) the Universal Copyright Convention;
(2) the Geneva Phonograms Convention;
(3) the Berne Convention;
(4) the WTO Agreement;
(5) the WIPO Copyright Treaty;
(6) the WIPO Performances and Phonograms Treaty; and
(7) any other copyright treaty to which the United States is a party.
A “joint work” is a work prepared by two or more authors with the intention that their contributions be merged into inseparable or interdependent parts of a unitary whole.
“Literary works” are works, other than audiovisual works, expressed in words, numbers, or other verbal or numerical symbols or indicia, regardless of the nature of the material objects, such as books, periodicals, manuscripts, phonorecords, film, tapes, disks, or cards, in which they are embodied.
The term “motion picture exhibition facility” means a movie theater, screening room, or other venue that is being used primarily for the exhibition of a copyrighted motion picture, if such exhibition is open to the public or is made to an assembled group of viewers outside of a normal circle of a family and its social acquaintances.
“Motion pictures” are audiovisual works consisting of a series of related images which, when shown in succession, impart an impression of motion, together with accompanying sounds, if any.
To “perform” a work means to recite, render, play, dance, or act it, either directly or by means of any device or process or, in the case of a motion picture or other audiovisual work, to show its images in any sequence or to make the sounds accompanying it audible.
A “performing rights society” is an association, corporation, or other entity that licenses the public performance of nondramatic musical works on behalf of copyright owners of such works, such as the American Society of Composers, Authors and Publishers (ASCAP), Broadcast Music, Inc. (BMI), and SESAC, Inc.
“Phonorecords” are material objects in which sounds, other than those accompanying a motion picture or other audiovisual work, are fixed by any method now known or later developed, and from which the sounds can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device. The term “phonorecords” includes the material object in which the sounds are first fixed.
“Pictorial, graphic, and sculptural works” include two-dimensional and three-dimensional works of fine, graphic, and applied art, photographs, prints and art reproductions, maps, globes, charts, diagrams, models, and technical drawings, including architectural plans. Such works shall include works of artistic craftsmanship insofar as their form but not their mechanical or utilitarian aspects are concerned; the design of a useful article, as defined in this section, shall be considered a pictorial, graphic, or sculptural work only if, and only to the extent that, such design incorporates pictorial, graphic, or sculptural features that can be identified separately from, and are capable of existing independently of, the utilitarian aspects of the article.
For purposes of section 513, a “proprietor” is an individual, corporation, partnership, or other entity, as the case may be, that owns an establishment or a food service or drinking establishment, except that no owner or operator of a radio or television station licensed by the Federal Communications Commission, cable system or satellite carrier, cable or satellite carrier service or programmer, provider of online services or network access or the operator of facilities therefor, telecommunications company, or any other such audio or audiovisual service or programmer now known or as may be developed in the future, commercial subscription music service, or owner or operator of any other transmission service, shall under any circumstances be deemed to be a proprietor.
A “pseudonymous work” is a work on the copies or phonorecords of which the author is identified under a fictitious name.
“Publication” is the distribution of copies or phonorecords of a work to the public by sale or other transfer of ownership, or by rental, lease, or lending. The offering to distribute copies or phonorecords to a group of persons for purposes of further distribution, public performance, or public display, constitutes publication. A public performance or display of a work does not of itself constitute publication.
To perform or display a work “publicly” means—
(1) to perform or display it at a place open to the public or at any place where a substantial number of persons outside of a normal circle of a family and its social acquaintances is gathered; or
(2) to transmit or otherwise communicate a performance or display of the work to a place specified by clause (1) or to the public, by means of any device or process, whether the members of the public capable of receiving the performance or display receive it in the same place or in separate places and at the same time or at different times.
“Registration”, for purposes of sections 205 (c)(2)405406410 (d)411412, and 506(e), means a registration of a claim in the original or the renewed and extended term of copyright.
“Sound recordings” are works that result from the fixation of a series of musical, spoken, or other sounds, but not including the sounds accompanying a motion picture or other audiovisual work, regardless of the nature of the material objects, such as disks, tapes, or other phonorecords, in which they are embodied.
“State” includes the District of Columbia and the Commonwealth of Puerto Rico, and any territories to which this title is made applicable by an Act of Congress.
A “transfer of copyright ownership” is an assignment, mortgage, exclusive license, or any other conveyance, alienation, or hypothecation of a copyright or of any of the exclusive rights comprised in a copyright, whether or not it is limited in time or place of effect, but not including a nonexclusive license.
A “transmission program” is a body of material that, as an aggregate, has been produced for the sole purpose of transmission to the public in sequence and as a unit.
To “transmit” a performance or display is to communicate it by any device or process whereby images or sounds are received beyond the place from which they are sent.
A “treaty party” is a country or intergovernmental organization other than the United States that is a party to an international agreement.
The “United States”, when used in a geographical sense, comprises the several States, the District of Columbia and the Commonwealth of Puerto Rico, and the organized territories under the jurisdiction of the United States Government.
For purposes of section 411, a work is a “United States work” only if—
(1) in the case of a published work, the work is first published—
(A) in the United States;
(B) simultaneously in the United States and another treaty party or parties, whose law grants a term of copyright protection that is the same as or longer than the term provided in the United States;
(C) simultaneously in the United States and a foreign nation that is not a treaty party; or
(D) in a foreign nation that is not a treaty party, and all of the authors of the work are nationals, domiciliaries, or habitual residents of, or in the case of an audiovisual work legal entities with headquarters in, the United States;
(2) in the case of an unpublished work, all the authors of the work are nationals, domiciliaries, or habitual residents of the United States, or, in the case of an unpublished audiovisual work, all the authors are legal entities with headquarters in the United States; or
(3) in the case of a pictorial, graphic, or sculptural work incorporated in a building or structure, the building or structure is located in the United States.
A “useful article” is an article having an intrinsic utilitarian function that is not merely to portray the appearance of the article or to convey information. An article that is normally a part of a useful article is considered a “useful article”.
The author’s “widow” or “widower” is the author’s surviving spouse under the law of the author’s domicile at the time of his or her death, whether or not the spouse has later remarried.
The “WIPO Copyright Treaty” is the WIPO Copyright Treaty concluded at Geneva, Switzerland, on December 20, 1996.
The “WIPO Performances and Phonograms Treaty” is the WIPO Performances and Phonograms Treaty concluded at Geneva, Switzerland, on December 20, 1996.
A “work of visual art” is—
(1) a painting, drawing, print, or sculpture, existing in a single copy, in a limited edition of 200 copies or fewer that are signed and consecutively numbered by the author, or, in the case of a sculpture, in multiple cast, carved, or fabricated sculptures of 200 or fewer that are consecutively numbered by the author and bear the signature or other identifying mark of the author; or
(2) a still photographic image produced for exhibition purposes only, existing in a single copy that is signed by the author, or in a limited edition of 200 copies or fewer that are signed and consecutively numbered by the author.
A work of visual art does not include—
(A)
(i) any poster, map, globe, chart, technical drawing, diagram, model, applied art, motion picture or other audiovisual work, book, magazine, newspaper, periodical, data base, electronic information service, electronic publication, or similar publication;
(ii) any merchandising item or advertising, promotional, descriptive, covering, or packaging material or container;
(iii) any portion or part of any item described in clause (i) or (ii);
(B) any work made for hire; or
(C) any work not subject to copyright protection under this title.
A “work of the United States Government” is a work prepared by an officer or employee of the United States Government as part of that person’s official duties.
A “work made for hire” is—
(1) a work prepared by an employee within the scope of his or her employment; or
(2) a work specially ordered or commissioned for use as a contribution to a collective work, as a part of a motion picture or other audiovisual work, as a translation, as a supplementary work, as a compilation, as an instructional text, as a test, as answer material for a test, or as an atlas, if the parties expressly agree in a written instrument signed by them that the work shall be considered a work made for hire. For the purpose of the foregoing sentence, a “supplementary work” is a work prepared for publication as a secondary adjunct to a work by another author for the purpose of introducing, concluding, illustrating, explaining, revising, commenting upon, or assisting in the use of the other work, such as forewords, afterwords, pictorial illustrations, maps, charts, tables, editorial notes, musical arrangements, answer material for tests, bibliographies, appendixes, and indexes, and an “instructional text” is a literary, pictorial, or graphic work prepared for publication and with the purpose of use in systematic instructional activities.
In determining whether any work is eligible to be considered a work made for hire under paragraph (2), neither the amendment contained in section 1011(d) of the Intellectual Property and Communications Omnibus Reform Act of 1999, as enacted by section 1000(a)(9) ofPublic Law 106–113, nor the deletion of the words added by that amendment—
(A) shall be considered or otherwise given any legal significance, or
(B) shall be interpreted to indicate congressional approval or disapproval of, or acquiescence in, any judicial determination,
by the courts or the Copyright Office. Paragraph (2) shall be interpreted as if both section 2(a)(1) of the Work Made For Hire and Copyright Corrections Act of 2000 and section 1011(d) of the Intellectual Property and Communications Omnibus Reform Act of 1999, as enacted by section 1000(a)(9) ofPublic Law 106–113, were never enacted, and without regard to any inaction or awareness by the Congress at any time of any judicial determinations.
The terms “WTO Agreement” and “WTO member country” have the meanings given those terms in paragraphs (9) and (10), respectively, of section 2 of the Uruguay Round Agreements Act.

6.8.2 Copyright Act: 17 U.S. Code § 102 - Subject matter of copyright: In general 6.8.2 Copyright Act: 17 U.S. Code § 102 - Subject matter of copyright: In general

(a) Copyright protection subsists, in accordance with this title, in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or device. Works of authorship include the following categories:
(1) literary works;
(2) musical works, including any accompanying words;
(3) dramatic works, including any accompanying music;
(4) pantomimes and choreographic works;
(5) pictorial, graphic, and sculptural works;
(6) motion pictures and other audiovisual works;
(7) sound recordings; and
(8) architectural works.
(b) In no case does copyright protection for an original work of authorship extend to any idea, procedure, process, system, method of operation, concept, principle, or discovery, regardless of the form in which it is described, explained, illustrated, or embodied in such work.

6.8.3 Copyright Act: 17 U.S. Code § 103 - Subject matter of copyright: Compilations and derivative works 6.8.3 Copyright Act: 17 U.S. Code § 103 - Subject matter of copyright: Compilations and derivative works

(a) The subject matter of copyright as specified by section 102 includes compilations and derivative works, but protection for a work employing preexisting material in which copyright subsists does not extend to any part of the work in which such material has been used unlawfully.
(b) The copyright in a compilation or derivative work extends only to the material contributed by the author of such work, as distinguished from the preexisting material employed in the work, and does not imply any exclusive right in the preexisting material. The copyright in such work is independent of, and does not affect or enlarge the scope, duration, ownership, or subsistence of, any copyright protection in the preexisting material.

6.8.4 Copyright Act: 17 U.S. Code § 106 - Exclusive rights in copyrighted works 6.8.4 Copyright Act: 17 U.S. Code § 106 - Exclusive rights in copyrighted works

Subject to sections 107 through 122, the owner of copyright under this title has the exclusive rights to do and to authorize any of the following:
(1) to reproduce the copyrighted work in copies or phonorecords;
(2) to prepare derivative works based upon the copyrighted work;
(3) to distribute copies or phonorecords of the copyrighted work to the public by sale or other transfer of ownership, or by rental, lease, or lending;
(4) in the case of literary, musical, dramatic, and choreographic works, pantomimes, and motion pictures and other audiovisual works, to perform the copyrighted work publicly;
(5) in the case of literary, musical, dramatic, and choreographic works, pantomimes, and pictorial, graphic, or sculptural works, including the individual images of a motion picture or other audiovisual work, to display the copyrighted work publicly; and
(6) in the case of sound recordings, to perform the copyrighted work publicly by means of a digital audio transmission.

6.8.5 Copyright Act: 17 U.S. Code § 107 - Limitations on exclusive rights: Fair use 6.8.5 Copyright Act: 17 U.S. Code § 107 - Limitations on exclusive rights: Fair use

Notwithstanding the provisions of sections 106 and 106A, the fair use of a copyrighted work, including such use by reproduction in copies or phonorecords or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright. In determining whether the use made of a work in any particular case is a fair use the factors to be considered shall include—
(1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes;
(2) the nature of the copyrighted work;
(3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and
(4) the effect of the use upon the potential market for or value of the copyrighted work.
The fact that a work is unpublished shall not itself bar a finding of fair use if such finding is made upon consideration of all the above factors.

6.8.6 Copyright Act: 17 U.S. Code § 109 - Limitations on exclusive rights: Effect of transfer of particular copy or phonorecord 6.8.6 Copyright Act: 17 U.S. Code § 109 - Limitations on exclusive rights: Effect of transfer of particular copy or phonorecord

(a) Notwithstanding the provisions of section 106 (3), the owner of a particular copy or phonorecord lawfully made under this title, or any person authorized by such owner, is entitled, without the authority of the copyright owner, to sell or otherwise dispose of the possession of that copy or phonorecord. Notwithstanding the preceding sentence, copies or phonorecords of works subject to restored copyright under section 104A that are manufactured before the date of restoration of copyright or, with respect to reliance parties, before publication or service of notice under section 104A (e), may be sold or otherwise disposed of without the authorization of the owner of the restored copyright for purposes of direct or indirect commercial advantage only during the 12-month period beginning on—
(1) the date of the publication in the Federal Register of the notice of intent filed with the Copyright Office under section 104A (d)(2)(A), or
(2) the date of the receipt of actual notice served under section 104A (d)(2)(B),
whichever occurs first.
(b)
(1)
(A) Notwithstanding the provisions of subsection (a), unless authorized by the owners of copyright in the sound recording or the owner of copyright in a computer program (including any tape, disk, or other medium embodying such program), and in the case of a sound recording in the musical works embodied therein, neither the owner of a particular phonorecord nor any person in possession of a particular copy of a computer program (including any tape, disk, or other medium embodying such program), may, for the purposes of direct or indirect commercial advantage, dispose of, or authorize the disposal of, the possession of that phonorecord or computer program (including any tape, disk, or other medium embodying such program) by rental, lease, or lending, or by any other act or practice in the nature of rental, lease, or lending. Nothing in the preceding sentence shall apply to the rental, lease, or lending of a phonorecord for nonprofit purposes by a nonprofit library or nonprofit educational institution. The transfer of possession of a lawfully made copy of a computer program by a nonprofit educational institution to another nonprofit educational institution or to faculty, staff, and students does not constitute rental, lease, or lending for direct or indirect commercial purposes under this subsection.
(B) This subsection does not apply to—
(i) a computer program which is embodied in a machine or product and which cannot be copied during the ordinary operation or use of the machine or product; or
(ii) a computer program embodied in or used in conjunction with a limited purpose computer that is designed for playing video games and may be designed for other purposes.
(C) Nothing in this subsection affects any provision of chapter 9 of this title.
(2)
(A) Nothing in this subsection shall apply to the lending of a computer program for nonprofit purposes by a nonprofit library, if each copy of a computer program which is lent by such library has affixed to the packaging containing the program a warning of copyright in accordance with requirements that the Register of Copyrights shall prescribe by regulation.
(B) Not later than three years after the date of the enactment of the Computer Software Rental Amendments Act of 1990, and at such times thereafter as the Register of Copyrights considers appropriate, the Register of Copyrights, after consultation with representatives of copyright owners and librarians, shall submit to the Congress a report stating whether this paragraph has achieved its intended purpose of maintaining the integrity of the copyright system while providing nonprofit libraries the capability to fulfill their function. Such report shall advise the Congress as to any information or recommendations that the Register of Copyrights considers necessary to carry out the purposes of this subsection.
(3) Nothing in this subsection shall affect any provision of the antitrust laws. For purposes of the preceding sentence, “antitrust laws” has the meaning given that term in the first section of the Clayton Act and includes section 5 of the Federal Trade Commission Act to the extent that section relates to unfair methods of competition.
(4) Any person who distributes a phonorecord or a copy of a computer program (including any tape, disk, or other medium embodying such program) in violation of paragraph (1) is an infringer of copyright under section 501 of this title and is subject to the remedies set forth in sections 502503504, and 505. Such violation shall not be a criminal offense under section 506 or cause such person to be subject to the criminal penalties set forth in section 2319 of title 18.
(c) Notwithstanding the provisions of section 106 (5), the owner of a particular copy lawfully made under this title, or any person authorized by such owner, is entitled, without the authority of the copyright owner, to display that copy publicly, either directly or by the projection of no more than one image at a time, to viewers present at the place where the copy is located.
(d) The privileges prescribed by subsections (a) and (c) do not, unless authorized by the copyright owner, extend to any person who has acquired possession of the copy or phonorecord from the copyright owner, by rental, lease, loan, or otherwise, without acquiring ownership of it.
(e) Notwithstanding the provisions of sections 106 (4) and 106 (5), in the case of an electronic audiovisual game intended for use in coin-operated equipment, the owner of a particular copy of such a game lawfully made under this title, is entitled, without the authority of the copyright owner of the game, to publicly perform or display that game in coin-operated equipment, except that this subsection shall not apply to any work of authorship embodied in the audiovisual game if the copyright owner of the electronic audiovisual game is not also the copyright owner of the work of authorship.

6.8.7 Copyright Act: 17 U.S. Code § 110 - Limitations on exclusive rights: Exemption of certain performances and displays 6.8.7 Copyright Act: 17 U.S. Code § 110 - Limitations on exclusive rights: Exemption of certain performances and displays

Notwithstanding the provisions of section 106, the following are not infringements of copyright:
(1) performance or display of a work by instructors or pupils in the course of face-to-face teaching activities of a nonprofit educational institution, in a classroom or similar place devoted to instruction, unless, in the case of a motion picture or other audiovisual work, the performance, or the display of individual images, is given by means of a copy that was not lawfully made under this title, and that the person responsible for the performance knew or had reason to believe was not lawfully made;
(2) except with respect to a work produced or marketed primarily for performance or display as part of mediated instructional activities transmitted via digital networks, or a performance or display that is given by means of a copy or phonorecord that is not lawfully made and acquired under this title, and the transmitting government body or accredited nonprofit educational institution knew or had reason to believe was not lawfully made and acquired, the performance of a nondramatic literary or musical work or reasonable and limited portions of any other work, or display of a work in an amount comparable to that which is typically displayed in the course of a live classroom session, by or in the course of a transmission, if—
(A) the performance or display is made by, at the direction of, or under the actual supervision of an instructor as an integral part of a class session offered as a regular part of the systematic mediated instructional activities of a governmental body or an accredited nonprofit educational institution;
(B) the performance or display is directly related and of material assistance to the teaching content of the transmission;
(C) the transmission is made solely for, and, to the extent technologically feasible, the reception of such transmission is limited to—
(i) students officially enrolled in the course for which the transmission is made; or
(ii) officers or employees of governmental bodies as a part of their official duties or employment; and
(D) the transmitting body or institution—
(i) institutes policies regarding copyright, provides informational materials to faculty, students, and relevant staff members that accurately describe, and promote compliance with, the laws of the United States relating to copyright, and provides notice to students that materials used in connection with the course may be subject to copyright protection; and
(ii) in the case of digital transmissions—
(I) applies technological measures that reasonably prevent—
(aa) retention of the work in accessible form by recipients of the transmission from the transmitting body or institution for longer than the class session; and
(bb) unauthorized further dissemination of the work in accessible form by such recipients to others; and
(II) does not engage in conduct that could reasonably be expected to interfere with technological measures used by copyright owners to prevent such retention or unauthorized further dissemination;
(3) performance of a nondramatic literary or musical work or of a dramatico-musical work of a religious nature, or display of a work, in the course of services at a place of worship or other religious assembly;
(4) performance of a nondramatic literary or musical work otherwise than in a transmission to the public, without any purpose of direct or indirect commercial advantage and without payment of any fee or other compensation for the performance to any of its performers, promoters, or organizers, if—
(A) there is no direct or indirect admission charge; or
(B) the proceeds, after deducting the reasonable costs of producing the performance, are used exclusively for educational, religious, or charitable purposes and not for private financial gain, except where the copyright owner has served notice of objection to the performance under the following conditions:
(i) the notice shall be in writing and signed by the copyright owner or such owner’s duly authorized agent; and
(ii) the notice shall be served on the person responsible for the performance at least seven days before the date of the performance, and shall state the reasons for the objection; and
(iii) the notice shall comply, in form, content, and manner of service, with requirements that the Register of Copyrights shall prescribe by regulation;
(5)
(A) except as provided in subparagraph (B), communication of a transmission embodying a performance or display of a work by the public reception of the transmission on a single receiving apparatus of a kind commonly used in private homes, unless—
(i) a direct charge is made to see or hear the transmission; or
(ii) the transmission thus received is further transmitted to the public;
(B) communication by an establishment of a transmission or retransmission embodying a performance or display of a nondramatic musical work intended to be received by the general public, originated by a radio or television broadcast station licensed as such by the Federal Communications Commission, or, if an audiovisual transmission, by a cable system or satellite carrier, if—
(i) in the case of an establishment other than a food service or drinking establishment, either the establishment in which the communication occurs has less than 2,000 gross square feet of space (excluding space used for customer parking and for no other purpose), or the establishment in which the communication occurs has 2,000 or more gross square feet of space (excluding space used for customer parking and for no other purpose) and—
(I) if the performance is by audio means only, the performance is communicated by means of a total of not more than 6 loudspeakers, of which not more than 4 loudspeakers are located in any 1 room or adjoining outdoor space; or
(II) if the performance or display is by audiovisual means, any visual portion of the performance or display is communicated by means of a total of not more than 4 audiovisual devices, of which not more than 1 audiovisual device is located in any 1 room, and no such audiovisual device has a diagonal screen size greater than 55 inches, and any audio portion of the performance or display is communicated by means of a total of not more than 6 loudspeakers, of which not more than 4 loudspeakers are located in any 1 room or adjoining outdoor space;
(ii) in the case of a food service or drinking establishment, either the establishment in which the communication occurs has less than 3,750 gross square feet of space (excluding space used for customer parking and for no other purpose), or the establishment in which the communication occurs has 3,750 gross square feet of space or more (excluding space used for customer parking and for no other purpose) and—
(I) if the performance is by audio means only, the performance is communicated by means of a total of not more than 6 loudspeakers, of which not more than 4 loudspeakers are located in any 1 room or adjoining outdoor space; or
(II) if the performance or display is by audiovisual means, any visual portion of the performance or display is communicated by means of a total of not more than 4 audiovisual devices, of which not more than one audiovisual device is located in any 1 room, and no such audiovisual device has a diagonal screen size greater than 55 inches, and any audio portion of the performance or display is communicated by means of a total of not more than 6 loudspeakers, of which not more than 4 loudspeakers are located in any 1 room or adjoining outdoor space;
(iii) no direct charge is made to see or hear the transmission or retransmission;
(iv) the transmission or retransmission is not further transmitted beyond the establishment where it is received; and
(v) the transmission or retransmission is licensed by the copyright owner of the work so publicly performed or displayed;
(6) performance of a nondramatic musical work by a governmental body or a nonprofit agricultural or horticultural organization, in the course of an annual agricultural or horticultural fair or exhibition conducted by such body or organization; the exemption provided by this clause shall extend to any liability for copyright infringement that would otherwise be imposed on such body or organization, under doctrines of vicarious liability or related infringement, for a performance by a concessionnaire, [1] business establishment, or other person at such fair or exhibition, but shall not excuse any such person from liability for the performance;
(7) performance of a nondramatic musical work by a vending establishment open to the public at large without any direct or indirect admission charge, where the sole purpose of the performance is to promote the retail sale of copies or phonorecords of the work, or of the audiovisual or other devices utilized in such performance, and the performance is not transmitted beyond the place where the establishment is located and is within the immediate area where the sale is occurring;
(8) performance of a nondramatic literary work, by or in the course of a transmission specifically designed for and primarily directed to blind or other handicapped persons who are unable to read normal printed material as a result of their handicap, or deaf or other handicapped persons who are unable to hear the aural signals accompanying a transmission of visual signals, if the performance is made without any purpose of direct or indirect commercial advantage and its transmission is made through the facilities of:
(i) a governmental body; or
(ii) a noncommercial educational broadcast station (as defined in section 397 of title47); or
(iii) a radio subcarrier authorization (as defined in 47 CFR 73.293–73.295 and 73.593–73.595); or
(iv) a cable system (as defined in section 111 (f));
(9) performance on a single occasion of a dramatic literary work published at least ten years before the date of the performance, by or in the course of a transmission specifically designed for and primarily directed to blind or other handicapped persons who are unable to read normal printed material as a result of their handicap, if the performance is made without any purpose of direct or indirect commercial advantage and its transmission is made through the facilities of a radio subcarrier authorization referred to in clause (8)(iii), Provided, That the provisions of this clause shall not be applicable to more than one performance of the same work by the same performers or under the auspices of the same organization;
(10) notwithstanding paragraph (4), the following is not an infringement of copyright: performance of a nondramatic literary or musical work in the course of a social function which is organized and promoted by a nonprofit veterans’ organization or a nonprofit fraternal organization to which the general public is not invited, but not including the invitees of the organizations, if the proceeds from the performance, after deducting the reasonable costs of producing the performance, are used exclusively for charitable purposes and not for financial gain. For purposes of this section the social functions of any college or university fraternity or sorority shall not be included unless the social function is held solely to raise funds for a specific charitable purpose; and
(11) the making imperceptible, by or at the direction of a member of a private household, of limited portions of audio or video content of a motion picture, during a performance in or transmitted to that household for private home viewing, from an authorized copy of the motion picture, or the creation or provision of a computer program or other technology that enables such making imperceptible and that is designed and marketed to be used, at the direction of a member of a private household, for such making imperceptible, if no fixed copy of the altered version of the motion picture is created by such computer program or other technology.
The exemptions provided under paragraph (5) shall not be taken into account in any administrative, judicial, or other governmental proceeding to set or adjust the royalties payable to copyright owners for the public performance or display of their works. Royalties payable to copyright owners for any public performance or display of their works other than such performances or displays as are exempted under paragraph (5) shall not be diminished in any respect as a result of such exemption.
In paragraph (2), the term “mediated instructional activities” with respect to the performance or display of a work by digital transmission under this section refers to activities that use such work as an integral part of the class experience, controlled by or under the actual supervision of the instructor and analogous to the type of performance or display that would take place in a live classroom setting. The term does not refer to activities that use, in 1 or more class sessions of a single course, such works as textbooks, course packs, or other material in any media, copies or phonorecords of which are typically purchased or acquired by the students in higher education for their independent use and retention or are typically purchased or acquired for elementary and secondary students for their possession and independent use.
For purposes of paragraph (2), accreditation—
(A) with respect to an institution providing post-secondary education, shall be as determined by a regional or national accrediting agency recognized by the Council on Higher Education Accreditation or the United States Department of Education; and
(B) with respect to an institution providing elementary or secondary education, shall be as recognized by the applicable state certification or licensing procedures.
For purposes of paragraph (2), no governmental body or accredited nonprofit educational institution shall be liable for infringement by reason of the transient or temporary storage of material carried out through the automatic technical process of a digital transmission of the performance or display of that material as authorized under paragraph (2). No such material stored on the system or network controlled or operated by the transmitting body or institution under this paragraph shall be maintained on such system or network in a manner ordinarily accessible to anyone other than anticipated recipients. No such copy shall be maintained on the system or network in a manner ordinarily accessible to such anticipated recipients for a longer period than is reasonably necessary to facilitate the transmissions for which it was made.
For purposes of paragraph (11), the term “making imperceptible” does not include the addition of audio or video content that is performed or displayed over or in place of existing content in a motion picture.
Nothing in paragraph (11) shall be construed to imply further rights under section 106 of this title, or to have any effect on defenses or limitations on rights granted under any other section of this title or under any other paragraph of this section.

6.8.8 Digital Millenium Copyright Act: 17 U.S. Code § 114 - Scope of exclusive rights in sound recordings 6.8.8 Digital Millenium Copyright Act: 17 U.S. Code § 114 - Scope of exclusive rights in sound recordings

(a) The exclusive rights of the owner of copyright in a sound recording are limited to the rights specified by clauses (1), (2), (3) and (6) of section 106, and do not include any right of performance under section 106 (4).
(b) The exclusive right of the owner of copyright in a sound recording under clause (1) of section 106 is limited to the right to duplicate the sound recording in the form of phonorecords or copies that directly or indirectly recapture the actual sounds fixed in the recording. The exclusive right of the owner of copyright in a sound recording under clause (2) of section 106 is limited to the right to prepare a derivative work in which the actual sounds fixed in the sound recording are rearranged, remixed, or otherwise altered in sequence or quality. The exclusive rights of the owner of copyright in a sound recording under clauses (1) and (2) of section 106 do not extend to the making or duplication of another sound recording that consists entirely of an independent fixation of other sounds, even though such sounds imitate or simulate those in the copyrighted sound recording. The exclusive rights of the owner of copyright in a sound recording under clauses (1), (2), and (3) of section 106 do not apply to sound recordings included in educational television and radio programs (as defined in section 397 of title 47) distributed or transmitted by or through public broadcasting entities (as defined by section 118 (f)): Provided, That copies or phonorecords of said programs are not commercially distributed by or through public broadcasting entities to the general public.
(c) This section does not limit or impair the exclusive right to perform publicly, by means of a phonorecord, any of the works specified by section 106 (4).
(d) Limitations on Exclusive Right.— Notwithstanding the provisions of section 106(6)
(1) Exempt transmissions and retransmissions.— The performance of a sound recording publicly by means of a digital audio transmission, other than as a part of an interactive service, is not an infringement of section 106 (6) if the performance is part of—
(A) a nonsubscription broadcast transmission;
(B) a retransmission of a nonsubscription broadcast transmission: Provided, That, in the case of a retransmission of a radio station’s broadcast transmission—
(i) the radio station’s broadcast transmission is not willfully or repeatedly retransmitted more than a radius of 150 miles from the site of the radio broadcast transmitter, however—
(I) the 150 mile limitation under this clause shall not apply when a nonsubscription broadcast transmission by a radio station licensed by the Federal Communications Commission is retransmitted on a nonsubscription basis by a terrestrial broadcast station, terrestrial translator, or terrestrial repeater licensed by the Federal Communications Commission; and
(II) in the case of a subscription retransmission of a nonsubscription broadcast retransmission covered by subclause (I), the 150 mile radius shall be measured from the transmitter site of such broadcast retransmitter;
(ii) the retransmission is of radio station broadcast transmissions that are—
(I) obtained by the retransmitter over the air;
(II) not electronically processed by the retransmitter to deliver separate and discrete signals; and
(III) retransmitted only within the local communities served by the retransmitter;
(iii) the radio station’s broadcast transmission was being retransmitted to cable systems (as defined in section 111 (f)) by a satellite carrier on January 1, 1995, and that retransmission was being retransmitted by cable systems as a separate and discrete signal, and the satellite carrier obtains the radio station’s broadcast transmission in an analog format: Provided, That the broadcast transmission being retransmitted may embody the programming of no more than one radio station; or
(iv) the radio station’s broadcast transmission is made by a noncommercial educational broadcast station funded on or after January 1, 1995, under section 396(k) of the Communications Act of 1934 (47 U.S.C. 396 (k)), consists solely of noncommercial educational and cultural radio programs, and the retransmission, whether or not simultaneous, is a nonsubscription terrestrial broadcast retransmission; or
(C) a transmission that comes within any of the following categories—
(i) a prior or simultaneous transmission incidental to an exempt transmission, such as a feed received by and then retransmitted by an exempt transmitter: Provided, That such incidental transmissions do not include any subscription transmission directly for reception by members of the public;
(ii) a transmission within a business establishment, confined to its premises or the immediately surrounding vicinity;
(iii) a retransmission by any retransmitter, including a multichannel video programming distributor as defined in section 602(12)  [1] of the Communications Act of 1934 (47 U.S.C. 522 (12)), of a transmission by a transmitter licensed to publicly perform the sound recording as a part of that transmission, if the retransmission is simultaneous with the licensed transmission and authorized by the transmitter; or
(iv) a transmission to a business establishment for use in the ordinary course of its business: Provided, That the business recipient does not retransmit the transmission outside of its premises or the immediately surrounding vicinity, and that the transmission does not exceed the sound recording performance complement. Nothing in this clause shall limit the scope of the exemption in clause (ii).
(2) Statutory licensing of certain transmissions.— The performance of a sound recording publicly by means of a subscription digital audio transmission not exempt under paragraph (1), an eligible nonsubscription transmission, or a transmission not exempt under paragraph (1) that is made by a preexisting satellite digital audio radio service shall be subject to statutory licensing, in accordance with subsection (f) if—
(A)
(i) the transmission is not part of an interactive service;
(ii) except in the case of a transmission to a business establishment, the transmitting entity does not automatically and intentionally cause any device receiving the transmission to switch from one program channel to another; and
(iii) except as provided in section 1002 (e), the transmission of the sound recording is accompanied, if technically feasible, by the information encoded in that sound recording, if any, by or under the authority of the copyright owner of that sound recording, that identifies the title of the sound recording, the featured recording artist who performs on the sound recording, and related information, including information concerning the underlying musical work and its writer;
(B) in the case of a subscription transmission not exempt under paragraph (1) that is made by a preexisting subscription service in the same transmission medium used by such service on July 31, 1998, or in the case of a transmission not exempt under paragraph (1) that is made by a preexisting satellite digital audio radio service—
(i) the transmission does not exceed the sound recording performance complement; and
(ii) the transmitting entity does not cause to be published by means of an advance program schedule or prior announcement the titles of the specific sound recordings or phonorecords embodying such sound recordings to be transmitted; and
(C) in the case of an eligible nonsubscription transmission or a subscription transmission not exempt under paragraph (1) that is made by a new subscription service or by a preexisting subscription service other than in the same transmission medium used by such service on July 31, 1998—
(i) the transmission does not exceed the sound recording performance complement, except that this requirement shall not apply in the case of a retransmission of a broadcast transmission if the retransmission is made by a transmitting entity that does not have the right or ability to control the programming of the broadcast station making the broadcast transmission, unless—
(I) the broadcast station makes broadcast transmissions—
(aa) in digital format that regularly exceed the sound recording performance complement; or
(bb) in analog format, a substantial portion of which, on a weekly basis, exceed the sound recording performance complement; and
(II) the sound recording copyright owner or its representative has notified the transmitting entity in writing that broadcast transmissions of the copyright owner’s sound recordings exceed the sound recording performance complement as provided in this clause;
(ii) the transmitting entity does not cause to be published, or induce or facilitate the publication, by means of an advance program schedule or prior announcement, the titles of the specific sound recordings to be transmitted, the phonorecords embodying such sound recordings, or, other than for illustrative purposes, the names of the featured recording artists, except that this clause does not disqualify a transmitting entity that makes a prior announcement that a particular artist will be featured within an unspecified future time period, and in the case of a retransmission of a broadcast transmission by a transmitting entity that does not have the right or ability to control the programming of the broadcast transmission, the requirement of this clause shall not apply to a prior oral announcement by the broadcast station, or to an advance program schedule published, induced, or facilitated by the broadcast station, if the transmitting entity does not have actual knowledge and has not received written notice from the copyright owner or its representative that the broadcast station publishes or induces or facilitates the publication of such advance program schedule, or if such advance program schedule is a schedule of classical music programming published by the broadcast station in the same manner as published by that broadcast station on or before September 30, 1998;
(iii) the transmission—
(I) is not part of an archived program of less than 5 hours duration;
(II) is not part of an archived program of 5 hours or greater in duration that is made available for a period exceeding 2 weeks;
(III) is not part of a continuous program which is of less than 3 hours duration; or
(IV) is not part of an identifiable program in which performances of sound recordings are rendered in a predetermined order, other than an archived or continuous program, that is transmitted at—
(aa) more than 3 times in any 2-week period that have been publicly announced in advance, in the case of a program of less than 1 hour in duration, or
(bb) more than 4 times in any 2-week period that have been publicly announced in advance, in the case of a program of 1 hour or more in duration,
  except that the requirement of this subclause shall not apply in the case of a retransmission of a broadcast transmission by a transmitting entity that does not have the right or ability to control the programming of the broadcast transmission, unless the transmitting entity is given notice in writing by the copyright owner of the sound recording that the broadcast station makes broadcast transmissions that regularly violate such requirement;
(iv) the transmitting entity does not knowingly perform the sound recording, as part of a service that offers transmissions of visual images contemporaneously with transmissions of sound recordings, in a manner that is likely to cause confusion, to cause mistake, or to deceive, as to the affiliation, connection, or association of the copyright owner or featured recording artist with the transmitting entity or a particular product or service advertised by the transmitting entity, or as to the origin, sponsorship, or approval by the copyright owner or featured recording artist of the activities of the transmitting entity other than the performance of the sound recording itself;
(v) the transmitting entity cooperates to prevent, to the extent feasible without imposing substantial costs or burdens, a transmission recipient or any other person or entity from automatically scanning the transmitting entity’s transmissions alone or together with transmissions by other transmitting entities in order to select a particular sound recording to be transmitted to the transmission recipient, except that the requirement of this clause shall not apply to a satellite digital audio service that is in operation, or that is licensed by the Federal Communications Commission, on or before July 31, 1998;
(vi) the transmitting entity takes no affirmative steps to cause or induce the making of a phonorecord by the transmission recipient, and if the technology used by the transmitting entity enables the transmitting entity to limit the making by the transmission recipient of phonorecords of the transmission directly in a digital format, the transmitting entity sets such technology to limit such making of phonorecords to the extent permitted by such technology;
(vii) phonorecords of the sound recording have been distributed to the public under the authority of the copyright owner or the copyright owner authorizes the transmitting entity to transmit the sound recording, and the transmitting entity makes the transmission from a phonorecord lawfully made under the authority of the copyright owner, except that the requirement of this clause shall not apply to a retransmission of a broadcast transmission by a transmitting entity that does not have the right or ability to control the programming of the broadcast transmission, unless the transmitting entity is given notice in writing by the copyright owner of the sound recording that the broadcast station makes broadcast transmissions that regularly violate such requirement;
(viii) the transmitting entity accommodates and does not interfere with the transmission of technical measures that are widely used by sound recording copyright owners to identify or protect copyrighted works, and that are technically feasible of being transmitted by the transmitting entity without imposing substantial costs on the transmitting entity or resulting in perceptible aural or visual degradation of the digital signal, except that the requirement of this clause shall not apply to a satellite digital audio service that is in operation, or that is licensed under the authority of the Federal Communications Commission, on or before July 31, 1998, to the extent that such service has designed, developed, or made commitments to procure equipment or technology that is not compatible with such technical measures before such technical measures are widely adopted by sound recording copyright owners; and
(ix) the transmitting entity identifies in textual data the sound recording during, but not before, the time it is performed, including the title of the sound recording, the title of the phonorecord embodying such sound recording, if any, and the featured recording artist, in a manner to permit it to be displayed to the transmission recipient by the device or technology intended for receiving the service provided by the transmitting entity, except that the obligation in this clause shall not take effect until 1 year after the date of the enactment of the Digital Millennium Copyright Act and shall not apply in the case of a retransmission of a broadcast transmission by a transmitting entity that does not have the right or ability to control the programming of the broadcast transmission, or in the case in which devices or technology intended for receiving the service provided by the transmitting entity that have the capability to display such textual data are not common in the marketplace.
(3) Licenses for transmissions by interactive services.—
(A) No interactive service shall be granted an exclusive license under section 106 (6)for the performance of a sound recording publicly by means of digital audio transmission for a period in excess of 12 months, except that with respect to an exclusive license granted to an interactive service by a licensor that holds the copyright to 1,000 or fewer sound recordings, the period of such license shall not exceed 24 months: Provided, however, That the grantee of such exclusive license shall be ineligible to receive another exclusive license for the performance of that sound recording for a period of 13 months from the expiration of the prior exclusive license.
(B) The limitation set forth in subparagraph (A) of this paragraph shall not apply if—
(i) the licensor has granted and there remain in effect licenses under section 106 (6)for the public performance of sound recordings by means of digital audio transmission by at least 5 different interactive services: Provided, however, That each such license must be for a minimum of 10 percent of the copyrighted sound recordings owned by the licensor that have been licensed to interactive services, but in no event less than 50 sound recordings; or
(ii) the exclusive license is granted to perform publicly up to 45 seconds of a sound recording and the sole purpose of the performance is to promote the distribution or performance of that sound recording.
(C) Notwithstanding the grant of an exclusive or nonexclusive license of the right of public performance under section 106 (6), an interactive service may not publicly perform a sound recording unless a license has been granted for the public performance of any copyrighted musical work contained in the sound recording: Provided, That such license to publicly perform the copyrighted musical work may be granted either by a performing rights society representing the copyright owner or by the copyright owner.
(D) The performance of a sound recording by means of a retransmission of a digital audio transmission is not an infringement of section 106 (6) if—
(i) the retransmission is of a transmission by an interactive service licensed to publicly perform the sound recording to a particular member of the public as part of that transmission; and
(ii) the retransmission is simultaneous with the licensed transmission, authorized by the transmitter, and limited to that particular member of the public intended by the interactive service to be the recipient of the transmission.
(E) For the purposes of this paragraph—
(i) a “licensor” shall include the licensing entity and any other entity under any material degree of common ownership, management, or control that owns copyrights in sound recordings; and
(ii) a “performing rights society” is an association or corporation that licenses the public performance of nondramatic musical works on behalf of the copyright owner, such as the American Society of Composers, Authors and Publishers, Broadcast Music, Inc., and SESAC, Inc.
(4) Rights not otherwise limited.—
(A) Except as expressly provided in this section, this section does not limit or impair the exclusive right to perform a sound recording publicly by means of a digital audio transmission under section 106 (6).
(B) Nothing in this section annuls or limits in any way—
(i) the exclusive right to publicly perform a musical work, including by means of a digital audio transmission, under section 106 (4);
(ii) the exclusive rights in a sound recording or the musical work embodied therein under sections 106 (1)106 (2) and 106 (3); or
(iii) any other rights under any other clause of section 106, or remedies available under this title, as such rights or remedies exist either before or after the date of enactment of the Digital Performance Right in Sound Recordings Act of 1995.
(C) Any limitations in this section on the exclusive right under section 106 (6) apply only to the exclusive right under section 106 (6) and not to any other exclusive rights under section 106. Nothing in this section shall be construed to annul, limit, impair or otherwise affect in any way the ability of the owner of a copyright in a sound recording to exercise the rights under sections 106 (1)106 (2) and 106 (3), or to obtain the remedies available under this title pursuant to such rights, as such rights and remedies exist either before or after the date of enactment of the Digital Performance Right in Sound Recordings Act of 1995.
(e) Authority for Negotiations.—
(1) Notwithstanding any provision of the antitrust laws, in negotiating statutory licenses in accordance with subsection (f), any copyright owners of sound recordings and any entities performing sound recordings affected by this section may negotiate and agree upon the royalty rates and license terms and conditions for the performance of such sound recordings and the proportionate division of fees paid among copyright owners, and may designate common agents on a nonexclusive basis to negotiate, agree to, pay, or receive payments.
(2) For licenses granted under section 106 (6), other than statutory licenses, such as for performances by interactive services or performances that exceed the sound recording performance complement—
(A) copyright owners of sound recordings affected by this section may designate common agents to act on their behalf to grant licenses and receive and remit royalty payments: Provided, That each copyright owner shall establish the royalty rates and material license terms and conditions unilaterally, that is, not in agreement, combination, or concert with other copyright owners of sound recordings; and
(B) entities performing sound recordings affected by this section may designate common agents to act on their behalf to obtain licenses and collect and pay royalty fees: Provided, That each entity performing sound recordings shall determine the royalty rates and material license terms and conditions unilaterally, that is, not in agreement, combination, or concert with other entities performing sound recordings.
(f) Licenses for Certain Nonexempt Transmissions.—
(1)
(A) Proceedings under chapter 8 shall determine reasonable rates and terms of royalty payments for subscription transmissions by preexisting subscription services and transmissions by preexisting satellite digital audio radio services specified by subsection (d)(2) during the 5-year period beginning on January 1 of the second year following the year in which the proceedings are to be commenced, except in the case of a different transitional period provided under section 6(b)(3) of the Copyright Royalty and Distribution Reform Act of 2004, or such other period as the parties may agree. Such terms and rates shall distinguish among the different types of digital audio transmission services then in operation. Any copyright owners of sound recordings, preexisting subscription services, or preexisting satellite digital audio radio services may submit to the Copyright Royalty Judges licenses covering such subscription transmissions with respect to such sound recordings. The parties to each proceeding shall bear their own costs.
(B) The schedule of reasonable rates and terms determined by the Copyright Royalty Judges shall, subject to paragraph (3), be binding on all copyright owners of sound recordings and entities performing sound recordings affected by this paragraph during the 5-year period specified in subparagraph (A), a transitional period provided under section 6(b)(3) of the Copyright Royalty and Distribution Reform Act of 2004, or such other period as the parties may agree. In establishing rates and terms for preexisting subscription services and preexisting satellite digital audio radio services, in addition to the objectives set forth in section 801 (b)(1), the Copyright Royalty Judges may consider the rates and terms for comparable types of subscription digital audio transmission services and comparable circumstances under voluntary license agreements described in subparagraph (A).
(C) The procedures under subparagraphs (A) and (B) also shall be initiated pursuant to a petition filed by any copyright owners of sound recordings, any preexisting subscription services, or any preexisting satellite digital audio radio services indicating that a new type of subscription digital audio transmission service on which sound recordings are performed is or is about to become operational, for the purpose of determining reasonable terms and rates of royalty payments with respect to such new type of transmission service for the period beginning with the inception of such new type of service and ending on the date on which the royalty rates and terms for subscription digital audio transmission services most recently determined under subparagraph (A) or (B) and chapter 8 expire, or such other period as the parties may agree.
(2)
(A) Proceedings under chapter 8 shall determine reasonable rates and terms of royalty payments for public performances of sound recordings by means of eligible nonsubscription transmission services and new subscription services specified by subsection (d)(2) during the 5-year period beginning on January 1 of the second year following the year in which the proceedings are to be commenced, except in the case of a different transitional period provided under section 6(b)(3) of the Copyright Royalty and Distribution Reform Act of 2004, or such other period as the parties may agree. Such rates and terms shall distinguish among the different types of eligible nonsubscription transmission services and new subscription services then in operation and shall include a minimum fee for each such type of service. Any copyright owners of sound recordings or any entities performing sound recordings affected by this paragraph may submit to the Copyright Royalty Judges licenses covering such eligible nonsubscription transmissions and new subscription services with respect to such sound recordings. The parties to each proceeding shall bear their own costs.
(B) The schedule of reasonable rates and terms determined by the Copyright Royalty Judges shall, subject to paragraph (3), be binding on all copyright owners of sound recordings and entities performing sound recordings affected by this paragraph during the 5-year period specified in subparagraph (A), a transitional period provided under section 6(b)(3) of the Copyright Royalty and Distribution  [2] Act of 2004, or such other period as the parties may agree. Such rates and terms shall distinguish among the different types of eligible nonsubscription transmission services then in operation and shall include a minimum fee for each such type of service, such differences to be based on criteria including, but not limited to, the quantity and nature of the use of sound recordings and the degree to which use of the service may substitute for or may promote the purchase of phonorecords by consumers. In establishing rates and terms for transmissions by eligible nonsubscription services and new subscription services, the Copyright Royalty Judges shall establish rates and terms that most clearly represent the rates and terms that would have been negotiated in the marketplace between a willing buyer and a willing seller. In determining such rates and terms, the Copyright Royalty Judges shall base their decision on economic, competitive and programming information presented by the parties, including—
(i) whether use of the service may substitute for or may promote the sales of phonorecords or otherwise may interfere with or may enhance the sound recording copyright owner’s other streams of revenue from its sound recordings; and
(ii) the relative roles of the copyright owner and the transmitting entity in the copyrighted work and the service made available to the public with respect to relative creative contribution, technological contribution, capital investment, cost, and risk.
In establishing such rates and terms, the Copyright Royalty Judges may consider the rates and terms for comparable types of digital audio transmission services and comparable circumstances under voluntary license agreements described in subparagraph (A).
(C) The procedures under subparagraphs (A) and (B) shall also be initiated pursuant to a petition filed by any copyright owners of sound recordings or any eligible nonsubscription service or new subscription service indicating that a new type of eligible nonsubscription service or new subscription service on which sound recordings are performed is or is about to become operational, for the purpose of determining reasonable terms and rates of royalty payments with respect to such new type of service for the period beginning with the inception of such new type of service and ending on the date on which the royalty rates and terms for eligible nonsubscription services and new subscription services, as the case may be, most recently determined under subparagraph (A) or (B) and chapter 8 expire, or such other period as the parties may agree.
(3) License agreements voluntarily negotiated at any time between 1 or more copyright owners of sound recordings and 1 or more entities performing sound recordings shall be given effect in lieu of any decision by the Librarian of Congress or determination by the Copyright Royalty Judges.
(4)
(A) The Copyright Royalty Judges shall also establish requirements by which copyright owners may receive reasonable notice of the use of their sound recordings under this section, and under which records of such use shall be kept and made available by entities performing sound recordings. The notice and recordkeeping rules in effect on the day before the effective date of the Copyright Royalty and Distribution Reform Act of 2004 shall remain in effect unless and until new regulations are promulgated by the Copyright Royalty Judges. If new regulations are promulgated under this subparagraph, the Copyright Royalty Judges shall take into account the substance and effect of the rules in effect on the day before the effective date of the Copyright Royalty and Distribution Reform Act of 2004 and shall, to the extent practicable, avoid significant disruption of the functions of any designated agent authorized to collect and distribute royalty fees.
(B) Any person who wishes to perform a sound recording publicly by means of a transmission eligible for statutory licensing under this subsection may do so without infringing the exclusive right of the copyright owner of the sound recording—
(i) by complying with such notice requirements as the Copyright Royalty Judges shall prescribe by regulation and by paying royalty fees in accordance with this subsection; or
(ii) if such royalty fees have not been set, by agreeing to pay such royalty fees as shall be determined in accordance with this subsection.
(C) Any royalty payments in arrears shall be made on or before the twentieth day of the month next succeeding the month in which the royalty fees are set.
(5)
(A) Notwithstanding section 112 (e) and the other provisions of this subsection, the receiving agent may enter into agreements for the reproduction and performance of sound recordings under section 112 (e) and this section by any 1 or more commercial webcasters or noncommercial webcasters for a period of not more than 11 years beginning on January 1, 2005, that, once published in the Federal Register pursuant to subparagraph (B), shall be binding on all copyright owners of sound recordings and other persons entitled to payment under this section, in lieu of any determination by the Copyright Royalty Judges. Any such agreement for commercial webcasters may include provisions for payment of royalties on the basis of a percentage of revenue or expenses, or both, and include a minimum fee. Any such agreement may include other terms and conditions, including requirements by which copyright owners may receive notice of the use of their sound recordings and under which records of such use shall be kept and made available by commercial webcasters or noncommercial webcasters. The receiving agent shall be under no obligation to negotiate any such agreement. The receiving agent shall have no obligation to any copyright owner of sound recordings or any other person entitled to payment under this section in negotiating any such agreement, and no liability to any copyright owner of sound recordings or any other person entitled to payment under this section for having entered into such agreement.
(B) The Copyright Office shall cause to be published in the Federal Register any agreement entered into pursuant to subparagraph (A). Such publication shall include a statement containing the substance of subparagraph (C). Such agreements shall not be included in the Code of Federal Regulations. Thereafter, the terms of such agreement shall be available, as an option, to any commercial webcaster or noncommercial webcaster meeting the eligibility conditions of such agreement.
(C) Neither subparagraph (A) nor any provisions of any agreement entered into pursuant to subparagraph (A), including any rate structure, fees, terms, conditions, or notice and recordkeeping requirements set forth therein, shall be admissible as evidence or otherwise taken into account in any administrative, judicial, or other government proceeding involving the setting or adjustment of the royalties payable for the public performance or reproduction in ephemeral phonorecords or copies of sound recordings, the determination of terms or conditions related thereto, or the establishment of notice or recordkeeping requirements by the Copyright Royalty Judges under paragraph (4) or section 112 (e)(4). It is the intent of Congress that any royalty rates, rate structure, definitions, terms, conditions, or notice and recordkeeping requirements, included in such agreements shall be considered as a compromise motivated by the unique business, economic and political circumstances of webcasters, copyright owners, and performers rather than as matters that would have been negotiated in the marketplace between a willing buyer and a willing seller, or otherwise meet the objectives set forth in section 801 (b). This subparagraph shall not apply to the extent that the receiving agent and a webcaster that is party to an agreement entered into pursuant to subparagraph (A) expressly authorize the submission of the agreement in a proceeding under this subsection.
(D) Nothing in the Webcaster Settlement Act of 2008, the Webcaster Settlement Act of 2009, or any agreement entered into pursuant to subparagraph (A) shall be taken into account by the United States Court of Appeals for the District of Columbia Circuit in its review of the determination by the Copyright Royalty Judges of May 1, 2007, of rates and terms for the digital performance of sound recordings and ephemeral recordings, pursuant to sections 112 and 114.
(E) As used in this paragraph—
(i) the term “noncommercial webcaster” means a webcaster that—
(I) is exempt from taxation under section 501 of the Internal Revenue Code of 1986 (26 U.S.C. 501);
(II) has applied in good faith to the Internal Revenue Service for exemption from taxation under section 501 of the Internal Revenue Code and has a commercially reasonable expectation that such exemption shall be granted; or
(III) is operated by a State or possession or any governmental entity or subordinate thereof, or by the United States or District of Columbia, for exclusively public purposes;
(ii) the term “receiving agent” shall have the meaning given that term in section 261.2 of title 37, Code of Federal Regulations, as published in the Federal Register on July 8, 2002; and
(iii) the term “webcaster” means a person or entity that has obtained a compulsory license under section 112 or 114 and the implementing regulations therefor.
(F) The authority to make settlements pursuant to subparagraph (A) shall expire at 11:59 p.m. Eastern time on the 30th day after the date of the enactment of the Webcaster Settlement Act of 2009.
(g) Proceeds From Licensing of Transmissions.—
(1) Except in the case of a transmission licensed under a statutory license in accordance with subsection (f) of this section—
(A) a featured recording artist who performs on a sound recording that has been licensed for a transmission shall be entitled to receive payments from the copyright owner of the sound recording in accordance with the terms of the artist’s contract; and
(B) a nonfeatured recording artist who performs on a sound recording that has been licensed for a transmission shall be entitled to receive payments from the copyright owner of the sound recording in accordance with the terms of the nonfeatured recording artist’s applicable contract or other applicable agreement.
(2) An agent designated to distribute receipts from the licensing of transmissions in accordance with subsection (f) shall distribute such receipts as follows:
(A) 50 percent of the receipts shall be paid to the copyright owner of the exclusive right under section 106 (6) of this title to publicly perform a sound recording by means of a digital audio transmission.
(B) 21/2 percent of the receipts shall be deposited in an escrow account managed by an independent administrator jointly appointed by copyright owners of sound recordings and the American Federation of Musicians (or any successor entity) to be distributed to nonfeatured musicians (whether or not members of the American Federation of Musicians) who have performed on sound recordings.
(C) 21/2 percent of the receipts shall be deposited in an escrow account managed by an independent administrator jointly appointed by copyright owners of sound recordings and the American Federation of Television and Radio Artists (or any successor entity) to be distributed to nonfeatured vocalists (whether or not members of the American Federation of Television and Radio Artists) who have performed on sound recordings.
(D) 45 percent of the receipts shall be paid, on a per sound recording basis, to the recording artist or artists featured on such sound recording (or the persons conveying rights in the artists’ performance in the sound recordings).
(3) A nonprofit agent designated to distribute receipts from the licensing of transmissions in accordance with subsection (f) may deduct from any of its receipts, prior to the distribution of such receipts to any person or entity entitled thereto other than copyright owners and performers who have elected to receive royalties from another designated agent and have notified such nonprofit agent in writing of such election, the reasonable costs of such agent incurred after November 1, 1995, in—
(A) the administration of the collection, distribution, and calculation of the royalties;
(B) the settlement of disputes relating to the collection and calculation of the royalties; and
(C) the licensing and enforcement of rights with respect to the making of ephemeral recordings and performances subject to licensing under section 112 and this section, including those incurred in participating in negotiations or arbitration proceedings under section 112 and this section, except that all costs incurred relating to the section 112 ephemeral recordings right may only be deducted from the royalties received pursuant to section 112.
(4) Notwithstanding paragraph (3), any designated agent designated to distribute receipts from the licensing of transmissions in accordance with subsection (f) may deduct from any of its receipts, prior to the distribution of such receipts, the reasonable costs identified in paragraph (3) of such agent incurred after November 1, 1995, with respect to such copyright owners and performers who have entered with such agent a contractual relationship that specifies that such costs may be deducted from such royalty receipts.
(h) Licensing to Affiliates.—
(1) If the copyright owner of a sound recording licenses an affiliated entity the right to publicly perform a sound recording by means of a digital audio transmission under section 106 (6), the copyright owner shall make the licensed sound recording available under section 106 (6) on no less favorable terms and conditions to all bona fide entities that offer similar services, except that, if there are material differences in the scope of the requested license with respect to the type of service, the particular sound recordings licensed, the frequency of use, the number of subscribers served, or the duration, then the copyright owner may establish different terms and conditions for such other services.
(2) The limitation set forth in paragraph (1) of this subsection shall not apply in the case where the copyright owner of a sound recording licenses—
(A) an interactive service; or
(B) an entity to perform publicly up to 45 seconds of the sound recording and the sole purpose of the performance is to promote the distribution or performance of that sound recording.
(i) No Effect on Royalties for Underlying Works.— License fees payable for the public performance of sound recordings under section 106 (6) shall not be taken into account in any administrative, judicial, or other governmental proceeding to set or adjust the royalties payable to copyright owners of musical works for the public performance of their works. It is the intent of Congress that royalties payable to copyright owners of musical works for the public performance of their works shall not be diminished in any respect as a result of the rights granted by section 106 (6).
(j) Definitions.— As used in this section, the following terms have the following meanings:
(1) An “affiliated entity” is an entity engaging in digital audio transmissions covered by section 106 (6), other than an interactive service, in which the licensor has any direct or indirect partnership or any ownership interest amounting to 5 percent or more of the outstanding voting or non-voting stock.
(2) An “archived program” is a predetermined program that is available repeatedly on the demand of the transmission recipient and that is performed in the same order from the beginning, except that an archived program shall not include a recorded event or broadcast transmission that makes no more than an incidental use of sound recordings, as long as such recorded event or broadcast transmission does not contain an entire sound recording or feature a particular sound recording.
(3) A “broadcast” transmission is a transmission made by a terrestrial broadcast station licensed as such by the Federal Communications Commission.
(4) A “continuous program” is a predetermined program that is continuously performed in the same order and that is accessed at a point in the program that is beyond the control of the transmission recipient.
(5) A “digital audio transmission” is a digital transmission as defined in section 101, that embodies the transmission of a sound recording. This term does not include the transmission of any audiovisual work.
(6) An “eligible nonsubscription transmission” is a noninteractive nonsubscription digital audio transmission not exempt under subsection (d)(1) that is made as part of a service that provides audio programming consisting, in whole or in part, of performances of sound recordings, including retransmissions of broadcast transmissions, if the primary purpose of the service is to provide to the public such audio or other entertainment programming, and the primary purpose of the service is not to sell, advertise, or promote particular products or services other than sound recordings, live concerts, or other music-related events.
(7) An “interactive service” is one that enables a member of the public to receive a transmission of a program specially created for the recipient, or on request, a transmission of a particular sound recording, whether or not as part of a program, which is selected by or on behalf of the recipient. The ability of individuals to request that particular sound recordings be performed for reception by the public at large, or in the case of a subscription service, by all subscribers of the service, does not make a service interactive, if the programming on each channel of the service does not substantially consist of sound recordings that are performed within 1 hour of the request or at a time designated by either the transmitting entity or the individual making such request. If an entity offers both interactive and noninteractive services (either concurrently or at different times), the noninteractive component shall not be treated as part of an interactive service.
(8) A “new subscription service” is a service that performs sound recordings by means of noninteractive subscription digital audio transmissions and that is not a preexisting subscription service or a preexisting satellite digital audio radio service.
(9) A “nonsubscription” transmission is any transmission that is not a subscription transmission.
(10) A “preexisting satellite digital audio radio service” is a subscription satellite digital audio radio service provided pursuant to a satellite digital audio radio service license issued by the Federal Communications Commission on or before July 31, 1998, and any renewal of such license to the extent of the scope of the original license, and may include a limited number of sample channels representative of the subscription service that are made available on a nonsubscription basis in order to promote the subscription service.
(11) A “preexisting subscription service” is a service that performs sound recordings by means of noninteractive audio-only subscription digital audio transmissions, which was in existence and was making such transmissions to the public for a fee on or before July 31, 1998, and may include a limited number of sample channels representative of the subscription service that are made available on a nonsubscription basis in order to promote the subscription service.
(12) A “retransmission” is a further transmission of an initial transmission, and includes any further retransmission of the same transmission. Except as provided in this section, a transmission qualifies as a “retransmission” only if it is simultaneous with the initial transmission. Nothing in this definition shall be construed to exempt a transmission that fails to satisfy a separate element required to qualify for an exemption under section 114 (d)(1).
(13) The “sound recording performance complement” is the transmission during any 3-hour period, on a particular channel used by a transmitting entity, of no more than—
(A) 3 different selections of sound recordings from any one phonorecord lawfully distributed for public performance or sale in the United States, if no more than 2 such selections are transmitted consecutively; or
(B) 4 different selections of sound recordings—
(i) by the same featured recording artist; or
(ii) from any set or compilation of phonorecords lawfully distributed together as a unit for public performance or sale in the United States,
if no more than three such selections are transmitted consecutively:
Provided, That the transmission of selections in excess of the numerical limits provided for in clauses (A) and (B) from multiple phonorecords shall nonetheless qualify as a sound recording performance complement if the programming of the multiple phonorecords was not willfully intended to avoid the numerical limitations prescribed in such clauses.
(14) A “subscription” transmission is a transmission that is controlled and limited to particular recipients, and for which consideration is required to be paid or otherwise given by or on behalf of the recipient to receive the transmission or a package of transmissions including the transmission.
(15) A “transmission” is either an initial transmission or a retransmission.

6.8.9 Digital Millenium Copyright Act: 17 U.S. Code § 512 - Limitations on liability relating to material online 6.8.9 Digital Millenium Copyright Act: 17 U.S. Code § 512 - Limitations on liability relating to material online

(a) Transitory Digital Network Communications.— A service provider shall not be liable for monetary relief, or, except as provided in subsection (j), for injunctive or other equitable relief, for infringement of copyright by reason of the provider’s transmitting, routing, or providing connections for, material through a system or network controlled or operated by or for the service provider, or by reason of the intermediate and transient storage of that material in the course of such transmitting, routing, or providing connections, if—
(1) the transmission of the material was initiated by or at the direction of a person other than the service provider;
(2) the transmission, routing, provision of connections, or storage is carried out through an automatic technical process without selection of the material by the service provider;
(3) the service provider does not select the recipients of the material except as an automatic response to the request of another person;
(4) no copy of the material made by the service provider in the course of such intermediate or transient storage is maintained on the system or network in a manner ordinarily accessible to anyone other than anticipated recipients, and no such copy is maintained on the system or network in a manner ordinarily accessible to such anticipated recipients for a longer period than is reasonably necessary for the transmission, routing, or provision of connections; and
(5) the material is transmitted through the system or network without modification of its content.
(b) System Caching.—
(1) Limitation on liability.— A service provider shall not be liable for monetary relief, or, except as provided in subsection (j), for injunctive or other equitable relief, for infringement of copyright by reason of the intermediate and temporary storage of material on a system or network controlled or operated by or for the service provider in a case in which—
(A) the material is made available online by a person other than the service provider;
(B) the material is transmitted from the person described in subparagraph (A) through the system or network to a person other than the person described in subparagraph (A) at the direction of that other person; and
(C) the storage is carried out through an automatic technical process for the purpose of making the material available to users of the system or network who, after the material is transmitted as described in subparagraph (B), request access to the material from the person described in subparagraph (A),
if the conditions set forth in paragraph (2) are met.
(2) Conditions.— The conditions referred to in paragraph (1) are that—
(A) the material described in paragraph (1) is transmitted to the subsequent users described in paragraph (1)(C) without modification to its content from the manner in which the material was transmitted from the person described in paragraph (1)(A);
(B) the service provider described in paragraph (1) complies with rules concerning the refreshing, reloading, or other updating of the material when specified by the person making the material available online in accordance with a generally accepted industry standard data communications protocol for the system or network through which that person makes the material available, except that this subparagraph applies only if those rules are not used by the person described in paragraph (1)(A) to prevent or unreasonably impair the intermediate storage to which this subsection applies;
(C) the service provider does not interfere with the ability of technology associated with the material to return to the person described in paragraph (1)(A) the information that would have been available to that person if the material had been obtained by the subsequent users described in paragraph (1)(C) directly from that person, except that this subparagraph applies only if that technology—
(i) does not significantly interfere with the performance of the provider’s system or network or with the intermediate storage of the material;
(ii) is consistent with generally accepted industry standard communications protocols; and
(iii) does not extract information from the provider’s system or network other than the information that would have been available to the person described in paragraph (1)(A) if the subsequent users had gained access to the material directly from that person;
(D) if the person described in paragraph (1)(A) has in effect a condition that a person must meet prior to having access to the material, such as a condition based on payment of a fee or provision of a password or other information, the service provider permits access to the stored material in significant part only to users of its system or network that have met those conditions and only in accordance with those conditions; and
(E) if the person described in paragraph (1)(A) makes that material available online without the authorization of the copyright owner of the material, the service provider responds expeditiously to remove, or disable access to, the material that is claimed to be infringing upon notification of claimed infringement as described in subsection (c)(3), except that this subparagraph applies only if—
(i) the material has previously been removed from the originating site or access to it has been disabled, or a court has ordered that the material be removed from the originating site or that access to the material on the originating site be disabled; and
(ii) the party giving the notification includes in the notification a statement confirming that the material has been removed from the originating site or access to it has been disabled or that a court has ordered that the material be removed from the originating site or that access to the material on the originating site be disabled.
(c) Information Residing on Systems or Networks At Direction of Users.—
(1) In general.— A service provider shall not be liable for monetary relief, or, except as provided in subsection (j), for injunctive or other equitable relief, for infringement of copyright by reason of the storage at the direction of a user of material that resides on a system or network controlled or operated by or for the service provider, if the service provider—
(A)
(i) does not have actual knowledge that the material or an activity using the material on the system or network is infringing;
(ii) in the absence of such actual knowledge, is not aware of facts or circumstances from which infringing activity is apparent; or
(iii) upon obtaining such knowledge or awareness, acts expeditiously to remove, or disable access to, the material;
(B) does not receive a financial benefit directly attributable to the infringing activity, in a case in which the service provider has the right and ability to control such activity; and
(C) upon notification of claimed infringement as described in paragraph (3), responds expeditiously to remove, or disable access to, the material that is claimed to be infringing or to be the subject of infringing activity.
(2) Designated agent.— The limitations on liability established in this subsection apply to a service provider only if the service provider has designated an agent to receive notifications of claimed infringement described in paragraph (3), by making available through its service, including on its website in a location accessible to the public, and by providing to the Copyright Office, substantially the following information:
(A) the name, address, phone number, and electronic mail address of the agent.
(B) other contact information which the Register of Copyrights may deem appropriate.
The Register of Copyrights shall maintain a current directory of agents available to the public for inspection, including through the Internet, and may require payment of a fee by service providers to cover the costs of maintaining the directory.
(3) Elements of notification.—
(A) To be effective under this subsection, a notification of claimed infringement must be a written communication provided to the designated agent of a service provider that includes substantially the following:
(i) A physical or electronic signature of a person authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.
(ii) Identification of the copyrighted work claimed to have been infringed, or, if multiple copyrighted works at a single online site are covered by a single notification, a representative list of such works at that site.
(iii) Identification of the material that is claimed to be infringing or to be the subject of infringing activity and that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit the service provider to locate the material.
(iv) Information reasonably sufficient to permit the service provider to contact the complaining party, such as an address, telephone number, and, if available, an electronic mail address at which the complaining party may be contacted.
(v) A statement that the complaining party has a good faith belief that use of the material in the manner complained of is not authorized by the copyright owner, its agent, or the law.
(vi) A statement that the information in the notification is accurate, and under penalty of perjury, that the complaining party is authorized to act on behalf of the owner of an exclusive right that is allegedly infringed.
(B)
(i) Subject to clause (ii), a notification from a copyright owner or from a person authorized to act on behalf of the copyright owner that fails to comply substantially with the provisions of subparagraph (A) shall not be considered under paragraph (1)(A) in determining whether a service provider has actual knowledge or is aware of facts or circumstances from which infringing activity is apparent.
(ii) In a case in which the notification that is provided to the service provider’s designated agent fails to comply substantially with all the provisions of subparagraph (A) but substantially complies with clauses (ii), (iii), and (iv) of subparagraph (A), clause (i) of this subparagraph applies only if the service provider promptly attempts to contact the person making the notification or takes other reasonable steps to assist in the receipt of notification that substantially complies with all the provisions of subparagraph (A).
(d) Information Location Tools.— A service provider shall not be liable for monetary relief, or, except as provided in subsection (j), for injunctive or other equitable relief, for infringement of copyright by reason of the provider referring or linking users to an online location containing infringing material or infringing activity, by using information location tools, including a directory, index, reference, pointer, or hypertext link, if the service provider—
(1)
(A) does not have actual knowledge that the material or activity is infringing;
(B) in the absence of such actual knowledge, is not aware of facts or circumstances from which infringing activity is apparent; or
(C) upon obtaining such knowledge or awareness, acts expeditiously to remove, or disable access to, the material;
(2) does not receive a financial benefit directly attributable to the infringing activity, in a case in which the service provider has the right and ability to control such activity; and
(3) upon notification of claimed infringement as described in subsection (c)(3), responds expeditiously to remove, or disable access to, the material that is claimed to be infringing or to be the subject of infringing activity, except that, for purposes of this paragraph, the information described in subsection (c)(3)(A)(iii) shall be identification of the reference or link, to material or activity claimed to be infringing, that is to be removed or access to which is to be disabled, and information reasonably sufficient to permit the service provider to locate that reference or link.
(e) Limitation on Liability of Nonprofit Educational Institutions.—
(1) When a public or other nonprofit institution of higher education is a service provider, and when a faculty member or graduate student who is an employee of such institution is performing a teaching or research function, for the purposes of subsections (a) and (b) such faculty member or graduate student shall be considered to be a person other than the institution, and for the purposes of subsections (c) and (d) such faculty member’s or graduate student’s knowledge or awareness of his or her infringing activities shall not be attributed to the institution, if—
(A) such faculty member’s or graduate student’s infringing activities do not involve the provision of online access to instructional materials that are or were required or recommended, within the preceding 3-year period, for a course taught at the institution by such faculty member or graduate student;
(B) the institution has not, within the preceding 3-year period, received more than two notifications described in subsection (c)(3) of claimed infringement by such faculty member or graduate student, and such notifications of claimed infringement were not actionable under subsection (f); and
(C) the institution provides to all users of its system or network informational materials that accurately describe, and promote compliance with, the laws of the United States relating to copyright.
(2) For the purposes of this subsection, the limitations on injunctive relief contained in subsections (j)(2) and (j)(3), but not those in (j)(1), shall apply.
(f) Misrepresentations.— Any person who knowingly materially misrepresents under this section—
(1) that material or activity is infringing, or
(2) that material or activity was removed or disabled by mistake or misidentification,
shall be liable for any damages, including costs and attorneys’ fees, incurred by the alleged infringer, by any copyright owner or copyright owner’s authorized licensee, or by a service provider, who is injured by such misrepresentation, as the result of the service provider relying upon such misrepresentation in removing or disabling access to the material or activity claimed to be infringing, or in replacing the removed material or ceasing to disable access to it.
(g) Replacement of Removed or Disabled Material and Limitation on Other Liability.—
(1) No liability for taking down generally.— Subject to paragraph (2), a service provider shall not be liable to any person for any claim based on the service provider’s good faith disabling of access to, or removal of, material or activity claimed to be infringing or based on facts or circumstances from which infringing activity is apparent, regardless of whether the material or activity is ultimately determined to be infringing.
(2) Exception.— Paragraph (1) shall not apply with respect to material residing at the direction of a subscriber of the service provider on a system or network controlled or operated by or for the service provider that is removed, or to which access is disabled by the service provider, pursuant to a notice provided under subsection (c)(1)(C), unless the service provider—
(A) takes reasonable steps promptly to notify the subscriber that it has removed or disabled access to the material;
(B) upon receipt of a counter notification described in paragraph (3), promptly provides the person who provided the notification under subsection (c)(1)(C) with a copy of the counter notification, and informs that person that it will replace the removed material or cease disabling access to it in 10 business days; and
(C) replaces the removed material and ceases disabling access to it not less than 10, nor more than 14, business days following receipt of the counter notice, unless its designated agent first receives notice from the person who submitted the notification under subsection (c)(1)(C) that such person has filed an action seeking a court order to restrain the subscriber from engaging in infringing activity relating to the material on the service provider’s system or network.
(3) Contents of counter notification.— To be effective under this subsection, a counter notification must be a written communication provided to the service provider’s designated agent that includes substantially the following:
(A) A physical or electronic signature of the subscriber.
(B) Identification of the material that has been removed or to which access has been disabled and the location at which the material appeared before it was removed or access to it was disabled.
(C) A statement under penalty of perjury that the subscriber has a good faith belief that the material was removed or disabled as a result of mistake or misidentification of the material to be removed or disabled.
(D) The subscriber’s name, address, and telephone number, and a statement that the subscriber consents to the jurisdiction of Federal District Court for the judicial district in which the address is located, or if the subscriber’s address is outside of the United States, for any judicial district in which the service provider may be found, and that the subscriber will accept service of process from the person who provided notification under subsection (c)(1)(C) or an agent of such person.
(4) Limitation on other liability.— A service provider’s compliance with paragraph (2) shall not subject the service provider to liability for copyright infringement with respect to the material identified in the notice provided under subsection (c)(1)(C).
(h) Subpoena To Identify Infringer.—
(1) Request.— A copyright owner or a person authorized to act on the owner’s behalf may request the clerk of any United States district court to issue a subpoena to a service provider for identification of an alleged infringer in accordance with this subsection.
(2) Contents of request.— The request may be made by filing with the clerk—
(A) a copy of a notification described in subsection (c)(3)(A);
(B) a proposed subpoena; and
(C) a sworn declaration to the effect that the purpose for which the subpoena is sought is to obtain the identity of an alleged infringer and that such information will only be used for the purpose of protecting rights under this title.
(3) Contents of subpoena.— The subpoena shall authorize and order the service provider receiving the notification and the subpoena to expeditiously disclose to the copyright owner or person authorized by the copyright owner information sufficient to identify the alleged infringer of the material described in the notification to the extent such information is available to the service provider.
(4) Basis for granting subpoena.— If the notification filed satisfies the provisions of subsection (c)(3)(A), the proposed subpoena is in proper form, and the accompanying declaration is properly executed, the clerk shall expeditiously issue and sign the proposed subpoena and return it to the requester for delivery to the service provider.
(5) Actions of service provider receiving subpoena.— Upon receipt of the issued subpoena, either accompanying or subsequent to the receipt of a notification described in subsection (c)(3)(A), the service provider shall expeditiously disclose to the copyright owner or person authorized by the copyright owner the information required by the subpoena, notwithstanding any other provision of law and regardless of whether the service provider responds to the notification.
(6) Rules applicable to subpoena.— Unless otherwise provided by this section or by applicable rules of the court, the procedure for issuance and delivery of the subpoena, and the remedies for noncompliance with the subpoena, shall be governed to the greatest extent practicable by those provisions of the Federal Rules of Civil Procedure governing the issuance, service, and enforcement of a subpoena duces tecum.
(i) Conditions for Eligibility.—
(1) Accommodation of technology.— The limitations on liability established by this section shall apply to a service provider only if the service provider—
(A) has adopted and reasonably implemented, and informs subscribers and account holders of the service provider’s system or network of, a policy that provides for the termination in appropriate circumstances of subscribers and account holders of the service provider’s system or network who are repeat infringers; and
(B) accommodates and does not interfere with standard technical measures.
(2) Definition.— As used in this subsection, the term “standard technical measures” means technical measures that are used by copyright owners to identify or protect copyrighted works and—
(A) have been developed pursuant to a broad consensus of copyright owners and service providers in an open, fair, voluntary, multi-industry standards process;
(B) are available to any person on reasonable and nondiscriminatory terms; and
(C) do not impose substantial costs on service providers or substantial burdens on their systems or networks.
(j) Injunctions.— The following rules shall apply in the case of any application for an injunction under section 502 against a service provider that is not subject to monetary remedies under this section:
(1) Scope of relief.—
(A) With respect to conduct other than that which qualifies for the limitation on remedies set forth in subsection (a), the court may grant injunctive relief with respect to a service provider only in one or more of the following forms:
(i) An order restraining the service provider from providing access to infringing material or activity residing at a particular online site on the provider’s system or network.
(ii) An order restraining the service provider from providing access to a subscriber or account holder of the service provider’s system or network who is engaging in infringing activity and is identified in the order, by terminating the accounts of the subscriber or account holder that are specified in the order.
(iii) Such other injunctive relief as the court may consider necessary to prevent or restrain infringement of copyrighted material specified in the order of the court at a particular online location, if such relief is the least burdensome to the service provider among the forms of relief comparably effective for that purpose.
(B) If the service provider qualifies for the limitation on remedies described in subsection (a), the court may only grant injunctive relief in one or both of the following forms:
(i) An order restraining the service provider from providing access to a subscriber or account holder of the service provider’s system or network who is using the provider’s service to engage in infringing activity and is identified in the order, by terminating the accounts of the subscriber or account holder that are specified in the order.
(ii) An order restraining the service provider from providing access, by taking reasonable steps specified in the order to block access, to a specific, identified, online location outside the United States.
(2) Considerations.— The court, in considering the relevant criteria for injunctive relief under applicable law, shall consider—
(A) whether such an injunction, either alone or in combination with other such injunctions issued against the same service provider under this subsection, would significantly burden either the provider or the operation of the provider’s system or network;
(B) the magnitude of the harm likely to be suffered by the copyright owner in the digital network environment if steps are not taken to prevent or restrain the infringement;
(C) whether implementation of such an injunction would be technically feasible and effective, and would not interfere with access to noninfringing material at other online locations; and
(D) whether other less burdensome and comparably effective means of preventing or restraining access to the infringing material are available.
(3) Notice and ex parte orders.— Injunctive relief under this subsection shall be available only after notice to the service provider and an opportunity for the service provider to appear are provided, except for orders ensuring the preservation of evidence or other orders having no material adverse effect on the operation of the service provider’s communications network.
(k) Definitions.—
(1) Service provider.—
(A) As used in subsection (a), the term “service provider” means an entity offering the transmission, routing, or providing of connections for digital online communications, between or among points specified by a user, of material of the user’s choosing, without modification to the content of the material as sent or received.
(B) As used in this section, other than subsection (a), the term “service provider” means a provider of online services or network access, or the operator of facilities therefor, and includes an entity described in subparagraph (A).
(2) Monetary relief.— As used in this section, the term “monetary relief” means damages, costs, attorneys’ fees, and any other form of monetary payment.
(l) Other Defenses Not Affected.— The failure of a service provider’s conduct to qualify for limitation of liability under this section shall not bear adversely upon the consideration of a defense by the service provider that the service provider’s conduct is not infringing under this title or any other defense.
(m) Protection of Privacy.— Nothing in this section shall be construed to condition the applicability of subsections (a) through (d) on—
(1) a service provider monitoring its service or affirmatively seeking facts indicating infringing activity, except to the extent consistent with a standard technical measure complying with the provisions of subsection (i); or
(2) a service provider gaining access to, removing, or disabling access to material in cases in which such conduct is prohibited by law.
(n) Construction.— Subsections (a), (b), (c), and (d) describe separate and distinct functions for purposes of applying this section. Whether a service provider qualifies for the limitation on liability in any one of those subsections shall be based solely on the criteria in that subsection, and shall not affect a determination of whether that service provider qualifies for the limitations on liability under any other such subsection.